<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-ippm-ioam-conf-state-10" indexInclude="true" ipr="trust200902" number="9359" prepTime="2023-04-07T15:42:56" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-conf-state-10" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9359" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Ping-Enabled IOAM Capabilities">Echo Request/Reply for Enabled In Situ OAM (IOAM) Capabilities</title>
    <seriesInfo name="RFC" value="9359" stream="IETF"/>
    <author fullname="Xiao Min" initials="X" surname="Min">
      <organization showOnFrontPage="true">ZTE Corp.</organization>
      <address>
        <postal>
          <street/>
          <city>Nanjing</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <phone>+86 25 88013062</phone>
        <email>xiao.min2@zte.com.cn</email>
      </address>
    </author>
    <author fullname="Greg Mirsky" initials="G" surname="Mirsky">
      <organization showOnFrontPage="true">Ericsson</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>United States of America</country>
        </postal>
        <phone/>
        <email>gregimirsky@gmail.com</email>
      </address>
    </author>
    <author fullname="Lei Bo" initials="L" surname="Bo">
      <organization showOnFrontPage="true">China Telecom</organization>
      <address>
        <postal>
          <street/>
          <city>Beijing</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <phone>+86 10 50902903</phone>
        <email>leibo@chinatelecom.cn</email>
      </address>
    </author>
    <date month="04" year="2023"/>
    <area>tsv</area>
    <workgroup>ippm</workgroup>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1"> This document describes a generic format for use in echo
      request/reply mechanisms, which can be used within an IOAM-Domain, allowing the
      IOAM encapsulating node to discover the enabled IOAM capabilities of
      each IOAM transit and IOAM decapsulating node.  The generic format is
      intended to be used with a variety of data planes such as IPv6, MPLS,
      Service Function Chain (SFC), and Bit Index Explicit Replication
      (BIER).</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9359" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2023 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions">Conventions</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-abbreviations">Abbreviations</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-capabilities-formats">IOAM Capabilities Formats</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-capabilities-query-con">IOAM Capabilities Query Container</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-capabilities-response-">IOAM Capabilities Response Container</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2.2.2">
                  <li pn="section-toc.1-1.3.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.1.1"><xref derivedContent="3.2.1" format="counter" sectionFormat="of" target="section-3.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-pre-allocated-tracing-">IOAM Pre-allocated Tracing Capabilities Object</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.2.1"><xref derivedContent="3.2.2" format="counter" sectionFormat="of" target="section-3.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-incremental-tracing-ca">IOAM Incremental Tracing Capabilities Object</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.3">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.3.1"><xref derivedContent="3.2.3" format="counter" sectionFormat="of" target="section-3.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-proof-of-transit-capab">IOAM Proof of Transit Capabilities Object</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.4">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.4.1"><xref derivedContent="3.2.4" format="counter" sectionFormat="of" target="section-3.2.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-edge-to-edge-capabilit">IOAM Edge-to-Edge Capabilities Object</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.5">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.5.1"><xref derivedContent="3.2.5" format="counter" sectionFormat="of" target="section-3.2.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-dex-capabilities-objec">IOAM DEX Capabilities Object</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.6">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.6.1"><xref derivedContent="3.2.6" format="counter" sectionFormat="of" target="section-3.2.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-end-of-domain-object">IOAM End-of-Domain Object</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-operational-guide">Operational Guide</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-sop-capability-registr">IOAM SoP Capability Registry</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ioam-tsf-capability-registr">IOAM TSF Capability Registry</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1"> In situ Operations, Administration, and Maintenance (IOAM) (<xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/> <xref target="RFC9326" format="default" sectionFormat="of" derivedContent="RFC9326"/>) defines data fields that 
  record OAM information within the packet while the packet traverses a particular network domain, called an "IOAM-Domain". IOAM can complement 
  or replace other OAM mechanisms, such as ICMP or other types of probe packets.</t>
      <t indent="0" pn="section-1-2"> As specified in <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/>, within the IOAM-Domain, the IOAM data may be updated by network nodes that
  the packet traverses.  The device that adds an IOAM header to the packet is called an "IOAM encapsulating node". In contrast, the device 
  that removes an IOAM header is referred to as an "IOAM decapsulating node".  Nodes within the domain that are aware of IOAM data and 
  that read, write, and/or process IOAM data are called "IOAM transit nodes". IOAM encapsulating or decapsulating nodes can also serve as IOAM 
  transit nodes at the same time. IOAM encapsulating or decapsulating nodes are also referred to as IOAM-Domain "edge devices", which can be 
  hosts or network devices. <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/> defines four IOAM option types, and <xref target="RFC9326" format="default" sectionFormat="of" derivedContent="RFC9326"/> introduces a new IOAM option 
  type called the "Direct Export (DEX) Option-Type", which is different from the other four IOAM option types defined in <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/> 
  regarding how to collect the operational and telemetry information defined in <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/>.</t>
      <t indent="0" pn="section-1-3"> As specified in <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/>, IOAM is focused on "limited domains" as defined in <xref target="RFC8799" format="default" sectionFormat="of" derivedContent="RFC8799"/>. 
  In a limited domain, a control entity that has control over every IOAM device may be deployed. If that's the case, the control entity can 
  provision both the explicit transport path and the IOAM header applied to the data packet at every IOAM encapsulating node.</t>
      <t indent="0" pn="section-1-4"> In a case when a control entity that has control over every IOAM
      device is not deployed in the IOAM-Domain, the IOAM encapsulating node
      needs to discover the enabled IOAM capabilities at the IOAM transit and
      decapsulating nodes: for example, what types of IOAM tracing data can be
      added or exported by the transit nodes along the transport path of the
      data packet IOAM is applied to. The IOAM encapsulating node can then add
      the correct IOAM header to the data packet according to the discovered
      IOAM capabilities. Specifically, the IOAM encapsulating node first
      identifies the types and lengths of IOAM options included in the IOAM
      data fields according to the discovered IOAM capabilities. Then the IOAM
      encapsulating node can add the IOAM header to the data packet based on
      the identified types and lengths of IOAM options included in the IOAM
      data fields. The IOAM encapsulating node may use NETCONF/YANG or IGP to
      discover these IOAM capabilities. However, NETCONF/YANG or IGP has some
      limitations:
  
      </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-1-5">
        <li pn="section-1-5.1">When NETCONF/YANG is used in this scenario, each IOAM
        encapsulating node (including the host when it takes the role of an
        IOAM encapsulating node) needs to implement a NETCONF Client, and each
        IOAM transit and IOAM decapsulating node (including the host when it
        takes the role of an IOAM decapsulating node) needs to implement a
        NETCONF Server, so complexity can be an issue. Furthermore, each IOAM
        encapsulating node needs to establish a NETCONF Connection with each
        IOAM transit and IOAM decapsulating node, so scalability can be an
        issue.
