1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
|
Internet Engineering Task Force (IETF) M. Boutier
Request for Comments: 9079 J. Chroboczek
Category: Standards Track IRIF, University of Paris
ISSN: 2070-1721 August 2021
Source-Specific Routing in the Babel Routing Protocol
Abstract
Source-specific routing, also known as Source Address Dependent
Routing (SADR), is an extension to traditional next-hop routing where
packets are forwarded according to both their destination address and
their source address. This document describes an extension for
source-specific routing to the Babel routing protocol.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9079.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction and Background
1.1. Application to Multihoming
1.2. Other Applications
1.3. Specificity of Prefix Pairs
2. Specification of Requirements
3. Data Structures
3.1. The Source Table
3.2. The Route Table
3.3. The Table of Pending Seqno Requests
4. Data Forwarding
5. Protocol Operation
5.1. Protocol Messages
5.2. Wildcard Messages
6. Compatibility with the Base Protocol
6.1. Starvation and Blackholes
7. Protocol Encoding
7.1. Source Prefix Sub-TLV
7.2. Source-Specific Update
7.3. Source-Specific Route Request
7.4. Source-Specific Seqno Request
8. IANA Considerations
9. Security Considerations
10. References
10.1. Normative References
10.2. Informative References
Acknowledgments
Authors' Addresses
1. Introduction and Background
The Babel routing protocol [RFC8966] is a distance vector routing
protocol for next-hop routing. In next-hop routing, each node
maintains a forwarding table that maps destination prefixes to next
hops. The forwarding decision is a per-packet operation that depends
on the destination address of the packets and on the entries of the
forwarding table. When a packet is about to be routed, its
destination address is compared to the prefixes of the routing table:
the entry with the most specific prefix containing the destination
address of the packet is chosen, and the packet is forwarded to the
associated next hop. Next-hop routing is a simple, well-understood
paradigm that works satisfactorily in a large number of cases.
The use of next-hop routing limits the flexibility of the routing
system in two ways. First, since the routing decision is local to
each router, a router A can only select a route ABC...Z if its
neighbouring router B has selected the route BC...Z. Second, the
only criterion used by a router to choose a route is the destination
address: two packets with the same destination follow the same route.
Yet, there are other data in the IP header that could conceivably be
used to guide the routing decision -- the Type of Service (ToS) octet
and, of course, the source address.
Source-specific routing [SS-ROUTING], or Source Address Dependent
Routing (SADR), is a modest extension to next-hop routing where the
forwarding decision depends not only on the destination address but
also on the source address of the packet being routed, which makes it
possible for two packets with the same destination but different
source addresses to be routed following different paths.
This document describes a source-specific routing extension for the
Babel routing protocol [RFC8966]. This involves minor changes to the
data structures, which must include a source prefix in addition to
the destination prefix already present, and some changes to the
Update, Route Request, and Seqno Request TLVs, which are extended
with a source prefix. The source prefix is encoded using a mandatory
sub-TLV ([RFC8966], Section 4.4).
1.1. Application to Multihoming
Multihoming is the practice of connecting a single network to two or
more transit networks. The main application of source-specific
routing is a form of multihoming known as "multihoming with multiple
addresses".
Classical multihoming consists of assigning a provider-independent
range of addresses to the multihomed network and announcing it to all
transit providers. While classical multihoming works well for large
networks, the cost of obtaining a provider-independent address range
and announcing it globally in the Internet is prohibitive for small
networks. Unfortunately, it is not possible to implement classical
multihoming with ordinary provider-dependent addresses: in a network
connected to two providers A and B, a packet with a source address
allocated by A needs to be routed through the edge router connected
to A. If it is routed through the edge router connected to B, it
will most likely be filtered (dropped), in accordance with [BCP84].
In multihoming with multiple addresses, every host in the multihomed
network is assigned multiple addresses, one for each transit
provider. Additional mechanisms are needed in order (i) to choose,
for each packet, a source address that is associated with a provider
that is currently up, and (ii) to route each packet towards the
router connected to the provider associated with its source address.
