<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rustignoli-panrg-scion-components-03" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="SCION COMP I-D">SCION Components Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-rustignoli-panrg-scion-components-03"/>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>SCION Association</organization>
      <address>
        <email>nic@scion.org</email>
      </address>
    </author>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>SCION Association</organization>
      <address>
        <email>cdk@scion.org</email>
      </address>
    </author>
    <date year="2023" month="September" day="10"/>
    <area>IRTF</area>
    <workgroup>Path Aware Networking RG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 349?>

<t>SCION is an inter-domain Internet architecture that focuses on security and availability. Its fundamental functions are carried out by a number of components.</t>
      <t>This document analyzes its core components from a functionality perspective, describing their dependencies, outputs, and properties provided.
The goal is to answer the following questions:</t>
      <ul spacing="normal">
        <li>What are the main components of SCION and their dependencies? Can they be used independently?</li>
        <li>What existing protocols are reused or extended? Why (or why not)?</li>
      </ul>
      <t>In addition, it focuses on the properties achievable, motivating cases when a greenfield approach is used.
It then briefly touches on the maturity level of components and some extensions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-components_I-D/draft-rustignoli-panrg-scion-components.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rustignoli-panrg-scion-components/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Path Aware Networking RG Research Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://www.ietf.org/mail-archive/web/panrg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/panrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-components_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <?line 363?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While SCION was initially developed in academia, the architecture has now "slipped out of the lab" and counts its early productive deployments (including the Swiss inter-banking network <xref target="SSFN"/>).
The architecture consists of a system of related components, some of which are essential to set up end-to-end SCION connectivity.
Core components are the data plane, the control plane, and the PKI. Extensions provide additional functionality, security, or backward compatibility. Discussions at PANRG <xref target="PANRG-INTERIM-Min"/> showed the need to describe the relationships between components.
This document, therefore, takes a look at each core component individually and independently from others.
It focuses on describing its dependencies, outputs, functionality, and properties.
It then touches on relationships to existing protocols.
The goal is not to describe each component's specification, but to illustrate the engineering decisions that made SCION what it is and to provide a basis for further discussions and work.</t>
      <t>Before reading this document, please refer to <xref target="I-D.dekater-scion-overview"/> for a generic overview of SCION and its components, the problems it solves, and existing deployments. Each component is described in-depth in dedicated drafts: see <xref target="I-D.dekater-scion-pki"/> for the SCION PKI, <xref target="I-D.dekater-scion-controlplane"/> for the control plane. The data plane will be available within weeks from the last update of this draft. For any other components, please refer to <xref target="CHUAT22"/>.</t>
      <section anchor="design-goals">
        <name>Design Goals</name>
        <t>SCION was created from the start with the intention to provide the following properties for inter-domain communication.</t>
        <ul spacing="normal">
          <li>
            <em>Availability</em>. SCION aims to provide highly available communication. Its focus is not only on quickly handling failures (both on the last hop or anywhere along the path) but also on allowing communication in the presence of adversaries.
Availability is fundamental as applications move to cloud data centers, and enterprises increasingly rely on the Internet for mission-critical communication.</li>
          <li>
            <em>Security</em>. SCION comes with an arsenal of mechanisms, designed by security researchers with the goal of making most network-based and routing attacks either impossible or easy to mitigate.
SCION strongly focuses on preventing routing attacks, traffic hijackings, and on providing stronger guarantees than the existing Internet. Routing information can be unambiguously attributed to an AS, and packets are only forwarded along authorized sections of the network. Payload encryption, on the other hand, is not within the scope of SCION, as existing protocols can be reused.
Security is tightly related to trust.
SCION, therefore, offers a new trust model, transparency, and control to endpoints over forwarding paths. In addition, SCION's design starts from the assumption that any two entities on the global Internet do not mutually trust each other. SCION, therefore, enables trust agility, allowing its users to decide the roots of trust they wish to rely upon.</li>
          <li>
            <em>Scalability</em>. Security and high availability should not result in compromises on scalability.
At the same time, a next-generation Internet architecture should scale with global network growth and avoid limitations related to forwarding table size.
The S in SCION, indeed, stands for scalability. The architecture proposes a design that is scalable both in the control plane and in the data plane (as described later in the document).</li>
        </ul>
        <t>Many research efforts have analyzed whether such properties could be achieved by extending the existing Internet architecture. As described for each core component in the following paragraphs, tradeoffs between properties would be unavoidable when exclusively relying on or extending existing protocols.</t>
      </section>
    </section>
    <section anchor="minimal-stack-core-components">
      <name>Minimal Stack - Core Components</name>
      <t>To establish end-to-end connectivity, SCION relies on three main components.</t>
      <ul spacing="normal">
        <li>Data plane: it carries out secure packet forwarding, providing path-aware inter-domain connectivity.</li>
        <li>Control plane: it performs inter-domain routing by discovering and securely disseminating path information.</li>
        <li>PKI: it handles cryptographic material and provides a unique trust model.</li>
      </ul>
      <t>A SCION network is formed of multiple interconnected administrative domains, called SCION autonomous systems (AS). Each AS deploys all of the three components above.
Implementations of all of the above components are deployed in production (e.g., they are in use within the SSFN, the Swiss Finance Network). There are commercial implementations (including a high-performance data plane).</t>
      <t>A SCION packet is sent through a SCION network by SCION endpoints (i.e., a network host). It is then forwarded between ASes by the SCION data plane, which authenticates packets at each hop.
The control plane is responsible for discovering and disseminating routing information. Path discovery is performed by each AS thanks to an authenticated path-exploration mechanism called beaconing.
SCION endpoints query their respective AS control plane and obtain authenticated and authorized network paths, in the form of path segments.
