<?xmlversion="1.0" encoding="US-ASCII"?>version='1.0' encoding='UTF-8'?> <!DOCTYPE rfcSYSTEM "rfc2629.dtd"> <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> <?rfc strict="yes" ?> <?rfc toc="yes"?> <?rfc tocdepth="4"?> <?rfc symrefs="yes"?> <?rfc sortrefs="yes" ?> <?rfc compact="yes" ?> <?rfc subcompact="no" ?>[ <!ENTITY nbsp " "> <!ENTITY zwsp "​"> <!ENTITY nbhy "‑"> <!ENTITY wj "⁠"> ]> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="std" docName="draft-ietf-pim-p2mp-policy-ping-25"ipr="trust200902">number="9961" consensus="true" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="4" symRefs="true" sortRefs="true" version="3"> <front> <!--[rfced] Since the running text uses "SR P2MP Policy ping and traceroute" and "P2MP policy ping" (both without "MPLS"), should the document title be updated as shown below for consistency? Since "traceroute" is mentioned in the Abstract and with ping in the running text, should it be included in the title as well? (Note that if "traceroute" is included, we will update the short title that spans the header of the PDF file to include it as well.) Also, would you like to add the abbreviation for "Segment Routing" since "(P2MP)" is included for "Point-to-Multipoint"? Original: Segment Routing MPLS Point-to-Multipoint (P2MP) Policy Ping Perhaps: MPLS Segment Routing (SR) Point-to-Multipoint (P2MP) Policy Ping and Traceroute --> <title abbrev="P2MP Policy Ping">Segment Routing MPLS Point-to-Multipoint (P2MP) Policy Ping</title> <seriesInfo name="RFC" value="9961"/> <author fullname="Hooman Bidgoli" initials="H" role="editor" surname="Bidgoli"> <organization>Nokia</organization> <address> <postal><street/><city>Ottawa</city><region/> <code/><country>Canada</country> </postal><phone/><email>hooman.bidgoli@nokia.com</email> </address> </author> <authorfullname="Zafar"fullname="Zafar Ali" initials="Z." surname="Ali"> <organization>Cisco System</organization> <address> <postal><street/><city>San Jose</city><region/> <code/> <country>USA</country><country>United States of America</country> </postal><phone/> <facsimile/><email>zali@cisco.com</email><uri/></address> </author> <author fullname="Zhaohui Zhang" initials="Z." surname="Zhang"> <organization>Juniper Networks</organization> <address> <postal><street/><city>Boston</city><region/> <code/> <country>USA</country><country>United States of America</country> </postal><phone/> <facsimile/><email>zzhang@juniper.net</email><uri/></address> </author> <author fullname="Anuj Budhiraja" initials="A." surname="BudhirajaC"> <organization>Cisco System</organization> <address> <postal><street/><city>San Jose</city><region/> <code/> <country>USA</country><country>United States of America</country> </postal><phone/> <facsimile/><email>abudhira@cisco.com</email><uri/></address> </author> <author fullname="Daniel Voyer" initials="D" surname="Voyer"> <organization>Cisco System</organization> <address> <postal><street/><city>Montreal</city><region/> <code/><country>Canada</country> </postal><phone/> <facsimile/><email>davoyer@cisco.com</email><uri/></address> </author> <dateday="09" month="October" year="2025"/>month="April" year="2026"/> <area>RTG</area> <workgroup>pim</workgroup> <!-- [rfced] Please insert any keywords (beyond those that appear in the title) for use on https://www.rfc-editor.org/search. --> <keyword>example</keyword> <abstract><t>SR<t>Segment Routing (SR) Point-to-Multipoint (P2MP) Policies are used to define and manage explicit P2MP paths within a network. These policies are typically calculated via a controller-based mechanism and installed via, e.g., a Path Computation Element (PCE). In othercasescases, these policies can be installedviausingNETCONF/YANGthe Network Configuration Protocol (NETCONF) / YANG orCLI.a Command Line Interface (CLI). They are used to steer multicast traffic along optimized paths from a Root to a set of Leaf routers.</t> <t>This document defines extensions to Ping and Traceroute mechanisms for an SR P2MP Policy with MPLS encapsulation to provideOAM (Operations,Operations, Administration, andMaintenance)Maintenance (OAM) capabilities. The extensions enable operators to verify connectivity, diagnosefailuresfailures, and troubleshoot forwarding issues within SR P2MP Policy multicast trees.