<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-lsr-pce-discovery-security-support-13" indexInclude="true" ipr="trust200902" number="9353" prepTime="2023-01-13T17:08:02" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" updates="5088,5089,8231,8306" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-lsr-pce-discovery-security-support-13" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9353" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="IGP Extension: PCEP Security in PCED">IGP Extension for Path Computation Element Communication Protocol (PCEP) Security Capability Support in PCE Discovery (PCED)</title>
    <seriesInfo name="RFC" value="9353" stream="IETF"/>
    <author fullname="Diego R. Lopez" initials="D" surname="Lopez">
      <organization showOnFrontPage="true">Telefonica I+D</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <author fullname="Qin Wu" initials="Q." surname="Wu">
      <organization abbrev="Huawei" showOnFrontPage="true">Huawei Technologies</organization>
      <address>
        <postal>
          <extaddr>Yuhua District</extaddr>
          <street>101 Software Avenue</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
      <organization abbrev="Huawei" showOnFrontPage="true">Huawei Technologies</organization>
      <address>
        <postal>
          <extaddr>Divyashree Techno Park, Whitefield</extaddr>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code>560037</code>
          <country>India</country>
        </postal>
        <email>dhruv.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Qiufang Ma" initials="Q." surname="Ma">
      <organization abbrev="Huawei" showOnFrontPage="true">Huawei Technologies</organization>
      <address>
        <postal>
          <extaddr>Yuhua District</extaddr>
          <street>101 Software Avenue</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>maqiufang1@huawei.com</email>
      </address>
    </author>
    <author fullname="Daniel King" initials="D" surname="King">
      <organization showOnFrontPage="true">Old Dog Consulting</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>
    <date month="01" year="2023"/>
    <area>rtg</area>
    <workgroup>lsr</workgroup>
    <keyword>Path Computation Element</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">When a Path Computation Element (PCE) is a Label Switching Router
(LSR) or a server participating in the Interior Gateway Protocol (IGP), its
presence and path computation capabilities can be advertised using IGP
flooding.  The IGP extensions
      for PCE Discovery (PCED) (RFCs 5088 and 5089) define a method to
      advertise path computation capabilities using IGP flooding for OSPF and
      IS-IS, respectively. However, these specifications lack a method to
      advertise Path Computation Element Communication Protocol (PCEP)
      security (e.g., Transport Layer Security (TLS) and TCP Authentication
      Option (TCP-AO)) support capability.</t>
      <t indent="0" pn="section-abstract-2">This document defines capability flag bits for the PCE-CAP-FLAGS
      sub-TLV that can be announced as an attribute in the IGP advertisement
      to distribute PCEP security support information. In addition, this
      document updates RFCs 5088 and 5089 to allow advertisement of a Key
      ID or KEY-CHAIN-NAME sub-TLV to support TCP-AO security capability.
      This document also updates RFCs 8231 and 8306.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9353" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2023 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions-used-in-this-do">Conventions Used in This Document</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-igp-extension-for-pcep-secu">IGP Extension for PCEP Security Capability Support</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-use-of-pcep-security-capabi">Use of PCEP Security Capability Support for PCED</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-key-id-sub-tlv">KEY-ID Sub-TLV</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2.2.2">
                  <li pn="section-toc.1-1.3.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.1.1"><xref derivedContent="3.2.1" format="counter" sectionFormat="of" target="section-3.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-is-is">IS-IS</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.2.1"><xref derivedContent="3.2.2" format="counter" sectionFormat="of" target="section-3.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ospf">OSPF</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-key-chain-name-sub-tlv">KEY-CHAIN-NAME Sub-TLV</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2.3.2">
                  <li pn="section-toc.1-1.3.2.3.2.1">
                    <t indent="0" pn="section-toc.1-1.3.2.3.2.1.1"><xref derivedContent="3.3.1" format="counter" sectionFormat="of" target="section-3.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-is-is-2">IS-IS</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.3.2.2">
                    <t indent="0" pn="section-toc.1-1.3.2.3.2.2.1"><xref derivedContent="3.3.2" format="counter" sectionFormat="of" target="section-3.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ospf-2">OSPF</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-updates-to-rfcs">Updates to RFCs</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-backward-compatibility-cons">Backward Compatibility Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-management-considerations">Management Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t indent="0" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-control-of-policy-and-funct">Control of Policy and Functions</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.2">
                <t indent="0" pn="section-toc.1-1.6.2.2.1"><xref derivedContent="6.2" format="counter" sectionFormat="of" target="section-6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-information-and-data-model">Information and Data Model</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.3">
                <t indent="0" pn="section-toc.1-1.6.2.3.1"><xref derivedContent="6.3" format="counter" sectionFormat="of" target="section-6.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-liveness-detection-and-moni">Liveness Detection and Monitoring</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.4">
                <t indent="0" pn="section-toc.1-1.6.2.4.1"><xref derivedContent="6.4" format="counter" sectionFormat="of" target="section-6.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-verification-of-correct-ope">Verification of Correct Operations</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.5">
                <t indent="0" pn="section-toc.1-1.6.2.5.1"><xref derivedContent="6.5" format="counter" sectionFormat="of" target="section-6.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-on-other-proto">Requirements on Other Protocols and Functional Components</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.6">
                <t indent="0" pn="section-toc.1-1.6.2.6.1"><xref derivedContent="6.6" format="counter" sectionFormat="of" target="section-6.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-impact-on-network-operation">Impact on Network Operations</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-pce-capability-flags">PCE Capability Flags</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-pced-sub-tlv-type-indicator">PCED Sub-TLV Type Indicators</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">As described in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>, privacy and integrity are important issues for communication using the Path Computation Element Communication
      Protocol (PCEP); an attacker that intercepts a PCEP message
      could obtain sensitive information
      related to computed paths and resources. Authentication and integrity checks
      allow the receiver of a PCEP
   message to know that the message genuinely comes from the node that
   purports to have sent it and whether the message has been
   modified.</t>
      <t indent="0" pn="section-1-2">Among the possible solutions mentioned in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>, Transport Layer Security (TLS) <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/> provides support for peer
      authentication, message encryption, and integrity while TCP-AO) <xref target="RFC5925" format="default" sectionFormat="of" derivedContent="RFC5925"/>
      and Cryptographic Algorithms for TCP-AO <xref target="RFC5926" format="default" sectionFormat="of" derivedContent="RFC5926"/> offer significantly improved security for
      applications using TCP. As specified in <xref target="RFC8253" sectionFormat="of" section="4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8253#section-4" derivedContent="RFC8253"/>, the PCC needs to know whether the PCE
      server supports TLS or TCP-AO as a secure transport in order for a Path
      Computation Client (PCC) to establish a connection with a PCE server
      using TLS or TCP-AO.</t>
      <t indent="0" pn="section-1-3"><xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> and <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/> define a method
      to advertise path computation capabilities using IGP flooding for OSPF
      and IS-IS, respectively. However, these specifications lack a method to
      advertise PCEP security (e.g., TLS and TCP-AO) support capability.</t>
      <t indent="0" pn="section-1-4">This document defines capability flag bits for the PCE-CAP-FLAGS
      sub-TLV that can be announced as attributes in the IGP advertisement to
      distribute PCEP security support information. In addition, this document
      updates <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> and <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/> to allow advertisement of a KeyID or
      KEY-CHAIN-NAME sub-TLV to support TCP-AO security capability.</t>
      <t indent="0" pn="section-1-5">IANA created a top-level registry titled "Path Computation Element (PCE) Capability
      Flags" per <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/>. This document updates <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> and moves it to follow the heading of the "Interior
      Gateway Protocol (IGP) Parameters" registry.
