<?xml version="1.0" encoding="US-ASCII"?>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2992 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2992.xml">
<!ENTITY RFC3032 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3032.xml">
<!ENTITY RFC3985 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3985.xml">
<!ENTITY RFC4023 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4023.xml">
<!ENTITY RFC5462 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5462.xml">
<!ENTITY RFC6347 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6347.xml">
<!ENTITY RFC7510 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7510.xml">
]>

<rfc docName="draft-bryant-mpls-unified-ip-sr-02" category="std">

  <front>
    <title abbrev="MPLS-SR in IP Networks">MPLS Segment Routing in IP Networks</title>

    <author initials="S." surname="Bryant" fullname="Stewart Bryant" role="editor">
      <organization>Huawei</organization>
      <address>
        <email>stewart.bryant@gmail.com</email>
      </address>
    </author>

    <author initials="A." surname="Farrel" fullname="Adrian Farrel" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <email>afarrel@juniper.net</email>
      </address>
    </author>

    <author initials="J." surname="Drake" fullname="John Drake">
      <organization>Juniper Networks</organization>
      <address>
        <email>jdrake@juniper.net</email>
      </address>
    </author>

    <author initials="J." surname="Tantsura" fullname="Jeff Tantsura">
      <organization>Individual</organization>
      <address>
        <email>jefftant.ietf@gmail.com</email>
      </address>
    </author>

    <date year="2017" />

    <workgroup>MPLS Working Group</workgroup>

    <abstract>

      <t>Segment routing is a source routed forwarding method that allows
         packets to be steered through a network on paths other than the
         shortest path derived from the routing protocol.  The approach uses
         information encoded in the packet header to partially or completely
         specify the route the packet takes through the network, and does not
         make use of a signaling protocol to pre-install paths in the network.</t>

      <t>Two different encapsulations have been defined to enable segment
         routing in an MPLS network or in an IPv6 network.  While
         acknowledging that there is a strong need to support segment routing
         in both environments, this document defines a mechanism to carry
         MPLS segment routing packets encapsulated in UDP.  The resulting
         approach is applicable to both IPv4 and IPv6 networks without the
         need for any changes to the IP or segment routing specifications.</t>

      <t>This document makes no changes to the segment routing architecture
         and builds on existing protocol mechanisms such as the encapsulation
         of MPLS within UDP defined in RFC 7510.</t>

      <t>No new procedures are introduced, but existing mechanisms are combined
         to achieve the desired result.</t>

    </abstract>

    <note title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref target="RFC2119" />.</t>
    </note>

  </front>

  <middle>

    <section anchor="introduction" title="Introduction">

      <t>Segment routing (SR) <xref target="I-D.ietf-spring-segment-routing"/>
         is a source routed forwarding method that allows packets to be steered
         through a network on paths other than the shortest path derived from
         the routing protocol.  SR also allows the packets to be steered through
         a set of packet processing functions along that path.  SR uses information
         encoded in the packet header to partially or completely specify the route
         the packet takes through the network and does not make use of a signaling
         protocol to pre-install paths in the network.</t>

      <t>The approach to segment routing in IPv6 networks is known as SRv6 and is
         described in <xref target="I-D.ietf-6man-segment-routing-header"/>.  The
         mechanism described encodes the segment routing instruction list as an
         ordered list of 128-bit IPv6 addresses that is carried in a new IPv6
         extension header: the Source Routing Header (SRH).</t>

      <t>MPLS-SPRING <xref target="I-D.ietf-spring-segment-routing-mpls"/>
         (also known as MPLS Segment Routing or MPLS-SR) encodes the route the
         packet takes through the network and the instructions to be applied to
         the packet as it transits the network by imposing a stack of MPLS label
         entries on the packet.</t>

      <t>This document describes a method for running SR in IPv4 or IPv6 networks by
         using an MPLS-SR label stack carried in UDP.  No change is made to the
         MPLS-SR encoding mechanism as described in
         <xref target="I-D.ietf-spring-segment-routing-mpls"/> where a sequence of
         32 bit units, one for each instruction, called the Segment Routing
         Instruction Stack (SRIS) is used.  Each basic unit is encoded as an MPLS
         label stack entry and the segment routing instructions (i.e., the Segment
         Identifiers, SIDs) are encoded in the 20 bit MPLS Label fields.</t>

