<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-savnet-inter-domain-spa-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SPA for Inter-domain SAVNET">Source Prefix Advertisement for Inter-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-savnet-inter-domain-spa-01"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization>USA NIST</organization>
      <address>
        <postal>
          <city>Gaithersburg, MD 20899</city>
          <country>United States of America</country>
        </postal>
        <email>ksriram@nist.gov</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="January" day="04"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 58?>

<t>This document proposes to use Source Prefix Advertisement (SPA) messages for advertising hidden source prefixes and discovering the hidden paths of source prefixes. The accuracy of existing inter-domain SAV mechanisms like EFP-uRPF can be improved by SPA.</t>
    </abstract>
  </front>
  <middle>
    <?line 62?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>EFP-uRPF <xref target="RFC8704"/> is a promising inter-domain Source Address Validation (SAV) mechanism and works well in most cases. <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/> does an analysis of existing inter-domain SAV mechanisms including EFP-uRPF. The analysis shows that EFP-uRPF may have improper blocking problems in the scenarios of i) "hidden source prefixes" in the Direct Server Return (DSR) scenario (see section 4.1.2 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>) and ii) "hidden paths of source prefixes" caused by "Limited Propagation of Prefixes" (see section 4.1.1 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>).</t>
      <t>The source prefix allowlists at customer-facing or lateral peer-facing interfaces are built by EFP-uRPF primarily based on the local BGP routing information. When source prefixes or paths are "hidden" in normal BGP Update messages, EFP-uRPF will fail to generate accurate prefix allowlists.</t>
      <t>This document follows the idea of sharing SAV-specific information between ASes proposed in <xref target="I-D.ietf-savnet-inter-domain-architecture"/>. A new inter-domain message called Source Prefix Advertisement (SPA) is defined. SPA messages can help advertise hidden source prefixes and discover hidden paths, and thus improve the accuracy of existing inter-domain SAV mechanisms like EFP-uRPF.</t>
      <t>SPA messages can be possibly delivered by extended BGP messages, but the design of protocol extensions are not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SPA: Source Prefix Advertisement (SPA) for advertising the origin source prefixes of an AS.</t>
        <t>Source AS: The AS which originates SPA messages.</t>
        <t>Validating AS: The AS which receives SPA messages, generates SAV rules, and conducts source address validation.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-spa">
      <name>Inter-domain Source Prefix Advertisement</name>
      <t>A new inter-domain message called SPA message is defined in this section. An SPA message <bcp14>SHOULD</bcp14> include the following items:</t>
      <ul spacing="normal">
        <li>
          <t>Source Prefixes: The source prefixes that the source addresses of the locally originated data packets of Source AS belong to. These source prefixes are to be updated or withdrawn, which is indicated by the Update/Withdraw Flag. The updated source prefixes are incremental to the previously announced prefixes.</t>
        </li>
        <li>
          <t>Source AS Number: The AS number of the Source AS (aka origin AS) that originates data packets with the source addresses belonging to the Source Prefixes.</t>
        </li>
        <li>
          <t>AS Path: It has the same meaning as the AS_PATH attribute in BGP <xref target="RFC4271"/>.</t>
        </li>
        <li>
          <t>Update/Withdraw Flag: It indicates whether the Source Prefixes in the message are to be updated or withdrawn.</t>
        </li>
      </ul>
      <t>A Source AS can advertise its "hidden source prefixes" through SPA messages to its neighboring ASes. The neighboring ASes can further propagate the messages to next-hop ASes, and so do the next-hop ASes. The manner of the propagation is similar to that of BGP Updates. In the DSR scenario, the anycast prefixes, which are not in the BGP routes originated by the Source AS, can be advertised to remote Validating ASes through SPA messages.</t>
    </section>
    <section anchor="sec-spd">
      <name>Inter-domain Source Path Discovery</name>