      <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/> states that the IS-IS PCE-CAP-FLAGS sub-TLV uses the 
same registry as OSPF. This document updates <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/> to
      refer to the new IGP registry.  Further, this document updates <xref target="RFC8231" format="default" sectionFormat="of" derivedContent="RFC8231"/> where it references the registry
      location as the "Open Shortest Path First v2 (OSPFv2) Parameters" registry to the
      "Interior Gateway Protocol (IGP) Parameters" registry.

      This document also
      updates <xref target="RFC8306" format="default" sectionFormat="of" derivedContent="RFC8306"/> by changing the term "OSPF PCE
Capability Flag" to read as "Path Computation Element (PCE) Capability
Flags" and to note the corresponding registry now exists in the
"Interior Gateway Protocol (IGP) Parameters" registry.</t>
      <aside pn="section-1-6">
        <t indent="0" pn="section-1-6.1">Note that <xref target="RFC5557" format="default" sectionFormat="of" derivedContent="RFC5557"/> uses the term
      "OSPF registry" instead of the "IGP registry", whereas <xref target="RFC8623" format="default" sectionFormat="of" derivedContent="RFC8623"/> and <xref target="RFC9168" format="default" sectionFormat="of" derivedContent="RFC9168"/> use the term "OSPF Parameters" instead of "IGP
      Parameters".</t>
      </aside>
      <aside pn="section-1-7">
        <t indent="0" pn="section-1-7.1">Note that the PCEP Open message exchange is another way to discover
      PCE capabilities information; however, in this instance, the TCP-security-related key parameters need to be known before the PCEP session is
      established and the PCEP Open messages are exchanged.  Thus, the IGP advertisement and flooding mechanisms need to be
     leveraged for PCE discovery and capabilities advertisement. </t>
      </aside>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-conventions-used-in-this-do">Conventions Used in This Document</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
      </t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-igp-extension-for-pcep-secu">IGP Extension for PCEP Security Capability Support</name>
      <t indent="0" pn="section-3-1"><xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> defines a PCE Discovery (PCED) TLV carried
      in an OSPF Router Information Link State Advertisement (LSA) as defined
      in <xref target="RFC7770" format="default" sectionFormat="of" derivedContent="RFC7770"/> to facilitate PCED using OSPF. This
      document defines two capability flag bits in the OSPF PCE Capability
      Flags to indicate TCP-AO support <xref target="RFC5925" format="default" sectionFormat="of" derivedContent="RFC5925"/> <xref target="RFC5926" format="default" sectionFormat="of" derivedContent="RFC5926"/> and PCEP over TLS support
      <xref target="RFC8253" format="default" sectionFormat="of" derivedContent="RFC8253"/>, respectively.</t>
      <t indent="0" pn="section-3-2">Similarly, <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/> defines the PCED sub-TLV for use
      in PCED using IS-IS. 
This document will use the same flag for the OSPF PCE Capability Flags sub-TLV
to allow IS-IS to indicate TCP-AO support and PCEP
over TLS support, respectively.</t>
      <t indent="0" pn="section-3-3">The IANA assignments for shared OSPF and IS-IS Security Capability
      Flags are documented in <xref target="cap" format="default" sectionFormat="of" derivedContent="Section 8.1"/> of this
      document.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-use-of-pcep-security-capabi">Use of PCEP Security Capability Support for PCED</name>
        <t indent="0" pn="section-3.1-1">TCP-AO and PCEP over TLS support flag bits are advertised using IGP
        flooding. </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3.1-2">
          <li pn="section-3.1-2.1">PCE supports TCP-AO: IGP advertisement <bcp14>SHOULD</bcp14> include a TCP-AO
            support flag bit.</li>
          <li pn="section-3.1-2.2">PCE supports TLS: IGP advertisement <bcp14>SHOULD</bcp14> include PCEP over
            TLS support flag bit.</li>
        </ul>
        <t indent="0" pn="section-3.1-3">If the PCE supports multiple security mechanisms, it <bcp14>SHOULD</bcp14>
        include all corresponding flag bits in its IGP advertisement.</t>
        <t indent="0" pn="section-3.1-4">A client's configuration <bcp14>MAY</bcp14> indicate that support for a given
        security capability is required. If a client is configured to require
        that its PCE server supports TCP-AO, the client <bcp14>MUST</bcp14> verify that the
        TCP-AO flag bit in the PCE-CAP-FLAGS sub-TLV for a given server is set
        before it opens a connection to that server. Similarly, if the client
        is configured to require that its PCE server supports TLS, the client
        <bcp14>MUST</bcp14> verify that the PCEP over TLS support flag bit in the
        PCE-CAP-FLAGS sub-TLV for a given server is set before it opens a
        connection to that server.</t>
      </section>
      <section anchor="keyid" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-key-id-sub-tlv">KEY-ID Sub-TLV</name>
        <t indent="0" pn="section-3.2-1">The KEY-ID sub-TLV specifies an identifier that can be used by the
        PCC to identify the TCP-AO key (referred to as "KeyID" in <xref target="RFC5925" format="default" sectionFormat="of" derivedContent="RFC5925"/>).</t>
        <section anchor="keyid-isis" numbered="true" toc="include" removeInRFC="false" pn="section-3.2.1">
          <name slugifiedName="name-is-is">IS-IS</name>
          <t indent="0" pn="section-3.2.1-1">The KEY-ID sub-TLV <bcp14>MAY</bcp14> be present in the PCED sub-TLV carried
          within the IS-IS Router CAPABILITY TLV when the capability flag bit
          of the PCE-CAP-FLAGS sub-TLV in IS-IS is set to indicate TCP-AO support.</t>
          <t indent="0" pn="section-3.2.1-2">The KEY-ID sub-TLV has the following format:</t>
          <dl newline="false" spacing="normal" indent="3" pn="section-3.2.1-3">
            <dt pn="section-3.2.1-3.1">Type:</dt>
            <dd pn="section-3.2.1-3.2">6</dd>
            <dt pn="section-3.2.1-3.3">Length:</dt>
            <dd pn="section-3.2.1-3.4">1</dd>
            <dt pn="section-3.2.1-3.5">KeyID:</dt>
            <dd pn="section-3.2.1-3.6">The one-octet KeyID as per <xref target="RFC5925" format="default" sectionFormat="of" derivedContent="RFC5925"/> to uniquely identify the
            Master Key Tuple (MKT).</dd>
          </dl>
        </section>
        <section anchor="keyid-ospf" numbered="true" toc="include" removeInRFC="false" pn="section-3.2.2">
          <name slugifiedName="name-ospf">OSPF</name>
          <t indent="0" pn="section-3.2.2-1">Similarly, this sub-TLV <bcp14>MAY</bcp14> be present in the PCED TLV carried
          within the OSPF Router Information LSA when the capability flag bit of
          the PCE-CAP-FLAGS sub-TLV in OSPF is set to indicate TCP-AO support.</t>
          <t indent="0" pn="section-3.2.2-2">The format of the KEY-ID sub-TLV is as follows:</t>
          <artwork name="" type="" align="left" alt="" pn="section-3.2.2-3">
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              Type = 6         |             Length            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    KeyID      |                 Reserved                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</artwork>
          <dl newline="false" spacing="normal" indent="3" pn="section-3.2.2-4">
            <dt pn="section-3.2.2-4.1">Type:</dt>
            <dd pn="section-3.2.2-4.2">6</dd>
            <dt pn="section-3.2.2-4.3">Length:</dt>
            <dd pn="section-3.2.2-4.4">4</dd>
            <dt pn="section-3.2.2-4.5">KeyID:</dt>
            <dd pn="section-3.2.2-4.6">The one octet KeyID as per <xref target="RFC5925" format="default" sectionFormat="of" derivedContent="RFC5925"/>
              to uniquely identify the MKT.</dd>
            <dt pn="section-3.2.2-4.7">Reserved:</dt>
            <dd pn="section-3.2.2-4.8">
              <bcp14>MUST</bcp14> be set to zero while sending and ignored on
              receipt.</dd>
          </dl>
        </section>
      </section>
      <section anchor="keyname" numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-key-chain-name-sub-tlv">KEY-CHAIN-NAME Sub-TLV</name>
        <t indent="0" pn="section-3.3-1">The KEY-CHAIN-NAME sub-TLV specifies a key chain name that can be
        used by the PCC to identify the key chain. 
