<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC8402 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8402.xml">
<!ENTITY RFC8660 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8660.xml">
<!ENTITY RFC8754 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8754.xml">
<!ENTITY RFC8986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC9256 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
<!ENTITY I-D.dawra-idr-bgp-sr-service-chaining SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.dawra-idr-bgp-sr-service-chaining.xml">
<!ENTITY I-D.xu-mpls-payload-protocol-identifier SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.xu-mpls-payload-protocol-identifier.xml">
<!ENTITY RFC7665 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7665.xml">
<!ENTITY RFC8300 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8300.xml">
<!ENTITY RFC8595 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8595.xml">
]>


<rfc ipr="trust200902" docName="draft-ietf-spring-sr-service-programming-10" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Service Programming with Segment Routing</title>

    <author initials="F." surname="Clad" fullname="Francois Clad" role="editor">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>fclad.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="X." surname="Xu" fullname="Xiaohu Xu" role="editor">
      <organization>China Mobile</organization>
      <address>
        <email>xuxiaohu@cmss.chinamobile.com</email>
      </address>
    </author>
    <author initials="C." surname="Filsfils" fullname="Clarence Filsfils">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>cf@cisco.com</email>
      </address>
    </author>
    <author initials="D." surname="Bernier" fullname="Daniel Bernier">
      <organization>Bell Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>daniel.bernier@bell.ca</email>
      </address>
    </author>
    <author initials="C." surname="Li" fullname="Cheng Li">
      <organization>Huawei</organization>
      <address>
        <email>chengli13@huawei.com</email>
      </address>
    </author>
    <author initials="B." surname="Decraene" fullname="Bruno Decraene">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>bruno.decraene@orange.com</email>
      </address>
    </author>
    <author initials="S." surname="Ma" fullname="Shaowen Ma">
      <organization>Mellanox</organization>
      <address>
        <email>mashaowen@gmail.com</email>
      </address>
    </author>
    <author initials="C." surname="Yadlapalli" fullname="Chaitanya Yadlapalli">
      <organization>AT&amp;T</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>cy098d@att.com</email>
      </address>
    </author>
    <author initials="W." surname="Henderickx" fullname="Wim Henderickx">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>wim.henderickx@nokia.com</email>
      </address>
    </author>
    <author initials="S." surname="Salsano" fullname="Stefano Salsano">
      <organization>Universita di Roma "Tor Vergata"</organization>
      <address>
        <postal>
          <country>Italy</country>
        </postal>
        <email>stefano.salsano@uniroma2.it</email>
      </address>
    </author>

    <date year="2024" month="August" day="23"/>

    <area>General</area>
    <workgroup>SPRING</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 183?>

<t>This document defines data plane functionality required to implement service segments and achieve service programming in SR-enabled MPLS and IPv6 networks, as described in the Segment Routing architecture.</t>



    </abstract>



  </front>

  <middle>


<?line 187?>

<section anchor="introduction"><name>Introduction</name>

<t>Segment Routing (SR) <xref target="RFC8402"/> is an architecture based on the source routing paradigm that seeks the right balance between distributed intelligence and centralized programmability.  SR can be used with an MPLS or an IPv6 data plane to steer packets through an ordered list of instructions, called segments.  These segments may encode simple routing instructions for forwarding packets along a specific network path, but also steer them through Virtual Network Functions (VNFs) or physical service appliances available in the network.</t>

<t>In an SR network, each of these services, running either on a physical appliance or in a virtual environment, are associated with a segment identifier (SID). These service SIDs are then leveraged as part of a SID-list to steer packets through the corresponding services.  Service SIDs may be combined together in a SID-list to achieve service programming, but also with other types of segments as defined in <xref target="RFC8402"/>.  SR thus provides a fully integrated solution for overlay, underlay and service programming. Furthermore, the IPv6 instantiation of SR (SRv6) <xref target="RFC8986"/> supports metadata transportation in the Segment Routing Header <xref target="RFC8754"/>, either natively in the tag field or with extensions such as TLVs.</t>

<t>This document describes how a service can be associated with a SID, including legacy services with no SR capabilities, and how these service SIDs are integrated within an SR policy. The definition of an SR Policy and the traffic steering mechanisms are covered in <xref target="RFC9256"/> and hence outside the scope of this document.</t>

<t>The definition of control plane components, such as service segment discovery, is outside the scope of this data plane document.  For reference, the option of using BGP extensions to support SR service programming is proposed in <xref target="I-D.dawra-idr-bgp-sr-service-chaining"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>This document leverages the terminology proposed in <xref target="RFC8402"/>, <xref target="RFC8660"/>, <xref target="RFC8754"/>, <xref target="RFC8986"/> and <xref target="RFC9256"/>.  It also introduces the following new terms.</t>

<t>Service segment: A segment associated with a service. The service may either run on a physical appliance or in a virtual environment such as a virtual machine or container.</t>

<t>SR-aware service: A service that is fully capable of processing SR traffic. An SR-aware service can be directly associated with a service segment.</t>

<t>SR-unaware service: A service that is unable to process SR traffic or may behave incorrectly due to presence of SR information in the packet headers. An SR-unaware service can be associated with a service segment through an SR proxy function.</t>

</section>
<section anchor="classification-and-steering"><name>Classification and Steering</name>

<t>Classification and steering mechanisms are defined in section 8 of <xref target="RFC9256"/> and are independent from the purpose of the SR policy.  From the perspective of a headend node classifying and steering traffic into an SR policy, there is no difference whether this policy contains IGP, BGP, peering, VPN or service segments, or any combination of these.</t>

<t>As documented in the above reference, traffic is classified when entering an SR domain.  The SR policy headend may, depending on its capabilities, classify the packets on a per-destination basis, via simple FIB entries, or apply more complex policy routing rules requiring to look deeper into the packet.  These rules are expected to support basic policy routing such as 5-tuple matching.  In addition, the IPv6 SRH tag field defined in <xref target="RFC8754"/> can be used to identify and classify packets sharing the same set of properties.  Classified traffic is then steered into the appropriate SR policy and forwarded as per the SID-list(s) of the active candidate path.</t>

<t>SR traffic can be re-classified by an SR endpoint along the original SR policy (e.g., DPI service) or a transit node intercepting the traffic.  This node is the head-end of a new SR policy that is imposed onto the packet, either as a stack of MPLS labels or as an IPv6 SRH.</t>

</section>
<section anchor="service-segments"><name>Service Segments</name>

<t>In the context of this document, the term service refers to a physical appliance running on dedicated hardware, a virtualized service inside an isolated environment such as a Virtual Machine (VM), container or namespace, or any process running on a compute element.  A service may also comprise multiple sub-components running in different processes or containers.  Unless otherwise stated, this document does not make any assumption on the type or execution environment of a service.</t>

<t>The execution of a service can be integrated as part of an SR policy by assigning a segment identifier, or SID, to the service and including this service SID in the SR policy SID-list.  Such a service SID may be of local or global significance. In the former case, other segments, such as prefix or adjacency segments, can be used to steer the traffic up to the node where the service segment is instantiated. In the latter case, the service is directly reachable from anywhere in the routing domain.  This is realized with SR-MPLS by assigning a SID from the global label block (<xref target="RFC8660"/>), or with SRv6 by advertising the SID locator in the routing protocol (<xref target="RFC8986"/>).  It is up to the network operator to define the scope and reachability of each service SID.  This decision can be based on various considerations such as infrastructure dynamicity, available control plane or orchestration system capabilities.</t>

<t>This document categorizes services in two types, depending on whether they are able to behave properly in the presence of SR information or not. These are respectively named SR-aware and SR-unaware services.</t>

<section anchor="sr-aware-services"><name>SR-Aware Services</name>

<t>An SR-aware service can process the SR information in the packets it receives. This means being able to identify the active segment as a local instruction and move forward in the segment list, but also that the service&#39;s own behavior is not hindered due to the presence of SR information.  For example, an SR-aware firewall filtering SRv6 traffic based on its final destination must retrieve that information from the last entry in the SRH rather than the Destination Address field of the IPv6 header.</t>

<t>An SR-aware service is associated with a locally instantiated service segment, which is used to steer traffic through it.</t>

<t>If the service is configured to intercept all the packets passing through the appliance, the underlying routing system only has to implement a default SR endpoint behavior (e.g., SR-MPLS node segment or SRv6 End behavior), and the corresponding SID will be used to steer traffic through the service.</t>

