<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cheng-idr-inter-domain-consistency-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="Consistent inter-domain consistency">Maintain consistency of inter-domain routing and forwarding</title>
    <seriesInfo name="Internet-Draft" value="draft-cheng-idr-inter-domain-consistency-00"/>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamoble.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Yue" fullname="Shengnan Yue">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>yueshengnan@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 52?>

<t>The AS_PATH attribute of BGP UPDATE records the AS number that it has passed through. Ideally, the traffic to the destination IP prefixes in NLRI of BGP UPDATE should be reversely forwarded along the AS path recorded in the AS_PATH. However, due to other factors such traffic redirection, traffic engineering, and route aggregation, the actual forwarding AS path of the packet is usually different from the propagation path of BGP UPDATE. In other words, inter-domain routing and forwarding are usually inconsistent, which results in that inter-domain forwarding has security risks such as traffic black hole, loop, detour and the malicious AS, etc. Consistent inter-domain routing and forwarding greatly contributes to enhanced inter-domain  forwarding security and visibility, which facilitates the long-term evolution of the Internet</t>
    </abstract>
  </front>
  <middle>
    <?line 56?>

<section anchor="the-inconsistency-of-inter-domain-routing-and-forwarding">
      <name>The inconsistency of inter-domain routing and forwarding</name>
      <t>The path from the origin AS to the destination AS is determined by BGP protocol and non-BGP factors. As a result, the actual forwarding AS path of the packet is usually different with the expected AS path which is the same as the AS_PATH attribute in BGP UPDATE. In other words, inter-AS routing and forwarding are inconsistent.</t>
      <t>The inconsistency means that inter-domain routing is a black box. The origin AS, maybe any AS, does not see the actual forwarding AS path from the route, which cause these paths may not comply with some local defined rules, e.g., including an AS that it does not prefer, violating the valley-free principle.</t>
      <figure anchor="fig-goal">
        <name>The complete forwarding AS path</name>
        <artwork><![CDATA[
 +-----+              +-----+              +-----+      
 | AS1 |--------------| ASx |--------------| AS2 |
 +-----+              +-----+              +-----+
          BGP Path            Non-BGP Path
                
