summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9655.txt
blob: 4b61e71c3e7dffd568a98f8df08d57826e70d77a (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
Internet Engineering Task Force (IETF)                     D. Rathi, Ed.
Request for Comments: 9655                                         Nokia
Category: Standards Track                                  S. Hegde, Ed.
ISSN: 2070-1721                                    Juniper Networks Inc.
                                                                K. Arora
                                                  Individual Contributor
                                                                  Z. Ali
                                                               N. Nainar
                                                     Cisco Systems, Inc.
                                                           November 2024


Egress Validation in Label Switched Path Ping and Traceroute Mechanisms

Abstract

   The MPLS ping and traceroute mechanisms described in RFC 8029 and the
   related extensions for Segment Routing (SR) defined in RFC 8287 are
   highly valuable for validating control plane and data plane
   synchronization.  In certain environments, only some intermediate or
   transit nodes may have been upgraded to support these validation
   procedures.  A straightforward MPLS ping and traceroute mechanism
   allows traversal of any path without validation of the control plane
   state.  RFC 8029 supports this mechanism with the Nil Forwarding
   Equivalence Class (FEC).  The procedures outlined in RFC 8029 are
   primarily applicable when the Nil FEC is used as an intermediate FEC
   in the FEC stack.  However, challenges arise when all labels in the
   label stack are represented using the Nil FEC.

   This document introduces a new Type-Length-Value (TLV) as an
   extension to the existing Nil FEC.  It describes MPLS ping and
   traceroute procedures using the Nil FEC with this extension to
   address and overcome these challenges.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc9655.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Revised BSD License text as described in Section 4.e of the
   Trust Legal Provisions and are provided without warranty as described
   in the Revised BSD License.

Table of Contents

   1.  Introduction
     1.1.  Requirements Language
   2.  Problem with Nil FEC
   3.  Egress TLV
   4.  Procedure
     4.1.  Sending Egress TLV in MPLS Echo Request
       4.1.1.  Ping Mode
       4.1.2.  Traceroute Mode
       4.1.3.  Detailed Example
     4.2.  Receiving Egress TLV in MPLS Echo Request
   5.  Backward Compatibility
   6.  IANA Considerations
     6.1.  New TLV
     6.2.  New Return Code
   7.  Security Considerations
   8.  References
     8.1.  Normative References
     8.2.  Informative References
   Acknowledgements
   Authors' Addresses

1.  Introduction

   Segment routing supports the creation of explicit paths by using one
   or more Link-State IGP Segments or BGP Segments defined in [RFC8402].
   In certain use cases, the TE paths are built using mechanisms
   described in [RFC9256] by stacking the labels that represent the
   nodes and links in the explicit path.  Controllers are often deployed
   to construct paths across multi-domain networks.  In such
   deployments, the headend routers may have the link-state database of
   their domain and may not be aware of the FEC associated with labels
   that are used by the controller to build paths across multiple
   domains.  A very useful Operations, Administration, and Maintenance
   (OAM) requirement is to be able to ping and trace these paths.

   [RFC8029] describes a simple and efficient mechanism to detect data
   plane failures in MPLS Label Switched Paths (LSPs).  It defines a
   probe message called an "MPLS echo request" and a response message
   called an "MPLS echo reply" for returning the result of the probe.
   SR-related extensions for these are specified in [RFC8287].
   [RFC8029] provides mechanisms primarily to validate the data plane
   and secondarily to verify the consistency of the data plane with the
   control plane.  It also provides the ability to traverse Equal-Cost
   Multipaths (ECMPs) and validate each of the ECMP paths.  The Target
   FEC Stack TLV [RFC8029] contains sub-TLVs that carry information
   about the label.  This information gets validated on each node for
   traceroute and on the egress for ping.  The use of the Target FEC
   Stack TLV requires all nodes in the network to have implemented the
   validation procedures, but all intermediate nodes may not have been
   upgraded to support validation procedures.  In such cases, it is
   useful to have the ability to traverse the paths in ping/traceroute
   mode without having to obtain the FEC for each label.

