<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-savnet-inter-domain-spa-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="SPA for Inter-domain SAVNET">Source Prefix Advertisement for Inter-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-savnet-inter-domain-spa-00"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization>USA NIST</organization>
      <address>
        <postal>
          <city>Gaithersburg, MD 20899</city>
          <country>United States of America</country>
        </postal>
        <email>ksriram@nist.gov</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 58?>

<t>This document proposes to use Source Prefix Advertisement (SPA) messages for advertising hidden source prefixes and discovering the hidden paths of source prefixes. The accuracy of existing inter-domain SAV mechanisms like EFP-uRPF can be improved by SPA.</t>
    </abstract>
  </front>
  <middle>
    <?line 62?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>EFP-uRPF <xref target="RFC8704"/> is a promising inter-domain Source Address Validation (SAV) mechanism and works well in most cases. <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/> does an analysis of existing inter-domain SAV mechanisms including EFP-uRPF. The analysis shows that EFP-uRPF may have improper blocking problems in the scenarios of i) "hidden source prefixes" in the Direct Server Return (DSR) scenario (see section 4.1.2 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>) and ii) "hidden paths of source prefixes" caused by "Limited Propagation of Prefixes" (see section 4.1.1 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>).</t>
      <t>The source prefix allowlists at customer-facing or lateral peer-facing interfaces are built by EFP-uRPF primarily based on the local BGP routing information. When source prefixes or paths are "hidden" in normal BGP Update messages, EFP-uRPF will fail to generate accurate prefix allowlists.</t>
      <t>This document follows the idea of sharing SAV-specific information between ASes proposed in <xref target="I-D.ietf-savnet-inter-domain-architecture"/>. A new inter-domain message called Source Prefix Advertisement (SPA) is defined. SPA messages can help advertise hidden source prefixes and discover hidden paths, and thus improve the accuracy of existing inter-domain SAV mechanisms like EFP-uRPF.</t>
      <t>SPA messages can be possibly delivered by extended BGP messages, but the design of protocol extensions are not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SPA: Source Prefix Advertisement (SPA) for advertising the origin source prefixes of an AS.</t>
        <t>Source AS: The AS which originates SPA messages.</t>
        <t>Validating AS: The AS which receives SPA messages, generates SAV rules, and conducts source address validation.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-spa">
      <name>Inter-domain Source Prefix Advertisement</name>
      <t>A new inter-domain message called SPA message is defined in this section. An SPA message <bcp14>SHOULD</bcp14> include the following items:</t>
      <ul spacing="normal">
        <li>
          <t>Source Prefixes: The source prefixes that the source addresses of the locally originated data packets of Source AS belong to. These source prefixes are to be updated or withdrawn, which is indicated by the Update/Withdraw Flag. The updated source prefixes are incremental to the previously announced prefixes.</t>
        </li>
        <li>
          <t>Source AS Number: The AS number of the Source AS (aka origin AS) that originates data packets with the source addresses belonging to the Source Prefixes.</t>
        </li>
        <li>
          <t>AS Path: It has the same meaning as the AS_PATH attribute in BGP <xref target="RFC4271"/>.</t>
        </li>
        <li>
          <t>Update/Withdraw Flag: It indicates whether the Source Prefixes in the message are to be updated or withdrawn.</t>
        </li>
      </ul>
      <t>A Source AS can advertise its "hidden source prefixes" through SPA messages to its neighboring ASes. The neighboring ASes can further propagate the messages to next-hop ASes, and so do the next-hop ASes. The manner of the propagation is similar to that of BGP Updates. In the DSR scenario, the anycast prefixes, which are not in the BGP routes originated by the Source AS, can be advertised to remote Validating ASes through SPA messages.</t>
    </section>
    <section anchor="sec-spd">
      <name>Inter-domain Source Path Discovery</name>