      <t>SPA messages can be used for source path discovery at the same time as advertising source prefixes. In the "Limited Propagation of Prefixes" scenarios (see section 4.1.1 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>), the propagation of BGP Update messages may be limited due to routing propagation policies (e.g., NO_EXPORT), but the SPA messages will be propagated because they are separate from routing Updates and do not have NO_EXPORT attached. Thus, the "hidden paths of source prefixes" can be discovered through SPA messages by the Validating ASes.</t>
    </section>
    <section anchor="sec-efp-urpf-plus">
      <name>EFP-uRPF Enhanced by SPA</name>
      <t>This section describes how to use SPA for enhancing EFP-uRPF.</t>
      <section anchor="hidden-prefixes-scenario">
        <name>"Hidden Prefixes" Scenario</name>
        <t>Consider the "Hidden Prefixes" scenario (e.g., the DSR scenario) described in section 4.1.2 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. <xref target="fig-dsr"/> shows an example of the DSR scenario, which is similar to Figure 3 in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. The propagation of BGP Updates of P1, P3 and P6 are shown in the figure. The anycast server in AS3 receives requests from users and tunnels the requests to the edge server in AS1. Then, the edge server will respond directly to the users by using the anycast IP address (belonging in P3) as the source address in the response packets.</t>
        <t>Prefix P3 is the anycast prefix and is only advertised by AS3 through BGP. Suppose AS2 or AS4 enables EFP-uRPF at customer-facing interfaces. The packets with source addresses belonging in P3 sent by AS1 will be blocked improperly when the packets arrive at the customer-facing interfaces of AS2/AS4. In this example, P3 is the hidden source prefix of AS1.</t>
        <figure anchor="fig-dsr">
          <name>An example of the DSR scenario.</name>
          <artwork><![CDATA[
                                +---------------+
                Anycast Server+-+    AS3(P3)    |
                                +----+/\+-------+
                                      /
                   P3[AS3](Downward) /
          P1,P6[AS4,AS2,AS1](Upward)/ 
                                   / (C2P)
                          +---------------+
                          |    AS4(P4)    |
                          ++/\+--+/\+-----+
      P3[AS4,AS3](Downward) /     |
    P1,P6[AS2,AS1](Upward) /      |
                          /       |
                         / (C2P)  |
          +---------------+       | P3[AS4,AS3](Downward)
    User+-+    AS2(P2)    |       | P1,P6[AS1](Upward)
          +-----------+/\++       |
                        \         | 
P3[AS2,AS4,AS3](Downward)\        |
       P1,P6[AS1](Upward) \       |
                           \ (C2P)| (C2P)
                        +---------------+
           Edge Server+-+  AS1(P1, P6)  |
                        +---------------+
P3 is the anycast prefix and is only advertised by AS3 through BGP.
]]></artwork>
        </figure>
        <t>SPA can be used to solve the improper blocking problems in the "Hidden Prefixes" scenarios. In the above DSR scenario, AS1 can advertise the hidden source prefix P3 to Validating ASes (i.e., AS2 and AS4) through SPA messages. The propagation process of SPA messages is illustrated in <xref target="fig-dsr-spa"/>. After receiving the SPA message, AS2 and AS4 will take a union of the prefixes in the SPA messages and the BGP Update messages for constructing SAV tables (allowlists). As a result, P3 will be included in the source prefix allowlist at the customer-facing interfaces at AS2 and AS4. When AS1 sends packets with source address in P3, they will pass the validation at AS2 and AS4.</t>
        <figure anchor="fig-dsr-spa">
          <name>SPA for the DSR scenario.</name>
          <artwork><![CDATA[
                                +---------------+
                Anycast Server+-+    AS3(P3)    |
                                +----+/\+-------+
                                      /
                  P3[AS3](Downward)  /
         P1,P6[AS4,AS2,AS1](Upward) / 
        SPA:P3[AS4,AS2,AS1](Upward)/ (C2P)
                          +---------------+
                          |    AS4(P4)    |
                          ++/\+--+/\+-----+
     P3[AS4,AS3](Downward)  /     |
    P1,P6[AS2,AS1](Upward) /      |
   SPA:P3[AS2,AS1](Upward)/       |
                         / (C2P)  |
          +---------------+       | P3[AS4,AS3](Downward)
    User+-+    AS2(P2)    |       | P1,P6[AS1](Upward)
          +-----------+/\++       | SPA:P3[AS1](Upward)
                        \         | 
P3[AS2,AS4,AS3](Downward)\        |
       P1,P6[AS1](Upward) \       |
      SPA:P3[AS1](Upward)  \ (C2P)| (C2P)
                        +---------------+
           Edge Server+-+  AS1(P1, P6)  |
                        +---------------+
P3 is the hidden prefix of AS1 and is advertised by AS1 through SPA.