      <t>In summary, the processing described in this document is a combination of
         normal MPLS-over-UDP behavior as described in <xref target="RFC7510"/>,
         MPLS-SR lookup and label-pop behavior as described in
         <xref target="I-D.ietf-spring-segment-routing-mpls"/>, and normal IP
         forwarding.  No new procedures are introduced, but existing mechanisms are
         combined to achieve the desired result.</t>

      <t>The method defined is a complementary way of running SR in an IP network
         that can be used alongside or interchangeably with that defined in
         <xref target="I-D.ietf-6man-segment-routing-header"/>.  Implementers and
         deployers should consider the benefits and drawbacks of each method and
         select the approach most suited to their needs.</t>

    </section>

    <section anchor="stack" title="The MPLS-SR-over-UDP Encoding Stack">

      <t>The MPLS-SR-over-UDP encoding stack is shown in <xref target="FIGPktFormat"/>.</t>

      <figure title="Packet Encapsulation" anchor="FIGPktFormat">
        <artwork>
          <![CDATA[
 +---------------------+
 |                     |
 |      IP Header      |
 |                     |
 +---------------------+
 |                     |
 |     UDP Header      |
 |                     |
 +---------------------+
 |                     |
 |   Segment Routing   |
 |  Instruction Stack  |
 ~                     ~
 ~                     ~
 |                     |
 +---------------------+
 |                     |
 |      Payload        |
 ~                     ~
 ~                     ~
 |                     |
 +---------------------+
          ]]>
        </artwork>
      </figure>

      <t>The payload may be of any type that, with an appropriate convergence
         layer, can be carried over a packet network.  It is anticipated that the
         most common packet types will be IPv4, IPv6, native MPLS, and pseudowires
         <xref target="RFC3985"/>.</t>

      <t>Preceding the Payload is the Segment Routing Instruction Stack (SRIS)
         that carries the sequence of instructions to be executed on the packet as
         it traverses the network.  This is the Segment Identifier (SID) stack that
         is the ordered list of segments described in
         <xref target="I-D.ietf-spring-segment-routing"/>.</t>

      <t>Preceding the SRIS is a UDP header. The UDP header is included to:
         <list style="symbols">

           <t>Introduce entropy to allow equal-cost multi-path load balancing (ECMP)
              <xref target="RFC2992"/> in the IP layer <xref target="RFC7510"/>.</t>

           <t>Provide a protocol multiplexing layer as an alternative to using a new
              IP type/next header.</t>

           <t>Allow transit through firewalls and other middleboxes.</t>

           <t>Provide disaggregation.</t>
         </list></t>

      <t>Preceding the UDP header is the IP header which may be IPv4 or IPv6.</t>

    </section>

    <section anchor="the-segment-routing-instruction-stack" title="The Segment Routing Instruction Stack">

      <t>The SRIS consists of a sequence of Segment Identifiers as described in
         <xref target="I-D.ietf-spring-segment-routing"/> encoded as an MPLS label
         stack as described in <xref target="I-D.ietf-spring-segment-routing-mpls"/>.</t>

      <t>The top SRIS entry is the next instruction to be executed.  When the node to which
         this instruction is directed has processed the instruction it is removed (popped)
         from the SRIS, and the next instruction processed.</t>

      <t>Each instruction is encoded in a single Label Stack Entry (LSE) as shown in
         <xref target="FIGSRISFormat"/>.  The structure of the LSE is unchanged from
         <xref target="RFC3032"/>.</t>

      <figure title="SRIS Label Stack Entry" anchor="FIGSRISFormat">
        <artwork>
          <![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              Instruction                  | TC  |S|   TTL     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                Instruction:  Label Value, 20 bits
                TC:           Traffic Class, 3 bits
                S:            Bottom of Stack, 1 bit
                TTL:          Time to Live, 8 bits
          ]]>
        </artwork>
      </figure>