Endpoints select one or more of the end-to-end network paths, based on the application requirements (i.e., latency). Endpoints then craft SCION packets containing the end-to-end path to the destination.</t>
      <t>The control plane relies on the control-plane PKI (CP-PKI) for authentication (e.g., of path segments).
SCION's authentication mechanisms aim at protecting the whole end-to-end path at each hop.
Such mechanisms are based on a trust model that is provided by the concept of Isolation Domains (ISDs).
An ISD is a group of Autonomous Systems that independently defines its own roots of trust.
ISD members share therefore a uniform trust environment (i.e., a common jurisdiction). They can transparently define trust relationships between parts of the network by deciding whether to trust other ISDs. SCION trust model, therefore, differs from the one provided by other PKI architectures. The motivation behind this design choice is clarified in <xref target="pki"/>.</t>
      <t>The following paragraphs look at each component individually.
Rather than describing how each component works, they focus on each component's dependencies and properties provided to other components.
The idea is to try to think of each component as a black box, and look at its "inputs" and "outputs".</t>
      <section anchor="pki">
        <name>Authentication - SCION CP-PKI</name>
        <t>SCION's control plane messages and path information are all authenticated.
This helps SCION avoid some of the obstacles to deployment mentioned in <xref target="RFC9049"/>, where several path-aware methods failed to achieve deployment because of lack of authentication or lack of mutual trust between hosts and the intermediate network.
The verification of messages relies on a public-key infrastructure (PKI) called the control-plane PKI or CP-PKI.
It consists of a set of mechanisms, roles, and policies related to the management and usage of certificates, which enables the verification of signatures of, e.g., path-segment construction beacons (PCBs).
A detailed specification of the PKI is available in <xref target="I-D.dekater-scion-pki"/>.</t>
        <section anchor="key-properties">
          <name>Key Properties</name>
          <t>One might ask why SCION requires its own PKI, rather than reusing some of the existing PKI architectures to issue AS certificates.
Several properties distinguish the CP-PKI from others, and motivate SCION's distinct approach.</t>
          <ul spacing="normal">
            <li>
              <em>Locally scoped and flexible trust.</em> SCION is designed to securely connect ASes that do not necessarily share mutual trust.
This requires a trust model that is different from the ones that are behind commonly deployed PKIs.
In a monopolistic model, all entities trust one or a small number of roots of trust. In an oligopolistic model, there are multiple equally trusted roots (e.g., in the Web PKI).
In both models, some or all certification authorities are omnipotent. If their key is compromised, then the security of the entire system collapses.
Both models do not scale well to a global environment, because mutually distrustful entities cannot agree on a single root of trust (monopoly) and because in the oligopoly model, the security is as strong as its weakest root.
In the SCION CP-PKI, trust is locally scoped within each ISD, and the capabilities of each ISD (authentication-wise) are limited to the communication channels in which they are involved. Each ISD can define its own trust policy. ASes must accept the trust policy of the ISD(s) in which they participate, but they can decide which ISDs they want to join, and they can participate in multiple ISDs.</li>
            <li>
              <em>Resilience to compromised entities and keys.</em> Compromised or malicious trust roots outside an ISD cannot affect operations that stay within that ISD. Moreover, as trust roots (in the form of a TRC) can only be updated through a voting process, each ISD can be configured to withstand the compromise of a number of its root keys.</li>
            <li>
              <em>Multilateral governance.</em> The voting mechanism mentioned above makes sure that fundamental changes to the trust policies are only allowed with the consent of multiple entities administering an ISD.
Within an ISD, no single entity is in full control, or owns a cryptographic "kill-switch".</li>
            <li>
              <em>Support for versioning &amp; updates.</em> Trust within an ISD is normally bootstrapped with an initial ceremony. Subsequent updates to the root of trust (TRC) are handled automatically. The PKI design makes sure that certificate rollover can be automated so that certificates can be rotated frequently (e.g., every few days for AS certificates).</li>
            <li>
              <em>Scalability.</em> The authentication infrastructure scales to the size of the Internet and is adapted to the heterogeneity of today’s Internet constituents.</li>
          </ul>
        </section>
        <section anchor="dependencies">
          <name>Dependencies</name>
          <t>Setting up the PKI in a freshly created Isolation Domain requires an initial trust bootstrapping process among some of the ISD members (i.e. a key exchange ceremony, and manual distribution of the initial ISD trust anchor).
As updates to the later roots of trust are automated, this process is in principle only required once.
In addition, certificate verification requires that PKI components can mutually communicate and have coarsely synchronized time.</t>
          <t>The CP PKI enables the verification of signatures, e.g., on path-segment construction beacons (PCBs).
It is built on top of a peculiar trust model, where entities are able to select their roots of trust.
It constitutes the most independent and self-contained core component, as it does not have significant dependencies on other SCION components.</t>
        </section>
        <section anchor="provided-to-other-components">
          <name>Provided to Other Components</name>
          <t>The PKI makes trust information available to the control plane through two elements:</t>
          <ul spacing="normal">
            <li>
              <em>Trust Root Configuration (TRC)</em>: The PKI provides well-defined per-ISD trust policies, in the form of a per-ISD Trust Root Configuration (TRC).
The TRC contains the ISD trust roots, and it is co-signed by multiple entities in a multilateral process called voting.</li>
            <li>
              <em>AS certificates</em>: For each Autonomous System that is part of an ISD, the PKI provides an AS certificate that is used by other components for authentication. It also provides a validation path up to the ISD trust root, through intermediate CA certificates.</li>
          </ul>
          <t>SCION CP-PKI comprises an optional extension called DRKey, which enables efficient symmetric key derivation between any two entities in possession of AS certificates.
Such symmetric keys are used for additional authentication mechanisms for high-rate data-plane traffic and some control messages.
