<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cheng-idr-conformance-forwarding-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="forwarding consistency">Definition and Problem Statement of consistent inter-domain routing and forwarding</title>
    <seriesInfo name="Internet-Draft" value="draft-cheng-idr-conformance-forwarding-01"/>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="S." surname="Yue" fullname="Shengnan Yue">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>yueshengnan@chinamobile.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 54?>

<t>This document introduces what the forwarding consistency is and why forwarding inconsistency is prevalent in the Internet, describes the risks of forwarding inconsistency and defines the requiremenets for forwarding consistency.</t>
    </abstract>
  </front>
  <middle>
    <?line 58?>

<section anchor="sec-intro">
      <name>The consistency of inter-domain routing and forwarding</name>
      <t>This document defines forwarding consistency as the forwarding of traffic exactly along the path planned by routing.</t>
      <t>Inconsistency forwarding means that the actual forwarding path is different from the path selected by other routers through routing. Routers route traffic depending on the routing information provided by routing protocols. Many factors, such as policy-based routing or traffic engineering, may result in that the forwarding path may be altered on the data plane by any routers and not conform to the routing path. In other words, the actual forwarding path is not verified by any consistent policies or routing algorithms. Therefore inconsistency forwarding may not match the intent of the network user and the route, leading to low quality, security risks or even unreachability.</t>
      <t>inconsistency forwarding is especially common in inter-domain scenarios. The AS_PATH attribute of BGP UPDATE records the AS number that it has passed through. Ideally, the traffic to the destination address should be forwarded along the AS number recorded in the AS_PATH. For purposes of load balancing, traffic analysis, and so on, the actual forwarding AS path can be affected by multiple entities and usually different from the propagation path of BGP UPDATE. In addition, the AS_PATH attribute is easy to be modified and may not reveal the actual propagation path of BGP UPDATE, which also contributes to inconsistency inter-domain forwarding.</t>
      <t>Inconsistency inter-domain forwarding causes the forwarding path of traffic in the Internet to be a black box for any AS. Worsely, the inter-domain forwarding path is not validated by any consistent policies or routing algorithms, which may incurs many forwarding risks such as traffic black hole, traffic loop, traffic detour and crossing the malicious AS, etc. Operators can only engineer inter-domain traffic based on simple consensus and best practices, burdening network maintenance and making it difficult to prevent these forwarding risks.</t>
      <figure anchor="fig-aspath">
        <name>The complete forwarding AS path</name>
        <artwork><![CDATA[
 +-----+       +-----+       +-----+       +-----+     
 | AS1 |-------| ASx |-------| ASy |-------| AS2 |
 +-----+       +-----+       +-----+       +-----+
         BGP Path    Non-BGP Path   BGP Path
            
]]></artwork>
      </figure>
      <t><xref target="fig-aspath"/> shows a simple case for inconsistency inter-domain forwarding. The comlpete forwarding AS path from AS1 to AS2 consists fo BGP paths and non-BGP paths. The non-BGP path from ASx to ASy, decided by non-BGP protocols, is invisible to AS1 and AS2. Similarly, the BGP path from ASy to AS2 is invisible to ASx and the BGP path from AS1 to ASx is invisible to ASy. If the two BGP paths contains the same AS, a loop occurs between AS1 and AS2. This loop cannot be detected or broken by any AS on the path.</t>
      <t>Forwarding consistency aims to empower BGP to open the forwarding black box in the Internet, enabling the actual forwarding path to be visible to the origin AS. It is unlikely to force all traffic to be forwarded according to the routing decision. However, it is essential to extend BGP to reveal the actual forwarding AS path or the non-BGP fators that affect the forwarding path. In fact, the community has already proposed lots of work along these lines, such as BPG Flowspec <xref target="RFC8955"/>, Add-Path <xref target="RFC7911"/>. The document aims to provide a risk analysis of inconsistency forwarding, summarize the reasons for inconsistency, introduce definition and potential scenarios of forwarding consistency.</t>
    </section>
    <section anchor="sec-risk">
      <name>The risk of inconsistency inter-domain forwarding</name>
      <t>The inconsistency forwarding result in the origin AS, possibly all ASes, not seeing the complete actual AS forwarding path to the destination AS. The reachability of BGP relay on simple consensus, e.g., valley-free principle, and best practices. After more than 50 years of practice, this principle is seems pretty solid. The complete AS path, which is not verified by routing principles and filters of the control plane of any AS, still has many problems.</t>
