<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="no"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="std" docName="draft-ietf-rift-kv-tie-structure-and-processing-07" ipr="trust200902" obsoletes="" submissionType="IETF" updates="" xml:lang="en" tocInclude="true" tocDepth="3" symRefs="true" sortRefs="true" version="3">
  <front>
    <title abbrev="draft-ietf-rift-kv-tie-structure-and-processing-07">
      Routing in Fat Trees (RIFT) Key/Value Topology Information Elements Structure and Processing
</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rift-kv-tie-structure-and-processing-07"/>
    <author role="editor" fullname="Jordan Head" initials="J." surname="Head">
      <organization>HPE</organization>
      <address>
        <postal>
          <street>1701 East Mossy Oaks Road
          </street>
          <city>Spring</city>
          <region>TX
          </region>
          <code>77389
          </code>
          <country>USA
          </country>
        </postal>
        <phone/>
        <email>jordan.head@hpe.com
        </email>
        <uri/>
      </address>
    </author>
    <author fullname="Tony Przygienda" initials="T." surname="Przygienda">
      <organization>HPE</organization>
      <address>
        <postal>
          <street>1701 East Mossy Oaks Road
          </street>
          <city>Spring</city>
          <region>TX
          </region>
          <code>77389
          </code>
          <country>USA
          </country>
        </postal>
        <phone/>
        <email>antoni.przygienda@hpe.com
        </email>
        <uri/>
      </address>
    </author>
    <date year="2025"/>
    <area>Routing Area</area>
    <workgroup>RIFT</workgroup>
    <keyword>rift</keyword>
    <keyword>kv</keyword>
    <abstract>
      <t>The RIFT (Routing in Fat Trees) protocol allows for key/value
            pairs to be advertised within Key-Value Topology Information Elements
            (KV TIEs). The data contained within these KV TIEs can be
            used for any imaginable purpose.
      </t>
      <t>This document specifies behavior for the
            various Key-Types (i.e., Well-Known, OUI, and Experimental) and a
            method to structure corresponding values. It also defines a Well-Known
      Key Sub-Type used for testing tie-breaking behavior.</t>
    </abstract>
    <note>
      <name>Requirements Language</name>
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
        NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
        "MAY", and "OPTIONAL" in this document are to be interpreted as
        described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
        appear in all capitals, as shown here.
      </t>
    </note>
  </front>
  <middle>
    <section toc="default" numbered="true">
      <name>Introduction</name>
      <t>The Routing in Fat Trees <xref target="RFC9692" format="default"/> protocol
        allows for key/value pairs to be advertised within Key-Value Topology
        Information Elements (KV TIEs). There are no restrictions
        placed on the data that is contained in KV TIEs nor what the
        data is used for.
      </t>
      <t>For example, it might be beneficial to advertise overlay protocol state
        from leaf nodes to the Top-of-Fabric (ToF) nodes. This would make it possible to view critical
        state of a fabric-wide service from a single ToF node rather than
        retrieving and reconciling the same state from multiple leaf nodes.
      </t>
    </section>
    <section anchor="generic_kv_structure" numbered="true" toc="default">
      <name>Key-Value Structure</name>
      <t>This section describes the generic key structure and semantics,
        <xref target="f1" format="default"/> further illustrates these components.</t>
      <t><xref target="RFC9692" section="6.1" sectionFormat="of"/> specifies the use of <xref target="THRIFT">Thrift</xref> to define the protocol's packet structure.
