Skip to main content

SCION Control Plane
draft-dekater-scion-controlplane-06

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Active".
Authors Corine de Kater , Nicola Rustignoli , Samuel Hitz
Last updated 2024-10-19 (Latest revision 2024-07-21)
RFC stream Independent Submission
Formats
Stream ISE state Response to Review Needed
Consensus boilerplate Unknown
Document shepherd (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-dekater-scion-controlplane-06
Network Working Group                                        C. de Kater
Internet-Draft                                             N. Rustignoli
Intended status: Informational                         SCION Association
Expires: 22 April 2025                                           S. Hitz
                                                         Anapaya Systems
                                                         19 October 2024

                          SCION Control Plane
                  draft-dekater-scion-controlplane-06

Abstract

   This document describes the Control Plane of the path-aware, inter-
   domain network architecture SCION (Scalability, Control, and
   Isolation On Next-generation networks).  One of the basic
   characteristics of SCION is that it gives path control to SCION-
   capable endpoints that can choose between multiple path options,
   enabling the optimization of network paths.  The Control Plane is
   responsible for discovering these paths and making them available to
   the endpoints.

   The main goal of the SCION Control Plane is to create and manage path
   segments which can then be combined into forwarding paths to transmit
   packets in the data plane.  This document discusses how path
   exploration is realized through beaconing and how path segments are
   created and registered.  Each SCION Autonomous System (AS) can
   register segments according to its own policy and can specify which
   path properties and algorithm(s) to use in the selection procedure.
   The document also describes the path lookup process whereby endpoints
   obtain path segments - a fundamental building block for the
   construction of end-to-end paths.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://scionassociation.github.io/scion-cp_I-D/draft-dekater-scion-
   controlplane.html.  Status information for this document may be found
   at https://datatracker.ietf.org/doc/draft-dekater-scion-
   controlplane/.

   Source for this draft and an issue tracker can be found at
   https://github.com/scionassociation/scion-cp_I-D.

de Kater, et al.          Expires 22 April 2025                 [Page 1]
Internet-Draft                  SCION CP                    October 2024

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 22 April 2025.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   4
     1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   6
     1.2.  Conventions and Definitions . . . . . . . . . . . . . . .   7
     1.3.  Paths and Links . . . . . . . . . . . . . . . . . . . . .   8
     1.4.  Routing . . . . . . . . . . . . . . . . . . . . . . . . .   9
       1.4.1.  Path Segments . . . . . . . . . . . . . . . . . . . .  11
     1.5.  Addressing  . . . . . . . . . . . . . . . . . . . . . . .  11
       1.5.1.  ISD Numbers . . . . . . . . . . . . . . . . . . . . .  12
       1.5.2.  SCION AS Numbers  . . . . . . . . . . . . . . . . . .  12
       1.5.3.  Wildcard Addressing . . . . . . . . . . . . . . . . .  13
       1.5.4.  Text Representation . . . . . . . . . . . . . . . . .  13
     1.6.  Avoiding Circular Dependencies and Partitioning . . . . .  14
     1.7.  Communication Protocol  . . . . . . . . . . . . . . . . .  15
   2.  Path Exploration or Beaconing . . . . . . . . . . . . . . . .  16
     2.1.  Introduction and Overview . . . . . . . . . . . . . . . .  16
       2.1.1.  Peering Links . . . . . . . . . . . . . . . . . . . .  17
       2.1.2.  Appending Entries to a PCB  . . . . . . . . . . . . .  17
       2.1.3.  PCB Propagation - Illustrated Examples  . . . . . . .  17

de Kater, et al.          Expires 22 April 2025                 [Page 2]
Internet-Draft                  SCION CP                    October 2024

     2.2.  Path-Segment Construction Beacons (PCBs)  . . . . . . . .  22
       2.2.1.  PCB Message Format  . . . . . . . . . . . . . . . . .  23
       2.2.2.  PCB Extensions  . . . . . . . . . . . . . . . . . . .  36
       2.2.3.  PCB Validity  . . . . . . . . . . . . . . . . . . . .  36
       2.2.4.  Configuration . . . . . . . . . . . . . . . . . . . .  37
     2.3.  Propagation of PCBs . . . . . . . . . . . . . . . . . . .  37
       2.3.1.  Selection of PCBs to Propagate  . . . . . . . . . . .  37
       2.3.2.  Propagation of Selected PCBs  . . . . . . . . . . . .  41
   3.  Deployment Considerations . . . . . . . . . . . . . . . . . .  44
     3.1.  Monitoring Considerations . . . . . . . . . . . . . . . .  44
     3.2.  Effects of Clock Inaccuracy . . . . . . . . . . . . . . .  45
     3.3.  Path Discovery Time and Scalability . . . . . . . . . . .  45
       3.3.1.  Intra-ISD Beaconing . . . . . . . . . . . . . . . . .  46
       3.3.2.  Inter-ISD Beaconing . . . . . . . . . . . . . . . . .  48
   4.  Registration of Path Segments . . . . . . . . . . . . . . . .  49
     4.1.  Intra-ISD Path Segment Registration . . . . . . . . . . .  49
       4.1.1.  Terminating a PCB . . . . . . . . . . . . . . . . . .  50
       4.1.2.  Transforming a PCB into an Up Segment . . . . . . . .  51
       4.1.3.  Transforming a PCB into a Down Segment  . . . . . . .  51
     4.2.  Core Path Segment Registration  . . . . . . . . . . . . .  52
     4.3.  Path Segment Registration gRPC API  . . . . . . . . . . .  52
     4.4.  Path MTU  . . . . . . . . . . . . . . . . . . . . . . . .  53
   5.  Path Lookup . . . . . . . . . . . . . . . . . . . . . . . . .  54
     5.1.  Lookup Process  . . . . . . . . . . . . . . . . . . . . .  54
       5.1.1.  Sequence of Lookup Requests . . . . . . . . . . . . .  56
       5.1.2.  Caching . . . . . . . . . . . . . . . . . . . . . . .  56
     5.2.  Behavior of Actors in the Lookup Process  . . . . . . . .  57
       5.2.1.  Use of Wildcard Addresses in the Lookup Process . . .  57
       5.2.2.  Segment-Request Handler of a Non-Core Source AS . . .  58
       5.2.3.  Segment-Request Handler of a Core AS  . . . . . . . .  59
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  59
     6.1.  Manipulation of the Beaconing Process by a Core
           Adversary . . . . . . . . . . . . . . . . . . . . . . . .  60
     6.2.  Manipulation of the Beaconing Process by a Non-Core
           Adversary . . . . . . . . . . . . . . . . . . . . . . . .  60
       6.2.1.  Path Hijacking through Interposition  . . . . . . . .  60
       6.2.2.  Creation of Spurious ASes and ISDs  . . . . . . . . .  61
       6.2.3.   Peering Link Misuse  . . . . . . . . . . . . . . . .  61
       6.2.4.  Manipulation of the Path-Selection Process  . . . . .  62
     6.3.  Denial of Service Attacks . . . . . . . . . . . . . . . .  63
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  64
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  64
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  64
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  66
   Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .  67
   Deployment Testing: SCIONLab  . . . . . . . . . . . . . . . . . .  67
   Full Control Service gRPC API . . . . . . . . . . . . . . . . . .  67
   SCION Data Plane use by the SCION Control Plane . . . . . . . . .  73

de Kater, et al.          Expires 22 April 2025                 [Page 3]
Internet-Draft                  SCION CP                    October 2024

   Path-Lookup Examples  . . . . . . . . . . . . . . . . . . . . . .  75
   Change Log  . . . . . . . . . . . . . . . . . . . . . . . . . . .  79
     draft-dekater-scion-controlplane-06 . . . . . . . . . . . . . .  79
     draft-dekater-scion-controlplane-05 . . . . . . . . . . . . . .  79
     draft-dekater-scion-controlplane-04 . . . . . . . . . . . . . .  80
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  80

1.  Introduction

   SCION is a path-aware internetworking routing architecture as
   described in [RFC9217].  It allows endpoints and applications to
   select paths across the network to use for traffic, based on
   trustworthy path properties.  SCION is an inter-domain network
   architecture and is therefore not concerned with intra-domain
   forwarding.

   SCION has been developed with the following goals:

   _Availability_ - to provide highly available communication that can
   send traffic over paths with optimal or required characteristics,
   quickly handle inter-domain link or router failures (both on the last
   hop or anywhere along the path) and provide continuity in the
   presence of adversaries.

   _Security_ - to provide higher levels of trust in routing information
   in order to prevent traffic hijacking, reduce potential for denial-
   of-service and other attacks.  Endpoints can decide the trust roots
   they wish to rely on, routing information can be unambiguously
   attributed to an AS, and packets are only forwarded along authorized
   path segments.  A particular use case is to enable geofencing.

   _Scalability_ - to improve the scalability of the inter-domain
   control plane and data plane, avoiding existing limitations related
   to convergence and forwarding table size.  The advertising of path
   segments is separated into a beaconing process within each Isolation
   Domain (ISD) and between ISDs which incurs minimal overhead and
   resource requirements on routers.

   SCION relies on three main components:

de Kater, et al.          Expires 22 April 2025                 [Page 4]
Internet-Draft                  SCION CP                    October 2024

   _PKI_ - To achieve scalability and trust, SCION organizes existing
   ASes into logical groups of independent routing planes called
   _Isolation Domains (ISDs)_. All ASes in an ISD agree on a set of
   trust roots called the _Trust Root Configuration (TRC)_ which is a
   collection of signed root certificates in X.509 v3 format [RFC5280].
   The ISD is governed by a set of _core ASes_ which typically manage
   the trust roots and provide connectivity to other ISDs.  This is the
   basis of the public key infrastructure which the SCION Control Plane
   relies upon for the authentication of messages that is used for the
   SCION Control Plane.  See [I-D.dekater-scion-pki]

   _Control Plane_ - performs inter-domain routing by discovering and
   securely disseminating path information between ASes.  The core ASes
   use Path-segment Construction Beacons (PCBs) to explore intra-ISD
   paths, or to explore paths across different ISDs.

   _Data Plane_ - carries out secure packet forwarding between SCION-
   enabled ASes over paths selected by endpoints.  A SCION border router
   reuses existing intra-domain infrastructure to communicate to other
   SCION routers or SCION endpoints within its AS.  See
   [I-D.dekater-scion-dataplane]

   This document describes the SCION Control Plane component.  It should
   be read in conjunction with the other components
   [I-D.dekater-scion-pki] and [I-D.dekater-scion-dataplane].

   The SCION architecture was initially developed outside of the IETF by
   ETH Zurich with significant contributions from Anapaya Systems.  It
   is deployed in the Swiss finance sector to provide resilient
   connectivity between financial institutions.  The aim of this
   document is to document the existing protocol specification as
   deployed, and to introduce new concepts that can potentially be
   further improved to address particular problems with the current
   Internet architecture.

   The SCION architecture was initially developed outside of the IETF by
   ETH Zurich with significant contributions from Anapaya Systems.  It
   is deployed in the Swiss finance sector to provide resilient
   connectivity between financial institutions.  The aim of this
   document is to document the existing protocol specification as
   deployed, and to introduce new concepts that can potentially be
   further improved to address particular problems with the current
   Internet architecture.

   Note (to be removed before publication): this document, together with
   the other components [I-D.dekater-scion-pki] and
   [I-D.dekater-scion-dataplane], deprecates
   [I-D.dekater-panrg-scion-overview].  This document provides an

de Kater, et al.          Expires 22 April 2025                 [Page 5]
Internet-Draft                  SCION CP                    October 2024

   extensive description of how the SCION Data Plane is implemented in
   order to facilitate understanding, but could potentially be split
   into separate documents if considered suitable for submission to the
   Internet Standards Process.

1.1.  Terminology

   *Autonomous System (AS)*: An Autonomous System is a network under a
   common administrative control.  For example, the network of an
   Internet service provider, company, or university can constitute an
   AS.

   *Beaconing*: The Control Plane process where an AS discovers paths to
   other ASes.

   *Control Plane*: The SCION Control Plane is responsible for the
   propagation and discovery of network paths, i.e., for the exchange of
   routing information between SCION nodes.  The Control Plane thus
   determines where traffic can be sent and deals with questions such as
   how paths are discovered, which paths exist, how they are
   disseminated to endpoints, etc.  Within a SCION AS, such
   functionalities are carried out by the Control Service whereas packet
   forwarding is a task carried out by the data plane.

   *Control Service*: The Control Service is the main control plane
   infrastructure component within a SCION AS.  It is responsible for
   the path exploration and registration processes that take place
   within the Control Plane.

   *Core AS*: Each Isolation Domain (ISD) is administered by a set of
   distinguished autonomous systems (ASes) called core ASes, which are
   responsible for initiating the path-discovery and -construction
   process (in SCION called "beaconing").

   *Endpoint*: An endpoint is the start or the end of a SCION path, as
   defined in [RFC9473].

   *Forwarding Path*: A forwarding path is a complete end-to-end path
   between two SCION endpoints which is used to transmit packets in the
   data plane.  It can be created with a combination of up to three path
   segments (an up segment, a core segment, and a down segment).

   *Hop Field (HF)*: Hop Field (HF): As they traverse the network, Path
   Segment Construction Beacons (PCBs) accumulate cryptographically
   protected AS-level path information in the form of Hop Fields.  In
   the data plane, Hop Fields are used for packet forwarding: they
   contain the incoming and outgoing interface IDs of the ASes on the
   forwarding path.

de Kater, et al.          Expires 22 April 2025                 [Page 6]
Internet-Draft                  SCION CP                    October 2024

   *Info Field (INF)*: Info Field (INF): Each Path Segment Construction
   Beacon (PCB) contains a single Info field, which provides basic
   information about the PCB.  Together with Hop Fields (HFs), these are
   used to create forwarding paths.

   *Isolation Domain (ISD)*: Isolation Domain (ISD): In SCION,
   Autonomous Systems (ASes) are organized into logical groups called
   Isolation Domains or ISDs.  Each ISD consists of ASes that span an
   area with a uniform trust environment (e.g. a common jurisdiction).
   A possible model is for ISDs to be formed along national boundaries
   or federations of nations.

   *Leaf AS*: An AS at the "edge" of an ISD, with no other downstream
   ASes.

   *MAC*: Message Authentication Code.  In the rest of this document,
   "MAC" always refers to "Message Authentication Code" and never to
   "Medium Access Control".  When "Medium Access Control address" is
   implied, the phrase "Link Layer Address" is used.

   *Path Segment*: Path segments are derived from Path Segment
   Construction Beacons (PCBs).  A path segment can be (1) an up segment
   (i.e. a path between a non-core AS and a core AS in the same ISD),
   (2) a down segment (i.e. the same as an up segment, but in the
   opposite direction), or (3) a core segment (i.e., a path between core
   ASes).  Up to three path segments can be used to create a forwarding
   path.

   *Path Segment Construction Beacon (PCB)*: Core AS control planes
   generate PCBs to explore paths within their isolation domain (ISD)
   and among different ISDs.  ASes further propagate selected PCBs to
   their neighboring ASes.  As a PCB traverses the network, it carries
   and accumulates path segments, which can subsequently be used for
   traffic forwarding.

   *Trust Root Configuration (TRC)*: A Trust Root Configuration or TRC
   is a signed collection of certificates pertaining to an isolation
   domain (ISD).  TRCs also contain ISD-specific policies.

1.2.  Conventions and Definitions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

de Kater, et al.          Expires 22 April 2025                 [Page 7]
Internet-Draft                  SCION CP                    October 2024

1.3.  Paths and Links

   SCION routers and endpoints connect to each other via links.  A SCION
   path between two endpoints essentially traverses one or more links.

   In SCION, Autonomous Systems (ASes) are organized into logical groups
   called Isolation Domains or ISDs.  Each ISD consists of ASes that
   span an area with a uniform trust environment (i.e. a common
   jurisdiction).  An ISD is administered by a set of distinguished ASes
   called core ASes.

   SCION distinguishes three types of links between ASes: (1) core
   links, (2) parent-child links, and (3) peering links.

   *  _Core_ links connect two core ASes, which are either within the
      same or in different ISDs.  Core links can exist for various
      reasons, including provider-customer (where the customer pays the
      provider for traffic) and peering relationships.

   *  _Parent-child_ links create a hierarchy between the parent and the
      child AS within the same ISD.  ASes with a parent-child link
      typically have a provider-customer relationship.

   *  _Peering_ links exist between ASes with a (settlement-free or
      paid) peering relationship.  They can be established between any
      two ASes (core or non-core) and can cross ISD boundaries.

   These link types form the basis of the notion of "valley free" paths.
   Valley free paths means that a child AS does not carry transit
   traffic from a parent AS.

   The SCION paths are always valley free, and consist of at most three
   segments: an up segment, traversing links from child to parent, then
   a core segment consisting of core links, followed by a down segment
   traversing links from parent to child.  Peering links can be used as
   "shortcuts" in an up-core-down path.

   A path can contain at most one peering link shortcut which means they
   can only be used in paths between ASes within the "customer cone" of
   the ASes connected by the peering link.

   Figure 1 shows the three types of links for one small ISD with two
   core ASes A and C, and four non-core ASes D,E,F, and G.

de Kater, et al.          Expires 22 April 2025                 [Page 8]
Internet-Draft                  SCION CP                    October 2024

   +-------------------------+
   |                         |       #
   |        ISD Core         |       |      parent-child
   |  .---.           .---.  |       |      link
   | (  A  )*-------*(  C  ) |       |
   |  `-#-'           `-#-'  |       0
   |    |               |    |
   +----|---------------|----+   *-------*  core link
        |               |
        |               |        < - - - >  peering link
      .-0-.           .-0-.
     (  D  )< - - - >(  E  )
      `-#-'           `-#-'
        |               |
        |               |
        |               |
      .-0-.           .-0-.
     (  G  )         (  F  )
      `---'           `---'

      Figure 1: The three types of SCION links in one ISD.  Each node
                        in the figure is a SCION AS.

   Each link connecting SCION routers is bi-directional and is
   identified by its corresponding egress and ingress interface IDs.  An
   interface ID consists of a 16-bit identifier that MUST be unique
   within each AS, with the exception of value 0 (see
   [I-D.dekater-scion-dataplane]).  Therefore, they can be chosen and
   encoded by each AS independently without any need for coordination
   between ASes.