</t> <t>By introducing new mechanisms for detecting failures and validating path integrity, this document enhances the operational robustness of P2MP multicast deployments. Additionally, it ensures that existing MPLS and SR-based OAM tools can be effectively applied to networks utilizing SR P2MP Policies.</t> </abstract> </front> <middle> <sectiontitle="Introduction"> <!-- 1 -->numbered="true" toc="default"> <name>Introduction</name> <t><xreftarget="draft-ietf-pim-sr-p2mp-policy"/>target="RFC9960" format="default"/> explains the concept of the SR P2MP Policy and itsCandidate Pathscandidate paths (CPs). It also explains the concept of how a CP is selected to be the active CP. To enable seamless globaloptimizationoptimization, a CP may consist of multiple P2MPTree Instancestree instances (PTIs), allowing for Make-Before-Break(MBB)procedures between an active PTI and a newly established, optimized PTI. A PTI is the actual P2MP tunnel set up from the Root to a set of Leaves via transit routers. A PTI is identified on the Root node by the PTI's instance ID.</t> <t>To ensure reliable network operation, it is essential to verify end-to-end connectivity for both active and backup CPs, as well as all associated PTIs. This document specifies a mechanism for detecting data plane failures withinaan SR P2MP Policy CP and its associated PTIs, enabling operators to monitor and troubleshoot multicast path integrity.</t><t>This<!--[rfced] Should "Replication Segments (Replication SIDs)" be updated as "Replication segment identifiers (Replication-SIDs)" (option A) or "Replication segments (i.e., Replication segment identifiers (Replication-SIDs)) (option B) for clarity? Original: This specification applies exclusively to Replication Segments (Replication SIDs) that use MPLS encapsulation for forwarding and does not cover Segment Routing over IPv6 (SRv6). Perhaps A: This specification applies exclusively to Replication segment identifiers (Replication-SIDs) that use MPLS encapsulation for forwarding and does not cover Segment Routing over IPv6 (SRv6). or Perhaps B: This specification applies exclusively to Replication segments (i.e., Replication segment identifiers (Replication-SIDs)) that use MPLS encapsulation for forwarding and does not cover Segment Routing over IPv6 (SRv6). --> <t>This specification applies exclusively to Replication Segments (Replication-SIDs) that use MPLS encapsulation for forwarding and does not cover Segment Routing over IPv6 (SRv6). The mechanisms described herein build upon the concepts established in <xreftarget="RFC6425"/>target="RFC6425" format="default"/> for P2MP MPLS Operations, Administration, and Maintenance (OAM). All considerations and limitations described insection 6 of<xreftarget="RFC6425"/>target="RFC6425" section="6"/> apply to this document as well.</t> <sectiontitle="Terminology ">numbered="true" toc="default"> <name>Terminology</name> <t>The readers of this document should familiarize themselves with the following documents and sections for terminology and details regarding the implementation of the SR P2MPPolicy</t>Policy.</t> <t><xreftarget="RFC9524"/> section 1.1target="RFC9524" section="1.1" sectionFormat="comma"/> defines terms specific to an SR ReplicationSegmentsegment and also explains theNodenode terminology in a Multicast domain, including the RootNode,node, LeafNodenode, andaBudNode.</t> <t><xref target="draft-ietf-pim-sr-p2mp-policy"> </xref>node.</t> <!-- [rfced] FYI - We have updated this citation to point to Section 1.1 of RFC-to-be 9960 (the Terminology section.) Please review and let us know of any objections. Original: [draft-ietf-pim-sr-p2mp-policy] section 2, defines terms and concepts specific to SR P2MP Policy including the CP and the PTI. Current: [RFC9960], Section 1.1 defines terms and concepts specific to the SR P2MP Policy including the CP and the PTI. --> <t><xref target="RFC9960" section="1.1" sectionFormat="comma"/> defines terms and concepts specific to the SR P2MP Policy including the CP and the PTI.</t> </section> </section> <sectiontitle="Conventions usednumbered="true" toc="default"> <name>Conventions Used inthis document"> <!-- 2 --> <t>TheThis Document</name> <t> The key words"MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY","<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and"OPTIONAL""<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described inBCP 14BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shownhere.