IDR Working Group G. Van de Velde, Ed. Internet-Draft W. Henderickx Intended status: Standards TrackAlcatel-LucentNokia Expires:September 18, 2016January 9, 2017 K. Patel A. Sreekantiah Cisco SystemsMarch 17,Z. Li S. Zhuang N. Wu Huawei Technologies July 8, 2016 Flowspec Indirection-id Redirectdraft-vandevelde-idr-flowspec-path-redirect-02draft-vandevelde-idr-flowspec-path-redirect-03 AbstractFlow-specFlowspec is an extension to BGP that allows for the dissemination of traffic flow specification rules. This has many possible applications but the primary one for many network operators is the distribution of traffic filtering actions for DDoS mitigation. The flow-spec standard RFC5575 [2] defines a redirect-to-VRF action for policy-based forwarding but this mechanism is not always sufficient,particularparticularly if the redirected traffic needs to be steered into an engineered path or into a service plane. This document defines a newredirect-to-INDIRECTION_ID (32-bit or 128-bit) flow-specextended community known as redirect-to- indirection-id (32-bit) flowspec action to provide advanced redirectioncapabilities.capabilities on flowspec clients. When activated, the flowspecIndirection-idextended community is used by a flowspec client toidentifyfind the correct next-hopredirect informationentry within arouter locallized Indirection-idlocalised indirection-id mapping table.ThisThe functionality present in this draft allows aflowspecnetwork controller tosignal redirection towards a next-hop IP address, a shortest path tunnel, a traffic engineered tunnel or a next-next-hop engineered tunnel interface.decouple flowspec functionality from the creation and maintainance of the network's service plane itself including the setup of tunnels and other service constructs that could be managed by other network devices. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [1]. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onSeptember 18, 2016.January 9, 2017. Copyright Notice Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . .23 2.INDIRECTION_IDindirection-id andINDIRECTION_ID Tableindirection-id table . . . . . . . . . . . 3 3. Use Case Scenarios . . . . . . . . . . . . . . . . . . . . . 4 3.1. Redirection shortest Path tunnel . . . . . . . . . . . . 4 3.2. Redirection to path-engineered tunnels . . . . . . . . . 4 3.3. Redirection to Next-next-hop tunnels . . . . . . . . . . 5 4. Redirect toINDIRECTION-ID Communitiesindirection-id Community . . . . . . . . . . . . 6 5. Redirect usinglocallized INDIRECTION_ID Router Mappinglocalised indirection-id mapping table . . .7. 8 6. Validation Procedures . . . . . . . . . . . . . . . . . . . . 8 7. Security Considerations . . . . . . . . . . . . . . . . . . . 8 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . .89 10. References . . . . . . . . . . . . . . . . . . . . . . . . .89 10.1. Normative References . . . . . . . . . . . . . . . . . .910 10.2. Informative References . . . . . . . . . . . . . . . . .910 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .910 1. IntroductionFlow-specFlowspec RFC5575 [2] is an extension to BGP that allows for the dissemination of traffic flow specification rules. This has many possibleapplications butapplications, however the primary one for many network operators is the distribution of traffic filtering actions for DDoS mitigation. Everyflow-specflowspec policy route is effectively a rule, consisting of a matching part (encoded in the NLRI field) and an action part (encoded in one or more BGP extendedcommunity).communities). The flow-spec standard RFC5575 [2] defines widely-used filter actions such as discard and rate limit; it also defines a redirect-to-VRF action for policy-based forwarding. Using the redirect-to-VRF actionfor redirectingto steer traffic towards an alternate destination is useful for DDoS mitigation but using this technology can be cumbersome when there is need toredirectsteer the traffic onto an engineered traffic path. This draft proposes a newredirect-to-Indirection-id flow-specredirect-to-indirection-id flowspec action facilitating an anchor point for policy-based forwarding onto an engineered path or into a service plane. Therouterflowspec client consuming and utilizing the new flowspecrule makesindirection-id