<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-cats-security-considerations-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="CATS Security Considerations">Security Considerations for Computing-Aware Traffic Steering</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-cats-security-considerations-02"/>
    <author initials="C." surname="Wang" fullname="Cuicui Wang">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangcc107@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="April" day="24"/>
    <area>routing</area>
    <workgroup>cats</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 55?>
<t>Computing-Aware Traffic Steering (CATS) inherits potential security vulnerabilities from the network, computing nodes as well as workflows of CATS. This document describes various threats and security concerns related to CATS and existing approaches to solve these threats.</t>
    </abstract>
  </front>
  <middle>
    <?line 58?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The CATS framework is an ingress-based overlay framework for the selection of the suitable service instance(s) from a set of instance candidates. By taking into account both networking and computing metrics, the CATS framework achieve a global of dispatching service demands over the various and available edge computing resources. However, ubiquitous distributed computing resources in CATS also pose challenges to security protection. The operators of CATS may not have complete control over the nodes and therefore guarantee the security and credibility of the computing nodes themselves. Moreover, there are great differences in the security capabilities provided by computing nodes in the network, which greatly improves the breadth and difficulty of security protection.</t>
      <t>This document describes various threats and security concerns related to CATS and existing approaches to solve these threats.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the following terms:</t>
      <t><strong>Computing-Aware Traffic Steering (CATS):</strong>  A traffic engineering approach <xref target="RFC9522"/> that takes into account the dynamic nature of computing resources and network state to optimize service-specific traffic forwarding towards a given service instance. Various relevant metrics may be used to enforce such computing-aware traffic steering policies. <xref target="I-D.ldbc-cats-framework"/></t>
      <t><strong>CATS Service ID (CS-ID):</strong>  An identifier representing a service, which the clients use to access it.</t>
      <t><strong>Service:</strong>  An offering provided by a service provider and which is delivered using one or more  service functions <xref target="RFC7665"/>.</t>
      <t><strong>CATS Service Metric Agent (C-SMA):</strong>  An agent that is responsible for collecting service capabilities and status, and for reporting them to a CATS Path Selector (C-PS).</t>
      <t><strong>Service request:</strong>  The request for a specific service instance.</t>
    </section>
    <section anchor="security-issues-of-the-computing-resources">
      <name>Security Issues of The Computing Resources</name>
      <t>The ubiquitous and flexible characterictics of computing resources and the frequent connections to the computing resources will lead to the following risks:</t>
      <ul spacing="normal">
        <li>
          <t>Unauthorized Access and Control  </t>
          <t>