   A simple MPLS echo request/reply mechanism allows for traversing the
   SR Policy path without validating the control plane state.  [RFC8029]
   supports this mechanism with FECs like the Nil FEC and the Generic
   FECs (i.e., Generic IPv4 prefix and Generic IPv6 prefix).  However,
   there are challenges in reusing the Nil FEC and Generic FECs for
   validation of SR Policies [RFC9256].  The Generic IPv4 prefix and
   Generic IPv6 prefix FECs are used when the protocol that is
   advertising the label is unknown.  The information that is carried in
   the Generic FECs is the IPv4 or IPv6 prefix and prefix length.  Thus,
   the Generic FEC types perform an additional control plane validation.
   However, the Generic FECs and relevant validation procedures are not
   thoroughly detailed in [RFC8029].  The use case mostly specifies
   inter-AS (Autonomous System) VPNs as the motivation.  Certain aspects
   of SR, such as anycast Segment Identifiers (SIDs), require clear
   guidelines on how the validation procedure should work.  Also, the
   Generic FECs may not be widely supported, and if transit routers are
   not upgraded to support validation of Generic FECs, traceroute may
   fail.  On the other hand, the Nil FEC consists of the label, and
   there is no other associated FEC information.  The Nil FEC is used to
   traverse the path without validation for cases where the FEC is not
   defined or routers are not upgraded to support the FECs.  Thus, it
   can be used to check any combination of segments on any data path.
   The procedures described in [RFC8029] are mostly applicable when the
   Nil FEC is used as an intermediate FEC in the FEC stack.  Challenges
   arise when all labels in the label stack are represented using the
   Nil FEC.

   Section 2 discusses the problems associated with using the Nil FEC in
   an MPLS ping/traceroute procedure, and Sections 3 and 4 discuss
   simple extensions needed to solve the problem.

   The problems and the solutions described in this document apply to
   the MPLS data plane.  Segment Routing over IPv6 (SRv6) is out of
   scope for this document.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

2.  Problem with Nil FEC

   The purpose of the Nil FEC, as described in [RFC8029], is to ensure
   that transit tunnel information is hidden and, in some cases, to
   avoid false negatives when the FEC information is unknown.

   This document uses a Nil FEC to represent the complete label stack in
   an MPLS echo request message in ping and traceroute mode.  A single
   Nil FEC is used in the MPLS echo request message irrespective of the
   number of segments in the label stack.  Section 4.4.1 of [RFC8029]
   notes:

   |  If the outermost FEC of the Target FEC stack is the Nil FEC, then
   |  the node MUST skip the Target FEC validation completely.

   When a router in the label stack path receives an MPLS echo request
   message, there is no definite way to decide whether it is the
   intended egress router since the Nil FEC does not carry any
   information and no validation is performed by the router.  Thus,
   there is a high possibility that the packet may be misforwarded to an
   incorrect destination but the MPLS echo reply might still return
   success.

   To mitigate this issue, it is necessary to include additional
   information, along with the Nil FEC, in the MPLS echo request message
   in both ping and traceroute modes and to perform minimal validation
   on the egress/destination router.  This will enable the router to
   send appropriate success and failure information to the headend
   router of the SR Policy.  This supplementary information should
   assist in reporting transit router details to the headend router,
   which can be utilized by an offline application to validate the
   traceroute path.

   Consequently, the inclusion of egress information in the MPLS echo
   request messages in ping and traceroute modes will facilitate the
   validation of the Nil FEC on the egress router, ensuring the correct
   destination.  Egress information can be employed to verify any
   combination of segments on any path without requiring upgrades to
   transit nodes.  The Egress TLV can be silently dropped if not
   recognized; alternately, it may be stepped over, or an error message
   may be sent (per [RFC8029] and the clarifications in [RFC9041]
   regarding code points in the range 32768-65535).

   If a transit node does not recognize the Egress TLV and chooses to
   silently drop or step over the Egress TLV, the headend will continue
   to send the Egress TLV in the next echo request message, and if
   egress recognizes the Egress TLV, egress validation will be executed
   at the egress.  If a transit node does not recognize the Egress TLV
   and chooses to send an error message, the headend will log the
   message for informational purposes and continue to send echo requests
   with the Egress TLV, with the TTL incremented.  If the egress node
   does not recognize the Egress TLV and chooses to silently drop or
   step over the Egress TLV, egress validation will not be done, and the
   ping/traceroute procedure will proceed as if the Egress TLV were not
   received.

