Individual Submissions (none) Internet Drafts


      
 The ARK Identifier Scheme
 
 draft-kunze-ark-39.txt
 Date: 09/05/2024
 Authors: John Kunze, Emmanuelle Bermes
 Working Group: Individual Submissions (none)
The ARK (Archival Resource Key) naming scheme is designed to facilitate the high-quality and persistent identification of information objects. The label "ark:" marks the start of a core ARK identifier that can be made actionable by prepending the beginning of a URL. Meant to be usable after today's networking technologies become obsolete, that core should be recognizable in the future as a globally unique ARK independent of the URL hostname, HTTP, etc. A founding principle of ARKs is that persistence is purely a matter of service and neither inherent in an object nor conferred on it by a particular naming syntax. The best any identifier can do is lead users to services that support robust reference. A full-functioning ARK leads the user to the identified object and, with the "?info" inflection appended, returns a metadata record and a commitment statement that is both human- and machine-readable. Tools exist for minting, binding, and resolving ARKs. Responsibility for this Document The ARK Alliance Technical Working Group [ARKAtech] is responsible for the content of this Internet Draft. The group homepage lists monthly meeting notes and agendas starting from March 2019. Revisions of the spec are maintained on github at [ARKdrafts].
 An IPv4 Flowlabel Option
 
 draft-dreibholz-ipv4-flowlabel-39.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz
 Working Group: Individual Submissions (none)
This draft defines an IPv4 option containing a flowlabel that is compatible to IPv6. It is required for simplified usage of IntServ and interoperability with IPv6.
 Prepaid Extensions to Remote Authentication Dial-In User Service (RADIUS)
 
 draft-lior-radius-prepaid-extensions-22.txt
 Date: 25/02/2013
 Authors: Avi Lior, Parviz Yegani, Kuntal Chowdhury, Hannes Tschofenig, Andreas Pashalidis
 Working Group: Individual Submissions (none)
This document specifies an extension to the Remote Authentication Dial-In User Service (RADIUS) protocol that enables service providers to charge for prepaid services. The supported charging models supported are volume-based, duration-based, and based on one-time events.
 Deterministic Route Redistribution into BGP
 
 draft-chen-bgp-redist-05.txt
 Date: 14/05/2024
 Authors: Enke Chen, Jenny Yuan
 Working Group: Individual Submissions (none)
In this document we present several examples of non-deterministic routing behavior involving route redistribution into BGP. To eliminate such non-deterministic behavior, we propose an enhancement to BGP route selection that would take into account the administrative distance under certain conditions. Additionally, We recommend automatically lowering the LOCAL_PREF value in implementation for the redistributed backup route when appropriate.
 Applicability of Reliable Server Pooling for Real-Time Distributed Computing
 
 draft-dreibholz-rserpool-applic-distcomp-36.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz
 Working Group: Individual Submissions (none)
This document describes the applicability of the Reliable Server Pooling architecture to manage real-time distributed computing pools and access the resources of such pools.
 Secure SCTP
 
 draft-hohendorf-secure-sctp-37.txt
 Date: 30/03/2024
 Authors: Carsten Hohendorf, Esbold Unurkhaan, Thomas Dreibholz
 Working Group: Individual Submissions (none)
This document explains the reason for the integration of security functionality into SCTP, and gives a short description of S-SCTP and its services. S-SCTP is fully compatible with SCTP defined in RFC4960, it is designed to integrate cryptographic functions into SCTP.
 Applicability of Reliable Server Pooling for SCTP-Based Endpoint Mobility
 
 draft-dreibholz-rserpool-applic-mobility-35.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz, Jobin Pulinthanath
 Working Group: Individual Submissions (none)
This document describes a novel mobility concept based on a combination of SCTP with Dynamic Address Reconfiguration extension and Reliable Server Pooling (RSerPool).
 Reliable Server Pooling (RSerPool) Bakeoff Scoring
 
 draft-dreibholz-rserpool-score-34.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz, Michael Tuexen
 Working Group: Individual Submissions (none)
This memo describes some of the scoring to be used in the testing of Reliable Server Pooling protocols ASAP and ENRP at upcoming bakeoffs.
 Considerations for Information Services and Operator Services Using SIP
 
 draft-haluska-sipping-directory-assistance-11.txt
 Date: 15/08/2011
 Authors: John Haluska, Richard Ahern, Marty Cruze, Chris Blackwell
 Working Group: Individual Submissions (none)
Information Services are services whereby information is provided in response to user requests, and may include involvement of a human or automated agent. A popular existing Information Service is Directory Assistance (DA). Moving ahead, Information Services providers envision exciting multimedia services that support simultaneous voice and data interactions with full operator backup at any time during the call. Information Services providers are planning to migrate to SIP based platforms, which will enable such advanced services, while continuing to support traditional DA services. Operator Services are traditional PSTN services which often involve providing human or automated assistance to a caller, and often require the specialized capabilities traditionally provided by an operator services switch. Market and/or regulatory factors in some jurisdictions dictate that some subset of Operator Services continue to be provided going forward. This document aims to identify how Operator and Information Services can be implemented using existing or currently proposed SIP mechanisms, to identity existing protocol gaps, and to provide a set of Best Current Practices to facilitate interoperability. For Operator Services, the intention is to describe how current operator services can continue to be provided to PSTN based subscribers via a SIP based operator services architecture. It also looks at how current operator services might be provided to SIP based subscribers via such an architecture, but does not consider the larger question of the need for or usefulness or suitability of each of these services for SIP based subscribers. This document addresses the needs of current Operator and Information Services providers; as such, the intended audience includes vendors of equipment and services to such providers.
 Handle Resolution Option for ASAP
 
 draft-dreibholz-rserpool-asap-hropt-34.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz
 Working Group: Individual Submissions (none)
This document describes the Handle Resolution option for the ASAP protocol.
 Definition of a Delay Measurement Infrastructure and Delay-Sensitive Least-Used Policy for Reliable Server Pooling
 
 draft-dreibholz-rserpool-delay-33.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz, Xing Zhou
 Working Group: Individual Submissions (none)
This document contains the definition of a delay measurement infrastructure and a delay-sensitive Least-Used policy for Reliable Server Pooling.
 Takeover Suggestion Flag for the ENRP Handle Update Message
 
 draft-dreibholz-rserpool-enrp-takeover-31.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz, Xing Zhou
 Working Group: Individual Submissions (none)
This document describes the Takeover Suggestion Flag for the ENRP_HANDLE_UPDATE message of the ENRP protocol.
 A Record of Discussions of Graceful Restart Extensions for Bidirectional Forwarding Detection (BFD)
 
 draft-palanivelan-bfd-v2-gr-13.txt
 Date: 17/11/2011
 Authors: Palanivelan Appanasamy
 Working Group: Individual Submissions (none)
This document is a historical record of discussions about extending the Bidirectional Forwarding Detection (BFD) protocol to provide additional capabilities to handle Graceful Restart. These discussions took place in the context of the IETF's BFD working group, and the consensus in that group was that these extensions should not be made. This document presents a summary of the challenges to BFD in surviving a graceful restart, and outlines a potential protocol solution that was discussed and rejected within the BFD working group. The purpose of this document is to provide a record of the work done so that future effort will not be wasted. This document does not propose or document any extensions to BFD, and there is no intention that it should be implemented in its current form.
 The i;codepoint collation
 
 draft-hoehrmann-cp-collation-01.txt
 Date: 14/09/2010
 Authors: Bjoern Hoehrmann
 Working Group: Individual Submissions (none)
This memo describes the "i;codepoint" collation. Character strings are compared based on the Unicode scalar values of the characters. The collation supports equality, substring, and ordering operations.
 A Uniform Resource Name (URN) Namespace for Sources of Law (LEX)
 
 draft-spinosa-urn-lex-22.txt
 Date: 15/05/2024
 Authors: PierLuigi Spinosa, Enrico Francesconi, Caterina Lupo
 Working Group: Individual Submissions (none)
This document describes a Uniform Resource Name (URN) Namespace Identifier for identifying, naming, assigning, and managing persistent resources in the legal domain. This specification is published to allow adoption of a common convention by multiple jurisdictions to facilitate ease of reference and access to resources in the legal domain. This specification is an independent submission to the RFC series. It is not a standard, and does not have the consensus of the IETF.
 Xon/Xoff State Control for Telnet Com Port Control Option
 
 draft-edwards-telnet-xon-xoff-state-control-00.txt
 Date: 23/03/2010
 Authors: Grant Edwards
 Working Group: Individual Submissions (none)
This document defines new values for use with the telnet com port control option's SET-CONTROL sub-command defined in RFC2217. These new values provide a mechanism for the telnet client to control and query the outbound Xon/Xoff flow control state of the telnet server's physical serial port. This capability is exposed in the serial port API on some operating systems and is needed by telnet clients that implement a port-redirector service which provides applications local to the redirector/telnet-client with transparent access to the remote serial port on the telnet server.
 Load Sharing for the Stream Control Transmission Protocol (SCTP)
 
 draft-tuexen-tsvwg-sctp-multipath-27.txt
 Date: 01/03/2024
 Authors: Martin Becke, Thomas Dreibholz, Nasif Ekiz, Jana Iyengar, Preethi Natarajan, Randall Stewart, Michael Tuexen
 Working Group: Individual Submissions (none)
The Stream Control Transmission Protocol (SCTP) supports multi-homing for providing network fault tolerance. However, mainly one path is used for data transmission. Only timer-based retransmissions are carried over other paths as well. This document describes how multiple paths can be used simultaneously for transmitting user messages.
 Clarification of Proper Use of "@" (at sign) in URI-style Components
 
 draft-accilent-at-sign-00.txt
 Date: 30/07/2010
 Authors: Robert Simpson
 Working Group: Individual Submissions (none)
Defacto standards have evolved that conflict with existing standards, specifically RFC 3986. This document clarifies the use of the "@" (at sign) in URIs and partial URI-like addresses.
 Hypertext Transfer Protocol (HTTP) Digest Authentication Using GSM 2G Authentication and Key Agreement (AKA)
 
 draft-morand-http-digest-2g-aka-05.txt
 Date: 14/04/2014
 Authors: Lionel Morand
 Working Group: Individual Submissions (none)
This document specifies a one-time password generation mechanism for Hypertext Transfer Protocol (HTTP) Digest access authentication based on Global System for Mobile Communications (GSM) authentication and key generation functions A3 and A8, also known as GSM AKA or 2G AKA. The HTTP Authentication Framework includes two authentication schemes: Basic and Digest. Both schemes employ a shared secret based mechanism for access authentication. The GSM AKA mechanism performs user authentication and session key distribution in GSM and Universal Mobile Telecommunications System (UMTS) networks. GSM AKA is a challenge-response based mechanism that uses symmetric cryptography.
 OSPF Abnormal State Information
 
 draft-chen-ospf-abnormal-state-info-12.txt
 Date: 02/04/2024
 Authors: Huaimo Chen
 Working Group: Individual Submissions (none)
This document describes a couple of options for an OSPF router to advertise its abnormal state information in a routing domain.
 Extensions to the Path Computation Element Communication Protocol (PCEP) for Backup Egress of a Traffic Engineering Label Switched Path
 
 draft-chen-pce-compute-backup-egress-24.txt
 Date: 02/04/2024
 Authors: Huaimo Chen
 Working Group: Individual Submissions (none)
This document presents extensions to the Path Computation Element Communication Protocol (PCEP) for a PCC to send a request for computing a backup egress for an MPLS TE P2MP LSP or an MPLS TE P2P LSP to a PCE and for a PCE to compute the backup egress and reply to the PCC with a computation result for the backup egress.
 Extensions to Path Computation Element Communication Protocol (PCEP) for Backup Ingress of a Traffic Engineering Label Switched Path
 
 draft-chen-pce-compute-backup-ingress-24.txt
 Date: 02/04/2024
 Authors: Huaimo Chen
 Working Group: Individual Submissions (none)
This document presents extensions to the Path Computation Element Communication Protocol (PCEP) for a PCC to send a request for computing a backup ingress for an MPLS TE P2MP LSP or an MPLS TE P2P LSP to a PCE and for a PCE to compute the backup ingress and reply to the PCC with a computation result for the backup ingress.
 SCTP Socket API Extensions for Concurrent Multipath Transfer
 
 draft-dreibholz-tsvwg-sctpsocket-multipath-28.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz, Martin Becke, Hakim Adhari
 Working Group: Individual Submissions (none)
This document describes extensions to the SCTP sockets API for configuring the CMT-SCTP and CMT/RP-SCTP extensions.
 Sender Queue Info Option for the SCTP Socket API
 
 draft-dreibholz-tsvwg-sctpsocket-sqinfo-28.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz, Robin Seggelmann, Martin Becke
 Working Group: Individual Submissions (none)
This document describes an extension to the SCTP sockets API for querying information about the sender queue.
 Encoding the graphemes of the SignWriting Script with the x-ISWA-2010
 
 draft-slevinski-iswa-2010-00.txt
 Date: 03/01/2011
 Authors: Stephen Slevinski, Valerie Sutton
 Working Group: Individual Submissions (none)
For concreteness, because the universal character set is not yet universal, because an undocumented and unlabeled coded character set hampers information interchange, a 12-bit coded character set has been created that encodes the graphemes of the SignWriting script as described in the open standard of the International SignWriting Alphabet 2010. The x-ISWA-2010 coded character set is defined with hexadecimal characters and described with Unicode characters, either proposed characters on plane 1 or interchange characters on plane 15. This memo defines a standard coded character set for the Internet community. It is published for reference, examination, implementation, and evaluation. Distribution of this memo is unlimited.
 Explicit Congestion Notification for the Stream Control Transmission Protocol
 
 draft-stewart-tsvwg-sctpecn-07.txt
 Date: 22/04/2024
 Authors: Randall Stewart, Michael Tuexen
 Working Group: Individual Submissions (none)
This document describes the addition of the Explicit Congestion Notification (ECN) to the Stream Control Transmission Protocol (SCTP).
 The FNV Non-Cryptographic Hash Algorithm
 
 draft-eastlake-fnv-22.txt
 Date: 01/04/2024
 Authors: Glenn Fowler, Landon Noll, Kiem-Phong Vo, Donald Eastlake, Tony Hansen
 Working Group: Individual Submissions (none)
FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with good dispersion that is referenced in a number of standards documents and widely used. The purpose of this document is to make information on FNV and open source code performing FNV conveniently available to the Internet community.
 A Forward-Search P2P TE LSP Inter-Domain Path Computation
 
 draft-chen-pce-forward-search-p2p-path-computation-27.txt
 Date: 02/04/2024
 Authors: Huaimo Chen
 Working Group: Individual Submissions (none)
This document presents a forward search procedure for computing paths for Point-to-Point (P2P) Traffic Engineering (TE) Label Switched Paths (LSPs) crossing a number of domains using multiple Path Computation Elements (PCEs). In addition, extensions to the Path Computation Element Communication Protocol (PCEP) for supporting the forward search procedure are described.
 Route Flap Damping Deployment Status Survey
 
 draft-shishio-grow-isp-rfd-implement-survey-05.txt
 Date: 21/06/2012
 Authors: Shishio Tsuchiya, Seiichi Kawamura, Randy Bush, Cristel Pelsser
 Working Group: Individual Submissions (none)
BGP Route Flap Damping [RFC2439] is a mechanism that targets route stability. It penalyzes routes that flap with the aim of reducing CPU load on the routers. But it has side-effects. Thus, in 2006, RIPE recommended not to use Route Flap Damping (see [RIPE-378]). Now, some researchers propose to turn RFD, with less aggressive parameters, back on [draft-ymbk-rfd-usable]. This document describes results of a survey conducted among service provider on their use of BGP Route Flap Damping.
 A Forward-Search P2MP TE LSP Inter-Domain Path Computation
 
 draft-chen-pce-forward-search-p2mp-path-26.txt
 Date: 02/04/2024
 Authors: Huaimo Chen
 Working Group: Individual Submissions (none)
This document presents a forward search procedure for computing a path for a Point-to-MultiPoint (P2MP) Traffic Engineering (TE) Label Switched Path (LSP) crossing a number of domains through using multiple Path Computation Elements (PCEs). In addition, extensions to the Path Computation Element Communication Protocol (PCEP) for supporting the forward search procedure are described.
 An Extension Language for the DNS
 
 draft-levine-dnsextlang-13.txt
 Date: 04/02/2024
 Authors: John Levine, Paul Vixie
 Working Group: Individual Submissions (none)
Adding new RRTYPEs to the DNS has required that DNS servers and provisioning software be upgraded to support each new RRTYPE in Master files. This document defines a DNS extension language intended to allow most new RRTYPEs to be supported by adding entries to configuration data read by the DNS software, with no software changes needed for each RRTYPE.
 Unified User-Agent String
 
 draft-karcz-uuas-01.txt
 Date: 10/11/2014
 Authors: Mateusz Karcz
 Working Group: Individual Submissions (none)
User-Agent is a HTTP request-header field. It contains information about the user agent originating the request, which is often used by servers to help identify the scope of reported interoperability problems, to work around or tailor responses to avoid particular user agent limitations, and for analytics regarding browser or operating system use. Over the years contents of this field got complicated and ambiguous. That was the reaction for sending altered version of websites to web browsers other than popular ones. During the development of the WWW, authors of the new web browsers used to construct User-Agent strings similar to Netscape's one. Nowadays contents of the User-Agent field are much longer than 15 years ago. This Memo proposes the Uniform User-Agent String as a way to simplify the User-Agent field contents, while maintaining the previous possibility of their use.
 SNMPD to use cache and shared database based on MIB Classification
 
 draft-haresh-sushrut-mib-classification-01.txt
 Date: 29/03/2012
 Authors: Haresh Khandelwal
 Working Group: Individual Submissions (none)
This memo defines classification of SNMP MIBs to either use SNMP cache database and shared database (SDB) mechanism to reduce high CPU usage while SNMP GET REQUEST, GETNEXT REQUEST, GETBULK REQUEST are continuously performed from network management system (NMS)/SNMP manager/SNMP MIB browser to managed device.
 Analysis of Algorithms For Deriving Port Sets
 
 draft-tsou-softwire-port-set-algorithms-analysis-04.txt
 Date: 17/05/2013
 Authors: Tina Tsou, Tetsuya Murakami, Simon Perreault
 Working Group: Individual Submissions (none)
This memo analyzes some port set definition algorithms used for stateless IPv4 to IPv6 transition technologies. The transition technologies using port set algorithms can be divided into two categories: fully stateless approach and binding approach. Some algorithms can work for both approaches.
 The Applicability of the PCE to Computing Protection and Recovery Paths for Single Domain and Multi-Domain Networks.
 
 draft-chen-pce-protection-applicability-22.txt
 Date: 02/04/2024
 Authors: Huaimo Chen
 Working Group: Individual Submissions (none)
The Path Computation Element (PCE) provides path computation functions in support of traffic engineering in Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks. A link or node failure can significantly impact network services in large-scale networks. Therefore it is important to ensure the survivability of large scale networks which consist of various connections provided over multiple interconnected networks with varying technologies. This document examines the applicability of the PCE architecture, protocols, and procedures for computing protection paths and restoration services, for single and multi-domain networks. This document also explains the mechanism of Fast Re-Route (FRR) where a point of local repair (PLR) needs to find the appropriate merge point (MP) to do bypass path computation using PCE.
 Extensible Provisioning Protocol (EPP) RESTful Transport
 
 draft-wullink-restful-epp-01.txt
 Date: 15/02/2024
 Authors: Maarten Wullink, Marco Davids
 Working Group: Individual Submissions (none)
This document describes RESTful EPP (REPP), a data format agnostic, REST based Application Programming Interface (API) for the Extensible Provisioning Protocol [RFC5730]. REPP enables the development of a stateless and scalable EPP service. This document includes a mapping of [RFC5730] [XML] EPP commands to a RESTful HTTP based interface. Existing semantics as defined in [RFC5731], [RFC5732] and [RFC5733] are retained and reused in RESTful EPP.
 An FTP Application Layer Gateway (ALG) for IPv4-to-IPv6 Translation
 
 draft-tsou-behave-ftp46-01.txt
 Date: 16/09/2013
 Authors: Tina Tsou, Simon Perreault, Jing Huang
 Working Group: Individual Submissions (none)
An FTP ALG for NAT64 was defined in RFC 6384. Its scope was limited to an IPv6 client connecting to an IPv4 server. This memo supports the case of an IPv4 client connecting to an IPv6 server.
 Web Cache Communication Protocol V2,Revision 1
 
 draft-mclaggan-wccp-v2rev1-00.txt
 Date: 02/08/2012
 Authors: Douglas McLaggan
 Working Group: Individual Submissions (none)
This document describes version 2 of the Web Cache Communication Protocol (WCCP). The WCCP V2 protocol specifies interactions between one or more routers and one or more web-caches. The interaction may take place within an IPv4 or IPv6 network. The purpose of the interaction is to establish and maintain the transparent redirection of selected types of traffic flowing through a group of routers (or similar devices). The selected traffic is redirected to a group of web-caches (or other traffic optimisation devices) with the aim of optimising resource usage and lowering response times. The protocol does not specify any interaction between the web-caches within a group or between a web-cache and a web-server.
 The application/stream+json Media Type
 
 draft-snell-activity-streams-type-01.txt
 Date: 11/10/2012
 Authors: James Snell
 Working Group: Individual Submissions (none)
This specification defines and registers the application/stream+json Content Type for the JSON Activity Streams format.
 Cryptographic Security Characteristics of 802.11 Wireless LAN Access Systems
 
 draft-orr-wlan-security-architectures-00.txt
 Date: 15/10/2012
 Authors: Stephen Orr, Anthony Grieco, Dan Harkins
 Working Group: Individual Submissions (none)
This note identifies all of the places that cryptography is used in Wireless Local Area Network (WLAN) architectures, to simplify the task of selecting the protocols, algorithms, and key sizes needed to achieve a consistent security level across the entire architecture.
 I-PAKE: Identity-Based Password Authenticated Key Exchange
 
 draft-kwon-yoon-kim-ipake-01.txt
 Date: 03/05/2013
 Authors: Hyojin Yoon, Sang Kim
 Working Group: Individual Submissions (none)
Although password authentication is the most widespread user authentication method today, cryptographic protocols for mutual authentication and key agreement, i.e., password authenticated key exchange (PAKE), in particular authenticated key exchange (AKE) based on a password only, are not actively used in the real world. This document introduces a quite novel form of PAKE protocols that employ a particular concept of ID-based encryption (IBE). The resulting cryptographic protocol is the ID-based password authenticated key exchange (I-PAKE) protocol which is a secure and efficient PAKE protocol in both soft- and hard-augmented models. I-PAKE achieves the security goals of AKE, PAKE, and hard-augmented PAKE. I-PAKE also achieves the great efficiency by allowing the whole pre-computation of the ephemeral Diffie-Hellman public keys by both server and client.
 remoteStorage
 
 draft-dejong-remotestorage-22.txt
 Date: 19/12/2023
 Authors: Michiel de Jong, F. Kooman, S. Kippe
 Working Group: Individual Submissions (none)
This draft describes a protocol by which client-side applications, running inside a web browser, can communicate with a data storage server that is hosted on a different domain name. This way, the provider of a web application need not also play the role of data storage provider. The protocol supports storing, retrieving, and removing individual documents, as well as listing the contents of an individual folder, and access control is based on bearer tokens.
 Ruoska Encoding
 
 draft-ruoska-encoding-06.txt
 Date: 12/10/2013
 Authors: Jukka-Pekka Makela
 Working Group: Individual Submissions (none)
This document describes hierarchically structured binary encoding format called Ruoska Encoding (later RSK). The main design goals are minimal resource usage, well defined structure with good selection of widely known data types, and still extendable for future usage. The main benefit when compared to non binary hierarchically structured formats like XML is simplicity and minimal resource demands. Even basic XML parsing is time and memory consuming operation. When compared to other binary formats like BER encoding of ASN.1 the main benefit is simplicity. ASN.1 with many different encodings is complex and even simple implementation needs a lot of effort. RSK is also more efficient than BER.
 ICANN Registry Interfaces
 
 draft-lozano-icann-registry-interfaces-21.txt
 Date: 07/04/2024
 Authors: Gustavo Ibarra, Eduardo Alvarez
 Working Group: Individual Submissions (none)
This document describes the technical details of the interfaces provided by the Internet Corporation for Assigned Names and Numbers (ICANN) to its contracted parties to fulfill reporting requirements. The interfaces provided by ICANN to Data Escrow Agents and Registry Operators to fulfill the requirements of Specifications 2 and 3 of the gTLD Base Registry Agreement are described in this document. Additionally, interfaces for retrieving the IP addresses of the probe nodes used in the SLA Monitoring System (SLAM) and interfaces for supporting maintenance window objects are described in this document.
 QoS-level aware Transmission Protocol (QTP) for virtual networks
 
 draft-lan-nvo3-qtp-19.txt
 Date: 31/03/2024
 Authors: Julong Lan, Dongnian Cheng, Yuxiang Hu, Guozhen Cheng, Tong Duan
 Working Group: Individual Submissions (none)
This document provides a QoS-level aware Transmission Protocol (QTP) for virtual networks.
 Binary Uniform Language Kit 1.0
 
 draft-thierry-bulk-04.txt
 Date: 15/04/2024
 Authors: Pierre Thierry
 Working Group: Individual Submissions (none)
This specification describes a uniform, decentrally extensible and efficient format for data serialization.
 Remote APDU Call Secure (RACS)
 
 draft-urien-core-racs-19.txt
 Date: 25/02/2024
 Authors: Pascal Urien
 Working Group: Individual Submissions (none)
This document describes the Remote APDU Call Protocol Secure (RACS) protocol, dedicated to Grid of Secure Elements (GoSE). These servers host Secure Elements (SE), i.e. tamper resistant chips offering secure storage and cryptographic resources. Secure Elements are microcontrollers whose chip area is about 25mm2; they deliver trusted computing services in constrained environments. RACS supports commands for GoSE inventory and data exchange with secure elements. It is designed according to the representational State Transfer (REST) architecture. RACS resources are identified by dedicated URIs. An HTTP interface is also supported. An open implementation [OPENRACS] is available (https://github.com/purien) for various OS.
 Use of the WebSocket Protocol as a Transport for the Remote Framebuffer Protocol
 
 draft-realvnc-websocket-02.txt
 Date: 07/10/2013
 Authors: Nicholas Wilson
 Working Group: Individual Submissions (none)
The Remote Framebuffer protocol (RFB) enables clients to connect to and control remote graphical resources. This document describes a transport for RFB using the WebSocket protocol, and defines a corresponding WebSocket subprotocol, enabling an RFB server to offer resources to clients with WebSocket connectivity, such as web- browsers.
 Metadata Query Protocol
 
 draft-young-md-query-20.txt
 Date: 07/01/2024
 Authors: Ian Young
 Working Group: Individual Submissions (none)
This document defines a simple protocol for retrieving metadata about named entities, or named collections of entities. The goal of the protocol is to profile various aspects of HTTP to allow requesters to rely on certain, rigorously defined, behaviour. This document is a product of the Research and Education Federations (REFEDS) Working Group process.
 Ideas for a Next Generation of the Reliable Server Pooling Framework
 
 draft-dreibholz-rserpool-nextgen-ideas-21.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz
 Working Group: Individual Submissions (none)
This document collects some idea for a next generation of the Reliable Server Pooling framework.
 Extensions to PCEP for Distributing Label Cross Domains
 
 draft-chen-pce-label-x-domains-19.txt
 Date: 02/04/2024
 Authors: Huaimo Chen, Autumn Liu, Mehmet Toy, Vic liu
 Working Group: Individual Submissions (none)
This document specifies extensions to PCEP for distributing labels crossing domains for an inter-domain Point-to-Point (P2P) or Point- to-Multipoint (P2MP) Traffic Engineering (TE) Label Switched Path (LSP).
 Informational Add-on for HTTP over the Secure Sockets Layer (SSL) Protocol and/or the Transport Layer Security (TLS) Protocol
 
 draft-hoehlhubmer-https-addon-07.txt
 Date: 25/11/2013
 Authors: Walter Hoehlhubmer
 Working Group: Individual Submissions (none)
This document describes an Add-on for websites providing encrypted connectivity (HTTP over TLS). The Add-on has two parts, one for the Domain Name System (DNS) - storing the X.509 certificate hashes - and one for the webserver itself - an additional webpage providing specific informations.
 Generic Fault-Avoidance Routing Protocol for Data Center Networks
 
 draft-sl-rtgwg-far-dcn-21.txt
 Date: 24/12/2023
 Authors: Bin Liu, Yantao Sun, Jing Cheng, Yichen Zhang, Bhumip Khasnabish
 Working Group: Individual Submissions (none)
This document describes a generic routing method and protocol for a regular data center network, named the Fault-Avoidance Routing (FAR) protocol. The FAR protocol provides a generic routing method for all types of regular topology network architectures that have been proposed for large-scale cloud-based data centers over the past few years. The FAR protocol is designed to leverage any regularity in the topology and compute its routing table in a concise manner. Fat- tree is taken as an example architecture to illustrate how the FAR protocol can be applied in real operational scenarios.
 SAML Profile for the Metadata Query Protocol
 
 draft-young-md-query-saml-20.txt
 Date: 07/01/2024
 Authors: Ian Young
 Working Group: Individual Submissions (none)
This document profiles the Metadata Query Protocol for use with SAML metadata. This document is a product of the Research and Education Federations (REFEDS) Working Group process. Editorial Note (To be removed by RFC Editor before publication) Discussion of this draft takes place on the MDX mailing list (mdx@lists.iay.org.uk), which is accessed from [MDX.list]. XML versions, latest edits and the issues list for this document are available from [md-query]. The changes in this draft are summarized in Appendix A.21.
 Passive DNS - Common Output Format
 
 draft-dulaunoy-dnsop-passive-dns-cof-11.txt
 Date: 27/04/2024
 Authors: Alexandre Dulaunoy, Aaron Kaplan, Paul Vixie, Henry Stern, Warren Kumari
 Working Group: Individual Submissions (none)
This document describes a common output format of Passive DNS Servers which clients can query. The output format description includes also in addition a common semantic for each Passive DNS system. By having multiple Passive DNS Systems adhere to the same output format for queries, users of multiple Passive DNS servers will be able to combine result sets easily.
 Just because it's an Internet-Draft doesn't mean anything... at all...
 
 draft-wkumari-not-a-draft-20.txt
 Date: 15/04/2024
 Authors: Warren Kumari
 Working Group: Individual Submissions (none)
Anyone can publish an Internet Draft (ID). This doesn't mean that the "IETF thinks" or that "the IETF is planning..." or anything similar.
 Ideas for a Next Generation of the Stream Control Transmission Protocol (SCTP)
 
 draft-dreibholz-tsvwg-sctp-nextgen-ideas-19.txt
 Date: 30/03/2024
 Authors: Thomas Dreibholz
 Working Group: Individual Submissions (none)
This document collects some ideas for a next generation of the Stream Control Transmission Protocol (SCTP) for further discussion. It is a result of lessons learned from more than one decade of SCTP deployment.
 Correlation of multiple responses of forked INVITES in Back to Back User Agents
 
 draft-jesske-dispatch-forking-answer-correlation-04.txt
 Date: 04/03/2024
 Authors: Roland Jesske
 Working Group: Individual Submissions (none)
This document describe how a correlation of multiple responses of a forked INVITE in Back to Back User Agents can apply.
 Service Function Path Establishment
 
 draft-lan-sfp-establishment-17.txt
 Date: 31/03/2024
 Authors: Julong Lan, Yuxiang Hu, Guozhen Cheng, Peng Wang, Tong Duan
 Working Group: Individual Submissions (none)
Service Function Chain architecture leads to more adaptive network nodes. It allows splitting the network function into fine-grained build blocks --- service function, and combining the network functions into service function chain to formulate complicated services. Further, the service function chain should be instantiated by selecting the optimal instance from the candidates for each service function in it. This document discusses the required components during the instantiation of service function chain in the network.
 Simplemux. A generic multiplexing protocol
 
 draft-saldana-tsvwg-simplemux-12.txt
 Date: 02/01/2024
 Authors: Jose Saldana
 Working Group: Individual Submissions (none)
The high amount of small packets present in nowaday's networks results in a low efficiency, as the size of both the headers and the payload in these packets can be comparably large, often falling within the same order of magnitude. In some situations, multiplexing (i.e. aggregating) a number of small packets into a bigger one is desirable to improve the efficiency. For example, a number of small packets can be sent together between a pair of machines if they share a common network path. This may happen between machines in different locations or even inside a datacenter with a number of servers hosting virtual machines. The traffic profile can be shifted from small to larger packets, thus reducing the network overhead and the number of packets per second to be managed by intermediate devices. This document describes Simplemux, a protocol able to encapsulate a number of packets belonging to different protocols into a single packet. Small headers (separators) are added at the beginning of each multiplexed packet, including some flags, the packet length and a "Protocol" field. The presence of this "Protocol" field allows it to aggregate packets belonging to any protocol (the "multiplexed packets"), in a single packet belonging to other (or the same) protocol (the "tunneling protocol"). To reduce the overhead, the size of the multiplexing headers is kept very low (it may be a single byte when multiplexing packets of small size).
 Multiple Upstream Interface Support for IGMP/MLD Proxy
 
 draft-asaeda-pim-multiif-igmpmldproxy-07.txt
 Date: 03/03/2024
 Authors: Hitoshi Asaeda, Luis Contreras
 Working Group: Individual Submissions (none)
This document describes the way of supporting multiple upstream interfaces for an IGMP/MLD proxy device. The proposed extension enables an IGMP/MLD proxy device to receive multicast sessions/ channels through the different upstream interfaces. The upstream interface can be selected based on multiple criteria, such as the subscriber address prefixes, channel/session IDs, and interface priority values. A mechanism for upstream interface takeover that enables to switch from an inactive upstream interface to an active upstream interface is also described.
 Encapsulating IP in UDP
 
 draft-xu-intarea-ip-in-udp-13.txt
 Date: 25/04/2024
 Authors: Xiaohu Xu, Hamid Assarpour, Shaowen Ma, Daniel Bernier, Darren Dukes, Shraddha Hegde, Yiu Lee, Fan Yongbing
 Working Group: Individual Submissions (none)
Existing IP-in-IP encapsulation technologies are not adequate for efficient load balancing of IP-in-IP traffic across IP networks. This document specifies additional IP-in-IP encapsulation technology, referred to as IP-in-UDP (User Datagram Protocol), which can facilitate the load balancing of IP-in-IP traffic across IP networks.
 SMTP Service Extension for Client Identity
 
 draft-storey-smtp-client-id-16.txt
 Date: 29/11/2023
 Authors: William Storey
 Working Group: Individual Submissions (none)
This document defines an extension for the Simple Mail Transfer Protocol (SMTP) called "CLIENTID" to provide a method for clients to indicate an identity to the server. This identity is an additional token that may be used for security and/or informational purposes, and with it a server may optionally apply heuristics using this token.
 PCE-initiated IP Tunnel
 
 draft-chen-pce-pce-initiated-ip-tunnel-04.txt
 Date: 10/01/2024
 Authors: Xia Chen, Hang Shi, Zhenbin Li
 Working Group: Individual Submissions (none)
This document specifies a set of extensions to PCEP to support PCE- initiated IP Tunnel to satisfy the requirement which is introduced in [I-D.li-spring-tunnel-segment]. The extensions include the setup, maintenance and teardown of PCE-initiated IP Tunnels, without the need for local configuration on the PCC.
 Optimizations of PCEP Link-State(LS) Synchronization Procedures
 
 draft-kondreddy-pce-pcep-ls-sync-optimizations-01.txt
 Date: 05/04/2024
 Authors: Venugopal Kondreddy, Mahendra Negi
 Working Group: Individual Submissions (none)
For a Path Computation Element (PCE) to perform its computations, it is important that Link-State (and TE) information be complete and accurate each time. This requires a reliable Link-State Synchronization mechanism between the PCE and path computation clients (PCCs), and between cooperating PCEs. The basic mechanism for Link-State Synchronization is part of the PCEP Link-State (and TE) draft. This draft presents motivations for optimizations to the base PCEP Link-State (and TE) procedure and specifies the required Path Computation Element Communication Protocol (PCEP) extensions.
 Node Potential Oriented Multi-NextHop Routing Protocol
 
 draft-lanzhangwang-rtgwg-npmnrp-17.txt
 Date: 31/03/2024
 Authors: Julong Lan, Jianhui Zhang, Bin Wang, Wenfen Liu, Tong Duan
 Working Group: Individual Submissions (none)
The Node Potential Oriented Multi-Nexthop Routing Protocol (NP-MNRP) bases on the idea of "hop-by-hop routing forwarding, multi-backup next hop" and combines with the phenomena that water flows from higher place to lower. NP-MNRP defines a metric named as node potential, which is based on hop count and the actual link bandwidth, and calculates multiple next-hops through the potential difference between the nodes.
 Multiple Ethernet - IPv6 address mapping encapsulation - fixed prefix
 
 draft-matsuhira-me6e-fp-17.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies Multiple Ethernet - IPv6 address mapping encapsulation - fixed prefix (ME6E-FP) base specification. ME6E-FP makes expantion ethernet network over IPv6 backbone network with encapsuation technoogy. And also, E6ME-FP can stack multiple Ethernet networks. ME6E-FP work on own routing domain.
 Multiple Ethernet - IPv6 address mapping encapsulation - prefix resolution
 
 draft-matsuhira-me6e-pr-17.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies Multiple Ethernet - IPv6 address mapping encapsulation - Prefix Resolution (ME6E-PR) specification. ME6E-PR makes expantion ethernet network over IPv6 backbone network with encapsuation technoogy. And also, E6ME-PR can stack multiple Ethernet networks. ME6E-PR work on non own routing domain.
 BGP Extensions for IDs Allocation
 
 draft-wu-idr-bgp-segment-allocation-ext-14.txt
 Date: 02/04/2024
 Authors: Huaimo Chen, Zhenbin Li, Zhenqiang Li, Yanhe Fan, Mehmet Toy, Lei Liu
 Working Group: Individual Submissions (none)
This document describes extensions to the BGP for IDs allocation. The IDs are SIDs for segment routing (SR), including SR for IPv6 (SRv6). They are distributed to their domains if needed.
 Generic Multicast Router Election on LAN's
 
 draft-wijnands-bier-mld-lan-election-03.txt
 Date: 21/04/2024
 Authors: IJsbrand Wijnands, Stig Venaas, Zhaohui Zhang, Zheng Zhang
 Working Group: Individual Submissions (none)
When a host is connected to multiple multicast capable routers, each of these routers is a candidate to process the multicast flow for that LAN, but only one router should be elected to process it. This document proposes a generic multicast router election mechanism using Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) that can be used by any Multicast Overlay Signalling Protocol (MOSP). Having such generic election mechanism removes a dependency on Protocol Independent Multicast (PIM).
 Multiple IPv4 - IPv6 mapped IPv6 address (M46A)
 
 draft-matsuhira-m46a-16.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies Multiple IPv4 - IPv6 mapped IPv6 address(M46A) spefification. M46A is an IPv4-mapped IPv6 address with a plane ID. Unique allocation of plane id value enables IPv4 private address unique in IPv6 address space. This address may use IPv4 over IPv6 encapsulation and IPv4 - IPv6 translation.
 Multiple IPv4 - IPv6 address mapping encapsulation - fixed prefix (M46E-FP)
 
 draft-matsuhira-m46e-fp-16.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies Multiple IPv4 - IPv6 address mapping encapsulation - fixed prefix (M46E-FP) specification. M46E-FP makes backbone network to IPv6 only. And also, M46E-FP can stack many IPv4 networks, i.e. the networks using same IPv4 (private) addresses, without interdependence.
 Multiple IPv4 - IPv6 address mapping encapsulation - prefix resolution (M46E-PR)
 
 draft-matsuhira-m46e-pr-16.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies M46E Prefix Resolution (M46E-PR) specification. M46E-PR connect IPv4 stub networks between IPv6 backbone network. And also, M46E-PR can stack many IPv4 networks, i.e. the nwtworks using same IPv4 private addresses without interdependence.
 Multiple IPv4 - IPv6 address mapping encapsulation - prefix translator (M46E-PT)
 
 draft-matsuhira-m46e-pt-16.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies Multiple IPv4 - IPv6 mapping encapsulation - Prefix Translator (M46E-PT) specification. M46E-PT expand IPv4 network plane by connecting M46E-FP domain and M46E-PR domain. M46E- PT translate prefix part of M46E-FP address and M46E-PR address both are IPv6 address. M46E-PT does not translate IPv4 packet which is encapsulated, so transparency of IPv4 packet is not broken.
 Multiple IPv4 - IPv6 address mapping translator (M46T)
 
 draft-matsuhira-m46t-16.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies Multiple IPv4 - IPv6 address mapping Translator (M46T) specification. M46T enable access to IPv4 only host from IPv6 host. IPv4 host is identified as M46 address in IPv6 address space. The address assigned to IPv4 host may be global IPv4 address or private IPv4 address. M46T does not support access to IPv6 host from IPv4 only host.
 Multiple IPv4 address and port number - IPv6 address mapping encapsulation (M4P6E)
 
 draft-matsuhira-m4p6e-16.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies Multiple IPv4 address and port number - IPv6 address mapping encapulation (M4P6E) specification.
 Multi-Stage Transparent Server Load Balancing
 
 draft-matsuhira-mslb-16.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies Multi-Stage Transparent Server Load Balancing (MSLB) specification. MSLB makes server load balancing over Layer3 network without packet header change at client and server. MSLB makes server load balancing with any protocol and protocol with encryption such as IPsec ESP, SSL/TLS.
 Additional Considerations for UDP Encapsulation of Stream Control Transmission Protocol (SCTP) Packets
 
 draft-tuexen-tsvwg-sctp-udp-encaps-cons-09.txt
 Date: 03/03/2024
 Authors: Michael Tuexen, Randall Stewart
 Working Group: Individual Submissions (none)
RFC 6951 specifies the UDP encapsulation of SCTP packets. The described handling of received packets requires the check of the verification tag. However, RFC 6951 misses a specification of the handling of received packets for which this check is not possible. This document updates RFC 6951 by specifying the handling of received packets for which the verification tag can not be checked.
 Multiple Ethernet - IPv6 mapped IPv6 address (ME6A)
 
 draft-matsuhira-me6a-16.txt
 Date: 04/04/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
This document specifies Multiple Ethernet - IPv6 mapped IPv6 address(ME6A) spefification. ME6A is an Ethernet-mapped IPv6 address with a plane ID. Unique allocation of plane id value enables duplicated MAC address unique in IPv6 address space. This address may use Ethernet over IPv6 encapsulation.
 OpenPGP Web Key Directory
 
 draft-koch-openpgp-webkey-service-17.txt
 Date: 18/12/2023
 Authors: Werner Koch
 Working Group: Individual Submissions (none)
This specification describes a service to locate OpenPGP keys by mail address using a Web service and the HTTPS protocol. It also provides a method for secure communication between the key owner and the mail provider to publish and revoke the public key.
 SSH Agent Protocol
 
 draft-miller-ssh-agent-14.txt
 Date: 15/04/2024
 Authors: Damien Miller
 Working Group: Individual Submissions (none)
This document describes a key agent protocol for use in the Secure Shell (SSH) protocol.
 Hierarchical PCE Determination
 
 draft-chen-pce-h-discovery-15.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Mehmet Toy, Xufeng Liu, Lei Liu, Zhenqiang Li
 Working Group: Individual Submissions (none)
This document presents extensions to the Path Computation Element Communication Protocol (PCEP) for determining parent child relations and exchanging the information between a parent and a child PCE in a hierarchical PCE system.
 PCEP Link State Abstraction
 
 draft-chen-pce-h-connect-access-15.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Mehmet Toy, Xufeng Liu, Lei Liu, Zhenqiang Li
 Working Group: Individual Submissions (none)
This document presents extensions to the Path Computation Element Communication Protocol (PCEP) for a child PCE to abstract its domain information to its parent for supporting a hierarchical PCE system.
 Static PCEP Link State
 
 draft-chen-pce-pcc-ted-15.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Mehmet Toy, Xufeng Liu, Lei Liu, Zhenqiang Li
 Working Group: Individual Submissions (none)
This document presents extensions to the Path Computation Element Communication Protocol (PCEP) for a PCC to advertise the information about the links without running IGP and for a PCE to build a TED based on the information received.
 MVPN/EVPN C-Multicast Routes Enhancements
 
 draft-zzhang-bess-mvpn-evpn-cmcast-enhancements-04.txt
 Date: 17/03/2024
 Authors: Zhaohui Zhang, Robert Kebler, Wen Lin, Eric Rosen
 Working Group: Individual Submissions (none)
[RFC6513] and [RFC6514] specify procedures for originating, propagating, and processing "C-multicast routes". However, there are a number of MVPN use cases that are not properly or optimally handled by those procedures. This document describes those use cases, and specifies the additional procedures needed to handle them. Some of the additional procedures are also applicable to EVPN SMET routes [RFC9251].
 Fast HIP Host Mobility
 
 draft-moskowitz-hip-fast-mobility-07.txt
 Date: 07/12/2023
 Authors: Robert Moskowitz, Stuart Card, Adam Wiethuechter
 Working Group: Individual Submissions (none)
This document describes mobility scenarios and how to aggressively support them in HIP. The goal is minimum lag in the mobility event.
 MISP core format
 
 draft-dulaunoy-misp-core-format-17.txt
 Date: 24/12/2023
 Authors: Alexandre Dulaunoy, Andras Iklody
 Working Group: Individual Submissions (none)
This document describes the MISP core format used to exchange indicators and threat information between MISP (Open Source Threat Intelligence Sharing Platform formerly known as Malware Information Sharing Platform) instances. The JSON format includes the overall structure along with the semantic associated for each respective key. The format is described to support other implementations which reuse the format and ensuring an interoperability with existing MISP [MISP-P] software and other Threat Intelligence Platforms.
 MISP taxonomy format
 
 draft-dulaunoy-misp-taxonomy-format-09.txt
 Date: 21/02/2024
 Authors: Alexandre Dulaunoy, Andras Iklody
 Working Group: Individual Submissions (none)
This document describes the MISP taxonomy format, a simple JSON format used to represent machine tags (also known as triple tags) vocabularies. A public directory, known as MISP taxonomies, is available and utilizes the MISP taxonomy format. These taxonomies are employed to classify cybersecurity events, threats, suspicious events, or indicators.
 Extension to the Link Management Protocol (LMP/DWDM -rfc4209) for Dense Wavelength Division Multiplexing (DWDM) Optical Line Systems to manage the application code of optical interface parameters in DWDM application
 
 draft-ggalimbe-ccamp-flex-if-lmp-17.txt
 Date: 23/01/2024
 Authors: Dharini Hiremagalur, Gert Grammel, Gabriele Galimberti, Ruediger Kunze
 Working Group: Individual Submissions (none)
This experimental memo defines extensions to LMP(rfc4209) for managing Optical parameters associated with Wavelength Division Multiplexing (WDM) adding a set of parameters related to multicarrier DWDM interfaces to be used in Spectrum Switched Optical Networks (sson).
 BIER in BABEL
 
 draft-zhang-bier-babel-extensions-10.txt
 Date: 23/01/2024
 Authors: Zheng Zhang, Tony Przygienda
 Working Group: Individual Submissions (none)
BIER introduces a novel multicast architecture. It does not require a signaling protocol to explicitly build multicast distribution trees, nor does it require intermediate nodes to maintain any per- flow state. Babel defines a distance-vector routing protocol that operates in a robust and efficient fashion both in wired as well as in wireless mesh networks. This document defines a way to carry necessary BIER signaling information in Babel.
 Encapsulating IPsec ESP in UDP for Load-balancing
 
 draft-xu-ipsecme-esp-in-udp-lb-12.txt
 Date: 26/03/2024
 Authors: Xiaohu Xu, Shraddha Hegde, Boris Pismenny, Dacheng Zhang, Liang Xia, Mahendra Puttaswamy
 Working Group: Individual Submissions (none)
IPsec Virtual Private Network (VPN) is widely used by enterprises to interconnect their geographical dispersed branch office locations across the Wide Area Network (WAN) or the Internet, especially in the Software-Defined-WAN (SD-WAN) era. In addition, IPsec is also increasingly used by cloud providers to encrypt IP traffic traversing data center networks and data center interconnect WANs so as to meet the security and compliance requirements, especially in financial cloud and governmental cloud environments. To fully utilize the bandwidth available in the data center network, the data center interconnect WAN or the Internet, load balancing of IPsec traffic over Equal Cost Multi-Path (ECMP) and/or Link Aggregation Group (LAG) is much attractive to those enterprises and cloud providers. This document defines a method to encapsulate IPsec Encapsulating Security Payload (ESP) packets over UDP tunnels for improving load-balancing of IPsec ESP traffic.
 Equal-Cost Multipath Considerations for BGP
 
 draft-lapukhov-bgp-ecmp-considerations-12.txt
 Date: 28/12/2023
 Authors: Petr Lapukhov, Jeff Tantsura
 Working Group: Individual Submissions (none)
BGP (Border Gateway Protocol) [RFC4271] employs tie-breaking logic to select a single best path among multiple paths available, known as BGP best path selection. At the same time, it has become a common practice to allow for "equal-cost multipath" (ECMP) selection and programming of multiple next-hops in routing tables. This document summarizes some common considerations for the ECMP logic when BGP is used as the routing protocol, with the intent of providing common reference for otherwise unstandardized set of features.
 Adaptive IPv4 Address Space
 
 draft-chen-ati-adaptive-ipv4-address-space-14.txt
 Date: 14/12/2023
 Authors: Abraham Chen, Ramamurthy Ati, Abhay Karandikar, David Crowe
 Working Group: Individual Submissions (none)
This document describes a solution to the Internet address depletion issue through the use of an existing Option mechanism that is part of the original IPv4 protocol. This proposal, named EzIP (phonetic for Easy IPv4), outlines the IPv4 public address pool expansion and the Internet system architecture enhancement considerations. EzIP may expand an IPv4 address by a factor of 256M without affecting the existing IPv4 based Internet, or the current private networks. It is in full conformance with the IPv4 protocol, and supports not only both direct and private network connectivity, but also their interoperability. EzIP deployments may coexist with existing Internet traffic and IoTs (Internet of Things) operations without perturbing their setups, while offering end-users the freedom to indepdently choose which service. EzIP may be implemented as a software or firmware enhancement to Internet edge routers or private network routing gateways, wherever needed, or simply installed as an inline adjunct hardware module between the two, enabling a seamless introduction. The 256M case detailed here establishes a complete spherical layer of an overlay of routers for interfacing between the Internet fabic (core plus edge routers) and the end user premises or IoTs. Incorporating caching proxy technology in the gateway, a fairly large geographical region may enjoy address expansion based on as few as one ordinary IPv4 public address utilizing IP packets with degenerated EzIP header. If IPv4 public pool allocations were reorganized, the assignable pool could be multiplied 512M fold or even more. Enabling hierarchical address architecture which facilitates both hierarchical and mesh routing, EzIP can provide nearly the same order of magnitude of address pool resources as IPv6 while streamlining the administrative aspects of it. The basic EzIP will immediately resolve the local IPv4 address shortage, while being transparent to the rest of the Internet as a new parallel facility. Under the Dual-Stack environment, these proposed interim facilities will relieve the IPv4 address shortage issue, while affording IPv6 more time to reach maturity for providing the availability levels required for delivering a long-term general service. The basic EzIP may be deployed in two distinctive phases. First, the CG-NAT operation may be enhanced by enabling the use of 240/4 netblock in addition to the current 100.64/10 netblock of RFC6598. This makes end-to-end connectivity feasible within the service area of each 240/4 netblock. Second, this capability may extend to global coverage with the use of the Option Word mechanism in the IP header.
 Mobility Capability Negotiation
 
 draft-yan-dmm-man-13.txt
 Date: 22/02/2024
 Authors: Zhiwei Yan, Tianji Jiang, Jianfeng Guan, Tao Huang, Jong-Hyouk Lee
 Working Group: Individual Submissions (none)
Mobile peers exchange signals with networks, for both wireline and wireless domains, to negotiate capabilities for mobile registration, connection management, session establishment, service provisioning, etc. Generally, mobility capabilities include the supported and provisioned resources along with associated protocols for certain mobility management scenarios. While devices in the mobile wireline (IP) domain would mostly focus on the IP-related negotiation, devices in the wireless domain, e.g., the 5G system (5GS), embrace both mobile IP-related resources as well as wireless-specific capabilities. Regarding both the mobile-IP and wireless domains, we have generalized two protocol categories for mobility capability negotiation & management, i.e., the host-initiated category that involves the direct & active engagement of mobile end devices vs. the network-based category over which mobile endpoints play almost no role in the process. The classification and then the application of the two categories help us analyze the mobility capability negotiation for both the mobile IPv6 and the 3GPP 5G system. The comparison of the capability negotiation under both the Home-Routed (HR) and the Local BreakOut (LBO) roaming cases in 5GS further reflects the feasibility of the protocol dichotomy.
 BGP Extension For L3VPN Performance Monitoring
 
 draft-fan-bess-pm-bgp-02.txt
 Date: 03/03/2024
 Authors: Jiajia Fan, Zhenbin Li, Shunwan Zhuang
 Working Group: Individual Submissions (none)
This document describes a new VT address family in BGP to exchange information required for apply performance monitoring in MPLS/BGP VPN, as described in [I-D.dong-l3vpn-pm-framework].
 ISP Location in DNS Queries
 
 draft-pan-dnsop-edns-isp-location-06.txt
 Date: 15/01/2024
 Authors: Pan Lanlan, Yu Fu, Cuicui Wang
 Working Group: Individual Submissions (none)
Nowadays, many authoritative servers support GeoIP feature, they guess the client's geolocation by the client subnet of EDNS Client Subnet (ECS) or by the source IP address of DNS query, return tailor DNS response based on the client's geolocation. However, ECS raises some privacy concerns because it leaks client subnet information on the resolution path to the authoritative server. This document describes an improved GeoIP solution, defines an EDNS ISP Location (EIL) extension to address the privacy problem of ECS, tries to find the right balance between privacy improvement and user experience optimization. EIL is defined to convey isp location < COUNTRY, AREA, ISP > information that is relevant to the DNS message. It will directly provide sufficient information for the GeoIP-enabled authoritative server as ECS, decide the response without guessing client's geolocation.
 Vehicular Neighbor Discovery for IP-Based Vehicular Networks
 
 draft-jeong-ipwave-vehicular-neighbor-discovery-17.txt
 Date: 08/02/2024
 Authors: Jaehoon Jeong, Yiwen Shen, Sandra Cespedes
 Working Group: Individual Submissions (none)
This document specifies a Vehicular Neighbor Discovery (VND) as an extension of IPv6 Neighbor Discovery (ND) for IP-based vehicular networks. An optimized Address Registration and a multihop Duplicate Address Detection (DAD) mechanism are performed for having operation efficiency and also saving both wireless bandwidth and vehicle energy. In addition, three new ND options for prefix discovery, service discovery, and mobility information report are defined to announce the network prefixes and services inside a vehicle (i.e., a vehicle's internal network).
 DNS Name Autoconfiguration for Internet-of-Things Devices in IP-Based Vehicular Networks
 
 draft-jeong-ipwave-iot-dns-autoconf-17.txt
 Date: 08/02/2024
 Authors: Jaehoon Jeong, Yoseop Ahn, Sejun Lee, J., PARK
 Working Group: Individual Submissions (none)
This document specifies an autoconfiguration scheme for device discovery and service discovery in IP-based vehicular networks. Through the device discovery, this document supports the global (or local) DNS naming of Internet-of-Things (IoT) devices, such as sensors, actuators, and in-vehicle units. By this scheme, the DNS name of an IoT device can be autoconfigured with the device's model information in wired and wireless target networks (e.g., vehicle, road network, home, office, shopping mall, and smart grid). Through the service discovery, IoT users (e.g., drivers, passengers, home residents, and customers) in the Internet (or local network) can easily identify each device for monitoring and remote-controlling it in a target network.
 Signaling extensions for Media Channel sub-carriers configuration in Spectrum Switched Optical Networks (SSON) in Lambda Switch Capable (LSC) Optical Line Systems.
 
 draft-ggalimbe-ccamp-flexigrid-carrier-label-16.txt
 Date: 23/01/2024
 Authors: Gabriele Galimberti, Domenico Fauci, Andrea Zanardi, Lorenzo Galvagni, Julien Meuric
 Working Group: Individual Submissions (none)
This memo defines the signaling extensions for managing Spectrum Switched Optical Network (SSON) parameters shared between the Client and the Network and inside the Network in accordance to the model described in RFC7698. The extensions are in accordance and extending the parameters defined in ITU-T Recommendation G.694.1 and its extensions and G.872.
 OSPF Extensions for Broadcast Inter-AS TE Link
 
 draft-chen-ospf-ias-lk-13.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Mehmet Toy, Xufeng Liu, Lei Liu, Zhenqiang Li, Yi Yang
 Working Group: Individual Submissions (none)
This document presents extensions to the Open Shortest Path First (OSPF) for advertising broadcast inter-AS Traffic Engineering (TE) links.
 ISIS Extensions for Broadcast Inter-AS TE Link
 
 draft-chen-isis-ias-lk-13.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mehmet Toy, Xufeng Liu, Lei Liu, Zhenqiang Li, Yi Yang
 Working Group: Individual Submissions (none)
This document presents extensions to the ISIS protocol for advertising broadcast inter-AS Traffic Engineering (TE) links.
 BGP Logical Link Discovery Protocol (LLDP) Peer Discovery
 
 draft-acee-idr-lldp-peer-discovery-17.txt
 Date: 04/01/2024
 Authors: Acee Lindem, Keyur Patel, Shawn Zandi, Jeffrey Haas, Xiaohu Xu
 Working Group: Individual Submissions (none)
Link Layer Discovery Protocol (LLDP) or IEEE Std 802.1AB is implemented in networking equipment from many vendors. It is natural for IETF protocols to avail this protocol for simple discovery tasks. This document describes how BGP would use LLDP to discover directly connected and 2-hop peers when peering is based on loopback addresses.
 Ad Hoc On-demand Distance Vector Version 2 (AODVv2) Routing
 
 draft-perkins-manet-aodvv2-04.txt
 Date: 03/03/2024
 Authors: Charles Perkins, John Dowdell, Lotte Steenbrink, Victoria Pritchard
 Working Group: Individual Submissions (none)
The Ad Hoc On-demand Distance Vector Version 2 (AODVv2) routing protocol is intended for use by mobile routers in wireless, multihop networks. AODVv2 determines unicast routes among AODVv2 routers within the network in an on-demand fashion.
 NEAT Sockets API
 
 draft-dreibholz-taps-neat-socketapi-14.txt
 Date: 01/03/2024
 Authors: Thomas Dreibholz
 Working Group: Individual Submissions (none)
This document describes a BSD Sockets-like API on top of the callback-based NEAT User API. This facilitates porting existing applications to use a subset of NEAT's functionality.
 Loop avoidance using Segment Routing
 
 draft-bashandy-rtgwg-segment-routing-uloop-16.txt
 Date: 17/12/2023
 Authors: Ahmed Bashandy, Clarence Filsfils, Stephane Litkowski, Bruno Decraene, Pierre Francois, Peter Psenak
 Working Group: Individual Submissions (none)
This document presents a mechanism aimed at providing loop avoidance in the case of IGP network convergence event. The solution relies on the temporary use of SR policies ensuring loop-freeness over the post-convergence paths from the converging node to the destination.
 IPv6 is Classless
 
 draft-bourbaki-6man-classless-ipv6-10.txt
 Date: 01/04/2024
 Authors: Nicolas Bourbaki
 Working Group: Individual Submissions (none)
Over the history of IPv6, various classful address models have been proposed, none of which has withstood the test of time. The last remnant of IPv6 classful addressing is a rigid network interface identifier boundary at /64. This document removes the fixed position of that boundary for interface addressing.
 BGP Signaled MPLS Namespaces
 
 draft-kaliraj-bess-bgp-sig-private-mpls-labels-08.txt
 Date: 26/04/2024
 Authors: Kaliraj Vairavakkalai, Jeyananth Jeganathan, Praveen Ramadenu, Israel Means
 Working Group: Individual Submissions (none)
The MPLS forwarding layer in a core network is a shared resource. The MPLS FIB at nodes in this layer contains labels that are dynamically allocated and locally significant at that node. These labels are scoped in context of the global loopback address. Let us call this the global MPLS namespace. For some usecases like upstream label allocation, it is useful to create private MPLS namespaces (virtual MPLS FIB) over this shared MPLS forwarding layer. This allows installing deterministic label values in the private FIBs created at nodes participating in the private MPLS namespace, while preserving the "locally significant" nature of the underlying shared global MPLS FIB. This document defines new address families (AFI: 16399, SAFI: 128, or 1) and associated signaling mechanisms to create and use MPLS forwarding contexts in a network. Some example use cases are also described.
 LISP for the Mobile Network
 
 draft-farinacci-lisp-mobile-network-18.txt
 Date: 19/02/2024
 Authors: Dino Farinacci, Padma Pillay-Esnault, Uma Chunduri
 Working Group: Individual Submissions (none)
This specification describes how the LISP architecture and protocols can be used in a LTE/5G mobile network to support session survivable EID mobility. A recommendation is provided to SDOs on how to integrate LISP into the mobile network.
 Reassignment of System Ports to the IESG
 
 draft-kuehlewind-system-ports-05.txt
 Date: 10/02/2020
 Authors: Mirja Kuehlewind, Sabrina Tanamal
 Working Group: Individual Submissions (none)
In the IANA Service Name and Transport Protocol Port Number Registry, a large number of System Ports are currently assigned to individuals or companies who have registered the port for the use with a certain protocol before RFC6335 was published. For some of these ports, RFCs exist that describe the respective protocol; for others, RFCs are under development that define, re-define, or assign the protocol used for the respective port, such as in case of so-far unused UDP ports that have been registered together with the respective TCP port. In these cases the IESG has the change control about the protocol used on the port (as described in the corresponding RFC) but change control for the port allocation iis designated to others. Under existing operational procedures, this means the original assignee needs to be involved in chnage to the port assignment. As it is not always possible to get in touch with the original assignee, particularly because of out-dated contact information, this current practice of handling historical allocation of System Ports does not scale well on a case-by-case basis. To address this, this document instructs IANA to perform actions with the goal to reassign System Ports to the IESG that were assigned to individuals prior to the publication of RFC6335, where appropriate.
 IPv6 Source Routing for ultralow Latency
 
 draft-foglar-ipv6-ull-routing-15.txt
 Date: 14/05/2024
 Authors: Andreas Foglar, Theodoros Rokkas, Marcin Godzina
 Working Group: Individual Submissions (none)
This Internet-Draft describes a hierarchical addressing scheme for IPv6, intentionally very much simplified to allow for ultralow latency source routing experimentation using simple forwarding nodes. The "6Tree" Network based on this addrssing scheme is described as well as possible applications.
 MISP galaxy format
 
 draft-dulaunoy-misp-galaxy-format-08.txt
 Date: 24/12/2023
 Authors: Alexandre Dulaunoy, Andras Iklody, Deborah Servili
 Working Group: Individual Submissions (none)
This document describes the MISP galaxy format which describes a simple JSON format to represent galaxies and clusters that can be attached to MISP events or attributes. A public directory of MISP galaxies is available and relies on the MISP galaxy format. MISP galaxies are used to add further informations on a MISP event. MISP galaxy is a public repository [MISP-G] [MISP-G-DOC] of known malware, threats actors and various other collections of data that can be used to mark, classify or label data in threat information sharing.
 MISP object template format
 
 draft-dulaunoy-misp-object-template-format-06.txt
 Date: 24/12/2023
 Authors: Alexandre Dulaunoy, Andras Iklody
 Working Group: Individual Submissions (none)
This document describes the MISP object template format which describes a simple JSON format to represent the various templates used to construct MISP objects. A public directory of common vocabularies MISP object templates [MISP-O] is available and relies on the MISP object reference format.
 Clarifying Use of LSP Ping to Bootstrap BFD over MPLS LSP
 
 draft-mirsky-mpls-bfd-bootstrap-clarify-05.txt
 Date: 09/01/2024
 Authors: Greg Mirsky, Yanhua Zhao, Gyan Mishra, Ron Bonica
 Working Group: Individual Submissions (none)
This document, if approved, updates RFC 5884 by clarifying procedures for using MPLS LSP ping to bootstrap Bidirectional Forwarding Detection (BFD) over MPLS Label Switch Path.
 A YANG Data Model for Client-layer Tunnel
 
 draft-zheng-ccamp-client-tunnel-yang-14.txt
 Date: 12/04/2024
 Authors: Chaode Yu, Haomian Zheng, Aihua Guo, Italo Busi, Yunbin Xu, Yang Zhao, Xufeng Liu
 Working Group: Individual Submissions (none)
A transport network is a server-layer network to provide connectivity services to its client. In this draft the tunnel of client is described, with the definition of client tunnel YANG model.
 DNS-SD Compatible Service Discovery in GeneRic Autonomic Signaling Protocol (GRASP)
 
 draft-eckert-anima-grasp-dnssd-06.txt
 Date: 05/01/2024
 Authors: Toerless Eckert, Mohamed Boucadair, Christian Jacquenet, Michael Behringer
 Working Group: Individual Submissions (none)
DNS Service Discovery (DNS-SD) defines a framework for applications to announce and discover services. This includes service names, service instance names, common parameters for selecting a service instance (weight or priority) as well as other service-specific parameters. For the specific case of autonomic networks, GeneRic Autonomic Signaling Protocol (GRASP) intends to be used for service discovery in addition to the setup of basic connectivity. Reinventing advanced service discovery for GRASP with a similar set of features as DNS-SD would result in duplicated work. To avoid that, this document defines how to use GRASP to announce and discover services relying upon DNS-SD features while maintaining the intended simplicity of GRASP. To that aim, the document defines name discovery and schemes for reusable elements in GRASP objectives.
 CoAP: Non-traditional response forms
 
 draft-bormann-core-responses-02.txt
 Date: 03/03/2024
 Authors: Carsten Bormann, Christian Amsuess
 Working Group: Individual Submissions (none)
In CoAP as defined by RFC 7252, responses are always unicast back to a client that posed a request. The present memo describes two forms of responses that go beyond that model. These descriptions are not intended as advocacy for adopting these approaches immediately, they are provided to point out potential avenues for development that would have to be carefully evaluated.
 HTTP Live Streaming 2nd Edition
 
 draft-pantos-hls-rfc8216bis-15.txt
 Date: 10/05/2024
 Authors: Roger Pantos
 Working Group: Individual Submissions (none)
This document obsoletes RFC 8216. It describes a protocol for transferring unbounded streams of multimedia data. It specifies the data format of the files and the actions to be taken by the server (sender) and the clients (receivers) of the streams. It describes version 12 of this protocol.
 A Decent LISP Mapping System (LISP-Decent)
 
 draft-farinacci-lisp-decent-14.txt
 Date: 08/04/2024
 Authors: Dino Farinacci, Colin Cantrell
 Working Group: Individual Submissions (none)
This draft describes how the LISP mapping system designed to be distributed for scale can also be decentralized for management and trust.
 A feature freezer for the Concise Data Definition Language (CDDL)
 
 draft-bormann-cbor-cddl-freezer-13.txt
 Date: 28/02/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
In defining the Concise Data Definition Language (CDDL), some features have turned up that would be nice to have. In the interest of completing this specification in a timely manner, the present document was started to collect nice-to-have features that did not make it into the first RFC for CDDL, RFC 8610, or the specifications exercising its extension points, such as RFC 9165. Significant parts of this draft have now moved over to the CDDL 2.0 project, described in draft-bormann-cbor-cddl-2-draft. The remaining items in this draft are not directly related to the CDDL 2.0 effort.
 IPv4+ The Extended Protocol Based On IPv4
 
 draft-tang-ipv4plus-12.txt
 Date: 20/01/2024
 Authors: ZiQiang Tang
 Working Group: Individual Submissions (none)
This document specifies version 4+ of the Internet Protocol (IPv4+). IPv4 is very successful,simple and elegant. continuation and expansion of the IPv4 is necessary. Existing systems, devices only need to upgrade the software to support IPv4+, without the need to update new hardwares,saving investment costs. Ipv4+ is also an interstellar Protocol, so the Internet will evolve into a star Internet.
 VXLAN-GPE Encapsulation for In Situ OAM (IOAM) Data
 
 draft-brockners-ippm-ioam-vxlan-gpe-05.txt
 Date: 01/03/2024
 Authors: Frank Brockners, Shwetha Bhandari, Vengada Govindan, Carlos Pignataro, Hannes Gredler, John Leddy, Stephen Youell, Tal Mizrahi, Aviv Kfir, Barak Gafni, Petr Lapukhov, Mickey Spiegel
 Working Group: Individual Submissions (none)
In situ Operations, Administration, and Maintenance (IOAM) records operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document outlines how IOAM data fields are encapsulated in VXLAN-GPE.
 EVPN All Active Usage Enhancement
 
 draft-eastlake-bess-enhance-evpn-all-active-12.txt
 Date: 22/11/2023
 Authors: Donald Eastlake, Zhenbin Li, Shunwan Zhuang, Russ White
 Working Group: Individual Submissions (none)
A principal feature of EVPN is the ability to support multihoming from a customer equipment (CE) to multiple provider edge equipment (PE) active with all-active links. This draft specifies an improvement to load balancing such links.
 EVPN VXLAN Bypass VTEP
 
 draft-eastlake-bess-evpn-vxlan-bypass-vtep-13.txt
 Date: 22/11/2023
 Authors: Donald Eastlake, Zhenbin Li, Shunwan Zhuang, Russ White
 Working Group: Individual Submissions (none)
A principal feature of EVPN is the ability to support multihoming from a customer equipment (CE) to multiple provider edge equipment (PE) with all-active links. This draft specifies a mechanism to simplify PEs used with VXLAN tunnels and enhance VXLAN Active-Active reliability.
 In-situ OAM raw data export with IPFIX
 
 draft-spiegel-ippm-ioam-rawexport-07.txt
 Date: 12/02/2024
 Authors: Mickey Spiegel, Frank Brockners, Shwetha Bhandari, Ramesh Sivakolundu
 Working Group: Individual Submissions (none)
In-situ Operations, Administration, and Maintenance (IOAM) records operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document discusses how In-situ Operations, Administration, and Maintenance (IOAM) information can be exported in raw, i.e. uninterpreted, format from network devices to systems, such as monitoring or analytics systems using IPFIX.
 ICANN Registrar Interfaces
 
 draft-icann-registrar-interfaces-12.txt
 Date: 07/04/2024
 Authors: Gustavo Ibarra, Eduardo Alvarez
 Working Group: Individual Submissions (none)
This document describes the interfaces provided by ICANN to Registrars and Data Escrow Agents to fulfill the data escrow requirements of the Registrar Accreditation Agreement and the Registrar Data Escrow Specifications.
 IS-IS Flooding Reduction in MSDC
 
 draft-xu-lsr-isis-flooding-reduction-in-msdc-05.txt
 Date: 30/01/2024
 Authors: Xiaohu Xu, Luyuan Fang, Jeff Tantsura, Shaowen Ma
 Working Group: Individual Submissions (none)
IS-IS is a commonly used routing protocol in MSDC (Massively Scalable Data Center) networks where CLOS is the most popular topology. In a CLOS topology, each IS-IS router would receive multiple copies of the same LSP (Link State Packet) from multiple IS-IS neighbors. Moreover, two IS-IS neighbors may send each other the same LSP simultaneously. The unnecessary link-state information flooding results in a large waste of resources for IS-IS routers, as there are too many neighbors for each router. To address this scaling problem, this document introduces some extensions to the IS-IS protocol. These extensions aim to significantly reduce the IS-IS flooding within MSDC networks, which can greatly improve the scalability of such networks.
 IMAP Service Extension for Client Identity
 
 draft-yu-imap-client-id-11.txt
 Date: 29/11/2023
 Authors: Deion Yu
 Working Group: Individual Submissions (none)
This document defines an Internet Message Access Protocol (IMAP) service extension called "CLIENTID" which provides a method for clients to indicate an identity to the server. This identity is an additional token that may be used for security and/or informational purposes, and with it a server may optionally apply heuristics using this token.
 The IPv6 Tunnel Payload Forwarding (TPF) Option
 
 draft-bonica-6man-vpn-dest-opt-21.txt
 Date: 15/01/2024
 Authors: Ron Bonica, Yuji Kamite, Luay Jalil, Yifeng Zhou, Gang Chen
 Working Group: Individual Submissions (none)
This document explains how IPv6 options can be used in IPv6 tunnels. It also defines the IPv6 Tunnel Payload Forwarding (TPF) option.
 Path Computation Element Communication Protocol (PCEP) extension to advertise the PCE Controlled Identifier Space
 
 draft-li-pce-controlled-id-space-16.txt
 Date: 25/01/2024
 Authors: Cheng Li, Hang Shi, Aijun Wang, Weiqiang Cheng, Chao Zhou
 Working Group: Individual Submissions (none)
The Path Computation Element Communication Protocol (PCEP) provides a mechanism for the Path Computation Elements (PCEs) to perform path computations in response to Path Computation Clients (PCCs) requests. The Stateful PCE extensions allow stateful control of Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) Label Switched Paths (LSPs) using PCEP. Furthermore, PCE can be used for computing paths in the SR networks. Stateful PCE provides active control of MPLS-TE LSPs via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. Further, stateful PCE could also create and remove PCE-initiated LSPs by itself. A PCE-based Central Controller (PCECC) simplify the processing of a distributed control plane by integrating with elements of Software-Defined Networking (SDN). In some use cases, such as PCECC or Binding Segment Identifier (SID) for Segment Routing (SR), there are requirements for a stateful PCE to make allocation of labels, SIDs, etc. These use cases require PCE aware of various identifier spaces from where to make allocations on behalf of a PCC. This document describes a generic mechanism for a PCC to inform the PCE of the identifier space set aside for the PCE control via PCEP. The identifier could be an MPLS label, a SID, or any other to-be-defined identifier that can be allocated and managed by the PCE.
 LISP Data-Plane Telemetry
 
 draft-farinacci-lisp-telemetry-12.txt
 Date: 15/04/2024
 Authors: Dino Farinacci, Said Ouissal, Erik Nordmark
 Working Group: Individual Submissions (none)
This draft specs a JSON formatted RLOC-record for telemetry data which decapsulating xTRs include in RLOC-probe Map Reply messages.
 Guidelines for Security Policy Translation in Interface to Network Security Functions
 
 draft-yang-i2nsf-security-policy-translation-16.txt
 Date: 07/02/2024
 Authors: Jaehoon Jeong, Patrick Lingga, Jinhyuk Yang
 Working Group: Individual Submissions (none)
This document proposes the guidelines for security policy translation in Interface to Network Security Functions (I2NSF) Framework. When I2NSF User delivers a high-level security policy for a security service, Security Policy Translator in Security Controller translates it into a low-level security policy for Network Security Functions (NSFs). For this security policy translation, this document specifies the relation between a high-level security policy based on the Consumer-Facing Interface YANG data model and a low-level security policy based on the NSF-Facing Interface YANG data model. Also, it describes an architecture of a security policy translator along with an NSF database, and the process of security policy translation with the NSF database.
 Flexible Session Protocol
 
 draft-gao-flexible-session-protocol-12.txt
 Date: 19/04/2024
 Authors: Jun-an Gao
 Working Group: Individual Submissions (none)
FSP is a connection-oriented transport layer protocol that provides mobility and multihoming support by introducing the concept of 'upper layer thread ID', which is associated with some shared secret that is applied with some authenticated encryption algorithm to protect authenticity of the origin of the FSP packets. It is able to provide following services to the upper layer application: * Stream-oriented send-receive with native message boundary * Flexibility to exploit authenticated encryption * On-the-wire compression * Light-weight session management
 Access Extensions for ANCP
 
 draft-lihawi-ancp-protocol-access-extension-12.txt
 Date: 18/03/2024
 Authors: Hongyu Li, Thomas Haag, Birgit Witschurke
 Working Group: Individual Submissions (none)
The purpose of this document is to specify extensions to ANCP (Access Node Control Protocol) (RFC6320) to support PON as described in RFC6934 and some other DSL Technologies including G.fast. This document updates RFC6320 by modifications to terminologies, flows and specifying new TLV types. This document updates RFC6320 by modifications to terminologies, flows and specifying new TLV types.
 Discovery of OSCORE Groups with the CoRE Resource Directory
 
 draft-tiloca-core-oscore-discovery-15.txt
 Date: 04/03/2024
 Authors: Marco Tiloca, Christian Amsuess, Peter van der Stok
 Working Group: Individual Submissions (none)
Group communication over the Constrained Application Protocol (CoAP) can be secured by means of Group Object Security for Constrained RESTful Environments (Group OSCORE). At deployment time, devices may not know the exact security groups to join, the respective Group Manager, or other information required to perform the joining process. This document describes how a CoAP endpoint can use descriptions and links of resources registered at the CoRE Resource Directory to discover security groups and to acquire information for joining them through the respective Group Manager. A given security group may protect multiple application groups, which are separately announced in the Resource Directory as sets of endpoints sharing a pool of resources. This approach is consistent with, but not limited to, the joining of security groups based on the ACE framework for Authentication and Authorization in constrained environments.
 Alternative Elliptic Curve Representations
 
 draft-ietf-lwig-curve-representations-23.txt
 Date: 21/01/2022
 Authors: Rene Struik
 Working Group: Individual Submissions (none)
This document specifies how to represent Montgomery curves and (twisted) Edwards curves as curves in short-Weierstrass form and illustrates how this can be used to carry out elliptic curve computations leveraging existing implementations and specifications of, e.g., ECDSA and ECDH using NIST prime curves. We also provide extensive background material that may be useful for implementers of elliptic curve cryptography.
 Inband Flow Analyzer
 
 draft-kumar-ippm-ifa-08.txt
 Date: 26/04/2024
 Authors: Jai Kumar, Surendra Anubolu, John Lemon, Rajeev Manur, Hugh Holbrook, Anoop Ghanwani, Dezhong Cai, Heidi Ou, Yizhou Li, Xiaojun Wang
 Working Group: Individual Submissions (none)
Inband Flow Analyzer (IFA) records flow specific information from an end station and/or switches across a network. This document discusses the method to collect data on a per hop basis across a network and perform localized or end to end analytics operations on the data. This document also describes a transport-agnostic header definition that may be used for tunneled and non-tunneled flows alike.
 Enhanced Alternate Marking Method
 
 draft-zhou-ippm-enhanced-alternate-marking-14.txt
 Date: 23/11/2023
 Authors: Tianran Zhou, Giuseppe Fioccola, Yisong Liu, Mauro Cociglio, Ran Pang, Lixia Xiong, Shinyoung Lee, Weidong Li
 Working Group: Individual Submissions (none)
This document extends the IPv6 Alternate Marking Option to provide enhanced capabilities and allow advanced functionalities. With this extension, it can be possible to perform thicker packet loss measurements and more dense delay measurements with no limitation for the number of concurrent flows under monitoring.
 PCE Communication Protocol (PCEP) Extensions for Using the PCE as a Central Controller (PCECC) of point-to-multipoint (P2MP) LSPs
 
 draft-dhody-pce-pcep-extension-pce-controller-p2mp-12.txt
 Date: 10/01/2024
 Authors: Zhenbin Li, Shuping Peng, Xuesong Geng, Mahendra Negi
 Working Group: Individual Submissions (none)
The PCE is a core component of Software-Defined Networking (SDN) systems. The PCE has been identified as an appropriate technology for the determination of the paths of point-to-multipoint (P2MP) TE Label Switched Paths (LSPs). A PCE-based Central Controller (PCECC) can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it. Thus, the P2MP LSP can be calculated/set up/initiated and the label-forwarding entries can also be downloaded through a centralized PCE server to each network device along the P2MP path, while leveraging the existing PCE technologies as much as possible. This document specifies the procedures and PCE Communication Protocol (PCEP) extensions for using the PCE as the central controller for provisioning labels along the path of the static P2MP LSP.
 BMP for BGP Route Leak Detection
 
 draft-gu-grow-bmp-route-leak-detection-06.txt
 Date: 03/03/2024
 Authors: Yunan Gu, China Telecom, Di Ma, Nan Geng, Shunwan Zhuang
 Working Group: Individual Submissions (none)
According to Route-Leak Problem Definition [RFC7908], Route leaks refer to the case that the delivery range of route advertisements is beyond the expected range. For many current security protection solutions, the ISPs (Internet Service Providers) are focusing on finding ways to prevent the happening of BGP [RFC4271] route leaks. However, the real-time route leak detection if any occurs is important as well, and serves as the basis for leak mitigation. This document extends the BGP Monitoring Protocol (BMP) [RFC7854] to provide a routing security scheme suitable for ISPs to detect BGP route leaks at the prefix level.
 Architecture for Use of BGP as Central Controller
 
 draft-cth-rtgwg-bgp-control-13.txt
 Date: 28/03/2024
 Authors: Yujia Luo, Liang Ou, Xiang Huang, Gyan Mishra, Huaimo Chen, Shunwan Zhuang, Zhenbin Li
 Working Group: Individual Submissions (none)
BGP is a core part of a network including Software-Defined Networking (SDN) system. It has the traffic engineering information on the network topology and can compute optimal paths for a given traffic flow across the network. This document describes some reference architectures for BGP as a central controller. A BGP-based central controller can simplify the operations on the network and use network resources efficiently for providing services with high quality.
 Flowspec Indirection-id Redirect for SRv6
 
 draft-ietf0-idr-srv6-flowspec-path-redirect-11.txt
 Date: 10/01/2024
 Authors: Gunter Van de Velde, Keyur Patel, Zhenbin Li, Huaimo Chen
 Working Group: Individual Submissions (none)
This document defines extensions to "FlowSpec Redirect to indirection-id Extended Community" for SRv6. This extended community can trigger advanced redirection capabilities to flowspec clients for SRv6. When activated, this flowspec extended community is used by a flowspec client to retrieve the corresponding next-hop and encoding information within a localised indirection-id mapping table. The functionality detailed in this document allows a network controller to decouple the BGP flowspec redirection instruction from the operation of the available paths.
 SRv6 and MPLS interworking
 
 draft-agrawal-spring-srv6-mpls-interworking-14.txt
 Date: 04/03/2024
 Authors: Swadesh Agrawal, Clarence Filsfils, Dan Voyer, Gaurav Dawra, Zhenbin Li, Shraddha Hegde
 Working Group: Individual Submissions (none)
This document describes SRv6 and MPLS/SR-MPLS interworking and co- existence procedures.
 IPv6 Formal Anycast Addresses and Functional Anycast Addresses
 
 draft-smith-6man-form-func-anycast-addresses-02.txt
 Date: 22/02/2024
 Authors: Mark Smith
 Working Group: Individual Submissions (none)
Currently, IPv6 anycast addresses are chosen from within the existing IPv6 unicast address space, with the addresses nominated as anycast addresses through configuration. An alternative scheme would be to have a special class of addresses for use as anycast addresses. This memo proposes a distinct general anycast addressing class for IPv6, and a more specific scheme for functional anycast addresses.
 Constrained Application Protocol (CoAP): Corrections and Clarifications
 
 draft-bormann-core-corr-clar-03.txt
 Date: 28/02/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
RFC 7252 defines the Constrained Application Protocol (CoAP), along with a number of additional specifications, including RFC 7641, RFC 7959, RFC 8132, and RFC 8323. RFC 6690 defines the link format that is used in CoAP self-description documents. Some parts of the specification may be unclear or even contain errors that may lead to misinterpretations that may impair interoperability between different implementations. The present document provides corrections, additions, and clarifications to the RFCs cited; this document thus updates these RFCs. In addition, other clarifications related to the use of CoAP in other specifications, including RFC 7390 and RFC 8075, are also provided.
 CoRE Resource Directory Extensions
 
 draft-amsuess-core-resource-directory-extensions-10.txt
 Date: 04/03/2024
 Authors: Christian Amsuess
 Working Group: Individual Submissions (none)
A collection of extensions to the Resource Directory [rfc9176] that can stand on their own, and have no clear future in specification yet. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the Constrained RESTful Environments Working Group mailing list (core@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/core/. Source for this draft and an issue tracker can be found at https://gitlab.com/chrysn/resource-directory-extensions.
 General Guidance for Implementing Branded Indicators for Message Identification (BIMI)
 
 draft-brotman-ietf-bimi-guidance-09.txt
 Date: 03/03/2024
 Authors: Alex Brotman, Terry Zink, Marc Bradshaw
 Working Group: Individual Submissions (none)
This document is meant to provide guidance to various entities so that they may implement Brand Indicators for Message Identification (BIMI). This document is a companion to various other BIMI drafts, which should first be consulted.
 Explicit Congestion Notification (ECN) and Congestion Feedback Using the Network Service Header (NSH) and IPFIX
 
 draft-ietf-sfc-nsh-ecn-support-13.txt
 Date: 15/04/2024
 Authors: Donald Eastlake, Bob Briscoe, Shunwan Zhuang, Andrew Malis, Xinpeng Wei
 Working Group: Individual Submissions (none)
Explicit Congestion Notification (ECN) allows a forwarding element to notify downstream devices of the onset of congestion without having to drop packets. Coupled with a means to feed information about congestion back to upstream nodes, this can improve network efficiency through better congestion control, frequently without packet drops. This document specifies ECN and congestion feedback support within a Service Function Chaining (SFC) enabled domain through use of the Network Service Header (NSH, RFC 8300) and IP Flow Information Export (IPFIX, RFC 7011) protocol.
 Proxy MAC-IP Advertisement in EVPNs
 
 draft-rbickhart-evpn-ip-mac-proxy-adv-02.txt
 Date: 04/03/2024
 Authors: Ryan Bickhart, Wen Lin, John Drake, Jorge Rabadan, Alton Lo, Patrice Brissette
 Working Group: Individual Submissions (none)
This document specifies procedures for EVPN PEs connected to a common multihomed site to generate proxy EVPN MAC-IP advertisements on behalf of other PEs to facilitate preservation of ARP/ND state across link or node failures.
 Composite ML-DSA for use in Internet PKI
 
 draft-ounsworth-pq-composite-sigs-13.txt
 Date: 04/03/2024
 Authors: Mike Ounsworth, John Gray, Massimiliano Pala, Jan Klaussner
 Working Group: Individual Submissions (none)
This document defines Post-Quantum / Traditional composite Key Signaturem algorithms suitable for use within X.509, PKIX and CMS protocols. Composite algorithms are provided which combine ML-DSA with RSA, ECDSA, Ed25519, and Ed448. The provided set of composite algorithms should meet most X.509, PKIX, and CMS needs.
 SRv6 Midpoint Protection
 
 draft-chen-rtgwg-srv6-midpoint-protection-14.txt
 Date: 01/02/2024
 Authors: Huanan Chen, Zhibo Hu, Huaimo Chen, Xuesong Geng, Yisong Liu, Gyan Mishra
 Working Group: Individual Submissions (none)
The current local repair mechanism, e.g., TI-LFA, allows the upstream neighbor of the failed node or link to fast re-route traffic around the failure. This mechanism does not work properly for SRv6 TE path after the failure happens in an endpoint node and IGP converges on the failure. This document defines midpoint protection for SRv6 TE path, which enables the upstream endpoint node of the failed node to perform the endpoint behavior for the faulty node and fast re-route traffic around the failure after IGP converges on the failure.
 Enhanced Topology Independent Loop-free Alternate Fast Re-route
 
 draft-li-rtgwg-enhanced-ti-lfa-10.txt
 Date: 30/04/2024
 Authors: Cheng Li, Zhibo Hu, Yongqing Zhu, Shraddha Hegde
 Working Group: Individual Submissions (none)
Topology Independent Loop-free Alternate Fast Re-route (TI-LFA) aims at providing protection of node and adjacency segments within the Segment Routing (SR) framework. A key aspect of TI-LFA is the FRR path selection approach establishing protection over the expected post-convergence paths from the point of local repair. However, the TI-LFA FRR path may skip the node even if it is specified in the SID list to be traveled. This document defines Enhanced TI-LFA(TI-LFA+) by adding a No-bypass indicator for segments to ensure that the FRR route will not bypass the specific node, such as firewall. Also, this document defines No- bypass flag and No-FRR flag in SRH to indicate not to bypass nodes and not to perform FRR on all the nodes along the SRv6 path, respectively.
 Arm's Platform Security Architecture (PSA) Attestation Token
 