1.4.  Routing

   SCION provides path-aware inter-domain routing between ASes across
   the Internet.  The SCION Control Plane is responsible for discovering
   these inter-domain paths and making them available to the endpoints
   within the ASes.

   SCION inter-domain routing operates on two levels: within a ISD which
   is called _intra_-ISD routing, and between ISD which is called
   _inter_-ISD routing.  Both levels use _Path Segment Construction
   Beacons (PCBs)_ to explore network paths.  A PCB is initiated by a
   core AS and then disseminated either within an ISD to explore intra-
   ISD paths, or among core ASes to explore core paths across different
   ISDs.

de Kater, et al.          Expires 22 April 2025                 [Page 9]
Internet-Draft                  SCION CP                    October 2024

   The PCBs accumulate cryptographically protected path and forwarding
   information at an AS level and store this information in the form of
   _Hop Fields_. Endpoints use information from these Hop Fields to
   create end-to-end forwarding paths for data packets that carry this
   information in their headers.  This also supports multi-path
   communication among endpoints.

   The creation of an end-to-end forwarding path consists of the
   following processes:

   1.  _Path exploration (or beaconing)_: This is the process where an
       AS discovers paths to other ASes.  See also Section 2.

   2.  _Path registration_: This is the process where an AS selects a
       few PCBs, according to defined policies, turns the selected PCBs
       into path segments, and adds these path segments to the relevant
       path infrastructure, thus making them available to other ASes.
       See also Section 4.

   3.  _Path resolution_: This is the process of actually creating an
       end-to-end forwarding path from the source endpoint to the
       destination.  For this, an endpoint performs (a) a path lookup
       step to obtain path segments, and (b) a path combination step to
       combine the forwarding path from the segments.  This last step
       takes place in the data plane.  See also Section 5.

   All processes operate concurrently.

   The *Control Service* is responsible for the path exploration and
   registration processes in the Control Plane.  It is the main control
   plane infrastructure component within each SCION AS and has the
   following tasks:

   *  Generating, receiving, and propagating PCBs.  Periodically, the
      Control Service of a core AS generates a set of PCBs, which are
      forwarded to the child ASes or neighboring core ASes.  In the
      latter case, the PCBs are sent over policy compliant paths to
      discover multiple paths between any pair of core ASes.

   *  Selecting and registering the set of path segments via which the
      AS wants to be reached.

   *  Managing certificates and keys to secure inter-AS communication.
      Each PCB contains signatures of all on-path ASes and each time the
      Control Service of an AS receives a PCB, it validates the PCB's
      authenticity.  When the Control Service lacks an intermediate
      certificate, it can query the Control Service of the neighboring
      AS that sent the PCB.

de Kater, et al.          Expires 22 April 2025                [Page 10]
Internet-Draft                  SCION CP                    October 2024

   *Note:* The Control Service of an AS is decoupled from SCION border
   routers.  The Control Service of a specific AS is part of the Control
   Plane, is responsible for _finding and registering suitable paths_,
   and can be deployed anywhere inside the AS.  Border routers are
   deployed at the edge of an AS and their main tasks are to _forward
   data packets_.

1.4.1.  Path Segments

   SCION distinguishes the following types of path segments:

   *  A path segment from a non-core AS to a core AS is an _up segment_.

   *  A path segment from a core AS to a non-core AS is a _down
      segment_.

   *  A path segment between core ASes is a _core segment_.

   Each path segment starts and/or ends at a core AS.

   All path segments may be inverted: a core segment can be used
   bidirectionally, an up segment can be converted into a down segment,
   and a down segment can be converted into an up segment depending on
   the direction of the end-to-end path.  This means that all path
   segments can be used to send data traffic in both directions.

   The cryptographic protection of PCBs and path segments is based on
   the Control Plane PKI.  The signatures are structured such that the
   entire message sequence constituting the path segment can be
   authenticated by anyone with access to this PKI.

   For fast validation of the path information carried in individual
   packets during packet forwarding, symmetric key cryptography is used
   and the Hop Fields contain a MAC.  These MACs are structured to allow
   verification of the sequence of hops, but in contrast to the PCBs can
   only be validated by the border routers of the respective AS.

1.5.  Addressing

   Inter-domain SCION routing is based on an <ISD, AS> tuple.  Although
   a complete SCION address is composed of the <ISD, AS, endpoint
   address> 3-tuple, the endpoint address is not used for inter-domain
   routing or forwarding.  The endpoint address is of variable length,
   does not need to be globally unique, and can thus be an IPv4, IPv6,
   or link layer address.

de Kater, et al.          Expires 22 April 2025                [Page 11]
Internet-Draft                  SCION CP                    October 2024

   *Note:* As a consequence of the fact that SCION relies on existing
   routing protocols (e.g.  IS-IS, OSPF, SR) and communication fabric
   (e.g.  IP, MPLS) for intra-domain forwarding, existing internal
   routers do not need to be changed to support SCION.

1.5.1.  ISD Numbers

   An ISD number is the 16-bit global identifier for an ISD and MUST be
   globally unique.

   The following table gives an overview of the ISD number allocation:

     +==============+================================================+
     | ISD          | Description                                    |
     +==============+================================================+
     | 0            | The wildcard ISD.                              |
     +--------------+------------------------------------------------+
     | 1 - 15       | Reserved for documentation and sample code     |
     |              | (analogous to [RFC5398]).                      |
     +--------------+------------------------------------------------+
     | 16 - 63      | Private use (analogous to [RFC6996]).  Can be  |
     |              | used for testing and private deployments       |
     +--------------+------------------------------------------------+
     | 64 - 4094    | Public ISDs.  Should be allocated in ascending |
     |              | order, without gaps and "vanity" numbers.      |
     +--------------+------------------------------------------------+
     | 4095 - 65535 | Reserved for future use.                       |
     +--------------+------------------------------------------------+

                      Table 1: ISD number allocations

   Currently, ISD numbers are allocated by Anapaya, a provider of SCION-
   based networking software and solutions (see [ISD-AS-assignments]).

1.5.2.  SCION AS Numbers

   A SCION AS number is the 48-bit identifier for an AS.  Although they
   play a similar role, there is no relationship between SCION AS
   numbers and BGP ASNs as defined by RFC4893.  For historical reasons
   some SCION Autonomous Systems use a SCION AS number where the first
   16 bits are 0 and the remaining 32 bits are identical to their BGP
   ASN, but there is no technical requirement for this.

de Kater, et al.          Expires 22 April 2025                [Page 12]
Internet-Draft                  SCION CP                    October 2024

1.5.2.1.  Special-Purpose SCION AS Numbers

    +===================+=============+===============================+
    | AS                | Size        | Description                   |
    +===================+=============+===============================+
    | 0:0:0             | 1           | The wildcard AS               |
    +-------------------+-------------+-------------------------------+
    | 0:0:1-0:ffff:ffff | ~4.3 bill.  | Public SCION AS numbers       |
    +-------------------+-------------+-------------------------------+
    | 1:0:0             | 1           | Reserved                      |
    +-------------------+-------------+-------------------------------+
    | 2:0:0/16          | ~4.3 bill.  | Additional public SCION AS    |
    |                   |             | numbers                       |
    +-------------------+-------------+-------------------------------+
    | ff00:0:0/32       | 65535       | Reserved for documentation    |
    |                   |             | and test/sample code          |
    |                   |             | (analogous to [RFC5398]).     |
    +-------------------+-------------+-------------------------------+
    | ffaa:0:0/24       | ~16.8 mill. | Reserved for private use      |
    |                   |             | (analogous to [RFC6996]).     |
    |                   |             | These numbers can be used for |
    |                   |             | testing/private deployments.  |
    +-------------------+-------------+-------------------------------+
    | ffff:ffff:ffff    | 1           | Reserved                      |
    +-------------------+-------------+-------------------------------+

                       Table 2: AS number allocations

   The rest of the space is currently unallocated.

1.5.3.  Wildcard Addressing

   SCION endpoints use wildcard AS 0:0:0 to designate any core AS, e.g.
   to place requests for core segments or down segments during path
   lookup.  These wildcard addresses are of the form I-0, to designate
   any AS in ISD I.  For more information, see Section 5.2.1.

1.5.4.  Text Representation

1.5.4.1.  ISD numbers

   The text representation of SCION ISD numbers MUST be its decimal
   ASCII representation.

1.5.4.2.  AS numbers

   The text representation of SCION AS numbers is similar to IPv6 (see
   [RFC5952]) but not identical.  It MUST be as follows:

de Kater, et al.          Expires 22 April 2025                [Page 13]
Internet-Draft                  SCION CP                    October 2024

   *  It uses a 16-bit colon-separated lower-case hex encoding with
      leading 0s omitted: 0:0:0 to ffff:ffff:ffff.

   *  The :: zero-compression feature of IPv6 MUST NOT be used.  The
      feature has very limited use in a 48-bit address space and would
      only add more complexity.

   *  A range of AS numbers can be shortened with a notation similar to
      the one used for CIDR IP ranges ([RFC4632]).  For example, the
      range of the lowest 32-bit AS numbers (0-4294967295) can be
      represented as 0:0:0/16.

   *  For historical reasons, SCION AS numbers in the lower 32-bit range
      MAY also be represented as decimal for human readability.  For
      example, if a program receives the AS number 0:1:f, it MAY display
      the number as "65551".

1.5.4.3.  <ISD, AS> tuples

   The text representation of SCION addresses MUST be <ISD>-<AS>, where
   <ISD> is the text representation of the ISD number, <AS> is the text
   representation of the AS number, and - is the litteral ASCII
   character 0x2D.

   For example, the text representation of AS number 65551 (0x1000f) in
   ISD number 4 is 4-0000:1:f.

1.6.  Avoiding Circular Dependencies and Partitioning

   A secure and reliable routing architecture has to be designed
   specifically to avoid circular dependencies during network
   initialization.  One goal of SCION is that the Internet can start up
   even after large outages or attacks, in addition to avoiding cascades
   of outages caused by fragile interdependencies.  This section lists
   the concepts SCION uses to prevent circular dependencies.

   *  Neighbor-based path discovery: Path discovery in SCION is
      performed by the beaconing mechanism.  In order to participate in
      this process, an AS only needs to be aware of its direct
      neighbors.  As long as no path segments are available,
      communicating with the neighboring ASes is possible with the one
      hop path type which does not rely on any path information.  SCION
      uses these _one hop paths_ to propagate PCBs to neighboring ASes
      to which no forwarding path is available yet.  The One Hop Path
      Type is described in more detail in [I-D.dekater-scion-dataplane].

de Kater, et al.          Expires 22 April 2025                [Page 14]
Internet-Draft                  SCION CP                    October 2024

   *  Path segment types: SCION uses different types of path segments to
      compose end-to-end paths.  Notably, a single path segment already
      enables intra-ISD communication.  For example, a non-core AS can
      reach the core of the local ISD simply by using an up segment
      fetched from the local path storage which is populated during the
      beaconing process.

   *  Path reversal: In SCION, every path is reversible.  That is, the
      receiver of a packet can reverse the path in the packet header in
      order to produce a reply packet without having to perform a path
      lookup.  Such a packet follows the original packet's path
      backwards.

   *  Availability of certificates: In SCION, every entity is required
      to be in possession of all cryptographic material (including the
      ISD's TRC and certificates) that is needed to verify any message
      it sends.  This (together with the path reversal) means that the
      receiver of a message can always obtain all this material by
      contacting the sender.

   *Note:* For a detailed description of a TRC and more information on
   the availability of certificates and TRCs, see the SCION Control-
   Plane PKI Internet-Draft [I-D.dekater-scion-pki].

   Besides inter-dependencies, another threat to the Internet is network
   partition which occurs when one network is split into two because of
   a link failure.  However, partition of the global SCION inter-domain
   network is much less likely to happen as during normal operation the
   full network fabric is available, offering multiple paths between all
   ASes.  Even during failures there is no special failure mode required
   as SCION-enabled ASes can always switch to otherwise unused links.

   Recovering from a partitioned network is also seamless as only coarse
   time synchronization between the partitions is required to resume
   normal operation and move forward with updates of the cryptographic
   material.  Section 3.2 further describes the impact of time
   synchronization.

1.7.  Communication Protocol

   All communication between the Control Services in different ASes is
   expressed in terms of gRPC remote procedure calls (for details, see
   [gRPC]).  Service interfaces and messages are defined in the Protocol
   Buffer "proto3" interface definition language (for details, see
   [proto3]).

de Kater, et al.          Expires 22 April 2025                [Page 15]
Internet-Draft                  SCION CP                    October 2024

   The RPC messages are transported via the [Connect]'s rpc protocol; a
   gRPC-like protocol that carries messages over HTTP/3 (see
   [RFC9114])).  HTTP3 traffic uses QUIC/UDP ([RFC9000]) as a transport
   layer.  In the case of SCION, UDP relies on the data plane.

   Appendix "Full Control Service gRPC API" provides the entire Control
   Service API definition in protobuf format.

   Appendix "SCION Data Plane use by the SCION Control Plane" provides
   details about the establishment of the underlying QUIC connections
   through the data plane.

2.  Path Exploration or Beaconing

2.1.  Introduction and Overview

   *Path Exploration* is the process where an AS discovers paths to
   other ASes.  In SCION, this process is referred to as _beaconing_ and
   this section provides a detailed explanation of this.

   In SCION, the _Control Service_ of each AS is responsible for the
   beaconing process.  The Control Service generates, receives, and
   propagates the _Path Segment Construction Beacons (PCBs)_ on a
   regular basis, to iteratively construct path segments.

   PCBs contain topology and authentication information, and can also
   include additional metadata that helps with path management and
   selection.  The beaconing process itself is divided into routing
   processes on two levels, where _inter-ISD_ or core beaconing is based
   on the (selective) sending of PCBs without a defined direction, and
   _intra-ISD_ beaconing on top-to-bottom propagation.

   *  _Inter-ISD or core beaconing_ is the process of constructing path
      segments between core ASes in the same or in different ISDs.
      During core beaconing, the Control Service of a core AS either
      initiates PCBs or propagates PCBs received from neighboring core
      ASes to other neighboring core ASes.  PCBs are periodically sent
      over policy compliant paths to discover multiple paths between any
      pair of core ASes.

   *  _Intra-ISD beaconing_ creates path segments from core ASes to non-
      core ASes.  For this, the Control Services of core ASes create
      PCBs and sends them to the non-core child ASes (typically customer
      ASes) at regular intervals.  The Control Service of a non-core
      child AS receives these PCBs and forwards them to its child ASes,
      and so on until the PCB reaches an AS without any customer (leaf
      AS).  As a result, all ASes within an ISD receive path segments to
      reach the core ASes of their ISD.

de Kater, et al.          Expires 22 April 2025                [Page 16]
Internet-Draft                  SCION CP                    October 2024

   On its way, a PCB accumulates cryptographically protected path and
   forwarding information per traversed AS.  At every AS, metadata as
   well as information about the AS's ingress and egress interfaces is
   added to the PCB.  The full PCB message format is described in
   Section 2.2.

2.1.1.  Peering Links

   PCBs do not traverse peering links.  Instead, peering links are
   announced along with a regular path in a PCB.  If both ASes at either
   end of a peering link have registered path segments that include this
   specific peering link, then it is possible to use this peering link
   during segment combination to create the end-to-end path.

2.1.2.  Appending Entries to a PCB

   Every propagation period (as configured by the AS), the Control
   Service:

   *  selects the best combinations of PCBs and interfaces connecting to
      a neighboring AS (i.e. a child AS or a core AS).  This is
      described in Section 2.3.1.

   *  propagates each selected PCB to the selected egress interface(s)
      associated with it.  This is described in Section 2.3.2.

   For every selected PCB and egress interface combination, the AS
   appends an _AS entry_ to the selected PCB.  This includes a Hop Field
   that specifies the ingress and egress interface for the packet
   forwarding through this AS, in the beaconing direction.  The AS entry
   can also contain peer entries.

2.1.3.  PCB Propagation - Illustrated Examples

   The following three figures show how intra-ISD PCB propagation works,
   from the ISD's core AS down to child ASes.  Interface identifiers of
   each AS are numbered with integer values while ASes are described
   with an upper case letter for the sake of illustration.