          While no explicit restrictions are placed on Key-Value data or what it is used for, it
        is RECOMMENDED that a serialized Thrift model also be used to define KV TIE structure for simpler interoperability. <xref target="RIFT-AUTO-EVPN" format="default"/> is an example of
        this type of implementation.</t>
      <figure anchor="f1">
        <name>Generic Key-Value Structure</name>
        <artwork align="center" alt="" name="" type=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Key Type    |               Key Identifier                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Values (variable)                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

    ]]></artwork>
      </figure>
      <t><strong>where:</strong></t>
      <ul empty="true" spacing="normal">
        <li>
          <dl newline="true" spacing="normal">
            <dt><strong>Key Type:</strong></dt>
            <dd>
              <t>A 1-byte value that identifies the Key Type. Key Type values are taken from the RIFTCommonKVTypes Registry defined in <xref target="RFC9692"/>.</t>
              <t>The range of valid values is 1 - 255 (2^8-1).</t>
              <t>0 is an illegal value and MUST NOT be allocated to or used by any
                  implementation. KV TIEs received with this value MUST be discarded and logged at least once.</t>
            </dd>
            <dt><strong>Key Identifier:</strong></dt>
            <dd>
              <t>A 3-byte value that identifies the specific key and describes the semantics of any contained values.
              It SHOULD be unique within the context of the given Key Type.</t>
              <t>The range of valid values is 1 - 16777215 (2^24-1).</t>
              <t>0 is an illegal value and MUST NOT be allocated to or used by any
                    implementation. KV TIEs received with this value MUST be discarded and logged at least once.</t>
            </dd>
            <dt><strong>Values:</strong></dt>
            <dd>A variable length value that contains data associated with the
              Key Identifier. It SHOULD contain 1 or more elements. The semantics
              (i.e., existence, order, duplication, etc.) of any contained values is governed by the
              particular key's specification.</dd>
          </dl>
        </li>
      </ul>
      <section>
        <name>Key Sub-Type</name>
        <t>The Key Sub-Type is a mechanism to further describe
          the key's semantics. This is illustrated by <xref target="f5" format="default"/>.
          The Key Sub-Type MUST be used when the Key Type is either Well-Known or Experimental
          in order to avoid interoperability issues, but is OPTIONAL for other Key Types.</t>
        <figure anchor="f5">
          <name>Generic Key-Value Structure with Key Sub-Type</name>
          <artwork align="center" alt="" name="" type=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Key Type    |  Key Sub-Type |      Key Sub-Identifier       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Values (variable)                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

        ]]></artwork>
        </figure>
        <t><strong>where:</strong></t>
        <ul empty="true" spacing="normal">
          <li>
            <dl newline="true" spacing="normal">
              <dt><strong>Key Sub-Type:</strong></dt>
              <dd>
                <t>A 1-byte value that identifies the Key Sub-Type which describes
              the key and its semantics.</t>
                <t>The range of valid values is 1 - 255 (2^8-1).</t>
                <t>0 is an illegal value and MUST NOT be allocated to or used by any
                  implementation. KV TIEs received with this value MUST be discarded and logged at least once.</t>
              </dd>
              <dt><strong>Key Sub-Identifier:</strong></dt>
              <dd>
                <t>A 2-byte value that identifies the specific key and describes the semantics of any contained values.
                  It SHOULD be unique within the context of the given Key Sub-Type.</t>
                <t>The range of valid values is 1 - 65535 (2^16-1).</t>
                <t>0 is an illegal value and MUST NOT be allocated to or used by any
                    implementation. KV TIEs received with this value MUST be discarded and logged at least once.</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Experimental Key Type</name>
        <t>This section describes the Experimental Key Type.</t>
        <t>As shown in <xref target="f2" format="default"/>, the Key Type is set to 1 which identifies the Key Type as Experimental. The Experimental Key Type MUST support the use of a Key Sub-Type. The Key Sub-Identifier will be
        used to identify the specific key and the semantics of any contained values.
        </t>
        <figure anchor="f2">
          <name>Experimental Key Type</name>
          <artwork align="center" alt="" name="" type=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       1       |  Key Sub-Type |      Key Sub-Identifier       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       Experimental Values                     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

    ]]></artwork>
        </figure>
      </section>
      <section numbered="true" toc="default">
        <name>Well-Known Key Type</name>
        <t>This section describes the Well-Known Key Type.</t>
        <t>As shown in <xref target="f3" format="default"/>, the Key Type is set to 2 which identifies the Key Type as Well-Known.