The key chain name could be manually configured
        via command-line interface (CLI) or installed in the YANG datastore (see <xref target="RFC8177" format="default" sectionFormat="of" derivedContent="RFC8177"/>) at the PCC.</t>
        <section anchor="keyname-ISIS" numbered="true" toc="include" removeInRFC="false" pn="section-3.3.1">
          <name slugifiedName="name-is-is-2">IS-IS</name>
          <t indent="0" pn="section-3.3.1-1">The KEY-CHAIN-NAME sub-TLV <bcp14>MAY</bcp14> be present in the PCED sub-TLV
          carried within the IS-IS Router CAPABILITY TLV when the capability
          flag bit of the PCE-CAP-FLAGS sub-TLV in IS-IS is set to indicate
          TCP-AO support.</t>
          <t indent="0" pn="section-3.3.1-2">The KEY-CHAIN-NAME sub-TLV has the following format:</t>
          <dl newline="false" spacing="normal" indent="3" pn="section-3.3.1-3">
            <dt pn="section-3.3.1-3.1">Type:</dt>
            <dd pn="section-3.3.1-3.2">7</dd>
            <dt pn="section-3.3.1-3.3">Length:</dt>
            <dd pn="section-3.3.1-3.4">Variable, encodes the length of the value field.</dd>
            <dt pn="section-3.3.1-3.5">Key Chain Name:</dt>
            <dd pn="section-3.3.1-3.6">The Key Chain Name contains a string of 1 to
            255 octets to be used to identify the key chain. It
            <bcp14>MUST</bcp14> be encoded using UTF-8. A receiving entity
            <bcp14>MUST NOT</bcp14> interpret invalid UTF-8 sequences and
            ignore them.  This field is not NULL terminated. UTF-8 "Shortest
            Form" encoding is <bcp14>REQUIRED</bcp14> to guard against the
            technical issues outlined in <xref target="UTR36" format="default" sectionFormat="of" derivedContent="UTR36"/>.</dd>
          </dl>
        </section>
        <section anchor="keyname-ospf" numbered="true" toc="include" removeInRFC="false" pn="section-3.3.2">
          <name slugifiedName="name-ospf-2">OSPF</name>
          <t indent="0" pn="section-3.3.2-1">Similarly, this sub-TLV <bcp14>MAY</bcp14> be present in the PCED TLV carried
          within the OSPF Router Information LSA when the capability flag bit
          of the PCE-CAP-FLAGS sub-TLV in OSPF is set to indicate TCP-AO support.
          The sub-TLV <bcp14>MUST</bcp14> be zero-padded so that the sub-TLV is 4-octet
          aligned.</t>
          <t indent="0" pn="section-3.3.2-2">The format of KEY-CHAIN-NAME sub-TLV is as follows:</t>
          <artwork name="" type="" align="left" alt="" pn="section-3.3.2-3">
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              Type = 7         |             Length            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
//                     Key Chain Name                          //
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</artwork>
          <dl newline="false" spacing="normal" indent="3" pn="section-3.3.2-4">
            <dt pn="section-3.3.2-4.1">Type:</dt>
            <dd pn="section-3.3.2-4.2">7</dd>
            <dt pn="section-3.3.2-4.3">Length:</dt>
            <dd pn="section-3.3.2-4.4">Variable, padding is not included in the Length
              field.</dd>
            <dt pn="section-3.3.2-4.5">Key Chain Name:</dt>
            <dd pn="section-3.3.2-4.6">The Key Chain Name contains a string of 1 to 255 octets
              to be used to
              identify the key chain. It <bcp14>MUST</bcp14> be encoded using UTF-8. A
              receiving entity <bcp14>MUST NOT</bcp14> interpret invalid UTF-8 sequences and ignore them.
              This field is not NULL terminated. UTF-8 "Shortest Form"
              encoding is <bcp14>REQUIRED</bcp14> to guard against the technical issues
              outlined in <xref target="UTR36" format="default" sectionFormat="of" derivedContent="UTR36"/>. The sub-TLV <bcp14>MUST</bcp14> be zero-padded so that the
              sub-TLV is 4-octet aligned.</dd>
          </dl>
        </section>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-updates-to-rfcs">Updates to RFCs</name>
      <t indent="0" pn="section-4-1"><xref target="RFC5088" sectionFormat="of" section="4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5088#section-4" derivedContent="RFC5088"/> states that no new sub-TLVs
      will be added to the PCED TLV and no new PCE information will be
      carried in the Router Information LSA. This document updates <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> by allowing the two sub-TLVs defined in this document
      to be carried in the PCED TLV advertised in the Router Information
      LSA.</t>
      <t indent="0" pn="section-4-2"><xref target="RFC5089" sectionFormat="of" section="4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5089#section-4" derivedContent="RFC5089"/> states that no new sub-TLVs
      will be added to the PCED TLV and no new PCE information will be
      carried in the Router CAPABILITY TLV. This document updates <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/> by allowing the two sub-TLVs defined in this document
      to be carried in the PCED TLV advertised in the Router CAPABILITY
      TLV.</t>
      <t indent="0" pn="section-4-3">This introduction of additional sub-TLVs should be viewed as an
      exception to the policies in <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> and <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/>, which is justified by the requirement
      to discover the PCEP security support prior to establishing a PCEP
      session. The restrictions defined in <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> and <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/> should still be
      considered to be in place. If new advertisements are required in the future,
      alternative mechanisms such as using <xref target="RFC6823" format="default" sectionFormat="of" derivedContent="RFC6823"/> or
      <xref target="I-D.ietf-lsr-ospf-transport-instance" format="default" sectionFormat="of" derivedContent="LSR-OSPF-TRANSPORT-INSTANCE"/> should be considered.</t>
      <t indent="0" pn="section-4-4">The registry for the PCE Capability Flags assigned in <xref target="RFC5557" sectionFormat="of" section="8.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5557#section-8.3" derivedContent="RFC5557"/>, <xref target="RFC8231" sectionFormat="of" section="8.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8231#section-8.1" derivedContent="RFC8231"/>, <xref target="RFC8306" sectionFormat="of" section="6.9" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8306#section-6.9" derivedContent="RFC8306"/>, <xref target="RFC8623" sectionFormat="of" section="11.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8623#section-11.1" derivedContent="RFC8623"/>, and <xref target="RFC9168" sectionFormat="of" section="10.5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9168#section-10.5" derivedContent="RFC9168"/> has changed to the
      IGP Parameters "Path Computation Element (PCE) Capability Flags"
      registry created in this document.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-backward-compatibility-cons">Backward Compatibility Considerations</name>
      <t indent="0" pn="section-5-1">An LSR that does not support the IGP PCE capability bits specified in
      this document silently ignores those bits.</t>
      <t indent="0" pn="section-5-2">An LSR that does not support the KEY-ID and KEY-CHAIN-NAME sub-TLVs
      specified in this document silently ignores those sub-TLVs.</t>
      <t indent="0" pn="section-5-3">IGP extensions defined in this document do not introduce any new
      interoperability issues.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-management-considerations">Management Considerations</name>
