<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.13 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rustignoli-panrg-scion-components-00" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="SCION COMP I-D">SCION Components Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-rustignoli-panrg-scion-components-00"/>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>ETH Zuerich</organization>
      <address>
        <email>nicola.rustignoli@inf.ethz.ch</email>
      </address>
    </author>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>ETH Zuerich</organization>
      <address>
        <email>corine.dekatermuehlhaeuser@inf.ethz.ch</email>
      </address>
    </author>
    <date year="2022" month="July" day="11"/>
    <area>IRTF</area>
    <workgroup>Path Aware Networking RG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>SCION is a future Internet architecture that focuses on security and availability. Its fundamental functions are carried out by a number of components.</t>
      <t>This document illustrates the dependencies between its core components and extensions. It also discusses the relationship between SCION and existing protocols, with focus on illustrating which existing protocols are reused or extended. Additionally, it describes the motivations behind cases where a greenfield approach is needed, and the properties that can be achieved thanks to it. It then briefly touches on the maturity level of components.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-components_I-D/draft-rustignoli-panrg-scion-components.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rustignoli-panrg-scion-components/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Path Aware Networking RG Research Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://www.ietf.org/mail-archive/web/panrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-components_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>While SCION  was initially developed in academia, the architecture  has now "slipped out of the lab" and counts its early productive deployments (including the Swiss inter-banking network SSFN).
The architecture is composed of a system of related components, some of which are  essential to set up end-to-end SCION connectivity.
Add-ons provide additional functionality, security, or backwards compatibility. Discussions at PANRG <xref target="PANRG-INTERIM-Min"/> showed the need to describe the relationships between SCION's core components.
This document, therefore focuses on each component, describing its functionality, properties, dependencies and relationships to existing protocols. The goal is not to describe each component's specification, but to illustrate the engineering decisions that made SCION what it is and to provide a basis for further discussions.</t>
      <t>Before reading this document, please refer to <xref target="I-D.dekater-scion-overview"/> for a generic overview of SCION and its components, the problems it solves, and existing deployments. For an in-depth description of SCION, refer to <xref target="CHUAT22"/>.</t>
      <section anchor="design-goals">
        <name>Design Goals</name>
        <t>SCION was created from the start with the intention to provide the following properties for inter-domain communication.</t>
        <ul spacing="normal">
          <li>
            <em>Availability</em>. SCION aims to provide highly available communication. Its focus is not only on handling failures (both on the last hop or anywhere along the path), but also on allowing communication in the presence of adversaries.
Availability is fundamental as applications move to cloud data centers, and enterprises increasingly rely on the Internet for mission-critical communication.
For example, as highlighted in <xref target="I-D.rtgwg-net2cloud-problem-statement"/>, achieving reliable inter-domain Internet connectivity remains an open challenge for cloud providers.</li>
          <li>
            <em>Security</em>. SCION comes with an arsenal of mechanisms, designed by security researchers with the goal of making most network-based and routing attacks either impossible or easy to mitigate. The relevance of Internet's routing security issues is testified by the fact that these issues now  have the attention of policymakers, while previously they were only well known in industry and academia. One example is the 2022 FCC inquiry on routing security <xref target="FCC2022"/>.
SCION strongly focuses on preventing routing attacks, IP prefix hijackings, DoS, providing stronger guarantees than the existing Internet. Security is tightly related to trust. SCION therefore offers end-hosts transparency and control over forwarding paths. In addition, SCION's design starts from the assumption that any two entities on the global Internet do not mutually trust each other. SCION therefore enables trust agility, allowing its users to decide the roots of trust they wish to rely upon.</li>
          <li>
            <em>Scalability</em>.  Security and high availability should not result in compromises on scalability.
At the same time, a next-generation Internet architecture should not suffer from scalability issues due to network growth or forwarding table size.
The S in SCION, indeed, stands for scalability. The architecture proposes a design that is scalable both in the control plane and in the data plane (making secure forwarding efficient).</li>
        </ul>
        <t>Many research efforts have analysed whether such properties could be achieved by extending the existing Internet architecture. But as described in <xref target="existing-protocols"/>, tradeoffs between properties would be unavoidable when exclusively relying on or extending existing protocols.</t>
        <t>The following paragraphs describe the key properties of SCION's core components. They then describe the components' mutual dependencies and their relation with existing protocols.</t>
      </section>
    </section>
    <section anchor="minimal-stack-core-components">
      <name>Minimal Stack - Core Components</name>
      <t>In order to establish end-to-end connectivity, SCION relies on three main components.
SCION's data plane carries out secure path-aware forwarding. Its control plane performs routing and provides a selection of path segments. The Control Plane PKI then handles cryptographic material.</t>
      <t>The control plane is responsible for discovering and disseminating routing information. Path discovery is performed by each autonomous system (AS) thanks to an authenticated path-exploration mechanism called beaconing.
SCION end hosts query their respective AS control plane and obtain authenticated and authorized network paths, in the form of path segments.
End hosts select one or more of the end-to-end network paths, based on the application requirements (i.e., latency). End hosts then craft SCION packets containing the end-to-end path to the destination.
The data plane is responsible for forwarding SCION packets while authenticating them at each hop.</t>
      <t>Both the control and data plane rely on the Control-Plane PKI (CP-PKI) for authentication.
SCION's authentication mechanisms aim at protecting the whole end-to-end path at each hop. SCION Autonomous Systems are organised in Isolation Domains (ISDs), that independently define their own roots of trust.
ISD members share a uniform trust environment (i.e., a common jurisdiction). They can transparently define trust relationships between parts of the network by deciding whether to trust other ISDs. SCION therefore relies on a unique trust model, which differs from other PKIs. The motivation behind this design choice is clarified in <xref target="pki"/>.</t>
      <t>All above mentioned core components are deployed in production (e.g., they are in use within the SSFN, the Swiss Finance Network). There are commercial implementations of all core components (including a high performance data-plane).</t>
      <section anchor="routing-control-plane">
        <name>Routing - Control Plane</name>
        <t>The SCION control plane's main purpose is to discover and disseminate routing information, in the form of path segments.
