<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.25 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rustignoli-panrg-scion-components-02" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="SCION COMP I-D">SCION Components Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-rustignoli-panrg-scion-components-02"/>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>SCION Association</organization>
      <address>
        <email>nic@scion.org</email>
      </address>
    </author>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>SCION Association</organization>
      <address>
        <email>cdk@scion.org</email>
      </address>
    </author>
    <date year="2023" month="March" day="10"/>
    <area>IRTF</area>
    <workgroup>Path Aware Networking RG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>SCION is an inter-domain Internet architecture that focuses on security and availability. Its fundamental functions are carried out by a number of components.</t>
      <t>This document analyzes its core components from a functionality perspective, describing their dependencies, outputs, and properties provided.
The goal is to answer the following questions:</t>
      <ul spacing="normal">
        <li>What are the main components of SCION and their dependencies? Can they be used independently?</li>
        <li>What existing protocols are reused or extended? Why (or why not)?</li>
      </ul>
      <t>In addition, it focuses on the properties achievable, motivating cases when a greenfield approach is used.
It then briefly touches on the maturity level of components and some extensions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-components_I-D/draft-rustignoli-panrg-scion-components.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rustignoli-panrg-scion-components/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Path Aware Networking RG Research Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://www.ietf.org/mail-archive/web/panrg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/panrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-components_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>While SCION was initially developed in academia, the architecture has now "slipped out of the lab" and counts its early productive deployments (including the Swiss inter-banking network SSFN).
The architecture consists of a system of related components, some of which are essential to set up end-to-end SCION connectivity.
Core components are the data plane, the control plane, and the PKI. Add-ons provide additional functionality, security, or backward compatibility. Discussions at PANRG <xref target="PANRG-INTERIM-Min"/> showed the need to describe the relationships between components.
This document, therefore, takes a look at each core component individually and independently from others.
It focuses on describing its dependencies, outputs, functionality, and properties.
It then touches on relationships to existing protocols.
The goal is not to describe each component's specification, but to illustrate the engineering decisions that made SCION what it is and to provide a basis for further discussions and work.</t>
      <t>Before reading this document, please refer to <xref target="I-D.dekater-scion-overview"/> for a generic overview of SCION and its components, the problems it solves, and existing deployments. Each component is to be described in-depth in dedicated drafts: see <xref target="I-D.dekater-scion-pki"/> for the SCION PKI specification, and refer to <xref target="CHUAT22"/> for other components.</t>
      <section anchor="design-goals">
        <name>Design Goals</name>
        <t>SCION was created from the start with the intention to provide the following properties for inter-domain communication.</t>
        <ul spacing="normal">
          <li>
            <em>Availability</em>. SCION aims to provide highly available communication. Its focus is not only on quickly handling failures (both on the last hop or anywhere along the path) but also on allowing communication in the presence of adversaries.
Availability is fundamental as applications move to cloud data centers, and enterprises increasingly rely on the Internet for mission-critical communication.</li>
          <li>
            <em>Security</em>. SCION comes with an arsenal of mechanisms, designed by security researchers with the goal of making most network-based and routing attacks either impossible or easy to mitigate.
SCION strongly focuses on preventing routing attacks, IP prefix hijackings, and on providing stronger guarantees than the existing Internet. Security is tightly related to trust.
SCION, therefore, offers a new trust model, transparency, and control to endpoints over forwarding paths. In addition, SCION's design starts from the assumption that any two entities on the global Internet do not mutually trust each other. SCION, therefore, enables trust agility, allowing its users to decide the roots of trust they wish to rely upon.</li>
          <li>
            <em>Scalability</em>. Security and high availability should not result in compromises on scalability.
At the same time, a next-generation Internet architecture should scale with global network growth and avoid limitations related to forwarding table size.
The S in SCION, indeed, stands for scalability. The architecture proposes a design that is scalable both in the control plane and in the data plane (as described later in the document).</li>
        </ul>
        <t>Many research efforts have analyzed whether such properties could be achieved by extending the existing Internet architecture. As described for each core component in the following paragraphs, tradeoffs between properties would be unavoidable when exclusively relying on or extending existing protocols.</t>
      </section>
    </section>
    <section anchor="minimal-stack-core-components">
      <name>Minimal Stack - Core Components</name>
      <t>To establish end-to-end connectivity, SCION relies on three main components.</t>
      <ul spacing="normal">
        <li>Data plane: it carries out secure packet forwarding, providing path-aware inter-domain connectivity.</li>
        <li>Control plane: it performs inter-domain routing by discovering and securely disseminating path information.</li>
        <li>PKI: it handles cryptographic material and provides a unique trust model.</li>
      </ul>
      <t>A SCION network is formed of multiple interconnected administrative domains, called SCION autonomous systems (AS). Each AS deploys all of the three components above.
Implementations of all of the above components are deployed in production (e.g., they are in use within the SSFN, the Swiss Finance Network). There are commercial implementations (including a high-performance data plane).</t>
      <t>A SCION packet is sent through a SCION network by SCION endpoints (i.e., a network host). It is then forwarded between ASes by the SCION data plane, which authenticates packets at each hop.
The control plane is responsible for discovering and disseminating routing information. Path discovery is performed by each AS thanks to an authenticated path-exploration mechanism called beaconing.
SCION endpoints query their respective AS control plane and obtain authenticated and authorized network paths, in the form of path segments.
Endpoints select one or more of the end-to-end network paths, based on the application requirements (i.e., latency). Endpoints then craft SCION packets containing the end-to-end path to the destination.</t>
      <t>The control plane relies on the control-plane PKI (CP-PKI) for authentication (e.g., of path segments).
SCION's authentication mechanisms aim at protecting the whole end-to-end path at each hop.