      <t indent="0" pn="section-6-1">Manageability considerations for PCED are addressed in <xref target="RFC4674" sectionFormat="of" section="4.10" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4674#section-4.10" derivedContent="RFC4674"/>, <xref target="RFC5088" sectionFormat="of" section="9" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5088#section-9" derivedContent="RFC5088"/>, and <xref target="RFC5089" sectionFormat="of" section="9" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5089#section-9" derivedContent="RFC5089"/>.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-6.1">
        <name slugifiedName="name-control-of-policy-and-funct">Control of Policy and Functions</name>
        <t indent="0" pn="section-6.1-1">A PCE implementation <bcp14>SHOULD</bcp14> allow the following
   parameters to be configured on the PCE:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6.1-2">
          <li pn="section-6.1-2.1">support for TCP-AO</li>
          <li pn="section-6.1-2.2">the KeyID used by TCP-AO</li>
          <li pn="section-6.1-2.3">Key Chain Name</li>
          <li pn="section-6.1-2.4">support for TLS</li>
        </ul>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-6.2">
        <name slugifiedName="name-information-and-data-model">Information and Data Model</name>
        <t indent="0" pn="section-6.2-1">The YANG module for PCEP <xref target="I-D.ietf-pce-pcep-yang" format="default" sectionFormat="of" derivedContent="PCE-PCEP-YANG"/> supports PCEP security parameters (key, key chain, and TLS).</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-6.3">
        <name slugifiedName="name-liveness-detection-and-moni">Liveness Detection and Monitoring</name>
        <t indent="0" pn="section-6.3-1">Normal operations of the IGP meet the requirements for liveness detection and monitoring.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-6.4">
        <name slugifiedName="name-verification-of-correct-ope">Verification of Correct Operations</name>
        <t indent="0" pn="section-6.4-1">The correlation of PCEP security information advertised against information
   received can be achieved by comparing the information in the PCED
   sub-TLV received by the PCC with that stored at the PCE using the
   PCEP YANG.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-6.5">
        <name slugifiedName="name-requirements-on-other-proto">Requirements on Other Protocols and Functional Components</name>
        <t indent="0" pn="section-6.5-1">There are no new requirements on other protocols.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-6.6">
        <name slugifiedName="name-impact-on-network-operation">Impact on Network Operations</name>
        <t indent="0" pn="section-6.6-1">Frequent changes in PCEP security information advertised in the
        PCED sub-TLV may have a significant impact on IGP and might
        destabilize the operation of the network by causing the PCCs to
        reconnect sessions with PCEs.  <xref target="RFC4674" sectionFormat="of" section="4.10.4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4674#section-4.10.4" derivedContent="RFC4674"/>, <xref target="RFC5088" sectionFormat="of" section="9.6" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5088#section-9.6" derivedContent="RFC5088"/>, and <xref target="RFC5089" sectionFormat="of" section="9.6" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5089#section-9.6" derivedContent="RFC5089"/> list techniques that are applicable to this
        document as well.</t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-7-1">Security considerations as specified by <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> and
      <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/> are applicable to this document.</t>
      <t indent="0" pn="section-7-2">As described in <xref target="RFC5440" sectionFormat="of" section="10.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5440#section-10.2" derivedContent="RFC5440"/>, a PCEP speaker <bcp14>MUST</bcp14>
      support TCP MD5 <xref target="RFC2385" format="default" sectionFormat="of" derivedContent="RFC2385"/>, so no capability advertisement is needed to
      indicate support. However, as noted in <xref target="RFC6952" format="default" sectionFormat="of" derivedContent="RFC6952"/>, TCP MD5 has been
      obsoleted by TCP-AO <xref target="RFC5925" format="default" sectionFormat="of" derivedContent="RFC5925"/> because of security concerns. TCP-AO is not widely implemented; therefore, it is <bcp14>RECOMMENDED</bcp14>
      that PCEP be secured using TLS per <xref target="RFC8253" format="default" sectionFormat="of" derivedContent="RFC8253"/> (which updates <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>).
      An implementation <bcp14>SHOULD</bcp14> offer at least one of the two
      security capabilities defined in this document.</t>
      <t indent="0" pn="section-7-3">The information related to PCEP security is sensitive and due care
      needs to be taken by the operator. This document defines new capability
      bits that are susceptible to a downgrade attack by setting them to zero.
      The content of the Key-ID or KEY-CHAIN-NAME sub-TLV can be altered to enable
      an on-path attack.  Thus, before advertising the PCEP security parameters by using the
mechanism described in this document, the IGP <bcp14>MUST</bcp14> be known to provide
authentication and integrity for the PCED TLV using the mechanisms
defined in <xref target="RFC5304" format="default" sectionFormat="of" derivedContent="RFC5304"/>, <xref target="RFC5310" format="default" sectionFormat="of" derivedContent="RFC5310"/>, or <xref target="RFC5709" format="default" sectionFormat="of" derivedContent="RFC5709"/>.</t>
      <t indent="0" pn="section-7-4">Moreover, as stated in the security considerations of <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> and
      <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/>, there are no mechanisms defined in OSPF or IS-IS to protect
      the confidentiality of the PCED TLV. 

For this reason, the operator must
      ensure that no private data is carried in the TLV. For example, the operator must ensure that KeyIDs or
      key chain names do not reveal sensitive information about the
      network.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <section anchor="cap" numbered="true" toc="include" removeInRFC="false" pn="section-8.1">
        <name slugifiedName="name-pce-capability-flags">PCE Capability Flags</name>
        <t indent="0" pn="section-8.1-1">IANA has moved the "Path Computation Element (PCE)
        Capability Flags" registry from the "Open Shortest Path First v2
        (OSPFv2) Parameters" grouping to the "Interior Gateway Protocol (IGP)
        Parameters" grouping.</t>
        <t indent="0" pn="section-8.1-2">IANA has made the following additional assignments from
        the "Path Computation Element (PCE) Capability Flags" registry:</t>
        <table anchor="PCEFlags" align="center" pn="table-1">
          <name slugifiedName="name-path-computation-element-pc">Path Computation Element (PCE) Capability Flags Registrations</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Bit</th>
              <th align="left" colspan="1" rowspan="1">Capability Description</th>
              <th align="left" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">17</td>
              <td align="left" colspan="1" rowspan="1">TCP-AO Support</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">18</td>
              <td align="left" colspan="1" rowspan="1">PCEP over TLS support</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353</td>
            </tr>
          </tbody>
        </table>
        <t indent="0" pn="section-8.1-4">The grouping is located at:
        <eref target="https://www.iana.org/assignments/igp-parameters/" brackets="angle"/>.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-8.2">
        <name slugifiedName="name-pced-sub-tlv-type-indicator">PCED Sub-TLV Type Indicators</name>
        <t indent="0" pn="section-8.2-1">The PCED sub-TLVs are defined in <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> and
        <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/>, but a corresponding IANA registry was not created.