    </li>
        <li pn="section-1-5.2">When IGP is used in this scenario, the IGP and IOAM-Domains don't
        always have the same coverage. For example, when the IOAM
        encapsulating node or the IOAM decapsulating node is a host, the
        availability can be an issue. Furthermore, it might be too challenging
        to reflect enabled IOAM capabilities at the IOAM transit and IOAM
        decapsulating node if these are controlled by a local policy depending
        on the identity of the IOAM encapsulating node.
    </li>
      </ul>
      <t indent="0" pn="section-1-6"> This document specifies formats and objects that can be used in the extension of echo request/reply mechanisms used in IPv6 (including Segment 
  Routing over IPv6 (SRv6) data plane), MPLS (including Segment Routing over MPLS (SR-MPLS) data plane),  Service Function Chain (SFC), and Bit Index Explicit Replication (BIER) environments, which can be 
  used within the IOAM-Domain, allowing the IOAM encapsulating node to discover the enabled IOAM capabilities of each IOAM transit and IOAM 
  decapsulating node.</t>
      <t indent="0" pn="section-1-7"> The following documents contain references to the echo request/reply mechanisms used in IPv6 (including SRv6), MPLS (including SR-MPLS), SFC, 
  and BIER environments:
      </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-1-8">
        <li pn="section-1-8.1"> "<xref target="RFC4443" format="title" sectionFormat="of" derivedContent="Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification"/>"
          <xref target="RFC4443" format="default" sectionFormat="of" derivedContent="RFC4443"/></li>
        <li pn="section-1-8.2">"<xref target="RFC4620" format="title" sectionFormat="of" derivedContent="IPv6 Node Information Queries"/>" <xref target="RFC4620" format="default" sectionFormat="of" derivedContent="RFC4620"/></li>
        <li pn="section-1-8.3">"<xref target="RFC4884" format="title" sectionFormat="of" derivedContent="Extended ICMP to Support Multi-Part Messages"/>" <xref target="RFC4884" format="default" sectionFormat="of" derivedContent="RFC4884"/></li>
        <li pn="section-1-8.4">"<xref target="RFC8335" format="title" sectionFormat="of" derivedContent="PROBE: A Utility for Probing Interfaces"/>" <xref target="RFC8335" format="default" sectionFormat="of" derivedContent="RFC8335"/></li>
        <li pn="section-1-8.5">"<xref target="RFC8029" format="title" sectionFormat="of" derivedContent="Detecting Multiprotocol Label Switched (MPLS) Data-Plane Failures"/>"
          <xref target="RFC8029" format="default" sectionFormat="of" derivedContent="RFC8029"/></li>
        <li pn="section-1-8.6">"<xref target="I-D.ietf-sfc-multi-layer-oam" format="title" sectionFormat="of" derivedContent="Active OAM for Service Function Chaining (SFC)"/>"
          <xref target="I-D.ietf-sfc-multi-layer-oam" format="default" sectionFormat="of" derivedContent="OAM-for-SFC"/></li>
        <li pn="section-1-8.7">"<xref target="I-D.ietf-bier-ping" format="title" sectionFormat="of" derivedContent="BIER Ping and Trace"/>"
          <xref target="I-D.ietf-bier-ping" format="default" sectionFormat="of" derivedContent="BIER-PING"/></li>
      </ul>
      <t indent="0" pn="section-1-9"> It is expected that the specification of the instantiation of each of these extensions will be done in the form of an RFC jointly designed by 
  the working group that develops or maintains the echo request/reply protocol and the IETF IP Performance Measurement (IPPM) Working Group.</t>
      <t indent="0" pn="section-1-10">In this document, note that the echo request/reply mechanism used in IPv6 does not mean ICMPv6 Echo Request/Reply <xref target="RFC4443" format="default" sectionFormat="of" derivedContent="RFC4443"/> but 
  does mean IPv6 Node Information Query/Reply <xref target="RFC4620" format="default" sectionFormat="of" derivedContent="RFC4620"/>.</t>
      <t indent="0" pn="section-1-11">Fate sharing is a common requirement for all kinds of active OAM
      packets, including echo requests. In this document, that means an echo
      request is required to traverse the path of an IOAM data packet. This
      requirement can be achieved by, e.g., applying the same explicit path or
      ECMP processing to both echo request and IOAM data
      packets. Specifically, the same ECMP processing can be applied to both
      echo request and IOAM data packets, by populating the same value or values in any
      ECMP affecting fields of the packets.</t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-conventions">Conventions</name>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-2.1">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t indent="0" pn="section-2.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-2.2">
        <name slugifiedName="name-abbreviations">Abbreviations</name>
        <dl spacing="normal" newline="false" indent="3" pn="section-2.2-1">
          <dt pn="section-2.2-1.1">BIER:</dt>
          <dd pn="section-2.2-1.2">Bit Index Explicit Replication</dd>
          <dt pn="section-2.2-1.3">BGP:</dt>
          <dd pn="section-2.2-1.4">Border Gateway Protocol</dd>
          <dt pn="section-2.2-1.5">DEX:</dt>
          <dd pn="section-2.2-1.6">Direct Export</dd>
          <dt pn="section-2.2-1.7">ECMP:</dt>
          <dd pn="section-2.2-1.8">Equal-Cost Multipath</dd>
          <dt pn="section-2.2-1.9">E2E:</dt>
          <dd pn="section-2.2-1.10">Edge to Edge</dd>
          <dt pn="section-2.2-1.11">ICMP:</dt>
          <dd pn="section-2.2-1.12">Internet Control Message Protocol</dd>
          <dt pn="section-2.2-1.13">IGP:</dt>
          <dd pn="section-2.2-1.14">Interior Gateway Protocol</dd>
          <dt pn="section-2.2-1.15">IOAM:</dt>
          <dd pn="section-2.2-1.16">In situ Operations, Administration, and Maintenance</dd>
          <dt pn="section-2.2-1.17">LSP:</dt>
          <dd pn="section-2.2-1.18">Label Switched Path</dd>
          <dt pn="section-2.2-1.19">MPLS:</dt>
          <dd pn="section-2.2-1.20">Multiprotocol Label Switching</dd>
          <dt pn="section-2.2-1.21">MTU:</dt>
          <dd pn="section-2.2-1.22">Maximum Transmission Unit</dd>
          <dt pn="section-2.2-1.23">NETCONF:</dt>
          <dd pn="section-2.2-1.24">Network Configuration Protocol</dd>
          <dt pn="section-2.2-1.25">NTP:</dt>
          <dd pn="section-2.2-1.26">Network Time Protocol</dd>
          <dt pn="section-2.2-1.27">OAM:</dt>
          <dd pn="section-2.2-1.28">Operations, Administration, and Maintenance</dd>
          <dt pn="section-2.2-1.29">PCEP:</dt>
          <dd pn="section-2.2-1.30">Path Computation Element Communication Protocol</dd>
          <dt pn="section-2.2-1.31">POSIX:</dt>
          <dd pn="section-2.2-1.32">Portable Operating System Interface</dd>
          <dt pn="section-2.2-1.33">POT:</dt>
          <dd pn="section-2.2-1.34">Proof of Transit</dd>
          <dt pn="section-2.2-1.35">PTP:</dt>
          <dd pn="section-2.2-1.36">Precision Time Protocol</dd>
          <dt pn="section-2.2-1.37">SoP:</dt>
          <dd pn="section-2.2-1.38">Size of POT</dd>
          <dt pn="section-2.2-1.39">SR-MPLS:</dt>
          <dd pn="section-2.2-1.40">Segment Routing over MPLS</dd>
          <dt pn="section-2.2-1.41">SRv6:</dt>
          <dd pn="section-2.2-1.42">Segment Routing over IPv6</dd>
          <dt pn="section-2.2-1.43">SFC:</dt>
          <dd pn="section-2.2-1.44">Service Function Chain</dd>
          <dt pn="section-2.2-1.45">TTL:</dt>