      <t>As with <xref target="I-D.ietf-spring-segment-routing-mpls"/> a 32 bit LSE is
         used to carry each SR instruction.  The instruction itself is carried in the
         20 bit Label Value field.  The TC field has the normal meaning as defined in
         <xref target="RFC3032"/> and modified in <xref target="RFC5462"/>.  The S bit
         has bottom of stack semantics defined in <xref target="RFC3032"/>.  TTL is
         discussed in <xref target="TTLSec"/>.</t>

      <section anchor="TTLSec" title="TTL">

         <t>The setting of the TTL is application specific, but the following operational
            consideration should be born in mind.  In SR the size of the label stack may be
            increased within a single routing domain by various operations such as the
            pushing of a binding SID.  Furthermore in SR packets are not necessarily
            constrained to travel on the shortest path with that routing domain.
            Consideration therefore has to be given to possibility of a forwarding loop.
            To mitigate against this it is RECOMMENDED that the TTL is continuously
            decremented as the packet passes through the SR network regardless of any
            other changes to the network layer encapsulation.</t>

         <t>Further discussion of the use of TTL during tunnelling can be found in
            <xref target="RFC4023"/>.</t>

      </section>

    </section>

    <section anchor="udpip-encapsulation" title="UDP/IP Encapsulation">

      <t>The procedures defined in <xref target="RFC7510"/> are followed.  RFC7510
         specifies the values to be used in the UDP Source Port, Destination Port, and
         Checksum fields.</t>

      <t>An administrative domain, or set of administrative domains that are sufficiently
         well managed and monitored to be able to safely use IP segment routing is likely
         to comply with the requirements called out in <xref target="RFC7510"/> to permit
         operation with a zero checksum over IPv6.  However each operator needs to validate
         the decision on whether or not to use a UDP checksum for themselves.</t>

      <t>The <xref target="RFC7510"/> UDP header may be carried over IPv4 or over IPv6.</t>

      <t>The IP source address is the address of the encapsulating device.  The IP
         destination address is implied by the instruction at the top of the instruction
         stack.</t>

      <t>If IPv4 is in use, fragmentation is not permitted.</t>

    </section>

    <section anchor="elements-of-procedure" title="Elements of Procedure">

      <t>Not all of the nodes in an SR domain are "SR capable" meaning that they can process
         MPLS-SR packets.  Some nodes may be "legacy routers" that cannot handle SR packets
         but can forward IP packets.  An SR capable node may advertise its capabilities using
         the IGP as described in <xref target="control-plane"/>.  There are six types of node
         in an SR domain:

         <list style="symbols">

           <t>Domain ingress nodes that receive packets and encapsulate them for
              transmission across the domain.  These packets may be any payload
              protocol including native IP packets or packets that are already
              MPLS encapsulated.</t>

           <t>Legacy transit nodes that are IP routers but that are not able to
              perform segment routing.</t>

           <t>Transit nodes that are SR capable but that are not identified by a
              SID in the SID stack.</t>

           <t>Transit nodes that are SR capable and need to perform SR routing.</t>

           <t>The penultimate SR capable node on the path that processes the last
              SID on the stack on behalf of the domain egress node.</t>

           <t>The domain egress node that forwards the payload packet for
              ultimate delivery.</t>

         </list></t>

      <t>The following sub-sections describe the processing behavior in each
         case.</t>

      <t>In summary, the processing is a combination of normal MPLS-over-UDP
         behavior as described in <xref target="RFC7510"/>, MPLS-SR lookup and label-pop
         behavior as described in <xref target="I-D.ietf-spring-segment-routing-mpls"/>,
         and normal IP forwarding.  No new procedures are introduced, but existing
         mechanisms ae combined to achieve the desired result.</t>

      <t>The descriptions in the following sections represent the functional
         behavior.  Optimizations on this behavior may be possible in
         implementations.</t>

      <section anchor="SECDI" title="Domain Ingress Nodes">

        <t>Domain ingress nodes receive packets from outside the domain and
           encapsulate them to be forwarded across the domain.  Received packets
           may already be MPLS-SR packets (in the case of connecting two MPLS-SR
           networks across a native IP network), or may be IP or MPLS packets.</t>

        <t>In the latter case, the packet is classified by the domain ingress
           node and an MPLS-SR stack is imposed.  In the former case the MPLS-SR
           stack is already in the packet.  The top entry in the stack is popped
           from the stack and retained for use below.</t>