As authentication based on digital signatures only scales well for relatively low message rates, using symmetric keys makes sure that the performance requirements for the high message rate of the data plane can be met.
For more information, refer to the extension draft <xref target="I-D.garciapardo-drkey"/>.</t>
          <t>The trust model and certificates provided could be used not only by the SCION control plane but also other systems and protocols.</t>
        </section>
        <section anchor="pki-related">
          <name>Relationship to Existing Protocols</name>
          <t>The CP-PKI is based on certificates that use the X.509v3 standard <xref target="RFC5280"/>. There are already several professional industry-grade implementations.</t>
          <t>The SCION trust model differs from existing PKIs in two ways.
First, no entity is globally omnipotent, as Isolation Domains elect their own locally scoped root of trust.
Second, changes to the trust roots require a voting process, making governance multilateral and each trust root resilient to the compromise of some of its keys.</t>
          <t>These properties would be lost if SCION were to rely on an existing PKI (i.e., the web PKI, the RPKI, ...).
For example, if SCION were to use the RPKI instead of the CP-PKI, its control plane would lack the trust model required to support Isolation Domains.
This is because RPKI's trust model follows the same structure as the IP allocation hierarchy, where the five RIRs represent the trust roots.
Within SCION, RPKI is instead used to secure some of its transition mechanisms, as later explained in <xref target="transition-mechanisms"/>.</t>
          <t>In conclusion, SCION is built around a unique trust model, justifying the existence of the CP-PKI.</t>
        </section>
      </section>
      <section anchor="routing-control-plane">
        <name>Routing - Control Plane</name>
        <t>The SCION control plane's main purpose is to securely discover and disseminate routing information.
Path exploration is based on path-segment construction beacons (PCBs), which are initiated by a subset of ASes and accumulate cryptographically protected path forwarding information.
Each AS selects a few PCBs and makes them available to endpoints via its path service, part of the control plane.</t>
        <t>Overall, the control plane takes an unexplored topology and AS certificates as input, it then discovers the inter-domain topology and makes routing information available to endpoints.</t>
        <t>The following section describes the core properties provided by the SCION control plane, its relationships with existing protocols, and its dependencies on the PKI.
For an in-depth description of the control plane, including its sub-components, as the beacon service, responsible for path discovery, and the path service, responsible for path dissemination, refer to <xref target="I-D.dekater-scion-controlplane"/>.</t>
        <section anchor="key-properties-1">
          <name>Key Properties</name>
          <ul spacing="normal">
            <li>
              <em>Massively multipath.</em> When exploring paths through beaconing, SCION ASes can select PCBs according to their policies, and register the corresponding path segments, making them available to other ASes and endpoints inside their network.
SCION endpoints can leverage a wide range of (possibly disjoint) inter-domain paths, based on application requirements or path conditions.
This goes beyond the capabilities of existing multipath mechanisms, such as BGP ADD-PATH <xref target="RFC7911"/>, that is focusing on advertising multiple paths for the same prefix to provide a backup path.</li>
            <li>
              <em>Scalability.</em> The SCION's beaconing algorithm is scalable and efficient due to the following reasons: The routing process is divided into a process within each ISD (intra-ISD) and one between ISDs (inter-ISD), SCION beaconing does not need to iteratively converge, and SCION makes AS-based announcements instead of IP prefix-based announcements.
Scalability of the routing process is fundamental not only to support network size growth but also to quickly react to failures.
An in-depth study of SCION's scalability in comparison to BGP is available in <xref target="KRAHENBUHL2022"/>.</li>
            <li>
              <em>Convergence time.</em> Since routing decisions are decoupled from the dissemination of path information, SCION features faster convergence times than path-vector protocols.
Path information is propagated across the network by PCBs in times that are within the same order of magnitude of network round trip time.
In addition, the division of the beaconing process into intra- and inter-ISD helps in speeding up global distribution of routing information.
This means that SCION can restore global reachability, even after catastrophic failures, within tens of seconds.</li>
            <li>
              <em>Hop-by-hop path authorization.</em> SCION packets can only be forwarded along authorized path segments.
This is achieved thanks to message authentication codes (MACs) within each hop field.
During beaconing, each AS's control plane creates nested MACs, which are then verified during forwarding, giving ASes strong guarantees about the path where the data is routed, with minimal overhead and resource requirements on routers.
Giving endpoints strong guarantees about the full inter-domain path is important to avoid traffic interception, and to enable geofencing (i.e., keeping data in transit within a well-defined trusted area of the SCION network).
This facilitated early adoption in the finance industry.</li>
            <li>
              <em>Host addressing agnostic.</em> SCION decouples routing from host addressing: inter-domain routing is based on ISD-AS tuples rather than on host addresses.
This design decision has two outcomes: First of all, SCION can reuse existing host addressing schemes, such as IPv6, IPv4, or others.
Second, the control plane does not carry prefix information.
Since packets contain forwarding state, routers do not need to look up routing tables (avoiding the need for dedicated hardware).</li>
            <li>
              <em>Transparency.</em> SCION endpoints have full visibility of the inter-domain path where their data is forwarded. This is a property that is missing in traditional IP networks, where routing decisions are made by each hop, therefore endpoints have no visibility nor guarantees on where their traffic is going.
Additionally, SCION users have visibility on the roots of trust that are used to forward traffic. SCION, therefore, makes it harder to redirect traffic through an adversary's vantage point.
Moreover, SCION gives end users the ability to select which parts of the Internet to trust. This is particularly relevant for workloads that currently use segregated networks.</li>
            <li>
              <em>Fault isolation.</em> As the SCION routing process is hierarchically divided into intra-ISD and inter-ISD, faults have a generally limited and localized impact.
Misconfigurations, such as an erroneous path policy, may suppress some paths. However, as long as an alternative path exists, communication is possible.