      <t>SPA messages can be used for source path discovery at the same time as advertising source prefixes. In the "Limited Propagation of Prefixes" scenarios (see section 4.1.1 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>), the propagation of BGP Update messages may be limited due to routing propagation policies (e.g., NO_EXPORT), but the SPA messages will be propagated because they are separate from routing Updates and do not have NO_EXPORT attached. Thus, the "hidden paths of source prefixes" can be discovered through SPA messages by the Validating ASes.</t>
    </section>
    <section anchor="sec-efp-urpf-plus">
      <name>EFP-uRPF Enhanced by SPA</name>
      <t>This section describes how to use SPA for enhancing EFP-uRPF.</t>
      <section anchor="hidden-prefixes-scenario">
        <name>"Hidden Prefixes" Scenario</name>
        <t>Consider the "Hidden Prefixes" scenario (e.g., the DSR scenario) described in section 4.1.2 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. <xref target="fig-dsr"/> shows an example of the DSR scenario, which is similar to Figure 3 in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. The propagation of BGP Updates of P1, P3 and P6 are shown in the figure. The anycast server in AS3 receives requests from users and tunnels the requests to the edge server in AS1. Then, the edge server will respond directly to the users by using the anycast IP address (belonging in P3) as the source address in the response packets.</t>
        <t>Prefix P3 is the anycast prefix and is only advertised by AS3 through BGP. Suppose AS2 or AS4 enables EFP-uRPF at customer-facing interfaces. The packets with source addresses belonging in P3 sent by AS1 will be blocked improperly when the packets arrive at the customer-facing interfaces of AS2/AS4. In this example, P3 is the hidden source prefix of AS1.</t>
        <figure anchor="fig-dsr">
          <name>An example of the DSR scenario.</name>
          <artwork><![CDATA[
                                +---------------+
                Anycast Server+-+    AS3(P3)    |
                                +----+/\+-------+
                                      /
                   P3[AS3](Downward) /
          P1,P6[AS4,AS2,AS1](Upward)/ 
                                   / (C2P)
                          +---------------+
                          |    AS4(P4)    |
                          ++/\+--+/\+-----+
      P3[AS4,AS3](Downward) /     |
    P1,P6[AS2,AS1](Upward) /      |
                          /       |
                         / (C2P)  |
          +---------------+       | P3[AS4,AS3](Downward)
    User+-+    AS2(P2)    |       | P1,P6[AS1](Upward)
          +-----------+/\++       |
                        \         | 
P3[AS2,AS4,AS3](Downward)\        |
       P1,P6[AS1](Upward) \       |
                           \ (C2P)| (C2P)
                        +---------------+
           Edge Server+-+  AS1(P1, P6)  |
                        +---------------+
P3 is the anycast prefix and is only advertised by AS3 through BGP.
]]></artwork>
        </figure>
        <t>SPA can be used to solve the improper blocking problems in the "Hidden Prefixes" scenarios. In the above DSR scenario, AS1 can advertise the hidden source prefix P3 to Validating ASes (i.e., AS2 and AS4) through SPA messages. The propagation process of SPA messages is illustrated in <xref target="fig-dsr-spa"/>. After receiving the SPA message, AS2 and AS4 will take a union of the prefixes in the SPA messages and the BGP Update messages for constructing SAV tables (allowlists). As a result, P3 will be included in the source prefix allowlist at the customer-facing interfaces at AS2 and AS4. When AS1 sends packets with source address in P3, they will pass the validation at AS2 and AS4.</t>
        <figure anchor="fig-dsr-spa">
          <name>SPA for the DSR scenario.</name>
          <artwork><![CDATA[
                                +---------------+
                Anycast Server+-+    AS3(P3)    |
                                +----+/\+-------+
                                      /
                  P3[AS3](Downward)  /
         P1,P6[AS4,AS2,AS1](Upward) / 
        SPA:P3[AS4,AS2,AS1](Upward)/ (C2P)
                          +---------------+
                          |    AS4(P4)    |
                          ++/\+--+/\+-----+
     P3[AS4,AS3](Downward)  /     |
    P1,P6[AS2,AS1](Upward) /      |
   SPA:P3[AS2,AS1](Upward)/       |
                         / (C2P)  |
          +---------------+       | P3[AS4,AS3](Downward)
    User+-+    AS2(P2)    |       | P1,P6[AS1](Upward)
          +-----------+/\++       | SPA:P3[AS1](Upward)
                        \         | 
P3[AS2,AS4,AS3](Downward)\        |
       P1,P6[AS1](Upward) \       |
      SPA:P3[AS1](Upward)  \ (C2P)| (C2P)
                        +---------------+
           Edge Server+-+  AS1(P1, P6)  |
                        +---------------+
P3 is the hidden prefix of AS1 and is advertised by AS1 through SPA.
