<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.16 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rustignoli-panrg-scion-components-01" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.14.0 -->
  <front>
    <title abbrev="SCION COMP I-D">SCION Components Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-rustignoli-panrg-scion-components-01"/>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>ETH Zürich</organization>
      <address>
        <email>nicola.rustignoli@inf.ethz.ch</email>
      </address>
    </author>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>ETH Zürich</organization>
      <address>
        <email>corine.dekatermuehlhaeuser@inf.ethz.ch</email>
      </address>
    </author>
    <date year="2022" month="August" day="26"/>
    <area>IRTF</area>
    <workgroup>Path Aware Networking RG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>SCION is an inter-domain Internet architecture that focuses on security and availability. Its fundamental functions are carried out by a number of components.</t>
      <t>This document analyzes its core components from a functionality perspective, describing their dependencies, outputs, and properties provided.
The goal is to answer the following questions:</t>
      <ul spacing="normal">
        <li>What are the main components of SCION and their dependencies? Can they be used independently?</li>
        <li>What existing protocols are reused or extended? Why (or why not)?</li>
      </ul>
      <t>In addition, it focuses on the properties achievable, motivating cases when a greenfield approach is used.
It then briefly touches on the maturity level of components and some extensions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-components_I-D/draft-rustignoli-panrg-scion-components.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rustignoli-panrg-scion-components/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Path Aware Networking RG Research Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://www.ietf.org/mail-archive/web/panrg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/panrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-components_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>While SCION was initially developed in academia, the architecture has now "slipped out of the lab" and counts its early productive deployments (including the Swiss inter-banking network SSFN).
The architecture consists of a system of related components, some of which are essential to set up end-to-end SCION connectivity.
Core components are the data plane, the control plane, and the PKI. Add-ons provide additional functionality, security, or backward compatibility. Discussions at PANRG <xref target="PANRG-INTERIM-Min"/> showed the need to describe the relationships between components.
This document, therefore, takes a look at each core component individually and independently from others.
It focuses on describing its dependencies, outputs, functionality, and properties.
It then touches on relationships to existing protocols.
The goal is not to describe each component's specification, but to illustrate the engineering decisions that made SCION what it is and to provide a basis for further discussions and work.</t>
      <t>Before reading this document, please refer to <xref target="I-D.dekater-scion-overview"/> for a generic overview of SCION and its components, the problems it solves, and existing deployments. For an in-depth description of SCION, refer to <xref target="CHUAT22"/>.</t>
      <section anchor="design-goals">
        <name>Design Goals</name>
        <t>SCION was created from the start with the intention to provide the following properties for inter-domain communication.</t>
        <ul spacing="normal">
          <li>
            <em>Availability</em>. SCION aims to provide highly available communication. Its focus is not only on handling failures (both on the last hop or anywhere along the path) but also on allowing communication in the presence of adversaries.
Availability is fundamental as applications move to cloud data centers, and enterprises increasingly rely on the Internet for mission-critical communication.</li>
          <li>
            <em>Security</em>. SCION comes with an arsenal of mechanisms, designed by security researchers with the goal of making most network-based and routing attacks either impossible or easy to mitigate.
SCION strongly focuses on preventing routing attacks, IP prefix hijackings, and on providing stronger guarantees than the existing Internet. Security is tightly related to trust.
SCION, therefore, offers a new trust model, transparency, and control to end-hosts over forwarding paths. In addition, SCION's design starts from the assumption that any two entities on the global Internet do not mutually trust each other. SCION, therefore, enables trust agility, allowing its users to decide the roots of trust they wish to rely upon.</li>
          <li>
            <em>Scalability</em>. Security and high availability should not result in compromises on scalability.
At the same time, a next-generation Internet architecture should scale with global network growth and avoid limitations related to forwarding table size.
The S in SCION, indeed, stands for scalability. The architecture proposes a design that is scalable both in the control plane and in the data plane (as described later in the document).</li>
        </ul>
        <t>Many research efforts have analyzed whether such properties could be achieved by extending the existing Internet architecture. As described for each core component in the following paragraphs, tradeoffs between properties would be unavoidable when exclusively relying on or extending existing protocols.</t>
      </section>
    </section>
    <section anchor="minimal-stack-core-components">
      <name>Minimal Stack - Core Components</name>
      <t>To establish end-to-end connectivity, SCION relies on three main components.</t>
      <ul spacing="normal">
        <li>Data plane: it carries out secure packet forwarding, providing path-aware inter-domain connectivity.</li>
        <li>Control plane: it performs inter-domain routing by discovering and securely disseminating path information.</li>
        <li>PKI: it handles cryptographic material and provides a unique trust model.</li>
      </ul>
      <t>Each SCION AS deploys all of the three components above.
Implementations of all of the above components are deployed in production (e.g., they are in use within the SSFN, the Swiss Finance Network). There are commercial implementations (including a high-performance data plane).</t>
      <t>When a packet is sent through a SCION network, it is forwarded between ASes by SCION data plane. It authenticates packets at each hop.
The control plane is responsible for discovering and disseminating routing information. Path discovery is performed by each autonomous system (AS) thanks to an authenticated path-exploration mechanism called beaconing.
SCION end hosts query their respective AS control plane and obtain authenticated and authorized network paths, in the form of path segments.
End hosts select one or more of the end-to-end network paths, based on the application requirements (i.e., latency). End hosts then craft SCION packets containing the end-to-end path to the destination.</t>
      <t>The control plane relies on the control-plane PKI (CP-PKI) for authentication (e.g., of path segments).
SCION's authentication mechanisms aim at protecting the whole end-to-end path at each hop.