</t>here. </t> </section> <sectiontitle="Motivation"> <!-- 3--> <t>Anumbered="true" toc="default"> <name>Motivation</name> <t>An SR P2MP Policy and its corresponding ReplicationSegmentssegments are typically provisioned via a centralized controller or configured using NETCONF/YANG or CLI. TherootRoot and theleavesLeaves are discovered in accordance with <xreftarget="draft-ietf-pim-sr-p2mp-policy"/>target="RFC9960" format="default"/>, and the multicast tree is computed from therootRoot to theleaves.Leaves. However, there is no underlay signaling protocol to distribute the SR P2MP Policy from therootRoot to theleafLeaf routers. Consequently, when a P2MP tree fails to deliver user traffic, identifying the failure can be challenging without ping and traceroute mechanisms to isolate faults along the tree.</t> <t>To address this challenge, SR P2MP Policy ping and traceroute can be utilized to detect and localize faults within the P2MP tree and its associated ReplicationSegments,segments, as defined in <xreftarget="RFC9524"/>.target="RFC9524" format="default"/>. These OAM tools enable periodic ping operations to verify connectivity between therootRoot and theleaves.Leaves. In cases where a ping fails, a traceroute can be initiated to determine the point of failure along the tree. This diagnostic process can be initiated from the node responsible for establishing the SR P2MP Policy, ensuring proactive monitoring and fault detection.</t> <sectiontitle="MPLSnumbered="true" toc="default"> <!--[rfced] Should "SR" be added to the title of Section 3.1 for consistency with the running text? Original: 3.1. MPLS P2MP Policy Ping andTraceroute"> <!-- 3.1Traceroute Perhaps: 3.1. MPLS SR P2MP Policy Ping and Traceroute --> <name>MPLS P2MP Policy Ping and Traceroute</name> <t>Ping/Traceroute packets are forwarded based upon the SR P2MPPolicy,Policy on a specific CP and its PTI toward the designatedleafLeaf routers. These packets are replicated at the replication point based on the ReplicationSegmentsegment forwarding information on the corresponding router.</t> <t>MPLSPacketspackets are processed based on the standard behavior when theirTime-to-LiveTime to Live (TTL) expires or when they reach the egress(leaf)(Leaf) router. The appropriate response is sent back to therootRoot node following the procedures outlined in <xreftarget="RFC6425"/>.</t>target="RFC6425" format="default"/>.</t> <sectiontitle="Applicabilitynumbered="true" toc="default"> <!--[rfced] Please clarify what "Current RFC" refers to in the title ofcurrentSection 3.1.1. Original: 3.1.1. Applicability of the Current RFC to SR P2MPPolicies"> <!-- 3.1.1Policies --> <name>Applicability of the Current RFC to SR P2MP Policies</name> <t>The procedures in <xreftarget="RFC6425"/>target="RFC6425" format="default"/> define fault detection and isolation mechanisms for P2MP MPLSLSPsLabel Switched Paths (LSPs) and extend the LSP ping techniques described in <xreftarget="RFC8029"/>target="RFC8029" format="default"/> such that they may be applied to P2MP MPLS LSPs, ensuring alignment with existing fault management tools. <xreftarget="RFC6425"/>target="RFC6425" format="default"/> emphasizes the reuse of existing LSP ping mechanisms designed for Point-to-PointP2P(P2P) LSPs, adapting them to P2MP MPLS LSPs to facilitate seamless implementation and network operation.</t> <t>The fault detection procedures specified in <xreftarget="RFC6425"/>target="RFC6425" format="default"/> are applicable to all P2MP MPLS protocols, including P2MP RSVP-TE and Multicast LDP and now the SR P2MPSRPolicy. While <xreftarget="RFC6425"/>target="RFC6425" format="default"/> highlights specific differences for P2MP RSVP-TE and Multicast LDP, this document introduces considerations unique to SR P2MP Policies, including:</t><t><list style="numbers"><ol spacing="normal" type="1"><li> <t>Egress Address P2MP ResponderSub-TLVs:sub-TLVs: Multicast LDP, as persection 3.2.1 of<xreftarget="RFC6425"/>,target="RFC6425" section="3.2.1" sectionFormat="of"/>, does not allow for the inclusion of Egress Address P2MP ResponderSub-TLVs,sub-TLVs, as upstreamLSRsLabel Switching Routers (LSRs) lack visibility into downstreamleafLeaf