        IANA has created a new registry called "PCE Discovery (PCED)
        Sub-TLV Type Indicators" under the "Interior Gateway Protocol (IGP)
        Parameters" registry.  The registration policy for this registry is
        "Standards Action" <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>. Values in this registry come from the range
        0-65535.</t>
        <t indent="0" pn="section-8.2-2">This registry is initially populated as follows:</t>
        <table anchor="PCEDIndicators" align="center" pn="table-2">
          <name slugifiedName="name-initial-contents-of-the-pce">Initial Contents of the PCED Sub-TLV Type Indicators Registry</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Value</th>
              <th align="left" colspan="1" rowspan="1">Description</th>
              <th align="left" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0</td>
              <td align="left" colspan="1" rowspan="1">Reserved</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353, RFC 5088</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">1</td>
              <td align="left" colspan="1" rowspan="1">PCE-ADDRESS</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353, RFC 5088</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">2</td>
              <td align="left" colspan="1" rowspan="1">PATH-SCOPE</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353, RFC 5088</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">3</td>
              <td align="left" colspan="1" rowspan="1">PCE-DOMAIN</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353, RFC 5088</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">4</td>
              <td align="left" colspan="1" rowspan="1">NEIG-PCE-DOMAIN</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353, RFC 5088</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">5</td>
              <td align="left" colspan="1" rowspan="1">PCE-CAP-FLAGS</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353, RFC 5088</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">6</td>
              <td align="left" colspan="1" rowspan="1">KEY-ID</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">7</td>
              <td align="left" colspan="1" rowspan="1">KEY-CHAIN-NAME</td>
              <td align="left" colspan="1" rowspan="1">RFC 9353</td>
            </tr>
          </tbody>
        </table>
        <t indent="0" pn="section-8.2-4">This registry is used by both the OSPF PCED TLV and the IS-IS PCED
        sub-TLV.</t>
        <t indent="0" pn="section-8.2-5">This grouping is located at:
        <eref target="https://www.iana.org/assignments/igp-parameters/" brackets="angle"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-pce-pcep-yang" to="PCE-PCEP-YANG"/>
    <displayreference target="I-D.ietf-lsr-ospf-transport-instance" to="LSR-OSPF-TRANSPORT-INSTANCE"/>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          <format target="https://www.rfc-editor.org/info/rfc2119" type="TXT"/>
        </reference>
        <reference anchor="RFC5088" target="https://www.rfc-editor.org/info/rfc5088" quoteTitle="true" derivedAnchor="RFC5088">
          <front>
            <title>OSPF Protocol Extensions for Path Computation Element (PCE) Discovery</title>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="Y. Ikejiri" initials="Y." surname="Ikejiri"/>
            <author fullname="R. Zhang" initials="R." surname="Zhang"/>
            <date month="January" year="2008"/>
            <abstract>
              <t indent="0">There are various circumstances where it is highly desirable for a Path Computation Client (PCC) to be able to dynamically and automatically discover a set of Path Computation Elements (PCEs), along with information that can be used by the PCC for PCE selection.  When the PCE is a Label Switching Router (LSR) participating in the Interior Gateway Protocol (IGP), or even a server participating passively in the IGP, a simple and efficient way to announce PCEs consists of using IGP flooding.  For that purpose, this document defines extensions to the Open Shortest Path First (OSPF) routing protocol for the advertisement of PCE Discovery information within an OSPF area or within the entire OSPF routing domain. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5088"/>
          <seriesInfo name="DOI" value="10.17487/RFC5088"/>
          <format target="https://www.rfc-editor.org/info/rfc5088" type="TXT"/>
        </reference>
        <reference anchor="RFC5089" target="https://www.rfc-editor.org/info/rfc5089" quoteTitle="true" derivedAnchor="RFC5089">
          <front>
            <title>IS-IS Protocol Extensions for Path Computation Element (PCE) Discovery</title>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="Y. Ikejiri" initials="Y." surname="Ikejiri"/>
            <author fullname="R. Zhang" initials="R." surname="Zhang"/>
            <date month="January" year="2008"/>
            <abstract>
              <t indent="0">There are various circumstances where it is highly desirable for a Path Computation Client (PCC) to be able to dynamically and automatically discover a set of Path Computation Elements (PCEs), along with information that can be used by the PCC for PCE selection.  When the PCE is a Label Switching Router (LSR) participating in the Interior Gateway Protocol (IGP), or even a server participating passively in the IGP, a simple and efficient way to announce PCEs consists of using IGP flooding.  For that purpose, this document defines extensions to the Intermediate System to Intermediate System (IS-IS) routing protocol for the advertisement of PCE Discovery information within an IS-IS area or within the entire IS-IS routing domain. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5089"/>
          <seriesInfo name="DOI" value="10.17487/RFC5089"/>
          <format target="https://www.rfc-editor.org/info/rfc5089" type="TXT"/>
        </reference>
        <reference anchor="RFC5304" target="https://www.rfc-editor.org/info/rfc5304" quoteTitle="true" derivedAnchor="RFC5304">
          <front>
            <title>IS-IS Cryptographic Authentication</title>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="R. Atkinson" initials="R." surname="Atkinson"/>
            <date month="October" year="2008"/>
            <abstract>
              <t indent="0">This document describes the authentication of Intermediate System to Intermediate System (IS-IS) Protocol Data Units (PDUs) using the Hashed Message Authentication Codes - Message Digest 5 (HMAC-MD5) algorithm as found in RFC 2104. IS-IS is specified in International Standards Organization (ISO) 10589, with extensions to support Internet Protocol version 4 (IPv4) described in RFC 1195. The base specification includes an authentication mechanism that allows for multiple authentication algorithms. The base specification only specifies the algorithm for cleartext passwords. This document replaces RFC 3567.</t>
              <t indent="0">This document proposes an extension to that specification that allows the use of the HMAC-MD5 authentication algorithm to be used in conjunction with the existing authentication mechanisms. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5304"/>
          <seriesInfo name="DOI" value="10.17487/RFC5304"/>
          <format target="https://www.rfc-editor.org/info/rfc5304" type="TXT"/>
        </reference>
        <reference anchor="RFC5310" target="https://www.rfc-editor.org/info/rfc5310" quoteTitle="true" derivedAnchor="RFC5310">
          <front>
            <title>IS-IS Generic Cryptographic Authentication</title>
            <author fullname="M. Bhatia" initials="M." surname="Bhatia"/>
            <author fullname="V. Manral" initials="V." surname="Manral"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="R. Atkinson" initials="R." surname="Atkinson"/>
            <author fullname="R. White" initials="R." surname="White"/>
