<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-yang-spring-sid-as-source-address-10" category="info" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="SID as source address">SID as source address in SRv6</title>

    <author initials="F." surname="Yang" fullname="Feng Yang">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <country>CN</country>
        </postal>
        <email>yangfeng@chinamobile.com</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <country>CN</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="19"/>

    <area>RTG</area>
    <workgroup>SPRING</workgroup>
    

    <abstract>


<?line 37?>

<t>SRv6 is being rapidly deployed and is currently primarily used in trusted-domain backbone networks. Both the carrier market and the enterprise market are adopting SRv6 for end-to-end service delivery. However, if a firewall exists along an SRv6 path, legitimate SRv6 traffic will be dropped. This proposal addresses this issue by using SID as source address in SRv6 packets.</t>



    </abstract>



  </front>

  <middle>


<?line 41?>

<section anchor="introduction"><name>Introduction</name>

<t>SRv6 is being rapidly deployed and is currently primarily used in trusted-domain backbone networks. Both the carrier market and the enterprise market are adopting SRv6 for end-to-end service delivery. However, if a firewall exists along an SRv6 path, legitimate SRv6 traffic will be dropped. This proposal addresses this issue by using SID as source address in SRv6 packets.</t>

<t>The reason has been elaborated in Section 8.1 of <xref target="I-D.draft-ietf-spring-srv6-security"></xref>. In brief, SRv6 using loopback as source address will cause asymmetric address, which will be blocked by the firewall. As a result, users are forced to encapsulate traffic with multiple layers of tunnel headers—such as IPSec or L2TP—to ensure it can pass through the firewall. This approach introduces two significant issues: first, it increases overhead—for example, IPSec adds approximately 80 bytes of header overhead; second, it undermines the programmability benefits of SRv6, as forwarding is performed based on IPSec rather than SRv6 itself.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="terminology"><name>Terminology</name>
<t>AC: attachment circuit</t>

<t>PE: Provider Edge.</t>

<t>SID:  Segment Identifier, defined in <xref target="RFC8402"></xref>.</t>

<t>SRv6: SR over IPv6, defined in <xref target="RFC8402"></xref>.</t>

<t>VPLS: Virtual Private LAN Service.</t>

<t>VPWS: Virtual Private Wire Service.</t>

<t>VPN: Virtual Private Network.</t>

</section>
</section>
<section anchor="using-srv6-sid-as-source-address"><name>Using SRv6 SID as Source Address</name>

<t>Only unicast traffics are eligible for using SID as source address. There are a bunch of SRv6 services specified in <xref target="RFC8986"></xref>, and those End.DT* and End.DX* SIDs are locally allocated and associated SRv6 tunnel operation. All those End.DX* and End.DT* SIDs except End.DT2M <bcp14>SHOULD</bcp14> be used for source address. Put it simple, it <bcp14>SHOULD</bcp14> consider using SID as source address for IPinIP, L3VPN, VPWS, VPLS and EVPN services.</t>

<section anchor="user-traffic"><name>User Traffic</name>

<t>AC is associated with an SRv6 service, and the SID of that SRv6 service is locally allocated by the PE. Therefore, the traffic received from an AC can always be unambiguously associated with a specific local SRv6 service SID. In other words, the SRv6 service SID to be populated as source address can be naturally determined during the forwarding process.</t>

</section>
<section anchor="control-traffic"><name>Control Traffic</name>

<t>Control traffic will not be terminated by VPN, thus will not be impacted.</t>

</section>
<section anchor="oam-traffic"><name>OAM Traffic</name>

<t>OAM traffic terminated by the SRv6 tunnel <bcp14>SHOULD</bcp14> use the SRv6 SID as source address, such as ping, trace. Refer to RFC 8986 4.1.1, Allowing the processing of specific Upper-Layer header types is useful for Operations, Administration, and Maintenance (OAM).  As an example, an operator might permit pinging of SIDs. To do this, they may enable permission of Upper-Layer header type 58(ICMPv6).</t>

</section>
<section anchor="management-traffic"><name>Management Traffic</name>

<t>Management traffic will not be terminated by VPN, thus <bcp14>SHOULD</bcp14> not be impacted.</t>

</section>
</section>
<section anchor="use-cases"><name>Use Cases</name>

<section anchor="srv6-network-with-sr-aware-stateful-firewall"><name>SRv6 Network with SR-aware Stateful Firewall</name>

<section anchor="problem-statement"><name>Problem Statement</name>

<t>To provide VPN service in an SRv6 network <xref target="RFC9252"></xref>, the ingress PE encapsulates the payload in an outer IPv6 header with the Segment Routing Header (SRH) <xref target="RFC8754"></xref> carrying the SR Policy segment list along with the VPN Service SID. If the VPN service is with best-effort connectivity, the destination address of the outer IPv6 header carries the VPN service SID and the SRH is omitted.</t>

<t>Along the forwarding path in the SRv6 network, firewalls may be deployed to filter the traffics. If a firewall is SR-aware, it will retrieve the final destination of an SRv6 packet from the last entry in the SRH rather than the destination address field of the IPv6 header <xref target="I-D.draft-ietf-spring-sr-service-programming"></xref>.</t>