]]></artwork>
        </figure>
      </section>
      <section anchor="limited-propagation-of-prefixes-scenario">
        <name>"Limited Propagation of Prefixes" Scenario</name>
        <t>Consider the "Limited Propagation of Prefixes" scenario (e.g., the NO_EXPORT scenario) described in section 4.1.1 of <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. <xref target="fig-no-export"/> shows the NO_EXPORT scenario, which is similar to Figure 2 in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. AS1 advertises only prefix P1 to AS2 through a BGP Update message with the NO_EXPORT community. As a result, AS4 learns no route of AS1 directly from AS2.</t>
        <t>If AS4 enables EFP-uRPF with algorithm A at the customer-facing interface connected to AS2, the packets with source addresses in P1 or P6 will be blocked improperly.</t>
        <figure anchor="fig-no-export">
          <name>An example of the NO_EXPORT scenario.</name>
          <artwork><![CDATA[
                    +-----------------+
                    |     AS4(P4)     |
                    ++/\+--+/\+-------+
                      /     |
                     /      |
                    /       |
                   / (C2P)  |
    +---------------+       |
    |    AS2(P2)    |       | P1,P6[AS1]
    +---------+/\+--+       |
                \           |
P1[AS1] NO_EXPORT\          |
                  \         |
                   \ (C2P)  | (C2P/P2P)
                  +---------------+
                  |  AS1(P1, P6)  |
                  +---------------+
P1 with NO_EXPORT is advertised to AS2
]]></artwork>
        </figure>
        <t>SPA can be used to solve the improper blocking problems in the "Limited Propagation of Prefixes" scenarios. In the above NO_EXPORT scenario, AS1 can send an SPA message to AS2, and then AS2 will propagate the message to AS4. Note that NO_EXPORT community does not apply and never attached to SPA messages. The propagation process of SPA messages is illustrated in <xref target="fig-no-export-spa"/>. AS4 deploying EFP-uRPF with either Algorithm A or Algorithm B will learn the existence of AS1 from the interface connected to AS2. AS4 will take the union of prefixes (and also AS paths) learned from BGP and SPA messages. Thus AS4 will include the source prefixes P1 and P6 of AS1 in the source prefix allowlist for the interface with AS2. When data packets with source addresses in P1 or P6 arrive at AS4 via AS2, they will pass the validation at AS4.</t>
        <figure anchor="fig-no-export-spa">
          <name>SPA for the NO_EXPORT scenario.</name>