 draft-tschofenig-rats-psa-token-22.txt
 Date: 21/02/2024
 Authors: Hannes Tschofenig, Simon Frost, Mathias Brossard, Adrian Shaw, Thomas Fossati
 Working Group: Individual Submissions (none)
The Arm Platform Security Architecture (PSA) is a family of hardware and firmware security specifications, as well as open-source reference implementations, to help device makers and chip manufacturers build best-practice security into products. Devices that are PSA compliant can produce attestation tokens as described in this memo, which are the basis for many different protocols, including secure provisioning and network access control. This document specifies the PSA attestation token structure and semantics. The PSA attestation token is a profile of the Entity Attestation Token (EAT). This specification describes what claims are used in an attestation token generated by PSA compliant systems, how these claims get serialized to the wire, and how they are cryptographically protected. This informational document is published as an independent submission to improve interoperability with ARM's architecture. It is not a standard nor a product of the IETF.
 JSON Web Token (JWT) Embedded Tokens
 
 draft-yusef-oauth-nested-jwt-08.txt
 Date: 24/12/2023
 Authors: Rifaat Shekh-Yusef, Dick Hardt, Giuseppe De Marco
 Working Group: Individual Submissions (none)
This specification defines a mechanism for embedding tokens into a JWT token. The JWT token and the embedded tokens are issued by one ore more issuers.
 Enhanced AS-Loop Detection for BGP
 
 draft-chen-grow-enhanced-as-loop-detection-07.txt
 Date: 03/03/2024
 Authors: Huanan Chen, Di Ma, Nan Geng, Shunwan Zhuang, Haibo Wang
 Working Group: Individual Submissions (none)
Misconfiguration and malicious manipulation of BGP AS_Path may lead to route hijack. This document proposes to enhance the BGP [RFC4271] Inbound/ Outbound route processing in the case of detecting an AS loop. It is an enhancement to the current BGP's Inbound/Outbound processing and can be implemented directly on the device, and this document also proposes a centralized usecase. This could empower networks to quickly and accurately figure out they're being victimized. Two options are proposed for the enhancement, a) a local check at the device; b) data collection/analysis at the remote network controller/ server. Both approaches are beneficial for route hijack detection.
 Vehicular Mobility Management for IP-Based Vehicular Networks
 
 draft-jeong-ipwave-vehicular-mobility-management-11.txt
 Date: 08/02/2024
 Authors: Jaehoon Jeong, Bien Mugabarigira, Yiwen Shen
 Working Group: Individual Submissions (none)
This document specifies a Vehicular Mobility Management (VMM) scheme for IP-based vehicular networks. The VMM scheme takes advantage of a vehicular link model based on a multi-link subnet. With a vehicle's mobility information (e.g., position, speed, acceleration/ deceleration, and direction) and navigation path (i.e., trajectory), it can provide a moving vehicle with proactive and seamless handoff along with its trajectory.
 IPv4 Extension Headers and Flow Label
 
 draft-herbert-ipv4-eh-03.txt
 Date: 22/02/2024
 Authors: Tom Herbert
 Working Group: Individual Submissions (none)
This specification defines extension headers for IPv4 and an IPv4 flow label. The goal is to provide a uniform and feasible method of extensibility that is common between IPv4 and IPv6.
 Design of the native Cyberspace Map
 
 draft-jilongwang-opsawg-cybersmap-10.txt
 Date: 08/05/2024
 Authors: Jilong Wang, Miao Congcong, Changqing An, Shuying Zhuang
 Working Group: Individual Submissions (none)
This memo discusses the design of the native cyberspace map which is stable and flexible to describe cyberspace. Although we have accepted the cyberspace as a parallel new world, we even have not defined its basic coordinate system, which means cyberspace have no its basic space dimension till now. The objective of this draft is to illustrate the basic design methodology of the native coordinate system of cyberspace, and show how to design cyberspace map on this basis.
 A Framework for Constructing Service Function Chaining Systems Based on Segment Routing
 
 draft-li-spring-sr-sfc-control-plane-framework-10.txt
 Date: 01/03/2024
 Authors: Yuanyang Yin, Cheng Li, Ahmed El Sawaf, Hongyi Huang, Zhenbin Li
 Working Group: Individual Submissions (none)
Segment Routing (SR) introduces a versatile methodology for defining end-to-end network paths by encoding sequences of topological sub- paths, known as "segments". This architecture can be deployed over both MPLS and IPv6 data planes, offering a flexible routing solution. Service Function Chaining (SFC) supports the establishment of composite services through an ordered sequence of Service Functions (SFs) that are applied to packets or frames based on initial classification. SFC's implementation can utilize various underlying technologies, including the Network Service Header (NSH) and SR, to facilitate the creation and management of service chains. This document presents a comprehensive control framework for developing SFC architectures using Segment Routing. It explores control plane solutions for the distribution of service function instance routes and service function paths, as well as techniques for directing packets into specific service function chains. The discussion encompasses both theoretical foundations and practical considerations for integrating SR into SFC deployments.
 Modern Network Unicode
 
 draft-bormann-dispatch-modern-network-unicode-04.txt
 Date: 29/02/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
BCP18 (RFC 2277) has been the basis for the handling of character- shaped data in IETF specifications for more than a quarter of a century now. It singles out UTF-8 (STD63, RFC 3629) as the "charset" that MUST be supported, and pulls in the Unicode standard with that. Based on this, RFC 5198 both defines common conventions for the use of Unicode in network protocols and caters for the specific requirements of the legacy protocol Telnet. In applications that do not need Telnet compatibility, some of the decisions of RFC 5198 can be cumbersome. The present specification defines "Modern Network Unicode" (MNU), which is a form of RFC 5198 Network Unicode that can be used in specifications that require the exchange of plain text over networks and where just mandating UTF-8 may not be sufficient, but there is also no desire to import all of the baggage of RFC 5198. As characters are used in different environments, MNU is defined in a one-dimensional (1D) variant that is useful for identifiers and labels, but does not use a structure of text lines. A 2D variant is defined for text that is a sequence of text lines, such as plain text documents or markdown format. Additional variances of these two base formats can be used to tailor MNU to specific areas of application.
 SR Path Ingress Protection
 
 draft-chen-idr-sr-ingress-protection-10.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Mehmet Toy, Aijun Wang, Zhenqiang Li, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes extensions to Border Gateway Protocol (BGP) for protecting the ingress node of a Segment Routing (SR) tunnel or path.
 Path Ingress Protections
 
 draft-chen-pce-sr-ingress-protection-12.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Mike McBride, Mehmet Toy, Gyan Mishra, Aijun Wang, Zhenqiang Li, Yisong Liu, Boris Khasanov, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes extensions to Path Computation Element (PCE) communication Protocol (PCEP) for fast protecting the ingress nodes of two types of paths or tunnels, which are Segment Routing (SR) paths and Bit Index Explicit Replication Tree/Traffic Engineering (BIER-TE) paths. The extensions comprise a foundation for protecting the ingress nodes of different types of paths. Based on this, the ingress protection of a new type of paths can be easily supported.
 The DOCSIS(r) Queue Protection Algorithm to Preserve Low Latency
 
 draft-briscoe-docsis-q-protection-07.txt
 Date: 23/11/2023
 Authors: Bob Briscoe, Greg White
 Working Group: Individual Submissions (none)
This informational document explains the specification of the queue protection algorithm used in DOCSIS technology since version 3.1. A shared low latency queue relies on the non-queue-building behaviour of every traffic flow using it. However, some flows might not take such care, either accidentally or maliciously. If a queue is about to exceed a threshold level of delay, the queue protection algorithm can rapidly detect the flows most likely to be responsible. It can then prevent harm to other traffic in the low latency queue by ejecting selected packets (or all packets) of these flows. The document is designed for four types of audience: a) congestion control designers who need to understand how to keep on the 'good' side of the algorithm; b) implementers of the algorithm who want to understand it in more depth; c) designers of algorithms with similar goals, perhaps for non-DOCSIS scenarios; and d) researchers interested in evaluating the algorithm.
 BGP Request for Candidate Paths of SR TE Policies
 
 draft-li-ldr-bgp-request-cp-sr-te-policy-07.txt
 Date: 29/03/2024
 Authors: Zhenbin Li, Qiangzhou Gao, Huaimo Chen, Yanhe Fan, Xufeng Liu, Lei Liu
 Working Group: Individual Submissions (none)
An SR Policy is a set of candidate paths. The headend of an SR Policy may learn multiple candidate paths for an SR Policy via a number of different mechanisms, e.g., CLI, NetConf, PCEP, or BGP. This document defines extensions to BGP for the headend to request BGP speaker (controller) for advertising the candidate paths.
 Network Programming extension: SRv6 uSID instruction
 
 draft-filsfils-spring-net-pgm-extension-srv6-usid-16.txt
 Date: 13/12/2023
 Authors: Clarence Filsfils, Pablo Camarillo, Dezhong Cai, Dan Voyer, Israel Meilik, Keyur Patel, Wim Henderickx, Prem Jonnalagadda, David Melman, Yisong Liu, Jim Guichard
 Working Group: Individual Submissions (none)
The SRv6 "micro segment" (SRv6 uSID or uSID for short) instruction is a straightforward extension of the SRv6 Network Programming model: * The SRv6 Control Plane is leveraged without any change * The SRH dataplane encapsulation is leveraged without any change * Any SID in the SID list can carry micro segments * Based on the Compressed SRv6 Segment List Encoding in SRH
 SRv6 for Inter-Layer Network Programming
 
 draft-dong-spring-srv6-inter-layer-programming-07.txt
 Date: 01/03/2024
 Authors: Liuyan Han, Jie Dong, Zongpeng Du, Minxue Wang
 Working Group: Individual Submissions (none)
The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header. Following the SRv6 Network Programming concept, this document defines an SRv6 based mechanism for inter-layer network programming, which can help to integrate the packet network layer with its underlying layers efficiently. A new SRv6 behavior called End.XU is introduced, which is a variant of the SRv6 End.X behavior. Instead of pointing to an interface with layer-3 adjacency, the End.XU behavior points to an underlay interface which connects to a remote layer-3 node via underlying links or connections that are invisible in the L3 network topology. The applicability of the End.XU behavior in typical inter- layer network programming scenarios is also illustrated.
 Software Version Capability for BGP
 
 draft-abraitis-bgp-version-capability-14.txt
 Date: 20/03/2024
 Authors: Donatas Abraitis
 Working Group: Individual Submissions (none)
In this document, we introduce a new BGP capability that allows the advertisement of a BGP speaker's routing daemon version. This BGP capability is an optional advertisement. Implementations are not required to advertise the version nor to process received advertisements.
 Maintaining CCNx or NDN flow balance with highly variable data object sizes
 
 draft-oran-icnrg-flowbalance-11.txt
 Date: 14/04/2024
 Authors: David Oran
 Working Group: Individual Submissions (none)
Deeply embedded in some ICN architectures, especially Named Data Networking (NDN) and Content-Centric Networking (CCNx) is the notion of flow balance. This captures the idea that there is a one-to-one correspondence between requests for data, carried in Interest messages, and the responses with the requested data object, carried in Data messages. This has a number of highly beneficial properties for flow and congestion control in networks, as well as some desirable security properties. For example, neither legitimate users nor attackers are able to inject large amounts of un-requested data into the network. Existing congestion control approaches however have a difficult time dealing effectively with a widely varying MTU of ICN data messages, because the protocols allow a dynamic range of 1-64K bytes. Since Interest messages are used to allocate the reverse link bandwidth for returning Data, there is large uncertainty in how to allocate that bandwidth. Unfortunately, most current congestion control schemes in CCNx and NDN only count Interest messages and have no idea how much data is involved that could congest the inverse link. This document proposes a method to maintain flow balance by accommodating the wide dynamic range in Data message size.
 Framework for Cyberspace Resources Categorization
 
 draft-jilongwang-opsawg-crc-06.txt
 Date: 03/12/2023
 Authors: Jilong Wang, Congcong Miao, Shuying Zhuang, Qianli Zhang, Chengyuan Zhang
 Working Group: Individual Submissions (none)
This memo presents the definition of cyberspace resource, and then discusses a classification framework for cyberspace resources. Cyberspace is widely applied in people's daily life and it is regarded as a new space, paralleled to the geographic space. There are various resources in cyberspace. However, they have not been systematically defined and classified. The objective of this draft is to present the deifinition of cyberspace resource and a standard classification framework, thus, supporting the unified resource storage and shares.
 Lzip Compressed Format and the 'application/lzip' Media Type
 
 draft-diaz-lzip-09.txt
 Date: 28/12/2023
 Authors: Antonio Diaz
 Working Group: Individual Submissions (none)
Lzip is a lossless compressed data format designed for data sharing, long-term archiving, and parallel compression/decompression. Lzip uses LZMA compression and can achieve higher compression ratios than gzip. Lzip provides accurate and robust 3-factor integrity checking. This document describes the lzip format and registers a media type, a content coding, and a structured syntax suffix to be used when transporting lzip-compressed content via MIME or HTTP.
 PEM file format for ECH
 
 draft-farrell-tls-pemesni-06.txt
 Date: 04/12/2023
 Authors: Stephen Farrell
 Working Group: Individual Submissions (none)
Encrypted ClientHello (ECH) key pairs need to be configured into TLS servers, that can be built using different TLS libraries, so there is a benefit and little cost in documenting a file format to use for these key pairs, similar to how RFC7468 defines other PEM file formats.
 Stateless OpenPGP Command Line Interface
 
 draft-dkg-openpgp-stateless-cli-10.txt
 Date: 01/03/2024
 Authors: Daniel Gillmor
 Working Group: Individual Submissions (none)
This document defines a generic stateless command-line interface for dealing with OpenPGP messages, known as sop. It aims for a minimal, well-structured API covering OpenPGP object security.
 DetNet Data Plane: IEEE 802.1 Time Sensitive Networking over SRv6
 
 draft-wang-detnet-tsn-over-srv6-08.txt
 Date: 05/01/2024
 Authors: Xueshun Wang, Jinyou Dai, Weiqiang Cheng, Jianhua Liu, Feng Zhang
 Working Group: Individual Submissions (none)
This document specifies the Deterministic Networking data plane when TSN networks interconnected over an Segment Routing IPv6 Packet Switched Networks.
 Performance Measurement for Geneve
 
 draft-xiao-nvo3-pm-geneve-09.txt
 Date: 15/04/2024
 Authors: Xiao Min, Greg Mirsky, Santosh Pallagatti
 Working Group: Individual Submissions (none)
This document describes the method to achieve Performance Measurement (PM) in point-to-point Generic Network Virtualization Encapsulation (Geneve) unicast tunnels used to make up an overlay network.
 A YANG Data Model for Client Signal Performance Monitoring
 
 draft-zheng-ccamp-client-pm-yang-10.txt
 Date: 03/03/2024
 Authors: Chaode Yu, Haomian Zheng, Italo Busi, Zheng Yanlei, Victor Lopez, Oscar de Dios
 Working Group: Individual Submissions (none)
A transport network is a server-layer network to provide connectivity services to its client. Given the client signal is configured, the followup function for performance monitoring, such as latency and bit error rate, would be needed for network operation. This document describes the data model to support the performance monitoring functionalities.
 Context-Aware Navigation Protocol for IP-Based Vehicular Networks
 
 draft-jeong-ipwave-context-aware-navigator-09.txt
 Date: 18/03/2024
 Authors: Jaehoon Jeong, Bien Mugabarigira, Yiwen Shen, Zeung Kim
 Working Group: Individual Submissions (none)
This document proposes a Context-Aware Navigation Protocol (CNP) for IP-based vehicular networks for cooperative navigation among vehicles in road networks. This CNP aims at the enhancement of driving safety through a light-weight driving information sharing method. The CNP protocol uses an IPv6 Neighbor Discovery (ND) option to convey driving information such as a vehicle's position, speed, acceleration/deceleration, and direction, and a driver's driving action (e.g., braking and accelerating).
 Basic Support for Security and Privacy in IP-Based Vehicular Networks
 
 draft-jeong-ipwave-security-privacy-09.txt
 Date: 08/02/2024
 Authors: Jaehoon Jeong, Yiwen Shen, J., PARK, Tae Oh
 Working Group: Individual Submissions (none)
This document describes possible attacks of security and privacy in IP Wireless Access in Vehicular Environments (IPWAVE). It also proposes countermeasures for those attacks.
 SRv6 Deployment Consideration
 
 draft-tian-spring-srv6-deployment-consideration-08.txt
 Date: 27/02/2024
 Authors: Hui Tian, Chongfeng Xie, Edmore Chingwena, Shuping Peng, Qiangzhou Gao
 Working Group: Individual Submissions (none)
SRv6 has significant advantages over SR-MPLS and has attracted more and more attention and interest from network operators and verticals. Smooth network migration towards SRv6 is a key focal point and this document provides network design and migration guidance and recommendations on solutions in various scenarios. Deployment cases with SRv6 are also introduced.
 Destination-IP-Origin-AS Filter for BGP Flow Specification
 
 draft-wang-idr-flowspec-dip-origin-as-filter-09.txt
 Date: 04/03/2024
 Authors: Haibo Wang, Aijun Wang, Shunwan Zhuang
 Working Group: Individual Submissions (none)
BGP Flowspec mechanism (BGP-FS) [RFC8955] [RFC8956] propagates both traffic Flow Specifications and Traffic Filtering Actions by making use of the BGP NLRI and the BGP Extended Community encoding formats. This document specifies a new BGP-FS component type to support AS- level filtering. The match field is the origin AS number of the destination IP address that is encoded in the Flowspec NLRI. This function is applied in a single administrative domain.
 IETF Network Slice Topology YANG Data Model
 
 draft-liu-teas-transport-network-slice-yang-09.txt
 Date: 01/03/2024
 Authors: Xufeng Liu, Jeff Tantsura, Igor Bryskin, Luis Contreras, Qin WU, Sergio Belotti, Reza Rokui, Aihua Guo, Italo Busi
 Working Group: Individual Submissions (none)
An IETF network slice customer may utilize intent-based topologies to express resource reservation intentions within the provider's network. These customer-defined intent topologies allow customers to request shared resources for future connections that can be flexibly allocated and customized. Additionally, they provide an extensive level of control over underlay service paths within the network slice. This document describes a YANG data model for configuring customer intent topologies for network slices using IETF technologies defined in RFC YYYY. [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of draft-ietf-teas-ietf-network-slices once it has been published.
 Removing Expiration Notices from Internet-Drafts
 
 draft-thomson-gendispatch-no-expiry-03.txt
 Date: 16/01/2024
 Authors: Martin Thomson, Paul Hoffman
 Working Group: Individual Submissions (none)
The long-standing policy of requiring that Internet-Drafts bear an expiration date is no longer necessary. This document removes requirements for expiration for Internet-Drafts from RFC 2026/BCP 9 and RFC 2418/BCP 25. In place of expiration, this document introduces Internet-Drafts being labeled "active" and "inactive" in the IETF tooling.
 Deadline-aware Transport Protocol
 
 draft-shi-quic-dtp-09.txt
 Date: 28/01/2024
 Authors: Yong Cui, Chuan Ma, Hang Shi, Kai Zheng, Wei Wang
 Working Group: Individual Submissions (none)
This document defines Deadline-aware Transport Protocol (DTP) to provide block-based deliver-before-deadline transmission. The intention of this memo is to describe a mechanism to fulfill unreliable transmission based on QUIC as well as how to enhance timeliness of data delivery.
 Braid-HTTP: Synchronization for HTTP
 
 draft-toomim-httpbis-braid-http-04.txt
 Date: 18/11/2023
 Authors: Michael Toomim, Greg Little, Rafie Walker, Bryn Bellomy, Seph Gentle
 Working Group: Individual Submissions (none)
Braid is a set of extensions that generalize HTTP from a state *transfer* protocol into a full state *synchronization* protocol. Braid is composed of four independent extensions to HTTP:
 Operational Considerations for BRSKI Registrar
 
 draft-richardson-anima-registrar-considerations-08.txt
 Date: 14/02/2024
 Authors: Michael Richardson, Wei Pan
 Working Group: Individual Submissions (none)
This document describes a number of operational modes that a BRSKI Registration Authority (Registrar) may take on. Each mode is defined, and then each mode is given a relevance within an over applicability of what kind of organization the Registrar is deployed into. This document does not change any protocol mechanisms. This document includes operational advice about avoiding unwanted consequences.
 HTTP Usage in the Industrial Internet Identifier Data Access Protocol (IIIDAP)
 
 draft-ma-identifier-access-http-08.txt
 Date: 18/12/2023
 Authors: Chendi Ma, Jian Chen, Xiaotian Fan, Meilan Chen, Zhiping Li
 Working Group: Individual Submissions (none)
This document describes an Extensible Provisioning Protocol (EPP) for the provisioning and management of enterprises and identifiers between the server which is called Business Management System (BMS) and is entitled to manage the identifier top-level node and the client which is also referred to as Second Node Management System (SNMS). Specified in XML, the mapping defines EPP command syntax and semantics as applied to enterprise and identifier management.
 Security Services for the Industrial Internet Identifier Data Access Protocol (IIIDAP)
 
 draft-mcd-identifier-access-security-08.txt
 Date: 18/12/2023
 Authors: Chendi Ma, Jian Chen, Xiaotian Fan, Meilan Chen, Zhiping Li
 Working Group: Individual Submissions (none)
The Industrial Internet Identifier Data Access Protocol (IIIDAP) provides "RESTful" web services to retrieve identifier metadata from Second-Level Node (SLN). This document describes information security services, including access control, authentication, authorization, availability, data confidentiality, and data integrity for IIIDAP.
 JSON Responses for the Industrial Internet Identifier Data Access Protocol (IIIDAP)
 
 draft-mcd-identifier-access-responce-08.txt
 Date: 18/12/2023
 Authors: Chendi Ma, Jian Chen, Xiaotian Fan, Meilan Chen
 Working Group: Individual Submissions (none)
This document describes JSON data structures representing identifier information maintained by Second-Level Nodes (SLN). These data structures are used to form Industrial Internet Identifier Data Access Protocol (IIIDAP) query responses.
 Finding the Authoritative Registration Data (IIIDAP) Service
 
 draft-mcd-identifier-access-authority-08.txt
 Date: 18/12/2023
 Authors: Chendi Ma, Jian Chen, Xiaotian Fan, Meilan Chen, Zhiping Li
 Working Group: Individual Submissions (none)
This document specifies a method to find which Industrial Internet Identifier Data Access Protocol (IIIDAP) server is authoritative to answer queries for a request of identifier data.
 Industrial Internet Identifier Data Access Protocol (IIIDAP) Query Format
 
 draft-mcd-identifier-access-query-08.txt
 Date: 18/12/2023
 Authors: Chendi Ma, Jian Chen, Xiaotian Fan, Meilan Chen, Zhiping Li
 Working Group: Individual Submissions (none)
This document describes uniform patterns to construct HTTP URLs that may be used to retrieve identifier information from Second-Level Nodes (SLN) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Industrial Internet Identifier Data Access Protocol (IIIDAP).
 Resource Allocation Model for Hybrid Switching Networks
 
 draft-sun-nmrg-hybrid-switching-09.txt
 Date: 14/02/2024
 Authors: Weiqiang Sun, Junyi Shao, Weisheng Hu
 Working Group: Individual Submissions (none)
The fast increase in traffic volumn within and outside Datacenters is placing an unprecendented challenge on the underline network, in both the capacity it can provide, and the way it delivers traffic. When a large portion of network traffic is contributed by large flows, providing high capacity and slow to change optical circuit switching along side fine-granular packet services may potentially improve network utility and reduce both CAPEX and OpEX. This gives rise to the concept of hybrid switching - a paradigm that seeks to make the best of packet and circuit switching. However, the full potential of hybrid switching networks (HSNs) can only be realized when such a network is optimally designed and operated, in the sense that "an appropriate amount of resource is used to handle an appropriate amount of traffic in both switching planes." The resource allocation problem in HSNs is in fact complex ineractions between three components: resource allocation between the two switching planes, traffic partitioning between the two switching planes, and the overall cost or performance constraints. In this memo, we explore the challenges of planning and operating hybrid switching networks, with a particular focus on the resource allocation problem, and provide a high-level model that may guide resource allocation in future hybrid switching networks.
 OSPF Graceful Restart Enhancements
 
 draft-basavaraj-lsr-ospf-gr-enhancements-08.txt
 Date: 26/11/2023
 Authors: Sami Boutros, Ankur Dubey, Vijayalaxmi Basavaraj, Acee Lindem
 Working Group: Individual Submissions (none)
This document describes enhancements to the OSPF graceful restart procedures to improve routing convergence in some OSPF network deployments. This document updates RFC 3623 and RFC 5187.
 (strong) AuCPace,an augmented PAKE
 
 draft-haase-aucpace-09.txt
 Date: 19/01/2024
 Authors: Bjoern Haase
 Working Group: Individual Submissions (none)
This document describes AuCPace which is an augmented PAKE protocol for two parties. The protocol was tailored for constrained devices and smooth migration for compatibility with legacy user credential databases. It is designed to be compatible with any group of both prime- and non-prime order and comes with a security proof providing composability guarantees.
 Stateless and Scalable Network Slice Identification for SRv6
 
 draft-filsfils-spring-srv6-stateless-slice-id-09.txt
 Date: 29/01/2024
 Authors: Clarence Filsfils, Francois Clad, Pablo Camarillo, Syed Raza, Dan Voyer, Reza Rokui
 Working Group: Individual Submissions (none)
This document defines a stateless and scalable solution to achieve network slicing with SRv6.
 BGP-LS Extensions for SR Network Resource Partition SIDs
 
 draft-chen-idr-bgp-ls-transport-slice-06.txt
 Date: 24/01/2024
 Authors: Ran Chen, Shaofu Peng, Tarek Saad, Vishnu Beeram
 Working Group: Individual Submissions (none)
This document specifies extensions to the BGP Link-state address- family in order to advertise the information of Network Resource Partition SIDs. An external component (e.g., a controller) then can collect Network Resource Partition SIDs in the "northbound" direction. The draft is applicable to both SR-MPLS and SRv6 dataplanes.
 Scalable Approaches on Supporting IOAM in IPv6
 
 draft-song-ippm-ioam-ipv6-support-03.txt
 Date: 04/03/2024
 Authors: Haoyu Song, Zhenbin Li, Shuping Peng, Jim Guichard
 Working Group: Individual Submissions (none)
IOAM pre-allocated trace option data fields can be encapsulated in IPv6 HbH options header as described in RFC9486. However, due to the potential large size of the trace data and the HbH extension header location in the IPv6 packets, the scheme creates practical challenges for implementation, especially when other extension headers, such as a routing header, also exist and require on-path processing. We propose two alternative approaches to address this challenge in addition to IOAM DEX: separating the IOAM incremental trace data from the IOAM instruction header, and applying the segment IOAM trace data export scheme, based on the network scenario and application requirements. We discuss the pros and cons of each approach in this document.
 CoAP over GATT (Bluetooth Low Energy Generic Attributes)
 
 draft-amsuess-core-coap-over-gatt-06.txt
 Date: 18/03/2024
 Authors: Christian Amsuess
 Working Group: Individual Submissions (none)
Interaction from computers and cell phones to constrained devices is limited by the different network technologies used, and by the available APIs. This document describes a transport for the Constrained Application Protocol (CoAP) that uses Bluetooth GATT (Generic Attribute Profile) and its use cases.
 BGP for Network High Availability
 
 draft-chen-idr-ctr-availability-08.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Yanhe Fan, Aijun Wang, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes protocol extensions to BGP for improving the reliability or availability of a network controlled by a controller cluster.
 PCE for Network High Availability
 
 draft-chen-pce-ctr-availability-08.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Aijun Wang, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes extensions to Path Computation Element (PCE) communication Protocol (PCEP) for improving the reliability or availability of a network controlled by a controller cluster.
 IGP for Network High Availability
 
 draft-chen-lsr-ctr-availability-08.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mehmet Toy, Aijun Wang, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes protocol extensions to OSPF and IS-IS for improving the reliability or availability of a network controlled by a controller cluster.
 Using Flex-Algo for Segment Routing (SR) based Network Resource Partition (NRP)
 
 draft-zhu-lsr-isis-sr-vtn-flexalgo-07.txt
 Date: 03/03/2024
 Authors: Yongqing Zhu, Jie Dong, Zhibo Hu
 Working Group: Individual Submissions (none)
Enhanced VPNs aim to deliver VPN services with enhanced characteristics, such as guaranteed resources, latency, jitter, etc., so as to support customers requirements for connectivity services with these enhanced characteristics. Enhanced VPN requires integration between the overlay VPN connectivity and the characteristics provided by the underlay network. A Network Resource Partition (NRP) is a subset of the network resources and associated policies on each of a connected set of links in the underlay network. An NRP could be used as the underlay to support one or a group of enhanced VPN services. In some network scenarios, each NRP can be associated with a unique Flexible Algorithm (Flex-Algo), which can provide constraint-path computation based on the customized topological constraints. This document specifies a mechanism to build Segment Routing (SR) based NRPs by combining SR Flex-Algo and IGP L2 bundles with minor extensions.
 Crowd Sourced Remote ID
 
 draft-moskowitz-drip-crowd-sourced-rid-12.txt
 Date: 08/04/2024
 Authors: Robert Moskowitz, Stuart Card, Adam Wiethuechter, Shuai Zhao, Henk Birkholz
 Working Group: Individual Submissions (none)
This document describes using the ASTM Broadcast Remote ID (B-RID) specification in a "crowd sourced" smart phone or fixed receiver asset environment to provide much of the ASTM and FAA envisioned Network Remote ID (Net-RID) functionality. This crowd sourced B-RID (CS-RID) data will use multilateration to add a level of reliability in the location data on the Uncrewed Aircraft (UA). The crowd sourced environment will also provide a monitoring coverage map to authorized observers.
 UAS Operator Privacy for RemoteID Messages
 
 draft-moskowitz-drip-operator-privacy-14.txt
 Date: 16/03/2024
 Authors: Robert Moskowitz, Stuart Card, Adam Wiethuechter
 Working Group: Individual Submissions (none)
This document describes a method of providing privacy for UAS Operator/Pilot information specified in the ASTM UAS Remote ID and Tracking messages. This is achieved by encrypting, in place, those fields containing Operator sensitive data using a hybrid ECIES.
 Secure UAS Network RID and C2 Transport
 
 draft-moskowitz-drip-secure-nrid-c2-14.txt
 Date: 16/03/2024
 Authors: Robert Moskowitz, Stuart Card, Adam Wiethuechter, Andrei Gurtov
 Working Group: Individual Submissions (none)
This document defines a transport mechanism between an Uncrewed Aircraft System (UAS) and its UAS Service Supplier (USS) for Network Remote ID (Net-RID) messages. Either the Broadcast Remote ID (B-RID) messages, or alternatively, appropriate MAVLink Messages can be sent directly over UDP or via a more functional protocol using CoAP/CBOR for the Net-RID messaging. This is secured via either HIP/ESP or DTLS. HIP/ESP or DTLS secure messaging Command-and-Control (C2) for is also described.
 Optimizing ACK mechanism for QUIC
 
 draft-li-quic-optimizing-ack-in-wlan-07.txt
 Date: 20/11/2023
 Authors: Tong Li, Kai Zheng, Rahul Jadhav, Jiao Kang
 Working Group: Individual Submissions (none)
The dependence on frequent acknowledgments (ACKs) is an artifact of current transport protocol designs rather than a fundamental requirement. This document analyzes the problems caused by contentions and collisions on the wireless medium between data packets and ACKs in WLAN and it proposes an ACK mechanism that minimizes the intensity of ACK Frame in QUIC, improving the performance of transport layer connection.
 Notable CBOR Tags
 
 draft-bormann-cbor-notable-tags-10.txt
 Date: 10/02/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
The Concise Binary Object Representation (CBOR, RFC 8949) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. In CBOR, one point of extensibility is the definition of CBOR tags. RFC 8949's original edition, RFC 7049, defined a basic set of 16 tags as well as a registry that can be used to contribute additional tag definitions [IANA.cbor-tags]. Since RFC 7049 was published, at the time of writing some 180 definitions of tags and ranges of tags have been added to that registry. The present document provides a roadmap to a large subset of these tag definitions. Where applicable, it points to a IETF standards or standard development document that specifies the tag. Where no such document exists, the intention is to collect specification information from the sources of the registrations. After some more development, the present document is intended to be useful as a reference document for the IANA registrations of the CBOR tags the definitions of which have been collected.
 SCRAM-SHA-512 and SCRAM-SHA-512-PLUS Simple Authentication and Security Layer (SASL) Mechanisms
 
 draft-melnikov-scram-sha-512-04.txt
 Date: 04/03/2024
 Authors: Alexey Melnikov
 Working Group: Individual Submissions (none)
This document registers the Simple Authentication and Security Layer (SASL) mechanisms SCRAM-SHA-512 and SCRAM-SHA-512-PLUS.
 MAC Address for Layer 3 Link Local Discovery Protocol (LLDP)
 
 draft-eastlake-lldp-mac-01.txt
 Date: 26/12/2023
 Authors: Donald Eastlake
 Working Group: Individual Submissions (none)
IEEE 802 has defined a number of protocols which can operate between adjacent Ethernet stations at Layer 2, including bridges, and may be useful between Layer 3 aware stations such as IP routers and hosts. An example is the Link Layer Discover Protocol (IEEE Std 802.1AB, LLDP). This document specifies a MAC address that can be used for this purpose for interoperability despite intervening bridges.
 Advertising SID Algorithm Information in BGP
 
 draft-peng-idr-segment-routing-te-policy-attr-10.txt
 Date: 14/05/2024
 Authors: Yao Liu, Shaofu Peng, Gyan Mishra
 Working Group: Individual Submissions (none)
This document defines new Segment Types and proposes extensions for BGP to provide algorithm information for SR-MPLS Adjacency-SIDs when delivering SR Policy via BGP.
 Identity Module for TLS Version 1.3
 
 draft-urien-tls-im-10.txt
 Date: 28/01/2024
 Authors: Pascal Urien
 Working Group: Individual Submissions (none)
TLS 1.3 will be deployed in the Internet of Things ecosystem. In many IoT frameworks, TLS or DTLS protocols, based on pre-shared key (PSK), are used for device authentication. So PSK tamper resistance, is a critical market request, in order to prevent hijacking issues. If DH exchange is used with certificate bound to DH ephemeral public key, there is also a benefit to protect its signature procedure. The TLS identity module (im) MAY be based on secure element; it realizes some HKDF operations bound to PSK, and cryptographic signature if certificates are used. Secure Element form factor could be standalone chip, or embedded in SoC like eSIM.
 Trusted Path Routing
 
 draft-voit-rats-trustworthy-path-routing-09.txt
 Date: 22/02/2024
 Authors: Eric Voit, Chennakesava Gaddam, Guy Fedorkow, Henk Birkholz, Meiling Chen
 Working Group: Individual Submissions (none)
There are end-users who believe encryption technologies like IPSec alone are insufficient to protect the confidentiality of their highly sensitive traffic flows. These end-users want their flows to traverse devices which have been freshly appraised and verified for trustworthiness. This specification describes Trusted Path Routing. Trusted Path Routing protects sensitive flows as they transit a network by forwarding traffic to/from sensitive subnets across network devices recently appraised as trustworthy.
 Distributed Ledger Time-Stamp
 
 draft-intesigroup-dlts-07.txt
 Date: 22/11/2023
 Authors: Emanuele Cisbani, Daniele Ribaudo, Giuseppe Damiano
 Working Group: Individual Submissions (none)
This document defines a standard to extend Time Stamp Tokens with Time Attestations recorded on Distributed Ledgers. The aim is to provide long-term validity to Time Stamp Tokens, backward compatible with currently available software.
 Simple Two-way Active Measurement Protocol (STAMP) Extensions for Hop- by-Hop Data Collection
 
 draft-wang-ippm-stamp-hbh-extensions-07.txt
 Date: 24/04/2024
 Authors: Tianran Zhou, Giuseppe Fioccola, Gyan Mishra, Hongwei Yang, Chang Liu
 Working Group: Individual Submissions (none)
This document describes how to use Simple Two-way Active Measurement Protocol (STAMP) test packets in combination with Hybrid Methods to perform Hop-By-Hop measurements in addition to the Edge-To-Edge measurements. It also defines optional TLVs which are carried in STAMP test packets to enhance the STAMP based functions. Such extensions to STAMP enable performance measurement and collection at every node and link along a STAMP test packet's delivery path.
 Stateless SRv6 Point-to-Multipoint Path
 
 draft-chen-pim-srv6-p2mp-path-10.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mike McBride, Yanhe Fan, Zhenbin Li, Xuesong Geng, Mehmet Toy, Gyan Mishra, Aijun Wang, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes a solution for a SRv6 Point-to-Multipoint (P2MP) Path/Tree to deliver the traffic from the ingress of the path to the multiple egresses/leaves of the path in a SR domain. There is no state stored in the core of the network for a SR P2MP path like a SR Point-to-Point (P2P) path in this solution.
 BIER Encapsulation for IOAM Data
 
 draft-xzlnp-bier-ioam-07.txt
 Date: 01/02/2024
 Authors: Xiao Min, Zheng Zhang, Yisong Liu, Nagendra Nainar, Carlos Pignataro
 Working Group: Individual Submissions (none)
In-situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. Bit Index Explicit Replication (BIER) is an architecture that provides optimal multicast forwarding through a "multicast domain", without requiring intermediate routers to maintain any per-flow state or to engage in an explicit tree-building protocol. The BIER header contains a bit- string in which each bit represents exactly one egress router to forward the packet to. This document outlines the requirements to carry IOAM data in BIER header and specifies how IOAM data is encapsulated in BIER header.
 Signal Degrade Indication in Segment Routing over MPLS Network
 
 draft-han-mpls-sdi-sr-05.txt
 Date: 27/12/2023
 Authors: Liuyan Han, Fan Yang, Ren Tan, Junfeng Zhao
 Working Group: Individual Submissions (none)
This document describes a typical use case of MPLS-TP, where signal degrade defect needs to be correctly detected and transmitted via OAM messages within network. When MPLS-TP evolves to Segment Routing MPLS, transit node has no knowledge of labels to be encapsulated in MPLS label stack. Transit node cannot spread OAM messages with signal degrade defect indication. Thus, a solution is proposed in this draft.
 SCRAM-SHA3-512 and SCRAM-SHA3-512-PLUS Simple Authentication and Security Layer (SASL) Mechanisms
 
 draft-melnikov-scram-sha3-512-04.txt
 Date: 04/03/2024
 Authors: Alexey Melnikov
 Working Group: Individual Submissions (none)
This document registers the Simple Authentication and Security Layer (SASL) mechanisms SCRAM-SHA3-512 and SCRAM-SHA3-512-PLUS.
 Interconnection Intents
 
 draft-contreras-nmrg-interconnection-intents-04.txt
 Date: 04/03/2024
 Authors: Luis Contreras, Paolo Lucente
 Working Group: Individual Submissions (none)
This memo introduces the use case of the usage of intents for expressing advance interconnection features, further than traditional IP peering.
 Cacheable OSCORE
 
 draft-amsuess-core-cachable-oscore-08.txt
 Date: 10/01/2024
 Authors: Christian Amsuess, Marco Tiloca
 Working Group: Individual Submissions (none)
Group communication with the Constrained Application Protocol (CoAP) can be secured end-to-end using Group Object Security for Constrained RESTful Environments (Group OSCORE), also across untrusted intermediary proxies. However, this sidesteps the proxies' abilities to cache responses from the origin server(s). This specification restores cacheability of protected responses at proxies, by introducing consensus requests which any client in a group can send to one server or multiple servers in the same group.
 AS Hijack Detection and Mitigation
 
 draft-sriram-sidrops-as-hijack-detection-07.txt
 Date: 24/01/2024
 Authors: Kotikalapudi Sriram, Doug Montgomery
 Working Group: Individual Submissions (none)
This document proposes a method for detection and mitigation of AS hijacking. In this mechanism, an AS operator registers a new object in the RPKI called 'ROAs Exist for All Prefixes (REAP)'. REAP is digitally signed using the AS holder's certificate. By registering a REAP object, the AS operator is declaring that they have Route Origin Authorization (ROA) coverage for all prefixes originated by their AS. A receiving AS will mark a route as Invalid if the prefix is not covered by any Validated ROA Payload (VRP) and the route origin AS has signed a REAP. Here Invalid means that the route is determined to be an AS hijack.
 SVG Tiny Portable/Secure
 
 draft-svg-tiny-ps-abrotman-07.txt
 Date: 03/03/2024
 Authors: Alex Brotman, J. Adams
 Working Group: Individual Submissions (none)
This document specifies SVG Tiny Portable/Secure (SVG Tiny PS) -- A Scalable Vector Graphics (SVG) profile to be used with documents that are intended for use with more secure requirements, and in some cases, in conjunction with a limited rendering engine.
 Federated TLS Authentication
 
 draft-halen-fed-tls-auth-11.txt
 Date: 03/04/2024
 Authors: Jakob Schlyter, Stefan Halen
 Working Group: Individual Submissions (none)
This document describes the Federated TLS Authentication (FedTLS) protocol, enabling secure end-to-end communication within a federated environment. Both clients and servers perform mutual TLS authentication, establishing trust based on a centrally managed trust anchor published by the federation. Additionally, FedTLS ensures unambiguous identification of entities, as only authorized members within the federation can publish metadata, further mitigating risks associated with unauthorized entities impersonating legitimate participants. This framework promotes seamless and secure interoperability across different trust domains adhering to common policies and standards within the federation.
 MSYNC
 
 draft-bichot-msync-15.txt
 Date: 22/12/2023
 Authors: Sophie Bale, Remy Brebion, Guillaume Bichot
 Working Group: Individual Submissions (none)
This document specifies the Multicast Synchronization (MSYNC) Protocol. MSYNC is intended to transfer video media objects over IP multicast. Although generic, MSYNC has been primarily designed for transporting HTTP adaptive streaming (HAS) objects including manifests/playlists and media segments (e.g., CMAF) according to a HAS protocol such as Apple HLS or MPEG DASH between a multicast sender and a multicast receiver.
 Binary Application Record Encoding (BARE)
 
 draft-devault-bare-11.txt
 Date: 19/03/2024
 Authors: Drew DeVault
 Working Group: Individual Submissions (none)
The Binary Application Record Encoding (BARE) is a data format used to represent application records for storage or transmission between programs. BARE messages are concise and have a well-defined schema, and implementations may be simple and broadly compatible. A schema language is also provided to express message schemas out-of-band. Comments Comments are solicited and should be addressed to the mailing list at ~sircmpwn/public-inbox@lists.sr.ht and/or the author(s).
 Revised Cookie Processing in the IKEv2 Protocol
 
 draft-smyslov-ipsecme-ikev2-cookie-revised-07.txt
 Date: 08/04/2024
 Authors: Valery Smyslov
 Working Group: Individual Submissions (none)
This document defines a revised processing of cookies in the Internet Key Exchange protocol Version 2 (IKEv2). It is intended to solve a problem in IKEv2 when due to packets loss and reordering peers may erroneously fail to authenticate each other when cookies are used in the initial IKEv2 exchange.
 BIER Egress Protection
 
 draft-chen-bier-egress-protect-07.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mike McBride, Aijun Wang, Gyan Mishra, Yisong Liu, Michael Menth, Boris Khasanov, Xuesong Geng, Yanhe Fan, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes a mechanism for fast protection against the failure of an egress node of a "Bit Index Explicit Replication" (BIER) domain. It is called BIER egress protection. It does not require any per-flow state in the core of the domain. With BIER egress protection the failure of a primary BFER (Bit Forwarding Egress Router) is protected with a backup BFER such that traffic destined to the primary BFER in the BIER domain is fast rerouted by a neighbor BFR to the backup BFER on the BIER layer. The mechanism is applicable if all BIER traffic sent to the primary BFER can reach its destination also via the backup BFER. It is complementary to BIER- FRR which cannot protect against the failure of a BFER.
 Security Management Automation of Cloud-Based Security Services in I2NSF Framework
 
 draft-jeong-i2nsf-security-management-automation-07.txt
 Date: 07/02/2024
 Authors: Jaehoon Jeong, Patrick Lingga, J., PARK, Diego Lopez, Susan Hares
 Working Group: Individual Submissions (none)
This document describes Security Management Automation (SMA) of cloud-based security services in the framework of Interface to Network Security Functions (I2NSF). The security management automation in this document deals with closed-loop security control, security policy translation, and security audit. To support these three features in SMA, this document specifies an augmented architecture of the I2NSF framework with new system components and new interfaces.
 SRH TLV Processing Programming
 
 draft-li-spring-srh-tlv-processing-programming-06.txt
 Date: 19/02/2024
 Authors: Cheng Li, Yang Xia, Dhruv Dhody, Zhenbin Li
 Working Group: Individual Submissions (none)
This document proposes a mechanism to program the processing rules of Segment Routig Header (SRH) optional TLVs explicitly on the ingress node. In this mechanism, there is no need to configure local configuration at the node to support SRH TLV processing. A network operator can program to process specific TLVs on specific segment endpoint nodes for specific packets on the ingress node, which is more efficient for SRH TLV processing.
 SRv6 In-situ Active Measurement
 
 draft-song-spring-siam-07.txt
 Date: 04/03/2024
 Authors: Haoyu Song, Gyan Mishra, Tian Pan
 Working Group: Individual Submissions (none)
This draft describes an active measurement method for SRv6 which can support segment-by-segment and end-to-end measurement on any SRv6 path using existing protocols such as IOAM. A packet containing an SRH uses a flag bit to indicate the packet is an active probing packet and requires segment-by-segment processing. The measurement information, such as the IOAM header and data, is encapsulated in UDP payload, indicated by a dedicated port number. The probing packet originates from a segment source node, traverses an arbitrary segment path, and terminates at a segment endpoint node, as configured by the segment list in SRH. Each segment node on the path, when detecting the flag, shall parse the UDP header and the payload. In the case of IOAM, the node shall process the IOAM option conforming to the standard procedures defined in the IOAM documents. The method is compatible with some other SRv6 active measurement proposals and support multiple applications.
 SR-MPLS / SRv6 Transport Interworking
 
 draft-bonica-spring-srv6-end-dtm-11.txt
 Date: 01/01/2024
 Authors: Shraddha Hegde, Parag Kaneriya, Ron Bonica, Shaofu Peng, Greg Mirsky, Zheng Zhang, Bruno Decraene, Dan Voyer, Swadesh Agrawal
 Working Group: Individual Submissions (none)
This document describes procedures for interworking between an SR- MPLS transit domain and an SRv6 transit domain. Each domain contains Provider Edge (PE) and Provider (P) routers. Area Border Routers (ABR) provide connectivity between domains. The procedures described in this document require the ABR to carry a route to each PE router. However, they do not required the ABR to carry service (i.e., customer) routes. In that respect, these procedures resemble L3VPN Interprovider Option C. Procedures described in this document support interworking for global IPv4 and IPv6 service prefixes. They do not support interworking for VPN services prefixes where the SR-MPLS domain uses MPLS service labels.
 Application of the Alternate Marking Method to the Segment Routing Header
 
 draft-fz-spring-srv6-alt-mark-08.txt
 Date: 08/02/2024
 Authors: Giuseppe Fioccola, Tianran Zhou, Mauro Cociglio, Gyan Mishra, xuewei wang, Geng Zhang
 Working Group: Individual Submissions (none)
The Alternate Marking Method is a passive performance measurement method based on marking consecutive batches of packets, which can be used to measure packet loss, latency, and jitter of live traffic. This method requires a packet marking method so that packet flows can be distinguished and identified. A mechanism to carry suitable packet marking in the Hop-by-Hop Header and the Destination Options Header of an IPv6 packet is described in RFC 9343 and is also applicable to Segment Routing for IPv6 (SRv6). This document describes an alternative approach that uses a new TLV in the Segment Routing Header (SRH) of an SRv6 packet. This approach has been implemented and has potential scaling and simplification benefits over the technique described in RFC 9343. This protocol extension has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale deployment to determine the potential benefits of this approach.
 BGP Extensions of SR Policy for Composite Candidate Path
 
 draft-li-idr-sr-policy-composite-path-06.txt
 Date: 26/02/2024
 Authors: Hao Li, Mengxiao Chen, Changwang Lin, Jiang Wenying, Weiqiang Cheng
 Working Group: Individual Submissions (none)
Segment Routing is a source routing paradigm that explicitly indicates the forwarding path for packets at the ingress node. An SR Policy is associated with one or more candidate paths. A candidate path is either dynamic, explicit or composite. This document defines extensions to BGP to distribute SR policies carrying composite candidate path information. So that composite candidate paths can be installed when the SR policy is applied.
 Signaling Composite Candidate Path of SR Policy using BGP-LS
 
 draft-li-idr-bgpls-sr-policy-composite-path-06.txt
 Date: 26/02/2024
 Authors: Hao Li, Mengxiao Chen, Changwang Lin, Jiang Wenying, Weiqiang Cheng
 Working Group: Individual Submissions (none)
Segment Routing is a source routing paradigm that explicitly indicates the forwarding path for packets at the ingress node. An SR Policy is associated with one or more candidate paths, and each candidate path is either dynamic, explicit or composite. This document specifies the extensions to BGP Link State (BGP-LS) to carry composite candidate path information in the advertisement of an SR policy.
 PCEP Extensions for sid verification for SR-MPLS
 
 draft-chen-pce-sr-mpls-sid-verification-08.txt
 Date: 21/02/2024
 Authors: Ran Chen, Samuel Sidor, Chun Zhu, Alex Tokar, Mike Koldychev
 Working Group: Individual Submissions (none)
This document defines a new flag for indicating the headend is explicitly requested to verify SID(s) by the PCE.
 Simple Two-Way Direct Loss Measurement Procedure
 
 draft-gandhi-ippm-simple-direct-loss-07.txt
 Date: 04/02/2024
 Authors: Rakesh Gandhi, Clarence Filsfils, Dan Voyer, Mach Chen, Bart Janssens
 Working Group: Individual Submissions (none)
This document defines Simple Two-Way Direct Loss Measurement (DLM) procedure that can be used for Alternate-Marking Method for detecting accurate data packet loss in a network. Specifically, DLM probe packets are defined for both unauthenticated and authenticated modes and they are efficient for hardware-based implementation.
 Layer-3 Accessible EVPN Services
 
 draft-wang-bess-l3-accessible-evpn-06.txt
 Date: 20/03/2024
 Authors: Wei Wang, Aijun Wang, Haibo Wang
 Working Group: Individual Submissions (none)
This draft describes layer-3 accessible EVPN service interfaces, and proposes a new solution which can span layer-3 network. This solution allows each PE in EVPN network to maintain only one MAC-VRF.
 PCE for BIER-TE Path
 
 draft-chen-pce-bier-te-path-07.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Mike McBride, Aijun Wang, Gyan Mishra, Yisong Liu, Yanhe Fan, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes extensions to Path Computation Element (PCE) communication Protocol (PCEP) for supporting Bit Index Explicit Replication (BIER) Traffic Engineering (TE) paths.
 BIER-TE Fast ReRoute
 
 draft-chen-bier-te-frr-07.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mike McBride, Yisong Liu, Aijun Wang, Gyan Mishra, Yanhe Fan, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes a mechanism for fast re-route (FRR) protection against the failure of a transit node or link on an explicit point to multipoint (P2MP) multicast path/tree in a "Bit Index Explicit Replication" (BIER) Traffic Engineering (TE) domain. It does not have any per-path state in the core. For a multicast packet to traverse a transit node along an explicit P2MP path, when the node fails, its upstream hop node as a PLR reroutes the packet around the failed node along the P2MP path once it detects the failure.
 BIER-TE Egress Protection
 
 draft-chen-bier-te-egress-protect-07.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mike McBride, Aijun Wang, Gyan Mishra, Yisong Liu, Yanhe Fan, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes a mechanism for fast protection against the failure of an egress node of an explicit point to multipoint (P2MP) multicast path/tree in a "Bit Index Explicit Replication" (BIER) Traffic Engineering (TE) domain. It does not have any per-flow state in the core of the domain. For a multicast packet to the egress node, when the egress node fails, its upstream hop as a PLR sends the packet to the egress' backup node once the PLR detects the failure.
 NTS4PTP - Key Management System for the Precision Time Protocol Based on the Network Time Security Protocol
 
 draft-langer-ntp-nts-for-ptp-07.txt
 Date: 16/02/2024
 Authors: Martin Langer, Rainer Bermbach
 Working Group: Individual Submissions (none)
This document specifies an automatic key management service for the integrated security mechanism (prong A) of IEEE Std 1588™-2019 (PTPv2.1) described there in Annex P. This key management follows the immediate security processing approach of prong A and extends the NTS Key Establishment protocol defined in IETF RFC 8915 for securing NTPv4. The resulting NTS for PTP (NTS4PTP) protocol provides a security solution for all relevant PTP modes and operates completely independent of NTPv4.
 Applicability of IETF-Defined Service and Network Data Models for Network Slice Service Management
 
 draft-barguil-teas-network-slices-instantation-09.txt
 Date: 15/04/2024
 Authors: Samier Barguil, Luis Contreras, Victor Lopez, Oscar de Dios, Mohamed Boucadair, Reza Rokui
 Working Group: Individual Submissions (none)
This document exemplifies how the various data models that are produced in the IETF can be combined in the context of Network Slice Services delivery. Specifically, this document describes the relationship between the Network Slice Service models for requesting Network Slice Services and both Service (e.g., the L3VPN Service Model, the L2VPN Service Model) and Network (e.g., the L3VPN Network Model, the L2VPN Network Model) models used during their realizations. In addition, this document describes the communication between a Network Slice Controller (NSC) and the network controllers for the realization of Network Slices. The Network Slice Service YANG model provides a customer-oriented view of the intended Network slice Service. Thus, once an NSC receives a request for a Slice Service request, the NSC has to map it to accomplish the specific objectives expected by the network controllers. Existing YANG network models are analyzed against Network Slice requirements, and the gaps in existing models are identified.
 Semantic Definition Format (SDF) for Data and Interactions of Things: Compact Notation
 
 draft-bormann-asdf-sdf-compact-06.txt
 Date: 25/04/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
The Semantic Definition Format (SDF) is a format for domain experts to use in the creation and maintenance of data and interaction models that describe Things, i.e., physical objects that are available for interaction over a network. It was created as a common language for use in the development of the One Data Model liaison organization (OneDM) definitions. Tools convert this format to database formats and other serializations as needed. The SDF format is mainly intended for interchange between machine generation and machine processing. However, there is often a need for humans to look at and edit SDF models. Similar to the way Relax-NG as defined in ISO/IEC 19757-2 has an XML- based format and a compact format (its Annex C), this specification defines a compact format to go along SDF's JSON-based format. The present version of this document is mostly a proof of concept, but was deemed useful to obtain initial feedback on the approach taken.
 The Time Zone Information Format (TZif)
 
 draft-murchison-rfc8536bis-15.txt
 Date: 08/05/2024
 Authors: Arthur Olson, Paul Eggert, Kenneth Murchison
 Working Group: Individual Submissions (none)
This document specifies the Time Zone Information Format (TZif) for representing and exchanging time zone information, independent of any particular service or protocol. Two media types for this format are also defined. This document replaces and obsoletes RFC 8536.
 Scalable Remote Attestation for Systems,Containers,and Applications
 
 draft-moriarty-attestationsets-07.txt
 Date: 28/03/2024
 Authors: Kathleen Moriarty, Monty Wiseman, A.J. Stein
 Working Group: Individual Submissions (none)
This document establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls that are defined and grouped by an external entity, preventing the need to send over individual attestations for each item within a benchmark or control framework. This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats for use as an Entity Attestation Token (EAT).
 Security Technical Specification for Smart Devices of IoT
 
 draft-wang-iot-devices-security-05.txt
 Date: 14/04/2024
 Authors: Bin Wang, Xing Wang, Li Wan, Wenyuan Xu, Chonghua Wang, HaoNan Yan, Yinghui Xie
 Working Group: Individual Submissions (none)
With the development of IoT, the security of smart devices has become an important issue for us to discuss. This draft proposes a security framework and detailed requirements in terms of hardware, system, data, network, and management to ensure the security of IoT smart devices. Specifically, hardware security includes the security of hardware interfaces and components. System security encompasses firmware security, security audits, and more. Data security involves data verification and protection of sensitive data.Network security entails stream protection, session security, and more.
 Technical Requirements for Secure Access and Management of IoT Smart Terminals
 
 draft-wang-secure-access-of-iot-terminals-06.txt
 Date: 14/04/2024
 Authors: Bin Wang, Song Liu, Li Wan, Jun Li, Xing Wang, HaoNan Yan, Yinghui Xie
 Working Group: Individual Submissions (none)
It is difficult to supervise the great deal of Internet of Things (IoT) smart terminals which are widely distributed. Furthermore, a large number of smart terminals (such as IP cameras, access control terminals, traffic cameras, etc.) running on the network have high security risks in access control. This draft introduces the technical requirements for access management and control of IoT smart terminals, which is used to solve the problem of personate and illegal connection in the access process, and enables users to strengthen the control of devices and discover devices that is offline in time, so as to ensure the safety and stability of smart terminals in the access process.
 Open Service Access Protocol for IoT Smart Devices
 
 draft-wang-open-service-access-protocol-05.txt
 Date: 14/04/2024
 Authors: Bin Wang, Shaopeng Zhou, Chao Li, Chunming Wu, Zizhao Wang, HaoNan Yan, Yinghui Xie
 Working Group: Individual Submissions (none)
With the development of IoT (Internet of Things) technology, everything becomes interconnected. Mass IoT data, devices, businesses, and services adopt different data descriptions and service access methods, resulting in fragmentation issues such as data heterogeneity, device heterogeneity, and application heterogeneity. These issues hinder the development of the industry. To solve this problem, this draft proposes the requirements for IoT smart devices to transmit and control, as well as transmission and protocol interfaces. It is intended for program design, system testing and acceptance, and related research. The structured, unified, and standardized open service interconnection model reduces business replication costs and eliminates service barriers, thus promoting industrial development.
 Fetch and Validation of Verified Mark Certificates
 
 draft-fetch-validation-vmc-wchuang-06.txt
 Date: 03/03/2024
 Authors: Wei Chuang, Marc Bradshaw, Thede Loder, Alex Brotman
 Working Group: Individual Submissions (none)
A description of how entities wishing to validate a Verified Mark Certificate (VMC) should retrieve and validate these documents. This document is a companion to BIMI core specification, which should be consulted alongside this document.
 BIMI Reporting
 
 draft-adams-bimi-reporting-06.txt
 Date: 03/03/2024
 Authors: J. Adams, Alex Brotman
 Working Group: Individual Submissions (none)
To support the utility of Brand Indicators for Message Identification (BIMI), domains publishing BIMI records may find it useful to know when their logos are failing to be displayed as expected. When an entity, for example a mailbox operator, determines whether or not to display the logo identified in the BIMI record, they may encounter errors trying to retrieve the image file. Similarly, the associated evidence document used to validate the logo may fail evaluation. In other cases, the evaluator may decide that despite everything validating, they may rely on local policies that determine validated logos should still not be displayed. This specification defines how BIMI evaluators should report their evaluation outcome back to the publisher within the context of existing Domain-based Message Authentication, Reporting, and Conformance (DMARC) reports.
 Common Format and MIME Type for Comma-Separated Values (CSV) Files
 
 draft-shafranovich-rfc4180-bis-06.txt
 Date: 31/01/2024
 Authors: Yakov Shafranovich
 Working Group: Individual Submissions (none)
This RFC documents the common format used for Comma-Separated Values (CSV) files and updates the associated MIME type "text/csv".
 Data Transmission Security of Identity Resolution in Industrial Internet
 
 draft-wang-data-transmission-security-irii-05.txt
 Date: 16/04/2024
 Authors: Bin Wang, Kezhang Lin, Chonghua Wang, Xing Wang, HaoNan Yan, Yinghui Xie
 Working Group: Individual Submissions (none)
This draft presents a comprehensive overview of the data transmission security within the identity resolution system for the Industrial Internet. Identity resolution systems play a vital role in the Industrial Internet, facilitating secure sharing and intelligent correlation of heterogeneous information across various organizations. This draft focuses on the security services that identity resolution systems should provide during the resolution process.
 Retrieving information about Object Identifiers using a text-based protocol
 
 draft-viathinksoft-oidip-07.txt
 Date: 23/01/2024
 Authors: Daniel Marschall
 Working Group: Individual Submissions (none)
This document defines a method for retrieving information about Object Identifiers (OIDs) and their associated Registration Authorities (RAs) through a text-based protocol, in a way that is both human-readable and machine-readable. Besides a text output format, OID-IP also supports sending information in JSON and XML.
 Using NETCONF over QUIC connection
 
 draft-dai-netconf-quic-netconf-over-quic-06.txt
 Date: 19/04/2024
 Authors: Jinyou Dai, Shaohua Yu, Weiqiang Cheng, Marc Blanchet, Per Andersson
 Working Group: Individual Submissions (none)
The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. NETCONF can be carried over various transports such as TCP, SSH or else. QUIC provides useful semantics for Network management and NETCONF in particular as a single connection can carry multiple requests over streams, enabling much better efficiency and performance for both peers. QUIC provides shorter handshake and includes TLS. QUIC is also more adaptable to more difficult environments such as those with long delays. This document describes how to use NETCONF over the QUIC transport protocol, named NETCONFoQUIC.
 Internet of Secure Elements
 
 draft-urien-coinrg-iose-08.txt
 Date: 25/02/2024
 Authors: Pascal Urien
 Working Group: Individual Submissions (none)
This draft defines an infrastructure for secure elements over internet, and features needed for their secure remote use. It describes a network architecture based on the TLS 1.3 protocol, which enables remote calls of cryptographic procedures, identified by Unified Resource Identifier (URI) such as schemeS://sen@server.com:443/?query The Internet of Secure Element (IoSE) is a set of secure elements providing TLS servers, communication interfaces, and identified by their name (Secure Element Name, sen).
 PCEP Procedures and Extension for VLAN-based Traffic Forwarding
 
 draft-wang-pce-vlan-based-traffic-forwarding-09.txt
 Date: 09/04/2024
 Authors: Yue Wang, Aijun Wang, Boris Khasanov, Fengwei Qin, Huaimo Chen, Chun Zhu
 Working Group: Individual Submissions (none)
This document defines the Path Computation Element Communication Protocol (PCEP) extension for VLAN-based traffic forwarding in native IP network and describes the essential elements and key processes of the data packet forwarding system based on VLAN info to accomplish the End to End (E2E) traffic assurance for VLAN-based traffic forwarding in native IP network.
 HESP - High Efficiency Streaming Protocol
 
 draft-theo-hesp-06.txt
 Date: 17/04/2024
 Authors: Pieter-Jan Speelmans
 Working Group: Individual Submissions (none)
This document describes a protocol for delivering multimedia data, enabling ultra-low latency and fast channel change over HTTP networks. It specifies the data format of the files and the actions to be taken by the server (sender) and the clients (receivers) of the streams. It describes version 2 of this protocol.
 Problem Statement and Use Cases of Trustworthiness-based Routing
 
 draft-lin-opsec-trustroute-problem-statement-04.txt
 Date: 23/01/2024
 Authors: Tao Lin, Hao Li, Xingang Shi, Xia Yin, Wenlong Chen, Mengxiao Chen
 Working Group: Individual Submissions (none)
Currently, network operators are trying to provide fine-granularity Service Level Agreement (SLA) guarantee to achieve better Quality of Experience (QoE) for end users and engage customers, such as ultra- low latency and high reliability service. However, with increasing security threats, differentiated QoE services are insufficient, the demands for more differentiated security service are emerging. This document explores the requirements for differentiated security services and identifies the scenarios for network operators. To provide differentiated security services, possible trustworthiness- based routing solution is discussed.
 SRv6-based BGP Service Capability
 
 draft-lz-bess-srv6-service-capability-05.txt
 Date: 22/02/2024
 Authors: Yao Liu, Zheng Zhang, Eduard Metz, Yisong Liu
 Working Group: Individual Submissions (none)
This draft describes the problems that may be encountered during the deployment of SRv6-based BGP services in the co-existence scenario where the network supports both SRv6 and MPLS in a given domain, and the possible solutions.
 Problems and Requirements of Satellite Constellation for Internet
 
 draft-lhan-problems-requirements-satellite-net-06.txt
 Date: 04/01/2024
 Authors: Lin Han, Richard LI, Alvaro Retana, Meiling Chen, Li Su, Tianji Jiang
 Working Group: Individual Submissions (none)
This document presents the detailed analysis about the problems and requirements of satellite constellation used for Internet. It starts from the satellite orbit basics, coverage calculation, then it estimates the time constraints for the communications between satellite and ground-station, also between satellites. How to use satellite constellation for Internet is discussed in detail including the satellite relay and satellite networking. The problems and requirements of using traditional network technology for satellite network integrating with Internet are finally outlined.
 Find Code Related to an Internet-Draft or RFC
 
 draft-eckel-edm-find-code-04.txt
 Date: 22/01/2024
 Authors: Charles Eckel
 Working Group: Individual Submissions (none)
Code related to existing IETF standards and ongoing standardization efforts may exist and be publicly accessible in many places. This document provides a set of practices to make it easier to identify and find such code.
 SRv6 inter-domain mapping SIDs
 
 draft-salih-spring-srv6-inter-domain-sids-05.txt
 Date: 18/03/2024
 Authors: Rajesh Shetty, Ron Bonica, Haibo Wang, Shaofu Peng
 Working Group: Individual Submissions (none)
This document describes three new SRv6 end-point behaviors, called END.REPLACE, END.REPLACEB6 and END.DB6. These behaviors are used in distributed inter-domain solutions and are normally executed on border routers. They also can be used to provide multiple intent- based paths across these domains.
 Security for the NFSv4 Protocols
 
 draft-dnoveck-nfsv4-security-09.txt
 Date: 21/04/2024
 Authors: David Noveck
 Working Group: Individual Submissions (none)
This document describes the core security features of the NFSv4 family of protocols, applying to all minor versions. The discussion includes the use of security features provided by RPC on a per- connection basis. Important aspects of the authorization model, related to the ACL feature, will be specified in a separate document. The current version of the document is intended, in large part, to result in working group discussion regarding existing NFSv4 security issues and to provide a framework for addressing these issues and obtaining working group consensus regarding necessary changes. When the resulting documents (i.e. this document and one derived from the separate ACL specification) are eventually published as RFCs, they will, by updating these documents, supersede the description of security appearing in existing minor version specification documents such as RFC 7530 and RFC 8881,
 PCE for BIER-TE Ingress Protection
 
 draft-chen-pce-bier-te-ingress-protect-04.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Mike McBride, Gyan Mishra, Yisong Liu, Aijun Wang, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes extensions to Path Computation Element (PCE) communication Protocol (PCEP) for protecting the ingress of a BIER-TE path.
 EVPN multi-homing support for L3 services
 
 draft-mackenzie-bess-evpn-l3mh-proto-04.txt
 Date: 07/02/2024
 Authors: Michael MacKenzie, Patrice Brissette, Satoru Matsushima, Wen Lin, Jorge Rabadan
 Working Group: Individual Submissions (none)
This document introduces the utilization of EVPN Multi-Chassis Link Aggregation Group (MC-LAG) technology to enhance network availability and load balancing for various L3 services in EVPN.
 Encoding Network Slice Identification for SRv6
 
 draft-cheng-spring-srv6-encoding-network-sliceid-08.txt
 Date: 07/01/2024
 Authors: Weiqiang Cheng, Peiyong Ma, Fenghua Ren, Changwang Lin, Liyan Gong, Shay Zadok, Mingyu Wu, xuewei wang
 Working Group: Individual Submissions (none)
This document describes a method to encode network slicing identifier within SRv6 domain.
 YANG Data Model for Topology Filter
 
 draft-bestbar-teas-yang-topology-filter-05.txt
 Date: 20/02/2024
 Authors: Vishnu Beeram, Tarek Saad, Rakesh Gandhi, Xufeng Liu
 Working Group: Individual Submissions (none)
This document defines a YANG data model for the management of topology filters/filter-sets on network elements and controllers.
 Service Function Chaining (SFC) Parallelism and Diversions
 
 draft-eastlake-sfc-parallel-07.txt
 Date: 26/11/2023
 Authors: Donald Eastlake
 Working Group: Individual Submissions (none)
Service Function Chaining (SFC) is the processing of packets through a sequence of Service Functions (SFs) within an SFC domain by the addition of path information and metadata on entry to that domain, the use and modification of that path information and metadata to step the packet through a sequence of SFs, and the removal of that path information and metadata on exit from that domain. The IETF has standardized a method for SFC using the Network Service Header specified in RFC 8300. There are requirements for SFC to process packets through parallel sequences of service functions, rejoining thereafter, and to easily splice in additional service functions or splice service functions out of a service chain. The IETF has received a liaison from International Telecommunication Union (ITU) indicating their interest in such requirements. This document provides use cases and specifies extensions to SFC to support these requirements.
 Encapsulation of Simple Two-Way Active Measurement Protocol for Pseudowires and LSPs in MPLS Networks
 
 draft-gandhi-mpls-stamp-pw-06.txt
 Date: 25/03/2024
 Authors: Rakesh Gandhi, Patrice Brissette, Eddie Leyton, Xiao Min
 Working Group: Individual Submissions (none)
Pseudowires (PWs) and Label Switched Paths (LSPs) are used in MPLS networks for various services including carrying layer 2 and layer 3 data packets. This document describes the procedure for encapsulation of the Simple Two-Way Active Measurement Protocol (STAMP) defined in RFC 8762 and its optional extensions defined in RFC 8972 for PWs and LSPs in MPLS networks. The procedure uses Generic Associated Channel (G-ACh) to encapsulate the STAMP test packets with or without adding an IP/UDP header.
 Security and Privacy Considerations for Multicast Transports
 
 draft-krose-multicast-security-06.txt
 Date: 27/12/2023
 Authors: Kyle Rose, Jake Holland
 Working Group: Individual Submissions (none)
Interdomain multicast has unique potential to solve delivery scalability for popular content, but it carries a set of security and privacy issues that differ from those in unicast delivery. This document analyzes the security threats unique to multicast-based delivery for Internet and Web traffic under the Internet and Web threat models. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/squarooticus/draft-krose-multicast-security.
 Autoconfiguration of infrastructure services in ACP networks via DNS-SD over GRASP
 
 draft-eckert-anima-services-dns-autoconfig-04.txt
 Date: 05/01/2024
 Authors: Toerless Eckert, Mohamed Boucadair, Christian Jacquenet, Michael Behringer
 Working Group: Individual Submissions (none)
This document defines standards that enable autoconfiguration of fundamental centralized or decentralized network infrastructure services on ACP network nodes via GRASP. These are primarily the services required for initial bootstrapping of a network but will persist through the lifecycles of the network. These services include secure remote access to zero-touch bootstrapped ANI devices via SSH/Netconf with Radius/Diameter authentication and authorization and provides lifecycle autoconfiguration for other crucial services such as syslog, NTP (clock synchronization) and DNS for operational purposes.
 Transient Hiding of Hop-by-Hop Options
 
 draft-eastlake-6man-hide-options-06.txt
 Date: 31/12/2023
 Authors: Donald Eastlake, Jie Dong
 Working Group: Individual Submissions (none)
There are an increasing number of IPv6 hop-by-hop options specified but such IPv6 options are poorly handled, particularly by high-speed routers in the core Internet where packets having options may be discarded. This document proposes a simple method of transiently hiding such options for part of a packet's path to protect the packet from discard or mishandling.
 KEM-based Authentication for TLS 1.3
 
 draft-celi-wiggers-tls-authkem-03.txt
 Date: 15/04/2024
 Authors: Thom Wiggers, Sofia Celi, Peter Schwabe, Douglas Stebila, Nick Sullivan
 Working Group: Individual Submissions (none)
This document gives a construction for a Key Encapsulation Mechanism (KEM)-based authentication mechanism in TLS 1.3. This proposal authenticates peers via a key exchange protocol, using their long- term (KEM) public keys.
 MPLS Network Action for Transporting In Situ OAM Data Fields
 
 draft-gandhi-mpls-ioam-12.txt
 Date: 17/03/2024
 Authors: Rakesh Gandhi, Frank Brockners, Bin Wen, Bruno Decraene, Haoyu Song
 Working Group: Individual Submissions (none)
In Situ Operations, Administration, and Maintenance (IOAM) is used for recording and collecting operational and telemetry information while the packet traverses a path between two points in the network. This document defines MPLS Network Action for transporting IOAM data fields.
 Advertisement of Stub Link Attributes
 
 draft-wang-lsr-stub-link-attributes-08.txt
 Date: 24/11/2023
 Authors: Aijun Wang, Zhibo Hu, Gyan Mishra, Jinsong Sun
 Working Group: Individual Submissions (none)
This document describes the mechanism that can be used to advertise the stub link attributes within the IS-IS or OSPF domain.
 MTU propagation over EVPN Overlays
 
 draft-saum-nvo3-mtu-propagation-over-evpn-overlays-05.txt
 Date: 28/01/2024
 Authors: DIKSHIT Saumya, Vinayak Joshi, A Nayak
 Working Group: Individual Submissions (none)
Path MTU Discovery between end-host-devices/Virtual-Machines/servers/ workloads connected over an EVPN-Overlay Network in Datacenter/Campus/enterprise deployment, is a problem, yet to be resolved in the standards forums. It needs a converged solution to ensure optimal usage of network and computational resources of the networking elements, including underlay routers/switches, constituting the overlay network. This documents takes leads from the guidelines presented in [RFC4459]. The overlay connectivity can pan across various sites (geographically seperated or collocated) for realizing a Datacenter Interconnect or intersite VPNs between campus sites (buildings, branch offices etc). This literature intends to solve problem of icmp error propagation from an underlay routing/switching device to an end-host (hooked to EVPN overlay), thus facilitating "accurate MTU" learnings. This document also leverages the icmp multipart message extension, mentioned in [RFC4884] to carry the original packet in the icmp PDU.
 Knowledge Transmission Using Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel
 
 draft-li-dots-knowledge-trans-06.txt
 Date: 20/02/2024
 Authors: Kun Li, Hua-chun Zhou, Zhe Tu, Feiyang Liu, Weilin Wang
 Working Group: Individual Submissions (none)
The document specifies new DOTS data channel configuration parameters that customize the DDoS knowledge transmission configuration between distributed knowledge bases. These options enable assist the distributed knowledge base to share attack knowledge in different fields and actively adapt to dynamically changing DDoS attacks.
 Defreezing Optimization post EVPN Mac Dampening
 
 draft-saum-bess-dampening-backoff-08.txt
 Date: 28/01/2024
 Authors: DIKSHIT Saumya, Vinayak Joshi, Swathi Shankar
 Working Group: Individual Submissions (none)
MAC move handling in EVPN deployments is discussed in detail in [RFC7432]. There are few optimizations which can be done in existing way of handling the mac duplication. This document describes few of the potential techniques to do so. This document is of informational type based on comments in the ietf meeting.
 Antitrust Guidelines for IETF Participants
 
 draft-halpern-gendispatch-antitrust-08.txt
 Date: 29/02/2024
 Authors: Joel Halpern, Jay Daley
 Working Group: Individual Submissions (none)
This document provides education and guidance for IETF participants on compliance with antitrust laws and how to reduce antitrust risks in connection with IETF activities.
 All PEs as DF
 
 draft-saumvinayak-bess-all-df-bum-07.txt
 Date: 28/01/2024
 Authors: DIKSHIT Saumya, Vinayak Joshi
 Working Group: Individual Submissions (none)
The Designated forwarder concept is leveraged to prevent looping of BUM traffic into tenant network sourced across NVO fabric for multihoming deployments. [RFC7432] defines a preliminary approach to select the DF for an ES,VLAN or ES,Vlan Group, panning across multiple NVE's. [RFC8584] makes the election logic more robust and fine grained by inculcating fair election of DF handling most of the prevalent use-cases. This document presents a deployment problem and a corresponding solution which cannot be easily resolve by rules mentioned in [RFC7432] and [RFC8584]. It involves redundant firewall deployment on disparate overlay sites connected over WAN. The requirement is to allow reachability, ONLY, to the local firewall, unless there is an outage. In case of outage the reachability can be extended to remote site's firewall over WAN.
 Updates to Anycast Property advertisement for OSPFv2
 
 draft-chen-lsr-anycast-flag-06.txt
 Date: 23/02/2024
 Authors: Ran Chen, Detao Zhao, Peter Psenak, Ketan Talaulikar, Changwang Lin
 Working Group: Individual Submissions (none)
Both SR-MPLS prefix-SID and IPv4 prefix may be configured as anycast and as such the same value can be advertised by multiple routers. It is useful for other routers to know that the advertisement is for an anycast identifier. Each prefix is advertised along with an 8-bit field of capabilities,by using the flag flield in the OSPFv2 Extended Prefix TLV, but the definition of anycast flag to identify the prefix as anycast has not yet been defined. This document defines a new flag in the OSPFv2 Extended Prefix TLV Flags to advertise the anycast property.
 Secure Vector Routing (SVR)
 
 draft-menon-svr-05.txt
 Date: 18/03/2024
 Authors: Abilash Menon, Patrick MeLampy, Michael Baj, Patrick Timmons, Hadriel Kaplan
 Working Group: Individual Submissions (none)
This document describes Secure Vector Routing (SVR). SVR is an overlay inter-networking protocol that operates at the session layer. SVR provides end-to-end communication of network requirements not possible or practical using network header layers. SVR uses application layer cookies that eliminate the need to create and maintain non-overlapping address spaces necessary to manage network routing requirements. SVR is an overlay networking protocol that works through middleboxes and address translators including those existing between private networks, the IPv4 public internet, and the IPv6 public internet. SVR enables SD-WAN and multi-cloud use cases and improves security at the networking routing plane. SVR eliminates the need for encapsulation and decapsulation often used to create non-overlapping address spaces.
 Procedure for Standards Track Documents to Refer Normatively to External Documents
 
 draft-kucherawy-bcp97bis-05.txt
 Date: 08/05/2024
 Authors: Murray Kucherawy
 Working Group: Individual Submissions (none)
This document specifies a procedure for referencing external standards and specifications from IETF-produced documents on the Standards Track. In doing so, it updates BCP 9 (RFC 2026).
 Brand Indicators for Message Identification (BIMI)
 
 draft-brand-indicators-for-message-identification-05.txt
 Date: 03/03/2024
 Authors: Seth Blank, Peter Goldstein, Thede Loder, Terry Zink, Marc Bradshaw, Alex Brotman
 Working Group: Individual Submissions (none)
Brand Indicators for Message Identification (BIMI) permits Domain Owners to coordinate with Mail User Agents (MUAs) to display brand- specific Indicators next to properly authenticated messages. There are two aspects of BIMI coordination: a scalable mechanism for Domain Owners to publish their desired Indicators, and a mechanism for Mail Transfer Agents (MTAs) to verify the authenticity of the Indicator. This document specifies how Domain Owners communicate their desired Indicators through the BIMI Assertion Record in DNS and how that record is to be interpreted by MTAs and MUAs. MUAs and mail- receiving organizations are free to define their own policies for making use of BIMI data and for Indicator display as they see fit.
 A UDP-based GMA (Generic Multi-Access) Protocol
 
 draft-zhu-intarea-gma-control-05.txt
 Date: 20/02/2024
 Authors: Jing Zhu, Menglei Zhang
 Working Group: Individual Submissions (none)
A device can simultaneously connect to multiple access networks, e.g., Wi-Fi, LTE, 5G, DSL, and SATCOM (Satellite Communications). It is desirable to seamlessly combine multiple connections over these networks below the transport layer (L4) to improve quality of experience for applications that do not have built-in multi- path capabilities. This document presents a new convergence protocol for managing data traffic across multiple network paths. The solution has been developed by the authors based on their experiences in multiple standards bodies including IETF and 3GPP, is not an Internet Standard and does not represent the consensus opinion of the IETF. This document will enable other developers to build interoperable implementations to experiment with the protocol.
 Updated Rules for PCE Communication Protocol (PCEP) Object Ordering
 
 draft-dhody-pce-pcep-object-order-05.txt
 Date: 31/12/2023
 Authors: Dhruv Dhody
 Working Group: Individual Submissions (none)
The PCE Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a PCE, or among PCEs. Such interactions include path computation requests and path computation replies defined in RFC 5440. As per RFC 5440, these message are required to follow strict object ordering. This document updates RFC 5440 by relaxing the strict object ordering requirement in the PCEP messages.
 Unicast Use of the Formerly Reserved 240/4
 
 draft-schoen-intarea-unicast-240-06.txt
 Date: 29/12/2023
 Authors: Seth Schoen, John Gilmore, David Taht
 Working Group: Individual Submissions (none)
This document redesignates 240/4, the region of the IPv4 address space historically known as "Experimental," "Future Use," or "Class E" address space, so that this space is no longer reserved. It asks implementers to make addresses in this range fully usable for unicast use on the Internet.
 Unicast Use of the Lowest Address in an IPv4 Subnet
 
 draft-schoen-intarea-unicast-lowest-address-05.txt
 Date: 29/12/2023
 Authors: Seth Schoen, John Gilmore, David Taht, Michael Karels
 Working Group: Individual Submissions (none)
With ever-increasing pressure to conserve IP address space on the Internet, it makes sense to consider where relatively minor changes can be made to fielded practice to improve numbering efficiency. One such change, proposed by this document, is to increase the number of unicast addresses in each existing subnet, by redefining the use of the lowest-numbered (zeroth) host address in each IPv4 subnet as an ordinary unicast host identifier, instead of as a duplicate segment- directed broadcast address.
 BIER-TE for Broadcast Link
 
 draft-chen-bier-te-lan-09.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mike McBride, Aijun Wang, Gyan Mishra, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes extensions to "Bit Index Explicit Replication Traffic Engineering" (BIER-TE) for supporting LANs (i.e., broadcast links). For a multicast packet with an explicit point-to-multipoint (P2MP) path traversing LANs, the packet is replicated and forwarded statelessly along the path.
 BGP-SPF Flooding Reduction
 
 draft-chen-lsvr-flood-reduction-07.txt
 Date: 02/04/2024
 Authors: Huaimo Chen, Gyan Mishra, Aijun Wang, Yisong Liu, Haibo Wang, Yanhe Fan
 Working Group: Individual Submissions (none)
This document describes extensions to Border Gateway Protocol (BGP) for flooding the link states on a topology that is a subgraph of the complete topology of a BGP-SPF domain, so that the amount of flooding traffic in the domain is greatly reduced. This would reduce convergence time with a more stable and optimized routing environment.
 Multicast DNS conflict resolution using the Time Since Received (TSR) EDNS option
 
 draft-tllq-tsr-04.txt
 Date: 04/03/2024
 Authors: Ted Lemon, Liang Qin
 Working Group: Individual Submissions (none)
This document specifies a new conflict resolution mechanism for DNS, for use in cases where the advertisement is being proxied, rather than advertised directly, e.g. when using a combined DNS-SD Advertising Proxy and SRP registrar. A new EDNS option is defined that communicates the time at which the set of resource records on a particular DNS owner name was most recently updated.
 BGP MVPN in IPv6 Infrastructure Networks: Problems and Solution Approaches
 
 draft-duan-bess-mvpn-ipv6-infras-05.txt
 Date: 21/11/2023
 Authors: Fanghong Duan, Jingrong Xie, Siyu Chen
 Working Group: Individual Submissions (none)
MVPN deployment faces some problems while used in provider's IPv6 infrastructure networks. This document describes these problems, and corresponding solutions.
 Multicast VPN Upstream Designated Forwarder Selection
 
 draft-wang-bess-mvpn-upstream-df-selection-08.txt
 Date: 21/11/2023
 Authors: Fanghong Duan, Siyu Chen, Yisong Liu, Heng Wang
 Working Group: Individual Submissions (none)
This document defines Multicast Virtual Private Network (VPN) extensions and procedures of designated forwarder election performed between ingress PEs, which is different from the one described in [RFC9026] in which the upstream designated forwarder determined by using the "Standby PE Community" carried in the C-Multicast routes. Based on the DF election, the failure detection point discovery mechanism between DF and standby DF is extended in MVPN procedures to achieve fast failover by using BFD session to track the status of detection point. To realize a stable "warm root standby", this document obsolete the P-Tunnel status determining procedure for downstream PEs in regular MVPN by introducing a RPF Set Checking mechanism as an instead.
 Traffic Mapping YANG model for Traffic Engineering (TE)
 
 draft-dhody-teas-te-traffic-yang-04.txt
 Date: 04/03/2024
 Authors: Dhruv Dhody
 Working Group: Individual Submissions (none)
This document provides a YANG data model to map traffic to Traffic Engineering (TE) paths. This model providers operator a seamless control and management of which traffic to send on the underlying TE resources.
 Flow Measurement in IPv6 Network
 
 draft-wang-ippm-ipv6-flow-measurement-06.txt
 Date: 09/01/2024
 Authors: Haojie Wang, Yisong Liu, Changwang Lin, Xiao Min, Greg Mirsky
 Working Group: Individual Submissions (none)
This document describes how to deploy in-situ flow performance measurement based on Alternate-Marking method in IPv6 domain.
 Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms
 
 draft-melnikov-scram-bis-04.txt
 Date: 04/03/2024
 Authors: Alexey Melnikov
 Working Group: Individual Submissions (none)
This document updates requirements on implementations of various Salted Challenge Response Authentication Mechanism (SCRAM) Simple Authentication and Security Layer (SASL) mechanisms based on more modern security practices.
 EVPN Fast Reroute
 
 draft-burdet-bess-evpn-fast-reroute-07.txt
 Date: 04/03/2024
 Authors: Luc Burdet, Patrice Brissette, Takuya Miyasaka, Jorge Rabadan
 Working Group: Individual Submissions (none)
This document summarises EVPN convergence mechanisms and specifies procedures for EVPN networks to achieve fast and scale-independent convergence.
 BGP SR Policy Extensions for template
 
 draft-zhang-idr-sr-policy-template-04.txt
 Date: 14/05/2024
 Authors: KaZhang, Zhibo Hu, Jie Dong, Qiangzhou Gao
 Working Group: Individual Submissions (none)
Segment Routing(SR) Policies can be advertised using BGP. An SR Policy may has lots of attributes, and as the application and features evolve, the SR Policy may need have more and more attribute attributes. To avoid modifying BGP when attributes are added to an SR Policy, we can define a template. The identifier and content of the template are defined by the receiver of the SR Policy. The advertiser of an SR policy only needs to know the ID of the template. When advertising SR policy, the advertiser carries the template ID in the tunnel encapsulation information of the SR policy. After receiving the SR Policy information, the receiver obtains the corresponding template and content according to the template ID, thereby obtaining abundant constraint configuration information.
 Semantic Definition Format (SDF): Mapping files
 
 draft-bormann-asdf-sdf-mapping-03.txt
 Date: 03/12/2023
 Authors: Carsten Bormann, Jan Romann
 Working Group: Individual Submissions (none)
The Semantic Definition Format (SDF) is a format for domain experts to use in the creation and maintenance of data and interaction models that describe Things, i.e., physical objects that are available for interaction over a network. It was created as a common language for use in the development of the One Data Model liaison organization (OneDM) definitions. Tools convert this format to database formats and other serializations as needed. An SDF specification often needs to be augmented by additional information that is specific to its use in a particular ecosystem or application. SDF mapping files provide a mechanism to represent this augmentation.
 TLS for Secure Element Input Output (TLS-SE-IO)
 
 draft-urien-core-tls-se-io-02.txt
 Date: 25/02/2024
 Authors: Pascal Urien
 Working Group: Individual Submissions (none)
The goal of TLS-SE-IO is to provide virtual IO pins for secure elements running TLS servers, in order to interact with sensors and actuators. TLS-SE device processes TLS packets in secure element. It may work like a black box (server mode) that exchanges fully encrypted packets. It may also export encrypted packet in clear form, in order to provide virtual output pin. Output messages may include cookies and/or cryptographic materials. Virtual input pin forwards input messages, triggered by previous output messages, and sent to TLS-SE device for further processing.
 Unicast Use of the Formerly Reserved 0/8
 
 draft-schoen-intarea-unicast-0-05.txt
 Date: 29/12/2023
 Authors: Seth Schoen, John Gilmore, David Taht
 Working Group: Individual Submissions (none)
This document redesignates 0/8, the lowest block in the IPv4 address space, so that this space is no longer reserved. It asks implementers to make addresses in this range fully usable for unicast use on the Internet.
 Unicast Use of the Formerly Special-Cased 127/8
 
 draft-schoen-intarea-unicast-127-05.txt
 Date: 28/02/2024
 Authors: Seth Schoen, John Gilmore, David Taht
 Working Group: Individual Submissions (none)
This document redefines the IPv4 local loopback network as consisting only of the 65,536 addresses 127.0.0.0 to 127.0.255.255 (127.0.0.0/16). It asks implementers to make addresses in the prior loopback range 127.1.0.0 to 127.255.255.255 fully usable for unicast use on the Internet.
 Arm's Platform Security Architecture (PSA) Attestation Verifier Endorsements
 