Attackers may exploit vulnerabilities in interfaces or APIs to gain unauthorized access, potentially hijacking computational resources or manipulating task execution.</t>
        </li>
        <li>
          <t>Data Confidentiality Breaches  </t>
          <t>
Sensitive data processed by computing resources (e.g., model parameters in ML workloads) could be intercepted during transmission or compromised through insecure memory handling.</t>
        </li>
        <li>
          <t>Denial-of-Service (DoS) Threats  </t>
          <t>
Malicious actors may flood computing resources with forged computation requests, degrading service availability or disrupting task scheduling.</t>
        </li>
      </ul>
      <t>To address these risks, CATS implementations COULD adopt the following safeguards:</t>
      <ul spacing="normal">
        <li>
          <t>Secure Communication Frameworks  </t>
          <ul spacing="normal">
            <li>
              <t>TLS 1.3 <xref target="RFC8446"/> could be adopted for all control-plane and data-plane communications.</t>
            </li>
            <li>
              <t>Certificate-based mutual authentication could be implemented using IETF SUIT <xref target="RFC9019"/> for Computing Service to C-SMA interactions.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Granular Access Control  </t>
          <ul spacing="normal">
            <li>
              <t>Role-based access policies (RBAC) aligned with AAA architecture could be used to manage the data processing in computing resources <xref target="RFC2904"/>.</t>
            </li>
            <li>
              <t>Hardware-rooted attestation (e.g., TPM measurements) could be used for runtime authorization decisions.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Resilience Against DoS  </t>
          <ul spacing="normal">
            <li>
              <t>Proof-of-work challenges for request authentication could be deployed as the resilience against DoS during traffic anomalies.</t>
            </li>
            <li>
              <t>Geo-distributed traffic scrubbing could be enabled through collaboration with CDN providers.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Continuous Monitoring  </t>
          <ul spacing="normal">
            <li>
              <t>Nodes could be instrumented with runtime integrity verification using OpenTelemetry standards.</t>
            </li>
            <li>
              <t>Anomaly detection systems leveraging federated learning could be established to identify cross-node attack pattern.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="computing-path-selector-security-issues">
      <name>Computing Path Selector Security Issues</name>
      <t>The Computing Path Selector which is responsible for dynamically selecting optimal forwarding paths, faces the following threats:</t>
      <ul spacing="normal">
        <li>
          <t>Path Manipulation Attacks  </t>
          <t>
Adversaries may forge or alter path metadata (e.g., node capabilities, network latency) to steer computation tasks toward compromised nodes.</t>
        </li>
        <li>
          <t>Covert Channel Exploitation  </t>
          <t>
Path selection patterns could be abused to leak sensitive information through timing analysis or topology fingerprinting.</t>
        </li>
        <li>
          <t>Topology Poisoning  </t>
          <t>
Injection of forged network topology data could degrade path selection efficiency or enable man-in-the-middle (MITM) attacks.</t>
        </li>
        <li>