Such mechanisms are based on a trust model that is provided by the concept of Isolation Domains (ISDs).
An ISD is a group of Autonomous Systems that independently defines its own roots of trust.
ISD members share therefore a uniform trust environment (i.e., a common jurisdiction). They can transparently define trust relationships between parts of the network by deciding whether to trust other ISDs. SCION trust model, therefore, differs from the one provided by other PKI architectures. The motivation behind this design choice is clarified in <xref target="pki"/>.</t>
      <t>The following paragraphs look at each component individually.
Rather than describing how each component works, they focus on each component's dependencies and properties provided to other components.
The idea is to try to think of each component as a black box, and look at its "inputs" and "outputs".</t>
      <section anchor="pki">
        <name>Authentication - SCION CP-PKI</name>
        <t>SCION's control plane messages and path information are all authenticated.
This helps SCION avoid some of the obstacles to deployment mentioned in <xref target="RFC9049"/>, where several path-aware methods failed to achieve deployment because of lack of authentication or lack of mutual trust between end hosts and the intermediate network.
The verification of messages relies on a public-key infrastructure (PKI) called the control-plane PKI or CP-PKI.
It consists of a set of mechanisms, roles, and policies related to the management and usage of certificates, which enables the verification of signatures of, e.g., path-segment construction beacons (PCBs).
A detailed specification of the PKI is available in <xref target="I-D.dekater-scion-pki"/>.</t>
        <section anchor="key-properties">
          <name>Key Properties</name>
          <t>One might ask why SCION requires its own PKI, rather than reusing some of the existing PKI architectures to issue AS certificates.
Several properties distinguish the CP-PKI from others, and motivate SCION's distinct approach.</t>
          <ul spacing="normal">
            <li>
              <em>Locally scoped and flexible trust.</em> SCION is designed to securely connect ASes that do not necessarily share mutual trust.
This requires a trust model that is different from the ones that are behind commonly deployed PKIs.
In a monopolistic model, all entities trust one or a small number of roots of trust. In an oligopolistic model, there are multiple equally trusted roots (e.g., in the Web PKI).
In both models, some or all certification authorities are omnipotent. If their key is compromised, then the security of the entire system collapses.
Both models do not scale well to a global environment, because mutually distrustful entities cannot agree on a single root of trust (monopoly) and because in the oligopoly model, the security is as strong as its weakest root.
In the SCION CP-PKI, trust is locally scoped within each ISD, and the capabilities of each ISD (authentication-wise) are limited to the communication channels in which they are involved. Each ISD can define its own trust policy. ASes must accept the trust policy of the ISD(s) in which they participate, but they can decide which ISDs they want to join, and they can participate in multiple ISDs.</li>
            <li>
              <em>Resilience to compromised entities and keys.</em> Compromised or malicious trust roots outside an ISD cannot affect operations that stay within that ISD. Moreover, as trust roots (in the form of a TRC) can only be updated through a voting process, each ISD can be configured to withstand the compromise of a number of its root keys.</li>
            <li>
              <em>Multilateral governance.</em> The voting mechanism mentioned above makes sure that fundamental changes to the trust policies are only allowed with the consent of multiple entities administering an ISD.
Within an ISD, no single entity is in full control, or owns a cryptographic "kill-switch".</li>
            <li>
              <em>Support for versioning &amp; updates.</em> Trust within an ISD is normally bootstrapped with an initial ceremony. Subsequent updates to the root of trust (TRC) are handled automatically. The PKI design makes sure that certificate rollover can be automated so that certificates can be rotated frequently (e.g., every few days for AS certificates).</li>
            <li>
              <em>Scalability.</em> The authentication infrastructure scales to the size of the Internet and is adapted to the heterogeneity of today's Internet constituents.</li>
          </ul>
        </section>
        <section anchor="dependencies">
          <name>Dependencies</name>
          <t>Setting up the PKI in a freshly created Isolation Domain requires an initial trust bootstrapping process among some of the ISD members (i.e. a key exchange ceremony, and manual distribution of the initial ISD trust anchor).
As updates to the later roots of trust are automated, this process is in principle only required once.
In addition, certificate verification requires that PKI components can mutually communicate and have coarsely synchronized time.</t>
          <t>The CP PKI enables the verification of signatures, e.g., on path-segment construction beacons (PCBs).
It is built on top of a peculiar trust model, where entities are able to select their roots of trust.
It constitutes the most independent and self-contained core component, as it does not have significant dependencies on other SCION components.</t>
        </section>
        <section anchor="provided-to-other-components">
          <name>Provided to Other Components</name>
          <t>The PKI makes trust information available to the control plane through two elements:</t>
          <ul spacing="normal">
            <li>
              <em>Trust Root Configuration (TRC)</em>: The PKI provides well-defined per-ISD trust policies, in the form of a per-ISD Trust Root Configuration (TRC).
The TRC contains the ISD trust roots, and it is co-signed by multiple entities in a multilateral process called voting.</li>
            <li>
              <em>AS certificates</em>: For each Autonomous System that is part of an ISD, the PKI provides an AS certificate that is used by other components for authentication. It also provides a validation path up to the ISD trust root, through intermediate CA certificates.</li>
          </ul>
          <t>SCION CP-PKI comprises an optional extension called DRKey, which enables efficient symmetric key derivation between any two entities in possession of AS certificates.
Such symmetric keys are used for additional authentication mechanisms for high-rate data-plane traffic and some control messages.
As authentication based on digital signatures only scales well for relatively low message rates, using symmetric keys makes sure that the performance requirements for the high message rate of the data plane can be met.