Such mechanisms are based on a trust model that is provided by the concept of Isolation Domains (ISDs).
An ISD is a group of Autonomous Systems that independently defines its own roots of trust.
ISD members share therefore a uniform trust environment (i.e., a common jurisdiction). They can transparently define trust relationships between parts of the network by deciding whether to trust other ISDs. SCION trust model, therefore, differs from the one provided by other PKI architectures. The motivation behind this design choice is clarified in <xref target="pki"/>.</t>
      <t>The following paragraphs look at each component individually.
Rather than describing how each component works, they focus on each component's dependencies and properties provided to other components.
The idea is to try to think of each component as a black box, and look at its "inputs" and "outputs".</t>
      <section anchor="pki">
        <name>Authentication - SCION CP-PKI</name>
        <t>SCION's control plane messages and path information are all authenticated.
This helps SCION avoid some of the obstacles to deployment mentioned in <xref target="RFC9049"/>, where several path-aware methods failed to achieve deployment because of lack of authentication or lack of mutual trust between hosts and the intermediate network.
The verification of messages relies on a public-key infrastructure (PKI) called the control-plane PKI or CP-PKI.
It consists of a set of mechanisms, roles, and policies related to the management and usage of certificates, which enables the verification of signatures of, e.g., path-segment construction beacons (PCBs).
A detailed specification of the PKI is available in <xref target="I-D.dekater-scion-pki"/>.</t>
        <section anchor="key-properties">
          <name>Key Properties</name>
          <t>One might ask why SCION requires its own PKI, rather than reusing some of the existing PKI architectures to issue AS certificates.
Several properties distinguish the CP-PKI from others, and motivate SCION's distinct approach.</t>
          <ul spacing="normal">
            <li>
              <em>Locally scoped and flexible trust.</em> SCION is designed to securely connect ASes that do not necessarily share mutual trust.
This requires a trust model that is different from the ones that are behind commonly deployed PKIs.
In a monopolistic model, all entities trust one or a small number of roots of trust. In an oligopolistic model, there are multiple equally trusted roots (e.g., in the Web PKI).
In both models, some or all certification authorities are omnipotent. If their key is compromised, then the security of the entire system collapses.
Both models do not scale well to a global environment, because mutually distrustful entities cannot agree on a single root of trust (monopoly) and because in the oligopoly model, the security is as strong as its weakest root.
In the SCION CP-PKI, trust is locally scoped within each ISD, and the capabilities of each ISD (authentication-wise) are limited to the communication channels in which they are involved. Each ISD can define its own trust policy. ASes must accept the trust policy of the ISD(s) in which they participate, but they can decide which ISDs they want to join, and they can participate in multiple ISDs.</li>
            <li>
              <em>Resilience to compromised entities and keys.</em> Compromised or malicious trust roots outside an ISD cannot affect operations that stay within that ISD. Moreover, as trust roots (in the form of a TRC) can only be updated through a voting process, each ISD can be configured to withstand the compromise of a number of its root keys.</li>
            <li>
              <em>Multilateral governance.</em> The voting mechanism mentioned above makes sure that fundamental changes to the trust policies are only allowed with the consent of multiple entities administering an ISD.
Within an ISD, no single entity is in full control, or owns a cryptographic "kill-switch".</li>
            <li>
              <em>Support for versioning &amp; updates.</em> Trust within an ISD is normally bootstrapped with an initial ceremony. Subsequent updates to the root of trust (TRC) are handled automatically. The PKI design makes sure that certificate rollover can be automated so that certificates can be rotated frequently (e.g., every few days for AS certificates).</li>
            <li>
              <em>Scalability.</em> The authentication infrastructure scales to the size of the Internet and is adapted to the heterogeneity of today's Internet constituents.</li>
          </ul>
        </section>
        <section anchor="dependencies">
          <name>Dependencies</name>
          <t>Setting up the PKI in a freshly created Isolation Domain requires an initial trust bootstrapping process among some of the ISD members (i.e. a key exchange ceremony, and manual distribution of the initial ISD trust anchor).
As updates to the later roots of trust are automated, this process is in principle only required once.
In addition, certificate verification requires that PKI components can mutually communicate and have coarsely synchronized time.</t>
          <t>The CP PKI enables the verification of signatures, e.g., on path-segment construction beacons (PCBs).
It is built on top of a peculiar trust model, where entities are able to select their roots of trust.
It constitutes the most independent and self-contained core component, as it does not have significant dependencies on other SCION components.</t>
        </section>
        <section anchor="provided-to-other-components">
          <name>Provided to Other Components</name>
          <t>The PKI makes trust information available to the control plane through two elements:</t>
          <ul spacing="normal">
            <li>
              <em>Trust Root Configuration (TRC)</em>: The PKI provides well-defined per-ISD trust policies, in the form of a per-ISD Trust Root Configuration (TRC).
The TRC contains the ISD trust roots, and it is co-signed by multiple entities in a multilateral process called voting.</li>
            <li>
              <em>AS certificates</em>: For each Autonomous System that is part of an ISD, the PKI provides an AS certificate that is used by other components for authentication. It also provides a validation path up to the ISD trust root, through intermediate CA certificates.</li>
          </ul>
          <t>SCION CP-PKI comprises an optional extension called DRKey, which enables efficient symmetric key derivation between any two entities in possession of AS certificates.
Such symmetric keys are used for additional authentication mechanisms for high-rate data-plane traffic and some control messages.
As authentication based on digital signatures only scales well for relatively low message rates, using symmetric keys makes sure that the performance requirements for the high message rate of the data plane can be met.