One might argue that multihoming with multiple addresses splits the
difficult problem of multihoming into two simpler sub-problems.
The issue of choosing a suitable source address is a decision local
to the sending host and is an area of active research. The simplest
solution is to use a traditional transport-layer protocol, such as
TCP, and to probe all available source addresses at connection time,
analogously to what is already done with destination addresses,
either sequentially [RFC6724] or in parallel [RFC8305]. Since the
transport-layer protocol is not aware of the multiple available
addresses, flows are interrupted when the selected provider goes down
(from the point of view of the user, all TCP connections are dropped
when the network environment changes). A better user experience can
be provided by making all of the potential source and destination
addresses available to higher-layer protocols, either at the
transport layer [RFC8684] [RFC4960] or at the application layer
[RFC8445].
Source-specific routing solves the problem of routing a packet to the
edge router indicated by its source address. Every edge router
announces into the routing domain a default route specific to the
prefix associated with the provider it is connected to. This route
is propagated all the way to the routers on the access link, which
are therefore able to route every packet to the correct router.
Hosts simply send packets to their default router -- no host changes
are necessary at the network layer.
1.2. Other Applications
In addition to multihoming with multiple addresses, we are aware of
two applications of source-specific routing. Tunnels and VPNs are
packet encapsulation techniques that are commonly used in the
Internet to establish a network-layer topology that is different from
the physical topology. In some deployments, the default route points
at the tunnel; this causes the network stack to attempt to send
encapsulated packets through the tunnel, which causes it to break.
Various solutions to this problem are possible, the most common of
which is to point a host route at the tunnel endpoint.
When source-specific routing is available, it becomes possible to
announce through the tunnel a default route that is specific to the
prefix served by the tunnel. Since the encapsulated packets have a
source address that is not within that prefix, they are not routed
through the tunnel.
The third application of source-specific routing is controlled
anycast. Anycast is a technique in which a single destination
address is used to represent multiple network endpoints, collectively
called an "anycast group". A packet destined to the anycast group is
routed to an arbitrary member of the group, typically the one that is
nearest according to the routing protocol.
In many applications of anycast, such as DNS root servers, the
nondeterminism of anycast is acceptable; some applications, however,
require finer control. For example, in some Content Distribution
Networks (CDNs), every endpoint is expected to handle a well-defined
subset of the client population. With source-specific routing, it is
possible for each member of the anycast group to announce a route
specific to its client population, a technique that is both simpler
and more robust than manually tweaking the routing protocol's metric
("prepending" in BGP).
1.3. Specificity of Prefix Pairs
In ordinary next-hop routing, when multiple routing table entries
match the destination of a packet, the "longest prefix rule" mandates
that the most specific entry applies. The reason why this rule makes
sense is that the set of prefixes has the following "tree property":
For any prefixes P and P', either P and P' are disjoint, or one is
more specific than the other.
It would be a natural proposition to order pairs of prefixes
pointwise: to define that (D,S) is more specific than (D',S') when D
is more specific than D and S is more specific than S'.
Unfortunately, the set of pairs of prefixes with the pointwise
ordering doesn't satisfy the tree property. Indeed, consider the
following two pairs:
(2001:db8:0:1::/64, ::/0) and (::/0, 2001:db8:0:2::/64)
These two pairs are not disjoint (a packet with destination
2001:db8:0:1::1 and source 2001:db8:0:2::1 is matched by both), but
neither is more specific than the other. The effect is that there is
no natural, unambiguous way to interpret a routing table such as the
following:
destination source next-hop
2001:db8:0:1::/64 ::/0 A
::/0 2001:db8:0:2::/64 B
A finer ordering of pairs of prefixes is required in order to avoid
all ambiguities. There are two natural choices: destination-first
ordering, where (D,S) is more specific than (D',S') when
* D is strictly more specific than D', or
* D = D', and S is more specific than S'
and, symmetrically, source-first ordering, in which sources are
compared first and destinations second.
