summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc8979.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc8979.txt')
-rw-r--r--doc/rfc/rfc8979.txt595
1 files changed, 595 insertions, 0 deletions
diff --git a/doc/rfc/rfc8979.txt b/doc/rfc/rfc8979.txt
new file mode 100644
index 0000000..9ce7a8a
--- /dev/null
+++ b/doc/rfc/rfc8979.txt
@@ -0,0 +1,595 @@
+
+
+
+
+Internet Engineering Task Force (IETF) B. Sarikaya
+Request for Comments: 8979
+Category: Standards Track D. von Hugo
+ISSN: 2070-1721 Deutsche Telekom
+ M. Boucadair
+ Orange
+ February 2021
+
+
+ Subscriber and Performance Policy Identifier Context Headers in the
+ Network Service Header (NSH)
+
+Abstract
+
+ This document defines the Subscriber and Performance Policy
+ Identifier Context Headers. These Variable-Length Context Headers
+ can be carried in the Network Service Header (NSH) and are used to
+ inform Service Functions (SFs) of subscriber- and performance-related
+ information for the sake of policy enforcement and appropriate
+ Service Function Chaining (SFC) operations. The structure of each
+ Context Header and their use and processing by NSH-aware nodes are
+ described.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc8979.
+
+Copyright Notice
+
+ Copyright (c) 2021 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 2. Conventions and Terminology
+ 3. Subscriber Identifier NSH Variable-Length Context Header
+ 4. Performance Policy Identifier NSH Variable-Length Context
+ Headers
+ 5. MTU Considerations
+ 6. IANA Considerations
+ 7. Security Considerations
+ 8. References
+ 8.1. Normative References
+ 8.2. Informative References
+ Acknowledgements
+ Authors' Addresses
+
+1. Introduction
+
+ This document discusses how to inform Service Functions (SFs)
+ [RFC7665] about subscriber and service policy information when
+ required for the sake of policy enforcement within a single
+ administrative domain. In particular, subscriber-related information
+ may be required to enforce subscriber-specific SFC-based traffic
+ policies. However, the information carried in packets may not be
+ sufficient to unambiguously identify a subscriber. This document
+ fills this void by specifying a new Network Service Header (NSH)
+ [RFC8300] Context Header to convey and disseminate such information
+ within the boundaries of a single administrative domain. As
+ discussed in Section 3, the use of obfuscated and non-persistent
+ identifiers is recommended.
+
+ Also, traffic steering by means of SFC may be driven, for example, by
+ Quality of Service (QoS) considerations. Typically, QoS information
+ may serve as an input for the computation, establishment, and
+ selection of the Service Function Path (SFP). Furthermore, the
+ dynamic structuring of Service Function Chains and their subsequent
+ SFPs may be conditioned by QoS requirements that will affect the
+ identification, location, and sequencing of SF instances. Hence, the
+ need arises to provide downstream SFs with a performance policy
+ identifier in order for them to appropriately meet the QoS
+ requirements. This document also specifies a new NSH Context Header
+ (Section 4) to convey such policy identifiers.
+
+ The context information defined in this document can be applicable in
+ the context of mobile networks (particularly in the 3GPP-defined
+ (S)Gi interface) [CASE-MOBILITY]. Typically, because of the
+ widespread use of private IPv4 addresses in those networks, if the
+ SFs to be invoked are located after a NAT function, the
+ identification based on the internal IPv4 address is not possible
+ once the NAT has been crossed. NAT functionality can reside in a
+ distinct node. For a 4G 3GPP network, that node can be the Packet
+ Data Network (PDN) Gateway (PGW) as specified in [TS23401]. For a 5G
+ 3GPP network, it can be the User Plane Function (UPF) facing the
+ external Data Network (DN) [TS23501]. As such, a mechanism to pass
+ the internal information past the NAT boundary may optimize packet
+ traversal within an SFC-enabled mobile network domain. Furthermore,
+ some SFs that are not enabled on the PGW/UPF may require a subscriber
+ identifier to properly operate (see, for example, those listed in
+ [RFC8371]). It is outside the scope of this document to include a
+ comprehensive list of deployments that may make use of the Context
+ Headers defined in the document.