extended- community finds the redirection information within alocallocalised indirection-id mappingbetweentable. The localised mapping table is a table construct providing at one side theflowspec signalled redirect Indirection-idtable key andlocally available redirection information referenced byat theIndirection-id. This locally available redirection information is derived from out-of-band programming or signalling.other side next-hop information. The table key consists out the combination of indirection-id type and indirection-id 32-bit value. Theredirect-to-Indirection-idredirect-to-indirection-id flowspec action is encoded in a newly defined BGP extendedIndirection_IDcommunity.The constructionIn addition, the type of redirection can be configured as an extended community indirection-id type field. This draft defines theIndirection-id redirect tableindirection-id extended-community and thetechnology usedwellknown indirection-id types. The specific solution tocreate an engineered pathconstruct the localised indirection-id mapping table are out-of-scope of this document. 2.INDIRECTION_IDindirection-id andINDIRECTION_ID Tableindirection-id table AnINDIRECTION_IDindirection-id is an abstract number (32-bitor 128-bitvalue) used as identifier for a localisedredirectionindirection decision.e.g. WhenThe indirection-id will allow aBGPflowspeccontroller intendsclient to redirect traffic into aflow using te redirect- to-INDIRECTION_ID action then it has the ability to redirect the flow toservice plane or onto an engineered traffic path. e.g. When adestination abstracted as the INDIRECTION_ID. The device receiving theBGP flowspecrule will usecontroller signals a flowspec client theINDIRECTION_ID to identifyindirection-id extended community, then thenext-hop andflowspec client uses therelevant tunnel encapsulations that needindirection-id tobe pushed bymake alocalisedrecursive lookupusingto retrieve next-hop informationlocated within the INDIRECTION_IDfound in a localised indirection mapping table. TheINDIRECTION_ID Tableindirection-id table is a router localised table. The indirection-id tablecontentis constructed out ofINDIRECTION_IDs and corresponding redirect information which may be of rescursive or non-recursive nature. When the redirect informationtable keys mapped to flowspec client localised redirection information. The table key isnon-recursive, thencreated by therepresented information MUST be sufficient to identifycombination of thelocal egress interfaceindirection-id type and thecorresponding required encapsulations. However, if the information is recursive, thenindirection-id 32-bit value. Each entry in therepresented information MUST beindirection-table key maps to sufficient information (parameters regarding encapsulation, interface, QoS, etc...) toidentify the local egress interface and corresponding encapsulations using additional recursions.successfully redirect traffic. 3. Use Case Scenarios This section describes use-case scenarios when deploying redirect-to-INDIRECTION_ID.indirection-id. 3.1. Redirection shortest Path tunnel A first use-case is allowing a BGP Flowspec controller to send a single flowspec policymessage (redirect-to-INDIRECTION_ID#1)route (i.e. flowspec_route#1) to many BGP flowspecconsuming routers.clients. Thismessage is instructingflowspec route signals the Flowspecrecipient routersclients to redirect traffic onto a tunneltotowards a single IP destination address. For this first use-case scenario,eachthe flowspecrecipient router has a tunnel configured followingclient receives from theshortest path towards a tunnel IP destination address. Each tunnel can have its own unique encapsulation associated. Each tunnel is associated with an INDIRECTION_ID, and for this example it is on all recipient routers INDIRECTION_ID#1. Both manual and orchestrated tunnel provisioning is supported, however for large scale deployment automation is advisable. When using this setup, a BGPflowspec controllercan sendasingle BGP Flowspec NLRI with redirect-to-INDIRECTION_ID#1. This BGP Flowspec NLRI is received by all recipient routers. Each offlowspec route (i.e. flowspec_route#1) including therecipient routers performs a locallised recursive lookup for INDIRECTION_ID#1 inredirect-to-indirection-id