]]></artwork>
      </figure>
      <t>As shown in the figure, the comlpete forwarding AS path from AS1 to AS2 consists fo BGP paths and non-BGP paths.</t>
    </section>
    <section anchor="reasons-for-the-inconsistency">
      <name>Reasons for the inconsistency</name>
      <t>Inter-domain routing and forwarding inconsistency may be caused by traffic redirection, traffic engineering protocols, and route aggregation, etc.</t>
      <section anchor="inter-domain-traffic-redirection">
        <name>Inter-domain traffic Redirection</name>
        <t>Due to load-balancing, anti-DDoS, etc., policy-based routing (PBR) or BGP Flowspec may be configured to redirect traffic to a new next-hop AS which is different with the next-hop AS determined by AS_PATH in BGP UPDATE.</t>
        <t>The subsequent forwarding AS path is determined by the next-hop AS, which is unknown to the origin AS and the upstream AS. The complete forwarding AS path consists of two parts: the AS path before redirection and the AS path after redirection. This path is not verified by BGP, which may violate the valley-free principle or even contain duplicate ASes, causing traffic blackholes or loops.</t>
      </section>
      <section anchor="traffic-engineering-protocols">
        <name>Traffic engineering protocols</name>
        <t>Due to load-balancing, network optimization, etc., operators may utilize other protocols such as MPLS，SR to steer traffic to the specified AS path which is different from the AS_PATH in BGP UPDATE.</t>
        <t>The complete forwarding AS path is determined by BGP and TE protocols. It may include multiple segments, for example, the first segment is an AS path determined by BGP that starts with the origin AS, the second segment is a TE path and the last segment is still the AS path determined by BGP that ends with the destination AS.</t>
        <t>The complete forwarding path is actually transparent to the origin AS and is not verified by its filters, which may incur similar risks as redirection.</t>
      </section>
      <section anchor="route-aggregation">
        <name>Route Aggregation</name>
        <t>To minimize routing tables, route aggregation is widely used in IP networks.</t>
        <t>BGP route aggregation causes the ordered AS_Sequence, to be converted to the unordered AS_SET, which are different types of AS_PATH. However, AS_SET does not represent the AS forwarding path of the data packet, which can also lead to the inconsistency between inter-domain routing and forwarding.</t>
      </section>
      <section anchor="other-factors">
        <name>Other factors</name>
        <t>Other factors, such as route convergence and route redistribution, may also contribute to the inconsistency between routing and forwarding.</t>
        <t>During route convergence, non-simultaneous addition and deletion of routes by multiple ASes may also cause a short-term inconsistency between routing and forwarding. However, as routing completes convergence, eventually routing and forwarding will be consistent. This short-term inconsistency is caused by the flaws in the routing protocol's own design and is beyond the scope of this draft.</t>
        <t>Redistributing BGP routes into IGP can result in the loss of AS_PATH. Before advertised to the other AS, the route should be redistributed from IGP into BGP. The other AS that receive the route by BGP considers the destination AS of the route to be the redistribution AS. The complete AS path that the origin AS wisher to obtain is actually the path from it to the redistribution AS. The forwarding AS path before redistribution are outside the scope of this draft for now.</t>
        <t>This draft focuses on the factors that contribute to the chronic inconsistency of inter-domain routing and forwarding: inter-domain redirection, TE protocols and route aggregation. There factors are inevitable obstacles to the consistency.</t>
      </section>
    </section>
    <section anchor="sec-peering">
      <name>The risk of the inconsistency</name>
      <t>The inconsistency between inter-domain routing and forwarding result in the origin AS, possibly all ASes, not seeing the complete actual AS forwarding path and not knowing whether the forwarding is secure. Specifically, the inconsistency between the expected AS path and the actual AS path  leads to the following risks:</t>
      <ul spacing="normal">
        <li>
          <t>Traffic blackhole: there is no corresponding route for the next-hop AS, resulting in a traffic black hole. For example, an AS redirects traffic that should be forwarded to the provider AS to another unrelated customer AS, which also violates the valley-free principle.</t>
        </li>
        <li>
          <t>Loop: the forwarding AS path that has not been checked by BGP may lead to loops, e.g., the AS path before redirection and the AS path after redirection may contain the same AS, which is a risk that cannot be circumvented by the current BGP protocol itself.</t>
        </li>
        <li>
          <t>Detour: the complete forwarding AS path is composed of multiple AS paths from different protocol, which may lead to unnecessary lengthening of AS_PATH.</t>
        </li>
        <li>
          <t>Malicious AS: The actual forwarding path is not visible to the origin AS, which may cause its packets to pass through some ASes it does not expect.</t>
        </li>
        <li>
          <t>Non-optimal route: The AS may prefer some ASes that may not be included in the actual pata to select a non-optimal route.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-extension">
      <name>Consistent inter-domain routing and forwarding</name>
      <t>During packet transmission from the origin AS to the destination AS, partial AS path may be controlled by redirection or non-BGP protocols, such MPLS, SR, etc. Therefore, to get the complete forwarding AS path by BGP, there are two steps:</t>
      <ul spacing="normal">
        <li>
          <t>Obtaining deviation AS paths that results from local non-BGP factors.</t>
        </li>
        <li>
          <t>Advertising the deviation AS path and the steered flow by BGP</t>
        </li>
      </ul>
      <section anchor="obtaining-deviation-as-paths">
        <name>Obtaining deviation AS paths</name>
        <section anchor="sec-redirectionPath">
          <name>Obtaining redirection deviation AS paths</name>