<t>If the service requires the packets to be directed to a specific virtual interface, networking queue or process, a dedicated SR behavior may be required to steer the packets to the appropriate location.  The definition of such service-specific functions is out of the scope of this document.</t>

<t>SR-aware services also enable advanced network programming functionalities such as conditional branching and jumping to arbitrary SIDs in the segment list. In addition, SRv6 provides several ways of passing and exchanging information between services (e.g., SID arguments, tag field and TLVs). An example scenario involving these features is described in <xref target="IFIP18"/>, which discusses the implementation of an SR-aware Intrusion Detection System.</t>

<t>Examples of SR-aware services are provided in section <xref target="sec-implem-aware"/>.</t>

</section>
<section anchor="sr-unaware-services"><name>SR-Unaware Services</name>

<t>Any service that does not meet the above criteria for SR-awareness is considered as SR-unaware.</t>

<t>An SR-unaware service is not able to process the SR information in the traffic that it receives.  It may either drop the traffic or take erroneous decisions due to the unrecognized routing information.  In order to include such services in an SR policy, it is thus required to remove the SR information as well as any other encapsulation header before the service receives the packet, or to alter it in such a way that the service can correctly process the packet.</t>

<t>In this document, we define the concept of an SR proxy as an entity, separate from the service, that performs these modifications and handle the SR processing on behalf of a service.  The SR proxy can run as a separate process on the service appliance, on a virtual switch or router on the compute node or on a different host.</t>

<t>An SR-unaware service is associated with a service segment instantiated on the SR proxy, which is used to steer traffic through the service. <xref target="sec-proxies"/> describes several SR proxy behaviors to handle the encapsulation headers and SR information under various circumstances.</t>

</section>
</section>
<section anchor="sr-service-policies"><name>SR Service Policies</name>

<t>An SR service policy is an SR policy, as defined in <xref target="RFC9256"/>, that includes at least one service. This service is represented in the SID-list by its associated service SID. In case the policy should include several services, the service traversal order is indicated by the relative position of each service SID in the SID-list. Using the mechanisms described in <xref target="RFC9256"/>, it is possible to load balance the traffic over several services, or instances of the same service, by associating with the SR service policy a weighted set of SID-lists, each containing a possible sequence of service SIDs to be traversed. Similarly, several candidate paths can be specified for the SR service policy, each with its own set of SID-lists, for resiliency purposes.</t>

<t>Furthermore, binding SIDs (BSIDs) <xref target="RFC8402"/> can be leveraged in the context of service policies to reduce the number of SIDs imposed by the headend, provide opacity between domains and improve scalability. For example, a network operator may want a policy in its core domain to include services that are running in one of its datacenters. One option is to define an SR policy at ingress edge of the core domain that explicitly includes all the SIDs needed to steer the traffic through the core and in the DC, but that may result in a long SID-list and requires to update the ingress edge configuration every time the DC part of the policy is modified. Alternatively, a separate policy can be defined at the ingress edge of the datacenter with only the SIDs that needs to be executed there and its BSID included in the core domain policy. That BSID remains stable when the DC policy is modified and can even be shared among several core domain policies that would require the same type of processing in the DC.</t>

<t>This section describes how services can be integrated within an SR-MPLS or SRv6 service policy.</t>

<figure title="SR service policy" anchor="fig-policy"><artwork><![CDATA[
     +------------------------------------------+
     |               SR network                 |
     |                                          |
+----+----+          +---------+           +----+-----+
|    H    +----------+    S    +-----------+    E     |
|(headend)|          |(service)|           |(endpoint)|
+----+----+          +---------+           +----+-----+
     |  =====================================>  |
     |     P1(H,E,C)                            |
     +------------------------------------------+
]]></artwork></figure>

<t><xref target="fig-policy"/> illustrates a basic SR service policy instantiated on a headend node H towards an endpoint E and traversing a service S. The SR policy may also include additional requirements, such as traffic engineering or VPN. On the head-end H, the SR policy P1 is created with a color C and endpoint E and associated with an SR path that can either be explicitly configured, dynamically computed on H or provisioned by a network controller.</t>

<t>In its most basic form, the SR policy P1 would be resolved into the SID-list &lt; SID(S), SID(E) &gt;. This is assuming that SID(S) and SID(E) are directly reachable from H and S, respectively, and that the forwarding path meets the policy requirement. However, depending on the dataplane and the segments available in the network, additional SIDs may be required to enforce the SR policy.</t>

<t>This model applies regardless of the SR-awareness of the service. If it is SR-unaware, then S simply represents the proxy that takes care of transmitting the packet to the actual service.</t>

<t>Traffic can then be steered into this policy using any of the mechanisms described in <xref target="RFC9256"/>.</t>

<t>The following subsections describe the specificities of each SR dataplane.</t>

<section anchor="sec-policy-mpls"><name>SR-MPLS Data Plane</name>

<figure title="Packet walk in an SR-MPLS network" anchor="fig-policy-mpls"><artwork><![CDATA[
     +-----------------------------------------------+
     |                SR-MPLS network                |
     |                                               |
+----+----+   ------>   +---------+   ------>   +----+-----+
|    H    +-------------+    S    +-------------+    E     |
|(headend)|             |(service)|             |(endpoint)|
+----+----+             +---------+             +----+-----+
     |    (1)         (2)         (3)         (4)    |
     |+---------+ +---------+ +---------+ +---------+|
     ||   ...   | |  L(S)   | |   ...   | |  L(E)   ||
     |+---------+ +---------+ +---------+ +---------+|
     ||  L(S)   | |   ...   | |  L(E)   | |Inner pkt||
     |+---------+ +---------+ +---------+ +---------+|
     ||   ...   | |  L(E)   | |Inner pkt|            |
     |+---------+ +---------+ +---------+            |
     ||  L(E)   | |Inner pkt|                        |
     |+---------+ +---------+                        |
     ||Inner pkt|                                    |
     |+---------+                                    |
     +-----------------------------------------------+
]]></artwork></figure>

<t>In an SR-MPLS network, the SR policy SID-list is encoded as a stack of MPLS labels <xref target="RFC8660"/> and pushed on top of the packet.</t>

<t>In the example shown on <xref target="fig-policy-mpls"/>, the SR policy should steer the traffic from the head-end H to the endpoint E via a service S. This translates into an MPLS label stack that includes at least a label L(S) associated to service S and a label L(E) associated to the endpoint E. The label stack may also include additional intermediate SIDs if these are required for traffic engineering (e.g., to encode a low latency path between H and S and / or between S and E) or simply for reachability purposes. Indeed, the service SID L(S) may be taken from the global or local SID block of node S and, in the latter case, one or more SIDs might be needed before L(S) in order for the packet to reach node S (e.g., a prefix-SID of S), where L(S) can be interpreted. The same applies for the SID L(E) at the SR policy endpoint.</t>

<t>Special consideration must be taken into account when using Local SIDs for service identification due to increased label stack depth and the associated impacts.</t>

<t>When the packet arrives at S, this node determines the MPLS payload type and the appropriate behavior for processing the packet based on the semantic locally associated to the top label L(S). If S is an SR-aware service, the SID L(S) may provide additional context or indication on how to process the packet (e.g., a firewall SID may indicate which rule set should be applied onto the packet). If S is a proxy in front of an SR-unaware service, L(S) indicates how and to which service attached to this proxy the packet should be transmitted. At some point in the process, L(S) is also popped from the label stack in order to expose the next SID, which may be L(E) or another intermediate SID.</t>

</section>
<section anchor="sec-policy-srv6"><name>SRv6 Data Plane</name>

<figure title="Packet walk in an SRv6 network" anchor="fig-policy-srv6"><artwork><![CDATA[
     +-----------------------------------------------+
     |                 SRv6 network                  |
     |                                               |
+----+----+   ------>   +---------+   ------>   +----+-----+
|    H    +-------------+    S    +-------------+    E     |
|(headend)|             |(service)|             |(endpoint)|
+----+----+             +---------+             +----+-----+
     |    (1)         (2)         (3)         (4)    |
     |+---------+ +---------+ +---------+ +---------+|
     ||IP6(H,..)| |IP6(H, S)| |IP6(H,..)| |IP6(H, E)||
     |+---------+ +---------+ +---------+ +---------+|
     ||SRH(E,..,| |SRH(E,..,| |SRH(E,..,| |SRH(E,..,||
     ||    S,..;| |    S,..;| |    S,..;| |    S,..;||
     ||    SL=i)| |    SL=j)| |    SL=k)| |    SL=0)||
     |+---------+ +---------+ +---------+ +---------+|
     ||Inner pkt| |Inner pkt| |Inner pkt| |Inner pkt||
     |+---------+ +---------+ +---------+ +---------+|
     +-----------------------------------------------+
]]></artwork></figure>