]]></artwork>
        </figure>
      </section>
      <section anchor="limited-propagation-of-prefixes-scenario">
        <name>"Limited Propagation of Prefixes" Scenario</name>
        <t>Consider the "Limited Propagation of Prefixes" scenario (e.g., the NO_EXPORT scenario) described in section 4.1.1 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. <xref target="fig-no-export"/> shows the NO_EXPORT scenario, which is similar to Figure 2 in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. AS1 advertises only prefix P1 to AS2 through a BGP Update message with the NO_EXPORT community. As a result, AS4 learns no route of AS1 directly from AS2.</t>
        <t>If AS4 enables EFP-uRPF with algorithm A at the customer-facing interface connected to AS2, the packets with source addresses in P1 or P6 will be blocked improperly.</t>
        <figure anchor="fig-no-export">
          <name>An example of the NO_EXPORT scenario.</name>
          <artwork><![CDATA[
                    +-----------------+
                    |     AS4(P4)     |
                    ++/\+--+/\+-------+
                      /     |
                     /      |
                    /       |
                   / (C2P)  |
    +---------------+       |
    |    AS2(P2)    |       | P1,P6[AS1]
    +---------+/\+--+       |
                \           |
P1[AS1] NO_EXPORT\          |
                  \         |
                   \ (C2P)  | (C2P/P2P)
                  +---------------+
                  |  AS1(P1, P6)  |
                  +---------------+
P1 with NO_EXPORT is advertised to AS2
]]></artwork>
        </figure>
        <t>SPA can be used to solve the improper blocking problems in the "Limited Propagation of Prefixes" scenarios. In the above NO_EXPORT scenario, AS1 can send an SPA message to AS2, and then AS2 will propagate the message to AS4. Note that NO_EXPORT community does not apply and never attached to SPA messages. The propagation process of SPA messages is illustrated in <xref target="fig-no-export-spa"/>. AS4 deploying EFP-uRPF with either Algorithm A or Algorithm B will learn the existence of AS1 from the interface connected to AS2. AS4 will take the union of prefixes (and also AS paths) learned from BGP and SPA messages. Thus AS4 will include the source prefixes P1 and P6 of AS1 in the source prefix allowlist for the interface with AS2. When data packets with source addresses in P1 or P6 arrive at AS4 via AS2, they will pass the validation at AS4.</t>
        <figure anchor="fig-no-export-spa">
          <name>SPA for the NO_EXPORT scenario.</name>
          <artwork><![CDATA[
                    +-----------------+
                    |     AS4(P4)     |
                    ++/\+--+/\+-------+
                      /     |
                     /      |
    SPA:P1[AS2,AS1] /       |
                   / (C2P)  |
    +---------------+       |
    |    AS2(P2)    |       | P1,P6[AS1]
    +---------+/\+--+       |
                \           |
P1[AS1] NO_EXPORT\          |
SPA:P1[AS1]       \         |
                   \ (C2P)  | (C2P/P2P)
                  +---------------+
                  |  AS1(P1, P6)  |
                  +---------------+
P1 without NO_EXPORT is advertised to AS2 through SPA
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-converge">
      <name>Convergence Considerations</name>
      <t>Validating AS needs to update SAV rules when source prefixes of Source AS or the paths of source prefixes change. The following <bcp14>RECOMMENDED</bcp14> actions will result in more effective re-convergence:</t>
      <ul spacing="normal">
        <li>
          <t>Applying hysteresis in the case of withdrawal of source prefixes or paths of source prefixes: During the re-convergence, the SAV source prefix lists will include some withdrawn prefixes for a little longer, and there may exist improper permitting shortly but no improper blocking.</t>
        </li>
        <li>
          <t>Updating source prefixes or paths of source prefixes as soon as possible when SPA message is received: During the convergence, any possibility of improper blocking will be minimized or eliminated if new source prefixes are announced in SPA first and then some delay is allowed before the related services (utilizing the new source prefixes) are activated online.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>There are two main threats associated with SPA: prefix hijacking and path hijacking.</t>
      <ul spacing="normal">
        <li>
          <t>Prefix hijacking. A malicious AS may send an SPA message which hijacks the source prefixes of a Source AS. The Validating AS that receives the message may improperly include the source prefixes in some source prefix lists, which results in improper permitting but no improper blocking.</t>
        </li>
        <li>
          <t>Path hijacking. A malicious AS may send an SPA message which carries a manipulated AS_PATH, which can be a forged-origin attack or a forged-path-segment attack. The Validating AS that receives the message may improperly include the source prefixes in some source prefix lists, which results in improper permitting but no improper blocking.</t>
        </li>
      </ul>
      <t>Existing mechanisms for detecting and preventing BGP prefix hijacking and BGP path hijacking can be used to deal with the above two threats.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>There is no IANA requirement.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the comments from XXX.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-09"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-architecture-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-01"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
      </references>
    </references>
    <?line 271?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