Expedient as it would be to leave the choice to the implementation,
this is not possible: all routers in a routing domain must use the
same ordering lest persistent routing loops occur. Indeed, consider
the following topology:
A --- B --- C --- D
Suppose that A announces a route for (::/0, 2001:db8:0:2::/64), while
D announces a route for (2001:db8:0:1::/64, ::/0). Suppose further
that B uses destination-first ordering while C uses source-first
ordering. Then a packet that matches both routes, say, with
destination 2001:db8:0:1::1 and source 2001:db8:0:2::1, would be sent
by B towards D and by C towards A and would therefore loop
indefinitely between B and C.
This document mandates (Section 4) that all routers use destination-
first ordering, which is generally believed to be more useful than
source-first ordering. Consider the following topology, where A is
an edge router connected to the Internet and B is an internal router
connected to an access network N:
(::/0, S) (D, ::/0)
Internet --- A --- B --- N
A announces a source-specific default route with source S (::/0, S),
while B announces a nonspecific route to prefix D. Consider what
happens to a packet with a destination in D and a source in S. With
destination-first ordering, the packet is routed towards the network
N, which is the only way it can possibly reach its destination. With
source-first ordering, on the other hand, the packet is sent towards
the Internet, with no hope of ever reaching its destination in N.
2. Specification of Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
3. Data Structures
A number of the conceptual data structures described in Section 3.2
of [RFC8966] contain a destination prefix. This specification
extends these data structures with a source prefix. Data from the
original protocol, which do not specify a source prefix, are stored
with a zero-length source prefix, which matches the exact same set of
packets as the original, non-source-specific data.
3.1. The Source Table
Every Babel node maintains a source table, as described in [RFC8966],
Section 3.2.5. A source-specific Babel node extends this table with
the following field:
* The source prefix (sprefix, splen) specifying the source address
of packets to which this entry applies.
The source table is now indexed by 5-tuples of the form (prefix,
plen, sprefix, splen, router-id).
Note that the route entry contains a source (see Sections 2 and 3.2.5
of [RFC8966]) that itself contains both destination and source
prefixes. These are two different concepts and must not be confused.
3.2. The Route Table
Every Babel node maintains a route table, as described in [RFC8966],
Section 3.2.6. Each route table entry contains, among other data, a
source, which this specification extends with a source prefix as
described above. The route table is now indexed by 5-tuples of the
form (prefix, plen, sprefix, splen, neighbour), where the first four
components are obtained from the source.
3.3. The Table of Pending Seqno Requests
Every Babel node maintains a table of pending seqno requests, as
described in [RFC8966], Section 3.2.7. A source-specific Babel node
extends this table with the following entry:
* The source prefix (sprefix, splen) being requested.
The table of pending seqno requests is now indexed by 5-tuples of the
form (prefix, plen, sprefix, splen, router-id).
4. Data Forwarding
As noted in Section 1.3, source-specific tables can, in general, be
ambiguous, and all routers in a routing domain must use the same
algorithm for choosing applicable routes. An implementation of the
extension described in this document MUST choose routing table
entries by using destination-first ordering, where routing table
entry R1 is preferred to routing table entry R2 when either R1's
destination prefix is more specific than R2's or the destination
prefixes are equal and R1's source prefix is more specific than R2's.
In practice, this means that a source-specific Babel implementation
must take care that any lower layer that performs packet forwarding
obey these semantics. More precisely:
* if the lower layers implement destination-first ordering, then the
Babel implementation SHOULD use them directly;
* if the lower layers can hold source-specific routes but not with
the right semantics, then the Babel implementation MUST either
silently ignore any source-specific routes or disambiguate the
routing table by using a suitable disambiguation algorithm (see
Section V.B of [SS-ROUTING] for such an algorithm);
* if the lower layers cannot hold source-specific routes, then a
Babel implementation MUST silently ignore any source-specific
routes.