          <t>Decision Logic Corruption  </t>
          <t>
Runtime modification of C-PS algorithms may lead to suboptimal or adversarial path selections.</t>
        </li>
        <li>
          <t>Orchestrator Impersonation  </t>
          <t>
Spoofed control-plane messages could trick CPS into accepting unauthorized path directives.</t>
        </li>
      </ul>
      <t>To mitigate these risks, CATS implementations COULD implement the following countermeasures:</t>
      <ul spacing="normal">
        <li>
          <t>Authenticated Path Metadata  </t>
          <ul spacing="normal">
            <li>
              <t>Digitally sign topology updates and node capability information could be implemented using CBOR Object Signing and Encryption (COSE) <xref target="RFC9052"/>.</t>
            </li>
            <li>
              <t>Enforce strict schema validation for path attributes per IETF YANG models <xref target="RFC7950"/>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Decision Integrity Protection  </t>
          <ul spacing="normal">
            <li>
              <t>C-PS path selection logic could be isolated in hardware-rooted trusted execution environments (TEEs).</t>
            </li>
            <li>
              <t>Runtime attestation of decision engines could be implemented via Remote Attestation Procedures (RATS) <xref target="RFC9334"/>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Differential Privacy for Path Selection  </t>
          <ul spacing="normal">
            <li>
              <t>Sensitive selection patterns could be Obfuscated by incorporating differentially private noise.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Resilient Topology Discovery  </t>
          <ul spacing="normal">
            <li>
              <t>RPKI <xref target="RFC6480"/> or BGPsec principles <xref target="RFC8205"/> could be adopted for secure topology propagation in multi-domain scenarios.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Control-Plane Hardening  </t>
          <ul spacing="normal">
            <li>
              <t>Mutual authentication could be adopted in communications between C-PS and C-SMA or C-NMA via OAuth 2.1 <xref target="RFC9449"/>.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="computing-service-announcement-security-issues">
      <name>Computing Service Announcement Security Issues</name>
      <t>The announcement of computing services in distributed environments introduces several security risks that must be addressed to ensure system integrity, confidentiality, and availability. This section outlines key threats and proposed countermeasures.</t>
      <ul spacing="normal">
        <li>
          <t>Unauthorized Announcement Injection  </t>
          <t>
Malicious actors may forge or manipulate service announcements to advertise rogue computing nodes, redirect traffic to compromised resources, or disrupt service discovery, which may lead to data exfiltration, computation tampering or denial of service.</t>
        </li>
        <li>
          <t>Sensitive Information Exposure  </t>
          <t>
Service announcements containing unencrypted metadata (e.g., topology details, capability descriptors) may reveal sensitive infrastructure or operational patterns, which may lead to attack surface expansion for targeted exploits or reconnaissance.</t>
        </li>
        <li>
          <t>Replay/Reuse of Legacy Announcements  </t>
          <t>