          The Well-Known Key Type MUST support the use of a Key Sub-Type. The Key Sub-Identifier will be
        used to identify the specific key and the semantics of any contained values.
        </t>
        <figure anchor="f3">
          <name>Well-Known Key Type</name>
          <artwork align="center" alt="" name="" type=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       2       |  Key Sub-Type |      Key Sub-Identifier       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Well-Known Values                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

    ]]></artwork>
        </figure>
      </section>
      <section numbered="true" toc="default">
        <name>OUI Key Type</name>
        <t>This section describes the OUI (vendor-specific) Key Type that an implementation MAY support.</t>
        <t>As shown in <xref target="f4" format="default"/>, the Key Type is set to 3 which identifies the
          Key Type as OUI. The Key Identifier MUST use the implementing
        organization's reserved OUI space to indicate the key and the semantics of any contained values.
        </t>
        <figure anchor="f4">
          <name>OUI Key Type</name>
          <artwork align="center" alt="" name="" type=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       3       |              OUI Key Identifier               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Vendor Specific Values                    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

    ]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="design" toc="default" numbered="true">
      <name>Design Considerations</name>
      <t><strong>NOTE: </strong>Like <xref target="RFC9692"/>, this section uses terms to denote directionality, specifically, "northbound" meaning "toward the top of the fabric"
        and "southbound" meaning "toward the bottom of the fabric".</t>
      <t>Key-Value elements SHOULD NOT be used to carry topology information
        used by RIFT itself to perform distributed computations.</t>
      <t>It is possible that deployments may have nodes that support a given KV TIE and others that do not.
        In this scenario, nodes that receive KV TIEs that they don't recognize (e.g., an unknown Key Type) will
      flood them normally as specified in <xref target="RFC9692" section="6.3.4" sectionFormat="of"/>.</t>
      <section anchor="tie-breaking" toc="default" numbered="true">
        <name>Tie-Breaking Considerations</name>
        <t>In cases where KV TIEs are flooded southbound, mechanisms SHOULD be implemented
        in order to avoid network-wide flooding where possible. Key Targets (defined in <xref target="key_target"/>) are one such mechanism.</t>
        <t><xref target="RFC9692" section="6.8.5.1" sectionFormat="of"/> specifies
          that only one KV TIE is selected when identical keys are received from multiple northbound neighbors.
          Therefore, it is RECOMMENDED that implementations ensure that nodes determine Values within KV TIEs independently in a consistent fashion in order
          to prevent scenarios where multiple ToFs advertise KV TIEs with identical keys but differing Values. In such scenarios, node(s) will select
          the KV TIE with highest System ID which may lead to unintended effects. Even with a robust implementation, operators should also consider that this may still happen under
          failure conditions, for example, multiple ToFs becoming split-brained.
        </t>
        <section>
          <name>Southbound Key-Value TIE Tie-Break Sub-Type</name>
          <t>This section reserves a Key Sub-Type from the RIFT Well-Known Key Sub-Types registry.</t>
          <t>This Key-Value pair contains information that allows implementations to test and verify proper tie-breaking behavior for the Southbound
            Key store. All implementations MUST support this Sub-Type.
          </t>
          <t>All implementations SHOULD use the Thrift model defined in <xref target="rift-s-kv-tie-break-model"/>.</t>
          <figure>
            <name>Southbound Tie-Break Sub-Type</name>
            <artset>
              <artwork align="center" name="" type="ascii-art" originalSrc="art/rift-kv-global-southbound-tie-break-kv.ascii-art"> 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       2       |      127      |      Key Sub-Identifier       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     (System ID,                                               |
|      Level),                                                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</artwork>
            </artset>
          </figure>
          <t><strong>where:</strong></t>
          <ul empty="true" spacing="normal">
            <li>
              <dl newline="true" spacing="normal">
                <dt><strong>System ID:</strong></dt>
                <dd>A REQUIRED value indicating the node's unique System ID.</dd>
                <dt><strong>Level:</strong></dt>
                <dd>A RECOMMENDED value indicating the node's level.</dd>
              </dl>
            </li>
          </ul>
          <section anchor="rift-s-kv-tie-break-model" numbered="true" toc="default">
            <name>Thrift Models</name>
            <t>This section contains the normative Thrift model to support testing southbound Key-Value tie-breaking based on System ID.