For more information, refer to the extension draft <xref target="I-D.garciapardo-drkey"/>.</t>
          <t>The trust model and certificates provided could be used not only by the SCION control plane but also other systems and protocols.</t>
        </section>
        <section anchor="pki-related">
          <name>Relationship to Existing Protocols</name>
          <t>The CP-PKI is based on certificates that use the X.509v3 standard <xref target="RFC5280"/>. There are already several professional industry-grade implementations.</t>
          <t>The SCION trust model differs from existing PKIs in two ways.
First, no entity is globally omnipotent, as Isolation Domains elect their own locally scoped root of trust.
Second, changes to the trust roots require a voting process, making governance multilateral and each trust root resilient to the compromise of some of its keys.</t>
          <t>These properties would be lost if SCION were to rely on an existing PKI (i.e., the web PKI, the RPKI, ...).
For example, if SCION were to use the RPKI instead of the CP-PKI, the control plane would lack the trust model required for Isolation Domains.
This is because RPKI's trust model follows the same structure as the IP allocation hierarchy, where the five RIRs represent the trust roots.
Within SCION, RPKI is instead used to secure some of its transition mechanisms, as later explained in <xref target="transition-mechanisms"/>.</t>
          <t>In conclusion, SCION is built around a unique trust model, justifying the existence of the CP-PKI.</t>
        </section>
      </section>
      <section anchor="routing-control-plane">
        <name>Routing - Control Plane</name>
        <t>The SCION control plane's main purpose is to securely discover and disseminate routing information.
Path exploration is based on path-segment construction beacons (PCBs), which are initiated by a subset of ASes and accumulate cryptographically protected path forwarding information.
Each AS selects a few PCBs and makes them available to end hosts via its path service, part of the control plane.</t>
        <t>Overall, the Control Plane takes an unexplored topology and AS certificates as input, it then discovers the inter-domain topology and makes routing information available to end hosts.</t>
        <t>The following section describes the core properties provided by the SCION control plane, its relationships with existing protocols, and its dependencies on the PKI.
For an overview of the process to create and disseminate path information, refer to <xref target="I-D.dekater-scion-overview"/>, section 1.2.2.
The control plane is internally formed by multiple sub-components (as the beacon service, responsible for path discovery, and the path service, responsible for path dissemination).
Processes and interfaces specifications between these sub-components could be topic for one or multiple dedicated documents.</t>
        <section anchor="key-properties-1">
          <name>Key Properties</name>
          <ul spacing="normal">
            <li>
              <em>Massively multipath.</em> When exploring paths through beaconing, SCION ASes can select PCBs according to their policies, and register the corresponding path segments, making them available to other ASes and end hosts.
SCION hosts can leverage a wide range of (possibly disjoint) inter-domain paths, based on application requirements or path conditions.
This goes beyond the capabilities of existing multipath mechanisms, such as BGP ADD-PATH <xref target="RFC7911"/>, that is focusing on advertising multiple paths for the same prefix to provide a backup path.</li>
            <li>
              <em>Scalability.</em> The SCION's beaconing algorithm is scalable and efficient due to the following reasons: The routing process is divided into a process within each ISD (intra-ISD) and one between ISDs (inter-ISD), SCION beaconing does not need to iteratively converge, and SCION makes AS-based announcements instead of IP prefix-based announcements.
Scalability of the routing process is fundamental not only to support network size growth but also to quickly react to failures.
An in-depth study of SCION's scalability in comparison to BGP is available in <xref target="KRAHENBUHL2022"/>.</li>
            <li>
              <em>Convergence time.</em> Since routing decisions are decoupled from the dissemination of path information, SCION features faster convergence times than path-vector protocols.
Path information is propagated across the network by PCBs in times that are within the same order of magnitude of network round trip time.
In addition, the division of the beaconing process into intra- and inter-ISD helps in speeding up global distribution of routing information.
This means that SCION can restore global reachability, even after catastrophic failures, within tens of seconds.</li>
            <li>
              <em>Hop-by-hop path authorization.</em> SCION packets can only be forwarded along authorized path segments.
This is achieved thanks to message authentication codes (MACs) within each hop field.
During beaconing, each AS's control plane creates nested MACs, which are then verified during forwarding.
This gives end hosts strong guarantees about the path where the data is routed, with minimal overhead and resource requirements on routers.
Giving end hosts strong guarantees about the full inter-domain path is important to avoid traffic interception, and to enable geofencing (i.e., keeping data in transit within a well-defined trusted area of the global Internet).
This facilitated early adoption in the finance industry.</li>
            <li>
              <em>Host addressing agnostic.</em> SCION decouples routing from end-host addressing: inter-domain routing is based on ISD-AS tuples rather than on end-host addresses.
This design decision has two outcomes: First of all, SCION can reuse existing host addressing schemes, such as IPv6, IPv4, or others.
Second, the control plane does not carry prefix information.
Thanks to PCFS, packets contain forwarding state, so routers do not need to look up routing tables (avoiding the need for dedicated hardware).</li>
            <li>
              <em>Transparency.</em> SCION end hosts have full visibility of the inter-domain path where their data is forwarded. This is a property that is missing in traditional IP networks, where routing decisions are made by each hop, therefore end hosts have no visibility nor guarantees on where their traffic is going.
Additionally, SCION users have visibility on the roots of trust that are used to forward traffic. SCION, therefore, makes it harder to redirect traffic through an adversary's vantage point.
Moreover, SCION gives end users the ability to select which parts of the Internet to trust. This is particularly relevant for workloads that currently use segregated networks.</li>
            <li>
              <em>Fault isolation.</em> As the SCION routing process is hierarchically divided into intra-ISD and inter-ISD, faults have a generally limited and localized impact.