            <author fullname="M. Fanto" initials="M." surname="Fanto"/>
            <date month="February" year="2009"/>
            <abstract>
              <t indent="0">This document proposes an extension to Intermediate System to Intermediate System (IS-IS) to allow the use of any cryptographic authentication algorithm in addition to the already-documented authentication schemes, described in the base specification and RFC 5304. IS-IS is specified in International Standards Organization (ISO) 10589, with extensions to support Internet Protocol version 4 (IPv4) described in RFC 1195.</t>
              <t indent="0">Although this document has been written specifically for using the Hashed Message Authentication Code (HMAC) construct along with the Secure Hash Algorithm (SHA) family of cryptographic hash functions, the method described in this document is generic and can be used to extend IS-IS to support any cryptographic hash function in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5310"/>
          <seriesInfo name="DOI" value="10.17487/RFC5310"/>
          <format target="https://www.rfc-editor.org/info/rfc5310" type="TXT"/>
        </reference>
        <reference anchor="RFC5557" target="https://www.rfc-editor.org/info/rfc5557" quoteTitle="true" derivedAnchor="RFC5557">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Requirements and Protocol Extensions in Support of Global Concurrent Optimization</title>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <author fullname="E. Oki" initials="E." surname="Oki"/>
            <date month="July" year="2009"/>
            <abstract>
              <t indent="0">The Path Computation Element Communication Protocol (PCEP) allows Path Computation Clients (PCCs) to request path computations from Path Computation Elements (PCEs), and lets the PCEs return responses. When computing or reoptimizing the routes of a set of Traffic Engineering Label Switched Paths (TE LSPs) through a network, it may be advantageous to perform bulk path computations in order to avoid blocking problems and to achieve more optimal network-wide solutions. Such bulk optimization is termed Global Concurrent Optimization (GCO). A GCO is able to simultaneously consider the entire topology of the network and the complete set of existing TE LSPs, and their respective constraints, and look to optimize or reoptimize the entire network to satisfy all constraints for all TE LSPs. A GCO may also be applied to some subset of the TE LSPs in a network. The GCO application is primarily a Network Management System (NMS) solution.</t>
              <t indent="0">This document provides application-specific requirements and the PCEP extensions in support of GCO applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5557"/>
          <seriesInfo name="DOI" value="10.17487/RFC5557"/>
          <format target="https://www.rfc-editor.org/info/rfc5557" type="TXT"/>
        </reference>
        <reference anchor="RFC5709" target="https://www.rfc-editor.org/info/rfc5709" quoteTitle="true" derivedAnchor="RFC5709">
          <front>
            <title>OSPFv2 HMAC-SHA Cryptographic Authentication</title>
            <author fullname="M. Bhatia" initials="M." surname="Bhatia"/>
            <author fullname="V. Manral" initials="V." surname="Manral"/>
            <author fullname="M. Fanto" initials="M." surname="Fanto"/>
            <author fullname="R. White" initials="R." surname="White"/>
            <author fullname="M. Barnes" initials="M." surname="Barnes"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="R. Atkinson" initials="R." surname="Atkinson"/>
            <date month="October" year="2009"/>
            <abstract>
              <t indent="0">This document describes how the National Institute of Standards and Technology (NIST) Secure Hash Standard family of algorithms can be used with OSPF version 2's built-in, cryptographic authentication mechanism.  This updates, but does not supercede, the cryptographic authentication mechanism specified in RFC 2328. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5709"/>
          <seriesInfo name="DOI" value="10.17487/RFC5709"/>
          <format target="https://www.rfc-editor.org/info/rfc5709" type="TXT"/>
        </reference>
        <reference anchor="RFC5925" target="https://www.rfc-editor.org/info/rfc5925" quoteTitle="true" derivedAnchor="RFC5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t indent="0">This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5).  TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5.  TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints.  The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes.  TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously.  TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
          <format target="https://www.rfc-editor.org/info/rfc5925" type="TXT"/>
        </reference>
        <reference anchor="RFC7770" target="https://www.rfc-editor.org/info/rfc7770" quoteTitle="true" derivedAnchor="RFC7770">
          <front>
            <title>Extensions to OSPF for Advertising Optional Router Capabilities</title>
            <author fullname="A. Lindem" initials="A." role="editor" surname="Lindem"/>
            <author fullname="N. Shen" initials="N." surname="Shen"/>
            <author fullname="JP. Vasseur" initials="JP." surname="Vasseur"/>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="S. Shaffer" initials="S." surname="Shaffer"/>
            <date month="February" year="2016"/>
            <abstract>
              <t indent="0">It is useful for routers in an OSPFv2 or OSPFv3 routing domain to know the capabilities of their neighbors and other routers in the routing domain.  This document proposes extensions to OSPFv2 and OSPFv3 for advertising optional router capabilities.  The Router Information (RI) Link State Advertisement (LSA) is defined for this purpose.  In OSPFv2, the RI LSA will be implemented with an Opaque LSA type ID.  In OSPFv3, the RI LSA will be implemented with a unique LSA type function code.  In both protocols, the RI LSA can be advertised at any of the defined flooding scopes (link, area, or autonomous system (AS)).  This document obsoletes RFC 4970 by providing a revised specification that includes support for advertisement of multiple instances of the RI LSA and a TLV for functional capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7770"/>
          <seriesInfo name="DOI" value="10.17487/RFC7770"/>
          <format target="https://www.rfc-editor.org/info/rfc7770" type="TXT"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" quoteTitle="true" derivedAnchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t indent="0">Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t indent="0">To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t indent="0">This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
          <format target="https://www.rfc-editor.org/info/rfc8126" type="TXT"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          <format target="https://www.rfc-editor.org/info/rfc8174" type="TXT"/>
        </reference>
        <reference anchor="RFC8177" target="https://www.rfc-editor.org/info/rfc8177" quoteTitle="true" derivedAnchor="RFC8177">
          <front>
            <title>YANG Data Model for Key Chains</title>
            <author fullname="A. Lindem" initials="A." role="editor" surname="Lindem"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="D. Yeung" initials="D." surname="Yeung"/>
            <author fullname="I. Chen" initials="I." surname="Chen"/>
            <author fullname="J. Zhang" initials="J." surname="Zhang"/>
            <date month="June" year="2017"/>
            <abstract>