 draft-fdb-rats-psa-endorsements-04.txt
 Date: 04/03/2024
 Authors: Thomas Fossati, Yogesh Deshpande, Henk Birkholz
 Working Group: Individual Submissions (none)
PSA Endorsements include reference values, cryptographic key material and certification status information that a Verifier needs in order to appraise attestation Evidence produced by a PSA device. This memo defines such PSA Endorsements as a profile of the CoRIM data model.
 Control Plane of Inter-Domain Source Address Validation Architecture
 
 draft-xu-savax-control-06.txt
 Date: 21/11/2023
 Authors: Ke Xu, Jianping Wu, Xiaoliang Wang, Yangfei Guo
 Working Group: Individual Submissions (none)
Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. The inter-domain source address validation architecture is an effort to enhance the Internet by using state machines to generate consistent tags. When communicating between two end hosts at different ADs of the IPv6 network, tags will be added to the packets to identify the authenticity of the IPv6 source address.
 Data Plane of Inter-Domain Source Address Validation Architecture
 
 draft-xu-savax-data-05.txt
 Date: 21/11/2023
 Authors: Ke Xu, Jianping Wu, Xiaoliang Wang, Yangfei Guo
 Working Group: Individual Submissions (none)
Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. The inter-domain source address validation architecture is an effort to enhance the Internet by using state machines to generate consistent tags. When communicating between two end hosts at different ADs of the IPv6 network, tags will be added to the packets to identify the authenticity of the IPv6 source address. This memo focuses on the data plane of the SAVA-X mechanism.
 Communication Protocol Between the AD Control Server and the AD Edge Router of Inter-Domain Source Address Validation Architecture
 
 draft-xu-savax-protocol-05.txt
 Date: 21/11/2023
 Authors: Ke Xu, Jianping Wu, Xiaoliang Wang, Yangfei Guo
 Working Group: Individual Submissions (none)
Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. The inter-domain source address validation architecture is an effort to enhance the Internet by using state machines to generate consistent tags. When communicating between two end hosts at different ADs of the IPv6 network, tags will be added to the packets to identify the authenticity of the IPv6 source address. This memo focuses on the data plane of the SAVA-X mechanism.
 Open Ethics Transparency Protocol
 
 draft-lukianets-open-ethics-transparency-protocol-05.txt
 Date: 12/05/2024
 Authors: Nikita Lukianets
 Working Group: Individual Submissions (none)
The Open Ethics Transparency Protocol (OETP) is an application-level protocol for publishing and accessing ethical Disclosures of IT Products and their Components. The Protocol is based on HTTP exchange of information about the ethical "postures", provided in an open and standardized format. The scope of the Protocol covers Disclosures for systems such as Software as a Service (SaaS) Applications, Software Applications, Software Components, Application Programming Interfaces (API), Automated Decision-Making (ADM) systems, and systems using Artificial Intelligence (AI). OETP aims to bring more transparent, predictable, and safe environments for the end-users. The OETP Disclosure Format is an extensible JSON-based format.
 IPlir network layer security protocol
 
 draft-iplir-protocol-05.txt
 Date: 23/03/2024
 Authors: Martishina Alexandra, Urivskiy Alexey, Rybkin Andrey, Tychina Leonid, Parshin Ilia
 Working Group: Individual Submissions (none)
This document specifies the IPlir network layer security protocol. It describes how to provide a set of security services for traffic over public and corporate networks using the TCP/IP stack.
 RIFT Auto-Flood Reflection
 
 draft-head-rift-auto-fr-04.txt
 Date: 29/02/2024
 Authors: Jordan Head, Tony Przygienda, Colby Barth
 Working Group: Individual Submissions (none)
This document specifies procedures where RIFT can automatically provision IS-IS Flood Reflection topologies by leveraging its native no-touch ZTP architecture.
 Deprecation Of The IPv6 Router Alert Option
 
 draft-bonica-6man-deprecate-router-alert-02.txt
 Date: 19/02/2024
 Authors: Ron Bonica
 Working Group: Individual Submissions (none)
This document deprecates the IPv6 Router Alert Option. Protocols that use the Router Alert Option may continue to do so, even in future versions. However, protocols standardized in the future must not use the Router Alert Option.
 Deadline Based Deterministic Forwarding
 
 draft-peng-detnet-deadline-based-forwarding-09.txt
 Date: 01/03/2024
 Authors: Shaofu Peng, Zongpeng Du, Kashinath Basu, czp@h3c.com, Dong Yang, Chang Liu
 Working Group: Individual Submissions (none)
This document describes a deterministic forwarding mechanism to IP/ MPLS network, as well as corresponding resource reservation, admission control, policing, etc, to provide guaranteed latency. Especially, latency compensation with core stateless is discussed to replace reshaping to be suitable for Diff-Serv architecture [RFC2475].
 Impact of DLTs on Provider Networks
 
 draft-trossen-rtgwg-impact-of-dlts-03.txt
 Date: 09/02/2024
 Authors: Dirk Trossen, David Guzman, Mike McBride, Xinxin Fan
 Working Group: Individual Submissions (none)
This document discusses the impact of distributed ledger technologies being realized over IP-based provider networks. The focus here lies on the impact that the DLT communication patterns have on efficiency of resource usage in the underlying networks. We provide initial insights into experimental results to quantify this impact in terms of inefficient and wasted communication, aligned along challenges that the DLT realization over IP networks faces. This document intends to outline this impact but also opportunities for network innovations to improve on the identified impact as well as the overall service quality. While this document does not promote specific solutions that capture those opportunities, it invites the wider community working on DLT and network solutions alike to contribute to the insights in this document to aid future research and development into possible solution concepts and technologies. The findings presented here have first been reported within the similarly titled whitepaper released by the Industry IoT Consortium (IIC) [IIC_whitepaper].
 Signaling Flow-ID Label Capability and Flow-ID Readable Label Depth
 
 draft-xzc-lsr-mpls-flc-frld-04.txt
 Date: 28/01/2024
 Authors: Xiao Min, Zheng Zhang, Weiqiang Cheng
 Working Group: Individual Submissions (none)
Flow-ID Label (FL) is used for MPLS flow identification and flow- based performance measurement with alternate marking method. The ability to process Flow-ID labels is called Flow-ID Label Capability (FLC), and the capability of reading the maximum label stack depth and performing FL-based performance measurement is called Flow-ID Readable Label Depth (FRLD). This document defines a mechanism to signal the FLC and the FRLD using IGP and BGP-LS.
 PCEP Extension for Bounded Latency
 
 draft-xiong-pce-detnet-bounded-latency-04.txt
 Date: 28/02/2024
 Authors: Quan Xiong, Peng Liu, Rakesh Gandhi
 Working Group: Individual Submissions (none)
In certain networks, such as Deterministic Networking (DetNet), it is required to consider the bounded latency for path selection. This document describes the extensions for Path Computation Element Communication Protocol (PCEP) to carry deterministic latency constraints and distribute deterministic paths for end-to-end path computation in deterministic services.
 Using CDDL for CSVs
 
 draft-bormann-cbor-cddl-csv-04.txt
 Date: 24/12/2023
 Authors: Carsten Bormann, Henk Birkholz
 Working Group: Individual Submissions (none)
The Concise Data Definition Language (CDDL), standardized in RFC 8610, is defined to provide data models for data shaped like JSON or CBOR. Another representation format that is quote popular is the CSV (Comma-Separated Values) file as defined by RFC 4180. The present document shows a way how to use CDDL to provide a data model for CSV files.
 Enhanced DetNet Data Plane Framework for Scaling Deterministic Networks
 
 draft-xiong-detnet-large-scale-enhancements-04.txt
 Date: 26/02/2024
 Authors: Quan Xiong, Zongpeng Du, Junfeng Zhao, Dong Yang
 Working Group: Individual Submissions (none)
The Enhanced Deterministic Networking (EDN) is required to provide the enhancement of flow identification and packet treatment for Deterministic Networking (DetNet) to achieve the DetNet QoS in scaling networks. This document proposes the enhancement of the framework to support the functions and metadata for enhanced DetNet data plane.
 Extensible Provisioning Protocol (EPP) Transport over HTTP
 
 draft-loffredo-regext-epp-over-http-03.txt
 Date: 20/02/2024
 Authors: Mario Loffredo, Lorenzo Trombacchi, Maurizio Martinelli, Dan Keathley, James Gould
 Working Group: Individual Submissions (none)
This document describes how an Extensible Provisioning Protocol (EPP) session is mapped onto a Hypertext Transfer Protocol (HTTP) connection. EPP over HTTP (EoH) requires the use of Transport Layer Security (TLS) to secure EPP information (i.e. HTTPS).
 Everything over CoAP
 
 draft-amsuess-core-coap-kitchensink-05.txt
 Date: 04/03/2024
 Authors: Christian Amsuess
 Working Group: Individual Submissions (none)
The Constrained Application Protocol (CoAP) has become the base of applications both inside of the constrained devices space it originally aimed for and outside. This document gives an overview of applications that are, can, may, and would better not be implemented on top of CoAP.
 SRPM Path Consistency over SRv6
 
 draft-weng-ippm-srpm-path-consistency-over-srv6-06.txt
 Date: 18/05/2024
 Authors: sijun weng, Weiqiang Cheng, Changwang Lin, Xiao Min
 Working Group: Individual Submissions (none)
TWAMP can be used to measure the performance of end-to-end paths in networks. STAMP [rfc8762] and TWAMP light are more lightweight measurement methods. In the SRv6 network, it is also necessary to measure the performance of SRv6 policy. This document describes a method to measure srv6 policy through stamp and TWAMP light.
 Advertisement of Dedicated Metric for Flexible Algorithm in IGP
 
 draft-lin-lsr-flex-algo-metric-04.txt
 Date: 03/03/2024
 Authors: Changwang Lin, Mengxiao Chen, Weiqiang Cheng, Liyan Gong
 Working Group: Individual Submissions (none)
This document proposes a method to advertise dedicated metric for Flex-Algorithm in IGP.
 BIER-TE Encapsulation with Multiple BitStrings
 
 draft-chen-bier-te-enc-04.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mike McBride, Ran Chen, Gyan Mishra, Aijun Wang, Yanhe Fan, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes a "Bit Index Explicit Replication Traffic Engineering" (BIER-TE) header, two levels of Bit Index Forwarding Tables (BIFTs) and a forwarding procedure for efficiently processing BIER-TE packets with the header. For a multicast packet with an explicit point-to-multipoint (P2MP) path, which has multiple BitStrings, the packet with the header containing the BitStrings is replicated and forwarded statelessly along the path.
 Stateless Traffic Engineering Multicast using MRH
 
 draft-chen-pim-mrh6-07.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mike McBride, Yanhe Fan, Zhenbin Li, Xuesong Geng, Mehmet Toy, Gyan Mishra, Yisong Liu, Aijun Wang, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes a stateless traffic engineering (TE) multicast along an explicit P2MP Path/Tree using an IPv6 extension header called TE multicast routing header (MRH). The MRH with the path encoded in link numbers is added into a packet to be multicast at the ingress. The packet is delivered to the egresses along the path. There is no state stored in the core of the network.
 Signalling CC Parameters for Careful Resume using QUIC
 
 draft-kuhn-quic-bdpframe-extension-05.txt
 Date: 04/03/2024
 Authors: Nicolas Kuhn, Stephan Emile, Gorry Fairhurst, Raffaello Secchi, Christian Huitema
 Working Group: Individual Submissions (none)
This document describes an extension for QUIC. This enables the exchange of Congestion Control (CC) parameters related to the characteristics of the between the sender and the receiver during a connection. These CC parameters allow a receiver to prepare to use additional capacity that is made available when using Careful Resume. It can also allow a receiver to request that previously computed CC parameters, are not used when the receiver has additional information about the current path or traffic that is to be sent.
 The IPv6 Segment Routing (SRv6) Domain Name System (DNS) Resource Record
 
 draft-eastlake-dnsop-rrtype-srv6-05.txt
 Date: 28/03/2024
 Authors: Donald Eastlake, Haoyu Song
 Working Group: Individual Submissions (none)
A Domain Name System (DNS) Resource Record (RR) Type is specified for storing IPv6 Segment Routing (SRv6) Information in the DNS.
 Mobile User Plane Evolution
 
 draft-zzhang-dmm-mup-evolution-08.txt
 Date: 23/02/2024
 Authors: Zhaohui Zhang, Keyur Patel, Luis Contreras, Kashif Islam, Jari Mutikainen, Tianji Jiang, Luay Jalil, Ori Sejati, Shay Zadok
 Working Group: Individual Submissions (none)
This document describes evolution of mobile user plane in 5G, including distributed User Plane Functions (UPFs) and alternative user plane implementations that some vendors/operators are promoting without changing 3GPP architecture/signaling, and further discusses potentially integrating UPF and Access Node (AN) in 6G mobile networks. This document is not an attempt to do 3GPP work in IETF. Rather, it discusses potential integration of IETF/wireline and 3GPP/wireless technologies - first among parties who are familiar with both areas and friendly with IETF/wireline technologies. If the ideas in this document are deemed reasonable, feasible and desired among these parties, they can then be brought to 3GPP for further discussions.
 Problem Statement and Gap Analysis for Connecting to Cloud DCs via Optical Networks
 
 draft-liu-ccamp-optical2cloud-problem-statement-06.txt
 Date: 23/04/2024
 Authors: Sheng Liu, Haomian Zheng, Aihua Guo, Yang Zhao, Daniel King
 Working Group: Individual Submissions (none)
Optical networking technologies such as fine-grain OTN (fgOTN) enable premium cloud-based services, including optical leased line, cloud Virtual Reality (cloud-VR), and computing to be carried end-to-end optically between applications and cloud data centers (DCs), offering premium quality and deterministic performance. This document describes the problem statement and requirements for accessing cloud services through optical networks. It also discusses technical gaps for IETF-developed management and control protocols to support service provisioning and management in such an all-optical network scenario.
 Expressing Quality of Service Requirements (QoS) in Domain Name System (DNS) Queries
 
 draft-eastlake-dnsop-expressing-qos-requirements-04.txt
 Date: 29/03/2024
 Authors: Donald Eastlake, Haoyu Song
 Working Group: Individual Submissions (none)
A method of encoding quality of communication service (QoS) requirements in a Domain Name System (DNS) query is specified through inclusion of the requirements in one or more labels of the name being queried. This enables DNS responses including addressing and packet labeling information that is dependent on such requirements without changes in the format of DNS protocol messages or DNS application program interfaces (APIs).
 Encrypted Client Hello Deployment Considerations
 
 draft-campling-ech-deployment-considerations-08.txt
 Date: 24/01/2024
 Authors: Andrew Campling, Paul Vixie, David Wright, Arnaud Taddei, Simon Edwards
 Working Group: Individual Submissions (none)
(Editorial note: to be updated as the text in the main body of the document is finalised) This document is intended to inform the community about the impact of the deployment of the proposed Encrypted Client Hello (ECH) standard that encrypts Server Name Indication (SNI) and other data. Data encapsulated by ECH (ie data included in the encrypted ClientHelloInner) is of legitimate interest to on-path security actors including those providing inline malware detection, parental controls, content filtering to prevent access to malware and other risky traffic, mandatory security controls etc. The document includes observations on current use cases for SNI data in a variety of contexts. It highlights how the use of that data is important to the operators of both public and private networks and shows how the loss of access to SNI data will cause difficulties in the provision of a range of services to end-users, including the potential weakening of cybersecurity defences. Some mitigations are identified that may be useful for inclusion by those considering the adoption of support for ECH in their software.
 Ethernet VPN Virtual Private Wire Services Gateway Solution
 
 draft-sr-bess-evpn-vpws-gateway-04.txt
 Date: 31/01/2024
 Authors: Jorge Rabadan, Senthil Sathappan, Vinod Prabhu, Wen Lin, Patrice Brissette
 Working Group: Individual Submissions (none)
Ethernet Virtual Private Network Virtual Private Wire Services (EVPN VPWS) need to be deployed in high scale multi-domain networks, where each domain can use a different transport technology, such as MPLS, VXLAN or Segment Routing with MPLS or IPv6 Segment Identifiers (SIDs). While transport interworking solutions on border routers spare the border routers from having to process service routes, they do not always meet the multi-homing, redundancy, and operational requirements, or provide the isolation that each domain requires. This document analyzes the scenarios in which an interconnect solution for EVPN VPWS using EVPN Domain Gateways is needed, and adds the required extensions to support it.
 The Architecture of Network-Aware Domain Name System (DNS)
 
 draft-song-network-aware-dns-04.txt
 Date: 04/03/2024
 Authors: Haoyu Song, Donald Eastlake
 Working Group: Individual Submissions (none)
This document describes a framework which extends the Domain Name System (DNS) to provide network awareness to applications. The framework enables DNS system responses that are dependent on communication service requirements such as QoS or path without changes in the format of DNS protocol messages or application program interfaces (APIs). The different enhancement methods and use cases are discussed.
 Tracing process in IPv6 VPN Tunneling Networks
 
 draft-peng-6man-tracing-option-05.txt
 Date: 27/01/2024
 Authors: Shuping Peng, Yisong Liu, zhaoranxiao, Pingan Yang
 Working Group: Individual Submissions (none)
This document specifies the tracing process in IPv6 VPN tunneling networks for diagnostic purposes. An IPv6 Tracing Option is specified to collect and carry the required key information in an effective manner to correctly construct ICMP(v4) and ICMPv6 Time Exceeded messages at the corresponding nodes, i.e. PE and P nodes, respectively.
 TCP RST Diagnostic Payload
 
 draft-boucadair-tcpm-rst-diagnostic-payload-08.txt
 Date: 26/02/2024
 Authors: Mohamed Boucadair, Tirumaleswar Reddy.K
 Working Group: Individual Submissions (none)
This document specifies a diagnostic payload format returned in TCP RST segments. Such payloads are used to share with an endpoint the reasons for which a TCP connection has been reset. Sharing this information is meant to ease diagnostic and troubleshooting.
 LISP for Satellite Networks
 
 draft-farinacci-lisp-satellite-network-04.txt
 Date: 04/02/2024
 Authors: Dino Farinacci, Victor Moreno, Padma Pillay-Esnault
 Working Group: Individual Submissions (none)
This specification describes how the LISP architecture and protocols can be used over satellite network systems. The LISP overlay runs on earth using the satellite network system in space as the underlay.
 ACME-Based Provisioning of IoT Devices
 
 draft-sweet-iot-acme-05.txt
 Date: 30/01/2024
 Authors: Michael Sweet
 Working Group: Individual Submissions (none)
This document extends the Automatic Certificate Management Environment (ACME) [RFC8555] to provision X.509 certificates for local Internet of Things (IoT) devices that are accepted by existing web browsers and other software running on End User client devices.
 SM2 Digital Signature Algorithm for DNSSEC
 
 draft-cuiling-dnsop-sm2-alg-15.txt
 Date: 18/01/2024
 Authors: Cuiling Zhang, Yukun Liu, Feng Leng, Qi Zhao, Zheng He
 Working Group: Individual Submissions (none)
This document specifies the use of the SM2 digital signature algorithm and SM3 hash algorithm for DNS Security (DNSSEC). This draft is an independent submission to the RFC series, and does not have consensus of the IETF community.
 IS-IS Extension to Advertise SRv6 SIDs using SID Block
 
 draft-cheng-lsr-isis-srv6-sid-block-03.txt
 Date: 16/01/2024
 Authors: Weiqiang Cheng, Jiang Wenying, Changwang Lin, Mengxiao Chen, Liyan Gong, Yao Liu
 Working Group: Individual Submissions (none)
This document proposes a simplified method to advertise SRv6 SIDs in IS-IS. The SRv6 SID Block is composed of a number of continuous SIDs within the address range of a Locator. When a SID is assigned from the SID Block, it is described by an index based on the SID Block, instead of the whole 128-bit IPv6 address.
 Advertising Exclusive Links for Flex-Algorithm in IGP
 
 draft-gong-lsr-exclusive-link-for-flex-algo-07.txt
 Date: 03/03/2024
 Authors: Liyan Gong, Weiqiang Cheng, Changwang Lin, Mengxiao Chen, Ran Chen, Yanrong Liang
 Working Group: Individual Submissions (none)
This document proposes the method to advertise exclusive links for Flex-Algorithm in IGP.
 SR Policies Extensions for Network Resource Partition in BGP-LS
 
 draft-chen-idr-bgp-ls-sr-policy-nrp-08.txt
 Date: 17/05/2024
 Authors: Ran Chen, Jie Dong, Detao Zhao, Liyan Gong, Yongqing Zhu, Ran Pang
 Working Group: Individual Submissions (none)
A Network Resource Partition (NRP) is a network resource attribute associated with the SR policy. It is also an important attribute of the SR policy and needs to be reported to the external components. This document defines a new TLV which enable the headend to report the configuration and the states of an SR policy carrying the NRP information by using BGP-LS.
 SRv6 Egress Protection in Multi-homed scenario
 
 draft-cheng-rtgwg-srv6-multihome-egress-protection-06.txt
 Date: 22/04/2024
 Authors: Weiqiang Cheng, Jiang Wenying, Changwang Lin, Zhibo Hu, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document describes a SRv6 egress node protection mechanism in multi-homed scenarios.
 Epoch Markers
 
 draft-birkholz-rats-epoch-markers-07.txt
 Date: 24/04/2024
 Authors: Henk Birkholz, Thomas Fossati, Wei Pan, Carsten Bormann
 Working Group: Individual Submissions (none)
This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system. Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell. Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock). Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
 BGP Blockchain
 
 draft-mcbride-rtgwg-bgp-blockchain-03.txt
 Date: 06/02/2024
 Authors: Mike McBride, Dirk Trossen, David Guzman, Thomas Martin
 Working Group: Individual Submissions (none)
A variety of mechanisms have been developed and deployed over the years to secure BGP including the more recent RPKI/ROA mechanisms. Is it also possible to use a distributed ledger such as Blockchain to secure BGP? BGP provides decentralized connectivity across the Internet. Blockchain provides decentralized secure transactions in a append-only, tamper-resistant ledger. This document reviews possible opportunities of using Blockchain to secure BGP policies within a domain and across the global Internet. We propose that BGP data could be placed in a blockchain and smart contracts can control how the data is managed. This could create a single source of truth, something for which blockchains are particularly well suited.
 Multicast Extension for QUIC
 
 draft-jholland-quic-multicast-04.txt
 Date: 09/01/2024
 Authors: Jake Holland, Lucas Pardue, Max Franke
 Working Group: Individual Submissions (none)
This document defines a multicast extension to QUIC to enable the efficient use of multicast-capable networks to send identical data streams to many clients at once, coordinated through individual unicast QUIC connections.
 SCION Overview
 
 draft-dekater-panrg-scion-overview-06.txt
 Date: 07/05/2024
 Authors: Corine de Kater, Nicola Rustignoli, Adrian Perrig
 Working Group: Individual Submissions (none)
The Internet has been successful beyond even the most optimistic expectations and is intertwined with many aspects of our society. But although the world-wide communication system guarantees global reachability, the Internet has not primarily been built with security and high availability in mind. The next-generation inter-network architecture SCION (Scalability, Control, and Isolation On Next- generation networks) aims to address these issues. SCION was explicitly designed from the outset to offer security and availability by default. The architecture provides route control, failure isolation, and trust information for end-to-end communication. It also enables multi-path routing between hosts. This document discusses the motivations behind the SCION architecture and gives a high-level overview of its fundamental components, including its authentication model and the setup of the control- and data plane. As SCION is already in production use today, the document concludes with an overview of SCION deployments. For detailed descriptions of SCION's components, refer to [I-D.dekater-scion-pki], [I-D.dekater-scion-controlplane], and [I-D.dekater-scion-dataplane]. A more detailed analysis of relationships and dependencies between components is available in [I-D.rustignoli-scion-components].
 EVPN Mpls Ping Extension
 
 draft-saum-evpn-lsp-ping-extension-04.txt
 Date: 19/11/2023
 Authors: DIKSHIT Saumya, Gyan Mishra, Srinath Rao, Santosh Easale, Ashwini Dahiya
 Working Group: Individual Submissions (none)
In an EVPN or any other VPN deployment, there is an urgent need to tailor the reachability checks of the client nodes via off-box tools which can be triggered from a remote Overlay end-point or a centralized controller. There is also a ease of operability needed when the knowledge known is partial or incomplete. This document aims to address the limitation in current standards for doing so and provides solution which can be made standards in future. As an additional requirement, in network border routers, there are liaison/ dummy VRFs created to leak routes from one network/fabric to another. There are scenarios wherein an explicit reachability check for these type of VRFs is not possible with existing mpls-ping mechanisms. This draft intends to address this as well. Few of missing pieces are equally applicable to the native lsp ping as well.
 Path Tracing in SR-MPLS networks
 
 draft-filsfils-spring-path-tracing-srmpls-04.txt
 Date: 13/05/2024
 Authors: Clarence Filsfils, Ahmed Abdelsalam, Pablo Camarillo, Israel Meilik, Mike Valentine, Ruediger Geib, Jonathan Desmarais
 Working Group: Individual Submissions (none)
Path Tracing provides a record of the packet path as a sequence of interface ids. In addition, it provides a record of end-to-end delay, per-hop delay, and load on each interface that forwards the packet. Path Tracing has the lowest MTU overhead compared to alternative proposals such as [INT], [RFC9197], [I-D.song-opsawg-ifit-framework], and [I-D.kumar-ippm-ifa]. Path Tracing supports fine grained timestamp. It has been designed for linerate hardware implementation in the base pipeline. This document defines the Path Tracing specification for the SR-MPLS dataplane. The Path Tracing specification for the SRv6 dataplane is defined in [I-D.filsfils-spring-path-tracing].
 BGP Extensions of SR Policy for Headend Behavior
 
 draft-lin-idr-sr-policy-headend-behavior-04.txt
 Date: 15/05/2024
 Authors: Changwang Lin, Jiang Wenying, Yisong Liu, Mengxiao Chen, Ran Chen
 Working Group: Individual Submissions (none)
This document defines extensions to Border Gateway Protocol (BGP) to distribute SR policies carrying headend behavior.
 Extensible In-band Processing (EIP) Architecture and Framework
 
 draft-eip-arch-03.txt
 Date: 21/12/2023
 Authors: Stefano Salsano, Hesham ElBakoury, Diego Lopez
 Working Group: Individual Submissions (none)
Extensible In-band Processing (EIP) extends the functionality of the IPv6 protocol considering the needs of future Internet services / 6G networks. This document discusses the architecture and framework of EIP. Two separate documents respectively analyze a number of use cases for EIP and provide the protocol specifications of EIP.
 REST API Linked Data Keywords
 
 draft-polli-restapi-ld-keywords-03.txt
 Date: 08/01/2024
 Authors: Roberto Polli
 Working Group: Individual Submissions (none)
This document defines two keywords to provide semantic information in OpenAPI Specification and JSON Schema documents, and support contract-first semantic schema design.
 Asynchronous Deterministic Networking Framework for Large-Scale Networks
 
 draft-joung-detnet-asynch-detnet-framework-04.txt
 Date: 17/03/2024
 Authors: Jinoo Joung, Jeong-dong Ryoo, Taesik Cheung, Yizhou Li, Peng Liu
 Working Group: Individual Submissions (none)
This document describes various solutions of Asynchronous Deterministic Networking (ADN) for large-scale networks. The solutions in this document do not need strict time-synchronization of network nodes, while guaranteeing end-to-end latency or jitter. The functional architecture and requirements for such solutions are specified.
 Credentials Provisioning and Management via EAP (EAP-CREDS)
 
 draft-pala-tian-eap-creds-02.txt
 Date: 27/11/2023
 Authors: Massimiliano Pala, Yuan Tian
 Working Group: Individual Submissions (none)
With the increase number of devices, protocols, and applications that rely on strong credentials (e.g., digital certificates, keys, or tokens) for network access, the need for a standardized credentials provisioning and management framework is paramount. The 802.1x architecture allows for entities (e.g., devices, applications, etc.) to authenticate to the network by providing a communication channel where different methods can be used to exchange different types of credentials. However, the need for managing these credentials (i.e., provisioning and renewal) is still a hard problem to solve. Usually, credentails used in an access network can be in different levels (e.g., network-level, user-level) and sometimes tend to live unmanaged for quite a long time due to the challenges of operation and implementation. EAP-CREDS (RFC XXXX), if implemented in Managed Networks (e.g., Cable Modems), could enable our operators to offer a registration and credentials management service integrated in the home WiFi thus enabling visibility about registered devices. During initialization, EAP-CREDS also allows for MUD files or URLs to be transferred between the EAP Peer and the EAP Server, thus giving detailed visibility about devices when they are provisioned with credentials for accessing the networks. The possibility provided by EAP-CREDS can help to secure home or business networks by leveraging the synergies of the security teams from the network operators thanks to the extended knowledge of what and how is registered/ authenticated. This specifications define how to support the provisioning and management of authentication credentials that can be exploited in different environments (e.g., Wired, WiFi, cellular, etc.) to users and/or devices by using EAP together with standard provisioning protocols.
 Secure IP Binding Synchronization via BGP EVPN
 
 draft-saumthimma-evpn-ip-binding-sync-03.txt
 Date: 03/01/2024
 Authors: DIKSHIT Saumya, Gadekal, Reddy
 Working Group: Individual Submissions (none)
The distribution of clients of L2 domain across extended, networks leveraging overlay fabric, needs to deal with synchronizing the Client Binding Database. The 'Client IP Binding' indicates the IP, MAC and VLAN details of the clients that are learnt by security protocols. Since learning 'Client IP Binding database' is last mile solution, this information stays local to the end point switch, to which clients are connected. When networks are extended across geographies, that is, both layer2 and layer3, the 'Client IP Binding Database' in end point of switches of remote fabrics should be in sync. This literature intends to align the synchronization of 'Client IP Binding Database" through an extension to BGP control plane constructs and as BGP is a typical control plane protocol configured to communicate across network boundries.
 Path MTU (PMTU) for Segment Routing (SR) Policy
 
 draft-peng-spring-pmtu-sr-policy-03.txt
 Date: 07/01/2024
 Authors: Shuping Peng, Dhruv Dhody, Ketan Talaulikar, Gyan Mishra
 Working Group: Individual Submissions (none)
This document defines the Path MTU (PMTU) for Segment Routing (SR) Policy (called SR-PMTU). It applies to both Segment Routing over IPv6 (SRv6) and SR-MPLS. This document specifies the framework of SR-PMTU for SR Policy including the link MTU collection, the SR-PMTU computation, the SR-PMTU enforcement, and the handling behaviours on the headend.
 Destination/Source Routing
 
 draft-llsyang-rtgwg-dst-src-routing-02.txt
 Date: 31/01/2024
 Authors: David Lamparter, Anton Smirnov, Jen Linkova, Shu Yang, Mingwei Xu
 Working Group: Individual Submissions (none)
This note specifies using packets' source addresses in route lookups as additional qualifier to be used in hop-by-hop routing decisions. This applies to IPv6 [RFC2460] in general with specific considerations for routing protocol left for separate documents. There is nothing precluding similar operation in IPv4, but this is not in scope of this document. Note that destination/source routing, source/destination routing, SADR, source-specific routing, source-sensitive routing, S/D routing and D/S routing are all used synonymously.
 SRv6 Underlay tunnel Programming
 
 draft-han-spring-srv6-underlay-tunnel-programming-04.txt
 Date: 19/03/2024
 Authors: Liuyan Han, Minxue Wang, Ran Chen
 Working Group: Individual Submissions (none)
This document defines a new SRv6 Endpoint behavior which can be used for SRv6 underlay tunnel (e.g.L1 channel) Programming, called END.BXC, this behavior are used to bind an underlay tunnel.
 Use Cases for Parent SR Policy
 
 draft-jiang-spring-parent-sr-policy-use-cases-03.txt
 Date: 05/01/2024
 Authors: Jiang Wenying, Weiqiang Cheng, Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
Segment Routing is a source routing paradigm that explicitly indicates the forwarding path for packets at the ingress node. An SR Policy is associated with one or more candidate paths, and each candidate path is dynamic, explicit or composite. This document illustrates some use cases for parent SR policy in MPLS and IPv6 environment.
 Intra-domain SAVNET method
 
 draft-lin-savnet-lsr-intra-domain-method-03.txt
 Date: 05/01/2024
 Authors: Dan Li, Libin Liu, Changwang Lin, Xueyan Song, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document proposes a method of Source Address Validation in Intra-domain, which can be applied to OSPF and IS-IS protocols. By extending IGP and adding the protocol calculation procedure, the SAV rule can be accurately calculated to realize the source address verification.
 NRP ID in SRv6 segment
 
 draft-liu-spring-nrp-id-in-srv6-segment-04.txt
 Date: 18/05/2024
 Authors: Yisong Liu, Changwang Lin, Hao Li, Liyan Gong
 Working Group: Individual Submissions (none)
This document proposes a method to carry the NRP-ID with the packet in the SRv6 segment.
 Segment Routing based Solution for Hierarchical IETF Network Slices
 
 draft-gong-teas-hierarchical-slice-solution-03.txt
 Date: 07/01/2024
 Authors: Liyan Gong, Weiqiang Cheng, Changwang Lin, Mengxiao Chen, Jie Dong, Ran Chen, Yanrong Liang
 Working Group: Individual Submissions (none)
This document describes a Segment Routing based solution for two- level hierarchical IETF network slices. Level-1 network slice is realized by associating Flex-Algo with dedicated sub-interfaces, and level-2 network slice is realized by using SR Policy with additional NRP-ID on data plane.
 Generalized Arguments of SRv6 Segment
 
 draft-lm-spring-srv6-generalized-arguments-02.txt
 Date: 20/11/2023
 Authors: Zhenbin Li, Jianwei Mao, Cheng Li
 Working Group: Individual Submissions (none)
This document analyzes the challenges of Arguments of SRv6 SID, and the chance of using Arguments of SRv6 SID to reduce the length of the IPv6 extension header. According to these analysis, this document specifies a kind of generalized and structured Arguments for SRv6 SID, which can carry multiple Arguments parts for a SRv6 SID.
 IS-IS and OSPFv3 Extensions to Advertise SRv6 Service SID
 
 draft-lin-lsr-srv6-service-sid-03.txt
 Date: 22/04/2024
 Authors: Changwang Lin, Mengxiao Chen, Hao Li
 Working Group: Individual Submissions (none)
The IPv6 backbone networks only deploying IGP may be required to interconnect IPv4 islands. SRv6 Service SIDs like End.DT4 may be used to realize such requirements. This document extends IS-IS and OSPFv3 to advertise SRv6 Service SIDs.
 PCEP for Enhanced DetNet
 
 draft-zhang-pce-enhanced-detnet-04.txt
 Date: 29/02/2024
 Authors: Li Zhang, Xuesong Geng, Tianran Zhou
 Working Group: Individual Submissions (none)
PCEP is used to provide a communication between a PCC and a PCE. This document defines the extensions to PCEP to support the bounded- latency path computation. Specifically, two new objects and three new TLVs are defined for the transmission of bounded latency information between PCC and PCE to guarantee the bounded latency transmission in control plane.
 IGP Extensions for Advertising Node Index
 
 draft-chen-lsr-adv-ni-04.txt
 Date: 02/04/2024
 Authors: Huaimo Chen, Donald Eastlake, Aijun Wang, Gyan Mishra, Yisong Liu, Yanhe Fan, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes OSPF and IS-IS extensions for distributing the node index configured on a node.
 IGP Extensions for Advertising Link Numbers
 
 draft-chen-lsr-adv-lkno-04.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Donald Eastlake, Aijun Wang, Gyan Mishra, Yisong Liu, Yanhe Fan, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes OSPF and IS-IS extensions for distributing the link numbers assigned to the links originating at a node.
 Stateless Best Effort Multicast Using MRH
 
 draft-chen-pim-be-mrh-04.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Donald Eastlake, Mike McBride, Yanhe Fan, Gyan Mishra, Yisong Liu, Aijun Wang, Xufeng Liu, Lei Liu
 Working Group: Individual Submissions (none)
This document describes stateless best effort Multicast along the shortest paths to the egress nodes of a P2MP Path/Tree. The multicast data packet is encapsulated in an IPv6 Multicast Routing Header (MRH). The MRH contains the egress nodes represented by the indexes of the nodes and flexible bit strings for the nodes. The packet is delivered to each of the egress nodes along the shortest path. There is no state stored in the core of the network.
 Distributed Learning Architecture based on Edge-cloud Collaboration
 
 draft-li-coinrg-distributed-learning-architecture-02.txt
 Date: 22/01/2024
 Authors: Chao Li, 4875690059616E67, Zhengjie Sun, Sheng Liu, Haomian Zheng
 Working Group: Individual Submissions (none)
This document describes the distributed learning architecture based on edge-cloud collaboration.
 An Overview of Energy-related Effort within the IETF
 
 draft-eckert-ietf-and-energy-overview-06.txt
 Date: 05/01/2024
 Authors: Toerless Eckert, Mohamed Boucadair, Pascal Thubert, Jeff Tantsura, Carlos Pignataro
 Working Group: Individual Submissions (none)
This memo provides an overview of work performed by or proposed within the IETF related to energy and/or green: awareness, management, control or reduction of consumption of energy, and sustainability as it related to the IETF. This document is written to help those unfamiliar with that work, but interested in it, in the hope to raise more interest in energy- related activities within the IETF, such as identifying gaps and investigating solutions as appropriate. This document captures work until 12/2022, at which time the "IAB workshop on Environmental Impact of Internet Applications and Systems" revived interest and triggered new work in the topic within the IETF/IRTF.
 Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
 
 draft-fossati-tls-attestation-06.txt
 Date: 19/03/2024
 Authors: Hannes Tschofenig, Yaron Sheffer, Paul Howard, Ionut Mihalcea, Yogesh Deshpande, Arto Niemi, Thomas Fossati
 Working Group: Individual Submissions (none)
The TLS handshake protocol allows authentication of one or both peers using static, long-term credentials. In some cases, it is also desirable to ensure that the peer runtime environment is in a secure state. Such an assurance can be achieved using attestation which is a process by which an entity produces evidence about itself that another party can use to appraise whether that entity is found in a secure state. This document describes a series of protocol extensions to the TLS 1.3 handshake that enables the binding of the TLS authentication key to a remote attestation session. This enables an entity capable of producing attestation evidence, such as a confidential workload running in a Trusted Execution Environment (TEE), or an IoT device that is trying to authenticate itself to a network access point, to present a more comprehensive set of security metrics to its peer. These extensions have been designed to allow the peers to use any attestation technology, in any remote attestation topology, and mutually.
 BIER Extension Headers
 
 draft-zzhang-bier-extension-headers-03.txt
 Date: 25/02/2024
 Authors: Zhaohui Zhang, Xiao Min, Yisong Liu, Hooman Bidgoli
 Working Group: Individual Submissions (none)
Bit Index Explicit Replication (BIER) is a multicast technology with a new encapsulation and forwarding paradigm. BIER encapsulation is specified in RFC8296, and this document specifies extension headers used with BIER encapsulation header.
 A Domain Name System (DNS) Service Parameter and Resource Record for Tunneling Information
 
 draft-eastlake-dnsop-svcb-rr-tunnel-05.txt
 Date: 07/05/2024
 Authors: Donald Eastlake, Haoyu Song
 Working Group: Individual Submissions (none)
A Domain Name System (DNS) Service Binding (SVCB) Service Parameter Type and a DNS Resource Record (RR) Type are specified for storing connection tunneling / encapsulation Information in the DNS.
 I2NSF Analytics Interface YANG Data Model
 
 draft-lingga-i2nsf-analytics-interface-dm-03.txt
 Date: 07/02/2024
 Authors: Patrick Lingga, Jaehoon Jeong, Yunchul Choi
 Working Group: Individual Submissions (none)
This document describes an information model and a YANG data model for the Analytics Interface between an Interface to Network Security Functions (I2NSF) Analyzer and a Security Controller in an I2NSF system in a Network Functions Virtualization (NFV) environment. The YANG data model described in this document is based on the I2NSF NSF- Facing Interface and the I2NSF Monitoring Interface for enabling the delivery of analytics information based on monitoring data received from a Network Security Function (NSF).
 Encryption algorithm Rocca-S
 
 draft-nakano-rocca-s-05.txt
 Date: 24/01/2024
 Authors: Yuto Nakano, Kazuhide Fukushima, Takanori Isobe
 Working Group: Individual Submissions (none)
This document defines Rocca-S encryption scheme, which is an Authenticated Encryption with Associated Data (AEAD), using a 256-bit key and can be efficiently implemented utilizing the AES New Instruction set (AES-NI).
 A Larger Internet Key Exchange version 2 (IKEv2) Payload
 
 draft-nir-ipsecme-big-payload-03.txt
 Date: 16/03/2024
 Authors: Yoav Nir
 Working Group: Individual Submissions (none)
The messages of the Internet Key Exchange version 2 (IKEv2) protocol are made up of payloads. The current protocol limits each of these payloads to 64KB by having a 2-byte length field. While this is usually enough, several of the payloads may need to be larger. This document defines an extension to IKEv2 that allows larger payloads.
 IBM i Telnet Enhancements
 
 draft-garvey-networking-rfc4777bis-02.txt
 Date: 21/11/2023
 Authors: Russel Garvey, Barbara Smith, Timothy Mullenbach
 Working Group: Individual Submissions (none)
This obsoletes RFC4777 with an enhanced Automatic Sign-On PBKDF2 with HMAC SHA-512 password hash available with systems running with V7R5M0 or later and configured to use Password Level (QPWDLVL) 4 or higher for the user profile passwords Section 5.3. Require use of Transport Layer Security (TLS) to secure the telnet session between the Telnet server and client Section 13. Add Telnet Device Negotiation Termination Section 10.5 documenting how telnet clients that do not follow 5250 negotiation are handled. Document use of Transport Layer Security (TLS) using port 992 Section 14. Enhancement to add Multi Factor Authentication to automatic sign-on Changes since -00 Draft * Update abstract for PBKDF2 with HMAC SHA-512 password hash * Document use of Transport Layer Security (TLS) in Security Considerations Section 13 Changes since -01 Draft * TLS handshake must complete before invite for terminal type is sent in Section 2 * Change using TLS from RECOMENDED to REQUIRED to be ccompliant with this draft Section 13 * Change disabling port 23 from RECOMENDED to REQUIRED Section 13 * Detail use and related DCM configuration for TLS Section 13 * Add IANA Considerations use of port 992 for Telnet using TLS/SSL (service telnet-ssl) to Section 14 * Include "application definition" and "Digital Certificate Manager (DCM)" to Section 1.1 * Update abstract for Authentication factor in Section 5 * Update Response Codes for Authentication factor in Section 10.4
 Simple Two-way Active Measurement Protocol (STAMP) for MPLS Label Switched Paths (LSPs)
 
 draft-mirsky-mpls-stamp-07.txt
 Date: 25/03/2024
 Authors: Greg Mirsky
 Working Group: Individual Submissions (none)
Simple Two-way Active Measurement Protocol (STAMP), defined in RFC 8762 and RFC 8972, is expected to be able to monitor the performance of paths between systems that use a wide variety of encapsulations. This document defines encapsulation and bootstrapping of a STAMP test session over an MPLS Label Switched Path.
 DAP Interoperation Test Design
 
 draft-dcook-ppm-dap-interop-test-design-07.txt
 Date: 28/02/2024
 Authors: David Cook
 Working Group: Individual Submissions (none)
This document defines a common test interface for implementations of the Distributed Aggregation Protocol for Privacy Preserving Measurement (DAP) and describes how this test interface can be used to perform interoperation testing between the implementations. Tests are orchestrated with containers, and new test-only APIs are introduced to provision DAP tasks and initiate processing.
 Remove SHA-1 from active use within DNSSEC
 
 draft-hardaker-dnsop-must-not-sha1-02.txt
 Date: 14/05/2024
 Authors: Wes Hardaker, Warren Kumari
 Working Group: Individual Submissions (none)
This document retires the use of SHA-1 within DNSSEC.
 The Transit Measurement Option
 
 draft-mzbc-ippm-transit-measurement-option-03.txt
 Date: 13/02/2024
 Authors: Tal Mizrahi, Tianran Zhou, Shahar Belkar, Reuven Cohen
 Working Group: Individual Submissions (none)
This document specifies an IPv6 option that contains a compact set of fields which can be used for transit delay measurement and congestion detection. This option can be incorporated into data packets and updated by transit nodes along the path, enabling lightweight measurement and monitoring using constant-length data that does not depend on the number of hops in the network.
 DNSSEC Cryptographic Algorithm Recommendation Update Process
 
 draft-hardaker-dnsop-rfc8624-bis-03.txt
 Date: 14/05/2024
 Authors: Wes Hardaker, Warren Kumari
 Working Group: Individual Submissions (none)
[EDITOR NOTE: This document does not change the status (MUST, MAY, RECOMMENDED, etc) of any of the algorithms listed in [RFC8624]; that is the work of future documents. Instead, this document moves the canonical list of algorithms from [RFC8624] to an IANA registry. This is done for two reasons: 1) to allow the list to be updated more easily, and, much more importantly, 2) to allow the list to be more easily referenced.] The DNSSEC protocol makes use of various cryptographic algorithms to provide authentication of DNS data and proof of non-existence. To ensure interoperability between DNS resolvers and DNS authoritative servers, it is necessary to specify both a set of algorithm implementation requirements and usage guidelines to ensure that there is at least one algorithm that all implementations support. This document updates [RFC8624] by moving the canonical source of algorithm implementation requirements and usage guidance for DNSSEC from [RFC8624] to an IANA registry. Future extensions to this registry can be made under new, incremental update RFCs.
 Cisco's CoAP Simple Management Protocol
 
 draft-duffy-csmp-06.txt
 Date: 11/12/2023
 Authors: Paul Duffy
 Working Group: Individual Submissions (none)
CoAP Simple Management Protocol (CSMP) is purpose-built to provide lifecycle management for resource constrained IoT devices deployed within large-scale, bandwidth constrained IoT networks. CSMP offers an efficient transport and message encoding supporting classic NMS functions such as device on-boarding, device configuration, device status reporting, securing the network, etc. This document describes the design and operation of CSMP. This document does not represent an IETF consensus.
 The R5N Distributed Hash Table
 
 draft-schanzen-r5n-04.txt
 Date: 17/02/2024
 Authors: Martin Schanzenbach, Christian Grothoff, Bernd Fix
 Working Group: Individual Submissions (none)
This document contains the R^5N DHT technical specification. R^5N is a secure distributed hash table (DHT) routing algorithm and data structure for decentralized applications. It features an open peer- to-peer overlay routing mechanism which supports ad-hoc permissionless participation and support for topologies in restricted-route environments. Optionally, the paths data takes through the overlay can be recorded, allowing decentralized applications to use the DHT to discover routes. This document defines the normative wire format of protocol messages, routing algorithms, cryptographic routines and security considerations for use by implementers. This specification was developed outside the IETF and does not have IETF consensus. It is published here to guide implementation of R^5N and to ensure interoperability among implementations including the pre-existing GNUnet implementation.
 Kyber Post-Quantum KEM
 
 draft-cfrg-schwabe-kyber-04.txt
 Date: 02/01/2024
 Authors: Peter Schwabe, Bas Westerbaan
 Working Group: Individual Submissions (none)
This memo specifies a preliminary version ("draft00", "v3.02") of Kyber, an IND-CCA2 secure Key Encapsulation Method. About This Document This note is to be removed before publishing as an RFC. The latest revision of this draft can be found at https://bwesterb.github.io/draft-schwabe-cfrg-kyber/draft-cfrg- schwabe-kyber.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-cfrg-schwabe-kyber/. Source for this draft and an issue tracker can be found at https://github.com/bwesterb/draft-schwabe-cfrg-kyber.
 Publicly Verifiable Nominations Committee (NomCom) Random Selection
 
 draft-eastlake-rfc3797bis-05.txt
 Date: 31/12/2023
 Authors: Donald Eastlake
 Working Group: Individual Submissions (none)
This document describes a method for making random selections in such a way as to promote public confidence in the unbiased nature of the choice. This method is referred to in this document as "verifiable selection". It focuses on the selection of the voting members of the IETF Nominations Committee (NomCom) from the pool of eligible volunteers; however, similar techniques could be and have been applied to other selections. It provdes an optional extension for multiple rounds of such selection that can be induced by earlier selectees without compromising the unpredictable nature of the selections. This document obsoletes RFC 3797.
 UDP Encapsulation of Stream Control Transmission Protocol (SCTP) Packets for End-Host to End-Host Communication
 
 draft-tuexen-tsvwg-rfc6951-bis-05.txt
 Date: 03/03/2024
 Authors: Michael Tuexen, Randall Stewart
 Working Group: Individual Submissions (none)
This document describes a simple method of encapsulating Stream Control Transmission Protocol (SCTP) packets into UDP packets and its limitations. This allows the usage of SCTP in networks with legacy NATs that do not support SCTP. It can also be used to implement SCTP on hosts without directly accessing the IP layer, for example, implementing it as part of the application without requiring special privileges. Please note that this document only describes the functionality needed within an SCTP stack to add on UDP encapsulation, providing only those mechanisms for two end-hosts to communicate with each other over UDP ports. In particular, it does not provide mechanisms to determine whether UDP encapsulation is being used by the peer, nor the mechanisms for determining which remote UDP port number can be used. These functions are out of scope for this document. This document covers only end-hosts and not tunneling (egress or ingress) endpoints.
 SCION Control-Plane PKI
 
 draft-dekater-scion-pki-05.txt
 Date: 04/03/2024
 Authors: Corine de Kater, Nicola Rustignoli, Samuel Hitz
 Working Group: Individual Submissions (none)
This document presents the trust concept and design of the SCION _control-plane Public Key Infrastructure (PKI)_, SCION's public key infrastructure model. SCION (Scalability, Control, and Isolation On Next-generation networks) is a path-aware, inter-domain network architecture. The control-plane PKI, or short CP-PKI, handles cryptographic material and lays the foundation for the authentication procedures in SCION. It is used by SCION's control plane to authenticate and verify path information, and builds the basis for SCION's special trust model based on so-called Isolation Domains. This document first introduces the trust model behind the SCION's control-plane PKI, as well as clarifications to the concepts used in it. This is followed by specifications of the different types of certificates and the Trust Root Configuration. The document then specifies how to deploy the whole infrastructure.
 Distributed Flow Measurement in IPv6
 
 draft-wang-ippm-ipv6-distributed-flow-measurement-04.txt
 Date: 08/01/2024
 Authors: Haojie Wang, sijun weng, Changwang Lin, Xiao Min, Greg Mirsky
 Working Group: Individual Submissions (none)
In IPv6 networks, performance measurements such as packet loss, delay and jitter of real traffic can be carried out based on the Alternate-Marking method. Usually, the controller needs to collect statistical data on network devices, calculate and present the measurement results. This document proposes a distributed method for on-path flow measurement, which is independent of the controller.
 SAV-based Anti-DDoS Architecture
 
 draft-cui-savnet-anti-ddos-03.txt
 Date: 04/03/2024
 Authors: Yong Cui, Jianping Wu, Linzhe Li, Lei Zhang
 Working Group: Individual Submissions (none)
Existing SAV schemes can not effectively defend against IP Spoofing DDoS under incremental deployment. This document proposes SAV-D, a savnet based distributed defense architecture to enhance SAV's defense. The main idea of SAV-D is to collect and aggregate more threat data from existing SAV devices and then distribute crucial knowledge to widespread devices, thus significantly expanding defense across the entire network.
 Segment Routing BGP Egress Peer Engineering over Layer 2 Bundle Members
 
 draft-lin-idr-sr-epe-over-l2bundle-06.txt
 Date: 15/05/2024
 Authors: Changwang Lin, Zhenqiang Li, Ran Pang, Ketan Talaulikar, Mengxiao Chen
 Working Group: Individual Submissions (none)
There are deployments where the Layer 3 interface on which a BGP peer session is established is a Layer 2 interface bundle. In order to allow BGP-EPE to control traffic flows on individual member links of the underlying Layer 2 bundle, BGP Peering SIDs need to be allocated to individual bundle member links, and advertisement of such BGP Peering SIDs in BGP-LS is required. This document describes how to support Segment Routing BGP Egress Peer Engineering over Layer 2 bundle members. This document updates [RFC9085] to allow the L2 Bundle Member Attributes TLV to be added to the BGP-LS Attribute associated with the Link NLRI of BGP peering link. This document updates [RFC9085] and [RFC9086] to allow the PeerAdj SID TLV to be included as a sub-TLV of the L2 Bundle Member Attributes TLV.
 Supporting In-Situ OAM Direct Export Using MPLS Network Actions
 
 draft-mb-mpls-ioam-dex-06.txt
 Date: 28/03/2024
 Authors: Greg Mirsky, Mohamed Boucadair, Tony Li
 Working Group: Individual Submissions (none)
In-Situ Operations, Administration, and Maintenance (IOAM), defined in RFC 9197, is an on-path telemetry method to collect and transport the operational state and telemetry information that can be used to calculate various performance metrics. IOAM Direct Export (IOAM-DEX) is one of the IOAM Option types, in which the operational state and telemetry information are collected according to the specified profile and exported in a manner and format defined by a local policy. MPLS Network Actions (MNA) techniques are meant to indicate actions to be performed on any combination of Label Switched Paths (LSPs), MPLS packets, and the node itself, and also to transfer data needed for these actions. This document explores the on-path operational state, and telemetry information can be collected using IOAM-DEX Option in combination with MNA.
 Replay Resistant Authenticated Receiver Chain
 
 draft-chuang-replay-resistant-arc-11.txt
 Date: 20/02/2024
 Authors: Wei Chuang, Bron Gondwana
 Working Group: Individual Submissions (none)
DKIM (RFC6376) is an IETF standard for the cryptographic protocol to authenticate email at the domain level and protect the integrity of messages during transit. Section 8.6 defines a vulnerability called DKIM Replay as a spam message sent through a SMTP MTA DKIM signer, that then is sent to many more recipients, leveraging the reputation of the signer. We propose a replay resistant cryptographic based protocol that discloses all SMTP recipients and signs them, allowing a receiver or any third party to verify that the message went to the intended recipient. If not then then potentially the message is replayed. Moreover it leverages ARC (RFC8617) and sender defined forwarding path to build a "chain of custody" that accurately defines the SMTP forwarding path of the message. This also allows the protocol to detect DKIM and ARC replay attacks and other attacks.
 Deterministic Networking (DetNet) Data Plane - Tagged Cyclic Queuing and Forwarding (TCQF) for bounded latency with low jitter in large scale DetNets
 
 draft-eckert-detnet-tcqf-05.txt
 Date: 05/01/2024
 Authors: Toerless Eckert, Yizhou Li, Stewart Bryant, Andrew Malis, Jeong-dong Ryoo, Peng Liu, Guangpeng Li, Shoushou Ren, Fan Yang
 Working Group: Individual Submissions (none)
This memo specifies a forwarding method for bounded latency and bounded jitter for Deterministic Networks and is a variant of the IEEE TSN Cyclic Queuing and Forwarding (CQF) method. Tagged CQF (TCQF) supports more than 2 cycles and indicates the cycle number via an existing or new packet header field called the tag to replace the cycle mapping in CQF which is based purely on synchronized reception clock. This memo standardizes TCQF as a mechanism independent of the tagging method used. It also specifies tagging via the (1) the existing MPLS packet Traffic Class (TC) field for MPLS packets, (2) the IP/IPv6 DSCP field for IP/IPv6 packets, and (3) a new TCQF Option header for IPv6 packets. Target benefits of TCQF include low end-to-end jitter, ease of high- speed hardware implementation, optional ability to support large number of flow in large networks via DiffServ style aggregation by applying TCQF to the DetNet aggregate instead of each DetNet flow individually, and support of wide-area DetNet networks with arbitrary link latencies and latency variations as well as low accuracy clock synchronization.
 In-band Task Provisioning for DAP
 
 draft-wang-ppm-dap-taskprov-06.txt
 Date: 06/02/2024
 Authors: Shan Wang, Christopher Patton
 Working Group: Individual Submissions (none)
An extension for the Distributed Aggregation Protocol (DAP) is specified that allows the task configuration to be provisioned in- band.
 A Blockchain Trusted Protocol for Intelligent Communication Network
 
 draft-tu-nmrg-blockchain-trusted-protocol-03.txt
 Date: 08/04/2024
 Authors: Jingfu Yan, Hua-chun Zhou, Yuzheng Yang, Haoxiang Song, Zhe Tu
 Working Group: Individual Submissions (none)
This document defines a blockchain-based trusted protocol for sixth- generation (6G) intelligent communication network.
 Additional addresses for QUIC
 
 draft-piraux-quic-additional-addresses-02.txt
 Date: 04/03/2024
 Authors: Maxime Piraux, Olivier Bonaventure
 Working Group: Individual Submissions (none)
This document specifies a QUIC frame enabling a QUIC server to advertise additional addresses that can be used for a QUIC connection.
 Network File System (NFS) Version 4 Minor Version 1 External Data Representation Standard (XDR) Description
 
 draft-dnoveck-nfsv4-rfc5662bis-02.txt
 Date: 06/05/2024
 Authors: David Noveck
 Working Group: Individual Submissions (none)
This document provides the External Data Representation Standard (XDR) description for Network File System version 4 (NFSv4) minor version 1. It obsoletes and replaces RFC5662.
 The Incident Detection Message Exchange Format version 2 (IDMEFv2)
 
 draft-lehmann-idmefv2-03.txt
 Date: 07/04/2024
 Authors: Gilles Lehmann
 Working Group: Individual Submissions (none)
The Incident Detection Message Exchange Format version 2 (IDMEFv2) defines a date representation for security incidents detected on cyber and/or physical infrastructures. The format is agnostic so it can be used in standalone or combined cyber (SIEM), physical (PSIM) and availability (NMS) monitoring systems. IDMEFv2 can also be used to represent man made or natural hazards threats. IDMEFv2 improves situational awareness by facilitating correlation of multiple types of events using the same base format thus enabling efficient detection of complex and combined cyber and physical attacks and incidents. If approved this draft will obsolete RFC4765.
 Service Affinity Solution for TCP based Application
 
 draft-wang-tcpm-tcp-service-affinity-option-05.txt
 Date: 17/03/2024
 Authors: Wei Wang, Aijun Wang
 Working Group: Individual Submissions (none)
This draft proposes a service affinity solution between client and server based on the newly defined TCP Options. This solution can avoid the waste of resources caused by saving a large amount of customer status data in the network equipment, and realize the optimized scheduling of resources based on network conditions and computing resources in the computing-aware traffic steering scenario, so as to realize the reasonable operation of network resources, cloud resources and computing resources.
 Mappings Between XML2RFC v3 and AsciiDoc
 
 draft-petithuguenin-xml2rfc-asciidoc-04.txt
 Date: 27/01/2024
 Authors: Marc Petit-Huguenin
 Working Group: Individual Submissions (none)
This document specifies a mapping between XML2RFC v3 and AsciiDoc. The goal of this mapping and its associated tooling is to make writing an Internet-Draft as simple as possible, by converting any AsciiDoc formatted document into a valid Internet-Draft, ready to be submitted to the IETF. This is still work in progress and for the time being this mapping only ensures that any valid XML2RFC element can be generated from AsciiDoc.
 A Concise Binary Object Representation (CBOR) of DNS Messages
 
 draft-lenders-dns-cbor-07.txt
 Date: 19/05/2024
 Authors: Martine Lenders, Carsten Bormann, Thomas Schmidt, Matthias Waehlisch
 Working Group: Individual Submissions (none)
This document specifies a compressed data format of DNS messages using the Concise Binary Object Representation [RFC8949]. The primary purpose is to keep DNS messages small in constrained networks.
 CDDL 2.0 and beyond -- a draft plan
 
 draft-bormann-cbor-cddl-2-draft-04.txt
 Date: 27/02/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
The Concise Data Definition Language (CDDL) today is defined by RFC 8610 and RFC 9165. The latter (as well as some more application specific specifications such as RFC 9090) have used the extension point provided in RFC 8610, the control operator. As CDDL is used in larger projects, feature requirements become known that cannot be easily mapped into this single extension point. Hence, there is a need for evolution of the base CDDL specification itself. The present document provides a roadmap towards a "CDDL 2.0". It is based on draft-bormann-cbor-cddl-freezer, but is more selective in what potential features it takes up and more detailed in their discussion. It is intended to serve as a basis for prototypical implementations of CDDL 2.0. This document is intended to evolve over time; it might spawn specific documents and then retire or eventually be published as a roadmap document.
 Media Handling Considerations for Wireless Networks
 
 draft-kaippallimalil-tsvwg-media-hdr-wireless-04.txt
 Date: 14/02/2024
 Authors: John Kaippallimalil, Sri Gundavelli, Spencer Dawkins
 Working Group: Individual Submissions (none)
Wireless networks like 5G cellular or Wi-Fi experience significant variations in link capacity over short intervals due to wireless channel conditions, interference, or the end-user's movement. These variations in capacity take place in the order of hundreds of milliseconds and is much too fast for end-to-end congestion signaling by itself to convey the changes for an application to adapt. Media applications on the other hand demand both high throughput and low latency, and may adjust the size and quality of a stream to network bandwidth available or dynamic change in content coded. However, catering to such media flows over a radio link with rapid changes in capacity requires the buffers and congestion to be managed carefully. Wireless networks need additional information to manage radio resources optimally to maximize network utilization and application performance. This draft provides requirements on metadata about the media transported, its scalability, privacy, and other related considerations.
 The JSON format for vCon - Conversation Data Container
 
 draft-petrie-vcon-03.txt
 Date: 04/03/2024
 Authors: Daniel Petrie, Thomas McCarthy-Howe
 Working Group: Individual Submissions (none)
A vCon is the container for data and information relating to a real- time, human conversation. It is analogous to a [vCard] which enables the definition, interchange and storage of an individual's various points of contact. The data contained in a vCon may be derived from any multimedia session, traditional phone call, video conference, SMS or MMS message exchange, webchat or email thread. The data in the container relating to the conversation may include Call Detail Records (CDR), call meta data, participant identity information (e.g. STIR PASSporT), the actual conversational data exchanged (e.g. audio, video, text), realtime or post conversational analysis and attachments of files exchanged during the conversation. A standardized conversation container enables many applications, establishes a common method of storage and interchange, and supports identity, privacy and security efforts (see [vCon-white-paper])
 Design Space Analysis of MoQ
 
 draft-shi-moq-design-space-analysis-of-moq-03.txt
 Date: 03/03/2024
 Authors: Hang Shi, Yong Cui, Xiaobo Yu
 Working Group: Individual Submissions (none)
This document investigates potential solution directions within the charter scope of MoQ WG. MoQ aims to provide low-latency, efficient media delivery solution for use cases including live streaming, gaming and video conferencing. To achieve low-latency media transfer efficiently, the network topology of relay nodes and the computation done at the relay nodes should be considered carefully. This document provides the analysis of those factors which can help the design of the MoQ protocols.
 LSP Ping/Traceroute for Enabled In-situ OAM Capabilities
 
 draft-xiao-mpls-lsp-ping-ioam-conf-state-03.txt
 Date: 25/03/2024
 Authors: Xiao Min, Greg Mirsky
 Working Group: Individual Submissions (none)
This document describes the MPLS Node IOAM Information Query functionality, which uses the MPLS echo request/reply messages, allowing the IOAM encapsulating node to discover the enabled IOAM capabilities of each IOAM transit and decapsulating node.
 Encapsulation of BFD for SRv6 Policy
 
 draft-liu-spring-bfd-srv6-policy-encap-03.txt
 Date: 04/03/2024
 Authors: Yisong Liu, Weiqiang Cheng, Changwang Lin, Mengxiao Chen, Xiao Min
 Working Group: Individual Submissions (none)
Bidirectional Forwarding Detection (BFD) mechanisms can be used for fast detection of failures in the forwarding path of SR Policy. This document describes the encapsulation of BFD for SRv6 Policy. The BFD packets may be encapsulated in Insert-mode or Encaps-mode.
 An EAT-based Key Attestation Token
 
 draft-bft-rats-kat-03.txt
 Date: 04/03/2024
 Authors: Mathias Brossard, Thomas Fossati, Hannes Tschofenig
 Working Group: Individual Submissions (none)
This document defines an evidence format for key attestation based on the Entity Attestation Token (EAT). Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/rats/. Source for this draft and an issue tracker can be found at https://github.com/thomas-fossati/draft-kat.
 Stateless Best Effort Multicast Simulations
 
 draft-chen-pim-be-mrh-simu-03.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Donald Eastlake, Mike McBride, Yanhe Fan, Gyan Mishra, Yisong Liu, Aijun Wang, Xufeng Liu, Lei Liu
 Working Group: Individual Submissions (none)
This document describes simulations of stateless best effort Multicasts and lists a set of simulation results for different large network sizes and different tree sizes.
 BGP for Mirror Binding
 
 draft-chen-idr-mbinding-04.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Bruno Decraene, Gyan Mishra, Yanhe Fan, Aijun Wang, Xufeng Liu
 Working Group: Individual Submissions (none)
BGP is used to distribute a binding to a node. The binding includes a binding SID and a path represented by a list of SIDs. This document describes extensions to BGP for distributing the information about the binding to a protecting node. For an SR path via the node with the binding SID, when the node fails, the protecting node such as the upstream neighbor on the path uses the information to protect the binding SID of the failed node.
 PCE for Mirror Binding
 
 draft-chen-pce-mbinding-03.txt
 Date: 29/03/2024
 Authors: Huaimo Chen, Bruno Decraene, Gyan Mishra, Aijun Wang, Xufeng Liu, Lei Liu
 Working Group: Individual Submissions (none)
PCE is used to distribute a binding to a node. The binding includes a binding SID and a path represented by a list of SIDs. This document describes extensions to PCEP for distributing the information about the binding to a protecting node. For an SR path via the node with the binding SID, when the node fails, the protecting node such as the upstream neighbor on the path uses the information to protect the binding SID of the failed node.
 Requirements and Design for Interfaces of Network Digital Twin
 
 draft-chen-nmrg-dtn-interface-03.txt
 Date: 04/03/2024
 Authors: Danyang Chen, Hongwei Yang, Cheng Zhou
 Working Group: Individual Submissions (none)
The interfaces of Digital Twin Network can be divided as twin network southbound interface, internal interface and northbound interface. In order to build a digital twin network and realize its many advantages, different interfaces should be able to meet different requirements. And this memo introduces the requirements and design about interfaces of the Digital Twin Network.
 General Source Address Validation Capabilities
 
 draft-huang-savnet-sav-table-05.txt
 Date: 03/03/2024
 Authors: Mingqing(Michael) Huang, Weiqiang Cheng, Dan Li, Nan Geng, Mingxing Liu, Li Chen, Changwang Lin
 Working Group: Individual Submissions (none)
The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.
 Inter-domain Source Address Validation (SAVNET) Architecture
 
 draft-wu-savnet-inter-domain-architecture-07.txt
 Date: 04/03/2024
 Authors: Dan Li, Jianping Wu, Mingqing(Michael) Huang, Li Chen, Nan Geng, Libin Liu, Lancheng Qin
 Working Group: Individual Submissions (none)
This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.
 Generalized IPv6 Tunnel for QUIC
 
 draft-li-rtgwg-gip6-for-quic-02.txt
 Date: 10/01/2024
 Authors: Zhenbin Li, Shuanglong Chen, Hang Shi
 Working Group: Individual Submissions (none)
This document defines a new encapsulation method for QUIC packet transmission based on IPv6 extension headers. This method enables QUIC packet transmission to easily inherit the extended functions of IPv6.
 BFD Extension for DetNet Remote Defect Indication (RDI)
 
 draft-huang-detnet-rdi-01.txt
 Date: 21/02/2024
 Authors: Hongyi Huang, Li Zhang, Tianran Zhou
 Working Group: Individual Submissions (none)
This document provides a method of realizing remote defect indication for DetNet OAM. It takes advantage of and extends BFD to explicitly indicate DetNet-specific defects.
 BGP-LS Advertisement of TE Policy Performance Metric
 
 draft-lin-idr-bgpls-te-policy-pm-02.txt
 Date: 20/12/2023
 Authors: Changwang Lin, Mengxiao Chen, Hao Li
 Working Group: Individual Submissions (none)
This document describes a way to advertise the performance metrics for Traffic Engineering (TE) Policy using BGP Link State (BGP-LS).
 EVPN Multicast Forwarding for EVPN to EVPN Gateways
 
 draft-rabnic-bess-evpn-mcast-eeg-03.txt
 Date: 04/03/2024
 Authors: Jorge Rabadan, Olivier Dornon, Vinod Prabhu, Alex Nichol, Zhaohui Zhang, Wen Lin
 Working Group: Individual Submissions (none)
This document proposes an EVPN (Ethernet Virtual Private Network) extension to allow IP multicast forwarding on Service Gateways that interconnect two or more EVPN domains.
 YANG Data Model for RPKI to Router Protocol
 
 draft-liu-sidrops-rtr-yang-04.txt
 Date: 08/12/2023
 Authors: Yisong Liu, Changwang Lin, Haibo Wang, Hongwei Liu, Di Ma
 Working Group: Individual Submissions (none)
This document defines YANG data models for configuring and managing Resource Public Key Infrastructure (RPKI) to Router Protocol (RFC6810 and RFC8210).
 Reliability Considerations of Path-Aware Semantic Addressing
 
 draft-li-6lo-pasa-reliability-03.txt
 Date: 04/03/2024
 Authors: Guangpeng Li, Zhe Lou, Luigi Iannone
 Working Group: Individual Submissions (none)
Path-Aware Semantic Address (PASA), proposes to algorithmically assign addresses to nodes in a 6lo environment so to achieve stateless forwarding, hence, allowing to avoid using a routing protocol. PASA is more suitable for stable and static wireline connectivity, in order to avoid renumbering due to topology changes. Even in such kind of scenarios, reliability remains a concern. This memo tackles specifically reliability in PASA deployments, analyzing possible broad solution categories to solve the issue.
 Basic Support for IPv6 Networks Operating over 5G Vehicle-to-Everything Communications
 
 draft-jeong-6man-ipv6-over-5g-v2x-03.txt
 Date: 22/04/2024
 Authors: Jaehoon Jeong, Bien Mugabarigira, Yiwen Shen, Alexandre Petrescu, Sandra Cespedes
 Working Group: Individual Submissions (none)
This document provides methods and settings for using IPv6 to communicate among IPv6 nodes within the communication range of one another over 5G V2X (i.e., the 5th Generation Vehicle-to-Everything) links. Support for these methods and settings require minimal changes to the existing IPv6 protocol stack. This document also describes limitations associated with using these methods. Optimizations and usage of IPv6 in more complex 5G scenarios are not covered in this specification and are a subject for future work.
 Intent-Based Network Management Automation in 5G Networks
 
 draft-jeong-nmrg-ibn-network-management-automation-04.txt
 Date: 22/04/2024
 Authors: Jaehoon Jeong, Yoseop Ahn, Younghan Kim, J., PARK
 Working Group: Individual Submissions (none)
This document describes Network Management Automation (NMA) of cellular network services in 5G networks. For NMA, it proposes a framework empowered with Intent-Based Networking (IBN). The NMA in this document deals with a closed-loop network control, network intent translator, and network management audit. To support these three features in NMA, it specifies an architectural framework with system components and interfaces. Also, this framework can support the use cases of NMA in 5G networks such as the data aggregation of Internet of Things (IoT) devices, network slicing, and the Quality of Service (QoS) in Vehicle-to-Everything (V2X).
 Requirement of Fast Fault Detection for IP-based Network
 
 draft-guo-ffd-requirement-02.txt
 Date: 01/03/2024
 Authors: Liang Guo, Yi Feng, Jizhuang Zhao, Fengwei Qin, Lily Zhao, Haibo Wang, Wei Quan, Hongyi Huang
 Working Group: Individual Submissions (none)
The IP-based distributed system and software application layer often use heartbeat to maintain the network topology status. However, the heartbeat setting is long, which prolongs the system fault detection time. This document describes the requirements for a fast fault detection solution of IP-based network.
 SR Policy Group
 
 draft-cheng-spring-sr-policy-group-04.txt
 Date: 20/03/2024
 Authors: Weiqiang Cheng, Jiang Wenying, Changwang Lin, Yuanxiang Qiu, Yawei Zhang, Ran Chen, Yanrong Liang
 Working Group: Individual Submissions (none)
Segment Routing is a source routing paradigm that explicitly indicates the forwarding path for packets at the ingress node. An SR Policy is associated with one or more candidate paths, and each candidate path is either dynamic, explicit, or composite. This document describes SR policy Group in MPLS and IPv6 environments and illustrates some use cases for parent SR policy and SR Policy Group to provide best practice cases for operators.
 Echo Request/Reply for DetNet Capability Discovery
 
 draft-tan-detnet-cap-discovery-01.txt
 Date: 18/02/2024
 Authors: Li Zhang, Hongyi Huang, Tianran Zhou
 Working Group: Individual Submissions (none)
This document describes an extension to the echo request/reply mechanisms used in IP, MPLS or other DetNet data plane environments, which can be used within the DetNet domain, allowing the ping initiator node to discover the enabled DetNet capabilities of each relay node of detnet service-sub layer, which including discovering DetNet relay nodes, collecting DetNet service sub-layer specific information from DetNet relay nodes, as well as discovering the locations of PREOF functions.
 ISP Dual Queue Networking Deployment Recommendations
 
 draft-livingood-low-latency-deployment-05.txt
 Date: 18/04/2024
 Authors: Jason Livingood
 Working Group: Individual Submissions (none)
The IETF's Transport Area Working Group (TSVWG) has finalized experimental RFCs for Low Latency, Low Loss, Scalable Throughput (L4S) and new Non-Queue-Building (NQB) per hop behavior. These documents do a good job of describing a new architecture and protocol for deploying low latency networking. But as is normal for many such standards, especially those in experimental status, certain deployment decisions are ultimately left to implementers. This document explores the potential implications of key deployment decisions and makes recommendations for those decisions that may help drive adoption.
 BGP over QUIC
 
 draft-retana-idr-bgp-quic-04.txt
 Date: 03/03/2024
 Authors: Alvaro Retana, Yingzhen Qu, Jeffrey Haas, Shuanglong Chen, Jeff Tantsura
 Working Group: Individual Submissions (none)
This document specifies the use of QUIC Streams to support multiple BGP sessions over one connection in order to achieve high resiliency.
 MicroTap Segment in Segment Routing
 
 draft-zzhang-spring-microtap-segment-02.txt
 Date: 21/02/2024
 Authors: Zhaohui Zhang, Ryan Hoffman, Gurminderjit Bajwa, Dan Voyer, Shay Zadok, Aijun Wang, Luay Jalil, Li, Siva Sivabalan
 Working Group: Individual Submissions (none)
This document specifies a microTap segment that can be used to instruct a transit node to make a copy of a segment-routed packet and deliver it to a specified node for the purpose of network monitoring, trouble shooting, or lawful intercept.
 Framework of Fast Fault Detection for IP-based Network
 
 draft-wang-ffd-framework-02.txt
 Date: 01/03/2024
 Authors: Haibo Wang, Fengwei Qin, Lily Zhao, Shuanglong Chen, Hongyi Huang
 Working Group: Individual Submissions (none)
The IP-based distributed system and software application layer often use heartbeat to maintain the network topology status. However, the heartbeat setting is long, which prolongs the system fault detection time. IP-based storage network is the typical usage of that scenario. When the IP-based storage network fault occurs, NVMe connections need to be switched over. Currently, no effective method is available for quick detection, switchover is performed only based on keepalive timeout, resulting in low performance. This document defines the basic framework of how network assisted host devices can quickly detect application connection failures caused by network faults.
 INIT Forwarding for the Stream Control Transmission Protocol
 
 draft-tuexen-tsvwg-sctp-init-fwd-03.txt
 Date: 10/04/2024
 Authors: Michael Tuexen, Timo Voelker
 Working Group: Individual Submissions (none)
The Stream Control Transmission Protocol (SCTP) extension described in this document allows the support of a simple mechanism to distribute association requests between a cluster of SCTP end points providing the same service. In particular, this allows the use of anycast addresses in combination with SCTP.
 Modelling Boundaries
 
 draft-davis-netmod-modelling-boundaries-03.txt
 Date: 16/03/2024
 Authors: Nigel Davis
 Working Group: Individual Submissions (none)
Current modelling techniques appear to have boundaries that make representation of some concepts in modern problems, such as intent and capability, challenging. The concepts all have in common the need to represent uncertainty and vagueness. The challenge results from the rigidity of boundary representation, including the absoluteness of instance value and the process of classification itself, provided by current techniques. When describing solutions, a softer approach seems necessary where the emphasis is on the focus on a particular thing from a particular perspective. Intelligent control (use of AI/ML etc.) could take advantage of partial compatibilities etc. if a softer representation was achieved. The solution representation appears to require * Expression of range, preference and focus as a fundamental part of
 A Collaborative Framework for Cyberspace Governance: the Internet of Governance
 
 draft-jilongwang-opsawg-iog-03.txt
 Date: 21/04/2024
 Authors: Jilong Wang, Yi Qiao
 Working Group: Individual Submissions (none)
This document proposes the Internet of Governance (IoG), a new technology supporting platform for cyberspace collaborative governance. This document illustrates IoG definition, two roles and four functionalities, and develops architectural models to carry out these functionalities. This document provides the design of IoG framework and the collaboration life-cycle and uses some practical applications as examples.
 The "dereferenceable identifier" pattern
 
 draft-bormann-t2trg-deref-id-03.txt
 Date: 02/03/2024
 Authors: Carsten Bormann, Christian Amsuess
 Working Group: Individual Submissions (none)
In a protocol or an application environment, it is often important to be able to create unambiguous identifiers for some meaning (concept or some entity). Due to the simplicity of creating URIs, these have become popular for this purpose. Beyond the purpose of identifiers to be uniquely associated with a meaning, some of these URIs are in principle _dereferenceable_, so something can be placed that can be retrieved when encountering such a URI. // The present -03 revision discusses the continuum between entirely // relying on the result of dereferencing an identifier and building // in knowledge of all expected identifiers, and it mentions further // pitfalls of using dereferenceable identifiers.
 Handling Encrypted DNS Server Redirection
 
 draft-jt-add-dns-server-redirection-03.txt
 Date: 04/03/2024
 Authors: John Todd, Tommy Jensen, Corey Mosher
 Working Group: Individual Submissions (none)
This document defines Encrypted DNS Server Redirection (EDSR), a mechanism for encrypted DNS servers to redirect clients to other encrypted DNS servers. This enables dynamic routing to geo-located or otherwise more desirable encrypted DNS servers without modifying DNS client endpoint configurations or the use of anycast by the DNS server.
 k-of-n Composite Signatures for Multi-Algorithm PKI
 
 draft-pala-klaussner-composite-kofn-01.txt
 Date: 04/12/2023
 Authors: Massimiliano Pala, Jan Klaussner, Mike Ounsworth, John Gray
 Working Group: Individual Submissions (none)
With the need to evolve the cryptography used in today applications, devices, and networks, there are many scenarios where the use of a single-algorithm is not sufficient. For example, there might be the need for migrating between two existing algorithms because of a weakening of earlier generations (e.g., from classic or traditional to post-quantum or quantum-safe). Another example might involve the need to test, instead, the capabilities of devices via test drivers and/or non-standard algorithms. Another very common case is the need to combine certified cryptography (e.g., FIPS) with newer algorithms that are not yet certified or that are not planned for certification. This work extends the options provided by Explicit Composite, defined in [I-D.ounsworth-pq-composite-sigs], by providing a mechanism to manage backward and forward compatibility via k-of-n signature validation procedures. This document provides the definition of a new type of the kofn- CompositePublicKey and kofn-CompositeSignature which are aligned with the definitions of the respective structures for Explicit Composite [I-D.ounsworth-pq-composite-sigs].
 Flag-based MPLS On Path Telemetry Network Actions
 
 draft-song-mpls-flag-based-opt-03.txt
 Date: 04/03/2024
 Authors: Haoyu Song, Giuseppe Fioccola, Rakesh Gandhi
 Working Group: Individual Submissions (none)
This document describes the scheme to support two on-path telemetry techniques, PBT-M and Alternate Marking, as flag-based MPLS Network Actions for OAM in MPLS networks.
 SRv6 Upper-Layer Checksum
 
 draft-xiao-spring-srv6-checksum-05.txt
 Date: 06/05/2024
 Authors: Xiao Min, Yao Liu, Chongfeng Xie, Yisong Liu
 Working Group: Individual Submissions (none)
This document defines SRH C-flag and its processing, which makes the IPv6 upper-layer checksum computation rule applicable to both compressed and uncompressed SRv6 SIDs.
 Defined-Trust Transport (DeftT) Protocol for Limited Domains
 
 draft-nichols-iotops-defined-trust-transport-04.txt
 Date: 31/03/2024
 Authors: Kathleen Nichols, Van Jacobson, Randy King
 Working Group: Individual Submissions (none)
This document describes a broadcast-oriented, many-to-many Defined- trust Transport (DeftT) framework that makes it simple to express and enforce application and deployment specific integrity, authentication, access control and behavior constraints directly in the protocol stack. DeftT enables secure and completely self- contained (e.g., no external identity servers or certificate authorities) overlay networks where credentialed members can join and leave at any time. DeftT is part of a Defined-trust Communications approach with a specific example implementation available. Combined with IPv6 multicast and modern hardware-based methods for securing keys and code, it provides an easy to use foundation for secure and efficient communications in Limited Domains (RFC8799), in particular for Operational Technology (OT) networks. Conventional IP transports create optionally secured one-to-one sessions. Where member identities exist, they must either be validated via external servers or all member identities must be be preconfigured in each member during enrollment. Synchronization of data across a domain is carried out through multiple two-party transport sessions. In contrast, DeftT is a multi-party transport that synchronizes collections of secured information across all enrolled members of a domain. Security in DeftT is not optional and members are preconfigured only with their own identities and the secured rules to authenticate other member identities. This document describes an architecture that is not a standard and does not enjoy IETF consensus. (The community is invited to consider standardizing its concepts and the specification.)
 PQ/T Hybrid Key Exchange in SSH
 
 draft-kampanakis-curdle-ssh-pq-ke-02.txt
 Date: 10/05/2024
 Authors: Panos Kampanakis, Douglas Stebila, Torben Hansen
 Working Group: Individual Submissions (none)
This document defines Post-Quantum Traditional (PQ/T) Hybrid key exchange methods based on traditional ECDH key exchange and post- quantum key encapsulation schemes. These methods are defined for use in the SSH Transport Layer Protocol.
 EDNS Presentation and JSON Format
 
 draft-peltan-edns-presentation-format-03.txt
 Date: 19/04/2024
 Authors: Libor Peltan, Tom Carpay
 Working Group: Individual Submissions (none)
This document describes the textual and JSON representation formats of EDNS options. It also modifies the escaping rules of the JSON representation of DNS messages, previously defined in RFC8427.
 Combiner function for hybrid key encapsulation mechanisms (Hybrid KEMs)
 
 draft-ounsworth-cfrg-kem-combiners-05.txt
 Date: 31/01/2024
 Authors: Mike Ounsworth, Aron Wussler, Stavros Kousidis
 Working Group: Individual Submissions (none)
The migration to post-quantum cryptography often calls for performing multiple key encapsulations in parallel and then combining their outputs to derive a single shared secret. This document defines a comprehensible and easy to implement Keccak- based KEM combiner to join an arbitrary number of key shares, that is compatible with NIST SP 800-56Cr2 [SP800-56C] when viewed as a key derivation function. The combiners defined here are practical split- key PRFs and are CCA-secure as long as at least one of the ingredient KEMs is.
 An sdfType for Links
 
 draft-bormann-asdf-sdftype-link-02.txt
 Date: 03/12/2023
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
This document defines and registers an sdfType "link" for the Semantic Definition Format (SDF) for Data and Interactions of Things (draft-ietf-asdf-sdf).
 Testing async submission
 
 draft-sparks-test-async-submission-03.txt
 Date: 24/04/2024
 Authors: Robert Sparks
 Working Group: Individual Submissions (none)
This draft is submitted only to test the async api submission endpoint
 The Gordian Envelope Structured Data Format
 
 draft-mcnally-envelope-07.txt
 Date: 31/03/2024
 Authors: Wolf McNally, Christopher Allen
 Working Group: Individual Submissions (none)
Gordian Envelope specifies a structured format for hierarchical binary data focused on the ability to transmit it in a privacy- focused way, offering support for privacy as described in RFC 6973 and human rights as described in RFC 8280. Envelopes are designed to facilitate "smart documents" and have a number of unique features including: easy representation of a variety of semantic structures, a built-in Merkle-like digest tree, deterministic representation using CBOR, and the ability for the holder of a document to selectively elide specific parts of a document without invalidating the digest tree structure. This document specifies the base Envelope format, which is designed to be extensible.
 Gap Analysis for Enhanced DetNet
 
 draft-xiong-detnet-enhanced-detnet-gap-analysis-03.txt
 Date: 25/02/2024
 Authors: Quan Xiong, Aihua Liu
 Working Group: Individual Submissions (none)
From charter and milestones, the enhanced Deterministic Networking (DetNet) is required to provide the enhancement of flow identification and packet treatment for data plane to achieve the DetNet QoS in large-scale networks. This document discusses the characteristics of scaling deterministic networks and analyzes the gaps of the existing technologies especially applying the DetNet data plane as per RFC8938.
 A Pre-Authentication Mechanism for SSH
 
 draft-gutmann-ssh-preauth-01.txt
 Date: 21/12/2023
 Authors: Peter Gutmann
 Working Group: Individual Submissions (none)
Devices running SSH are frequently exposed on the Internet, either because of operational considerations or through misconfiguration, making them vulnerable to the constant 3-degree background radiation of scanning and probing attacks that pervade the Internet. This document describes a simple pre-authentication mechanism that limits these attacks with minimal changes to SSH implementations and no changes to the SSH protocol itself.
 An Ontology for RFCs
 
 draft-petithuguenin-rfc-ontology-04.txt
 Date: 20/01/2024
 Authors: Marc Petit-Huguenin
 Working Group: Individual Submissions (none)
This document defines an ontology that describes the specifications published by the RFC Editor, together with ancillary documents.
 PCEP Extensions to support BFD parameters
 
 draft-fizgeer-pce-pcep-bfd-parameters-02.txt
 Date: 04/12/2023
 Authors: Orly Bachar, Marina Fizgeer
 Working Group: Individual Submissions (none)
This document proposes extension to PCEP to configure LSP parameters. Some of LSP parameters are needed to configure S-BFD for candidate paths. Each candidate path is identified in PCEP by its uniquely assigned PLSP-ID. The mechanism proposed in this document is applicable to to all path setup types. The need for these definitions first appeared for Segment Routing path setup type, both MPLS and IPv6 data planes of SR.
 Deterministic Networking (DetNet) Controller Plane - VPFC Planning Information Model Based on VPFP in Scaling Deterministic Networks
 
 draft-guo-detnet-vpfc-planning-03.txt
 Date: 05/01/2024
 Authors: Daorong Guo, Guangliang Wen, Kehan Yao, Quan Xiong, Guoyu Peng, YOU Xuejun, zhushiyin
 Working Group: Individual Submissions (none)
The cycle-based queuing and forwarding mechanisms are an effective method to ensure that the transmission has a definite upper bound of jitter, as well as latency. The prerequisite for this method is to ensure that queuing resources do not conflict. In scaling deterministic networks, how to avoid the queuing resources conflict of this method is an open problem. This document proposes the information model of planning virtual periodic forwarding channel (VPFC) based on virtual periodic forwarding path (VPFP). The solution can solve the queuing resources conflict of cycle-specified queuing and forwarding in nonlinear topology domain, ensuring the bounded latency of DetNet flow in the same periodic forwarding domain.
 mLDP/RSVP-TE P2MP Tunnel with SRv6 SID
 
 draft-zzhang-mpls-mldp-rsvp-p2mp-srv6-02.txt
 Date: 06/02/2024
 Authors: Zhaohui Zhang, Vishnu Beeram, Rishabh Parekh, IJsbrand Wijnands, Ran Chen
 Working Group: Individual Submissions (none)
This document specifies extensions to mLDP and RSVP-TE P2MP protocols to set up mLDP and RSVP-TE P2MP tunnels with SRv6 SIDs intead of MPLS labels.
 Static Multicast Distribution Trees
 
 draft-nandy-pim-static-mcast-distribution-trees-02.txt
 Date: 08/01/2024
 Authors: tathagata nandy, Anil Raj, Muthukumar, Subramanian
 Working Group: Individual Submissions (none)
This document specifies the Static Provision of Multicast route as an alternate to Layer 3 Multicast protocols like PIM-SM (Protocol Independent Multicast - Sparse Mode), PIM SSM (Source-Specific Multicast), or PIM BIDI (Bidirectional). It works like a standalone Multicast Route provisioning feature that can interoperate with other dynamic Multicast protocols like PIM-SM or with L2 protocols like IGMP (Internet Group Management Protocol) and MLD (Multicast Listener Discovery). This feature can function with/without the use of Unicast Routing Protocols to build the Multicast tree.
 Interconnecting domains with IBGP
 