Misconfigurations, such as an erroneous path policy, may suppress some paths. However, as long as an alternative path exists, communication is possible.
In addition, while the control plane is responsible for creating new paths, it does not invalidate existing paths.
The latter function is handled by end hosts upon detecting failures or eventually receiving an SCMP message from the data plane.
This separation of control and data plane prevents the control plane from cutting off an existing communication or having a global kill-switch.</li>
          </ul>
        </section>
        <section anchor="dependencies-1">
          <name>Dependencies</name>
          <t>The SCION control plane requires the control-plane PKI to authenticate path information.
It heavily relies on certificates provided by the CP-PKI for beaconing (i.e., for authenticating routing information).
Each Isolation Domain requires its own root of trust, in the form of a TRC, in order to carry out path exploration and dissemination.</t>
          <t>While in principle the control plane could use certificates provided by another PKI, it would be severely affected by a lack of the ISD concept.
All security properties related to the trust model would be affected.
The concept of ISD is also necessary for scalability and fault isolation to organize the routing process into a two-tiered architecture.</t>
          <t>In conclusion, the control plane depends on the CP-PKI. If it were to be used with another PKI, it would lose several of its fundamental properties.</t>
        </section>
        <section anchor="provided-to-other-components-1">
          <name>Provided to Other Components</name>
          <t>In SCION, an end host sending a packet must specify, in the header, the full SCION forwarding path the packet takes towards the destination.
This concept is called packet-carried forwarding state (PCFS).
Rather than having knowledge of the network topology, an end host's data plane relies on the control plane for getting such information.
The end host stack queries path segments, then it selects them and combines them into a full forwarding path to the destination.</t>
          <t>The control plane is responsible, therefore, for providing an authenticated (multipath) view of the explored global topology to end hosts (and, in turn, to the data plane).
In addition, it provides the data plane the ability to send authenticated control messages.
The "interfaces" towards the data plane are represented by:</t>
          <ul spacing="normal">
            <li>
              <em>Path segments</em>, that are provided to end hosts and used by SCION routers for forwarding.
Segments are designed so that each AS data plane can independently verify its own segments, while globally achieving full path authorization.</li>
            <li>
              <em>SCMP.</em> SCION control-plane messages are by default all authenticated.
In addition to beacons, the control plane offers the SCION Control Message Protocol (SCMP).
It is analogous to ICMP, and it provides functionality for network diagnostics, such as ping and traceroute, and authenticated error messages that signal packet processing or network layer problems.
SCMP is the first control message protocol that supports the authentication of network control messages, preventing that unauthenticated control messages can potentially be used to affect or even prevent traffic forwarding.
SCMP is used, for example, by the data plane to achieve path revocation.</li>
          </ul>
        </section>
        <section anchor="relationship-to-existing-protocols">
          <name>Relationship to Existing Protocols</name>
          <t>At first sight, it might seem that the SCION control plane takes care of similar duties as existing routing protocols.
While both focus on disseminating routing information, there are substantial differences in their mechanisms and properties offered.</t>
          <t>The SCION control plane was designed to carry out inter-domain routing, while intra-domain routing (and forwarding) are intentionally left out of scope.
Existing IGPs are used within an AS, allowing the reuse of existing intra-domain routing infrastructure and reducing the amount of changes required for deployment.</t>
          <t>End-host addressing is decoupled from routing.
Similar to LISP <xref target="RFC6830"/>, SCION separates routing, that is based on locator (an ISD-AS tuple), and host identifiers (e.g., IPv6, IPv4, ...).
While the two architectures have this concept in common, there are notable differences.
SCION brings improvements to inter-domain routing and provides secure multipath, while LISP provides a framework to build overlays on top of the existing Internet.
In addition, LISP security proposals focus on protecting identifier to locator mappings, while SCION focuses on securing inter-domain routing.
Lastly, identifier to locator mapping in SCION not part of the core components, rather it is left to some of its transition mechanisms, later described in <xref target="transition-mechanisms"/>.</t>
          <t>The above-mentioned decoupling also implies that SCION does not provide, by design, IP prefix origin validation, which is currently provided by RPKI <xref target="RFC8210"/>.
As prefix origin validation is outside of SCION's scope, IP-to-SCION's coexistence mechanisms (SIAM, SBAS) later discussed in <xref target="transition-mechanisms"/> build on top of RPKI for IP origin attestation.</t>
          <t>Additionally, the SCION control plane design takes into account some of the lessons learned discussed in <xref target="RFC9049"/>: It does not try to outperform end-to-end mechanisms, as path selection is performed by end hosts. SCION, therefore, can leverage existing end-to-end mechanisms to switch paths, rather than compete with them. In addition, no single component in the architecture needs to keep connection state, as this task is pushed to end hosts.</t>
          <t>One last point is that several of the SCION control plane properties and key mechanisms depend on the fact that SCION ASes are grouped into Isolation Domains (ISDs).
For example, ISDs are fundamental to achieving transparency, routing scalability, fault isolation, and fast propagation of routing information.
No existing protocol provides such a concept, motivating the existence of the control plane.</t>
        </section>
      </section>
      <section anchor="data-plane">
        <name>Forwarding - Data Plane</name>
        <t>The SCION data plane is responsible for inter-domain packet forwarding between ASes.
SCION routers are deployed at their network edge.
They receive and validate SCION packets from neighbors, then they use their intra-domain forwarding information to transmit packets to the next border router or SCION end host.</t>
        <t>SCION packets are at the network layer (layer-3), and the SCION header sits in between the transport and link layer.