              <t indent="0">This document describes the key chain YANG data model.  Key chains are commonly used for routing protocol authentication and other applications requiring symmetric keys.  A key chain is a list containing one or more elements containing a Key ID, key string, send/accept lifetimes, and the associated authentication or encryption algorithm.  By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated.  By representing them in a YANG data model, key distribution can be automated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8177"/>
          <seriesInfo name="DOI" value="10.17487/RFC8177"/>
          <format target="https://www.rfc-editor.org/info/rfc8177" type="TXT"/>
        </reference>
        <reference anchor="RFC8231" target="https://www.rfc-editor.org/info/rfc8231" quoteTitle="true" derivedAnchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t indent="0">The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t indent="0">Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
          <format target="https://www.rfc-editor.org/info/rfc8231" type="TXT"/>
        </reference>
        <reference anchor="RFC8253" target="https://www.rfc-editor.org/info/rfc8253" quoteTitle="true" derivedAnchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <date month="October" year="2017"/>
            <abstract>
              <t indent="0">The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP. The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t indent="0">This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
          <format target="https://www.rfc-editor.org/info/rfc8253" type="TXT"/>
        </reference>
        <reference anchor="RFC8306" target="https://www.rfc-editor.org/info/rfc8306" quoteTitle="true" derivedAnchor="RFC8306">
          <front>
            <title>Extensions to the Path Computation Element Communication Protocol (PCEP) for Point-to-Multipoint Traffic Engineering Label Switched Paths</title>
            <author fullname="Q. Zhao" initials="Q." surname="Zhao"/>
            <author fullname="D. Dhody" initials="D." role="editor" surname="Dhody"/>
            <author fullname="R. Palleti" initials="R." surname="Palleti"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="November" year="2017"/>
            <abstract>
              <t indent="0">Point-to-point Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering Label Switched Paths (TE LSPs) may be established using signaling techniques, but their paths may first need to be determined. The Path Computation Element (PCE) has been identified as an appropriate technology for the determination of the paths of point-to-multipoint (P2MP) TE LSPs.</t>
              <t indent="0">This document describes extensions to the PCE Communication Protocol (PCEP) to handle requests and responses for the computation of paths for P2MP TE LSPs.</t>
              <t indent="0">This document obsoletes RFC 6006.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8306"/>
          <seriesInfo name="DOI" value="10.17487/RFC8306"/>
          <format target="https://www.rfc-editor.org/info/rfc8306" type="TXT"/>
        </reference>
        <reference anchor="RFC8623" target="https://www.rfc-editor.org/info/rfc8623" quoteTitle="true" derivedAnchor="RFC8623">
          <front>
            <title>Stateful Path Computation Element (PCE) Protocol Extensions for Usage with Point-to-Multipoint TE Label Switched Paths (LSPs)</title>
            <author fullname="U. Palle" initials="U." surname="Palle"/>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Tanaka" initials="Y." surname="Tanaka"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <date month="June" year="2019"/>
            <abstract>
              <t indent="0">The Path Computation Element (PCE) has been identified as an appropriate technology for the determination of the paths of point- to-multipoint (P2MP) TE Label Switched Paths (LSPs).  This document provides extensions required for the Path Computation Element Communication Protocol (PCEP) so as to enable the usage of a stateful PCE capability in supporting P2MP TE LSPs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8623"/>
          <seriesInfo name="DOI" value="10.17487/RFC8623"/>
          <format target="https://www.rfc-editor.org/info/rfc8623" type="TXT"/>
        </reference>
        <reference anchor="RFC9168" target="https://www.rfc-editor.org/info/rfc9168" quoteTitle="true" derivedAnchor="RFC9168">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extension for Flow Specification</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="January" year="2022"/>
            <abstract>
              <t indent="0">The Path Computation Element (PCE) is a functional component capable of selecting paths through a traffic engineering (TE) network. These paths may be supplied in response to requests for computation or may be unsolicited requests issued by the PCE to network elements. Both approaches use the PCE Communication Protocol (PCEP) to convey the details of the computed path.</t>
              <t indent="0">Traffic flows may be categorized and described using "Flow Specifications". RFC 8955 defines the Flow Specification and describes how Flow Specification components are used to describe traffic flows. RFC 8955 also defines how Flow Specifications may be distributed in BGP to allow specific traffic flows to be associated with routes.</t>
              <t indent="0">This document specifies a set of extensions to PCEP to support dissemination of Flow Specifications. This allows a PCE to indicate what traffic should be placed on each path that it is aware of.</t>
              <t indent="0">The extensions defined in this document include the creation, update, and withdrawal of Flow Specifications via PCEP and can be applied to tunnels initiated by the PCE or to tunnels where control is delegated to the PCE by the Path Computation Client (PCC). Furthermore, a PCC requesting a new path can include Flow Specifications in the request to indicate the purpose of the tunnel allowing the PCE to factor this into the path computation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9168"/>
          <seriesInfo name="DOI" value="10.17487/RFC9168"/>
          <format target="https://www.rfc-editor.org/info/rfc9168" type="TXT"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.ietf-lsr-ospf-transport-instance" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-ietf-lsr-ospf-transport-instance-04" derivedAnchor="LSR-OSPF-TRANSPORT-INSTANCE">
          <front>
            <title>OSPF-GT (Generalized Transport)</title>
            <author initials="A." surname="Lindem" fullname="Acee Lindem">
              <organization showOnFrontPage="true">Cisco Systems</organization>
            </author>
            <author initials="Y." surname="Qu" fullname="Yingzhen Qu">
              <organization showOnFrontPage="true">Futurewei</organization>
            </author>
            <author initials="A." surname="Roy" fullname="Abhay Roy">
              <organization showOnFrontPage="true">Arrcus, Inc.</organization>
            </author>
            <author initials="S." surname="Mirtorabi" fullname="Sina Mirtorabi">
              <organization showOnFrontPage="true">Cisco Systems</organization>
            </author>
            <date month="January" day="3" year="2023"/>
            <abstract>
              <t indent="0">   OSPFv2 and OSPFv3 include a reliable flooding mechanism to
   disseminate routing topology and Traffic Engineering (TE) information
   within a routing domain.  Given the effectiveness of these
   mechanisms, it is advantageous to use the same mechanism for
   dissemination of other types of information within the domain.
   However, burdening OSPF with this additional information will impact
   intra-domain routing convergence and possibly jeopardize the
   stability of the OSPF routing domain.  This document presents
   mechanisms to advertise this non-routing information in separate OSPF
   Generalized Transport (OSPF-GT) instances.

   OSPF-GT is not constrained to the semantics as traditional OSPF.