5. Protocol Operation
This extension does not fundamentally change the operation of the
Babel protocol, and we therefore only describe differences between
the original protocol and the extended protocol.
In the original protocol, three TLVs carry a destination prefix:
Update, Route Request, and Seqno Request TLVs. This specification
extends these messages so that they may carry a Source Prefix sub-
TLV, as described in Section 7. The sub-TLV is marked as mandatory
so that an unextended implementation will silently ignore the whole
enclosing TLV. A node obeying this specification MUST NOT send a TLV
with a zero-length source prefix; instead, it sends a TLV with no
Source Prefix sub-TLV. Conversely, an extended implementation MUST
interpret an unextended TLV as carrying a source prefix of zero
length. Taken together, these properties ensure interoperability
between the original and extended protocols (see Section 6).
5.1. Protocol Messages
This extension allows three TLVs of the original Babel protocol to
carry a source prefix: Update TLVs, Route Request TLVs, and Seqno
Request TLVs.
In order to advertise a route with a non-zero length source prefix, a
node sends a source-specific update, i.e., an update with a Source
Prefix sub-TLV. When a node receives a source-specific update
(prefix, source prefix, router-id, seqno, metric) from a neighbour
neigh, it behaves as described in [RFC8966], Section 3.5.3, except
that the entry under consideration is indexed by (prefix, plen,
sprefix, splen, neigh) rather than just (prefix, plen, neigh).
Similarly, when a node needs to send a request of either kind that
applies to a route with a non-zero length source prefix, it sends a
source-specific request, i.e., a request with a Source Prefix sub-
TLV. When a node receives a source-specific request, it behaves as
described in Section 3.8 of [RFC8966], except that the request
applies to the route table entry carrying the source prefix indicated
by the Source Prefix sub-TLV.
5.2. Wildcard Messages
In the original protocol, the address encoding (AE) value 0 is used
for wildcard messages: messages that apply to all routes of any
address family and with any destination prefix. Wildcard messages
are allowed in two places in the protocol: wildcard retractions are
used to retract all of the routes previously advertised by a node on
a given interface, and wildcard route requests are used to request a
full dump of the route table from a given node. Wildcard messages
are intended to apply to all routes, including routes decorated with
additional data and AE values to be defined by future extensions;
hence, this specification extends wildcard operations to apply to all
routes, whatever the value of the source prefix.
More precisely, a node receiving an update with the AE field set to 0
and the Metric field set to infinity (a wildcard retraction) MUST
apply the route acquisition procedure described in Section 3.5.3 of
[RFC8966] to all of the routes that it has learned from the sending
node, whatever the value of the source prefix. A node MUST NOT send
a wildcard retraction with an attached source prefix, and a node that
receives a wildcard retraction with a source prefix MUST ignore the
retraction.
Similarly, a node that receives a route request with the AE field set
to 0 (a wildcard route request) SHOULD send a full routing table
dump, including routes with a non-zero length source prefix. A node
MUST NOT send a wildcard request that carries a source prefix, and a
node receiving a wildcard request with a source prefix MUST ignore
the request.
6. Compatibility with the Base Protocol
The protocol extension defined in this document is, to a great
extent, interoperable with the base protocol defined in [RFC8966]
(and all previously standardised extensions). More precisely, if
non-source-specific routers and source-specific routers are mixed in
a single routing domain, Babel's loop-avoidance properties are
preserved, and, in particular, no persistent routing loops will
occur.
However, this extension is encoded using mandatory sub-TLVs,
introduced in [RFC8966], and therefore is not compatible with the
older version of the Babel routing protocol [RFC6126], which does not
support mandatory sub-TLVs. Consequently, this extension MUST NOT be
used in a routing domain in which some routers implement [RFC6126];
otherwise, persistent routing loops may occur.