 draft-smn-idr-inter-domain-ibgp-03.txt
 Date: 17/04/2024
 Authors: Krzysztof Szarkowicz, Israel Means, Moshiko Nayman
 Working Group: Individual Submissions (none)
This document relaxes the recommendations specified in [RFC4364] and [RFC4456] allowing the building of Inter-domain L3VPN architecture with internal BGP.
 Considerations for Protection of SR Networks
 
 draft-liu-rtgwg-sr-protection-considerations-02.txt
 Date: 09/01/2024
 Authors: Yao Liu, Weiqiang Cheng, Changwang Lin, Xuesong Geng, Yisong Liu
 Working Group: Individual Submissions (none)
This document describes the considerations for protection of Segment Routing (SR) networks.
 Compact ECDHE and ECDSA Encodings for TLS 1.3
 
 draft-mattsson-tls-compact-ecc-06.txt
 Date: 23/02/2024
 Authors: John Mattsson, Hannes Tschofenig
 Working Group: Individual Submissions (none)
The encodings used in the ECDHE groups secp256r1, secp384r1, and secp521r1 and the ECDSA signature algorithms ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, and ecdsa_secp521r1_sha512 have significant overhead and the ECDSA encoding produces variable-length signatures. This document defines new optimal fixed-length encodings and registers new ECDHE groups and ECDSA signature algorithms using these new encodings. The new encodings reduce the size of the ECDHE groups with 33, 49, and 67 bytes and the ECDSA algorithms with an average of 7 bytes. These new encodings also work in DTLS 1.3 and are especially useful in cTLS.
 Encapsulation of Email over Delay-Tolerant Networks(DTN) using the Bundle Protocol
 
 draft-blanchet-dtn-email-over-bp-03.txt
 Date: 04/03/2024
 Authors: Marc Blanchet
 Working Group: Individual Submissions (none)
This document describes the encapsulation of emails using RFC2442 format in the payload of bundles of the Bundle Protocol for the use case of Delay-Tolerant Networks(DTN) such as in space communications.
 Bundle Protocol Endpoint ID Patterns
 
 draft-sipos-dtn-eid-pattern-02.txt
 Date: 08/04/2024
 Authors: Brian Sipos
 Working Group: Individual Submissions (none)
This document extends the Bundle Protocol Endpoint ID (EID) concept into an EID Pattern, which is used to categorize any EID as matching a specific pattern or not. EID Patterns are suitable for expressing configuration, for being used on-the-wire by protocols, and for being easily understandable by a layperson. EID Patterns include scheme- specific optimizations for expressing set membership and each scheme pattern includes text and CBOR encoding forms; the pattern for the "ipn" EID scheme being designed to be highly compressible in its CBOR form. This document also defines a Public Key Infrastructure Using X.509 (PKIX) Other Name form to contain an EID Pattern and a handling rule to use a pattern to match an EID.
 YANG model for NETCONF Event Notifications
 
 draft-ahuang-netconf-notif-yang-04.txt
 Date: 21/01/2024
 Authors: Alex Feng, Pierre Francois, Thomas Graf, Benoit Claise
 Working Group: Individual Submissions (none)
This document defines the YANG model for NETCONF Event Notifications. The definition of this YANG model allows the encoding of NETCONF Event Notifications in YANG compatible encodings such as YANG-JSON and YANG-CBOR.
 Encapsulation of HTTP over Delay-Tolerant Networks(DTN) using the Bundle Protocol
 
 draft-blanchet-dtn-http-over-bp-01.txt
 Date: 04/03/2024
 Authors: Marc Blanchet
 Working Group: Individual Submissions (none)
This document describes the encapsulation of HTTP requests and responses in the payload of bundles of the Bundle Protocol for the use case of Delay-Tolerant Networks(DTN) such as in space communications.
 lispers.net LISP NAT-Traversal Implementation Report
 
 draft-farinacci-lisp-lispers-net-nat-07.txt
 Date: 22/12/2023
 Authors: Dino Farinacci
 Working Group: Individual Submissions (none)
This memo documents the lispers.net implementation of LISP NAT traversal functionality. The document describes message formats and protocol semantics necessary to interoperate with the implementation. This memo is not a standard and does not reflect IETF consensus.
 Computerate Specification
 
 draft-petithuguenin-computerate-specification-02.txt
 Date: 03/02/2024
 Authors: Marc Petit-Huguenin
 Working Group: Individual Submissions (none)
This document specifies computerate specifications, which are the combination of a formal and an informal specification such as parts of the informal specification are generated from the formal specification.
 Compressed SID (C-SID) for SRv6 SFC
 
 draft-lh-spring-srv6-sfc-csid-02.txt
 Date: 29/02/2024
 Authors: Cheng Li, Weiqiang Cheng, Hongyi Huang
 Working Group: Individual Submissions (none)
In SRv6, an SRv6 SID is a 128-bit value. When too many 128-bit SRv6 SIDs are included in an SRH, the introduced overhead will affect the transmission efficiency of payload. In order to address this problem, Compressed SID(C-SID) is proposed. This document defines new behaviors for service segments with REPLACE-C-SID and NEXT-C-SID flavors to enable compressed SRv6 service programming.
 BIER with Anycast
 
 draft-zzhang-bier-anycast-03.txt
 Date: 06/02/2024
 Authors: Zhaohui Zhang, IJsbrand Wijnands, Zheng Zhang, Mankamana Mishra, Huaimo Chen
 Working Group: Individual Submissions (none)
BIER architecture currently does not support anycast, in that each BIER Forwarding Router (BFR) has its own unique BFR-prefix and BFR- ID. BIER signaling protocols also check if there are duplicate BFR- IDs advertised. This document discusses and specifies anycast support with BIER. It updates RFC 8279, RFC 8401 and RFC 8444.
 Timeslot Queueing and Forwarding Mechanism
 
 draft-peng-detnet-packet-timeslot-mechanism-06.txt
 Date: 04/03/2024
 Authors: Shaofu Peng, Peng Liu, Kashinath Basu, Aihua Liu, Dong Yang, Guoyu Peng
 Working Group: Individual Submissions (none)
IP/MPLS networks use packet switching (with the feature store-and- forward) and are based on statistical multiplexing. Statistical multiplexing is essentially a variant of time division multiplexing, which refers to the asynchronous and dynamic allocation of link timeslot resources. In this case, the service flow does not occupy a fixed timeslot, and the length of the timeslot is not fixed, but depends on the size of the packet. Statistical multiplexing has certain challenges and complexity in meeting deterministic QoS, and its delay performance is dependent on the used queueing mechanism. This document further describes a generic time division multiplexing scheme in IP/MPLS networks, which we call timeslot queueing and forwarding (TQF) mechanism. It aims to bring timeslot resources to layer-3, to make it easier for the control plane to calculate the delay performance based on the timeslot resources, and also make it easier for the data plane to create more flexible timeslot mapping. The functions of TQF can better meet large scaling requirements.
 Additional XML Security Uniform Resource Identifiers (URIs)
 
 draft-eastlake-rfc9231bis-xmlsec-uris-03.txt
 Date: 01/03/2024
 Authors: Donald Eastlake
 Working Group: Individual Submissions (none)
This document updates and corrects the IANA "XML Security URIs" registry that lists URIs intended for use with XML digital signatures, encryption, canonicalization, and key management. These URIs identify algorithms and types of information. This document also obsoletes RFC 9231.
 IP Addressing with References (IPREF)
 
 draft-augustyn-intarea-ipref-03.txt
 Date: 23/03/2024
 Authors: Waldemar Augustyn
 Working Group: Individual Submissions (none)
IP addressing with references, or IPREF for short, is a method for end-to-end communication across different address spaces normally not reachable through native means. IPREF uses references to addresses instead of real addresses. It allows to reach across NAT/NAT6 and across protocols IPv4/IPv6. It is a pure layer 3 addressing feature that works with existing network protocols. IPREF forms addresses (IPREF addresses) made of context addresses and references. These IPREF addresses are publishable in Domain Name System (DNS). Any host in any address space, including behind NAT/ NAT6 or employing different protocol IPv4/IPv6, may publish IPREF addresses of its services in DNS. These services will be reachable from any address space, including those running different protocol IPv4/IPv6 or behind NAT/NAT6, provided both ends support IPREF. IPREF is especially useful for transitioning to IPv6 or for operating networks with a mix of IPv4/IPv6.
 Managing CBOR numbers in Internet-Drafts
 
 draft-bormann-cbor-draft-numbers-03.txt
 Date: 29/02/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
CBOR-based protocols often make use of numbers allocated in a registry. During development of the protocols, those numbers may not yet be available. This impedes the generation of data models and examples that actually can be used by tools. This short draft proposes a common way to handle these situations, without any changes to existing tools. Also, in conjunction with the application-oriented EDN literal "e", a further reduction in editorial processing of CBOR examples around the time of approval can be achieved.
 Distribution of Service Metadata in BGP-LS
 
 draft-ls-idr-bgp-ls-service-metadata-03.txt
 Date: 05/05/2024
 Authors: Cheng Li, Hang Shi, Tao He, Ran Pang, Guofeng Qian
 Working Group: Individual Submissions (none)
In edge computing, a service may be deployed on multiple instances within one or more sites, called edge service. The edge service is associated with an ANYCAST address in the IP layer, and the route of it with potential service metadata will be distributed to the network. The Edge Service Metadata can be used by ingress routers to make path selections not only based on the routing cost but also the running environment of the edge services. The service route with metadata can be collected by a PCE(Path Compute Element) or an analyzer for calculating the best path to the best site/instance. This draft describes a mechanism to collect information of the service routes and related service metadata in BGP-LS.
 Distribution of SR P2MP Policies and State using BGP-LS
 
 draft-liu-idr-bgpls-sr-p2mp-policy-distribution-03.txt
 Date: 22/03/2024
 Authors: Yisong Liu, Changwang Lin, Hooman Bidgoli, Zheng Zhang
 Working Group: Individual Submissions (none)
This document specifies the extensions to BGP Link State (BGP-LS) to distribute SR P2MP Policies and state. This allows operators to establish a consistent view of the underlying multicast network state, providing an efficient mechanism for the advertisement and synchronization of SR P2MP policies.
 Distribution of Service Metadata in BGP FlowSpec
 
 draft-yi-idr-bgp-fs-edge-service-metadata-02.txt
 Date: 06/05/2024
 Authors: Xinxin Yi, Tao He, Hang Shi, Xiangfeng Ding, Haibo Wang, Zicheng Wang
 Working Group: Individual Submissions (none)
In edge computing, a service may be deployed on multiple instances within one or more sites, called edge service. The edge service is associated with an ANYCAST IP address. Its routes along with service metadata can be collected by a central controller. The controller may process the metadata and distribute the result to ingress routers using BGP FlowSpec. The service metadata can be used by ingress routers to make path selections not only based on the routing cost but also on the running environment of the edge services. This document describes a mechanism to distribute the information of the service routes and related service metadata using BGP FlowSpec.
 CDDL models for some existing RFCs
 
 draft-bormann-cbor-rfc-cddl-models-03.txt
 Date: 27/02/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
A number of CBOR- and JSON-based protocols have been defined before CDDL was standardized or widely used. This short draft records some CDDL definitions for such protocols, which could become part of a library of CDDL definitions available for use in CDDL2 processors. It focuses on CDDL in (almost) published IETF RFCs.
 Broadening the Scope of Encapsulating Security Payload (ESP) Protocol
 
 draft-mrossberg-ipsecme-multiple-sequence-counters-02.txt
 Date: 15/02/2024
 Authors: Michael Rossberg, Steffen Klassert, Michael Pfeiffer
 Working Group: Individual Submissions (none)
There are certain use cases where the Encapusalating Security Payload (ESP) protocol in its current form cannot reach its maximum potential regarding security, features and performance. Although these scenarios are quite different, the shortcomings could be remedied by three measures: Introducing more fine-grained sub-child-SAs, adapting the ESP header and trailer format, and allowing parts of the transport layer header to be unencrypted. These mechanisms are neither completely interdependent, nor are they entirely orthogonal, as the implementation of one measure does influence the integration of another. Although an independent specification and implementation of these mechanisms is possible, it may be worthwhile to consider a combined solution to avoid a combinatorial explosion of optional features. Therefore, this document does not yet propose a specific change to ESP. Instead, explains the relevant scenarios, details possible modifications of the protocol, collects arguments for (and against) these changes, and discusses their implications.
 Using ALTO for exposing Time-Variant Routing information
 
 draft-contreras-tvr-alto-exposure-03.txt
 Date: 27/02/2024
 Authors: Luis Contreras
 Working Group: Individual Submissions (none)
Network operations can require time-based, scheduled changes in nodes, links, adjacencies, etc. All those changes can alter the connectivity in the network in a predictable manner, which is known as Time-Variant Routing (TVR). Existing IETF solutions like ALTO can assist, as an off-path mechanism, on the exposure of such predicted changes to both internal and external applications then anticipating the occurrence of routing changes. This document describes how ALTO helps in that purpose.
 EAT Attestation Results
 
 draft-fv-rats-ear-03.txt
 Date: 21/04/2024
 Authors: Thomas Fossati, Eric Voit, Sergei Trofimov
 Working Group: Individual Submissions (none)
This document defines the EAT Attestation Result (EAR) message format. EAR is used by a verifier to encode the result of the appraisal over an attester's evidence. It embeds an AR4SI's "trustworthiness vector" to present a normalized view of the evaluation results, thus easing the task of defining and computing authorization policies by relying parties. Alongside the trustworthiness vector, EAR provides contextual information bound to the appraisal process. This allows a relying party (or an auditor) to reconstruct the frame of reference in which the trustworthiness vector was originally computed. EAR supports simple devices with one attester as well as composite devices that are made of multiple attesters, allowing the state of each attester to be separately examined. EAR can also accommodate registered and unregistered extensions. It can be serialized and protected using either CWT or JWT.
 IPv6 Site connection to many Carriers
 
 draft-fbnvv-v6ops-site-multihoming-03.txt
 Date: 29/01/2024
 Authors: Nick Buraglio, Klaus Frank, Paolo Nero, Paolo Volpato, Eduard
 Working Group: Individual Submissions (none)
Carrier resilience is a typical business requirement. IPv4 deployments have traditionally solved this challenge through private internal site addressing in combination with separate NAT engines attached to multiple redundant carriers. IPv6 brings support for true end-to-end connectivity on the Internet, and hence NAT is the least desirable option in such deployments. Native IPv6 solutions for carrier resiliency, however, have drawbacks. This document discusses all currently-available options to organize carrier resiliency for a site, their strengths and weaknesses, and provides a history of past IETF efforts approaching the issue. The views presented here are the summary of discussions on the v6ops mailing list and are not just the personal opinion of the authors.
 Flexible Candidate Path Selection of SR Policy
 
 draft-liu-spring-sr-policy-flexible-path-selection-05.txt
 Date: 21/02/2024
 Authors: Yisong Liu, Changwang Lin, Shuping Peng, Gyan Mishra, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document proposes a flexible SR policy candidate path selection method. Based on the real-time resource usage and forwarding quality of candidate paths, the head node can perform dynamic path switching among multiple candidate paths in the SR policy.
 Support of Hostname and Sequencing in YANG Notifications
 
 draft-tgraf-netconf-notif-sequencing-04.txt
 Date: 28/04/2024
 Authors: Thomas Graf, Jean Quilbeuf, Alex Feng
 Working Group: Individual Submissions (none)
This document specifies a new YANG module that augment the NETCONF Event Notification header to support hostname and sequence numbers to identify from which network node and at which time the message was published. This allows the collector to recognize loss, delay and reordering between the publisher and the downstream system storing the message.
 the extensions of BGP-LS to carry security capabilities
 
 draft-chen-idr-bgp-ls-security-capability-03.txt
 Date: 04/03/2024
 Authors: Meiling Chen, Li Su
 Working Group: Individual Submissions (none)
As users' traffic faces more unpredictable attacks during transmission, there are more and more end-users now need high security data transmission guarantee, they need ISPs to provide security protection capabilities on the data forwarding path. Therefore, ISPs need to have real-time awareness of the security capabilities available in the network, then form a security capability map, finally provide security protection for users at the routing level. The goal of this draft is to collect the security capabilities of nodes, which will be one of the factors to form the routing topology, and use the routing programming capabilities to form a secure routing path. The security capability includes healthy information(such as the device software is up-to-date), security service information, device information(such as the manufacturer information of the equipment). The BGP-LS protocol is extended to carry the security capabilities of the node. The controller collects topology information, forms a topology path with security capabilities according to security requirements, and supports SRv6 path sending to execute node forwarding through programming.
 IGP Color-Aware Shortcut
 
 draft-cheng-lsr-igp-shortcut-enhancement-03.txt
 Date: 27/02/2024
 Authors: Weiqiang Cheng, Liyan Gong, Changwang Lin, Mengxiao Chen
 Working Group: Individual Submissions (none)
IGP shortcut mechanism allows calculating routes to forward traffic over Traffic Engineering tunnels. This document describes the enhancement of IGP shortcut which can steer routes onto TE-tunnels based on colors.
 Network Proactive Defense based on Source Address Validation
 
 draft-cheng-savnet-proactive-defense-network-02.txt
 Date: 14/04/2024
 Authors: Weiqiang Cheng, Nan Geng, Dan Li, 1211176911910469110103
 Working Group: Individual Submissions (none)
Source address validation (SAV) helps routers check the validity of packets. Networks can use the SAV capability to enhance threat awareness. This document proposes proactive defense network where routers can directly identify threats through SAV. The proactive threat awareness feature is helpful for satisfying the threat awareness requirement of ISPs.
 UMR application in Ethernet VPN(EVPN)
 
 draft-fu-bess-evpn-umr-application-01.txt
 Date: 17/11/2023
 Authors: Zheng Fu, Tong Zhu, Haibo Wang, Jian Dai, Dawei Wang
 Working Group: Individual Submissions (none)
This document describes an application scenario that how unknown MAC- route(UMR) is used in the EVPN network. In particular, this document describes how MAC address route and UMR route are advertised on DC's GW or NVE. This document also describes the soloution that MAC mobility issue due to the lack of advertisement of specific MAC routes. However, some incremental work is required, which will be covered in a separate document.
 dCBOR: A Deterministic CBOR Application Profile
 
 draft-mcnally-deterministic-cbor-09.txt
 Date: 10/04/2024
 Authors: Wolf McNally, Christopher Allen, Carsten Bormann
 Working Group: Individual Submissions (none)
The purpose of determinism is to ensure that semantically equivalent data items are encoded into identical byte streams. CBOR (RFC 8949) defines "Deterministically Encoded CBOR" in its Section 4.2, but leaves some important choices up to the application developer. The CBOR Common Deterministic Encoding (CDE) Internet Draft builds on this by specifying a baseline for application profiles that wish to implement deterministic encoding with CBOR. The present document provides an application profile "dCBOR" that can be used to help achieve interoperable deterministic encoding based on CDE for a variety of applications wishing an even narrower and clearly defined set of choices.
 Deep Audio Redundancy (DRED) Extension for the Opus Codec
 
 draft-valin-opus-dred-05.txt
 Date: 23/02/2024
 Authors: Jean-Marc Valin, Jan Buethe
 Working Group: Individual Submissions (none)
This document proposes a mechanism for embedding very low bitrate deep audio redundancy (DRED) within the Opus codec (RFC6716) bitstream.
 A YANG Data Model for the Virtual Router Redundancy Protocol (VRRP)
 
 draft-acee-rtgwg-vrrp-rfc8347bis-03.txt
 Date: 01/03/2024
 Authors: Acee Lindem, Xufeng Liu, Athanasios Kyparlis, Ravi Parikh, Mingui Zhang
 Working Group: Individual Submissions (none)
This document describes a data model for the Virtual Router Redundancy Protocol (VRRP). Both versions 2 and 3 of VRRP are covered. The VRRP terminology has been updated conform to inclusive language guidelines for IETF technologies. The IETF has designated National Institute of Standards and Technology (NIST) "Guidance for NIST Staff on Using Inclusive Language in Documentary Standards" for its inclusive language guidelines. This document obsoletes RFC 8347.
 Simplified MVPN for BIER and IR
 
 draft-duan-bess-simplified-mvpn-for-bier-and-ir-02.txt
 Date: 04/03/2024
 Authors: Fanghong Duan, Siyu Chen
 Working Group: Individual Submissions (none)
Per RFC6513 and RFC6514, seven MCAST-VPN NLRIs and relevant procedures are defined to build multicast forwarding tree over the service provider backbone. RFC8556 introduces that MVPN can use BIER as PMSI tunnel to perform optimal multicast forwarding. However, the complicated NLRI exchange and the switching from I-PMSI to S-PMSI tunnel is not necessary for BIER and IR tunnel. The architectural advantages of BIER and IR cannot be fully utilized. Therefore, a new simplified MVPN for BIER and IR is proposed to substitute current NLRIs exchange and procedures. This document would like to discuss the value of the MVPN simplification and provide suggestive solution.
 SR Policy for enhanced DetNet
 
 draft-zhang-idr-sr-policy-enhanced-detnet-02.txt
 Date: 29/02/2024
 Authors: Li Zhang, Xuesong Geng, Zhenbin Li
 Working Group: Individual Submissions (none)
SR Policy is a set of candidate SR paths consisting of one or more segment lists and necessary path attributes. It enables instantiation of an ordered list of segments with a specific intent for traffic steering. DetNet provides the capability to carry specified unicast or multicast data flows with extremely low data loss rates and bounded end-to-end latency within a network domain. This document defines the SR policy enhancement to carry the Bounded Latency Information with a candidate path of SR policy. So that BLI behavior can be enabled automatically when the SR Policy is applied.
 The DNSCrypt protocol
 
 draft-denis-dprive-dnscrypt-03.txt
 Date: 07/02/2024
 Authors: Frank Denis
 Working Group: Individual Submissions (none)
The DNSCrypt protocol is designed to encrypt and authenticate DNS traffic between clients and resolvers. This document specifies the protocol and its implementation. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-denis-dprive-dnscrypt/. Source for this draft and an issue tracker can be found at https://github.com/DNSCrypt/dnscrypt-protocol.
 BGP extensions for BIER-TE
 
 draft-chen-bier-idr-bier-te-bgp-02.txt
 Date: 18/01/2024
 Authors: Ran Chen, BenChong Xu, Zheng Zhang
 Working Group: Individual Submissions (none)
Bit Index Explicit Replication (BIER)-TE shares architecture and packet formats with BIER as described in [RFC8279]. BIER-TE forwards and replicates packets based on a BitString in the packet header, but every BitPosition of the BitString of a BIER-TE packet indicates one or more adjacencies as described in [RFC8279]. This document describes BGP extensions for advertising the BIER-TE specific information.
 Source IPv6 Address Programmability
 
 draft-cheng-6man-source-address-programmability-02.txt
 Date: 03/03/2024
 Authors: Weiqiang Cheng, Liyan Gong, Changwang Lin, Hao Li
 Working Group: Individual Submissions (none)
IPv6-based tunneling technologies, such as SRv6, have been deployed by provider on transport networks to provide users with services such as VPN and SD-WAN. After the service traffic enters the provider's transport network, it will be encapsulated by tunnel (SRv6 encapsulation). In order to better meet the SLA requirements of users, some technologies need to carry relevant information along with the flow to guide the processing of packets during forwarding. This document discusses the programmability of IPv6 source addresses to carry the necessary flow information
 IETF Meeting Venue Requirements Review
 
 draft-daley-gendispatch-venue-requirements-02.txt
 Date: 29/02/2024
 Authors: Jay Daley, Sean Turner
 Working Group: Individual Submissions (none)
Following a review of the IETF meeting venue requirements, this document proposes updates to RFC 8718 “IETF Plenary Meeting Venue Selection Process”, clarifies how the IETF Administration Support Activity (IASA) should interpret some elements of RFC 8718, and proposes a replacement exploratory meeting process, thereby updating RFC 8719 "High-Level Guidance for the Meeting Policy of the IETF".
 Post-Stack MPLS Network Action (MNA) Solution
 
 draft-jags-mpls-ps-mna-hdr-02.txt
 Date: 01/05/2024
 Authors: Jaganbabu Rajamanickam, Rakesh Gandhi, Royi Zigler, Tony Li, Jie Dong
 Working Group: Individual Submissions (none)
This document defines the Post-Stack MPLS Network Action (MNA) solution for carrying Network Actions and Ancillary Data after the MPLS label stack based on In-Stack MNA solution defined in draft- ietf-mpls-mna-hdr. MPLS Network Actions can be used to influence packet forwarding decisions, carry additional OAM information in the MPLS packet or perform user-defined operations. This document addresses the MNA requirements specified in draft-ietf-mpls-mna- requirements. This document follows the MNA framework specified in draft-ietf-mpls-mna-fwk.
 Applicability of Abstraction and Control
 
 draft-poidt-ccamp-actn-poi-pluggable-03.txt
 Date: 12/02/2024
 Authors: Gabriele Galimberti, Jean-Francois Bouquier, Ori Gerstel, Brent Foster, Daniele Ceccarelli, Sergio Belotti, Oscar de Dios
 Working Group: Individual Submissions (none)
This document extends the I-D.draft-ietf-teas-actn-poi-applicability to the use case where the DWDM optical coherent interface is equipped on the Packet device. The document analyzes several control architectures and identifies the YANG data models being defined by the IETF to support this deployment architectures and specific scenarios relevant for Service Providers. Existing IETF protocols and data models are identified for each multi-layer (packet over optical) scenario with a specific focus on the MPI (Multi-Domain Service Coordinator to Provisioning Network Controllers Interface)in the ACTN architecture.
 EVPN Inter-Domain Option-B Solution
 
 draft-rabadan-bess-evpn-inter-domain-opt-b-03.txt
 Date: 04/03/2024
 Authors: Jorge Rabadan, Senthil Sathappan, Ali Sajassi, Wen Lin
 Working Group: Individual Submissions (none)
An EVPN Inter-Domain interconnect solution is required if two or more sites of the same Ethernet Virtual Private Network (EVPN) are attached to different IGP domains or Autonomous Systems (AS), and they need to communicate. The Inter-Domain Option-B connectivity model is one of the most popular solutions for such EVPN connectivity. While multiple documents refer to this type of interconnect solution and specify different aspects of it, there is no document that summarizes the impact of the Inter-Domain Option-B connectivity in the EVPN procedures. This document does not specify new procedures but analyses the EVPN procedures in an Inter-Domain Option-B network and suggests potential solutions for the described issues. Those solutions are based on either other specifications or based on local implementations that do not modify the end-to-end EVPN control plane.
 Merkle Tree Certificates for TLS
 
 draft-davidben-tls-merkle-tree-certs-02.txt
 Date: 04/03/2024
 Authors: David Benjamin, Devon O'Brien, Bas Westerbaan
 Working Group: Individual Submissions (none)
This document describes Merkle Tree certificates, a new certificate type for use with TLS. A relying party that regularly fetches information from a transparency service can use this certificate type as a size optimization over more conventional mechanisms with post- quantum signatures. Merkle Tree certificates integrate the roles of X.509 and Certificate Transparency, achieving comparable security properties with a smaller message size, at the cost of more limited applicability.
 BIER Flow Overlay with Anycast Egress Protection
 
 draft-zzhang-bier-egress-protection-overlay-01.txt
 Date: 06/02/2024
 Authors: Zhaohui Zhang, IJsbrand Wijnands, Zheng Zhang, Mankamana Mishra, Huaimo Chen
 Working Group: Individual Submissions (none)
This document discusses considerations and specifies procedures for multicast flow overlay when BIER Anycast is used for egress protection in the context of MVPN and EVPN. Future revisions will cover other flow overlay protocols like PIM/MLD/mLDP.
 SID as source address in SRv6
 
 draft-yang-spring-sid-as-source-address-03.txt
 Date: 18/01/2024
 Authors: Feng Yang, Changwang Lin
 Working Group: Individual Submissions (none)
In SRv6 network, the SRv6 packets usually use loopback address as source address. However, when there is symmetric traffic requirement for bidirectional flow, or there is requirement for traffic source validation, using loopback address as source address is not sufficient. This document proposes using SID as source address for SRv6 traffic, also identifies solution for several use cases.
 MoQ relay for support of deadline-aware media transport
 
 draft-ma-moq-relay-for-deadline-02.txt
 Date: 03/03/2024
 Authors: Yong Cui, Chuan Ma, Yixin Liao, Hang Shi
 Working Group: Individual Submissions (none)
This draft specifies the behavior of MoQ relays for delivering media before the deadline to decrease end-to-end latency and save transport costs in media transmission. To achieve this, the draft introduces deadline-aware actions prioritizing media streams with earlier deadlines, ensuring timely transmission while minimizing costs.
 SR-MPLS FRR Extension
 
 draft-chen-spring-srmpls-frr-ex-04.txt
 Date: 02/04/2024
 Authors: Huaimo Chen, Zhibo Hu, Aijun Wang, Yisong Liu, Gyan Mishra
 Working Group: Individual Submissions (none)
The current SR FRR such as TI-LFA provides fast re-route protection for the failure of a node on an SR-MPLS path by the neighbor upstream node as point of local repair (PLR) of the failed node. However, once the IGP converges, the SR FRR is no longer sufficient to forward traffic of the path around the failure, since the non-neighbor upstream node of the failed node will no longer have a route to the failed node. This document describes a simple mechanism to extend the fast re-route protection for the failure on an SR-MPLS path after the IGP converges. The mechanism protects the node SID, adjacency SID and binding SID of the failed node on the path.
 Security Considerations for Tenant ID and Similar Fields
 
 draft-eastlake-secdispatch-tenantid-consid-04.txt
 Date: 14/04/2024
 Authors: Donald Eastlake, Nancy Cam-Winget, Mohammed Umair
 Working Group: Individual Submissions (none)
Many protocols provide for header fields to be added to a packet on ingress to a network domain and removed on egress from that domain. Examples of such fields are Tenant ID for multi-tenant networks, ingress port ID and/or type, and other identity or handling directive fields. These fields mean that a packet may be accompanied by supplemental information as it transits the network domain that would not be present with the packet or not be visible if it were simply forwarded in a traditional manner. A particular concern is that these fields may harm privacy by identifying, in greater detail, the packet source and intended traffic handling. This document provides Security Considerations for the inclusion of such fields with a packet.
 A YANG Data Model for Optical Resource Performance Monitoring
 
 draft-yu-ccamp-optical-resource-pm-yang-03.txt
 Date: 04/03/2024
 Authors: Chaode Yu, Fabio Peruzzini, Zheng Yanlei, Italo Busi, Aihua Guo, Victor Lopez, XingZhao
 Working Group: Individual Submissions (none)
This document defines a YANG data model for performance Monitoring in optical networks which provides the functionalities of performance monitoring task management, TCA (Threshold Crossing Alert) configuration and current or historic performance data retrieval. This data model should be used in the northbound of PNC.
 Considerations for SRv6 across Untrusted Domain
 
 draft-lin-spring-srv6-across-untrusted-domain-02.txt
 Date: 22/12/2023
 Authors: Changwang Lin, Ce Zhou, Mengxiao Chen
 Working Group: Individual Submissions (none)
Segment Routing operates within a trusted domain. There are some scenarios in which the whole SRv6 domain is separated by untrusted domain and SRv6 packets need to traverse it. This document describes some use cases of SRv6 across untrusted domain, and proposes a solution using IPSec technology.
 MNA for Performance Measurement with Alternate Marking Method
 
 draft-cx-mpls-mna-inband-pm-04.txt
 Date: 18/04/2024
 Authors: Weiqiang Cheng, Xiao Min, Rakesh Gandhi, Greg Mirsky
 Working Group: Individual Submissions (none)
MPLS Network Action (MNA) is used to indicate action for Label Switched Paths (LSPs) and/or MPLS packets and to transfer data needed for the action. This document defines MNA encoding for MPLS performance measurement with alternate marking method, which performs flow-based packet loss, delay, and jitter measurements on MPLS live traffic.
 Network Management Intent -One of IBN Use Cases
 
 draft-chen-nmrg-ibn-management-01.txt
 Date: 03/03/2024
 Authors: Danyang Chen, Kehan Yao, Chungang Yang, Xinru Mi, Ying Ouyang
 Working Group: Individual Submissions (none)
Full life cycle network management will be a key feature of the future communication networks. Meanwhile, the complexity of the network management should be reduced and the network expects to be managed in a fully automated manner with humans out of the loop. In this document, we propose an use case of intent based network management to achieve more flexible , convenient, and efficient network management. In this use case, we propose an architecture and attempt to illustrate the five levels of achieving full autonomous network management.
 Selective Synchronization for RPKI to Router Protocol
 
 draft-geng-sidrops-rtr-selective-sync-02.txt
 Date: 03/03/2024
 Authors: Nan Geng, Shunwan Zhuang, Mingqing(Michael) Huang
 Working Group: Individual Submissions (none)
The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid some unnecessary synchronizations. The router can obtain only the data that it really needs, and it does not need to save the data that are not needed.
 Design analysis of methods for distributing the computing metric
 
 draft-shi-cats-analysis-of-metric-distribution-02.txt
 Date: 01/03/2024
 Authors: Hang Shi, Zongpeng Du, Xinxin Yi, Tianle Yang
 Working Group: Individual Submissions (none)
This document analyses different methods for distributing the computing metrics from service instances to the ingress router. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the Computing-Aware Traffic Steering Working Group mailing list (cats@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/cats/. Source for this draft and an issue tracker can be found at https://github.com/VMatrix1900/draft-cats-method-analysis.
 BMP Loc-RIB: Peer address
 
 draft-francois-grow-bmp-loc-peer-03.txt
 Date: 04/03/2024
 Authors: Pierre Francois, Maxence Younsi, Paolo Lucente
 Working Group: Individual Submissions (none)
BMP Loc-RIB lets a BMP publisher set the Peer Address value of a path information to zero. This document introduces the option to communicate the actual peer from which a path was received when advertising that path with BMP Loc-RIB.
 Structured Connection ID Carrying Metadata
 
 draft-shi-quic-structured-connection-id-02.txt
 Date: 04/03/2024
 Authors: Hang Shi
 Working Group: Individual Submissions (none)
This document describes a mechanism to carry the metadata in the QUIC connection ID so that the intermediary can perform optimization.
 BGP Extensions for Source Address Validation Networks (BGP SAVNET)
 
 draft-geng-idr-bgp-savnet-03.txt
 Date: 22/11/2023
 Authors: Nan Geng, Zhenbin Li, Zhen Tan, Mingxing Liu, Dan Li, Fang Gao
 Working Group: Individual Submissions (none)
Many source address validation (SAV) mechanisms have been proposed for preventing source address spoofing. However, existing SAV mechanisms are faced with the problems of inaccurate validation or high operational overhead in some scenarios. This document proposes BGP SAVNET by extending BGP protocol for SAV. This protocol can propagate SAV-related information through BGP messages. The propagated information will help edge/border routers automatically generate accurate SAV rules. These rules construct a validation boundary for the network and help check the validity of source addresses of arrival data packets.
 BGP SPF Extensions for Intra-domain SAVNET
 
 draft-lin-savnet-intra-domain-bgp-spf-extensions-03.txt
 Date: 22/04/2024
 Authors: Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document describes the BGP SPF protocol extension that is required for Source Address Validation in Intra-domain. By extending BGP SPF and adding the BGP SPF protocol calculation procedure, the SAV information can be accurately calculated to realize the source address verification.
 IGP Extensions for Link MTU
 
 draft-hu-lsr-igp-link-mtu-02.txt
 Date: 27/01/2024
 Authors: Zhibo Hu, Shuping Peng, Xing Xi
 Working Group: Individual Submissions (none)
Segment routing (SR) leverages the source routing mechanism. It allows for a flexible definition of end-to-end paths within IGP topologies by encoding paths as sequences of topological sub-paths which are called segments. These segments are advertised by the link-state routing protocols (IS-IS and OSPF). Unlike the MPLS, SR does not have the specific path construction signaling so that it cannot support the Path MTU. This draft provides the necessary IS-IS and OSPF extensions about the Path MTU that need to be used on SR. Here, the term "OSPF" means both OSPFv2 and OSPFv3.
 One Administrative Domain using BGP
 
 draft-uttaro-idr-bgp-oad-03.txt
 Date: 10/01/2024
 Authors: Jim Uttaro, Alvaro Retana, Pradosh Mohapatra, Keyur Patel, Bin Wen
 Working Group: Individual Submissions (none)
This document defines a new External BGP (EBGP) peering type known as EBGP-OAD, which is used between two EBGP peers that belong to One Administrative Domain (OAD).
 IS-IS Extension for Big TLV
 
 draft-chen-lsr-isis-big-tlv-03.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Bruno Decraene, Gyan Mishra, Aijun Wang, Zhenqiang Li, Yanhe Fan, Xufeng Liu, Lei Liu, Donald Eastlake
 Working Group: Individual Submissions (none)
The IS-IS routing protocol uses TLV (Type-Length-Value) encoding in a variety of protocol messages. The original IS-IS TLV definition allows for 255 octets of value in maximum. This document proposes a backward compatible IS-IS extension for encoding the TLV whose value is bigger than 255 octets.
 Service Interworking between SRv6
 
 draft-cheng-spring-service-interworking-srv6-02.txt
 Date: 22/04/2024
 Authors: Weiqiang Cheng, Changwang Lin
 Working Group: Individual Submissions (none)
When operators provide services through SRv6, such as L3VPN and L2VPN, there may be cross-domain scenarios of multiple ASs, or multiple admin domain scenarios within the same AS. This document describes how to implement interworking of services for such scenarios.
 Realization of Composite IETF Network Slices
 
 draft-li-teas-composite-network-slices-02.txt
 Date: 04/03/2024
 Authors: Zhenbin Li, Jie Dong, Ran Pang, Yongqing Zhu, Luis Contreras
 Working Group: Individual Submissions (none)
A network slice offers connectivity services to a network slice customer with specific Service Level Objectives (SLOs) and Service Level Expectations (SLEs) over a common underlay network. RFC XXXX describes a framework for network slices built in networks that use IETF technologies. As part of that framework, the Network Resource Partition (NRP) is introduced as a collection of network resources that are allocated from the underlay network to carry a specific set of network slice service traffic and meet specific SLOs and SLEs. In some network scenarios, network slices using IETF technologies may span multiple network domains, and they may be composed hierarchically, which means a network slice itself may be further sliced. In the context of 5G, a 5G end-to-end network slice consists of three different types of network technology segments: Radio Access Network (RAN), Transport Network (TN) and Core Network (CN). The transport segments of the 5G end-to-end network slice can be provided using network slices described in RFC XXXX. This document first describes the possible use cases of composite network slices built in networks that use IETF network technologies, then it provides considerations about the realization of composite network slices. For the multi-domain network slices, an Inter-Domain Network Resource Partition Identifier (Inter-domain NRP ID) may be introduced. For hierarchical network slices, the structure of the NRP ID is discussed. And for the interaction between IETF network slices with 5G network slices, the identifiers of the 5G network slices may be introduced into IETF networks. These network slice- related identifiers may be used in the data plane, control plane and management plane of the network for the instantiation and management of composite network slices. This document also describes the management considerations of composite network slices.
 The Proximate Location Claim
 
 draft-mandyam-rats-proxlocclaim-01.txt
 Date: 17/01/2024
 Authors: Giridhar Mandyam
 Working Group: Individual Submissions (none)
The Entity Attestation Token (EAT) is an extensible attestation version of a CBOR Web Token (CWT). EAT defines a location claim, but does not define a proximate location claim. This document proposes a claim in which an attester can relay detected relative location of a target.
 Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) for Packet Optical Integration (POI) service assurance
 
 draft-poidt-teas-actn-poi-assurance-02.txt
 Date: 04/03/2024
 Authors: Italo Busi, Jean-Francois Bouquier, Fabio Peruzzini, Paolo Volpato, Prasenjit Manna
 Working Group: Individual Submissions (none)
This document extends the analysis of the applicability of Abstraction and Control of TE Networks (ACTN) architecture to Packet Optical Integration (POI), provided in RFC YYYY, to cover multi-layer service assurance scenarios, for end-to-end customer L2VPN or L3VPN connectivity services setup over underlying transport optical paths, with specific Service Level Agreement (SLA) requirements. EDITORS NOTE: Replace RFC YYYY with the RFC number of draft-ietf- teas-actn-poi-applicability once it has been published. Existing IETF protocols and data models are identified for each multi-layer (packet over optical) service assurance scenario with a specific focus on the MPI (Multi-Domain Service Coordinator to Provisioning Network Controllers Interface) in the ACTN architecture.
 TLD Zone Pipeline: Requirements And Design Principles
 
 draft-johani-tld-zone-pipeline-02.txt
 Date: 02/05/2024
 Authors: Johan Stenstam, Jakob Schlyter
 Working Group: Individual Submissions (none)
Today most TLD registries publish DNSSEC signed zones. The sequence of steps from generating the unsigned zone, via DNSSEC signing and various types of verification is referred to as the "zone pipeline". The robustness and correctness of the zone pipeline is of crucial importance and the zone pipeline is one of the most critical parts of the operations of a TLD registry. The goal of this document is to describe the requirements that the .SE Registry choose in preparation for the implementation of a new zone pipeline. The document also describes some of the design consequences that follow from the requirements. Hence this document is intended to work as a guide for understanding the actual implementation, which is planned to be released as open source. TO BE REMOVED: This document is being collaborated on in Github at: https://github.com/johanix/draft-johani-tld-zone-pipeline (https://github.com/johanix/draft-johani-tld-zone-pipeline). The most recent working version of the document, open issues, etc. should all be available there. The authors (gratefully) accept pull requests.
 Auto Edge Protection
 
 draft-hegde-spring-auto-edge-protection-02.txt
 Date: 09/02/2024
 Authors: Shraddha Hegde, Krzysztof Szarkowicz, Zhaohui Zhang, Bruno Decraene, Dan Voyer, Luay Jalil
 Working Group: Individual Submissions (none)
This document specifies procedures to automatically establish context based forwarding for providing fast reroute during egress node and egress link failures. It describes how to detect multi-homed services and establish context for forwarding. It also defines procedures to avoid conflicts among routers while establishing context.
 Partially Blind RSA Signatures
 
 draft-amjad-cfrg-partially-blind-rsa-02.txt
 Date: 10/01/2024
 Authors: Ghous Amjad, Scott Hendrickson, Christopher Wood, Kevin Yeo
 Working Group: Individual Submissions (none)
This document specifies a blind RSA signature protocol that supports public metadata. It is an extension to the RSABSSA protocol recently specified by the CFRG. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the Crypto Forum Research Group mailing list (cfrg@ietf.org), which is archived at https://mailarchive.ietf.org/arch/search/?email_list=cfrg. Source for this draft and an issue tracker can be found at https://github.com/chris-wood/draft-amjad-cfrg-partially-blind-rsa.
 EVPN First Hop Security
 
 draft-sajassi-bess-evpn-first-hop-security-02.txt
 Date: 22/02/2024
 Authors: Ali Sajassi, Lukas Krattiger, Krishnaswamy Ananthamurthy, Jorge Rabadan, Wen Lin
 Working Group: Individual Submissions (none)
The Dynamic Host Configuration Protocol (DHCP) snoop database stores valid IPv4-to-MAC and IPv6-to-MAC bindings by snooping on DHCP messages. These bindings are used by security functions like Dynamic Address Resolution Protocol Inspection (DAI), Neighbor Discovery Inspection (NDI), IPv4 Source Guard, and IPv6 Source Guard to safeguard against traffic received with a spoofed address. These functions are collectively referred to as First Hop Security (FHS). This document proposes BGP extensions and new procedures for Ethernet VPN (EVPN) will distribute and synchronize the DHCP snoop database to support FHS. Such synchronization is needed to support EVPN host mobility and multi-homing.
 The MASQUE Proxy
 
 draft-schinazi-masque-proxy-02.txt
 Date: 28/02/2024
 Authors: David Schinazi
 Working Group: Individual Submissions (none)
MASQUE (Multiplexed Application Substrate over QUIC Encryption) is a set of protocols and extensions to HTTP that allow proxying all kinds of Internet traffic over HTTP. This document defines the concept of a "MASQUE Proxy", an Internet-accessible node that can relay client traffic in order to provide privacy guarantees.
 Sustainability Insights
 
 draft-almprs-sustainability-insights-03.txt
 Date: 07/05/2024
 Authors: Per Andersson, Jan Lindblad, Snezana Mitrovic, Marisol Palmero, Esther Roure, Gonzalo Salgueiro, Stephan Emile
 Working Group: Individual Submissions (none)
Internet and the ICT industry is consuming a sizable portion of the electricity available in the world today, and the fraction has been growing significantly over time. Data shows that the power draw of internet is relatively constant over the day and week, even though the “load” and delivered services vary greatly over this time span. This seems to suggest that there is room for optimizations. This document provides some definitions, some proposed principles for a solution, and then paints a picture of what a solution based on existing standards and some current internet drafts might look like. The first step of an optimization loop is to measure. This document proposes a mechanism to collect energy related telemetry data from the extremely diverse set of devices found in networks today, without necessarily updating the network elements. Once the collection is done, it’s also very relevant to be able to control the devices, and turn them into low power modes when the service demand is lower.
 Low Overhead Media Container
 
 draft-mzanaty-moq-loc-03.txt
 Date: 04/03/2024
 Authors: Mo Zanaty, Suhas Nandakumar, Peter Thatcher
 Working Group: Individual Submissions (none)
This specification describes a media container format for encoded and encrypted audio and video media data to be used primarily for interactive Media over QUIC transport (MOQ), with the goal of it being a low-overhead format. It also defines the LOC Streaming Format for the MOQ Common Catalog format for publishers to annouce and describe their LOC tracks and for subscribers to consume them.
 Emergency Communication Services over Wi-Fi Access Networks
 
 draft-gundavelli-dispatch-e911-wifi-02.txt
 Date: 11/01/2024
 Authors: Sri Gundavelli, Mark Grayson
 Working Group: Individual Submissions (none)
This document introduces an approach to enable emergency services over Wi-Fi access networks. These services encompass emergency services such as 911 in North America, 112 in the European Union, and equivalent emergency services in other regulatory domains. The proposed approach aims to provide a comprehensive solution for supporting emergency communication across different regions and regulatory frameworks. Leveraging the legal framework and infrastructure of the OpenRoaming federation, this proposal aims to extend emergency calling capabilities to the vast number of OpenRoaming Wi-Fi hotspots that have already been deployed. The approach addresses critical challenges related to emergency calling, including discovery and authentication procedures for accessing networks that support emergency services, emergency access credentials, the configuration of emergency voice services, accurate location determination of the emergency caller, and call spofing. By providing a comprehensive solution, this proposal ensures that emergency communication services can be seamlessly and effectively supported within the IEEE 802.11-based Wi-Fi ecosystem leveraging Passpoint Profiles.
 Linearized Matrix
 
 draft-ralston-mimi-linearized-matrix-04.txt
 Date: 10/01/2024
 Authors: Travis Ralston, Matthew Hodgson
 Working Group: Individual Submissions (none)
This document specifies Linearized Matrix (LM). LM is an extensible protocol for interoperability between messaging providers, using Matrix's (matrix.org (https://matrix.org)) decentralized room model. LM simplifies the Directed Acyclic Graph (DAG) persistence of Matrix while maintaining compatibility with non-linearized servers within a room. It does this by using a doubly-linked list of events/messages per room with hub and spoke fanout. LM's extensibility enables a wide range of transport protocol and end-to-end encryption possibilities. This document uses Matrix's room access control semantics supported by Messaging Layer Security (MLS), transported via HTTPS and JSON. The details of which server- to-server transport to use and what is put over MLS are replaceable. The threat model of LM does not place trust in a central owning server for each conversation. Instead, it defines a hub server which handles maintaining linearized room history for other servers in the room. This model permits transparent interconnection between LM servers and Matrix servers, in the same room.
 Trusted Domain SRv6
 
 draft-raviolli-intarea-trusted-domain-srv6-03.txt
 Date: 09/04/2024
 Authors: Andrew Alston, Tom Hill, Tony Przygienda, Luay Jalil
 Working Group: Individual Submissions (none)
SRv6 as designed has evoked interest from various parties, though its deployment is being limited, amongst other things, by known security problems in its architecture. This document specifies a standard way to create a solution that closes some of the major security concerns, while retaining the tenants of the SRv6 protocol.
 Delegated Credentials to Host Encrypted DNS Forwarders on CPEs
 
 draft-reddy-add-delegated-credentials-03.txt
 Date: 01/12/2023
 Authors: Tirumaleswar Reddy.K, Mohamed Boucadair, Dan Wing, Shashank Jain
 Working Group: Individual Submissions (none)
An encrypted DNS server is authenticated by a certificate signed by a Certificate Authority (CA). However, for typical encrypted DNS server deployments on Customer Premise Equipment (CPEs), the signature cannot be obtained or requires excessive interactions with a Certificate Authority. This document explores the use of TLS delegated credentials for a DNS server deployed on a CPE. This approach is meant to ease operating DNS forwarders in CPEs while allowing to make use of encrypted DNS capabilities.
 Policy experts are IETF stakeholders
 
 draft-hoffmann-gendispatch-policy-stakeholders-03.txt
 Date: 10/01/2024
 Authors: Stacie Hoffmann, Marek Blachut
 Working Group: Individual Submissions (none)
The IETF's work has significance for communities concerned with societal, economic, and political outcomes, though barriers to engagement with the IETF exist for non-technical experts from these communities. This informational document introduces a problem statement and gap analysis of existing initiatives related to policy expert engagement in the IETF. It aims to be a resource for anyone interested in working to enable policy expert engagement in IETF standardisation.
 Content Delivery Network Interconnection (CDNI) Named Footprints
 
 draft-arolovitch-cdni-named-footprints-01.txt
 Date: 04/03/2024
 Authors: Alan Arolovitch
 Working Group: Individual Submissions (none)
Open Caching architecture is a use case of Content Delivery Networks Interconnection (CDNI) in which the commercial Content Delivery Network (CDN) is the upstream CDN (uCDN) and the ISP caching layer serves as the downstream CDN (dCDN). This document extends the Footprint & Capabilities Advertisement Interface (FCI) defined in RFC8008, to allow advertising of named footprint objects, that can be referenced in a consistent manner from Metadata Interface (MI), also defined in RFC8006, as well as from the FCI itself as well as additional interfaces in the Open Caching architecture. This document also supplements the CDNI Metadata Footprint Types defined in RFC8006 and modifies the CDNI operation as described in RFC7336.
 Aircraft to Anything AdHoc Broadcasts and Session
 
 draft-moskowitz-drip-a2x-adhoc-session-04.txt
 Date: 25/04/2024
 Authors: Robert Moskowitz, Stuart Card, Andrei Gurtov
 Working Group: Individual Submissions (none)
Aircraft-to-anything (A2X) communications are often single broadcast messages that to be trustable, need to be signed with expensive (in cpu and payload size) asymmetric cryptography. There are also frequent cases of extended exchanges between two devices where trust can be maintained via a lower cost symmetric key protect flow. This document shows both how to secure A2X broadcast messages with DRIP Entity Tags (DET) and DRIP Endorsement objects and to leverage these to create an AdHoc session key for just such a communication flow. There is also provision for DETs within X.509 certificates, encoded in c509, as an alternative DET trust model.
 Efficient Air-Ground Communications
 
 draft-moskowitz-drip-efficient-a2g-comm-02.txt
 Date: 26/03/2024
 Authors: Robert Moskowitz, Stuart Card, Andrei Gurtov
 Working Group: Individual Submissions (none)
This document defines protocols to provide efficient air-ground communications without associated need for aircraft to maintain stateful connection to any tower infrastructure. Instead, a secure source-routed ground infrastructure will not only provide the needed routing intelligence, but also reliable packet delivery through inclusion of Automatic Repeat reQuest (ARQ) and Forward Error Correction (FEC) protocols to address both reliable wireless packet delivery, and assured terrestrial packet delivery.
 Leveraging DNS in Digital Trust: Credential Exchanges and Trust Registries
 
 draft-latour-dns-and-digital-trust-02.txt
 Date: 11/04/2024
 Authors: Jesse Carter, Jacques Latour, Mathieu Glaude
 Working Group: Individual Submissions (none)
This memo describes an architecture for trust registry membership association and verification using Decentralized Identifiers (DIDs), trust registries, and the DNS. This architecture provides a verifier with a simple process by which to determine and verify an issuer's membership in a trust registry.
 Green Challenges in Computing-Aware Traffic Steering (CATS)
 
 draft-wang-cats-green-challenges-03.txt
 Date: 04/03/2024
 Authors: Jing Wang, Yuexia Fu, Cheng Li
 Working Group: Individual Submissions (none)
As mobile edge computing networks sink computing tasks from cloud data centers to the edge of the network, tasks need to be processed by computing resources close to the user side. Therefore, CATS was raised. Reducing carbon footprint is a major challenge of our time. Networks are the main enablers of carbon reductions. The introduction of computing dimension in CATS makes it insufficient to consider the energy saving of network dimension in the past, so the green for CATS based on network and computing combination is worth exploring. This document outlines a series of challenges and associated research to explore ways to reduce carbon footprint and reduce network energy based on CATS.
 OSPF Adjacency Suppression
 
 draft-cheng-lsr-ospf-adjacency-suppress-02.txt
 Date: 17/03/2024
 Authors: Weiqiang Cheng, Liyan Gong, Changwang Lin, Mengxiao Chen
 Working Group: Individual Submissions (none)
This document describes a mechanism for a router to instructs its neighbors to suppress advertising the adjacency to it until link- state database synchronization and LSA reoriginating are complete. This minimizes transient routing disruption when a router restarts from unplanned outages.
 X25519Kyber768Draft00 hybrid post-quantum KEM for HPKE
 
 draft-westerbaan-cfrg-hpke-xyber768d00-03.txt
 Date: 14/05/2024
 Authors: Bas Westerbaan, Christopher Wood
 Working Group: Individual Submissions (none)
This memo defines X25519Kyber768Draft00, a hybrid post-quantum KEM, for HPKE (RFC9180). This KEM does not support the authenticated modes of HPKE.
 Transport of Incident Detection Message Exchange Format version 2 (IDMEFv2) Messages over HTTPS
 
 draft-lehmann-idmefv2-https-transport-02.txt
 Date: 07/04/2024
 Authors: Gilles Lehmann
 Working Group: Individual Submissions (none)
The Incident Detection Message Exchange Format version 2 (IDMEFv2) defines a date representation for security incidents detected on cyber and/or physical infrastructures. The format is agnostic so it can be used in standalone or combined cyber (SIEM), physical (PSIM) and availability (NMS) monitoring systems. IDMEFv2 can also be used to represent man made or natural hazards threats. IDMEFv2 improves situational awareness by facilitating correlation of multiple types of events using the same base format thus enabling efficient detection of complex and combined cyber and physical attacks and incidents. This document defines a way to transport IDMEFv2 Alerts over HTTPs. If approved this document would obsolete RFC4767.
 LISP Multicast Overlay Group to Underlay RLOC Mappings
 
 draft-vdas-lisp-group-mapping-03.txt
 Date: 03/05/2024
 Authors: Vengada Govindan, Dino Farinacci, Aswin Kuppusami, Stig Venaas
 Working Group: Individual Submissions (none)
This draft augments LISP [RFC9300] multicast functionality described in [I-D.farinacci-lisp-rfc6831bis] and [I-D.farinacci-lisp-rfc8378bis] to support the mapping of overlay group addresses to underlay RLOC addresses. This draft defines a many-to-1, 1-to-many, and many-to-many relationship between multicast EIDs and the Replication List Entries (RLEs) RLOC records they map to. The mechanisms in this draft allow a multicast LISP overlay to run over a mixed underlay of unicast and/or multicast packet forwarding functionality.
 Network-based mobility management in CATS network environment
 
 draft-jaehwoon-cats-mobility-02.txt
 Date: 01/05/2024
 Authors: Jaehwoon Lee
 Working Group: Individual Submissions (none)
Computing-Aware Traffic Steering (CATS) network architecture is to choose the best edge computing server by considering both the network environment and available computing/storage resources of the edge computing server. This draft describes the mechanism in which service continuity is provided even when the client moves and connects to a new ingress CATS-Router by using the PMIPv6-based mobility management method in the CATS-based edge computing networking environment.
 Ethernet-Tree (E-Tree) Support in Ethernet VPN (EVPN) and Provider Backbone Bridging EVPN (PBB-EVPN)
 
 draft-sajassi-bess-rfc8317bis-01.txt
 Date: 19/02/2024
 Authors: Ali Sajassi, Jorge Rabadan, John Drake, Arivudainambi Gounder, Aaron Bamberger
 Working Group: Individual Submissions (none)
The MEF Forum (MEF) has defined a rooted-multipoint Ethernet service known as Ethernet-Tree (E-Tree). A solution framework for supporting this service in MPLS networks is described in [RFC7387], "A Framework for Ethernet-Tree (E-Tree) Service over a Multiprotocol Label Switching (MPLS) Network". This document discusses how those functional requirements can be met with a solution based on RFC 7432, "BGP MPLS Based Ethernet VPN (EVPN)", with some extensions and a description of how such a solution can offer a more efficient implementation of these functions than that of [RFC7796], "Ethernet- Tree (E-Tree) Support in Virtual Private LAN Service (VPLS)". This document makes use of the most significant bit of the Tunnel Type field (in the P-Multicast Service Interface (PMSI) Tunnel attribute) governed by the IANA registry created by [RFC7385]; hence, it updates [RFC7385] accordingly. This document obsoletes [RFC8317].
 Detecting Unwanted Location Trackers
 
 draft-detecting-unwanted-location-trackers-01.txt
 Date: 20/12/2023
 Authors: Brent Ledvina, Zachary Eddinger, Ben Detwiler, Siddika Polatkan
 Working Group: Individual Submissions (none)
This document lists a set of best practices and protocols for accessory manufacturers whose products have built-in location- tracking capabilities. By following these requirements and recommendations, a location-tracking accessory will be compatible with unwanted tracking detection and alerts on mobile platforms. This is an important capability for improving the privacy and safety of individuals in the circumstance that those accessories are used to track their location without their knowledge or consent.
 Galois Counter Mode with Secure Short Tags (GCM-SST)
 
 draft-mattsson-cfrg-aes-gcm-sst-03.txt
 Date: 16/03/2024
 Authors: Matt Campagna, Alexander Maximov, John Mattsson
 Working Group: Individual Submissions (none)
This document defines the Galois Counter Mode with Secure Short Tags (GCM-SST) Authenticated Encryption with Associated Data (AEAD) algorithm. GCM-SST can be used with any keystream generator, not just a block cipher. The main differences compared to GCM [GCM] is that GCM-SST uses an additional subkey Q, that fresh subkeys H and Q are derived for each nonce, and that the POLYVAL function from AES- GCM-SIV is used instead of GHASH. This enables short tags with forgery probabilities close to ideal. This document also registers several instances of Advanced Encryption Standard (AES) with Galois Counter Mode with Secure Short Tags (AES-GCM-SST). This document is the product of the Crypto Forum Research Group.
 Enforcing end-to-end delay bounds via queue resizing
 
 draft-aft-detnet-bound-delay-queue-02.txt
 Date: 18/04/2024
 Authors: Antoine Fressancourt
 Working Group: Individual Submissions (none)
This document presents a distributed mechanism to enforce strict delay bounds for some network flows in large scale networks. It leverages on the capacity of modern network devices to adapt their queue's capacities to bound the maximum time spent by packets in those devices. It is using a reservation protocol to guarantee the availability of the resources in the devices' queues to serve packets belonging to specific flows while enforcing an end-to-end delay constraint.
 Hybrid X25519 and Streamlined NTRU Prime sntrup761 with SHA3-256: Chempat-X
 
 draft-josefsson-ntruprime-hybrid-01.txt
 Date: 20/01/2024
 Authors: Simon Josefsson
 Working Group: Individual Submissions (none)
This memo define Chempat-X, a post-quantum/traditional hybrid key exchange method (PQ/T KEM) based on X25519 and Streamlined NTRU Prime sntrup761 with SHA3-256.
 WebSocket Extension to disable masking
 
 draft-damjanovic-websockets-nomasking-02.txt
 Date: 27/02/2024
 Authors: Dragana Damjanovic
 Working Group: Individual Submissions (none)
The WebSocket protocol specifies that all frames sent from the client to the server must be masked. This was introduced as a protection against a possible attack on the infrastructure. With careful consideration, the masking could be omitted when intermediaries do not have access to the unencrypted traffic. This specification introduces a WebSocket extension that disables the mandatory masking of frames sent from the client to the server. The extension is allowed only if the client uses an encrypted connection.
 Extensible Provisioning Protocol (EPP) Transport over QUIC
 
 draft-yao-regext-epp-quic-01.txt
 Date: 18/02/2024
 Authors: Jiankang Yao, Hongtao Li, Zhiwei Yan, Dan Keathley, James Gould
 Working Group: Individual Submissions (none)
This document describes how an Extensible Provisioning Protocol (EPP) session is mapped onto a QUIC connection. EPP over QUIC (EoQ) leverages the performance and security features of the QUIC protocol as an EPP transport.
 Cycle Mapping Learning Method for Scaling DetNet
 
 draft-zhu-detnet-cycle-mapping-learning-01.txt
 Date: 26/12/2023
 Authors: Xiangyang Zhu, Yu jinghai, Chenqiang Gao, Quan Xiong
 Working Group: Individual Submissions (none)
The scaling DetNet (Deterministic Networking) technology based on cyclic queuing and scheduling is expected to solve the scalability problem of DetNet, and is hoped to extend the adaptive domain of DetNet to wide area network or even backbone network. One of the keys of this technology is to accurately obtain the cyclic mapping relationship between adjacent nodes, based on which DetNet packets can be end-to-end deterministically forwarded . This draft proposes a method for nodes to learn the cycle mapping relationship through sending learning messages.
 SPKI S-Expressions
 
 draft-rivest-sexp-08.txt
 Date: 07/05/2024
 Authors: Ronald Rivest, Donald Eastlake
 Working Group: Individual Submissions (none)
This memo specifies a data structure representation that is suitable for representing arbitrary, complex data structures. It was devised in 1996/1997 to support SPKI (RFC 2692) certificates with the intent that it be more widely applicable and has been used elsewhere. There are many implementations in a variety of programming languages. Uses of this representation herein are referred to as "S-expressions". This memo makes precise the encodings of these S-expressions: it gives a "canonical form" for them, describes two "transport" representations, and also describe an "advanced" format for display to people.
 A SAVI Solution for WLAN
 
 draft-bi-intarea-savi-wlan-02.txt
 Date: 10/01/2024
 Authors: Mingwei Xu, Jianping Wu, Tao Lin, Lin He, You Wang
 Working Group: Individual Submissions (none)
This document describes a source address validation solution for WLANs where 802.11i or other security mechanisms are enabled to secure MAC addresses. This mechanism snoops NDP and DHCP packets to bind IP addresses to MAC addresses, and relies on the security of MAC addresses guaranteed by 802.11i or other mechanisms to filter IP spoofing packets. It can work in the special situations described in the charter of SAVI (Source Address Validation Improvements) workgroup, such as multiple MAC addresses on one interface. This document describes three different deployment scenarios, with solutions for migration of binding entries when hosts move from one access point to another.
 An Emulation System Architecture for Space Network
 
 draft-zh-sn-emulation-arch-01.txt
 Date: 17/02/2024
 Authors: Kanglian Zhao, Hou Dongxu, Xiao Min
 Working Group: Individual Submissions (none)
This document describes an emulation architecture which provides a realistic, flexible, and extensible experimental environment for the space network (SN). The architecture includes four components, namely logical plane, control plane, data plane and measurement plane. Software-defined networking (SDN), virtualization technology, and traffic control mechanism are adopted to realize the real space environment and arbitrary topology. Furthermore, an extensible structure is described to emulate large-scale scenarios and access external emulation resources.
 Security Profiles in Bootstrap Voucher Artifacts
 
 draft-mohammed-anima-voucher-security-profile-01.txt
 Date: 27/11/2023
 Authors: Jabir Mohammed, Reda Haddad, Srihari Raghavan, Sandesh Rao
 Working Group: Individual Submissions (none)
This document describes an extension of the RFC8366 Voucher Artifact in order to support security profiles. This allows the owner to change and customize the security posture of the device dynamically and securely. This lets the owner to selectively enable or disable each of the underlying security parameters that make up the security posture of the device.
 A Mechanism for Encoding Differences in Paired Certificates
 
 draft-bonnell-lamps-chameleon-certs-03.txt
 Date: 04/01/2024
 Authors: Corey Bonnell, John Gray, D. Hook, Tomofumi Okubo, Mike Ounsworth
 Working Group: Individual Submissions (none)
This document specifies a method to efficiently convey the differences between two certificates in an X.509 version 3 extension. This method allows a relying party to extract information sufficient to construct the paired certificate and perform certification path validation using the constructed certificate. In particular, this method is especially useful as part of a key or signature algorithm migration, where subjects may be issued multiple certificates containing different public keys or signed with different CA private keys or signature algorithms. This method does not require any changes to the certification path validation algorithm as described in RFC 5280. Additionally, this method does not violate the constraints of serial number uniqueness for certificates issued by a single certification authority.
 Multi-segment SD-WAN via Cloud DCs
 
 draft-dmk-rtgwg-multisegment-sdwan-07.txt
 Date: 20/02/2024
 Authors: Kausik Majumdar, Linda Dunbar, Venkit Kasiviswanathan, Ashok Ramchandra, Aseem Choudhary
 Working Group: Individual Submissions (none)
This document describes a method for SD-WAN CPEs using GENEVE Encapsulation (RFC8926) to encapsulate the IPsec encrypted packets and send them to their closest Cloud GWs, who can steer the IPsec encrypted payload through the Cloud Backbone without decryption to the egress Cloud GWs which then forward the original IPsec encrypted payload to the destination CPEs. This method is for Cloud Backbone to connect multiple segments of SD-WAN without the Cloud GWs decrypting and re- encrypting the payloads.
 RPKI Publication Server Best Current Practices
 
 draft-timbru-sidrops-publication-server-bcp-02.txt
 Date: 18/01/2024
 Authors: Tim Bruijnzeels, Ties de Kock, Frank Hill, Tom Harrison
 Working Group: Individual Submissions (none)
This document describes best current practices for operating an RFC 8181 RPKI Publication Server and its rsync (RFC 5781) and RRDP (RFC 8182) public repositories.
 Generating the Transport Key Containers Using the GOST Algorithms
 
 draft-pkcs12-gost-08.txt
 Date: 12/12/2023
 Authors: Karelina Ekaterina
 Working Group: Individual Submissions (none)
This document specifies how to use "PKCS #12: Personal Information Exchange Syntax v1.1" (RFC 7292) to generate the transport key containers for storing keys and certificates in conjunction with the Russian national standard GOST algorithms. This specification has been developed outside the IETF. The purpose of publication being to facilitate interoperable implementations that wish to support the GOST algorithms. This document does not imply IETF endorsement of the cryptographic algorithms used here.
 Signaling In-Network Computing operations (SINC)
 
 draft-lou-rtgwg-sinc-02.txt
 Date: 16/03/2024
 Authors: Zhe Lou, Luigi Iannone, Yizhou Li, Zhangcuimin, Kehan Yao
 Working Group: Individual Submissions (none)
This memo introduces "Signaling In-Network Computing operations" (SINC), a mechanism to enable signaling in-network computing operations on data packets in specific scenarios like NetReduce, NetDistributedLock, NetSequencer, etc. In particular, this solution allows to flexibly communicate computational parameters, to be used in conjunction with the payload, to in-network SINC-enabled devices in order to perform computing operations.
 Signaling In-Network Computing operations (SINC) deployment considerations
 
 draft-lou-rtgwg-sinc-deployment-considerations-01.txt
 Date: 08/12/2023
 Authors: Zhe Lou, Luigi Iannone, Yizhou Li, Zhangcuimin
 Working Group: Individual Submissions (none)
This document is intended to discuss some deployment aspects of "Signaling In-Network Computing operations" (SINC). Based on some examples, this document analyzes how each device in the SINC chain undertakes its own functions. This document showcase the use of SINC mechanism.
 WARP Streaming Format
 
 draft-law-moq-warpstreamingformat-01.txt
 Date: 22/01/2024
 Authors: Will Law, Luke Curley, Victor Vasiliev, Suhas Nandakumar, Kirill Pugin
 Working Group: Individual Submissions (none)
This document specifies the WARP Streaming Format, designed to operate on Media Over QUIC Transport.
 An Overview of Network Slicing Efforts in The IETF
 
 draft-boucadair-teas-ietf-slicing-overview-05.txt
 Date: 15/02/2024
 Authors: Mohamed Boucadair
 Working Group: Individual Submissions (none)
This document lists a set of slicing-related specifications that are being development within the IETF. This document is meant to provide an overview of slicing activities in the IETF to hopefully ease coordination and ensure that specifications that are developed in many WGs are consistent.
 Analysis and Evaluation for TSN Queuing Mechanisms
 
 draft-hp-detnet-tsn-queuing-mechanisms-evaluation-01.txt
 Date: 20/12/2023
 Authors: Jinjie Yan, Yufang Han, Shaofu Peng, Yuehong Gao
 Working Group: Individual Submissions (none)
TSN technology standards developed in the IEEE 802.1TSN Task Group define the time-sensitive mechanism to provide deterministic connectivity through IEEE 802 networks, i.e., guaranteed packet transport with bounded latency, low packet delay variation, and low packet loss.This document summarizes and evaluates various queuing technologies of TSN as reference information for Scaling Deterministic Networks Requirements[I-D.ietf-detnet-scaling-requirements] and Enhancing Deterministic Forwarding.
 SRv6 Context Indicator SIDs for SR-Aware Services
 
 draft-lin-spring-srv6-aware-context-indicator-01.txt
 Date: 20/12/2023
 Authors: Changwang Lin, Dongjie Lu, Mengxiao Chen, Meiling Chen
 Working Group: Individual Submissions (none)
A context indicator provides the context on how to process the packet for service nodes. This document describes how to use SRv6 SIDs as context indicator for SR-aware services. The corresponding Endpoint behaviors are defined.
 WBA OpenRoaming Wireless Federation
 
 draft-tomas-openroaming-02.txt
 Date: 16/02/2024
 Authors: Bruno Tomas, Mark Grayson, Necati Canpolat, Betty Cockrell, Sri Gundavelli
 Working Group: Individual Submissions (none)
This document describes the Wireless Broadband Alliance's OpenRoaming system. The OpenRoaming architectures enables a seamless onboarding experience for devices connecting to access networks that are part of the federation of access networks and identity providers. The primary objective of this document is to describe the protocols that form the foundation for this architecture, enabling providers to correctly configure their equipment to support interoperable OpenRoaming signalling exchanges. In addition, the topic of OpenRoaming has been raised in different IETF working groups, and therefore a secondary objective is to assist those discussions by describing the federation organization and framework.
 Green Networking Metrics
 
 draft-cx-opsawg-green-metrics-02.txt
 Date: 04/03/2024
 Authors: Alexander Clemm, Lijun Dong, Greg Mirsky, Laurent Ciavaglia, Jeff Tantsura, Marie-Paule Odini, Eve Schooler, Ali Rezaki, Carlos Pignataro
 Working Group: Individual Submissions (none)
This document explains the need for network instrumentation that allows to assess a number of sustainability-related attributes such as power consumption, energy efficiency, and carbon footprint associated with a network, its equipment, and the services that are provided over it. It also suggests a set of related metrics that, when provided visibility into, can help to optimize a network's "greenness" accordingly.
 Routing Framework for LEO Mega-constellation Based on Region Division
 
 draft-hou-satellite-routing-framework-02.txt
 Date: 17/02/2024
 Authors: Hou Dongxu, Xiao Min, Fenlin Zhou
 Working Group: Individual Submissions (none)
The inter-satellite routing is the premis to ensure that the satellite network provides end-to-end stable service covering the whole globe. However, the mature terrestrial network technologies are difficult to directly apply to the satellite network because of the highly dynamic network topology and the limited on-board resources. This issue is further exacerbated in LEO mega- constellations. In view of this challenge, this document presents a routing framework for LEO mega-constellation. Based on the orbit position characteristic and the predictable topology, this framwork realizes flexible region division, establishes intra-region and inter-region path, as well as completes end-to-end data forwarding.
 RIFT extensions for SRv6
 
 draft-cheng-rift-srv6-extensions-02.txt
 Date: 04/03/2024
 Authors: Weiqiang Cheng, Changwang Lin, Ruixue Wang
 Working Group: Individual Submissions (none)
The Segment Routing (SR) architecture allows a flexible definition of the end-to-end path by encoding it as a sequence of topologicalelements called segments. It can be implemented over an MPLS or IPv6 data plane. This document describes the RIFT extensions required to support Segment Routing over the IPv6 data plane (SRv6).
 The Monitoring Plugins Interface
 
 draft-kaestle-monitoring-plugins-interface-04.txt
 Date: 22/03/2024
 Authors: Lorenz Kaestle
 Working Group: Individual Submissions (none)
This document aims to document the Monitoring Plugin Interface, a standard more or less strictly implemented by different network monitoring solutions. Implementers and Users of network monitoring solutions, monitoring plugins and libraries can use this as a reference point as to how these programs interface with each other.
 PIM Flooding Mechanism Enhancements
 
 draft-gopal-pim-pfm-forwarding-enhancements-02.txt
 Date: 04/03/2024
 Authors: Ananya Gopal, Stig Venaas
 Working Group: Individual Submissions (none)
PIM Flooding Mechanism is a generic PIM message exchange mechanism that allows multicast information to be exchanged between PIM routers hop-by-hop. One example is PIM Flooding Mechanism and Source Discovery which allows Last Hop Routers to learn about new sources using PFM messages, without the need of initial data registers, RPs or shared trees. This document defines a methodology that enhances forwarding efficiency in PFM deployments. This enhancement can avoid extra processing at PIM routers when PFM messages are forwarded.
 Simple Random Candidate Selection
 
 draft-hoffman-random-candidate-selection-02.txt
 Date: 20/11/2023
 Authors: Paul Hoffman
 Working Group: Individual Submissions (none)
This document describes a process to randomly select a subset of named candidates from a larger set of candidates. The process uses an unpredictable value that can be trusted by all candidates. This draft has a GitHub repository (https://github.com/paulehoffman/ draft-hoffman-random-candidate-selection). Issues and pull requests can be made there.
 Intel Profile for CoRIM
 
 draft-cds-rats-intel-corim-profile-01.txt
 Date: 20/12/2023
 Authors: James Beaney, Andrew Draper, Vincent Scarlata, Ned Smith
 Working Group: Individual Submissions (none)
This document describes extensions to the CoRIM schema that support Intel specific Attester implementations. Multiple Evidence formats are compatible with base CoRIM, but extensions to evidence formats may be required to fully support the CoMID schema extensions defined in this profile. The concise evidence definition uses the CoMID schema such that extensions to CoMID are inherited by concise evidence. Reference Value Providers may use this profile to author mainifests containing Reference Values and Endorsements. RATS Verifiers recognize this profile by it's profile identifier and implement support for the extentions defined.
 Latency Guarantee with Stateless Fair Queuing
 
 draft-joung-detnet-stateless-fair-queuing-02.txt
 Date: 29/02/2024
 Authors: Jinoo Joung, Jeong-dong Ryoo, Taesik Cheung, Yizhou Li, Peng Liu
 Working Group: Individual Submissions (none)
This document specifies the framework and the operational procedure for deterministic networking with work conserving packet schedulers that guarantee end-to-end latency bounds to flows. Schedulers in core nodes of the network do not need to maintain flow states. Instead, the entrance node of a flow marks an ideal service completion time, called Finish Time (FT), of a packet in the packet header. The subsequent core nodes update FT by adding a delay factor, which is a function of the flow and upstream nodes. The packets in the queue are served in the ascending order of the FT. This technique is called Fair Queuing (FQ). The result is that flows are isolated from each other almost perfectly. The latency bound of a flow depends only on the flow's intrinsic parameters, except the link capacities and the maximum packet lengths among other flows sharing each output link with the flow.
 Framework for Rule-based International Cyberspace Governance
 
 draft-hanliu-ricg-01.txt
 Date: 30/12/2023
 Authors: Han Liu, Jilong Wang, Chengyuan Zhang, Pardis Tehrani, Ji Ma
 Working Group: Individual Submissions (none)
Cyberspace involves politics, economy, culture, and technology; it engages governments, international organizations, Internet companies, technology communities, civil society, and citizens, forming an integrated, organic body. In a word, cyberspace is the online version of a community with a shared future for mankind. This memo tries to outline a new framework for rule-based international cyberspace governance regime in the context of IPv6 application, which looks into the future international cooperation of cyberspace governance.
 SCION Control Plane
 
 draft-dekater-scion-controlplane-03.txt
 Date: 04/03/2024
 Authors: Corine de Kater, Nicola Rustignoli, Samuel Hitz
 Working Group: Individual Submissions (none)
This document describes the control plane of the path-aware, inter- domain network architecture SCION (Scalability, Control, and Isolation On Next-generation networks). One of the basic characteristics of SCION is that it gives path control to SCION- capable endpoints. In fact, endpoints can choose between multiple path options, enabling the optimization of network paths. The SCION control plane is responsible for discovering these paths and making them available to the endpoints. The main goal of SCION's control plane is to create and manage path segments, which can then be combined into forwarding paths to transmit packets in the data plane. This document first discusses how path exploration is realized through beaconing and how path segments are created and registered. Each SCION autonomous system (AS) can register segments according to its own policy - it is free to specify which path properties and algorithm(s) to use in the selection procedure. The document then describes the path lookup process, where endpoints obtain path segments - a fundamental building block for the construction of end-to-end paths.
 OAM for LPWAN using Static Context Header Compression (SCHC)
 
 draft-barthel-schc-oam-schc-03.txt
 Date: 19/01/2024
 Authors: Dominique Barthel, Laurent Toutain
 Working Group: Individual Submissions (none)
This document describes how SCHC can be used to efficiently perform basic Operation, Administration and Maintenance (OAM) on Low Power Wide Area Networks (LPWANs) by compressing ICMPv6/IPv6 headers, or by shielding the LPWAN network and the Device from undesirable ICMPv6 traffic. This document specifies additional behavior for SCHC [RFC8724] and extends the YANG Data Model defined in [RFC9363].
 Communicating Proxy Configurations in Provisioning Domains
 
 draft-pauly-intarea-proxy-config-pvd-02.txt
 Date: 01/03/2024
 Authors: Tommy Pauly, Dragana Damjanovic
 Working Group: Individual Submissions (none)
This document defines a mechanism for accessing provisioning domain information associated with a proxy, such as other proxy URIs that support different protocols and a list of DNS zones that are accessible via a proxy. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/tfpauly/privacy-proxy.
 Deterministic Networking (DetNet) Data Plane - guaranteed Latency Based Forwarding (gLBF) for bounded latency with low jitter and asynchronous forwarding in Deterministic Networks
 
 draft-eckert-detnet-glbf-02.txt
 Date: 05/01/2024
 Authors: Toerless Eckert, Alexander Clemm, Stewart Bryant, Stefan Hommes
 Working Group: Individual Submissions (none)
This memo proposes a mechanism called "guaranteed Latency Based Forwarding" (gLBF) as part of DetNet for hop-by-hop packet forwarding with per-hop deterministically bounded latency and minimal jitter. gLBF is intended to be useful across a wide range of networks and applications with need for high-precision deterministic networking services, including in-car networks or networks used for industrial automation across on factory floors, all the way to ++100Gbps country-wide networks. Contrary to other mechanisms, gLBF does not require network wide clock synchronization, nor does it need to maintain per-flow state at network nodes, avoiding drawbacks of other known methods while leveraging their advantages. Specifically, gLBF uses the queuing model and calculus of Urgency Based Scheduling (UBS, [UBS]), which is used by TSN Asynchronous Traffic Shaping [TSN-ATS]. gLBF is intended to be a plug-in replacement for TSN-ATN or as a parallel mechanism beside TSN-ATS because it allows to keeping the same controller-plane design which is selecting paths for TSN-ATS, sizing TSN-ATS queues, calculating latencies and admitting flows to calculated paths for calculated latencies. In addition to reducing the jitter compared to TSN-ATS by additional buffering (dampening) in the network, gLBF also eliminates the need for per-flow, per-hop state maintenance required by TSN-ATS. This avoids the need to signal per-flow state to every hop from the controller-plane and associated scaling problems. It also reduces implementation cost for high-speed networking hardware due to the avoidance of additional high-speed speed read/write memory access to retrieve, process and update per-flow state variables for a large number of flows.
 SRv6 Segment List optimization
 
 draft-liu-idr-srv6-segment-list-optimize-01.txt
 Date: 05/01/2024
 Authors: Yisong Liu, Changwang Lin, Ran Chen, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document introduces an optimization method for segment list arrangement to solve the problem of the penultimate segment node being unable to perform PSP behavior when the egress node has both End SID and service SID, and improve the forwarding efficiency of data packets.
 BGP Route Broker for Hyperscale SDN
 
 draft-xu-idr-bgp-route-broker-04.txt
 Date: 25/04/2024
 Authors: Xiaohu Xu, Shraddha Hegde, Srihari Sangli, Shunwan Zhuang, Jie Dong
 Working Group: Individual Submissions (none)
This document describes an optimized BGP route reflector mechanism, referred to as a BGP route broker, so as to use BGP-based IP VPN as an overlay routing protocol in a scalable way for hyperscale data center network virtualization environments, also known as Software- Defined Network (SDN) environments.
 Sloppy Topology Updates for ad-hoc Routing Protocols (STURP)
 
 draft-lou-manet-sturp-01.txt
 Date: 30/12/2023
 Authors: Zhe Lou, Luigi Iannone, Dirk Trossen, Zhaochen Shi
 Working Group: Individual Submissions (none)
This memo describes an approach to updating topologies in typical MANET-like environments, relying on what is termed 'sloppy updates' in the remainder of this document. Key to the approach is that updates are only initiated if existing communication relations may be effect by non-synchronized topology information, otherwise using the topology information as it exists. This 'sloppy' nature of the approach reduces the needed updates and the associated communication for them, thus increases efficiency as well as performance from a user perspective.
 PIM Flooding Mechanism and Source Discovery Sub-TLV
 
 draft-venaas-pim-pfm-sd-subtlv-01.txt
 Date: 04/03/2024
 Authors: Stig Venaas, Francesco Meo
 Working Group: Individual Submissions (none)
PIM Flooding Mechanism and Source Discovery (RFC 8364) allows for announcement of active sources, but it does not allow for providing additional information about the flow. This document defines a new TLV for announcing sources that allows for Sub-TLVs that can be used for providing various types of information. This document defines a Sub-TLV for flow data rate.
 Update to Automatic Bandwidth Adjustment procedure of Stateful PCE
 
 draft-peng-pce-stateful-pce-autobw-update-01.txt
 Date: 25/12/2023
 Authors: Shuping Peng, Dhruv Dhody, Rakesh Gandhi
 Working Group: Individual Submissions (none)
Extensions to the Path Computation Element Communication Protocol (PCEP) for MPLS-TE Label Switched Path (LSP) Automatic Bandwidth Adjustments with Stateful PCE are defined in RFC 8733. It defines the AUTO-BANDWIDTH-ATTRIBUTES TLV and a set of sub-TLVs for each of the attributes. The sub-TLVs are included if there is a change since the last information sent in the PCEP message. But it lacks a mechanism to explicitly remove an attribute identified by the sub- TLV. This document updates RFC 8733 by defining the behaviour to explicitly remove an attribute..
 Using onion routing with CoAP
 
 draft-amsuess-t2trg-onion-coap-02.txt
 Date: 17/05/2024
 Authors: Christian Amsuess, Marco Tiloca, Rikard Hoeglund
 Working Group: Individual Submissions (none)
The CoAP protocol was designed with direct connections and proxies in mind. This document defines mechanisms by which chains of proxies can be set up. In combination, they enable the operation of hidden services and client similar to how Tor (The Onion Router) enables it for TCP based protocols.
 Bundle Protocol Yang Model
 
 draft-blanchet-dtn-bp-yang-model-01.txt
 Date: 04/03/2024
 Authors: Marc Blanchet, Yingzhen Qu
 Working Group: Individual Submissions (none)
This document describes the Yang model for the Bundle protocol.
 HPCC++: Enhanced High Precision Congestion Control
 
 draft-miao-ccwg-hpcc-02.txt
 Date: 29/02/2024
 Authors: Rui Miao, Surendra Anubolu, Rong Pan, Jeongkeun Lee, Barak Gafni, Jeff Tantsura, Allister Alemania, Yuval Shpigelman
 Working Group: Individual Submissions (none)
Congestion control (CC) is the key to achieving ultra-low latency, high bandwidth and network stability in high-speed networks. However, the existing high-speed CC schemes have inherent limitations for reaching these goals. In this document, we describe HPCC++ (High Precision Congestion Control), a new high-speed CC mechanism which achieves the three goals simultaneously. HPCC++ leverages inband telemetry to obtain precise link load information and controls traffic precisely. By addressing challenges such as delayed signaling during congestion and overreaction to the congestion signaling using inband and granular telemetry, HPCC++ can quickly converge to utilize all the available bandwidth while avoiding congestion, and can maintain near-zero in- network queues for ultra-low latency. HPCC++ is also fair and easy to deploy in hardware, implementable with commodity NICs and switches.
 Inband Telemetry for HPCC++
 
 draft-miao-ccwg-hpcc-info-02.txt
 Date: 29/02/2024
 Authors: Rui Miao, Surendra Anubolu, Rong Pan, Jeongkeun Lee, Barak Gafni, Jeff Tantsura, Allister Alemania, Yuval Shpigelman
 Working Group: Individual Submissions (none)
Congestion control (CC) is the key to achieving ultra-low latency, high bandwidth and network stability in high-speed networks. However, the existing high-speed CC schemes have inherent limitations for reaching these goals. In this document, we describe HPCC++ (High Precision Congestion Control), a new high-speed CC mechanism which achieves the three goals simultaneously. HPCC++ leverages inband telemetry to obtain precise link load information and controls traffic precisely. By addressing challenges such as delayed signaling during congestion and overreaction to the congestion signaling using inband and granular telemetry, HPCC++ can quickly converge to utilize all the available bandwidth while avoiding congestion, and can maintain near-zero in- network queues for ultra-low latency. HPCC++ is also fair and easy to deploy in hardware, implementable with commodity NICs and switches.
 Problem statements and requirements of L2 CATS
 
 draft-huang-cats-ps-and-requirements-of-l2-cats-02.txt
 Date: 05/01/2024
 Authors: Daniel Huang, Bin Tan
 Working Group: Individual Submissions (none)
The computing intensive parts of the customer premise equipment have been decoupled and migrated to the cloud, therefore the thin CPE remaining at customer premise needs to access its “avatar” virtual CPE in the cloud which could be deployed in multiple edge computing sites. This draft will illustrate a use case of L2 traffic steering in terms of dynamic computing and networking resource status, together with requirements for CATS as well as solution consideration with regard to particularly the difference from the L3 routing framework.
 Routing mechanism in Dragonfly Networks Gap Analysis,Problem Statement,and Requirements
 
 draft-wang-rtgwg-dragonfly-routing-problem-01.txt
 Date: 03/03/2024
 Authors: Ruixue Wang, Changwang Lin, wangwenxuan, Weiqiang Cheng
 Working Group: Individual Submissions (none)
This document provides the gap analysis of existing routing mechanism in dragonfly networks, describes the fundamental problems, and defines the requirements for technical improvements.
 Ping Path Consistency over SRv6
 
 draft-gong-spring-ping-path-consistency-over-srv6-01.txt
 Date: 04/01/2024
 Authors: Liyan Gong, Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
In the SRv6 network, the headend node could use Ping (ICMPv6 Echo) to detect the connectivity of the SRv6 path to implement path switching. When a headend use Ping to detect the segment list/CPath of SRv6 Policy, the forward path of ICMPv6 Echo Request message is indicated by segment list, the reverse path of ICMPv6 Echo Reply message is via the shortest path from the destination node to the source as determined by routing. The forward path and reverse path of ICMPv6 message are likely inconsistent going through different intermediate nodes or links. This document describes how to ensure the consistency of the forward path and the reverse path when using ICMPv6 Echo messages to detect SRv6 Policy.
 PCEP Extension to Support SRv6 Segment List optimization
 
 draft-lin-pce-srv6-segment-list-optimize-01.txt
 Date: 05/01/2024
 Authors: Changwang Lin, Yisong Liu, Ran Chen, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Clients (PCCs) requests. Segment routing (SR) leverages the source routing and tunneling paradigms. The Stateful PCEP extensions allow stateful control of Segment Routing Traffic Engineering (TE) Paths. Furthermore, PCEP can be used for computing SR TE paths in the network. This document defines PCEP extensions for optimizing the arrangement of segment lists to solve the problem of the penultimate segment node being unable to perform PSP behavior when the egress node has both End SID and service SID, and improve the forwarding efficiency of data packets.
 Auto-discovery mechanism for ACME servers
 
 draft-vanbrouwershaven-acme-auto-discovery-03.txt
 Date: 15/02/2024
 Authors: Paul van Brouwershaven, Mike Ounsworth, Corey Bonnell, Inigo Barreira, Q Misell
 Working Group: Individual Submissions (none)
A significant impediment to the widespread adoption of the Automated Certificate Management Environment (ACME) [RFC8555] is that ACME clients need to be pre-configured with the URL of the ACME server to be used. This often leaves domain owners at the mercy of their hosting provider as to which Certification Authorities (CAs) can be used. This specification provides a mechanism to bootstrap ACME client configuration from a domain's DNS CAA Resource Record [RFC8659], thus giving control of which CA(s) to use back to the domain owner. Specifically, this document specifies two new extensions to the DNS CAA Resource Record: the "discovery" and "priority" parameters. Additionally, it registers the URI "/.well-known/acme" at which all compliant ACME servers will host their ACME directory object. By retrieving instructions for the ACME client from the authorized CA(s), this mechanism allows for the domain owner to configure multiple CAs in either load-balanced or fallback prioritizations which improves user preferences and increases diversity in certificate issuers.
 Raytime: Validating token expiry on an unbounded local time interval
 
 draft-amsuess-t2trg-raytime-02.txt
 Date: 11/01/2024
 Authors: Christian Amsuess
 Working Group: Individual Submissions (none)
When devices are deployed in locations with no real-time access to the Internet, obtaining a trusted time for validation of time limited tokens and certificates is sometimes not possible. This document explores the options for deployments in which the trade-off between availability and security needs to be made in favor of availability. While considerations are general, terminology and examples primarily focus on the ACE framework.
 Multiple Algorithm Rules in DNSSEC
 
 draft-huque-dnsop-multi-alg-rules-03.txt
 Date: 05/05/2024
 Authors: Shumon Huque, Peter Thomassen, Viktor Dukhovni, Duane Wessels
 Working Group: Individual Submissions (none)
This document restates the requirements on DNSSEC signing and validation and makes small adjustments in order to allow for more flexible handling of configurations that advertise multiple Secure Entry Points (SEP) with different signing algorithms via their DS record or trust anchor set. The adjusted rules allow both for multi- signer operation and for the transfer of signed DNS zones between providers, where the providers support disjoint DNSSEC algorithm sets. In addition, the proposal enables pre-publication of a trust anchor in preparation for an algorithm rollover, such as of the root zone. This document updates RFCs 4035, 6840, and 8624.
 Extension Header Use Cases
 
 draft-mcbride-v6ops-eh-use-cases-01.txt
 Date: 26/02/2024
 Authors: Mike McBride, Nalini Elkins, Nick Buraglio, Xuesong Geng, michael ackermann
 Working Group: Individual Submissions (none)
This document outlines IPv6 extension header use cases including those intended to be deployed in limited domains and those intended for the global Internet. We specify use cases are deployed today and those which may be of use in the future. The hope is that through understanding these various extension header use cases, we can then better understand how best to improve upon extension header deployments including any limits on their use.
 Secure Asset Transfer Protocol (SATP) Gateway Crash Recovery Mechanism
 
 draft-belchior-satp-gateway-recovery-01.txt
 Date: 29/01/2024
 Authors: Rafael Belchior, Miguel Correia, Andre Augusto, Thomas Hardjono
 Working Group: Individual Submissions (none)
This memo describes the crash recovery mechanism for the Secure Asset Transfer Protocol (SATP). The goal of this draft is to specify the message flow that implements a crash recovery mechanism. The mechanism assures that gateways running SATP are able to recover faults, enforcing ACID properties for asset transfers across ledgers (i.e., double spend does not occur).
 Use of Reliable Transport in the Internet Key Exchange Protocol Version 2 (IKEv2)
 
 draft-smyslov-ipsecme-ikev2-reliable-transport-01.txt
 Date: 28/12/2023
 Authors: Valery Smyslov
 Working Group: Individual Submissions (none)
The Internet Key Exchange protocol version 2 (IKE2) can operate either over unreliable (UDP) transport or over reliable (TCP) transport. If TCP is used, then IPsec tunnels created by IKEv2 also use TCP. This document specifies how to decouple IKEv2 and IPsec transports, so that IKEv2 can operate over TCP, while IPsec tunnels use unreliable transport. This feature allows IKEv2 to effectively exchange large blobs of data (e.g. when post-quantum algorithms are employed) while avoiding performance problems which arise when TCP is used for IPsec.
 Middle Ware Facilities for CATS
 
 draft-yuan-cats-middle-ware-facility-01.txt
 Date: 02/01/2024
 Authors: Dongyu Yuan, Fenlin Zhou
 Working Group: Individual Submissions (none)
This draft proposes a method to perceive and process the running status of computing resources by introducing a logical Middle Ware facility, aiming to avoid directly reflecting continuous and dynamic computing resource status in the network domain, match service requirements and instance conditions, and ultimately achieve computing aware traffic steering and be applicable to various possible scheduling strategies.
 Validity of SR Policy Candidate Path
 
 draft-chen-spring-sr-policy-cp-validity-02.txt
 Date: 01/03/2024
 Authors: Ran Chen, Yisong Liu, Ketan Talaulikar, Samuel Sidor, Detao Zhao, Changwang Lin, Zafar Ali
 Working Group: Individual Submissions (none)
An SR Policy comprises one or more candidate paths (CP) of which at a given time one and only one may be active (i.e., installed in forwarding and usable for steering of traffic). Each CP in turn may have one or more SID-List of which one or more may be active; when multiple SID-List are active then traffic is load balanced over them. However, a candidate path is valid when at least one SID-List is active. This candidate path validity criterion cannot meet the needs of some scenarios. This document defines the new candidate path validity criterion.
 Microloop Prevention in a Hierarchical Segment Routing Solution for CATS
 
 draft-yuan-cats-hierarchical-loop-prevention-01.txt
 Date: 02/01/2024
 Authors: Dongyu Yuan, Fenlin Zhou
 Working Group: Individual Submissions (none)
Considering computing and networking is quite different in terms of resource granularity as well as their status stability, a hierarchical segment routing is proposed and introduced as an end-to- end CATS process. However, it brings about potential problems as illustrated in [I-D.yuan-cats-end-to-end-problem-requirement]. In order to solve the mentioned problems and to improve and perfect a hierarchical solution, corresponding aggregation methods are discussed and hierarchical entries are proposed in this draft.
 Validity of SR Policy Candidate Path
 
 draft-chen-idr-bgp-sr-policy-cp-validity-02.txt
 Date: 01/03/2024
 Authors: Ran Chen, Detao Zhao, Ketan Talaulikar, Yisong Liu, Changwang Lin
 Working Group: Individual Submissions (none)
This document defines extensions to BGP to distribute the validity control parameters of a candidate path for an SR Policy.
 YANG Data Model for Intra-domain and Inter-domain Source Address Validation (SAVNET)
 
 draft-li-savnet-sav-yang-04.txt
 Date: 03/03/2024
 Authors: Dan Li, Fang Gao, Changwang Lin, Jianping Wu, Tianhao Wu, Weiqiang Cheng
 Working Group: Individual Submissions (none)
This document describes a YANG data model for Intra-domain and Inter-domain Source Address Validation (SAVNET). The model serves as a base framework for configuring and managing an SAV subsystem, including SAV rule and SAV Tables, and expected to be augmented by other SAV technology models accordingly. Additionally, this document also specifies the model for the SAV Static application.
 Persistent Symmetric Keys in OpenPGP
 
 draft-huigens-openpgp-persistent-symmetric-keys-02.txt
 Date: 03/01/2024
 Authors: Daniel Huigens
 Working Group: Individual Submissions (none)
This document defines new algorithms for the OpenPGP standard (RFC4880) to support persistent symmetric keys, for message encryption using authenticated encryption with additional data (AEAD) and for authentication with hash-based message authentication codes (HMAC). This enables the use of symmetric cryptography for data storage (and other contexts that do not require asymmetric cryptography), for improved performance, smaller keys, and improved resistance to quantum computing.
 Views and View Addresses for Secure Asset Transfer
 
 draft-ramakrishna-satp-views-addresses-02.txt
 Date: 08/01/2024
 Authors: Venkatraman Ramakrishna, Vinayaka Pandit, Ermyas Abebe, Sandeep Nishad, Krishnasuri Narayanam
 Working Group: Individual Submissions (none)
With increasing use of DLT (distributed ledger technology) systems, including blockchain systems and networks, for virtual assets, there is a need for asset-related data and metadata to traverse system boundaries and link their respective business workflows. Core requirements for such interoperation between systems are the abilities of these systems to project views of their assets to external parties, either individual agents or other systems, and the abilities of those external parties to locate and address the views they are interested in. A view denotes the complete or partial state of a virtual asset, or the output of a function computed over the states of one or more assets, or locks or pledges made over assets for internal or external parties. Systems projecting these views must be able to guard them using custom access control policies, and external parties consuming them must be able to verify them independently for authenticity, finality, and freshness. The end-to-end protocol that allows an external party to request a view by an address and a DLT system to return a view in response must be DLT- neutral and mask the interior particularities and complexities of the DLT systems. The view generation and verification modules at the endpoints must obey the native consensus logic of their respective systems.
 Protocol for Requesting and Sharing Views across Networks
 
 draft-ramakrishna-satp-data-sharing-01.txt
 Date: 08/01/2024
 Authors: Venkatraman Ramakrishna, Vinayaka Pandit, Ermyas Abebe, Sandeep Nishad, Dhinakaran Vinayagamurthy
 Working Group: Individual Submissions (none)
With increasing use of DLT (distributed ledger technology) systems, including blockchain systems and networks, for virtual assets, there is a need for asset-related data and metadata to traverse system boundaries and link their respective business workflows. Systems and networks can define and project views, or asset states, outside of their boundaries, as well as guard them using access control policies, and external agents or other systems can address those views in a globally unique manner. Universal interoperability requires such systems and networks to request and supply views via gateway nodes using a request-response protocol. The endpoints of this protocol lie within the respective systems or in networks of peer nodes, but the cross-system protocol occurs through the systems’ respective gateways. The inter-gateway protocol that allows an external party to request a view by an address and a DLT system to return a view in response must be DLT-neutral and mask the internal particularities and complexities of the DLT systems. The view generation and verification modules at the endpoints must obey the native consensus logic of their respective networks.
 Integration of Speech Codec Enhancement Methods into the Opus Codec
 
 draft-buethe-opus-speech-coding-enhancement-02.txt
 Date: 21/04/2024
 Authors: Jan Buethe, Jean-Marc Valin
 Working Group: Individual Submissions (none)
This document proposes a method for integrating a speech codec enhancement method into the Opus codec [RFC6716]
 Deterministic Networking (DetNet) Data Plane - Flow interleaving for scaling detnet data planes with minimal end-to-end latency and large number of flows.
 