<t>In an SRv6 network, the SR Policy is encoded into the packet as an IPv6 header possibly followed by a Segment Routing Header (SRH) <xref target="RFC8754"/>.</t>

<t>In the example shown on <xref target="fig-policy-srv6"/>, the SR policy should steer the traffic from the head-end H to the endpoint E via a service S. This translates into Segment-List that includes at least a segment SID(S) to the service, or service proxy, S and a segment SID(E) to the endpoint E. The Segment-List may also include additional intermediate SIDs if these are required for traffic engineering (e.g., the encode a low latency path between H and S and / or between S and E) or simply for reachability purposes. Indeed, the service SID locator may or may not be advertised in the routing protocol and, in the latter case, one or more SIDs might be needed before SID(S) in order to bring the packet up to node S, where SID(S) can be interpreted. The same applies for the segment SID(E) at the SR policy endpoint.</t>

<t>When the packet arrives at S, this node determines how to process the packet based on the semantic locally associated to the active segment SID(S). If S is an SR-aware service, then SID(S) may provide additional context or indication on how to process the packet (e.g., a firewall SID may indicate which rule set should be applied onto the packet). If S is a proxy in front of an SR-unaware service, SID(S) indicates how and to which service attached to this proxy the packet should be transmitted. At some point in the process, the SRv6 End function is also applied in order to make the next SID, which may be SID(E) or another intermediate SID, active.</t>

<t>The &quot;Inner pkt&quot; on <xref target="fig-policy-srv6"/> represents the SRv6 payload, which may be an encapsulated IP packet, an Ethernet frame or a transport-layer payload, for example.</t>

</section>
</section>
<section anchor="sec-proxies"><name>SR Proxy Behaviors</name>

<t>This section describes several SR proxy behaviors designed to enable SR service programming through SR-unaware services.  A system implementing one of these behaviors may handle the SR processing on behalf of an SR-unaware service and allows the service to properly process the traffic that is steered through it.</t>

<t>A service may be located at any hop in an SR policy, including the last segment.  However, the SR proxy behaviors defined in this section are dedicated to supporting SR-unaware services at intermediate hops in the segment list.  In case an SR-unaware service is at the last segment, it is sufficient to ensure that the SR information is ignored (IPv6 routing extension header with Segments Left equal to 0) or removed before the packet reaches the service (MPLS PHP, SRv6 decapsulation behavior or PSP flavor).</t>

<t>As illustrated on <xref target="fig-proxy"/>, the generic behavior of an SR proxy has two parts.  The first part is in charge of passing traffic from the network to the service.  It intercepts the SR traffic destined for the service via a locally instantiated service segment, modifies it in such a way that it appears as non-SR traffic to the service, then sends it out on a given interface, IFACE-OUT, connected to the service.  The second part receives the traffic coming back from the service on IFACE-IN, restores the SR information and forwards it according to the next segment in the list.  IFACE-OUT and IFACE-IN are respectively the proxy interface used for sending traffic to the service and the proxy interface that receives the traffic coming back from the service.  These can be physical interfaces or sub-interfaces (VLANs) and, unless otherwise stated, IFACE-OUT and IFACE-IN can represent the same interface.</t>

<figure title="Generic SR proxy" anchor="fig-proxy"><artwork><![CDATA[
           +----------------------------+
           |                            |
           |           Service          |
           |                            |
           +----------------------------+
                    ^  Non SR   |
                    |  traffic  |
                    |           v
              +-----------+----------+
           +--| IFACE OUT | IFACE IN |--+
SR traffic |  +-----------+----------+  | SR traffic
---------->|          SR proxy          |---------->
           |                            |
           +----------------------------+
]]></artwork></figure>

<t>In the next subsections, the following SR proxy mechanisms are defined:</t>

<t><list style="symbols">
  <t>Static proxy</t>
  <t>Dynamic proxy</t>
  <t>Shared-memory proxy</t>
  <t>Masquerading proxy</t>
</list></t>

<t>Each mechanism has its own characteristics and constraints, which are summarized in the below table.  It is up to the operator to select the best one based on the proxy node capabilities, the service behavior and the traffic type.  It is also possible to use different proxy mechanisms within the same service policy.</t>

<figure title="SR proxy summary" anchor="fig-proxy-sum"><artwork><![CDATA[
                                        +-----+-----+-----+-----+
                                        |     |     |     |  M  |
                                        |     |     |  S  |  a  |
                                        |     |     |  h  |  s  |
                                        |     |     |  a  |  q  |
                                        |     |     |  r  |  u  |
                                        |     |  D  |  e  |  e  |
                                        |  S  |  y  |  d  |  r  |
                                        |  t  |  n  |     |  a  |
                                        |  a  |  a  |  m  |  d  |
                                        |  t  |  m  |  e  |  i  |
                                        |  i  |  i  |  m  |  n  |
                                        |  c  |  c  |  .  |  g  |
+---------------------------------------+-----+-----+-----+-----+
|                |       SR-MPLS        |  Y  |  Y  |  Y  |  -  |
|                |                      |     |     |     |     |
|   SR flavors   |     Inline SRv6      |  P  |  P  |  P  |  Y  |
|                |                      |     |     |     |     |
|                |  SRv6 encapsulation  |  Y  |  Y  |  Y  |  -  |
+----------------+----------------------+-----+-----+-----+-----+
|     Chain agnostic configuration      |  N  |  N  |  Y  |  Y  |
+---------------------------------------+-----+-----+-----+-----+
|     Transparent to chain changes      |  N  |  Y  |  Y  |  Y  |
+----------------+----------------------+-----+-----+-----+-----+
|                |   DA modification    |  Y  |  Y  |  Y  | NAT |
|                |                      |     |     |     |     |
|                | Payload modification |  Y  |  Y  |  Y  |  Y  |
|                |                      |     |     |     |     |
|Service support |  Packet generation   |  Y  |  Y  |cache|cache|
|                |                      |     |     |     |     |
|                |   Packet deletion    |  Y  |  Y  |  Y  |  Y  |
|                |                      |     |     |     |     |
|                |  Packet re-ordering  |  Y  |  Y  |  Y  |  Y  |
|                |                      |     |     |     |     |
|                |  Transport endpoint  |  Y  |  Y  |cache|cache|
+----------------+----------------------+-----+-----+-----+-----+
|                |       Ethernet       |  Y  |  Y  |  Y  |  -  |
|   Supported    |                      |     |     |     |     |
|    traffic     |         IPv4         |  Y  |  Y  |  Y  |  -  |
|                |                      |     |     |     |     |
|                |         IPv6         |  Y  |  Y  |  Y  |  Y  |
+----------------+----------------------+-----+-----+-----+-----+
]]></artwork></figure>

<t>Note: The use of a shared memory proxy requires both the service (VNF) and the proxy to be running on the same node.</t>

<section anchor="sec-proxies-static"><name>Static SR Proxy</name>

<t>The static proxy is an SR endpoint behavior for processing SR-MPLS or SRv6 encapsulated traffic on behalf of an SR-unaware service.  This proxy thus receives SR traffic that is formed of an MPLS label stack or an IPv6 header on top of an inner packet, which can be Ethernet, IPv4 or IPv6.</t>

<t>A static SR proxy segment is associated with the following mandatory parameters</t>

<t><list style="symbols">
  <t>INNER-TYPE: Inner packet type</t>
  <t>NH-ADDR: Next hop Ethernet address (only for inner type IPv4 and IPv6)</t>
  <t>IFACE-OUT: Local interface for sending traffic towards the service</t>
  <t>IFACE-IN: Local interface receiving the traffic coming back from the service</t>
  <t>CACHE: SR information to be attached on the traffic coming back from the service, including at least
  <list style="symbols">
      <t>CACHE.SA: IPv6 source address (SRv6 only)</t>
      <t>CACHE.LIST: Segment list expressed as MPLS labels or IPv6 address</t>
    </list></t>
</list></t>