6.1. Starvation and Blackholes
In general, the discarding of source-specific routes by non-source-
specific routers will cause route starvation. Intuitively, unless
there are enough non-source-specific routes in the network, non-
source-specific routers will suffer starvation and discard packets
for destinations that are only announced by source-specific routers.
In the common case where all source-specific routes are originated at
one of a small set of edge routers, a simple yet sufficient condition
for avoiding starvation is to build a connected source-specific
backbone that includes all of the edge routers and announce a non-
source-specific default route towards the backbone.
7. Protocol Encoding
This extension defines a new sub-TLV used to carry a source prefix:
the Source Prefix sub-TLV. It can be used within an Update, Route
Request, or Seqno Request TLV to match a source-specific entry of the
route table in conjunction with the destination prefix natively
carried by these TLVs.
Since a source-specific routing entry is characterised by a single
destination prefix and a single source prefix, a source-specific
message contains exactly one Source Prefix sub-TLV. A node MUST NOT
send more than one Source Prefix sub-TLV in a TLV, and a node
receiving more than one Source Prefix sub-TLV in a single TLV MUST
ignore the TLV. It MAY ignore the whole packet.
7.1. Source Prefix Sub-TLV
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = 128 | Length | Source Plen | Source Prefix...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
Fields:
Type Set to 128 to indicate a Source Prefix sub-TLV.
Length The length of the body, in octets, exclusive of the
Type and Length fields.
Source Plen The length of the advertised source prefix, in bits.
This MUST NOT be 0.
Source Prefix The source prefix being advertised. This field's size
is (Source Plen)/8 octets rounded upwards.
The length of the body TLV is normally of size 1+(Source Plen)/8
rounded upwards. If the Length field indicates a length smaller than
that, then the sub-TLV is corrupt, and the whole enclosing TLV must
be ignored; if the Length field indicates a length that is larger,
then the extra octets contained in the sub-TLV MUST be silently
ignored.
The contents of the Source Prefix sub-TLV are interpreted according
to the AE of the enclosing TLV. If a TLV with AE equal to 0 contains
a Source Prefix sub-TLV, then the whole enclosing TLV MUST be
ignored. If a TLV contains multiple Source Prefix sub-TLVs, then the
whole TLV MUST be ignored.
Note that this sub-TLV is a mandatory sub-TLV. Therefore, as
described in Section 4.4 of [RFC8966], the whole TLV MUST be ignored
if that sub-TLV is not understood (or malformed).
7.2. Source-Specific Update
The source-specific update is an Update TLV with a Source Prefix sub-
TLV. It advertises or retracts source-specific routes in the same
manner as routes with non-source-specific updates (see [RFC8966]). A
wildcard retraction (update with AE equal to 0) MUST NOT carry a
Source Prefix sub-TLV.
Babel uses a stateful compression scheme to reduce the size taken by
destination prefixes in Update TLVs (see Section 4.5 of [RFC8966]).
The source prefix defined by this extension is not compressed. On
the other hand, compression is allowed for the destination prefixes
carried by source-specific updates. As described in Section 4.5 of
[RFC8966], unextended implementations will correctly update their
parser state while otherwise ignoring the whole TLV.
7.3. Source-Specific Route Request
A source-specific route request is a Route Request TLV with a Source
Prefix sub-TLV. It prompts the receiver to send an update for a
given pair of destination and source prefixes, as described in
Section 3.8.1.1 of [RFC8966]. A wildcard request (route request with
AE equal to 0) MUST NOT carry a Source Prefix sub-TLV; if a wildcard
request with a Source Prefix sub-TLV is received, then the request
MUST be ignored.
7.4. Source-Specific Seqno Request
A source-specific seqno request is a Seqno Request TLV with a Source
Prefix sub-TLV. It requests that the receiving node perform the
procedure described in Section 3.8.1.2 of [RFC8966] but applied to a
pair consisting of a destination and source prefix.
8. IANA Considerations
IANA has allocated sub-TLV number 128 for the Source Prefix sub-TLV
in the "Babel Sub-TLV Types" registry.