        <t>The packet is then encapsulated in UDP with the destination port set
           to 6635 to indicate "MPLS-UDP" or to 6636 to indicate "MPLS-UDP-DTLS"as
           described in <xref target="RFC7510"/>.  The source UDP port is set
           randomly or to provide entropy as described in <xref target="RFC7510"/>.</t>

        <t>The packet is then encapsulated in IP for transmission across the
           network.  The IP source address is set to the domain ingress node,
           and the destination address is set to the address corresponding to
           the label that was previously popped from the stack.</t>

        <t>This corresponds to sending the packet out of a virtual interface
           that corresponds to a virtual link between the ingress node and the
           next hop SR node realized by a UDP tunnel.</t>

        <t>The packet is then sent into the IP network and is routed according
           to the local FIB and applying hashing to resolve any ECMP choices.</t>

      </section>

      <section anchor="SECLT" title="Legacy Transit Nodes">

        <t>A legacy transit node is an IP router that has no SR capabilities.
           When such a router receives an MPLS-SR-in-UDP packet it will carry
           out normal TTL processing and if the packet is still live it will
           forward it as it would any other UDP-in-IP packet.  The packet will
           be routed toward the destination indicated in the packet header using
           the local FIB and applying hashing to resolve any ECMP choices.</t>

        <t>If the packet is mistakenly addressed to the legacy router, the UDP
           tunnel will be terminated and the packet will be discarded either
           because the MPLS-in-UDP port is not supported or because the
           uncovered top label has not been allocated.  This is, however, a
           misconnection and should not occur unless there is a routing error.</t>

      </section>

      <section anchor="OPPT" title="On-Path Pass-Through SR Nodes">

        <t>Just because a node is SR capable and receives an MPLS-SR-in-UDP
           packet does not mean that it performs SR processing on the packet.
           Only routers identified by SIDs in the SR stack need to do such
           processing.</t>

        <t>Routers that are not addressed by the destination address in the IP
           header simply treat the packet as a normal UDP-in-IP packet carrying
           out normal TTL processing and if the packet is still live routing the
           packet according to the local FIB and applying hashing to resolve any
           ECMP choices.</t>

        <t>This is important because it means that the SR stack can be kept
           relatively small and the packet can be steered through the network
           using shortest path first routing between selected SR nodes.</t>

      </section>

      <section anchor="SecTransit" title="SR Transit Nodes">

        <t>An SR capable node that is addressed by the top most SID in the stack
           when that is not the last SID in the stack (i.e., the S bit is not set)
           is an SR transit node.  When an SR transit node receives an MPLS-SR-in-UDP
           packet that is addressed to it, it acts as follows:

           <list style="symbols">
             <t>Perform TTL processing as normal for an IP packet.</t>
             <t>Determine that the packet is addressed to the local node.</t>
             <t>Find that the payload is UDP and that the destination port
                indicates MPLS-in-UDP.</t>
             <t>Strip the IP and UDP headers.</t>
             <t>Pop the top label from the SID stack and retain it for use below.</t>
             <t>Encapsulate the packet in UDP with the destination port set to 6635
                (or 6636 for DTLS) and the source port set for entropy.  The
                entropy value SHOULD be retained from the received UDP header or
                MAY be freshly generated since this is a new UDP tunnel.</t>
             <t>Encapsulate the packet in IP with the IP source address set to this
                transit router, and the destination address set to the address
                corresponding to the next SID in the stack.</t>
             <t>Send the packet into the IP network routing the packet according to
                the local FIB and applying hashing to resolve any ECMP choices.</t>
           </list></t>

      </section>

      <section anchor="SECPSRT" title="Penultimate SR Transit Nodes">

        <t>The penultimate SR transit node is an SR transit node as described in
           <xref target="SecTransit"/> where the SID for the node is directly
           followed by the final SID (i.e., that of domain egress node).  When a
           penultimate SR transit node receives an MPLS-SR-in-UDP packet that is
           addressed to it, it acts according  to whether penultimate hop popping
           (PHP) is supported for the final SID.  That information could be
           indicated using the control plane as described in
           <xref target="control-plane"/>.</t>