   In Figure 2 below, core AS X sends the two different PCBs "a" and "b"
   via two different links to child AS Y: PCB "a" leaves core AS X via
   egress interface "2", whereas PCB "b" is sent over egress interface
   "1".  Core AS X adds the respective egress information to the PCBs
   when sending them off, as can be seen in the figure (the entries
   "_Core - Out:2_" and "_Core - Out:1_", respectively).

de Kater, et al.          Expires 22 April 2025                [Page 17]
Internet-Draft                  SCION CP                    October 2024

                               +-------------+
                               | Core AS X   |
                               |             |
                               |    2   1    |
                               +----#---#----+
             +--------+             |   |             +--------+
             |PCB     |     +-----+ |   | +-----+     |PCB     |
             |========|-----|PCB a| |   | |PCB b|=====|++++++++|
             |Core    |     +-----+ |   | +-----+     |Core    |
             |- Out:2 |        |    |   |    |        |- Out:1 |
             +--------+        v    |   |    v        +--------+
                                    v   v
                               +----#---#----+
                               |     AS Y    |

       Figure 2: Intra-ISD PCB propagation from the ISD core to child
                               ASes - Part 1

   AS Y receives the two PCBs "a" and "b" through two different
   (ingress) interfaces, namely "2" and "3", respectively (see Figure 3
   below).  Additionally, AS Y forwards to AS Z four PCBs that were
   previously sent by core AS X.  For this, AS Y uses the two different
   (egress) links "5" and "6".  AS Y appends the corresponding ingress
   and egress interface information to the four PCBs.  As can be seen in
   the figure, AS Y also has two peering links to its neighboring peers
   V and W, through the interfaces "1" and "4", respectively - AS Y
   includes this information in the PCBs, as well.  Thus, each forwarded
   PCB cumulates path information on its way "down" from core AS X.

de Kater, et al.          Expires 22 April 2025                [Page 18]
Internet-Draft                  SCION CP                    October 2024

                           +-----+ |   | +-----+
                           |PCB a| |   | |PCB b|
                           +-----+ |   | +-----+
                              |    |   |    |
                              v    |   |    v
           +-------------+         v   v
           |             |    +----#---#----+    +-------------+
           |             |    |    2   3    |    |             |
           |    AS V     #- --# 1           |    |             |
           |             |    |     AS Y    |    |    AS W     |
           |             |    |           4 #- --#             |
           +-------------+    |             |    |             |
                              |    6   5    |    +-------------+
               +--------+     +----#---#----+     +--------+
               |PCB     |          |   |          |PCB     |
               |========|          |   |          |========|
               |Core X  |          |   |          |Core X  |
               |- Out:2 |          |   |          |- Out:2 |
   +--------+  |--------|  +-----+ |   | +-----+  |--------|  +--------+
   |PCB     |  |AS Y    |--|PCB c| |   | |PCB d|--|AS Y    |  |PCB     |
   |++++++++|  |-In:2   |  +-----+ |   | +-----+  |-In:2   |  |++++++++|
   |Core X  |  |-Out:6  |     |    |   |    |     |-Out:5  |  |Core X  |
   |- Out:1 |  |-PeerV:1|     v    |   |    v     |-PeerV:1|  |- Out:1 |
   |--------|  |-PeerW:4|          |   |          |-PeerW:4|  |--------|
   |AS Y    |  +--------+          |   |          +--------+  |AS Y    |
   |-In:3   |              +-----+ |   | +-----+              |-In:3   |
   |-Out:6  |==============|PCB e| |   | |PCB f|==============|-Out:5  |
   |-PeerV:1|              +-----+ |   | +-----+              |-PeerV:1|
   |-PeerW:4|                 |    |   |    |                 |-PeerW:4|
   +--------+                 v    |   |    v                 +--------+
                                   v   v
                              +----#---#----+
                              |    AS Z     |

       Figure 3: Intra-ISD PCB propagation from the ISD core to child
                               ASes - Part 2

   The following figure shows how the four PCBs "c", "d", "e", and "f",
   coming from AS Y, are received by AS Z over two different links: PCBs
   "c" and "e" reach AS Z over ingress interface "5", whereas PCBs "d"
   and "f" enter AS Z via ingress interface "1".  Additionally, AS Z
   propagates PCBs "g", "h", "i", and "j" further down, all over the
   same link (egress interface "3").  AS Z extends the PCBs with the
   relevant information, so that each of these PCBs now includes AS hop
   entries from core AS X, AS Y, and AS Z.

de Kater, et al.          Expires 22 April 2025                [Page 19]
Internet-Draft                  SCION CP                    October 2024

                      +-----+      |   |      +-----+
                      |PCB c|      |   |      |PCB d|
                      +-----+      |   |      +-----+
                        |  +-----+ |   | +-----+  |
                        v  |PCB e| |   | |PCB f|  v
                           +-----+ |   | +-----+
                              |    |   |    |
                              v    |   |    v
                                   v   v
                            +------#---#------+
                            |      5   1      |
                            |                 |
                            | AS Z            |
               +--------+   |        3        |   +--------+
               |PCB     |   +--------#--------+   |PCB     |
               |========|            |            |========|
               |Core X  |            |            |Core X  |
   +--------+  |- Out:2 |            |            |- Out:2 |  +--------+
   |PCB     |  |--------|            |            |--------|  |PCB     |
   |++++++++|  |AS Y    |            |            |AS Y    |  |++++++++|
   |Core X  |  |-In:2   |            |            |-In:2   |  |Core X  |
   |- Out:1 |  |-Out:6  |   +-----+  |  +-----+   |-Out:5  |  |- Out:1 |
   |--------|  |-PeerV:1|---|PCB g|  |  |PCB h|---|-PeerV:1|  |--------|
   |AS Y    |  |-PeerW:4|   +-----+  |  +-----+   |-PeerW:4|  |AS Y    |
   |-In:3   |  |--------|      |     |     |      |--------|  |-In:3   |
   |-Out:6  |  |AS Z    |      v     |     v      |AS Z    |  |-Out:5  |
   |-PeerV:1|  |-In:5   |            |            |-In:1   |  |-PeerV:1|
   |-PeerW:4|  |-Out:3  |            |            |-Out:3  |  |-PeerW:4|
   |--------|  +--------+            |            +--------+  |--------|
   |AS Z    |               +-----+  |  +-----+               |AS Z    |
   |-In:5   |===============|PCB i|  |  |PCB j|===============|-In:1   |
   |-Out:3  |               +-----+  |  +-----+               |-Out:3  |
   +--------+                  |     |     |                  +--------+
                               v     |     v
                                     v

       Figure 4: Intra-ISD PCB propagation from the ISD core to child
                               ASes - Part 3

de Kater, et al.          Expires 22 April 2025                [Page 20]
Internet-Draft                  SCION CP                    October 2024

   Based on the figures above, one could say that a PCB represents a
   single path segment.  However, there is a difference between a PCB
   and a registered path segment as a PCB is a so-called "travelling
   path segment" that accumulates AS entries when traversing the
   Internet.  A registered path segment is instead a "snapshot" of a
   travelling PCB at a given time T and from the vantage point of a
   particular AS A.  This is illustrated by Figure 5.  This figure shows
   several possible path segments to reach AS Z, based on the PCBs "g",
   "h", "i", and "j" from Figure 4 above.  It is up to AS Z to use all
   of these path segments or just a selection of them.

de Kater, et al.          Expires 22 April 2025                [Page 21]
Internet-Draft                  SCION CP                    October 2024

                AS Entry Core         AS Entry Y          AS Entry Z

               +-------------+     +-------------+     +-------------+
               |  Core AS X  |     |    AS Y     |     |     AS Z    |
path segment 1 |            1#     #3            5     #1            |
               |             |     |             |     |             |
               |            2#-----#2----------- 6-----#5            |
               |             |     |             |     |             |
               +-------------+     +-------------+     +-------------+
                 egress 2       ingress 2 - egress 6      ingress 5

----------------------------------------------------------------------

               +-------------+     +-------------+     +-------------+
               |  Core AS X  |     |    AS Y     |     |     AS Z    |
               |            1#     #3     +-----5#-----#1            |
path segment 2 |             |     |      |      |     |             |
               |            2#-----#2-----+     6#     #5            |
               |             |     |             |     |             |
               +-------------+     +-------------+     +-------------+
                 egress 2       ingress 2 - egress 5      ingress 1

------------------------------------------------------------------------

               +-------------+     +-------------+     +-------------+
               |  Core AS X  |     |    AS Y     |     |     AS Z    |
               |            1#-----#3-----+     5#     #1            |
path segment 3 |             |     |      |      |     |             |
               |            2#     #2     +-----6#-----#5            |
               |             |     |             |     |             |
               +-------------+     +-------------+     +-------------+
                 egress 1       ingress 3 - egress 6      ingress 5

------------------------------------------------------------------------

               +-------------+     +-------------+     +-------------+
               |  Core AS X  |     |   AS Y      |     |     AS Z    |
               |            1#-----#3-----------5#-----#1            |
path segment 4 |             |     |             |     |             |
               |            2#     #2           6#     #5            |
               |             |     |             |     |             |
               +-------------+     +-------------+     +-------------+
                 egress 1       ingress 3 - egress 5      ingress 1

           Figure 5: Possible up- or down segments for AS Z

2.2.  Path-Segment Construction Beacons (PCBs)

de Kater, et al.          Expires 22 April 2025                [Page 22]
Internet-Draft                  SCION CP                    October 2024

2.2.1.  PCB Message Format

   Figure 6 graphically represents the PCB message format:

                              PCB / PATH SEGMENT

+-------------+------------+------------+--------+--------------------+
|Segment Info | AS Entry 0 | AS Entry 1 |  ...   |     AS Entry N     |
+-------------+------------+------------+--------+--------------------+
*- - - - # - -*            *- - - # - - *
         |                        |
*- - - - v - - - *                |
+---------+------+                |
|Timestamp|Seg ID|                |
+---------+------+                |
                                  |
*- - - - - - - - - - - - - - - - -v- - - - - - - - - - - - - - - - - - *
+-----------------------+----------------------------------------------+
|    Unsigned Ext.      |               Signed AS Entry                |
+-----------------------+----------------------------------------------+
                        *- - - - - - - - - - - - # - - - - - - - - - - *
                                                 |
                                                 |
*- - - - - - - - - - - - - - - - - - - - - - - - v - - - - - - - - - - *
+--------------------+-----------------++------------------------------+
|     Signature      |    Header       ||                    Body      |
+--------------------+-----------------++------------------------------+
                     *- - - - # - - - -**- - - - - - - - # - - - - - - *
                              |                          |
*- - - - - - - - - - - - - - -v- - - - *                 |
+----------------+---------------------+                 |
| Signature Alg. | Verification Key ID |                 |
+----------------+---------------------+                 |
                 *- - - - - # - - - - -*                 |
                            |                            |
*- - - - - - - - - - - - - -v- - - - - - - - - -*        |
+---------+---------+------------+--------------+        |
| ISD-AS  |TRC Base | TRC Serial |Subject Key ID|        |
+---------+---------+------------+--------------+        |
                                                         |
*- - - - - - - - - - - - - - - - - - - - - - - - - - - - v - - - - - - *
+------+-----------+---------++------------+----+------------++---+----+
|ISD-AS|Next ISD-AS|Hop Entry||Peer Entry 0| ...|Peer Entry N||MTU|Ext.|
+------+-----------+---------++------------+----+------------++---+----+
                   *- - # - -**- - - # - - *
                        |            |
                        |            |
*- - - - - - - - - - - -v- *  *- - - v - - - - - - - - - - - - - - - - *

de Kater, et al.          Expires 22 April 2025                [Page 23]
Internet-Draft                  SCION CP                    October 2024

+-------------+------------+  +--------+--------+----------+-----------+
| Ingress MTU | Hop Field  |  |HopField|PeerMTU |PeerISD-AS|PeerInterf.|
+-------------+--------+---+  +----+---+--------+----------+-----------+
                       *- - -#- - -*
                             |
                             |
*- - - - - - - - - - - - - - v - - - - - - - - - - - - - - *
+------------+-------------+-------------------+-----------+
|  Ingress   |    Egress   |  Expiration Time  |   MAC     |
+------------+-------------+-------------------+-----------+

              Figure 6: Top-down composition of one PCB

   *Note:* For a full example of one PCB in the Protobuf message format,
   please see Appendix "Full Control Service gRPC API", Figure 12.

2.2.1.1.  PCB Top-Level Message Format

   +-------------+-------------+------------+------+------------+
   |Segment Info | AS Entry 0  | AS Entry 1 |  ... | AS Entry N |
   +-------------+-------------+------------+------+------------+

   Each PCB MUST consists of at least:

   *  An information field with an identifier and a timestamp.

   *  Entries of all ASes on the path segment represented by this PCB.

   The following code block defines the PCB at the top level in Protobuf
   message format.

      message PathSegment {
          bytes segment_info = 1;
          repeated ASEntry as_entries = 2;
      }

   *  segment_info: This field is used as input for the PCB signature.
      It is the encoded version of the component SegmentInformation,
      which provides basic information about the PCB.  The
      SegmentInformation component is specified in detail in
      Section 2.2.1.2.

   *  as_entries: Contains the ASEntry component of all ASes on the path
      segment represented by this PCB.

de Kater, et al.          Expires 22 April 2025                [Page 24]
Internet-Draft                  SCION CP                    October 2024

      -  ASEntry: The ASEntry component contains the complete path
         information of a specific AS that is part of the path segment
         represented by the PCB.  The ASEntry component is specified in
         detail in Section 2.2.1.3.

2.2.1.2.  Segment Information

   +----------------------------+
   |         Segment Info       |
   +----------------------------+
   *- - - - - - - # - - - - - - *
                  |
                  |
   *- - - - - - - v - - - - - - *
   +--------------+-------------+
   |   Timestamp  |   Seg ID    |
   +--------------+-------------+

   Each PCB MUST include an information component with basic information
   about the PCB.

   In the Protobuf message format, the information component of a PCB is
   called the SegmentInformation message.  The following code block
   shows the Protobuf message definition for the SegmentInformation
   message.

      message SegmentInformation {
          int64 timestamp = 1;
          uint32 segment_id = 2;
      }

   *  timestamp: The 32-bit timestamp indicates the creation time of
      this PCB.  It is set by the originating core AS and the expiration
      time of each Hop Field in the PCB is computed relative to this
      timestamp.  The timestamp is encoded as the number of seconds
      elapsed since the POSIX Epoch (1970-01-01 00:00:00 UTC).

   *  segment_id: The 16-bit identifier of this PCB and the
      corresponding path segment.  The segment ID is REQUIRED for the
      computation of the message authentication code (MAC) of an AS's
      Hop Field.  The MAC is used for Hop Field verification in the data
      plane and the originating core AS MUST fill this field with a
      cryptographically random number.

   *Note:* See Section 2.2.1.6 for more information on the Hop Field
   message format.  [I-D.dekater-scion-dataplane] provides a detailed
   description of the computation of the MAC and the verification of the
   Hop Field in the data plane.

de Kater, et al.          Expires 22 April 2025                [Page 25]
Internet-Draft                  SCION CP                    October 2024

2.2.1.3.  AS Entry

                              +--------------+
                              |  AS Entry    |
                              +--------------+
                              *- - - -#- - - *
                                      |
                                      |
                                      |
   *- - - - - - - - - - - - - - - - - v - - - - - - - - - - - - - - - *
   +-----------------------+------------------------------------------+
   |    Unsigned Ext.      |          Signed AS Entry                 |
   +-----------------------+------------------------------------------+

   Each PCB MUST also contain the entries of all ASes included in the
   corresponding path segment.  This means that the originating core AS
   MUST add its AS entry to each PCB it creates, and each traversed AS
   MUST attach its AS entry to the PCB.

   One AS entry contains the complete hop information for this specific
   AS in this specific path segment.  It consists of a signed and an
   unsigned component.

   The code block below defines an AS entry ASEntry in Protobuf message
   format.

      message ASEntry {
          SignedMessage signed = 1;
          PathSegmentUnsignedExtensions unsigned = 2;
      }

   It includes the following components:

   *  SignedMessage: The signed component of an AS entry.  For the
      specification of this part of the AS entry, see Section 2.2.1.4
      below.

   *  PathSegmentUnsignedExtensions: The unsigned and thus unprotected
      part of the AS entry.  These are extensions with metadata that
      need no explicit protection.

2.2.1.4.  AS Entry Signed Component

de Kater, et al.          Expires 22 April 2025                [Page 26]
Internet-Draft                  SCION CP                    October 2024

         +------------------------------------------------------+
         |                   Signed AS Entry                    |
         +------------------------------------------------------+
         *- - - - - - - - - - - - -#- - - - - - - - - - - - - - *
                                   |
                                   |
 *- - - - - - - - - - - - - - - - -v- - - - - - - - - - - - - - - - - -*
 +--------------------+-----------------+------------------------------+
 |      Header        |     Body        |            Signature         |
 +--------------------+-----------------+------------------------------+

   Each AS entry of a PCB MUST include a signed component as well as a
   signature computed over the signed component.  Each AS entry MUST be
   signed with the Control Plane AS Certificate (See
   [I-D.dekater-scion-pki]).

   The signed component of an AS entry MUST include the following
   elements:

   *  a header,

   *  a body, and

   *  a signature.

   In the Protobuf message format implementation, the signed component
   of an AS entry is specified by the SignedMessage.  It consists of a
   header-and-body part (header_and_body) and a raw signature
   (signature).  See also the code block below.

      message SignedMessage {
          bytes header_and_body = 1;
          bytes signature = 2;
      }

   The following code block shows the low level representation of the
   HeaderAndBodyInternal message used for signature computation input.
   This message SHOULD NOT be used by external code.

      message HeaderAndBodyInternal {
          // Encoded header suitable for signature computation.
          bytes header = 1;
          // Raw payload suitable for signature computation.
          bytes body = 2;
      }

   *  For the specification of the signed header, see Section 2.2.1.4.1.

de Kater, et al.          Expires 22 April 2025                [Page 27]
Internet-Draft                  SCION CP                    October 2024

   *  For the specification of the signed body, see Section 2.2.1.4.2.

   *  For the specification of the signature field, see
      Section 2.2.1.4.3.

2.2.1.4.1.  AS Entry Signed Header

              +-----------------+
              |     Header      |
              +-----------------+
              *- - - - # - - - -*
                       |
    - - - - - - - - - -v- - - - - - - - - *
   +----------------+---------------------+
   | Signature Alg. | Verification Key ID |
   +----------------+---------------------+
                    *- - - - - # - - - - -*
                               |
    - - - - - - - - - - - - - -v- - - - - - - - - -
   +---------+---------+------------+--------------+
   | ISD-AS  |TRC Base | TRC Serial |Subject Key ID|
   +---------+---------+------------+--------------+

   The header part defines metadata that is relevant to the computation
   and verification of the signature.  It MUST include at least the
   following metadata:

   *  The algorithm to compute the signature

   *  The subjectKeyIdentifier of the public key to be used to verify
      the signature (see [I-D.dekater-scion-pki])

   *  The ISD-AS number of the AS

   The following code block defines the signed header of an AS entry in
   Protobuf message format (called the Header message).

de Kater, et al.          Expires 22 April 2025                [Page 28]
Internet-Draft                  SCION CP                    October 2024

      message Header {
          SignatureAlgorithm signature_algorithm = 1;
          bytes verification_key_id = 2;
          // Optional
          google.protobuf.Timestamp timestamp = 3;
          // Optional
          bytes metadata = 4;
          int32 associated_data_length = 5;
      }

      message VerificationKeyID {
          uint64 isd_as = 1;
          bytes subject_key_id = 2;
          uint64 trc_base = 3;
          uint64 trc_serial = 4;
      }

   *  signature_algorithm: Specifies the algorithm to compute the
      signature.

   *  verification_key_id: Contains information that is relevant to
      signing and verifying PCBs and other control-plane messages.  It
      includes the following fields (see also the above code block):

      -  isd_as: The ISD-AS number of the current AS.

      -  subject_key_id: Refers to the certificate that contains the
         public key needed to verify this PCB's signature.