The header contains a variable type and length end-host address, and can therefore carry any address (IPv4, IPv6, ...).
In addition, end-host addresses only need to be unique within an AS, and can be, in principle, reused.</t>
        <section anchor="key-properties-2">
          <name>Key Properties</name>
          <ul spacing="normal">
            <li>
              <em>Path selection.</em> In SCION, end hosts select inter-domain network paths, rather than routers. The end hosts are empowered to make end-to-end path choices based on application requirements.
This means that routers do not carry the burden of making enhanced routing or forwarding decisions.</li>
            <li>
              <em>Scalability.</em> SCION routers can efficiently forward packets without the need to look up forwarding tables or keep per-connection state. Routers only need to verify MACs in hop fields. This operation is based on modern block ciphers such as AES, can be computed faster than performing a memory lookup, and is widely supported in modern CPUs.
Routers, therefore, do not require expensive and energy-intensive dedicated hardware and can be deployed on off-the-shelf hardware. The lack of forwarding tables also implies that the growing size of forwarding tables is of no concern to SCION. Additionally, routers that keep state of network information can suffer from denial-of-service (DoS) attacks exhausting the router's state <xref target="SCHUCHARD2011"/>, which is less of a problem to SCION.</li>
            <li>
              <em>Recovery from failures.</em> SCION hosts usually receive more than one path to a given destination.
Each host can select (potentially disjoint) backup paths that are available in case of failure.
In contrast to the IP-based Internet, SCION packets are not dynamically rerouted by the network in case of failures.
Routers use BFD <xref target="RFC5880"/> to detect link failures, and in case they cannot forward a packet, they send an authenticated SCMP message triggering path revocation.
End hosts can use this information, or perform active monitoring, to quickly reroute traffic in case of failures.
There is therefore no need to wait for inter-domain routing protocol convergence.</li>
            <li>
              <em>Extensibility.</em> SCION, similarly to IPv6, supports extensions in its header.
Such extensions can be hop-by-hop (and are processed at each hop), or end-to-end.</li>
            <li>
              <em>Path validation.</em> SCION routers validate network paths in packets at each hop, so that they are only forwarded along paths that were authorized by all on-path ASes in the control plane. Thanks to a system of nested message authentication codes, traffic hijacking attacks are avoided.</li>
          </ul>
          <t>In conclusion, in comparison to today's Internet, the SCION's data plane pushes some of the responsibilities away from routers onto end hosts (such as selecting paths or reacting to failures).
This contributes to creating a data plane that is more efficient and scalable, and that does not require routers with specialized routing table lookup hardware.
Routers validate network paths so that packets are only forwarded on previously authorized paths.</t>
        </section>
        <section anchor="dependencies-2">
          <name>Dependencies</name>
          <t>The data plane is generally decoupled from the control plane.
To be able to transmit data, end hosts need to fetch path information from their AS control plane.
In addition, some operations (such as path revocation) require the data plane to be able to use an authenticated control-plane mechanism, such as SCMP.</t>
          <t>Path information is assumed to be fresh and validated by the control plane, which in turn relies on the CP-PKI for validation.
The data plane, therefore, relies on both the control plane and indirectly on the CP-PKI to function.</t>
          <t>Should the data plane be used independently, without end-to-end path validation, SCION would lose many of its security properties, which are fundamental in an inter-domain scenario where entities are mutually distrustful.
As discussed in <xref target="RFC9049"/>, lack of authentication has often been the cause for path-aware protocols never being adopted because of security concerns. SCION should avoid such pitfalls and therefore its data plane should rely on the corresponding control plane and control-plane PKI.</t>
        </section>
        <section anchor="provided-to-other-components-2">
          <name>Provided to Other Components</name>
          <t>The SCION data plane provides path-aware connectivity to applications.
The SCION stack on an end host, therefore, takes application requirements as an input (i.e., latency, bandwidth, a list of trusted ASes, ... ), and crafts packets containing an appropriate path to a given destination.</t>
          <t>How to expose capabilities of path-aware networking to upper layers remains an open question.
PANAPI (Path-Aware Networking API) <xref target="slides-113-taps-panapi"/> is being evaluated as a way of making path-awareness and multipath available to the transport layer at end hosts, using the TAPS abstraction layer.</t>
        </section>
        <section anchor="relationship-to-existing-protocols-1">
          <name>Relationship to Existing Protocols</name>
          <t>SCION is an inter-domain network architecture and as such its data plane does not interfere with intra-domain forwarding.
This corresponds to the practice today where ASes use an intra-domain protocol of their choice (i.e., OSPF, IS-IS, MPLS, ...).
For example, in some of the early deployments, intra-AS SCION packets are encapsulated into an IP/UDP datagram, reusing the network's existing IGP internal data plane.
SCION, therefore, re-uses the intra-domain network fabric to provide connectivity among its infrastructure services, border routers, and end hosts, minimizing changes to the internal infrastructure.</t>
          <t>Given its path-aware properties, some of SCION's data plane characteristics might seem similar to the ones provided by Segment Routing (SR) <xref target="RFC8402"/>.
There are, however, fundamental differences that distinguish and motivate SCION.
The most salient one is that Segment Routing is designed to be deployed across a single trusted domain. SR, therefore, does not focus on security, which remains an open question, as outlined in <xref target="I-D.spring-srv6-security-consideration"/>.
SCION, instead, is designed from the start to facilitate inter-domain communication between (potentially mutually distrustful) entities. It comes, therefore, with built-in security measures to prevent attacks (i.e., authenticating all control-plane messages and all critical fields in the data-plane header).