          <artwork><![CDATA[
                    +-----------------+
                    |     AS4(P4)     |
                    ++/\+--+/\+-------+
                      /     |
                     /      |
    SPA:P1[AS2,AS1] /       |
                   / (C2P)  |
    +---------------+       |
    |    AS2(P2)    |       | P1,P6[AS1]
    +---------+/\+--+       |
                \           |
P1[AS1] NO_EXPORT\          |
SPA:P1[AS1]       \         |
                   \ (C2P)  | (C2P/P2P)
                  +---------------+
                  |  AS1(P1, P6)  |
                  +---------------+
P1 without NO_EXPORT is advertised to AS2 through SPA
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-converge">
      <name>Convergence Considerations</name>
      <t>Validating AS needs to update SAV rules when source prefixes of Source AS or the paths of source prefixes change. The following <bcp14>RECOMMENDED</bcp14> actions will result in more effective re-convergence:</t>
      <ul spacing="normal">
        <li>
          <t>Applying hysteresis in the case of withdrawal of source prefixes or paths of source prefixes: During the re-convergence, the SAV source prefix lists will include some withdrawn prefixes for a little longer, and there may exist improper permitting shortly but no improper blocking.</t>
        </li>
        <li>
          <t>Updating source prefixes or paths of source prefixes as soon as possible when SPA message is received: During the convergence, any possibility of improper blocking will be minimized or eliminated if new source prefixes are announced in SPA first and then some delay is allowed before the related services (utilizing the new source prefixes) are activated online.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>There are two main threats associated with SPA: prefix hijacking and path hijacking.</t>
      <ul spacing="normal">
        <li>
          <t>Prefix hijacking. A malicious AS may send an SPA message which hijacks the source prefixes of a Source AS. The Validating AS that receives the message may improperly include the source prefixes in some source prefix lists, which results in improper permitting but no improper blocking.</t>
        </li>
        <li>
          <t>Path hijacking. A malicious AS may send an SPA message which carries a manipulated AS_PATH, which can be a forged-origin attack or a forged-path-segment attack. The Validating AS that receives the message may improperly include the source prefixes in some source prefix lists, which results in improper permitting but no improper blocking.</t>
        </li>