      -  trc_base: Defines the _base_ number of the latest Trust Root
         Configuration (TRC) available to the signer at the time of the
         signature creation.

      -  trc_serial: Defines the _serial_ number of the latest TRC
         available to the signer at the time of the signature creation.

   *Note:* For more information on signing and verifying control plane
   messages (such as PCBs), see the chapter Signing and Verifying
   Control Plane Messages of the SCION Control Plane PKI Specification
   [I-D.dekater-scion-pki].  For more information on the TRC base and
   serial number, see the chapter Trust Root Configuration Specification
   of the SCION Control Plane PKI Specification [I-D.dekater-scion-pki].

   *  timestamp: Defines the signature creation timestamp.  This field
      is OPTIONAL.

   *  metadata: Can be used to include arbitrary per-protocol metadata.
      This field is OPTIONAL.

de Kater, et al.          Expires 22 April 2025                [Page 29]
Internet-Draft                  SCION CP                    October 2024

   *  associated_data_length: Specifies the length of associated data
      that is covered by the signature, but is not included in the
      header and body.  The value of this field is zero, if no
      associated data is covered by the signature.

2.2.1.4.2.  AS Entry Signed Body

                 +--------------------------------------+
                 |                 Body                 |
                 +--------------------------------------+
                 *- - - - - - - - - -#- - - - - - - - - *
                                     |
                                     |
 *- - - - - - - - - - - - - - - - - -v- - - - - - - - - - - - - - - - -*
 +------+-----------+---------++------------+---+------------++---+----+
 |ISD-AS|Next ISD-AS|Hop Entry||Peer Entry 0|...|Peer Entry N||MTU|Ext.|
 +------+-----------+---------++------------+---+------------++---+----+

   The body of an AS entry MUST consist of the signed component
   ASEntrySignedBody of all ASes in the path segment represented by the
   PCB, up until and including the current AS.

   The following code block defines the signed body of one AS entry in
   Protobuf message format (called the ASEntrySignedBody message).

      message ASEntrySignedBody {
          uint64 isd_as = 1;
          uint64 next_isd_as = 2;
          HopEntry hop_entry = 3;
          repeated PeerEntry peer_entries = 4;
          uint32 mtu = 5;
          PathSegmentExtensions extensions = 6;
      }

   *  isd_as: The ISD-AS number of the AS that created this AS entry.

   *  next_isd_as: The ISD-AS number of the downstream AS to which the
      PCB SHOULD be forwarded.

   *  hop_entry: The hop entry (HopEntry) with the information required
      to forward this PCB through the current AS to the next AS.  This
      information is used in the data plane.  For a specification of the
      hop entry, see Section 2.2.1.5.

   *  peer_entries: The list of optional peer entries (PeerEntry).  For
      a specification of one peer entry, see Section 2.2.1.7.

de Kater, et al.          Expires 22 April 2025                [Page 30]
Internet-Draft                  SCION CP                    October 2024

   *  mtu: The maximum transmission unit (MTU) that is supported by all
      intra-domain links within the current AS.  This value is set by
      the control service when adding the AS entry to the beacon.  How
      the control service obtains this information is implementation
      dependent.  Current practice is to make it a configuration item.

   *  extensions: List of (signed) extensions (optional).  PCB
      extensions defined here are part of the signed AS entry.  This
      field SHOULD therefore only contain extensions that include
      important metadata for which cryptographic protection is required.
      For more information on PCB extensions, see Section 2.2.2.

2.2.1.4.3.  AS Entry Signature

   Each AS entry MUST be signed with the AS certificate's private key
   K_i.  The certificate MUST have a validity period fully containing
   that of the segment being verified, regardless of current time.  The
   signature Sig_i of an AS entry ASE_i is computed over the AS entry's
   signed component.

   This is the input for the computation of the signature:

   *  The signed header and body of the current AS (header_and_body).

   *  The segment_info component of the current AS.  This is the encoded
      version of the SegmentInformation component containing basic
      information about the path segment represented by the PCB.  For
      the specification of SegmentInformation, see Section 2.2.1.2.

   *  The signed header_and_body/signature combination of each previous
      AS on this specific path segment.

   The signature Sig_i of an AS entry ASE_i is now computed as follows:

   Sig_i = K_i( SegInfo || ASE_0^(signed) || Sig_0 || ... ||
   ASE_(i-1)^(signed) || Sig_(i-1) || ASE_i^(signed) )

   The signature metadata minimally contains the ISD-AS number of the
   signing entity and the key identifier of the public key to be used to
   verify the message.  For more information on signing and verifying
   control plane messages, see the chapter "Signing and Verifying
   Control Plane Messages" of the SCION Control Plane PKI Specification
   [I-D.dekater-scion-pki].

   The following code block shows how the signature input is defined in
   the SCION Protobuf implementation ("ps" stands for path segment).
   Note that the signature has a nested structure.

de Kater, et al.          Expires 22 April 2025                [Page 31]
Internet-Draft                  SCION CP                    October 2024

   input(ps, i) = signed.header_and_body || associated_data(ps, i)

   associated_data(ps, i) = ps.segment_info ||
                            ps.as_entries[1].signed.header_and_body ||
                            ps.as_entries[1].signed.signature ||
                            ...
                            ps.as_entries[i-1].signed.header_and_body ||
                            ps.as_entries[i-1].signed.signature

2.2.1.5.  Hop Entry

          +-----------+
          | Hop Entry |
          +-----------+
          *- - -#- - -*
                |
    - - - - - - v - - - - - - *
   +-------------+------------+
   | Ingress MTU | Hop Field  |
   +-------------+------------+

   Each body of an AS entry MUST contain exactly one hop entry
   component.  The hop entry component specifies forwarding information
   which the data plane requires to create the hop through the current
   AS (in the direction of the beaconing).

   The following code block defines the hop entry component HopEntry in
   Protobuf message format:

      message HopEntry {
          HopField hop_field = 1;
          uint32 ingress_mtu = 2;
      }

   *  hop_field: Contains the authenticated information about the
      ingress and egress interfaces in the direction of beaconing.
      Routers need this information to forward packets through the
      current AS.  For further specifications, see Section 2.2.1.6.

   *  ingress_mtu: Specifies the maximum transmission unit (MTU) of the
      ingress interface (in beaconing direction) of the hop being
      described.  The MTU of paths constructed from the containing
      beacon is necessarily less than or equal to this value.  How the
      control service obtains the MTU of an inter-AS link is
      implementation dependent.  It may be discovered or configured.
      Current practice to make it a configuration item.

de Kater, et al.          Expires 22 April 2025                [Page 32]
Internet-Draft                  SCION CP                    October 2024

   In this description, MTU and packet size are to be understood in the
   same sense as in [RFC1122].  That is, exclusive of any layer 2
   framing or packet encapsulation (for links using an underlay
   network).

2.2.1.6.  Hop Field

                         +-----------+
                         | Hop Field |
                         +-----------+
                         *- - -#- - -*
                               |
                               |
   *- - - - - - - - - - - - - -v- - - - - - - - - - - - - - - *
   +-------------+-------------+-------------------+----------+
   |   Ingress   |    Egress   |  Expiration Time  |   MAC    |
   +-------------+-------------+-------------------+----------+

   The Hop Field, part of both hop entries and peer entries, is used
   directly in the data plane for packet forwarding and specifies the
   incoming and outgoing interfaces of the ASes on the forwarding path.
   To prevent forgery, this information is authenticated with a message
   authentication code (MAC) which will be checked by the SCION border
   routers during packet forwarding.  The algorithm used to compute the
   Hop Field MAC is an AS-specific choice and the operator of an AS can
   freely choose a MAC algorithm without outside coordination.  However,
   the Control Service and routers of the AS do need to agree on the
   algorithm used.

   Control Service and router implementations MUST support the Default
   Hop Field MAC algorithm described in [I-D.dekater-scion-dataplane].
   This document does not specify any further mechanism to coordinate
   this choice between Control Services and routers of one AS.

   The following code block defines the Hop Field component HopField in
   Protobuf message format:

      message HopField {
          uint64 ingress = 1;
          uint64 egress = 2;
          uint32 exp_time = 3;
          bytes mac = 4;
      }

   *  ingress: The 16-bit ingress interface identifier (in the direction
      of the path construction, that is, in the direction of beaconing
      through the current AS).

de Kater, et al.          Expires 22 April 2025                [Page 33]
Internet-Draft                  SCION CP                    October 2024

   *Note:* For the core AS that initiates the PCB, the ingress interface
   identifier MUST NOT be specified.  This initiating AS is a core AS.

   *  egress: The 16-bit egress interface identifier (in the direction
      of beaconing).

   *  exp_time: The 8-bit encoded expiration time of the Hop Field,
      indicating its validity.  This field expresses a duration in
      seconds according to the formula: duration = (1 + exp_time) *
      (24*60*60/256).  The minimum duration is therefore 337.5 s.  This
      duration is relative to the PCB creation timestamp set in the
      PCB's segment information component (see also Section 2.2.1.2).
      Therefore, the absolute expiration time of the Hop Field is the
      sum of these two values.

   *  mac: The message authentication code (MAC) used in the data plane
      to verify the Hop Field, as described in
      [I-D.dekater-scion-dataplane].

2.2.1.7.  Peer Entry

                         +--------------+
                         |  Peer Entry  |
                         +--------------+
                         *- - - -#- - - *
                                 |
   *- - - - - - - - - - - - - - -v- - - - - - - - - - - - - - *
   +-------------+------------+--------------+----------------+
   |  Hop Field  |  Peer MTU  | Peer ISD-AS  | Peer Interface |
   +-------------+------------+--------------+----------------+

   By means of a peer entry, an AS can announce that it has a peering
   link to another AS.  A peer entry is an optional component of a PCB -
   it is only included if there is a peering link to a peer AS.

   The following code block defines the peer entry component PeerEntry
   in Protobuf message format:

      message PeerEntry {
          uint64 peer_isd_as = 1;
          uint64 peer_interface = 2;
          uint32 peer_mtu = 3;
          HopField hop_field = 4;
      }

   *  peer_isd_as: The ISD-AS number of the peer AS.  This number is
      used to match peering segments during path construction.

de Kater, et al.          Expires 22 April 2025                [Page 34]
Internet-Draft                  SCION CP                    October 2024

   *  peer_interface: The 16-bit interface identifier of the peering
      link on the peer AS side.  This identifier is used to match
      peering segments during path construction.

   *  peer_mtu: Specifies the maximum transmission unit (MTU) of the
      peering link being described.  The MTU of paths via such link is
      necessarily less than or equal to this value.  How the control
      service obtains the MTU of an inter-AS link is implementation
      dependent.  It may be discovered or configured, but current
      practice is to make it a configuration item.

   *  hop_field: Contains the authenticated information about the
      ingress and egress interfaces in the current AS (coming from the
      peering link, in the direction of beaconing - see also Figure 7).
      The data plane needs this information to forward packets through
      the current AS.  For further specifications, see Section 2.2.1.6.

   In this description, MTU and packet size are to be understood in the
   same sense as in [RFC1122].  That is, exclusive of any layer 2
   framing or packet encapsulation (for links using an underlay
   network).

      +-----------+
      |           |
      | parent AS |
      |           |
      +-----------+
            |
            |
            | ASE.HF.ingress_interface
   +--------#-----------+                  +-----------------+
   |        |           |         PE.peer_ |                 |
   |                    |         interface|                 |
   |        | + - - - - #------------------#     peer AS     |
   |                    |PE.HF.ingress_    |                 |
   |        | |         |interface         |                 |
   |                    |                  +-----------------+
   |        v v         |
   +---------#----------+
             | PE.HF.egress_interface
             | ASE.HF.egress_interface
             |
             |
       +-----------+
       |           |
       |  child AS |
       |           |
       +-----------+

de Kater, et al.          Expires 22 April 2025                [Page 35]
Internet-Draft                  SCION CP                    October 2024

      Figure 7: Peer entry information, in the direction of beaconing

2.2.2.  PCB Extensions

   In addition to basic routing information such a hop entries and peer
   entries, PCBs can be used to communicate additional metadata in
   extensions.  Extensions can be signed and unsigned: signed extensions
   are protected by the AS signature, whereas unsigned extensions are
   not.

   In Protobuf, extensions are specified as follows:

   *  Unsigned extensions PathSegmentUnsignedExtensions are part of the
      AS entry component (the ASEntry message, see also
      Section 2.2.1.3).

   *  Signed extensions PathSegmentExtensions are part of the signed
      body component of an AS entry (the ASEntrySignedBody message, see
      also Section 2.2.1.4.2).

   *Note:* SCION also supports so-called "detachable extensions".  The
   detachable extension is part of a PCB's unsigned extensions, but a
   cryptographic hash of the detachable extension data is added to the
   signed extensions.  Thus, a PCB with a detachable extension can be
   signed and verified without actually including the detachable
   extension in the signature.  This prevents a possible processing
   overhead caused by large cryptographically-protected extensions.

2.2.3.  PCB Validity

   To be valid (that is, usable to construct a valid path), a PCB MUST:

   *  Contain valid AS Entry signatures (Section 2.2.1.4.3).

   *  Have a timestamp (Section 2.2.1.2) that is not in the future.

   *  Contain only unexpired hops (Section 2.2.1.6).

   For the purpose of validation, a timestamp is considered "future" if
   it is later than the current time at the point of validation plus the
   minimum expiration time of a Hop Field (337.5 seconds, see
   Section 2.2.1.6).

   For the purpose of validation, a hop is considered expired if its
   absolute expiration time, calculated as defined in Section 2.2.1.6,
   is later than the current time at the point of validation.

de Kater, et al.          Expires 22 April 2025                [Page 36]
Internet-Draft                  SCION CP                    October 2024

2.2.4.  Configuration

   For the purpose of constructing and propagating path segments, an AS
   Control Service MUST be configured with links to neighboring ASes.
   Such information may be conveyed to the Control Service in an out-of-
   band fashion (e.g in a configuration file).  For each link, these
   values MUST be configured:

   *  Local interface ID

   *  Neighbor type (core, parent, child, peer), depending on link type
      (see Section 1.3).  Link type depends on mutual agreements between
      the organizations operating the ASes at each end of each link.

   *  Neighbor ISD-AS number

   *  Neighbor interface underlay address

   In addition, the maximum MTU supported by all intra-AS links MAY be
   configured.

2.3.  Propagation of PCBs

   This section describes how PCBs are selected and propagated in the
   path exploration process.

2.3.1.  Selection of PCBs to Propagate

   As an AS receives a series of intra-ISD or core PCBs, it MUST select
   the PCBs that it will propagate further.  Each AS specifies a local
   policy on the basis of which PCBs are evaluated, selected, or
   eliminated.  The selection process can inspect and compare the
   properties of the candidate PCBs (e.g., length, disjointness across
   different paths, age, expiration time) and/or take into account which
   PCBs have been propagated in the past.

   Naturally, an AS's policy selects PCBs corresponding to paths that
   are commercially or otherwise operationally viable.  From these
   viable PCBs, only a relatively small subset SHOULD be propagated to
   avoid excessive overhead of the path discovery system in bigger
   networks.

de Kater, et al.          Expires 22 April 2025                [Page 37]
Internet-Draft                  SCION CP                    October 2024

   The goal of the AS SHOULD be to propagate those candidate PCBs with
   the highest probability of collectively meeting the needs of the
   endpoints that will perform path construction.  As SCION does not
   provide any in-band signal about the intentions of endpoints nor
   about the policies of downstream ASes, the policy will typically
   select a somewhat diverse set optimized for multiple, generic
   parameters.

2.3.1.1.  Storing and Selecting Candidate PCBs

   When receiving a PCB, an AS first stores the PCB in a temporary
   storage for candidate PCBs called the _Beacon Store_.

   PCBs are propagated in batches to each connected AS at a fixed
   frequency known as the _propagation interval_. At each propagation
   event, each AS selects a set of the best PCBs from the candidates in
   the Beacon Store, according to the AS's selection policy.  This set
   SHOULD have a fixed size, the _best PCBs set size_.

   *  The _best PCBs set size_ SHOULD be at most "50" (PCBs) for intra-
      ISD beaconing and at most "5" (PCBs) for core beaconing (i.e.
      propagation between all core ASes).  These are RECOMMENDED maxima;
      in current practice the intra-ISD set size is typically 20.

   Depending on the selection criteria, it may be necessary to keep more
   candidate PCBs than the _best PCBs set size_ in the Beacon Store, to
   be able to determine the best set of PCBs.  If this is the case, an
   AS SHOULD have a suitable pre-selection of candidate PCBs in place in
   order to keep the Beacon Store capacity limited.

   *  The _propagation interval_ SHOULD be at least "5" (seconds) for
      intra-ISD beaconing and at least "60" (seconds) for core
      beaconing.

   Note that to ensure quick connectivity establishment, an AS MAY
   attempt to forward a PCB more frequently ("fast recovery").  Current
   practice is to increase the frequency of attempts if no PCB
   propagation is know to have succeeded within the last propagation
   interval:

   *  because the corresponding RPC failed;

   *  or because no beacon was available to propagate.

   The scalability implications of such parameters are further discussed
   in Section 3.3.

de Kater, et al.          Expires 22 April 2025                [Page 38]
Internet-Draft                  SCION CP                    October 2024

2.3.1.2.  Selection Policy Example

   Figure 8 below illustrates the selection of path segments in three
   networks.  Each network uses a different path property to select path
   segments.

   *  The network at the upper left considers the _path length_ which is
      here defined as the number of hops from the originator core AS to
      the local AS.  This number can give an indication of the path's
      latency and based this, the network will select the PCB
      representing path segment A-G (in direction of beaconing) to
      propagate.

   *  The network at the upper right uses _peering links_ as the
      selection criterion.  That is the number of different peering ASes
      from all non-core ASes on the PCB or path segment: a greater
      number of peering ASes increases the likelihood of finding a
      shortcut on the path segment.  Based on this, the network will
      select the PCB representing path segment B-E-I-L (in direction of
      beaconing) to propagate.