 draft-eckert-detnet-flow-interleaving-01.txt
 Date: 05/01/2024
 Authors: Toerless Eckert
 Working Group: Individual Submissions (none)
This memo explain requirements, benefits and feasibility of a new DetNet service function tentatively called "flow interleaving". It proposes to introduce this service function into the DetNet architecture. Flow interleaving can be understood as a DetNet equivalent of the IEEE TSN timed gates. Its primary role is intended to be at the ingress edge of DetNet domains supporting higher utilization and lower bounded latency for flow aggregation (interleaving of flows into a single flow), as well as higher utilization and lower bounded latency for interleaving occurring in transit hops of the DetNet domain in conjunction with in-time per-hop bounded latency forwarding mechanisms.
 Integrating the Alternate-Marking Method into In Situ Operations,Administration,and Maintenance (IOAM)
 
 draft-he-ippm-integrating-am-into-ioam-01.txt
 Date: 08/01/2024
 Authors: Xiaoming He, Frank Brockners, Haoyu Song, Giuseppe Fioccola, Aijun Wang
 Working Group: Individual Submissions (none)
In situ Operations, Administration, and Maintenance (IOAM) is used for recording and collecting operational and telemetry information. Specifically, passport-based IOAM allows telemetry data generated by each node along the path to be pushed into data packets when they traverse the network, while postcard-based IOAM allows IOAM data generated by each node to be directly exported without being pushed into in-flight data packets. This document extends IOAM Direct Export (DEX) Option-Type to integrate the Alternate-Marking Method into IOAM.
 An SR-TE based Solution For Computing-Aware Traffic Steering
 
 draft-fu-cats-sr-te-based-solution-01.txt
 Date: 07/01/2024
 Authors: FUHUAKAI, Daniel Huang, Liwei Ma, Wei Duan
 Working Group: Individual Submissions (none)
Computing-aware traffic steering (CATS) is a traffic engineering approach [I-D.ietf-teas-rfc3272bis] that takes into account the dynamic nature of computing resources and network state to optimize service-specific traffic forwarding towards a given service instance. Various relevant metrics may be used to enforce such computing-aware traffic steering policies.It is critical to meet different types of computing-aware traffic steering requirements without disrupting the existing network architecture. In this context, this document proposes a computing-aware traffic steering solution based on the SR- TE infrastructure of the current traffic engineering technology to reduce device resource consumption and investment and meet the requirements for computing-aware traffic steering of network devices.
 Applying COSE Signatures for YANG Data Provenance
 
 draft-lopez-opsawg-yang-provenance-02.txt
 Date: 01/03/2024
 Authors: Diego Lopez, Antonio Pastor, Alex Feng, Henk Birkholz
 Working Group: Individual Submissions (none)
This document defines a mechanism based on COSE signatures to provide and verify the provenance of YANG data, so it is possible to verify the origin and integrity of a dataset, even when those data are going to be processed and/or applied in workflows where a crypto-enabled data transport directly from the original data stream is not available. As the application of evidence-based OAM automation and the use of tools such as AI/ML grow, provenance validation becomes more relevant in all scenarios. The use of compact signatures facilitates the inclusion of provenance strings in any YANG schema requiring them.
 BGP Attribute Escape
 
 draft-haas-idr-bgp-attribute-escape-01.txt
 Date: 02/02/2024
 Authors: Jeffrey Haas
 Working Group: Individual Submissions (none)
BGP-4 [RFC 4271] has been very successful in being extended over the years it has been deployed. A significant part of that success is due to its ability to incrementally add new features to its Path Attributes when they are marked "optional transitive". Implementations that are ignorant of a feature for an unknown Path Attribute that are so marked will propagate BGP routes with such attributes. Unfortunately, this blind propagation of unknown Path Attributes may happen for features that are intended to be used in a limited scope. When such Path Attributes inadvertently are carried beyond that scope, it can lead to things such as unintended disclosure of sensitive information, or cause improper routing. In their worst cases, such propagation may be for malformed Path Attributes and lead to BGP session resets or crashes. This document calls such inadvertent propagation of BGP Path Attributes, "attribute escape". This document further describes some of the scenarios that leads to this behavior and makes recommendations on practices that may limit its impact.
 ANUP Implementation in 5G with BGP Signaling
 
 draft-zzhang-dmm-anup5g-signaling-01.txt
 Date: 06/02/2024
 Authors: Zhaohui Zhang, Keyur Patel
 Working Group: Individual Submissions (none)
Draft-zzhang-dmm-mup-evolution describes an architecture in which co- located Access Node and User Plane Function node of a 5G mobile network are integrated into a single Network Function ANUP in 6G for simplified signaling and optimized forwarding. The integration can happen in 5G as well but only with optimized forwarding. This document describes how BGP signaling specified in Draft-mpmz-bess- mup-safi can be used for ANUP implementation in 5G.
 Confidential Virtual Machine Provisioning in Cloud Environment
 
 draft-deng-teep-cvmp-01.txt
 Date: 01/12/2023
 Authors: Deng, Guorui Yu
 Working Group: Individual Submissions (none)
This document specifies the procedures of provisioning confidential virtual machine in the cloud environment.
 Transmission of IPv6 Packets over Short-Range Optical Wireless Communications
 
 draft-choi-6lo-owc-02.txt
 Date: 04/03/2024
 Authors: Younghwan Choi, Cheol-min Kim, Carles Gomez
 Working Group: Individual Submissions (none)
IEEE 802.15.7, "Short-Range Optical Wireless Communications" defines wireless communication using visible light. It defines how data is transmitted, modulated, and organized in order to enable reliable and efficient communication in various environments. The standard is designed to work alongside other wireless communication systems and supports both line-of-sight (LOS) and non-line-of-sight (NLOS) communications. This document describes how IPv6 is transmitted over short-range optical wireless communications (OWC) using IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) techniques.
 Advertisement of Candidate Path Validity Control Parameters using BGP-LS
 
 draft-chen-idr-bgp-ls-sr-policy-cp-validity-01.txt
 Date: 01/03/2024
 Authors: Ran Chen, Detao Zhao, Ketan Talaulikar, Yisong Liu, Changwang Lin
 Working Group: Individual Submissions (none)
This document describes a mechanism to collect the configuration and states of SR policies carrying the validity control parameters of the candidate path by using BGP Link-State (BGP-LS) updates. Such information can be used by external components for path computation, re-optimization, service placement, etc.
 Generic Address Assignment Option for 6LowPAN Neighbor Discovery
 
 draft-iannone-6lo-nd-gaao-02.txt
 Date: 01/03/2024
 Authors: Luigi Iannone, Zhe Lou
 Working Group: Individual Submissions (none)
This document specifies a new extension to the IPv6 Neighbor Discovery in Low Power and Lossy Networks enabling a node to request to be assigned an address or a prefix from neighbor routers. Such mechanism allows to recursively assign addresses and prefixes to nodes in a 6LowPAN deployment.
 Some Refinements to Network Topologies (RFC8345)
 
 draft-davis-opsawg-some-refinements-to-rfc8345-01.txt
 Date: 10/01/2024
 Authors: Nigel Davis, Olga Havel, Benoit Claise
 Working Group: Individual Submissions (none)
This draft provides a brief analysis of the current unidirectional point-to-point approach to modeling of the link in RFC8345, highlights why this is not sufficient and makes a proposal to enhance RFC8345 YANG to support multipoint uni/bi links. The two alternative enhancement approaches proposed are backward compatible. The enhancement is such that it provides a uniform solution to modeling all links that could, over time, replace the current unidirectional point-to-point approach. The rationale for the change is based on many years of practical experience, including challenges using RFC8345 in actual solution development, and insight gained through other standardisation efforts and deployments.
 IPSec for BGP Enabled Services over SRv6
 
 draft-wang-bess-secservice-02.txt
 Date: 26/01/2024
 Authors: Haibo Wang, Linda Dunbar, Cheng Sheng, Hang Shi
 Working Group: Individual Submissions (none)
This document describes an approach to encrypting selective user data flows using IPsec and then orchestrating the encrypted flows based on the SRv6 Policy path. The method is needed for some users or applications that demand an elevated level of security, necessitating the encryption of their data flows even within networks like SRv6, which are built and managed by Network Service Providers (NSP) and generally considered secure. Employing encryption for selective flows over NSP managed networks, including technologies like SRv6, adds an extra layer of protection, safeguarding valuable data from potential breaches and enhancing overall network security.
 SAVI in an EVPN network
 
 draft-levyabegnoli-bess-evpn-savi-02.txt
 Date: 03/03/2024
 Authors: Eric Levy-Abegnoli, Pascal Thubert, Ratko Kovacina
 Working Group: Individual Submissions (none)
Source Address Validation procedures have been specified in the SAVI Working Group and provide a set of mechanisms and state machines to verify Source Address ownership. The main mechanisms are described in RFC6620 and RFC7513. RFC7432 and furthermore RFC9161 specify how an EVPN network could learn and distribute IP addressess. RFC9161 describes a mechanism by which the PE can proxy some ND messages based on this information. In this document, we review how these two sets of specifications and underlying mechanisms can interact to provide Source Address Validation in an EVPN network.
 VPN Inter-AS Option BC
 
 draft-zzhang-bess-vpn-option-bc-01.txt
 Date: 06/02/2024
 Authors: Zhaohui Zhang, Kireeti Kompella, Bruno Decraene, Luay Jalil
 Working Group: Individual Submissions (none)
RFC 4364 specifies protocol and procedures for BGP/MPLS IP Virtual Private Networks (VPNs), including different options (A/B/C) of Inter-AS support. This document specifies MPLS VPN Inter-AS Option BC that combines the advantages of Option B and Option C (and that removes the disadvantages of Option B and Option C). The same concept is applicable to Ethernet Virtual Private Network (EVPN) as well.
 Advertise NRP Group extensions for IGP
 
 draft-cheng-lsr-advertise-nrp-group-extensions-01.txt
 Date: 07/01/2024
 Authors: Weiqiang Cheng, Changwang Lin, Liyan Gong
 Working Group: Individual Submissions (none)
Network slicing provides the ability to partition a physical network into multiple isolated logical networks of varying sizes,structures, and functions so that each slice can be dedicated to specific services or customers. A Network Resource Partition (NRP) is a collection of resources in the underlay network. Each NRP is used as the underlay network construct to support one or a group of IETF network slice services. This document describes an IGP mechanism that is used to advertise a large number of NRPs into a smaller number of NRP groups.
 Additional MLS Credentials
 
 draft-barnes-mls-addl-creds-01.txt
 Date: 04/03/2024
 Authors: Richard Barnes, Suhas Nandakumar
 Working Group: Individual Submissions (none)
This specification defines two new kinds of credentials for use within the Message Layer Security (MLS) credential framework: UserInfo Verifiable Credentials and multi-credentials. UserInfo Verifiable Credentials allow clients to present credentials that associate OpenID Connect attributes to a signature key pair held by the client. Multi-credentials allow clients to present authenticated attributes from multiple sources, or to present credentials in different formats to support groups with heterogeneous credential support.
 EVPN Anycast Aliasing For Multi-Homing
 
 draft-rabnag-bess-evpn-anycast-aliasing-01.txt
 Date: 07/02/2024
 Authors: Jorge Rabadan, Kiran Nagaraj, Alex Nichol, Nick Morris
 Working Group: Individual Submissions (none)
The current Ethernet Virtual Private Network (EVPN) all-active multi- homing procedures in Network Virtualization Over Layer-3 (NVO3) networks provide the required Split Horizon filtering, Designated Forwarder Election and Aliasing functions that the network needs in order to handle the traffic to and from the multi-homed CE in an efficient way. In particular, the Aliasing function addresses the load balancing of unicast packets from remote Network Virtualization Edge (NVE) devices to the NVEs that are multi-homed to the same CE, irrespective of the learning of the CE's MAC/IP information on the NVEs. This document describes an optional optimization of the EVPN multi-homing Aliasing function - EVPN Anycast Aliasing - that is specific to the use of EVPN with NVO3 tunnels (i.e., IP tunnels) and, in typical Data Center designs, may provide savings in terms of data plane and control plane resources in the routers.
 A Transaction Ledger Verifiable Structure for COSE Merkle Tree Proofs
 
 draft-birkholz-cose-cometre-ccf-profile-01.txt
 Date: 12/01/2024
 Authors: Henk Birkholz, Antoine Delignat-Lavaud, Cedric Fournet
 Working Group: Individual Submissions (none)
This document defines a new verifiable data structure type for COSE Signed Merkle Tree Proofs specifically designed for transaction ledgers produced by Trusted Execution Environments (TEEs) to provide stronger tamper-evidence guarantees.
 Additional Formats of Authentication Credentials for the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)
 
 draft-tiloca-ace-authcred-dtls-profile-01.txt
 Date: 10/01/2024
 Authors: Marco Tiloca, John Mattsson
 Working Group: Individual Submissions (none)
This document updates the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE). In particular, it specifies the use of additional formats of authentication credentials for establishing a DTLS session, when peer authentication is based on asymmetric cryptography. Therefore, this document updates RFC 9202. What is defined in this document is seamlessly applicable also if the profile uses Transport Layer Security (TLS) instead, as defined in RFC 9430.
 PCEP extension to support Candidate Paths validity
 
 draft-chen-pce-sr-policy-cp-validity-01.txt
 Date: 01/03/2024
 Authors: Ran Chen, Detao Zhao, Samuel Sidor, Mike Koldychev, Zafar Ali
 Working Group: Individual Submissions (none)
This document defines PCEP extensions for signaling the validity control parameters of a candidate path for an SR Policy.
 Computing-Aware Traffic Steering (CATS) Using Segment Routing
 
 draft-lbdd-cats-dp-sr-01.txt
 Date: 11/01/2024
 Authors: Cheng Li, Mohamed Boucadair, Zongpeng Du, John Drake
 Working Group: Individual Submissions (none)
This document describes a solution that adheres to the Computing- Aware Traffic Steering (CATS) framework. The solution uses anycast IP addresses as the CATS service identifier and Segment Routing (SR) as the data plane encapsulation to achieve computing-aware traffic steering among multiple services instances.
 Adaptive Stateless TE Multicast
 
 draft-chen-pim-adaptive-te-03.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Mike McBride, Yanhe Fan, Zhenbin Li, Xuesong Geng, Mehmet Toy, Gyan Mishra, Yisong Liu, Aijun Wang, Lei Liu, Xufeng Liu
 Working Group: Individual Submissions (none)
This document describes a multicast solution which provides adaptive stateless traffic engineering along an explicit P2MP path/tree. Each portion of the tree is encoded by a most efficient encoding method. A tree portion includes all or some of the links/branches/subtrees from any number of nodes on the tree. An IPv6 extension header is used to encapsulate a packet which is to be multicast at the ingress. The overhead of the encapsulated packet is minimal. The packet is delivered to the egresses along the tree. There is no state stored in the core of the network.
 Merkle Tree Ladder Mode (MTL) Signatures
 
 draft-harvey-cfrg-mtl-mode-02.txt
 Date: 12/12/2023
 Authors: Joe Harvey, Burt Kaliski, Andrew Fregly, Swapneel Sheth
 Working Group: Individual Submissions (none)
This document provides an interoperable specification for Merkle tree ladder (MTL) mode, a technique for using an underlying signature scheme to authenticate an evolving series of messages. MTL mode can reduce the signature scheme's operational impact. Rather than signing messages individually, the MTL mode of operation signs structures called "Merkle tree ladders" that are derived from the messages to be authenticated. Individual messages are then authenticated relative to the ladder using a Merkle tree authentication path and the ladder is authenticated using the public key of the underlying signature scheme. The size and computational cost of the underlying signatures are thereby amortized across multiple messages, reducing the scheme's operational impact. The reduction can be particularly beneficial when MTL mode is applied to a post-quantum signature scheme that has a large signature size or computational cost. As an example, the document shows how to use MTL mode with SPHINCS+ (and the SLH-DSA subset specified in the draft FIPS 205), the stateless hash-based signature scheme selected by NIST for standardization. Like other Merkle tree techniques, MTL mode's security is based only on cryptographic hash functions, so the mode is quantum-safe based on the quantum-resistance of its cryptographic hash functions.
 IGP for Temporal Links
 
 draft-chen-lsr-tl-02.txt
 Date: 28/03/2024
 Authors: Huaimo Chen, Aijun Wang, Gyan Mishra, Zhenqiang Li, Yanhe Fan, Xufeng Liu, Lei Liu
 Working Group: Individual Submissions (none)
This document specifies extensions to OSPF and IS-IS for temporal links whose costs are functions of time.
 Datagram Transport Layer Security (DTLS) 1.3 for Stream Control Transmission Protocol (SCTP)
 
 draft-tuexen-tsvwg-rfc6083-bis-04.txt
 Date: 04/03/2024
 Authors: Michael Tuexen, Hannes Tschofenig
 Working Group: Individual Submissions (none)
This document describes the usage of the Datagram Transport Layer Security (DTLS) 1.3 protocol over the Stream Control Transmission Protocol (SCTP). DTLS 1.3 over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery. Applications using DTLS 1.3 over SCTP can use almost all transport features provided by SCTP and its extensions.
 Integrating YANG Configuration and Management into an Abstraction and Control of TE Networks (ACTN) System for Optical Networks
 
 draft-gstk-ccamp-actn-optical-transport-mgmt-03.txt
 Date: 12/04/2024
 Authors: Adrian Farrel, Daniel King, XingZhao, Chaode Yu
 Working Group: Individual Submissions (none)
Many network technologies are operated as Traffic Engineered (TE) networks. Optical networks are a particular case, and have complex technology-specific details. Abstraction and Control of TE Networks (ACTN) is a management architecture that abstracts TE network resources to provide a limited network view for customers to request and self-manage connectivity services. It also provides functional components to orchestrate and operate the network. Management of legacy optical networks is often provided via Fault, Configuration, Accounting, Performance, and Security (known as FCAPS) using mechanisms such as the Multi-Technology Operations System Interface (MTOSI) and the Common Object Request Broker Architecture (CORBA). FCAPS can form a critical part of configuration management and service assurance for network operations. However, the ACTN architecture as described in RFC 8453 does not include consideration of FCAPS. This document enhances the ACTN architecture as applied to optical networks by introducing support for FCAPS. It considers which elements of existing IETF YANG work can be used to solve existing scenarios and emerging technologies, and what new work may be needed. In doing so, this document adds fine-grained network management to the ACTN architecture. This enhanced architecture may then be used to evolve networks from CORBA and MTOSI FCAPS interfaces to IETF- based YANG and RESTful API capabilities.
 Routing in Dragonfly+ Topologies
 
 draft-agt-rtgwg-dragonfly-routing-01.txt
 Date: 04/03/2024
 Authors: Dmitry Afanasiev, Roman, Jeff Tantsura
 Working Group: Individual Submissions (none)
This document provides an overview of Dragonfly+ network topology and describes routing implementation for IP networks with Dragonfly+ topology with support for non-minimal routing.t
 MIMI Portability
 
 draft-kohbrok-mimi-portability-01.txt
 Date: 04/01/2024
 Authors: Konrad Kohbrok, Raphael Robert
 Working Group: Individual Submissions (none)
This document describes MIMI Portability mechanisms.
 MIMI Attachments
 
 draft-robert-mimi-attachments-01.txt
 Date: 04/01/2024
 Authors: Raphael Robert, Konrad Kohbrok
 Working Group: Individual Submissions (none)
This document describes MIMI Attachments.
 Maintaining Protocols Using Grease and Variability
 
 draft-edm-protocol-greasing-03.txt
 Date: 07/05/2024
 Authors: Lucas Pardue
 Working Group: Individual Submissions (none)
Long-term interoperability of protocols is an important goal of the network standards process. Deployment success can depend on supporting change, which can include modifying how the protocol is used, extending the protocol, or replacing the protocol. This document presents concepts, considerations, and techniques related to protocol maintenance, such as greasing or variability. The intended audience is protocol designers and implementers.
 Crowd Sourced Remote ID
 
 draft-wiethuechter-drip-csrid-02.txt
 Date: 10/04/2024
 Authors: Robert Moskowitz, Adam Wiethuechter
 Working Group: Individual Submissions (none)
This document describes a way for an Internet connected device to forward/proxy received Broadcast Remote ID into UAS Traffic Management (UTM). This is done through a Supplemental Data Service Provider (SDSP) that takes Broadcast Remote ID in from Finder and provides an aggregated view using Network Remote ID data models and protocols. This enables more comprehensive situational awareness and reporting of Unmanned Aircraft (UA) in a "crowd sourced" manner.
 Privacy Pass Token Expiration Extension
 
 draft-hendrickson-privacypass-expiration-extension-02.txt
 Date: 18/03/2024
 Authors: Scott Hendrickson, Christopher Wood
 Working Group: Individual Submissions (none)
This document describes an extension for Privacy Pass that allows tokens to encode expiration information.
 Using QUIC to traverse NATs
 
 draft-seemann-quic-nat-traversal-02.txt
 Date: 03/03/2024
 Authors: Marten Seemann, Eric Kinnear
 Working Group: Individual Submissions (none)
QUIC is well-suited to various NAT traversal techniques. As it operates over UDP, and because the QUIC header was designed to be demultipexed from other protocols, STUN can be used on the same UDP socket, enabling ICE to be used with QUIC. Furthermore, QUIC’s path validation mechanism can be used to test the viability of an address candidate pair while at the same time creating the NAT bindings required for a direction connection, after which QUIC connection migration can be used to migrate the connection to a direct path.
 Packed CBOR: Table set up by reference
 
 draft-amsuess-cbor-packed-by-reference-02.txt
 Date: 04/03/2024
 Authors: Christian Amsuess
 Working Group: Individual Submissions (none)
Packed CBOR is a compression mechanism for Concise Binary Object Representation (CBOR) that can be used without a decompression step. This document introduces a means for setting up its tables by means of dereferencable identifiers, and introduces a pattern of using it without sending long identifiers.
 Tolerating Mailing-List Modifications
 
 draft-chuang-mailing-list-modifications-04.txt
 Date: 20/02/2024
 Authors: Wei Chuang
 Working Group: Individual Submissions (none)
Mailing-lists distribute email to multiple recipients by forwarding and potentially modifying messages to document the distribution to the recipients. Unfortunately forwarding breaks SPF (RFC7208) authentication and message modification breaks DKIM (RFC6376) authentication. This document is based on ARC (RFC8617) to provide a framework to describe forwarding with extensions to tolerate common mailing-list message modifications. This specification characterizes the mailing-list transforms such that a receiver can reverse them to enable digital signatures verification and attribution of the message content. These message modifications are: 1) adding a description string to the Subject header, 2) rewriting the From header, 3) removing the original DKIM-Signature and 4) appending a footer to the message body. This also specifies those modifications for the purpose of making them reversible.
 Guide for building an EC PKI
 
 draft-moskowitz-ec-pki-02.txt
 Date: 01/02/2024
 Authors: Robert Moskowitz, Henk Birkholz, Michael Richardson
 Working Group: Individual Submissions (none)
This memo provides a guide for building a PKI (Public Key Infrastructure) of EC certificates using openSSL. Certificates in this guide can use either ECDSA or EdDSA. Along with common End Entity certificates, this guide provides instructions for creating IEEE 802.1AR iDevID Secure Device certificates.
 The Restatement Anti-Pattern
 
 draft-bormann-restatement-01.txt
 Date: 02/03/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
Normative documents that cite other normative documents often _restate_ normative content extracted out of the cited document in their own words. The present memo explains why this can be an Antipattern, and how it can be mitigated.
 CBOR: On Deterministic Encoding
 
 draft-bormann-cbor-det-02.txt
 Date: 03/03/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
CBOR (STD 94, RFC 8949) defines "Deterministically Encoded CBOR" in its Section 4.2. The present document provides additional information about use cases, deployment considerations, and implementation choices for Deterministic Encoding.
 Associated Gateway Exchange in Multi-segment SD-WAN
 
 draft-sheng-idr-gw-exchange-in-sd-wan-02.txt
 Date: 29/02/2024
 Authors: Cheng Sheng, Hang Shi, Linda Dunbar, Gyan Mishra
 Working Group: Individual Submissions (none)
The document describes the control plane enhancement for multi- segment SD-WAN to exchange the associated GW information between edges. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the Inter-Domain Routing Working Group mailing list (idr@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/idr/. Source for this draft and an issue tracker can be found at https://github.com/VMatrix1900/draft-sheng-idr-gw-exchange-in-sd-wan.
 ESP Echo Protocol
 
 draft-colitti-ipsecme-esp-ping-02.txt
 Date: 04/04/2024
 Authors: Lorenzo Colitti, Jen Linkova, Michael Richardson
 Working Group: Individual Submissions (none)
This document defines an ESP echo function which can be used to detect whether a given network path supports ESP packets.
 End Marker in 5G Data Network
 
 draft-zzhang-dmm-5gdn-end-marker-01.txt
 Date: 06/02/2024
 Authors: Zhaohui Zhang, Marco Liebsch, Tianji Jiang
 Working Group: Individual Submissions (none)
In a mobile network, when a mobile device (referred to as User Equipment or UE) moves from one Access Node (source AN) to another (target AN), the anchoring node that connects the UE to the Data Network sends an End Marker to the source AN after it starts sending UE traffic towards the target AN. The target AN buffers the data until it receives the End Marker forwarded by the source AN. This is to preserve the order of packets during the handover between ANs. The anchoring node is referred to as User Plane Function (UPF) in 5G and it is a Network Function of the mobile network. The UPFs are traditionally centrally deployed but are more and more distributed closer to the edge. With distributed UPFs, handover becomes necessary among UPFs, and the End Marker mechanism may need to be extended to Data Network devices that are not mobile network functions. This document discusses the problem and proposes a solution based on ICMP messages if packet ordering needs to be preserved during handover between UPFs.
 Computing-Aware Traffic Steering (CATS) Using LISP
 
 draft-kjsun-cats-lisp-01.txt
 Date: 22/01/2024
 Authors: Sun Kj, Tran Ngoc, Ha-Duong Phung, Younghan Kim
 Working Group: Individual Submissions (none)
This document describes the usage of Locator/ID Separation Protocol (LISP) as a solution to implement Computing-Aware Traffic Steering (CATS). How LISP meets CATS requirements and how it fits to the control plane and data plane of CATS framework are presented.
 ACME PQC Algorithm Negotiation
 
 draft-giron-acme-pqcnegotiation-03.txt
 Date: 16/02/2024
 Authors: Alexandre Giron
 Working Group: Individual Submissions (none)
ACME is a critical protocol for accelerating HTTPS adoption on the Internet, automating digital certificate issuing for web servers. Because RFC 8555 assumes that both sides (client and server) support the primary cryptographic algorithms necessary for the certificate, ACME does not include algorithm negotiation procedures. However, in light of Post-Quantum Cryptography (PQC), many signature algorithm alternatives can be used, allowing for different trade-offs (e.g., signature vs. public key size). In addition, alternative PQC migration strategies exist, such as KEMTLS, which employs KEM public keys for authentication. This document describes an algorithm negotiation mechanism for ACME. The negotiation allows different strategies and provides KEMTLS certificate issuing capabilities.
 The Requirements of a Unified Transport Protocol for In-Network Computing in Support of RPC-based Applications
 
 draft-song-inc-transport-protocol-req-01.txt
 Date: 24/01/2024
 Authors: Haoyu Song, Wenfei Wu, Dirk Kutscher
 Working Group: Individual Submissions (none)
In-network computing breaks the end-to-end principle and introduces new challenges to the transport layer functionalities. This draft provides the background of a suite of RPC-based applications which can take advantage of INC support, surveys the existing transport protocols to show they are insufficient or improper to be used in this context, and lays out the requirements to develop a general transport protocol tailored for such applications. The purpose of this draft is to help understand the problem domain and inspire the design and development a unified INC transport protocol.
 Signaling Additional SRTP Context information via SDP
 
 draft-davis-mmusic-srtp-assurance-03.txt
 Date: 10/01/2024
 Authors: Kyzer Davis, Esteban Valverde, Gonzalo Salgueiro
 Working Group: Individual Submissions (none)
This document specifies additional cryptographic attributes for signaling additional Secure Real-time Transport Protocol (SRTP) cryptographic context information via the Session Description Protocol (SDP) in alongside those defined by RFC4568. The SDP extension defined in this document address situations where the receiver needs to quickly and robustly synchronize with a given sender. The mechanism also enhances SRTP operation in cases where there is a risk of losing sender-receiver synchronization.
 Hybrid IANA Registration Policy
 
 draft-klensin-iana-consid-hybrid-02.txt
 Date: 09/02/2024
 Authors: John Klensin
 Working Group: Individual Submissions (none)
The current Guidelines for Writing an IANA Considerations Section in RFCs specifies ten well-known registration policies. Since it was published in 2017, the IETF's focus for many registries has evolved away from the notion of strong IETF review and consensus toward trying to be sure names are registered to prevent conflicts. Several of the policies that were heavily used in the past appear to present too high a barrier to getting names into registries to prevent accidental reuse of the same strings. This specifies an eleventh well-known policy that avoids the implied tension, essentially combining two of the existing policies.
 Route Target ORF
 
 draft-xu-idr-route-target-orf-01.txt
 Date: 25/04/2024
 Authors: Xiaohu Xu, Shraddha Hegde, Srihari Sangli, Shunwan Zhuang, Jie Dong
 Working Group: Individual Submissions (none)
This document defines a new Outbound Router Filter (ORF) type for BGP, referred to as "Route Target Outbound Route Filter", that can be used to perform route target based route filtering.
 Framework for CID Flow Indicator (CIDFI)
 
 draft-wing-cidfi-04.txt
 Date: 14/12/2023
 Authors: Dan Wing, Tirumaleswar Reddy.K, Mohamed Boucadair
 Working Group: Individual Submissions (none)
Host-to-network signaling and network-to-host signaling can improve the user experience to adapt to network's constraints and share expected application needs, and thus to provide differentiated service to a flow and to packets within a flow. The differentiated service may be provided at the network (e.g., packet prioritization), the server (e.g., adaptive transmission), or both. This document describes how clients can communicate with their nearby network elements so they can learn network constraints. Optionally, with QUIC server support their incoming QUIC packets can be mapped to metadata about their contents so packet importance can influence both intentional and reactive management policies. The framework handles both directions of a flow.
 KEM-based pre-shared-key handshakes for TLS 1.3
 
 draft-wiggers-tls-authkem-psk-01.txt
 Date: 15/04/2024
 Authors: Thom Wiggers, Sofia Celi, Peter Schwabe, Douglas Stebila, Nick Sullivan
 Working Group: Individual Submissions (none)
This document gives a construction in which (long-term) KEM public keys are used in the place of TLS PSK keys, avoiding concerns that may affect systems that use symmetric-key-based PSK, such as requiring key diversification and protection of symmetric-keys' confidentiality. This mechanism is inspired by AuthKEM (and could use AuthKEM certificate public keys for resumption), but can be independently implemented.
 First-Party Approved Third-Party Certifications in OpenPGP
 
 draft-dkg-openpgp-1pa3pc-01.txt
 Date: 01/03/2024
 Authors: Daniel Gillmor
 Working Group: Individual Submissions (none)
An OpenPGP certificate can grow in size without bound when third- party certifications are included. This document describes a way for the owner of the certificate to explicitly approve of specific third- party certifications, so that relying parties can safely prune the certificate of any unapproved certifications.
 Unicode Character Repertoire Subsets
 
 draft-bray-unichars-08.txt
 Date: 27/04/2024
 Authors: Tim Bray, Paul Hoffman
 Working Group: Individual Submissions (none)
This document discusses specifying subsets of the Unicode character repertoire for use in protocols and data formats. It also specifies those subsets in as PRECIS profiles.
 BBS for PrivacyPass
 
 draft-ladd-privacypass-bbs-01.txt
 Date: 26/02/2024
 Authors: Watson Ladd
 Working Group: Individual Submissions (none)
Existing token types in privacy pass conflate attribution with rate limiting. This document describes a token type where the issuer attests to a set of properties of the client, which the client can then selectively prove to the origin. Repeated showings of the same credential are unlinkable, unlike other token types in privacy pass.
 JSON semantic format (JSON-NTV)
 
 draft-thomy-json-ntv-02.txt
 Date: 19/12/2023
 Authors: Philippe Thomy
 Working Group: Individual Submissions (none)
This document describes a set of simple rules for unambiguously and concisely encoding semantic data into JSON Data Interchange Format. These rules are based on an NTV (Named and Typed Values) data structure applicable to any simple or complex data. The JSON-NTV format is its JSON translation.
 Infight Removal of IPv6 Hop-by-Hop and Routing Headers
 
 draft-herbert-eh-inflight-removal-04.txt
 Date: 22/02/2024
 Authors: Tom Herbert
 Working Group: Individual Submissions (none)
This document specifies an experimental method to allow routers to remove IPv6 Hop-by-Hop Options or Routing headers from packets in- flight. The goal is to reduce the probability of packets being dropped because they contain extension headers, without adversely impacting functionality. An additional goal is to limit visibility of information in extension headers to those nodes that need to process the headers.
 Signaling MNA Capability Using IGP and BGP-LS
 
 draft-chen-lsr-mpls-mna-capability-01.txt
 Date: 01/03/2024
 Authors: Ran Chen, Detao Zhao
 Working Group: Individual Submissions (none)
This document defines a mechanism to signal MNA Capability using IGP and Border Gateway Protocol-Link State(BGP-LS).
 MIMI Discovery Requirements and Considerations
 
 draft-rosenberg-mimi-discovery-reqs-01.txt
 Date: 04/03/2024
 Authors: Jonathan Rosenberg, Jon Peterson
 Working Group: Individual Submissions (none)
This document defines requirements and use cases for the discovery problem in the More Instant Messaging Interoperability (MIMI) working group. The discovery problem refers to the process by which a message sender can identify the provider(s) associated with a desired messaging recipient, who is normally identified by an email address or phone number.
 The eap.arpa domain and EAP provisioning
 
 draft-dekok-emu-eap-arpa-01.txt
 Date: 25/02/2024
 Authors: Alan DeKok
 Working Group: Individual Submissions (none)
This document defines the eap.arpa domain as a way for EAP peers to signal to EAP servers that they wish to obtain limited, and unauthenticated, network access. EAP peers leverage user identifier portion of the Network Access Identifier (NAI) format of RFC7542 in order to describe what kind of provisioning they need. A table of identifiers and meanings is defined.
 Use Cases for SPICE
 
 draft-prorock-spice-use-cases-01.txt
 Date: 03/03/2024
 Authors: Michael Prorock, Brent Zundel
 Working Group: Individual Submissions (none)
This document describes various use cases related to credential exchange in a three party model (issuer, holder, verifier). These use cases aid in the identification of which Secure Patterns for Internet CrEdentials (SPICE) are most in need of specification or detailed documentation.
 Congestion Signaling (CSIG)
 
 draft-ravi-ippm-csig-01.txt
 Date: 02/02/2024
 Authors: Abhiram Ravi, Nandita Dukkipati, Naoshad Mehta, Jai Kumar
 Working Group: Individual Submissions (none)
This document presents Congestion Signaling (CSIG), an in-band network telemetry protocol that allows end-hosts to obtain visibility into fine-grained network signals for congestion control, traffic management, and network debuggability in the network. CSIG provides a simple, low-overhead, and extensible packet header mechanism to obtain fixed-length summaries from bottleneck devices along a packet path. This summarized information is collected over L2 CSIG-tags in a compare-and-replace manner across network devices along the path. Receivers can reflect this information back to senders via L4+ CSIG reflection headers. CSIG builds upon the successful aspects of prior work such as switch in-band network telemetry (INT) that incorporates multibit signals in live data packets. At the same time, CSIG's end-to-end mechanism for carrying the signals via fixed size header is simple, practical and deployable akin to Explicit Congestion Notification (ECN). In addition to a detailed description of the end-to-end protocol, this document also motivates the use cases for CSIG and the rationale for design choices made in CSIG. It describes a set of signals of interest to applications (minimum available bandwidth, maximum link utilization, and maximum hop delay), methods to compute these signals in network devices, and how these signals can be leveraged in applications. Additionally, it describes how attributes about the bottleneck's location can be carried and made useful to applications. It also provides the framework to incorporate future signals. Finally, this document addresses incremental deployment, backward compatibility and nuances of CSIG's applicability in a range of scenarios.
 COSE Header Parameter for Carrying OpenID Federation 1.0 Trust Chains
 
 draft-demarco-cose-header-federation-trust-chain-01.txt
 Date: 05/02/2024
 Authors: Giuseppe De Marco, John Bradley
 Working Group: Individual Submissions (none)
The CBOR Object Signing and Encryption (COSE) [RFC9053] message structure uses message headers to give references to elements that are needed for the security and verifiability of the message, such as algorithms and keys. OpenID Federation 1.0 [OIDC-FED] is a general purpose attestation mechanism to obtain verifiable metadata and cryptographic keys. This document defines a new COSE header parameter to identify and transport an OpenID Federation 1.0 Trust Chain.
 Intelligent Routing Method of SR Policy
 
 draft-yang-spring-sr-policy-intelligent-routing-01.txt
 Date: 25/03/2024
 Authors: Feng Yang, Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
Segment Routing is a source routing paradigm that explicitly indicates the forwarding path for packets at the ingress node. An SR Policy is associated with one or more candidate paths, and each candidate path is either dynamic, explicit or composite. This document describes an intelligent routing method for SR Policy based on network quality in MPLS and IPv6 environments.
 Revisiting the Use of the IP Protocol Stack in Deep Space: Assessment and Possible Solutions
 
 draft-many-deepspace-ip-assessment-01.txt
 Date: 04/03/2024
 Authors: Marc Blanchet, Christian Huitema, Dean Bogdanovic
 Working Group: Individual Submissions (none)
Deep space communications involve long delays (e.g., Earth to Mars is 4-20 minutes) and intermittent communications, because of orbital dynamics. Up to now, communications have been done on a layer-2 point to point basis, with sometimes the use of relays, therefore no layer-3 networking was possible. RFC4838 reports an assessment done around 25 years ago concluding that the IP protocol stack was not suitable for deep space networking. This result lead to the definition of a new protocol stack based on a store-and-forward paradigm implemented in the Bundle Protocol(BP). More recently, space agencies are planning to deploy IP networks on celestial bodies, such as Moon or Mars, ground, and vicinity. This document revisits the initial assessment of not using IP and provides solution paths to use the IP protocol stack, from IP forwarding to transport to applications to network management, in deep space communications.
 Terminal-based joint selection and configuration of MEC host and RAW network
 
 draft-bernardos-detnet-raw-joint-selection-raw-mec-01.txt
 Date: 07/04/2024
 Authors: Carlos Bernardos, Alain Mourad
 Working Group: Individual Submissions (none)
There are several scenarios involving multi-hop heterogeneous wireless networks requiring reliable and available features combined with multi-access edge computing, such as Industry 4.0. This document discusses mechanisms to allow a terminal influencing the selection of a MEC host for instantiation of the terminal-targeted MEC applications and functions, and (re)configuring the RAW network lying in between the terminal and the selected MEC host. This document assumes IETF RAW and ETSI MEC integration, fostering discussion about extensions at both IETF and ETSI MEC to better support these scenarios.
 Extensions to enable wireless reliability and availability in multi-access edge deployments
 
 draft-bernardos-detnet-raw-mec-01.txt
 Date: 07/04/2024
 Authors: Carlos Bernardos, Alain Mourad
 Working Group: Individual Submissions (none)
There are several scenarios involving multi-hop heterogeneous wireless networks requiring reliable and available features combined with multi-access edge computing, such as Industry 4.0. This document describes solutions integrating IETF RAW and ETSI MEC, fostering discussion about extensions at both IETF and ETSI MEC to better support these scenarios.
 MIPv6 RAW mobility
 
 draft-bernardos-detnet-raw-mobility-01.txt
 Date: 07/04/2024
 Authors: Carlos Bernardos, Alain Mourad
 Working Group: Individual Submissions (none)
There are several use cases where reliability and availability are key requirements for wireless heterogeneous networks in which connected devices might be mobile, such as eXtended Reality (XR). This document discusses and specifies control plane solutions to cope with mobility, by proactively preparing the network for the change of point of attachment of a connected mobile node. It also defines Mobile IPv6 extensions implementing these control plane solutions.
 RAW multidomain extensions
 
 draft-bernardos-detnet-raw-multidomain-01.txt
 Date: 07/04/2024
 Authors: Carlos Bernardos, Alain Mourad
 Working Group: Individual Submissions (none)
This document describes the multi-domain RAW problem and explores and proposes some extensions to enable RAW multi-domain operation.
 Path Energy Traffic Ratio API (PETRA)
 
 draft-petra-path-energy-api-01.txt
 Date: 18/03/2024
 Authors: Alberto Rodriguez-Natal, Luis Contreras, Alejandro Muniz, Marisol Palmero, Fernando Munoz
 Working Group: Individual Submissions (none)
This document describes an API to query a network regarding its Energy Traffic Ratio for a given path.
 JMAP extension for S/MIME signing and encryption
 
 draft-melnikov-jmap-smime-sender-extensions-alt-06.txt
 Date: 04/03/2024
 Authors: Alexey Melnikov
 Working Group: Individual Submissions (none)
This document specifies an extension to JMAP for sending S/MIME signed and/or S/MIME encrypted messages, as well as automatic decryption of received S/MIME messages. [[This version presents an alternative syntax to revision 04 of https://datatracker.ietf.org/doc/draft-ietf-jmap-smime-sender- extensions/]]
 UAS Serial Numbers in DNS
 
 draft-wiethuechter-drip-uas-sn-dns-01.txt
 Date: 04/12/2023
 Authors: Adam Wiethuechter
 Working Group: Individual Submissions (none)
This document describes a way Uncrewed Aerial System (UAS) Serial Numbers are placed into and retrieved from the Domain Name System (DNS). This is to directly support DRIP-based Serial Numbers.
 Model and Test Methods for LTE-V2X Physical Layer Key Distribution System
 
 draft-yu-keydistribution-02.txt
 Date: 14/04/2024
 Authors: Yanzhao Yang, Peng Guo, Jiabao Yu, Aiqun Hu
 Working Group: Individual Submissions (none)
There are several key distribution systems based on the physical layer of the LTE Vehicle-to-Everything (V2X) communication system, utilizing the random and high-agreement secret key generation schemes from noisy wideband channels. These systems are used in conjunction with physical layer authentication systems that are also based on physical characteristics. To characterize these systems, this document proposes a reference model and several test methods of main technical parameters of such systems, including average key generation rate as well as the consistency and the randomness of generated key bits.
 PREOF IOAM Method for Deterministic Network Service Sub-layer
 
 draft-qian-detnet-preof-ioam-01.txt
 Date: 19/03/2024
 Authors: Xiaocong Qian, Quan Xiong, Fenlin Zhou
 Working Group: Individual Submissions (none)
This document proposes an active IOAM method to PREOF monitor and troubleshoot for Deterministic Networking (DetNet) in its service sub-layer. The method uses a special PREOF-TRACE message to collect multiple types of information from the target flow's PREOF entities and to record them in the packet, and uses a PREOF-RESPONCE message to feed them back to the head node. It assists the DetNet to monitor and maintain the PREOF for the traffic flow.
 More Instant Messaging Interoperability (MIMI) Policy
 
 draft-ralston-mimi-policy-01.txt
 Date: 22/03/2024
 Authors: Travis Ralston, Matthew Hodgson
 Working Group: Individual Submissions (none)
This document specifies an authorization policy framework for the More Instant Messaging Interoperability (MIMI) working group's transport protocol. It makes use of a Role-Based Access Control (RBAC) mechanism to grant/deny permissions to users, clients, and servers.
 Email Feedback Reports for DKIM Signers
 
 draft-brotman-dkim-fbl-02.txt
 Date: 26/03/2024
 Authors: Alex Brotman
 Working Group: Individual Submissions (none)
Mechanism to discover a destination used to deliver user-supplied FBL reports to an original DKIM signer or other responsible parties. This allows the reporting entity to deliver reports for each party which has affixed a validating DKIM signature. The discovery is made via DNS and the record is constructed using items within the DKIM signature in the message.
 TLS Key Share Prediction
 
 draft-davidben-tls-key-share-prediction-01.txt
 Date: 17/03/2024
 Authors: David Benjamin
 Working Group: Individual Submissions (none)
This document defines a mechanism for servers to communicate key share preferences in DNS. Clients may use this information to reduce TLS handshake round-trips.
 Common Catalog Format for moq-transport
 
 draft-wilaw-moq-catalogformat-02.txt
 Date: 30/11/2023
 Authors: Suhas Nandakumar, Will Law, Mo Zanaty
 Working Group: Individual Submissions (none)
This specification defines a Common Catalog specification for streaming formats implementing the MOQ Transport Protocol [MoQTransport]. Media over QUIC Transport (MOQT) defines a publish/ subscribe based unified media delivery protocol for delivering media for streaming and interactive applications over QUIC. The catalog describes the content made available by a publisher, including information necessary for subscribers to select, subscribe and initialize tracks.
 Constraining RPKI Trust Anchors
 
 draft-snijders-constraining-rpki-trust-anchors-05.txt
 Date: 17/04/2024
 Authors: Job Snijders, Theo Buehler
 Working Group: Individual Submissions (none)
This document describes an approach for Resource Public Key Infrastructure (RPKI) Relying Parties (RPs) to impose locally configured Constraints on cryptographic products subordinate to publicly-trusted Trust Anchors (TAs), as implemented in OpenBSD's rpki-client validator. The ability to constrain a Trust Anchor operator's effective signing authority to a limited set of Internet Number Resources (INRs) allows Relying Parties to enjoy the potential benefits of assuming trust - within a bounded scope.
 BGP Community-based Attacks and Community Origin Authentication
 
 draft-liu-sidrops-community-authentication-01.txt
 Date: 24/03/2024
 Authors: Yunhao Liu, Jessie Wang, Yangyang Wang, Mingwei Xu
 Working Group: Individual Submissions (none)
BGP community usage has continued to increase during the past decade. Unfortunately, while BGP community is a seemingly innocuous feature, it can be used to influence routing in unintended ways. Existing defense mechanisms are insufficient to prevent community-based attacks. This document describes some of the scenarios that may be used to launch these attacks and make recommendations on practices that may defend them. In particular, this document proposes SecCommunity, an extension to the Border Gateway Protocol (BGP) that can authenticate the ASes who added action community values on the announcements.
 Resource Guarantee for SRv6 Policies
 
 draft-cheng-spring-srv6-policy-resource-gurantee-03.txt
 Date: 21/04/2024
 Authors: Weiqiang Cheng, Jiang Wenying, Ran Chen, Detao Zhao, Changwang Lin
 Working Group: Individual Submissions (none)
This document defines a new SRv6 Endpoint behavior which can be used to associate with a set of network resource partition (e.g. bandwidth, buffer and queue resources ) Programming, called End.NRP. By using the End.NRP SID to build its segment list , the SRv6 policy has the capability to program network resources and achieve strict SLA guarantees.
 SCION Data Plane
 
 draft-dekater-scion-dataplane-01.txt
 Date: 04/03/2024
 Authors: Corine de Kater, Nicola Rustignoli, Samuel Hitz
 Working Group: Individual Submissions (none)
This document describes the data plane of the path-aware, inter- domain network architecture SCION (Scalability, Control, and Isolation On Next-generation networks). One of the basic characteristics of SCION is that it gives path control to endpoints. The SCION control plane is responsible for discovering these paths and making them available as path segments to the endpoints. The responsibility of the *SCION data plane* is to combine the path segments into end-to-end paths, and forward data between endpoints according to the specified path. The SCION data plane fundamentally differs from today's IP-based data plane in that it is _path-aware_: In SCION, interdomain forwarding directives are embedded in the packet header. This document first provides a detailed specification of the SCION data packet format as well as the structure of the SCION header. SCION also supports extension headers - these are described, too. The document then shows the life cycle of a SCION packet while traversing the SCION Internet. This is followed by a specification of the SCION path authorization mechanisms and the packet processing at routers. SCION also includes its own protocol to communicate failures to endpoints, the SCION Control Message Protocol (SCMP). This protocol will be described in a separate document, which will follow later.
 External Keys For Use In Internet X.509 Certificates
 
 draft-ounsworth-lamps-pq-external-pubkeys-03.txt
 Date: 02/04/2024
 Authors: Mike Ounsworth, Markku-Juhani Saarinen, John Gray, D. Hook
 Working Group: Individual Submissions (none)
Many of the post quantum cryptographic algorithms have large public keys. In the interest of reducing bandwidth of transitting X.509 certificates, this document defines new public key and algorithms for referencing external public key data by hash, and location, for example URL. This mechanism is designed to mimic the behaviour of an Authority Information Access extension.
 BGP Operations for Inter-domain SAV
 
 draft-song-savnet-inter-domain-bgp-ops-02.txt
 Date: 17/04/2024
 Authors: Xueyan Song, Chunning Dai, 1211176911910469110103, Changwang Lin
 Working Group: Individual Submissions (none)
This document attempts to present deployment considerations of source address validation using BGP protocol in inter-domain network.
 Information Awareness System for Computing-Aware Service Function Chain (IAS-CASFC): Security Service Aspect
 
 draft-wang-cats-awareness-system-for-casfc-01.txt
 Date: 01/04/2024
 Authors: Weilin Wang, Hua-chun Zhou, Jingfu Yan
 Working Group: Individual Submissions (none)
This document describes the Information Awareness System of the Computing-Aware Service Function Chain (ISA-CASFC) from the security service aspect, including the system architecture, network, and computing information details. The SFC enables traffic to pass through the ordered Network Security Function (NSF) path, enabling end-to-end security services. Differences in the available network and computing resources cause performance differences between NSF instances deployed on different service sites. It can be seen that the routing decision on NSF instances will affect the quality of the security service. Therefore, it is necessary to implement the CA-SFC to ensure the quality of security service. This document extends the CATS framework and the CATS Computing and Network Information Awareness (CNIA) architecture for CA-SFC, and describes the network and computing information content for security service.
 OpenPGP HTTP Keyserver Protocol
 
 draft-gallagher-openpgp-hkp-04.txt
 Date: 04/03/2024
 Authors: Daphne Shaw, Andrew Gallagher
 Working Group: Individual Submissions (none)
This document specifies a series of conventions to implement an OpenPGP keyserver using the Hypertext Transfer Protocol (HTTP). As this document is a codification and extension of a protocol that is already in wide use, strict attention is paid to backward compatibility with these existing implementations.
 BGP Extension for Distributing CP Threshold Constraints of SR Policy
 
 draft-liu-idr-bgp-sr-policy-cp-threshold-01.txt
 Date: 23/04/2024
 Authors: Yisong Liu, Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document defines the extension of BGP to distribute threshold and metric constraint parameters of candidate paths for SR Policy to achieve flexible path selection.
 PCEP Extension to Support Signaling Candidate Path Threshold Constraints of SR Policy
 
 draft-liu-pce-sr-policy-cp-threshold-01.txt
 Date: 29/04/2024
 Authors: Yisong Liu, Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document defines the extension of PCEP to signal the threshold and metric constraint parameters of candidate paths for SR Policy to support flexible path selection.
 RFC 6296bis IPv6-to-IPv6 Network Prefix Translation
 
 draft-bctb-6man-rfc6296-bis-02.txt
 Date: 26/01/2024
 Authors: Margaret Cullen, Fred Baker, Ole Troan, Nick Buraglio
 Working Group: Individual Submissions (none)
This document describes a stateless, transport-agnostic IPv6-to-IPv6 Network Prefix Translation (NPTv6) function that provides the address-independence benefit associated with IPv4-to-IPv4 NAT (NAPT44) and provides a 1:1 relationship between addresses in the "inside" and "outside" prefixes, preserving end-to-end reachability at the network layer. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/buraglio/rfc6296-bis.
 Use of Hybrid Public Key Encryption (HPKE) with JSON Object Signing and Encryption (JOSE)
 
 draft-rha-jose-hpke-encrypt-07.txt
 Date: 31/03/2024
 Authors: Tirumaleswar Reddy.K, Hannes Tschofenig, Aritra Banerjee, Orie Steele, Michael Jones
 Working Group: Individual Submissions (none)
This specification defines Hybrid Public Key Encryption (HPKE) for use with JSON Object Signing and Encryption (JOSE). HPKE offers a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. HPKE works for any combination of an asymmetric key encapsulation mechanism (KEM), key derivation function (KDF), and authenticated encryption with additional data (AEAD) function. Authentication for HPKE in JOSE is provided by JOSE-native security mechanisms or by one of the authenticated variants of HPKE. This document defines the use of the HPKE with JOSE.
 Computing-aware Traffic Steering for attack detection
 
 draft-li-cats-attack-detection-01.txt
 Date: 08/04/2024
 Authors: Hua-chun Zhou, Weilin Wang, Shuangxing Deng
 Working Group: Individual Submissions (none)
This document describes the closed-loop framework for computing-aware traffic steering for attack detection (CATS-AD). The computing-aware traffic steering is determined by composing selected service instances and overlay links. The service instances are selected according to the computing power of service instances. This document describes the closed-loop framework for attacks detection and how to select and combine service instances to form a computing-aware service function chain (SFC).
 Certificate Management over CMS (CMC)
 
 draft-mandel-lamps-rfc5272bis-02.txt
 Date: 04/03/2024
 Authors: Joe Mandel, Sean Turner
 Working Group: Individual Submissions (none)
This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:
 Certificate Management over CMS (CMC): Transport Protocols
 
 draft-mandel-lamps-rfc5273bis-02.txt
 Date: 04/03/2024
 Authors: Joe Mandel, Sean Turner
 Working Group: Individual Submissions (none)
This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. This document obsoletes RFCs 5273 and 6402.
 Certificate Management Messages over CMS (CMC): Compliance Requirements
 
 draft-mandel-lamps-rfc5274bis-02.txt
 Date: 04/03/2024
 Authors: Joseph Mandel, Sean Turner
 Working Group: Individual Submissions (none)
This document provides a set of compliance statements about the CMC (Certificate Management over CMS) enrollment protocol. The ASN.1 structures and the transport mechanisms for the CMC enrollment protocol are covered in other documents. This document provides the information needed to make a compliant version of CMC. This document obsoletes RFCs 5274 and 6402.
 The Mastic VDAF
 
 draft-mouris-cfrg-mastic-02.txt
 Date: 04/03/2024
 Authors: Hannah Davis, Dimitris Mouris, Christopher Patton, Pratik Sarkar, Nektarios Tsoutsos
 Working Group: Individual Submissions (none)
This document describes Mastic, a two-party VDAF for the following aggregation task: each client holds a string, and the collector wishes to count how many of these strings begin with a given prefix. Such a VDAF can be used to solve the private heavy hitters problem, where the goal is to compute the subset of the strings that occur most frequently without learning which client holds which string. This document also describes different modes of operation for Mastic that support additional use cases and admit various performance and security trade-offs.
 Classic McEliece
 
 draft-josefsson-mceliece-01.txt
 Date: 14/04/2024
 Authors: Simon Josefsson
 Working Group: Individual Submissions (none)
This document specifies Classic McEliece, a Key Encapsulation Method (KEM) designed for IND-CCA2 security, even against quantum computers. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-josefsson-mceliece/. Source for this draft and an issue tracker can be found at https://gitlab.com/jas/ietf-mceliece.
 IGP Flexible Algorithm with Link Loss
 
 draft-wang-lsr-flex-algo-link-loss-02.txt
 Date: 22/03/2024
 Authors: Wang Yifan, Guoqi Xu, Xuesong Geng, Jie Dong
 Working Group: Individual Submissions (none)
IGP Flexible Algorithms allow IGPs to compute constraint-based paths. Since link packet loss rate plays an important role in network evaluation, links with high packet loss rate should be bypassed during forwarding. This draft proposes a path computation method based on a maximum link loss constraint to prune unsatisfied links in Flexible Algorithms.
 RTP Payload for Haptics
 
 draft-hsyang-avtcore-rtp-haptics-03.txt
 Date: 25/03/2024
 Authors: Hyunsik Yang, Xavier de Foy
 Working Group: Individual Submissions (none)
This memo describes an RTP payload format for the MPEG-I haptic data. A haptic media stream is composed of MIHS units including a MIHS(MPEG-I Haptic Stream) unit header and zero or more MIHS packets. The RTP payload header format allows for packetization of a MIHS unit in an RTP packet payload as well as fragmentation of a MIHS unit into multiple RTP packets.
 IS-IS and OSPF extensions for TVR (Time-Variant Routing)
 
 draft-zw-lsr-tvr-extensions-01.txt
 Date: 03/03/2024
 Authors: Zheng Zhang, Haisheng Wu, Jing Wang
 Working Group: Individual Submissions (none)
TVR needs IGP to calculate different results depending on the time, without convergence after the detection of link or nodes. IGP nodes need to learn the predictable and scheduled changes in advance. This document defines the IGP extensions for predictable and scheduled changes of TVR.
 LTE-D Physical Layer Device Authentication Protocol
 
 draft-yu-deviceauthentication-02.txt
 Date: 14/04/2024
 Authors: Yanzhao Yang, Peng Guo, Jiabao Yu
 Working Group: Individual Submissions (none)
This document describes a physical layer device authentication protocol based on the physical layer unclonable fingerpint (PUF) technique for LTE Direct (LTE-D), a subprotocol of LTE V2X (Vehicle- to-Everything), to help the LTE-D message receiver confirm the identity of the LTE-D message sender. PUF utilizes intrinsic nonlinear characters of the transmission signal to identificate the devices and coresponding wireless signal transmitters, and is suitable for critical vehicular communication scenarios by its immunity against traditional cryptographic attacks. The protocol can be seamlessly integrated into the LTE-D communication system, and compatible with the traditional cryptography-based authentication mechanism.
 A Network Inventory Topology Model
 
 draft-wzwb-ivy-network-inventory-topology-01.txt
 Date: 29/04/2024
 Authors: Bo Wu, Cheng Zhou, Qin WU, Mohamed Boucadair
 Working Group: Individual Submissions (none)
This document defines a YANG model for network inventory topology to correlate the network inventory data with the general topology model to form a base underlay network, which can facilitate the mapping and correlation of the layer (e.g. Layer 2, Layer3) topology information above to the inventory data of the underlay network for agile service provisioning and network maintenance analysis.
 CDNI Metadata Expression Language
 
 draft-power-metadata-expression-language-01.txt
 Date: 04/03/2024
 Authors: Will Power, Glenn Goldstein, Arnon Warshavsky
 Working Group: Individual Submissions (none)
This document specifies the syntax and provides usage examples for an expression language to be used within Streaming Video Technology Alliance (SVTA)/Content Delivery Network Interconnection (CDNI) Metadata Interface (MI) objects. The purpose of this expression language is to enable metadata to be applied conditionally (based on aspects of an HTTP request), and to enable Hypertext Transfer Protocol (HTTP) responses to be generated or altered dynamically.
 CDNI Processing Stages Metadata
 
 draft-goldstein-processing-stages-metadata-01.txt
 Date: 04/03/2024
 Authors: Glenn Goldstein, Will Power, Arnon Warshavsky
 Working Group: Individual Submissions (none)
This document specifies a set of objects extending the Content Delivery Network Interconnection (CDNI) metadata model to allow for metadata to be applied conditionally and at various points in a dCDNs processing of requests. The concept of Processing Stages are introduced, where each stage in a CDN's processing pipeline presents an opportunity to examine requests and responses and make alterations as needed. Metadata, such as caching rules, can be applied conditionally (based on aspects of an HTTP request header), and HTTP responses from a source can be altered dynamically (such as adding or dropping an HTTP header). This standard leverages the expression language documented in the Metadata Expression Language (MEL) Specification.
 BGP Flow Specification for Source Address Validation
 
 draft-geng-idr-flowspec-sav-03.txt
 Date: 03/03/2024
 Authors: Nan Geng, Dan Li
 Working Group: Individual Submissions (none)
BGP FlowSpec reuses BGP route to distribute infrastructure and propagates traffic flow information with filtering actions. This document specifies a new flow specification called Incoming- Interface-Set. Incoming-Interface-Set can be used together with the Source Prefix component to disseminate SAV rules.
 A YANG Network Data Model of Network Inventory Software Extensions
 
 draft-wzwb-ivy-network-inventory-software-01.txt
 Date: 30/04/2024
 Authors: Bo Wu, Cheng Zhou, Qin WU, Mohamed Boucadair
 Working Group: Individual Submissions (none)
The base Network Inventory YANG model defines the physical network elements (NEs) and hardware components of NEs. This document extends the base Network Inventory model for software-enabled NEs (e.g., controllers, virtual network functions (VNFs)) and software components (e.g., platform operating system (OS), software-patch).
 QUIC Address Discovery
 
 draft-seemann-quic-address-discovery-01.txt
 Date: 28/02/2024
 Authors: Marten Seemann
 Working Group: Individual Submissions (none)
Unless they have out-of-band knowledge, QUIC endpoints have no information about their network situation. They neither know their external IP address and port, nor do they know if they are directly connected to the internet or if they are behind a NAT. This QUIC extension allows nodes to determine their public IP address and port for any QUIC path.
 IGP POI for Intra-domain SAV
 
 draft-song-savnet-intra-domain-igp-poi-01.txt
 Date: 23/01/2024
 Authors: Xueyan Song, Zenggui Kou, Yu Fu, Changwang Lin
 Working Group: Individual Submissions (none)
This document describes an IGP Prefix Originated Indicator (POI) method for Source Address Validation (SAV) on routers to mitigate source address spoofing attack and improve the accuracy of source address validation in intra-domain networks.
 SR based Loop-free implementation
 
 draft-deng-spring-sr-loop-free-01.txt
 Date: 22/11/2023
 Authors: Lijie Deng, Yongqing Zhu, Xuesong Geng, Zhibo Hu
 Working Group: Individual Submissions (none)
Microloops are brief packet loops that occur in the network following a topology change (link down, link up, node fault, or metric change events). Microloops are caused by the non-simultaneous convergence of different nodes in the network. If nodes converge and send traffic to a neighbor node that has not converged yet, traffic may be looped between these two nodes, resulting in packet loss,jitter, and out-of-order packets. This document presents some optional implementation methods aimed at providing loop avoidance in the case of IGP network convergence event in different scenarios.
 IGP Extensions for Intra-Domain SAV
 
 draft-chen-savnet-lsr-intra-02.txt
 Date: 01/02/2024
 Authors: Huaimo Chen, Weiqiang Cheng, Aijun Wang, Gyan Mishra, Yanhe Fan, Xufeng Liu
 Working Group: Individual Submissions (none)
This document specifies extensions to OSPF and IS-IS for Source Address Validation in Intra-domain.
 TLS Trust Expressions
 
 draft-davidben-tls-trust-expr-02.txt
 Date: 04/03/2024
 Authors: David Benjamin, Devon O'Brien, Bob Beck
 Working Group: Individual Submissions (none)
This document defines TLS trust expressions, a mechanism for relying parties to succinctly convey trusted certification authorities to subscribers by referencing named and versioned trust stores. It also defines supporting mechanisms for subscribers to evaluate these trust expressions, and select one of several available certification paths to present. This enables a multi-certificate deployment model, for a more agile and flexible PKI that can better meet security requirements.
 A YANG Data Model for Microwave Radio Link
 
 draft-ybam-rfc8561bis-01.txt
 Date: 03/03/2024
 Authors: Scott Mansfield, Jonas Ahlberg, Min Ye, Daniela Spreafico, Danilo Pala
 Working Group: Individual Submissions (none)
This document defines a YANG data model for control and management of radio link interfaces and their connectivity to packet (typically Ethernet) interfaces in a microwave/millimeter wave node. The data nodes for management of the interface protection functionality is broken out into a separate and generic YANG data model in order to make it available for other interface types as well. This document obsoletes RFC 8561.
 EAT profile for Intel® Trust Domain Extensions (TDX) attestation result
 
 draft-kdyxy-rats-tdx-eat-profile-01.txt
 Date: 23/04/2024
 Authors: Greg Kostal, Sindhuri Dittakavi, Raghuram Yeluri, Haidong Xia, Jerry Yu
 Working Group: Individual Submissions (none)
Intel® Trust Domain Extensions (TDX) introduce architectural elements designed for the deployment of hardware-isolated virtual machines (VMs) known as trust domains (TDs). TDX is designed to provide a secure and isolated environment for running sensitive workloads or applications. This Entity Attestation Token (EAT) profile outlines claims for an Intel TDX attestation result which facilitate the establishment of trust between a relying party and the environment.
 Recommendations for using Multiple IP Addresses in Benchmarking Tests
 
 draft-lencse-bmwg-multiple-ip-addresses-01.txt
 Date: 04/03/2024
 Authors: Gabor Lencse, Keiichi Shima
 Working Group: Individual Submissions (none)
RFC 2544 has defined a benchmarking methodology for network interconnect devices. Its test frame format contained fixed IP addresses and fixed port numbers. RFC 4814 introduced pseudorandom port numbers, but it kept the usage of a single source and destination IP address pair when a single destination network is used. This limitation may cause an issue when the device under test uses Receive-Side Scaling (RSS) mechanism in the packet processing flow. RSS has two types of implementations: the first one only includes the IP addresses, whereas the second one also includes the port numbers into the tuple used for hashing. Benchmarking tests that use a single IP address pair and RFC 4814 pseudorandom port numbers are biased against the first type of RSS implementation, because in this case, the traffic is not distributed among the processing elements. This document recommends the usage of pseudorandom IP addresses in a similar manner as RFC 4814 did it with the port numbers. If accepted, this document updates all affected RFCs, including RFC 2544, RFC 4814, RFC 5180, RFC 8219.
 Coordinated Congestion Management
 
 draft-lyu-rtgwg-coordinated-cm-01.txt
 Date: 19/04/2024
 Authors: Lv Yunping, Yuhan Zhang, Mengzhu Liu
 Working Group: Individual Submissions (none)
AI fabric is sensitive to bandwidth. Congestion management, including congestion control and load balancing, is a main method to fully utilize network resource. However, current congestion management mechanisms are not coordinated, which lead to throughput decreasing. This document provides a scheme to coordinate different congestion management mechanisms. It describes the design principle, behaviors of network switches and hosts in the scheme, and gives an example to show end-to-end procedure.
 Asset Lifecycle Management and Operations: A Problem Statement
 
 draft-palmero-ivy-ps-almo-01.txt
 Date: 24/04/2024
 Authors: Marisol Palmero, Frank Brockners, Sudhendu Kumar, Camilo Cardona, Diego Lopez
 Working Group: Individual Submissions (none)
This document presents a problem statement for assets lifecycle management and operations. It describes a framework, the motivation and requirements for asset-centric metrics including but not limited to, asset adoption, usability, entitlements, supported capabilities, and enabled capabilities. The document also defines an information model. The primaty objectives for the problem statement document is to validate and proof that the framework can measure and improve the network operators' experience along the lifecycle journey, from technical requirements and technology selection through renewal, including the end of life of an asset.
 Reliability in AI Networks Gap Analysis,Problem Statement,and Requirements
 
 draft-cheng-rtgwg-ai-network-reliability-problem-01.txt
 Date: 22/04/2024
 Authors: Weiqiang Cheng, Changwang Lin, wangwenxuan
 Working Group: Individual Submissions (none)
This document provides the gap analysis of existing reliability mechanism in AI networks, describes the fundamental problems, and defines the requirements for technical improvements.
 Path Computation and Control Extention Requirements for Fine-Granularity Transport Network
 
 draft-han-pce-path-computation-fg-transport-01.txt
 Date: 04/03/2024
 Authors: Liuyan Han, Haomian Zheng, Minxue Wang, Yang Zhao
 Working Group: Individual Submissions (none)
This document focuses on the requirements for path computation and control of the fine-granularity transport network. It provides the general context of the use cases of path computation and the considerations on the requirements of PCE extension in such fine- granularity transport network.
 Power and Energy Efficiency
 
 draft-opsawg-poweff-01.txt
 Date: 07/05/2024
 Authors: Jan Lindblad, Snezana Mitrovic, Marisol Palmero, Gonzalo Salgueiro
 Working Group: Individual Submissions (none)
This document specifies a device YANG “dashboard” data model that allows devices to report which power measurement and control functions they offer. This basic YANG model is applicable to any kind of device, regardless of whether the device itself has any support for YANG-based management interfaces or not. The YANG model simply allows a device to describe what it can report, and which interfaces are available to request this data. Devices that lack any on-board YANG-based management interfaces provide this information in form of a YANG instance data file. This file may be readable from an on-board web server on the device, or hosted anywhere else.
 An Application Layer Interface for Non-IP device control (NIPC)
 
 draft-brinckman-nipc-01.txt
 Date: 21/04/2024
 Authors: Bart Brinckman, Rohit Mohan, Braeden Sanford
 Working Group: Individual Submissions (none)
This memo specifies RESTful application layer interface for gateways providing operations against non-IP devices. The described interface is extensible. This memo initially describes Bluetooth Low Energy and Zigbee as they are the most commonly deployed.
 OAuth 2.0 for First-Party Applications
 
 draft-parecki-oauth-first-party-apps-01.txt
 Date: 01/03/2024
 Authors: Aaron Parecki, George Fletcher, Pieter Kasselman
 Working Group: Individual Submissions (none)
This document defines the Authorization Challenge Endpoint, which supports a first-party client that wants to control the process of obtaining authorization from the user using a native experience. In many cases, this can provide an entirely browserless OAuth 2.0 experience suited for native applications, only delegating to the browser in unexpected, high risk, or error conditions.
 Reliability Framework for SRv6 Service Function Chaining
 
 draft-yang-rtgwg-srv6-sfc-reliability-framework-02.txt
 Date: 18/05/2024
 Authors: Feng Yang, Xiaoqiu Zhang, Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document describes the framework for protection of service function chains in source routing networks.
 IGP Color-Aware Routing
 
 draft-lin-lsr-igp-car-01.txt
 Date: 21/04/2024
 Authors: Changwang Lin, Mengxiao Chen, Liyan Gong
 Working Group: Individual Submissions (none)
This document describes an IGP based routing solution to establish end-to-end intent-aware paths across a multi-domain service provider transport network.
 YANG Data Model for SR and SR TE Topologies on IPv6 Data Plane
 
 draft-liu-teas-yang-srv6-te-topo-01.txt
 Date: 22/04/2024
 Authors: Yisong Liu, Changwang Lin, Xufeng Liu
 Working Group: Individual Submissions (none)
This document defines a YANG data model for Segment Routing (SR) topology and Segment Routing (SR) Traffic Engineering (TE) topology, using IPv6 data plane. It provides the methods for representing and manipulating SR Topologies on IPv6 Data Plane, and can be used on a controller for the network-wide operations such as path computation.
 DNS IPv6 Transport Operational Guidelines
 
 draft-momoka-dnsop-3901bis-05.txt
 Date: 29/04/2024
 Authors: Momoka Yamamoto, Tobias Fiebig
 Working Group: Individual Submissions (none)
This memo provides guidelines and documents Best Current Practice for operating authoritative and recursive DNS servers, given that queries and responses are carried in a mixed environment of IPv4 and IPv6 networks. It expands on RFC 3901 by now suggesting authoritative and iterative resolvers to operate on both IPv4 and IPv6. This document obsoletes RFC3901. (if approved) Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/momoka0122y/draft-dnsop-3901bis.
 A Multiplane Architecture Proposal for the Quantum Internet
 
 draft-lopez-qirg-qi-multiplane-arch-01.txt
 Date: 04/03/2024
 Authors: Diego Lopez, Vicente Martin, Blanca Lopez, Luis Contreras
 Working Group: Individual Submissions (none)
A consistent reference architecture model for the Quantum Internet is required to progress in its evolution, providing a framework for the integration of the protocols applicable to it, and enabling the advance of the applications based on it. This model has to satisfy three essential requirements: agility, so it is able to adapt to the evolution of quantum communications base technologies, sustainability, with open availability in technological and economical terms, and pliability, being able to integrate with the operations and management procedures in current networks. This document proposes such an architecture framework, with the goal of providing a conceptual common framework for the integration of technologies intended to build the Quantum Internet infrastructure and its integration with the current Internet. The framework is based on the already extensive experience in the deployment of QKD network infrastructures and on related initiatives focused on the integration of network infrastructures and services.
 RIFT in Dragonfly Topologies
 
 draft-przygienda-rift-dragonfly-01.txt
 Date: 01/01/2024
 Authors: Tony Przygienda
 Working Group: Individual Submissions (none)
RIFT extensions for dragonfly topologies.
 Philatelist,YANG-based Network Controller collection and aggregation framework integrating Telemetry data and Time Series Databases
 
 draft-lindblad-tlm-philatelist-01.txt
 Date: 07/05/2024
 Authors: Jan Lindblad
 Working Group: Individual Submissions (none)
Timestamped telemetry data is collected en masse today. Mature tools are typically used, but the data is often collected in an ad hoc manner. While the dashboard graphs look great, the resulting data is often of questionable quality, not well defined, and hard to compare with seemingly similar data from other organizations. This document proposes a standard, extensible, cross domain framework for collecting and aggregating timestamped telemetry data in a way that combines YANG, metadata and Time Series Databases to produce more transparent, dependable and comparable results. This framework is implemented in the Network Controller layer, but is rooted in data that is collected from all kinds of Network Elements and related systems.
 Extended information of Semantic Definition Format (SDF) for Digital Twin
 
 draft-lee-asdf-digital-twin-01.txt
 Date: 04/03/2024
 Authors: Hyunjeong Lee, Joo-Sang Youn, Yong-Geun Hong
 Working Group: Individual Submissions (none)
An SDF specification can describe the definition of a Things, i.e., physical objects and their associated interactions and express the various information that be exchanged for the interactions. Therefore, the SDF format can be used to define the behaviour of an object and its associated data model and interaction model in a digital twin system that has an object as a component. In a digital twin system, interactions between physical and virtual objects, as well as interactions of objects existing in the different digital twin systems, are performed over a network, which is important to provide location information of objects during interactions. This document specifies the extension information of SDF to represent the location information of an objects.
 SRH Reduction for SRv6 End.M.GTP6.E Behavior
 
 draft-kawakami-dmm-srv6-gtp6e-reduced-01.txt
 Date: 01/03/2024
 Authors: Yuya Kawakami, Satoru Matsushima, Shay Zadok, Derek Yeung, Dan Voyer
 Working Group: Individual Submissions (none)
Segment Routing over IPv6 for the Mobile User Plane specifies interworking between SRv6 networks and GTP-U networks including required behaviors. This document specifies a new behavior named End.M.GTP6.E.Red which improves the End.M.GTP6.E behavior more hardware-friendly by indicating the behavior with one SID.
 YANG Model for IS-IS Protocol Implementation Conformance Statement (PICS)
 
 draft-qgp-lsr-isis-pics-yang-02.txt
 Date: 09/05/2024
 Authors: Yingzhen Qu, Les Ginsberg, Tony Przygienda, Yongqing Zhu
 Working Group: Individual Submissions (none)
The YANG model in this document is to be used to query an IS-IS Protocol Implementation Conformance Statement (PICS).
 Requirements from Control and Management Viewpoint for Collective Communication Optimization
 
 draft-liu-opsawg-cco-cm-requirement-01.txt
 Date: 27/02/2024
 Authors: Liu Chang, Xu Shiping
 Working Group: Individual Submissions (none)
Collective communication optimization is crucial to improve the performance of distributed applications, due to that communication has become bottleneck to degrade applications with the growth of scale of distributed systems. The industry and academy has worked on proposing solutions to upgrade collective communication operations. However, there has been a problem of lacking for unified guidelines. This draft provide requirements on collective communication optimization from the control and management viewpoint.
 Ethernet VPN Signalling Extensions for Bit-stream VPWS
 
 draft-schmutzer-bess-bitstream-vpws-signalling-01.txt
 Date: 18/04/2024
 Authors: Steven Gringeri, Jeremy Whittaker, Christian Schmutzer, Bharath Vasudevan, Patrice Brissette
 Working Group: Individual Submissions (none)
This document specifies the mechanisms to allow for dynamic signalling of Virtual Private Wire Services (VPWS) carrying bit- stream signals over Packet Switched Networks (PSN).
 CATS based on Real Locator
 
 draft-shi-cats-with-real-locator-01.txt
 Date: 28/02/2024
 Authors: Hang Shi, Xia Chen, Zhenbin Li, Xinxin Yi, Kehan Yao
 Working Group: Individual Submissions (none)
This document describes a solution framework that adheres to the CATS framework. The solution uses anycast IP addresses as the CATS service identifier and real locator of the service contact instance as the CATS Instance Selection ID.
 Data Model for Asset Lifecycle Management and Operations
 
 draft-palmero-ivy-dmalmo-01.txt
 Date: 24/04/2024
 Authors: Marisol Palmero, Frank Brockners, Sudhendu Kumar, Camilo Cardona, Diego Lopez
 Working Group: Individual Submissions (none)
This document includes a data model for assets lifecycle management and operations. The primary objective of the data model is to measure and improve the network operators' experience along the lifecycle journey, from technical requirements and technology selection through renewal, including the end of life of an asset. This model is based on the information model introduced in "Asset Lifecycle Management and Operations: A Problem Statement" (ALMO) [I-D.draft-palmero-opsawg-ps-almo-00] IETF draft.
 Application Aware Computing Network
 
 draft-li-cats-application-aware-computing-network-01.txt
 Date: 28/02/2024
 Authors: Zhenbin Li, Hang Shi, Xia Chen, Zongpeng Du, Shuai Zhang
 Working Group: Individual Submissions (none)
This document describes a solution framework that adheres to the CATS framework. The solution uses APN as part of the CATS service identifier and flow identifier.
 Collective Communication Optimizations: Requirement and Analysis
 