              Per <xref target="RFC9692" section="7" sectionFormat="of"/>, all signed values MUST be interpreted as unsigned values.</t>
            <figure>
              <name>RIFT Common Schema for Southbound Key-Value Tie-Break Key Sub-Type</name>
              <artset>
                <artwork align="left" type="ascii-art" originalSrc="art/southbound_kv.thrift.ascii-art">include "common.thrift"

namespace py southbound_kv
namespace rs models

const i8            GlobalSystemIdentifierKV  = 127

/** simple type to test correct tie-breaking based on system ID */
struct SystemIdentifierKV {
    1:  required   common.SystemIDType         system_id,
    2:  optional   common.LevelType            level,
}

</artwork>
              </artset>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="key_target">
        <name>Key Target</name>
        <t>The Key Target is an OPTIONAL 64-bit value that identifies group(s) of node(s) that
          are intended to receive a given Key-Value TIE. Key Targets have a valid range of 0 - 18446744073709551615 (2^64-1).
        </t>
        <t>The Thrift model defined in <xref target="RFC9692" section="7.2" sectionFormat="of"/> SHOULD be used for
        Key Target implementation.</t>
        <t><xref target="f6" format="default"/> illustrates the format.</t>
        <figure anchor="f6">
          <name>Key Target Format</name>
          <artset>
            <artwork align="center" name="" type="ascii-art" originalSrc="art/rift-kv-key-target.ascii-art"> 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Key Target                           |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Key Type    |               Key Identifier                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           Values                              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </artset>
        </figure>
        <t>A value of all 0s indicates that every node is intended to receive
          this Key-Value TIE and MUST NOT be used for any other reason.</t>
        <t>A value of all 1s indicates that all leaf nodes are intended to receive
          this Key-Value TIE and MUST NOT be used for any other reason.</t>
        <t>Any other value MUST be derived from the following normative algorithm. Note that while the
           algorithm is shown using example code written in <xref target="Rust" format="default"/>,
        this document does not mandate the use of any particular language for implementation.</t>
        <figure>
          <name>Key Target Standard Algorithm</name>
          <artset>
            <artwork align="center" name="" type="ascii-art" originalSrc="art/rift-kv-target-std-algo.ascii-art">&lt;CODE BEGINS&gt;
/// random seeds used in algorithms to increase entropy
pub const RANDOMSEEDS: [UnsignedSystemID; 3] = [
    67438371571u64,
    37087353685,
    88675895388,
];

/// given a system ID delivers the bits set by the according Bloom Filter in the southbound
/// key value target.
pub (crate) fn target2bits(target: UnsignedSystemID) -&gt; KeyValueTargetType {
    (0 as usize .. 3)
        .map(|s| {
            let rot = (target ^ RANDOMSEEDS[s]).rotate_left(s as _);
            rot.to_ne_bytes().iter().fold(0, |v: u8, nv| v.rotate_right(4) ^ *nv) % 64
        })
        .fold(0, |v, nv| v | (1 &lt;&lt; nv))
}
&lt;CODE ENDS&gt;</artwork>
          </artset>
        </figure>
        <section>
          <name>Key Target Processing</name>
          <t>Nodes that support the processing of Key Targets MUST only do so on
            KV TIEs in the southbound direction. Key Targets MUST NOT be present on KV TIEs
            in the northbound direction and are ignored and logged at least once.</t>
          <t>
            Nodes that do not support the processing of Key Targets MUST continue to send KV TIEs
            to all nodes in the appropriate direction. Additionally, Key Targets MUST be preserved
            when KV TIEs are re-originated in the southbound direction.