In addition, while the control plane is responsible for creating new paths, it does not invalidate existing paths.
The latter function is handled by endpoints upon detecting failures or eventually receiving an authenticated signal from the data plane.
This separation of control and data plane prevents the control plane from cutting off an existing communication or having a global kill-switch.</li>
          </ul>
        </section>
        <section anchor="dependencies-1">
          <name>Dependencies</name>
          <t>The SCION control plane requires the control-plane PKI to authenticate path information.
It heavily relies on certificates provided by the CP-PKI for beaconing (i.e., for authenticating routing information).
Each Isolation Domain requires its own root of trust, in the form of a TRC, in order to carry out path exploration and dissemination.</t>
          <t>While in principle the control plane could use certificates provided by another PKI, it would be severely affected by a lack of the ISD concept.
All security properties related to the trust model would be affected.
The concept of ISD is also necessary for scalability and fault isolation to organize the routing process into a two-tiered architecture.</t>
          <t>In conclusion, the control plane depends on the CP-PKI. If it were to be used with another PKI, it would lose several of its fundamental properties.</t>
        </section>
        <section anchor="provided-to-other-components-1">
          <name>Provided to Other Components</name>
          <t>In SCION, an endpoint sending a packet must specify, in the header, the full SCION forwarding path the packet takes towards the destination.
Rather than having knowledge of the network topology, an endpoint's data plane relies on the control plane for getting such information.
The endpoint's SCION stack queries path segments, then it selects them and combines them into a full forwarding path to the destination.</t>
          <t>The control plane is responsible, therefore, for providing an authenticated (multipath) view of the explored global topology to endpoints (and, in turn, to the data plane).
In addition, it provides the data plane the ability to send authenticated control messages.
The "interfaces" towards the data plane are represented by:</t>
          <ul spacing="normal">
            <li>
              <em>Path segments</em>, that are provided to endpoints and used by SCION routers for forwarding.
Segments are designed so that each AS data plane can independently verify its own segments, while globally achieving full path authorization.</li>
            <li>
              <em>SCMP.</em> SCION control-plane messages are by default all authenticated.
In addition to beacons, the control plane offers the SCION Control Message Protocol (SCMP).
It is analogous to ICMP, and it provides functionality for network diagnostics, such as ping and traceroute, and authenticated error messages that signal packet processing or network layer problems.
SCMP is the first control message protocol that supports the authentication of network control messages, preventing unauthenticated control messages from potentially being used to affect or even prevent traffic forwarding.
SCMP is used, for example, by the data plane to achieve path revocation.</li>
          </ul>
        </section>
        <section anchor="relationship-to-existing-protocols">
          <name>Relationship to Existing Protocols</name>
          <t>At first sight, it might seem that the SCION control plane takes care of similar duties as existing routing protocols.
While both focus on disseminating routing information, there are substantial differences in their mechanisms and properties offered.</t>
          <t>The SCION control plane was designed to carry out inter-domain routing, while intra-domain routing (and forwarding) are intentionally left out of scope.
Existing IGPs are used within an AS, allowing the reuse of existing intra-domain routing infrastructure and reducing the amount of changes required for deployment.</t>
          <t>End-host addressing is decoupled from routing.
Similar to LISP <xref target="RFC6830"/>, SCION separates routing, that is based on locator (an ISD-AS tuple), and host identifiers (e.g., IPv6, IPv4, ...).
While the two architectures have this concept in common, there are notable differences.
SCION brings improvements to inter-domain routing and provides secure multipath, while LISP provides a framework to build overlays on top of the existing Internet.
In addition, LISP security proposals focus on protecting identifier to locator mappings, while SCION focuses on securing inter-domain routing.
Lastly, identifier to locator mapping in SCION not part of the core components, rather it is left to some of its transition mechanisms, later described in <xref target="transition-mechanisms"/>.</t>
          <t>The above-mentioned decoupling also implies that SCION does not provide, by design, IP prefix origin validation, which is currently provided by RPKI <xref target="RFC8210"/>.
As prefix origin validation is outside of SCION's scope, IP-to-SCION's coexistence mechanisms (SIAM, SBAS) later discussed in <xref target="transition-mechanisms"/> build on top of RPKI for IP origin attestation.</t>
          <t>Additionally, the SCION control plane design takes into account some of the lessons learned discussed in <xref target="RFC9049"/>: It does not try to outperform end-to-end mechanisms, as path selection is performed by endpoints. SCION, therefore, can leverage existing end-to-end mechanisms to switch paths, rather than compete with them. In addition, no single component in the architecture needs to keep connection state, as this task is pushed to endpoints.</t>
          <t>One last point is that several of the SCION control plane properties and key mechanisms depend on the fact that SCION ASes are grouped into Isolation Domains (ISDs).
For example, ISDs are fundamental to achieving transparency, routing scalability, fault isolation, and fast propagation of routing information.
No existing protocol provides such a concept, motivating the existence of the control plane.</t>
        </section>
      </section>
      <section anchor="data-plane">
        <name>Forwarding - Data Plane</name>
        <t>The SCION data plane is responsible for inter-domain packet forwarding between ASes.
SCION routers are deployed at an AS network edge.
They receive and validate SCION packets from neighbors, then they use their intra-domain forwarding information to transmit packets to the next SCION border router or to a SCION endpoint inside the AS.</t>
        <t>SCION packets are at the network layer (layer-3), and the SCION header sits in between the transport and link layer.
The header contains a variable type and length host address, and can therefore carry any address (IPv4, IPv6, ...).
In addition, host addresses only need to be unique within an AS, and can be, in principle, reused.</t>
        <section anchor="key-properties-2">
          <name>Key Properties</name>
          <ul spacing="normal">
            <li>
              <em>Path selection.</em> In SCION, endpoints select inter-domain network paths, rather than routers. The endpoints are empowered to make end-to-end path choices based on application requirements.