+
+ Since subscriber identifiers are distinct from those used to identify
+ a performance policy and given that multiple policies may be
+ associated with a single subscriber within a Service Function Chain,
+ these identifiers are carried in distinct Context Headers rather than
+ being multiplexed in one single Context Header. This approach avoids
+ a requirement for additional internal structure in the Context
+ Headers to specify whether an identifier refers to a subscriber or to
+ a policy.
+
+ This document does not make any assumptions about the structure of
+ subscriber or performance policy identifiers; each such identifier is
+ treated as an opaque value. The semantics and validation of these
+ identifiers are policies local to each SFC-enabled domain. This
+ document focuses on the data plane behavior. Control plane
+ considerations are out of the scope.
+
+ This document adheres to the SFC data plane architecture defined in
+ [RFC7665]. This document assumes the reader is familiar with
+ [RFC8300].
+
+ This document assumes the NSH is used exclusively within a single
+ administrative domain. This document follows the recommendations in
+ [RFC8300] for handling the Context Headers at both ingress and egress
+ SFC boundary nodes (i.e., to strip the entire NSH, including Context
+ Headers). Revealing any subscriber-related information to parties
+ outside the SFC-enabled domain is avoided by design. Accordingly,
+ the scope for privacy breaches and user tracking is limited to within
+ the SFC-enabled domain where the NSH is used. It is assumed that
+ appropriate mechanisms to monitor and audit an SFC-enabled domain to
+ detect misbehavior and to deter misuse are in place.
+
+ MTU considerations are discussed in Section 5.
+
+2. Conventions and Terminology
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+ The reader should be familiar with the terms defined in [RFC7665].
+
+ "SFC Control Element" refers to a logical entity that instructs one
+ or more SFC data plane functional elements on how to process packets
+ within an SFC-enabled domain.
+
+3. Subscriber Identifier NSH Variable-Length Context Header
+
+ Subscriber Identifier is defined as an optional Variable-Length NSH
+ Context Header. Its structure is shown in Figure 1.
+
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Metadata Class | Type |U| Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ ~ Subscriber Identifier ~
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 1: Subscriber Identifier Variable-Length Context Header
+
+ The fields are described as follows:
+
+ Metadata Class: MUST be set to 0x0 [RFC8300].
+
+ Type: 0x00 (see Section 6).
+
+ U bit: Unassigned bit (see Section 2.5.1 of [RFC8300]).
+
+ Length: Indicates the length of the Subscriber Identifier, in bytes
+ (see Section 2.5.1 of [RFC8300]).
+
+ Subscriber Identifier: Carries an opaque local identifier that is
+ assigned to a subscriber by a network operator.
+
+ While this document does not specify an internal structure for
+ these identifiers, it also does not provide any cryptographic
+ protection for them; any internal structure to the identifier
+ values chosen will thus be visible on the wire if no secure
+ transport encapsulation is used. Accordingly, in alignment with
+ Section 8.2.2 of [RFC8300], identifier values SHOULD be
+ obfuscated.
+
+ The Subscriber Identifier Context Header is used by SFs to enforce
+ per-subscriber policies (e.g., resource quota, customized filtering
+ profile, accounting). To that aim, network operators may rely on
+ identifiers that are generated from those used in legacy deployments
+ (e.g., Section 3.3 of [CASE-MOBILITY]). Alternatively, network
+ operators may use identifiers that are associated with customized
+ policy profiles that are preconfigured on SFs using an out-of-band
+ mechanism. Such a mechanism can be used to rotate the identifiers,
+ thus allowing for better unlinkability (Section 3.2 of [RFC6973]).
+ Such alternative methods may be suboptimal (e.g., scalability issues
+ induced by maintaining and processing finer granular profiles) or
+ inadequate for providing some per-subscriber policies. The
+ assessment of whether a method for defining a subscriber identifier
+ provides the required functionality and whether it is compatible with
+ the capabilities of the SFs at the intended performance level is
+ deployment specific.