      <t>Specifically, the inconsistency inter-domain forwarding has the following risks:</t>
      <ul spacing="normal">
        <li>
          <t>Traffic blackhole: there is no corresponding route for the next-hop AS, resulting in a traffic black hole. For example, an AS that violates the valley-free principle redirects traffic that should be forwarded to the provider AS to another unrelated customer AS. Both BGP Flowspec and PBR support redirection of traffic on the data plane, which is invisible to the control plane.</t>
        </li>
        <li>
          <t>Loop: the complete AS path that has not been checked by secure routing principles of any AS may lead to loops, e.g., the AS path before redirection and the AS path after redirection may contain the same AS.</t>
        </li>
        <li>
          <t>Detour: the complete forwarding AS path is composed of multiple AS paths from different protocol, which may lead to unnecessary lengthening of AS path.</t>
        </li>
        <li>
          <t>Malicious AS: the actual forwarding path is not visible to the origin AS, which may cause its traffic to pass through some insecure ASes it does not expect.</t>
        </li>
        <li>
          <t>Non-optimal route: the AS may select the optimal route based on some preferred ASes. However, the actual forwarding AS path may not contain the AS it expectes.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-reason">
      <name>Reasons for inconsistency inter-domain forwarding</name>
      <t>This document focuses on inconsistency forwarding resulting from control-plane and data-plane disagreement. The inter-domain forwarding that does conform to routing may be caused by traffic redirection, traffic engineering protocols, and ambiguous routing specifications, etc.</t>
      <section anchor="traffic-redirection">
        <name>Traffic Redirection</name>
        <t>Due to load-balancing, anti-DDoS, etc., policy-based routing (PBR) or BGP Flowspec may be configured to redirect traffic on the data plane to a new next-hop AS which is different with the next-hop AS determined by AS_PATH in BGP UPDATE. In addition, ECMP optionally ignores comparing AS_PATH of different routes, resulting in load-sharing of traffic across multiple different next-hop ASes. However, BGP usually only advertises the optimal route outwardly.</t>
        <t>The forwarding AS path of the traffic after the above redirection is determined by the next-hop AS that not in the AS_PATH attribute, which is unknown to the origin AS and the upstream AS. The complete forwarding AS path consists of two parts: the AS path before redirection and the AS path after redirection. This path is not verified by any AS and may violate the valley-free principle or even contain duplicate ASes, causing traffic blackholes or loops.</t>
      </section>
      <section anchor="traffic-engineering-protocols">
        <name>Traffic engineering protocols</name>
        <t>Due to load-balancing, network optimization, etc., operators may utilize other protocols such as MPLS，SR to locally steer traffic to the specified AS path which is different from the AS_PATH in BGP UPDATE.</t>
        <t>The complete forwarding AS path is determined by BGP and TE protocols. It may include multiple segments, for example, the first segment is an AS path determined by BGP that starts with the origin AS, the second segment is a TE path and the last segment is still the AS path determined by BGP that ends with the destination AS.</t>
        <t>The complete forwarding path is actually transparent to the origin AS and is not verified by its filters, which may incur similar risks as redirection.</t>
      </section>
      <section anchor="ambiguous-routing-specifications">
        <name>Ambiguous routing specifications</name>
        <t>Ambiguous routing specifications, such as route aggregation, convergence and redistribution, may also contribute to the inconsistency between inter-domain routing and forwarding.</t>
        <t>To minimize routing tables, route aggregation is widely used in IP networks. BGP route aggregation causes the ordered AS_SEQUENCE to be converted to the unordered AS_SET. AS_SEQUENCE and AS_SET which are different types of AS_PATH. AS_SET does not indicate the forwarding AS path of traffic, which can lead to the inconsistency between inter-domain routing and forwarding.</t>
        <t>Redistributing BGP routes into IGP can result in the loss of AS_PATH. Before advertised to the other AS, the route should be redistributed from IGP into BGP. The other AS that receives the route by BGP considers the destination AS of the route to be the redistribution AS. In fact, the complete AS path that the origin AS wishes to obtain is actually the AS path from it to the destination AS. Fortunately, this reditribution is too dangerous to be practiced.</t>
      </section>
    </section>
    <section anchor="sec-requirement">
      <name>Potential Use case</name>
      <t>The purpose of comformance forwarding is to enhance the ability of routing protocols to keep data-plane and control-plane alignment by ensuring that all forwarding behavior is controlled by the routing protocol or reflected in routing announcements.</t>