   OSPF-GT neighbors are not required to be directly attached since they
   are never used to compute hop-by-hop routing.  Consequently,
   independent sparse topologies can be defined to dissemenate non-
   routing information only to those OSPF-GT routers requiring it.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lsr-ospf-transport-instance-04"/>
          <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-lsr-ospf-transport-instance-04.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-pce-pcep-yang" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-ietf-pce-pcep-yang-20" derivedAnchor="PCE-PCEP-YANG">
          <front>
            <title>A YANG Data Model for Path Computation Element Communications Protocol (PCEP)</title>
            <author initials="D." surname="Dhody" fullname="Dhruv Dhody" role="editor">
              <organization showOnFrontPage="true">Huawei Technologies</organization>
            </author>
            <author initials="V." surname="Beeram" fullname="Vishnu Pavan Beeram">
              <organization showOnFrontPage="true">Juniper Networks</organization>
            </author>
            <author initials="J." surname="Hardwick" fullname="Jonathan Hardwick">
              <organization showOnFrontPage="true">Microsoft</organization>
            </author>
            <author initials="J." surname="Tantsura" fullname="Jeff Tantsura">
              <organization showOnFrontPage="true">Microsoft</organization>
            </author>
            <date month="October" day="23" year="2022"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pce-pcep-yang-20"/>
          <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-pce-pcep-yang-20.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC2385" target="https://www.rfc-editor.org/info/rfc2385" quoteTitle="true" derivedAnchor="RFC2385">
          <front>
            <title>Protection of BGP Sessions via the TCP MD5 Signature Option</title>
            <author fullname="A. Heffernan" initials="A." surname="Heffernan"/>
            <date month="August" year="1998"/>
            <abstract>
              <t indent="0">This memo describes a TCP extension to enhance security for BGP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2385"/>
          <seriesInfo name="DOI" value="10.17487/RFC2385"/>
          <format target="https://www.rfc-editor.org/info/rfc2385" type="TXT"/>
        </reference>
        <reference anchor="RFC4674" target="https://www.rfc-editor.org/info/rfc4674" quoteTitle="true" derivedAnchor="RFC4674">
          <front>
            <title>Requirements for Path Computation Element (PCE) Discovery</title>
            <author fullname="J.L. Le Roux" initials="J.L." role="editor" surname="Le Roux"/>
            <date month="October" year="2006"/>
            <abstract>
              <t indent="0">This document presents a set of requirements for a Path Computation Element (PCE) discovery mechanism that would allow a Path Computation Client (PCC) to discover dynamically and automatically a set of PCEs along with certain information relevant for PCE selection.  It is intended that solutions that specify procedures and protocols or extensions to existing protocols for such PCE discovery satisfy these requirements.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4674"/>
          <seriesInfo name="DOI" value="10.17487/RFC4674"/>
          <format target="https://www.rfc-editor.org/info/rfc4674" type="TXT"/>
        </reference>
        <reference anchor="RFC5440" target="https://www.rfc-editor.org/info/rfc5440" quoteTitle="true" derivedAnchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t indent="0">This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs.  Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering.  PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
          <format target="https://www.rfc-editor.org/info/rfc5440" type="TXT"/>
        </reference>
        <reference anchor="RFC5926" target="https://www.rfc-editor.org/info/rfc5926" quoteTitle="true" derivedAnchor="RFC5926">
          <front>
            <title>Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)</title>
            <author fullname="G. Lebovitz" initials="G." surname="Lebovitz"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="June" year="2010"/>
            <abstract>
              <t indent="0">The TCP Authentication Option (TCP-AO) relies on security algorithms to provide authentication between two end-points.  There are many such algorithms available, and two TCP-AO systems cannot interoperate unless they are using the same algorithms.  This document specifies the algorithms and attributes that can be used in TCP-AO's current manual keying mechanism and provides the interface for future message authentication codes (MACs). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5926"/>
          <seriesInfo name="DOI" value="10.17487/RFC5926"/>
          <format target="https://www.rfc-editor.org/info/rfc5926" type="TXT"/>
        </reference>
        <reference anchor="RFC6823" target="https://www.rfc-editor.org/info/rfc6823" quoteTitle="true" derivedAnchor="RFC6823">
          <front>
            <title>Advertising Generic Information in IS-IS</title>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <date month="December" year="2012"/>
            <abstract>
              <t indent="0">This document describes the manner in which generic application information (i.e., information not directly related to the operation of the Intermediate System to Intermediate System (IS-IS) protocol) should be advertised in IS-IS Link State Protocol Data Units (LSPs) and defines guidelines that should be used when flooding such information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6823"/>
          <seriesInfo name="DOI" value="10.17487/RFC6823"/>
          <format target="https://www.rfc-editor.org/info/rfc6823" type="TXT"/>
        </reference>
        <reference anchor="RFC6952" target="https://www.rfc-editor.org/info/rfc6952" quoteTitle="true" derivedAnchor="RFC6952">
          <front>
            <title>Analysis of BGP, LDP, PCEP, and MSDP Issues According to the Keying and Authentication for Routing Protocols (KARP) Design Guide</title>
            <author fullname="M. Jethanandani" initials="M." surname="Jethanandani"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="L. Zheng" initials="L." surname="Zheng"/>
            <date month="May" year="2013"/>
            <abstract>
              <t indent="0">This document analyzes TCP-based routing protocols, the Border Gateway Protocol (BGP), the Label Distribution Protocol (LDP), the Path Computation Element Communication Protocol (PCEP), and the Multicast Source Distribution Protocol (MSDP), according to guidelines set forth in Section 4.2 of "Keying and Authentication for Routing Protocols Design Guidelines", RFC 6518.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6952"/>
          <seriesInfo name="DOI" value="10.17487/RFC6952"/>
          <format target="https://www.rfc-editor.org/info/rfc6952" type="TXT"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
          <format target="https://www.rfc-editor.org/info/rfc8446" type="TXT"/>
        </reference>
        <reference anchor="UTR36" target="https://www.unicode.org/unicode/reports/tr36/" quoteTitle="true" derivedAnchor="UTR36">
          <front>
            <title>Unicode Security Considerations</title>
            <author fullname="Mark Davis" initials="M." surname="Davis" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="M. Suignard" initials="M." surname="Suignard" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="August" year="2010"/>
          </front>
          <refcontent>Unicode Technical Report #36</refcontent>
        </reference>
      </references>
    </references>
    <section numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.a-1">The authors of this document would like to thank <contact fullname="Acee Lindem"/>, <contact fullname="Julien Meuric"/>, <contact fullname="Les Ginsberg"/>, <contact fullname="Ketan Talaulikar"/>,
      <contact fullname="Tom Petch"/>, <contact fullname="Aijun Wang"/>, and
      <contact fullname="Adrian Farrel"/> for the review and comments.</t>
      <t indent="0" pn="section-appendix.a-2">The authors would also like to give special thanks to <contact fullname="Michale Wang"/> for his major contributions to the initial
      draft version.</t>
      <t indent="0" pn="section-appendix.a-3">Thanks to <contact fullname="John Scudder"/> for providing an
      excellent AD review. Thanks to <contact fullname="Carlos Pignataro"/>,
      <contact fullname="Yaron Sheffer"/>, <contact fullname="Ron Bonica"/>,
      and <contact fullname="Will (Shucheng) LIU"/> for directorate reviews.
      </t>
      <t indent="0" pn="section-appendix.a-4">Thanks to <contact fullname="Lars Eggert"/>, <contact fullname="Robert Wilton"/>, <contact fullname="Roman Danyliw"/>,
      <contact fullname="Éric Vyncke"/>, <contact fullname="Paul Wouters"/>,
      <contact fullname="Murray Kucherawy"/>, and <contact fullname="Warren       Kumari"/> for IESG reviews.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Diego R. Lopez" initials="D" surname="Lopez">
        <organization showOnFrontPage="true">Telefonica I+D</organization>
        <address>
          <postal>
            <country>Spain</country>
          </postal>
          <email>diego.r.lopez@telefonica.com</email>
        </address>
      </author>
      <author fullname="Qin Wu" initials="Q." surname="Wu">
        <organization abbrev="Huawei" showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <postal>
            <extaddr>Yuhua District</extaddr>
            <street>101 Software Avenue</street>
            <city>Nanjing</city>
            <region>Jiangsu</region>
            <code>210012</code>
            <country>China</country>
          </postal>
          <email>bill.wu@huawei.com</email>
        </address>
      </author>
      <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
        <organization abbrev="Huawei" showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <postal>
            <extaddr>Divyashree Techno Park, Whitefield</extaddr>
            <city>Bangalore</city>
            <region>Karnataka</region>
            <code>560037</code>
            <country>India</country>
          </postal>
          <email>dhruv.ietf@gmail.com</email>
        </address>
      </author>
      <author fullname="Qiufang Ma" initials="Q." surname="Ma">
        <organization abbrev="Huawei" showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <postal>
            <extaddr>Yuhua District</extaddr>
            <street>101 Software Avenue</street>
            <city>Nanjing</city>
            <region>Jiangsu</region>
            <code>210012</code>
            <country>China</country>
          </postal>
          <email>maqiufang1@huawei.com</email>
        </address>
      </author>
      <author fullname="Daniel King" initials="D" surname="King">
        <organization showOnFrontPage="true">Old Dog Consulting</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>daniel@olddog.co.uk</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