+
+ The classifier and NSH-aware SFs MAY inject a Subscriber Identifier
+ Context Header as a function of a local policy. This local policy
+ should indicate the SFP(s) for which the Subscriber Identifier
+ Context Header will be added. In order to prevent interoperability
+ issues, the type and format of the identifiers to be injected in a
+ Subscriber Identifier Context Header should be configured to nodes
+ authorized to inject and consume such headers. For example, a node
+ can be instructed to insert such data following a type/set scheme
+ (e.g., node X should inject subscriber ID type Y). Other schemes may
+ be envisaged.
+
+ Failures to inject such headers should be logged locally, while a
+ notification alarm may be sent to a Control Element. The details of
+ sending notification alarms (i.e., the parameters affecting the
+ transmission of the notification alarms) might depend on the nature
+ of the information in the Context Header. Parameters for sending
+ alarms, such as frequency, thresholds, and content of the alarm,
+ should be configurable.
+
+ The default behavior of intermediary NSH-aware nodes is to preserve
+ Subscriber Identifier Context Headers (i.e., the information can be
+ passed to next-hop NSH-aware nodes), but local policy may require an
+ intermediary NSH-aware node to strip a Subscriber Identifier Context
+ Header after processing it.
+
+ NSH-aware SFs MUST ignore Context Headers carrying unknown subscriber
+ identifiers.
+
+ Local policies at NSH-aware SFs may require running additional
+ validation checks on the content of these Context Headers (e.g.,
+ accepting only some lengths or types). These policies may also
+ indicate the behavior to be followed by an NSH-aware SF if the
+ validation checks fail (e.g., removing the Context Header from the
+ packet). These additional validation checks are deployment specific.
+ If validation checks fail on a Subscriber Identifier Context Header,
+ an NSH-aware SF MUST ignore that Context Header. The event should be
+ logged locally, while a notification alarm may be sent to a Control
+ Element if the NSH-aware SF is instructed to do so. For example, an
+ SF will discard Subscriber Identifier Context Headers conveying
+ identifiers in all formats that are different from the one the SF is
+ instructed to expect.
+
+ Multiple Subscriber Identifier Context Headers MAY be present in the
+ NSH, each carrying a distinct opaque value but all pointing to the
+ same subscriber. This may be required, e.g., by policy enforcement
+ mechanisms in a mobile network where some SFs rely on IP addresses as
+ subscriber identifiers, while others use non-IP-specific identifiers
+ such as those listed in [RFC8371] and Section 3.3.2 of
+ [CASE-MOBILITY]. When multiple Subscriber Identifier Context Headers
+ are present and an SF is instructed to strip the Subscriber
+ Identifier Context Header, that SF MUST remove all Subscriber
+ Identifier Context Headers.
+
+4. Performance Policy Identifier NSH Variable-Length Context Headers
+
+ Dedicated service-specific performance identifiers are defined to
+ differentiate between services that require specific treatment in
+ order to exhibit a performance characterized by, e.g., ultra-low
+ latency (ULL) or ultra-high reliability (UHR). Other policies can be
+ considered when instantiating a Service Function Chain within an SFC-
+ enabled domain. They are conveyed in the Performance Policy
+ Identifier Context Header.
+
+ The Performance Policy Identifier Context Header is inserted in an
+ NSH packet so that downstream NSH-aware nodes can make use of the
+ performance information for proper selection of suitably distributed
+ SFC paths, SF instances, or applicable policy at SFs. Note that the
+ use of the performance policy identifier is not helpful if the path
+ computation is centralized and a strict SFP is presented as local
+ policy to SF Forwarders (SFFs).
+
+ The Performance Policy Identifier Context Header allows for the
+ distributed enforcement of a per-service policy such as requiring an
+ SFP to only include specific SF instances (e.g., SFs located within
+ the same Data Center (DC) or those that are exposing the shortest
+ delay from an SFF). Details of this process are implementation
+ specific. For illustration purposes, an SFF may retrieve the details
+ of usable SFs based upon the corresponding performance policy
+ identifier. Typical criteria for instantiating specific SFs include
+ location, performance, or proximity considerations. For the
+ particular case of UHR services, the standby operation of backup
+ capacity or the presence of SFs deployed in multiple instances may be
+ requested.