For more information, refer to the extension draft <xref target="I-D.garciapardo-drkey"/>.</t>
          <t>The trust model and certificates provided could be used not only by the SCION control plane but also other systems and protocols.</t>
        </section>
        <section anchor="pki-related">
          <name>Relationship to Existing Protocols</name>
          <t>The CP-PKI is based on certificates that use the X.509v3 standard <xref target="RFC5280"/>. There are already several professional industry-grade implementations.</t>
          <t>The SCION trust model differs from existing PKIs in two ways.
First, no entity is globally omnipotent, as Isolation Domains elect their own locally scoped root of trust.
Second, changes to the trust roots require a voting process, making governance multilateral and each trust root resilient to the compromise of some of its keys.</t>
          <t>These properties would be lost if SCION were to rely on an existing PKI (i.e., the web PKI, the RPKI, ...).
For example, if SCION were to use the RPKI instead of the CP-PKI, its control plane would lack the trust model required to support Isolation Domains.
This is because RPKI's trust model follows the same structure as the IP allocation hierarchy, where the five RIRs represent the trust roots.
Within SCION, RPKI is instead used to secure some of its transition mechanisms, as later explained in <xref target="transition-mechanisms"/>.</t>
          <t>In conclusion, SCION is built around a unique trust model, justifying the existence of the CP-PKI.</t>
        </section>
      </section>
      <section anchor="routing-control-plane">
        <name>Routing - Control Plane</name>
        <t>The SCION control plane's main purpose is to securely discover and disseminate routing information.
Path exploration is based on path-segment construction beacons (PCBs), which are initiated by a subset of ASes and accumulate cryptographically protected path forwarding information.
Each AS selects a few PCBs and makes them available to endpoints via its path service, part of the control plane.</t>
        <t>Overall, the control plane takes an unexplored topology and AS certificates as input, it then discovers the inter-domain topology and makes routing information available to endpoints.</t>
        <t>The following section describes the core properties provided by the SCION control plane, its relationships with existing protocols, and its dependencies on the PKI.
For an overview of the process to create and disseminate path information, refer to <xref target="I-D.dekater-scion-overview"/>, section 1.2.2.
The control plane is internally formed by multiple sub-components (as the beacon service, responsible for path discovery, and the path service, responsible for path dissemination).
Processes and interfaces specifications between these sub-components could be topic for one or multiple dedicated documents.</t>
        <section anchor="key-properties-1">
          <name>Key Properties</name>
          <ul spacing="normal">
            <li>
              <em>Massively multipath.</em> When exploring paths through beaconing, SCION ASes can select PCBs according to their policies, and register the corresponding path segments, making them available to other ASes and endpoints inside their network.
SCION endpoints can leverage a wide range of (possibly disjoint) inter-domain paths, based on application requirements or path conditions.
This goes beyond the capabilities of existing multipath mechanisms, such as BGP ADD-PATH <xref target="RFC7911"/>, that is focusing on advertising multiple paths for the same prefix to provide a backup path.</li>
            <li>
              <em>Scalability.</em> The SCION's beaconing algorithm is scalable and efficient due to the following reasons: The routing process is divided into a process within each ISD (intra-ISD) and one between ISDs (inter-ISD), SCION beaconing does not need to iteratively converge, and SCION makes AS-based announcements instead of IP prefix-based announcements.
Scalability of the routing process is fundamental not only to support network size growth but also to quickly react to failures.
An in-depth study of SCION's scalability in comparison to BGP is available in <xref target="KRAHENBUHL2022"/>.</li>
            <li>
              <em>Convergence time.</em> Since routing decisions are decoupled from the dissemination of path information, SCION features faster convergence times than path-vector protocols.
Path information is propagated across the network by PCBs in times that are within the same order of magnitude of network round trip time.
In addition, the division of the beaconing process into intra- and inter-ISD helps in speeding up global distribution of routing information.
This means that SCION can restore global reachability, even after catastrophic failures, within tens of seconds.</li>
            <li>
              <em>Hop-by-hop path authorization.</em> SCION packets can only be forwarded along authorized path segments.
This is achieved thanks to message authentication codes (MACs) within each hop field.
During beaconing, each AS's control plane creates nested MACs, which are then verified during forwarding.
This gives endpoints strong guarantees about the path where the data is routed, with minimal overhead and resource requirements on routers.
Giving endpoints strong guarantees about the full inter-domain path is important to avoid traffic interception, and to enable geofencing (i.e., keeping data in transit within a well-defined trusted area of the SCION network).
This facilitated early adoption in the finance industry.</li>
            <li>
              <em>Host addressing agnostic.</em> SCION decouples routing from host addressing: inter-domain routing is based on ISD-AS tuples rather than on host addresses.
This design decision has two outcomes: First of all, SCION can reuse existing host addressing schemes, such as IPv6, IPv4, or others.
Second, the control plane does not carry prefix information.
Thanks to PCFS, packets contain forwarding state, so routers do not need to look up routing tables (avoiding the need for dedicated hardware).</li>
            <li>
              <em>Transparency.</em> SCION endpoints have full visibility of the inter-domain path where their data is forwarded. This is a property that is missing in traditional IP networks, where routing decisions are made by each hop, therefore endpoints have no visibility nor guarantees on where their traffic is going.
Additionally, SCION users have visibility on the roots of trust that are used to forward traffic. SCION, therefore, makes it harder to redirect traffic through an adversary's vantage point.
Moreover, SCION gives end users the ability to select which parts of the Internet to trust. This is particularly relevant for workloads that currently use segregated networks.</li>
            <li>
              <em>Fault isolation.</em> As the SCION routing process is hierarchically divided into intra-ISD and inter-ISD, faults have a generally limited and localized impact.
Misconfigurations, such as an erroneous path policy, may suppress some paths. However, as long as an alternative path exists, communication is possible.