<t>A static SR proxy segment is thus defined for a specific service, inner packet type and cached SR information.  It is also bound to a pair of directed interfaces on the proxy.  These may be both directions of a single interface, or opposite directions of two different interfaces. The latter is recommended in case the service is to be used as part of a bi-directional SR service policy.  If the proxy and the service both support 802.1Q, IFACE-OUT and IFACE-IN can also represent sub-interfaces.</t>

<t>The first part of this behavior is triggered when the proxy node receives a packet whose active segment matches a segment associated with the static proxy behavior.  It removes the SR information from the packet then sends it on a specific interface towards the associated service.  This SR information corresponds to the full label stack for SR-MPLS or to the encapsulation IPv6 header with any attached extension header in the case of SRv6.</t>

<t>The second part is an inbound policy attached to the proxy interface receiving the traffic returning from the service, IFACE-IN.  This policy attaches to the incoming traffic the cached SR information associated with the SR proxy segment.  If the proxy segment uses the SR-MPLS data plane, CACHE contains a stack of labels to be pushed on top of the packets.  With the SRv6 data plane, CACHE is defined as a source address, an active segment and an optional SRH (tag, segments left, segment list and metadata).  The proxy encapsulates the packets with an IPv6 header that has the source address, the active segment as destination address and the SRH as a routing extension header.  After the SR information has been attached, the packets are forwarded according to the active segment, which is represented by the top MPLS label or the IPv6 Destination Address. An MPLS TTL or IPv6 Hop Limit value may also be configured in CACHE. If it is not, the proxy should set these values according to the node&#39;s default setting for MPLS or IPv6 encapsulation.</t>

<t>In this scenario, there are no restrictions on the operations that can be performed by the service on the stream of packets.  It may operate at all protocol layers, terminate transport layer connections, generate new packets and initiate transport layer connections.  This behavior may also be used to integrate an IPv4-only service into an SRv6 policy.  However, a static SR proxy segment can be used in only one service policy at a time.  As opposed to most other segment types, a static SR proxy segment is bound to a unique list of segments, which represents a directed SR service policy.  This is due to the cached SR information being defined in the segment configuration.  This limitation only prevents multiple segment lists from using the same static SR proxy segment at the same time, but a single segment list can be shared by any number of traffic flows.  Besides, since the returning traffic from the service is re-classified based on the incoming interface, an interface can be used as receiving interface (IFACE-IN) only for a single SR proxy segment at a time.  In the case of a bi-directional SR service policy, a different SR proxy segment and receiving interface are required for the return direction.</t>

<t>The static proxy behavior may also be used for sending traffic through &quot;bump in the wire&quot; services that are transparent to the IP and Ethernet layers. This type of processing is assumed when the inner traffic type is Ethernet, since the original destination address of the Ethernet frame is preserved when the packet is steered into the SR Policy and likely associated with a node downstream of the policy tail-end. In case the inner type is IP (IPv4 or IPv6), the NH-ADDR parameter may be set to a dummy or broadcast Ethernet address, or simply to the address of the proxy receiving interface (IFACE-IN).</t>

<section anchor="sec-proxies-static-mpls"><name>SR-MPLS Pseudocode</name>

<section anchor="static-proxy-for-inner-type-ethernet"><name>Static Proxy for Inner Type Ethernet</name>

<t>When processing an MPLS packet whose top label matches a locally instantiated
MPLS static proxy SID for Ethernet traffic, the following pseudocode is
executed.</t>

<figure title="SID processing for MPLS static proxy
(Ethernet)" anchor="code-static-mpls-eth-sid"><artwork><![CDATA[
S01. POP all labels in the MPLS label stack.
S02. Submit the frame to the Ethernet module for transmission via
     interface IFACE-OUT.
]]></artwork></figure>

<t>When processing an Ethernet frame received on the interface IFACE-IN and with a
destination MAC address that is neither a broadcast address nor matches the
address of IFACE-IN, the following pseudocode is executed.</t>

<figure title="Inbound policy for MPLS static proxy
(Ethernet)" anchor="code-static-mpls-eth-inbound"><artwork><![CDATA[
S01. Retrieve the CACHE entry associated with IFACE-IN.
S02. If the CACHE entry is not empty {
S03.   Remove the preamble or Frame Check Sequence (FCS).
S04.   PUSH all labels from the retrieved CACHE entry.
S05.   Submit the packet to the MPLS module for transmission as per
       the top label in the MPLS label stack.
S06. }
]]></artwork></figure>

</section>
<section anchor="static-proxy-for-inner-type-ipv4"><name>Static Proxy for Inner Type IPv4</name>

<t>When processing an MPLS packet whose top label matches a locally instantiated
MPLS static proxy SID for IPv4 traffic, the following pseudocode is
executed.</t>

<figure title="SID processing for MPLS static proxy
(IPv4)" anchor="code-static-mpls-ipv4-sid"><artwork><![CDATA[
S01. POP all labels in the MPLS label stack.
S02. Submit the packet to the IPv4 module for transmission on
     interface IFACE-OUT via NH-ADDR.
]]></artwork></figure>

<t>When processing an IPv4 packet received on the interface IFACE-IN and with a
destination address that does not match any address of IFACE-IN, the following
pseudocode is executed.</t>

<figure title="Inbound policy for MPLS static proxy
(IPv4)" anchor="code-static-mpls-ipv4-inbound"><artwork><![CDATA[
S01. Retrieve the CACHE entry associated with IFACE-IN.
S02. If the CACHE entry is not empty {
S03.   Decrement the TTL and adjust the checksum accordingly.
S04.   PUSH all labels from the retrieved CACHE entry.
S05.   Submit the packet to the MPLS module for transmission as per
       the top label in the MPLS label stack.
S06. }
]]></artwork></figure>

</section>
<section anchor="static-proxy-for-inner-type-ipv6"><name>Static Proxy for Inner Type IPv6</name>

<t>When processing an MPLS packet whose top label matches a locally instantiated
MPLS static proxy SID for IPv6 traffic, the following pseudocode is
executed.</t>

<figure title="SID processing for MPLS static proxy
(IPv6)" anchor="code-static-mpls-ipv6-sid"><artwork><![CDATA[
S01. POP all labels in the MPLS label stack.
S02. Submit the packet to the IPv6 module for transmission on
     interface IFACE-OUT via NH-ADDR.
]]></artwork></figure>

<t>When processing an IPv6 packet received on the interface IFACE-IN and with a
destination address that does not match any address of IFACE-IN, the following
pseudocode is executed.</t>

<figure title="Inbound policy for MPLS static proxy
(IPv6)" anchor="code-static-mpls-ipv6-inbound"><artwork><![CDATA[
S01. Retrieve the CACHE entry associated with IFACE-IN.
S02. If the CACHE entry is not empty {
S03.   Decrement the Hop Limit.
S04.   PUSH all labels from the retrieved CACHE entry.
S05.   Submit the packet to the MPLS module for transmission as per
       the top label in the MPLS label stack.
S06. }
]]></artwork></figure>

</section>
</section>
<section anchor="sec-proxies-static-srv6"><name>SRv6 Pseudocode</name>

<section anchor="static-proxy-for-inner-type-ethernet-1"><name>Static Proxy for Inner Type Ethernet</name>

<t>When processing an IPv6 packet matching a FIB entry locally instantiated as an
SRv6 static proxy SID for Ethernet traffic, the following pseudocode is
executed.</t>

<figure title="SID processing for SRv6 static proxy
(Ethernet)" anchor="code-static-srv6-eth-sid"><artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0) {
S03.     Proceed to process the next header in the packet.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S07.   }
S08.   max_last_entry = (Hdr Ext Len / 2) - 1
S09.   If ((Last Entry > max_last_entry) or
           (Segments Left > (Last Entry + 1))) {
S10.     Send an ICMP Parameter Problem message to the Source Address,
         Code 0 (Erroneous header field encountered),
         Pointer set to the Segments Left field,
         Interrupt packet processing and discard the packet.
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Decrement Segments Left by 1.
S14.   Copy Segment List[Segments Left] from the SRH to the
       Destination Address of the IPv6 header.
S15.   If (Upper-layer header type != 143 (Ethernet)) {
S16.     Resubmit the packet to the IPv6 module for transmission to
         the new destination.
S17.   }
S18.   Perform IPv6 decapsulation.
S19.   Submit the frame to the Ethernet module for transmission via
       interface IFACE-OUT.
S20. }
]]></artwork></figure>