3.  Egress TLV

   The Egress TLV MAY be included in an MPLS echo request message.  It
   is an optional TLV and, if present, MUST appear before the Target FEC
   Stack TLV in the MPLS echo request packet.  This TLV can only be used
   in LSP ping/traceroute requests that are generated by the headend
   node of an LSP or SR Policy for which verification is performed.  In
   cases where multiple Nil FECs are present in the Target FEC Stack
   TLV, the Egress TLV must be added corresponding to the ultimate
   egress of the label stack.  Explicit paths can be created using Node-
   SID, Adj-SID, Binding SID, etc.  The Address field of the Egress TLV
   must be derived from the path egress/destination.  The format is as
   specified in Figure 1.

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |      Type = 32771 (Egress TLV)  |          Length             |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                      Address (4 or 16 octets)                 |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                            Figure 1: Egress TLV

   Type:  32771 (Section 6.1)

   Length:  Variable (4 octets for IPv4 addresses and 16 octets for IPv6
      addresses).  Length excludes the length of the Type and Length
      fields.

   Address:  This field carries a valid 4-octet IPv4 address or a valid
      16-octet IPv6 address.  The address can be obtained from the
      egress of the path and corresponds to the last label in the label
      stack or the SR Policy Endpoint field [SR-POLICY-BGP].

4.  Procedure

   This section describes aspects of LSP ping and traceroute operations
   that require further considerations beyond those detailed in
   [RFC8029].

4.1.  Sending Egress TLV in MPLS Echo Request

   As previously mentioned, when the sender node constructs an echo
   request with a Target FEC Stack TLV, the Egress TLV, if present, MUST
   appear before the Target FEC Stack TLV in the MPLS echo request
   packet.

4.1.1.  Ping Mode

   When the sender node constructs an echo request with a Target FEC
   Stack TLV that contains a single Nil FEC corresponding to the last
   segment of the SR Policy path, the sender node MUST add an Egress TLV
   with the address obtained from the SR Policy Endpoint field
   [SR-POLICY-BGP].  The Label value in the Nil FEC MAY be set to zero
   when a single Nil FEC is added for multiple labels in the label
   stack.  In case the endpoint is not specified or is equal to zero
   (Section 8.8.1 of [RFC9256]), the sender MUST use the address
   corresponding to the last segment of the SR Policy in the Address
   field of the Egress TLV.  Some specific cases on how to derive the
   Address field in the Egress TLV are listed below:

   *  If the last SID in the SR Policy is an Adj-SID, the Address field
      in the Egress TLV is derived from the node at the remote end of
      the corresponding adjacency.

   *  If the last SID in the SR Policy is a Binding SID, the Address
      field in the Egress TLV is derived from the last node of the path
      represented by the Binding SID.

4.1.2.  Traceroute Mode

   When the sender node builds an echo request with a Target FEC Stack
   TLV that contains a Nil FEC corresponding to the last segment of the
   segment list of the SR Policy, the sender node MUST add an Egress TLV
   with the address obtained from the SR Policy Endpoint field
   [SR-POLICY-BGP].

   Although there is no requirement to do so, an implementation MAY send
   multiple Nil FECs if that makes it easier for the implementation.  If
   the SR Policy headend sends multiple Nil FECs, the last one MUST
   correspond to the Egress TLV.  The Label value in the Nil FEC MAY be
   set to zero for the last Nil FEC.  If the endpoint is not specified
   or is equal to zero (Section 8.8.1 of [RFC9256]), the sender MUST use
   the address corresponding to the last segment endpoint of the SR
   Policy path (i.e., the ultimate egress is used as the address in the
   Egress TLV).

4.1.3.  Detailed Example

                     ----R3----
                    /  (1003)  \
         (1001)    /            \(1005)     (1007)
           R1----R2(1002)        R5----R6----R7(address X)
                   \            /     (1006)
                    \   (1004) /
                     ----R4----

             Figure 2: Egress TLV Processing in Sample Topology

   Consider the SR Policy configured on router R1 to destination X,
   configured with label stack as 1002, 1004, 1007.  Segment 1007
   belongs to R7, which has the address X locally configured on it.