 draft-yao-tsvwg-cco-requirement-and-analysis-01.txt
 Date: 04/02/2024
 Authors: Kehan Yao, Xu Shiping, Yizhou Li, Hongyi Huang, Weifeng Wang, Dirk KUTSCHER
 Working Group: Individual Submissions (none)
Gernerative AI applications depend on large scale parallel computing clusters for model training and inference. Existing implementations of collective communication in parallel computing is built on top of RDMA, the most adoptable AI transport protocol. However, One-to- Many, Many-to-One, and Many-to-Many collective operations all depend on point-to-point transport semantics of RDMA, which inevitably introduces more bandwidth occupancy and transmission overhead. Emerging approaches for collective communication optimization focus on network-assisted collective acceleration and can work compatibly with RDMA. This document analyzes different technical schemes for network-assisted collective acceleration based on RDMA, and presents the gap between these work and current IETF standards, notably iWARP. Requirements for designing new standards are proposed accordingly.
 the architecture for secure routing
 
 draft-chen-secure-path-architecture-01.txt
 Date: 04/03/2024
 Authors: Meiling Chen, Li Su
 Working Group: Individual Submissions (none)
Some users need to choose nodes that meet security requirements to form secure routing and ensure that traffic can defend against dynamic attacks during path forwarding. In this architecture, there are four roles defined: attester, authorizer, controller and secfunction, the interaction of these four roles can achieve the selection of secure routing and security services. The purpose of this architecture is to secure the routing, including node static security assessment, dynamic security defense, and routing path and security service consistency validation.
 Nonce-based Freshness for Remote Attestation in Certificate Signing Requests (CSRs) for the Certification Management Protocol (CMP) and for Enrollment over Secure Transport (EST)
 
 draft-tschofenig-lamps-nonce-cmp-est-01.txt
 Date: 03/03/2024
 Authors: Hannes Tschofenig, Hendrik Brockhaus
 Working Group: Individual Submissions (none)
Certificate Management Protocol (CMP) and Enrollment over Secure Transport (EST) define protocol messages for X.509v3 certificate creation and management. Both protocol provide interactions between client systems and PKI management entities, such as a Registration Authority (RA) and a Certification Authority (CA). CMP and EST allow an RA/CA to request additional information it has to provide in a certification request. When an end entity places attestation Evidence in a Certificate Signing Request (CSR) it may need to demonstrate freshness of the provided Evidence. Attestation technology today often accomplishes this task via the help of nonces. This document specifies how nonces are provided by an RA/CA to the end entity for inclusion in Evidence.
 Automating DNS Delegation Management via DDNS
 
 draft-johani-dnsop-delegation-mgmt-via-ddns-02.txt
 Date: 04/03/2024
 Authors: Johan Stenstam
 Working Group: Individual Submissions (none)
Delegation information (i.e. the NS RRset, possible glue, possible DS records) should always be kept in sync between child zone and parent zone. However, in practice that is not always the case. When the delegation information is not in sync the child zone is usually working fine, but without the amount of redundancy that the zone owner likely expects to have. Hence, should any further problems ensue it could have catastropic consequences. The DNS name space has lived with this problem for decades and it never goes away. Or, rather, it will never go away until a fully automated mechanism for how to keep the information in sync automatically is deployed. This document proposes such a mechanism. TO BE REMOVED: This document is being collaborated on in Github at: https://github.com/johanix/draft-johani-dnsop-delegation-mgmt-via- ddns (https://github.com/johanix/draft-johani-dnsop-delegation-mgmt- via-ddns). The most recent working version of the document, open issues, etc, should all be available there. The author (gratefully) accept pull requests.
 Opportunistic TCP-AO with TLS
 
 draft-piraux-tcp-ao-tls-01.txt
 Date: 04/03/2024
 Authors: Maxime Piraux, Olivier Bonaventure, Thomas Wirtgen
 Working Group: Individual Submissions (none)
This document specifies an opportunistic mode for TCP-AO. In this mode, the TCP connection starts with a well-known authentication key which is later replaced by a secure key derived from the TLS handshake.
 BMP Local Path-ID
 
 draft-younsi-grow-local-path-id-02.txt
 Date: 18/03/2024
 Authors: Maxence Younsi, Pierre Francois, Paolo Lucente
 Working Group: Individual Submissions (none)
Intelligence is required to track BGP paths throughout the various RIBs and VRFs of a routing platform, due to potential attribute modifications and the use of BGP multipath. This document introduces the option to identify a path within a router in order to ease correlation in monitoring. A BMPv4 TLV is defined in order to communicate this locally significant identifier in monitoring messages.
 Implementation Considerations for Ephemeral Diffie-Hellman Over COSE (EDHOC)
 
 draft-tiloca-lake-edhoc-implem-cons-01.txt
 Date: 12/02/2024
 Authors: Marco Tiloca
 Working Group: Individual Submissions (none)
This document provides considerations for guiding the implementation of the authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC).
 IPFIX Alternate-Marking Information
 
 draft-gfz-opsawg-ipfix-alt-mark-01.txt
 Date: 24/04/2024
 Authors: Thomas Graf, Giuseppe Fioccola, Tianran Zhou, Fabrizio Milan, Massimo Nilo
 Working Group: Individual Submissions (none)
This document introduces new IP Flow Information Export (IPFIX) Information Elements (IEs) to export Alternate Marking measurement data.
 Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)
 
 draft-tiloca-lake-app-profiles-01.txt
 Date: 04/03/2024
 Authors: Marco Tiloca, Rikard Hoeglund
 Working Group: Individual Submissions (none)
The lightweight authenticated key exchange protocol Ephemeral Diffie- Hellman Over COSE (EDHOC) requires certain parameters to be agreed out-of-band, in order to ensure its successful completion. To this end, application profiles specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. This document defines a number of means to coordinate the use and discovery of EDHOC application profiles. Also, it defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles. Finally, it defines a well-known EDHOC application profile.
 BGP over TLS/TCP
 
 draft-wirtgen-bgp-tls-01.txt
 Date: 24/04/2024
 Authors: Thomas Wirtgen, Olivier Bonaventure
 Working Group: Individual Submissions (none)
This document specifies the utilization of TCP/TLS to support BGP.
 TLS Flag - Request mTLS
 
 draft-jhoyla-req-mtls-flag-01.txt
 Date: 18/02/2024
 Authors: Jonathan Hoyland
 Working Group: Individual Submissions (none)
Normally in TLS there is no way for the client to signal to the server that it has been configured with a certificate suitable for mTLS. This document defines a TLS Flag [I-D.ietf-tls-tlsflags] that enables clients to provide this hint.
 Application-aware Networking (APN6) Header Authentication
 
 draft-liu-apn-header-auth-01.txt
 Date: 25/04/2024
 Authors: liuy619@chinaunicom.cn, Ran Pang, Changwang Lin, Mengxiao Chen
 Working Group: Individual Submissions (none)
This document proposes an authentication method to verify the application-aware networking (APN) header.
 Application-aware Data Center Network (APDN) Use Cases and Requirements
 
 draft-wh-rtgwg-application-aware-dc-network-02.txt
 Date: 01/03/2024
 Authors: Haibo Wang, Kehan Yao, Wei Pan, Hongyi Huang
 Working Group: Individual Submissions (none)
The deployment of large-scale AI services within data centers introduces significant challenges to established technologies, including load balancing and congestion control. Additionally, the adoption of cutting-edge network technologies, such as in-network computing, is on the rise within AI-centric data centers. These advanced network-assisted application acceleration technologies necessitate the flexible exchange of cross-layer interaction information between end-hosts and network nodes. The Application-aware Data Center Network (APDN) leverages the Application-aware Networking (APN) framework for application side to furnish the data center network with detailed application-aware information. This approach facilitates the rapid advancement of network-application co-design technologies. This document delves into the use cases of APDNs and outlines the associated requirements, setting the stage for enhanced performance and efficiency in data center operations tailored to the demands of AI services.
 EAP-FIDO
 
 draft-janfred-eap-fido-02.txt
 Date: 01/03/2024
 Authors: Jan-Frederik Rieckers, Stefan Winter
 Working Group: Individual Submissions (none)
This document specifies an EAP method leveraging FIDO2 keys for authentication in EAP. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-janfred-eap-fido/. Discussion of this document takes place on the EAP Method Update Working Group mailing list (mailto:emu@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/emu/. Subscribe at https://www.ietf.org/mailman/listinfo/emu/.
 Problem Statement,Use Cases,and Requirements of Hierarchical SFC with Segment Routing
 
 draft-nh-sr-hsfc-usecases-requirements-01.txt
 Date: 02/03/2024
 Authors: nikangkang, Hongyi Huang, Yige Zhang, Jiaming Ye
 Working Group: Individual Submissions (none)
Hierarchical Service Function Chaining (hSFC) is a network service chaining method that utilizes a hierarchical structure to efficiently organize and manage service function chains, enhancing network performance and scalability. This document primarily describes the use case of hSFC, which is the security resource pool. It outlines the associated problem statement and requirements for the security resource pool. The document aims to assist in identifying candidate solution architectures and solutions.
 Post-Quantum Cryptography Recommendations for Internet Applications
 
 draft-reddy-uta-pqc-app-02.txt
 Date: 01/03/2024
 Authors: Tirumaleswar Reddy.K
 Working Group: Individual Submissions (none)
Post-quantum cryptography brings some new challenges to applications, end users, and system administrators. This document describes characteristics unique to application protocols and best practices for deploying Quantum-Ready usage profiles for applications using TLS.
 IRTF Code of Conduct
 
 draft-perkins-irtf-code-of-conduct-02.txt
 Date: 28/04/2024
 Authors: Colin Perkins
 Working Group: Individual Submissions (none)
This document describes the code of conduct for participants in the Internet Research Task Force (IRTF). The IRTF believes that research is most effective when done in an open and inclusive forum that encourages diversity of ideas and diversity of participation. Through this code of conduct, the IRTF will continue to strive to create and maintain an environment that encourages broad participation, and one in which people are treated with dignity, decency, and respect
 Static Context Header Compression and Fragmentation for Zero Energy Devices
 
 draft-ramos-schc-zero-energy-devices-01.txt
 Date: 21/04/2024
 Authors: Edgar Ramos, Lorenzo Corneo, Ana Minaburo
 Working Group: Individual Submissions (none)
This document describes the use of SCHC for very constraint devices. The use of SCHC will bring connectivity to devices with restrained use of battery and long delays.
 Application of Explicit Measurement Techniques for QUIC Troubleshooting
 
 draft-mdt-quic-explicit-measurements-01.txt
 Date: 04/03/2024
 Authors: Alexandre Ferrieux, Igor Lubashev, Giuseppe Fioccola, Isabelle Hamchaoui, Massimo Nilo, Fabio Bulgarella, Mauro Cociglio
 Working Group: Individual Submissions (none)
This document defines an extension to the QUIC transport protocol to allow endpoints to signal packet loss in a way that can be used by network devices to measure and locate the source of the loss. Discussion of this work is encouraged to happen on the QUIC IETF mailing list quic@ietf.org (mailto:quic@ietf.org) or on the GitHub repository which contains the draft: https://github.com/igorlord/ draft-mdt-quic-explicit-measurements (https://github.com/igorlord/ draft-mdt-quic-explicit-measurements).
 Happy Eyeballs Version 3: Better Connectivity Using Concurrency
 
 draft-pauly-v6ops-happy-eyeballs-v3-01.txt
 Date: 04/03/2024
 Authors: Tommy Pauly, David Schinazi, Nidhi Jaju, Kenichi Ishibashi
 Working Group: Individual Submissions (none)
Many communication protocols operating over the modern Internet use hostnames. These often resolve to multiple IP addresses, each of which may have different performance and connectivity characteristics. Since specific addresses or address families (IPv4 or IPv6) may be blocked, broken, or sub-optimal on a network, clients that attempt multiple connections in parallel have a chance of establishing a connection more quickly. This document specifies requirements for algorithms that reduce this user-visible delay and provides an example algorithm, referred to as "Happy Eyeballs". This document updates the algorithm description in RFC 8305.
 Post-quantum cryptography migration use cases
 
 draft-vaira-pquip-pqc-use-cases-01.txt
 Date: 04/03/2024
 Authors: Antonio Vaira, Hendrik Brockhaus, Alexander Railean, John Gray, Mike Ounsworth
 Working Group: Individual Submissions (none)
This document is meant to be continuously updated, to incorporate emerging Post-Quantum Cryptography (PQC) migration use cases, with a focus on the migration from traditional signature algorithms (e.g., RSA, DSA, ECDSA) to PQC signature algorithms (e.g., LMS, XMSS, ML- DSA, SLH-DSA). This document aims at categorizing real-world scenarios based on a set of distinctive features. The primary goal is to facilitate discussions on migration strategies by offering a systematic taxonomy and a shared understanding among stakeholders.
 Path Computation Based on Precision Availability Metrics
 
 draft-contreras-pce-pam-02.txt
 Date: 13/02/2024
 Authors: Luis Contreras, Fernando Agraz, Salvatore Spadaro
 Working Group: Individual Submissions (none)
The Path Computation Element (PCE) is able of determining paths according to constraints expressed in the form of metrics. The value of the metric can be signaled as a bound or maximum, meaning that path metric must be less than or equal such value. While this can be sufficient for certain services, some others can require the utilization of Precision Availability Metrics (PAM). This document defines a new object, namely the PRECISION METRIC object, to be used for path calculation or selection for networking services with performance requirements expressed as Service Level Objectives (SLO) using PAM.
 Stateless Multicast Replication with Segment Routed Recursive Tree Structures (RTS)
 
 draft-eckert-pim-rts-forwarding-01.txt
 Date: 04/03/2024
 Authors: Toerless Eckert, Michael Menth, Steffen Lindner
 Working Group: Individual Submissions (none)
BIER provides stateless multicast in BIER domains using bitstrings to indicate receivers. BIER-TE extends BIER with tree engineering capabilities. Both suffer from scalability problems in large networks as bitstrings are of limited size so the BIER domains need to be subdivided using set identifiers so that possibly many packets need to be sent to reach all receivers of a multicast group within a subdomain. This problem can be mitigated by encoding explicit multicast trees in packet headers with bitstrings that have only node-local significance. A drawback of this method is that any hop on the path needs to be encoded so that long paths consume lots of header space. This document presents the idea of Segment Routed Recursive Tree Structures (RTS), a unifying approach in which a packet header representing a multicast distribution tree is constructed from a tree structure of vertices ("so called Recursive Units") that support replication to their next-hop neighbors either via local bitstrings or via sequence of next-hop neighbor identifiers called SIDs. RTS, like RBS is intended to expand the applicability of deployment for stateless multicast replication beyond what BIER and BIER-TE support and expect: larger networks, less operational complexity, and utilization of more modern forwarding planes as those expected to be possible when BIER was designed (ca. 2010). This document only specifies the forwarding plane but discusses possible architectural options, which are primarily determined through the future definition/mapping to encapsulation headers and controller-plane functions.
 EVPN L3-Optimized IRB
 
 draft-sajassi-bess-evpn-l3-optimized-irb-02.txt
 Date: 04/03/2024
 Authors: Ali Sajassi, Chuanfa Wang, Krishnaswamy Ananthamurthy, Jorge Rabadan
 Working Group: Individual Submissions (none)
Ethernet VPN Integrated Routing and Bridging (EVPN-IRB) provides dynamic and efficient intra and inter-subnet connectivity among Tenant Systems and end devices while maintaining very flexible multihoming capabilities. This document describes how EVPN-IRB can be optimized for IP hosts and devices such that PE devices only maintain MAC addresses for locally-connected IP hosts,thus improving MAC scalability of customer bridges and PE devices significantly. This document describes how such optimization is acheived while still supporting host moblity which is one of the fundamental features in EVPN and EVPN-IRB. With such optimization PE devices perform routing for both intra and inter-subnet traffic which results in some some caveats that operators and service providers need to be fully aware of.
 A Mechanism for X.509 Certificate Discovery
 
 draft-lamps-okubo-certdiscovery-01.txt
 Date: 23/04/2024
 Authors: Tomofumi Okubo, Corey Bonnell, John Gray
 Working Group: Individual Submissions (none)
This document specifies a method to discover a secondary X.509 certificate associated with an X.509 certificate to enable efficient multi-certificate handling in protocols. The objective is threefold: to enhance cryptographic agility, improve operational availability, and accommodate multi-key/certificate usage. The proposed method aims to maximize compatibility with existing systems and is designed to be legacy-friendly, making it suitable for environments with a mix of legacy and new implementations. It includes mechanisms to provide information about the target certificate's signature algorithm, public key algorithm and the location of the secondary X.509 certificate, empowering relying parties to make informed decisions on whether or not to fetch the secondary certificate. The primary motivation for this method is to address the limitations of traditional certificate management approaches, which often lack flexibility, scalability, and seamless update capabilities. By leveraging this mechanism, subscribers can achieve cryptographic agility by facilitating the transition between different algorithms or X.509 certificate types. Operational redundancy is enhanced by enabling the use of backup certificates and minimizing the impact of primary certificate expiration or CA infrastructure failures. The approach ensures backward compatibility with existing systems and leverages established mechanisms, such as the subjectInfoAccess extension, to enable seamless integration. It does not focus on identity assurance between the primary and secondary certificates, deferring such considerations to complementary mechanisms.
 Aggregation Trace Option for In-situ Operations,Administration,and Maintenance (IOAM)
 
 draft-cxx-ippm-ioamaggr-01.txt
 Date: 24/04/2024
 Authors: Alexander Clemm, Metzger
 Working Group: Individual Submissions (none)
The purpose of this memo is to describe a new option type for In-Situ Operations, Administration, and Maintenance (IOAM). This option type allows to aggregate IOAM data along a network path. Aggregates include functions such as the sum, average, minimum, or maximum of a given data parameter.
 SR Path Binding Protection Architecture
 
 draft-chen-spring-sr-bind-protect-arch-01.txt
 Date: 01/02/2024
 Authors: Huaimo Chen, Zhibo Hu, Weiqiang Cheng, Aijun Wang, Gyan Mishra
 Working Group: Individual Submissions (none)
This document describes a architecture of fast re-route protection for binding SIDs on SR paths including SRv6 paths and SR-MPLS paths. The SR paths are in a single domain or cross two domains. The two domains are administrated by one provider or two different providers.
 CDNI Logging Extensions
 
 draft-rosenblum-cdni-logging-extensions-01.txt
 Date: 04/03/2024
 Authors: Ben Rosenblum, Omar Ramadan, Kenton Seward
 Working Group: Individual Submissions (none)
This document defines a set of extensions to CDNI for supporting transmission of transaction logs in both push and pull operational modes, new log container formats and log record formats, new logging fields, and metadata for describing the transformation, obfuscation, and encryption of log record fields.
 Secure Telephone Identity for Message Layer Security
 
 draft-peterson-stir-mls-01.txt
 Date: 04/03/2024
 Authors: Jon Peterson, Richard Barnes
 Working Group: Individual Submissions (none)
This document specifies Message Layer Security (MLS) Credential Types for use with Secure Telephone Identity Revisited (STIR), one for STIR certificates and another for the Personal Assertion Token (PASSporT).
 Large Record Sizes for TLS and DTLS
 
 draft-mattsson-tls-super-jumbo-record-limit-02.txt
 Date: 04/03/2024
 Authors: John Mattsson, Hannes Tschofenig, Michael Tuexen
 Working Group: Individual Submissions (none)
RFC 8449 defines a record size limit extension for TLS and DTLS allowing endpoints to negotiate a record size limit smaller than the protocol-defined maximum record size, which is around 2^14 bytes. This document specifies a TLS flag extension to be used in combination with the record size limit extension allowing endpoints to use a record size limit larger than the protocol-defined maximum record size, but not more than about 2^16 bytes.
 LDP Extensions to Support Private Line Emulation (PLE)
 
 draft-schmutzer-pals-ple-signaling-01.txt
 Date: 18/04/2024
 Authors: Christian Schmutzer
 Working Group: Individual Submissions (none)
This document defines extension to the Pseudowire Emulation Edge-to- Edge (PWE3) control protocol [RFC4447] required for the setup of Private Line Emulation (PLE) pseudowires in MPLS networks.
 Centralized Anycast Gateway in Ethernet VPN(EVPN)
 
 draft-malhotra-bess-evpn-centralized-anycast-gw-01.txt
 Date: 04/03/2024
 Authors: Neeraj Malhotra, Krishnaswamy Ananthamurthy, Ali Sajassi, Lukas Krattiger, Jorge Rabadan
 Working Group: Individual Submissions (none)
EVPN Integrated Routing and Bridging (IRB) fabrics provide a flexible and extensible method for Layer-2 and Layer-3 overlay network connectivity. [EVPN-IRB] defines operation for symmetric and asymmetric EVPN IRB using distributed anycast gateway architecture (DAG). In a DAG architecture, both bridging and first-hop routing functions for overlay subnets are located on leaf PEs, with first-hop routing provided by a distributed anycast gateway provisioned across the leaf PEs. This document describes an architecture and operation for EVPN Centralized Anycast Gateway (CAG), which allows the first- hop routing function for overlay subnets to be centralized on designated IRB GWs while the bridging function is still located on the leaf PEs. The documents also covers trade-offs of deploying a CAG as compared with DAG. It further describes operation for inter- op between CAG and DAG based EVPN-IRB network overlays.
 Joint Exposure of Network and Compute Information for Infrastructure-Aware Service Deployment
 
 draft-rcr-opsawg-operational-compute-metrics-03.txt
 Date: 04/03/2024
 Authors: Sabine Randriamasy, Luis Contreras, Jordi Ros-Giralt, Roland Schott
 Working Group: Individual Submissions (none)
Service providers are starting to deploy computing capabilities across the network for hosting applications such as distributed AI workloads, AR/VR, vehicle networks, and IoT, among others. In this network-compute environment, knowing information about the availability and state of the underlying communication and compute resources is necessary to determine both the proper deployment location of the applications and the most suitable servers on which to run them. Further, this information is used by numerous use cases with different interpretations. This document proposes an initial approach towards a common understanding and exposure scheme for metrics reflecting compute and communication capabilities.
 Current Process for Handling RFC Errata Reports
 
 draft-rpc-errata-process-01.txt
 Date: 27/02/2024
 Authors: Alice Russo, Jean Mahoney
 Working Group: Individual Submissions (none)
This document describes the current web-based process for handling the submission, verification, and posting of errata for the RFC Series. The main concepts behind this process are (1) distributing the responsibility for verification to the appropriate organization or person for each RFC stream, and (2) using a Web portal to automate the processing of erratum reports. This system was launched in November 2007. This draft documents the existing system as a means to facilitate discussion to revamp how errata are reported, reviewed, and publicized.
 Hybrid signature spectrums
 
 draft-hale-pquip-hybrid-signature-spectrums-04.txt
 Date: 21/03/2024
 Authors: Nina Bindel, Britta Hale, Deirdre Connolly, Florence D
 Working Group: Individual Submissions (none)
This document describes classification of design goals and security considerations for hybrid digital signature schemes, including proof composability, non-separability of the component signatures given a hybrid signature, backwards/forwards compatiblity, hybrid generality, and simultaneous verification. Discussion of this work is encouraged to happen on the IETF PQUIP mailing list pqc@ietf.org or on the GitHub repository which contains the draft: https://github.com/dconnolly/draft-hale-pquip-hybrid- signature-spectrums
 BIER Anycast MPLS Label
 
 draft-chen-bier-anycast-label-01.txt
 Date: 17/03/2024
 Authors: Siyu Chen, Fanghong Duan
 Working Group: Individual Submissions (none)
This document provides a method to reduce packet loss when failures occur at BIER transit or egress nodes or link.
 Mail Autoconfig
 
 draft-bucksch-autoconfig-02.txt
 Date: 31/01/2024
 Authors: Ben Bucksch
 Working Group: Individual Submissions (none)
Set up a mail account with only email address and password. About This Document This note is to be removed before publishing as an RFC. The latest revision of this draft can be found at https://benbucksch.github.io/autoconfig-spec/draft-autoconfig-1.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-autoconfig-1/. Source for this draft and an issue tracker can be found at https://github.com/benbucksch/autoconfig-spec.
 YANG Full Embed
 
 draft-jouqui-netmod-yang-full-include-01.txt
 Date: 04/03/2024
 Authors: Jean Quilbeuf, Benoit Claise, Thomas Joubert
 Working Group: Individual Submissions (none)
YANG lacks re-usability of models defined outside of the grouping and augmentation mechanisms. For instance, it is almost impossible to reuse a model defined for a device in the context of the network, i.e by encapsulating it in a list indexed by device IDs. [RFC8528] defines the YANG mount mechanism, partially solving the problem by allowing to mount an arbitrary set of schemas at an arbitrary point. However, YANG mount is only focusing on deploy or runtime. This document aims to provide the same mechanism at design time.
 Augmented-by Addition into the IETF-YANG-Library
 
 draft-lincla-netconf-yang-library-augmentation-01.txt
 Date: 04/03/2024
 Authors: Zhuoyao Lin, Benoit Claise, Ignacio Martinez-Casanueva
 Working Group: Individual Submissions (none)
This document augments the ietf-yang-library in [RFC8525] to provide the augmented-by list. It facilitates the process of obtaining the entire dependencies of YANG model, by directly querying the server's YANG module. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/Zephyre777/draft-lincla-netconf-yang-library- augmentation.
 SRv6 Security Considerations
 
 draft-bdmgct-spring-srv6-security-01.txt
 Date: 03/03/2024
 Authors: Nick Buraglio, Tal Mizrahi, tongtian124, Luis Contreras
 Working Group: Individual Submissions (none)
SRv6 is a traffic engineering, encapsulation and steering mechanism utilizing IPv6 addresses to identify segments in a pre-defined policy. This document discusses security considerations in SRv6 networks, including the potential threats and the possible mitigation methods. The document does not define any new security protocols or extensions to existing protocols.
 Basic Requirements for IPv6 Customer Edge Routers
 
 draft-winters-v6ops-rfc7084bis-02.txt
 Date: 04/03/2024
 Authors: Gabor Lencse, Jordi Martinez, Patton, Timothy Winters
 Working Group: Individual Submissions (none)
This document specifies requirements for an IPv6 Customer Edge (CE) router. Specifically, the current version of this document focuses on the basic provisioning of an IPv6 CE router and the provisioning of IPv6 hosts attached to it. The document obsoletes RFC 7084.
 464 Customer-side Translator (CLAT): Node Recommendations
 
 draft-link-v6ops-claton-02.txt
 Date: 28/02/2024
 Authors: Jen Linkova, Tommy Jensen
 Working Group: Individual Submissions (none)
464XLAT ([RFC6877]) defines an architecture for providing IPv4 connectivity across an IPv6-only network. The solution contains two key elements: provider-side translator (PLAT) and customer-side translator (CLAT). This document provides recommendations on when a node shall enable or disable CLAT.
 Using Subnet-Specific Link-Local Addresses to Improve SLAAC Robustness
 
 draft-link-v6ops-gulla-01.txt
 Date: 25/02/2024
 Authors: Jen Linkova
 Working Group: Individual Submissions (none)
This document suggests that a link-local address used by a router as a source address for Router Advertisement packets is calculated as a function of prefixes listed in the Prefix Information Option of the Router Advertisement. The proposed approach, combined with the Rule 5.5 of the Default Source Address Selection algorithm (RFC6724) and first-hop selection requirements for hosts (RFC 8028) improves the robustness of the SLAAC by allowing the hosts to detect the IPv6 subnet changes much faster and select the correct source address.
 Sustainability Considerations for Internetworking
 
 draft-cparsk-eimpact-sustainability-considerations-07.txt
 Date: 24/01/2024
 Authors: Carlos Pignataro, Ali Rezaki, Suresh Krishnan, Hesham ElBakoury, Alexander Clemm
 Working Group: Individual Submissions (none)
This document defines a set of sustainability-related terms to be used while describing and evaluating environmental impacts of Internet technologies. It also describes several of the design tradeoffs for trying to optimize for sustainability along with the other common networking metrics such as performance and availability. Embedding sustainability considerations at the design of new protocols and extensions is more effective than attempting to do so after-the-fact. Consequently, this document also gives network, protocol, and application designers and implementors sustainability- related advice and guideance. This document recommends to authors and reviewers the inclusion of a Sustainability Considerations section in IETF Internet-Drafts and RFCs.
 EVN6: A Framework of Mapping of Ethernet Virtual Network to IPv6 Underlay
 
 draft-xie-v6ops-evn6-01.txt
 Date: 08/04/2024
 Authors: Chongfeng Xie, Xing Li, Congxiao Bao, Mark Smith, Jibin Sun
 Working Group: Individual Submissions (none)
This document describes the mechanism of mapping of Ethernet Virtual Network to IPv6 Underlay for transmission. Unlike the existing methods, this approach places the Ethernet frames to be transmitted directly in the payload of IPv6 packets, i.e., L2 over IPv6, and uses stateless mapping to generate IPv6 source and destination addresses from the host's MAC addresses, Ethernet Virtual Network identifier and site prefixes. The IPv6 packets generated in this way carry Ethernet frames and are routed to the destination site across public IPv6 network.
 Global Token Revocation
 
 draft-parecki-oauth-global-token-revocation-03.txt
 Date: 21/03/2024
 Authors: Aaron Parecki
 Working Group: Individual Submissions (none)
Global Token Revocation enables parties such as a security incident management tool or an external Identity Provider to send a request to an Authorization Server to indicate that it should revoke all of the user's existing tokens and require that the user re-authenticates before issuing new tokens.
 Usage specification of the otpauth URI format for TOTP and HOTP token generators
 
 draft-linuxgemini-otpauth-uri-01.txt
 Date: 12/05/2024
 Authors: Ilteris Eroglu
 Working Group: Individual Submissions (none)
This document describes a foundational schema for the otpauth URI, utilized by TOTP (and/or HOTP) based authenticators.
 Post-quantum Hybrid Key Exchange with ML-KEM in the Internet Key Exchange Protocol Version 2 (IKEv2)
 
 draft-kampanakis-ml-kem-ikev2-03.txt
 Date: 29/03/2024
 Authors: Panos Kampanakis, Gerardo Ravago
 Working Group: Individual Submissions (none)
[EDNOTE: The intention of this draft is to get IANA KE codepoints for ML-KEM. It could be a standards track draft given that ML-KEM will see a lot of adoption, an AD sponsored draft, or even an individual stable draft which gets codepoints from Expert Review. The approach is to be decided by the IPSECME WG. ] NIST recently standardized ML-KEM, a new key encapsulation mechanism, which can be used for quantum-resistant key establishment. This draft specifies how to use ML-KEM as an additional key exchange in IKEv2 along with traditional key exchanges. This Post-Quantum Traditional Hybrid Key Encapsulation Mechanism approach allows for negotiating IKE and Child SA keys which are safe against cryptanalytically-relevant quantum computers and theoretical weaknesses in ML-KEM.
 Mitigating QNAME minimization performance problems
 
 draft-levine-qmin-performance-01.txt
 Date: 05/05/2024
 Authors: John Levine
 Working Group: Individual Submissions (none)
QNAME minimization improves DNS privacy by truncating query names sent to authoritative name servers. While it works well when there is a zone cut between each label in a name, when a zone includes more than one level of labels, it can cause multiple redundant queries to the same server, significantly increasing the load on that server without additional privacy benefits. This document describes some situations where minimization causes load problems and potential ways to fix the problem,
 The DNS-Based scheme to revoke certificates in Transport Layer Security (TLS) Protocol: TLSR
 
 draft-jilongwang-dnsop-tlsr-01.txt
 Date: 22/11/2023
 Authors: Jilong Wang, Changqing An, Chengyuan Zhang
 Working Group: Individual Submissions (none)
This memo presents the definition of a new DNS resouce record type named TLSR, and then discusses a new framework for certificate revocation and certificate status verification. This document can solve the existing problems in the current certificate revocation schemes. This requires matching improvements in TLS client software, but no change in TLS server software.
 QUIC Bandwidth Delay Product Tokens
 
 draft-misell-quic-bdp-token-02.txt
 Date: 22/01/2024
 Authors: Q Misell
 Working Group: Individual Submissions (none)
This document describes a method to store previously calculated Congestion Control parameters on a QUIC client to allow additional capacity on high Bandwidth Delay Product paths to be used with Careful Resume. Discussion This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/theenbyperor/quic-bdp-token.
 Identity Trust System
 
 draft-sbriz-identity-trust-system-01.txt
 Date: 28/04/2024
 Authors: Luigi Sbriz
 Working Group: Individual Submissions (none)
This document describes the identity trust system, which is an open identity authentication system that requires no federation of authentication domains. It is based on a symmetric authentication protocol and a specific infrastructure based on trust in Identity Providers (IdPs). Below are the main components of the authentication process between two entities.
 Update to Message Submission for Mail
 
 draft-levine-rfc6409bis-02.txt
 Date: 19/11/2023
 Authors: John Levine
 Working Group: Individual Submissions (none)
This memo adds updated advice for e-mail message submission. This memo also offers guidance to software that constructs a message envelope from a message's headers prior to submission.
 QUIC Accurate ECN Acknowledgements
 
 draft-seemann-quic-accurate-ack-ecn-00.txt
 Date: 17/11/2023
 Authors: Marten Seemann
 Working Group: Individual Submissions (none)
QUIC defines a variant of the ACK frame that carries cumulative count for each of the three ECN codepoints (ECT(1), ECT(0) and CE). From this information, the recipient of the ACK frame cannot deduce which ECN marking the individual packets were received with. This document defines an alternative ACK frame that encodes enough information to indicate which ECN mark each individual packet was received with.
 Gender Representation in the IETF Nominating Committees
 
 draft-knodel-nomcom-gender-representation-02.txt
 Date: 04/04/2024
 Authors: Mallory Knodel
 Working Group: Individual Submissions (none)
This document extends the existing limit on nomcom representation by company in order to improve gender diversity by ensuring that not all voting members of the IETF Nominating Committee (nomcom) belong to the same gender.
 RFC 3535,20 Years Later: An Update of Operators Requirements on Network Management Protocols and Modelling
 
 draft-boucadair-nmop-rfc3535-20years-later-02.txt
 Date: 19/03/2024
 Authors: Mohamed Boucadair, Luis Contreras, Oscar de Dios, Thomas Graf, Reshad Rahman
 Working Group: Individual Submissions (none)
The IAB has organized an important workshop to establish a dialog between network operators and protocol developers, and to guide the IETF focus on work regarding network management. The outcome of that workshop was documented in the "IAB Network Management Workshop" (RFC 3535) which was instrumental for developing NETCONF and YANG, in particular.
 Flooding Reduction in CLOS Networks
 
 draft-xu-lsr-flooding-reduction-in-clos-01.txt
 Date: 21/11/2023
 Authors: Xiaohu Xu
 Working Group: Individual Submissions (none)
In a CLOS topology, an OSPF (or ISIS) router may receive identical copies of an LSA (or LSP) from multiple OSPF (or ISIS) neighbors. Moreover, two OSPF (or ISIS) neighbors may exchange the same LSA (or LSP) simultaneously. This results in unnecessary flooding of link- state information, which wastes the precious resources of OSPF (or ISIS) routers. Therefore, this document proposes extensions to OSPF (or ISIS) to reduce this flooding within CLOS networks. The reduction of OSPF (or ISIS) flooding is highly beneficial for improving the scalability of CLOS networks.
 Deterministic Networks - Navigating Precision in Communication
 
 draft-chen-detnet-automation-00.txt
 Date: 22/11/2023
 Authors: Guangshuo Chen, Yuyin Ma, Liang Wang, Ying Zhou
 Working Group: Individual Submissions (none)
This document offers a comprehensive overview of deterministic networks, elucidating their significance, key characteristics, and the challenges they address in comparison to non-deterministic counterparts. With a focus on Time-Sensitive Networking (TSN) and Precision Time Protocol (PTP), the technological aspects are explored, encompassing synchronization mechanisms, traffic shaping, and security considerations. Real-world applications in industrial automation, control systems, and multimedia streaming underscore the practical relevance of deterministic networks. The document emphasizes the importance of precise time synchronization, security measures, and collaboration within the networking community. Through acknowledgments, the collaborative efforts of the Deterministic Networking (DetNet) Working Group, authors of relevant standards, and the broader community are recognized, highlighting the collective dedication to advancing deterministic networking technologies.
 OAuth 2.0 Web Message Response Mode for Popup- and Iframe-based Authorization Flows
 
 draft-meyerzuselha-oauth-web-message-response-mode-00.txt
 Date: 23/11/2023
 Authors: Karsten zu Selhausen, Louis Jannett, Christian Mainka
 Working Group: Individual Submissions (none)
This specification defines the web message response mode that authorization servers use for transmitting authorization response parameters via the user-agent's postMessage API to the client. This mode is intended for authorization flows that use secondary windows, which are well-suited for browser-based applications.
 Fully Adaptive Routing Ethernet
 
 draft-xu-lsr-fare-02.txt
 Date: 25/02/2024
 Authors: Xiaohu Xu, Zongying He, Junjie Wang, Hongyi Huang, Qingliang Zhang, Hang Wu, Yadong Liu, Yinben Xia, Peilong Wang, Shraddha Hegde
 Working Group: Individual Submissions (none)
Large language models (LLMs) like ChatGPT have become increasingly popular in recent years due to their impressive performance in various natural language processing tasks. These models are built by training deep neural networks on massive amounts of text data, often consisting of billions or even trillions of parameters. However, the training process for these models can be extremely resource- intensive, requiring the deployment of thousands or even tens of thousands of GPUs in a single AI training cluster. Therefore, three- stage or even five-stage CLOS networks are commonly adopted for AI networks. The non-blocking nature of the network become increasingly critical for large-scale AI models. Therefore, adaptive routing is necessary to dynamically load balance traffic to the same destination over multiple ECMP paths, based on network capacity and even congestion information along those paths.
 Datagram Transport Layer Security (DTLS) in the Stream Control Transmission Protocol (SCTP) DTLS Chunk
 
 draft-westerlund-tsvwg-sctp-dtls-handshake-01.txt
 Date: 12/01/2024
 Authors: Magnus Westerlund, John Mattsson, Claudio Porfiri
 Working Group: Individual Submissions (none)
This document defines a usage of Datagram Transport Layer Security (DTLS) 1.3 to protect the content of Stream Control Transmission Protocol (SCTP) packets using the framework provided by the SCTP DTLS chunk which we name DTLS in SCTP. DTLS in SCTP provides encryption, source authentication, integrity and replay protection for the SCTP association with in-band DTLS based key-management and mutual authentication of the peers. The specification is enabling very long-lived sessions of weeks and months and supports mutual re- authentication and rekeying with ephemeral key exchange. This is intended as an alternative to using DTLS/SCTP [RFC6083] and SCTP-AUTH [RFC4895].
 Stream Control Transmission Protocol (SCTP) DTLS Chunk
 
 draft-westerlund-tsvwg-sctp-dtls-chunk-01.txt
 Date: 12/01/2024
 Authors: Magnus Westerlund, John Mattsson, Claudio Porfiri
 Working Group: Individual Submissions (none)
This document describes a method for adding Cryptographic protection to the Stream Control Transmission Protocol (SCTP). The SCTP DTLS chunk defined in this document is intended to enable communications privacy for applications that use SCTP as their transport protocol and allows applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery. Applications using SCTP DTLS chunk can use all transport features provided by SCTP and its extensions but with some limitations.
 Guidance for HTTP Capsule Protocol Extensibility
 
 draft-pardue-capsule-ext-guidance-00.txt
 Date: 23/11/2023
 Authors: Lucas Pardue
 Working Group: Individual Submissions (none)
This document updates RFC 9297 with further guidance for extensibility of the HTTP Capsule Protocol.
 Towards a CAP Theorem for Censorship Circumvention
 
 draft-cfm-circumvention-cap-theorem-01.txt
 Date: 25/11/2023
 Authors: Cory Myers
 Working Group: Individual Submissions (none)
This Internet-Draft is a submission to the IAB Workshop on Barriers to Internet Access of Services [biasws]. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-cfm-circumvention-cap- theorem/. Source for this draft and an issue tracker can be found at https://github.com/cfm/draft-cfm-circumvention-cap-theorem.
 LibrePGP Message Format
 
 draft-koch-librepgp-00.txt
 Date: 29/11/2023
 Authors: Werner Koch, Ronald Tse
 Working Group: Individual Submissions (none)
This document specifies the message formats used in LibrePGP. LibrePGP is an extension of the OpenPGP format which provides encryption with public-key or symmetric cryptographic algorithms, digital signatures, compression and key management. This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the LibrePGP format. It is not a step-by-step cookbook for writing an application. It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network. It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws. This document is based on: RFC 4880 (OpenPGP), RFC 5581 (Camellia in OpenPGP), and RFC 6637 (Elliptic Curves in OpenPGP).
 Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3
 
 draft-tls-tls13-pkcs1-00.txt
 Date: 29/11/2023
 Authors: David Benjamin, Andrei Popov
 Working Group: Individual Submissions (none)
This document allocates code points for the use of RSASSA-PKCS1-v1_5 with client certificates in TLS 1.3. This removes an obstacle for some deployments to migrate to TLS 1.3.
 RADIUS accounting via IPFIX
 
 draft-ietf-radext-dekok-radius-ipfix-00.txt
 Date: 29/11/2023
 Authors: Alan DeKok, Stefan Winter
 Working Group: Individual Submissions (none)
The Remote Authentication Dial In User Server (RADIUS) Protocol provides for a number of simple session-based metrics. There is a need to increase the number of metrics, and to add metrics for individual flows within a session. This document leverages IP Flow Information Export (IPFIX) to address both needs.
 Path Tracing in SRv6 networks
 
 draft-filsfils-ippm-path-tracing-00.txt
 Date: 01/12/2023
 Authors: Clarence Filsfils, Ahmed Abdelsalam, Pablo Camarillo, Mark Yufit, Thomas Graf, Yuanchao Su, Satoru Matsushima, Mike Valentine, Dhamija
 Working Group: Individual Submissions (none)
Path Tracing provides a record of the packet path as a sequence of interface ids. In addition, it provides a record of end-to-end delay, per-hop delay, and load on each egress interface along the packet delivery path. Path Tracing allows to trace 14 hops with only a 40-bytes IPv6 Hop- by-Hop extension header. Path Tracing supports fine grained timestamp. It has been designed for linerate hardware implementation in the base pipeline.
 Export of Flow Precision Availability Metrics Using IPFIX
 
 draft-clemm-ippm-pam-ipfix-00.txt
 Date: 04/12/2023
 Authors: Alexander Clemm, Mohamed Boucadair, Greg Mirsky
 Working Group: Individual Submissions (none)
This document defines a set of IP Flow Information Export (IPFIX) Information Elements to export precision availability data associated with Flows, specifically Flows that are associated with stringent Service Level Objectives (SLOs) such as latency or packet delay variation.
 An HTTP Status Code to Report Requester Impairment
 
 draft-richardroda-420requesterimpaired-04.txt
 Date: 12/12/2023
 Authors: Richard Roda
 Working Group: Individual Submissions (none)
This document specifies a Hypertext Transfer Protocol (HTTP) status code for use when an operation or resource is denied due to requester impairment.
 A Routing Architecture for Satellite Networks
 
 draft-li-arch-sat-06.txt
 Date: 21/02/2024
 Authors: Tony Li
 Working Group: Individual Submissions (none)
Satellite networks present some interesting challenges for packet networking. The entire topology is continually in motion, with links that are far less reliable than what is common in terrestrial networks. Some changes to link connectivity can be anticipated due to orbital mechanics. This document proposes a scalable routing architecture for satellite networks based on existing routing protocols and mechanisms, enhanced with scheduled link connectivity change information. This document proposes no protocol changes. This document presents the author's view and is neither the product of the IETF nor a consensus view of the community.
 PKCS #15 Updates
 
 draft-gutmann-pkcs15-00.txt
 Date: 06/12/2023
 Authors: Peter Gutmann
 Working Group: Individual Submissions (none)
This document describes updates to the PKCS #15 standard made since the original publication of the standard.
 Update to the use of Internet-Drafts in the Internet Standards Process
 
 draft-levine-iduse-01.txt
 Date: 31/01/2024
 Authors: John Levine
 Working Group: Individual Submissions (none)
This memo updates the way that Internet-Drafts are used in the Internet Standards Process. Rather than expiring, Internet-Drafts are marked Active or Inactive. Also, the rules for referencing Internet-Drafts in other documents are clarified.
 AEGIS-based Cipher Suites for TLS 1.3,DTLS 1.3 and QUIC
 
 draft-denis-tls-aegis-01.txt
 Date: 07/12/2023
 Authors: Frank Denis, Samuel Lucas
 Working Group: Individual Submissions (none)
This documents proposes new cipher suites based on the AEGIS family of authenticated encryption algorithms for integration into the TLS 1.3, DTLS 1.3, and QUIC protocols. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-denis-tls-aegis/. Source for this draft and an issue tracker can be found at https://github.com/jedisct1/draft-denis-tls-aegis.
 Payload Protocol Identifier based Fragmentation and Reassembly for the Stream Control Transmission Protocol
 
 draft-tuexen-tsvwg-sctp-ppid-frag-00.txt
 Date: 07/12/2023
 Authors: Michael Tuexen, Randell Jesup, Hannes Tschofenig
 Working Group: Individual Submissions (none)
This document describes a method for the Stream Control Transmission Protocol (SCTP) allowing the upper layer to perform fragmentation, reassembly, and interleaving of large ordered user messages by using the payload protocol identifier (PPID). According to the base specification supporting fragmentation of large user messages is optional. And even if an SCTP implementation supports fragmentation, interleaving of user messages is not supported by the base specification.
 Internet Control Message Protocol (ICMPv6) Loopback
 
 draft-mcb-6man-icmpv6-loopback-00.txt
 Date: 07/12/2023
 Authors: Tal Mizrahi, Tianran Zhou, Shahar Belkar, Reuven Cohen, Justin Iurman
 Working Group: Individual Submissions (none)
This document defines ICMPv6 Loopback, which enables a two-way packet exchange that can be used for probing and for diagnostic purposes. ICMPv6 Loopback is similar to ICMPv6 Echo, except that after a Loopback Request is sent, its corresponding Reply includes as much of the IPv6 Loopback Request packet as possible, including the IPv6 header and IPv6 extension headers and options if they are present.
 Origin-Bound One-Time Codes
 
 draft-wells-origin-bound-one-time-codes-00.txt
 Date: 07/12/2023
 Authors: Eryn Wells, Theresa O'Connor
 Working Group: Individual Submissions (none)
This specification defines a mechanism for associating one-time codes with domains that can be included in the body of an SMS message or the headers of an email.
 BGP Flow Specification Extensions for Traffic Statistics
 
 draft-bao-idr-flowspec-statistics-00.txt
 Date: 07/12/2023
 Authors: baolei
 Working Group: Individual Submissions (none)
RFC8955 defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix. It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification. This document extends RFC 8955 with New traffic Filtering Actions. statistic for bytes rate per second and statistic for packets rate per second are useful in specified Flow processing scenario.
 Compensation Reference for Jitter Reduction Mechanism
 
 draft-guo-detnet-compensation-reference-00.txt
 Date: 10/12/2023
 Authors: Daorong Guo, YOU Xuejun, Rubing Liu, zhushiyin
 Working Group: Individual Submissions (none)
This document describes several methods for obtaining reference delay applicable to different scenarios. These methods are in conjunction with mechanisms aimed at reducing end-to-end delay jitter in a scalable deterministic network. The goal is to meet specific business requirements and provide greater flexibility in the multipath planning for service protection.
 Retiring the Tao of the IETF
 
 draft-tenoever-tao-retirement-04.txt
 Date: 26/02/2024
 Authors: Niels ten Oever, Greg Wood
 Working Group: Individual Submissions (none)
This document retires and obsoletes the Tao of the IETF as an IETF- maintained document. This document also obsoletes RFC 6722, which describes the publication process of the Tao. Furthermore, this document describes the rationale for the retirement of the Tao. For archival purposes, the last version of the Tao is included as an annex. Information that new participants need to engage in the work of the IETF will continue to be provided through the IETF website in a more timely and accessible manner. This is the way.
 Paired MLS - PCS in Limited Modes
 
 draft-fondevik-mls-pairedmls-00.txt
 Date: 13/12/2023
 Authors: Elsie Fondevik, Britta Hale, Xisen Tian
 Working Group: Individual Submissions (none)
This document describes the Paired Messaging Layer Security (MLS) extension that improves Post Compromise Security for devices that are unable to self-update using a trusted paired device.
 MLS Virtual Clients
 
 draft-kohbrok-mls-virtual-clients-00.txt
 Date: 14/12/2023
 Authors: Joel, Konrad Kohbrok, Raphael Robert
 Working Group: Individual Submissions (none)
This document describes a method that allows multiple MLS clients to emulate a virtual MLS client. A virtual client allows multiple emulator clients to jointly participate in an MLS group under a single leaf. Depending on the design of the application, virtual clients can help hide metadata and improve performance.
 BGP Next-next Hop Nodes
 
 draft-wang-idr-next-next-hop-nodes-00.txt
 Date: 14/12/2023
 Authors: Kevin Wang, Jeffrey Haas
 Working Group: Individual Submissions (none)
BGP speakers learn their next hop addresse for NLRI in [RFC4271] in the NEXT_HOP field and in [RFC4760] in the "Network Address of Next Hop" field. Under certain circumstances, it might be desirable for a BGP speaker to know both the next hops and the next-next hops of NLRI to make optimal forwarding decisions. One such example is global load balancing (GLB) in a Clos network. [I-D.ietf-idr-entropy-label] defines the "Next Hop Dependent Capabilities Attribute" (NHC) which allows a BGP speaker to signal the forwarding capabilities associated with a given next hop. This document defines a new NHC capability, the Next-next Hop Nodes (NNHN) capability, which can be used to advertise the next-next hop nodes associated with a given next hop.
 Use cases with Requirements for Packet Optical Integration (POI) Under ACTN Framework
 
 draft-poidt-ccamp-actn-poi-pluggable-usecases-00.txt
 Date: 18/12/2023
 Authors: Oscar de Dios, Edward Echeverry, Reza Rokui, Nigel Davis, Bhavit Vadhadiya, Praveen Maheshwari, Italo Busi, Aihua Guo
 Working Group: Individual Submissions (none)
This document provides general overarching guidelines for control and management of packet over optical converged networks and focuses on operators' use cases with requirements and network topologies. It provides a set of use cases and requirements which are needed to achieve full automation for control and management of the packet over optical networks which comprise devices with mixes of packet and optical functions where the optical functions may be provided on coherent pluggables. It is intended that other IETF drafts in this area reference this draft and abide by the use cases and requirements in this draft. The realization of these use cases is out of scope of this draft and shall be covered in other IETF drafts.
 NTV tabular format (NTV-TAB)
 
 draft-thomy-ntv-tab-00.txt
 Date: 19/12/2023
 Authors: Philippe Thomy
 Working Group: Individual Submissions (none)
This document describes a set of simple rules for unambiguously and concisely encoding semantic tabular and multidimensional data (NTV- TAB format). These rules are based on the NTV structure and its JSON representation (JSON-NTV format).
 Stateless Hash-Based Signatures in Merkle Tree Ladder Mode (SLH-DSA-MTL) for DNSSEC
 
 draft-fregly-dnsop-slh-dsa-mtl-dnssec-00.txt
 Date: 19/12/2023
 Authors: Andrew Fregly, Joe Harvey, Burt Kaliski, Duane Wessels
 Working Group: Individual Submissions (none)
This document describes how to apply the Stateless Hash-Based Digital Signature Algorithm in Merkle Tree Ladder mode to the DNS Security Extensions. This combination is referred to as the SLH-DSA-MTL Signature scheme. This document describes how to specify SLH-DSA-MTL keys and signatures in DNSSEC. It uses both the SHA2 and SHAKE family of hash functions. This document also provides guidance for use of EDNS(0) in signature retrieval.
 URN Namespace for Metaverse Standards Forum Resources
 
 draft-stockhammer-msf-urn-00.txt
 Date: 19/12/2023
 Authors: Thomas Stockhammer
 Working Group: Individual Submissions (none)
This document describes the Namespace IDentifier (NID) 'metaverse- standards-org' for Uniform Resource Names (URNs) used to identify resources published by Metaverse Standards Forum. The forum specifies and manages resources that utilize this URN identification model. Example resources include ressources, eXtensible Markup Language (XML) Schemas, classification schemes, XML Document Type Definitions (DTDs), namespaces, style sheets, and other types of resources produced or managed by the Metaverse Standards Forum.
 CoAP in Space
 
 draft-gomez-core-coap-space-00.txt
 Date: 19/12/2023
 Authors: Carles Gomez, Sergio Aguilar
 Working Group: Individual Submissions (none)
This document provides guidance on using the Constrained Application Protocol (CoAP) in deep space environments. The document focuses on the scenario where an IP protocol stack is used for deep space communication.
 Internet Wall
 
 draft-pradeepkumarxplorer-ee-00.txt
 Date: 21/12/2023
 Authors: pradeep xplorer
 Working Group: Individual Submissions (none)
To be able to say the owner of two emails are same like pradeep@4a2e.online = pradeepan88@hotmail.com
 vCard Credentials
 
 draft-steele-spice-vcard-credentials-01.txt
 Date: 26/12/2023
 Authors: Orie Steele
 Working Group: Individual Submissions (none)
vCard is a file format for digital business cards. This document enables vCards to be used as a transport for digital credentials.
 Outer Header Translator
 
 draft-matsuhira-oht-01.txt
 Date: 25/02/2024
 Authors: Naoki Matsuhira
 Working Group: Individual Submissions (none)
Network address translation technology has a convenient aspect, however, it has the side effect of breaking end-to-end transparency. This document proposes a technology that achieves both network address translation and end-to-end transparency. This technology may provide solutions for mobility, migration, multihoming, policy routing, etc.
 NTS extensions for enabling pools
 
 draft-venhoek-nts-pool-00.txt
 Date: 22/12/2023
 Authors: David Venhoek, Folkert de Vries, Marc Schoolderman
 Working Group: Individual Submissions (none)
The aim of this document is to describe a proof of concept system for NTS pools that are able to be used by clients without any knowledge beyond plain NTS. The work here focuses purely on creating an intermediate NTS Key Exchange server that can be configured with the addresses of multiple downstream servers and distribute load between them. The parts of pool operation dealing with managing the list of servers are left out of scope for this work.
 Digital Credential Profiles Best Current Practices
 
 draft-steele-spice-profiles-bcp-00.txt
 Date: 22/12/2023
 Authors: Orie Steele, Michael Prorock, Mahmoud Alkhraishi
 Working Group: Individual Submissions (none)
Digital Credentials are frequently modeled on documents, forms, and messages that enable a holder to prove they have attributes that are acceptable to a verifier. This document provides guidance to verifiers enabling them to describe their requirements such that they can be translated into digital credential profiles.
 Secure Shell Key Exchange Method Using Hybrid Classic McEliece and X25519 with SHA-512: mceliece6688128x25519-sha512
 
 draft-josefsson-ssh-mceliece-00.txt
 Date: 26/12/2023
 Authors: Simon Josefsson
 Working Group: Individual Submissions (none)
This document specify a hybrid key exchange method in the Secure Shell (SSH) protocol based on Classic McEliece (mceliece6688128) and X25519 with SHA-512. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-josefsson-ssh-mceliece/. Source for this draft and an issue tracker can be found at https://gitlab.com/jas/ietf-ssh-mceliece.
 Ethernet over HTTPS Protocol
 
 draft-bouaram-ethernet-over-https-01.txt
 Date: 28/12/2023
 Authors: ARAM Salim-amine
 Working Group: Individual Submissions (none)
This document defines a protocol for encapsulating Ethernet frames over HTTPS, allowing secure communication between a client and internal web servers. The protocol includes authentication using strong API keys encrypted with the server's public key. The communication is secured using TLS for privacy and integrity.
 Recursively Setting Directories and Subitems
 
 draft-mzhang-nfsv4-recursively-setting-02.txt
 Date: 26/03/2024
 Authors: Zhang Mingqian, Sunil Bhargo, Rijesh Parambattu, Dongyu Geng, Yunfei Du
 Working Group: Individual Submissions (none)
In recent years, the concept of near-data computing has been widely recognized in storage architectures. The core idea is to process data nearby, reduce the overhead of network transmission, and utilize the computing capability of smart devices (such as intelligent NICs, smart SSDs, and DPUs). This reduces CPU and memory usage of clients (computing nodes) and improves data processing efficiency. This design idea is applied in NFSv4.2 or future NFS verions, such as Server-Side Copy, in which client sends the control command and the storage server copies data without passing through the data between the client and storage server. Compared with traditional copy operations, data is read from the source storage server and then written to the target storage server after two network transmissions. Data transmission on the network is reduced, and bandwidth resources are greatly released. In addition, the client changes from an original data copy executor to a data copy controller, and a specific execution action is executed by the storage server. Therefore, a large amount of computing resources and memory resources are saved on the client side.
 OpenPGP Hardware-Backed Secret Keys
 
 draft-dkg-openpgp-hardware-secrets-02.txt
 Date: 19/04/2024
 Authors: Daniel Gillmor
 Working Group: Individual Submissions (none)
This document defines a standard wire format for indicating that the secret component of an OpenPGP asymmetric key is stored on a hardware device.
 Adding a Wrong Recipient URL for Handling Misdirected Emails
 
 draft-dweekly-wrong-recipient-05.txt
 Date: 16/02/2024
 Authors: David Weekly
 Working Group: Individual Submissions (none)
This document describes a mechanism for an email recipient to indicate to a sender that they are not the intended recipient. About This Document This note is to be removed before publishing as an RFC. The latest revision of this draft can be found at https://dweekly.github.io/ietf-wrong-recipient/draft-dweekly-wrong- recipient.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-dweekly-wrong-recipient/. Source for this draft and an issue tracker can be found at https://github.com/dweekly/ietf-wrong-recipient.
 OpenPGP Literal Data Metadata Integrity
 
 draft-gallagher-openpgp-literal-metadata-00.txt
 Date: 01/01/2024
 Authors: Andrew Gallagher
 Working Group: Individual Submissions (none)
This document specifies a method for ensuring the integrity of file metadata when signed using OpenPGP.
 A lightweight DNS delegation confirmation protocol
 
 draft-zuo-dns-delegation-confirmation-00.txt
 Date: 01/01/2024
 Authors: Peng Zuo, Zhiwei Yan
 Working Group: Individual Submissions (none)
Delegation occurs when an NS record is added in the parent zone for the child origin. In the current DNS delegation mechanism, a delegated zone/child zone (see Section1.1 for definition of delegated zone) can specify any NS records at the zone apex without requiring confirmation from the zone maintaining Glue records of the NS record. Recently, new types of attacks that exploit this flaw have been discovered. This draft suggests a protocol-level solution for DNS delegation confirmation to reduce the risk of these attacks.
 A lightweight DNS delegation confirmation protocol
 
 draft-zuo-dnsop-delegation-confirmation-00.txt
 Date: 01/01/2024
 Authors: Peng Zuo, Zhiwei Yan
 Working Group: Individual Submissions (none)
Delegation occurs when an NS record is added in the parent zone for the child origin. In the current DNS delegation mechanism, a delegated zone/child zone (see Section1.1 for definition of delegated zone) can specify any NS records at the zone apex without requiring confirmation from the zone maintaining Glue records of the NS record. Recently, new types of attacks that exploit this flaw have been discovered. This draft suggests a protocol-level solution for DNS delegation confirmation to reduce the risk of these attacks.
 RDAP Extension for DNS Time-To-Live (TTL Values)
 
 draft-brown-rdap-ttl-extension-00.txt
 Date: 02/01/2024
 Authors: Gavin Brown
 Working Group: Individual Submissions (none)
This document describes an extension to the Registration Data Access Protocol ([RFC9083]) which allows the Time-To-Live (TTL) values for relevant DNS record types to be included in RDAP responses. About this draft This note is to be removed before publishing as an RFC. The source for this draft, and an issue tracker, may can be found at https://github.com/gbxyz/rdap-ttl-extension.
 Simplemux Blast flavor
 
 draft-saldana-tsvwg-simplemux-blast-00.txt
 Date: 02/01/2024
 Authors: Jose Saldana
 Working Group: Individual Submissions (none)
Many utilities are nowadays connected via dedicated networks, but the trend toward a fully IP network is gaining more traction in some sectors (e.g. electric power). In some use cases, although it would be desirable to avoid the use of IP networks, this may prove unavoidable. Consequently, equipment is linked to extensive communication networks, the performance of which cannot be fully controlled or known. Some utilities that are not connected to a dedicated network may use public wireless networks, which present certain degree of variability of some parameters (delay, jitter, packet loss, and bandwidth limits). Considering the importance of receiving packets with a low delay, this document presents a solution for using tunnels to send frames or packets between remote facilities, with a certain degree of redundance. This can be useful in some use cases as e.g. the sending of event-driven field commands between eletric substations. In some cases, these messages can be very critical, and their loss or delay can make the difference between a blackout and a simple outage. Considering the high redundancy of the protocol, its use must be restricted to traffic flows which require very low delay to control critical equipment.
 Cryptovolense
 
 draft-steele-spice-cryptovolense-00.txt
 Date: 02/01/2024
 Authors: Orie Steele
 Working Group: Individual Submissions (none)
Digital presentations enable a holder of digital credentials to present proofs to a verifier. Using QR Codes for digital presentations introduces challenges regarding maximum transmission size, error correction and confidentiality. This document describes a generic optical transmission protocol suitable for digital credential presentations.
 WebTransport over WebSocket
 
 draft-richter-webtransport-websocket-00.txt
 Date: 03/01/2024
 Authors: Marten Richter
 Working Group: Individual Submissions (none)
WebTransport [OVERVIEW], a protocol framework within the Web security model, empowers Web clients to initiate secure multiplexed transport for low-level client-server interactions with remote servers. This document outlines a protocol, based on WebSocket [WEBSOCKET], offering WebTransport capabilities similar to the HTTP/2 variant [WEBTRANSPORT-H2]. It serves as an alternative when UDP-based protocols are inaccessible, and the client environment exclusively supports WebSocket [WEBSOCKET].
 Extended Key Update for Transport Layer Security (TLS) 1.3
 
 draft-tschofenig-tls-extended-key-update-01.txt
 Date: 03/03/2024
 Authors: Hannes Tschofenig, Michael Tuexen, Tirumaleswar Reddy.K, Steffen Fries
 Working Group: Individual Submissions (none)
The Transport Layer Security (TLS) 1.3 specification offers a dedicated message to update cryptographic keys during the lifetime of an ongoing session. The traffic secret and the initialization vector are updated directionally but the sender may trigger the recipient, via the request_update field, to transmit a key update message in the reverse direction. In environments where sessions are long-lived, such as industrial IoT or telecommunication networks, this key update alone is insufficient since forward secrecy is not offered via this mechanism. Earlier versions of TLS allowed the two peers to perform renegotiation, which is a handshake that establishes new cryptographic parameters for an existing session. When a security vulnerability with the renegotiation mechanism was discovered, RFC 5746 was developed as a fix. Renegotiation has, however, been removed from version 1.3 leaving a gap in the feature set of TLS. This specification defines an extended key update that supports forward secrecy.
 CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing Chains of CBOR Web Tokens (CWTs)
 
 draft-tschofenig-cose-cwt-chain-00.txt
 Date: 04/01/2024
 Authors: Hannes Tschofenig, Brendan Moran
 Working Group: Individual Submissions (none)
The CBOR Object Signing and Encryption (COSE) message structure uses references to keys and defines header parameters to carry chains of X.509 certificates. This specification extends this functionality to CBOR Web Tokens (CWTs).
 Definition for Aggregated BMP Route Monitoring Message
 
 draft-liu-grow-bmp-rm-aggregated-00.txt
 Date: 05/01/2024
 Authors: Yisong Liu, Changwang Lin
 Working Group: Individual Submissions (none)
This document proposes a aggregated BMP route monitoring message. It can compress multiple BMP route monitoring messages into one aggregated BMP route monitoring message to reduce the amount of reported BMP route monitoring messages and reduce network overhead. This document updates RFC 7854 by adding new BMP Messages type.
 Clarification to processing Key Usage values during CRL validation
 
 draft-lamps-bonnell-keyusage-crl-validation-00.txt
 Date: 05/01/2024
 Authors: Corey Bonnell, Tadahiko Ito, Tomofumi Okubo
 Working Group: Individual Submissions (none)
RFC 5280 defines the profile of X.509 certificates and certificate revocation lists (CRLs) for use in the Internet. This profile requires that certificates which certify keys for signing CRLs contain the key usage extension with the cRLSign bit asserted. Additionally, RFC 5280 defines steps for the validation of CRLs. While there is a requirement for CRL validators to verify that the cRLSign bit is asserted in the keyUsage extension of the CRL issuer's certificate, there is no requirement for validators to verify the presence of the keyUsage extension itself. The lack of this requirement may manifest in an issue in some Public Key Infrastructures where a CRL issuer who has been certified by a Certification Authority to issue CRLs on its behalf can sign CRLs using a key that has not been certified for signing CRLs. This document specifies an enhancement to the CRL validation process to explicitly require the presence of the keyUsage extension to resolve this issue.
 SADCDN Video Optimization Requirements
 
 draft-joras-sadcdn-video-optimization-requirements-00.txt
 Date: 05/01/2024
 Authors: Matt Joras, Anoop Tomar, Abhishek Tiwari, Alan Frindell
 Working Group: Individual Submissions (none)
These are the requirements for the "Video Optimization" use-case for the SADCDN topic, which broadly speaking seeks to optimize video playback experience in mobile networks by cooperative communication between video content providers and the providers of network services to end users. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/mjoras/sadcdn-video-optimization-requirements.
 SPICE Metadata Discovery
 
 draft-steele-spice-metadata-discovery-01.txt
 Date: 22/01/2024
 Authors: Orie Steele
 Working Group: Individual Submissions (none)
Entities interested in digital credentials need to express and discover preferences for working with them. Before issuance, holders need to discover what credentials are supported, and issuers need to discover if a holder's wallet is safe enough to store their credentials. Before presentation, holder's need to discovery verifier's encryption keys, and which presentation formats a verifier supports. After presentation, verifiers need to discover any new key material or status changes related to credentials. This document enables issuers, holders and verifiers to discover supported protocols and formats for keys, claims, credentials and proofs.
 Transparency Tokens
 
 draft-steele-spice-transparency-tokens-00.txt
 Date: 07/01/2024
 Authors: Orie Steele
 Working Group: Individual Submissions (none)
When professionals travel for business, they carry identity documents, such as passports, employer related payment capabilites, such as corporate credit cards, and security keys that might be used for both personal or professional reasons, such as hotel or car keys. These credentials might be stored in a purse, briefcase or wallet. Digital storage systems struggle to support the various credential formats, physical proximity and remote presentation protocols, and assurance capabilities needed to enable international business. Device capabilities, cost and power consumption can preclude access and adoption of digital credentials, or exclude communities that require higher than normal privacy, sustainability, or availability guarantees. This specification describes a scalable solution to digital credentials, that is market friendly, transport agnostic, privacy oriented, and accountable to users of digital credentials above all other stakeholders.
 AAA for Hierarchical Network Slices
 
 draft-zhang-rtgwg-aaa-hierarchical-network-slices-00.txt
 Date: 07/01/2024
 Authors: Xiaoqiu Zhang, Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document describes an enhanced AAA mechanism for hierarchical network slice service when users access to the network and use the network slice resources of different SLA levels.
 Intra-domain SAV Support via IGP
 
 draft-cheng-savnet-intra-domain-sav-igp-01.txt
 Date: 25/02/2024
 Authors: Weiqiang Cheng, Dan Li, Changwang Lin, 1211176911910469110103
 Working Group: Individual Submissions (none)
This document describes a Dynamic calculation SAVNET mechanism by extending IGP protocol in intra-domain scenarios. This mechanism can propagate SAV-related information through IGP messages to help routers automatically generate accurate SAV rules which are for checking the validity of data packets.
 Internet Wall
 
 draft-pradeepkumarxplorer-postpasswordurl-02.txt
 Date: 09/01/2024
 Authors: pradeep xplorer
 Working Group: Individual Submissions (none)
To have a way to specify an URL that can retrieve contents that is available only after authentication
 Explicit Forged Answer Signal
 
 draft-pan-dnsop-explicit-forged-answer-signal-00.txt
 Date: 10/01/2024
 Authors: Pan Lanlan
 Working Group: Individual Submissions (none)
This document describes that recursive resolver should give explict signal in the forged answer. Client could react more clearly based on the explict forged answer signal, to protect user on security and privacy.
 X-Wing: general-purpose hybrid post-quantum KEM
 
 draft-connolly-cfrg-xwing-kem-02.txt
 Date: 26/03/2024
 Authors: Deirdre Connolly, Peter Schwabe, Bas Westerbaan
 Working Group: Individual Submissions (none)
This memo defines X-Wing, a general-purpose post-quantum/traditional hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML- KEM-768.
 Bicone Source Address Validation
 
 draft-li-sidrops-bicone-sav-00.txt
 Date: 10/01/2024
 Authors: Dan Li, Lancheng Qin, Li Chen, Libin Liu
 Working Group: Individual Submissions (none)
The primary design goal of source address validation (SAV) is avoiding improper block (i.e., blocking legitimate traffic) while maintaining directionality, especially in partial deployment scenarios (see [I-D.ietf-savnet-inter-domain-problem-statement] and [RFC8704]). Existing advanced SAV solutions typically generate ingress SAV allowlist filters by using information related to customer cone. This document analyzes potential improper block problems of solely using allowlist filters. To minimize improper block, this document proposes Bicone SAV, which enhances the SAV technology by additionally using blocklist filters generated based on information related to provider cone.
 Blind BBS Signatures
 
 draft-kalos-bbs-blind-signatures-00.txt
 Date: 11/01/2024
 Authors: Vasilis Kalos, Greg Bernstein
 Working Group: Individual Submissions (none)
This document defines an extension to the BBS Signature scheme that supports blind digital signatures, i.e., signatures over messages not known to the Signer. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/BasileiosKal/blind-bbs-signatures.
 Transfer Digital Credentials Securely
 
 draft-vinokurov-tigress-http-00.txt
 Date: 11/01/2024
 Authors: Dmitry Vinokurov, Yogesh Karandikar, Matthias Lerch, Alex Pelletier, Nick Sha
 Working Group: Individual Submissions (none)
Digital Credentials allow users to access Homes, Cars or Hotels using their mobile devices. Once a user has a Credential on a device, sharing it to others is a natural use case. Process of sharing credentials should be secure, privacy preserving and have a seamless user experience. To facilitate Credential sharing, a new transport is required. This document defines that new transport to meet unique requirements of sharing a Credential.
 Oblivious Credential State
 
 draft-steele-spice-oblivious-credential-state-00.txt
 Date: 13/01/2024
 Authors: Orie Steele
 Working Group: Individual Submissions (none)
Issuers of Digital Credentials enable dynamic state or status checks through the use of dereferenceable identifiers, that resolve to resources providing herd privacy. Privacy in such systems is determined not just from the size of the herd, and the cryptographic structure encoding it, but also from the observability of access to shared state. This document describes a privacy preserving state management system for digital credentials based on Oblivious HTTP that addresses both data model and protocol risks associated with digital credentials with dynamic state.
 Support of Network Observation Timestamping in YANG Notifications
 
 draft-tgraf-netconf-yang-push-observation-time-01.txt
 Date: 14/04/2024
 Authors: Thomas Graf, Benoit Claise, Alex Feng
 Working Group: Individual Submissions (none)
This document extends the YANG Notification header with the YANG objects observation timestamping, both for the "push-update" and "push-change-update" notifications.
 How is the Area Director Workload Made Up?
 
 draft-farrel-how-much-ad-work-00.txt
 Date: 15/01/2024
 Authors: Adrian Farrel, Rich Salz
 Working Group: Individual Submissions (none)
Anecdotally, every IESG complains about the Area Director (AD) workload, and says that it takes the first full term to understand the job. Empirically, the AD workload is high sometimes causing backlogs in processing of Internet-Drafts and stressing the ADs. After some discussions in the GENDISPATCH working group and arising from an Internet-Draft postulating changes that might reduce the AD workload, several ADs reported some data on how they spent their time in a few weeks chosen at random. This document collates that data and presents it for information. This document does not attempt to draw any conclusions from the limited data currently available, and there is no intention to publish this document as an RFC.
 Entering IPv6 Zone Identifiers in User Interfaces
 
 draft-carpenter-6man-zone-ui-04.txt
 Date: 31/03/2024
 Authors: Brian Carpenter, Robert Hinden
 Working Group: Individual Submissions (none)
This document describes how the zone identifier of an IPv6 scoped address, defined in the IPv6 Scoped Address Architecture (RFC 4007), should be entered into a user interface. It obsoletes RFC 6874. Discussion Venue This note is to be removed before publishing as an RFC. Discussion of this document takes place on the 6MAN mailing list (ipv6@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/ipv6/ (https://mailarchive.ietf.org/arch/browse/ipv6/).
 XML to JSON conversion rules for RESTful EPP
 
 draft-wullink-restful-epp-json-00.txt
 Date: 16/01/2024
 Authors: Maarten Wullink, Marco Davids
 Working Group: Individual Submissions (none)
This document describes the rules for converting an EPP [RFC5730] XML message to a JSON [RFC8259] message for use with RESTful EPP [REF-TO- REPP-HERE].
 Dataplane Enhancement Taxonomy
 
 draft-joung-detnet-taxonomy-dataplane-01.txt
 Date: 25/02/2024
 Authors: Jinoo Joung, Xuesong Geng, Shaofu Peng, Toerless Eckert
 Working Group: Individual Submissions (none)
This draft is to facilitate the understanding of the data plane enhancement solutions, which are suggested currently or can be suggested in the future, for deterministic networking. This draft provides criteria for classifying data plane solutions. Examples of each category are listed, along with reasons where necessary. Strengths and limitations of the categories are described. Suitability of the solutions for various services of deterministic networking are also briefly mentioned.
 JOSE algorithms for ECDH-MAC-based signatures
 
 draft-bastian-jose-alg-ecdh-mac-01.txt
 Date: 17/01/2024
 Authors: Paul Bastian
 Working Group: Individual Submissions (none)
This specification defines a JSON Web Algorithm for JOSE, that uses a combination of key agreement and MAC to construct a signature-like mechanism.
 Peering API
 
 draft-ramseyer-grow-peering-api-04.txt
 Date: 16/03/2024
 Authors: Carlos Aguado, Matt Griswold, Jenny Ramseyer, Arturo Servin, Tom Strickx
 Working Group: Individual Submissions (none)
We propose an API standard for BGP Peering, also known as interdomain interconnection through global Internet Routing. This API offers a standard way to request public (settlement-free) peering, verify the status of a request or BGP session, and list potential connection locations. The API is backed by PeeringDB OIDC, the industry standard for peering authentication. We also propose future work to cover private peering, and alternative authentication methods.
 Paths Limit for Multiple Paths in BGP
 
 draft-abraitis-idr-addpath-paths-limit-01.txt
 Date: 01/02/2024
 Authors: Donatas Abraitis, Alvaro Retana, Jeffrey Haas
 Working Group: Individual Submissions (none)
This document specifies a BGP capability that complements the ADD- PATH Capability by indicating the maximum number of paths a BGP speaker can receive from a peer, optimizing the transmission of BGP routes by selectively relaying pertinent routes instead of the entire set.
 Email identity
 
 draft-pradeepkumarxplorer-getemailidfromipaddress-02.txt
 Date: 30/01/2024
 Authors: pradeep xplorer
 Working Group: Individual Submissions (none)
To have a way in PHP and html to get the email identities and phone numbers that logged into the client IP address that viewed a wevsite
 Policing Caused Jitter Control Mechanism
 
 draft-peng-detnet-policing-jitter-control-00.txt
 Date: 18/01/2024
 Authors: Shaofu Peng, Peng Liu, Kashinath Basu
 Working Group: Individual Submissions (none)
A mechanism to eliminate jitter caused by policing delay is described. It needs to be used in combination with a scheduling mechanism that provides low jitter for the transport path, and ultimately provides a low jitter guarantee for the application flow.
 Delay Options
 
 draft-peng-6man-delay-options-00.txt
 Date: 18/01/2024
 Authors: Shaofu Peng
 Working Group: Individual Submissions (none)
This document introduces new IPv6 options for HBH or DOH Options header, to carry delay related information for deterministic forwarding.
 Some Key Terms for Network Incident and Problem Management
 
 draft-davis-nmop-incident-terminology-01.txt
 Date: 13/05/2024
 Authors: Nigel Davis, Adrian Farrel, Thomas Graf, Qin WU, Chaode Yu
 Working Group: Individual Submissions (none)
This document sets out some key terms that are fundamental to a common understanding of network incident and problem management within the IETF. The purpose of this document is to bring clarity to discussions and other work related to network incident and problem management in particular YANG models and management protocols that report, make visible, or manage network incidents and problems.
 Safe(r) Limited Domains
 
 draft-wkumari-intarea-safe-limited-domains-00.txt
 Date: 19/01/2024
 Authors: Warren Kumari, Andrew Alston, Eric Vyncke, Suresh Krishnan
 Working Group: Individual Submissions (none)
There is a trend towards documents describing protocols that are only intended to be used within "limited domains". Unfortunately, these drafts often do not clearly define how the boundary of the limited domain is established and enforced, or require that operators of these limited domains //perfectly// implement filters to protect the rest of the Internet from these protocols. In addition, these protocols sometimes require that networks that are outside of (and unaffiliated with) the limited domain explicitly implement filters in order to protect their networks if these protocols leak outside of the limited domain. This document discusses the concepts of "fail-open" versus "fail- closed" protocols and limited domains, and provides a mechanism for designing limited domain protocols that are safer to deploy.
 Semantic Metadata Annotation for Network Anomaly Detection
 
 draft-netana-nmop-network-anomaly-semantics-01.txt
 Date: 16/03/2024
 Authors: Thomas Graf, Wanting Du, Alex Feng, Vincenzo Riccobene, Antonio Roberto
 Working Group: Individual Submissions (none)
This document explains why and how semantic metadata annotation helps to test, validate and compare outlier detection, supports supervised and semi-supervised machine learning development, enables data exchange among network operators, vendors and academia and make anomalies for humans apprehensible. The proposed semantics uniforms the network anomaly data exchange between and among operators and vendors to improve their network outlier detection systems.
 IPv4 routes with an IPv6 next hop
 
 draft-chroboczek-intarea-v4-via-v6-00.txt
 Date: 21/01/2024
 Authors: Juliusz Chroboczek, Warren Kumari, Toke Hoeiland-Joergensen
 Working Group: Individual Submissions (none)
We propose "v4-via-v6" routing, a technique that uses IPv6 next-hop addresses for routing IPv4 packets, thus making it possible to route IPv4 packets across a network where routers have not been assigned IPv4 addresses. We describe the technique, and discuss its operational implications. { Editor note: This document was originally published as draft- chroboczek-int-v4-via-v6, and later renamed to draft-chroboczek- intarea-v4-via-v6 . }
 The SDN-based MPTCP-aware and MPQUIC-aware Transmission Control Model using ALTO
 
 draft-xing-nmop-sdn-controller-aware-mptcp-mpquic-00.txt
 Date: 22/01/2024
 Authors: Ziyang Xing, Xiaoqiang Di, Hui Qi
 Working Group: Individual Submissions (none)
This document aims to study and implement Multipath Transmission Control Protocol (MPTCP) and Multipath QUIC (MPQUIC) using application layer traffic optimization (ALTO) in software defined network (SDN). In a software-defined network, ALTO server collects network cost indicators (including link delay, number of paths, availability, network traffic, bandwidth and packet loss rate etc.), and the controller extracts MPTCP or MPQUIC packet header to allocate MPTCP or MPQUIC packet to suitable transmission path according to the network cost indicators by ALTO, which can reduce the probability of transmission path congestion and improving path utilization in a multipath transmission network.
 Extensible Delegation for DNS
 
 draft-dnsop-deleg-00.txt
 Date: 23/01/2024
 Authors: Tim April, Petr Spacek, Ralf Weber, tale
 Working Group: Individual Submissions (none)
A delegation in the Domain Name System (DNS) is a mechanism that enables efficient and distributed management of the DNS namespace. It involves delegating authority over subdomains to specific DNS servers via NS records, allowing for a hierarchical structure and distributing the responsibility for maintaining DNS records. An NS record contains the hostname of the nameserver for the delegated namespace. Any facilities of that nameserver must be discovered through other mechanisms. This document proposes a new extensible DNS record type, DELEG, which contains additional information about the delegated namespace and the capabilities of authoritative nameservers for the delegated namespace.
 MPLS FRR bypass path calculation with bandwidth awareness without reservation
 
 draft-szarecki-teas-bw-aware-bypass-no-reservation-00.txt
 Date: 23/01/2024
 Authors: Rafal Szarecki, Jon Mitchell
 Working Group: Individual Submissions (none)
RFC4090 documents facility backup FRR in MPLS-TE networks. This document describes methods that allow the Point of Local Repair (PLR) to find a path with sufficient available bandwidth to accommodate protected traffic, while not making undesired reservations that would require additional capacity. Below aspects are covered: * Automatic determination of bypass required bandwidth by the PLR * Calculation of path based on this information using constrained shortest path algorithm (CSPF) * Determination of RSVP SENDER-TSPEC rate value for bypass tunnel signaling
 Intent Translation Engine for Intent-Based Networking
 
 draft-pedro-ite-01.txt
 Date: 04/03/2024
 Authors: Pedro Martinez-Julia, Jaehoon Jeong
 Working Group: Individual Submissions (none)
This document specifies the schemas and models required to realize the data formats and interfaces for Intent-Based Networking (IBN). They are needed to enable the composition of services to build a translation engine for IBN-based network management. This intent translation engine (called an intent translator) is an essential function for network intents to be enforced into a target network for the configuration and management of the network and its security.
 Extensible Provisioning Protocol (EPP) mapping for DELEG records
 
 draft-brown-epp-deleg-00.txt
 Date: 26/01/2024
 Authors: Gavin Brown, Paul Hoffman
 Working Group: Individual Submissions (none)
This document describes an extension to the Extensible Provisioning Protocol ([STD69]) which allows clients to provision DELEG records for domain names. About this draft This note is to be removed before publishing as an RFC. The source for this draft, and an issue tracker, may can be found at https://github.com/gbxyz/epp-deleg-extension.
 Asset Schema Architecture for Asset Exchange
 
 draft-avrilionis-satp-asset-schema-architecture-04.txt
 Date: 10/05/2024
 Authors: Denis Avrilionis, Thomas Hardjono
 Working Group: Individual Submissions (none)
A management architecture for asset schemas and profiles is needed to enable entities in the tokenized assets ecosystem to instantiate tokens within one or more asset networks. An asset network may be constrained to support only a select class or type of token to be present in the network. In the SATP protocol, the receiving gateway at the destination network is assumed in its preparatory stages to evaluate the transfer request of a tokenized asset from the sending gateway at the origin network. In order to evaluate the proposed transfer, the receiving gateway must have access to the asset definition schema upon which the token was based in the origin network. The current document discusses the management architecture for the asset definition schema and the schema-profiles derived from the definition schema.
 Use Cases-Standalone Service ID in Routing Network
 
 draft-huang-rtgwg-us-standalone-sid-00.txt
 Date: 28/01/2024
 Authors: Daniel Huang, gechen, Jie Liang, Yan Zhang, Feng Yang, Dong Yang, Dongyu Yuan, FUHUAKAI, Cheng Huang, Yong Guo
 Working Group: Individual Submissions (none)
More and more emerging applications have raised the demand for establishing networking connections anywhere and anytime, alongside the availability of highly distributive any-cloud services. Such a demand motivates the need to efficiently interconnect heterogeneous entities, e.g., different domains of network and cloud owned by different providers, with the goal of reducing cost, e.g., overheads and end-to-end latency, while ensuring the overall performance satisfies the requirements of the applications. Considering that different network domains and cloud providers may adopt different types of technologies, the key of interconnection and efficient coordination is to employ a unified interface that can be understood by heterogeneous parties which could derive the consistent requirements of the same service and treat the service traffic appropriately by their proprietary policies and technologies. This document provides use cases and problem statements from two main Internet traffic categories: one is the traditional north-south traffic which is defined from clients to entities (such as servers or DCs), and the other is east-west traffic which refers to traffic between entities (such as inter-server or inter-service).The requirements for a standalone Service ID are also derived.
 Using ShangMi in the Internet Key Exchange Protocol Version 2 (IKEv2)
 
 draft-guo-ipsecme-ikev2-using-shangmi-00.txt
 Date: 28/01/2024
 Authors: Yanfei Guo, Liang Xia, Yu Fu
 Working Group: Individual Submissions (none)
This document defines a set of cryptographic transforms for using in the Internet Key Exchange Protocol version 2 (IKEv2). The transforms are based on Chinese cryptographic standard algorithms (called "ShangMi" or “SM” algorithms). The use of these algorithms with IKEv2 is not endorsed by the IETF. The SM algorithms are mandatory in China, so this document provides a description of how to use the SM algorithms with IKEv2 and specifies a set of cryptographic transforms so that implementers can produce interworking implementations.
 Export of GTP-U Information in IP Flow Information Export (IPFIX)
 
 draft-voyersriram-opsawg-ipfix-gtpu-06.txt
 Date: 25/04/2024
 Authors: Dan Voyer, Sriram Gopalakrishnan, Thomas Graf, Benoit Claise, Vyasraj Satyanarayana
 Working Group: Individual Submissions (none)
This document introduces IP Flow Information Export Information Elements to identify information contained in the Generic Packet Radio Service Tunneling Protocol User Plane header such as Tunnel Endpoint Identifier, and data contained in its session container extension header.
 JSON Schema extension to NTV data
 
 draft-thomy-ntv-schema-00.txt
 Date: 01/02/2024
 Authors: Philippe Thomy
 Working Group: Individual Submissions (none)
The NTV format is an extension of the JSON format integrating a semantic dimension through the notion of type. This format remains compatible with the current JSON format but it is relevant to examine its compatibility and its impacts with data schemas. This document provides some answers to this question and presents some of the possible developments based mainly on the example of JSON Schema and additionally on the example of OpenAPI.
 Transport Layer Security (TLS) Authentication with Verifiable Credential (VC)
 
 draft-vesco-vcauthtls-01.txt
 Date: 16/02/2024
 Authors: Andrea Vesco, Leonardo Perugini
 Working Group: Individual Submissions (none)
This document defines a new certificate type and extension for the exchange of Verifiable Credentials in the handshake of the Transport Layer Security (TLS) protocol. The new certificate type is intended to add the Verifiable Credentials as a new means of authentication. The resulting authentication process leverages a distributed ledger as the root of trust of the TLS endpoints' public keys. The endpoints can use different distributed ledger technologies to store their public keys and to perform the TLS handshake.
 DHCPv4 over DHCPv6 with Relay Agent Support
 
 draft-porfiri-dhc-dhcpv4-over-dhcpv6-ra-00.txt
 Date: 01/02/2024
 Authors: Claudio Porfiri, Suresh Krishnan, Jari Arkko, Mirja Kuehlewind
 Working Group: Individual Submissions (none)
This document describes a general mechanism for networks with legacy IPv4 only clients to use DHCPv4-over-DHCPv6 (DHCP 4o6) for discovering information about network Topology. To address this scenario, this document specifies an amendment to RFC7341 that allows a new 4o6 Relay Agent (4o6RA) to perform the 4o6 DHCP en- and decapsultion instead of the client.
 Deterministic Hashed Data Elision: Problem Statement and Areas of Work
 
 draft-appelcline-hashed-elision-00.txt
 Date: 01/02/2024
 Authors: Shannon Appelcline, Wolf McNally, Christopher Allen
 Working Group: Individual Submissions (none)
This document discusses the privacy and human rights benefits of data minimization via the methodology of hashed data elision and how it can help protocols to fulfill the guidelines of RFC 6973: Privacy Considerations for Internet Protocols and RFC 8280: Research into Human Rights Protocol Considerations. Additional details discuss how the extant Gordian Envelope draft can provide further benefits in these categories.
 PROBE: A Utility for Probing Interfaces
 
 draft-fenner-intarea-probe-clarification-00.txt
 Date: 01/02/2024
 Authors: Bill Fenner, Ron Bonica, Reji Thomas, Jen Linkova, Chris Lenart, Mohamed Boucadair
 Working Group: Individual Submissions (none)
This document describes a network diagnostic tool called PROBE. PROBE is similar to PING in that it can be used to query the status of a probed interface, but it differs from PING in that it does not require bidirectional connectivity between the probing and probed interfaces. Instead, PROBE requires bidirectional connectivity between the probing interface and a proxy interface. The proxy interface can reside on the same node as the probed interface, or it can reside on a node to which the probed interface is directly connected. This document updates RFC 4884 and obsoletes RFC 8335.
 A SOCKS Transparent Proxy Method
 
 draft-lucioni-a-socks-transparent-proxy-method-00.txt
 Date: 02/02/2024
 Authors: G. Lucioni
 Working Group: Individual Submissions (none)
This document describes a backwards-compatible extension of the SOCKS version 5 protocol to include a transparent proxy type method.
 TCP-AO Protection for BGP Monitoring Protocol (BMP)
 