nodes. Similarly, SR P2MP Policies often rely on a Path Computation Element (PCE) for programming transit routers. This is why in the SR P2MP domain, transit routers do not have knowledge of theleafLeaf nodes. Only the Root node, where the SR P2MP Policy is programmed, has visibility into theleafLeaf nodes. Consequently, theseSub-TLVs SHOULD NOTsub-TLVs <bcp14>SHOULD NOT</bcp14> be used when an echo request carriesaan SR P2MP Policy MPLS Candidate PathFEC.Forwarding Equivalence Class (FEC). If a node receives the Egress Address P2MP ResponderSub-TLVssub-TLVs in an echo request, then it will not respond since it is unaware of whether it lies on the path to the address in the sub-TLV.</t> </li> <li> <t>End of Processing for Traceroutes: As persection 4.3.1 of<xreftarget="RFC6425"/>,target="RFC6425" section="4.3.1" sectionFormat="of"/>, it isRECOMMENDED<bcp14>RECOMMENDED</bcp14> thatfortraceroute orations provide for a configurable upper limit on TTL values. This isbecausebecause, for some protocols like Multicast LDP, there may not be an easy way to figure out the end of the tracerouteprocessingprocessing, as the initiating LSR might not always know about all of theleafLeaf routers. In the case ofaan SR P2MPPolicyPolicy, the Root node has visibility of theleaf nodes,Leaf nodes; assuchsuch, there is a definitive way to estimate the end of processing for atraceroutetraceroute, and a configurable upper limit on TTL may not be necessary.How ever,However, a configurable upper limit on the TTL value is an implementation choice.</t> </li> <li> <t>Identification of the LSP under test: <xreftarget="RFC6425"/>, in Section 3.1,target="RFC6425" section="3.1" sectionFormat="of"/> defines distinct identifiers for P2MP RSVP-TE and Multicast LDP when identifying an LSP under test. As each protocol has its own identifier, this document introduces a new Target FEC Stack TLV specific to SR P2MP Policies to uniquely identify theirCandidate Paths (CPs)CPs andP2MP Tree Instances (PTIs).PTIs. These modifications ensure that SR P2MP Policy OAM mechanisms are properly aligned with existing MPLS ping and traceroute tools while addressing the specific operational characteristics of SR P2MP Policies.</t></list></t></li> </ol> </section> <sectiontitle="Conformancenumbered="true" toc="default"> <name>Conformance to Existing Procedures and AdditionalConsiderations"> <!-- 3.1.2 -->Considerations</name> <t>In addition to major differences outlined in the previous section, SR P2MP PoliciesSHOULD<bcp14>SHOULD</bcp14> followtothe common procedures specified in <xreftarget="RFC6425"/>target="RFC6425" format="default"/> for P2MP MPLS LSPs. Furthermore, this specification reuses the same destination UDP port as defined in <xreftarget="RFC8029">target="RFC8029" format="default"> </xref> for consistency with the existing MPLS OAM mechanism.</t> <t>ImplementationsMUST<bcp14>MUST</bcp14> account for the fact thataan SR P2MP Policy may contain multiple CPs, and each CP may consist of multiple PTIs. As such, implementationsSHOULD<bcp14>SHOULD</bcp14> support the ability to individually test each CP and its corresponding PTI using ping and traceroute mechanisms. The ping and traceroute packets are forwarded along the specified CP and its PTI, traversing the associated ReplicationSegments.segments. When a downstream node capable of understanding thereplication SIDReplication-SID receives a ping or traceroute packet, itMUST<bcp14>MUST</bcp14> process the request and generate a response even if the CP and its PTI are not currently the active path.</t> </section> <sectiontitle="Considerationsnumbered="true" toc="default"> <name>Considerations for Interworking with Unicastpaths">Paths</name> <t>As per <xreftarget="draft-ietf-pim-sr-p2mp-policy"/>target="RFC9960" format="default"/>, there are two ways to build a P2MPTree:</t> <t><list style="numbers">tree:</t> <ol spacing="normal" type="1"><li> <t>P2MPTreetree with non-adjacent ReplicationSegments</t>segments</t> </li> <li> <t>P2MP tree with adjacent ReplicationSegments</t> </list></t>segments</t> </li> </ol> <t>For the case of adjacent ReplicationSegments,segments, there are no special considerations for the TTL or Hop Limitpropagationpropagation, and the TTL should be decremented hop by hop as the OAM packet traverses the ReplicationSegmentssegments of a P2MP tree.