          <dd pn="section-2.2-1.46">Time to Live (this is also the Hop Limit field in the IPv6
	  header)</dd>
          <dt pn="section-2.2-1.47">TSF:</dt>
          <dd pn="section-2.2-1.48">TimeStamp Format</dd>
        </dl>
      </section>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-ioam-capabilities-formats">IOAM Capabilities Formats</name>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-3.1">
        <name slugifiedName="name-ioam-capabilities-query-con">IOAM Capabilities Query Container</name>
        <t indent="0" pn="section-3.1-1"> For echo requests, the IOAM Capabilities Query uses a container that has the following format:</t>
        <figure anchor="Figure_1" align="left" suppress-title="false" pn="figure-1">
          <name slugifiedName="name-ioam-capabilities-query-cont">IOAM Capabilities Query Container of an Echo Request</name>
          <artwork align="center" pn="section-3.1-2.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.            IOAM Capabilities Query Container Header           .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.                   List of IOAM Namespace-IDs                  .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
        </figure>
        <t indent="0" pn="section-3.1-3"> When this container is present in the echo request sent by an IOAM encapsulating node, the IOAM encapsulating node 
	 requests that the receiving node reply with its enabled IOAM capabilities. If there is no IOAM capability to be reported by the receiving 
	 node, then this container <bcp14>MUST</bcp14> be ignored by the receiving node. This means the receiving node <bcp14>MUST</bcp14> send an echo reply without IOAM 
	 capabilities or no echo reply, in the light of whether the echo request includes containers other than the IOAM Capabilities Query Container. 
	 A list of IOAM Namespace-IDs (one or more Namespace-IDs) <bcp14>MUST</bcp14> be included in this container in the echo request; if present, the Default-Namespace-ID 
	 0x0000 <bcp14>MUST</bcp14> be placed at the beginning of the list of IOAM Namespace-IDs. The IOAM encapsulating node requests only the enabled IOAM capabilities 
	 that match one of the Namespace-IDs. Inclusion of the Default-Namespace-ID 0x0000 elicits replies only for capabilities that are configured 
	 with the Default-Namespace-ID 0x0000. The Namespace-ID has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.3" derivedContent="RFC9197"/>.</t>
        <t indent="0" pn="section-3.1-4"> The IOAM Capabilities Query Container has a container header that is used to identify the type and, optionally, the length of the container payload. The container payload (List of IOAM Namespace-IDs) is zero-padded to align with a 4-octet boundary. Since the Default-Namespace-ID 0x0000 is 
	 mandated to appear first in the list, any other occurrences of 0x0000 <bcp14>MUST</bcp14> be disregarded.</t>
        <t indent="0" pn="section-3.1-5"> The length, structure, and definition of the IOAM Capabilities Query Container Header depend on the specific deployment environment.</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-3.2">
        <name slugifiedName="name-ioam-capabilities-response-">IOAM Capabilities Response Container</name>
        <t indent="0" pn="section-3.2-1"> For echo replies, the IOAM Capabilities Response uses a container that has the following format:</t>
        <figure anchor="Figure_2" align="left" suppress-title="false" pn="figure-2">
          <name slugifiedName="name-ioam-capabilities-response-c">IOAM Capabilities Response Container for an Echo Reply</name>
          <artwork align="center" pn="section-3.2-2.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.          IOAM Capabilities Response Container Header          .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.               List of IOAM Capabilities Objects               .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
        </figure>
        <t indent="0" pn="section-3.2-3"> When this container is present in the echo reply sent by an IOAM transit node or IOAM decapsulating node, the IOAM function 
	is enabled at this node, and this container contains the enabled IOAM capabilities of the sender.  A list of IOAM capabilities objects (one 
	 or more objects) that contains the enabled IOAM capabilities <bcp14>MUST</bcp14> be included in this container of the echo reply unless the sender encounters 
	 an error (e.g., no matched Namespace-ID).</t>
        <t indent="0" pn="section-3.2-4"> The IOAM Capabilities Response Container has a container header that is used to identify the type and, optionally, the length of the container payload. 
	 The container header <bcp14>MUST</bcp14> be defined such that it falls on a 4-octet boundary.</t>
        <t indent="0" pn="section-3.2-5"> The length, structure, and definition of the IOAM Capabilities Response Container Header depends on the specific deployment environment.</t>
        <t indent="0" pn="section-3.2-6"> Based on the IOAM data fields defined in <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/> and <xref target="RFC9326" format="default" sectionFormat="of" derivedContent="RFC9326"/>, six types of objects are defined in this document. 
	 The same type of object <bcp14>MAY</bcp14> be present in the IOAM Capabilities Response Container more than once, only if listed with a different Namespace-ID.</t>
        <t indent="0" pn="section-3.2-7"> Similar to the container, each object has an object header that is used to identify the type and length of the object payload. The object 
	 payload <bcp14>MUST</bcp14> be defined such that it falls on a 4-octet boundary.</t>
        <t indent="0" pn="section-3.2-8"> The length, structure, and definition of the object header depends on the specific deployment environment.</t>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-3.2.1">
          <name slugifiedName="name-ioam-pre-allocated-tracing-">IOAM Pre-allocated Tracing Capabilities Object</name>
          <figure anchor="Figure_3" align="left" suppress-title="false" pn="figure-3">
            <name slugifiedName="name-ioam-pre-allocated-tracing-c">IOAM Pre-allocated Tracing Capabilities Object</name>
            <artwork align="center" pn="section-3.2.1-1.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.     IOAM Pre-allocated Tracing Capabilities Object Header     .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               IOAM-Trace-Type                 |  Reserved   |W|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |          Ingress_MTU          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Ingress_if_id (short or wide format)         ......          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t indent="0" pn="section-3.2.1-2"> When the IOAM Pre-allocated Tracing Capabilities Object is present in the IOAM Capabilities Response Container, the sending node is an IOAM transit node, and the IOAM 
	 pre-allocated tracing function is enabled at this IOAM transit node.</t>
          <t indent="0" pn="section-3.2.1-3">The IOAM-Trace-Type field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.4" derivedContent="RFC9197"/>.</t>
          <t indent="0" pn="section-3.2.1-4">The Reserved field <bcp14>MUST</bcp14> be zeroed on transmission and ignored on receipt.</t>
          <t indent="0" pn="section-3.2.1-5">The W flag indicates whether Ingress_if_id is in short or wide format. The W-bit is set if the Ingress_if_id is in wide format. 