extended community. The redirect-to-indirection-id extended community contains theINDIRECTION_ID Table and identifieskey (indirection-id type + indirection-id 32-bit value) to select the correspondinglocallisednext-hop information from the flowpsec client localised indirection-id table. The resulting next-hop information for this use-case is a remote tunnelredirect information. This locallisedend-point IP address with accordingly sufficient tunnel encapsulation informationis now usedto forward the packet accordingly. For redirecttraffic matchingto shortest path tunnel it is required that theFlowspec policy towards a tunnel, each potentially using its own uniquetunnelencapsulation.MUST be operational and allow packets to be exchanged between tunnel head- and tail-end. 3.2. Redirection to path-engineered tunnelsA second use-case is allowing a BGP Flowspec controller sendFor asingle flowspec policy message (redirect-to-INDIRECTION_ID#2) to many BGP flowspec consuming routers. This messagesecond use-case, it isinstructingexpected that theFlowspec recipient routers toflowspec client redirect traffic matches the flowspec rule, onto a path engineered tunnel.For this use-case scenario, each flowspec recipient router has aThe path engineered tunnelconfigured.on the flowspec client SHOULD be created by out-of-band mechanisms. Eachtunnel can have its own unique encapsulation and engineeredpathassociated. Eachengineered tunnelis associated with an INDIRECTION_ID, anddeployed forthis example it is on all recipient routers INDIRECTION_ID#2. Both manualflowspec redirection, has a unque key as an identifier. consequently, the key (=indirection-id type andorchestratedindirection-id 32-bit value) uniquely identifies a single path engineered tunnelprovisioning is supported, however for large scale deployment automationon the flowspec client. The localised indirection-id mapping table isadvisable. A first example usingthe collection of all keys corresponding all path engineered tunnels on the flowspec client. For thissetup, is when a BGPsecond use-case scenario, the flowspec controller sends asingle BGP Flowspec NLRI with redirect-to-INDIRECTION_ID#2. This BGP Flowspec NLRI is received by all recipient routers. Each offlowspec route (i.e. flowspec_route#2) to therecipient routers performs a locallised recursive lookup for INDIRECTION_ID#2 inflowspec clients. The flowspec clients, respectively receive the flowspec route. The redirect-to-indirection-id extended community contains theINDIRECTION_ID Table and identifieskey (indirection type + indirection-id 32-bit value) to select the correspondinglocallisednext-hop information from the flowpsec client localised indirection-id table. The resulting next-hop information for this use-case is path engineered tunnelredirect information. This locallisedinformation and has sufficient tunnel encapsulation informationis now usedtoredirect traffic matchingforward theFlowspec policy towards a path engineered tunnel.packet according the expectations of the flowspec controller. Asecondconcrete example of this use-case can be found in segment routed networks where path engineered tunnels can be setup by means of a controller signaling explicit paths to peering routers. In such a case, theINDIRECTION_IDindirection-id references to a Segment Routing BindingSID.SID, while the indirection-id type references the Bindging SID semantic. The Binding SID is a segment identifier value (as per segment routing definitions in [I-D.draft-ietf-spring-segment-routing] [6]) used to associate withaan explicit path and can be setup by a controller using BGP as specified in [I-D.sreekantiah-idr-segment-routing-te] [5] or using PCE as detailed in draft-ietf-pce-segment-routing [7]. When a BGP speaker receives a flow-spec route with a 'redirect to Binding SID' extended community, it installs a traffic filtering rule that matches the packets described by the NLRI field and redirects them to the explicit path associated with the Binding SID. The explicit path is specified as a set/stack of segment identifiers as detailed in the previous documents. The stack of segment identifiers is now imposed on packets matching the flow-spec rule to perform redirection as per the explicit path setup prior. The encoding of the