</t> <t>For the case of non-adjacent ReplicationSegments, as an examplesegments (for example, two ReplicationSegmentssegments that are connected viaaan SR Policy or similartechnology,technology), there are special considerations. In such scenarios, SR P2MP Policy OAM tools should be used to verify the connectivity of the non-adjacent ReplicationSegmentssegments that are building the P2MPTreetree, while the unicast OAM tools should be used to verify the connectivity of the unicast path connecting the two non-adjacent ReplicationSegment.segments. In thesescenariosscenarios, theReplication SIDReplication-SID should not be exposed or examined in the unicast path. Proper TTL handling to copy the ReplicationSegmentsegment TTL to the unicast path can be achieved via the hierarchical MPLS TTL mode being used (e.g., Pipe Mode vs. Uniform Mode) as per <xreftarget="RFC3270"/>.target="RFC3270" format="default"/>. For the P2MP TreeTracerouteTraceroute, the TTL modeMUST<bcp14>MUST</bcp14> be set toPIPE modePipe Mode on the router that the unicast path starts. This will ensure that the unicast path TTL is set to a large value that allows the traceroute packet to be delivered to the downstream ReplicationSegment.segment. ForPingPing, either thePIPE modePipe Mode or the UniformmodeMode can be used depending on the implementation. The unicast path failure detection is considered out of scope for this document.</t> </section> </section> <sectiontitle="Packet formatnumbered="true" toc="default"> <name>Packet Format andnew TLVs">New TLVs</name> <t>The packet format used in this specificationfollow section 3 offollows <xreftarget="RFC8029"/>.target="RFC8029" section="3" sectionFormat="of"/>. However, additional TLVs and sub-TLVs are required to support the new functionality introduced for SR P2MP Policies. These extensions are described in the following sections.</t> <sectiontitle="Identifyingnumbered="true" toc="default"> <name>Identifying a P2MPPolicy"> <!-- 3.1 -->Policy</name> <t><xreftarget="RFC8029"/>target="RFC8029" format="default"/> defines a standardized mechanism for detectingdata-planedata plane failures inMultiprotocol Label Switching (MPLS) Label Switched Paths (LSPs).MPLS LSPs. To correctly identify the ReplicationSegmentsegment associated with a givenCandidate Path (CP)CP andP2MP Tree Instance (PTI),PTI, theEcho Requestecho request messageMUST<bcp14>MUST</bcp14> include a Target FEC Stack TLV that explicitly specifies theCandidate Pathcandidate path and P2MPTree Instancetree instance under test.</t> <t>This document introduces a new sub-TLV, referred to as the SR MPLS P2MP Policy Tree Instance sub-TLV, which is defined as follows:</t><figure> <artwork><![CDATA[Sub-Type Length Value Field -------- ------ ----------- 41 Variable SR<table> <thead> <tr> <th>Sub-Type</th> <th>Length</th> <th>Value Field</th> </tr> </thead> <tbody> <tr> <td>41</td> <td>Variable</td> <td>SR MPLS P2MP Policy TreeInstance ]]></artwork> </figure>Instance</td> </tr> </tbody> </table> <t>Further details regarding the structure and processing of this sub-TLV are provided in subsequent sections.</t> <sectiontitle="SRnumbered="true" toc="default"> <name>SR MPLS P2MP Policy Tree Instance FEC StackSub-TLVs">Sub-TLVs</name> <t>The SR MPLS P2MP Policy Tree Instance sub-TLV value field follows the format specified inSection 2.3 of<xreftarget="draft-ietf-pim-sr-p2mp-policy"/>.section="2.3" target="RFC9960" format="default" sectionFormat="of"/>. The structure of this sub-TLV is illustrated in the figure below. It should be noted that this sub-TLV is testing a specific PTI within a specific CP and it is not testing the CP.</t><t><figure> <artwork><![CDATA[<artwork name="" type="" align="left" alt=""><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Address Family | Address Length| Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | ~ Root ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Tree-ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Instance-ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork></figure></t> <t><list style="symbols"> <t>Address Family: (2 octets)<dl spacing="normal" newline="false"> <dt>Address Family:</dt><dd>2 octets. IPv4/IPv6ADDRESS FAMILY NUMBERSAddress Family Numbers as specified in <xreftarget="IANA-AF"/> ,target="IANA-AF" format="default"/>, indicating theaddress familyAddress Family of the Root. Any other AddressFamily but IPv4/IPv6Family, except IPv4/IPv6, is not supported by thisdraft.