          </t>
          <section>
            <name>Purging/Rollover</name>
            <t>There are several reasons a node may select a different KV TIE. For example, the KV TIE is
              considered newer due to the sequence number incrementing, there was a change in the original
              tie-breaking result between multiple KV TIEs, or a loss of northbound connectivity to the node
              that advertised the previously selected KV TIE.</t>
            <t>Consider a case where Leaf-1, Leaf-2, and Leaf-3 are members of a group of nodes represented by
              Key Target KT1. If Leaf-2 is removed from that group and a newer instance of the KV TIE needs to be flooded
              Leaf-2 will have to maintain the older KV TIE in the LSDB until the lifetime expires. This could lead to
              suboptimal behavior in the fabric.
            </t>
            <t>If the new KV TIE being flooded does not include the previous Key Target value, then implementations
              SHOULD flood the newer instance of the KV TIE with a very short lifetime to nodes that belonged to the previous Key
              Target but not the new Key Target.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="RIFT-KV-IANA" toc="default" numbered="true">
      <name>IANA Considerations</name>
      <t>Per <xref target="RFC8126"/>, IANA is requested to create a new registry in the "Routing in Fat Trees (RIFT)" registry group at https://www.iana.org/assignments/rift</t>
      <ul>
        <li>RIFT Well-Known Key Sub-Types</li>
      </ul>
      <t>IANA is also requested to update the RIFTCommonKVTypes Registry based on values defined in <xref target="generic_kv_structure"/> of this document.</t>
      <t>Experts reviewing requests for new values to either the RIFTCommonKVTypes registry or the RIFT Well-Known Key Sub-Types registry MUST consider the items in the
        <xref target="expert_review_guide">Expert Review Guidance</xref> section.</t>
      <section numbered="true" toc="default">
        <name>RIFT Well-Known Key Sub-Types</name>
        <t>This section requests that IANA create and help govern the following registry:</t>
        <ul empty="true" spacing="normal">
          <li>
            <dl newline="true" spacing="normal">
              <dt><strong>Registry Name:</strong></dt>
              <dd>RIFT Well-Known Key Sub-Types</dd>
              <dt><strong>Registration Procedures:</strong></dt>
              <dd>Expert Review</dd>
              <dt><strong>Description:</strong></dt>
              <dd>Well-Known Key Sub-Types registry for the RIFT protocol.</dd>
              <dt><strong>Reference:</strong></dt>
              <dd>This document.</dd>
            </dl>
          </li>
        </ul>
        <section numbered="true" toc="default">
          <name>RIFT Well-Known Key Sub-Types Requested Entries</name>
          <t>This section requests that IANA register the following suggested values
              to the "RIFT Well-Known Key Sub-Types" Registry.
          </t>
          <table align="left">
            <name>RIFT Well-Known Key Sub-Types Requested Entries</name>
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Name</th>
                <th align="left">Description</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Illegal</td>
                <td align="left">Not allowed.</td>
                <td align="left">This document.</td>
              </tr>
              <tr>
                <td align="left">1-126</td>
                <td align="left">Unassigned</td>
                <td align="left"/>
                <td align="left"/>
              </tr>
              <tr>
                <td align="left">127</td>
                <td align="left">Southbound Tie-Break Sub-Type</td>
                <td align="left">Used for testing/verifying Southbound Keystore tie-breaking behavior.</td>
                <td align="left">This document.</td>
              </tr>
              <tr>
                <td align="left">128-255</td>
                <td align="left">Unassigned</td>
                <td align="left"/>
                <td align="left"/>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="expert_review_guide" toc="default" numbered="true">
        <name>Expert Review Guidance</name>
        <t>Experts reviewing requests for values from the "RIFTCommonKVTypes" registry or
          the "RIFT Well-Known Key Sub-Types" registry are responsible for the following:</t>
        <ol>
          <li>
            <t>Ensuring that the supporting documentation accompanying the request properly defines how
              Key Identifiers and/or Key Sub-Identifiers are used
              (e.g., as a boolean, an explicit value, an auto-derived value, etc.)</t>
          </li>
          <li>
            <t>Ensuring that the supporting documentation provides normative Thrift model(s) (if applicable).</t>
          </li>
          <li>
            <t>Ensuring that any work originating outside the IETF does not conflict
              with any work that is already published or in active pursuit of being
              published.</t>
          </li>
        </ol>
      </section>
    </section>
    <section numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>This document introduces no new security concerns to RIFT or other
         specifications referenced in this document given that the Key-Value TIEs
         are already extensively secured by the
         <xref target="RFC9692" format="default">RIFT</xref> protocol specification itself.