          <t>A router redirecting traffic to a new next-hop AS generates a deviation AS path. In order to get the direction deviation AS path, the router first acquires the next-hop AS and the destination prefix of the redirection rule. The router then looks up the AS_PATH in Adj_RIBs_In from the next-hop AS by the destination prefix. The AS_PATH is the forwarding AS path after redirection, i.e., the redirection deviation AS path.</t>
          <t>Redirection rules usually specify only the next-hop address or the outgoing interface, so it is also necessary to obtain the AS to which the interface is connected. In the prior art, one way is that there will be relevant configuration in the BGP peer that specifies the AS to which the remote peer belongs and the outgoing interface used for the connection. This interface is connected to the AS to which the peer belongs (except for the loopback interface). Additional configuration to specify the AS to which the interface is connected is also a viable approach.</t>
          <t>All BGP routes sent by remote peers are stored in Adj-RIBs-in. The feasible redirection AS path should be among these unpreferred BGP routes. The new next-hop AS that was redirected to has no routes to the destination prefix of the redirection rule, which may result in the traffic black hole.</t>
          <t>If the redirection rule does not have the destination prefix field, the traffic routed to any destination prefix may be redirected. Thus all AS_PATHs in Adj-RIBs-In are deviation AS paths resulting from the redirection rule. Typically such redirection rules that do not include the destination prefix field and whose next-hop AS lacks reachability are not recommended.</t>
        </section>
        <section anchor="obtaining-deviation-as-path-from-other-protocols">
          <name>Obtaining deviation AS path from other protocols</name>
          <t>Some TE protocols that may direct the specific flow into pre-planned AS paths. Their destination prefix of the steered traffic is obtained in a similar way as in <xref target="sec-redirectionPath"/>.</t>
          <t>In the egress router of the TE path, the Adj-RIBs-In is then looked up by the destination prefix to obtain the subsequent AS path. The complete forwarding path, therefore, is stitched together from the TE Path and other AS Paths controlled by BGP.</t>
        </section>
      </section>
      <section anchor="advertising-the-deviation-path">
        <name>Advertising the deviation path</name>
        <figure anchor="fig-goal1">
          <name>Advertising the deviation path</name>
          <artwork><![CDATA[
                                              +-----+
                                            / | AS3 | \
                                           /  +-----+  \
                                          /             \
                                         /               \
+-----+            +-----+           +-----+          +-----+
| ASx |------------| AS1 |-----------| AS2 |----------| AS4 |
+-----+ <--------  +-----+ <-------  +-----+ <------  +-----+
   BGP UPDATE:              BGP UPDATE:          BGP UPDATE:
    AS_PATH:[AS1,AS2,AS4]    AS_PATH:[AS2,AS4]   AS_PATH:[AS4]
    D_PATH:[AS1,AS2,AS3,AS4] D_PATH:[AS2,AS3,AS4]                    
]]></artwork>
        </figure>
        <t>As shown in the figure, AS4 advertises a BGP UPDATE to ASx along the AS path ([AS1,AS2,AS4]). AS2 is a redirection AS which redirect the packet routing to AS4 to AS3. As a result, the actual forwarding path of packets from AS1 to AS2 is [AS1, AS2, AS3, AS4]. So AS2 should add D_PATH to BGP UPDATE. D_PATH refers to the actual forwarding AS path through which the packet sent to AS4.</t>
        <t>The AS that generates the deviation AS path is obliged to advertise it to other ASes. For example, the AS that is configured with the redirection rule advertises the redirection deviation path to the origin AS. The origin AS then combines the AS path to the redirection AS and the redirection deviation AS path to get the complete forwarding AS path which is verified to be optimal or secure using the local AS_PATH filter. The path that passes through malicious ASes will not be selected by the origin AS.</t>
        <t>However, only the flow that matches the redirection rule will go through the deviation path, and the other missed flow is still forwarded along the original path planned by BGP. Therefor, the redirection AS should jointly advertise the deviation path and the specific flow to other ASes.</t>
        <t>In order to maintain the consistency of inter-domain routing and forwarding, the deviation AS path should be propagated to other ASes in the form of route advertisement. In other words, the deviation AS path and attributes of the specific flow should be included in BGP UPDATE, so that utilizing the BGP protocol, other ASes can see that some traffic will go through the AS path controlled by non-BGP factors. The other ASes can perform TE and QoS according to the real forwarding AS path of the flow, which is helpful to reduce the risk of unreachability and the potential damage incurred by malicious ASes.</t>
      </section>
    </section>
    <section anchor="benefits">
      <name>Benefits</name>
      <t>Since the birth of the Internet, inter-AS TE has been a very complex and difficult task. One of the major reasons is that inter-domain routing and forwarding are inconsistent. The AS_PATH attrtibute in BGP UPDATE only represents the propagation path of the route, which may not correspond to the actual forwarding path.</t>
      <t>The community has designed many complex protocols to plan the forwarding path and guarantee SLA, while routing protocols are usually utilized to get the basic reachability. If inter-domain routing and forwarding keep consistent, TE and routing security will be significantly simplified. Moreover, the ability of the origin AS to plan the forwarding AS path of its own path opens the black box of the Internet. Problems that have plagued the Internet for decades, such as visualization and troubleshooting, may be solved.</t>
    </section>
    <section anchor="sec-manage">
      <name>Management Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document does not introduce any new security considerations.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>






  </back>
  <!-- ##markdown-source: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-->

</rfc>