Path exploration is based on path-segment construction beacons (PCBs), which are initiated by a subset of ASes and accumulate cryptographically protected path forwarding information. Each AS selects a few PCBs and makes them available to end hosts via its path service.
End hosts query the control plane for path segments, and combine them into forwarding paths to transmit packets in the data plane.
For an overview of the process to create and disseminate path information, refer to <xref target="I-D.dekater-scion-overview"/>, section 1.2.2.</t>
        <section anchor="key-properties-in-relationship-to-existing-protocols">
          <name>Key Properties in Relationship to Existing Protocols</name>
          <t>On first sight, it might seem that the SCION control plane takes care of similar duties as BGP. While both focus on disseminating routing information, there are substantial differences in their mechanisms and properties offered.
This section describes the core properties provided by the SCION control plane, and its relationships with existing protocols.</t>
          <ul spacing="normal">
            <li>
              <em>Host addressing.</em>  SCION decouples routing from end-host addressing: inter-domain routing is based on ISD-AS tuples rather than on end-host addresses, making SCION agnostic to end-host addressing.
This design decision  has two outcomes: First of all, SCION can reuse existing host addressing schemes, as IPv6,  IPv4, or others. Secondly, its control plane does not carry prefix information, avoiding known issues of using routing tables (i.e., scalability, the need for dedicated hardware).</li>
            <li>
              <em>Multipath.</em> SCION ASes can select PCBs according to their policies, and register the corresponding path segments, making them available to other ASes and end hosts. SCION hosts can leverage a wide range of inter-domain paths, selecting them at each hop based on application requirements or path conditions.
One existing mechanism is BGP ADD-PATH <xref target="RFC7911"/>, focusing on advertising multiple paths for the same prefix in order to provide a backup path.
However, BGP multipath does not allow end hosts to select the whole end-to-end paths, therefore traffic cannot be routed based on application requirements. In addition, it faces scalability concerns typical for BGP (i.e., increased resource requirement on routers), as discussed in the above-mentioned RFC.
Similarly to BGP multipath, other approaches based on BGP either are only able to provide backup paths that can solely be activated in case of failure (i.e., "Diverse BGP Paths" <xref target="RFC6774"/>), or they face scalability limitations. Such concerns motivate an alternative approach, such as SCION.</li>
            <li>
              <em>Hop-by-hop path authorization.</em> SCION packets can only be forwarded along authorized path segments. This is achieved thanks to message authentication codes (MACs) within each hop field. During beaconing, each AS's control plane creates MACs, which are then verified during forwarding. This gives end hosts strong guarantees about the path where the data is routed. Other approaches, such as BGPSec (<xref target="RFC8205"/>), suffer from challenges with scalability, introduce circular dependencies <xref target="COOPER2013"/> and global kill switches <xref target="ROTHENBERGER2017"/>.
Giving end hosts guarantees about the full inter-domain path is important in order to avoid traffic interception, and to enable geofencing (i.e., keeping data in transit within a well-defined trusted area of the global Internet).</li>
            <li>
              <em>Scalability.</em> The SCION's beaconing algorithm is around two orders of magnitude more efficient than BGP due to the following reasons: The routing process is divided in a process within each ISD (intra-ISD) and one between ISDs (inter-ISD), SCION beaconing does not need to iteratively converge, and SCION makes AS-based announcements instead of BGP's IP prefix-based announcements.
Scalability of the routing process is fundamental not only in order to support network size growth, but also in order to quickly react to failures. Refer to <xref target="KRAHENBUHL2022"/> for an in-depth study of SCION's scalability in comparison to BGP.</li>
            <li>
              <em>Convergence time.</em> Since routing decisions are decoupled from the dissemination of path information, SCION features faster convergence times than path-vector protocols such as BGP.
Path information is propagated across the network by PCBs in times that are within the same order of magnitude of network round trip time. In addition, the division of the beaconing process into intra- and inter-ISD helps in speeding up global distribution of routing information. This means that SCION has the capability to restore global reachability, even after catastrophic failures, within tens of seconds.
This is in contrast to BGP, which in certain situations will never converge to a stable state, or converge only non-deterministically (see <xref target="GRIFFIN1999"/> and <xref target="RFC4264"/>). Convergence under BGP may also simply take too much time <xref target="SAHOO2009"/>.</li>
            <li>
              <em>Transparency.</em> SCION end hosts have full visibility about the inter-domain path where their data is forwarded. This is a property that is missing in traditional IP networks, where routing decisions are made by each hop, therefore end hosts have no visibility nor guarantees on where their traffic is going.
Additionally, SCION users have visibility on the roots of trust that are used to forward traffic. SCION therefore makes it harder to redirect traffic through an adversary's vantage point. Moreover, SCION gives end users the ability to select which parts of the Internet to trust. This is particularly relevant for workloads that currently use segregated networks.</li>
            <li>
              <em>Fault isolation.</em> As the SCION routing process is hierarchically divided into intra-ISD and inter-ISD, faults have a generally limited and localized impact.
Misconfigurations, such as an erroneous path policy, may suppress some paths. However, as long as an alternative path exists, communication is possible.
In addition, while the control plane is responsible for creating new paths, it does not invalidate existing paths.
The latter function is handled by end hosts upon detecting failures or eventually receiving a SCMP message from the data plane.
This separation of control and data plane prevents the control plane from cutting off an existing communication.</li>
            <li>
              <em>Authenticated control messages.</em> BGP has no built-in security mechanisms and does not provide any tools for ASes to authenticate the information they receive through BGP update messages. This opens up a multitude of attack opportunities.
SCION control-plane messages, instead, are all authenticated, avoiding pitfalls that could possibly prevent deployment, as discussed in <xref target="RFC9049"/>.