      </t>
    </section>
    <section numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>Thanks to Italo Busi for his very thoughtful review which yielded an improved spec.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="BCP" value="14"/>
          <author initials="S." surname="Bradner" fullname="S. Bradner">
            <organization/>
          </author>
          <date year="1997" month="March"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
        <front>
          <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
          <author initials="M." surname="Cotton" fullname="M. Cotton">
            <organization/>
          </author>
          <author initials="B." surname="Leiba" fullname="B. Leiba">
            <organization/>
          </author>
          <author initials="T." surname="Narten" fullname="T. Narten">
            <organization/>
          </author>
          <date year="2017" month="June"/>
        </front>
      </reference>
      <reference anchor="RFC9692" target="https://www.rfc-editor.org/info/rfc9692" quoteTitle="true" derivedAnchor="RFC9692">
        <front>
          <title>RIFT: Routing in Fat Trees</title>
          <author fullname="Tony Przygienda" initials="T." surname="Przygienda" role="editor">
            <organization showOnFrontPage="true">Juniper Networks</organization>
          </author>
          <author fullname="Jordan Head" initials="J." surname="Head" role="editor">
            <organization showOnFrontPage="true">Juniper Networks</organization>
          </author>
          <author fullname="Alankar Sharma" initials="A." surname="Sharma">
            <organization showOnFrontPage="true">Hudson River Trading</organization>
          </author>
          <author fullname="Pascal Thubert" initials="P." surname="Thubert">
            <organization showOnFrontPage="true">Individual</organization>
          </author>
          <author fullname="Bruno Rijsman" initials="B." surname="Rijsman">
            <organization showOnFrontPage="true">Individual</organization>
          </author>
          <author fullname="Dmitry Afanasiev" initials="D." surname="Afanasiev">
            <organization showOnFrontPage="true">Yandex</organization>
          </author>
          <date month="April" year="2025"/>
        </front>
        <seriesInfo name="RFC" value="9692"/>
        <seriesInfo name="DOI" value="10.17487/RFC9692"/>
      </reference>
      <reference anchor="THRIFT" target="https://github.com/apache/thrift/tree/0.15.0/doc">
        <front>
          <title>Thrift Language Implementation and Documentation</title>
          <author>
            <organization>Apache Software Foundation</organization>
          </author>
          <date/>
        </front>
      </reference>
    </references>
    <references>
      <name>Informative References</name>
      <reference anchor="Rust" target="https://doc.rust-lang.org/reference/">
        <front>
          <title>The Rust Reference</title>
          <author>
            <organization>Rust Foundation</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="RIFT-AUTO-EVPN" target="https://www.ietf.org/archive/id/draft-ietf-rift-auto-evpn-06.html">
        <front>
          <title>RIFT Auto-EVPN</title>
          <seriesInfo name="Work in Progress," value="draft-ietf-rift-auto-evpn-06"/>
          <author initials="J." surname="Head" fullname="Jordan Head">
            <organization/>
          </author>
          <author initials="T." surname="Przygienda" fullname="Tony Przygienda">
            <organization/>
          </author>
          <author initials="W." surname="Lin" fullname="Wen Lin">
            <organization/>
          </author>
          <date month="January" year="2025"/>
        </front>
      </reference>
    </references>
  </back>
</rfc>