Replayed announcements of deprecated services could lead to resource misallocation or dependency on outdated/insecure compute nodes.</t>
        </li>
        <li>
          <t>DoS Through Announcement Flooding  </t>
          <t>
Flooding the control plane with excessive or malformed announcements may lead to system resources exhausted.</t>
        </li>
        <li>
          <t>Identity Spoofing  </t>
          <t>
Impersonation of legitimate service providers through forged identity claims in announcements.</t>
        </li>
      </ul>
      <t>To address these risks, CATS implementations COULD adopt the following mitigation measures:</t>
      <ul spacing="normal">
        <li>
          <t>Cryptographic Integrity Protection  </t>
          <ul spacing="normal">
            <li>
              <t>Digital signatures (e.g., using COSE/JOSE) could be adopted for all announcements to ensure authenticity and integrity.</t>
            </li>
            <li>
              <t>Verifiable attestation (via frameworks like RATS) could be used for critical service claims.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Metadata Minimization &amp; Encryption  </t>
          <ul spacing="normal">
            <li>
              <t>Data minimization principles could be applied to limit exposed metadata in announcements.</t>
            </li>
            <li>
              <t>Hybrid encryption (e.g., ECIES) could be used for sensitive fields while maintaining routable/public attributes in cleartext.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Anti-Replay Mechanisms  </t>
          <ul spacing="normal">
            <li>
              <t>Timestamp/nonce could be used in announcements with strict freshness validation.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Rate Limiting &amp; Prioritization  </t>
          <ul spacing="normal">
            <li>
              <t>QoS controls could be applied to prioritize announcements from authenticated entities.</t>
            </li>
            <li>
              <t>Rate limits per node/domain could be adopted using token-bucket or similar algorithms.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Identity Verification  </t>
          <ul spacing="normal">
            <li>
              <t>The announcement from the computing devices could be binded to DIDs (Decentralized Identifiers) or VCs (Verifiable Credentials) for cryptographic identity proof.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="metrics-distribution-security-issues">
      <name>Metrics Distribution Security Issues</name>
      <t>Metrics distribution mechanisms in CATS are critical for performance optimization and resource coordination. However, they introduce specific security challenges that must be mitigated to prevent misuse or systemic compromise. This section identifies key threats and proposes countermeasures.</t>
      <ul spacing="normal">
        <li>
          <t>Tampering with Metric Data  </t>
          <t>
Adversaries may alter metrics (e.g., latency, throughput, resource utilization) during transmission to mislead the decision-making of control plane, triggering suboptimal traffic placement or resource allocation and leading to degraded service performance.</t>
        </li>
        <li>
          <t>Eavesdropping on Sensitive Metrics  </t>
          <t>
Unauthorized interception of metrics may cause the eavesdropping on sensitive operational details (e.g., geo-location patterns, infrastructure capacity), which will lead to the exposure of business-critical intelligence or user behavior profiling.</t>