In addition, currently the Internet Control Message Protocol (ICMP) lacks authentication support, see <xref target="RFC4443"/> and <xref target="RFC0791"/>. Unauthenticated ICMP messages can potentially be used to affect or even prevent traffic forwarding.
SCION therefore provides the SCION Control Message Protocol (SCMP), which is analogous to ICMP. It provides functionality for network diagnostics, such as ping and traceroute, and error messages that signal packet processing or network layer problems.
SCMP is the first control message protocol that supports the authentication of network control messages.</li>
          </ul>
          <t>Additionally, the SCION control plane design takes into account some of the lessons learned discussed in <xref target="RFC9049"/>: It does not try to outperform end-to-end mechanisms, as path selection is performed by end hosts. SCION, therefore, can leverage existing end-to-end mechanisms to switch paths, rather than competing with them. In addition, there is no component in the architecture that needs to keep connection state, as this task is  pushed to end hosts.</t>
          <t>Overall, several of the SCION control plane properties and key mechanisms depend on the fact that SCION ASes are grouped into Isolation Domains (ISDs). For example, ISDs are fundamental to achieve transparency, routing scalability, fault isolation, and fast propagation of routing information. The SCION control plane therefore is built around the concept of ISDs, and relies on the SCION Control-Plane PKI (see <xref target="pki"/>) for authenticating control information.</t>
        </section>
      </section>
      <section anchor="data-plane">
        <name>Forwarding - Data Plane</name>
        <t>SCION is an inter-domain network architecture and as such does not interfere with intra-domain forwarding. This corresponds to the practice today where BGP is used for inter-domain routing, while ASes use an intra-domain protocol of their choice (i.e., OSPF, IS-IS, MPLS, ...).
SCION therefore re-uses the intra-domain network fabric to provide connectivity among its infrastructure services, border routers, and end hosts, minimising changes to the internal infrastructure.</t>
        <t>SCION routers are deployed at the network edge. They receive and validate SCION packets from neighbours, then they use their intra-domain forwarding information to transmit packets to the next border router or SCION end host.</t>
        <t>SCION packets are at the network layer (layer-3), and the SCION header sits in between the transport and link layer.
The header contains a variable type and length end-host address, and can therefore carry any address (IPv4, IPv6, ...). In addition, end-host addresses only need to be unique within an AS, and can be, in principle, reused. In early deployments, intra-AS SCION packets are sometimes encapsulated into an IP packet, for backwards compatibility.</t>
        <section anchor="existing-protocols">
          <name>Key Properties in Relationship to Existing Protocols</name>
          <t>Thanks to its data plane, SCION achieves properties that are difficult to achieve when exclusively extending existing protocols.</t>
          <ul spacing="normal">
            <li>
              <em>Path selection.</em> In SCION, end hosts select inter-domain network paths, rather than routers. The end hosts are empowered to make end-to-end path choices based on application requirements.
This means that routers do not carry the burden of making enhanced routing or forwarding decisions.</li>
            <li>
              <em>Scalability.</em> SCION routers can efficiently forward packets without the need to look up forwarding tables or keeping per-connection state. Routers only need to verify  MACs in hop fields. This operation is based on modern block ciphers such as AES, can be computed faster than performing a memory lookup and is widely supported in modern CPUs.
Routers, therefore, do not require expensive and energy-intensive dedicated hardware, and can be deployed on off-the-shelf hardware. Lack of forwarding tables also implies that the growing size of forwarding tables is of no concern to SCION. Additionally, routers that keep state of network information can suffer from denial-of-service (DoS) attacks exhausting the router's state <xref target="SCHUCHARD2011"/>, which is less of a problem to SCION.</li>
            <li>
              <em>Recovery from failures.</em> SCION hosts usually receive more than one path to a given destination.
Each host can select (potentially disjoint) backup paths that are available in case of failure.
In contrast to the IP-based Internet, SCION packets are not dynamically rerouted by the network in case of failures.
Routers use BFD <xref target="RFC5880"/> to detect link failures, and in case they cannot forward a packet, they send an authenticated SCMP message triggering path revocation.
End hosts can use this information, or alternatively perform active monitoring, to quickly reroute traffic in case of failures.
There is therefore no need to wait for inter-domain routing protocol convergence.</li>
            <li>
              <em>Extensibility.</em> SCION, similarly to IPv6, supports extensions in its header.
Such extensions can be hop-by-hop (and are processed at each hop), or end-to-end.</li>
            <li>
              <em>Path validation.</em> SCION routers validate network paths in packets at each hop, so that they are only forwarded along paths that were authorized by all on-path ASes in the control plane. Thanks to a system of nested message authentication codes, traffic hijackings attacks are avoided.</li>
          </ul>
          <t>In conclusion, in comparison to today's Internet, the SCION's data plane pushes some of the responsibilities away from routers onto end hosts (such as selecting paths or reacting to failures).
This contributes to creating a data plane that is more efficient and scalable, and that does not require routers with specialised routing table lookup hardware.
Routers validate network paths so that packets are only forwarded on previously authorized packets.</t>
        </section>
      </section>
      <section anchor="pki">
        <name>Authentication -  SCION PKI</name>
        <t>SCION's control plane messages are all authenticated. The verification of those messages relies on a public-key infrastructure (PKI) called the Control-Plane PKI or CP-PKI. It consists of a set of mechanisms, roles, and policies related to the management and usage of certificates, which enables the verification of signatures of, e.g., path-segment construction beacons (PCBs).</t>
        <section anchor="key-properties">
          <name>Key Properties</name>
          <t>One might ask why SCION requires its own PKI, rather than reusing some of the existing PKI architectures. There are several properties that distinguish the CP-PKI from others, and motivate SCION's distinct approach.</t>
          <ul spacing="normal">
            <li>
              <em>Unique decentralised trust model.</em> SCION is designed to enable global secure connectivity, where ASes do not necessarily share mutual trust.