<t>A stateful firewall keeps a track of the state of the network connections traveling across it. Whenever a packet arrives to seek permission to pass through it, the firewall checks from its state table if there is an active connection between identified by 3 tuple or 5 tuple. Thus only legitimate packets are allowed to be transmitted across it.</t>

<t><xref target="f4"/> and <xref target="f5"/> show the bidirectional VPN traffic packets passing through a firewall in an SRv6 network.</t>

<t>The source address of the outer IPv6 header is the IPv6 address of
   ingress PE. The final destination address of the outer IPv6 header
   is the VPN Service SID of egress PE. In the SR-Policy-based way, the
   final destination address is encapsulated in the last entry in the
   SRH, Segment[0]. In the best-effort way, the SRH is omitted.</t>

<figure align="center" anchor="f4" title="SR-Policy-based VPN Traffic across Firewall"><artwork type="ascii-art"><![CDATA[
+---+   +---+       +--------+       +---+   +---+
|CE1|---|PE1|--...--|Firewall|--...--|PE2|---|CE2|
+---+   +---+       +--------+       +---+   +---+

Packet (PE1 ---> PE2):        Packet (PE1 <--- PE2):
**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-IP-ADDR     *        * SA=PE2-IP-ADDR     *
* DA=NextSegment     *        * DA=NextSegment     *
**********************        **********************
*        SRH         *        *        SRH         *
* Seg[0]=PE2-VPN-SID *        * Seg[0]=PE1-VPN-SID *
* Seg[...]           *        * Seg[...]           *
**********************        **********************
*    Eth/IPv4/IPv6   *        *    Eth/IPv4/IPv6   *
* Source=CE1         *        * Source=CE2         *
* Destination=CE2    *        * Destination=CE1    *
**********************        **********************
*       Payload      *        *       Payload      *
**********************        **********************

]]></artwork></figure>

<figure align="center" anchor="f5" title="Best-Effort VPN Traffic across Firewall"><artwork type="ascii-art"><![CDATA[
 +---+   +---+       +--------+       +---+   +---+
 |CE1|---|PE1|--...--|Firewall|--...--|PE2|---|CE2|
 +---+   +---+       +--------+       +---+   +---+

Packet (PE1 ---> PE2):        Packet (PE1 <--- PE2):
**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-IP-ADDR     *        * SA=PE2-IP-ADDR     *
* DA=PE2-VPN-SID     *        * DA=PE1-VPN-SID     *
**********************        **********************
*    Eth/IPv4/IPv6   *        *    Eth/IPv4/IPv6   *
* Source=CE1         *        * Source=CE2         *
* Destination=CE2    *        * Destination=CE1    *
**********************        **********************
*       Payload      *        *       Payload      *
**********************        **********************

]]></artwork></figure>

<t>The stateful firewall will check the association relationships of the bidirectional VPN traffic packets. A common implementation may record the key information of the packets on forward way(internal to external), such as source address and destination address. When receiving a packet on backward way(external to internal), it checks the state table if there is an existing forward packet flow. For example, the firewall may require that the source address of packet on backward way matches the destination address of packet on forward way, and destination address will be checked in the similar way. If not matched, the packet on the backward path will be regarded as illegal and thus dropped.</t>

<t>An SR-aware firewall is able to retrieve the final destination of an SRv6 packet from the last entry in the SRH. The &lt;source, destination&gt; tuple of the packet from PE1 to PE2 is &lt;PE1-IP-ADDR, PE2-VPN-SID&gt;, and the other direction is &lt;PE2-IP-ADDR, PE1-VPN-SID&gt;. However, the source address of the outer IPv6 packet is usually a loopback interface of the ingress PE. Eventually, the source address and destination address of the forward and backward VPN traffic are regarded as different flow, and they may be blocked by the firewall.</t>

</section>
<section anchor="solution-for-srv6-traffic-pass-thru-sr-aware-stateful-firewall"><name>Solution for SRv6 Traffic Pass Thru SR-aware Stateful Firewall</name>

<t>In the SRv6-based VPN service, the final destination of the outer IPv6 header is the VPN-SID of the egress PE, which is associated with that VPN service. But the source address of the outer IPv6 header is usually unrelated to the VPN service. So, it can be difficult for a stateful firewall to establish the association relationship between the bidirectional traffic flows.</t>

<t>The proposed solution is to unify the semantic of the source and destination address thus ensure the symmetry of the bidirectional flow.</t>

<t>When an ingress PE receives the client packet from CE, it checks which L3 VPN service it belongs to, and uses the VPN-SID associated with that L3 VPN service as the source address when encapsulating the outer IPv6 header with the optional SRH.</t>

<figure align="center" anchor="f6" title="Outer IPv6 Header in the Proposed Solution"><artwork type="ascii-art"><![CDATA[
Outer IPv6 Header of SR-Policy-based VPN Traffic:

**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-VPN-SID     *        * SA=PE2-VPN-SID     *
* DA=NextSegment     *        * DA=NextSegment     *
**********************        **********************
*        SRH         *        *        SRH         *
* Seg[0]=PE2-VPN-SID *        * Seg[0]=PE1-VPN-SID *
* Seg[...]           *        * Seg[...]           *
**********************        **********************

Outer IPv6 Header of Best-effort VPN Traffic:

**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-VPN-SID     *        * SA=PE2-VPN-SID     *
* DA=PE2-VPN-SID     *        * DA=PE1-VPN-SID     *
**********************        **********************

]]></artwork></figure>

<t>According to <xref target="RFC8402"></xref> and <xref target="RFC8986"></xref>, an SRv6 VPN Service SID is an IPv6 address, and it is routable by its Locator prefix in the SRv6 network. In the proposed solution, when an SRv6 VPN Service SID is used as the source address of the outer IPv6 header in the SRv6 network, it is treated as a normal IPv6 address and does not perform any special behavior.</t>

</section>
</section>
</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>
<section anchor="Security"><name>Security Considerations</name>

<t>TBD.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8402">
  <front>
    <title>Segment Routing Architecture</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
    <author fullname="R. Shakir" initials="R." surname="Shakir"/>
    <date month="July" year="2018"/>
    <abstract>
      <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
      <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
      <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8402"/>
  <seriesInfo name="DOI" value="10.17487/RFC8402"/>
</reference>
<reference anchor="RFC8754">
  <front>
    <title>IPv6 Segment Routing Header (SRH)</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8754"/>
  <seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>
<reference anchor="RFC8986">
  <front>
    <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="Z. Li" initials="Z." surname="Li"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
      <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
      <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8986"/>
  <seriesInfo name="DOI" value="10.17487/RFC8986"/>
</reference>
<reference anchor="RFC9252">
  <front>
    <title>BGP Overlay Services Based on Segment Routing over IPv6 (SRv6)</title>
    <author fullname="G. Dawra" initials="G." role="editor" surname="Dawra"/>
    <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
    <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="S. Zhuang" initials="S." surname="Zhuang"/>
    <author fullname="J. Rabadan" initials="J." surname="Rabadan"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>This document defines procedures and messages for SRv6-based BGP services, including Layer 3 Virtual Private Network (L3VPN), Ethernet VPN (EVPN), and Internet services. It builds on "BGP/MPLS IP Virtual Private Networks (VPNs)" (RFC 4364) and "BGP MPLS-Based Ethernet VPN" (RFC 7432).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9252"/>
  <seriesInfo name="DOI" value="10.17487/RFC9252"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-ietf-spring-sr-service-programming">
   <front>
      <title>Service Programming with Segment Routing</title>
      <author fullname="Ahmed Abdelsalam" initials="A." surname="Abdelsalam">
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname="Xiaohu Xu" initials="X." surname="Xu">
         <organization>China Mobile</organization>
      </author>
      <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname="Daniel Bernier" initials="D." surname="Bernier">
         <organization>Bell Canada</organization>
      </author>
      <author fullname="Cheng Li" initials="C." surname="Li">
         <organization>Huawei</organization>
      </author>
      <author fullname="Bruno Decraene" initials="B." surname="Decraene">
         <organization>Orange</organization>
      </author>
      <author fullname="Shaowen Ma" initials="S." surname="Ma">
         <organization>Mellanox</organization>
      </author>
      <author fullname="Chaitanya Yadlapalli" initials="C." surname="Yadlapalli">
         <organization>AT&amp;T</organization>
      </author>
      <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
         <organization>Nokia</organization>
      </author>
      <author fullname="Stefano Salsano" initials="S." surname="Salsano">
         <organization>Universita di Roma &quot;Tor Vergata&quot;</organization>
      </author>
      <date day="3" month="November" year="2025"/>
      <abstract>
	 <t>   This document defines data plane functionality required to implement
   service segments and achieve service programming in SR-enabled MPLS
   and IPv6 networks, as described in the Segment Routing architecture.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-service-programming-12"/>
   
</reference>

<reference anchor="I-D.draft-ietf-spring-srv6-security">
   <front>
      <title>Segment Routing IPv6 Security Considerations</title>
      <author fullname="Nick Buraglio" initials="N." surname="Buraglio">
         <organization>Energy Sciences Network</organization>
      </author>
      <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
         <organization>Huawei</organization>
      </author>
      <author fullname="tongtian124" initials="" surname="tongtian124">
         <organization>China Unicom</organization>
      </author>
      <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
         <organization>Telefonica</organization>
      </author>
      <author fullname="Fernando Gont" initials="F." surname="Gont">
         <organization>SI6 Networks</organization>
      </author>
      <date day="2" month="February" year="2026"/>
      <abstract>
	 <t>   SRv6 is a traffic engineering, encapsulation and steering mechanism
   utilizing IPv6 addresses to identify segments in a pre-defined
   policy.  This document discusses security considerations in SRv6
   networks, including the potential threats and the possible mitigation
   methods.  The document does not define any new security protocols or
   extensions to existing protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-spring-srv6-security-11"/>
   
</reference>



    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