      <t>The primary goal of the routing protocol is to provide connectivity. With the emergence of hyperscale networks and diverse applications, routing protocols are given the ability to advertise more routing or forwarding information to reduce the burden on network management and provide better network quality. Existing routing protocols, expecially BGP, already support the advertisemnet of almost all routing and forwarding information.</t>
      <t>There is a lack of frameworks and requirements to gudie BGP to integrate all the information and open the black box of forwarding on the control plane. There are some scenarios where inter-domain forwarding consistency may be required:</t>
      <ul spacing="normal">
        <li>
          <t>Network Visualization</t>
        </li>
      </ul>
      <t>Visualization has been an enduring topic since the birth of the Internet. The forwarding behavior defined by the data plane makes visualization and predictability of the forwarding path even more challenging. Forwarding consistency allows the actual forwarding path of packets to be predicted based on route announcements.</t>
      <t>Current developments in BGP, such as BGP flowspec and extensions for TE, have demonstrated that route announcements can carry forwarding information that directly affects the path of packets on the data plane.</t>
      <ul spacing="normal">
        <li>
          <t>Intent-based routing</t>
        </li>
      </ul>
      <t>Intent-based routing provides flexible, scalable, and reliable end-to-end connectivity for multiple services accross the network domains by carrying multiple supported intent in routing protocols. Intent reflects the demand of application for transmission quality. Intent routing presupposes forwarding consistency. If inter-domain forwarding does not follow the routing, the intent may be not satisfied.</t>
      <ul spacing="normal">
        <li>
          <t>Source address validation</t>
        </li>
      </ul>
      <t>Source address validation based on RIB or FIB suffers from unavoidable improper pass or improper filter problems. Accurate source address validation verification relies on the actual forwarding path of the packet. However, inconsistency forwarding makes the high overhead of the discovery of the path unacceptable. Forwarding consistency can reduce the overhead, which contributes to TE and route security.</t>
    </section>
    <section anchor="requirements-for-inter-domain-forwarding-consistency">
      <name>Requirements for inter-domain forwarding consistency</name>
      <t>All use cases require the inter-domain routing protocol, i.e., BGP, to learn deviating paths that are determined by non-BGP factors. Therefore, to get the complete actual forwarding AS path by BGP, there are two requirements:</t>
      <ul spacing="normal">
        <li>
          <t>Obtaining deviation AS paths that results from local non-BGP factors.</t>
        </li>
        <li>
          <t>Advertising the deviation AS path and the steered flow by BGP</t>
        </li>
      </ul>
      <section anchor="requirement-1-obtaining-deviation-as-paths">
        <name>Requirement 1: Obtaining deviation AS paths</name>
        <t>Rotuers need to understand how non-BGP factors affect forwarding AS paths to learn deviating paths, which is vital to network visualization.</t>
        <section anchor="sec-redirectionPath">
          <name>Obtaining redirection deviation AS paths</name>
          <t>A router redirecting traffic to a new next-hop AS generates a deviation AS path. In order to get the direction deviation AS path, the router first acquires the next-hop AS and the destination prefix of the redirection rule. The router then looks up the AS_PATH in Adj_RIBs_In from the next-hop AS by the destination prefix. The AS_PATH is the forwarding AS path after redirection, i.e., the redirection deviation AS path.</t>
        </section>
        <section anchor="obtaining-deviation-as-path-from-other-protocols">
          <name>Obtaining deviation AS path from other protocols</name>
          <t>Some TE protocols that may direct the specific flow into pre-planned AS paths. Their destination prefix of the steered traffic is obtained in a similar way as in <xref target="sec-redirectionPath"/>.</t>
          <t>In the egress router of the TE path, the Adj-RIBs-In is then looked up by the destination prefix to obtain the subsequent AS path. The complete forwarding path, therefore, is stitched together from the TE Path and other AS Paths controlled by BGP.</t>
        </section>
      </section>
      <section anchor="requirement-2-advertising-the-deviation-path">
        <name>Requirement 2: Advertising the deviation path</name>
        <t>Advertising the devation path benefits other ASes not only in terms of network visualization but also in terms of optimal routing.</t>
        <t>The AS that generates the deviation AS path is obliged to advertise it to other ASes. For example, the AS that is configured with the redirection rule advertises the redirection deviation path to the origin AS. The origin AS then combines the AS path to the redirection AS and the redirection deviation AS path to get the complete forwarding AS path which is verified to be optimal or secure using the local AS_PATH filter. The path that passes through malicious ASes will not be selected by the origin AS.</t>