This requires a trust model that is different from existing ones that are behind commonly deployed PKIs in today's Internet.
In a monopolistic model, all entities trust one or a small number of roots of trust. In an oligopolistic model, there are  multiple equally trusted roots  (e.g., in the Web PKI).
In both models, some or all certification authorities are omnipotent. If their key is compromised, then the security of the entire system collapses.
Both models do not scale well to a global environment, because mutually distrustful entities cannot agree on a single root of trust (monopoly) and because in the oligopoly model, the security is as strong as its weakest root.
The SCION trust model differs from classic PKIs in two ways. First, no entity is omnipotent, as  Isolation Domains  elect their own root of trust, and the  capabilities of each ISD (authentication-wise) are limited to communication channels in which they are involved.
Second, the trust roots of each ISD are located in a single file, the TRC, which is co-signed by multiple entities in a process  called voting.</li>
            <li>
              <em>Resilience to compromised entities and keys.</em> Compromised or malicious trust roots outside an ISD cannot affect operations that stay within that ISD. Moreover, each ISD can be configured to withstand the compromise of any single voting key.</li>
            <li>
              <em>Trust flexibility.</em> Each ISD can define its own trust policy. ASes must accept the trust policy of the ISD(s) in which they participate, but they can decide which ISDs they want to join, and they can participate in multiple ISDs.</li>
            <li>
              <em>Scalability.</em> The authentication infrastructure scales to the size of the Internet and is adapted to the heterogeneity of today's Internet constituents.</li>
            <li>
              <em>A basis for authentication of data-plane messages.</em> Authentication based on digital signatures works well for the relatively low message rates in the control plane, but it does not meet the performance requirements for the high message rate of the data plane.
The authentication of data-plane traffic and control messages requires a highly efficient and ideally stateless system to achieve high bandwidths on commodity hardware, and to avoid creating opportunities for DoS attacks. SCION comprises a component called  DRKey, which enables high-speed data-plane elements, like border routers, to derive symmetric cryptographic keys from local secrets only. This DRKey component is used to authenticate SCMP messages.
Today's Internet also lacks a fundamental mechanism to share a secret key between two end hosts for secure end-to-end communication. Existing approaches (i.e., SSH) resort to trust-on-first-use (TOFU), where a host's initial public key is accepted without verification. DRKey addresses this issue as well. For more information, refer to the draft <xref target="I-D.garciapardo-drkey"/>.</li>
          </ul>
          <t>The CP-PKI is based on certificates that follow the X.509v3 standard <xref target="RFC5280"/>. There are already several professional industry-grade implementations.
Trust within an ISD is normally bootstrapped with an initial ceremony. Subsequent updates to the root of trust are handled automatically.</t>
          <t>SCION is built around a unique trust model, allowing mutually distrustful entities to communicate.
This justifies the existence of the CP-PKI, which differs from existing PKI architectures.
Thanks to the CP-PKI, control and data plane packets are authenticated.
This helps avoiding some of the obstacles to deployment mentioned in <xref target="RFC9049"/>, where several path-aware methods failed to achieve deployment because of lack of authentication or lack of mutual trust between end hosts and the intermediate network.</t>
        </section>
      </section>
    </section>
    <section anchor="additional-components">
      <name>Additional Components</name>
      <t>This document mainly focuses on describing the fundamental components needed to run a minimal SCION network.
Beyond that, SCION comprises a number of extensions and transition mechanisms that provide additional properties, as improved incremental deployability, security, additional features.
For the sake of completeness, this paragraph briefly mentions some of these transition mechanisms and extensions.</t>
      <section anchor="transition-mechanisms">
        <name>Transition Mechanisms</name>
        <t>As presented in <xref target="I-D.dekater-scion-overview"/>, incremental deployability is a focus area of SCION's design.
It comprises transition mechanisms that allow partial deployment and coexistence with existing protocols.
These mechanisms require different levels of changes in existing systems, and have different maturity levels (from research to production).
Rather than describing how each mechanism works, this document provides a short summary of each approach, focusing on its functions and properties, as well as on how it reuses, extends or interacts with existing protocols.</t>
        <ul spacing="normal">
          <li>
            <em>SCION-IP-Gateway (SIG).</em>  A SCION-IP-Gateway (SIG) encapsulates regular IP packets into SCION packets with a corresponding SIG at the destination that performs the decapsulation.
This mechanism enables IP end hosts to benefit from a SCION deployment by transparently obtaining improved security and availability properties.
SCION routing policies can be configured on SIGs, in order to select appropriate SCION paths based on application requirements.
SIGs have the ability to dynamically exchange prefix information, currently using their own encapsulation and prefix exchange protocol.
This does not exclude reusing existing protocols in the future.
SIGs are deployed in production SCION networks, and there are commercial implementations.</li>
          <li>
            <em>SIAM.</em> To make SIGs a viable transition mechanism in an Internet-scale network with tens of thousands of ASes, an automatic configuration system is required.
SIAM creates mappings between IP prefixes and SCION addresses, relying on the authorisations in the Resource Public Key Infrastructure (RPKI).
SIAM is currently a research prototype, further described in <xref target="SUPRAJA2021"/>.</li>
          <li>
            <em>SBAS</em> is an experimental architecture aiming at extending the benefits of SCION (in terms of performance and routing security) to potentially any IP host on the Internet.
SBAS consists of a federated backbone of entities. SBAS appears on the outside Internet as a regular BGP-speaking AS.
Customers of SBAS can leverage the system to route traffic across the SCION network according to their requirements (i.e., latency, geography, ... ).
SBAS contains globally distributed PoPs that advertise its customer's announcements.
SBAS relies on RPKI to validate IP prefix authorization.