Rather than compete, SCION and SR complement each other.
SCION relies on existing intra-domain routing protocols, therefore SR can be one of the possible intra-domain forwarding mechanisms.
Possible integration of its path-aware properties with SR remains for now an open question.</t>
          <t>In conclusion, thanks to its data plane, SCION achieves properties that are difficult to achieve when exclusively extending existing protocols.</t>
        </section>
      </section>
    </section>
    <section anchor="additional-components">
      <name>Additional Components</name>
      <t>This document mainly focuses on describing the fundamental components needed to run a minimal SCION network.
Beyond that, SCION comprises several extensions and transition mechanisms that provide additional properties, such as improved incremental deployability, security, and additional features.
For the sake of completeness, this paragraph briefly mentions some of these transition mechanisms and extensions.</t>
      <section anchor="transition-mechanisms">
        <name>Transition Mechanisms</name>
        <t>As presented in <xref target="I-D.dekater-scion-overview"/>, incremental deployability is a focus area of SCION's design.
It comprises transition mechanisms that allow partial deployment and coexistence with existing protocols.
These mechanisms require different levels of changes in existing systems and have different maturity levels (from production-grade to research prototype).
Rather than describing how each mechanism works, this document provides a short summary of each approach, focusing on its functions and properties, as well as on how it reuses, extends, or interacts with existing protocols.</t>
        <ul spacing="normal">
          <li>
            <em>SCION-IP-Gateway (SIG).</em> A SCION-IP-Gateway (SIG) encapsulates regular IP packets into SCION packets with a corresponding SIG at the destination that performs the decapsulation.
This mechanism enables IP end hosts to benefit from a SCION deployment by transparently obtaining improved security and availability properties.
SCION routing policies can be configured on SIGs, in order to select appropriate SCION paths based on application requirements.
SIGs can dynamically exchange prefix information, currently using their own encapsulation and prefix exchange protocol.
This does not exclude reusing existing protocols in the future.
SIGs are deployed in production SCION networks, and there are commercial implementations.</li>
          <li>
            <em>SIAM.</em> To make SIGs a viable transition mechanism in an Internet-scale network with tens of thousands of ASes, an automatic configuration system is required.
SIAM creates mappings between IP prefixes and SCION addresses, relying on the authorizations in the Resource Public Key Infrastructure (RPKI).
SIAM is currently a research prototype, further described in <xref target="SUPRAJA2021"/>.</li>
          <li>
            <em>SBAS</em> is an experimental architecture aiming at extending the benefits of SCION (in terms of performance and routing security) to potentially any IP host on the Internet.
SBAS consists of a federated backbone of entities. SBAS appears on the outside Internet as a regular BGP-speaking AS.
Customers of SBAS can leverage the system to route traffic across the SCION network according to their requirements (i.e., latency, geography, ... ).
SBAS contains globally distributed PoPs that advertise its customer's announcements.
SBAS relies on RPKI to validate IP prefix authorization.
Traffic is therefore routed as close as possible to the source onto the SCION network. The system is further described in <xref target="BIRGLEE2022"/>.</li>
        </ul>
      </section>
      <section anchor="extensions-and-other-components">
        <name>Extensions and Other Components</name>
        <t>In addition to transition mechanisms, there are other proposed extensions, that build upon the three SCION core components described earlier in this document.
DRKey <xref target="I-D.garciapardo-drkey"/> is a SCION extension that provides an Internet-wide key-establishment system allowing any two hosts to efficiently derive a symmetric key. This extension can be leveraged by other components to provide additional security properties.
For example, LightningFilter <xref target="slides-111-panrg-lightning-filter"/> leverages DRKey to provide high-speed packet filtering between trusted SCION ASes.
COLIBRI <xref target="GIULIARI2021"/> is SCION's inter-domain bandwidth reservation system.
These additional components are briefly mentioned here in order to provide additional context.
They are therefore unlikely to be the best candidates for future IETF work.</t>
      </section>
    </section>
    <section anchor="component-dependencies-summary">
      <name>Component Dependencies Summary</name>
      <t><xref target="components"/> briefly summarises on a high level the dependencies between SCION's core components discussed in the previous paragraphs.</t>
      <figure anchor="components">
        <name>Dependencies overview</name>
        <artwork><![CDATA[
                                  * Initial trust ceremony
                                  * Loose time synchronization
                                  * Communication
                  ┌────────────────────────────┐
                  │     Control Plane PKI      │
                  └────────────────────────────┘
                                 │ * TRC
                                 ▼ * AS Certificates
                  ┌────────────────────────────┐
                  │       Control Plane        │
                  └────────────────────────────┘
                                 │ * Path segments
                                 ▼ * SCMP
                  ┌────────────────────────────┐
                  │         Data Plane         │
                  └────────────────────────────┘
                                 │ * Secure  inter-domain paths
                                 ▼ to destination
                  ┌────────────────────────────┐
                  │  Applications on end host  │
                  └────────────────────────────┘
]]></artwork>
      </figure>
      <t>Overall, the control plane PKI represents the most independent building block, as it does not rely on other SCION components.
The control plane relies on the trust model and on certificate material provided by the PKI.
It provides the data plane with path segments, that are then used at forwarding, and with SCMP, that is used for secure error messages.
The data plane makes multipath communication available to applications on SCION end hosts.</t>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>This document describes the three fundamental SCION core components, together with their properties and dependencies.
It highlights how such components allow SCION to provide unique properties. It then discusses how the main components are interlinked, to foster a discussion on the standardization of key components.