This means that routers do not carry the burden of making enhanced routing or forwarding decisions.</li>
            <li>
              <em>Scalability.</em> SCION routers can efficiently forward packets without the need to look up forwarding tables or keep per-connection state. Routers only need to verify MACs in hop fields. This operation is based on modern block ciphers such as AES, can be computed faster than performing a memory lookup, and is widely supported in modern CPUs.
Routers, therefore, do not require expensive and energy-intensive dedicated hardware and can be deployed on off-the-shelf hardware. The lack of forwarding tables also implies that the growing size of forwarding tables is of no concern to SCION. Additionally, routers that keep state of network information can suffer from denial-of-service (DoS) attacks exhausting the router’s state <xref target="SCHUCHARD2011"/>, which is less of a problem to SCION.</li>
            <li>
              <em>Recovery from failures.</em> SCION hosts usually receive more than one path to a given destination.
Each host can select (potentially disjoint) backup paths that are available in case of a failure.
In contrast to the IP-based Internet, SCION packets are not dynamically rerouted by the network in case of failures.
Routers use BFD <xref target="RFC5880"/> to detect link failures, and in case they cannot forward a packet, they send an authenticated SCMP message triggering path revocation.
End hosts can use this information, or perform active monitoring, to quickly reroute traffic in case of failures.
There is therefore no need to wait for inter-domain routing protocol convergence.</li>
            <li>
              <em>Extensibility.</em> SCION, similarly to IPv6, supports extensions in its header.
Such extensions can be hop-by-hop (and are processed at each hop), or end-to-end.</li>
            <li>
              <em>Path authorization.</em> SCION routers validate per-hop MACs in packets at each hop, so that they are only forwarded along paths that were authorized by all on-path ASes in the control plane. Thanks to a system of nested message authentication codes, traffic hijacking attacks are avoided.</li>
          </ul>
          <t>In conclusion, in comparison to today's Internet, the SCION's data plane takes some of the responsibilities away from routers and places them on endpoints (such as selecting paths or reacting to failures).
This contributes to creating a data plane that is more efficient and scalable, and that does not require routers with specialized routing table lookup hardware.
Routers validate network paths so that packets are only forwarded on previously authorized paths.</t>
        </section>
        <section anchor="dependencies-2">
          <name>Dependencies</name>
          <t>The data plane is generally decoupled from the control plane.
To be able to transmit data, endpoints need to fetch path information from their AS control plane.
In addition, some operations (such as path revocation) require the data plane to be able to use an authenticated control-plane mechanism, such as SCMP.</t>
          <t>Path information is assumed to be fresh and validated by the control plane, which in turn relies on the CP-PKI for validation.
The data plane, therefore, relies on both the control plane and indirectly on the CP-PKI to function.</t>
          <t>Should the data plane be used independently, without end-to-end path authorization, SCION would lose many of its security properties, which are fundamental in an inter-domain scenario where entities are mutually distrustful.
As discussed in <xref target="RFC9049"/>, lack of authentication has often been the cause for path-aware protocols never being adopted because of security concerns. SCION should avoid such pitfalls and therefore its data plane should rely on the corresponding control plane and control-plane PKI.</t>
        </section>
        <section anchor="provided-to-other-components-2">
          <name>Provided to Other Components</name>
          <t>The SCION data plane provides path-aware connectivity to applications.
The SCION stack on an endpoint, therefore, takes application requirements as an input (i.e., latency, bandwidth, a list of trusted ASes, ... ), and crafts packets containing an appropriate path to a given destination.</t>
          <t>How to expose capabilities of path-aware networking to upper layers remains an open question.
PANAPI (Path-Aware Networking API) <xref target="slides-113-taps-panapi"/> is being evaluated as a way of making path-awareness and multipath available to the transport layer at endpoints, using the TAPS abstraction layer.</t>
        </section>
        <section anchor="relationship-to-existing-protocols-1">
          <name>Relationship to Existing Protocols</name>
          <t>SCION is an inter-domain network architecture and as such its data plane does not interfere with intra-domain forwarding.
It re-uses the existing intra-domain data and control plane to provide connectivity among its infrastructure services, border routers, and endpoints, minimizing changes to the internal infrastructure.
This corresponds to the practice today where ASes use an intra-domain protocol of their choice (i.e., OSPF, IS-IS, MPLS, ...).</t>
          <t>Given its path-aware properties, some of SCION's data plane characteristics might seem similar to the ones provided by Segment Routing (SR) <xref target="RFC8402"/>.
There are, however, fundamental differences that distinguish and motivate SCION.
The most salient one is that Segment Routing is designed to be deployed across a single trusted domain. SR, therefore, does not focus on security, which remains an open question, as outlined in <xref target="I-D.spring-srv6-security-consideration"/>.
SCION, instead, is designed from the start to facilitate inter-domain communication between (potentially mutually distrustful) entities. It comes, therefore, with built-in security measures to prevent attacks (i.e., authenticating all control-plane messages and all critical fields in the data-plane header).
Rather than compete, SCION and SR complement each other.
SCION relies on existing intra-domain routing protocols, therefore SR can be one of the possible intra-domain forwarding mechanisms.
Possible integration of its path-aware properties with SR remains for now an open question.</t>
          <t>In SCION's current implementation and early deployments, intra-AS SCION packets are encapsulated into an IP/UDP datagram for AS-local packet delivery, reusing the AS existing IGP and IP-based data plane.
This design decision eased early deployments of SCION in IP-based networks.
In the long term, it is not excluded that SCION's data plane could be better integrated with IP. For example, SCION path information could be included in a custom IPv6 routing extension header (<xref target="RFC8200"/> section 4.4).