 draft-hmntsharma-bmp-tcp-ao-03.txt
 Date: 11/04/2024
 Authors: Hemant Sharma, Jeffrey Haas
 Working Group: Individual Submissions (none)
This document outlines the utilization of the TCP Authentication Option (TCP-AO), as specified in RFC5925, for the authentication of BGP Monitoring Protocol (BMP) sessions, as specified in RFC7854. TCP-AO provides for the authentication of BMP sessions established between routers and BMP stations at the TCP layer. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao.
 ICMP Extensions for Environmental Information
 
 draft-pignataro-eimpact-icmp-02.txt
 Date: 05/04/2024
 Authors: Carlos Pignataro, Jainam Parikh, Ron Bonica, Michael Welzl
 Working Group: Individual Submissions (none)
This document defines a data structure that can be appended to selected ICMP messages. The ICMP extension defined herein can be used to gain visibility on environmental impact information on the Internet by providing per-hop (i.e., per topological network node) power metrics and other current or future sustainability metrics. This will contribute to achieving an objective mentioned in the IAB E-Impact workshop. The techniques presented are useful not only in a transactional setting (e.g., a user-issued traceroute or a ping request), but also in a scheduled automated setting where they may be run periodically in a mesh across an administrative domain to map out environmental- impact metrics.
 Simple Two-Way Active Measurement Protocol (STAMP) Extensions for Reflecting STAMP Packet Headers
 
 draft-gandhi-ippm-stamp-ext-hdr-00.txt
 Date: 06/02/2024
 Authors: Rakesh Gandhi, Tianran Zhou
 Working Group: Individual Submissions (none)
Simple Two-Way Active Measurement Protocol (STAMP) defined in RFC 8762 and its optional extensions defined in RFC 8972 can be used for Edge-To-Edge (E2E) active measurement. In Situ Operations, Administration, and Maintenance (IOAM) data fields defined in RFC 9197 can be used for recording and collecting Hop-By-Hop (HBH) and E2E operational and telemetry information. This document extends STAMP to reflect any IPv6 options and MPLS Network Action Sub-Stacks for hop-by-hop and edge-to-edge active measurements, including IOAM data fields.
 OAuth 2.0 Nonce Endpoint
 
 draft-demarco-oauth-nonce-endpoint-00.txt
 Date: 06/02/2024
 Authors: Giuseppe De Marco, Orie Steele
 Working Group: Individual Submissions (none)
This document defines the Nonce Endpoint for OAuth 2.0 implementations [RFC6749]. It details how an Authorization Server generates and issues opaque Nonces and how a client can learn about this endpoint to obtain a Nonce generated by the Authorization Server.
 OAuth Status Attestations
 
 draft-demarco-oauth-status-attestations-01.txt
 Date: 19/04/2024
 Authors: Giuseppe De Marco, Orie Steele, Francesco Marino
 Working Group: Individual Submissions (none)
Status Attestation is a signed object that demonstrates the validity status of a digital credential. These attestations are periodically provided to holders, who can present these to Verifiers along with the corresponding digital credentials. The approach outlined in this document makes the verifiers able to check the non-revocation of a digital credential without requiring to query any third-party entities.
 RTCP feedback Message Timing Configuration
 
 draft-majali-avtcore-rtcp-fb-timing-cfg-00.txt
 Date: 06/02/2024
 Authors: Shridhar Majali
 Working Group: Individual Submissions (none)
This specification describes configuring the Real-time Transport Control Protocol (RTCP) message feedback send time.
 IPv6 Address Assignment for SRv6
 
 draft-liu-srv6ops-sid-address-assignment-00.txt
 Date: 07/02/2024
 Authors: Yisong Liu, Yongqing Zhu
 Working Group: Individual Submissions (none)
This document provides detailed SRv6 SID assignment considerations, which could be a comprehensive guide for optimizing SRv6 SID allocation in diverse deployment scenarios.
 A Network Inventory Location Model
 
 draft-wbbpb-ivy-network-inventory-location-00.txt
 Date: 07/02/2024
 Authors: Bo Wu, Sergio Belotti, Jean-Francois Bouquier, Fabio Peruzzini, Phil Bedard
 Working Group: Individual Submissions (none)
This document defines a Yang data model for Network Inventory location, e.g. site, room, rack, geo-location data, which is used to provide location information with different granularities for network inventory items (such as Network Elements, device components). Accurate location information is useful for network planning, deployment, and maintenance. However, such information cannot be obtained or verified from Network Elements and therefore is not included in the base Network Inventory model defined in draft-ietf- ivy-network-inventory-yang. The purpose of this document is to define a location model for network inventory that extends the base inventory with comprehensive location data.
 NASR Use Case and Requirements
 
 draft-liu-nasr-requirements-01.txt
 Date: 03/03/2024
 Authors: Peter Liu, Luigi Iannone, Diego Lopez, Antonio Pastor, Meiling Chen, Li Su
 Working Group: Individual Submissions (none)
This document describes the use cases and requirements that guide the specification of a Network Attestation for Secure Routing framework (NASR).
 MASQUE extension for signaling media bitrate
 
 draft-ihlar-masque-sconepro-mediabitrate-00.txt
 Date: 09/02/2024
 Authors: Marcus Ihlar, Mirja Kuehlewind
 Working Group: Individual Submissions (none)
This document specifies a new Capsule (RFC9297) that can be used with CONNECT-UDP (RFC9298), CONNECT-IP (RFC9484), or other future CONNECT extensions to signal the available bitrate for media traffic that is proxied through an HTTP server. This information can be used by a media application to regulate its media bitrate in accordance with a network policy, as an alternative to in-network traffic shaping.
 Recommendation to avoid use of BGP Extended Communities at Internet Exchange Route Servers
 
 draft-spaghetti-grow-bcp-ext-comms-02.txt
 Date: 18/04/2024
 Authors: Job Snijders, Stavros Konstantaras, Mo Shivji
 Working Group: Individual Submissions (none)
This document outlines a recommendation to the Internet operational community to avoid the use of BGP Extended Communities at Internet Exchange Point (IXP) Route Servers. It includes guidance for both the Internet Service Provider side peering with Route Servers and IXPs operating Route Servers. This recommendation aims to help the global Internet routing system's performance and help protect Route Server participants against misconfigurations.
 Security and Privacy Implications of 3GPP AI/ML Networking Studies for 6G
 
 draft-sarischo-6gip-aiml-security-privacy-01.txt
 Date: 02/04/2024
 Authors: Behcet Sarikaya, Roland Schott
 Working Group: Individual Submissions (none)
This document provides an overview of 3GPP work on Artificial Intelligence/ Machine Learning (AI/ML) networking. Application areas and corresponding proposed modifications to the architecture are identified. Security and privacy issues of these new applications need to be identified out of which IETF work could emerge.
 Extending ICMP for Node Identification
 
 draft-fenner-intarea-extended-icmp-hostid-01.txt
 Date: 23/04/2024
 Authors: Bill Fenner, Reji Thomas
 Working Group: Individual Submissions (none)
RFC5837 describes a mechanism for Extending ICMP for Interface and Next-Hop Identification, which allows providing additional information in an ICMP error that helps identify interfaces participating in the path. This is especially useful in environments where each interface may not have a unique IP address to respond to, e.g., a traceroute. This document introduces a similar ICMP extension for Node Identification. It allows providing a unique IP address and/or a textual name for the node, in the case where each node may not have a unique IP address (e.g., the IPv6 nexthop deployment case described in draft-chroboczek-intarea-v4-via-v6).
 Something Better Than Errata
 
 draft-farrell-errata-00.txt
 Date: 11/02/2024
 Authors: Stephen Farrell
 Working Group: Individual Submissions (none)
This document outlines some ideas for a system that would (in the author's view) be better than current errata handling. This is for discussion and is not expected to become an RFC.
 Just-In-Time RFC Publication
 
 draft-rescorla-rfc-jit-00.txt
 Date: 11/02/2024
 Authors: Eric Rescorla
 Working Group: Individual Submissions (none)
This document describes a new approach to RFC publication that is intended to allow easy revisions without re-running the entire RFC publication process. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/ekr/draft-rescorla-rfc-jit.
 Policy Considerations for Changes to RFCs
 
 draft-carpenter-rswg-rfc-changes-01.txt
 Date: 23/02/2024
 Authors: Brian Carpenter
 Working Group: Individual Submissions (none)
This document describes policies applicable when the text of an RFC is modified after it has been approved for publication. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-carpenter-rswg-rfc-changes/. Discussion of this document takes place on the RSWG Working Group mailing list (mailto:rswg@rfc-editor.org), which is archived at https://mailarchive.ietf.org/arch/browse/rswg/.
 The "testing" flag for Service Binding (SVCB) Records
 
 draft-manuben-svcb-testing-flag-00.txt
 Date: 12/02/2024
 Authors: Benjamin Schwartz, Manu Bretelle
 Working Group: Individual Submissions (none)
This draft defines a flag to mark a service endpoint as being potentially unreliable. This flag may be useful when introducing new features that could have a negative impact on availability. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-manuben-svcb-testing-flag/. Source for this draft and an issue tracker can be found at https://github.com/bemasc/svcb-testing-flag.
 Characterization and Benchmarking Methodology for Power in Networking Devices
 
 draft-cprjgf-bmwg-powerbench-01.txt
 Date: 04/03/2024
 Authors: Carlos Pignataro, Romain Jacob, Giuseppe Fioccola, Qin WU
 Working Group: Individual Submissions (none)
This document defines a standard mechanism to measure, report, and compare power usage of different networking devices and under different network configurations and conditions.
 SIP Product Identifier
 
 draft-jesske-dispatch-sip-product-identifier-00.txt
 Date: 14/02/2024
 Authors: Roland Jesske, Bastian Dreyer, Michael Kreipl, Roland Schott
 Working Group: Individual Submissions (none)
Complex telephony networks using SIP as signalling like the IP Multimedia Subsystem (IMS) of the Third Generation Partnership (3GPP) serving different groups of customers like business and retail customers with different products like mobile, fixed and PBX services have the problem of different handling of the services. This may end up in a complex analysis of the signalling syntax before starting the required procedures for calls based on their service provided to the customer. With the introduction of microservice based technologies the complexity increases. This draft describes a generic identification mechanism for SIP dialogs in using an identifier indicating the service/product which the customer is using to allow an efficient processing of the SIP dialog and session.
 Discovery of CIDFI-aware Network Elements
 
 draft-wing-cidfi-discovery-00.txt
 Date: 14/02/2024
 Authors: Dan Wing, Tirumaleswar Reddy.K, Mohamed Boucadair
 Working Group: Individual Submissions (none)
Host-to-network signaling and network-to-host signaling can improve the user experience to adapt to network's constraints and share expected application needs, and thus to provide differentiated service to a flow and to packets within a flow. The differentiated service may be provided at the network (e.g., packet prioritization), the server (e.g., adaptive transmission), or both. Such an approach is called CIDFI, for Collaborative and Interoperable Dissemination of Flow Indicators. A key component in a CIDFI system is to discover whether a network is CIDFI-capable, and if so discover a set of CIDFI-aware Network Elements (CNEs) that will be involved in the Host-to-network signaling and network-to-host signaling. This document discusses a set of discovery methods.
 A YANG Data Model for Energy Saving Management
 
 draft-cwbgp-ivy-energy-saving-management-01.txt
 Date: 02/03/2024
 Authors: Gen Chen, Qin WU, Mohamed Boucadair, Oscar de Dios, Carlos Pignataro
 Working Group: Individual Submissions (none)
This document defines a YANG module for power and energy management. The document covers both device and network levels. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the Network Inventory YANG Working Group mailing list (inventory-yang@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/inventory-yang/. Source for this draft and an issue tracker can be found at https://github.com/boucadair/draft-cwbgp-energy-saving-management.
 Auto-discovery mechanism for ACME authorized clients
 
 draft-vanbrouwershaven-acme-client-discovery-00.txt
 Date: 15/02/2024
 Authors: Paul van Brouwershaven, Mike Ounsworth, Corey Bonnell, Inigo Barreira, Q Misell
 Working Group: Individual Submissions (none)
A significant challenge in the widespread adoption of the Automated Certificate Management Environment (ACME) [RFC8555] is the trust establishment between ACME servers and clients. While ACME clients can automatically discover the URL of the ACME server through ACME Auto Discovery [I-D.vanbrouwershaven-acme-auto-discovery], they face difficulty in identifying authorized clients. This draft proposes a solution to this problem by allowing Certification Authority (CA) customers to specify which ACME keys are authorized to request certificates on their behalf by simply providing the domain name of the service provider. Specifically, this document registers the URI "/.well-known/acme- keys" at which all compliant service providers can publish their ACME client public keys. This mechanism allows the ACME server to identify the specific service provider, enhancing the trust relationship. Furthermore, it provides flexibility to service providers as they can use multiple keys and rotate them as often as they like, thereby improving security and control over their ACME client configurations while giving CA customers the ability to specifically authorize which service providers can request certificates on their behalf.
 IPv4 Parcels and Advanced Jumbos (AJs)
 
 draft-templin-intarea-parcels2-03.txt
 Date: 12/04/2024
 Authors: Fred Templin
 Working Group: Individual Submissions (none)
IPv6 Parcels and Advanced Jumbos (AJs) present new data packaging constructs and a new link model for Internetworking. As is often the case, technologies developed in the IPv6 space can also be applied in IPv4 and vice-versa. This document presents the adaptations necessary to support Parcels and AJs in IPv4.
 QUIC on Streams
 
 draft-kazuho-quic-quic-on-streams-00.txt
 Date: 16/02/2024
 Authors: Kazuho Oku, Lucas Pardue
 Working Group: Individual Submissions (none)
This document specifies a polyfill of QUIC version 1 that runs on top of bi-directional streams such as TLS. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the QUIC Working Group mailing list (quic@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/quic/. Source for this draft and an issue tracker can be found at https://github.com/kazuho/draft-kazuho-quic-quic-on-streams.
 HTTP/3 on Streams
 
 draft-kazuho-httpbis-http3-on-streams-00.txt
 Date: 16/02/2024
 Authors: Kazuho Oku, Lucas Pardue
 Working Group: Individual Submissions (none)
This document specifies how to use HTTP/3 on top of bi-directional, byte-oriented streams such as TLS over TCP. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the HTTP Working Group mailing list (ietf-http-wg@w3.org), which is archived at https://lists.w3.org/Archives/Public/ietf-http-wg/. Source for this draft and an issue tracker can be found at https://github.com/kazuho/draft-kazuho-httpbis-http3-on-streams.
 IPv6 Parcels and Advanced Jumbos (AJs)
 
 draft-templin-6man-parcels2-03.txt
 Date: 12/04/2024
 Authors: Fred Templin
 Working Group: Individual Submissions (none)
IPv6 packets contain a single unit of transport layer protocol data which becomes the retransmission unit in case of loss. Transport layer protocols including the Transmission Control Protocol (TCP) and reliable transport protocol users of the User Datagram Protocol (UDP) prepare data units known as segments which the network layer packages into individual IPv6 packets each containing only a single segment. This specification presents new packet constructs termed IPv6 Parcels and Advanced Jumbos (AJs) with different properties. Parcels permit a single packet to include multiple segments as a "packet-of- packets", while AJs offer significant operational advantages over basic jumbograms for transporting singleton segments of all sizes ranging from very small to very large. Parcels and AJs provide essential building blocks for improved performance, efficiency and integrity while encouraging larger Maximum Transmission Units (MTUs) according to both the classic Internetworking link model and a new Delay Tolerant Network (DTN) link model.
 OAuth Cookie Response Mode
 
 draft-hanson-oauth-cookie-response-mode-00.txt
 Date: 16/02/2024
 Authors: Jared Hanson
 Working Group: Individual Submissions (none)
This specification defines a response mode for OAuth 2.0 that uses a cookie to obtain and transmit an access token. In this mode, the access token is encoded using an HTTP Set-Cookie header and transmitted via the HTTP Cookie header to the client or resource server.
 The Computing-Aware Routing Architecture in Computing-Aware Traffic Steering
 
 draft-peng-cats-car-architecture-00.txt
 Date: 17/02/2024
 Authors: Tianhao Peng, Yuyin Ma
 Working Group: Individual Submissions (none)
This document proposes a compute-aware routing (CAR) architecture for Computing-Aware Traffic Steering (CATS), designed to support routing systems with compute resource awareness and provide a standardized approach for network devices and services.
 Lightweight Route Information Advertisement for LEO Mega-constellation
 
 draft-hou-satellite-route-advertisement-00.txt
 Date: 17/02/2024
 Authors: Hou Dongxu, Xiao Min, Fenlin Zhou
 Working Group: Individual Submissions (none)
This document presents a lightweight route information advertisement method in satellite networks. On the one hand, the method selects the advertisement link by the way of route-associated judgment, to reduce the overhead of route information advertisement. On the other hand, the method provides a manner for dealing with link fault during the route information advertisement process, to ensure the reliability of routing information advertisement.
 IGP Flexible Algorithm with Time Constraint
 
 draft-dong-lsr-flex-algo-time-constraint-00.txt
 Date: 18/02/2024
 Authors: Jie Dong, Li Zhang
 Working Group: Individual Submissions (none)
IGP Flexible Algorithm allows IGPs to compute constraint-based paths over the network using different types of metrics or constraints. This document defines a new type of constraint called "Time Constraint", which can be used to control the time period during which a Flex-Algorithm takes effect for constraint-based path calculation. Such mechanism may be useful in network scenarios where either the traffic demand or the characteristics of the network varies as a function of time. The procedures of using Time Constraint in Flexible Algorithm is also described.
 Chempat: Generic Instantiated PQ/T Hybrid Key Encapsulation Mechanisms
 
 draft-josefsson-chempat-01.txt
 Date: 14/04/2024
 Authors: Simon Josefsson
 Working Group: Individual Submissions (none)
This document specify Chempat as a generic family of instantiated Post-Quantum/Traditional (PQ/T) Hybrid Key Exchange Methods (KEMs). The goal is to provide a generic combiner construct that can be analysed separately for security assurance, and to offer concrete instantiated algorithms for integration into protocol and implementations. Identified instances are provided based on traditional Diffie-Hellman key agreement using curves P-256, P-384, X25519, X448, brainpoolP256, brainpoolP384 combined with post quantum methods ML-KEM-768, ML-KEM-1024, Streamlined NTRU Prime sntrup761, and Classic McEliece.
 Signaling Aggregate Header Size Limit via IGP
 
 draft-liu-lsr-aggregate-header-limit-00.txt
 Date: 19/02/2024
 Authors: Yao Liu, Yiming Shen
 Working Group: Individual Submissions (none)
This document proposes extensions for IGP to order to advertise the aggregate header limit of a node or a link on a node to for efficient packet processing. Aggregate header limit is the total header size(e.g, in IPv6, it includes the IPv6 header chain as well as any headers that are part of network encapsulation that precedes the innermost transport layer) that a router is able to process at full forwarding rate, for some devices, this limit is related with its buffer size and buffer design.
 Hash-based Signatures: State and Backup Management
 
 draft-wiggers-hbs-state-00.txt
 Date: 19/02/2024
 Authors: Thom Wiggers, Kaveh Bashiri, Stefan Kolbl, Jim Goodman, Stavros Kousidis
 Working Group: Individual Submissions (none)
Stateful Hash-Based Signature Schemes (S-HBS) such as LMS, HSS, XMSS and XMSS^MT combine Merkle trees with One-Time Signatures (OTS) to provide signatures that are resistant against attacks using large- scale quantum computers. Unlike conventional stateless digital signature schemes, S-HBS have a state to keep track of which OTS keys have been used, as double-signing with the same OTS key allows forgeries. This document provides guidance and documents security considerations for the operational and technical aspects of deploying systems that rely on S-HBS. Management of the state of the S-HBS, including any handling of redundant key material, is a sensitive topic, and we discuss some approaches to handle the associated challenges. We also describe the challenges that need to be resolved before certain approaches should be considered.
 Increase of the Congestion Window when the Sender Is Rate-Limited
 
 draft-welzl-ccwg-ratelimited-increase-02.txt
 Date: 09/05/2024
 Authors: Michael Welzl, Tom Henderson, Gorry Fairhurst
 Working Group: Individual Submissions (none)
This document specifies how transport protocols increase their congestion window when the sender is rate-limited, and updates RFC 5681, RFC 9002, RFC 9260, and RFC 9438. Such a limitation can be caused by the sending application not supplying data or by receiver flow control.
 IPv6 Extended Fragment Header (EFH)
 
 draft-templin-6man-ipid-ext2-03.txt
 Date: 14/05/2024
 Authors: Fred Templin, Tom Herbert
 Working Group: Individual Submissions (none)
The Internet Protocol, version 4 (IPv4) header includes a 16-bit Identification field in all packets, but this length is too small to ensure reassembly integrity even at moderate data rates in modern networks. Even for Internet Protocol, version 6 (IPv6), the 32-bit Identification field included when a Fragment Header is present may be smaller than desired for some applications. This specification addresses these limitations by defining an IPv6 Extended Fragment Header (EFH) that includes a 64-bit Identification with efficient fragmentation and reassembly procedures.
 IPv6 Extended Fragment Header for IPv4
 
 draft-templin-intarea-ipid-ext2-02.txt
 Date: 12/04/2024
 Authors: Fred Templin
 Working Group: Individual Submissions (none)
The Internet Protocol, version 4 (IPv4) header includes a 16-bit Identification field in all packets, but this length is too small to ensure reassembly integrity even at moderate data rates in modern networks. Even for Internet Protocol, version 6 (IPv6), the 32-bit Identification field included when a Fragment Header is present may be smaller than desired for some applications. This specification addresses these limitations by adapting the IPv6 Extended Fragment Header for IPv4.
 Identifying Email Forwarding
 
 draft-chuang-identifying-email-forwarding-00.txt
 Date: 19/02/2024
 Authors: Wei Chuang
 Working Group: Individual Submissions (none)
Forwarded email often becomes unauthenticated because it breaks SPF (RFC7208) authentication and DKIM (RFC6376) authentication. For example mailing-lists distribute email to multiple recipients through a separate server than the original sending server that breaks IP based SPF authentication and potentially may modify the message that breaks the DKIM signature. This document calls for using ARC (RFC8617) to identify and authenticate forwarded emails by further specifying the naming of the two digital signatures present in ARC headers- the message signature and the seal. Because this uses ARC digital signature, the receiver has confidence that a valid signature corresponding to some forwarder only could have been generated by the named domain. This document also specifies that all forwarded mail flows have associated ARC headers and the means to characterize the mail flows.
 Reverse Tunnel over HTTP
 
 draft-kazuho-httpbis-reverse-tunnel-00.txt
 Date: 19/02/2024
 Authors: Kazuho Oku
 Working Group: Individual Submissions (none)
This document specifies an HTTP extension to establish bi-directional byte streams in the direction from servers to their clients, utilizing HTTP as a tunneling mechanism. This approach not only facilitates communication between servers located behind firewalls and their known clients but also introduces the potential for these known clients to serve as relays. In such configurations, clients can forward application protocol messages or relay TCP connections, allowing servers to interact with any client on the Internet without direct exposure.
 Implementation and Performance Evaluation of PDM using eBPF
 
 draft-elkins-ebpf-pdm-ebpf-00.txt
 Date: 20/02/2024
 Authors: Nalini Elkins, Chinmaya Sharma, Amogh Umesh, Balajinaidu V, Mohit Tahiliani
 Working Group: Individual Submissions (none)
RFC8250 describes an optional Destination Option (DO) header embedded in each packet to provide sequence numbers and timing information as a basis for measurements. As kernel implementation can be complex and time-consuming, this document describes the implementation of the Performance and Diagnostic Metrics (PDM) extension header using eBPF in the Linux kernel's Traffic Control (TC) subsystem. The document also provides a performance analysis of the eBPF implementation in comparison to the traditional kernel implementation.
 Implementation and Performance Evaluation of PDM using eBPF
 
 draft-elkins-v6ops-bpf-pdm-ebpf-00.txt
 Date: 20/02/2024
 Authors: Nalini Elkins, Chinmaya Sharma, Amogh Umesh, Balajinaidu V, Mohit Tahiliani
 Working Group: Individual Submissions (none)
RFC8250 describes an optional Destination Option (DO) header embedded in each packet to provide sequence numbers and timing information as a basis for measurements. As kernel implementation can be complex and time-consuming, this document describes the implementation of the Performance and Diagnostic Metrics (PDM) extension header using eBPF in the Linux kernel's Traffic Control (TC) subsystem. The document also provides a performance analysis of the eBPF implementation in comparison to the traditional kernel implementation.
 Best Practices for Link-Local Connectivity in URI-Based Protocols
 
 draft-schinazi-httpbis-link-local-uri-bcp-03.txt
 Date: 22/02/2024
 Authors: David Schinazi
 Working Group: Individual Submissions (none)
Link-local IP connectivity allows hosts on the same network to communicate with each other without the need for centralized IP addressing infrastructure. The IP prefixes 169.254.0.0/16 and fe80::/10 were reserved for this purpose. However, both IP versions have limitations that make link-local addresses unideal for usage with URI-based protocols. This document provides guidance for how best to enable link-local connectivity in such protocols. This document also obsoletes RFC 6874, a previous attempt at solving this issue.
 Stream Namespaces for QUIC
 
 draft-vvv-quic-namespaces-00.txt
 Date: 20/02/2024
 Authors: Victor Vasiliev
 Working Group: Individual Submissions (none)
QUIC Stream Namespaces provide an extension to the QUIC protocol that enables multiplexing multiple logical groups of streams within the same connection, while providing flow control isolation.
 Keep inter-domain forwarding conformance to routing
 
 draft-cheng-idr-conformance-forwarding-00.txt
 Date: 20/02/2024
 Authors: Weiqiang Cheng, 1211176911910469110103, Mingxing Liu, Mingqing(Michael) Huang
 Working Group: Individual Submissions (none)
This document introduces what the conformance forwarding is and why nonconformance forwarding is prevalent in the Internet, describes the risks of nonconformance forwarding and defines the requiremenets for conformance forwarding.
 Stand-in Tags for YANG-CBOR
 
 draft-bormann-cbor-yang-standin-00.txt
 Date: 21/02/2024
 Authors: Carsten Bormann, Maria Matejka
 Working Group: Individual Submissions (none)
YANG (RFC 7950) is a data modeling language used to model configuration data, state data, parameters and results of Remote Procedure Call (RPC) operations or actions, and notifications. YANG-CBOR (RFC 9254) defines encoding rules for YANG in the Concise Binary Object Representation (CBOR) (RFC 8949). While the overall structure of YANG-CBOR is encoded in an efficient, binary format, YANG itself has its roots in XML and therefore traditionally encodes some information such as date/times and IP addresses/prefixes in a verbose text form. This document defines how to use existing CBOR tags for this kind of information in YANG-CBOR as a "stand-in" for the text-based information that would be found in the original form of YANG-CBOR.
 Circuit Style Segment Routing Policies with Optimized SID List Depth
 
 draft-karboubi-spring-sidlist-optimized-cs-sr-00.txt
 Date: 21/02/2024
 Authors: Amal Karboubi, Cengiz Alaettinoglu, Himanshu Shah, Siva Sivabalan, Todd Defillipi
 Working Group: Individual Submissions (none)
Service providers require delivery of circuit-style transport services in a segment routing based IP network. This document introduces a solution that supports circuit style segment routing policies that allows usage of optimized SID lists (i.e. SID List that may contain non-contiguous node SIDs as instructions) and describes mechanisms that would allow such encoding to still honor all the requirements of the circuit style policies notably traffic engineering and bandwidth requirements.
 Cedar Profile for OAuth 2.0 Rich Authorization Requests
 
 draft-cecchetti-oauth-rar-cedar-02.txt
 Date: 21/02/2024
 Authors: Sarah Cecchetti
 Working Group: Individual Submissions (none)
This specification defines a profile of OAuth 2.0 Rich Authorization Requests in Cedar policy format within the authorization_details JSON object. Authorization servers and resource servers from different vendors can leverage this profile to distribute and recieve relevant Cedar policy sets in an interoperable manner.
 A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET
 
 draft-chen-sidrops-sispi-00.txt
 Date: 22/02/2024
 Authors: Li Chen, Libin Liu, Dan Li, Lancheng Qin
 Working Group: Individual Submissions (none)
This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.
 Greasing Protocol Extension Points in the DNS
 
 draft-huque-dnsop-grease-01.txt
 Date: 29/02/2024
 Authors: Shumon Huque, Mark Andrews
 Working Group: Individual Submissions (none)
Long term evolvability of the Domain Name System (DNS) protocol requires the ability to support change. Greasing is one technique that exercises the regular use of unallocated protocol extension points to prevent ossification of their current usage patterns by middleboxes or DNS implementations. This document describes considerations and proposals for applying grease to the DNS protocol. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/shuque/ietf-dns-grease.
 Path-aware Remote Protection Framework
 
 draft-liu-rtgwg-path-aware-remote-protection-01.txt
 Date: 03/03/2024
 Authors: Yisong Liu, Changwang Lin, Mengxiao Chen, Zheng Zhang
 Working Group: Individual Submissions (none)
This document describes the framework of path-aware remote protection.
 Routing Consideration for Satellite Constellation Network
 
 draft-jiang-tvr-sat-routing-consideration-00.txt
 Date: 23/02/2024
 Authors: Tianji Jiang, Peng Liu, Huaimo Chen
 Working Group: Individual Submissions (none)
The 3GPP has done tremendous work to either standardize or study various types of wireless services that would depend on a satellite constellation network. While the ISLs, or Inter-Satellite Links, along with the routing scheme(s) over them are critical to help fullfil the satellite services, the 3GPP considers them out-of-scope. This leaves somewhat significant work to be explored in the IETF domain. This draft stems from the latest 3GPP satellite use cases, and lands on summarizing the restrictions & challenges in term of satellite-based routing. Based on some unique & advantageous characteristics associated with satellite movement, the draft raises briefly the general design principles and possible algorithms for the integrated NTN+TN routing, while leaves the implementation details for further expansion.
 FC-BGP Protocol Specification
 
 draft-sidrops-wang-fcbgp-protocol-00.txt
 Date: 23/02/2024
 Authors: Ke Xu, Xiaoliang Wang, Zhuotao liu, Li Qi, Jianping Wu, Yangfei Guo
 Working Group: Individual Submissions (none)
This document describes Forwarding Commitment BGP (FC-BGP), an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. Forwarding Commitment(FC)is a cryptographically signed code to certify an AS's routing intent on its directly connected hops. Based on FC, FC-BGP aims to build a secure inter- domain system that can simultaneously authenticate the AS_PATH attribute in BGP UPDATE and validate network forwarding on the data plane.
 The need for email archival option in email clients
 
 draft-emailarchiveoption-std-00.txt
 Date: 24/02/2024
 Authors: pradeep xplorer
 Working Group: Individual Submissions (none)
This document describes the need for a email archive option button or check box in email client to make sure of accountability of emails, transmission delivery and control of email SPAM
 Advertisement of SR Policy Flexible Candidate Path Selection Result using BGP Link-State
 
 draft-liu-idr-bgp-ls-srp-flexible-path-selection-00.txt
 Date: 25/02/2024
 Authors: Yisong Liu, Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document defines the extension of BGP Link-State to advertise the result of SR Policy flexible candidate path selection. Such information can be used by external components for path computation, re-optimization, service placement, network visualization, etc.
 Addition of New BMP Stat Types
 
 draft-liu-grow-bmp-stats-reports-00.txt
 Date: 25/02/2024
 Authors: Yisong Liu, Changwang Lin, Jinming Li
 Working Group: Individual Submissions (none)
BMP statistics messages are used by the monitoring station to observe interesting events that occur on the router. Several BMP statistics types are defined in RFC 7854, this document lists some new statistics types to update RFC 7854 for growing BGP features.
 Policy Considerations for Changes to RFCs
 
 draft-carpenter-rswg-format-details-00.txt
 Date: 25/02/2024
 Authors: Brian Carpenter
 Working Group: Individual Submissions (none)
This document clarifies the policy framework for changes to RFC formats and associated tool chains. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-carpenter-rswg-format- details/. Discussion of this document takes place on the RSWG Working Group mailing list (mailto:rswg@rfc-editor.org), which is archived at https://mailarchive.ietf.org/arch/browse/rswg/.
 A Profile for Mapping Origin Authorizations (MOAs)
 
 draft-xie-sidrops-moa-profile-03.txt
 Date: 24/04/2024
 Authors: Chongfeng Xie, Guozhen Dong, Xing Li, Geoff Huston, Di Ma
 Working Group: Individual Submissions (none)
For the authenticity of the mapping origin of IPv4 address block in IPv6-only networks, this document defines a standard profile for Mapping Origin Authorizations (MOAs). MOA is a cryptographically signed object that provides a means of verifying that the holder of a set of IPv4 prefixes has authorized an IPv6 mapping prefix to originate mapping for those prefixes. When receiving the MOA objects from the relying parties, PE devices can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.
 Terminology and Use cases for Secured Routing Infrastructure
 
 draft-richardson-nasr-terminology-00.txt
 Date: 26/02/2024
 Authors: Michael Richardson, Peter Liu
 Working Group: Individual Submissions (none)
This document collects terminology and use cases for Secured Routing.
 Enhancing Route Origin Validation by Aggregating Validated ROA Payloads
 
 draft-zhang-sidrops-vrp-aggregation-00.txt
 Date: 26/02/2024
 Authors: Jia Zhang, Mingwei Xu, Yangyang Wang
 Working Group: Individual Submissions (none)
Resource Public Key Infrastructure (RPKI) enables address space holders to issue Route Origin Authorization (ROA) objects to authorize one or more Autonomous Systems (ASes) to originate BGP routes for specific IP address prefixes. Individual BGP speakers can utilize Validated ROA Payloads (VRPs) to validate the legitimacy of BGP announcements. This document highlights potential validation errors, and recommends extension of VRPs from reasonable aggregation to enhance Route Origin Validation (ROV) and prevent validation errors that may occur due to traffic engineering or route aggregation policies.
 Terminal Identity Authentication Based on Address Label
 
 draft-guan-6man-ipv6-id-authentication-00.txt
 Date: 26/02/2024
 Authors: Jianfeng Guan, Su Yao, Kexian Liu, Xiaolong Hu, Jianli Liu
 Working Group: Individual Submissions (none)
Privacy and accountability are currently significant concerns on the internet. Privacy generally implies untraceable sources. Effective verification methods inherently raise privacy concerns when confirming a user's identity. To prevent extensive modifications to current network protocols and the introduction of new identifiers, we propose an IPv6 based address label terminal identity authentication mechanism. This mechanism facilitates user identity verification, ensuring privacy protection, security, and efficient auditing. Additionally, this document outlines the implementation of address label authentication in the IPv6 extension header.
 EAT Measured Component
 
 draft-fft-rats-eat-measured-component-02.txt
 Date: 03/03/2024
 Authors: Simon Frost, Thomas Fossati, Hannes Tschofenig
 Working Group: Individual Submissions (none)
This document defines a "measured components" format that can be used with the EAT Measurements claim.
 Remove ECC-GOST from use within DNSSEC
 
 draft-hardaker-dnsop-must-not-ecc-gost-01.txt
 Date: 14/05/2024
 Authors: Wes Hardaker, Warren Kumari
 Working Group: Individual Submissions (none)
This document retires the use of ECC-GOST within DNSSEC.
 An In Situ Operations,Administration,and Maintenance (IOAM) Multi-path Flag
 
 draft-zhang-ippm-ioam-mp-00.txt
 Date: 28/02/2024
 Authors: Li Zhang, Tianran Zhou
 Working Group: Individual Submissions (none)
Active measurements are typically used to collect the information of a specific path. However, when using active measurement mechanisms in a multi-path topology, the default forwarding behavior is to go through one path. So, it cannot collect the information of all the paths at one time. This document extends IOAM Trace Option with a multi-path flag to simplify multi-path IOAM active measurement, which can promote the information collection and topology restoration of a multi-path topology.
 RoCEv2-based Collective Communication Offloading
 
 draft-liu-nfsv4-rocev2-00.txt
 Date: 28/02/2024
 Authors: liufeng, Weifeng Wang, Rubing Liu, Yan Mu, Kehan Yao
 Working Group: Individual Submissions (none)
This draft proposes the design scheme of RoCEv2-based collective communication offloading. Through establishing RDMA connections between client and switch, collective operations can be implemented on network nodes, thus improving the overall efficiency of collective communication.
 IP Payload Compression excluding transport layer
 
 draft-ls-ipsecme-ipcomp-exclude-transport-layer-00.txt
 Date: 28/02/2024
 Authors: Cheng Li, Hang Shi, Meng Zhang, Xiaobo Ding
 Working Group: Individual Submissions (none)
IP Payload Compression Protocol (IPComp) is used for compressing the IP payload in transmission to increase communication performance. The IPComp is applied to the payload of the IP datagram, starting with the first octet immediately after the IP header in IPv4, and the first octet after the excluded IPv6 Extension headers. However, transport layer information such as source port and destination port are useful in many network functions in transmission. This document defines extensions of IP payload compression protocol (IPComp) to support compressing the payload excluding the transport layer information, to enable network functions using transport layer information (e.g., ECMP) working together with the payload compression. This document also defines an extension of IPComp to indicate the payload is not compressed to solve the out-of-order problems between the compressed and uncompressed packets.
 Secure shell over HTTP/3 connections
 
 draft-michel-ssh3-00.txt
 Date: 28/02/2024
 Authors: Francois Michel, Olivier Bonaventure
 Working Group: Individual Submissions (none)
The secure shell (SSH) traditionally offers its secure services over an insecure network using the TCP transport protocol. This document defines mechanisms to run the SSH protocol over HTTP/3 using Extended CONNECT. Running SSH over HTTP/3 enables additional benefits such as the scalability offered by HTTP multiplexing, relying on TLS for secure channel establishment leveraging X.509 certificates, HTTP Authentication schemes for client and server authentication, UDP port forwarding and stronger resilience against packet injection attacks and middlebox interference.
 Problem Statement with Aggregate Header Limit
 
 draft-liu-spring-aggregate-header-limit-problem-00.txt
 Date: 28/02/2024
 Authors: Yao Liu, Yisong Liu
 Working Group: Individual Submissions (none)
Aggregate header limit(AHL) is the total header size that a router is able to process at full forwarding rate, for some devices, this limit is related with its buffer size and buffer design. This document describes the problems for path calculation and function enablement without the awareness of AHL in SRv6, and the considerations for AHL collection are also included.
 Implementation and Performance Evaluation of PDM using eBPF
 
 draft-ne-v6ops-pdm-ebpf-00.txt
 Date: 28/02/2024
 Authors: Nalini Elkins, Chinmaya Sharma, Amogh Umesh, Balajinaidu V, Mohit Tahiliani
 Working Group: Individual Submissions (none)
RFC8250 describes an optional Destination Option (DO) header embedded in each packet to provide sequence numbers and timing information as a basis for measurements. As kernel implementation can be complex and time-consuming, this document describes the implementation of the Performance and Diagnostic Metrics (PDM) extension header using eBPF in the Linux kernel's Traffic Control (TC) subsystem. The document also provides a performance analysis of the eBPF implementation in comparison to the traditional kernel implementation.
 Experiment: Network Anomaly Lifecycle
 
 draft-netana-nmop-network-anomaly-lifecycle-01.txt
 Date: 16/03/2024
 Authors: Vincenzo Riccobene, Antonio Roberto, Thomas Graf, Wanting Du, Alex Feng
 Working Group: Individual Submissions (none)
Accurately detect network anomalies is very challenging for network operators in production networks. Good results require a lot of expertise and knowledge around both the implied network technologies and the specific service provided to consumers, apart from a proper monitoring infrastructure. In order to facilitate the detection of network anomalies, novel techniques are being introduced, including AI-based ones, with the promise of improving scalability and the hope to keep a high detection accuracy. To guarantee acceptable results, the process needs to be properly designed, adopting well-defined stages to accurately collect evidence of anomalies, validate their relevancy and improve the detection systems over time. This document describes the lifecycle process to iteratively improve network anomaly detection accurately. Three key stages are proposed, along with a YANG model specifying the required metadata for the network anomaly detection covering the different stages of the lifecycle.
 A SAVI Solution for IP based Satellite Access
 
 draft-jliu-savi-ipsa-00.txt
 Date: 28/02/2024
 Authors: Jun Liu, Hewu Li, Tianyu Zhang, Qian Wu
 Working Group: Individual Submissions (none)
This document presents the source address validation solution for for IP based Satellite Access. This mechanism transfers user states through end network collaboration to solve the impact of dynamic handover of satellite-ground links on native SAVI. This document mainly describes the operations involved in overcoming the dynamics of the access link.
 Segment Routing over IPv6 (SRv6) Proof of Transit
 
 draft-iannone-spring-srv6-pot-00.txt
 Date: 28/02/2024
 Authors: Luigi Iannone, Antoine Fressancourt
 Working Group: Individual Submissions (none)
Various technologies, including SRv6, allow to perform Traffic Engineering (TE), steering IP traffic through a specific path. However, there is no native mechanism in IP that allows to verify whether or not a packet did follow the path it was supposed to. This document specifies a new TLV for the Segment Routing Header (SRH) that allows to provide a cryptographically generated proof of transit over the different segments. The proposed mechanisms allows to verify whether a packet did go through the segments listed in its SRH header in the intended order.
 A Path Verification Solution based on SRv6
 
 draft-jliu-tpp-srv6-00.txt
 Date: 28/02/2024
 Authors: Jun Liu, Hewu Li, Tianyu Zhang, Qian Wu, Zongpeng Du
 Working Group: Individual Submissions (none)
A trusted network path is desired for source authentication and path verification. The emergence of IPv6 Segment Routing (SRv6) may bring the opportunity to assemble trusted network paths with a lightweight IP header. This document describes a trusted network path verification mechanism based on SRv6 (Segment Routing to enable Trusted and Private Network Paths, SR-TPP), which supports network path verification with path information protection. SR-TPP extends SRv6 function in protocol header to meet the requirement of path compliance. Path information is sequentially encoded into the segment list in SR-TPP so that path information is partially visible to each intermediate router. The distributed verification of SR-TPP also makes it easier to locate faults.
 ML-KEM for HPKE
 
 draft-connolly-cfrg-hpke-mlkem-00.txt
 Date: 28/02/2024
 Authors: Deirdre Connolly
 Working Group: Individual Submissions (none)
This memo defines the ML-KEM-768-based and ML-KEM-1024-based ciphersuites for HPKE (RFC9180). ML-KEM is believed to be secure even against adversaries who possess a quantum computer.
 On-time Forwarding with Push-In First-Out (PIFO) queue
 
 draft-ryoo-detnet-ontime-forwarding-00.txt
 Date: 28/02/2024
 Authors: Yeoncheol Ryoo
 Working Group: Individual Submissions (none)
This document describes operations of data plane and controller plane for Deterministic Networking (DetNet) to forward packets to meet minimum and maximum end-to-end latency requirements, while utilizing Push-In First-Out (PIFO) queue. According to the solution described in this document, forwarding nodes do not need to maintain flow states or to be time-synchronized with each other.
 A YANG Data Model for the Alternate Marking Method
 
 draft-ydt-ippm-alt-mark-yang-01.txt
 Date: 04/03/2024
 Authors: Thomas Graf, Minxue Wang, Giuseppe Fioccola, Tianran Zhou, Xiao Min, Guo Jun, Massimo Nilo, Liuyan Han
 Working Group: Individual Submissions (none)
Alternate-Marking Method is a technique used to perform packet loss, delay, and jitter measurements on in-flight packets. This document defines a YANG data model for the Alternate Marking Method.
 Intelligent Protection Optimization System for IOT
 
 draft-li-iotops-intelligent-security-00.txt
 Date: 29/02/2024
 Authors: Xinru Li, Yuyin Ma, Guangshuo Chen
 Working Group: Individual Submissions (none)
Communication technology is becoming more and more developed, the Internet of Things coverage is becoming more and more comprehensive, and a large number of data and devices are joining, which also makes more data security and privacy issues appear. Therefore, this draft proposes a scheme to build an information-centered network. By analyzing common network attack methods, an intelligent protection optimization system is established from three aspects: naming and parsing, data exchange, and data caching, so as to achieve better content privacy protection without adding additional costs.
 BGP AS_PATH Validation State Extended Community
 
 draft-wu-sidr-aspa-validation-signaling-00.txt
 Date: 29/02/2024
 Authors: Tianhao Wu, Jun Ge, Xiangfeng Ding, Haibo Wang
 Working Group: Individual Submissions (none)
This document defines a new BGP opaque extended community to carry the AS_PATH validation state based on Autonomous System Provider Authorization (ASPA) inside an autonomous system. Internal BGP (IBGP) speakers that receive this validation state can configure local policies that allow it to influence their decision process.
 Destination-IP-Community Filter for BGP Flow Specification
 
 draft-wu-idr-flowspec-dip-community-filter-00.txt
 Date: 29/02/2024
 Authors: Tianhao Wu, Jun Ge, Xiangfeng Ding, Haibo Wang
 Working Group: Individual Submissions (none)
BGP Flowspec mechanism (BGP-FS) propagates both traffic Flow Specifications and Traffic Filtering Actions by making use of the BGP NLRI and the BGP Extended Community encoding formats. This document specifies a new BGP-FS component type to support community-level filtering. The match field is the community of the destination IP address that is encoded in the Flowspec NLRI. This function is applied in a single administrative domain.
 External References to Values in CBOR Diagnostic Notation (EDN)
 
 draft-bormann-cbor-e-ref-00.txt
 Date: 29/02/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
The Concise Binary Object Representation (CBOR, RFC 8949) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. CBOR diagnostic notation (EDN) is widely used to represent CBOR data items in a way that is accessible to humans, for instance for examples in a specification. At the time of writing, EDN did not provide mechanisms for composition of such examples from multiple components or sources. This document uses EDN application extensions to provide two such mechanisms, both of which insert an imported data item into the data item being described in EDN: The e'' application extension provides a way to import data items, particularly constant values, from a CDDL model (which itself has ways to provide composition). The ref'' application extension provides a way to import data items that are described in EDN.
 ACLs within the NFSv4 Protocols
 
 draft-dnoveck-nfsv4-acls-01.txt
 Date: 26/04/2024
 Authors: David Noveck
 Working Group: Individual Submissions (none)
This document describes the structure of NFSv4 ACLs and their role in the NFSv4 security architecture. While the focus of this document is on the role of ACLs in providing a more flexible approach to file access authorization than is made available by the POSIX-derived authorization-related attributes, the potential provision of other security-related functionality is covered as well. While the goals of the description are similar to that used in previous specifications, the approach taken is substantally different, in that the relationship of the multiple ACL models supported has changed. A core set of functionality, derived form the the now-withdrawn POSIX draft ACLs is presented as the conceptual base of the feature set. Additional features used to provide the functionality within the NFSv4 ACL model are presented as OPTIONAL extensions to that core. The current version of the document is intended, in large part, to result in working group discussion regarding repairing problems with previous specifications of ACL-related features and to enable work to provide a greater degree of interoperability than has been available heretofore. The drafts a framework for addressing these issues and obtaining working group consensus regarding necessary changes. When the resulting document is eventually published as an RFC, it will supersede the descriptions of ACL structure and semantics appearing in existing minor version specification documents for NFSv4.0 and NFSv4.1, thereby updating RFC7530 and RFC8881.
 Latency analysis of mobile transmission
 
 draft-varga-detnet-mobile-latency-analysis-00.txt
 Date: 29/02/2024
 Authors: Balazs Varga, Joachim Sachs, Frank Duerr, Samie Mostafavi
 Working Group: Individual Submissions (none)
Dependable time-critical communication over a mobile network has its own challenges. This document focuses on a comprehensive analysis of mobile systems latency in order to incorporate its specifics in developments of latency specific network functions. The analysis provides valuable insights for the development of wireless-friendly methods ensuring bounded latency as well as future approaches using data-driven latency characterization.
 Computing Aware Traffic Steering using IP address anchoring
 
 draft-bernardos-cats-ip-address-anchoring-01.txt
 Date: 29/02/2024
 Authors: Carlos Bernardos, Alain Mourad
 Working Group: Individual Submissions (none)
The IETF CATS WG addresses the problem of how the network infrastructure can steer traffic between clients of a service and sites offering the service, considering both network metrics (such as bandwidth and latency), and compute metrics (such as processing, storage capabilities, and capacity). This document defines new extensions for a terminal connected to a network infrastructure, to request a service with specific connectivity and computing requirements, so traffic is steered to an instance meeting both requirements. Both CATS-aware and -unaware terminals are considered. Exemplary signaling control messages and operation extending the well-known Proxy Mobile IPv6 protocol are also defined.
 BGP-MVPN Source Active Route Enhancement
 
 draft-zzhang-bess-bgp-mvpn-source-active-route-00.txt
 Date: 29/02/2024
 Authors: Zhaohui Zhang, Rishabh Parekh
 Working Group: Individual Submissions (none)
RFC6514 specifies the protocol and procedures for multicast in MPLS/ BGP IP VPNs. In the Any-Source Multicast (ASM) case, the section "14. Supporting PIM-SM without Inter-Site Shared C-Trees" specifies that the Provider Edge that serves as a customer Rendezvous Point or runs Multicast Source Discovery Protocol advertises Source Active (SA) routes for ASM flows when it discovers those flows. This document describes a situation where an optional enhancement to the advertisement of SA routes is desired and specifies the procedures. It updates RFC6514.
 Triggering Unsolicited Router Advertisements Upon Configuration Changes
 
 draft-link-6man-truce-00.txt
 Date: 29/02/2024
 Authors: Jen Linkova
 Working Group: Individual Submissions (none)
IPv6 routers employ Router Advertisements (RAs) to disseminate essential network configuration data to hosts. RAs play a vital role in Stateless address autoconfiguration (SLAAC) and providing IPv6 connectivity. Timely updates via RAs become paramount as network configurations change to prevent service outages. This document modifies RFC4861, recommending immediate propagation of configuration information changes by routers.
 Customer Experience Index for Evaluating Network Quality for Cloud Applications
 
 draft-hz-ippm-cei-01.txt
 Date: 14/05/2024
 Authors: Sifa Liu, Yaojing Wang, Wei Sun, Xiang Huang, Shuai Zhou, Hongyi Huang, Tianran Zhou, Jian Ge, KE Ma
 Working Group: Individual Submissions (none)
This document outlines a unified Customer Experience Index (CEI) designed to assist cloud vendors in assessing network quality, reflecting the customer experience with cloud applications when accessed via the public network.
 The OID Directory: A Technical Roadmap
 
 draft-coretta-oiddir-roadmap-00.txt
 Date: 29/02/2024
 Authors: Jesse Coretta
 Working Group: Individual Submissions (none)
This ID outlines a series of experimental standards documents which define the abstracts of the "OID Directory": a proposed philosophy and set of procedures used to facilitate the storage and management of the "OID spectrum" -- in part or in whole -- within an X.500/LDAP service implementation.
 The OID Directory: The Schema
 
 draft-coretta-oiddir-schema-01.txt
 Date: 29/02/2024
 Authors: Jesse Coretta
 Working Group: Individual Submissions (none)
In service to the "OID Directory" ID series, this ID declares schema definitions for use within an implementation of the Registration Authority Directory Information Tree. See the RADIR ID for a complete draft series manifest.
 The OID Directory: The RA DUA
 
 draft-coretta-oiddir-radua-00.txt
 Date: 29/02/2024
 Authors: Jesse Coretta
 Working Group: Individual Submissions (none)
In service to the "OID Directory" ID series, this ID covers design strategies, requirements and procedures for the client component of the OID Directory Registration Authority client/server model. See the RADIR ID for a complete draft series manifest.
 The OID Directory: The RA DSA
 
 draft-coretta-oiddir-radsa-00.txt
 Date: 29/02/2024
 Authors: Jesse Coretta
 Working Group: Individual Submissions (none)
In service to the "OID Directory" ID series, this ID covers design considerations and basic requirements for the server component of the OID Directory Registration Authority client/server model. See the RADIR ID for a complete draft series manifest.
 The OID Directory: The RA DIT
 
 draft-coretta-oiddir-radit-00.txt
 Date: 29/02/2024
 Authors: Jesse Coretta
 Working Group: Individual Submissions (none)
In service to the "OID Directory" ID series, this ID covers design strategies and requirements relating to the Registration Authority Directory Information Tree. See the RADIR ID for a complete draft series manifest.
 Deterministic Routing Header
 
 draft-pb-6man-deterministic-crh-00.txt
 Date: 29/02/2024
 Authors: Shaofu Peng, Ron Bonica
 Working Group: Individual Submissions (none)
This document introduces a new IPv6 Routing Header used for deterministic forwarding wihch is generally a strict explicit path. This Routing Header will contain the decoupled topology instructions and deterministic forwarding resource indications. The target is low cost of encapasultion and less amount of allocated SIDs.
 Anomalous Packets Handling for DetNet
 
 draft-liu-detnet-anomalous-packets-handling-00.txt
 Date: 29/02/2024
 Authors: Chang Liu, Jinjie Yan, Xiangyang Zhu
 Working Group: Individual Submissions (none)
In deterministic networking (DetNet), there may be resource conflicts at the flow aggregation nodes, resulting in network anomalies. The existing mechanisms for handling anomalous packets in the data plane are crude, such as discarding or processing them as BE flows, so the network performance may be worse than applying traditional QoS. Therefore, in order to handle the anomalous traffic, the data plane should implement an enhanced handling mechanism. This document proposes an anomalous packet handling solution for anomalous traffic in DetNet. This solution includes two policies: the packet squeezing policy and the packet degrading policy, which can be applied flexibly to a variety of queuing mechanisms, thereby ensuring that network traffic for deterministic services is preferentially scheduled in anomalous situations.
 Gap Analysis of Online Data Express Service (ODES)
 
 draft-zhao-tsvwg-odes-gap-analysis-00.txt
 Date: 29/02/2024
 Authors: Guangyu Zhao, Hongwei Yang, Zongpeng Du
 Working Group: Individual Submissions (none)
This document is a gap analysis of online data express delivery services, which is helpful to the design and development of online data express delivery services.
 Trust-enhanced Path Routing: Problem Statement and Use Cases
 
 draft-liu-trust-enhanced-path-routing-00.txt
 Date: 29/02/2024
 Authors: Xiang Liu, Yanchen Qiao, Yu Zhang
 Working Group: Individual Submissions (none)
Digital trust refers to the measurable confidence of one entity posts on another about accomplishing some task in the digital world. This document introduces the concept of trust into the networking and routing area, and proposes the idea of trust-enhanced path routing, elaborates the key technical problems and design goals, and also lists some use cases.
 Procedures and Extension for VLAN-based Traffic Forwarding
 
 draft-wang-ise-vlan-based-traffic-forwarding-00.txt
 Date: 01/03/2024
 Authors: Yue Wang, Aijun Wang, Boris Khasanov, Fengwei Qin, Huaimo Chen, Chun Zhu
 Working Group: Individual Submissions (none)
This document defines the data plane operations around VLAN switching and describes a standard method for implementing VLAN tags, and thus the desired tag manipulation can be achieved.
 Flow Aggregation for Enhanced DetNet
 
 draft-xiong-detnet-flow-aggregation-00.txt
 Date: 01/03/2024
 Authors: Quan Xiong, Tianji Jiang, Jinoo Joung
 Working Group: Individual Submissions (none)
This document describes the flow aggregation scenarios and proposes a method by aggregating DetNet flows based on DetNet flow-specific classification in enhanced DetNet and the flow identification of aggregated-class can be used to indicate the required treatment and forwarding behaviors in scaling networks.
 Extended YANG Data Model for DOTS
 
 draft-cui-dots-extended-yang-01.txt
 Date: 01/03/2024
 Authors: Yong Cui, Linzhe Li
 Working Group: Individual Submissions (none)
With the development of DDoS defense technologies, the interfaces and parameters defined by DOTS are no longer sufficient to support the collaborative signaling required between DDoS mitigation systems. This document defines three YANG model to extend the data models of existing interfaces on the DOTS signaling and data channels, with the aim of supporting the transmission of necessary collaborative information between DDoS mitigation systems via DOTS and enabling efficient collaborative mitigation based on this information.
 No Further Fast Reroute for SRv6 Service SID
 
 draft-liu-bess-srv6-service-sid-nffrr-flag-00.txt
 Date: 01/03/2024
 Authors: Yisong Liu, Changwang Lin, Mengxiao Chen, Yao Liu
 Working Group: Individual Submissions (none)
In some multihoming SRv6 L3VPN and EVPN scenarios, once fast reroute has taken place, a second fast reroute is undesirable and may cause looping. This document proposes a mechanism to prevent further fast reroutes by advertising No-Further-FRR flags for SRv6 Service SIDs in BGP messages.
 SRv6 Service SID Anycast Flag
 
 draft-liu-bess-srv6-service-sid-anycast-flag-00.txt
 Date: 01/03/2024
 Authors: Yisong Liu, Changwang Lin, Mengxiao Chen, Yao Liu
 Working Group: Individual Submissions (none)
In some multihoming SRv6 L3VPN and EVPN scenarios, there are requirements for the egress PE to advertise both unicast and anycast SRv6 Service SIDs for the same service. This document defines the Anycast-flag for SRv6 Service SIDs carried in BGP messages.
 Constrained Application Protocol (CoAP) over Bundle Protocol (BP)
 
 draft-gomez-core-coap-bp-00.txt
 Date: 01/03/2024
 Authors: Carles Gomez, Anna Calveras
 Working Group: Individual Submissions (none)
The Bundle Protocol (BP) was designed to enable end-to-end communication in challenged networks. The Constrained Application Protocol (CoAP), which was designed for constrained-node networks, may be a suitable application-layer protocol for the scenarios where BP is used. This document specifies how CoAP is carried over BP.
 Service Mobility-Enabled Computing Aware Traffic Steering using IP address anchoring
 
 draft-bernardos-cats-anchoring-service-mobility-00.txt
 Date: 01/03/2024
 Authors: Carlos Bernardos, Alain Mourad
 Working Group: Individual Submissions (none)
The IETF CATS WG addresses the problem of how the network infrastructure can steer traffic between clients of a service and sites offering the service, considering both network metrics (such as bandwidth and latency), and compute metrics (such as processing, storage capabilities, and capacity). This document defines new extensions and procedures for a terminal connected to a network infrastructure, to benefit from transparent service migration adapting to specific connectivity and computing requirements, so traffic is always steered to an instance meeting both requirements. Both CATS-aware and -unaware terminals are considered. Exemplary signaling control messages and operation extending the well-known Proxy Mobile IPv6 protocol are also defined.
 Unrelated name server name requirement
 
 draft-fujiwara-dnsop-unrelated-name-server-00.txt
 Date: 01/03/2024
 Authors: Kazunori Fujiwara
 Working Group: Individual Submissions (none)
Unrelated(out-of-bailiwick) name server names are required for DNS hosting services. However, using unrelated name server names increases the name resolution costs. This document proposes using in-domain name servers as much as possible for name resolution of unrelated name server names to reduce the name resolution costs.
 Validating anydata in YANG Library context
 
 draft-aelhassany-anydata-validation-01.txt
 Date: 17/03/2024
 Authors: Ahmed Elhassany
 Working Group: Individual Submissions (none)
This document describes a method to use YANG Library [RFC8525] to validate YANG data nodes that are children of an "anydata" data node.
 List Pagination Snapshots for YANG-driven Protocols
 
 draft-awwhl-netconf-list-pagination-snapshot-00.txt
 Date: 01/03/2024
 Authors: Per Andersson, Kent Watsen, Qin WU, Olof Hagsand, Hongwei Li
 Working Group: Individual Submissions (none)
List pagination for YANG-driven protocols are defined in [I-D.ietf-netconf-list-pagination]. Operational data can have very large data sets. These data sets can furthermore have big churn, a lot of additions or deletions to the data set. In order to support a stable pagination of such data sets, snapshots can be used. This document defines snapshot support for pagination of "config false" nodes of type "list" and "leaf-list". The snapshot support for individual nodes is signaled via the "ietf-system-capabilities" module.
 Advance Professional Video
 
 draft-lim-apv-00.txt
 Date: 01/03/2024
 Authors: Youngkwon Lim, Minwoo Park, Madhukar Budagavi, Rajan Joshi, Kwang Choi
 Working Group: Individual Submissions (none)
This document describes bitstream format of Advanced Professional Video and decoding process of it.
 The Asynchronous Remote Key Generation (ARKG) algorithm
 
 draft-bradleylundberg-cfrg-arkg-01.txt
 Date: 17/03/2024
 Authors: Emil Lundberg, John Bradley
 Working Group: Individual Submissions (none)
Asynchronous Remote Key Generation (ARKG) is an abstract algorithm that enables delegation of asymmetric public key generation without giving access to the corresponding private keys. This capability enables a variety of applications: a user agent can generate pseudonymous public keys to prevent tracking; a message sender can generate ephemeral recipient public keys to enhance forward secrecy; two paired authentication devices can each have their own private keys while each can register public keys on behalf of the other. This document provides three main contributions: a specification of the generic ARKG algorithm using abstract primitives; a set of formulae for instantiating the abstract primitives using concrete primitives; and an initial set of fully specified concrete ARKG instances. We expect that additional instances will be defined in the future.
 MKA over IP
 
 draft-hb-intarea-eap-mka-00.txt
 Date: 01/03/2024
 Authors: Hooman Bidgoli, Nick Morris, Nabeel Cocker
 Working Group: Individual Submissions (none)
Extensible Authentication Protocol (EAP) is described in [RFC3748]. EAP typically runs directly over data link layers such as Point-to- Point Protocol (PPP) or IEEE 802, without requiring IP. IEEE802.1X-2004 clarifies some aspect of the EAP over Layer 2 PDUs. IEEE802.1X-2010 introduces MACsec Key Agreement Protocol (MKA) which uses EAPOL. In IEEE 802.1X-2010 the existing EAPOL (EAP over LANs) PDU formats have not been modified, but additional EAPOL PDUs have been added to support MKA. MKA is used for discovering peers and their mutual authentication, to agree the secrete keys (SAKs) used by MACsec for symmetric shared key cryptography. This document describes procedures to transport EAP and ultimately MKA PDUs over a IP network to distribute SAKs for symmetric key cryptography.
 Avoiding Registration Storms by adapted Registration Behavior for Voice Cloud Applications
 
 draft-schott-sip-avors-00.txt
 Date: 01/03/2024
 Authors: Roland Schott, Michael Kreipl, Bastian Dreyer, Roland Jesske
 Working Group: Individual Submissions (none)
This document describes the AVORS (Avoiding Registration Storms) concept that allows the resumption of active registrations. The concept can be mapped on any architecture having a distributed structure and could work for different protocols. The concept is exemplary explained here regarding an architecture for voice and is mapped on a 3GPP (3rd Generation Partnership Project) architecture. This document describes the AVORS (Avoiding Registration Storms) concept that allows the resumption of active UE (User Equipment) registrations on other Outbound Proxies (P-CSCF) within the SIP voice architecture. The AVORS concept increases service continuity, improves network resilience, and offers savings potential. Additionally, this document gives an outlook regarding stateless voice architectures, load calculation aspects, and Service Based Interfaces (SBI) in context data base interworking. Security aspects are considered in the security chapter. As stated above the AVORS principle is not only limited to the SIP protocol and could be adopted by other protocols.
 Identity Assertion Authorization Grant
 
 draft-parecki-oauth-identity-assertion-authz-grant-00.txt
 Date: 01/03/2024
 Authors: Aaron Parecki, Karl McGuinness
 Working Group: Individual Submissions (none)
This specification provides a mechanism for an application to use an identity assertion to obtain an access token for a third-party API using Token Exchange [RFC8693] and JWT Profile for OAuth 2.0 Authorization Grants [RFC7523].
 Documenting and Managing DNSSEC Algorithm Lifecycles
 
 draft-crocker-dnsop-dnssec-algorithm-lifecycle-00.txt
 Date: 02/03/2024
 Authors: Steve Crocker, Russ Housley
 Working Group: Individual Submissions (none)
Cryptographic algorithms for DNSSEC go through multiple phases during their lifetime. They are created, tested, adopted, used, and deprecated over a period of time. This RFC defines these phases, and defines the criteria for moving from one phase to the next.
 JOSE-COSE HPKE Cookbook
 
 draft-steele-jose-cose-hpke-cookbook-00.txt
 Date: 02/03/2024
 Authors: Orie Steele
 Working Group: Individual Submissions (none)
This document contains a set of examples using JSON Object Signing and Encryption (JOSE), CBOR Object Signing and Encryption (COSE) and Hybrid Public Key Encryption (HPKE) to protect data. These examples are meant to coverage the edge cases of both JOSE and COSE, including different structures for single and multiple recipients, external additional authenticated data, and key derivation function (KDF) context binding.
 Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) for JOSE and COSE
 
 draft-reddy-cose-jose-pqc-kem-01.txt
 Date: 16/03/2024
 Authors: Tirumaleswar Reddy.K, Aritra Banerjee, Hannes Tschofenig
 Working Group: Individual Submissions (none)
This document describes the conventions for using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) within JOSE and COSE. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-reddy-cose-jose-pqc/. Discussion of this document takes place on the cose Working Group mailing list (mailto:cose@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/cose/. Subscribe at https://www.ietf.org/mailman/listinfo/cose/.
 Use Cases and Problem Statement of Online Data Express Service
 
 draft-du-tsvwg-odes-problem-statement-00.txt
 Date: 02/03/2024
 Authors: Zongpeng Du, Hongwei Yang, Guangyu Zhao
 Working Group: Individual Submissions (none)
This document describes use cases and problem statement of Online Data Express Service.
 SNMP Trap for SRv6 Policy
 
 draft-pang-srv6ops-srv6-policy-trap-00.txt
 Date: 03/03/2024
 Authors: Ran Pang, Changwang Lin, Mengxiao Chen
 Working Group: Individual Submissions (none)
This document defines the Simple Network Management Protocol (SNMP) trap module for SRv6 Policy.
 Modeling the Digital Map based on RFC 8345: Sharing Experience and Perspectives
 
 draft-havel-nmop-digital-map-00.txt
 Date: 03/03/2024
 Authors: Olga Havel, Benoit Claise, Oscar de Dios, Ahmed Elhassany, Thomas Graf, Mohamed Boucadair
 Working Group: Individual Submissions (none)
This document shares experience in modelling Digital Map based on the IETF RFC 8345 topology YANG modules and some of its augmentations. First, the concept of Digital Map is defined and its connection to the Digital Twin is explained. Next to Digital Map requirements and use cases, the document identifies a set of open issues encountered during the modelling phases, the missing features in RFC 8345, and some perspectives on how to address them. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/OlgaHuawei.
 Vector Commitment-based Proof of Transit
 
 draft-liu-vcpot-00.txt
 Date: 03/03/2024
 Authors: Peter Liu
 Working Group: Individual Submissions (none)
This document describes an ordered Proof of Transit mechanism.
 IOAM Trace Option Extensions for Incorporating the Alternate-Marking Method
 
 draft-he-ippm-ioam-extensions-incorporating-am-00.txt
 Date: 03/03/2024
 Authors: Xiaoming He, Xiao Min, Frank Brockners, Giuseppe Fioccola, Chongfeng Xie
 Working Group: Individual Submissions (none)
In situ Operation, Administration, and Maintenance (IOAM) is used for recording and collecting operational and telemetry information. Specifically, passport-based IOAM allows telemetry data generated by each node along the path to be pushed into data packets when they traverse the network, while postcard-based IOAM allows IOAM data generated by each node to be directly exported without being pushed into in-flight data packets. This document extends IOAM Trace Option for incorporating the Alternate-Marking Method.
 The UDP Authentication Option
 
 draft-touch-tsvwg-udp-auth-opt-00.txt
 Date: 03/03/2024
 Authors: Joseph Touch
 Working Group: Individual Submissions (none)
This document extends UDP by defining a framework for an authentication option.
 Telemetry Methodologies for Analog Measurement Instrumentation
 
 draft-janzking-nmrg-telemetry-instrumentation-01.txt
 Date: 03/03/2024
 Authors: Christopher Janz, Daniel King
 Working Group: Individual Submissions (none)
Evolution toward network operations automation requires systems encompassing software-based analytics and decision-making. Network- based instrumentation provides crucial data for these components and processes. However, the proliferation of such instrumentation and the need to migrate the data it generates from the physical network to "off-the-network" software, poses challenges. In particular, analog measurement instrumentation, which generates time-continuous real number data, may generate significant data volumes. Methodologies for handling analog measurement instrumentation data will need to be identified and discussed, informed in part by consideration of requirements for the operation of network digital twins, which may be important software-realm consumers of such data.
 YANG Model for IS-IS Segment Routing MPLS PICS
 
 draft-qgp-lsr-isis-pics-srmpls-yang-01.txt
 Date: 09/05/2024
 Authors: Yingzhen Qu, Les Ginsberg, Tony Przygienda, Yongqing Zhu
 Working Group: Individual Submissions (none)
The YANG model in this document is to query an IS-IS Protocol Implementation Conformance Statement (PICS) of Segment Routing on MPLS data plane.
 IKEv2 support for Child SA PFS policy notification
 
 draft-pwouters-ipsecme-child-pfs-info-00.txt
 Date: 03/03/2024
 Authors: Paul Wouters
 Working Group: Individual Submissions (none)
This document defines the CHILD_PFS_INFO Notify Message Status Type Payload for the Internet Key Exchange Protocol Version 2 (IKEv2) to support exchanging the policy for the Perfect Forward Secrecy (PFS) and Key Exchange (KE) method setting of the initial Child SA.
 YANG Data Models for Transport TE FGNM Extension Model
 
 draft-yu-ccamp-te-fgnm-yang-00.txt
 Date: 03/03/2024
 Authors: Chaode Yu, XingZhao
 Working Group: Individual Submissions (none)
This document defines two extension YANG data models augmenting to TE topology and TE tunnel YANG model, based on the FGNM (Fine-Grain Network Management) requirements in transport networks.
 Mobile User Plane Architecture for Distributed Mobility Management
 
 draft-mhkk-dmm-mup-architecture-00.txt
 Date: 03/03/2024
 Authors: Satoru Matsushima, Katsuhiro Horiba, Ashiq Khan, Yuya Kawakami, Tetsuya Murakami, Keyur Patel, Miya Kohno, Teppei Kamata, Pablo Camarillo, Jakub Horn, Dan Voyer, Shay Zadok, Israel Meilik, Ashutosh Agrawal, Kumaresh Perumal
 Working Group: Individual Submissions (none)
This document defines the Mobile User Plane (MUP) architecture for Distributed Mobility Management. The requirements for Distributed Mobility Management described in [RFC7333] can be satisfied by routing fashion. In MUP Architecture, session information between the entities of the mobile user plane is turned to routing information so that mobile user plane can be integrated into dataplane. MUP architecture is designed to be pluggable user plane part of existing mobile service architectures, enabled by auto-discovery for the use plane. Segment Routing provides network programmability for a scalable option with it. While MUP architecture itself is independent from a specific dataplane protocol, several dataplane options are available for the architecture. This document describes IPv6 dataplane in Segment Routing case due to the DMM requirement, and is suitable for mobile services which require a large IP address space.
 Use Cases and Requirements for Implementing Lossless Techniques in Wide Area Networks
 
 draft-huang-rtgwg-wan-lossless-uc-00.txt
 Date: 03/03/2024
 Authors: Hongyi Huang, Tao He, Tianran Zhou
 Working Group: Individual Submissions (none)
This document outlines the use cases and requirements for implementing lossless data transmission techniques in Wide Area Networks (WANs), motivated by the increasing demand for high- bandwidth and reliable data transport in applications such as high- performance computing (HPC), genetic sequencing, and audio/video production. The challenges associated with existing data transport protocols in WAN environments are discussed, along with the proposal of requirements for enhancing lossless transmission capabilities to support emerging data-intensive applications.
 Data Fields for Congestion Measurement
 
 draft-shi-ippm-congestion-measurement-data-00.txt
 Date: 03/03/2024
 Authors: Hang Shi, Tianran Zhou, Zhenqiang Li
 Working Group: Individual Submissions (none)
Congestion Measurement collects the congestion information in the packet while the packet traverses a path. The sender sets the congestion measurement command in the packet header indicating the network device along the path to update the congestion information field in the packet. When the packet arrive at the receiver, the congestion information field will reflect the degree of congestion across network path. Congestion Measurement can enable precise congestion control, aids in effective load balancing, and simplifies network debugging. This document defines data fields for Congestion Measurement. Congestion Measurement Data-Fields can be encapsulated into a variety of protocols, such as Network Service Header (NSH), Segment Routing, Generic Network Virtualization Encapsulation (Geneve), or IPv6.
 IGP Extensions for Source Prefix Identification
 
 draft-li-lsr-extensions-for-spi-00.txt
 Date: 03/03/2024
 Authors: Dan Li, Lancheng Qin, Changwang Lin
 Working Group: Individual Submissions (none)
This document proposes a new intra-domain SAV solution, called Source Prefix Identification (SPI), and designs IGP extensions for implementing SPI.
 IPv6 Options for Congestion Measurement
 
 draft-shi-ippm-congestion-measurement-ipv6-options-00.txt
 Date: 03/03/2024
 Authors: Hang Shi, Tianran Zhou, liuy619@chinaunicom.cn, Mengyao Han
 Working Group: Individual Submissions (none)
The Congestion Measurement enables precise congestion control, aids in effective load balancing, and simplifies network debugging by accurately reflecting the degree of congestion across network paths. This document outlines how Congestion Measurement Data-Fields are encapsulated in IPv6.
 IOAM network awareness for Low Latency,Low Loss,and Scalable Throughput (L4S)
 
 draft-quan-l4s-ioam-00.txt
 Date: 03/03/2024
 Authors: Wei Quan, Wei Su, Shuaihao Pan, Xiaobin Liang, Jie Liang
 Working Group: Individual Submissions (none)
This specification defines a framework how to update L4S Dual-Queue Coupled AQM with In Situ Operations, Administration, and Maintenance (IOAM). These are designed for consistently very low queuing latency, very low congestion loss, and scaling of perflow throughput by using Explicit Congestion Notification (ECN) using the operational and telemetry information collected by IOAM. Since L4S lacks information about the use of network status and network nodes, which also affect network performance in practice, it is considered to use direct export mode for information collection of L4S-IOAM to strengthen the AQM regulation of L4S. It then gives the normative requirements that are necessary.
 IKEv2 Support for Anti-Replay Status Notification
 
 draft-pan-ipsecme-anti-replay-notification-00.txt
 Date: 03/03/2024
 Authors: Wei Pan, Qi He, Paul Wouters
 Working Group: Individual Submissions (none)
RFC 4302 and RFC 4303 specify that, during Security Association (SA) establishment, IPsec implementation should notify the peer if it will not provide anti-replay protection, to avoid having the peer do unnecessary sequence number monitoring and SA setup. This document defines the ANTI_REPLAY_STATUS Notify Message Status Type Payload in the Internet Key Exchange Protocol Version 2 (IKEv2) to inform the peers of their own anti-replay status when creating the IPsec SAs, to fulfill the above requirement.
 Shared Use of IPsec Tunnel in a Multi-VPN Environment
 
 draft-he-ipsecme-vpn-shared-ipsecsa-00.txt
 Date: 03/03/2024
 Authors: Qi He, Wei Pan, Xiaolan Chen, Beijing Ding
 Working Group: Individual Submissions (none)
In a multi-VPN environment, currently, different IPsec tunnels (i.e., different IKE SAs and Child SAs) have to be created to differentiate and protect the traffic of each VPN between the device and its peer. When the number of neighbors of a device and the number of VPNs increases, the number of IPsec tunnels also increases considerably. This results in the need for a large number of SAs, which exceeds the device's capacity. This document proposes a method for different VPNs to share the use of a single IPsec tunnel, which can greatly reduce the number of SAs required in a multi-VPN scenario.
 A Reference Implementation of Ascertaining RPKI Signed Objects to be Validated in Incremental Updates
 
 draft-madi-sidrops-partial-validation-00.txt
 Date: 04/03/2024
 Authors: Di Ma, Yu Zhang
 Working Group: Individual Submissions (none)
This document describes a reference implementation of how an RP ascertains which RPKI signed objects that need to be validated during a transaction of RPKI incremental update from the perspective of this RP.
 A YANG Data Model for Network Element Threat Surface Management
 
 draft-hu-network-element-tsm-yang-00.txt
 Date: 04/03/2024
 Authors: Feifei Hu, Danke Hong, Liang Xia
 Working Group: Individual Submissions (none)
This document defines a base YANG data model for network element threat surface management that is application- and technology- agnostic.
 Hierarchical methods of computing metrics distribution
 
 draft-yi-cats-hierarchical-metric-distribution-00.txt
 Date: 04/03/2024
 Authors: Xinxin Yi, Naihan Zhang, Hang Shi
 Working Group: Individual Submissions (none)
This document analyzes the necessarity of setting hierarchical methods of computing metrics distribution. Besides, we propose the workflow of hierarchical metric distribution for different CATS frameworks.
 Alternate Marking Deployment Status and Considerations
 
 draft-zhou-srv6ops-am-deployment-status-00.txt
 Date: 04/03/2024
 Authors: Tianran Zhou, Zhenbin Li
 Working Group: Individual Submissions (none)
Operators have started the deployment of Alternate Marking in their networks for different scenarios. This document introduces several deployment cases of Alternate Marking in operator networks. Some considerations about the Alternate Marking deployments are also collected.
 Application-aware Networking (APN) Framework
 
 draft-li-rtgwg-apn-framework-00.txt
 Date: 04/03/2024
 Authors: Zhenbin Li, Shuping Peng, Dan Voyer, Cong Li, Peng Liu, Chang Cao, Gyan Mishra
 Working Group: Individual Submissions (none)
A multitude of applications are carried over the network, which have varying needs for network bandwidth, latency, jitter, and packet loss, etc. Some new emerging applications have very demanding performance requirements. However, in current networks, the network and applications are decoupled, that is, the network is not aware of the applications' requirements in a fine granularity. Therefore, it is difficult to provide truly fine-granularity traffic operations for the applications and guarantee their SLA requirements. This document proposes a new framework, named Application-aware Networking (APN), where application-aware information (i.e. APN attribute) including APN identification (ID) and/or APN parameters (e.g. network performance requirements) is encapsulated at network edge devices and carried in packets traversing an APN domain in order to facilitate service provisioning, perform fine-granularity traffic steering and network resource adjustment.
 A YANG Model for Application-aware Networking (APN)
 
 draft-peng-rtgwg-apn-yang-00.txt
 Date: 04/03/2024
 Authors: Shuping Peng, Zhenbin Li, Ran Pang, Huiyue Zhang
 Working Group: Individual Submissions (none)
Application-aware Networking (APN) is a framework, where APN data packets convey APN attribute (incl. APN ID and/or APN Parameters) to enable fine grained service provisioning. This document defines a YANG module for APN. The YANG modules in this document conform to the Network Management Datastore Architecture (NMDA).
 Dissemination of BGP Flow Specification Rules for APN
 
 draft-peng-idr-apn-bgp-flowspec-00.txt
 Date: 04/03/2024
 Authors: Shuping Peng, Zhenbin Li, Huiyue Zhang, Ran Pang, Yong Cui
 Working Group: Individual Submissions (none)
A BGP Flow Specification is an n-tuple consisting of several matching criteria that can be applied to IP traffic. Application-aware Networking (APN) is a framework, where APN data packets convey APN attribute including APN ID and/or APN Parameters. The dynamic Flow Spec mechanism for APN is designed for the new applications of traffic filtering in an APN domain as well as the traffic control and actions at the policy enforcement points in this domain. These applications require coordination among the ASes within a service provider. This document specifies a new BGP Flow Spec Component Type in order to support APN traffic filtering. The match field is the APN ID. It also specifies traffic filtering actions to enable the creation of the APN ID in the outer tunnel encapsulation when matched to the corresponding Flow Spec rules.
 Benchmarking Methodology for Segment Routing
 
 draft-vfv-bmwg-sr-bench-meth-00.txt
 Date: 04/03/2024
 Authors: Giuseppe Fioccola, Eduard, Paolo Volpato, Luis Contreras, Bruno Decraene
 Working Group: Individual Submissions (none)
This document defines a methodology for benchmarking Segment Routing (SR) performance for Segment Routing over IPv6 (SRv6) and MPLS (SR- MPLS). It builds upon RFC 2544, RFC 5180, RFC 5695 and RFC 8402.
 SRv6 Service Benchmarking Guideline
 
 draft-geng-bmwg-srv6-service-guideline-00.txt
 Date: 04/03/2024
 Authors: Xuesong Geng, Zhu Keyi, Tianran Zhou
 Working Group: Individual Submissions (none)
This document serves as a comprehensive guideline for SRv6 service benchmarking, outlining a core set of test cases that can be employed as a foundation for further benchmarking work.
 Application-aware IPv6 Networking (APN6) Encapsulation
 
 draft-li-6man-apn-ipv6-encap-00.txt
 Date: 04/03/2024
 Authors: Zhenbin Li, Shuping Peng, Chongfeng Xie, Shuai Zhang
 Working Group: Individual Submissions (none)
Application-aware IPv6 Networking (APN6) makes use of IPv6 encapsulation to convey the APN Attribute along with data packets and make the network aware of data flow requirements at different granularity levels. The APN attribute can be encapsulated in the APN header. This document defines the APN header and its encapsulation in the IPv6 data plane.
 Post-Quantum Cryptography enhancement in EAP-AKA prime
 
 draft-ar-emu-pqc-eapaka-00.txt
 Date: 04/03/2024
 Authors: Aritra Banerjee, Tirumaleswar Reddy.K
 Working Group: Individual Submissions (none)
Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) is specified in [I-D.ietf-emu-aka-pfs], providing updates to [RFC9048] with an optional extension that offers ephemeral key exchange using the traditional Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement algorithm for achieving perfect forward secrecy (PFS). However, it is susceptible to future threats from Cryptographically Relevant Quantum Computers, which could potentially compromise a traditional ephemeral public key. If the adversary has also obtained knowledge of the long-term key and ephemeral public key, it could compromise session keys generated as part of the authentication run in EAP-AKA'. This draft aims to enhance the security of EAP-AKA' FS making it quantum-safe.
 Application-aware Networking (APN) Implementation and Deployment Status
 
 draft-lxm-rtgwg-apn-deployment-status-01.txt
 Date: 20/03/2024
 Authors: liuy619@chinaunicom.cn, Qingbang Xu, Jianwei Mao
 Working Group: Individual Submissions (none)
This draft provides an overview of Application-aware Networking (APN) deployment status. It lists various APN features that have been deployed in the production networks. It also provides an overview of APN implementation status.
 BGP Link State Extensions for Scalable Network Resource Partition
 
 draft-dong-idr-bgp-ls-scalable-nrp-01.txt
 Date: 23/04/2024
 Authors: Jie Dong, Yongqing Zhu, Zehua Hu, Jun Ge, KaZhang
 Working Group: Individual Submissions (none)
Enhanced VPNs aim to deliver VPN services with enhanced characteristics, such as guaranteed resources, latency, jitter, etc., so as to support customers requirements on connectivity services with these enhanced characteristics. Enhanced VPN requires integration between the overlay VPN connectivity and the characteristics provided by the underlay network. A Network Resource Partition (NRP) is a subset of the network resources and associated policies on each of a connected set of links in the underlay network. An NRP could be used as the underlay to support one or a group of enhanced VPN services. The NRP-specific resource information and status needs to be collected from network nodes and reported to the network controller for NRP-specific management and path computation. This document specifies the BGP Link-State (BGP-LS) mechanisms with necessary extensions to advertise the information of NRPs to network controller in a scalable way. The NRP information is advertised using a separate type of BGP-LS NLRI, which allows flexible update of NRP information without impacting the based link state information.
 IPv6-Mostly Networks: Deployment and Operations Considerations
 
 draft-link-v6ops-6mops-00.txt
 Date: 04/03/2024
 Authors: Jen Linkova
 Working Group: Individual Submissions (none)
This document discusses an deployment scenario called "an IPv6-Mostly network", when IPv6-only and IPv4-enabled endpoints coexist on the same network (network segment, VLAN, SSID etc).
 Discovery of Network-designated CoRE Resolvers
 
 draft-lenders-core-dnr-01.txt
 Date: 19/03/2024
 Authors: Martine Lenders, Christian Amsuess, Thomas Schmidt, Matthias Waehlisch
 Working Group: Individual Submissions (none)
This document specifies solutions to discover DNS resolvers that support encrypted DNS resolution in constrained environments. The discovery is based DNS SVCB records, Router Advertisements, or DHCP. In particular, the proposed specification allows a host to learn DNS over CoAP (DoC) servers, including configurations to use DoC over TLS/DTLS, OSCORE, and EDHOC when resolving names.
 Applicability of GMPLS for fine grain Optical Transport Network
 
 draft-lin-ccamp-gmpls-fgotn-applicability-00.txt
 Date: 04/03/2024
 Authors: Yi Lin, Liuyan Han, Yang Zhao, Raul Munoz
 Working Group: Individual Submissions (none)
ITU-T Recommendation G.709/Y.1331 Edition 6.5 [G709-E6.5] introduced new fine grain OTN (fgOTN) for the efficient transmission of sub-1G client signals. This document reviews the fgOTN control plane requirements, examines the applicability of using existing GMPLS control plane for fgOTN, and provides the standard gap analysis and considerations on GMPLS extensions.
 EAP Multiple Pre-Shared Keys (EAP-MPSK) Method
 
 draft-yan-emu-eap-multiple-psk-00.txt
 Date: 04/03/2024
 Authors: Lei YAN
 Working Group: Individual Submissions (none)
This document defines an Extensible Authentication Protocol (EAP) method for supporting the negotiation of a PSK among multiple PSKs.
 BGP Link-State Extensions for Source Address Validation Networks (SAVNET)
 
 draft-tong-idr-bgp-ls-savnet-00.txt
 Date: 04/03/2024
 Authors: tongtian124, Ran Pang, Nan Geng, Mingxing Liu
 Working Group: Individual Submissions (none)
BGP Link-state uses the BGP protocol to collect and report network topology to the network controller. This document defines a new type of BGP-LS NLRI for reporting source address validation-related information to the controller. The reported information can be used to generate SAV rules centrally.
 Operations,Administration and Maintenance (OAM) for Computing-Aware Traffic Steering
 
 draft-fu-cats-oam-fw-00.txt
 Date: 04/03/2024
 Authors: FUHUAKAI, Bo Liu, Zhenqiang Li, Daniel Huang, Cheng Huang, Liwei Ma, Wei Duan
 Working Group: Individual Submissions (none)
This document describes an OAM framework for Computing-Aware Traffic Steering (CATS). The proposed OAM framework enables the fault and the performance management of end-to-end connections from clients to networks and finally to computing instances. In the following sections, the major components of the framework, the functionalities, and the deployment considerations are elaborated in detail.
 Analysis for Multiple Data Plane Solutions of Computing-Aware Traffic Steering
 
 draft-fu-cats-muti-dp-solution-00.txt
 Date: 04/03/2024
 Authors: FUHUAKAI, Bo Liu, Zhenqiang Li, Daniel Huang, Dongyu Yuan, Liwei Ma, Wei Duan
 Working Group: Individual Submissions (none)
This document presents an overall framework for the data plane of Computing-Aware Traffic Steering (CATS). In particular, it illustrates several optional and possible data plane solutions, compares their key features and main differences, and analyzes their corresponding applicable scenarios.
 Computing Aware Traffic Steering Consideration for Mobile User Plane Architecture
 
 draft-dcn-dmm-cats-mup-00.txt
 Date: 04/03/2024
 Authors: Tran Ngoc, Younghan Kim
 Working Group: Individual Submissions (none)
The document [I-D.draft-mhkk-dmm-srv6mup-architecture] describes the Mobile User Plane (MUP) architecture for Distributed Mobility Management. The proposed architecture converts the user mobility session information from the control plane entity to an optimal IPv6 dataplane routing information. However, when anycast address is used for service in data network (DN), this solution can be enhanced to dynamically set up the dataplane to the optimal service instance. This document discusses a solution to integrate computing-aware traffic steering capabilities to the mentioned MUP architecture. The target applied use-case is the anycast IP services scenario, where different instances that share the same anycast address of the service can serve the user request. For each session request, based on the up-to-date collected computing and network information, the MUP controller can convert the session information to the dataplane routing information to the optimal service instance.
 Signaling Use Cases for Traffic Differentiation
 
 draft-bwbr-tsvwg-signaling-use-cases-00.txt
 Date: 04/03/2024
 Authors: Sridharan Rajagopalan, Dan Wing, Mohamed Boucadair, Tirumaleswar Reddy.K
 Working Group: Individual Submissions (none)
Host-to-network signaling can improve the user experience by informing the network which flows are more important and which packets within a flow are more important. The differentiated service may be provided at the network (e.g., packet prioritization), the sender (e.g., adaptive transmission), or through cooperation of both the sender and the network. This document outlines use-cases that highlight the need for a new signaling protocol from the receiver to its network elements which enables different traffic treatment.
 SAVNET Use Cases
 