	 The W-bit is clear if the Ingress_if_id is in short format.</t>
          <t indent="0" pn="section-3.2.1-6">The Namespace-ID field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.3" derivedContent="RFC9197"/>. It <bcp14>MUST</bcp14>
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
          <t indent="0" pn="section-3.2.1-7">The Ingress_MTU field has 16 bits and specifies the MTU (in octets) of the ingress interface from which the sending node received the echo 
	 request.</t>
          <t indent="0" pn="section-3.2.1-8">The Ingress_if_id field has 16 bits (in short format) or 32 bits (in
          wide format) and specifies the identifier of the ingress interface
          from which the sending node received the echo request. If the W-bit is
          cleared, the Ingress_if_id field has 16 bits; then the 16
          bits following the Ingress_if_id field are reserved for future use,
          <bcp14>MUST</bcp14> be set to zero, and <bcp14>MUST</bcp14> be
          ignored when non-zero.</t>
        </section>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-3.2.2">
          <name slugifiedName="name-ioam-incremental-tracing-ca">IOAM Incremental Tracing Capabilities Object</name>
          <figure anchor="Figure_4" align="left" suppress-title="false" pn="figure-4">
            <name slugifiedName="name-ioam-incremental-tracing-cap">IOAM Incremental Tracing Capabilities Object</name>
            <artwork align="center" pn="section-3.2.2-1.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.      IOAM Incremental Tracing Capabilities Object Header      .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               IOAM-Trace-Type                 |  Reserved   |W|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |          Ingress_MTU          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Ingress_if_id (short or wide format)         ......          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t indent="0" pn="section-3.2.2-2">When the IOAM Incremental Tracing Capabilities Object is present in the IOAM Capabilities Response
          Container, the sending node is an IOAM transit node, and
          the IOAM incremental tracing function is enabled at this IOAM
          transit node.</t>
          <t indent="0" pn="section-3.2.2-3">The IOAM-Trace-Type field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.4" derivedContent="RFC9197"/>.</t>
          <t indent="0" pn="section-3.2.2-4">The Reserved field <bcp14>MUST</bcp14> be zeroed on transmission and ignored on receipt.</t>
          <t indent="0" pn="section-3.2.2-5">The W flag indicates whether Ingress_if_id is in short or wide format. The W-bit is set if the Ingress_if_id is in wide format. 
	 The W-bit is clear if the Ingress_if_id is in short format.</t>
          <t indent="0" pn="section-3.2.2-6">The Namespace-ID field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.3" derivedContent="RFC9197"/>. It <bcp14>MUST</bcp14>
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
          <t indent="0" pn="section-3.2.2-7">The Ingress_MTU field has 16 bits and specifies the MTU (in octets) of the ingress interface from which the sending node received the echo 
	 request.</t>
          <t indent="0" pn="section-3.2.2-8">The Ingress_if_id field has 16 bits (in short format) or 32 bits (in
          wide format) and specifies the identifier of the ingress interface
          from which the sending node received the echo request. If the W-bit
          is cleared, the Ingress_if_id field has 16 bits; then the
          16 bits following the Ingress_if_id field are reserved for future
          use, <bcp14>MUST</bcp14> be set to zero, and <bcp14>MUST</bcp14>
          be ignored when non-zero.</t>
        </section>
        <section anchor="ioam-cap-res-cont" numbered="true" removeInRFC="false" toc="include" pn="section-3.2.3">
          <name slugifiedName="name-ioam-proof-of-transit-capab">IOAM Proof of Transit Capabilities Object</name>
          <figure anchor="Figure_5" align="left" suppress-title="false" pn="figure-5">
            <name slugifiedName="name-ioam-proof-of-transit-capabi">IOAM Proof of Transit Capabilities Object</name>
            <artwork align="center" pn="section-3.2.3-1.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.       IOAM Proof of Transit Capabilities Object Header        .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          | IOAM-POT-Type |SoP| Reserved  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t indent="0" pn="section-3.2.3-2"> When the IOAM Proof of Transit Capabilities Object is present in the IOAM Capabilities Response Container, the sending node is an IOAM transit node and the IOAM 
	 Proof of Transit function is enabled at this IOAM transit node.</t>
          <t indent="0" pn="section-3.2.3-3">The Namespace-ID field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.3" derivedContent="RFC9197"/>. It <bcp14>MUST</bcp14>
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
          <t indent="0" pn="section-3.2.3-4"> The IOAM-POT-Type field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.5" derivedContent="RFC9197"/>.</t>
          <t indent="0" pn="section-3.2.3-5">The SoP (Size of POT) field has two bits that indicate the size of "PktID"
   and "Cumulative" data, which are specified in  <xref target="RFC9197" sectionFormat="of" section="4.5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.5" derivedContent="RFC9197"/>. This document defines SoP as follows:
          </t>
          <dl spacing="normal" indent="3" newline="false" pn="section-3.2.3-6">
            <dt pn="section-3.2.3-6.1">0b00:</dt>
            <dd pn="section-3.2.3-6.2">64-bit "PktID" and 64-bit "Cumulative" data</dd>
            <dt pn="section-3.2.3-6.3">0b01~0b11:</dt>
            <dd pn="section-3.2.3-6.4">reserved for future standardization</dd>
          </dl>
          <t indent="0" pn="section-3.2.3-7">The Reserved field <bcp14>MUST</bcp14> be zeroed on transmission and ignored on receipt.</t>
        </section>
        <section anchor="ioam-e2e" numbered="true" removeInRFC="false" toc="include" pn="section-3.2.4">
          <name slugifiedName="name-ioam-edge-to-edge-capabilit">IOAM Edge-to-Edge Capabilities Object</name>
          <figure anchor="Figure_6" align="left" suppress-title="false" pn="figure-6">
            <name slugifiedName="name-ioam-edge-to-edge-capabiliti">IOAM Edge-to-Edge Capabilities Object</name>
            <artwork align="center" pn="section-3.2.4-1.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.          IOAM Edge-to-Edge Capabilities Object Header         .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |         IOAM-E2E-Type         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|TSF|         Reserved          |           Reserved            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t indent="0" pn="section-3.2.4-2"> When the IOAM Edge-to-Edge Capabilities Object is present in the IOAM Capabilities Response Container, the sending node is an IOAM decapsulating node and 