Traffic is therefore routed as close as possible to the source onto the SCION network. The system is further described in chapter 13 of <xref target="CHUAT22"/>.</li>
        </ul>
      </section>
      <section anchor="extensions-and-other-components">
        <name>Extensions and Other Components</name>
        <t>In addition to the components mentioned above, there are others that aim at facilitating deployment or at better integrating SCION with existing networks. As an example, PANAPI (Path-Aware Networking API) <xref target="slides-113-taps-panapi"/> aims at making path-awareness and multipath to the transport layer at end hosts.
DRKey <xref target="I-D.garciapardo-drkey"/> is a SCION extension that provides an Internet-wide key-establishment system allowing any two hosts to efficiently derive a symmetric key. This extension can be leveraged by other components to provide additional security properties.
For example, LightningFilter <xref target="slides-111-panrg-lightning-filter"/> leverages DRKey to provide high-speed packet filtering between trusted SCION ASes.
The SCION Control Message Protocol (SCMP) provides authenticated error messages and network diagnostics.
COLIBRI <xref target="GIULIARI2021"/> is SCION's inter-domain bandwidth reservation system.
RHINE (Robust and High-performance Internet Naming for End-to-end security, formerly RAINS) is a secure-by-design naming system that provides a set of desired security, reliability, and performance properties beyond what the DNS security infrastructure offers today. It is further described in chapter 19 of <xref target="CHUAT22"/>.</t>
        <t>These additional components are briefly mentioned here in order to provide additional context.
As extensions, they build upon the three SCION core components described earlier in this document.
They are therefore unlikely to be the first components being standardised.</t>
      </section>
    </section>
    <section anchor="related-work">
      <name>Related Work</name>
      <t>A question that is often asked is whether SCION could simply reuse or extend existing protocols.
This section tries to clarify this question, giving an overview of the relationships between SCION and other approaches.
This section discusses what properties can be achieved by extending existing protocols, already deployed in the wild, and what properties can only be achieved with an approach like SCION.</t>
      <section anchor="scion-and-rpki">
        <name>SCION and RPKI</name>
        <t>One might ask why SCION could not just rely on RPKI. Summarising the points discussed in this document, the CP-PKI distinguishes itself because of its trust model, which comprises independent trust roots that are a fundamental building block for SCION's Isolation Domains.
RPKI's trust model follows the same structure as the IP allocation hierarchy, where the five RIRs run a CA. This clashes with the trust model required for SCION's Isolation Domains, therefore the SCION control plane would not be able to leverage RPKI instead of the CP-PKI.
In addition, RPKI is only meant to provide authorisation, but not authentication. SCION indeed does not provide, by design, IP authorisation. Rather, one of IP-to-SCION's coexistence mechanisms mentioned earlier (SIAM) relies on RPKI for IP origin attestation.</t>
      </section>
      <section anchor="scion-and-segment-routing">
        <name>SCION and Segment Routing</name>
        <t>Given its path-aware properties, some of SCION's characteristics might seem similar to the ones provided by Segment Routing (SR) <xref target="RFC8402"/>. There are, however, fundamental differences that distinguish and motivate SCION. The most salient one is that Segment Routing is designed to be deployed across a single trusted domain. SR therefore does not focus on security, which remains an open question, as outlined in <xref target="I-D.spring-srv6-security-consideration"/>.
SCION, instead, is designed from the start to facilitate inter-domain communication between (potentially mutually distrustful) entities. It comes, therefore, with built-in security measures to prevent attacks (i.e., authenticating all control-plane messages and all critical fields in the data-plane header).
Rather than competing, SCION and SR complement each other.
SCION relies on existing intra-domain routing protocols, therefore SR can be one of the possible intra-domain forwarding mechanisms.
A possible integration of its path-aware properties remains for now an open question.</t>
      </section>
      <section anchor="scion-and-other-routing-approaches">
        <name>SCION and Other Routing Approaches</name>
        <t>There is an increasing motivation to extend inter-domain routing beyond mere reachability. See for example <xref target="I-D.trossen-routing-beyond-reachability"/>, which provides a summary of some of the existing methods, and states that wider architectural approaches are needed.
One proposed approach is semantic routing <xref target="I-D.irtf-introduction-to-semantic-routing"/>, which adds support for advanced routing and forwarding into packets and into the data-plane.
SCION takes a different approach: Path selection is carried out by end hosts, which have the ability to select network paths based on application requirements.
This means that there is no need to include semantics in packets. This comes with the benefit that the SCION data plane can provide advanced routing without increased complexity or strain on routers.
BGP ADD-PATH <xref target="RFC7911"/> extends BGP to allow additional path announcements for a certain prefix, without implicitly revoking the existing path.
However, when additional paths are advertised for a large number of prefixes, router memory consumption is significantly increased. Furthermore, the additional path diversity is not exposed to end-hosts, therefore the additional paths can only be used for redundancy.</t>
      </section>
    </section>
    <section anchor="dependency-analysis">
      <name>Dependency Analysis</name>
      <t>This section briefly discusses dependencies between SCION's core components, with the goal of facilitating a discussion on whether it is possible to implement each of SCION's core components on its own, independently from other core components.</t>
      <ul spacing="normal">
        <li>
          <em>Control-plane PKI.</em>
The CP PKI enables the verification of signatures, e.g., on path-segment construction beacons (PCBs).
As discussed in <xref target="pki"/>, it is built on top of a peculiar trust model, where entities are able to select their roots of trust.
Overall, it constitutes the most independent and self-contained building block, as it could potentially be leveraged by SCION or other protocols.
The PKI itself does not have significant dependencies on other SCION components, therefore it could represent a good starting point for standardisation.
Its unique trust properties, interfaces, and processes (as voting), could be a good candidate for a first draft.</li>
        <li>
          <em>Control plane.</em>
The SCION control plane is built around the concept of Isolation Domains, being the routing process divided into an intra- and inter-ISD one.
It heavily relies on the CP-PKI for beaconing (i.e., for authenticating routing information).
Each Isolation Domain requires its own root of trust in order to carry out path exploration and dissemination.