<t>S15: 143 (Ethernet) refers to the value assigned by IANA for &quot;Ethernet&quot; in the
&quot;Internet Protocol Numbers&quot; registry.</t>

<t>When processing the Upper-layer header of a packet matching a FIB entry locally
instantiated as an SRv6 static proxy SID for Ethernet traffic, the following
pseudocode is executed.</t>

<figure title="Upper-layer header processing for SRv6
static proxy (Ethernet)" anchor="code-static-srv6-eth-ulh"><artwork><![CDATA[
S01. If (Upper-layer header type != 143 (Ethernet)) {
S02.   Process as per [RFC8986] Section 4.1.1
S03. }
S04. Perform IPv6 decapsulation.
S05. Submit the frame to the Ethernet module for transmission via
     interface IFACE-OUT.
]]></artwork></figure>

<t>When processing an Ethernet frame received on the interface IFACE-IN and with a
destination MAC address that is neither a broadcast address nor matches the
address of IFACE-IN, the following pseudocode is executed.</t>

<figure title="Inbound policy for SRv6 static proxy
(Ethernet)" anchor="code-static-srv6-eth-inbound"><artwork><![CDATA[
S01. Retrieve the CACHE entry associated with IFACE-IN.
S02. If the CACHE entry is not empty {
S03.   Remove the preamble or Frame Check Sequence (FCS).
S04.   Perform IPv6 encapsulation with an SRH
         Source Address of the IPv6 header is set to CACHE.SA,
         Destination Address of the IPv6 header is set to
         CACHE.LIST[0],
         Next Header of the SRH is set to 143 (Ethernet),
         Segment List of the SRH is set to CACHE.LIST.
S05.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S06. }
]]></artwork></figure>

<t>S04: CACHE.LIST[0] represents the first entry in CACHE.LIST. Unless a local
configuration indicates otherwise, the SIDs in CACHE.LIST should be encoded
in the Segment List field in reversed order, the Segment Left and Last Entry
values should be set of the length of CACHE.LIST minus 1. If CACHE.LIST contains
a single entry, the SRH can be omitted and the Next Header field of the IPv6
header set to 143 (Ethernet).</t>

</section>
<section anchor="static-proxy-for-inner-type-ipv4-1"><name>Static Proxy for Inner Type IPv4</name>

<t>When processing an IPv6 packet matching a FIB entry locally instantiated as an
SRv6 static proxy SID for IPv4 traffic, the following pseudocode is executed.</t>

<figure title="SID processing for SRv6 static proxy
(IPv4)" anchor="code-static-srv6-ipv4-sid"><artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0) {
S03.     Proceed to process the next header in the packet.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S07.   }
S08.   max_last_entry = (Hdr Ext Len / 2) - 1
S09.   If ((Last Entry > max_last_entry) or
           (Segments Left > (Last Entry + 1))) {
S10.     Send an ICMP Parameter Problem message to the Source Address,
         Code 0 (Erroneous header field encountered),
         Pointer set to the Segments Left field,
         Interrupt packet processing and discard the packet.
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Decrement Segments Left by 1.
S14.   Copy Segment List[Segments Left] from the SRH to the
       Destination Address of the IPv6 header.
S15.   If (Upper-layer header type != 4 (IPv4)) {
S16.     Resubmit the packet to the IPv6 module for transmission to
         the new destination.
S17.   }
S18.   Perform IPv6 decapsulation.
S19.   Submit the packet to the IPv4 module for transmission on
       interface IFACE-OUT via NH-ADDR.
S20. }
]]></artwork></figure>

<t>When processing the Upper-layer header of a packet matching a FIB entry locally
instantiated as an SRv6 static proxy SID for IPv4 traffic, the following
pseudocode is executed.</t>

<figure title="Upper-layer header processing for SRv6
static proxy (IPv4)" anchor="code-static-srv6-ipv4-ulh"><artwork><![CDATA[
S01. If (Upper-layer header type != 4 (IPv4)) {
S02.   Process as per [RFC8986] Section 4.1.1
S03. }
S04. Perform IPv6 decapsulation.
S05. Submit the packet to the IPv4 module for transmission on
     interface IFACE-OUT via NH-ADDR.
]]></artwork></figure>

<t>When processing an IPv4 packet received on the interface IFACE-IN and with a
destination address that does not match any address of IFACE-IN, the following
pseudocode is executed.</t>

<figure title="Inbound policy for SRv6 static proxy
(IPv4)" anchor="code-static-srv6-ipv4-inbound"><artwork><![CDATA[
S01. Retrieve the CACHE entry associated with IFACE-IN.
S02. If the CACHE entry is not empty {
S03.   Decrement the TTL and adjust the checksum accordingly.
S04.   Perform IPv6 encapsulation with an SRH
         Source Address of the IPv6 header is set to CACHE.SA,
         Destination Address of the IPv6 header is set to
         CACHE.LIST[0],
         Next Header of the SRH is set to 4 (IPv4),
         Segment List of the SRH is set to CACHE.LIST.
S05.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S06. }
]]></artwork></figure>

<t>S04: CACHE.LIST[0] represents the first entry in CACHE.LIST. Unless a local
configuration indicates otherwise, the SIDs in CACHE.LIST should be encoded
in the Segment List field in reversed order, the Segment Left and Last Entry
values should be set of the length of CACHE.LIST minus 1. If CACHE.LIST contains
a single entry, the SRH can be omitted and the Next Header field of the IPv6
header set to 4 (IPv4).</t>

</section>
<section anchor="static-proxy-for-inner-type-ipv6-1"><name>Static Proxy for Inner Type IPv6</name>

<t>When processing an IPv6 packet matching a FIB entry locally instantiated as an
SRv6 static proxy SID for IPv6 traffic, the following pseudocode is executed.</t>

<figure title="SID processing for SRv6 static proxy
(IPv6)" anchor="code-static-srv6-ipv6-sid"><artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0) {
S03.     Proceed to process the next header in the packet.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S07.   }
S08.   max_last_entry = (Hdr Ext Len / 2) - 1
S09.   If ((Last Entry > max_last_entry) or
           (Segments Left > (Last Entry + 1))) {
S10.     Send an ICMP Parameter Problem message to the Source Address,
         Code 0 (Erroneous header field encountered),
         Pointer set to the Segments Left field,
         Interrupt packet processing and discard the packet.
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Decrement Segments Left by 1.
S14.   Copy Segment List[Segments Left] from the SRH to the
       Destination Address of the IPv6 header.
S15.   If (Upper-layer header type != 41 (IPv6)) {
S16.     Resubmit the packet to the IPv6 module for transmission to
         the new destination.
S17.   }
S18.   Perform IPv6 decapsulation.
S19.   Submit the packet to the IPv6 module for transmission on
       interface IFACE-OUT via NH-ADDR.
S20. }
]]></artwork></figure>

<t>When processing the Upper-layer header of a packet matching a FIB entry locally
instantiated as an SRv6 static proxy SID for IPv6 traffic, the following
pseudocode is executed.</t>

<figure title="Upper-layer header processing for SRv6
static proxy (IPv6)" anchor="code-static-srv6-ipv6-ulh"><artwork><![CDATA[
S01. If (Upper-layer header type != 41 (IPv6)) {
S02.   Process as per [RFC8986] Section 4.1.1
S03. }
S04. Perform IPv6 decapsulation.
S05. Submit the packet to the IPv6 module for transmission on
     interface IFACE-OUT via NH-ADDR.
]]></artwork></figure>

<t>When processing an IPv6 packet received on the interface IFACE-IN and with a
destination address that does not match any address of IFACE-IN, the following
pseudocode is executed.</t>

<figure title="Inbound policy for SRv6 static proxy
(IPv6)" anchor="code-static-srv6-ipv6-inbound"><artwork><![CDATA[
S01. Retrieve the CACHE entry associated with IFACE-IN.
S02. If the CACHE entry is not empty {
S03.   Decrement the Hop Limit.
S04.   Perform IPv6 encapsulation with an SRH
         Source Address of the IPv6 header is set to CACHE.SA,
         Destination Address of the IPv6 header is set to
         CACHE.LIST[0],
         Next Header of the SRH is set to 41 (IPv6),
         Segment List of the SRH is set to CACHE.LIST.
S05.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S06. }
]]></artwork></figure>