Such approach requires further exploration on its impact on intra-domain forwarding and on addressing, so further discussion on the topic is left to future revisions of this draft.</t>
        </section>
      </section>
    </section>
    <section anchor="additional-components">
      <name>Additional Components</name>
      <t>This document mainly focuses on describing the fundamental components needed to run a minimal SCION network.
Beyond that, SCION comprises several extensions and transition mechanisms that provide additional properties, such as improved incremental deployability, security, and additional features.
For the sake of completeness, this paragraph briefly mentions some of these transition mechanisms and extensions.</t>
      <section anchor="transition-mechanisms">
        <name>Transition Mechanisms</name>
        <t>As presented in <xref target="I-D.dekater-scion-overview"/>, incremental deployability is a focus area of SCION's design.
It comprises transition mechanisms that allow partial deployment and coexistence with existing protocols.
These mechanisms require different levels of changes in existing systems and have different maturity levels (from production-grade to research prototype).
Rather than describing how each mechanism works, this document provides a short summary of each approach, focusing on its functions and properties, as well as on how it reuses, extends, or interacts with existing protocols.</t>
        <ul spacing="normal">
          <li>
            <em>SCION-IP-Gateway (SIG).</em> A SCION-IP-Gateway (SIG) is a SCION endpoint that encapsulates regular IP packets into SCION packets. A corresponding SIG at the destination performs the decapsulation.
This mechanism enables IP hosts to benefit from a SCION deployment by transparently obtaining improved security and availability properties.
SCION routing policies can be configured on SIGs, in order to select appropriate SCION paths based on application requirements.
SIGs can dynamically exchange prefix information, currently using their own encapsulation and prefix exchange protocol.
This does not exclude reusing existing protocols in the future.
SIGs are deployed in production SCION networks, and there are commercial implementations.</li>
          <li>
            <em>SIAM.</em> To make SIGs a viable transition mechanism in an Internet-scale network with tens of thousands of ASes, an automatic configuration system is required.
SIAM creates mappings between IP prefixes and SCION addresses, relying on the authorizations in the Resource Public Key Infrastructure (RPKI).
SIAM is currently a research prototype, further described in <xref target="SUPRAJA2021"/>.</li>
          <li>
            <em>SBAS</em> is an experimental architecture aiming at extending the benefits of SCION (in terms of performance and routing security) to potentially any IP host on the Internet.
SBAS consists of a federated backbone of entities. SBAS appears on the outside Internet as a regular BGP-speaking AS.
Customers of SBAS can leverage the system to route traffic across the SCION network according to their requirements (i.e., latency, geography, ... ).
SBAS contains globally distributed PoPs that advertise its customer's announcements.
SBAS relies on RPKI to validate IP prefix authorization.
Traffic is therefore routed as close as possible to the source onto the SCION network. The system is further described in <xref target="BIRGLEE2022"/>.</li>
        </ul>
      </section>
      <section anchor="extensions-and-other-components">
        <name>Extensions and Other Components</name>
        <t>In addition to transition mechanisms, there are other proposed extensions, that build upon the three SCION core components described earlier in this document.
DRKey <xref target="I-D.garciapardo-drkey"/> is a SCION extension that provides an Internet-wide key-establishment system allowing any two hosts to efficiently derive a symmetric key. This extension can be leveraged by other components to provide additional security properties.
For example, LightningFilter <xref target="slides-111-panrg-lightning-filter"/> leverages DRKey to provide high-speed packet filtering between trusted SCION ASes.
COLIBRI <xref target="GIULIARI2021"/> is SCION's inter-domain bandwidth reservation system.
EPIC <xref target="LEGNER2020"/> is a proposal that extends the data plane to provide full path validation, with different levels of guarantees.
These additional components are briefly mentioned here in order to provide additional context and some of them are experimental.</t>
      </section>
    </section>
    <section anchor="component-dependencies-summary">
      <name>Component Dependencies Summary</name>
      <t><xref target="components"/> briefly summarises on a high level the dependencies between SCION's core components discussed in the previous paragraphs.</t>
      <figure anchor="components">
        <name>Dependencies overview</name>
        <artwork><![CDATA[
                                  * Initial trust ceremony
                                  * Loose time synchronization
                                  * Communication
                  ┌────────────────────────────┐
                  │     Control plane PKI      │
                  └────────────────────────────┘
                                 │ * TRC
                                 ▼ * AS Certificates
                  ┌────────────────────────────┐
                  │       Control plane        │
                  └────────────────────────────┘
                                 │ * Path segments
                                 ▼ * SCMP
                  ┌────────────────────────────┐
                  │         Data plane         │
                  └────────────────────────────┘
                                 │ * Secure  inter-domain paths
                                 ▼ to destination
                  ┌────────────────────────────┐
                  │  Applications on endpoint  │
                  └────────────────────────────┘
]]></artwork>
      </figure>
      <t>Overall, the control plane PKI represents the most independent building block, as it does not rely on other SCION components.
The control plane relies on the trust model and on certificate material provided by the PKI.
It provides the data plane with path segments, that are then used at forwarding, and with SCMP, that is used for secure error messages.
The data plane makes multipath communication available to applications on SCION endpoints.</t>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>This document describes the three fundamental SCION core components, together with their properties and dependencies.
It highlights how such components allow SCION to provide unique properties. It then discusses how the main components are interlinked, to foster a discussion on the standardization of key components.