   Let us look at an example of a ping echo request message.  The echo
   request message contains a Target FEC Stack TLV with the Nil FEC sub-
   TLV.  An Egress TLV is added before the Target FEC Stack TLV.  The
   Address field contains X (corresponding to a locally configured
   address on R7).  X could be an IPv4 or IPv6 address, and the Length
   field in the Egress TLV will be either 4 or 16 octets, based on the
   address type of address X.

   Let us look at an example of an echo request message in a traceroute
   packet.  The echo request message contains a Target FEC Stack TLV
   with the Nil FEC sub-TLV corresponding to the complete label stack
   (1002, 1004, 1007).  An Egress TLV is added before the Target FEC
   Stack TLV.  The Address field contains X (corresponding to a locally
   configured address on destination R7).  X could be an IPv4 or IPv6
   address, and the Length field in the Egress TLV will be either 4 or
   16 octets, based on the address type of address X.  If the
   destination/endpoint is set to zero (as in the case of the color-only
   SR Policy), the sender should use the endpoint of segment 1007 (the
   last segment in the segment list) as the address for the Egress TLV.

4.2.  Receiving Egress TLV in MPLS Echo Request

   Any node that receives an MPLS echo request message and processes it
   is referred to as the "receiver".  In the case of the ping procedure,
   the actual destination/egress is the receiver.  In the case of
   traceroute, every node is a receiver.  This document does not propose
   any change in the processing of the Nil FEC (as defined in [RFC8029])
   in the node that receives an MPLS echo request with a Target FEC
   Stack TLV.  The presence of the Egress TLV does not affect the
   validation of the Target FEC Stack sub-TLV at FEC-stack-depth if it
   is different than Nil FEC.

   Additional processing MUST be done for the Egress TLV on the receiver
   node as follows.  Note that <RSC> refers to the Return Subcode.

   1.  If the Label-stack-depth is greater than 0 and the Target FEC
       Stack sub-TLV at FEC-stack-depth is Nil FEC, set Best-return-code
       to 8 ("Label switched at stack-depth <RSC>") and Best-rtn-subcode
       to Label-stack-depth to report transit switching in the MPLS echo
       reply message.

   2.  If the Label-stack-depth is 0 and the Target FEC Stack sub-TLV at
       FEC-stack-depth is Nil FEC, then do a lookup for an exact match
       of the Address field of the Egress TLV to any of the locally
       configured interfaces or loopback addresses.

       a.  If the Egress TLV address lookup succeeds, set Best-return-
           code to 36 ("Replying router is an egress for the address in
           the Egress TLV for the FEC at stack depth <RSC>")
           (Section 6.2) in the MPLS echo reply message.

       b.  If the Egress TLV address lookup fails, set the Best-return-
           code to 10 ("Mapping for this FEC is not the given label at
           stack-depth <RSC>").

   3.  In some cases, multiple Nil FECs (one corresponding to each label
       in the label stack), along with the Egress TLV, are sent from the
       SR Policy headend.  When the packet reaches the egress, the
       number of labels in the received packet (size of stack-R) becomes
       zero, or a label with the Bottom-of-Stack bit set to 1 is
       processed.  All Nil FEC sub-TLVs MUST be removed, and the Egress
       TLV MUST be validated.

5.  Backward Compatibility

   The extensions defined in this document are backward compatible with
   the procedures described in [RFC8029].  A router that does not
   support the Egress TLV will ignore it and use the Nil FEC procedures
   described in [RFC8029].

   When the egress node in the path does not support the extensions
   defined in this document, egress validation will not be done, and
   Best-return-code will be set to 3 ("Replying router is an egress for
   the FEC at stack-depth <RSC>") and Best-rtn-subcode to stack-depth in
   the MPLS echo reply message.

   When the transit node in the path does not support the extensions
   defined in this document, Best-return-code will be set to 8 ("Label
   switched at stack-depth <RSC>") and Best-rtn-subcode to Label-stack-
   depth to report transit switching in the MPLS echo reply message.