Binding SID value is specified in section 4, with theindirectionindirection-id field now encoding the associated value for the binding SID. 3.3. Redirection to Next-next-hop tunnels A Third use-case isallowingwhen a BGP Flowspec controllersendsends a single flowspec policymessage (redirect-to-INDIRECTION_ID#3)route tomany BGPflowpsec clients to signal redirection towards next-next-hop tunnels. In this use-case The flowspecconsuming routers. This messagerule is instructing the Flowspecrecipient routersclient to redirect trafficonto a shortest or engineered path tousing atunnel end-point and onwards to the next-hop-interface on this end-point. This typesequence oftunnel is used for example for Segment Routing Central Egress Path Engineering [4]. For this use-case scenario, each flowspec recipient router constructs redirect information using two tunnel components.indirection-id extended communities. Thefirst componentsequence of indirection- ids is managed using Tunnel IDs (TID). i.e. ashortest or engineered path towards a network egress router. The second component is the interface used on this network egress router to which the redirected traffic needs toclassic example would besteered upon. The combination of these two components allows steeringDDoS mitigation towardsthe next-hop of the egress router, allowing for example theSegment Routing Central Egress Path Engineeringusing BGP Flowspec[4].The redirection towards a next-next-hop tunnel can be done by using either a single INDIRECTION_ID representing the combined path to the egress router and steering theTo steer DDoS trafficto the egress interface, or by using individual INDIRECTION_IDs each representing a tunnel component (One INDIRECTION_ID value to identify the pathtowardsthe egress router and another INDIRECTION_ID value to identify theegressinterface on this egress router towards the next-next-hop). When using individual INDIRECTION_IDs it is required to use INDIRECTION_ID community Tunnel IDs (TID) each identifying a component of the complete redirect path attached to the NLRI. i.e. when using next-next-hop tunnels,peer engineering paths, aBGP flowspec controller can sendfirst indirection-id will steer traffic onto asingle BGP Flowspec NLRI with redirect-to-INDIRECTION_ID#3. This BGP Flowspec NLRItunnel to an egress router, while a second indirection-id isreceived by all recipient routers. Each ofused steer therecipient routers performstraffic at this egress router onto alocallised recursive lookupparticular interface or towards a peer. The flowspec client will forINDIRECTION_ID#3 in the INDIRECTION_ID Table and identifies the corresponding locallised tunnel redirect information (=paththis use-case dynamically append all segment routing segments to steer theegress router andDDoS traffic through thenext-hop egress interface onEPE path. To achieve thisrouter). Traffic matchingtype of redirection to next-next-hop tunnels, multiple indirection-ids, each using a unique Tunnel ID are imposed upon a the flowspec policyis redirected towardsrule. The Tunnel ID will allow therecursively found redirection information.flowspec client to sequence the indirection-ids for correct next- next-hop tunnel constructs. 4. Redirect toINDIRECTION-ID Communitiesindirection-id Community This document defines a new BGP extended community known as a Redirect-to-indirection-id extended community.TheThis extendedcommunities have a type indicating they are transitive and IPv4- address-specific or IPv6-address-specific, depending on whether the INDIRECTION_IDcommunity is32-bit or 128-bit. The sub-type value [to be assigned by IANA] indicates that the global administrator and local administrator fields encodeaflow-spec 'redirect to INDIRECTION_ID' action. In thenew transitive extended community with the4-byte or 16-byte global administrator field encodes the 32-bit or 128-bit INDIRECTION_ID's providing the INDIRECTION_ID to allow a local toType and therouter mapping referenceSub-Type field toan engineered Path.be assigned by IANA. The2-byte local administrator fieldformat of this extended community isformatted as shownshow in Figure 1. 