Decoupling the control plane from the CP-PKI would severely affect the properties and guarantees that can be provided by the control plane.
The control plane could, therefore, be specified in parallel with the CP-PKI.
The control plane is internally formed by multiple sub-components (as the beacon service, responsible for path discovery, and the path service, responsible for path dissemination).
Processes and interfaces between these sub-components could be topic for one or multiple drafts.</li>
        <li>
          <em>Data plane.</em>
In order to be able to transmit data, end hosts need to fetch path information from their AS control plane, as discussed in <xref target="data-plane"/>.
In addition, the SCION data plane requires that hosts validate paths, and that routers authenticate path information at each hop.
This authentication mechanism relies on the control-plane PKI. It is what allows SCION to distinguish itself from other proposals, gaining many of the security and availability proprieties discussed earlier.
The data plane, therefore, relies on both the control plane and the control-plane PKI in order to function.
Should the data plane be used independently, without end-to-end path validation, SCION would loose many of its security properties, which are fundamental in an inter-domain scenario where entities are mutually distrustful.
As discussed in <xref target="RFC9049"/>, lack of authentication has often been the cause for path-aware protocols never being adopted because of security concerns. SCION should avoid such pitfalls and therefore its data plane should rely on the corresponding control plane and control-plane PKI.</li>
      </ul>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>This document describes the three fundamental SCION core components, together with their properties and dependencies.
It highlights how such components allow SCION to provide unique properties. It then discusses how the main components are interlinked, with the goal of fostering a discussion on the standardisation of key components.
As this document is an early draft, the authors welcome feedback from the IETF community for future iterations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC4264">
        <front>
          <title>BGP Wedgies</title>
          <author fullname="T. Griffin" initials="T." surname="Griffin">
            <organization/>
          </author>
          <author fullname="G. Huston" initials="G." surname="Huston">
            <organization/>
          </author>
          <date month="November" year="2005"/>
          <abstract>
            <t>It has commonly been assumed that the Border Gateway Protocol (BGP) is a tool for distributing reachability information in a manner that creates forwarding paths in a deterministic manner.  In this memo we will describe a class of BGP configurations for which there is more than one potential outcome, and where forwarding states other than the intended state are equally stable.  Also, the stable state where BGP converges may be selected by BGP in a non-deterministic manner. These stable, but unintended, BGP states are termed here "BGP Wedgies".  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4264"/>
        <seriesInfo name="DOI" value="10.17487/RFC4264"/>
      </reference>
      <reference anchor="RFC8205">
        <front>
          <title>BGPsec Protocol Specification</title>
          <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski">
            <organization/>
          </author>
          <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram">
            <organization/>
          </author>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes.  BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message.  The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8205"/>
        <seriesInfo name="DOI" value="10.17487/RFC8205"/>
      </reference>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins">
            <organization/>
          </author>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG).  At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RFC4443">
        <front>
          <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
          <author fullname="A. Conta" initials="A." surname="Conta">
            <organization/>
          </author>
          <author fullname="S. Deering" initials="S." surname="Deering">
            <organization/>
          </author>
          <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta">
            <organization/>
          </author>
          <date month="March" year="2006"/>
          <abstract>
            <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="89"/>
        <seriesInfo name="RFC" value="4443"/>
        <seriesInfo name="DOI" value="10.17487/RFC4443"/>
      </reference>
      <reference anchor="RFC0791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC7911">
        <front>
          <title>Advertisement of Multiple Paths in BGP</title>
          <author fullname="D. Walton" initials="D." surname="Walton">
            <organization/>
          </author>
          <author fullname="A. Retana" initials="A." surname="Retana">
            <organization/>
          </author>
          <author fullname="E. Chen" initials="E." surname="Chen">
            <organization/>
          </author>
          <author fullname="J. Scudder" initials="J." surname="Scudder">
            <organization/>
          </author>
          <date month="July" year="2016"/>
          <abstract>
            <t>This document defines a BGP extension that allows the advertisement of multiple paths for the same address prefix without the new paths implicitly replacing any previous ones.  The essence of the extension is that each path is identified by a Path Identifier in addition to the address prefix.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7911"/>
        <seriesInfo name="DOI" value="10.17487/RFC7911"/>
      </reference>
      <reference anchor="RFC5880">
        <front>
          <title>Bidirectional Forwarding Detection (BFD)</title>
          <author fullname="D. Katz" initials="D." surname="Katz">
            <organization/>
          </author>
          <author fullname="D. Ward" initials="D." surname="Ward">
            <organization/>
          </author>
          <date month="June" year="2010"/>
          <abstract>
            <t>This document describes a protocol intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and to the extent possible the forwarding engines themselves, with potentially very low latency.  It operates independently of media, data protocols, and routing protocols. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5880"/>
        <seriesInfo name="DOI" value="10.17487/RFC5880"/>
      </reference>
      <reference anchor="RFC8402">
        <front>
          <title>Segment Routing Architecture</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
            <organization/>
          </author>
          <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi">
            <organization/>
          </author>
          <author fullname="L. Ginsberg" initials="L." surname="Ginsberg">
            <organization/>
          </author>
          <author fullname="B. Decraene" initials="B." surname="Decraene">
            <organization/>
          </author>
          <author fullname="S. Litkowski" initials="S." surname="Litkowski">
            <organization/>
          </author>
          <author fullname="R. Shakir" initials="R." surname="Shakir">
            <organization/>
          </author>
          <date month="July" year="2018"/>
          <abstract>