   *  The lower network selects PCBs based on _disjointness_. The
      disjointness of a PCB is calculated relative to the PCBs that have
      been previously sent.  Paths can be either AS disjoint or link
      disjoint.  AS disjoint paths have no common upstream/core AS for
      the current AS, whereas link disjoint paths do not share any AS-
      to-AS link.  Depending on the objective of the AS, both criteria
      can be used: AS disjointness allows path diversity in the event
      that an AS becomes unresponsive, and link disjointness provides
      resilience in case of link failure.  Based on the disjointness
      criterion, the network will select the PCBs representing the path
      segments A-D-G-H-J and C-E-F-I-J (in direction of beaconing) to
      propagate.

   Selected path segment: #------# or *------*
   Peering Link: PL

     ISD A: Path Length                 ISD B: Peering Links
  +----------------------+          +---------------------------+
  |      ISD Core        |          |        ISD Core           |
  | .---.         .---.  |          |  .---.             .---.  |
  |(  A  ) - - - (  C  ) |          | (  A  ) - - - - - (  C  ) |
  | `-#-'         `---'  |       + --- `---'             `---'  |
  |   ||   .---.   | |   |          |      |  .---. - - - - -   |
  |   | - (  B  ) -      |       |  |    |  -(  B  )            |
  |   |    `-+-'     |   |          |         `-#-||            |
  +---|--------------|---+       |  |    |      |   - - - - - - - - +
      |      |       |           |  |           | |             |

de Kater, et al.          Expires 22 April 2025                [Page 39]
Internet-Draft                  SCION CP                    October 2024

      |                          |  +----|------|-|-------------+   |
      |      |     .-+-.                        | + - - - - +
      |    .-+-.  (  E  )        |       |      |                   |
      |   (  D  )  `---'                        |           |
      |    `-+-'     |         .-+-.     |    .-#-.       .-+-.     |
      |            .-+-.      (  D  )-PL-----(  E  )--PL-(  F  )
      |      |    (  F  )      `---'     |    `-#-'       `-+-'   .-+-.
    .-#-.          `-+-'                        |                (  G  )
   (  G  ) - +       |               - - +      |           |     `-+-'
    `---- - - - - - -               |           |
                                  .---.       .-#-.       .-+-.     |
                                 (  H  )-PL--(  I  )--PL-(  J  )
                                  `---'       `-#-'       `---'   .-+-.
                                                |           |    (  K  )
         ISD C: Disjointness                    |                 `---'
    +---------------------------+             .-#-.         |       |
    |          ISD Core         |            (  L  ) - - - -
    |                           |             `---' - - - - - - - - +
    | .---.               .---. |
    |(  A  ) - - - - - - (  C  )|
    | `-*-'               `-#-' |
    |   | |     .---.     | |   |
    |   |  - - (  B  ) - -  |   |
    |   |       `---'       |   |
    +---|-------------------|---+
        |                   |
   .----*.                .-#---.
  (   D   )              (   E   )
   `----*'                `-#---'
   |    |                   |   |
      #---------------------#
   |  | |                       |
      | *------------------*
   |  |                    |    |
   .--#--.                .*----.
  (   F   #-------#      (   G   )
   `-----'        |       `*----|
   |          *------------*
              |   |             |
   |-----.    |   |       .-----.
  (   H  *----*   #------#   I   )
   `---*-'                `-#---'
       |                    |
       |       .---.        |
       *------*  J  #-------#
               `---'

de Kater, et al.          Expires 22 April 2025                [Page 40]
Internet-Draft                  SCION CP                    October 2024

     Figure 8: Example networks to illustrate path segment selection
                   based on different path properties.

2.3.2.  Propagation of Selected PCBs

   As mentioned above, once per _propagation period_ (determined by each
   AS), an AS propagates selected PCBs to its neighboring ASes which
   happens at the level of both intra-ISD beaconing and core beaconing.
   This section describes both processes in more detail.

   To bootstrap the initial communication with a neighboring beacon
   service, ASes use one-hop paths.  This special kind of path handles
   beaconing between neighboring ASes for which no forwarding path may
   be available yet.  In fact, it is the task of beaconing to discover
   such forwarding paths and the purpose of one-hop paths is to break
   this circular dependency.  The One-Hop Path Type is described in more
   detail in [I-D.dekater-scion-dataplane].

2.3.2.1.  Reception of PCBs

   The following first steps of the propagation procedure are the same
   for both intra-ISD and core beaconing:

   1.  Upon receiving a PCB, the Control Service of an AS verifies the
       validity of the PCB (see Section 2.2.3) and invalid PCBs MUST be
       discarded.  The PCB contains the version numbers of the TRC(s)
       and certificate(s) that MUST be used to verify its signatures
       which enables the Control Service to check whether it has the
       relevant TRC(s) and certificate(s).  If not, they can be
       requested from the Control Service of the sending AS.

   2.  As core beaconing is based on propagating PCBs to all AS
       neighbors, it is necessary to avoid loops during path creation.
       The Control Service of core ASes MUST therefore check whether the
       PCB includes duplicate hop entries created by the core AS itself
       or by other ASes, and if so, the PCB MUST be discarded in order
       to avoid loops.  Additionally, core ASes MAY make a policy
       decision not to propagate beacons containing path segments that
       traverse the same ISD more than once as this can be legitimate,
       e.g. if the ISD spans a large geographical area, a path
       transiting another ISD may constitute a shortcut.

   3.  If the PCB verification is successful, the Control Service
       decides whether to store the PCB as a candidate for propagation
       based on selection criteria and polices specific for each AS.
       For more information on the selection process, see Section 2.3.1.

de Kater, et al.          Expires 22 April 2025                [Page 41]
Internet-Draft                  SCION CP                    October 2024

2.3.2.2.  Propagation of PCBs in Intra-ISD Beaconing

   The propagation process in intra-ISD beaconing includes the following
   steps:

   1.  From the candidate PCBs stored in the Beacon Store, the Control
       Service of an AS selects the best PCBs to propagate to its
       downstream neighboring ASes, based on a selection algorithm
       specific for this AS.

   2.  The Control Service adds a new AS entry to every selected PCB
       which MUST at least include:

       *  The ingress interface to this AS, in the Hop Field component.

       *  The egress interface to the neighboring AS, also in the Hop
          Field component.

       *  The ISD_AS number of the next AS, in the signed body component
          of the AS entry.

       *  If the AS has peering links, the Control Service MAY add
          corresponding peer entry components to the signed body of the
          AS entry; one peer entry component for each peering link that
          the AS wants to advertise.  The Hop Field component of each
          added peer entry MUST have a specified egress interface.

   3.  The Control Service MUST now sign each selected, extended PCB and
       append the computed signature.

   4.  As a final step, the Control Service propagates each extended PCB
       to the correct neighboring ASes by invoking the
       SegmentCreationService.Beacon remote procedure call (RPC) in the
       Control Services of the neighboring ASes (see also
       Section 2.3.2.4).

2.3.2.3.  Propagation of PCBs in Core Beaconing

   The propagation process in core beaconing includes the following
   steps:

   1.  The core Control Service selects the best PCBs to forward to
       neighboring core ASes observed so far.

   2.  The service adds a new AS entry to every selected PCB which MUST
       at least include:

de Kater, et al.          Expires 22 April 2025                [Page 42]
Internet-Draft                  SCION CP                    October 2024

       *  The egress interface to the neighboring core AS in the Hop
          Field component.

       *  The ISD_AS number of the neighboring core AS in the signed
          body component of the AS entry.

   3.  The core Control Service MUST sign the extended PCBs and append
       the computed signature.

   4.  As a final step, the service propagates the extended PCBs to the
       neighboring core ASes by invoking the
       SegmentCreationService.Beacon remote procedure call (RPC) in the
       Control Services of the neighboring core ASes (see also
       Section 2.3.2.4).

2.3.2.4.  Propagation of PCBs in Protobuf Message Format

   The last step of the above described core and intra-ISD propagation
   procedures is implemented as follows in Protobuf message format:

      service SegmentCreationService {
          rpc Beacon(BeaconRequest) returns (BeaconResponse) {}
      }

      message BeaconRequest {
          PathSegment segment = 1;
      }

      message BeaconResponse {}

   The propagation procedure includes the following elements:

   *  SegmentCreationService: Specifies the service via which the
      extended PCB is propagated to the Control Service of the
      neighboring AS.

      -  Beacon: Specifies the method that calls the Control Service at
         the neighboring AS in order to propagate the extended PCB.

   *  BeaconRequest: Specifies the request message sent by the Beacon
      method to the Control Service of the neighboring AS.  It contains
      the following element:

      -  PathSegment: Specifies the path segment to propagate to the
         neighboring AS.  For more information on the Protobuf message
         type PathSegment, see Section 2.2.1.1.

de Kater, et al.          Expires 22 April 2025                [Page 43]
Internet-Draft                  SCION CP                    October 2024

   *  BeaconResponse: An empty message returned as an acknowledgement
      upon success.

3.  Deployment Considerations

3.1.  Monitoring Considerations

   In order to maintain service availability, an AS SHOULD monitor the
   following aspects when deploying the SCION control plane:

   *  For routers (to enable correlation with link states): state of
      configured links (core, child, parent)

   *  For any control service:

      -  Fraction of path lookups served successfully (see Section 5)

      -  Time synchronization offset with other ASes (see Section 3.2)

      -  Fraction of ASes found in non-expired segments for which a non-
         expired certificate exists

   *  For a core AS:

      -  Fraction of core ASes (preferably only those to which the link
         is up) that can be found in non-expired core segments

      -  Fraction of ASes, core or children, (preferably only those to
         which the link is up) whereto a beacon was initiated during the
         last propagation interval

      -  Fraction of freshly propagated beacons for which at least one
         corresponding down segment has been registered (see Section 4)

   *  For a non-core AS:

      -  Number of up segments available (may be just 0/non-0) younger
         than the propagation interval (or some multiple thereof).

      -  Fraction of up segments that were successfully registered as
         down segments (see Section 4).

      -  Fraction of children ASes (preferably only those to which the
         link is up) whereto a beacon was propagated during the last
         propagation interval

de Kater, et al.          Expires 22 April 2025                [Page 44]
Internet-Draft                  SCION CP                    October 2024

3.2.  Effects of Clock Inaccuracy

   A PCB originated by a given Control Service is validated by all the
   Control Services that receive it.  All have different clocks and
   their differences affect the validation process:

   *  A fast clock at origination or a slow clock at reception will
      yield a lengthened expiration time for hops, and possibly an
      origination time in the future.

   *  A slow clock at origination or a fast clock at reception will
      yield a shortened expiration time for hops, and possibly an
      expiration time in the past.

   This bias comes in addition to a structural delay: PCBs are
   propagated at a configurable interval - typically around one minute.
   As a result of this and the way they are iteratively constructed,
   PCBs with N hops may be validated up to N intervals (so maximally N
   minutes) after origination which creates a constraint on the
   expiration of hops.  Hops of the minimal expiration time (337.5
   seconds - see Section 2.2.1.6) would make any PCB describing a path
   longer than 5 hops expire.  For this reason it is unadvisable to
   create hops with a short expiration time - they SHOULD be around 6
   hours.

   The Control Service and its clients authenticate each-other according
   to their respective AS's certificate.  Path segments are
   authenticated based on the certificates of the ASes that they refer
   to.  The RECOMMENDED expiration time of a SCION AS certificate is
   between 3h and 3 days.  Some deployments use up to 5 days.  In
   comparison to these time scales, clock offsets in the order of
   minutes are immaterial.

   Each administrator of a SCION Control Service is responsible for
   maintaining sufficient clock accuracy.  No particular method is
   assumed by this specification.

3.3.  Path Discovery Time and Scalability

   The path discovery mechanism balances the number of discovered paths
   and the time it takes to discover them versus resource overhead of
   the discovery.

   The resource costs for path discovery are as follows:

   *  Communication overhead is transmitting the PCBs and occasionally
      obtaining the required PKI material.

de Kater, et al.          Expires 22 April 2025                [Page 45]
Internet-Draft                  SCION CP                    October 2024

   *  Processing overhead is validating the signatures of the AS
      entries, signing new AS entries, and to a lesser extent,
      evaluating the beaconing policies.

   *  Storage overhead is both the temporary storage of PCBs before the
      next propagation interval, and the storage of complete discovered
      path segments.

   All of these are dependent on the number and length of the discovered
   path segments, i.e. the total number of AS entries of the discovered
   path segments.

   Interesting metrics for scalability and speed of path discovery are
   the time until all discoverable path segments have been discovered
   after a "cold start", and the time until new link is usable.  In
   general, the time until a specific PCB is built depends on its
   length, the propagation interval, and whether on-path ASes use "fast
   recovery".

   At each AS, the PCB will be processed and propagated at the
   subsequent propagation event.  As propagation events are not
   synchronized between different ASes, a PCB arrives at a random point
   in time during the interval and may be buffered before potentially
   being propagated.  With a propagation interval T at each AS, the mean
   time until the PCB is propagated in one AS therefore is T / 2 and the
   mean total time for the propagation steps of a PCB of length L is at
   worst L * T / 2 (with a variance of L * T^2 / 12).

   Note that link removal is not part of path discovery in SCION.  For
   scheduled removal of links, operators let path segments expire.  On
   link failures, endpoints route around the failed link by switching to
   different paths in the data plane.

   To achieve scalability, SCION partitions ASes into ISDs and in an
   ideal topology the inter-ISD core network should be kept to a
   moderate size.  For more specific observations, we distinguish
   between intra-ISD and inter-ISD beaconing.

3.3.1.  Intra-ISD Beaconing

   In the intra-ISD beaconing, PCBs are propagated top down along
   parent-child links from core to leaf ASes.  Each AS discovers path
   segments from itself to the core ASes of its ISD.

de Kater, et al.          Expires 22 April 2025                [Page 46]
Internet-Draft                  SCION CP                    October 2024

   This typically produces an acyclic graph which is narrow at the top,
   widens towards the leafs, and is relatively shallow.  Intermediate
   provider ASes will have a large number of children, while they only
   have a small number of parents and the chain of intermediate
   providers from a leaf AS to a core AS is typically not long (e.g.
   local, regional, national provider, then core).

   Each AS potentially receives PCBs for all down path segments from the
   core to itself.  While the number of distinct provider chains to the
   core is typically moderate, the multiplicity of links between
   provider ASes has multiplicative effect on the number of PCBs.  Once
   this number grows above the maximum recommended best PCBs set size of
   50, ASes SHOULD trim the set of PCBs propagated.

   Ultimately, the number of PCBs received by an AS per propagation
   interval remains bounded by 50 for each parent link of an AS, and at
   most 50 PCBs per child link are propagated.  The length of these PCBs
   and thus the number of AS entries to be processed and stored, is
   expected to be moderate and not grow considerably with network size.
   The total resource overhead for beacon propagation is easily
   manageable even for highly connected ASes.

   To illustrate this, an AS with a rather large number of 100 parent
   links receives at most 5000 PCBs during a propagation interval.
   Assuming a generous average length of 10 AS entries for these PCBs,
   this corresponds to 50000 AS entries.

   Due to the variable length fields in AS entries, the sizes for
   storage and transmission cannot be predicted exactly, but assume an
   average of 250 bytes per AS entry.  At the shortest recommended
   propagation interval of 5 seconds, this corresponds to an average
   bandwidth of around 2.5 MB/s and the processing of 10000 signature
   verifications per second.

   If the same AS has 1000 child links, the propagation of the beacons
   will require signing one new AS entry for each of the propagated PCBs
   for each link (at most 50 per link), i.e. at most 50000 signatures
   per propagation event.  The total bandwidth for the propagation of
   these PCBs for all 1000 child links would, be roughly around 25 MB/s
   which is manageable with even modest consumer hardware.

de Kater, et al.          Expires 22 April 2025                [Page 47]
Internet-Draft                  SCION CP                    October 2024

   On a cold start of the network, path segments to each AS are
   discovered within a number of propagation steps proportional to the
   longest path.  With a 5 second propagation period and a generous
   longest path of length 10, all path segments are discovered after 25
   seconds on average.  When all ASes start propagation just after
   they've received the first PCBs from any of their upstreams (see
   'fast recovery'), the construction of a first path to connect each AS
   to the ISD core is accelerated.

   When a new parent-child link is added to the network, the parent AS
   will propagate the available PCBs in the next propagation event.  If
   the AS on the child side of the new link is a leaf AS, path discovery
   is thus complete after at most one propagation interval.  Otherwise,
   child ASes at distance D below the new link, learn of the new link
   after at worst D further propagation intervals.

3.3.2.  Inter-ISD Beaconing

   In the inter-ISD core beaconing, PCBs are propagated
   omnidirectionally along core links.  Each AS discovers path segments
   from itself to any other core AS.

   The number of distinct paths through the core network is typically
   very large.  To keep the overhead manageable, at most 5 path segments
   to every destination AS are discovered and the propagation frequency
   is slower than in the intra-ISD beaconing (at least 60 seconds
   between propagation events).

   Without making strong assumptions on the topology of the core
   network, we can assume that shortest paths through real world
   networks are relatively short: e.g. the Barabási-Albert random graph
   model predicts a diameter of log(N)/log(log(N)) for a network with N
   nodes [BollRio-2000] and The average distance scales in the same way.
   Whilst we cannot assume that the selected PCBs are strictly the
   shortest paths through the network, they are likely to be not very
   much longer than the shortest paths either.

   With N the number of participating core ASes, an AS receives up to 5
   * N PCBs per propagation interval per core link interface.  For
   highly connected ASes, the number of PCBs received thus becomes
   rather large and in a network of 1000 ASes, a AS with 300 core links
   receives up to 1.5 million PCBs per propagation interval.

de Kater, et al.          Expires 22 April 2025                [Page 48]
Internet-Draft                  SCION CP                    October 2024

   Assuming an average PCB length of 6 and the shortest propagation
   interval of 60 seconds, this corresponds to roughly 150 thousand
   signature validations per second or roughly 38 MB/s.  For much
   larger, more highly connected ASes, the path discovery tasks of the
   Control Service can be distributed over many instances in order to
   increase the PCB throughput.

   On a cold start of the network, full connectivity is obtained after a
   number of propagation steps corresponding to the diameter of the
   network.  Assuming a network diameter of 6, this corresponds to
   roughly 3 minutes on average.  When a new link is added to the
   network, it will be available to connect two ASes at distances D1 and
   D2 from the link, respectively, at worst after a mean time
   (D1+D2)*T/2.