In addition, while the control plane is responsible for creating new paths, it does not invalidate existing paths.
The latter function is handled by endpoints upon detecting failures or eventually receiving an SCMP message from the data plane.
This separation of control and data plane prevents the control plane from cutting off an existing communication or having a global kill-switch.</li>
          </ul>
        </section>
        <section anchor="dependencies-1">
          <name>Dependencies</name>
          <t>The SCION control plane requires the control-plane PKI to authenticate path information.
It heavily relies on certificates provided by the CP-PKI for beaconing (i.e., for authenticating routing information).
Each Isolation Domain requires its own root of trust, in the form of a TRC, in order to carry out path exploration and dissemination.</t>
          <t>While in principle the control plane could use certificates provided by another PKI, it would be severely affected by a lack of the ISD concept.
All security properties related to the trust model would be affected.
The concept of ISD is also necessary for scalability and fault isolation to organize the routing process into a two-tiered architecture.</t>
          <t>In conclusion, the control plane depends on the CP-PKI. If it were to be used with another PKI, it would lose several of its fundamental properties.</t>
        </section>
        <section anchor="provided-to-other-components-1">
          <name>Provided to Other Components</name>
          <t>In SCION, an endpoint sending a packet must specify, in the header, the full SCION forwarding path the packet takes towards the destination.
This concept is called packet-carried forwarding state (PCFS).
Rather than having knowledge of the network topology, an endpoint's data plane relies on the control plane for getting such information.
The endpoint's SCION stack queries path segments, then it selects them and combines them into a full forwarding path to the destination.</t>
          <t>The control plane is responsible, therefore, for providing an authenticated (multipath) view of the explored global topology to endpoints (and, in turn, to the data plane).
In addition, it provides the data plane the ability to send authenticated control messages.
The "interfaces" towards the data plane are represented by:</t>
          <ul spacing="normal">
            <li>
              <em>Path segments</em>, that are provided to endpoints and used by SCION routers for forwarding.
Segments are designed so that each AS data plane can independently verify its own segments, while globally achieving full path authorization.</li>
            <li>
              <em>SCMP.</em> SCION control-plane messages are by default all authenticated.
In addition to beacons, the control plane offers the SCION Control Message Protocol (SCMP).
It is analogous to ICMP, and it provides functionality for network diagnostics, such as ping and traceroute, and authenticated error messages that signal packet processing or network layer problems.
SCMP is the first control message protocol that supports the authentication of network control messages, preventing unauthenticated control messages from potentially being used to affect or even prevent traffic forwarding.
SCMP is used, for example, by the data plane to achieve path revocation.</li>
          </ul>
        </section>
        <section anchor="relationship-to-existing-protocols">
          <name>Relationship to Existing Protocols</name>
          <t>At first sight, it might seem that the SCION control plane takes care of similar duties as existing routing protocols.
While both focus on disseminating routing information, there are substantial differences in their mechanisms and properties offered.</t>
          <t>The SCION control plane was designed to carry out inter-domain routing, while intra-domain routing (and forwarding) are intentionally left out of scope.
Existing IGPs are used within an AS, allowing the reuse of existing intra-domain routing infrastructure and reducing the amount of changes required for deployment.</t>
          <t>End-host addressing is decoupled from routing.
Similar to LISP <xref target="RFC6830"/>, SCION separates routing, that is based on locator (an ISD-AS tuple), and host identifiers (e.g., IPv6, IPv4, ...).
While the two architectures have this concept in common, there are notable differences.
SCION brings improvements to inter-domain routing and provides secure multipath, while LISP provides a framework to build overlays on top of the existing Internet.
In addition, LISP security proposals focus on protecting identifier to locator mappings, while SCION focuses on securing inter-domain routing.
Lastly, identifier to locator mapping in SCION not part of the core components, rather it is left to some of its transition mechanisms, later described in <xref target="transition-mechanisms"/>.</t>
          <t>The above-mentioned decoupling also implies that SCION does not provide, by design, IP prefix origin validation, which is currently provided by RPKI <xref target="RFC8210"/>.
As prefix origin validation is outside of SCION's scope, IP-to-SCION's coexistence mechanisms (SIAM, SBAS) later discussed in <xref target="transition-mechanisms"/> build on top of RPKI for IP origin attestation.</t>
          <t>Additionally, the SCION control plane design takes into account some of the lessons learned discussed in <xref target="RFC9049"/>: It does not try to outperform end-to-end mechanisms, as path selection is performed by endpoints. SCION, therefore, can leverage existing end-to-end mechanisms to switch paths, rather than compete with them. In addition, no single component in the architecture needs to keep connection state, as this task is pushed to endpoints.</t>
          <t>One last point is that several of the SCION control plane properties and key mechanisms depend on the fact that SCION ASes are grouped into Isolation Domains (ISDs).
For example, ISDs are fundamental to achieving transparency, routing scalability, fault isolation, and fast propagation of routing information.
No existing protocol provides such a concept, motivating the existence of the control plane.</t>
        </section>
      </section>
      <section anchor="data-plane">
        <name>Forwarding - Data Plane</name>
        <t>The SCION data plane is responsible for inter-domain packet forwarding between ASes.
SCION routers are deployed at an AS network edge.
They receive and validate SCION packets from neighbors, then they use their intra-domain forwarding information to transmit packets to the next SCION border router or to a SCION endpoint inside the AS.</t>
        <t>SCION packets are at the network layer (layer-3), and the SCION header sits in between the transport and link layer.
The header contains a variable type and length host address, and can therefore carry any address (IPv4, IPv6, ...).