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type |Reserved |B|TID|C| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Sub-Type | Flags(1 octet)| Indirection ID| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Generalized indirection_id | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1In the local administrator fieldThe meaning of the extended community fields are as follows: Type: 1 octet to be assigned by IANA. Sub-Type: 1 octet to be assigned by IANA. Flags: 1 octet field. Following Flags are defined. 0 1 0 1 2 3 4 5 6 7 +-+-+-+-+-+-+-+-+ | RES | TID |C| +-+-+-+-+-+-+-+-+ Figure 2 The least-significant Flag bit is defined as the 'C' (or copy) bit. When the 'C' bit is set the redirection applies to copies of the matching packets and not to the original traffic stream. The 'TID' field identifies a24 bit Table-id field. This field is used to provide therouter consuming theflowspecruleclient an indication how and where touse the INDIRECTION_ID when redirecting traffic. Bit 2 is defined to be the 'B' (Binding) bit. When the 'B' bit is set,sequence the received indirection-ids to redirecting traffic. TID valueencoded in the global administrator0 indicates that Table-id field isa Binding Segment Identifier value the use of which is detailed in section 3.2.NOT set and SHOULD be ignored. All bits other than the'C', 'TID''C' and'B''TID' bitsin the local administrator fieldMUST be set to 0 by the originating BGP speaker and ignored by receiving BGP speakers. Indirection ID: 1 octet value. This draft defines following indirection_id Types: 0 - Localised ID 1 - Node ID 2 - Agency ID 3 - AS (Autonomous System) ID 4 - Anycast ID 5 - Multicast ID 6 - Tunnel ID (Tunnel Binding ID ) 7 - VPN ID 8 - OAM ID 9 - ECMP (Equal Cost Multi-Path) ID 10 - QoS ID 11 - Bandwidth-Guarantee ID 12 - Security ID 13 - Multi-Topology ID 5. Redirect usinglocallized INDIRECTION_ID Router Mappinglocalised indirection-id mapping table When a BGP speaker receives aflow-specflowspec policy route with a 'redirect toINDIRECTION_ID'indirection-id' extended community and this route represents the one and only bestpath,path or an equal cost multipath, it installs a traffic filtering rule that matches the packets described by the NLRI field and redirects them (C=0) or copies them (C=1) towards theINDIRECTION_IDindirection-id local recursedPath. The BGP speaker is expected to do a local INDIRECTION_ID Table lookup to identifypath. To construct theredirection information. The routerlocalINDIRECTION_ID table contains a list of INDIRECTION_ID's each mapped to redirect information. The redirect information can be non-recursive (i.e. there is only one option available in the INDIRECTION_ID Table) or recursive (i.e. L3 VPN, L2 VPN, a pre-programmed routing topology, etc... ). o When the redirect information is non-recursive then the packet is redirected based upon the information found in the Table. o In case of a next-hop tunnel, the traffic matchingrecursed path, the flowspecrule is redirected to the next-hop tunnel. This tunnel could be instantiated through various means (i.e. manual configuration, PCEP, RSVP-TE, WAN Controller, Segment Routing, etc...). o In case of redirection toclient does a localnext-hop interface, the traffic matching the flowspec rule is redirected to the local next-hop interface. o In case the INDIRECTION_ID Tableindirection-id mapping table lookupresults in redirect information identifying an additional layerusing the key comprised ofrecursion, then this will triggertheflowindirection-id 32-bit value and indirection-id type tobe redirected based upon an additional routing lookup withinretrieve therealm of the additional layer of recursion.correct redirection information. 6. Validation Procedures The validation check described in RFC5575 [2] and revised in [3] SHOULD be applied by default to received flow-spec routes with a 'redirect toINDIRECTION_ID'indirection-id' extended community. This means that a flow-spec route with a destination prefix subcomponent SHOULD NOT be accepted from an EBGP peer unless that peer also advertised the best path for the matching unicast route. It is possible from a semenatics perspective to have multiple redirect actions defined within a single flowspec rule. When a BGP flowspec NLRI has a 'redirect toINDIRECTION_ID'indirection-id' extended community attached resulting in valid redirection then it MUST take priority above all other redirect actions emposed. However, if the 'redirect toINDIRECTION_ID'indirection-id' does not result in a valid redirection, then the flowspec rule must be processed as if the 'redirect toINDIRECTION_ID'indirection- id' community was not attached to the flowspec route and MUST provide an indication within the BGP routing table that the respective 'redirect toINDIRECTION_ID'indirection-id' resulted in an invalid redirection action. 