        <t>However, only the flow that matches the redirection rule will go through the deviation path, and the other missed flow is still forwarded along the original path planned by BGP. Therefor, the redirection AS should advertise the deviation path and the flow specification to other ASes.</t>
        <figure anchor="fig-goal">
          <name>Advertising the deviation path</name>
          <artwork><![CDATA[
                                                   +-----+
                                                 / | AS3 | \
                                                /  +-----+  \
                                               /             \
                                              /               \
 +-----+               +-----+            +-----+            +-----+      
 | ASx |---------------| AS1 |------------| AS2 |------------| AS4 |
 +-----+ <-----------  +-----+ <--------  +-----+ <--------  +-----+
      BGP UPDATE:               BGP UPDATE:           BGP UPDATE:
       AS_PATH:[AS1,AS2,AS4]     AS_PATH:[AS2,AS4]     AS_PATH:[AS4]
       D_PATH:[AS1,AS2,AS3,AS4]  D_PATH:[AS2,AS3,AS4]                    
]]></artwork>
        </figure>
        <t><xref target="fig-goal"/> shows an example of advertising the devation path. As shown in the figure, AS4 advertises a BGP UPDATE to ASx along the AS path ([AS1,AS2,AS4]). AS2 is a redirection AS which redirect the packet routing to AS4 to AS3. As a result, the actual forwarding path of packets from AS1 to AS2 is [AS1, AS2, AS3, AS4]. So AS2 should add D_PATH to BGP UPDATE. D_PATH refers to the actual forwarding AS path through which the packet sent to AS4.</t>
        <t>The router generating the deviation AS path needs to advertise the non-BGP factors or the deviation AS path to other routers by the inter-domain routing protocol, i.e., BGP. In other words, inter-domain forwarding consistency requires that BGP announcements contain all possible forwarding behaviors. The routing algorithm integrates all possible forwarding behaviors and paths to select the optimal forwarding path. In short, routing announcements are subject to forwarding, but routing dictates the ultimate forwarding path.</t>
      </section>
    </section>
    <section anchor="benefits">
      <name>Benefits</name>
      <t>Since the birth of the Internet, inter-AS TE has been a very complex and difficult task. One of the major reasons is that inter-domain routing and forwarding are inconsistency The AS_PATH attrtibute in BGP UPDATE only represents the propagation path of the route, which may not correspond to the actual forwarding path.</t>
      <t>The community has designed many complex protocols to plan the forwarding path and guarantee SLA, while routing protocols are usually utilized to get the basic reachability. If inter-domain forwarding conforms to inter-domain routing announcements, TE and routing security will be significantly simplified. Moreover, the ability of the origin AS to plan the forwarding AS path of its own path opens the black box of the Internet. Problems that have plagued the Internet for decades, such as visualization and troubleshooting, may be solved.</t>
    </section>
    <section anchor="sec-manage">
      <name>Management Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document does not introduce any new security considerations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
        <front>
          <title>Dissemination of Flow Specification Rules</title>
          <author fullname="C. Loibl" initials="C." surname="Loibl"/>
          <author fullname="S. Hares" initials="S." surname="Hares"/>
          <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
          <author fullname="D. McPherson" initials="D." surname="McPherson"/>
          <author fullname="M. Bacher" initials="M." surname="Bacher"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
            <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
            <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8955"/>
        <seriesInfo name="DOI" value="10.17487/RFC8955"/>
      </reference>
      <reference anchor="RFC7911" target="https://www.rfc-editor.org/info/rfc7911" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7911.xml">
        <front>
          <title>Advertisement of Multiple Paths in BGP</title>
          <author fullname="D. Walton" initials="D." surname="Walton"/>
          <author fullname="A. Retana" initials="A." surname="Retana"/>
          <author fullname="E. Chen" initials="E." surname="Chen"/>
          <author fullname="J. Scudder" initials="J." surname="Scudder"/>
          <date month="July" year="2016"/>
          <abstract>
            <t>This document defines a BGP extension that allows the advertisement of multiple paths for the same address prefix without the new paths implicitly replacing any previous ones. The essence of the extension is that each path is identified by a Path Identifier in addition to the address prefix.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7911"/>
        <seriesInfo name="DOI" value="10.17487/RFC7911"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