4.  Registration of Path Segments

   *Path registration* is the process where an AS transforms selected
   PCBs into path segments, and adding these segments to the relevant
   path databases thereby making them available to other ASes.

   As mentioned previously, a non-core AS typically receives several
   PCBs representing several path segments to the core ASes of the ISD
   the AS belongs to.  Out of these PCBs, the non-core AS selects those
   down path segments through which it wants to be reached, based on AS-
   specific selection criteria.

   The next step is to register the selected down segments with the
   Control Service of the relevant core ASes in accordance with a
   process called _intra-ISD path segment registration_. As a result, a
   core AS's Control Service contains all intra-ISD path segments
   registered by the non-core ASes of its ISD.  In addition, each core
   AS Control Service also stores the preferred core path segments to
   other core ASes during the _core segment registration_ process.

   Both processes are described below.

4.1.  Intra-ISD Path Segment Registration

   Every _registration period_ (determined by each AS), the AS's Control
   Service selects two sets of PCBs to transform into two types of path
   segments:

   *  Up segments, which allow the infrastructure entities and endpoints
      in this AS to communicate with core ASes; and

   *  Down segments, which allow remote entities to reach this AS.

de Kater, et al.          Expires 22 April 2025                [Page 49]
Internet-Draft                  SCION CP                    October 2024

   The up segments and down segments do not have to be equal as AS may
   want to communicate with core ASes via one or more up segments that
   differ from the down segment(s) through which it wants to be reached.
   Therefore, an AS can define different selection policies for the up
   segment and down segment sets.  In addition, the processes of
   transforming a PCB in an up segment or a down segment differ
   slightly.

4.1.1.  Terminating a PCB

   Both the up segments and down segments end at the AS, so by
   transforming a PCB into a path segment, an AS "terminates" the PCB
   for this AS ingress interface and at that moment in time.

   The Control Service of a non-core AS MUST perform the following steps
   to "terminate" a PCB:

   1.  The Control Service adds a new AS entry to the PCB which MUST be
       defined as follows:

       *  The next AS MUST NOT be specified.

          -  In Protobuf message format, this means that the value of
             the next_isd_as field in the ASEntrySignedBody component
             MUST be "0".

       *  The egress interface in the Hop Field component MUST NOT be
          specified.

          -  In Protobuf message format, this means that the value of
             the egress field in the HopField component MUST be "0".

   2.  If the AS has peering links, the Control Service MAY add
       corresponding peer entry components to the signed body of the AS
       entry - one peer entry component for each peering link that the
       AS wants to advertise.  The egress interface ID in the Hop Field
       component of each added peer entry MUST NOT be specified.

       *  In Protobuf message format, this means that the value of the
          egress field in the HopField component MUST be "0".

   3.  The Control Service MUST sign the modified PCB and append the
       computed signature.

   *Note:*

   *  For more information on the signed body component of an AS entry,
      see Section 2.2.1.4.2.

de Kater, et al.          Expires 22 April 2025                [Page 50]
Internet-Draft                  SCION CP                    October 2024

   *  For more information on a peer entry, see Section 2.2.1.7.

   *  For more information on the Hop Field component, see
      Section 2.2.1.6.

   *  For more information on signing an AS entry, see
      Section 2.2.1.4.3.

4.1.2.  Transforming a PCB into an Up Segment

   Every registration period, the Control Service of a non-core AS
   performs the following steps to transform PCBs into up segments:

   1.  The Control Service selects the PCBs that it wants to transform
       into up segments from the candidate PCBs in the Beacon Store.

   2.  The Control Service "terminates" the selected PCBs by performing
       the steps described in Section 4.1.1.  From this moment on, the
       modified PCBs are called *up segments*.

   3.  The Control Service adds the newly created up segments to its own
       path database.

   *Note:* For more information on possible selection strategies of
   PCBs, see Section 2.3.1.

4.1.3.  Transforming a PCB into a Down Segment

   Every registration period, the Control Service of a non-core AS
   performs the following steps to transform PCBs into down segments:

   1.  The Control Service selects the PCBs that it wants to transform
       into down segments from the candidate PCBs in the Beacon Store.

   2.  The Control Service "terminates" the selected PCBs by performing
       the steps described in Section 4.1.1.  From this moment on, the
       modified PCBs are called *down segments*.

   3.  The Control Service registers the newly created down segments
       with the Control Services of the core ASes that originated the
       corresponding PCBs.  This is done by invoking the
       SegmentRegistrationService.SegmentsRegistration remote procedure
       call (RPC) in the Control Services of the relevant core ASes (see
       also Section 4.3).

   *Note:* For more information on possible selection strategies of
   PCBs, see Section 2.3.1.

de Kater, et al.          Expires 22 April 2025                [Page 51]
Internet-Draft                  SCION CP                    October 2024

4.2.  Core Path Segment Registration

   The core beaconing process creates path segments from core AS to core
   AS.  These core segments are then added to the Control Service path
   database of the core AS that created the segment, so that local and
   remote endpoints can obtain and use these core segments.  In contrast
   to the intra-ISD registration procedure, there is no need to register
   core segments with other core ASes as each core AS will receive PCBs
   originated from every other core AS.

   In every registration period, the Control Service of a core AS
   performs the following operations:

   1.  The core Control Service selects the best PCBs towards each core
       AS observed so far.

   2.  The core Control Service "terminates" the selected PCBs by
       performing the steps described in Section 4.1.1.  From this
       moment on, the modified PCBs are called *core segments*.

   3.  The Control Service adds the newly created core segments to its
       own path database.

   *Note:* For more information on possible selection strategies of
   PCBs, see Section 2.3.1.

4.3.  Path Segment Registration gRPC API

   The Control Service of a non-core AS has to register the newly
   created down segments with the Control Services of the core ASes that
   originated the corresponding PCBs.  This registration step is
   implemented as follows in Protobuf message format:

de Kater, et al.          Expires 22 April 2025                [Page 52]
Internet-Draft                  SCION CP                    October 2024

     enum SegmentType {
         SEGMENT_TYPE_UNSPECIFIED = 0;
         SEGMENT_TYPE_UP = 1;
         SEGMENT_TYPE_DOWN = 2;
         SEGMENT_TYPE_CORE = 3;
     }

     service SegmentRegistrationService {
         rpc SegmentsRegistration(SegmentsRegistrationRequest) returns (
           SegmentsRegistrationResponse) {}
     }

     message SegmentsRegistrationRequest {
         message Segments {
             repeated PathSegment segments = 1;
         }

         map<int32, Segments> segments = 1;
     }

     message SegmentsRegistrationResponse {}

   *  SegmentType: Specifies the type of the path segment to be
      registered.  Currently, only the following type is used:

      -  SEGMENT_TYPE_DOWN: Specifies a down segment.

   *  map<int32, Segments> segments: Represents a separate list of
      segments for each path segment type.  The key is the integer
      representation of the corresponding SegmentType.

   *  SegmentRegistrationResponse: an empty message returned as an
      acknowledgement upon success.

4.4.  Path MTU

   SCION paths represent a sequence of ASes and inter-AS links; each
   with possibly different MTUs.  As a result, the path MTU is the
   minimum of the MTUs of each inter-AS link and intra-AS networks it
   traverses.  Such MTU information is disseminated during path
   construction:

   *  The MTU of each intra-AS network traversed (represented by the MTU
      field of the corresponding AS Entries (Section 2.2.1.4.2))

   *  The MTU of each inter-AS link or peering link (indicated by the
      ingress_mtu field of each Section 2.2.1.5 or the peer_mtu field of
      each Section 2.2.1.7 used)

de Kater, et al.          Expires 22 April 2025                [Page 53]
Internet-Draft                  SCION CP                    October 2024

   Such information is then made available to endpoints during the path
   lookup process (See Section 5).  SCION endpoints are oblivious to the
   topology of intermediate ASes, therefore when looking up a path they
   MUST assume that all hops are constrained by the intra-AS MTU of each
   AS traversed.

5.  Path Lookup

   The _path lookup_ is a fundamental building block of SCION's path
   management as it enables endpoints to obtain path segments found
   during path exploration and registered during path registration.
   This allows the endpoints to construct end-to-end paths from the set
   of possible path segments returned by the path lookup process.  The
   lookup of paths still happens in the control plane, whereas the
   construction of the actual end-to-end paths happens in the data
   plane.

5.1.  Lookup Process

   An endpoint (source) that wants to start communication with another
   endpoint (destination) requires up to three path segments:

   *  An up segment to reach the core of the source ISD (only if the
      source endpoint is a non-core AS);

   *  a core segment to reach

      -  another core AS in the source ISD, in case the destination AS
         is in the same source ISD, or;

      -  a core AS in a remote ISD, if the destination AS is in another
         ISD, and;

   *  a down segment to reach the destination AS.

   The actual number of required path segments depends on the location
   of the destination AS as well as on the availability of shortcuts and
   peering links.  More information on combining and constructing paths
   is provided by [I-D.dekater-scion-dataplane].

   The process to look up and fetch path segments consists of the
   following steps:

de Kater, et al.          Expires 22 April 2025                [Page 54]
Internet-Draft                  SCION CP                    October 2024

   1.  The source endpoint queries the Control Service in its own AS
       (i.e. the source AS) for the required segments by sending a
       SegmentsRequest.  The Control Service has up segments stored in
       its path database and additionally checks if it has appropriate
       core segments and down segments stored as well - in this case it
       returns them immediately in a SegmentsResponse.

   2.  If there are no appropriate core segments and down segments, the
       Control Service in the source AS queries the Control Services of
       the reachable core ASes in the source ISD for core segments to
       core ASes in the destination ISD.  To reach the core Control
       Services, the Control Service of the source AS uses the locally
       stored up segments.

   3.  The Control Service of the source AS combines up segments with
       the newly retrieved core segments.  The Control Service then
       queries the Control Services of the remote core ASes in the
       destination ISD to fetch down segments to the destination AS.  To
       reach the remote core ASes, the Control Service of the source AS
       uses the previously obtained and combined up segments and core
       segments.

   4.  The Control Service of the source AS returns all retrieved path
       segments to the source endpoint.

   5.  Once it has obtained all path segments, the source endpoint
       combines them into an end-to-end path in the data plane.

   6.  The destination endpoint, once it receives the first packet, MAY
       revert the path in the received packet in order to construct a
       response.  This ensures that traffic flows on the same path
       bidirectionally.

   Table 3 below shows which Control Service provides the source
   endpoint with which type of path segment.

de Kater, et al.          Expires 22 April 2025                [Page 55]
Internet-Draft                  SCION CP                    October 2024

      +==============+=============================================+
      | Segment Type | Responsible Control Service(s)              |
      +==============+=============================================+
      | Up-segment   | Control service of the source AS            |
      +--------------+---------------------------------------------+
      | Core-segment | Control service of core ASes in source ISD  |
      +--------------+---------------------------------------------+
      | Down-segment | Control service of core ASes in destination |
      |              | ISD (either the local ISD or a remote ISD)  |
      +--------------+---------------------------------------------+

        Table 3: Control services responsible for different types
                             of path segments

5.1.1.  Sequence of Lookup Requests

   The overall sequence of requests to resolve a path SHOULD be as
   follows:

   1.  Request up segments for the source endpoint at the Control
       Service of the source AS.

   2.  Request core segments, which start at the core ASes that are
       reachable with up segments, and end at the core ASes in the
       destination ISD.  If the destination ISD coincides with the
       source ISD, this step requests core segments to core ASes that
       the source endpoint cannot directly reach with an up segment.

   3.  Request down segments starting at core ASes in the destination
       ISD.

   The segment lookup API gRPC definition can be found in Figure 9.

5.1.2.  Caching

   For the sake of efficiency, the Control Service of the source AS
   SHOULD cache each returned path segment request.  Caching ensures
   that path lookups are fast for frequently used destinations and is
   also essential to ensure that the path lookup process is scalable and
   can be performed with low latency.

   In general, to improve overall efficiency, the Control Services of
   all ASes SHOULD do the following:

   *  Cache the returned path segments.

   *  Send requests in parallel when requesting path segments from other
      Control Services.

de Kater, et al.          Expires 22 April 2025                [Page 56]
Internet-Draft                  SCION CP                    October 2024

5.2.  Behavior of Actors in the Lookup Process

   As described above, the source endpoint resolves paths with a
   sequence of segment requests to the Control Service of the source AS.
   The Control Service in the source AS either answers directly or
   forwards these requests to the responsible Control Services of core
   ASes.  In SCION, the instances that handle these segment requests at
   the Control Services are called _source AS segment-request handler_
   and _core AS segment-request handler_, respectively.

   This section specifies the behavior of the segment request handlers
   in the lookup process.

5.2.1.  Use of Wildcard Addresses in the Lookup Process

   Endpoints can use wildcard addresses to designate any core AS in path
   segment requests.  The segment request handlers MUST expand these
   wildcard addresses and translate them into one or more actual
   addresses.  Table 4 below shows who is responsible for what.

   *Note:* For general information on the use of wildcard addresses in
   SCION, see Section 1.5.3.

   +=========+===================+=================+==================+
   | Segment | Wildcard          | Expanded/       | Translated Into  |
   | Request | Represents        | Translated By   |                  |
   +=========+===================+=================+==================+
   | Up      | "Destination"     | Control service | Actual address   |
   | segment | core AS (where up | of the _source  | destination core |
   |         | segment ends)     | AS_             | AS in source ISD |
   +---------+-------------------+-----------------+------------------+
   | Core    | Source core AS    | Control service | Actual address   |
   | segment | (where core       | of the _source  | source core AS   |
   |         | segment starts)^1 | AS_             | in source ISD    |
   +---------+-------------------+-----------------+------------------+
   | Core    | Destination core  | Control service | Actual address   |
   | segment | AS (where core    | of the _source  | destination core |
   |         | segment ends)     | core AS_        | AS in            |
   |         |                   |                 | destination ISD  |
   +---------+-------------------+-----------------+------------------+
   | Down    | "Source" core AS  | Control service | Actual address   |
   | segment | (where down       | of the _source  | source core AS   |
   |         | segment starts)^2 | AS_             | in destination   |
   |         |                   |                 | ISD              |
   +---------+-------------------+-----------------+------------------+

           Table 4: Use of wildcards in path segments requests

de Kater, et al.          Expires 22 April 2025                [Page 57]
Internet-Draft                  SCION CP                    October 2024

   1) Includes all core ASes for which an up segment from the source AS
   exists.
   2) Includes all core ASes in destination ISD with a down segment to
   destination AS.

5.2.2.  Segment-Request Handler of a Non-Core Source AS

   When the segment request handler of the Control Service of a _non-
   core_ source AS receives a path segment request, it MUST proceed as
   follows:

   1.  Determine the requested segment type.

   2.  In the case of an up segment request, look up matching up
       segments in the path database and return them.

   3.  In the case of a core segment request from a source core AS to a
       destination core AS:

       *  Expand the source wildcard into separate requests for each
          reachable core AS in the source ISD.

       *  For each core segment request;

          -  If possible, return matching core segments from cache;

          -  Otherwise, request the core segments from the Control
             Services of each reachable core AS at the source of the
             core segment, and then add the retrieved core segments to
             the cache.

   4.  In the case of a down segment request:

       *  Expand the source wildcard into separate requests for every
          core AS in the destination ISD (destination ISD refers to the
          ISD to which the destination endpoint belongs).

       *  For each segment request;

          -  If possible, return matching down segments from cache;

          -  Otherwise, request the down segment from the Control
             Services of the core ASes at the source of the down
             segment.  Sending the request may require looking up core
             segments to the source core AS of the down segment, and
             then adding the retrieved down segments to the cache.

de Kater, et al.          Expires 22 April 2025                [Page 58]
Internet-Draft                  SCION CP                    October 2024

5.2.3.  Segment-Request Handler of a Core AS

   When the segment request handler of a _core AS_ Control Service
   receives a path segment request, it MUST proceed as follows:

   1.  Validate the request:

       *  The source of the path segment MUST be this core AS.

       *  The request MUST either be;

          -  for a core segment to a core AS in this ISD or another ISD,
             or;

          -  for a down segment to an AS in this ISD.

   2.  If the destination is a core or wildcard address, then load
       matching core segments from the path database and return.

   3.  Otherwise, load the matching down segments from the path database
       and return.

   Appendix "Path-Lookup Examples" shows by means of an illustration how
   the lookup of path segments in SCION works.

6.  Security Considerations

   As described previously, the goal of SCION’s beaconing process in the
   control plane is to securely discover and disseminate paths between
   any two ASes.  This section describes security considerations for
   SCION's Control Plane that focuses on _inter_-domain routing.  SCION
   does not provide intra-domain routing, nor does it provide end-to-end
   payload encryption so these topics lie outside the scope of this
   section.

   This section focuses on three kinds of security risks in the control
   plane:

   1.  When an adversary controls one or all core ASes of an ISD and
       tries to manipulate the beaconing process from the top down (see
       Section 6.1).

   2.  When "ordinary" (non-core) adversaries try to manipulate the
       beaconing process (see Section 6.2).

   3.  Denial of Services (DoS) attacks where attackers overload
       different parts of the infrastructure (see Section 6.3).

de Kater, et al.          Expires 22 April 2025                [Page 59]
Internet-Draft                  SCION CP                    October 2024

6.1.  Manipulation of the Beaconing Process by a Core Adversary

   The first risk to the beaconing process comes from an adversary
   controlling one or more core ASes in an ISD.  If the adversary stops
   all core AS(es) within an ISD from propagating PCBs, the discovery of
   new paths will halt.  In this case, downstream ASes will notice that
   PCBs are no longer being propagated, but all previously discovered
   and still valid paths remain usable for data plane forwarding until
   they expire.  This is an unlikely scenario, as it would require
   compromise of all core ASes within an ISD.

6.2.  Manipulation of the Beaconing Process by a Non-Core Adversary

   This section examines several possible approaches that could be taken
   by an "ordinary" non-core adversary to manipulate the beaconing
   process in the SCION Control Plane.  For each case it shows to what
   extent SCION's design can prevent the corresponding attack or help
   mitigate it.