<t>S04: CACHE.LIST[0] represents the first entry in CACHE.LIST. Unless a local
configuration indicates otherwise, the SIDs in CACHE.LIST should be encoded
in the Segment List field in reversed order, the Segment Left and Last Entry
values should be set of the length of CACHE.LIST minus 1. If CACHE.LIST contains
a single entry, the SRH can be omitted and the Next Header field of the (outer)
IPv6 header set to 41 (IPv6).</t>

</section>
</section>
</section>
<section anchor="sec-proxies-dynamic"><name>Dynamic SR Proxy</name>

<t>The dynamic proxy is an improvement over the static proxy that dynamically learns the SR information before removing it from the incoming traffic.  The same information can then be re-attached to the traffic returning from the service.  As opposed to the static SR proxy, no CACHE information needs to be configured.  Instead, the dynamic SR proxy relies on a local caching mechanism on the node instantiating this segment.</t>

<t>Upon receiving a packet whose active segment matches a dynamic SR proxy function, the proxy node pops the top MPLS label or applies the SRv6 End behavior, then compares the updated SR information with the cache entry for the current segment.  If the cache is empty or different, it is updated with the new SR information.  The SR information is then removed and the inner packet is sent towards the service.</t>

<t>The cache entry is not mapped to any particular packet, but instead to an SR service policy identified by the receiving interface (IFACE-IN). Any non-link-local IP packet or non-local Ethernet frame received on that interface will be re-encapsulated with the cached headers as described in <xref target="sec-proxies-static"/>.  The service may thus drop, modify or generate new packets without affecting the proxy.</t>

<section anchor="sr-mpls-pseudocode"><name>SR-MPLS Pseudocode</name>

<t>The dynamic proxy SR-MPLS pseudocode is obtained by inserting the following instructions at the beginning of the static SR-MPLS pseudocode (<xref target="sec-proxies-static-mpls"/>).</t>

<figure title="SID processing for MPLS dynamic proxy" anchor="code-dynamic-mpls-sid"><artwork><![CDATA[
S01. If the top label S bit is different from 0 {
S02.   Discard the packet.
S03. }
S04. POP the top label.
S05. Copy the MPLS label stack in a CACHE entry associated with the
     interface IFACE-IN.
]]></artwork></figure>

<t>S01: As mentioned at the beginning of <xref target="sec-proxies"/>, an SR proxy is not needed to include an SR-unaware service at the end of an SR policy.</t>

<t>S05: An implementation may optimize the caching procedure by copying information
into the cache only if it is different from the current content of the cache
entry. Furthermore, a TTL margin can be configured for the top label stack entry
to prevent constant cache updates when multiple equal-cost paths with different
hop counts are used towards the SR proxy node.  In that case, a TTL difference
smaller than the configured margin should not trigger a cache update (provided
that the labels are the same).</t>

<t>When processing an Ethernet frame, an IPv4 packet or an IPv6 packet received on
the interface IFACE-IN and with a destination address that does not match any
address of IFACE-IN, the pseudocode reported in
<xref target="code-static-mpls-eth-inbound"/>, <xref target="code-static-mpls-ipv4-inbound"/> or
<xref target="code-static-mpls-ipv6-inbound"/>, respectively, is executed.</t>

</section>
<section anchor="srv6-pseudocode"><name>SRv6 Pseudocode</name>

<t>When processing an IPv6 packet matching a FIB entry locally instantiated as an
SRv6 dynamic proxy SID, the same pseudocode as described in
<xref target="code-static-srv6-eth-sid"/>, <xref target="code-static-srv6-ipv4-sid"/> and
<xref target="code-static-srv6-ipv6-sid"/>, respectively for Ethernet, IPv4 and IPv6 traffic,
is executed with the following addition between lines S17 and S18.</t>

<figure title="SID processing for SRv6 dynamic proxy" anchor="code-dynamic-srv6-sid"><artwork><![CDATA[
(... S17.     })
S17.1.   Copy the IPv6 encapsulation in a CACHE entry associated with
         the interface IFACE-IN.
(S18.     Perform IPv6 decapsulation...)
]]></artwork></figure>

<t>An implementation may optimize the caching procedure by copying information into
the cache only if it is different from the current content of the cache entry.
A Hop Limit margin can be configured to prevent constant cache updates when
multiple equal-cost paths with different hop counts are used towards the SR
proxy node.  In that case, a Hop Limit difference smaller than the configured
margin should not trigger a cache update. Similarly, the Flow Label value can be
ignored when comparing the current packet IPv6 header with the cache entry. In
this case, the Flow Label should be re-computed by the proxy node when it
restores the IPv6 encapsulation from the cache entry.</t>

<t>When processing the Upper-layer header of a packet matching a FIB entry locally
instantiated as an SRv6 dynamic proxy SID, process the packet as per
<xref target="RFC8986"/> Section 4.1.1.</t>

<t>When processing an Ethernet frame, an IPv4 packet or an IPv6 packet received on
the interface IFACE-IN and with a destination address that does not match any
address of IFACE-IN, the same pseudocode as in <xref target="code-static-srv6-eth-inbound"/>,
<xref target="code-static-srv6-ipv4-inbound"/> or <xref target="code-static-srv6-ipv6-inbound"/>,
respectively, is executed.</t>

</section>
</section>
<section anchor="shared-memory-sr-proxy"><name>Shared Memory SR Proxy</name>

<t>The shared memory proxy is an SR endpoint behavior for processing SR-MPLS or SRv6 encapsulated traffic on behalf of an SR-unaware service. This proxy behavior leverages a shared-memory interface with a virtualized service (VNF) in order to hide the SR information from an SR-unaware service while keeping it attached to the packet.  We assume in this case that the proxy and the VNF are running on the same compute node.  A typical scenario is an SR-capable vrouter running on a container host and forwarding traffic to VNFs isolated within their respective container.</t>

</section>
<section anchor="masquerading-sr-proxy"><name>Masquerading SR Proxy</name>

<t>The masquerading proxy is an SR endpoint behavior for processing SRv6 traffic on behalf of an SR-unaware service.  This proxy thus receives SR traffic that is formed of an IPv6 header and an SRH on top of an inner payload.  The masquerading behavior is independent from the inner payload type.  Hence, the inner payload can be of any type but it is usually expected to be a transport layer packet, such as TCP or UDP.</t>

<t>A masquerading SR proxy segment is associated with the following mandatory parameters:</t>

<t><list style="symbols">
  <t>NH-ADDR: Next hop Ethernet address</t>
  <t>IFACE-OUT: Local interface for sending traffic towards the service</t>
  <t>IFACE-IN: Local interface receiving the traffic coming back from the service</t>
</list></t>

<t>A masquerading SR proxy segment is thus defined for a specific service and bound to a pair of directed interfaces or sub-interfaces on the proxy.  As opposed to the static and dynamic SR proxies, a masquerading segment can be present at the same time in any number of SR service policies and the same interfaces can be bound to multiple masquerading proxy segments.  The only restriction is that a masquerading proxy segment cannot be the last segment in an SR service policy.</t>

<t>The first part of the masquerading behavior is triggered when the proxy node receives an IPv6 packet whose Destination Address matches a masquerading proxy SID.  The proxy inspects the IPv6 extension headers and substitutes the Destination Address with the last SID in the SRH attached to the IPv6 header, which represents the final destination of the IPv6 packet.  The packet is then sent out towards the service.</t>

<t>The service receives an IPv6 packet whose source and destination addresses are respectively the original source and final destination.  It does not attempt to inspect the SRH, as RFC8200 specifies that routing extension headers are not examined or processed by transit nodes. Instead, the service simply forwards the packet based on its current Destination Address.  In this scenario, we assume that the service can only inspect, drop or perform limited changes to the packets.  For example, Intrusion Detection Systems, Deep Packet Inspectors and non-NAT Firewalls are among the services that can be supported by a masquerading SR proxy.  Flavors of the masquerading behavior are defined in <xref target="sec-proxies-am-nat"/> and <xref target="sec-proxies-am-cache"/> to support a wider range of services.</t>