	 IOAM edge-to-edge function is enabled at this IOAM decapsulating node.</t>
          <t indent="0" pn="section-3.2.4-3">The Namespace-ID field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.3" derivedContent="RFC9197"/>. It <bcp14>MUST</bcp14>
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
          <t indent="0" pn="section-3.2.4-4">The IOAM-E2E-Type field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.6" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.6" derivedContent="RFC9197"/>.</t>
          <t indent="0" pn="section-3.2.4-5">The TSF field specifies the timestamp format used by the sending node. Aligned with three possible timestamp formats specified in <xref target="RFC9197" sectionFormat="of" section="5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-5" derivedContent="RFC9197"/>, this document defines TSF as follows:
          </t>
          <dl spacing="normal" indent="3" newline="false" pn="section-3.2.4-6">
            <dt pn="section-3.2.4-6.1">0b00:</dt>
            <dd pn="section-3.2.4-6.2">PTP truncated timestamp format</dd>
            <dt pn="section-3.2.4-6.3">0b01:</dt>
            <dd pn="section-3.2.4-6.4">NTP 64-bit timestamp format</dd>
            <dt pn="section-3.2.4-6.5">0b10:</dt>
            <dd pn="section-3.2.4-6.6"> POSIX-based timestamp format</dd>
            <dt pn="section-3.2.4-6.7">0b11:</dt>
            <dd pn="section-3.2.4-6.8"> Reserved for future standardization</dd>
          </dl>
          <t indent="0" pn="section-3.2.4-7">The Reserved field <bcp14>MUST</bcp14> be zeroed on transmission and ignored on receipt.</t>
        </section>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-3.2.5">
          <name slugifiedName="name-ioam-dex-capabilities-objec">IOAM DEX Capabilities Object</name>
          <figure anchor="Figure_7" align="left" suppress-title="false" pn="figure-7">
            <name slugifiedName="name-ioam-dex-capabilities-object">IOAM DEX Capabilities Object</name>
            <artwork align="center" pn="section-3.2.5-1.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.              IOAM DEX Capabilities Object Header              .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               IOAM-Trace-Type                 |    Reserved   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |           Reserved            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t indent="0" pn="section-3.2.5-2">When the IOAM DEX Capabilities Object is present in the IOAM Capabilities Response Container, the sending node is an IOAM transit node and the IOAM 
	 direct exporting function is enabled at this IOAM transit node.</t>
          <t indent="0" pn="section-3.2.5-3">The IOAM-Trace-Type field has the same definition as what's specified in <xref target="RFC9326" sectionFormat="of" section="3.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9326#section-3.2" derivedContent="RFC9326"/>.</t>
          <t indent="0" pn="section-3.2.5-4">The Namespace-ID field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.3" derivedContent="RFC9197"/>. It <bcp14>MUST</bcp14> 
	  be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
          <t indent="0" pn="section-3.2.5-5">The Reserved field <bcp14>MUST</bcp14> be zeroed on transmission and ignored on receipt.</t>
        </section>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-3.2.6">
          <name slugifiedName="name-ioam-end-of-domain-object">IOAM End-of-Domain Object</name>
          <figure anchor="Figure_8" align="left" suppress-title="false" pn="figure-8">
            <name slugifiedName="name-ioam-end-of-domain-object-2">IOAM End-of-Domain Object</name>
            <artwork align="center" pn="section-3.2.6-1.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.               IOAM End-of-Domain Object Header                .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |            Reserved           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t indent="0" pn="section-3.2.6-2">When the IOAM End-of-Domain Object is present in the IOAM Capabilities Response Container, the sending node is an IOAM decapsulating node. 
	 Unless the IOAM Edge-to-Edge Capabilities Object is present, which also indicates that the sending node is an IOAM 
	 decapsulating node, the IOAM End-of-Domain Object <bcp14>MUST</bcp14> be present in the IOAM Capabilities Response Container sent by an IOAM decapsulating node. 
	 When the IOAM edge-to-edge function is enabled at the IOAM decapsulating node, including only the IOAM Edge-to-Edge Capabilities Object, not the IOAM End-of-Domain Object, is <bcp14>RECOMMENDED</bcp14>.</t>
          <t indent="0" pn="section-3.2.6-3">The Namespace-ID field has the same definition as what's specified in <xref target="RFC9197" sectionFormat="of" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.3" derivedContent="RFC9197"/>. It <bcp14>MUST</bcp14>
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Container.</t>
          <t indent="0" pn="section-3.2.6-4"> Reserved field <bcp14>MUST</bcp14> be zeroed on transmission and ignored on receipt.</t>
        </section>
      </section>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-operational-guide">Operational Guide</name>
      <t indent="0" pn="section-4-1"> Once the IOAM encapsulating node is triggered to discover the
      enabled IOAM capabilities of each IOAM transit and IOAM decapsulating
      node, the IOAM encapsulating node will send echo requests that include
      the IOAM Capabilities Query Container as follows:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4-2">
        <li pn="section-4-2.1">First, with TTL equal to 1 to reach the closest node (which may or
	may not be an IOAM transit node).</li>
        <li pn="section-4-2.2">Then, with TTL equal to 2 to reach the second-nearest node (which
	also may or may not be an IOAM transit node).</li>
        <li pn="section-4-2.3">Then, further increasing by 1 the TTL every time the IOAM
	encapsulating node sends a new echo request, until the IOAM
	encapsulating node receives an echo reply sent by the IOAM
	decapsulating node (which contains the IOAM Capabilities Response
	Container including the IOAM Edge-to-Edge Capabilities Object or the
	IOAM End-of-Domain Object).</li>
      </ul>
      <t indent="0" pn="section-4-3">As a result, the echo requests sent by the
      IOAM encapsulating node will reach all nodes one by one along the
      transport path of IOAM data packet.</t>
      <t indent="0" pn="section-4-4">Alternatively, if the IOAM
      encapsulating node knows precisely all the IOAM transit and IOAM
      decapsulating nodes beforehand, once the IOAM encapsulating node is
      triggered to discover the enabled IOAM capabilities, it can send an echo
      request to each IOAM transit and IOAM decapsulating node directly,
      without TTL expiration.</t>
      <t indent="0" pn="section-4-5"> The IOAM encapsulating node may be triggered by the device administrator, the network management system, the network controller, or