6.2.1.  Path Hijacking through Interposition

   A malicious AS M might try to manipulate the beaconing process
   between two neighbor ASes A and B, with the goal to hijack traffic to
   flow via M.  If M can interpose itself on the path between A and B,
   then it could attempt several potential attacks:

   *  The adversary M could intercept and disseminate a PCB on its way
      from A to the neighboring AS B, and inject its own AS entry into
      the PCB toward downstream ASes.

   *  The adversary could modify the Hop Fields of an already existing
      path in order to insert its own AS in the path.

   *  The adversary could fully block traffic between AS A and AS B in
      order to force traffic redirection through an alternate path that
      includes its own AS.

   The first type of attack is detectable and blocked by downstream ASes
   (e.g.  B) because a PCB disseminated by AS A towards AS B contains
   the "Next ISD AS" field in the entry of AS A, pointing to AS B, and
   protected by A's signature.  If M manipulates the PCB while in flight
   from A to B, then verification of the manipulated inbound PCBs will
   fail at AS B, as the adversary's PCBs cannot contain A's correct
   signature.

   The second type of attack is made impossible by the Hop Field's MAC
   which protects the Hop Field's integrity and chains it with the
   previous Hop Fields on the path.

de Kater, et al.          Expires 22 April 2025                [Page 60]
Internet-Draft                  SCION CP                    October 2024

   The third type of attack generally cannot be prevented.  However the
   alternate path would be immediately visible to endpoints as traffic
   MUST include Hop Fields from AS M.

6.2.2.  Creation of Spurious ASes and ISDs

   An alternative scenario is when an adversary tries to introduce and
   spoof a non-existent AS.  This would enable the adversary to send
   traffic with the spoofed AS as a source, allowing the adversary to
   complicate the detection of its attack and to plausibly deny the
   misbehavior.

   However, spoofing a new AS requires a registration of that AS with
   the ISD core to obtain a valid AS certificate, otherwise the
   adversary cannot construct valid PCBs.  As this registration should
   include a thorough check and authentication by a CA, this cannot be
   done stealthily which defeats the original purpose.

   Similarly to creating a fake AS, an adversary could try to introduce
   a new malicious ISD.  This involves the generation of its own TRC,
   finding core ASes to peer with, and convincing other ISDs of its
   legitimacy to accept the new TRC.  Although this setup is not
   entirely impossible, it requires substantial time and effort and may
   need the involvement of more than one malicious entity.  Here the
   "costs" of setting up the fake ISD may outweigh the benefits.

6.2.3.   Peering Link Misuse

   The misuse of a peering link by an adversary represents another type
   of attack.  Consider the case where AS A wants to share its peering
   link only with one of its downstream neighbors AS B, and therefore
   selectively includes the peering link only in PCBs sent to B.  An
   adversary may now try to gain access to this peering link by
   prepending the relevant PCBs to its own path.  For this, the
   adversary needs to be able to (1) eavesdrop on the link from A to B,
   and (2) obtain the necessary Hop Fields by querying a Control Service
   and extracting the Hop Fields from registered paths.

   Even if an adversary succeeds in misusing a peering link as described
   above, SCION is able to mitigate this kind of attack.  Each AS
   includes an egress interface as well as specific “next hop”
   information to the PCB before disseminating it further downstream.
   If a malicious entity tries to misuse a stolen PCB by adding it to
   its own segments, verification will fail upstream as the egress
   interface mismatches.  Therefore, the peering link can only be used
   by the intended AS.

de Kater, et al.          Expires 22 April 2025                [Page 61]
Internet-Draft                  SCION CP                    October 2024

6.2.4.  Manipulation of the Path-Selection Process

   Endpoint path control is one of the main benefits of SCION compared
   to the current Internet as SCION endpoints can select inter-domain
   forwarding paths for each packet.  However, with the benefits of path
   selection comes the risk of endpoints selecting non-optimal paths.
   This section discusses some mechanisms with which an adversary can
   attempt to trick endpoints downstream (in the direction of beaconing)
   into choosing non-optimal paths.  The goal of such attacks is to make
   paths that are controlled by the adversary more attractive than other
   available paths.

   In SCION, overall path selection is the result of three steps.
   Firstly, each AS selects which PCBs are further forwarded to its
   neighbors.  Secondly, each AS chooses the paths it wants to register
   at the local Control Service (as up segments) and at the core Control
   Service (as down segments).  Thirdly, the endpoint performs path
   selection among all available paths resulting from a path lookup
   process.

   These attacks are only successful if the adversary is located within
   the same ISD and upstream relative to the victim AS.  It is not
   possible to attract traffic away from the core as traffic travels
   upstream towards the core.  Furthermore, the attack may either be
   discovered downstream (e.g., by seeing large numbers of paths
   becoming available), or during path registrations.  After detection,
   non-core ASes will be able to identify paths traversing the adversary
   AS and avoid these paths.

   *Announcing Large Numbers of Path Segments*
   This attack is possible if the adversary controls at least two ASes.
   The adversary can create a large number of links between the ASes
   under its control which do not necessarily correspond to physical
   links.  This allows the adversary to multiply the number of PCBs
   forwarded to its downstream neighbor ASes and in turn increases the
   chance that one or several of these forwarded PCBs are selected by
   the downstream ASes.

   In general, the number of PCBs that an adversary can announce this
   way scales exponentially with the number of consecutive ASes the
   adversary controls.  However, this also decreases their chance of
   being chosen by a downstream AS for PCB dissemination or by an
   endpoint for path construction as these relatively long paths have to
   compete with other shorter paths.  Furthermore, both endpoints and
   downstream ASes can detect poorer quality paths in the data plane and
   switch to better paths.

de Kater, et al.          Expires 22 April 2025                [Page 62]
Internet-Draft                  SCION CP                    October 2024

   *Wormhole Attack*
   A malicious AS M1 can send a PCB not only to their downstream
   neighbor ASes, but also out-of-band to another non-neighbor colluding
   malicious AS M2.  This creates new segments to M2 and M2's downstream
   neighbor ASes, simulating a link between M1 and M2 which may not
   correspond to an actual link in the network topology.

   Similarly, a fake path can be announced through a fake peering link
   between two colluding ASes even if in different ISDs.  An adversary
   can advertise fake peering links between the two colluding ASes, thus
   offering short paths to many destination ASes.  Downstream ASes might
   have a policy of preferring paths with many peering links and thus
   are more likely to disseminate PCBs from the adversary.  Endpoints
   are also more likely to choose short paths that make use of peering
   links.  In the data plane, whenever the adversary receives a packet
   containing a fake peering link, it can transparently exchange the
   fake peering Hop Fields with valid Hop Fields to the colluding AS.
   To avoid detection of the path alteration by the receiver, the
   colluding AS can replace the added Hop Fields with the fake peering
   link Hop Fields the sender inserted.

   To defend against this attack, methods to detect the wormhole attack
   are needed.  Per link or path latency measurements can help reveal
   the wormhole and render the fake peering link suspicious or
   unattractive.  Without specific detection mechanisms these so-called
   wormhole attacks are unavoidable in routing.

6.3.  Denial of Service Attacks

   The beaconing process in the SCION Control Plane relies on control
   plane communication.  ASes exchange control plane messages within
   each other when propagating PCBs to downstream neighbors, when
   registering PCBs as path segments, or during core path lookup.
   Volumetric DoS attacks, where attackers overload a link may make it
   difficult to exchange these messages.

   SCION limits the impact of such attacks which aim to exhaust network
   bandwidth on links as ASes can switch to alternative paths that do
   not contain the congested links.  Reflection-based attacks are also
   prevented as response packets are returned on the same path to the
   actual sender.

   Other mechanisms are required to avoid transport protocol attacks
   where the attacker tries to exhaust the resources on a target server,
   such as for the Control Services, by opening many connections to
   this.  The means to mitigate these kind of DoS attacks are basically
   the same as for the current Internet, e.g. filtering, geo-blocking or
   using cookies.

de Kater, et al.          Expires 22 April 2025                [Page 63]
Internet-Draft                  SCION CP                    October 2024

   Thanks to its path awareness, SCION enables more fine-grained
   filtering mechanisms based on certain path properties.  For example,
   control plane RPC methods that are available to endpoints within an
   AS are strictly separate from methods available to endpoints from
   other ASes.  Specifically, expensive recursive path segment and trust
   material lookups are thus shielded from abuse by unauthorized
   entities.

   For RPC methods exposed to other ASes, the Control Service
   implementation minimizes its attack surface by rejecting illegitimate
   callers based on ISD/AS, path type and length and any other available
   data points as soon as possible, i.e. immediately after determining
   the request type.  For example:

   *  SegmentCreationService.Beacon can only be called by direct
      neighbors and thus calls from peers with a path length greater
      than one can immediately be discarded.

   *  SegmentRegistrationService.SegmentsRegistration can only be called
      from within the same ISD, thus the source address MUST match the
      local ISD and the number of path segments MUST be 1.

   A combination of the mechanism above is used to prevent flooding
   attacks on the Control Service.  In addition, the Control Service
   SHOULD be deployed in a distributed and replicated manner so that
   requests can be balanced and a single instance failure does not
   result in a complete failure of the control plane of a SCION AS.

7.  IANA Considerations

   This document has no IANA actions.

   The ISD and SCION AS number are SCION-specific numbers.  They are
   currently allocated by Anapaya Systems, a provider of SCION-based
   networking software and solutions (see [ISD-AS-assignments]).  This
   task is currently being transitioned from Anapaya to the SCION
   Association.

8.  References

8.1.  Normative References

   [Connect]  "Connect Protocol Reference", 2024,
              <https://connectrpc.com/docs/protocol/>.

   [gRPC]     "gRPC, an open-source universal RPC framework", 2023,
              <https://grpc.io/>.

de Kater, et al.          Expires 22 April 2025                [Page 64]
Internet-Draft                  SCION CP                    October 2024

   [I-D.dekater-scion-dataplane]
              de Kater, C., Rustignoli, N., and S. Hitz, "SCION Data
              Plane", Work in Progress, Internet-Draft, draft-dekater-
              scion-dataplane-02, 8 July 2024,
              <https://datatracker.ietf.org/doc/html/draft-dekater-
              scion-dataplane-02>.

   [I-D.dekater-scion-pki]
              de Kater, C., Rustignoli, N., and S. Hitz, "SCION Control-
              Plane PKI", Work in Progress, Internet-Draft, draft-
              dekater-scion-pki-06, 8 July 2024,
              <https://datatracker.ietf.org/doc/html/draft-dekater-
              scion-pki-06>.

   [proto3]   "Protocol Buffers Language Guide version 3", 2023,
              <https://protobuf.dev/programming-guides/proto3/>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/rfc/rfc2119>.

   [RFC4632]  Fuller, V. and T. Li, "Classless Inter-domain Routing
              (CIDR): The Internet Address Assignment and Aggregation
              Plan", BCP 122, RFC 4632, DOI 10.17487/RFC4632, August
              2006, <https://www.rfc-editor.org/rfc/rfc4632>.

   [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
              Housley, R., and W. Polk, "Internet X.509 Public Key
              Infrastructure Certificate and Certificate Revocation List
              (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
              <https://www.rfc-editor.org/rfc/rfc5280>.

   [RFC5952]  Kawamura, S. and M. Kawashima, "A Recommendation for IPv6
              Address Text Representation", RFC 5952,
              DOI 10.17487/RFC5952, August 2010,
              <https://www.rfc-editor.org/rfc/rfc5952>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.

   [RFC9000]  Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based
              Multiplexed and Secure Transport", RFC 9000,
              DOI 10.17487/RFC9000, May 2021,
              <https://www.rfc-editor.org/rfc/rfc9000>.

de Kater, et al.          Expires 22 April 2025                [Page 65]
Internet-Draft                  SCION CP                    October 2024

   [RFC9114]  Bishop, M., Ed., "HTTP/3", RFC 9114, DOI 10.17487/RFC9114,
              June 2022, <https://www.rfc-editor.org/rfc/rfc9114>.

8.2.  Informative References

   [BollRio-2000]
              Bollobás, B. and O. Riordan, "The diameter of a scale-free
              random graph", n.d.,
              <https://kam.mff.cuni.cz/~ksemweb/clanky/BollobasR-
              scale_free_random.pdf>.

   [CHUAT22]  Chuat, L., Legner, M., Basin, D., Hausheer, D., Hitz, S.,
              Mueller, P., and A. Perrig, "The Complete Guide to SCION",
              ISBN 978-3-031-05287-3, 2022,
              <https://doi.org/10.1007/978-3-031-05288-0>.

   [I-D.dekater-panrg-scion-overview]
              de Kater, C., Rustignoli, N., and A. Perrig, "SCION
              Overview", Work in Progress, Internet-Draft, draft-
              dekater-panrg-scion-overview-06, 7 May 2024,
              <https://datatracker.ietf.org/doc/html/draft-dekater-
              panrg-scion-overview-06>.

   [ISD-AS-assignments]
              "SCION ISD and AS Assignments", 2024,
              <https://docs.anapaya.net/en/latest/resources/isd-as-
              assignments/>.

   [RFC1122]  Braden, R., Ed., "Requirements for Internet Hosts -
              Communication Layers", STD 3, RFC 1122,
              DOI 10.17487/RFC1122, October 1989,
              <https://www.rfc-editor.org/rfc/rfc1122>.

   [RFC5398]  Huston, G., "Autonomous System (AS) Number Reservation for
              Documentation Use", RFC 5398, DOI 10.17487/RFC5398,
              December 2008, <https://www.rfc-editor.org/rfc/rfc5398>.

   [RFC6996]  Mitchell, J., "Autonomous System (AS) Reservation for
              Private Use", BCP 6, RFC 6996, DOI 10.17487/RFC6996, July
              2013, <https://www.rfc-editor.org/rfc/rfc6996>.

   [RFC9217]  Trammell, B., "Current Open Questions in Path-Aware
              Networking", RFC 9217, DOI 10.17487/RFC9217, March 2022,
              <https://www.rfc-editor.org/rfc/rfc9217>.

   [RFC9473]  Enghardt, R. and C. Krähenbühl, "A Vocabulary of Path
              Properties", RFC 9473, DOI 10.17487/RFC9473, September
              2023, <https://www.rfc-editor.org/rfc/rfc9473>.

de Kater, et al.          Expires 22 April 2025                [Page 66]
Internet-Draft                  SCION CP                    October 2024

   [SCIONLAB] Kown, J., García-Pardo, J., Legner, M., Wirz, F., Frei,
              M., Hausheer, D., and A. Perrig, "SCIONLAB - A Next-
              Generation Internet Testbed", 2020,
              <https://ieeexplore.ieee.org/abstract/document/9259355>.

Acknowledgments

   Many thanks go to William Boye (Swiss National Bank), Matthias Frei
   (SCION Association), Kevin Meynell (SCION Association), Juan A.
   Garcia Prado (ETH Zurich), and Roger Lapuh (Extreme Networks) for
   reviewing this document.  We are also very grateful to Adrian Perrig
   (ETH Zurich), for providing guidance and feedback about every aspect
   of SCION.  Finally, we are indebted to the SCION development teams of
   Anapaya and ETH Zurich, for their practical knowledge and for the
   documentation about the SCION Control Plane, as well as to the
   authors of [CHUAT22] - the book is an important source of input and
   inspiration for this draft.

Deployment Testing: SCIONLab

   SCIONLab is a global research network that is available to test the
   SCION architecture.  You can create and use your ASes using your own
   computation resources which allows you to gain real-world experience
   of deploying and managing a SCION network.

   More information can be found on the SCIONLab website and in the
   [SCIONLAB] paper.

Full Control Service gRPC API

   The following code blocks provide, in protobuf format, the entire API
   by which control services interact.

de Kater, et al.          Expires 22 April 2025                [Page 67]
Internet-Draft                  SCION CP                    October 2024

   service SegmentLookupService {
       // Segments returns all segments that match the request.
       rpc Segments(SegmentsRequest) returns (SegmentsResponse) {}
   }

   message SegmentsRequest {
       // The source ISD-AS of the segment.
       uint64 src_isd_as = 1;
       // The destination ISD-AS of the segment.
       uint64 dst_isd_as = 2;
   }

   enum SegmentType {
       // Unknown segment type.
       SEGMENT_TYPE_UNSPECIFIED = 0;
       // Up segment.
       SEGMENT_TYPE_UP = 1;
       // Down segment.
       SEGMENT_TYPE_DOWN = 2;
       // Core segment.
       SEGMENT_TYPE_CORE = 3;
   }

   message SegmentsResponse {
       message Segments {
           // List of path segments.
           repeated PathSegment segments = 1;
       }

       // Mapping from path segment type to path segments.
       // The key is the integer representation of the SegmentType enum.
       map<int32, Segments> segments = 1;
   }

     Figure 9: Control Service gRPC API - Segment lookup.  This API is
       exposed on the SCION dataplane by the control services of core
           ASes and exposed on the intra-domain protocol network.

de Kater, et al.          Expires 22 April 2025                [Page 68]
Internet-Draft                  SCION CP                    October 2024

   service SegmentRegistrationService {
       // SegmentsRegistration registers segments at the remote.
       rpc SegmentsRegistration(SegmentsRegistrationRequest) returns (
           SegmentsRegistrationResponse) {}
   }

   message SegmentsRegistrationRequest {
       message Segments {
           // List of path segments.
           repeated PathSegment segments = 1;
       }

       // Mapping from path segment type to path segments.
       // The key is the integer representation of the SegmentType enum.
       map<int32, Segments> segments = 1;
   }

   message SegmentsRegistrationResponse {}

     Figure 10: Control Service gRPC API - Segment registration.  This
     API is only exposed by core ASes and only on the SCION dataplane.

   service SegmentCreationService {
       // Beacon sends a beacon to the remote control service.
       rpc Beacon(BeaconRequest) returns (BeaconResponse) {}
   }

   message BeaconRequest {
       // Beacon in form of a partial path segment.
       PathSegment segment = 1;
   }

   message BeaconResponse {}

           Figure 11: Control Service gRPC API - Segment creation

 message PathSegment {
     // The encoded SegmentInformation. It is used for signature input.
     bytes segment_info = 1;
     // Entries of ASes on the path.
     repeated ASEntry as_entries = 2;
 }

 message SegmentInformation {

de Kater, et al.          Expires 22 April 2025                [Page 69]
Internet-Draft                  SCION CP                    October 2024