        </li>
        <li>
          <t>Forged Metric Sources  </t>
          <t>
Spoofing of metric publishers to inject false data or impersonate trusted entities (e.g., fake "low-load" signals to attract traffic).</t>
        </li>
        <li>
          <t>Privacy Violations via Aggregation  </t>
          <t>
The statistical analysis of aggregated metrics may produce inference of sensitive information (e.g., user activity, infrastructure weaknesses) which may result in privacy violation.</t>
        </li>
      </ul>
      <t>To address these risks, CATS implementations COULD adopt the following safeguards:</t>
      <ul spacing="normal">
        <li>
          <t>End-to-End Integrity Protection  </t>
          <ul spacing="normal">
            <li>
              <t>Cryptographic signatures (e.g., using COSE/JOSE) could be applied to metric payloads to ensure authenticity and detect tampering.</t>
            </li>
            <li>
              <t>Hash-chaining or Merkle trees could be used for batch metric verification in streaming scenarios.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Confidentiality Preservation  </t>
          <ul spacing="normal">
            <li>
              <t>Sensitive metric fields could be encrypted (e.g., using AES-GCM or HPKE)while preserving routable headers in cleartext.</t>
            </li>
            <li>
              <t>Differential privacy or noise injection could be employed for aggregated metrics to prevent inference attacks.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Source Authentication  </t>
          <ul spacing="normal">
            <li>
              <t>Metric publishers could be binded to cryptographically verifiable identities (e.g., X.509 certificates, DIDs).</t>
            </li>
            <li>
              <t>Role-based access control (RBAC) could be used for metric publication rights.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Privacy-Aware Metric Design  </t>
          <ul spacing="normal">
            <li>
              <t>The high-granularity data (e.g., masking exact geolocation to regional levels) could be anonymized or truncated to protect the privacy.</t>
            </li>
            <li>
              <t>The federated learning or on-device aggregation could be used to minimize raw data exposure.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="security-related-metrics">
      <name>Security-related Metrics</name>
      <t>The service and network metrics could include the security-related capabilities which could be used by the CATS Path selector to compute paths with security guarantee.</t>
      <t>The security capabilities of nodes could be one of the metrics for C-PS to computing the traffic forwarding path and form a secure routing path. And C-PS will fetch the real-time awareness of the security capabilities available in the network and computing services and finally provide security protection for users. Clients with high security requirements could choose the service with desired security attributes and achieve dependable forwarding on top of only devices that satisfies certain trust requirements, which will avoid the risks of traffic eavesdropping, sensitive data leakage etc.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations of CATS are presented throughout this document. .</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7950.xml">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8205" target="https://www.rfc-editor.org/info/rfc8205" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8205.xml">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC9449" target="https://www.rfc-editor.org/info/rfc9449" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9449.xml">