  data traffic. The specific triggering mechanisms are outside the scope of this document.</t>
      <t indent="0" pn="section-4-6"> Each IOAM transit and IOAM decapsulating node that receives an echo request containing the IOAM Capabilities Query Container will send an
  echo reply to the IOAM encapsulating node. For the echo reply, there is an IOAM Capabilities Response Container containing one or more
  Objects. The IOAM Capabilities Query Container of the echo request would be ignored by the receiving node unaware of IOAM.</t>
      <t indent="0" pn="section-4-7"> Note that the mechanism defined in this document applies to all
      kinds of IOAM option types, whether the four types of IOAM options
      defined in <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/> or the DEX type of IOAM option
      defined in <xref target="RFC9326" format="default" sectionFormat="of" derivedContent="RFC9326"/>. Specifically, when applied to the
      IOAM DEX option, the mechanism allows the IOAM encapsulating node to
      discover which nodes along the transport path support IOAM direct
      exporting and which trace data types are supported to be directly
      exported at these nodes.</t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-5-1"> IANA has created a registry named "In Situ OAM (IOAM) Capabilities".</t>
      <t indent="0" pn="section-5-2"> This registry includes the following subregistries:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-5-3">
        <li pn="section-5-3.1">IOAM SoP Capability</li>
        <li pn="section-5-3.2">IOAM TSF Capability</li>
      </ul>
      <t indent="0" pn="section-5-4"> The subsequent subsections detail the registries herein contained.</t>
      <t indent="0" pn="section-5-5"> Considering the Containers/Objects defined in this document that would be carried in different types of Echo Request/Reply messages, such as 
  ICMPv6 or LSP Ping, it is intended that the registries for Container/Object Type would be requested in subsequent documents.</t>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-5.1">
        <name slugifiedName="name-ioam-sop-capability-registr">IOAM SoP Capability Registry</name>
        <t indent="0" pn="section-5.1-1"> This registry defines four codepoints for the IOAM SoP Capability field for identifying the size of "PktID" and "Cumulative" data 
	as explained in <xref target="RFC9197" sectionFormat="of" section="4.5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-4.5" derivedContent="RFC9197"/>.</t>
        <t indent="0" pn="section-5.1-2"> A new entry in this registry requires the following fields:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-5.1-3">
          <li pn="section-5.1-3.1"> SoP (Size of POT): a 2-bit binary field as defined in <xref target="ioam-cap-res-cont" format="default" sectionFormat="of" derivedContent="Section 3.2.3"/>.</li>
          <li pn="section-5.1-3.2"> Description: a terse description of the meaning of this SoP value.</li>
        </ul>
        <t indent="0" pn="section-5.1-4"> The registry initially contains the following value:</t>
        <table anchor="sop-description" align="center" pn="table-1">
          <name slugifiedName="name-sop-and-description">SoP and Description</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">SoP</th>
              <th align="left" colspan="1" rowspan="1">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0b00</td>
              <td align="left" colspan="1" rowspan="1">64-bit "PktID" and 64-bit "Cumulative" data</td>
            </tr>
          </tbody>
        </table>
        <t indent="0" pn="section-5.1-6">0b01 - 0b11 are available for assignment via the IETF Review process as per <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>.</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-5.2">
        <name slugifiedName="name-ioam-tsf-capability-registr">IOAM TSF Capability Registry</name>
        <t indent="0" pn="section-5.2-1"> This registry defines four codepoints for the IOAM TSF Capability field for identifying the timestamp format as explained in <xref target="RFC9197" sectionFormat="of" section="5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9197#section-5" derivedContent="RFC9197"/>.</t>
        <t indent="0" pn="section-5.2-2"> A new entry in this registry requires the following fields:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-5.2-3">
          <li pn="section-5.2-3.1"> TSF (TimeStamp Format): a 2-bit binary field as defined in <xref target="ioam-e2e" format="default" sectionFormat="of" derivedContent="Section 3.2.4"/>.</li>
          <li pn="section-5.2-3.2"> Description: a terse description of the meaning of this TSF value.</li>
        </ul>
        <t indent="0" pn="section-5.2-4"> The registry initially contains the following values:</t>
        <table anchor="tsf-description" align="center" pn="table-2">
          <name slugifiedName="name-tsf-and-description">TSF and Description</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">TSF</th>
              <th align="left" colspan="1" rowspan="1">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0b00</td>
              <td align="left" colspan="1" rowspan="1">PTP Truncated Timestamp Format</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">0b01</td>
              <td align="left" colspan="1" rowspan="1">NTP 64-bit Timestamp Format</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">0b10</td>
              <td align="left" colspan="1" rowspan="1">POSIX-based Timestamp Format</td>
            </tr>
          </tbody>
        </table>
        <t indent="0" pn="section-5.2-6"> 0b11 is available for assignment via the IETF Review process as per <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>.</t>
      </section>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-6-1"> Overall, the security needs for IOAM capabilities query mechanisms used in different environments are similar.</t>
      <t indent="0" pn="section-6-2"> To avoid potential Denial-of-Service (DoS) attacks, it is <bcp14>RECOMMENDED</bcp14> that implementations apply rate-limiting to 
  incoming echo requests and replies.</t>
      <t indent="0" pn="section-6-3"> To protect against unauthorized sources using echo request messages to obtain IOAM Capabilities information, 
  implementations <bcp14>MUST</bcp14> provide a means of checking the source addresses of echo request messages against an 
  access list before accepting the message.</t>
      <t indent="0" pn="section-6-4"> A deployment <bcp14>MUST</bcp14> ensure that border-filtering drops inbound echo requests with an IOAM Capabilities Container Header 
  from outside of the domain and that drops outbound echo requests or replies with IOAM Capabilities Headers leaving the domain.</t>
      <t indent="0" pn="section-6-5"> A deployment <bcp14>MUST</bcp14> support the configuration option to enable or disable the IOAM Capabilities Discovery feature defined 
  in this document. By default, the IOAM Capabilities Discovery feature <bcp14>MUST</bcp14> be disabled.</t>