        <t>If PHP is allowed the penultimate SR transit node acts as follows:
           <list style="symbols">
             <t>Perform TTL processing as normal for an IP packet.</t>
             <t>Determine that the packet is addressed to the local node.</t>
             <t>Find that the payload is UDP and that the destination port
                indicates MPLS-in-UDP.</t>
             <t>Strip the IP and UDP headers.</t>
             <t>Pop the top label from the SID stack and retain it for use below.</t>
             <t>Pop the next label from the SID stack.</t>
             <t>Encapsulate the packet in UDP with the destination port set to 6635
                (or 6636 for DTLS) and the source port set for entropy.  The
                entropy value SHOULD be retained from the received UDP header or
                MAY be freshly generated since this is a new UDP tunnel.</t>
             <t>Encapsulate the packet in IP with the IP source address set to
                this transit router, and the destination address set to the domain
                egress node IP address corresponding to the label that was previously
                popped from the stack.</t>
             <t>Send the packet into the IP network routing the packet according
                to the local FIB and applying hashing to resolve any ECMP choices.</t>
           </list></t>

        <t>If PHP is not supported, the penultimate SR transit node just acts as a
           normal SR transit node just as described in <xref target="SecTransit"/>.
           However, the penultimate SR transit node may be required to replace the
           final SID with an MPLS-SR label stack entry carrying an explicit null
           label value (0 for IPv4 and 2 for IPv6) before forwarding the packet.
           This requirement may also be indicated by the control plane as described
           in <xref target="control-plane"/>.</t>

      </section>

      <section anchor="SECDE" title="Domain Egress Nodes">

        <t>The domain egress acts as follows:
           <list style="symbols">
             <t>Perform TTL processing as normal for an IP packet.</t>
             <t>Determine that the packet is addressed to the local node.</t>
             <t>Find that the payload is UDP and that the destination port
                indicates MPLS-in-UDP.</t>
             <t>Strip the IP and UDP headers.</t>
             <t>Pop the outermost SID if present (i.e., if PHP was not performed
                as described in <xref target="SECPSRT"/>.</t>
             <t>Pop the explicit null label if it is present in the label stack
                as requested by the domain egress and communicated in the control
                plane as described in <xref target="control-plane"/>.</t>
             <t>Forward the payload packet according to its type and the local
                routing/forwarding mechanisms.</t>
           </list></t>

      </section>

    </section>

    <section anchor="modes-of-deployment" title="Modes of Deployment">

      <t>As previously noted, the procedures described in this document may be
         used to connect islands of SR functionality across an IP backbone, or
         can provide SR function within a native IP network.  This section
         briefly expounds upon those two deployment modes.</t>

      <section anchor="interconnection-of-sr-domains" title="Interconnection of SR Domains">

        <t><xref target="FIGA"/> shows two SR domains interconnected by an IP network.
           The procedures described in this document are deployed at border routers
           R1 and R2 and packets are carried across the backbone network in a UDP
           tunnel.</t>

        <t>R1 acts as the domain ingress as described in <xref target="SECDI"/>.  It
           takes the MPLS-SR packet from the SR domain, pops the top label and uses it
           to identify its peer border router R2.  R1 then encapsulates the packet in
           UDP in IP and sends it toward R2.</t>

        <t>Routers within the IP network simply forward the packet using normal IP
           routing.</t>

        <t>R2 acts as a domain egress router as described in <xref target="SECDE"/>.  It
           receives a packet that is addressed to it, strips the IP and UDP
           headers, and acts on the payload SR label stack to continue to
           route the packet.</t>

        <figure title="SR in UDP to Tunnel Between SR Sites" anchor="FIGA">
          <artwork>
            <![CDATA[
                 ________________________
    ______      (                        )      ______
   (      )    (        IP Network        )    (      )
  (        )  (                            )  (        )
 (      --------                          --------      )
(      | Border |    SR-in-UDP Tunnel    | Border |      )
(  SR  | Router |========================| Router |  SR  )
(      |   R1   |                        |   R2   |      )
 (      --------                          --------      )
  (        )  (                            )  (        )
   (______)    (                          )    (______)
                (________________________)
            ]]>
          </artwork>
        </figure>