The authors welcome feedback from the IETF community for future iterations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins">
            <organization/>
          </author>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG).  At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RFC7911">
        <front>
          <title>Advertisement of Multiple Paths in BGP</title>
          <author fullname="D. Walton" initials="D." surname="Walton">
            <organization/>
          </author>
          <author fullname="A. Retana" initials="A." surname="Retana">
            <organization/>
          </author>
          <author fullname="E. Chen" initials="E." surname="Chen">
            <organization/>
          </author>
          <author fullname="J. Scudder" initials="J." surname="Scudder">
            <organization/>
          </author>
          <date month="July" year="2016"/>
          <abstract>
            <t>This document defines a BGP extension that allows the advertisement of multiple paths for the same address prefix without the new paths implicitly replacing any previous ones.  The essence of the extension is that each path is identified by a Path Identifier in addition to the address prefix.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7911"/>
        <seriesInfo name="DOI" value="10.17487/RFC7911"/>
      </reference>
      <reference anchor="RFC5880">
        <front>
          <title>Bidirectional Forwarding Detection (BFD)</title>
          <author fullname="D. Katz" initials="D." surname="Katz">
            <organization/>
          </author>
          <author fullname="D. Ward" initials="D." surname="Ward">
            <organization/>
          </author>
          <date month="June" year="2010"/>
          <abstract>
            <t>This document describes a protocol intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and to the extent possible the forwarding engines themselves, with potentially very low latency.  It operates independently of media, data protocols, and routing protocols. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5880"/>
        <seriesInfo name="DOI" value="10.17487/RFC5880"/>
      </reference>
      <reference anchor="RFC8402">
        <front>
          <title>Segment Routing Architecture</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
            <organization/>
          </author>
          <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi">
            <organization/>
          </author>
          <author fullname="L. Ginsberg" initials="L." surname="Ginsberg">
            <organization/>
          </author>
          <author fullname="B. Decraene" initials="B." surname="Decraene">
            <organization/>
          </author>
          <author fullname="S. Litkowski" initials="S." surname="Litkowski">
            <organization/>
          </author>
          <author fullname="R. Shakir" initials="R." surname="Shakir">
            <organization/>
          </author>
          <date month="July" year="2018"/>
          <abstract>
            <t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called "segments".  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
            <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t>
            <t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8402"/>
        <seriesInfo name="DOI" value="10.17487/RFC8402"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper">
            <organization/>
          </author>
          <author fullname="S. Santesson" initials="S." surname="Santesson">
            <organization/>
          </author>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen">
            <organization/>
          </author>
          <author fullname="R. Housley" initials="R." surname="Housley">
            <organization/>
          </author>
          <author fullname="W. Polk" initials="W." surname="Polk">
            <organization/>
          </author>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC6830">
        <front>
          <title>The Locator/ID Separation Protocol (LISP)</title>
          <author fullname="D. Farinacci" initials="D." surname="Farinacci">
            <organization/>
          </author>
          <author fullname="V. Fuller" initials="V." surname="Fuller">
            <organization/>
          </author>
          <author fullname="D. Meyer" initials="D." surname="Meyer">
            <organization/>
          </author>
          <author fullname="D. Lewis" initials="D." surname="Lewis">
            <organization/>
          </author>
          <date month="January" year="2013"/>
          <abstract>
            <t>This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs).  No changes are required to either host protocol stacks or to the "core" of the Internet infrastructure.  The Locator/ID Separation Protocol (LISP) can be incrementally deployed, without a "flag day", and offers Traffic Engineering, multihoming, and mobility benefits to early adopters, even when there are relatively few LISP-capable sites.</t>
            <t>Design and development of LISP was largely motivated by the problem statement produced by the October 2006 IAB Routing and Addressing Workshop.  This document defines an Experimental Protocol for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6830"/>
        <seriesInfo name="DOI" value="10.17487/RFC6830"/>
      </reference>
      <reference anchor="RFC8210">
        <front>
          <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
          <author fullname="R. Bush" initials="R." surname="Bush">
            <organization/>
          </author>
          <author fullname="R. Austein" initials="R." surname="Austein">
            <organization/>
          </author>
          <date month="September" year="2017"/>
          <abstract>
            <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
            <t>This document describes version 1 of the RPKI-Router protocol.  RFC 6810 describes version 0.  This document updates RFC 6810.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8210"/>
        <seriesInfo name="DOI" value="10.17487/RFC8210"/>
      </reference>
      <reference anchor="SCHUCHARD2011">
        <front>
          <title>Losing control of the internet: using the data plane to attack the control plane</title>
          <author fullname="Max Schuchard" initials="M." surname="Schuchard">
            <organization/>
          </author>
          <author fullname="Abedelaziz Mohaisen" initials="A." surname="Mohaisen">
            <organization/>
          </author>
          <author fullname="Denis Foo Kune" initials="D." surname="Foo Kune">
            <organization/>
          </author>
          <author fullname="Nicholas Hopper" initials="N." surname="Hopper">
            <organization/>
          </author>
          <author fullname="Yongdae Kim" initials="Y." surname="Kim">
            <organization/>
          </author>
          <author fullname="Eugene Y. Vasserman" initials="E." surname="Vasserman">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <seriesInfo name="Proceedings of the 17th ACM conference on Computer and communications security - CCS" value="'10"/>
        <seriesInfo name="DOI" value="10.1145/1866307.1866411"/>
      </reference>
      <reference anchor="I-D.dekater-scion-overview" target="https://datatracker.ietf.org/doc/draft-dekater-panrg-scion-overview/">