      <t indent="0" pn="section-6-6"> The integrity protection on IOAM Capabilities information carried in echo reply messages can be achieved by the 
  underlying transport. For example, if the environment is an IPv6 network, the IP Authentication Header 
  <xref target="RFC4302" format="default" sectionFormat="of" derivedContent="RFC4302"/> or IP Encapsulating Security Payload Header <xref target="RFC4303" format="default" sectionFormat="of" derivedContent="RFC4303"/> can be used.</t>
      <t indent="0" pn="section-6-7"> The collected IOAM Capabilities information by queries may be considered confidential. An implementation can use 
  secure underlying transport of echo requests or replies to provide privacy protection. For example, if the environment is 
  an IPv6 network, confidentiality can be achieved by using the IP Encapsulating Security Payload Header <xref target="RFC4303" format="default" sectionFormat="of" derivedContent="RFC4303"/>.</t>
      <t indent="0" pn="section-6-8"> An implementation can also directly secure the data carried in echo requests and replies if needed, the specific 
  mechanism on how to secure the data is beyond the scope of this document.</t>
      <t indent="0" pn="section-6-9"> An implementation can also check whether the fields in received echo
      requests and replies strictly conform to the specifications, e.g.,
      whether the list of IOAM Namespace-IDs includes duplicate entries and
      whether the received Namespace-ID is an operator-assigned or
      IANA-assigned one, once a check fails, an exception event indicating the
      checked field should be reported to the management.</t>
      <t indent="0" pn="section-6-10"> Except for what's described above, the security issues discussed in <xref target="RFC9197" format="default" sectionFormat="of" derivedContent="RFC9197"/> provide good guidance on 
  implementation of this specification.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-sfc-multi-layer-oam" to="OAM-for-SFC"/>
    <displayreference target="I-D.ietf-bier-ping" to="BIER-PING"/>
    <references pn="section-7">
      <name slugifiedName="name-references">References</name>
      <references pn="section-7.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" quoteTitle="true" derivedAnchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t indent="0">Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t indent="0">To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t indent="0">This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9197" target="https://www.rfc-editor.org/info/rfc9197" quoteTitle="true" derivedAnchor="RFC9197">
          <front>
            <title>Data Fields for In Situ Operations, Administration, and Maintenance (IOAM)</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="May" year="2022"/>
            <abstract>
              <t indent="0">In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network.  This document discusses the data fields and associated data types for IOAM.  IOAM-Data-Fields can be encapsulated into a variety of protocols, such as Network Service Header (NSH), Segment Routing, Generic Network Virtualization Encapsulation (Geneve), or IPv6.  IOAM can be used to complement OAM mechanisms based on, e.g., ICMP or other types of probe packets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9197"/>
          <seriesInfo name="DOI" value="10.17487/RFC9197"/>
        </reference>
        <reference anchor="RFC9326" target="https://www.rfc-editor.org/info/rfc9326" quoteTitle="true" derivedAnchor="RFC9326">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Direct Exporting</title>
            <author fullname="H. Song" initials="H." surname="Song"/>
            <author fullname="B. Gafni" initials="B." surname="Gafni"/>
            <author fullname="F. Brockners" initials="F." surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." surname="Bhandari"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="November" year="2022"/>
            <abstract>
              <t indent="0">In situ Operations, Administration, and Maintenance (IOAM) is used for recording and collecting operational and telemetry information.  Specifically, IOAM allows telemetry data to be pushed into data packets while they traverse the network.  This document introduces a new IOAM option type (denoted IOAM-Option-Type) called the "IOAM Direct Export (DEX) Option-Type".  This Option-Type is used as a trigger for IOAM data to be directly exported or locally aggregated without being pushed into in-flight data packets.  The exporting method and format are outside the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9326"/>
          <seriesInfo name="DOI" value="10.17487/RFC9326"/>
        </reference>
      </references>
      <references pn="section-7.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.ietf-bier-ping" target="https://datatracker.ietf.org/doc/html/draft-ietf-bier-ping-08" quoteTitle="true" derivedAnchor="BIER-PING">
          <front>
            <title>BIER Ping and Trace</title>
            <author initials="N. K." surname="Nainar" fullname="Nagendra Kumar Nainar">
              <organization showOnFrontPage="true">Cisco Systems, Inc.</organization>
            </author>
            <author initials="C." surname="Pignataro" fullname="Carlos Pignataro">
              <organization showOnFrontPage="true">Cisco Systems, Inc.</organization>
            </author>
            <author initials="N." surname="Akiya" fullname="Nobo Akiya">
              <organization showOnFrontPage="true">Big Switch Networks</organization>
            </author>
            <author initials="L." surname="Zheng" fullname="Lianshu Zheng">
              <organization showOnFrontPage="true">Individual Contributor</organization>
            </author>
            <author initials="M." surname="Chen" fullname="Mach Chen">
              <organization showOnFrontPage="true">Huawei Technologies</organization>
            </author>
            <author initials="G." surname="Mirsky" fullname="Greg Mirsky">
              <organization showOnFrontPage="true">Ericsson</organization>
            </author>
            <date month="March" day="6" year="2023"/>
            <abstract>
              <t indent="0">   Bit Index Explicit Replication (BIER) is an architecture that
   provides optimal multicast forwarding through a "BIER domain" without
   requiring intermediate routers to maintain any multicast related per-
   flow state.  BIER also does not require any explicit tree-building
   protocol for its operation.  A multicast data packet enters a BIER
   domain at a "Bit-Forwarding Ingress Router" (BFIR), and leaves the
   BIER domain at one or more "Bit-Forwarding Egress Routers" (BFERs).
   The BFIR router adds a BIER header to the packet.  The BIER header
   contains a bit-string in which each bit represents exactly one BFER
   to forward the packet to.  The set of BFERs to which the multicast
   packet needs to be forwarded is expressed by setting the bits that
   correspond to those routers in the BIER header.