      </section>

      <section anchor="sr-within-and-ip-network" title="SR Within an IP Network">

        <t><xref target="FIGB"/> shows the procedures defined in this document to
           provide SR function across an IP network.</t>

        <t>R1 receives a native packet and classifies it, determining that it should
           be sent on the SR path R2-R3-R4-R5.  It imposes a label stack accordingly
           and then acts as a domain ingress as described in <xref target="SECDI"/>.
           It pops the label for R2, and encapsulates the packet in UDP in IP, sets
           the IP source to R1 and the IP destination to R2, and sends the packet into
           the IP network.</t>

        <t>Routers Ra and Rb are transit routers that simply forward the packets using
           normal IP forwarding.  They may be legacy transit routers (see
           <xref target="SECLT"/>) or on-path pass-through SR nodes (see
           <xref target="OPPT"/>).</t>

        <t>R2 is an SR transit nodes as described in <xref target="SecTransit"/>.  It
           receives a packet addressed to it, strips the IP and UDP headers, and
           processes the SR label stack.  It pops the top label and uses it to identify
           the next SR hop which is R3.  R2 then encapsulates the packet in UDP in IP
           setting the IP source to R2 and the IP destination to R3.</t>

        <t>Rc, Rd, and Re are transit routers and perform as Ra and Rb.</t>

        <t>R3 is an SR transit node and performs as R2.</t>

        <t>R4 is a penultimate SR transit node as described in <xref target="SECPSRT"/>.
           It receives a packet addressed to it, strips the IP and UDP headers, and
           processes the SR label stack.  It pops the top label and uses it to identify
           the next SR hop which is R5.</t>

        <t>R5 is the domain egress as described in <xref target="SECDE"/>.  It receives
           a packet addressed to it, strips the IP and UDP headers.</t>

        <figure title="SR Within an IP Network" anchor="FIGB"><artwork><![CDATA[
                 __________________________________
              __(           IP Network             )__
           __(                                        )__
          (               --        --        --         )
     --------   --   --  |R2|  --  |R3|  --  |R4|  --   --------
    | Ingress| |Ra| |Rb| |  | |Rc| |  | |Rd| |  | |Re| | Egress |
--->| Router |===========|  |======|  |======|  |======| Router |--->
    |   R1   | |  | |  | |  | |  | |  | |  | |  | |  | |   R5   |
     --------   --   --  |  |  --  |  |  --  |  |  --   --------
          (__             --        --        --       __)
             (__                                    __)
                (__________________________________)
            ]]>
          </artwork>
        </figure>

      </section>

    </section>

    <section anchor="control-plane" title="Control Plane">

      <t>This document is concerned with forwarding plane issues, and a description
         of applicable control plane mechanisms is out of scope.  This section is
         provided only as a collection of references.  No changes to the control
         plane mechanisms for MPLS-SR are needed or proposed.</t>

      <t>A routers that is able to support SR can advertise the fact in the IGP as
         follows:
         <list style="symbols">
           <t>In IS-IS, by using the SR-Capabilities TLV as defined in
              <xref target="I-D.ietf-isis-segment-routing-extensions"/></t>
           <t>In OSPF/OSPFv3 by using the Router Information LSA as defined in
              <xref target="I-D.ietf-ospf-segment-routing-extensions"/> and
              <xref target="I-D.ietf-ospf-ospfv3-segment-routing-extensions"/>.</t>
         </list></t>

      <t>Nodes can advertise SIDs using the mechanisms defined in
         <xref target="I-D.ietf-isis-segment-routing-extensions"/>,
         <xref target="I-D.ietf-ospf-segment-routing-extensions"/>, or
         <xref target="I-D.ietf-ospf-ospfv3-segment-routing-extensions"/>.</t>

      <t>Support for PHP can be indicated in a SID advertisement using flags in
         the advertisements as follows:
         <list style="symbols">
           <t>For IS-IS, the N (no-PHP) flag in the Prefix-SID sub-TLV indicates
              whether PHP is not to be used.</t>
           <t>For OSPF/OSPFv3, the NP (no-PHP) flag in the Prefix SID Sub-TLV
              indicates whether PHP is not to be used.</t>
         </list></t>