        <front>
          <title>SCION Overview</title>
          <author initials="C." surname="de Kater" fullname="Corine de Kater">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="I-D.dekater-scion-pki" target="https://datatracker.ietf.org/doc/draft-dekater-scion-pki/">
        <front>
          <title>SCION Overview</title>
          <author initials="C." surname="de Kater" fullname="Corine de Kater">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="I-D.spring-srv6-security-consideration" target="https://datatracker.ietf.org/doc/draft-li-spring-srv6-security-consideration/">
        <front>
          <title>Security Considerations for SRv6 Networks</title>
          <author initials="C." surname="Li">
            <organization/>
          </author>
          <author initials="Z." surname="Li">
            <organization/>
          </author>
          <author initials="C." surname="Xie">
            <organization/>
          </author>
          <author initials="H." surname="Tian">
            <organization/>
          </author>
          <author initials="J." surname="Mao">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="slides-113-taps-panapi" target="https://datatracker.ietf.org/meeting/113/materials/slides-113-taps-panapi-implementation-00.pdf">
        <front>
          <title>PANAPI, a Path-Aware Networking API</title>
          <author initials="T." surname="Krüger">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="slides-111-panrg-lightning-filter" target="https://datatracker.ietf.org/meeting/111/materials/slides-111-panrg-lightning-filter-high-speed-traffic-filtering-based-on-drkey-00.pdf">
        <front>
          <title>Lightning Filter: High-Speed Traffic Filtering based on DRKey</title>
          <author initials="J. A." surname="Garcia Pardo">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="I-D.garciapardo-drkey" target="https://datatracker.ietf.org/doc/draft-garciapardo-panrg-drkey/">
        <front>
          <title>Dynamically Recreatable Keys</title>
          <author initials="J." surname="Pardo" fullname="Juan A. García Pardo Giménez de los Galanes">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="B." surname="Rothenberger" fullname="Benjamin Rothenberger">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="KRAHENBUHL2022" target="https://netsec.ethz.ch/publications/papers/2021_conext_deployment.pdf">
        <front>
          <title>Deployment and Scalability of an Inter-Domain Multi-Path Routing Infrastructure</title>
          <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="S." surname="Tabaeiaghdaei" fullname="Seyedali Tabaeiaghdaei">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="C." surname="Glοοr" fullname="Christelle Glοοr">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="J." surname="Kwon" fullname="Jonghoon Kwon">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Hausheer" fullname="David Hausheer">
            <organization>OVGU Magdeburg</organization>
          </author>
          <author initials="D." surname="Roos" fullname="Dominik Roos">
            <organization>Anapaya Systems</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="GIULIARI2021" target="https://netsec.ethz.ch/publications/papers/2021_conext_colibri.pdf">
        <front>
          <title>Colibri: A Cooperative Lightweight Inter-domain Bandwidth-Reservation Infrastructure</title>
          <author initials="G." surname="Giuliari" fullname="Giacomo Giuliari">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Roos" fullname="Dominik Roos">
            <organization>Anapaya Systems</organization>
          </author>
          <author initials="M." surname="Wyss" fullname="Marc Wyss">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="J." surname="García-Pardo" fullname="Juan Angel García-Pardo">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="BIRGLEE2022" target="https://www.usenix.org/conference/usenixsecurity22/presentation/birge-lee">
        <front>
          <title>Creating a Secure Underlay for the Internet</title>
          <author initials="H." surname="Birge-Lee">
            <organization>Princeton University</organization>
          </author>
          <author initials="J." surname="Wanner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="G. H." surname="Cimaszewski">
            <organization>Princeton University</organization>
          </author>
          <author initials="J." surname="Kwon">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="L." surname="Wang">
            <organization>Princeton University</organization>
          </author>
          <author initials="F." surname="Wirz">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="P." surname="Mittal">
            <organization>Princeton University</organization>
          </author>
          <author initials="A." surname="Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="Y." surname="Sun">
            <organization>University of Virginia</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
        <front>
          <title>The Complete Guide to SCION</title>
          <author initials="L." surname="Chuat" fullname="Laurent Chuat">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Basin" fullname="David Basin">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Hausheer" fullname="David Hausheer">
            <organization>Otto von Guericke University Magdeburg</organization>
          </author>
          <author initials="S." surname="Hitz" fullname="Samuel Hitz">
            <organization>Anapaya Systems</organization>
          </author>
          <author initials="P." surname="Mueller" fullname="Peter Mueller">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
        <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
      </reference>
      <reference anchor="SUPRAJA2021" target="https://netsec.ethz.ch/publications/papers/sridhara_taurin2021_siam.pdf">
        <front>
          <title>Global Distributed Secure Mapping of Network Addresses</title>
          <author initials="S." surname="Supraja" fullname="Supraja Sridhara">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="F." surname="Wirz" fullname="François Wirz">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="J." surname="de Ruiter" fullname="Joeri de Ruiter">
            <organization>SIDN Labs</organization>
          </author>
          <author initials="C." surname="Schutijser" fullname="Caspar Schutijser">
            <organization>SIDN Labs</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="PANRG-INTERIM-Min" target="https://datatracker.ietf.org/meeting/interim-2022-panrg-01/materials/minutes-interim-2022-panrg-01-202206011700-00">
        <front>
          <title>Path Aware Networking Research Group - Interim  106 Minutes</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="June"/>
        </front>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors are indebted to Adrian Perrig, Laurent Chuat,
Markus Legner, David Basin, David Hausheer, Samuel Hitz, and Peter
Mueller, for writing the book "The Complete Guide to SCION"
<xref target="CHUAT22"/>, which provides the background information needed to write
this document.
Many thanks also to Francois Wirz and Juan A. Garcia-Pardo for reviewing this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