</t> <t>Address Length: (1 octet) specifyingdocument.</dd> <dt>Address Length:</dt><dd>1 octet. Specifies the length of the Root Address in octets (4 octets for IPv4, and 16 octets forIPv6).</t> <t>Reserved: MUSTIPv6).</dd> <dt>Reserved:</dt><dd><bcp14>MUST</bcp14> be set to zero by the sender anditshould be ignored by thereceiver.</t> <t>Root: (variablereceiver.</dd> <dt>Root:</dt><dd>Variable length depending on theaddress family field)Address Family field. TherootRoot node of the SR P2MP Policy, as defined in <xreftarget="draft-ietf-pim-sr-p2mp-policy"/></t> <t>Tree-ID: (4 octets)target="RFC9960" format="default"/>.</dd> <dt>Tree-ID:</dt><dd>4 octets. A unique identifier for the P2MP tree, as defined in <xreftarget="draft-ietf-pim-sr-p2mp-policy"/></t> <t>Instance-ID: (2 octets) identifiestarget="RFC9960" format="default"/>.</dd> <dt>Instance-ID:</dt><dd>2 octets. Identifies the specificPath-InstancePath-Instance, as definedin<xref target="draft-ietf-pim-sr-p2mp-policy"/></t> </list></t>in <xref target="RFC9960" format="default"/>.</dd> </dl> </section> </section> </section> <sectiontitle="Limitingnumbered="true" toc="default"> <name>Limiting the Scope ofResponse"> <!-- 3.2 -->Response</name> <t>As specified insection 3.2 of<xreftarget="RFC6425"/>,target="RFC6425" section="3.2" sectionFormat="of"/>, four sub-TLVs are used within the P2MP Responder Identifier TLV that is included in the echo request message.</t> <t>TheSub-TLVssub-TLVs for IPv4 and IPv6 egress addresses of the P2MP responder are aligned withsection 3.2.1 of<xreftarget="RFC6425"/>.</t>target="RFC6425" section="3.2.1" sectionFormat="of"/>.</t> <t>The sub-TLVs for IPv4 and IPv6 node addresses of the P2MP responder are aligned withSection 3.2.2 of<xreftarget="RFC6425"/></t>target="RFC6425" section="3.2.2" sectionFormat="of"/>.</t> <t>These mechanisms ensure that responses are appropriately scoped to limit unnecessary processing and improve the efficiency of P2MP OAM procedures.</t> </section> </section> <sectiontitle="Implementation Status"> <t>Note to the RFC Editor: please remove this section before publication. This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in RFC7942 . The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs. Please note that the listing of any individual implementation here does not imply endorsement by the IETF. Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors. This is not intended as, and must not be construed to be, a catalog of available implementations or their features. Readers are advised to note that other implementations may exist. According to RFC7942, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature. It is up to the individual working groups to use this information as they see fit".</t> <section title="Nokia Implementation"> <t>Nokia has implemented <xref target="draft-ietf-pim-sr-p2mp-policy"/> and <xref target="RFC9524"/>. In addition, Nokia has implemented P2MP policy ping as defined in this draft to verify the end to end connectivity of a P2MP tree in segment routing domain. The implementation supports SR-MPLS encapsulation and has all the MUST and SHOULD clause in this draft. The implementation is at general availability maturity and is compliant with the latest version of the draft. The documentation for implementation can be found at Nokia help and the point of contact is hooman.bidgoli@nokia.com.</t> </section> </section> <section title="IANA Consideration"> <!-- 6 --> <t>IANAnumbered="true" toc="default"> <name>IANA Considerations</name> <t> IANA has assignedthe code pointa sub-type value for the"SRSR MPLS P2MP Policy TreeInstance" Sub-TLV Name. This Sub-TLV is assigned fromInstance sub-TLV in the "Sub-TLVs for TLVtype 1 (Target FEC Stack) fromTypes 1, 16, and 21" registry under the"Multi-Protocol"Multiprotocol Label Switching (MPLS) Label Switched Paths (LSPs) Ping Parameters" registry group. TheSub-TLVs for TLV type 1 are listed under "Sub-TLVs for TLV Types 1, 16, and 21" sub-registry. Thissub-type valueishas been assigned from thestandardsStandards Action range of 0-16383 as shown below. Note that the sub-TLV has been assigned from Type 1 (Target FEC Stack) of the"Sub-TLVs for TLV Types 1, 16, and 21" sub-registry.