 draft-ys-savnet-use-cases-00.txt
 Date: 04/03/2024
 Authors: 1211176911910469110103, Xueyan Song, Changwang Lin, Nan Geng
 Working Group: Individual Submissions (none)
This document introduces the use case for Source Address Validation (SAV) applied in intra-domain and inter-domain telecommunication networks. It describes the typical routing implements and possible improvements for SAV in the use cases.
 Best practices for traffic steering to SRv6
 
 draft-geng-srv6ops-traffic-steering-to-srv6-00.txt
 Date: 04/03/2024
 Authors: Gary Geng, Yisong Liu, Chongfeng Xie, Changwang Lin
 Working Group: Individual Submissions (none)
This document primarily describes the traffic steering towards SRv6- BE and SRv6-TE respectively, providing an overview of the main traffic steering methods for these two approaches. Furthermore, it discusses the recommended traffic steering methods for various typical scenarios.
 Intra-domain SAV Support via BGP
 
 draft-cheng-savnet-intra-domain-sav-bgp-00.txt
 Date: 04/03/2024
 Authors: Weiqiang Cheng, Changwang Lin, 1211176911910469110103
 Working Group: Individual Submissions (none)
This document describes a method for publishing source prefixes via the BGP protocol, iterating through the SAVNET table entries based on intra-domain next hop SAVNET rules. The generation of intra- domain next hop SAVNET rules is implemented by the intra-domain IGP protocol, and the BGP protocol inherits the source interface list from its next hop SAVNET rules to generate the SAVNET rule table for source prefixes.
 BGP Flowspec for Computing-Aware Traffic Steering
 
 draft-lin-idr-cats-flowspec-ts-00.txt
 Date: 04/03/2024
 Authors: Changwang Lin, Huijuan Yao
 Working Group: Individual Submissions (none)
A BGP Flow Specification is an n-tuple consisting of several matching criteria that can be applied to IP traffic. Computing-Aware Traffic Steering (CATS) is a framework, This document specifies a new BGP Flow Spec Component Type in order to support CATS traffic forwarding.
 Distribute Service Metric By BGP
 
 draft-lin-idr-distribute-service-metric-00.txt
 Date: 04/03/2024
 Authors: Changwang Lin, Huijuan Yao
 Working Group: Individual Submissions (none)
When calculating the path selection for service traffic, it is important to consider not only network metrics, but also the impact of service Metric. Therefore, it is necessary to transmit service Metric information from the server site to the user access site, in order to facilitate path selection for service traffic at the access router. This document describes an approach for using the BGP Control Plane to steer traffic based on a set of metrics that reflect the underlying network conditions and other service-specific state collected from available service locations.
 Host to Network Signaling Use Cases for Collaborative Traffic Differentiation
 
 draft-rwbr-tsvwg-signaling-use-cases-02.txt
 Date: 17/03/2024
 Authors: Sridharan Rajagopalan, Dan Wing, Mohamed Boucadair, Tirumaleswar Reddy.K
 Working Group: Individual Submissions (none)
Host-to-network (and vice versa) signaling can improve the user experience by informing the network which flows are more important and which packets within a flow are more important without having to disclose the content of the packets being delivered. The differentiated service may be provided at the network (e.g., packet discard preference), the sender (e.g., adaptive transmission or session migration), or through cooperation of both the host and the network. This document lists use cases demonstrating the need for a mechanism to share metadata about flows between a receiving host and its networks to enable differentiated traffic treatment for packets sent to the host. Such a mechanism is typically implemented using a signaling protocol between the host and a set of network elements.
 An Intent-Based Management Framework for Software-Defined Vehicles in Intelligent Transportation Systems
 
 draft-jeong-opsawg-intent-based-sdv-framework-00.txt
 Date: 04/03/2024
 Authors: Jaehoon Jeong, Yiwen Shen
 Working Group: Individual Submissions (none)
Software-Defined Vehicle (SDV) is a new player towards autonomous vehicles in Intelligent Transportation Systems (ITS). An SDV is constructed by a software platform like a cloud-native system like Kubernetes and has its internal network. To facilitate the easy and efficient configuration of networks in the SDV, an intent-based management is an appropriate direction. This document proposes a framework of intent-based management for networks, security, and applications in SDVs so that they can communicate with other SDVs and infrastructure nodes for safe driving and infotainment services in the road networks.
 Scenarios and Potential Future Work of Enterprise Network Policies
 
 draft-liu-enterprise-network-policies-00.txt
 Date: 04/03/2024
 Authors: Bing Liu, Qiangzhou Gao, liuy619@chinaunicom.cn
 Working Group: Individual Submissions (none)
This document describes several typical scenarios of utilizing network policies against enterprise networks, and discusses some existing work and the limitations. Lastly, this document proposes several aspects of potential future work that might led to a formation of policy plane for enterprise networks.
 Non-source-routed Multicast in SR Networks
 
 draft-zzhang-pim-non-source-routed-sr-mcast-00.txt
 Date: 04/03/2024
 Authors: Zhaohui Zhang, IJsbrand Wijnands, Hooman Bidgoli, Yisong Liu
 Working Group: Individual Submissions (none)
With Segment Routing (SR) architecture, a unicast flow can be source- routed through an SR network following an explicit path specified in the packet, w/o the need for per-flow state in the network. As a result, the otherwise needed protocols to signal the per-flow unicast state can also be removed from the network. In the case of multicast, traffic can be either source-routed or non-source-routed, and this document discusses non-sourced-routed options for multicast in an SR network with either MPLS or IPv6/SRv6 data plane.
 Distribution of Device Discovery Information in NVMe Over RoCEv2 Storage Network Using BGP
 
 draft-wang-idr-bgp-nof-nlri-00.txt
 Date: 04/03/2024
 Authors: Ruixue Wang, Changwang Lin, Mengxiao Chen, Fengwei Qin, Qi Zhang, wangwenxuan
 Working Group: Individual Submissions (none)
This document proposes a method of distributing device discovery information in NVMe over RoCEv2 storage network using the BGP routing protocol. A new BGP Network Layer Reachability Information (NLRI) encoding format, named NoF NLRI, is defined.
 Structured vacation notices
 
 draft-happel-sml-structured-vacation-notices-00.txt
 Date: 04/03/2024
 Authors: Hans-Joerg Happel
 Working Group: Individual Submissions (none)
This document describes a machine-readable format for vacation notice messages. It is supposed to be used in conjuction with conventional, human-readable vacation notices.
 CDNI Source Access Control Metadata
 
 draft-chaudhari-source-access-control-metadata-00.txt
 Date: 04/03/2024
 Authors: Pankaj Chaudhari, Glenn Goldstein, Will Power, Arnon Warshavsky
 Working Group: Individual Submissions (none)
This specification provides an alternative to the MI.SourceMetadata objects defined in RFC8006, providing greatly extended capabilities with regards to defining multiple sources, load balancing, and failover rules across those sources, as well as a mechanism for a content delivery network (CDN) to monitor source health and pull unhealthy sources out of rotation. Additionally, new methods are defined for authentication access to an upstream source/origin.
 CDNI Client Access Control Metadata
 
 draft-chaudhari-client-access-control-metadata-01.txt
 Date: 17/03/2024
 Authors: Pankaj Chaudhari, Glenn Goldstein, Will Power, Arnon Warshavsky
 Working Group: Individual Submissions (none)
This specification adds to the basic client access control metadata in RFC8006, providing content providers and upstream content delivery networks (uCDNs) extended capabilities in defining location and time window restrictions. Support is also provided to define required Transport Layer Security (TLS) certificates and encryption levels.
 CDNI Delivery Metadata
 
 draft-bichot-delivery-metadata-00.txt
 Date: 04/03/2024
 Authors: Guillaume Bichot, Alfonso Siloniz, Glenn Goldstein
 Working Group: Individual Submissions (none)
This specification adds to the core set of configuration metadata defined in RFC8006, providing delivery metadata to define traffic types, Open Caching request delegation behavior for Open Caching node selection, and request routing modes of traffic delegation.
 CDNI Private Features Metadata
 
 draft-warshavsky-private-features-metadata-00.txt
 Date: 04/03/2024
 Authors: Arnon Warshavsky, Glenn Goldstein
 Working Group: Individual Submissions (none)
This specification defines a mechanism for downstream content delivery networks (dCDNs) to define private extensions to the metadata model that are mutually agreed upon between participating upstream content delivery networks (uCDNs) and dCDNs.
 Compute-Aware Traffic Steering for Midhaul Networks
 
 draft-lcmw-cats-midhaul-00.txt
 Date: 04/03/2024
 Authors: Luis Contreras, Mark Watts
 Working Group: Individual Submissions (none)
Computing-Aware Traffic Steering (CATS) takes into account both computing and networking resource metrics for selecting the appropriate service instance to forwarding the service traffic.
 Flow Metadata for Collaborative Host/Network Signaling
 
 draft-rwbr-sconepro-flow-metadata-01.txt
 Date: 26/04/2024
 Authors: Sridharan Rajagopalan, Dan Wing, Mohamed Boucadair, Tirumaleswar Reddy.K
 Working Group: Individual Submissions (none)
This document defines per-flow and per-packet metadata for both network-to-host and host-to-network signaling in Concise Data Definition Language (CDDL) which expresses both CBOR and JSON. The common metadata definition allows interworking between signaling protocols with high fidelity. The metadata is also self- describing to improve interpretation by network elements and endpoints while reducing the need for version negotiation.
 IPv6 Hop-by-hop and Destination Options Forwarding In Routers
 
 draft-ouellette-v6ops-eh-router-forwarding-00.txt
 Date: 04/03/2024
 Authors: Kyle Ouellette
 Working Group: Individual Submissions (none)
It has become accepted that packets containing IPv6 Extension Headers, especially Hop-by-hop Options, are frequently dropped on the Internet. However, the question still remains as to why they get dropped and what type of devices may be dropping them. This document describes research conducted to isolate routers in a simple topology, with minimal configuration, and shows that router implementations alone are likely not the cause of packets containing IPv6 Extension Headers being dropped on the Internet.
 Remote attestation over EDHOC
 
 draft-song-lake-ra-00.txt
 Date: 04/03/2024
 Authors: Yuxuan Song
 Working Group: Individual Submissions (none)
This document specifies how to perform remote attestation as part of the lightweight authenticated Diffie-Hellman key exchange protocol EDHOC (Ephemeral Diffie-Hellman Over COSE), based on the Remote ATtestation procedureS (RATS) architecture.
 An Identitifier Proof-of-Possession Mechanism
 
 draft-peterson-mimi-idprover-00.txt
 Date: 04/03/2024
 Authors: Jon Peterson
 Working Group: Individual Submissions (none)
This document specifies a means for a third-party service to prove and attest the association of a communications platform with a particular user's telephone number. This capability supports secure enrollment for users of messaging platforms or similar real-time communication applications, for cases where users assert telephone numbers as communication identifiers, and interoperating platforms need to verify that identifiers are being properly attested. This general approach can potentially work with other forms of Service Independent Identifiers (SIIs) in the More Instant Messaging Interoperability (MIMI) framework.
 A YANG Data Model for Intermediate System to intermediate System (IS-IS) Topology
 
 draft-ogondio-nmop-isis-topology-00.txt
 Date: 04/03/2024
 Authors: Oscar de Dios, Samier Barguil, Victor Lopez, Daniele Ceccarelli, Benoit Claise
 Working Group: Individual Submissions (none)
This document defines a YANG data model for representing an abstracted view of a network topology that contains Intermediate System to Intermediate System (IS-IS). This document augments the 'ietf-network' data model by adding IS-IS concepts and explains how the data model can be used to represent the IS-IS topology. The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA).
 Consideration for IP-Based TVR (Time-Variant Routing)
 
 draft-wang-tvr-ip-consideration-00.txt
 Date: 04/03/2024
 Authors: Jing Wang
 Working Group: Individual Submissions (none)
Satellite network are one of the TVR's use case. This document makes some considerations on using IP for the satellite network.
 Light Clients for MLS
 
 draft-kiefer-mls-light-00.txt
 Date: 04/03/2024
 Authors: Franziskus Kiefer, Karthikeyan Bhargavan, Richard Barnes, Joel, Marta Mularczyk
 Working Group: Individual Submissions (none)
The Messaging Layer Security (MLS) protocol provides efficient asynchronous group key establishment for large groups with up to thousands of clients. In MLS, any member can commit a change to the group, and consequently, all members must download, validate, and maintain the full group state which can incur a significant communication and computational cost, especially when joining a group. This document defines Light MLS, an extension that allows for "light clients". A light client cannot commit changes to the group, and only has partial authentication information for the other members of the group, but is otherwise able to participate in the group. In exchange for these limitations, a light client can participate in an MLS group with significantly lower requirements in terms of download, memory, and processing.
 Considerations for common QoS IPv6 extension header(s)
 
 draft-eckert-6man-qos-exthdr-discuss-00.txt
 Date: 04/03/2024
 Authors: Toerless Eckert, Jinoo Joung, Shaofu Peng, Xuesong Geng
 Working Group: Individual Submissions (none)
This document is written to start a discussion and collect opinions and ansers to questions raised in this document on the issue of defining IPv6 extension headers for DETNET-WG functionality with IPv6.
 Messaging Layer Security Ciphersuite using XWing Key Exchange Mechanism
 
 draft-mahy-mls-xwing-00.txt
 Date: 04/03/2024
 Authors: Rohan Mahy
 Working Group: Individual Submissions (none)
This document registers a new Messaging Layer Security (MLS) ciphersuite using the X-Wing hybrid post-quantum resistant / traditional (PQ/T) Key Exchange Mechanism (KEM).
 STI Certificate Transparency
 
 draft-wendt-stir-certificate-transparency-01.txt
 Date: 17/03/2024
 Authors: Chris Wendt, Robert Sliwa, Alec Fenichel, Vinit Gaikwad
 Working Group: Individual Submissions (none)
This document describes a framework for the use of the Certificate Transparency (CT) protocol for publicly logging the existence of Secure Telephone Identity (STI) certificates as they are issued or observed. This allows any interested party that is part of the STI eco-system to audit STI certification authority (CA) activity and audit both the issuance of suspect certificates and the certificate logs themselves. The intent is for the establishment of a level of trust in the STI eco-system that depends on the verification of telephone numbers requiring and refusing to honor STI certificates that do not appear in a established log. This effectively establishes the precedent that STI CAs must add all issued certificates to the logs and thus establishes unique association of STI certificates to an authorized provider or assignee of a telephone number resource. The primary role of CT in the STI ecosystem is for verifiable trust in the avoidance of issuance of unauthorized duplicate telephone number level delegate certificates or provider level certificates. This provides a robust auditable mechanism for the detection of unauthorized creation of certificate credentials for illegitimate spoofing of telephone numbers.
 Self-Clocked Rate Adaptation for Multimedia
 
 draft-johansson-ccwg-rfc8298bis-screamv2-00.txt
 Date: 04/03/2024
 Authors: Ingemar Johansson, Magnus Westerlund
 Working Group: Individual Submissions (none)
This memo describes a rate adaptation algorithm for conversational media services such as interactive video. The solution conforms to the packet conservation principle and is a hybrid loss- and delay based congestion control/rate management algorithm that also supports ECN and L4S. The algorithm is evaluated over both simulated Internet bottleneck scenarios as well as in a LongTerm Evolution (LTE) and 5G system simulator and is shown to achieve both low latency and high video throughput in these scenarios. This specification obsoletes RFC 8298. The algorithm supports handling of multiple media streams, typical use cases are streaming for remote control, AR and 3D VR googles.
 Private Inexpensive Norm Enforcement (PINE) VDAF
 
 draft-chen-cfrg-vdaf-pine-00.txt
 Date: 04/03/2024
 Authors: Junye Chen, Christopher Patton
 Working Group: Individual Submissions (none)
This document describes PINE, a Verifiable Distributed Aggregation Function (VDAF) for secure aggregation of high-dimensional, real- valued vectors with bounded L2-norm. PINE is intended to facilitate private and robust federated machine learning.
 Secure Objects for Media over QUIC
 
 draft-jennings-moq-secure-objects-00.txt
 Date: 04/03/2024
 Authors: Cullen Jennings, Suhas Nandakumar
 Working Group: Individual Submissions (none)
This document describes end-to-end encryption and authentication mechanism for application objects intended to be delivered over Media over QUIC Transport (MOQT).
 Ranking Domain Name System data
 
 draft-toorop-dnsop-ranking-dns-data-00.txt
 Date: 04/03/2024
 Authors: Paul Hoffman, Shumon Huque, Willem Toorop
 Working Group: Individual Submissions (none)
This document extends the list ranking the trustworthiness of domain name system (DNS) data (see Section 5.4.1 of [RFC2181]). The list is extended with entries for root server names and addresses built-in resolvers, and provided via a root hints file with the lowest trustworthiness, as wel as an entry for data which is verifiable DNSSEC secure with the highest trustworthiness. This document furthermore assigns ranked values to the positions of the list for easier reference and comparison of trustworthiness of DNS data.
 EVPN Group Policy
 
 draft-lrss-bess-evpn-group-policy-00.txt
 Date: 04/03/2024
 Authors: Wen Lin, Dhananjaya Rao, Ali Sajassi, Michael Smith, Larry Kreeger
 Working Group: Individual Submissions (none)
Group Based Policy can be used to achieve micro or macro segmentation of user traffic. For Group Based Policy, a Group Policy ID, also known as Group Policy Tag, is used to represent a logical group that shares the same policy and access privilege. This document defines a backward compatible extension to Virtual eXtensible Local Area Network (VXLAN) that allows a Group Policy ID to be carried for the purposes of policy enforcement at the egress Network Virtualization Edge (NVE). It also defines a new BGP Extended Community that can be used to propagate Group Policy ID through a BGP route advertisement in the control plane. This is to facilitate policy enforcement at the ingress NVE when feasible.
 Unicode Separated Values (USV)
 
 draft-unicode-separated-values-01.txt
 Date: 16/03/2024
 Authors: Joel Henderson
 Working Group: Individual Submissions (none)
Unicode Separated Values (USV) is a data format that uses Unicode characters to mark parts. USV builds on ASCII separated values (ASV), and provides pragmatic ways to edit data in text editors by using visual symbols and layouts.
 Window Sizing for Zstandard Content Encoding
 
 draft-jaju-httpbis-zstd-window-size-00.txt
 Date: 04/03/2024
 Authors: Nidhi Jaju, W. Handte
 Working Group: Individual Submissions (none)
Deployments of Zstandard, or "zstd", can use different window sizes to limit memory usage during compression and decompression. Some browsers and user agents limit window sizes to mitigate memory usage concerns, causing interoperability issues. This document updates the window size limit in RFC8878 from a recommendation to a requirement in HTTP contexts.
 5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS
 
 draft-cbs-teas-5qi-to-dscp-mapping-00.txt
 Date: 04/03/2024
 Authors: Luis Contreras, Ivan Bykov, Krzysztof Szarkowicz
 Working Group: Individual Submissions (none)
5G End-to-End Network Slice QoS is an essential aspect of network slicing, as described in both IETF drafts and the 3GPP specifications. Network slicing allows for the creation of multiple logical networks on top of a shared physical infrastructure, tailored to support specific use cases or services. The primary goal of QoS in network slicing is to ensure that the specific performance requirements of each slice are met, including latency, reliability, and throughput.
 OpenPGP Replacement Key Signalling Mechanism
 
 draft-gallagher-openpgp-replacementkey-00.txt
 Date: 04/03/2024
 Authors: Daphne Shaw, Andrew Gallagher
 Working Group: Individual Submissions (none)
This document specifies a method in OpenPGP to suggest a replacement for an expired or revoked key.
 SRv6 SFC Architecture with SR-aware Functions
 
 draft-watal-spring-srv6-sfc-sr-aware-functions-00.txt
 Date: 04/03/2024
 Authors: Wataru Mishima, 59 61
 Working Group: Individual Submissions (none)
This document describes the architecture of Segment Routing over IPv6 (SRv6) Service Function Chaining (SFC) with SR-aware functions. This architecture provides the following benefits: * Comprehensive management: a centralized controller for SFC, handling SR Policy, link-state, and network metrics. * Simplicity: no SFC proxies, so that reduces nodes and address resource consumption. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the Source Packet Routing in Networking Working Group mailing list (spring@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/spring/. Source for this draft and an issue tracker can be found at https://https/github.com/watal.
 Secure Group Key Agreement with MLS over MoQ
 
 draft-jennings-moq-e2ee-mls-00.txt
 Date: 04/03/2024
 Authors: Cullen Jennings, Richard Barnes, Suhas Nandakumar
 Working Group: Individual Submissions (none)
This specification defines a mechanism to use Message Layer Security (MLS) to provide end-to-end group key agreement for Media over QUIC (MOQ) applications. Almost all communications are done via the MOQ transport. MLS requires a small degree of synchronization, which is provided by a simple counter service.
 Including Additional Records for DNSSD in DNS Push Subscriptions
 
 draft-tlmd-push-dnssd-additional-00.txt
 Date: 04/03/2024
 Authors: Ted Lemon, Di Ma
 Working Group: Individual Submissions (none)
This document extends DNS Push Notifications by providing ways for DNS Push subscribers to track additional data as well as direct answers to DNS questions. This is analogous to the support for additional data specified for multicast DNS, for example.
 MoWIE for Network Aware Application
 
 draft-mertus-scone-mowie-for-network-aware-app-00.txt
 Date: 04/03/2024
 Authors: Daniel Mertus, Yuhang Jia, Yunfei Zhang, Richard Yang, Gang Li, Yixue Lei, Yunbo Han, Sabine Randriamasy
 Working Group: Individual Submissions (none)
With the deployment of 5G networks, cloud-based interactive services such as cloud gaming have gained substantial attention. To ensure users' quality of experience (QoE), a cloud interactive service may require not only high bandwidth (e.g., high-resolution media transmission) but also low delay (e.g., low latency and low lagging). However, the quality perceived by a user of a mobile and wireless device may vary widely as a function of many factors, and unhandled changes can substantially compromise the user's QoE. In this document, we investigate network-aware applications (NAA), which realize cloud-based interactive services with improved QoE, by efficient utilization of a solution named Mobile and Wireless Information Exposure (MoWIE). In particular, this document demonstrates, through realistic evaluations, that mobile network information such as MCS (Modulation and Coding Scheme) can effectively expose the dynamics of the underlying network and can be made available to applications through MoWIE; using such an information, the applications can then adapt key control knobs such as media codec schemes, encapsulation, and application layer processing to minimize QoE distortion. Following evaluations we give a cursory overview of the design space for implementing MoWIE
 Use cases,Network Scenarios and gap analysis for Packet Optical Integration (POI) with coherent plugables under ACTN Framework
 
 draft-poidt-ccamp-actn-poi-pluggable-usecases-gaps-00.txt
 Date: 04/03/2024
 Authors: Oscar de Dios, Jean-Francois Bouquier, Julien Meuric, Gyan Mishra, Gabriele Galimberti
 Working Group: Individual Submissions (none)
This document provides general overarching guidelines for control and management of packet over optical converged networks with coherent pluggables and focuses on operators' use cases and network scenarios. It provides a set of use cases which are needed for the control and management of the packet over optical networks which comprise devices with mixes of packet and optical functions where the optical functions may be provided on coherent pluggables. The document provides a gap analysis to solve the use cases.
 ML-KEM Post-Quantum Key Agreement for TLS 1.3
 
 draft-connolly-tls-mlkem-key-agreement-01.txt
 Date: 21/03/2024
 Authors: Deirdre Connolly
 Working Group: Individual Submissions (none)
This memo defines ML-KEM-768 and ML-KEM-1024 as a standalone NamedGroup for use in TLS 1.3 to achieve post-quantum key agreement.
 Use Cases and Requirements of Massive Data Transmission(MDT) in High Bandwidth-delay Product (BDP) Network
 
 draft-liu-rtgwg-mdt-in-high-bdp-00.txt
 Date: 04/03/2024
 Authors: liuy619@chinaunicom.cn, Mengyao Han
 Working Group: Individual Submissions (none)
This document describes the use cases and related requirements of Massive Data Transmission(MDT)in High Bandwidth-delay Product (BDP) Network. To achieve MDT, it is necessary to implement service identification and traffic record, network layer load balancing, transmission protocol optimization, etc.
 Mangrove: A Unified Framework for Internet Topology,Routing Abstraction,and Modeling
 
 draft-mangrove-workgroup-mangrove-00.txt
 Date: 05/03/2024
 Authors: Richard Yang, Bradley Lewis, Daniel Mertus, Alex Shi, Joseph Zhang
 Working Group: Individual Submissions (none)
This document describes a novel system called Mangrove for obtaining global visibility across the Internet. It achieves this through constructing a comprehensive, unified representation of the Internet's topology and routing behavior by aggregating and indexing diverse data sources. he core challenge is obtaining an accurate, up-to-date model of how packets traverse the global Internet given the Internet's vast scale, dynamic nature, and fragmented visibility across multiple organizations collecting data in different formats. Mangrove addresses this by leveraging the hierarchical structure and natural abstractions of Internet architecture. It collects and integrates data from traceroute measurements, BGP routing tables, IP allocation records, and active broadband measurements. This multi-source data is partitioned and indexed across multiple granularity levels - geographic regions, autonomous systems, and IP prefixes - allowing effective storage, querying, and scalable processing. Mangrove constructs a unified topology and routing representation augmented with an extensible ruleset derived from Internet axioms and measured data. For arbitrary source-destination pairs, it computes estimated packet paths and associated performance metrics at the highest feasible granularity level based on available information completeness. The system handles real-time Internet dynamics through incremental rule refinement using detected changes in routing data and measurements. This enables timely updates to the topology model without full recomputation. Mangrove aims to provide researchers and operators an unprecedented unified Internet view for analysis, optimization, planning, security, and regulatory tasks.
 Terminology for Constrained-Node Networks
 
 draft-bormann-iotops-ietf-lwig-7228bis-00.txt
 Date: 13/03/2024
 Authors: Carsten Bormann, Mehmet Ersue, Ari Keranen, Carles Gomez
 Working Group: Individual Submissions (none)
The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.
 Advertisement of Remote Interface Identifiers for Layer 2 Bundle Members
 
 draft-glctgp-lsr-l2-bundle-member-remote-id-00.txt
 Date: 16/03/2024
 Authors: Liyan Gong, Changwang Lin, Mengxiao Chen, Ketan Talaulikar, Les Ginsberg, Peter Psenak
 Working Group: Individual Submissions (none)
This document describes how OSPF and IS-IS would advertise the remote interface identifiers for Layer 2 bundle members. The corresponding extension of BGP-LS is also specified.
 PQ/T Hybrid KEM: HPKE with JOSE/COSE
 
 draft-reddy-cose-jose-pqc-hybrid-hpke-00.txt
 Date: 16/03/2024
 Authors: Tirumaleswar Reddy.K, Hannes Tschofenig
 Working Group: Individual Submissions (none)
This document outlines the construction of a PQ/T Hybrid Key Encapsulation Mechanism (KEM) in Hybrid Public-Key Encryption (HPKE) for integration with JOSE and COSE. It specifies the utilization of both traditional and Post-Quantum Cryptography (PQC) algorithms, referred to as PQ/T Hybrid KEM, within the context of JOSE and COSE.
 Filtering Out RPKI Data by Type based on Enhanced SLURM Filters
 
 draft-fu-sidrops-enhanced-slurm-filter-00.txt
 Date: 16/03/2024
 Authors: Yu Fu, Nan Geng
 Working Group: Individual Submissions (none)
Simplified Local Internet Number Resource Management with the RPKI (SLURM) helps operators create a local view of the global RPKI by generating sets of filters and assertions. This document proposes to filter out RPKI data by type based on enhanced SLURM filters. Only the RPKI data types that the network or routers are interested in will appear in the Relay Party's output.
 Signed Prefix List (SPL) Based Route Origin Verification and Operational Considerations
 
 draft-sriram-sidrops-spl-verification-00.txt
 Date: 17/03/2024
 Authors: Kotikalapudi Sriram, Job Snijders, Doug Montgomery
 Working Group: Individual Submissions (none)
The Signed Prefix List (SPL) is an RPKI object that attests to the complete list of prefixes which an Autonomous System (AS) may originate in the Border Gateway Protocol (BGP). This document specifies an SPL-based Route Origin Verification (SPL-ROV) methodology and combines it with the ROA-based ROV (ROA-ROV) to facilitate an integrated mitigation strategy for prefix hijacks and AS forgery. The document also explains the various BGP security threats that SPL can help address and provides operational considerations associated with SPL-ROV deployment.
 JSON Fine Grained Access
 
 draft-zhang-jose-json-fine-grained-access-00.txt
 Date: 17/03/2024
 Authors: Jinling Zhang, cheng Jiang, lingling Ji
 Working Group: Individual Submissions (none)
This document defines a JSON-based fine-grained access (JSON-FA) method, which aims to provide a flexible and easy-to-implement way to achieve fine-grained access control in JSON data.
 SRv6 Deployment and Operation Problem Summary
 
 draft-liu-srv6ops-problem-summary-02.txt
 Date: 19/03/2024
 Authors: Yisong Liu, Dan Voyer, Thomas Graf, Zoltan Miklos, Luis Contreras, Nicolai Leymann, Linjian Song, Satoru Matsushima, Chongfeng Xie, Xinxin Yi, Weiqiang Cheng
 Working Group: Individual Submissions (none)
This document aims to provide a concise overview of the common problems encountered during SRv6 deployment and operation, which provides foundations for further work, including for example of potential solutions and best practices to navigate deployment.
 SRv6 Deployment Consideration
 
 draft-tian-srv6ops-srv6-deployment-consideration-00.txt
 Date: 18/03/2024
 Authors: Hui Tian, Chongfeng Xie, Edmore Chingwena, Shuping Peng, Qiangzhou Gao
 Working Group: Individual Submissions (none)
SRv6 has significant advantages over SR-MPLS and has attracted more and more attention and interest from network operators and verticals. Smooth network migration towards SRv6 is a key focal point and this document provides network design and migration guidance and recommendations on solutions in various scenarios. Deployment cases with SRv6 are also introduced.
 JOSE: Deprecate 'none' and 'RSA1_5'
 
 draft-madden-jose-deprecate-none-rsa15-00.txt
 Date: 18/03/2024
 Authors: Neil Madden
 Working Group: Individual Submissions (none)
This draft updates [RFC7518] to deprecate the JWS algorithm "none" and the JWE algorithm "RSA1_5".
 BBS per Verifier Linkability
 
 draft-vasilis-bbs-per-verifier-linkability-00.txt
 Date: 18/03/2024
 Authors: Vasilis Kalos, Greg Bernstein
 Working Group: Individual Submissions (none)
The BBS Signatures scheme describes a multi-message digital signature, that supports selectively disclosing the messages through unlinkable presentations, build using zero-knowledge proofs. Each BBS proof reveals no information other than the signed messages that the Prover chooses to disclose in that specific instance. As such, the Verifier (i.e., the recipient) of the BBS proof, may not be able to track those presentations over time. Although in many applications this is desirable, there are use cases where that require from the Verifier, to be able to track the BBS proofs they receive from the same entity. Examples include monitoring the use of access credentials for abnormal activity, monetization etc.. This document presents the use of pseudonyms with BBS proofs. A pseudonym, is a value that will remain constant each time a Prover presents a BBS proof to the same Verifier, but will be different (and unlinkable), when the Prover interacts with different parties. This provides a way for a recipient to track the presentations intended for them, while also hindering them from tracking the Prover's interactions with other Verifiers.
 Methods for Remotely Measuring IP Spoofing Capability
 
 draft-wang-savnet-remote-measurement-ip-spoofing-00.txt
 Date: 18/03/2024
 Authors: Shuai Wang, Dan Li, Ruifeng Li, Qian Cao
 Working Group: Individual Submissions (none)
This document summarizes and standardizes methods for remotely measuring a network's IP spoofing capability. For outbound spoofing capability measurement, i.e., whether the network allows IP spoofing traffic to be sent from inside the network to the outside of the network, DNS traceroute can be used to check whether spoofed packets are generated in the network and sent to outside of the network. For inbound spoofing capability measurment, i.e., whether the network allows IP spoofing traffic from the outside the network to arrive inside, DNS resolver and ICMPv6 rate limiting mechanism can be utilized to check whether spoofed packets are received by devices in the network.
 DNS Extensions for Proxying IP in HTTP
 
 draft-schinazi-masque-connect-ip-dns-00.txt
 Date: 18/03/2024
 Authors: David Schinazi
 Working Group: Individual Submissions (none)
Proxying IP in HTTP allows building a VPN through HTTP load balancers. However, at the time of writing, that mechanism doesn't offer a mechanism for communicating DNS information inline. In contrast, most existing VPN protocols provide a mechanism to exchange DNS configuration information. This document describes an extension that exchanges this information using HTTP capsules.
 Add CB_LAYOUTRECLL_DEVICE to NFSv4.2
 
 draft-haynes-nfsv4-recalldevice-00.txt
 Date: 18/03/2024
 Authors: Thomas Haynes
 Working Group: Individual Submissions (none)
The Parallel Network File System (pNFS) allows for the metadata server to use CB_LAYOUTRECALL to recall a layout from a client by file id or file system id or all. It also allows the server to use CB_NOTIFY_DEVICEID to delete a devicid. It does not provide a mechanism for the metadata server to recall all layouts that have a data file on a specific deviceid. This document presents an extension to RFC8881 to allow the server recall layouts from clients based on deviceid.
 A Simplified Flooding Phase Scheme Based on OSPF Routing Protocol
 
 draft-wu-lsr-simplified-00.txt
 Date: 19/03/2024
 Authors: Mingzhen Wu, Ying Zhou, Liang Wang, Yuyin Ma
 Working Group: Individual Submissions (none)
This distributed routing protocol aims to facilitate information exchange and path calculation between routers to ensure efficient data transmission in the network. Each router initializes adjacency matrices, neighbor tables, routing tables, and flood flags during setup. In operation, routers periodically broadcast Hello packets to update neighbor tables and detect changes in neighbor relationships, broadcasting update packets accordingly. Nodes receiving update packets process them based on flood flags, optimizing network performance through scheduled flood flag resets, controlling link occupancy rates, and utilizing Dijkstra's algorithm to compute shortest paths when adjacency matrices are complete, storing results in routing tables for optimal path selection.
 Dataplane Operations for VLAN Switching
 
 draft-wang-vlan-based-traffic-forwarding-01.txt
 Date: 19/03/2024
 Authors: Yue Wang, Aijun Wang, Boris Khasanov, Fengwei Qin, Huaimo Chen, Chun Zhu
 Working Group: Individual Submissions (none)
This document describes the data plane operations around VLAN switching using VLAN tag rewriting. It further describes the forwarding tables for VLAN that are utilised to achieve VLAN forwarding.
 MLS Subgroups
 
 draft-mcmillion-mls-subgroups-00.txt
 Date: 19/03/2024
 Authors: Brendan McMillion
 Working Group: Individual Submissions (none)
This document describes how the user of an MLS-based messaging service can synchronize the operation of its devices, such that they behave as a single virtual MLS client. This prevents other users of the messaging service from being able to tell when a user changes its set of authorized devices, or which device the user sent a message from.
 Stub Router Flag in ICMPv6 Router Advertisement Messages
 
 draft-hui-6man-stub-router-ra-flag-00.txt
 Date: 19/03/2024
 Authors: Jonathan Hui
 Working Group: Individual Submissions (none)
This document defines a new flag, the Stub Router flag, in the Router Advertisement message that can be used to distinguish configuration information sent by stub routers from information sent by infrastructure routers. This flag is used only by stub routers and is ignored by all other devices.
 Securing hybrid network - criteria
 
 draft-oiwa-secure-hybrid-network-00.txt
 Date: 19/03/2024
 Authors: Yutaka OIWA
 Working Group: Individual Submissions (none)
This document analyzes current issues for ensuring and monitoring the security status of the network used under complex network environment such as hybrid cloud or mixed cloud settings.
 Packet Content Filter for BGP FlowSpec
 
 draft-cui-idr-content-filter-flowspec-01.txt
 Date: 08/05/2024
 Authors: Yong Cui, Yujia Gao
 Working Group: Individual Submissions (none)
The BGP Flow Specification enables the distribution of traffic filter policies (traffic filters and actions) via BGP, facilitating DDoS traffic filtering. However, the traffic filterer in FSv1 and FSv2 predominantly focuses on IP header fields, which may not adequately address new types of DDoS attack traffic characterized by constant patterns within the packet content. This document introduces a new flow specification filter type designed for packet content filtering. The match field includes otype, offset value, content-length, and content, encoded in the Flowspec NLRI. This new filter aims to augment DDoS defense capabilities.
 IoT Operational Issues
 
 draft-walther-iotops-iot-ops-00.txt
 Date: 19/03/2024
 Authors: Karsten Walther, Carsten Bormann
 Working Group: Individual Submissions (none)
This I-D is based on a presentation at IETF 119 in the IOTOPS WG.
 Common Option Format for Host-Network Signaling
 
 draft-herbert-hnsigopt-00.txt
 Date: 20/03/2024
 Authors: Tom Herbert
 Working Group: Individual Submissions (none)
This specification describes an option format for Hop-by-Hop and Destination Options for host-net signaling (host to network and network to host signaling). The format supports a uniform mechanism for sending signals and reflecting received signals back to an originating sender. While this document describes a format for IPv6 Hop-by-Hop options or Destination options, the base format for carrying signals is generic and could be the payload of other options mechanisms such as UDP Options or Geneve options.
 Ways to convey the Ratchet Tree in Messaging Layer Security
 
 draft-mahy-mls-ratchet-tree-options-00.txt
 Date: 20/03/2024
 Authors: Rohan Mahy
 Working Group: Individual Submissions (none)
The Messaging Layer Security (MLS) protocol needs to share its ratchet_tree object to welcome new clients into a group and in external joins. While, the protocol only defines a mechanism for sharing the entire tree, most implementations use various optimizations to avoid sending this structure repeatedly in large groups. This draft explores ways to convey these improvements in a standardized way and to convey parts of a GroupInfo object that are not visible to an intermediary server.
 Common BMP Route-Monitoring Messages for Routes Unchanged by Policy
 
 draft-patki-grow-bmp-common-updates-00.txt
 Date: 21/03/2024
 Authors: Dhananjay Patki, Prasad Narasimha
 Working Group: Individual Submissions (none)
[RFC7854] and [RFC8671] define Pre-Policy Adj-RIB-In, Post-Policy Adj-RIB-In, Pre-Policy Adj-RIB-Out and Post-Policy Adj-RIB-Out Route- Monitoring messages. A route unmodified by the inbound policy is included both in Pre-Policy Adj-RIB-In as well as Post-Policy Adj- RIB-In Route-Monitoring messages when both the Pre-Policy and Post- Policy Route-Monitoring modes are enabled. Similarly, a route unmodified by the outbound policy is included in Pre-Policy Adj-RIB- Out as well as Post-Policy Adj-RIB-Out Route-Monitoring messages. To avoid duplicate inclusion of routes unmodified by policy either in Adj-RIB-In or Adj-RIB-Out this document defines two methods.
 High Assurance DIDs with DNS
 
 draft-carter-high-assurance-dids-with-dns-03.txt
 Date: 09/04/2024
 Authors: Jesse Carter, Jacques Latour, Mathieu Glaude, Tim Bouma
 Working Group: Individual Submissions (none)
This document outlines a method for improving the authenticity, discoverability, and portability of Decentralized Identifiers (DIDs) by utilizing the current DNS infrastructure and its technologies. This method offers a straightforward procedure for a verifier to cryptographically cross-validate a DID using data stored in the DNS, separate from the DID document.
 ICMP Extensions for IP/ICMP translators (XLATs)
 
 draft-equinox-intarea-icmpext-xlat-source-00.txt
 Date: 21/03/2024
 Authors: David Lamparter, Jen Linkova
 Working Group: Individual Submissions (none)
This document suggests the creation of an ICMP Multi-part Extension to carry the original IPv6 source address of ICMPv6 messages translated to ICMP by stateless (RFC6145) or stateful (RFC 6146) protocol translators.
 Selective Disclosure CWTs (SD-CWT)
 
 draft-prorock-spice-cose-sd-cwt-00.txt
 Date: 21/03/2024
 Authors: Michael Prorock, Orie Steele
 Working Group: Individual Submissions (none)
This document describes how to perform selective disclosure of claims withing a CBOR Web Token (CWT) [RFC8392] as well as how to create and verify those tokens. This document does not define any new cryptography.
 Multiple Hop Unaffiliate BFD
 
 draft-jiang-bfd-multi-hop-unaffiliate-00.txt
 Date: 22/03/2024
 Authors: Jiang Wenying, Changwang Lin, Xiao Min
 Working Group: Individual Submissions (none)
The Bidirectional Forwarding Detection (BFD) is a fault detection protocol designed to rapidly identify communication failure between two forwarding engines. This document suggests utilizing BFD Echo when the local system supports BFD, but the neighboring system does not. BFD Control packets and their processing procedures can be executed over the BFD Echo port, where the neighboring system solely loops packets back to the local system. This document serves as an update to RFC 5880 and draft-ietf-bfd- unaffiliate-echo-10.
 GMA Traffic Splitting Control
 
 draft-zhu-gma-tsc-00.txt
 Date: 25/03/2024
 Authors: Jing Zhu, Menglei Zhang
 Working Group: Individual Submissions (none)
This document specifies the GMA (Generic Multi-Access) traffic splitting control algorithm. The receiving endpoint measures one- way-delay, round-trip time, and delivery rate for multiple connections and determines how a data flow is split across them. When update is needed, it will send out a control message, aka Traffic Splitting Update (TSU), to notify the transmitting endpoint of the new traffic splitting configuration. Relative to other sender-based multi-path transport protocols, e.g. MPTCP, MPQUIC, the GMA traffic splitting algorithm is receiver-based and does not require per-packet feedback, e.g. Ack. It is designed specifically to support the Generic Multi-Access (GMA) convergence protocol as introduced in [MAMS] [GMA]. The solution has been developed by the authors based on their experiences in multiple standards bodies including IETF and 3GPP, is not an Internet Standard and does not represent the consensus opinion of the IETF.
 SID Extension to efficiently manipulate YANG Data Models
 
 draft-toutain-t2t-sid-extension-00.txt
 Date: 26/03/2024
 Authors: Laurent Toutain, Manoj Gudi, Javier FERNANDEZ
 Working Group: Individual Submissions (none)
As the Internet of Things (IoT) systems are becoming more pervasive with their rapid adoption, they are also becoming more complex in their architecture. Hence, a tool is required to generate prototype code based on the YANG models for constrained devices [RFC7228] to improve interoperability and increase the reusability of software components. A novel approach is introduced in this document to generate software prototypes (also called stubs) in the C language for the CORECONF protocol [I-D.ietf-core-comi] using YANG Schema Item iDentifiers (YANG SID [I-D.ietf-core-sid]). These stubs greatly reduce the complexity of navigating the CORECONF structure by abstracting the corresponding YANG SIDs. This document elaborates on the procedure to generate YANG SIDs for a given YANG model of a system, which then generates C stubs using the tools developed by the authors with the help of an example (sensor.yang file).
 Aggregate Reports for DKIM Signers
 
 draft-brotman-dkim-aggregate-reporting-00.txt
 Date: 26/03/2024
 Authors: Alex Brotman
 Working Group: Individual Submissions (none)
This document introduces a mechanism enabling DKIM-signing domain owners to solicit comprehensive aggregate reports from email receivers. Presented in an XML format, these reports possess adaptable elements conducive for integration with current and future drafts and standards like DMARCbis. They capture the evaluation outcomes of DKIM signatures, such as 'pass' or 'fail', alongside other potential data attributes. Receivers can relay these aggregate reports to destinations designated by the DKIM-signing domain holder, contingent upon their support capabilities.
 Discovery of Network Rate-Limit Policies (NRLPs)
 
 draft-brw-sconepro-rate-policy-discovery-01.txt
 Date: 07/04/2024
 Authors: Mohamed Boucadair, Dan Wing, Tirumaleswar Reddy.K, Sridharan Rajagopalan, Gyan Mishra
 Working Group: Individual Submissions (none)
Traffic exchanged over a network attachment may be subject to rate- limit policies. These policies may be intentional policies (e.g., enforced as part of the activation of the network attachment and typically agreed upon service subscription) or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation). Networks already support mechanisms to advertize a set of network properties to hosts using Neighbor Discovery options. Examples of such properties are link MTU (RFC 4861) and PREFIX64 (RFC 8781). This document complements these tools and specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate these policies to hosts. For address family parity, a new DHCP option is also defined.
 Digital Emblems Indicating Protections Under International Law
 
 draft-haberman-digital-emblem-00.txt
 Date: 29/03/2024
 Authors: Brian Haberman, Allison Mankin, Bill Woodcock, Casey Deccio, Antonio DeSimone
 Working Group: Individual Submissions (none)
International law defines a number of emblems, such as the blue helmets of United Nations peacekeeping forces, the blue and white shield of UNESCO, and the Red Cross of the International Committee of the Red Cross, as indicative of special protections under the Geneva Conventions. Similar protections attach to journalists who wear "Press" protective emblems on the battlefield, under Article 79 of Protocol I of the Geneva Conventions and Resolution 2222 of the United Nations Security Council. The emblems of national governments and inter-governmental organizations protect diplomatic pouches, couriers, and envoys under the Vienna Convention on Diplomatic Relations. Other marks enjoy protections against mis-use under the Paris Convention, the Madrid Protocol, and the Trade-Related Aspects of Intellectual Property Rights. Such physical emblems have a number of weaknesses (e.g., no real-time evaluation of their authenticity) and do not translate to the digital realm. This document describes a digital emblem which addresses the shortcomings of the physical emblems and makes possible the indication of protections of digital assets under international law.
 DataRight+: Energy Resource Set
 
 draft-authors-datarightplus-resource-set-energy-00.txt
 Date: 01/04/2024
 Authors: Stuart Low
 Working Group: Individual Submissions (none)
This is the resource set profile outlining the energy sector related endpoints. In addition to outlining Initiator and Provider provisions it also specifies requirements for the Energy Authority (electricity assets and usage) and Energy Plan Website (retail electricity plan information). Notational Conventions The keywords "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
 DataRight+: Common Resource Set
 
 draft-authors-datarightplus-resource-set-common-00.txt
 Date: 01/04/2024
 Authors: Stuart Low
 Working Group: Individual Submissions (none)
This is the resource set profile outlining the common endpoints utilised across multiple industries. Notational Conventions The keywords "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
 DataRight+: Banking Resource Set
 
 draft-authors-datarightplus-resource-set-banking-00.txt
 Date: 01/04/2024
 Authors: Stuart Low
 Working Group: Individual Submissions (none)
This is the resource set profile outlining the banking sector related endpoints. Notational Conventions The keywords "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
 DataRight+ Security Profile: Baseline
 
 draft-authors-datarightplus-infosec-baseline-00.txt
 Date: 01/04/2024
 Authors: Stuart Low, Ben Kolera
 Working Group: Individual Submissions (none)
The DataRight+ Security Profile: Baseline is intended to be a compatible profile of the [CDS] presented as a profile of [FAPI-1.0-Advanced]. This profile focuses primarily on the obligations between Provider and Initiator with respect to authorisation requests and does so as an overlay on the underlying FAPI profile combined with the inclusion of specified authorisation types. This profile does not attempt to provide elaboration on registration protocols, certificate profiles, federation or other components specified within the [CDS]. Further terminology used is deliberately jurisdiction agnostic, please refer to [DATARIGHTPLUS-ROSETTA] for specific ecosystem mappings.
 DataRight+: Sharing Arrangement V1
 
 draft-authors-datarightplus-sharing-arrangement-v1-00.txt
 Date: 01/04/2024
 Authors: Stuart Low, Ben Kolera
 Working Group: Individual Submissions (none)
This specification outlines the technical requirements related to the delivery of Sharing Arrangement V1. Notational Conventions The keywords "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
 Closing the RTP Payload Format Media Types IANA Registry
 
 draft-westerlund-avtcore-rtp-payload-registry-00.txt
 Date: 02/04/2024
 Authors: Magnus Westerlund
 Working Group: Individual Submissions (none)
It has been observed that specifications of new RTP payload formats often forget to register themselves in the IANA regsitry "RTP Payload Formats Media Types". In practice this has no real impact. One reason is that the Media Types registry is the crucial regsistry to register any Media Type to establish the media type used to identified the format in various signalling usage. To resolve this sitaution this document performs the following. First it updates the registry to include known RTP payload formats at the time of writing. Then it closes the IANA Registry for RTP Payload formats Media Types for future registration. Beyond instructing IANA to close this registry the instructions to authors in RFC 8088 are updated that registration is no longer required in the closed registry.
 Proposal for the Introduction of Email Headers for Phishing Detection Training
 
 draft-vgpastor-email-phishing-training-00.txt
 Date: 02/04/2024
 Authors: Victor Garcia
 Working Group: Individual Submissions (none)
This document proposes the addition of new email headers designed specifically to identify emails that are sent as part of phishing detection training programs. These headers would allow recipients to verify the authenticity of training emails using DNS queries to confirm that the sending domains are authorized to send these types of emails.
 DataRight+: Admission Control Baseline
 
 draft-authors-datarightplus-admission-control-00.txt
 Date: 02/04/2024
 Authors: Stuart Low, Ben Kolera
 Working Group: Individual Submissions (none)
The establishment of a shared model of trust is critical to any functioning technology ecosystem, particularly when it relates to the sharing of data and the execution of Consumer specific actions. Traditional models of trust have typically revolved around implicit trust established through bi-lateral arrangements (i.e. legal contracts) between participants. The issue with this approach is that, at scale, it is not possible for all participants to efficiently establish communication with all other participants. This leads to the requirement for a mechanism to establish trust across participants in a way that the business layer of an organisation has confidence in ensuring participant interaction is validated.
 DataRight+: Australian CDR Profile
 
 draft-authors-datarightplus-cdr-profile-00.txt
 Date: 02/04/2024
 Authors: Stuart Low
 Working Group: Individual Submissions (none)
This is the ecosystem profile for the Australian CDR describing the composite components to form the technical infrastructure operating to form the Australian Consumer Data Right. This specification is intended to result in a [CDS] compatible implementation. Notational Conventions The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
 YANG Model for the NETCONF default attribute
 
 draft-andersson-netconf-defaults-yang-00.txt
 Date: 02/04/2024
 Authors: Per Andersson
 Working Group: Individual Submissions (none)
This document defines a YANG module with the "default" attribute using the namespace and prefix defined in [RFC6243]. This enables usage of the "default" attribute in e.g. YANG JSON encoding.
 Allowing Experimental Error Codes in the Path Computation Element Protocol
 
 draft-farrel-pce-experimental-errors-01.txt
 Date: 14/04/2024
 Authors: Adrian Farrel, Haomian Zheng
 Working Group: Individual Submissions (none)
Experimental RFCs are often considered beneficial approaches to developing new protocol features. To that end, sub-ranges of code point registries are often designated as for experimental use. IANA assigns values to the Path Computation Element Communication Protocol (PCEP) parameters (messages, objects, TLVs). According to RFC 5440 as updated by RFC 8356, the allocation policies for the registries for PCEP messages, objects, and TLV types are IETF Review with some sub-ranges of these registries being assigned for Experimental Use. However, the registry of PCEP Error-Types and Error-values has only the IETF Review assignment policy meaning that experimentation is somewhat limited. This document updates RFC 5440 by designating a range of PCEP Error- Types for Experimental Use.
 Registry policies "... with Expert Review"
 
 draft-bormann-gendispatch-with-expert-review-00.txt
 Date: 04/04/2024
 Authors: Carsten Bormann, Marco Tiloca
 Working Group: Individual Submissions (none)
This document updates RFC 8126, adding registry policies that augment an existing policy that is based on a review body action with the additional requirement for a Designated Expert review. It also updates RFC 7120 with the necessary process to perform early allocations for registries with one of the augmented policies.
 Updates to RFC Publication Formats
 
 draft-hoffman-pub-format-updates-01.txt
 Date: 11/04/2024
 Authors: Paul Hoffman
 Working Group: Individual Submissions (none)
draft-rswg-rfc7990-updates, the successor to RFC 7990, defines the definitive version of an RFC as a published RFC with is in RFCXML. It defines publication versions of the RFC as published RFCs in the publication formats such as PDF, plain text, and HTML. draft-rswg- xml2rfcv3-implemented is updating the specification for the RFCXML format. This document updates some of the publication formats, specifically updating RFC 7992, RFC 7994, RFC 7995, and RFC 8153. Because RFC 7990 mentions some of the features of the publication formats, this document also updates RFC 7990. There is a repository for this draft at https://github.com/paulehoffman/pub-format-updates (https://github.com/paulehoffman/pub-format-updates).
 MIMI Metadata Minimalization (MIMIMI)
 
 draft-kohbrok-mimi-metadata-minimalization-00.txt
 Date: 05/04/2024
 Authors: Konrad Kohbrok, Raphael Robert
 Working Group: Individual Submissions (none)
This document describes a proposal to run the MIMI protocol in a way that reduces the ability of the Hub and service providers to associate messaging activity of clients with their respective identities. For now, this document only contains a high-level description of the mechanisms involved.
 Transmission of IP Packets over Overlay Multilink Network (OMNI) Interfaces
 
 draft-templin-6man-omni3-03.txt
 Date: 15/04/2024
 Authors: Fred Templin
 Working Group: Individual Submissions (none)
Air/land/sea/space mobile nodes (e.g., aircraft of various configurations, terrestrial vehicles, seagoing vessels, space systems, enterprise wireless devices, pedestrians with cell phones, etc.) communicate with networked correspondents over wireless and/or wired-line data links and configure mobile routers to connect end user networks. This document presents a multilink virtual interface specification that enables mobile nodes to coordinate with a network- based mobility service, fixed node correspondents and/or other mobile node peers. The virtual interface provides an adaptation layer service suited for both mobile and more static environments such as enterprise and home networks. Both Provider-Aggregated (PA) and Provider-Independent (PI) addressing services are supported. This document specifies the transmission of IP packets over Overlay Multilink Network (OMNI) Interfaces.
 Automatic Extended Route Optimization (AERO)
 
 draft-templin-6man-aero3-03.txt
 Date: 16/04/2024
 Authors: Fred Templin
 Working Group: Individual Submissions (none)
This document specifies an Automatic Extended Route Optimization (AERO) service for IP internetworking over Overlay Multilink Network (OMNI) interfaces. AERO/OMNI uses IPv6 Neighbor Discovery (IPv6 ND) for control plane messaging over the OMNI virtual link. Router discovery and neighbor coordination are employed for network admission and to manage the OMNI link forwarding and routing systems. Secure multilink path selection, multinet traversal, mobility management, multicast forwarding, multihop operation and route optimization are naturally supported through dynamic neighbor cache updates on a per flow basis. Both Provider-Aggregated (PA) and Provider-Independent (PI) addressing services are supported. AERO is a widely-applicable service especially well-suited for air/land/sea/ space mobility applications including aviation, intelligent transportation systems, mobile end user devices, space exploration and many others.
 Update to Private Header Field P-Visited-Network-ID in Session Initiation Protocol (SIP) Requests and Responses
 
 draft-sipcore-rfc7976bis-01.txt
 Date: 09/04/2024
 Authors: Christer Holmberg, Nevenka Biondic, Gonzalo Salgueiro, Roland Jesske
 Working Group: Individual Submissions (none)
The Third Generation Partnership Project (3GPP) has identified cases where different SIP private header extensions referred to as "P-" header fields, and defined in RFC 7315, need to be included in SIP requests and responses currently not allowed according to RFC 7315. This document updates RFC 7315, in order to allow inclusion of the affected "P-" header fields in such requests and responses. This document also makes updates for RFC 7315 in order to fix misalignments that occurred when RFC 3455 was updated and obsoleted by RFC 7315.
 Proof of Issuer Key Authority (PIKA)
 
 draft-barnes-oauth-pika-00.txt
 Date: 09/04/2024
 Authors: Richard Barnes, Sharon Goldberg
 Working Group: Individual Submissions (none)
A relying party verifying a JSON Web Token (JWT) needs to verify that the public key used to verify the signature legitimately represents the issuer represented in the "iss" claim of the JWT. Today, relying parties commonly use the "iss" claim to fetch a set of authorized signing keys over HTTPS, relying on the security of HTTPS to establish the authority of the downloaded keys for that issuer. The ephemerality of this proof of authority makes it unsuitable for use cases where a JWT might need to be verified for some time. In this document, we define a format for Proofs of Issuer Key Authority, which establish the authority of a key using a signed object instead of an HTTPS connection.
 SRv6 Resource Programming with NRP flavor
 
 draft-gong-spring-srv6-nrp-flavor-00.txt
 Date: 09/04/2024
 Authors: Liyan Gong, Changwang Lin
 Working Group: Individual Submissions (none)
This document introduces a new flavor type for SRv6 called "Flavor NRP". It associates the SRv6 End.X SID with a set of network resource partitions (referred to as NRP resources). By using the End.X SID with the NRP flavor type, SRv6 policies can provide programmability for network resources.
 Methods for Remotely Measuring IP Spoofing Capability
 
 draft-wang-bmwg-measure-meth-ip-spoofing-00.txt
 Date: 10/04/2024
 Authors: Shuai Wang, Dan Li, Ruifeng Li, Qian Cao
 Working Group: Individual Submissions (none)
This document summarizes and standardizes methods for remotely measuring a network's IP spoofing capability. For outbound spoofing capability measurement, i.e., whether the network allows IP spoofing traffic to be sent from inside the network to the outside of the network, DNS traceroute can be used to check whether spoofed packets are generated in the network and sent to outside of the network. For inbound spoofing capability measurment, i.e., whether the network allows IP spoofing traffic from the outside the network to arrive inside, DNS resolver and ICMPv6 rate limiting mechanism can be utilized to check whether spoofed packets are received by devices in the network.
 The Network Geographic identification in Computing-Aware Traffic Steering
 
 draft-ma-cats-ngid-01.txt
 Date: 14/04/2024
 Authors: Yuyin Ma, Tianhao Peng, Guoqing Dong, Qixuan Zhang, Xiaoshuang Lv, Guangjing He, Yiyun Zhang, Yuanming Sun, Qihao Si, Haocheng Lang, Xiuling Wang
 Working Group: Individual Submissions (none)
This document proposes a novel network address encoding scheme, called Network Geoidentifier (NGID), which aims to improve the efficiency and accuracy of network device management by directly embedding geolocation information (latitude and longitude) into IPv6 and IPv4 addresses. This approach provides a native support for the geolocation of network devices and is expected to have a significant impact on the future of network management and service positioning.
 Application-Responsive Network Framework
 
 draft-yang-rtgwg-arn-framework-01.txt
 Date: 10/05/2024
 Authors: Feng Yang, Changwang Lin
 Working Group: Individual Submissions (none)
With the deployment of increasingly advanced technologies on a large scale, such as SRv6 and network slicing, there is a growing need to expose these new capabilities to applications. The current practice involves using ACLs to classify packets and then map the traffic onto appropriate network resources. This approach results in the application being passively perceived by the network, rather than the application actively interfacing with the network. Furthermore, changes in application characteristics necessitate triggering network configuration adjustments, making it challenging to deploy at scale. The document proposes a new framework called Application Responsive Network (ARN), by encapsulating more network functions into ARN ID, thus it opens up interfaces to applications. The vision is to enable applications to access network resources like they access an operating system.
 RDAP Extension for DNS DELEG
 
 draft-albanna-regext-rdap-deleg-00.txt
 Date: 11/04/2024
 Authors: Zaid AlBanna, Scott Hollenbeck
 Working Group: Individual Submissions (none)
This document describes an extension of the Registration Data Access Protocol (RDAP) that includes DNS DELEG values in responses to RDAP domain object queries.
 Same-Origin Policy for the RPKI Repository Delta Protocol (RRDP)
 
 draft-spaghetti-sidrops-rrdp-same-origin-00.txt
 Date: 11/04/2024
 Authors: Job Snijders
 Working Group: Individual Submissions (none)
This document describes a Same-origin policy (SOP) requirement for RPKI Repository Delta Protocol (RRDP) servers and clients. The same- origin policy concept is a security mechanism to restrict how a document loaded from one origin can cause interaction with resources from another origin. Application of a same-origin policy in RRDP client/server communication isolates resources such as Delta and Snapshot files from different Repository Servers, reducing possible attack vectors. This document updates RFC 8182.
 Forward Error Correction (FEC) for SCHC framework
 
 draft-papadopoulos-schc-fec-00.txt
 Date: 15/04/2024
 Authors: Georgios Papadopoulos, Amaury Bruniaux
 Working Group: Individual Submissions (none)
This document describes a Forward Error Correction (FEC) method that is applied over the SCHC framework to improve the network performance under certain range of loss/error rates.
 A File Format to Aid in Consumer Privacy Enforcement,Research,and Tools
 
 draft-colwell-privacy-txt-00.txt
 Date: 15/04/2024
 Authors: Nick Sullivan, Louise Van der Peet, Georgios Smaragdakis, Brien Colwell
 Working Group: Individual Submissions (none)
This proposal outlines a new file format called privacy.txt. It follows similar placement on a web server as robots.txt // https://datatracker.ietf.org/doc/html/rfc9309, security.txt // https://datatracker.ietf.org/doc/html/rfc9116, or ads.txt // https://iabtechlab.com/ads-txt/, in the / directory or /.well- known directory. The file format adds structured data for three areas: 1. A machine parsable and complete privacy policy 2. Consumer actions under their privacy rights 3. Cookie disclosures
 Double Nonce Derive Key AES-GCM (DNDK-GCM)
 
 draft-gueron-cfrg-dndkgcm-00.txt
 Date: 15/04/2024
 Authors: Shay Gueron
 Working Group: Individual Submissions (none)
This document specifies an authenticated encryption algorithm called Double Nonce Derive Key AES-GCM (DNDK-GCM) that operates with a 32- byte root key and encrypts with a 24-byte random nonce, and optionally provides for key commitment. Encryption takes the root key and a random nonce, derives a fresh encryption key and a key commitment value, invokes AES-GCM with the derived key and a 12-byte zero nonce, and outputs the ciphertext, authentication tag and the key commitment value. The low collision probability with 24-byte random nonces extends the lifetime of the root key and this supports processing up to 2^64 bytes under one root key. DNDK-GCM involves a small overhead compared to using AES-GCM directly, and its security relies only on the standard assumption on AES as a pseudorandom permutation.
 Securing service-to-service traffic by WIMSE Token
 
 draft-liu-wimse-secure-service-to-service-traffic-00.txt
 Date: 16/04/2024
 Authors: Dapeng Liu, Xining Wang, Li Yi
 Working Group: Individual Submissions (none)
This document specifies the system architecture, related processes, token structures, etc., for secure protection of Service-to-Service traffic using WIMSE tokens.
 BGP Flow Specification Version 2 - for Basic IP
 
 draft-hares-idr-fsv2-ip-basic-02.txt
 Date: 12/05/2024
 Authors: Susan Hares, Donald Eastlake, Chaitanya Yadlapalli, Sven Maduschke
 Working Group: Individual Submissions (none)
BGP flow specification version 1 (FSv1), defined in RFC 8955, RFC 8956, and RFC 9117 describes the distribution of traffic filter policy (traffic filters and actions) distributed via BGP. During the deployment of BGP FSv1 a number of issues were detected, so version 2 of the BGP flow specification (FSv2) protocol addresses these features. In order to provide a clear demarcation between FSv1 and FSv2, a different NLRI encapsulates FSv2. The IDR WG requires two implementation Implementers feedback on FSv2 was that FSv2 has a correct design, but that breaking FSv2 into a progression of documents would aid deployment of the draft. The IDR WG requires two implementation so This document is the first of the series of documents indicating the basic FSv2 with user ordering of filters added to FSv1 IP Filters and IP actions.
 A Method for Exploring Latency Correlation in Multipath Networks
 
 draft-zhou-pce-latency-00.txt
 Date: 17/04/2024
 Authors: Ying Zhou, Mingzhen Wu
 Working Group: Individual Submissions (none)
The exploration of latency correlation patterns is of great significance for characterizing network states. However, existing measurement approaches have to confront multiple challenges in detecting latency correlation factors, such as probing speed, routing hops and geographical locations. In this paper, we conduct three tasks to handle these issues. The first is to construct relative latency measurement strategies for individual machines without any time synchronization and control plane requirements. The probing speed has been increased by 14.3% in the same hardware conditions. In 4G/5G heterogeneous edges enabled by different mobile operators, worldwide 5003 target servers are selected to acquire more than 1TB network datasets. The second is to reveal the potential modes between latency and routing hops. Surprisingly, 91.2% available targets present non-positive characteristics in extreme cases. The third is to analyze the fine-grained relationship between latency and geographical locations. We found that the significance of mean backward receiving delay is higher than other parameters, with a maximum of 33%. Finally, we also made optimizations regarding latency compression and time accuracy in multipath networks. The experimental data have been released to an open-source community for further investigations.
 Security Considerations for Computing-Aware Traffic Steering
 
 draft-wang-cats-security-considerations-00.txt
 Date: 18/04/2024
 Authors: Cuicui Wang, Yu Fu
 Working Group: Individual Submissions (none)
Computing-Aware Traffic Steering (CATS) inherits potential security vulnerabilities from the network, computing node as well as workflows of CATS procedures. This document describes various threats and security concerns related to CATS networks and existing approaches to solve these threats.
 Representing metadata annotations in YANG-CBOR
 
 draft-bormann-cbor-yang-metadata-00.txt
 Date: 18/04/2024
 Authors: Carsten Bormann
 Working Group: Individual Submissions (none)
This specification defines the representation of metadata annotations (RFC 7952) in YANG-CBOR (RFC 9254).
 Revision to Registration Procedures for IS-IS Neighbor Link-Attribute Bit Values
 
 draft-li-lsr-labv-registration-01.txt
 Date: 23/04/2024
 Authors: Tony Li
 Working Group: Individual Submissions (none)
RFC 5029, "Definition of an IS-IS Link Attribute Sub-TLV", defines a registry for "IS-IS Neighbor Link-Attribute Bit Values". This document changes the registration procedure for that registry from "Standards Action" to "Expert Review".
 Post-quantum Hybrid Key Exchange in the IKEv2 with ECDH,ML-KEM,and FrodoKEM
 
 draft-wang-hybrid-kem-ikev2-frodo-01.txt
 Date: 08/05/2024
 Authors: Guilin WANG
 Working Group: Individual Submissions (none)
RFC 9370 specifies a framework that supports mulitple key encapsulation mechanisms (KEMs) in the Internet Key Exchange Protocol Version 2 (IKEv2) by allowing up to 7 layers of additiona KEMs employed with the oringal ECDH to derive the final shared secret keys for IPsec protocols. The primitive goal is to mitigate the security threat against quantum computers by hybriding additional post-quantum (PQ) KEMs with the orinigal ECDH key exchange. This draft describes concretely how two specific QP KEMs, namely, ML-KEM and FrodoKEM, can be instantiated in the IKEv2 as the additional KEMs with the main ECDH to achieve hybrid key agreement. [EDNOTE: IANA KE code points for FrodoKEM may need to be assigned, when considering the code points for ML-KEM has been considered in [I-D.D24]. ]
 IKEv2 negotiation for Bound End-to-End Tunnel (BEET) mode ESP
 
 draft-antony-ipsecme-iekv2-beet-mode-01.txt
 Date: 03/05/2024
 Authors: Antony Antony, Steffen Klassert
 Working Group: Individual Submissions (none)
This document specifies a new Notify Message Type Payload for the Internet Key Exchange Protocol Version 2 (IKEv2), to negotiate IPsec ESP Bound End-to-End Tunnel (BEET) mode. BEET mode combines the benefits of tunnel mode with reduced overhead, making it suitable for applications requiring minimalistic end-to-end tunnels, mobility support, and multi-address multi-homing capabilities. The introduction of the USE_BEET_MODE Notify Message enables the negotiation and establishment of BEET mode security associations.
 Applying Generate Random Extensions And Sustain Extensibility (GREASE) to EDHOC Extensibility
 
 draft-amsuess-lake-edhoc-grease-00.txt
 Date: 23/04/2024
 Authors: Christian Amsuess
 Working Group: Individual Submissions (none)
This document applies the extensibility mechanism GREASE (Generate Random Extensions And Sustain Extensibility), which was pioneered for TLS, to the EDHOC ecosystem. It reserves a set of non-critical EAD labels and unusable cipher suites that may be included in messages to ensure peers correctly handle unknown values.
 Fast Congestion Notification Packet (CNP) in RoCEv2 Networks
 
 draft-xiao-rtgwg-rocev2-fast-cnp-00.txt
 Date: 25/04/2024
 Authors: Xiao Min, lihesong
 Working Group: Individual Submissions (none)
This document describes a Remote Direct Memory Access (RDMA) over Converged Ethernet version 2 (RoCEv2) congestion control mechanism, which is similar to Really Explicit Congestion Notification (RECN) described in RFC 7514, also known as Fast Congestion Notification Packet (CNP). By extending the RoCEv2 CNP, Fast CNP can be sent by the switches directly to the sender, advising the sender to reduce the transmission rate at which it sends the flow of RoCEv2 data traffic.
 An Update on Milestones
 
 draft-schinazi-update-on-milestones-01.txt
 Date: 26/04/2024
 Authors: David Schinazi
 Working Group: Individual Submissions (none)
As mandated in RFC 2418, working group charters currently contain milestones. However, these milestones are often sufficiently out of date that they no longer provide value. This document exists to facilitate a community discussion around the future of milestones. This document could potentially update RFC 2418.
 Unmasked BIER Mode
 
 draft-zzhang-bier-unmasked-bier-00.txt
 Date: 27/04/2024
 Authors: Tony Przygienda, Zhaohui Zhang, Hooman Bigdoli, IJsbrand Wijnands
 Working Group: Individual Submissions (none)
The document introduces a new mode of interpretation of the bitmask field in the BIER encoding, called unmasked BIER, that solves the problem of BIER originator targeting receivers across many different sets and hence, in worst case, degrading into ingress replication.
 Transferring Opportunistic Wireless Encryption to the IEEE 802.11 Working Group
 
 draft-wkumari-rfc8110-to-ieee-00.txt
 Date: 27/04/2024
 Authors: Warren Kumari, Dan Harkins
 Working Group: Individual Submissions (none)
RFC8110 describes Opportunistic Wireless Encryption (OWE), a mode that allows unauthenticated clients to connect to a network using encrypted traffic. This document transfers the ongoing maintenance and further development of the protocol to the IEEE 802.11 Working Group. This documents updates RFC8110 by noting that future work on the protocol described in RFC8110 will occur in the IEEE 802.11 Working Group.
 A Formalization of Symbolic Expressions
 
 draft-petithuguenin-ufmrg-formal-sexpr-01.txt
 Date: 29/04/2024
 Authors: Marc Petit-Huguenin
 Working Group: Individual Submissions (none)
The goal of this document is to show and explain the formal model developed to guarantee that the examples and ABNF in the "SPKI Symbolic Expressions" Internet-Draft are correct.
 Use of UDP Options for Transmission of Large DNS Responses
 
 draft-heard-dnsop-udp-opt-large-dns-responses-00.txt
 Date: 28/04/2024
 Authors: C. Heard
 Working Group: Individual Submissions (none)
This document describes an experimental method for using UDP Options to facilitate the transmission of large DNS responses without the use of IP fragmentation or fallback to TCP.
 Measurement Method for Bandwidth of SRv6 Forwarding Path
 
 draft-liu-spring-srv6-bandwidth-measurement-00.txt
 Date: 29/04/2024
 Authors: Yisong Liu, Changwang Lin, Yuanxiang Qiu
 Working Group: Individual Submissions (none)
This document proposes a method for measuring the actual bandwidth of SRv6 forwarding paths. Carrying the bandwidth information from bottleneck nodes along the packet path in the IPv6 extension header of data packets or active measurement packets, the head node and controller can obtain the actual minimum available bandwidth of the forwarding path in real-time.
 Problem Statement for Digitized Emblems
 
 draft-haberman-digital-emblem-ps-01.txt
 Date: 15/05/2024
 Authors: Brian Haberman, Tommy Jensen, Bill Woodcock
 Working Group: Individual Submissions (none)
International law defines a number of emblems, such as the blue helmets of United Nations peacekeeping forces, the blue and white shield of UNESCO, and the Red Cross of the International Committee of the Red Cross, as indicative of special protections under the Geneva Conventions. Similar protections attach to journalists who wear "Press" protective emblems on the battlefield, under Article 79 of Protocol I of the Geneva Conventions and Resolution 2222 of the United Nations Security Council. The emblems of national governments and inter-governmental organizations protect diplomatic pouches, couriers, and envoys under the Vienna Convention on Diplomatic Relations. Other marks enjoy protections against mis-use under the Paris Convention, the Madrid Protocol, and the Trade-Related Aspects of Intellectual Property Rights. Such physical emblems have a number of weaknesses and do not translate to the digital realm. This document provides a summary of the problems and documents identified requirements from a number of stakeholders for a digital emblem which addresses the shortcomings of the physical emblems and makes possible the indication of protections of digital assets under international law.
 APIs To Expose SCONEPRO Metadata to Applications
 
 draft-eddy-sconepro-api-01.txt
 Date: 03/05/2024
 Authors: Wesley Eddy, Abhishek Tiwari, Alan Frindell
 Working Group: Individual Submissions (none)
This document describes API considerations to provide applications with SCONEPRO metadata, notifying them of network-supplied information about acceptable network flow rates. Since this information is signalled from the network within the stack below the application, it needs to be made accessible to applications in order for them to pick proper video rates, or to otherwise confine the application behavior within network-defined limits.
 Problem Statement for a Digital Emblem
 
 draft-linker-digital-emblem-00.txt
 Date: 02/05/2024
 Authors: Felix Linker, Mauro Vignati
 Working Group: Individual Submissions (none)
In times of armed conflict, the protective emblems of the red cross, red crescent, and red crystal are used to mark _physical_ assets. This enables military units to identify assets as respected and protected under international humanitarian law. This draft explores how one could apply the protective emblems to _digital_, network- connected infrastructure using a _digital emblem_, and defines the requirements of a digital emblem, emphasizing security requirements. Notably, a digital emblem has a unique combination of security requirements, namely, authentication, accountability, and a property that we call _covert inspection_. Covert inspection means that those wishing to authenticate assets as protected must be able to do so without revealing that they may attack unprotected entities.
 The Locator/ID Separation Protocol (LISP) for Multicast Environments
 
 draft-farinacci-lisp-rfc6831bis-01.txt
 Date: 06/05/2024
 Authors: Dino Farinacci, David Meyer, John Zwiebel, Stig Venaas
 Working Group: Individual Submissions (none)
This document describes the design for inter-domain multicast overlays using the Locator/ID Separation Protocol (LISP) architecture and protocols. The document specifies how LISP multicast overlays operate over multicast and unicast underlays. The mechanisms in this specification indicate how a signal-based approach using the PIM protocol can be used to program LISP encapsulators with a replication list in a locator-set, where the replication list can be a mix of multicast and unicast locators.
 Signal-Free Locator/ID Separation Protocol (LISP) Multicast
 
 draft-farinacci-lisp-rfc8378bis-00.txt
 Date: 03/05/2024
 Authors: Victor Moreno, Dino Farinacci
 Working Group: Individual Submissions (none)
This document describes the design for inter-domain multicast overlays using the Locator/ID Separation Protocol (LISP) architecture and protocols. The document specifies how LISP multicast overlays operate over a unicast underlays. When multicast sources and receivers are active at Locator/ID Separation Protocol (LISP) sites, the core network is required to use native multicast so packets can be delivered from sources to group members. When multicast is not available to connect the multicast sites together, a signal-free mechanism can be used to allow traffic to flow between sites. The mechanism within here uses unicast replication and encapsulation over the core network for the data plane and uses the LISP mapping database system so encapsulators at the source LISP multicast site can find decapsulators at the receiver LISP multicast sites.
 BGP Flow Specification Version 2 - More IP Filters
 
 draft-hares-idr-fsv2-more-ip-filters-01.txt
 Date: 12/05/2024
 Authors: Susan Hares
 Working Group: Individual Submissions (none)
The BGP flow specification version 2 (FSv2) for Basic IP defines user ordering of filters along with FSv1 IP Filters and FSv1 actions. This draft suggests additional IP Filters for Flow Specification FSv2.
 Adaptive Forward Erasure Correction for Delay-Sensitive QUIC Connections
 
 draft-dmoskvitin-quic-adaptive-fec-00.txt
 Date: 06/05/2024
 Authors: Dmitriy Moskvitin, Evgeny Onegin, Rachel Huang, Hanlin Luo, Qichang Chen
 Working Group: Individual Submissions (none)
This document proposes a FEC supporting mechanism of QUIC protocol for both short flows and long flows protection in accordance to the sender observed packet loss rate.
 DNS over IPv6 Best Practices
 
 draft-hinden-v6ops-dns-00.txt
 Date: 06/05/2024
 Authors: Robert Hinden, Suresh Krishnan
 Working Group: Individual Submissions (none)
This document describes an approach to how Domain Name Protocol (DNS) should be carried over IPv6. There have been some operational issues identified in carrying DNS packets over IPv6 and this draft proposes solutions to address them. A summary of what is proposed is to limit IPv6 DNS responses over UDP to be 1280 octets and use TCP or QUIC for anything larger.
 Knowledge Graphs for YANG-based Network Management
 
 draft-marcas-nmop-knowledge-graph-yang-01.txt
 Date: 07/05/2024
 Authors: Ignacio Martinez-Casanueva
 Working Group: Individual Submissions (none)
The success of the YANG language and YANG-based protocols for managing the network has unlocked new opportunities in network analytics. However, the wide heterogeneity of YANG models hinders the consumption and analysis of network data. Besides, data encoding formats and transport protocols will differ depending on the network management protocol supported by the network device. These challenges call for new data management paradigms that facilitate the discovery, understanding, integration and access to silos of heterogenous YANG data, abstracting from the complexities of the network devices. This document introduces the knowledge graph paradigm has a solution to this data management problem, with focus on YANG-based network management. The document provides background on related topics such as ontologies and graph standards, and shares guidelines for implementing knowledge graphs from YANG data.
 SATP Asset Profiles for Asset Exchange
 
 draft-avrilionis-satp-asset-profiles-00.txt
 Date: 07/05/2024
 Authors: Denis Avrilionis, Thomas Hardjono
 Working Group: Individual Submissions (none)
A definition of asset schema and profiles is needed to provide a semantic definition of tokenized assets. The Asset schema is an abstract construct at the root hierarchy of more specific "asset profiles". Asset profiles describe the structure (type) of assets that are specific to a given domain or industry. An asset instance that is instantiated in a specific network and is exchanged via the SATP protocol has an instance-class relationship (in an ontological sense) with a given profile. Asset profiles are essential to the SATP protocol as they define the semantics of asset instances to be transferred. Gateways may negotiate asset transfers based on the nature and abilities of the assets as defined according to their profile. The current document discusses the definition of the asset schema and profile.
 IANA Registrations for the BGP Finite State Machine (FSM)
 
 draft-hhp-idr-bgp-fsm-iana-00.txt
 Date: 07/05/2024
 Authors: Jeffrey Haas, Susan Hares, Keyur Patel
 Working Group: Individual Submissions (none)
The Border Gateway Protocol, version 4 (BGP-4) finite state machine (FSM) is defined in RFC 4271. Over the years, various extensions to BGP have been authored that update the protocol's FSM. Some elements of the FSM are enumerated. Those elements are referred to across BGP extensions in their respective state machine changes, and may also be used for management purposes in things such as YANG. To provide consistent naming and enumeration of these FSM elements, this draft requests IANA to create and maintain registries for elements in the BGP FSM.
 iTip using PARTICIPANT only
 
 draft-douglass-itip-participants-00.txt
 Date: 07/05/2024
 Authors: Michael Douglass
 Working Group: Individual Submissions (none)
This specification specifies updates to RFC5546 iTip which allow scheduling using the PARTICIPANT components specified in RFC9073. New properties are also defined for use within the PARTICIPANT component.
 BGP Flow Specification Version 2 - More IP Actions
 
 draft-hares-idr-fsv2-more-ip-actions-00.txt
 Date: 08/05/2024
 Authors: Susan Hares
 Working Group: Individual Submissions (none)
The BGP flow specification version 2 (FSv2) for Basic IP defines user ordering of filters along with FSv1 IP Filters and FSv1 actions. This draft suggests additional IP Filters for Flow Specification FSv2.
 Internationalization for the NFSv4 Protocols
 
 draft-dnoveck-nfsv4-i18n-extrevtry-01.txt
 Date: 19/05/2024
 Authors: David Noveck
 Working Group: Individual Submissions (none)
This document describes the handling of internationalization for NFSv4 as a whole, including NFSv4.0, NFSv4.1, and NFSv4.2. It illustrates one possible approach to contniuation of the development if draft-ietf-nfsv4-internationalization given the external review comments that need to be accommodated.
 SCONEPRO Privacy Properties and Incentives for Abuse
 
 draft-tomar-sconepro-privacy-00.txt
 Date: 10/05/2024
 Authors: Anoop Tomar, Wesley Eddy, Abhishek Tiwari, Matt Joras
 Working Group: Individual Submissions (none)
This document discusses privacy properties of the SCONEPRO metadata or network-to-host signals. This covers questions that were raised during the IETF 119 BoF and subsequent discussions. It is not intended to be published as a separate RFC but might be incorporated as a part of the security considerations or other content within eventual SCONEPRO RFCs together with other documents covering security considerations. Other documents will address additional aspects of the security considerations such as authentication, integrity protection, and encryption of SCONEPRO metadata.
 Directory Delegation clarification for Network File System Version 4,Minor Version 2
 
 draft-rmacklem-nfsv4-directory-delegations-01.txt
 Date: 13/05/2024
 Authors: Rick Macklem
 Working Group: Individual Submissions (none)
This document describes the addition of bit flags to be used in the request by a client for the GET_DIR_DELEGATION operation to allow the client to specify detailed behavior of CB_NOTIFYs the server will perform on the client. Early implementation experience with directory delegations has demonstrated that clients may not need the full information specified in [RFC8881] for CB_NOTIFYs and may not require the recall of the directory delegation to be done synchronously. Limiting the CB_NOTIFY's requirements can simplify server implementation of directory delegations. These additional bit flags allow the client to request desired behavior. The server's reply will then specify what behavior the client can expect.
 OAuth 2.0 Delegated B2B Authorization
 
 draft-janicijevic-oauth-b2b-authorization-00.txt
 Date: 12/05/2024
 Authors: Igor Janicijevic
 Working Group: Individual Submissions (none)
Delegated B2B Authorization enables a third-party OAuth client to obtain a limited access to an HTTP service on behalf of another OAuth client which is acting as a resource owner. This specification extends the OAuth 2.0 Authorization Framework with two new endpoints which allow a resource owner OAuth client to manage access for a third-party OAuth client.
 IP6 ULAs with UUID Interface Identifiers (ULA-UUID)
 
 draft-templin-6man-ula-uuid-01.txt
 Date: 16/05/2024
 Authors: Fred Templin
 Working Group: Individual Submissions (none)
Internet Protocol, version 6 (IPv6) defines a Unique Local IPv6 Unicast Address (ULA) format based on the IANA-assigned prefix fc00::/7. The structure for sub-prefix fd00::/8 is well defined, but the remaining sub-prefix fc00::/8 is reserved for future use. This document proposes a use for sub-prefix fc00::/8 in conjunction with the Universally Unique Interface IDentifier (UUID).
 Implementation of RFC Publication Formats
 
 draft-rossi-rfcpubformats-00.txt
 Date: 14/05/2024
 Authors: Alexis Rossi
 Working Group: Individual Submissions (none)
This document assigns responsibility for the code level implementation decisions for RFC publication formats (currently HTML, PDF, and TXT), the CSS file, and SVG files to the Tools Team and the RPC. It assigns responsibility for defining high level design requirements for the RFC publication formats, CSS, and SVG files to the RSWG. This document updates RFC7992, RFC7993, RFC7994, RFC7995, and RFC7996. This document makes no changes to the RFCXML format described in RFC7991 or subsequent documents.
 Control Character Separated Value Files
 
 draft-rankin-ccsv-00.txt
 Date: 15/05/2024
 Authors: Mike Rankin
 Working Group: Individual Submissions (none)
TODO Abstract About This Document This note is to be removed before publishing as an RFC. The latest revision of this draft can be found at https://oldgrognard.github.io/ccsv-id/draft-rankin-ccsv.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-rankin-ccsv/. Source for this draft and an issue tracker can be found at https://github.com/oldgrognard/ccsv-id.
 Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC
 
 draft-reddy-ipsecme-ikev2-pqc-auth-00.txt
 Date: 15/05/2024
 Authors: Tirumaleswar Reddy.K, Valery Smyslov, Scott Fluhrer
 Working Group: Individual Submissions (none)
Signature-based authentication methods are utilized in IKEv2 [RFC7296]. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures. This document outlines how post-quantum digital signatures, specifically Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol. It introduces ML- DSA and SLH-DSA capability to IKEv2 without necessitating any alterations to existing IKE operations.
 The "doi" URI Scheme
 
 draft-lemieux-doi-uri-scheme-01.txt
 Date: 16/05/2024
 Authors: Pierre-Anthony Lemieux
 Working Group: Individual Submissions (none)
This document specifies the "doi" URI scheme, as specified in [RFC3986], for Digital Object Identifier (DOI) names.
 OAuth Profile for Open Public Clients
 
 draft-jenkins-oauth-public-00.txt
 Date: 16/05/2024
 Authors: Neil Jenkins
 Working Group: Individual Submissions (none)
This document specifies a profile of the OAuth authorization protocol to allow for interoperability between clients and servers using open protocols, such as JMAP, IMAP, SMTP, POP, CalDAV, and CardDAV.
 Problem statements and requirements of Deterministic CATS on the Industrial Internet
 
 draft-ftzhs-cats-industrial-requirement-00.txt
 Date: 16/05/2024
 Authors: Tao Fu, Zhang Hengsheng, Jing Wang
 Working Group: Individual Submissions (none)
The Industrial Internet is a new infrastructure, application mode and industrial ecology with the deep integration among the new information technology, communication technology and the industrial economy.Industrial production tasks are time-sensitive, which put forward high requirements on networks and applications, and need to meet the deterministic requirements in terms of delay, jitter, reliability, etc. Industrial deterministic service refers to a closed loop composed of communication paths and control processes in which two or more applications participate.Industrial management platforms need to unify network forwarding and computing tasks for each deterministic service. This draft illustrates use cases of traffic steering for deterministic service in terms of dynamic computing and networking resource status,together with the requirements and solutions for CATS(Computing-Aware Traffic Steering).
 SCONEPRO Net Neutrality
 
 draft-tan-sconepro-netneutrality-00.txt
 Date: 17/05/2024
 Authors: Bryan Tan
 Working Group: Individual Submissions (none)
This document provides a response to the question of whether SCONEPRO can be used to undermine Net Neutrality provisions for network users. It proposes guardrails to ensure Net Neutrality principles are maintained.
 Clarification of IPv6 Address Assignment Policy
 
 draft-carpenter-6man-addr-assign-00.txt
 Date: 17/05/2024
 Authors: Brian Carpenter, Suresh Krishnan
 Working Group: Individual Submissions (none)
This document clarifies the approval process for changes to the IPv6 Address Space registry. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-carpenter-6man-addr-assign/. Discussion of this document takes place on the 6MAN Working Group mailing list (mailto:ipv6@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/ipv6/. Subscribe at https://www.ietf.org/mailman/listinfo/ipv6/.
 The Distributed Symmetric Key Establishment (DSKE) Protocol
 
 draft-mwag-dske-00.txt
 Date: 17/05/2024
 Authors: Mattia Montagna, Manfred von Willich, Melchior Aelmans, Gert Grammel
 Working Group: Individual Submissions (none)
The Distributed Symmetric Key Establishment (DSKE) protocol introduces an approach to symmetric key distribution that enables robust, scalable, and future-proofed security without reliance on asymmetric encryption. This document delineates the protocol's specifications, security model, and architectural integration. Note This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
 SCONEPRO Video Optimization Requirements
 
 draft-joras-sconepro-video-opt-requirements-00.txt
 Date: 17/05/2024
 Authors: Matt Joras, Anoop Tomar, Abhishek Tiwari, Alan Frindell
 Working Group: Individual Submissions (none)
These are the requirements for the "Video Optimization" use-case for the SCONEPRO topic, which broadly speaking seeks to optimize video playback experience in mobile networks by cooperative communication between video content providers and the providers of network services to end users.