     // Segment creation time set by the originating AS. Segment
     // expiration time is computed relative to this timestamp.
     // The timestamp is encoded as the number of seconds elapsed
     // since January 1, 1970 UTC.
     int64 timestamp = 1;
     // The 16-bit segment ID integer used for MAC computation.
     uint32 segment_id = 2;
 }

 message ASEntry {
     // The signed part of the AS entry. The body of the SignedMessage
     // is the serialized ASEntrySignedBody. The signature input is
     // defined as follows:
     //
     //  input(ps, i) = signed.header_and_body || associated_data(ps, i)
     //
     //  associated_data(ps, i) =
     //          ps.segment_info ||
     //          ps.as_entries[1].signed.header_and_body ||
     //          ps.as_entries[1].signed.signature ||
     //          ...
     //          ps.as_entries[i-1].signed.header_and_body ||
     //          ps.as_entries[i-1].signed.signature
     //
     proto.crypto.v1.SignedMessage signed = 1;
     // The unsigned part of the AS entry.
     proto.control_plane.v1.PathSegmentUnsignedExtensions unsigned = 2;
 }

 message SignedMessage {
     // Encoded header and body.
     bytes header_and_body = 1;
     // Raw signature. The signature is computed over the concatenation
     // of the header and body, and the optional associated data.
     bytes signature = 2;
 }

 message HopEntry {
     // Material to create the data-plane Hop Field.
     HopField hop_field = 1;
     // MTU on the ingress link.
     uint32 ingress_mtu = 2;
 }

 message PeerEntry {
     // ISD-AS of peer AS. This is used to match peering segments
         // during path construction.
     uint64 peer_isd_as = 1;

de Kater, et al.          Expires 22 April 2025                [Page 70]
Internet-Draft                  SCION CP                    October 2024

     // Remote peer interface identifier. This is used to match
     // peering segments
     // during path construction.
     uint64 peer_interface = 2;
     // MTU on the peering link.
     uint32 peer_mtu = 3;
     // Material to create the data-plane Hop Field
     HopField hop_field = 4;
 }

 message HopField {
     // Ingress interface identifier.
     uint64 ingress = 1;
     // Egress interface identifier.
     uint64 egress = 2;
     // 8-bit encoded expiration offset relative to the segment
         // creation timestamp.
     uint32 exp_time = 3;
     // MAC used in the dataplane to verify the Hop Field.
     bytes mac = 4;
 }

      Figure 12: Control Service gRPC API - Segment representation

  enum SignatureAlgorithm {
      // Unspecified signature algorithm. This value is never valid.
      SIGNATURE_ALGORITHM_UNSPECIFIED = 0;
      // ECDS with SHA256.
      SIGNATURE_ALGORITHM_ECDSA_WITH_SHA256 = 1;
      // ECDS with SHA384.
      SIGNATURE_ALGORITHM_ECDSA_WITH_SHA384 = 2;
      // ECDS with SHA512.
      SIGNATURE_ALGORITHM_ECDSA_WITH_SHA512 = 3;
  }

  // Low-level representation of HeaderAndBody used for signature
  // computation input. This should not be used by external code.
  message HeaderAndBodyInternal {
      // Encoded header suitable for signature computation.
      bytes header = 1;
      // Raw payload suitable for signature computation.
      bytes body = 2;
  }

  message Header {
      // Algorithm used to compute the signature.

de Kater, et al.          Expires 22 April 2025                [Page 71]
Internet-Draft                  SCION CP                    October 2024

      SignatureAlgorithm signature_algorithm = 1;
      // Optional arbitrary per-protocol key identifier.
      bytes verification_key_id = 2;
      // Optional signature creation timestamp.
      google.protobuf.Timestamp timestamp = 3;
      // Optional arbitrary per-protocol metadata.
      bytes metadata = 4;
      // Length of associated data that is covered by the signature, but
      // is not included in the header and body. This is zero, if no
      // associated data is covered by the signature.
      int32 associated_data_length = 5;
  }

  message ASEntrySignedBody {
      // ISD-AS of the AS that created this AS entry.
      uint64 isd_as = 1;
      // ISD-AS of the downstream AS.
      uint64 next_isd_as = 2;
      // The required regular hop entry.
      HopEntry hop_entry = 3;
      // Optional peer entries.
      repeated PeerEntry peer_entries = 4;
      // Intra AS MTU.
      uint32 mtu = 5;
      // Optional extensions.
      proto.control_plane.v1.PathSegmentExtensions extensions = 6;
  }

  message VerificationKeyID {
      uint64 isd_as = 1;
      bytes subject_key_id = 2;
      uint64 trc_base = 3;
      uint64 trc_serial = 4;
  }

   Figure 13: Control Service gRPC API - Signed ASEntry representation

   In case of failure, gRPC calls return an error as specified by the
   gRPC framework.  That is, a non-zero status code and an explanatory
   string.

de Kater, et al.          Expires 22 April 2025                [Page 72]
Internet-Draft                  SCION CP                    October 2024

SCION Data Plane use by the SCION Control Plane

   The SCION Control Plane RPC APIs rely on QUIC connections carried by
   the SCION dataplane.  The main difference between QUIC over native
   UDP and QUIC over UDP/SCION is the need for a UDP/SCION connection
   initiator to identify the relevant peer (service resolution) and to
   select a path to it.  Since the Control Service is itself the source
   of path segment information, the following bootstrapping strategies
   apply:

   *  Neighboring ASes craft one-hop-paths directly.  This allows
      multihop paths to be constructed and propagated incrementally.

   *  Constructed multihop paths are registered with the Control Service
      at the origin core AS.  The path to that AS is the very path being
      registered.

   *  Paths to far ASes are available from neighboring ASes.  Clients
      obtain paths to remote ASes from their local Control Service.

   *  Control services respond to requests from remote ASes by reversing
      the path via which the request came.

   *  Clients find the relevant Control Service endpoint by resolving a
      "service address" (that is an address where the DT/DL field of the
      common header is set to 1/0 (see [I-D.dekater-scion-dataplane]).

   The mechanics of service address resolution are the following:

   *  To resolve the address of the control service at a given AS, a
      client sends a ServiceResolutionRequest RPC (which has no
      parameters) to an endpoint address constructed as follows:

      -  Common Header:

         o  Path type: SCION (0x01)

         o  DT/DL: "Service" (0b0100)

      -  Address Header:

         o  DstHostAddr: "SVC_CS" (0x0002)

      -  UDP Header:

         o  DstPort: 0

de Kater, et al.          Expires 22 April 2025                [Page 73]
Internet-Draft                  SCION CP                    October 2024

   *  The ingress border router at the destination AS resolves the
      service destination to an actual endpoint address.  This document
      does not mandate any specific method for this resolution.

   *  The ingress border router forwards the message to the resolved
      address.

   *  The destination service responds to the client with a
      ServiceResolutionResponse.  That response contain one or more
      transport options.

   *  The client uses the address and port from the "QUIC" option to
      establish a QUIC connection, which can then be used for regular
      RPCs.

   The following code block provides the full service resolution API in
   the Protobuf message format.

de Kater, et al.          Expires 22 April 2025                [Page 74]
Internet-Draft                  SCION CP                    October 2024

package proto.control_plane.v1;

// A ServiceResolutionRequest must always fit within a UDP datagram. If
// the request does not fit, there is no mechanism for clients and
// servers to establish control-plane reachability.
message ServiceResolutionRequest {}

// A ServiceResolutionResponse must always fit within a UDP datagram. If
// the response does not fit, there is no mechanism for clients and
// servers to establish control-plane reachability.
message ServiceResolutionResponse {
    // Supported transports to reach the service,
    //
    // List of known transports:
    // - QUIC
    //
    // Unknown values should be ignored by clients.
    map<string, Transport> transports = 1;
}

message Transport {
    // Protocol specific server address descriptor.
    //
    // Supported address format for QUIC:
    //  192.168.0.1:80
    //  [2001:db8::1]:80
    //
    //  Missing ports / zero port / invalid port values should be
    // treated by clients as errors.
    string address = 1;
}

          Figure 14: Service Resolution gRPC API definition

Path-Lookup Examples

   To illustrate how the path lookup works, we show two path-lookup
   examples in sequence diagrams.  The network topology of the examples
   is represented in Figure 15 below.  In both examples, the source
   endpoint is in AS A.  Figure 16 shows the sequence diagram for the
   path lookup process in case the destination is in AS D, whereas
   Figure 17 shows the path lookup sequence diagram if the destination
   is in AS G.  ASes B and C are core ASes in the source ISD, while E
   and F are core ASes in a remote ISD.  Core AS B is a provider of the
   local AS, but AS C is not, i.e. there is no up-segment from A to C.
   "CS" stands for Control Service.

de Kater, et al.          Expires 22 April 2025                [Page 75]
Internet-Draft                  SCION CP                    October 2024

   +----------------------------+     +----------------------------+
   |                            |     |                            |
   |                            |     |                            |
   |    +------------------+    |     |    +------------------+    |
   |    |      Core        |    |     |    |          Core    |    |
   |    |                  |    |     |    |                  |    |
   |    | .---.     .---.  |    |     |    |            .---. |    |
   |    |(  C  )---(  B  )-----------------------------(  F  )|    |
   |    | `+--'     `+-+'---------+   |    |    .---.   `+-+' |    |
   |    |  |         | |   |    | +------------(  E  )   | |  |    |
   |    |  |         | |   |    |     |    |    `-+-'----+ |  |    |
   |    +--|---------|-|---+    |     |    +------|--------|--+    |
   |       |         | |        |     |           |        |       |
   |       |         | |        |     |           |        |       |
   |       |+--------+ |        |     |           |        |       |
   |       ||          |        |     |           |        |       |
   |       ||          |        |     |           |        |       |
   |     .-++.         |        |     |         .-+-.      |       |
   |    (  D  )      .-+-.      |     |        (  G  )-----+       |
   |     `---'      (  A  )     |     |         `---'              |
   |                 `---'      |     |                            |
   |   ISD 1                    |     |                    ISD 2   |
   +----------------------------+     +----------------------------+

           Figure 15: Topology used in the path lookup examples.

+---------+          +---------+          +---------+        +---------+
|Endpoint |          |Source AS|          | Core AS |        | Core AS |
|         |          | CS (A)  |          | CS (B)  |        | CS (C)  |
+----+----+          +----+----+          +----+----+        +-----+---+
    +++                   |                    |                   |
    | |                   |                    |                   |
+---+-+-------+           |                    |                   |
|send requests|           |                    |                   |
| in parallel |           |                    |                   |
+---+-+-------+           |                    |                   |
    | |                   |                    |                   |
    | |  request (up)     |                    |                   |
    | +----------------->+++                   |                   |
    | |< -- -- -- -- -- -+++                   |                   |
    | | reply (up,[A->B]) |                    |                   |
    | |                   |                    |                   |
    | |                   |                    |                   |
    | |                   |                    |                   |
    | |request (core,*,*) |                    |                   |
    | +----------------->+++                   |                   |
    | |                  | |request (core,B,*) |                   |
    | |                  | +----------------->+++                  |

de Kater, et al.          Expires 22 April 2025                [Page 76]
Internet-Draft                  SCION CP                    October 2024

    | |                  | |<-- -- -- -- -- --+++                  |
    | |                  | | reply(core,[B->C])|                   |
    | |< -- -- -- -- -- -+++                   |                   |
    | |reply (core,[B->C])|                    |                   |
    | |                   |                    |                   |
    | |                   |                    |                   |
    | |request (down,*,D) |                    |                   |
    | +----------------->+++                   |                   |
    | |            +-----+-+-----+             |                   |
    | |            |send requests|             |                   |
    | |            | in parallel |             |                   |
    | |            +-----+-+-----+             |                   |
    | |                  | |                   |                   |
    | |                  | |request (down,B,D) |                   |
    | |                  | +----------------->+++                  |
    | |                  | |<-- -- -- -- -- --+++                  |
    | |                  | | reply(down,[B->D])|                   |
    | |                  | |                   |                   |
    | |                  | |                   |request (down,C,D) |
    | |                  | +-------------------+----------------->+++
    | |                  | <-- -- -- -- -- -- -+ -- -- -- -- -- --+++
    | |   reply (down,   | |                   | reply(down,[C->D])|
    | |   [B->D, C->D])  | |                   |                   |
    | |< -- -- -- -- -- -+++                   |                   |
    | |                   |                    |                   |
+---+-+----------+        |                    |                   |
|combine segments|        |                    |                   |
+---+-+----------+        |                    |                   |
    | |                   |                    |                   |
    +++                   |                    |                   |
     |                    |                    |                   |
 +---+----+           +---+----+          +----+---+          +----+---+
 +--------+           +--------+          +--------+          +--------+

     Figure 16: Sequence diagram illustrating a path lookup for a
  destination D in the source ISD.  The request (core, x, x) is for
   all pairs of core ASes in the source ISD.  Similarly, (down, x,
  D) is for down segments between any core AS in the source ISD and
                            destination D.

+---------+     +---------+      +---------+   +---------+   +---------+
|Endpoint |     |Source AS|      | Core AS |   | Core AS |   | Core AS |
|         |     | CS (A)  |      | CS (B)  |   | CS (E)  |   | CS (F)  |
+---+-----+     +----+----+      +----+----+   +----+----+   +----+----+
    |                |                |             |             |
   +++               |                |             |             |
   | |               |                |             |             |
+--+-+------+        |                |             |             |

de Kater, et al.          Expires 22 April 2025                [Page 77]
Internet-Draft                  SCION CP                    October 2024

|   send    |        |                |             |             |
|requests in|        |                |             |             |
| parallel  |        |                |             |             |
+--+-+------+        |                |             |             |
   | |               |                |             |             |
   | |  request (up) |                |             |             |
   | +------------->+++               |             |             |
   | |<- -- -- -- --+++               |             |             |
   | |    reply      |                |             |             |
   | | (up,[A->B])   |                |             |             |
   | |               |                |             |             |
   | |               |                |             |             |
   | |   request     |                |             |             |
   | |(core,*,(2,*)) |                |             |             |
   | +------------->+++    request    |             |             |
   | |              | |(core,B,(2,*)) |             |             |
   | |              | +------------->+++            |             |
   | |              | |<- -- -- -- --+++            |             |
   | |              | | reply (core,  |             |             |
   | |              | | [B->E,B->F])  |             |             |
   | |<- -- -- -- --+++               |             |             |
   | | reply (core,  |                |             |             |
   | | [B->E,B->F])  |                |             |             |
   | |               |                |             |             |
   | |               |                |             |             |
   | |               |                |             |             |
   | |   request     |                |             |             |
   | |(down,(2,*),G) |                |             |             |
   | +------------->+++               |             |             |
   | |        +-----+-+-----+         |             |             |
   | |        |send requests|         |             |             |
   | |        | in parallel |         |             |             |
   | |        +-----+-+-----+         |   request   |             |
   | |              | |               | (down,E,G)  |             |
   | |              | +---------------+----------->+++            |
   | |              | <- -- -- -- -- -+ -- -- -- --+++            |
   | |              | |               |    reply    |             |
   | |              | |               |(down,[E->G])|             |
   | |              | |               |             |   request   |
   | |              | |               |             | (down,F,G)  |
   | |              | +---------------+-------------+----------->+++
   | |              | < -- -- -- -- --|-- -- -- -- -+ -- -- -- --+++
   | |              | |               |             |    reply    |
   | | reply (down, | |               |             |(down,[F->G])|
   | | [E->G,F->G]) | |               |             |             |
   | |<- -- -- -- --+++               |             |             |
   | |               |                |             |             |
+--+-+----+          |                |             |             |

de Kater, et al.          Expires 22 April 2025                [Page 78]
Internet-Draft                  SCION CP                    October 2024

| combine |          |                |             |             |
|segments |          |                |             |             |
+--+-+----+          |                |             |             |
   | |               |                |             |             |
   +++               |                |             |             |
    |                |                |             |             |
+---+----+       +---+----+       +---+----+    +---+----+    +---+----+
+--------+       +--------+       +--------+    +--------+    +--------+

     Figure 17: Sequence diagram illustrating a path lookup for a
   destination G in a remote ISD.  The request (core, x, (2, x)) is
   for all path segments between a core AS in the source ISD and a
     core AS in ISD 2.  Similarly, (down, (2, x), G) is for down
       segments between any core AS in ISD 2 and destination G.

Change Log

   Changes made to drafts since ISE submission.  This section is to be
   removed before publication.

draft-dekater-scion-controlplane-06

   Major changes:

   *  New section: Path MTU -New section: Monitoring Considerations

   *  Completed description of Control Services gRPC API in appendix

   Minor changes:

   *  Introduction: clarify goal of the document

   *  Clarify typical vs recommended-limits values for best PCB set size
      and for certificate validity duration.

   *  Clarify text representation of ISD-AS

   *  General rewording

   *  Added reference to SCIONLab as a testbed for implementors

   *  Introduced this change log

draft-dekater-scion-controlplane-05

   Minor changes:

   *  Clarify beaconing fast retry at bootstrapping

de Kater, et al.          Expires 22 April 2025                [Page 79]
Internet-Draft                  SCION CP                    October 2024

draft-dekater-scion-controlplane-04

   Major changes:

   *  Clarified selection of MAC including a default algorithm

   *  New section: PCB validity

   *  New section: configuration

   *  New section: Path Discovery Time and Scalability

   *  New section: Effects of Clock Inaccuracy

   *  New appendix: Control Service gRPC API

   Minor changes:

   *  Introduction: Added overview of SCION components

   *  Clarified path reversibility, link types, interface IDs

   *  Fixed private AS range typo

   *  Clarified PCB selection policies and endpoint requirements

   *  Clarified PCB propagation

   *  General edits to make terminology consistent, remove duplication
      and rationalize text

   *  Removed forward references

   *  Added RFC2119 compliant terminology

Authors' Addresses

   Corine de Kater
   SCION Association
   Email: c_de_kater@gmx.ch

   Nicola Rustignoli
   SCION Association
   Email: nic@scion.org

de Kater, et al.          Expires 22 April 2025                [Page 80]
Internet-Draft                  SCION CP                    October 2024

   Samuel Hitz
   Anapaya Systems
   Email: hitz@anapaya.net

de Kater, et al.          Expires 22 April 2025                [Page 81]