</t> <t>Sub-Type Sub-TLV Name</t> <t>41 SR"TLVs" registry. </t> <table> <thead> <tr><th>Sub-Type</th><th>Sub-TLV Name</th></tr> </thead> <tbody> <tr><td>41</td><td>SR MPLS P2MP Policy TreeInstance</t>Instance</td></tr> </tbody> </table> </section> <sectiontitle="Security Considerations"> <!-- 8 -->numbered="true" toc="default"> <name>Security Considerations</name> <t>Overall, the security needs for P2MP policy ping are the same as in <xreftarget="draft-ietf-pim-sr-p2mp-policy"/>,target="RFC9960" format="default"/>, <xreftarget="RFC6425"/> and<xref target="RFC8029">target="RFC6425" format="default"/>, and <xref target="RFC8029" format="default"> </xref>.TheP2MP policy ping is susceptible to the same three attack vectors as explained in <xreftarget="RFC8029"/> section 5.target="RFC8029" section="5" sectionFormat="of"/>. The same procedures and recommendations explained in <xreftarget="RFC8029"/> section 5target="RFC8029" section="5" sectionFormat="of"/> should be taken and implemented to mitigate these attack vectors for P2MP policyPingping as well.</t><t>In<!--[rfced] To improve the readability of this quotation, may we format it within a <blockquote>? Original: In addition security considerations of section 8 of<xref target="RFC6425"/>[RFC6425] should be followed, specifically the security recommendations from<xref target="RFC4379"/>[RFC4379] which recommends "To avoid potential Denial-of-Service attacks, it is RECOMMENDED that implementations regulate the LSP ping traffic going to the control plane. A rate limiter SHOULD be applied to thewell-knownwell- known UDP port" allocated for thisservice."</t> </section> <section title="Acknowledgments"> <!-- 9service." Perhaps: In addition, security considerations in Section 8 of [RFC6425] should be followed, specifically the security recommendations from [RFC4379], which recommend the following: | To avoid potential Denial-of-Service attacks, it is | RECOMMENDED that implementations regulate the LSP ping traffic going | to the control plane. A rate limiter SHOULD be applied to the well- | known UDP port [allocated for this service. --><t/><t>In addition, the security considerations in <xref target="RFC6425" section="8" sectionFormat="of"/> should be followed, specifically the security recommendation from <xref target="RFC4379" format="default"/>, which recommends "To avoid potential Denial-of-Service attacks, it is <bcp14>RECOMMENDED</bcp14> that implementations regulate the LSP ping traffic going to the control plane. A rate limiter <bcp14>SHOULD</bcp14> be applied to the well-known UDP port" allocated for this service.</t> </section> </middle> <back><references title="Normative References"> <reference anchor="RFC2119"> <front> <title>S. Brandner, "Key words for use in RFCs to Indicate Requirement Levels"</title> <author> <organization/> </author> <date month="March" year="1997"/> </front> </reference> <reference anchor="RFC8174"> <front> <title>B. Leiba, "ambiguity of Uppercase vs Lowercase in<references> <name>References</name> <references> <name>Normative References</name> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8029.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9524.xml"/> <!-- [RFC9960] draft-ietf-pim-sr-p2mp-policy-22 companion doc RFC2119 Key Words"</title> <author> <organization/> </author> <date month="May" year="2017"/> </front> </reference> <reference anchor="RFC8029"> <front> <title>K. Kompella, G. Swallow, C. Pgnataro, N. kumar, S. Aldrin M. Chen, "Detecting Multiprotocol Label Switched (MPLS) Data-Plane Failures.</title> <author> <organization/> </author> <date month="February" year="2006"/> </front> </reference>9960 in RFC-EDITOR as of 04/14/26 --> <referenceanchor="RFC9524">anchor="RFC9960" target="https://www.rfc-editor.org/info/rfc9960"> <front><title>D. Voyer, C. Filsfils, R. Parekh, H. Bidgoli, Z. Zhang, "Segment<title>Segment RoutingReplication for Multipoint Service Delivery"</title> <author> <organization/>Point-to-Multipoint Policy</title> <author initials="R." surname="Parekh" fullname="Rishabh Parekh" role="editor"> <organization>Arrcus</organization> </author><date month="February" year="2024"/> </front> </reference> <reference anchor="draft-ietf-pim-sr-p2mp-policy"> <front> <title>D. Yoyer, C. Filsfils, R.Prekh, H.bidgoli, Z. Zhang, "draft-ietf-pim-sr-p2mp-policy"</title> <author> <organization/><author initials="D." surname="Voyer" fullname="Daniel Voyer" role="editor"> <organization>Cisco Systems, Inc.