9. Security Considerations
The extension defined in this document adds a new sub-TLV to three
sub-TLVs already present in the original Babel protocol and does not
change the security properties of the protocol itself. However, the
additional flexibility provided by source-specific routing might
invalidate the assumptions made by some network administrators, which
could conceivably lead to security issues.
For example, a network administrator might be tempted to abuse route
filtering (Appendix C of [RFC8966]) as a security mechanism. Unless
the filtering rules are designed to take source-specific routing into
account, they might be bypassed by a source-specific route, which
might cause traffic to reach a portion of a network that was thought
to be protected. A network administrator might also assume that no
route is more specific than a host route and use a host route in
order to direct traffic for a given destination through a security
device (e.g., a firewall); source-specific routing invalidates this
assumption, and, in some topologies, announcing a source-specific
route might conceivably be used to bypass the security device.
10. References
10.1. Normative References
[BCP84] Baker, F. and P. Savola, "Ingress Filtering for Multihomed
Networks", BCP 84, RFC 3704, March 2004.
Sriram, K., Montgomery, D., and J. Haas, "Enhanced
Feasible-Path Unicast Reverse Path Forwarding", BCP 84,
RFC 8704, February 2020.
<https://www.rfc-editor.org/info/bcp84>
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8966] Chroboczek, J. and D. Schinazi, "The Babel Routing
Protocol", RFC 8966, DOI 10.17487/RFC8966, January 2021,
<https://www.rfc-editor.org/info/rfc8966>.
10.2. Informative References
[RFC4960] Stewart, R., Ed., "Stream Control Transmission Protocol",
RFC 4960, DOI 10.17487/RFC4960, September 2007,
<https://www.rfc-editor.org/info/rfc4960>.
[RFC6126] Chroboczek, J., "The Babel Routing Protocol", RFC 6126,
DOI 10.17487/RFC6126, April 2011,
<https://www.rfc-editor.org/info/rfc6126>.
[RFC6724] Thaler, D., Ed., Draves, R., Matsumoto, A., and T. Chown,
"Default Address Selection for Internet Protocol Version 6
(IPv6)", RFC 6724, DOI 10.17487/RFC6724, September 2012,
<https://www.rfc-editor.org/info/rfc6724>.
[RFC8305] Schinazi, D. and T. Pauly, "Happy Eyeballs Version 2:
Better Connectivity Using Concurrency", RFC 8305,
DOI 10.17487/RFC8305, December 2017,
<https://www.rfc-editor.org/info/rfc8305>.
[RFC8445] Keranen, A., Holmberg, C., and J. Rosenberg, "Interactive
Connectivity Establishment (ICE): A Protocol for Network
Address Translator (NAT) Traversal", RFC 8445,
DOI 10.17487/RFC8445, July 2018,
<https://www.rfc-editor.org/info/rfc8445>.
[RFC8684] Ford, A., Raiciu, C., Handley, M., Bonaventure, O., and C.
Paasch, "TCP Extensions for Multipath Operation with
Multiple Addresses", RFC 8684, DOI 10.17487/RFC8684, March
2020, <https://www.rfc-editor.org/info/rfc8684>.
[SS-ROUTING]
Boutier, M. and J. Chroboczek, "Source-Specific Routing",
IFIP Networking Conference,
DOI 10.1109/IFIPNetworking.2015.7145305, May 2015,
<http://arxiv.org/pdf/1403.0445>.
Acknowledgments
The authors are indebted to Donald Eastlake, Joel Halpern, and Toke
Hoiland-Jorgensen for their help with this document.
Authors' Addresses
Matthieu Boutier
IRIF, University of Paris
Case 7014
75205 Paris Cedex 13
France
Email: boutier@irif.fr
Juliusz Chroboczek
IRIF, University of Paris
Case 7014
75205 Paris Cedex 13
France
Email: jch@irif.fr
|