      </ul>
      <t>Existing mechanisms for detecting and preventing BGP prefix hijacking and BGP path hijacking can be used to deal with the above two threats.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>There is no IANA requirement.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the comments from XXX.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-12"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-architecture-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="31" month="August" year="2025"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-02"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
      </references>
    </references>
    <?line 271?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA91be3MTRxL/fz/FnPlHOiwZGRcBVV4CG3DFGMWyE3JApUa7
I2ni1c5mZ9dGgPNZ7rPcJ7vunsfuSivJ5LgqEhUBaXce/fx190yn0+kEucxj
0WcjVWShYMNMTOQ7NoiuRJZLLeYiydlEZew4yUXWidScy4SNBj+dHp0HfDzO
xBXMHQ7WjolUmPA5bBBlfJJ3piKZdjS/SkTekZXhHZ3yzr1eoMZaxSIXuh8U
acTpC/7TD0L4e6qyRZ/pPAp0MZ5LraVKzhcprH58dP40CGSa9VmeFTrfv3fv
0b39gGeC99mZKnKZTINrlV1OM1WkfUfdpVjAw6hvSEeiDpHMIOBFPlNZP2Cd
gDGZ6D477bJnQDz8NPyc8sQ9UNmUJ/I9z4GcPnte8Gsh4bEAxuI+Q5YTnnw/
o+fdUM3hXShz4OSxkL9JWiJURZIjc09mMuFBZd+TLvtRJn7bE56EM1jRPqxv
/a+ZSqbTAoYUCYwcq4znILKSlt9lEoff4/fu+2kY83FXREU3TD6Joh+6bJTJ
jM89UT+oXF7ymKdFJMt3ddouRgN2ejw6L4m51DTy+0TqvDtVV56IZ1zmM5Hp
cZFNd9mLQ7Z/7+GjR1WaLhKZi4iNcrQQpiZsMBeZDGtkHnbZifQkHoK66Ged
qnMN3IJmcEUweQ37lwTmKpYRaC63g24vrERlc9jhCuyWsbOnTx5+de8Avx53
DrtS5JNGF0gzNY7FvKORK3S8rTN4Fs5AEGFeZLCTTCZL2x7sf9XrB0G32w2C
TqfD+FjnGQ/Bvs9nUjPwzYIcHHZOlQZJ5ooVWmwEgxZ4e5vNhdZ8CjPQ77kd
ALJgMxlFImHarJDSCjCMJxGLpA4VjMRhoF83NOX5jHS4NKfLzmEQD8MCSF7g
APEOLAVnyyWgAXLCGWhVzzWL5aVgR0+HneJs+JSFoPaxYHIOLF6BxYwXiFZd
ZuQxBwpiEQR30P8zFRUhWgX7cEeLECWdqZsg8Gu9top8y0B2HIU2NzzXyTFc
DKIoAxmxnzjaEC3bAkrbJakkE4Qkza5FHMMqbK50DiRrZP7Dh08zlpsb0CdJ
Gv7weKGlvrXMZBLG4LowyjFrhe8W0jN1DdYx43kp2jlfsBm/ssJNRcbGsQov
cRVLHC5MmtahSHgmFVEk22yn2Up23PhDmYFRs5HIwFzYmQD7BvEdjs7afinW
0gIWFkZjB91edx8X/3SptUkPskLVOoPcAdWAd5AR7ZzIOUHQEFjnU6NgmDL0
Y1fo6/1J+tBYURk1ahiPY3Udg25B42AzEPIUQGBnwkNUADhlDCtkPGapKB/T
XvAdzSQTbFzIOEduvE7TTM5BuvGCjTlyqow+QK+w0uNnQ5aZUMo81qiky36e
NXg8kGAEiTtZ0ZKCCRvNahcU4j2Y7JaEXEvwiAmgMEISRFBgJXdgkDcIwQip
imkThS810S8jwUmhM07oA+YPCYcI5USGVVYAKvJrAcwMRsCBRcUIid6ityoQ
39x02YAl4rrucpZJsKE4xtC1FWKRGXiZiKhLGZaHXMS0mYhTj7viNqhbg9td
epXPCu2gkeT0v4Et6mCFUABfEKKWY7CpSMQYZI0HiXe5SCL4joZQWsC4yImU
SGg5JZcC8nIVqtjMwJTP2FSizMgJaJzcNa/qH4m5c4edi2wuExWr6YKI25zo
GsEvhzTcRGVyKhuMfIJ4OxgR6xb4R33CzsGIXc9kOLNTKVGpSgenuOAAm6xM
AwQUIK36pF3vC5pUkRWxsMoMVYLxSzsauQ1AVz4AWZGcid8LwFdkWGM6Cfni
VBiIgXQYI1Kk2c6Li9H5zq75l52+pO9nRz9eHJ8dHeL30fPByYn/EtgRo+cv