The authors welcome feedback from the IETF community for future iterations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RFC7911">
        <front>
          <title>Advertisement of Multiple Paths in BGP</title>
          <author fullname="D. Walton" initials="D." surname="Walton"/>
          <author fullname="A. Retana" initials="A." surname="Retana"/>
          <author fullname="E. Chen" initials="E." surname="Chen"/>
          <author fullname="J. Scudder" initials="J." surname="Scudder"/>
          <date month="July" year="2016"/>
          <abstract>
            <t>This document defines a BGP extension that allows the advertisement of multiple paths for the same address prefix without the new paths implicitly replacing any previous ones. The essence of the extension is that each path is identified by a Path Identifier in addition to the address prefix.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7911"/>
        <seriesInfo name="DOI" value="10.17487/RFC7911"/>
      </reference>
      <reference anchor="RFC5880">
        <front>
          <title>Bidirectional Forwarding Detection (BFD)</title>
          <author fullname="D. Katz" initials="D." surname="Katz"/>
          <author fullname="D. Ward" initials="D." surname="Ward"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>This document describes a protocol intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and to the extent possible the forwarding engines themselves, with potentially very low latency. It operates independently of media, data protocols, and routing protocols. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5880"/>
        <seriesInfo name="DOI" value="10.17487/RFC5880"/>
      </reference>
      <reference anchor="RFC8402">
        <front>
          <title>Segment Routing Architecture</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
          <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
          <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
          <author fullname="B. Decraene" initials="B." surname="Decraene"/>
          <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
          <author fullname="R. Shakir" initials="R." surname="Shakir"/>
          <date month="July" year="2018"/>
          <abstract>
            <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
            <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
            <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8402"/>
        <seriesInfo name="DOI" value="10.17487/RFC8402"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC6830">
        <front>
          <title>The Locator/ID Separation Protocol (LISP)</title>
          <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
          <author fullname="V. Fuller" initials="V." surname="Fuller"/>
          <author fullname="D. Meyer" initials="D." surname="Meyer"/>
          <author fullname="D. Lewis" initials="D." surname="Lewis"/>
          <date month="January" year="2013"/>
          <abstract>
            <t>This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs). No changes are required to either host protocol stacks or to the "core" of the Internet infrastructure. The Locator/ID Separation Protocol (LISP) can be incrementally deployed, without a "flag day", and offers Traffic Engineering, multihoming, and mobility benefits to early adopters, even when there are relatively few LISP-capable sites.</t>
            <t>Design and development of LISP was largely motivated by the problem statement produced by the October 2006 IAB Routing and Addressing Workshop. This document defines an Experimental Protocol for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6830"/>
        <seriesInfo name="DOI" value="10.17487/RFC6830"/>
      </reference>
      <reference anchor="RFC8210">
        <front>
          <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
          <author fullname="R. Bush" initials="R." surname="Bush"/>
          <author fullname="R. Austein" initials="R." surname="Austein"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
            <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8210"/>
        <seriesInfo name="DOI" value="10.17487/RFC8210"/>
      </reference>
      <reference anchor="RFC8200">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author fullname="S. Deering" initials="S." surname="Deering"/>
          <author fullname="R. Hinden" initials="R." surname="Hinden"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>
      <reference anchor="SCHUCHARD2011">
        <front>
          <title>Losing control of the internet: using the data plane to attack the control plane</title>
          <author fullname="Max Schuchard" initials="M." surname="Schuchard">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Abedelaziz Mohaisen" initials="A." surname="Mohaisen">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Denis Foo Kune" initials="D." surname="Foo Kune">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Nicholas Hopper" initials="N." surname="Hopper">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Yongdae Kim" initials="Y." surname="Kim">
            <organization>University of Minnesota, Minneapolis, MN, USA</organization>
          </author>
          <author fullname="Eugene Y. Vasserman" initials="E." surname="Vasserman">
            <organization>Kansas State University, Manhaattan, KS, USA</organization>
          </author>
          <date month="October" year="2010"/>
        </front>
        <seriesInfo name="Proceedings of the 17th ACM conference on Computer and communications" value="security"/>
        <seriesInfo name="DOI" value="10.1145/1866307.1866411"/>
        <refcontent>ACM</refcontent>
      </reference>
      <reference anchor="I-D.dekater-scion-overview" target="https://datatracker.ietf.org/doc/draft-dekater-panrg-scion-overview/">
        <front>
          <title>SCION Overview</title>
          <author initials="C." surname="de Kater" fullname="Corine de Kater">
            <organization>SCION Association</organization>
          </author>
          <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
            <organization>SCION Association</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="I-D.dekater-scion-pki" target="https://datatracker.ietf.org/doc/draft-dekater-scion-pki/">
        <front>
          <title>SCION Control-Plane PKI</title>
          <author initials="C." surname="de Kater" fullname="Corine de Kater">
            <organization>SCION Association</organization>
          </author>
          <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
            <organization>SCION Association</organization>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="I-D.dekater-scion-controlplane" target="https://datatracker.ietf.org/doc/draft-dekater-scion-controlplane/">
        <front>
          <title>SCION Control Plane</title>
          <author initials="C." surname="de Kater" fullname="Corine de Kater">
            <organization>SCION Association</organization>
          </author>
          <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
            <organization>SCION Association</organization>
          </author>
          <author initials="M." surname="Frei" fullname="Matthias Frei">
            <organization>SCION Association</organization>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="I-D.spring-srv6-security-consideration" target="https://datatracker.ietf.org/doc/draft-li-spring-srv6-security-consideration/">
        <front>
          <title>Security Considerations for SRv6 Networks</title>
          <author initials="C." surname="Li">
            <organization/>
          </author>
          <author initials="Z." surname="Li">
            <organization/>