7. Security Considerations A system using'redirect-to-INDIRECTION_ID''redirect-to-indirection-id' extended community can cause during the redirect mitigation of a DDoS attack result inanoverflow of trafficbeingreceived by the mitigation infrastructure. 8. Acknowledgements This document received valuable comments and input from IDR working group including Adam Simpson, Mustapha Aissaoui, Jan Mertens, Robert Raszuk, Jeff Haas, Susan Hares and Lucy Yong 9. IANA Considerations This document requests a new type and sub-type for the Redirect to indirection-id Extended community from the "TransitiveIPv4- Address-Specific" extended communityExtended community" registry. Thesub-typeType name shall be "Redirect to indirection-id Extended Community" and the Sub-type name shall be 'Flow-spec Redirect to 32-bit Path-id'.ThisIn addition, this document requests IANA to create a newsub-type from the "Transitive IPv6- Address-Specific" extended community registry. The sub-type name shall be 'Flow-specregistry for Redirect to128-bit Path-id'.indirection-id Extended Community INDIRECTION-IDs as follows: Under "Transitive Extended Community:" Registry: "Redirect Extended Community indirection_id" Reference: [RFC-To-Be] Registration Procedure(s): First Come, First Served Registry: "Redirect Extended Community indirection_id" Value Code Reference 0 Localised ID [RFC-To-Be] 1 Node ID [RFC-To-Be] 2 Agency ID [RFC-To-Be] 3 AS (Autonomous System) ID [RFC-To-Be] 4 Anycast ID [RFC-To-Be] 5 Multicast ID [RFC-To-Be] 6 Tunnel ID (Tunnel Binding ID ) [RFC-To-Be] 7 VPN ID [RFC-To-Be] 8 OAM ID [RFC-To-Be] 9 ECMP (Equal Cost Multi-Path) ID [RFC-To-Be] 10 QoS ID [RFC-To-Be] 11 Bandwidth-Guarantee ID [RFC-To-Be] 12 Security ID [RFC-To-Be] 13 Multi-Topology ID [RFC-To-Be] Figure 3 10. References 10.1. Normative References [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997, <http://xml.resource.org/public/rfc/html/rfc2119.html>. [2] Marques, P., Sheth, N., Raszuk, R., Greene, B., Mauch, J., and D. McPherson, "Dissemination of Flow Specification Rules", RFC 5575, DOI 10.17487/RFC5575, August 2009, <http://www.rfc-editor.org/info/rfc5575>. 10.2. Informative References [3] Uttaro, J., Filsfils, C., Alcaide, J., and P. Mohapatra, "Revised Validation Procedure for BGP Flow Specifications", January 2014. [4] Filsfils, C., Previdi, S., Aries, E., Ginsburg, D., and D. Afanasiev, "Segment Routing Centralized Egress Peer Engineering", October 2015. [5] Sreekantiah, A., Filsfils, C., Previdi, S., Sivabalan, S., Mattes, P., and S. Lin, "Segment Routing Traffic Engineering Policy using BGP", October 2015. [6] Filsfils, C., Previdi, S., Decraene, B., Litkowski, S., Shakir, R., Bashandy, A., Horneffer, M., Henderickx, W., Tantsura, J., Crabbe, E., Milojevic, I., and S. Ytti, "Segment Routing Architecture", December 2015. [7] Sivabalan, S., Medved, M., Filsfils, C., Litkowski, S., Raszuk, R., Bashandy, A., Lopez, V., Tantsura, J., Henderickx, W., Hardwick, J., Milojevic, I., and S. Ytti, "PCEP Extensions for Segment Routing", December 2015. Authors' Addresses Gunter Van de Velde (editor)Alcatel-LucentNokia Antwerp BE Email:gunter.van_de_velde@alcatel-lucent.comgunter.van_de_velde@nokia.com Wim HenderickxAlcatel-LucentNokia Antwerp BE Email:wim.henderickx@alcatel-lucent.comwim.henderickx@nokia.com Keyur Patel Cisco Systems 170 W. Tasman Drive San Jose, CA 95134 USA Email: keyupate@cisco.com Arjun Sreekantiah Cisco Systems 170 W. Tasman Drive San Jose, CA 95134 USA Email: asreekan@cisco.com Zhenbin Li Huawei Technologies Huawei Bld., No. 156 Beiquing Rd Beijing 100095 China Email: lizhenbin@huawei.com Shunwan Zhuang Huawei Technologies Huawei Bld., No. 156 Beiquing Rd Beijing 100095 China Email: zhuangshunwan@huawei.com Nan Wu Huawei Technologies Huawei Bld., No. 156 Beiquing Rd Beijing 100095 China Email: eric.wu@huawei.com