<t>The second part of the masquerading behavior, also called de-masquerading, is an inbound policy attached to the proxy interface receiving the traffic returning from the service, IFACE-IN.  This policy inspects the incoming traffic and triggers a regular SRv6 endpoint processing (End) on any IPv6 packet that contains an SRH.  This processing occurs before any lookup on the packet Destination Address is performed and it is sufficient to restore the right active SID as the Destination Address of the IPv6 packet.</t>

<section anchor="srv6-masquerading-proxy-pseudocode"><name>SRv6 Masquerading Proxy Pseudocode</name>

<t>Masquerading: When processing an IPv6 packet matching a FIB entry locally
instantiated as an SRv6 masquerading proxy SID, the following pseudocode is
executed.</t>

<figure title="SID processing for SRv6 masquerading proxy" anchor="code-masquerading-sid"><artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0) {
S03.     Proceed to process the next header in the packet.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S07.   }
S08.   max_last_entry = (Hdr Ext Len / 2) - 1
S09.   If ((Last Entry > max_last_entry) or
           (Segments Left > (Last Entry + 1))) {
S10.     Send an ICMP Parameter Problem message to the Source Address,
         Code 0 (Erroneous header field encountered),
         Pointer set to the Segments Left field,
         Interrupt packet processing and discard the packet.
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Decrement Segments Left by 1.
S14.   Copy Segment List[0] from the SRH to the Destination Address
       of the IPv6 header.
S15.   Submit the packet to the IPv6 module for transmission on
       interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork></figure>

<t>When processing the Upper-layer header of a packet matching a FIB entry locally
instantiated as an SRv6 masquerading proxy SID, process the packet as per
<xref target="RFC8986"/> Section 4.1.1.</t>

<t>De-masquerading: When processing an IPv6 packet received on the interface
IFACE-IN and with a destination address that does not match any address of
IFACE-IN, the following pseudocode is executed.</t>

<figure title="Inbound policy for SRv6 masquerading proxy" anchor="code-masquerading-inbound"><artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (IPv6 Hop Limit <= 1) {
S03.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S04.   }
S05.   If (Segments Left != 0) {
S06.     max_last_entry = (Hdr Ext Len / 2) - 1
S07.     If ((Last Entry > max_last_entry) or
             (Segments Left > Last Entry)) {
S08.       Send an ICMP Parameter Problem message to the Source Address,
           Code 0 (Erroneous header field encountered),
           Pointer set to the Segments Left field,
           Interrupt packet processing and discard the packet.
S09.     }
S10.     Copy Segment List[Segments Left] from the SRH to the
         Destination Address of the IPv6 header.
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S14. }
]]></artwork></figure>

</section>
<section anchor="sec-proxies-am-nat"><name>Destination NAT Flavor</name>

<t>Services modifying the destination address in the packets they process, such as
NATs, can be supported by reporting the updated Destination Address back into
the Segment List field of the SRH.</t>

<t>The Destination NAT flavor of the SRv6 masquerading proxy is enabled by adding
the following instruction between lines S09 and S10 of the de-masquerading
pseudocode in <xref target="code-masquerading-inbound"/>.</t>

<figure><artwork><![CDATA[
(... S09.     })
S09.1.   Copy the Destination Address of the IPv6 header to the
         Segment List[0] entry of the SRH.
(S10.     Copy Segment List[Segments Left] from the SRH to the
          Destination Address of the IPv6 header...)
]]></artwork></figure>

</section>
<section anchor="sec-proxies-am-cache"><name>Caching Flavor</name>

<t>Services generating packets or acting as endpoints for transport connections can be supported by adding a dynamic caching mechanism similar to the one described in <xref target="sec-proxies-dynamic"/>.</t>

<t>The caching flavor of the SRv6 masquerading proxy is enabled by:</t>

<t><list style="symbols">
  <t>Adding the following instruction between lines S14 and S15 of the masquerading
pseudocode in <xref target="code-masquerading-sid"/>.</t>
</list></t>

<figure><artwork><![CDATA[
(... S14.   Copy Segment List[0] from the SRH to the Destination
            Address of the IPv6 header.
S14.1. Copy the IPv6 encapsulation in a CACHE entry associated with
       the interface IFACE-IN.
(S15.   Submit the packet to the IPv6 module for transmission on
        interface IFACE-OUT via NH-ADDR.)
]]></artwork></figure>

<t><list style="symbols">
  <t>Updating the de-masquerading pseudocode such that, in addition to the SRH
processing in <xref target="code-masquerading-inbound"/>, the following pseudocode is
executed when processing an IPv6 packet (received on the interface IFACE-IN and
with a destination address that does not match any address of IFACE-IN) that
does not contain an SRH.</t>
</list></t>

<figure><artwork><![CDATA[
S01. Retrieve the CACHE entry associated with IFACE-IN.
S02. If the CACHE entry is not empty {
S03.   If (IPv6 Hop Limit <= 1) {
S04.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S05.   }
S06.   Decrement Hop Limit by 1.
S07.   Update the IPv6 encapsulation according to the retrieved CACHE
       entry.
S08.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S09. }
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="metadata"><name>Metadata</name>

<section anchor="mpls-data-plane"><name>MPLS Data Plane</name>

<t>Metadata can be carried for SR-MPLS traffic in a Segment Routing Header inserted between the last MPLS label and the MPLS payload. When used solely as a metadata container, the SRH does not carry any segment but only the mandatory header fields, including the tag and flags, and any TLVs that is required for transporting the metadata.</t>

<t>Since the MPLS encapsulation has no explicit protocol identifier field to indicate the protocol type of the MPLS payload, how to indicate the presence of metadata in an MPLS packet is a potential issue to be addressed.  One possible solution is to add the indication about the presence of metadata in the semantic of the SIDs. Note that only the SIDs whose behavior involves looking at the metadata or the MPLS payload would need to include such semantic (e.g., service segments). Other segments, such as topological segments, are not affected by the presence of metadata.  Another, more generic, solution is to introduce a protocol identifier field within the MPLS packet as described in <xref target="I-D.xu-mpls-payload-protocol-identifier"/>.</t>

</section>
<section anchor="ipv6-data-plane"><name>IPv6 Data Plane</name>

<section anchor="srh-tlv-objects"><name>SRH TLV Objects</name>

<t>The IPv6 SRH TLV objects are designed to carry all sorts of metadata. TLV objects can be imposed by the ingress edge router that steers the traffic into the SR service policy.</t>

<t>An SR-aware service may impose, modify or remove any TLV object attached to the first SRH, either by directly modifying the packet headers or via a control channel between the service and its forwarding plane.</t>

<t>An SR-aware service that re-classifies the traffic and steers it into a new SR service policy (e.g.  DPI) may attach any TLV object to the new SRH.</t>

<t>Metadata imposition and handling will be further discussed in a future version of this document.</t>

<section anchor="opaque-metadata-tlv"><name>Opaque Metadata TLV</name>

<t>This document defines an SRv6 TLV called Opaque Metadata TLV. This is a fixed-length container to carry any type of Service Metadata. No assumption is made by this document on the structure or the content of the carried metadata. The Opaque Metadata TLV has the following format:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      Type     |     Length    |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
|                       Service Metadata                        |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>Type: to be assigned by IANA.</t>
  <t>Length: 14.</t>
  <t>Service Metadata: 14 octets of opaque data.</t>
</list></t>

</section>
<section anchor="nsh-carrier-tlv"><name>NSH Carrier TLV</name>

<t>This document defines an SRv6 TLV called NSH Carrier TLV. It is a container to carry Service Metadata in the form of Variable-Length Metadata as defined in <xref target="RFC8300"/> for NSH MD Type 2. The NSH Carrier TLV has the following format:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      Type     |     Length    |     Flags     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
//            Service Metadata                                 //
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>Type: to be assigned by IANA.</t>
  <t>Length: the total length of the TLV.</t>
  <t>Flags: 8 bits.  No flags are defined in this document.  SHOULD be set to 0 on transmission and MUST be ignored on receipt.</t>
  <t>Service Metadata: a list of Service Metadata TLV as defined in <xref target="RFC8300"/> for NSH MD Type 2.</t>
</list></t>

</section>
</section>
<section anchor="srh-tag"><name>SRH Tag</name>

<t>The SRH tag identifies a packet as part of a group or class of packets <xref target="RFC8754"/>.</t>