+
+ In an environment characterized by frequent changes of link and path
+ behavior (for example, due to variable load or availability caused by
+ propagation conditions on a wireless link), the SFP may have to be
+ adapted dynamically by on-the-move SFC path and SF instance
+ selection.
+
+ Performance Policy Identifier is defined as an optional Variable-
+ Length Context Header. Its structure is shown in Figure 2.
+
+ The default behavior of intermediary NSH-aware nodes is to preserve
+ such Context Headers (i.e., the information can be passed to next-hop
+ NSH-aware nodes), but local policy may require an intermediary NSH-
+ aware node to strip one Context Header after processing it.
+
+ Multiple Performance Policy Identifier Context Headers MAY be present
+ in the NSH, each carrying an opaque value for a distinct policy that
+ needs to be enforced for a flow. Supplying conflicting policies may
+ complicate the SFP computation and SF instance location.
+ Corresponding rules to detect conflicting policies may be provided as
+ a local policy to the NSH-aware nodes. When such conflict is
+ detected by an NSH-aware node, the default behavior of the node is to
+ discard the packet and send a notification alarm to a Control
+ Element.
+
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Metadata Class | Type |U| Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ ~ Performance Policy Identifier ~
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 2: Performance Policy Identifier Variable-Length Context
+ Header
+
+ The fields are described as follows:
+
+ Metadata Class: MUST be set to 0x0 [RFC8300].
+
+ Type: 0x01 (see Section 6).
+
+ U bit: Unassigned bit (see Section 2.5.1 of [RFC8300]).
+
+ Length: Indicates the length of the Performance Policy Identifier,
+ in bytes (see Section 2.5.1 of [RFC8300]).
+
+ Performance Policy Identifier: Represents an opaque value pointing
+ to a specific performance policy to be enforced. The structure
+ and semantics of this field are deployment specific.
+
+5. MTU Considerations
+
+ As discussed in Section 5.6 of [RFC7665], the SFC architecture
+ prescribes that additional information be added to packets to:
+
+ * Identify SFPs. This is typically the NSH Base Header (Section 2.2
+ of [RFC8300]) and Service Path Header (Section 2.3 of [RFC8300]).
+
+ * Carry metadata such those defined in Sections 3 and 4.
+
+ * Steer the traffic along the SFPs: This is realized by means of
+ transport encapsulation.
+
+ This added information increases the size of the packet to be carried
+ along an SFP.
+
+ Aligned with Section 5 of [RFC8300], it is RECOMMENDED for network
+ operators to increase the underlying MTU so that NSH traffic is
+ forwarded within an SFC-enabled domain without fragmentation. The
+ available underlying MTU should be taken into account by network
+ operators when providing SFs with the required Context Headers to be
+ injected per SFP and the size of the data to be carried in these
+ Context Headers.
+
+ If the underlying MTU cannot be increased to accommodate the NSH
+ overhead, network operators may rely upon a transport encapsulation
+ protocol with the required fragmentation handling. The impact of
+ activating such feature on SFFs should be carefully assessed by
+ network operators (Section 5.6 of [RFC7665]).
+
+ When dealing with MTU issues, network operators should consider the
+ limitations of various transport encapsulations such as those
+ discussed in [INTAREA-TUNNELS].
+
+6. IANA Considerations
+
+ IANA has assigned the following types from the "NSH IETF-Assigned
+ Optional Variable-Length Metadata Types" subregistry (0x0000 IETF
+ Base NSH MD Class) available at: <https://www.iana.org/assignments/
+ nsh>.
+
+ +=======+===============================+===========+
+ | Value | Description | Reference |
+ +=======+===============================+===========+
+ | 0x00 | Subscriber Identifier | [RFC8979] |
+ +-------+-------------------------------+-----------+
+ | 0x01 | Performance Policy Identifier | [RFC8979] |
+ +-------+-------------------------------+-----------+
+
+ Table 1: NSH IETF-Assigned Optional Variable-
+ Length Metadata Types Additions
+
+7. Security Considerations
+
+ Data plane SFC-related security considerations, including privacy,
+ are discussed in Section 6 of [RFC7665] and Section 8 of [RFC8300].