            <t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called "segments".  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
            <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t>
            <t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8402"/>
        <seriesInfo name="DOI" value="10.17487/RFC8402"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper">
            <organization/>
          </author>
          <author fullname="S. Santesson" initials="S." surname="Santesson">
            <organization/>
          </author>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen">
            <organization/>
          </author>
          <author fullname="R. Housley" initials="R." surname="Housley">
            <organization/>
          </author>
          <author fullname="W. Polk" initials="W." surname="Polk">
            <organization/>
          </author>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC6774">
        <front>
          <title>Distribution of Diverse BGP Paths</title>
          <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk">
            <organization/>
          </author>
          <author fullname="R. Fernando" initials="R." surname="Fernando">
            <organization/>
          </author>
          <author fullname="K. Patel" initials="K." surname="Patel">
            <organization/>
          </author>
          <author fullname="D. McPherson" initials="D." surname="McPherson">
            <organization/>
          </author>
          <author fullname="K. Kumaki" initials="K." surname="Kumaki">
            <organization/>
          </author>
          <date month="November" year="2012"/>
          <abstract>
            <t>The BGP4 protocol specifies the selection and propagation of a single best path for each prefix.  As defined and widely deployed today, BGP has no mechanisms to distribute alternate paths that are not considered best path between its speakers.  This behavior results in a number of disadvantages for new applications and services.</t>
            <t>The main objective of this document is to observe that by simply adding a new session between a route reflector and its client, the Nth best path can be distributed.  This document also compares existing solutions and proposed ideas that enable distribution of more paths than just the best path.</t>
            <t>This proposal does not specify any changes to the BGP protocol definition.  It does not require a software upgrade of provider edge (PE) routers acting as route reflector clients.  This document is not an Internet  Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6774"/>
        <seriesInfo name="DOI" value="10.17487/RFC6774"/>
      </reference>
      <reference anchor="SCHUCHARD2011">
        <front>
          <title>Losing control of the internet: using the data plane to attack the control plane</title>
          <author fullname="Max Schuchard" initials="M." surname="Schuchard">
            <organization/>
          </author>
          <author fullname="Abedelaziz Mohaisen" initials="A." surname="Mohaisen">
            <organization/>
          </author>
          <author fullname="Denis Foo Kune" initials="D." surname="Foo Kune">
            <organization/>
          </author>
          <author fullname="Nicholas Hopper" initials="N." surname="Hopper">
            <organization/>
          </author>
          <author fullname="Yongdae Kim" initials="Y." surname="Kim">
            <organization/>
          </author>
          <author fullname="Eugene Y. Vasserman" initials="E." surname="Vasserman">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <seriesInfo name="Proceedings of the 17th ACM conference on Computer and communications security - CCS" value="'10"/>
        <seriesInfo name="DOI" value="10.1145/1866307.1866411"/>
      </reference>
      <reference anchor="GRIFFIN1999">
        <front>
          <title>An analysis of BGP convergence properties</title>
          <author fullname="Timothy G. Griffin" initials="T." surname="Griffin">
            <organization/>
          </author>
          <author fullname="Gordon Wilfong" initials="G." surname="Wilfong">
            <organization/>
          </author>
          <date month="October" year="1999"/>
        </front>
        <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 29, pp. 277-288"/>
        <seriesInfo name="DOI" value="10.1145/316194.316231"/>
      </reference>
      <reference anchor="SAHOO2009">
        <front>
          <title>BGP convergence delay after multiple simultaneous router failures: Characterization and solutions</title>
          <author fullname="Amit Sahoo" initials="A." surname="Sahoo">
            <organization/>
          </author>
          <author fullname="Krishna Kant" initials="K." surname="Kant">
            <organization/>
          </author>
          <author fullname="Prasant Mohapatra" initials="P." surname="Mohapatra">
            <organization/>
          </author>
          <date month="May" year="2009"/>
        </front>
        <seriesInfo name="Computer Communications" value="Vol. 32, pp. 1207-1218"/>
        <seriesInfo name="DOI" value="10.1016/j.comcom.2009.03.009"/>
      </reference>
      <reference anchor="COOPER2013">
        <front>
          <title>On the risk of misbehaving RPKI authorities</title>
          <author fullname="Danny Cooper" initials="D." surname="Cooper">
            <organization/>
          </author>
          <author fullname="Ethan Heilman" initials="E." surname="Heilman">
            <organization/>
          </author>
          <author fullname="Kyle Brogle" initials="K." surname="Brogle">
            <organization/>
          </author>
          <author fullname="Leonid Reyzin" initials="L." surname="Reyzin">
            <organization/>
          </author>
          <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
            <organization/>
          </author>
          <date month="November" year="2013"/>
        </front>
        <seriesInfo name="Proceedings of the Twelfth ACM Workshop on Hot Topics in" value="Networks"/>
        <seriesInfo name="DOI" value="10.1145/2535771.2535787"/>
      </reference>
      <reference anchor="ROTHENBERGER2017">
        <front>
          <title>Internet Kill Switches Demystified</title>
          <author fullname="Benjamin Rothenberger" initials="B." surname="Rothenberger">
            <organization/>
          </author>
          <author fullname="Daniele E. Asoni" initials="D." surname="Asoni">
            <organization/>
          </author>
          <author fullname="David Barrera" initials="D." surname="Barrera">
            <organization/>
          </author>
          <author fullname="Adrian Perrig" initials="A." surname="Perrig">
            <organization/>
          </author>
          <date month="April" year="2017"/>
        </front>
        <seriesInfo name="Proceedings of the 10th European Workshop on Systems" value="Security"/>
        <seriesInfo name="DOI" value="10.1145/3065913.3065922"/>
      </reference>
      <reference anchor="I-D.dekater-scion-overview" target="https://datatracker.ietf.org/doc/draft-dekater-panrg-scion-overview/">
        <front>
          <title>SCION Overview</title>
          <author initials="C." surname="de Kater" fullname="Corine de Kater">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zuerich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="I-D.rtgwg-net2cloud-problem-statement" target="https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-problem-statement/">
        <front>
          <title>SCION Overview</title>
          <author initials="L." surname="Dunbar">
            <organization/>