</organization> </author><date month="July" year="2025"/> </front> </reference> <reference anchor="RFC6425"> <front> <title>S. Saxena, G. Swallow, Z. Ali, A. Farrel, S. Yasukawa, T.Nadeau "Detecting Data-Plane Failures in Point-to-Multipoint MPLS"</title> <author> <organization/><author initials="C." surname="Filsfils" fullname="Clarence Filsfils"> <organization>Cisco Systems, Inc.</organization> </author><date month="November" year="2011"/> </front> </reference> <reference anchor="RFC3270"> <front> <title>F. Le Faucheur, L. Wu, B. Davie "MPLS Support of Differentiated Services"</title> <author> <organization/><author initials="H." surname="Bidgoli" fullname="Hooman Bidgoli"> <organization>Nokia</organization> </author><date month="May" year="2002"/> </front> </reference> <reference anchor="RFC4379"> <front> <title>K. Kompella, G. Swallow "Detecting MPLS Data Plane Failures"</title> <author> <organization/><author initials="Z." surname="Zhang" fullname="Zhaohui (Jeffrey) Zhang"> <organization>Juniper Networks</organization> </author> <datemonth="February" year="2006"/>month='April' year='2026'/> </front> <seriesInfo name="RFC" value="9960"/> <seriesInfo name="DOI" value="10.17487/RFC9960"/> </reference> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6425.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3270.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4379.xml"/> </references><references title="Informative References"> <!-- 10.2 --><references> <name>Informative References</name> <referenceanchor="IANA-AF">anchor="IANA-AF" target="http://www.iana.org/assignments/address-family-numbers"> <front><title>IANA Assigned Port Numbers, "http://www.iana.org/assignments/address-family-numbers"</title><title>Address Family Numbers</title> <author><organization/><organization>IANA</organization> </author> <date/> </front> </reference> </references></back> </rfc></references> <!--[rfced] Terminology a) Throughout the text, the following terminology appears to be used inconsistently. Please review these occurrences and let us know if/how they may be made consistent. Multicast vs. multicast Ping vs. ping Traceroute vs. traceroute b) FYI - We have updated the following terms to reflect the forms on the right per usage in RFC-to-be 9960. Please review and let us know of any objections. Candidate Path -> candidate path P2MP Tree -> P2MP tree [Note: If any instances of "P2MP tree" should be "P2MP tree instance", please let us know. P2MP Tree Instance -> P2MP tree instance Replication Segment -> Replication segment c) Please let us know if/how we may make these terms consistent. SR P2MP Policy ping vs. P2MP policy ping --> <!--generated[rfced] Abbreviations a) FYI - We have added expansions for the following abbreviations per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each expansion in the document carefully to ensure correctness. Command Line Interface (CLI) Forwarding Equivalence Class (FEC) Label Switching Router (LSR) Segment Routing (SR) b) As recommended in the Web Portion of the Style Guide <https://www.rfc-editor.org/styleguide/part2/#exp_abbrev>, once an abbreviation is introduced, the abbreviated form should be used thereafter. Please consider if you would like to apply this style for the following terms: candidate path (CP) Operations, Administration, and Maintenance (OAM) P2MP tree instance (PTI) Path Computation Element (PCE) c) FYI - In the Introduction, note that we removed the abbreviation "MBB" fromfile C:\Users\hbidgoli\Downloads\draft-ietf-bier-pim-signaling-08.nroff with nroff2xml 0.1.0 by Tomek Mrugalski"Make-Before-Break (MBB)" as this term was only mentioned once. --> <!-- [rfced] Please review the "Inclusive Language" portion of the online Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language> and let us know if any changes are needed. Updates of this nature typically result in more precise language, which is helpful for readers. Note that our script did not flag any words in particular, but this should still be reviewed as a best practice. --> </back> </rfc>