In addition, host addresses only need to be unique within an AS, and can be, in principle, reused.</t>
        <section anchor="key-properties-2">
          <name>Key Properties</name>
          <ul spacing="normal">
            <li>
              <em>Path selection.</em> In SCION, endpoints select inter-domain network paths, rather than routers. The endpoints are empowered to make end-to-end path choices based on application requirements.
This means that routers do not carry the burden of making enhanced routing or forwarding decisions.</li>
            <li>
              <em>Scalability.</em> SCION routers can efficiently forward packets without the need to look up forwarding tables or keep per-connection state. Routers only need to verify MACs in hop fields. This operation is based on modern block ciphers such as AES, can be computed faster than performing a memory lookup, and is widely supported in modern CPUs.
Routers, therefore, do not require expensive and energy-intensive dedicated hardware and can be deployed on off-the-shelf hardware. The lack of forwarding tables also implies that the growing size of forwarding tables is of no concern to SCION. Additionally, routers that keep state of network information can suffer from denial-of-service (DoS) attacks exhausting the router's state <xref target="SCHUCHARD2011"/>, which is less of a problem to SCION.</li>
            <li>
              <em>Recovery from failures.</em> SCION hosts usually receive more than one path to a given destination.
Each host can select (potentially disjoint) backup paths that are available in case of a failure.
In contrast to the IP-based Internet, SCION packets are not dynamically rerouted by the network in case of failures.
Routers use BFD <xref target="RFC5880"/> to detect link failures, and in case they cannot forward a packet, they send an authenticated SCMP message triggering path revocation.
End hosts can use this information, or perform active monitoring, to quickly reroute traffic in case of failures.
There is therefore no need to wait for inter-domain routing protocol convergence.</li>
            <li>
              <em>Extensibility.</em> SCION, similarly to IPv6, supports extensions in its header.
Such extensions can be hop-by-hop (and are processed at each hop), or end-to-end.</li>
            <li>
              <em>Path validation.</em> SCION routers validate network paths in packets at each hop, so that they are only forwarded along paths that were authorized by all on-path ASes in the control plane. Thanks to a system of nested message authentication codes, traffic hijacking attacks are avoided.</li>
          </ul>
          <t>In conclusion, in comparison to today's Internet, the SCION's data plane takes some of the responsibilities away from routers and places them on endpoints (such as selecting paths or reacting to failures).
This contributes to creating a data plane that is more efficient and scalable, and that does not require routers with specialized routing table lookup hardware.
Routers validate network paths so that packets are only forwarded on previously authorized paths.</t>
        </section>
        <section anchor="dependencies-2">
          <name>Dependencies</name>
          <t>The data plane is generally decoupled from the control plane.
To be able to transmit data, endpoints need to fetch path information from their AS control plane.
In addition, some operations (such as path revocation) require the data plane to be able to use an authenticated control-plane mechanism, such as SCMP.</t>
          <t>Path information is assumed to be fresh and validated by the control plane, which in turn relies on the CP-PKI for validation.
The data plane, therefore, relies on both the control plane and indirectly on the CP-PKI to function.</t>
          <t>Should the data plane be used independently, without end-to-end path validation, SCION would lose many of its security properties, which are fundamental in an inter-domain scenario where entities are mutually distrustful.
As discussed in <xref target="RFC9049"/>, lack of authentication has often been the cause for path-aware protocols never being adopted because of security concerns. SCION should avoid such pitfalls and therefore its data plane should rely on the corresponding control plane and control-plane PKI.</t>
        </section>
        <section anchor="provided-to-other-components-2">
          <name>Provided to Other Components</name>
          <t>The SCION data plane provides path-aware connectivity to applications.
The SCION stack on an endpoint, therefore, takes application requirements as an input (i.e., latency, bandwidth, a list of trusted ASes, ... ), and crafts packets containing an appropriate path to a given destination.</t>
          <t>How to expose capabilities of path-aware networking to upper layers remains an open question.
PANAPI (Path-Aware Networking API) <xref target="slides-113-taps-panapi"/> is being evaluated as a way of making path-awareness and multipath available to the transport layer at endpoints, using the TAPS abstraction layer.</t>
        </section>
        <section anchor="relationship-to-existing-protocols-1">
          <name>Relationship to Existing Protocols</name>
          <t>SCION is an inter-domain network architecture and as such its data plane does not interfere with intra-domain forwarding.
It re-uses the existing intra-domain data and control plane to provide connectivity among its infrastructure services, border routers, and endpoints, minimizing changes to the internal infrastructure.
This corresponds to the practice today where ASes use an intra-domain protocol of their choice (i.e., OSPF, IS-IS, MPLS, ...).</t>
          <t>Given its path-aware properties, some of SCION's data plane characteristics might seem similar to the ones provided by Segment Routing (SR) <xref target="RFC8402"/>.
There are, however, fundamental differences that distinguish and motivate SCION.
The most salient one is that Segment Routing is designed to be deployed across a single trusted domain. SR, therefore, does not focus on security, which remains an open question, as outlined in <xref target="I-D.spring-srv6-security-consideration"/>.
SCION, instead, is designed from the start to facilitate inter-domain communication between (potentially mutually distrustful) entities. It comes, therefore, with built-in security measures to prevent attacks (i.e., authenticating all control-plane messages and all critical fields in the data-plane header).
Rather than compete, SCION and SR complement each other.
SCION relies on existing intra-domain routing protocols, therefore SR can be one of the possible intra-domain forwarding mechanisms.
Possible integration of its path-aware properties with SR remains for now an open question.</t>
          <t>In SCION's current implementation and early deployments, intra-AS SCION packets are encapsulated into an IP/UDP datagram for AS-local packet delivery, reusing the AS existing IGP and IP-based data plane.
This design decision eased early deployments of SCION in IP-based networks.