          </author>
          <author initials="C." surname="Xie">
            <organization/>
          </author>
          <author initials="H." surname="Tian">
            <organization/>
          </author>
          <author initials="J." surname="Mao">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="slides-113-taps-panapi" target="https://datatracker.ietf.org/meeting/113/materials/slides-113-taps-panapi-implementation-00.pdf">
        <front>
          <title>PANAPI, a Path-Aware Networking API</title>
          <author initials="T." surname="Krüger">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="slides-111-panrg-lightning-filter" target="https://datatracker.ietf.org/meeting/111/materials/slides-111-panrg-lightning-filter-high-speed-traffic-filtering-based-on-drkey-00.pdf">
        <front>
          <title>Lightning Filter: High-Speed Traffic Filtering based on DRKey</title>
          <author initials="J. A." surname="Garcia Pardo">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="I-D.garciapardo-drkey" target="https://datatracker.ietf.org/doc/draft-garciapardo-panrg-drkey/">
        <front>
          <title>Dynamically Recreatable Keys</title>
          <author initials="J." surname="Pardo" fullname="Juan A. García Pardo Giménez de los Galanes">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="B." surname="Rothenberger" fullname="Benjamin Rothenberger">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="KRAHENBUHL2022" target="https://netsec.ethz.ch/publications/papers/2021_conext_deployment.pdf">
        <front>
          <title>Deployment and Scalability of an Inter-Domain Multi-Path Routing Infrastructure</title>
          <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="S." surname="Tabaeiaghdaei" fullname="Seyedali Tabaeiaghdaei">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="C." surname="Glοοr" fullname="Christelle Glοοr">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="J." surname="Kwon" fullname="Jonghoon Kwon">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Hausheer" fullname="David Hausheer">
            <organization>OVGU Magdeburg</organization>
          </author>
          <author initials="D." surname="Roos" fullname="Dominik Roos">
            <organization>Anapaya Systems</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="GIULIARI2021" target="https://netsec.ethz.ch/publications/papers/2021_conext_colibri.pdf">
        <front>
          <title>Colibri: A Cooperative Lightweight Inter-domain Bandwidth-Reservation Infrastructure</title>
          <author initials="G." surname="Giuliari" fullname="Giacomo Giuliari">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Roos" fullname="Dominik Roos">
            <organization>Anapaya Systems</organization>
          </author>
          <author initials="M." surname="Wyss" fullname="Marc Wyss">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="J." surname="García-Pardo" fullname="Juan Angel García-Pardo">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="BIRGLEE2022" target="https://www.usenix.org/conference/usenixsecurity22/presentation/birge-lee">
        <front>
          <title>Creating a Secure Underlay for the Internet</title>
          <author initials="H." surname="Birge-Lee">
            <organization>Princeton University</organization>
          </author>
          <author initials="J." surname="Wanner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="G. H." surname="Cimaszewski">
            <organization>Princeton University</organization>
          </author>
          <author initials="J." surname="Kwon">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="L." surname="Wang">
            <organization>Princeton University</organization>
          </author>
          <author initials="F." surname="Wirz">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="P." surname="Mittal">
            <organization>Princeton University</organization>
          </author>
          <author initials="A." surname="Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="Y." surname="Sun">
            <organization>University of Virginia</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
        <front>
          <title>The Complete Guide to SCION</title>
          <author initials="L." surname="Chuat" fullname="Laurent Chuat">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Basin" fullname="David Basin">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="D." surname="Hausheer" fullname="David Hausheer">
            <organization>Otto von Guericke University Magdeburg</organization>
          </author>
          <author initials="S." surname="Hitz" fullname="Samuel Hitz">
            <organization>Anapaya Systems</organization>
          </author>
          <author initials="P." surname="Mueller" fullname="Peter Mueller">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2022"/>
        </front>
        <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
      </reference>
      <reference anchor="SUPRAJA2021" target="https://netsec.ethz.ch/publications/papers/sridhara_taurin2021_siam.pdf">
        <front>
          <title>Global Distributed Secure Mapping of Network Addresses</title>
          <author initials="S." surname="Supraja" fullname="Supraja Sridhara">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="F." surname="Wirz" fullname="François Wirz">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="J." surname="de Ruiter" fullname="Joeri de Ruiter">
            <organization>SIDN Labs</organization>
          </author>
          <author initials="C." surname="Schutijser" fullname="Caspar Schutijser">
            <organization>SIDN Labs</organization>
          </author>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="LEGNER2020" target="https://netsec.ethz.ch/publications/papers/Legner_Usenix2020_EPIC.pdf">
        <front>
          <title>EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet</title>
          <author initials="M." surname="Legner" fullname="Markus Legner">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="T." surname="Klenze" fullname="Tobias Klenze">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="M." surname="Wyss" fullname="Marc Wyss">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="C." surname="Sprenger" fullname="Christoph Sprenger">
            <organization>ETH Zürich</organization>
          </author>
          <author initials="A." surname="Perrig" fullname="Adrian Perrig">
            <organization>ETH Zürich</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="PANRG-INTERIM-Min" target="https://datatracker.ietf.org/meeting/interim-2022-panrg-01/materials/minutes-interim-2022-panrg-01-202206011700-00">
        <front>
          <title>Path Aware Networking Research Group - Interim  106 Minutes</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="June"/>
        </front>
      </reference>
      <reference anchor="SSFN" target="https://www.six-group.com/en/products-services/banking-services/ssfn.html">
        <front>
          <title>Secure Swiss Finance Network (SSFN)</title>
          <author>
            <organization/>
          </author>
          <date year="2023" month="September"/>
        </front>
      </reference>
    </references>
    <?line 740?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors are indebted to Adrian Perrig, Laurent Chuat,
Markus Legner, David Basin, David Hausheer, Samuel Hitz, and Peter
Mueller, for writing the book "The Complete Guide to SCION"
<xref target="CHUAT22"/>, which provides the background information needed to write
this document.
Many thanks also to François Wirz, Juan A. Garcia-Pardo and Matthias Frei for reviewing this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