+ In particular, Section 8.2.2 of [RFC8300] states that attached
+ metadata (i.e., Context Headers) should be limited to that necessary
+ for correct operation of the SFP. Section 8.2.2 of [RFC8300]
+ indicates that metadata considerations that operators can take into
+ account when using NSH are discussed in [RFC8165].
+
+ As specified in [RFC8300], means to prevent leaking privacy-related
+ information outside an SFC-enabled domain are natively supported by
+ the NSH given that the last SFF of an SFP will systematically remove
+ the NSH (and therefore the identifiers defined in this specification)
+ before forwarding a packet exiting the SFP.
+
+ Nodes that are involved in an SFC-enabled domain are assumed to be
+ trusted (Section 1.1 of [RFC8300]). Discussion of means to check
+ that only authorized nodes are traversed when a packet is crossing an
+ SFC-enabled domain is out of scope of this document.
+
+ Both Subscriber Identifier and Performance Policy Identifier Context
+ Headers carry opaque data. In particular, the Subscriber Identifier
+ Context Header is locally assigned by a network provider and can be
+ generated from some of the information that is already conveyed in
+ the original packets from a host (e.g., internal IP address) or other
+ information that is collected from various sources within an SFC-
+ enabled domain (e.g., line identifier). The structure of the
+ identifiers conveyed in these Context Headers is communicated only to
+ entitled NSH-aware nodes. Nevertheless, some structures may be
+ easily inferred from the headers if trivial structures are used
+ (e.g., IP addresses). As persistent identifiers facilitate tracking
+ over time, the use of indirect and non-persistent identification is
+ thus RECOMMENDED.
+
+ Moreover, the presence of multiple Subscriber Identifier Context
+ Headers in the same NSH allows a misbehaving node from within the
+ SFC-enabled domain to bind these identifiers to the same subscriber.
+ This can be used to track that subscriber more effectively. The use
+ of non-persistent (e.g., regularly randomized) identifiers as well as
+ the removal of the Subscriber Identifier Context Headers from the NSH
+ by the last SF making use of such headers soften this issue (see
+ "data minimization" discussed in Section 3 of [RFC8165]). Such
+ behavior is especially strongly recommended in case no encryption is
+ enabled.
+
+ A misbehaving node from within the SFC-enabled domain may alter the
+ content of Subscriber Identifier and Performance Policy Identifier
+ Context Headers, which may lead to service disruption. Such an
+ attack is not unique to the Context Headers defined in this document;
+ measures discussed in Section 8 of [RFC8300] are to be followed. A
+ mechanism for NSH integrity is specified in [NSH-INTEGRITY].
+
+ If no secure transport encapsulation is enabled, the use of trivial
+ subscriber identifier structures, together with the presence of
+ specific SFs in a Service Function Chain, may reveal sensitive
+ information to every on-path device. Also, operational staff in
+ teams managing these devices could gain access to such user privacy-
+ affecting data. Such disclosure can be a violation of legal
+ requirements because such information should be available to very few
+ network operator personnel. Furthermore, access to subscriber data
+ usually requires specific access privilege levels. To maintain that
+ protection, an SF keeping operational logs should not log the content
+ of Subscriber and Performance Policy Identifier Context Headers
+ unless the SF actually uses the content of these headers for its
+ operation. As discussed in Section 8.2.2 of [RFC8300], subscriber-
+ identifying information should be obfuscated, and, if an operator
+ deems cryptographic integrity protection is needed, security features
+ in the transport encapsulation protocol (such as IPsec) must be used.
+ A mechanism for encrypting sensitive NSH data is specified in
+ [NSH-INTEGRITY]. This mechanism can be considered by network
+ operators when enhanced SF-to-SF security protection of NSH metadata
+ is required (e.g., to protect against compromised SFFs).
+
+ Some events are logged locally with notification alerts sent by NSH-
+ aware nodes to a Control Element. These events SHOULD be rate
+ limited.