<t>In the context of service programming, this field can be used to encode basic metadata in the SRH. An example use-case is to leverage the SRH tag to encode a policy ID. This policy ID can then be used by an SR-aware function to identify a particular processing policy to be applied on that packet.</t>

</section>
</section>
</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>This section is to be removed prior to publishing as an RFC.</t>

<section anchor="sec-implem-aware"><name>SR-Aware Services</name>

<t>Specific SRv6 support has been implemented for the below open-source services:</t>

<t><list style="symbols">
  <t>Iptables (1.6.2 and later) <xref target="IPTABLES"/></t>
  <t>Nftables (0.8.4 and later) <xref target="NFTABLES"/></t>
  <t>Snort <xref target="SNORT"/></t>
</list></t>

<t>In addition, any service relying on the Linux kernel, version 4.10 and later, or FD.io VPP for packet forwarding can be considered as SR-aware.</t>

</section>
<section anchor="proxy-behaviors"><name>Proxy Behaviors</name>

<t>The static SR proxy is available for SR-MPLS and SRv6 on various Cisco hardware and software platforms.  Furthermore, the following proxies are available on open-source software.</t>

<figure title="Open-source implementation status table" anchor="tab-implem"><artwork><![CDATA[
                                        +-------------+-------------+
                                        |     VPP     |    Linux    |
+---+-----------------------------------+-------------+-------------+
| M |           Static proxy            |  Available  | In progress |
| P |                                   |             |             |
| L |           Dynamic proxy           | In progress | In progress |
| S |                                   |             |             |
|   |        Shared memory proxy        | In progress | In progress |
+---+-----------------------------------+-------------+-------------+
|   |           Static proxy            |  Available  | In progress |
| S |                                   |             |             |
| R |           Dynamic proxy           |  Available  |  Available  |
| v |                                   |             |             |
| 6 |        Shared memory proxy        | In progress | In progress |
|   |                                   |             |             |
|   |        Masquerading proxy         |  Available  |  Available  |
+---+-----------------------------------+-------------+-------------+
]]></artwork></figure>

</section>
</section>
<section anchor="related-works"><name>Related Works</name>

<t>The Segment Routing solution addresses a wide problem that covers both topological and service policies.  The topological and service instructions can be either deployed in isolation or in combination.  SR has thus a wider applicability than the architecture defined in <xref target="RFC7665"/>.  Furthermore, the inherent property of SR is a stateless network fabric.  In SR, there is no state within the fabric to recognize a flow and associate it with a policy.  State is only present at the ingress edge of the SR domain, where the policy is encoded into the packets.  This is completely different from other proposals such as <xref target="RFC8300"/> and the MPLS label swapping mechanism described in <xref target="RFC8595"/>, which rely on state configured at every hop of the service chain.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="srv6-endpoint-behaviors"><name>SRv6 Endpoint Behaviors</name>

<t>This I-D requests the IANA to allocate, within the &quot;SRv6 Endpoint Behaviors&quot; sub-registry belonging to the top-level &quot;Segment-routing with IPv6 dataplane (SRv6) Parameters&quot; registry, the following allocations:</t>

<figure><artwork><![CDATA[
Value      Description                               Reference
--------------------------------------------------------------
TBA1-1     End.AN - SR-aware function (native)       [This.ID]
TBA1-2     End.AS - Static proxy                     [This.ID]
TBA1-3     End.AD - Dynamic proxy                    [This.ID]
TBA1-4     End.AM - Masquerading proxy               [This.ID]
TBA1-5     End.AM - Masquerading proxy with NAT      [This.ID]
TBA1-6     End.AM - Masquerading proxy with Caching  [This.ID]
TBA1-7     End.AM - Masquerading proxy with NAT &    [This.ID]
                    Caching
]]></artwork></figure>

</section>
<section anchor="segment-routing-header-tlvs"><name>Segment Routing Header TLVs</name>

<t>This I-D requests the IANA to allocate, within the &quot;Segment Routing Header TLVs&quot; registry, the following allocations:</t>

<figure><artwork><![CDATA[
Value      Description               Reference
----------------------------------------------
TBA2-1     Opaque Metadata TLV       [This.ID]
TBA2-2     NSH Carrier TLV           [This.ID]
]]></artwork></figure>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security requirements and mechanisms described in <xref target="RFC8402"/>, <xref target="RFC8754"/> and <xref target="RFC8986"/> also apply to this document.</t>

<t>This document does not introduce any new security vulnerabilities.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank Thierry Couture, Ketan Talaulikar, Loa Andersson, Andrew G.  Malis, Adrian Farrel, Alexander Vainshtein and Joel M.  Halpern for their valuable comments and suggestions on the document.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC8402;
&RFC8660;
&RFC8754;
&RFC8986;
&RFC9256;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&I-D.dawra-idr-bgp-sr-service-chaining;
&I-D.xu-mpls-payload-protocol-identifier;
&RFC7665;
&RFC8300;
&RFC8595;
<reference anchor="IFIP18" >
  <front>
    <title>SEgment Routing Aware Firewall For Service Function Chaining scenarios</title>
    <author initials="A." surname="Abdelsalam">
      <organization></organization>
    </author>
    <author initials="S." surname="Salsano">
      <organization></organization>
    </author>
    <author initials="F." surname="Clad">
      <organization></organization>
    </author>
    <author initials="P." surname="Camarillo">
      <organization></organization>
    </author>
    <author initials="C." surname="Filsfils">
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
  <seriesInfo name="IFIP Networking conference" value=""/>
</reference>
<reference anchor="IPTABLES" target="https://netfilter.org/projects/iptables/files/changes-iptables-1.6.2.txt">
  <front>
    <title>iptables-1.6.2 changes</title>
    <author >
      <organization></organization>
    </author>
    <date year="2018" month="February"/>
  </front>
</reference>
<reference anchor="NFTABLES" target="https://netfilter.org/projects/nftables/files/changes-nftables-0.8.4.txt">
  <front>
    <title>nftables-0.8.4 changes</title>
    <author >
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>
<reference anchor="SNORT" target="https://github.com/SRouting/SR-Snort">
  <front>
    <title>SR-Snort</title>
    <author >
      <organization></organization>
    </author>
    <date year="2018" month="March"/>
  </front>
</reference>


    </references>

</references>


    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="P." surname="Camarillo" fullname="Pablo Camarillo">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>pcamaril@cisco.com</email>
      </address>
    </contact>
    <contact initials="B." surname="Peirens" fullname="Bart Peirens">
      <organization>Proximus</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>bart.peirens@proximus.com</email>
      </address>
    </contact>
    <contact initials="D." surname="Steinberg" fullname="Dirk Steinberg">
      <organization>Lapishills Consulting Limited</organization>
      <address>
        <postal>
          <country>Cyprus</country>
        </postal>
        <email>dirk@lapishills.com</email>
      </address>
    </contact>
    <contact initials="A." surname="AbdelSalam" fullname="Ahmed AbdelSalam">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <country>Italy</country>
        </postal>
        <email>ahabdels@cisco.com</email>
      </address>
    </contact>
    <contact initials="G." surname="Dawra" fullname="Gaurav Dawra">
      <organization>LinkedIn</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gdawra@linkedin.com</email>
      </address>
    </contact>
    <contact initials="S." surname="Bryant" fullname="Stewart Bryant">
      <organization>Futurewei Technologies Inc</organization>
      <address>
        <email>stewart.bryant@gmail.com</email>
      </address>
    </contact>
    <contact initials="H." surname="Assarpour" fullname="Hamid Assarpour">
      <organization>Broadcom</organization>
      <address>
        <email>hamid.assarpour@broadcom.com</email>
      </address>
    </contact>
    <contact initials="H." surname="Shah" fullname="Himanshu Shah">
      <organization>Ciena</organization>
      <address>
        <email>hshah@ciena.com</email>
      </address>
    </contact>
    <contact initials="L. M." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica I+D</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </contact>
    <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
      <organization>Individual</organization>
      <address>
        <email>jefftant@gmail.com</email>
      </address>
    </contact>
    <contact initials="M." surname="Vigoureux" fullname="Martin Vigoureux">
      <organization>Nokia</organization>
      <address>
        <email>martin.vigoureux@nokia.com</email>
      </address>
    </contact>
    <contact initials="J." surname="Bhattacharya" fullname="Jisu Bhattacharya">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jisu@cisco.com</email>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