          <front>
            <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Waite" initials="D." surname="Waite"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9449"/>
          <seriesInfo name="DOI" value="10.17487/RFC9449"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ldbc-cats-framework" target="https://datatracker.ietf.org/doc/html/draft-ldbc-cats-framework-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ldbc-cats-framework.xml">
          <front>
            <title>A Framework for Computing-Aware Traffic Steering (CATS)</title>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Zongpeng Du" initials="Z." surname="Du">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <date day="8" month="February" year="2024"/>
            <abstract>
              <t>This document describes a framework for Computing-Aware Traffic Steering (CATS). Particularly, the document identifies a set of CATS components, describes their interactions, and exemplifies the workflow of the control and data planes.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ldbc-cats-framework-06"/>
        </reference>
        <reference anchor="RFC7665" target="https://www.rfc-editor.org/info/rfc7665" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7665.xml">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC9019" target="https://www.rfc-editor.org/info/rfc9019" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9019.xml">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="B. Moran" initials="B." surname="Moran"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="M. Meriac" initials="M." surname="Meriac"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
              <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9019"/>
          <seriesInfo name="DOI" value="10.17487/RFC9019"/>
        </reference>
        <reference anchor="RFC2904" target="https://www.rfc-editor.org/info/rfc2904" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2904.xml">
          <front>
            <title>AAA Authorization Framework</title>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="L. Gommans" initials="L." surname="Gommans"/>
            <author fullname="G. Gross" initials="G." surname="Gross"/>
            <author fullname="B. de Bruijn" initials="B." surname="de Bruijn"/>
            <author fullname="C. de Laat" initials="C." surname="de Laat"/>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
            <author fullname="D. Spence" initials="D." surname="Spence"/>
            <date month="August" year="2000"/>
            <abstract>
              <t>This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS). It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2904"/>
          <seriesInfo name="DOI" value="10.17487/RFC2904"/>
        </reference>
        <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC9522" target="https://www.rfc-editor.org/info/rfc9522" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9522.xml">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
      </references>
    </references>
    <?line 306?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8VbbXMbN5L+zl+Bc6q2rJSGlhw7iVR7u0dTcqJdy9JaTO5S