          </author>
          <author initials="A." surname="Malis">
            <organization/>
          </author>
          <author initials="C." surname="Jacquenet">
            <organization/>
          </author>
          <author initials="M." surname="Toy">
            <organization/>
          </author>
          <author initials="K." surname="Majumdar">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="I-D.spring-srv6-security-consideration" target="https://datatracker.ietf.org/doc/draft-li-spring-srv6-security-consideration/">
        <front>
          <title>Security Considerations for SRv6 Networks</title>
          <author initials="C." surname="Li">
            <organization/>
          </author>
          <author initials="Z." surname="Li">
            <organization/>
          </author>
          <author initials="C." surname="Xie">
            <organization/>
          </author>
          <author initials="H." surname="Tian">
            <organization/>
          </author>
          <author initials="J." surname="Mao">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="I-D.irtf-introduction-to-semantic-routing" target="https://datatracker.ietf.org/doc/draft-li-spring-srv6-security-consideration/">
        <front>
          <title>An Introduction to Semantic Routing</title>
          <author initials="A." surname="Farrel">
            <organization/>
          </author>
          <author initials="D." surname="King">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="slides-113-taps-panapi" target="https://datatracker.ietf.org/meeting/113/materials/slides-113-taps-panapi-implementation-00.pdf">
        <front>
          <title>PANAPI, a Path-Aware Networking API</title>
          <author initials="T." surname="Krüger">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="slides-111-panrg-lightning-filter" target="https://datatracker.ietf.org/meeting/111/materials/slides-111-panrg-lightning-filter-high-speed-traffic-filtering-based-on-drkey-00.pdf">
        <front>
          <title>Lightning Filter: High-Speed Traffic Filtering based on DRKey</title>
          <author initials="J. A." surname="Garcia Pardo">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="I-D.garciapardo-drkey" target="https://datatracker.ietf.org/doc/draft-garciapardo-panrg-drkey/">
        <front>
          <title>Dynamically Recreatable Keys</title>
          <author initials="J." surname="Pardo" fullname="Juan A. García Pardo Giménez de los Galanes">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="B." surname="Rothenberger" fullname="Benjamin Rothenberger">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zuerich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="I-D.trossen-routing-beyond-reachability" target="https://datatracker.ietf.org/doc/draft-trossen-rtgwg-routing-beyond-reachability/">
        <front>
          <title>Continuing to Evolve Internet Routing Beyond 'Mere' Reachability</title>
          <author initials="D." surname="Trossen">
            <organization/>
          </author>
          <author initials="D." surname="Lou">
            <organization/>
          </author>
          <author initials="S." surname="Jiang">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="FCC2022" target="https://www.fcc.gov/document/fcc-launches-inquiry-internet-routing-vulnerabilities">
        <front>
          <title>Notice of Inquiry on Secure Internet Routing</title>
          <author initials="" surname="Federal Communications Commission">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="KRAHENBUHL2022" target="https://netsec.ethz.ch/publications/papers/2021_conext_deployment.pdf">
        <front>
          <title>Deployment and Scalability of an Inter-Domain Multi-Path Routing Infrastructure</title>
          <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="S." surname="Tabaeiaghdaei" fullname="Seyedali Tabaeiaghdaei">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="C." surname="Glοοr" fullname="Christelle Glοοr">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="J." surname="Kwon" fullname="Jonghoon Kwon">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="D." surname="Hausheer" fullname="David Hausheer">
            <organization>OVGU Magdeburg</organization>
          </author>
          <author initials="D." surname="Roos" fullname="Dominik Roos">
            <organization>Anapaya Systems</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="GIULIARI2021" target="https://netsec.ethz.ch/publications/papers/2021_conext_colibri.pdf">
        <front>
          <title>Colibri: A Cooperative Lightweight Inter-domain Bandwidth-Reservation Infrastructure</title>
          <author initials="G." surname="Giuliari" fullname="Giacomo Giuliari">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="D." surname="Roos" fullname="Dominik Roos">
            <organization>Anapaya Systems</organization>
          </author>
          <author initials="M." surname="Wyss" fullname="Marc Wyss">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="J." surname="García-Pardo" fullname="Juan Angel García-Pardo">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zuerich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
        <front>
          <title>The Complete Guide to SCION</title>
          <author initials="L." surname="Chuat" fullname="Laurent Chuat">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="D." surname="Basin" fullname="David Basin">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="D." surname="Hausheer" fullname="David Hausheer">
            <organization>Otto von Guericke University Magdeburg</organization>
          </author>
          <author initials="S." surname="Hitz" fullname="Samuel Hitz">
            <organization>Anapaya Systems</organization>
          </author>
          <author initials="P." surname="Mueller" fullname="Peter Mueller">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zuerich</organization>
          </author>
          <date year="2022"/>
        </front>
        <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
      </reference>
      <reference anchor="SUPRAJA2021" target="https://netsec.ethz.ch/publications/papers/sridhara_taurin2021_siam.pdf">
        <front>
          <title>Global Distributed Secure Mapping of Network Addresses</title>
          <author initials="S." surname="Supraja" fullname="Supraja Sridhara">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="F." surname="Wirz" fullname="François Wirz">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="J." surname="de Ruiter" fullname="Joeri de Ruiter">
            <organization>SIDN Labs</organization>
          </author>
          <author initials="C." surname="Schutijser" fullname="Caspar Schutijser">
            <organization>SIDN Labs</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zuerich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zuerich</organization>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="PANRG-INTERIM-Min" target="https://datatracker.ietf.org/meeting/interim-2022-panrg-01/materials/minutes-interim-2022-panrg-01-202206011700-00">
        <front>
          <title>Path Aware Networking Research Group - Interim  106 Minutes</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="June"/>
        </front>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors are indebted to Adrian Perrig, Laurent Chuat,
Markus Legner, David Basin, David Hausheer, Samuel Hitz, and Peter
Mueller, for writing the book "The Complete Guide to SCION"
<xref target="CHUAT22"/>, which provides the background information needed to write
this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