In the long term, it is not excluded that SCION's data plane could be better integrated with IP. For example, SCION path information could be included in a custom IPv6 routing extension header (<xref target="RFC8200"/> section 4.4).
Such approach requires further exploration on its impact on intra-domain forwarding and on addressing, so further discussion on the topic is left to future revisions of this draft.</t>
        </section>
      </section>
    </section>
    <section anchor="additional-components">
      <name>Additional Components</name>
      <t>This document mainly focuses on describing the fundamental components needed to run a minimal SCION network.
Beyond that, SCION comprises several extensions and transition mechanisms that provide additional properties, such as improved incremental deployability, security, and additional features.
For the sake of completeness, this paragraph briefly mentions some of these transition mechanisms and extensions.</t>
      <section anchor="transition-mechanisms">
        <name>Transition Mechanisms</name>
        <t>As presented in <xref target="I-D.dekater-scion-overview"/>, incremental deployability is a focus area of SCION's design.
It comprises transition mechanisms that allow partial deployment and coexistence with existing protocols.
These mechanisms require different levels of changes in existing systems and have different maturity levels (from production-grade to research prototype).
Rather than describing how each mechanism works, this document provides a short summary of each approach, focusing on its functions and properties, as well as on how it reuses, extends, or interacts with existing protocols.</t>
        <ul spacing="normal">
          <li>
            <em>SCION-IP-Gateway (SIG).</em> A SCION-IP-Gateway (SIG) is a SCION endpoint that encapsulates regular IP packets into SCION packets. A corresponding SIG at the destination performs the decapsulation.
This mechanism enables IP hosts to benefit from a SCION deployment by transparently obtaining improved security and availability properties.
SCION routing policies can be configured on SIGs, in order to select appropriate SCION paths based on application requirements.
SIGs can dynamically exchange prefix information, currently using their own encapsulation and prefix exchange protocol.
This does not exclude reusing existing protocols in the future.
SIGs are deployed in production SCION networks, and there are commercial implementations.</li>
          <li>
            <em>SIAM.</em> To make SIGs a viable transition mechanism in an Internet-scale network with tens of thousands of ASes, an automatic configuration system is required.
SIAM creates mappings between IP prefixes and SCION addresses, relying on the authorizations in the Resource Public Key Infrastructure (RPKI).
SIAM is currently a research prototype, further described in <xref target="SUPRAJA2021"/>.</li>
          <li>
            <em>SBAS</em> is an experimental architecture aiming at extending the benefits of SCION (in terms of performance and routing security) to potentially any IP host on the Internet.
SBAS consists of a federated backbone of entities. SBAS appears on the outside Internet as a regular BGP-speaking AS.
Customers of SBAS can leverage the system to route traffic across the SCION network according to their requirements (i.e., latency, geography, ... ).
SBAS contains globally distributed PoPs that advertise its customer's announcements.
SBAS relies on RPKI to validate IP prefix authorization.
Traffic is therefore routed as close as possible to the source onto the SCION network. The system is further described in <xref target="BIRGLEE2022"/>.</li>
        </ul>
      </section>
      <section anchor="extensions-and-other-components">
        <name>Extensions and Other Components</name>
        <t>In addition to transition mechanisms, there are other proposed extensions, that build upon the three SCION core components described earlier in this document.
DRKey <xref target="I-D.garciapardo-drkey"/> is a SCION extension that provides an Internet-wide key-establishment system allowing any two hosts to efficiently derive a symmetric key. This extension can be leveraged by other components to provide additional security properties.
For example, LightningFilter <xref target="slides-111-panrg-lightning-filter"/> leverages DRKey to provide high-speed packet filtering between trusted SCION ASes.
COLIBRI <xref target="GIULIARI2021"/> is SCION's inter-domain bandwidth reservation system.
These additional components are briefly mentioned here in order to provide additional context.
They are therefore unlikely to be the best candidates for future IETF work.</t>
      </section>
    </section>
    <section anchor="component-dependencies-summary">
      <name>Component Dependencies Summary</name>
      <t><xref target="components"/> briefly summarises on a high level the dependencies between SCION's core components discussed in the previous paragraphs.</t>
      <figure anchor="components">
        <name>Dependencies overview</name>
        <artwork><![CDATA[
                                  * Initial trust ceremony
                                  * Loose time synchronization
                                  * Communication
                  ┌────────────────────────────┐
                  │     Control plane PKI      │
                  └────────────────────────────┘
                                 │ * TRC
                                 ▼ * AS Certificates
                  ┌────────────────────────────┐
                  │       Control plane        │
                  └────────────────────────────┘
                                 │ * Path segments
                                 ▼ * SCMP
                  ┌────────────────────────────┐
                  │         Data plane         │
                  └────────────────────────────┘
                                 │ * Secure  inter-domain paths
                                 ▼ to destination
                  ┌────────────────────────────┐
                  │  Applications on endpoint  │
                  └────────────────────────────┘
]]></artwork>
      </figure>
      <t>Overall, the control plane PKI represents the most independent building block, as it does not rely on other SCION components.
The control plane relies on the trust model and on certificate material provided by the PKI.
It provides the data plane with path segments, that are then used at forwarding, and with SCMP, that is used for secure error messages.
The data plane makes multipath communication available to applications on SCION endpoints.</t>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>This document describes the three fundamental SCION core components, together with their properties and dependencies.
It highlights how such components allow SCION to provide unique properties. It then discusses how the main components are interlinked, to foster a discussion on the standardization of key components.