+
+8. References
+
+8.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function
+ Chaining (SFC) Architecture", RFC 7665,
+ DOI 10.17487/RFC7665, October 2015,
+ <https://www.rfc-editor.org/info/rfc7665>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+ [RFC8300] Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro, Ed.,
+ "Network Service Header (NSH)", RFC 8300,
+ DOI 10.17487/RFC8300, January 2018,
+ <https://www.rfc-editor.org/info/rfc8300>.
+
+8.2. Informative References
+
+ [CASE-MOBILITY]
+ Haeffner, W., Napper, J., Stiemerling, M., Lopez, D. R.,
+ and J. Uttaro, "Service Function Chaining Use Cases in
+ Mobile Networks", Work in Progress, Internet-Draft, draft-
+ ietf-sfc-use-case-mobility-09, 1 January 2019,
+ <https://tools.ietf.org/html/draft-ietf-sfc-use-case-
+ mobility-09>.
+
+ [INTAREA-TUNNELS]
+ Touch, J. and M. Townsley, "IP Tunnels in the Internet
+ Architecture", Work in Progress, Internet-Draft, draft-
+ ietf-intarea-tunnels-10, 12 September 2019,
+ <https://tools.ietf.org/html/draft-ietf-intarea-tunnels-
+ 10>.
+
+ [NSH-INTEGRITY]
+ Boucadair, M., Reddy.K, T., and D. Wing, "Integrity
+ Protection for the Network Service Header (NSH) and
+ Encryption of Sensitive Context Headers", Work in
+ Progress, Internet-Draft, draft-ietf-sfc-nsh-integrity-03,
+ 22 January 2021, <https://tools.ietf.org/html/draft-ietf-
+ sfc-nsh-integrity-03>.
+
+ [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
+ Morris, J., Hansen, M., and R. Smith, "Privacy
+ Considerations for Internet Protocols", RFC 6973,
+ DOI 10.17487/RFC6973, July 2013,
+ <https://www.rfc-editor.org/info/rfc6973>.
+
+ [RFC8165] Hardie, T., "Design Considerations for Metadata
+ Insertion", RFC 8165, DOI 10.17487/RFC8165, May 2017,
+ <https://www.rfc-editor.org/info/rfc8165>.
+
+ [RFC8371] Perkins, C. and V. Devarapalli, "Mobile Node Identifier
+ Types for MIPv6", RFC 8371, DOI 10.17487/RFC8371, July
+ 2018, <https://www.rfc-editor.org/info/rfc8371>.
+
+ [TS23401] 3GPP, "General Packet Radio Service (GPRS) enhancements
+ for Evolved Universal Terrestrial Radio Access Network
+ (E-UTRAN) access, Release 16", Version 16.5.0, TS 23.401,
+ December 2019.
+
+ [TS23501] 3GPP, "System architecture for the 5G System (5GS),
+ Release 16", Version 16.3.0, TS 23.501, December 2019.
+
+Acknowledgements
+
+ Comments from Joel Halpern on a previous draft version and from
+ Carlos Bernardos are appreciated.
+
+ Contributions and review by Christian Jacquenet, Danny Lachos,
+ Debashish Purkayastha, Christian Esteve Rothenberg, Kyle Larose,
+ Donald Eastlake, Qin Wu, Shunsuke Homma, and Greg Mirsky are
+ thankfully acknowledged.
+
+ Many thanks to Robert Sparks for the secdir review.
+
+ Thanks to Barry Leiba, Erik Kline, Éric Vyncke, Robert Wilton, and
+ Magnus Westerlund for the IESG review.
+
+ Special thanks to Benjamin Kaduk for the careful review and
+ suggestions that enhanced this specification.
+
+Authors' Addresses
+
+ Behcet Sarikaya
+
+ Email: sarikaya@ieee.org
+
+
+ Dirk von Hugo
+ Deutsche Telekom
+ Deutsche-Telekom-Allee 9
+ D-64295 Darmstadt
+ Germany
+
+ Email: Dirk.von-Hugo@telekom.de
+
+
+ Mohamed Boucadair
+ Orange
+ 3500 Rennes
+ France
+
+ Email: mohamed.boucadair@orange.com