6.  IANA Considerations

6.1.  New TLV

   IANA has added the following entry to the "TLVs" registry within the
   "Multiprotocol Label Switching (MPLS) Label Switched Paths (LSPs)
   Ping Parameters" registry group [IANA-MPLS-LSP]:

                    +=======+============+===========+
                    | Type  | TLV Name   | Reference |
                    +=======+============+===========+
                    | 32771 | Egress TLV | RFC 9655  |
                    +-------+------------+-----------+

                          Table 1: TLVs Registry

6.2.  New Return Code

   IANA has added the following entry to the "Return Codes" registry
   within the "Multiprotocol Label Switching (MPLS) Label Switched Paths
   (LSPs) Ping Parameters" registry group [IANA-MPLS-LSP]:

         +=======+==================================+===========+
         | Value | Meaning                          | Reference |
         +=======+==================================+===========+
         | 36    | Replying router is an egress for | RFC 9655  |
         |       | the address in the Egress TLV    |           |
         |       | for the FEC at stack depth <RSC> |           |
         +-------+----------------------------------+-----------+

                      Table 2: Return Codes Registry

7.  Security Considerations

   This document defines an additional TLV for MPLS LSP ping and
   conforms to the mechanisms defined in [RFC8029].  All the security
   considerations defined in [RFC8287] apply to this document.  This
   document does not introduce any additional security challenges to be
   considered.

8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8029]  Kompella, K., Swallow, G., Pignataro, C., Ed., Kumar, N.,
              Aldrin, S., and M. Chen, "Detecting Multiprotocol Label
              Switched (MPLS) Data-Plane Failures", RFC 8029,
              DOI 10.17487/RFC8029, March 2017,
              <https://www.rfc-editor.org/info/rfc8029>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8287]  Kumar, N., Ed., Pignataro, C., Ed., Swallow, G., Akiya,
              N., Kini, S., and M. Chen, "Label Switched Path (LSP)
              Ping/Traceroute for Segment Routing (SR) IGP-Prefix and
              IGP-Adjacency Segment Identifiers (SIDs) with MPLS Data
              Planes", RFC 8287, DOI 10.17487/RFC8287, December 2017,
              <https://www.rfc-editor.org/info/rfc8287>.

   [RFC8402]  Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L.,
              Decraene, B., Litkowski, S., and R. Shakir, "Segment
              Routing Architecture", RFC 8402, DOI 10.17487/RFC8402,
              July 2018, <https://www.rfc-editor.org/info/rfc8402>.

   [RFC9041]  Andersson, L., Chen, M., Pignataro, C., and T. Saad,
              "Updating the MPLS Label Switched Paths (LSPs) Ping
              Parameters IANA Registry", RFC 9041, DOI 10.17487/RFC9041,
              July 2021, <https://www.rfc-editor.org/info/rfc9041>.

   [RFC9256]  Filsfils, C., Talaulikar, K., Ed., Voyer, D., Bogdanov,
              A., and P. Mattes, "Segment Routing Policy Architecture",
              RFC 9256, DOI 10.17487/RFC9256, July 2022,
              <https://www.rfc-editor.org/info/rfc9256>.

8.2.  Informative References

   [IANA-MPLS-LSP]
              IANA, "Multiprotocol Label Switching (MPLS) Label Switched
              Paths (LSPs) Ping Parameters",
              <http://www.iana.org/assignments/mpls-lsp-ping-
              parameters>.

   [SR-POLICY-BGP]
              Previdi, S., Filsfils, C., Talaulikar, K., Ed., Mattes,
              P., and D. Jain, "Advertising Segment Routing Policies in
              BGP", Work in Progress, Internet-Draft, draft-ietf-idr-sr-
              policy-safi-10, 7 November 2024,
              <https://datatracker.ietf.org/doc/html/draft-ietf-idr-sr-
              policy-safi-10>.

Acknowledgements

   The authors would like to thank Stewart Bryant, Greg Mirsky,
   Alexander Vainshtein, Sanga Mitra Rajgopal, and Adrian Farrel for
   their careful review and comments.

Authors' Addresses

   Deepti N. Rathi (editor)
   Nokia
   Manyata Embassy Business Park
   Bangalore 560045
   Karnataka
   India
   Email: deepti.nirmalkumarji_rathi@nokia.com


   Shraddha Hegde (editor)
   Juniper Networks Inc.
   Exora Business Park
   Bangalore 560103
   Karnataka
   India
   Email: shraddha@juniper.net


   Kapil Arora
   Individual Contributor
   Email: kapil.it@gmail.com


   Zafar Ali
   Cisco Systems, Inc.
   Email: zali@cisco.com


   Nagendra Kumar Nainar
   Cisco Systems, Inc.
   Email: naikumar@cisco.com