The authors welcome feedback from the IETF community for future iterations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins">
            <organization/>
          </author>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG).  At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RFC7911">
        <front>
          <title>Advertisement of Multiple Paths in BGP</title>
          <author fullname="D. Walton" initials="D." surname="Walton">
            <organization/>
          </author>
          <author fullname="A. Retana" initials="A." surname="Retana">
            <organization/>
          </author>
          <author fullname="E. Chen" initials="E." surname="Chen">
            <organization/>
          </author>
          <author fullname="J. Scudder" initials="J." surname="Scudder">
            <organization/>
          </author>
          <date month="July" year="2016"/>
          <abstract>
            <t>This document defines a BGP extension that allows the advertisement of multiple paths for the same address prefix without the new paths implicitly replacing any previous ones.  The essence of the extension is that each path is identified by a Path Identifier in addition to the address prefix.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7911"/>
        <seriesInfo name="DOI" value="10.17487/RFC7911"/>
      </reference>
      <reference anchor="RFC5880">
        <front>
          <title>Bidirectional Forwarding Detection (BFD)</title>
          <author fullname="D. Katz" initials="D." surname="Katz">
            <organization/>
          </author>
          <author fullname="D. Ward" initials="D." surname="Ward">
            <organization/>
          </author>
          <date month="June" year="2010"/>
          <abstract>
            <t>This document describes a protocol intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and to the extent possible the forwarding engines themselves, with potentially very low latency.  It operates independently of media, data protocols, and routing protocols. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5880"/>
        <seriesInfo name="DOI" value="10.17487/RFC5880"/>
      </reference>
      <reference anchor="RFC8402">
        <front>
          <title>Segment Routing Architecture</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
            <organization/>
          </author>
          <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi">
            <organization/>
          </author>
          <author fullname="L. Ginsberg" initials="L." surname="Ginsberg">
            <organization/>
          </author>
          <author fullname="B. Decraene" initials="B." surname="Decraene">
            <organization/>
          </author>
          <author fullname="S. Litkowski" initials="S." surname="Litkowski">
            <organization/>
          </author>
          <author fullname="R. Shakir" initials="R." surname="Shakir">
            <organization/>
          </author>
          <date month="July" year="2018"/>
          <abstract>
            <t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called "segments".  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
            <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t>
            <t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8402"/>
        <seriesInfo name="DOI" value="10.17487/RFC8402"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper">
            <organization/>
          </author>
          <author fullname="S. Santesson" initials="S." surname="Santesson">
            <organization/>
          </author>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen">
            <organization/>
          </author>
          <author fullname="R. Housley" initials="R." surname="Housley">
            <organization/>
          </author>
          <author fullname="W. Polk" initials="W." surname="Polk">
            <organization/>
          </author>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC6830">
        <front>
          <title>The Locator/ID Separation Protocol (LISP)</title>
          <author fullname="D. Farinacci" initials="D." surname="Farinacci">
            <organization/>
          </author>
          <author fullname="V. Fuller" initials="V." surname="Fuller">
            <organization/>
          </author>
          <author fullname="D. Meyer" initials="D." surname="Meyer">
            <organization/>
          </author>
          <author fullname="D. Lewis" initials="D." surname="Lewis">
            <organization/>
          </author>
          <date month="January" year="2013"/>
          <abstract>
            <t>This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs).  No changes are required to either host protocol stacks or to the "core" of the Internet infrastructure.  The Locator/ID Separation Protocol (LISP) can be incrementally deployed, without a "flag day", and offers Traffic Engineering, multihoming, and mobility benefits to early adopters, even when there are relatively few LISP-capable sites.</t>
            <t>Design and development of LISP was largely motivated by the problem statement produced by the October 2006 IAB Routing and Addressing Workshop.  This document defines an Experimental Protocol for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6830"/>
        <seriesInfo name="DOI" value="10.17487/RFC6830"/>
      </reference>
      <reference anchor="RFC8210">
        <front>
          <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
          <author fullname="R. Bush" initials="R." surname="Bush">
            <organization/>
          </author>
          <author fullname="R. Austein" initials="R." surname="Austein">
            <organization/>
          </author>
          <date month="September" year="2017"/>
          <abstract>
            <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
            <t>This document describes version 1 of the RPKI-Router protocol.  RFC 6810 describes version 0.  This document updates RFC 6810.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8210"/>
        <seriesInfo name="DOI" value="10.17487/RFC8210"/>
      </reference>
      <reference anchor="RFC8200">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author fullname="S. Deering" initials="S." surname="Deering">
            <organization/>
          </author>
          <author fullname="R. Hinden" initials="R." surname="Hinden">
            <organization/>
          </author>
          <date month="July" year="2017"/>
          <abstract>
            <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>
      <reference anchor="SCHUCHARD2011">
        <front>
          <title>Losing control of the internet: using the data plane to attack the control plane</title>
          <author fullname="Max Schuchard" initials="M." surname="Schuchard">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Abedelaziz Mohaisen" initials="A." surname="Mohaisen">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Denis Foo Kune" initials="D." surname="Foo Kune">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Nicholas Hopper" initials="N." surname="Hopper">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Yongdae Kim" initials="Y." surname="Kim">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Eugene Y. Vasserman" initials="E." surname="Vasserman">
            <organization>Kansas State University, Manhaattan, KS, USA</organization>
          </author>
          <date month="October" year="2010"/>
        </front>
        <seriesInfo name="Proceedings of the 17th ACM conference on Computer and communications" value="security"/>
        <seriesInfo name="DOI" value="10.1145/1866307.1866411"/>
      </reference>