   This document describes the mechanism and basic BIER OAM packet
   format that can be used to perform failure detection and isolation on
   the BIER data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-bier-ping-08"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-sfc-multi-layer-oam" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-ietf-sfc-multi-layer-oam-23" derivedAnchor="OAM-for-SFC">
          <front>
            <title>Active OAM for Service Function Chaining (SFC)</title>
            <author initials="G." surname="Mirsky" fullname="Greg Mirsky">
              <organization showOnFrontPage="true">Ericsson</organization>
            </author>
            <author initials="W." surname="Meng" fullname="Wei Meng">
              <organization showOnFrontPage="true">ZTE Corporation</organization>
            </author>
            <author initials="T." surname="Ao" fullname="Ting Ao">
              <organization showOnFrontPage="true">China Mobile</organization>
            </author>
            <author initials="B." surname="Khasnabish" fullname="Bhumip Khasnabish">
              <organization showOnFrontPage="true">Individual contributor</organization>
            </author>
            <author initials="K." surname="Leung" fullname="Kent Leung">
              <organization showOnFrontPage="true">Individual contributor</organization>
            </author>
            <author initials="G." surname="Mishra" fullname="Gyan Mishra">
              <organization showOnFrontPage="true">Verizon Inc.</organization>
            </author>
            <date month="March" day="23" year="2023"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sfc-multi-layer-oam-23"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302" quoteTitle="true" derivedAnchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t indent="0">This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6.  This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" quoteTitle="true" derivedAnchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t indent="0">This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4443" target="https://www.rfc-editor.org/info/rfc4443" quoteTitle="true" derivedAnchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t indent="0">This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC4620" target="https://www.rfc-editor.org/info/rfc4620" quoteTitle="true" derivedAnchor="RFC4620">
          <front>
            <title>IPv6 Node Information Queries</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <author fullname="B. Haberman" initials="B." role="editor" surname="Haberman"/>
            <date month="August" year="2006"/>
            <abstract>
              <t indent="0">This document describes a protocol for asking an IPv6 node to supply certain network information, such as its hostname or fully-qualified domain name.  IPv6 implementation experience has shown that direct queries for a hostname are useful, and a direct query mechanism for other information has been found useful in serverless environments and for debugging.  This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4620"/>
          <seriesInfo name="DOI" value="10.17487/RFC4620"/>
        </reference>
        <reference anchor="RFC4884" target="https://www.rfc-editor.org/info/rfc4884" quoteTitle="true" derivedAnchor="RFC4884">
          <front>
            <title>Extended ICMP to Support Multi-Part Messages</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="April" year="2007"/>
            <abstract>
              <t indent="0">This document redefines selected ICMP messages to support multi-part operation. A multi-part ICMP message carries all of the information that ICMP messages carried previously, as well as additional information that applications may require.</t>
              <t indent="0">Multi-part messages are supported by an ICMP extension structure. The extension structure is situated at the end of the ICMP message. It includes an extension header followed by one or more extension objects. Each extension object contains an object header and object payload. All object headers share a common format.</t>
              <t indent="0">This document further redefines the above mentioned ICMP messages by specifying a length attribute. All of the currently defined ICMP messages to which an extension structure can be appended include an "original datagram" field. The "original datagram" field contains the initial octets of the datagram that elicited the ICMP error message. Although the original datagram field is of variable length, the ICMP message does not include a field that specifies its length. Therefore, in order to facilitate message parsing, this document allocates eight previously reserved bits to reflect the length of the "original datagram" field.</t>
              <t indent="0">The proposed modifications change the requirements for ICMP compliance. The impact of these changes on compliant implementations is discussed, and new requirements for future implementations are presented.</t>
              <t indent="0">This memo updates RFC 792 and RFC 4443. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4884"/>
          <seriesInfo name="DOI" value="10.17487/RFC4884"/>
        </reference>
        <reference anchor="RFC8029" target="https://www.rfc-editor.org/info/rfc8029" quoteTitle="true" derivedAnchor="RFC8029">
          <front>
            <title>Detecting Multiprotocol Label Switched (MPLS) Data-Plane Failures</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <author fullname="N. Kumar" initials="N." surname="Kumar"/>
            <author fullname="S. Aldrin" initials="S." surname="Aldrin"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <date month="March" year="2017"/>
            <abstract>
              <t indent="0">This document describes a simple and efficient mechanism to detect data-plane failures in Multiprotocol Label Switching (MPLS) Label Switched Paths (LSPs). It defines a probe message called an "MPLS echo request" and a response message called an "MPLS echo reply" for returning the result of the probe. The MPLS echo request is intended to contain sufficient information to check correct operation of the data plane and to verify the data plane against the control plane, thereby localizing faults.</t>
              <t indent="0">This document obsoletes RFCs 4379, 6424, 6829, and 7537, and updates RFC 1122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8029"/>
          <seriesInfo name="DOI" value="10.17487/RFC8029"/>
        </reference>
        <reference anchor="RFC8335" target="https://www.rfc-editor.org/info/rfc8335" quoteTitle="true" derivedAnchor="RFC8335">
          <front>
            <title>PROBE: A Utility for Probing Interfaces</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="R. Thomas" initials="R." surname="Thomas"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <author fullname="C. Lenart" initials="C." surname="Lenart"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="February" year="2018"/>
            <abstract>
              <t indent="0">This document describes a network diagnostic tool called PROBE.  PROBE is similar to PING in that it can be used to query the status of a probed interface, but it differs from PING in that it does not require bidirectional connectivity between the probing and probed interfaces.  Instead, PROBE requires bidirectional connectivity between the probing interface and a proxy interface.  The proxy interface can reside on the same node as the probed interface, or it can reside on a node to which the probed interface is directly connected.  This document updates RFC 4884.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8335"/>
          <seriesInfo name="DOI" value="10.17487/RFC8335"/>
        </reference>
        <reference anchor="RFC8799" target="https://www.rfc-editor.org/info/rfc8799" quoteTitle="true" derivedAnchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t indent="0">There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t indent="0">This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
      </references>
    </references>
    <section numbered="false" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1"> The authors would like to acknowledge <contact fullname="Tianran       Zhou"/>, <contact fullname="Dhruv Dhody"/>, <contact fullname="Frank       Brockners"/>, <contact fullname="Cheng Li"/>, <contact fullname="Gyan       Mishra"/>, <contact fullname="Marcus Ihlar"/>, <contact fullname="Martin       Duke"/>, <contact fullname="Chris Lonvick"/>, <contact fullname="Éric       Vyncke"/>, <contact fullname="Alvaro Retana"/>, <contact fullname="Paul       Wouters"/>, <contact fullname="Roman Danyliw"/>, <contact fullname="Lars       Eggert"/>, <contact fullname="Warren Kumari"/>, <contact fullname="John       Scudder"/>, <contact fullname="Robert Wilton"/>, <contact fullname="Erik       Kline"/>, <contact fullname="Zaheduzzaman Sarker"/>, <contact fullname="Murray Kucherawy"/>, and <contact fullname="Donald Eastlake       3rd"/> for their careful review and helpful comments.</t>
      <t indent="0" pn="section-appendix.a-2"> The authors appreciate the f2f discussion with <contact fullname="Frank Brockners"/> on this document.</t>
      <t indent="0" pn="section-appendix.a-3"> The authors would like to acknowledge <contact fullname="Tommy       Pauly"/> and <contact fullname="Ian Swett"/> for their good suggestion
      and guidance.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Xiao Min" initials="X" surname="Min">
        <organization showOnFrontPage="true">ZTE Corp.</organization>
        <address>
          <postal>
            <street/>
            <city>Nanjing</city>
            <region/>
            <code/>
            <country>China</country>
          </postal>
          <phone>+86 25 88013062</phone>
          <email>xiao.min2@zte.com.cn</email>
        </address>
      </author>
      <author fullname="Greg Mirsky" initials="G" surname="Mirsky">
        <organization showOnFrontPage="true">Ericsson</organization>
        <address>
          <postal>
            <street/>
            <city/>
            <region/>
            <code/>
            <country>United States of America</country>
          </postal>
          <phone/>
          <email>gregimirsky@gmail.com</email>
        </address>
      </author>
      <author fullname="Lei Bo" initials="L" surname="Bo">
        <organization showOnFrontPage="true">China Telecom</organization>
        <address>
          <postal>
            <street/>
            <city>Beijing</city>
            <region/>
            <code/>
            <country>China</country>
          </postal>
          <phone>+86 10 50902903</phone>
          <email>leibo@chinatelecom.cn</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