KX8AZ0AS0XDAHcxQ5rr8X+633C+7p7uBGQxF+7JVd3X+Is4b0OiXp59uwFmW
jRrblOZcqTuTt7VtdmrqKm8LU+vG4pdauBq31pu2sdUymzzo2qhZrRcLm6u7
xpgat0d6Pq/N9lxNJ7O7z400Klxe6TXmKvB5kz1ojJfrxmc+fJDlgw+yk+cj
N/euNI3x56N2U2j+QX/OR/jSLF29O1e+KUa+na+t9/hstttgiqvL2evRyG7q
c9XUrW+en5ycYTgIr89V7XgxowdX3y9xsTlXJMfo3uxwq8DXVWPqyjTZBUk6
Gum2Wbn6fKSykVK28ljoWP075MelLGna2ry18Z6rl7qy/+Bl4NnKVlr9VNnc
rfHQrLUtzxUtP89PT777t5yet/x4nFd4I4cuztUrY3+zPFzu2qqhlfJIiRS/
jNXrtpPhl1aufs/si3Z3+v23//TUo8rVawy8hQGUevd6+v3pdy/izxcvvg0/
z05ePg8/vzt7eRJfeH7yMr7w4sXZ+WikcAUrVYt01KvsYlwW81x8Y1FjbWSo
ON6333aDnJyehZ/Pz06iGGfffBN/fvvi+zj32cvnz2lCNRqPx6NRlmVKz31T
67wZ/U/erZ6SWx9B5StcN15tXGOqxupSRc9V27as4LdzW9rGGkRN7daqWRkF
LyLpj6HJMIuqXIE3tFcPpiz5L15YlO7BK7fgEBqr2cp6hYBp15hJ4f28tnN8
tdW1da3H0PBkiKKrohcC4ZPDb72qTYnoKFTjJCLpLfPBep5ebza10/kKo+E5
wmtrSFJv4qBjRVYhFa1tUZRmNPqKIqJ2RZuTT6mPX2HKzNKtT3hzhmXyNJ2t
lCXJoLBlbbzP5tpDGLc1dal3yVsELaQjb0ojI2P9fKO1jZ6X9KTe2tyQtzca
i3vqj0S1Go8aej0+QQRXhWWEGKtXO9Xoe1oshHRK5+zGau6aVTQIawJq6c2y
Nk1tc3/MEuytB+qyBnrSalm6OQyPmQvrN7qhCFp2chYIr6rwvFYeJ9qLptJb
hB4vyxRLk8wMJbm2zknyH90D5qmPVTu3f4cW6FtMBMnmLVn0wEdYY7By6R18
E4bMV7osTbUMJo7+Abs3omhyMKPchqDW1Z3fqTXsU7lGrfRWBCTsJb+Cqct+
VcGDsSZc1QZ2NGrZ6loDN00waZiTdVybwnJo7KKF96MB99Zwgy3p4BrDOVYC
j64oJpfkmdDEYoE7VVj1YKJcb/rww0q3SCSFmu8eTRU+7ALzYWXzlUxQ7pRd
07cikUJS0wV8hhZBcwPjS1nDQZ1yLPw/xi0C9Sv1zsBvakPze/UGSabVSyNB
ivxGWAP/fHL9093sybH8VW9v+Pe7y7/9dPXu8oJ+3/04efOm+zEKb9z9ePPT
m4v+V//l9Ob6+vLthXyMu2pwa/TkevILntB6ntzczq5u3k7ePBFLpPoiS2Nt
cwp4ZOBNbUgbGtQhKLKgb15Nb//rP09fqI8f/4Wg//T07NOncEHpCBcPK1PJ
bK6CTeUSutqNoESjaxoFEUI+A6ApEfNAYb9yD5Uij4Miv/6VNPP+XP1xnm9O
X/wp3KAFD25GnQ1uss4e33n0sSjxwK0D03TaHNzf0/RQ3skvg+uo9+TmH/9c
2sqo7PT7P/9pRDA/M/XaVq50y92+L6/1PTyvhbuFEF64EjmLPBOmWoONwP2/
/vp3JtPzr79WagJuJk+BVRBEXoh+rn4Nefs9pkPwNyzAANBJjGIH9oMhKt20
NQt3CCPJF0LEgy8iyMjP3Kaxa/uPLs1kfmNyS/JEuYBsWEXBi3T0y1MKAFGp
HqWmsfo5xDii2Gw1qUwyCqMqfLr1EtqG+E5OWQ6L7ITNNOsrzuyjvjautLkl
XPz48XPc6NMn0b2wb5Hr6gKqvsuuLoKukY4LYi0LCxCvDWLL0yUpPK4lYiED
dGkZQcjgonFkcmWbsZg5zBKHdoTLLG0CvN248W7NZpA5yLVMCU0iN2AS+tbB
FcEI1pRNuk8XbZVLIfJrYH/vSQQV/+0v+5p1riZL8tmn0+zuetIpQPNNdiZL
ZvIbqjcoIRMTyeHPhORJOh/kFIZsuE7rBVroG+jR1fwJJTBWlCD3rUbauGNe
g9cgx+3d0VB1+PbvrfENC0foHK55XKguuuJjP1MUqV2RdeU9PiO/Zx7W+f67
zvcF/BNCwdKXSCy0dHAFYsEwH9ae+y8FEEc9iwk1ImlVJpgG6x4m9f67Bwuc
LZFG40s9bNTW36OcG2WoTqTCQiwWaiKuRhNOhXgQb1eTptH5vaklnMyHTels
84h320pSx0LT5NDk5PaK5VtqPGrTecSlj3s2j0yxsr9hEhJO1sI1FOhevx5y
UFRXmxaZmu2u/T2kgTWYA9BqLnSjSfSFBJxm3vMKKZpyN63lzsDtqNxRBb2K
6CBJ9tlKP+dTM16OjxEYiBi10RT1DSkCK7p+w9VD6XQBagxULIsufeZmQ+mz
aDkyASyVDzWyYncnpoMbBEorVMHLFfkYuZUBciEKoQ4YARliKcsyFdaSuUUW
PfjphUNZNBP2QQu71oRV7GI580oyFSobd5i4PlgECdx92RFb1neMBNimMMta
F2lIBhIdyGRN5LhuN70pPJRctEHoGeKxKKgGCUyJXe5YQtQSu6XUFhodU868
ukBW2HNUrxeG6G0h3nonOkKoral0FplfRyxmRahMzd7cqdPxNwxbVBq/763D
cxhBEKYh4ubZptSAQCab8ItwmafTEMfj0aemJiinJkgor9Zt08JTycHJ64JY
vUfE1XZwSy0SdffT1UwSLYrp98NmT4epREcJSMWtdB4lydQPcCpEQh2DNg3Y
TL1zZZQu5I+YzNTTd68m0yOs3i4rPGZPmEwmYIAoqIhQk4Y74WPmROQBwyXt
J5Ejhd5BF/s1NAfeR8X9CDNSos1q55hcNqgYg9+FOJvdXiMAtG8Diz7aE4SB
H/TDro2KeCIDFMBs3ykHCGwpi0KDE4IfYDsCJshxi/kXFExMSZKCTdKKpILP
GbMwQL8dU2NWRt3PpPuZkshnSqErt4bCTedEPxiXpcVlxz3yup3PBQXDjKai
wrVHCkqWeu6kUyfmm1687RI9T5GxO9iqJUC4dhWSDzcLZfK3XIwliAU52uCg
PF5UMTndUposSFKLqAxx4puNqWaGPLsBXlGGLChO4wonvOQdFBaKNOV3YFZr
j5SE0fSSxlgYbjliXuSpuhqu21MjwvqVOGCgUIDp2nmfUUFJHoScAVxuqGk4
pomRn/soGlKBvbwduiefebmjSvtcJZBezlmhe0IEivgsMCBhrZBqBcCTdLjH
2gW3GdJ42usur0FPkm4ZzCYFVOVBbk0AdEJsxdiFFfMURHU1h2SIIdZMSp+O
O/pNJW6V7464iiWWO8B+AnEfyPYgR3HxznE1peZAo6bIThUS4qVQAf6cxOW1