      <reference anchor="I-D.dekater-scion-overview" target="https://datatracker.ietf.org/doc/draft-dekater-panrg-scion-overview/">
        <front>
          <title>SCION Overview</title>
          <author initials="C." surname="de Kater" fullname="Corine de Kater">
            <organization>SCION Association</organization>
          </author>
          <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
            <organization>SCION Association</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="I-D.dekater-scion-pki" target="https://datatracker.ietf.org/doc/draft-dekater-scion-pki/">
        <front>
          <title>SCION Control-Plane PKI</title>
          <author initials="C." surname="de Kater" fullname="Corine de Kater">
            <organization>SCION Association</organization>
          </author>
          <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
            <organization>SCION Association</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="I-D.spring-srv6-security-consideration" target="https://datatracker.ietf.org/doc/draft-li-spring-srv6-security-consideration/">
        <front>
          <title>Security Considerations for SRv6 Networks</title>
          <author initials="C." surname="Li">
            <organization/>
          </author>
          <author initials="Z." surname="Li">
            <organization/>
          </author>
          <author initials="C." surname="Xie">
            <organization/>
          </author>
          <author initials="H." surname="Tian">
            <organization/>
          </author>
          <author initials="J." surname="Mao">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="slides-113-taps-panapi" target="https://datatracker.ietf.org/meeting/113/materials/slides-113-taps-panapi-implementation-00.pdf">
        <front>
          <title>PANAPI, a Path-Aware Networking API</title>
          <author initials="T." surname="Krüger">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="slides-111-panrg-lightning-filter" target="https://datatracker.ietf.org/meeting/111/materials/slides-111-panrg-lightning-filter-high-speed-traffic-filtering-based-on-drkey-00.pdf">
        <front>
          <title>Lightning Filter: High-Speed Traffic Filtering based on DRKey</title>
          <author initials="J. A." surname="Garcia Pardo">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="I-D.garciapardo-drkey" target="https://datatracker.ietf.org/doc/draft-garciapardo-panrg-drkey/">
        <front>
          <title>Dynamically Recreatable Keys</title>
          <author initials="J." surname="Pardo" fullname="Juan A. García Pardo Giménez de los Galanes">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="B." surname="Rothenberger" fullname="Benjamin Rothenberger">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="KRAHENBUHL2022" target="https://netsec.ethz.ch/publications/papers/2021_conext_deployment.pdf">
        <front>
          <title>Deployment and Scalability of an Inter-Domain Multi-Path Routing Infrastructure</title>
          <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="S." surname="Tabaeiaghdaei" fullname="Seyedali Tabaeiaghdaei">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="C." surname="Glοοr" fullname="Christelle Glοοr">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="J." surname="Kwon" fullname="Jonghoon Kwon">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Hausheer" fullname="David Hausheer">
            <organization>OVGU Magdeburg</organization>
          </author>
          <author initials="D." surname="Roos" fullname="Dominik Roos">
            <organization>Anapaya Systems</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="GIULIARI2021" target="https://netsec.ethz.ch/publications/papers/2021_conext_colibri.pdf">
        <front>
          <title>Colibri: A Cooperative Lightweight Inter-domain Bandwidth-Reservation Infrastructure</title>
          <author initials="G." surname="Giuliari" fullname="Giacomo Giuliari">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Roos" fullname="Dominik Roos">
            <organization>Anapaya Systems</organization>
          </author>
          <author initials="M." surname="Wyss" fullname="Marc Wyss">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="J." surname="García-Pardo" fullname="Juan Angel García-Pardo">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="BIRGLEE2022" target="https://www.usenix.org/conference/usenixsecurity22/presentation/birge-lee">
        <front>
          <title>Creating a Secure Underlay for the Internet</title>
          <author initials="H." surname="Birge-Lee">
            <organization>Princeton University</organization>
          </author>
          <author initials="J." surname="Wanner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="G. H." surname="Cimaszewski">
            <organization>Princeton University</organization>
          </author>
          <author initials="J." surname="Kwon">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="L." surname="Wang">
            <organization>Princeton University</organization>
          </author>
          <author initials="F." surname="Wirz">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="P." surname="Mittal">
            <organization>Princeton University</organization>
          </author>
          <author initials="A." surname="Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="Y." surname="Sun">
            <organization>University of Virginia</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
        <front>
          <title>The Complete Guide to SCION</title>
          <author initials="L." surname="Chuat" fullname="Laurent Chuat">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Basin" fullname="David Basin">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Hausheer" fullname="David Hausheer">
            <organization>Otto von Guericke University Magdeburg</organization>
          </author>
          <author initials="S." surname="Hitz" fullname="Samuel Hitz">
            <organization>Anapaya Systems</organization>
          </author>
          <author initials="P." surname="Mueller" fullname="Peter Mueller">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
        <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
      </reference>
      <reference anchor="SUPRAJA2021" target="https://netsec.ethz.ch/publications/papers/sridhara_taurin2021_siam.pdf">
        <front>
          <title>Global Distributed Secure Mapping of Network Addresses</title>
          <author initials="S." surname="Supraja" fullname="Supraja Sridhara">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="F." surname="Wirz" fullname="François Wirz">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="J." surname="de Ruiter" fullname="Joeri de Ruiter">
            <organization>SIDN Labs</organization>
          </author>
          <author initials="C." surname="Schutijser" fullname="Caspar Schutijser">
            <organization>SIDN Labs</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="PANRG-INTERIM-Min" target="https://datatracker.ietf.org/meeting/interim-2022-panrg-01/materials/minutes-interim-2022-panrg-01-202206011700-00">
        <front>
          <title>Path Aware Networking Research Group - Interim  106 Minutes</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="June"/>
        </front>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors are indebted to Adrian Perrig, Laurent Chuat,
Markus Legner, David Basin, David Hausheer, Samuel Hitz, and Peter
Mueller, for writing the book "The Complete Guide to SCION"
<xref target="CHUAT22"/>, which provides the background information needed to write
this document.
Many thanks also to François Wirz, Juan A. Garcia-Pardo and Matthias Frei for reviewing this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