      <t>The requirement to use an explicit null SID if PHP is not in use can be
         indicated in SID advertisement using the Explicit-Null Flag (E-Flag).  If
         set, the penultimate SR transit node replaces the final SID with a SID
         containing an Explicit-NULL value (0 for IPv4 and 2 for IPv6) before
         forwarding the packet.</t>

      <t>The method of advertising the tunnel encapsulation capability of a router using
         IS-IS or OSPF are specified in <xref target="I-D.ietf-isis-encapsulation-cap"/>
         and <xref target="I-D.ietf-ospf-encapsulation-cap"/> respectively.  No changes
         to those procedures are needed in support of this work.</t>

    </section>

    <section anchor="oam" title="OAM">

      <t>OAM at the payload layer follows the normal OAM procedures for the payload. To
         the payload the whole SR network looks like a tunnel.</t>

      <t>OAM in the IP domain follows the normal IP procedures. This can only be carried
         out between on the IP hops between pairs of SR nodes.</t>

      <t>OAM between instruction processing entities i.e. at the SR layer uses the
         procedures documented for MPLS.</t>

    </section>

    <section anchor="security-considerations" title="Security Considerations">

      <t>The security consideration of  <xref target="I-D.ietf-spring-ipv6-use-cases"/> and
         <xref target="RFC7510"/> apply.  DTLS <xref target="RFC6347"/> SHOULD be used where
         security is needed on an MPLS-SR-over-UDP segment.</t>

      <t>It is difficult for an attacker to pass a raw MPLS encoded packet into a network and
         operators have considerable experience at excluding such packets at the network
         boundaries.</t>

      <t>It is easy for an ingress node to detect any attempt to smuggle IP packet into the
         network since it would see that the UDP destination port was set to MPLS.  SR
         packets not having a destination address terminating in the network would be
         transparently carried and would pose no security risk to the network under
         consideration.</t>

    </section>

    <section anchor="iana-considerations" title="IANA Considerations">

      <t>This document makes no IANA requests.</t>

    </section>

    <section anchor="acknowledgements" title="Acknowledgements">

      <t>This draft was partly inspired by
         <xref target="I-D.xu-mpls-unified-source-routing-instruction" />, and we acknowledge
         the following authors of version -02 of that draft: Robert Raszuk, Uma Chunduri,
         Luis M. Contreras, Luay Jalil, Hamid Assarpour, Gunter Van De Velde, Jeff Tantsura,
         and Shaowen Ma.</t>

      <t>Thanks to Joel Halpern, Bruno Decraene, Loa Andersson, Ron Bonica, Eric Rosen,
         Robert Raszuk, Wim Henderickx, Jim Guichard, and Gunter Van De Velde for their
         insightful comments on this draft.</t>

    </section>

    <section anchor="contributors" title="Contributors">

      <t><list style="symbols">
        <t>Mach Chen, Huawei Technologies, mach.chen@huawei.com</t>
      </list></t>

    </section>

  </middle>

  <back>

    <references title='Normative References'>

      &RFC2119;
      &RFC3032;
      &RFC5462;
      &RFC6347;
      &RFC7510;

      <?rfc include="reference.I-D.ietf-spring-segment-routing-mpls"?>
      <?rfc include="reference.I-D.ietf-spring-segment-routing"?>

    </references>

    <references title='Informative References'>

      &RFC2992;
      &RFC3985;
      &RFC4023;

      <?rfc include="reference.I-D.ietf-6man-segment-routing-header"?>
      <?rfc include="reference.I-D.ietf-spring-ipv6-use-cases"?>
      <?rfc include="reference.I-D.xu-mpls-unified-source-routing-instruction"?>
      <?rfc include="reference.I-D.ietf-isis-encapsulation-cap"?>
      <?rfc include="reference.I-D.ietf-ospf-encapsulation-cap"?>
      <?rfc include="reference.I-D.ietf-isis-segment-routing-extensions"?>
      <?rfc include="reference.I-D.ietf-ospf-segment-routing-extensions"?>
      <?rfc include="reference.I-D.ietf-ospf-ospfv3-segment-routing-extensions"?>

    </references>

  </back>

</rfc>