9C2lYJfE1fQ84gnsjYzRZeOuEUlyBEenCoFbRXAjbzn/N27DFZJa4AlVqZZ5
NMs2i89unfWuCu5+Vf3WN7hCwovq6EZj9YmQkvaMqLZfiqHopDDnzCchSZiY
2SqDbTNp16mn11ez66Pglz7kbgEm9cYtEeBTV3PSFIW9C4EGftGHF3WEQFph
4yWitlmtxfaRyfl2Hr2NHCF6iC73ZJbpb2qiPg03m9TVeoOXQavi/HcbQCFT
gDQNrgHsetlBBLH6ezWFRLECNJL1B5yOJy9sTZNv2V1AAdaw7pJLvt/JAbq7
exHDRSdqXckNEjmTHqIxv8RRiAVaG1Rvl9RjoEBFruvNHbYzpDIdRMtu4Ihf
yODTVzfv1M2cfEvdYfDY07ys8nq3kZQ2vbm7PAoZ/uVzSYMZ3gglKKm1YdK0
1mqL7FDIrAQyrEx4kaQHJG+EKpOGXyZvfxA2Gqqys5cn74d+dtWB9m3XIJOp
2av2HLtkr+xX6p30wZDUV3v5mndzTNFTbsTB1taukobX09nlpT8Kq4yOneZ4
atxGIaXr4A+reGs1MvgakxIWdt/fEuUoyPzgMLwt8GvYdAgaCC1K3h64re1W
54yYKbJ3uugLgS/h1c180Xrxrzn5Ru7qDWdemLtIpiupG4kJG2rQAjMHJKTp
oenC+pwgdBe0dPvXK14EbZe8p3B+9cMt6gAarMotNCJWpu2bz5DYUDV0vg3Q
3oCI8Hpgw3VbNjYrkIpx4XMAV21dxHKJ+VuOeSJnJoJmpq6/TGmjBEL9EpKM
h82DMVVAMCokmb4Suc3e4gfZ9oYiVz0fn4oBX7w4IwN+dYD+TqoKgZ8LIhzM
3zp9Y1BAh7KFa7WUag2c1obNFbzmmZYkG0uMVtKzWMPzZd1c0sRmEmFRoDU9
V6L9pkEBepxuQTDKhE0mHzNT25QcDdQlTtvUZEznGZ8H8Dd+XLmnauhy3ucL
w8gjuoK63/BJNcr1O6eYxhJ+u2X7aAPhWNEeA+F+x2LxUcofuprgOCkb+42b
GBOxB5YmO87M5sPClo0Q3uM9ykIZjQkYBuYqWbYIeGgihKM01K8ScAd3caRM
6QocWjolRYSNZDojwE7V3h7f6lkEHljqaCfpRLrnG1L8ES+shpexkyXMp9ZE
wKXwwjpkb0i6HxGSDukmsF8sgjgm9WV05WMGaTQsLGjNHI3pE4zkqkpbpHdq
ZwlIIefvnr0zob38xiwJNlN/YiYq71HdM9ARY/oG4zJGdiEnQBEFjfYHHfDA
Shd5DpkMRUQhtIrjgBJz8axrhoitTcJAqbiaBYI4cPrX1OsI+BV/h9aYbKEJ
t+H6xnzg2nUbQqAkr3i0tAHnkhjvi1vzYaU5G7JQVxzsMDfzqcg8U7JFiioN
6Ah4WxJrXdHWkd5AUW0cMS+1XTOGDaT73+uwBIpGMg7Y1ZTc3YEMb+B4XyAV
gWQxxeJ9gK5pFpgSWNCzvzAV+mwX5hHkBGjt0k/czuxANtCMn7ksZTI+6CZQ
lula9Kg47b1RQhke9xMQn5Tgyr71zCpnw0Y+qa6BA+vYa/hDQvOCEuiddfpO
ksH7ZW824ANS/uDNhmKT4b2DlANm5s7Jbl5bylw9uRQVX06vLg8uqseXhTVl
4Qk+uGKxHabRURzS3LNNizI7T+kmpXUqyBvzoWE9TGCETCAAOslR/lm/9iLc
DDzPExA/qxyfBhgIs78iCcBAfhfwllVFHtzzX0ElCpI3pCOS9A/E5qgUCsqV
ef8GJAixfVjHm/jRPrDLMYZB9cDRFvszYX62kXBvwp9ngUU98mLx88bdmyqb
t/k9nY6ABfA1tef6Km4IFT8nHZWgyH06051k6TNuYVKAhRBzWxWy3IurC4Qe
ygB8Ch7DtOCq23dC+oFQP0/xShI0U6Ru4Sl0uoODIY36DoU21DJjjnYdNtYu
IqMib3zEzOJbRfrWunOc/twEYXyMPy58TM0pmhwp7BFKPFH0d3kkd456LOIv
/cEN2mbuGV26jxN3+5PDGSmti2VqcBuMRluI1nNOrAP6c5kUSc0eg+v29z7L
4fxBDjfr+AuHRdhBuwgV7H73R5o+cWszQEDo6RzHDAJHOe41Bc2XQYVHB7cj
qLVrveQ56u2GAi1byyEeZtRJ/jymbsByKTInnYjI/PBS5OJ1L0WS9EklNJuE
TGy3FH1G7B2ANXSpt8YX0OFG9ikTNhecjDQ14MLdDkzIu+lecK55VxUrNfsD
95CZErBA6qK2l8Zl3Vp6crZH4ogAUs46irTt0VacCeyT5JsTgNBhrS4SaAVl
aZfcVoYiIXMNP13praUYqcExur2h10IYguvcCT/pejvBhqICxUjvV8w3HGbh
9sUCwR+a+hjcdqzF9AV/AMeohIVGOn0C/pDR5tcTSf2lD5yUdimiPxyxiLEW
/9m6MvARStCT5bI2yw4ACf44gXtRQt/3WygdXpVc2VlzEyId6pezSUL+DzUV
O05CW+HUouLCbM9uD0bfkyUM0LDn23BjVNGEWZuwkG1cyP/ZRtdlVWSNy/Dn
S/2cAVj/UwSsz5LRNfSOdzK/xL6kld8XXZGdaL/KAK1CK+BD16a+L8l9TJqp
Om4yp6N7cd7BxgL1KPCV5r7vo27FYFP3lg5R1NskffbAEIYOzCfZSIkl3EA/
k8u77IfpNQn+4+1fL4+EKW1k/JQoqRUCOGz+pvRIWHDSe4pu4mrpBoVIG3RQ
zDrsIzEHfuzeSSLqvTvtK0ukp03QThPXj6L9AF0YZHruYG17XhASfxLz/zF+
eXKm8n7vEy5OjKNr+D3acIx5I+w3PvaDFJSCAyC3rBqfgkY4yxQzoyEv7+nS
Cu9ny7ATyvV2UpivteccZj4QIgG5O+DmmnQpAE+7UWW60ahBY3drziRUR9eg
Yz01cBIBKxONPO6FObCZRdV8lQlp66w88INuf1WKB8CHfohdD0kR4/TMSRbP
KXbJj2Gz61/0mxvRkWQmFCNlWwwPiHZjDc7aCO4N5Zvv+pO5yR4Pb8h0NTrv
dwV6HwlXdzJ1HAU9dGQUoF0NtyT5PJKcdYvr4P1xaip2U8YC/8CJMemfy0kh
ObHM7YTwvw/48RhFTSEjcnZemCacvwIAlZl0r8n3uD6Jp6MPyt+fLh4ecN07
5dx1R1gw0FdpG3MH4NCpVl4yJSw/VtNwJozVS16ftCnTU6eiwXzlnI/GFtfg
D6FjW5vk+GtS83GPMpy1lraMDlueUakcOBtSBR/tjKUIM2lPeZv5L0EElUlM
HgbCDciQ3jorlFParKTgeCIxZWbHST7nsKCNQzqJAHMNImP/P8/ISfm40k/7
/jd8OR7CJqgJx/P6HXc4zfCw7FiN+SDY1eTt5PC0FuTl0/4xzpX28HP5KjnJ
kWXIiPk9DTjJ7yv3UNIZdWm8fTyv2vWcDur96xPmaU9o1FcXI/73380deJdE
NAAA

-->

</rfc>