L04Oy2/lzCcvX7w4Oj00k+Epqz0Kdl4MftkxjOy8HJ4fvzwdnNhwUHVq1DsA
AkZ0tErQA2Iw1wGYS5jJsXHWx0+G//l37wCc9h8Qsvd7vUcQHM2Ph72vDuDH
NSCW2U0lYJjmJ+h5EfA0FTzDVcBPwYJTmfMYRWyCIHpeJiCd+udrlMzbPvt6
HKa9g2/tA2S49tDJrPaQZLb6ZGWyEWLDo4ZtvDRrz5ckXad38Evtt5N75eHX
38UAQKzTe/jdt4HNk1ZSnUZXMjkUVHWQQd0CDUsbr+Ce178No4CrSW2oFYZJ
X4RFA4R9wi2IoFA9Bp06nVBRspVwKmxyk5cvrP8ICy02CIKxeH8GbOU55IE8
vBQ5DfMQABYaK4QORYmUXt2utGRT50YYMK+h7oE6+RqM0YCAxBQqkiENANBE
OkzQ3PvZjmVPYz416ZpbqWkvkJHxeU4hFReC91dSFRp44kkCFUwIc8vsuyI5
YOi0mI9F5jEqoZ9ONOWwFr/kDiwHo7aRagUBaxJDdptFbsRH4KuqOwxr1MF+
Q4hmUL3nkImaUK+h2gP7gPgEk+2zwejX4eD8OSRKOWBEkQsCCQg7r22N9Nas
1yRZWtzpQCNSYGnaRJNLXp1xbtYw7jioCA5jZRnPJUhnbZKczyALm87qSQHs
hJMSIaczqPtNSHFF1PJT2m1SZMRKajNYUaWeFkwg4nZmKqU5Bi61AjCmgbWX
Zps5mFFpFGklM0YfhoQ5BmQlhaJRTCopICxwbFP/0ZnP8XdNUpIsoCTKvQCc
b7gcwIrdZaeUenoPtT7j5bzrkhIv6wgpAtdQIIBaPCZMWJU0RdFmHARbhNLF
pFsLj4DRTXNaRKUE5hpOwTg98tMdGqE95xL+AmOuZiUr1bIV4PbKpKzGPluN
srui8Zp6S96xaATeY0tjVJCPuKqiukCqYhlKmNIS3Wl3FyLer0evhi/Pzttl
klgTK5UM45IK1L6gio0iO9mLFimnAmICxbvf1tqgSZcVGRUVtn5LRA4ezjAT
P4ec2XB7m3KRFO10iqbW5LrWRpeMz9iZL4iOEsi5Q3+CYa1LTNJOkaWTThoX
+saWQE6hLifSDBIXf7Rjz2oFrVcv+Sk93Hlu2CrtZWTtJQieQO4NtZSBv9WB
ZW1uVLbsz21WS9M+Q/GOxyQTOe1EOoOszpxSgNDFOz5PY+GQqI4pPrJWEOmp
nELlxu7fotRrpOJ8k/WTcQx7u2x4n0xs+MDYIqWTFr0mRIA7dTGAp83xB0XS
+2U9kEH+LrDuJxsGnWbGcvMC0Dc2Ec+PseFTRFNRW69HW5mkt/aWvAiicKqo
dsRzGMgP7DJmM7DAwhdGjtjjoa84WmX0hr2G99suDi9VJpZ1s5kWLi1AO7Qp
JQhM6oYgYI5stEneK0gOlKGonJeBCqB0LlKs4uHFPgbgwegAbJ+DCnXpXA0n
KOVRidVuNWfZkK8QxyDMJDfU9Dwu0ekYWr49LrN1h0FOuzrPMtCxw/71NNGR
92h/D7ixwA/SsFa/WxFbUwph5vZQzH/88UfAtnzuduqfuyszBlY35rjubucu
PRzdb6Hq4fPxdnvc3Xtzd+0ezZ+9pnHD+69h87etQ3Cva55F7dow8MPhAxhw
sAvyg/96b1sXKQ3bY7fZdY+1nuwP2xuGbhdY+fmIfwExreHBVlHdNQLyYnLr
Er/ITp1nVq7neK7za4ds3HOPbR1jBVIfsyIDz28jtTTzQleMZ7813G97CZmZ
louSgzUbooT8hmsJf+O/fWQBUYXiWabMj/ILrZLhl9po6G+MnD5usZ+N1nOE
QF1xM6CiRYHlQXvT7qtrfgZgJfD40Gd3bPxldJH8zc5gY/jt7thsuJoEQ3TR
KrZnkNtvE9YnHmUWzMd4plkP/AjG9TJrLUSCfICo5XKgJbuiu0uRBOUE1tJe
UyIs5wPwPcSQh2cE1dQP6/sYUrc8o3yVsg8rTzo7waPkCYC+jf4u6FbWqJFj
Yk3OL0EArEhsJmJr/VqRWqPCnAWLxoQdc8UQwnOe4eWYOTuHHSh+tsrz9zYQ
ipdiEA+LOKcQ5OKePZ2J/GVQ8z3GLYIejKgwa+8dUKsQbiO9KUSbsGyO+Axh
KdfGAcrz0ZX1/54BcjU+Voetj4+sEiDxJN0j+XIY/cICZHN8/NQA6Tle5rYy
pvnzhQfIkrPGefXP/zFoNpDxxQZNV/lX82kXOpejZq8aIlaiJqK8i5yuNG+M
mViZbz3ZWVep3/pIqFq5l6cft6jf/+TBkavfE9UR71KV5b6Kb6ZgY/W+/2er
d9KeU5tNflwi0MMNMCo4LfKGMFmeZJckh2o+hxCcL5YiI4bpWPAs0SwxJ1/C
WZAvt6myh00xBB1PmmtW2pLHU5XBFxi9NX5iGE9gfZNwoefWSs/mwhbjZg/r
5uGDDYXsplC57Efr8N7gWAXq1/jmMsqvjx9VhF/zcs3bjai+hOdrkTzwXG1B
66VlLH9rSXhT+f4xGPZojdLw3lTfrlL/ZuNbB7hIIH7ZGzbD7m1C+MdbQG0D
yPaMJZaOVMdUY7o1GPXgsb4EWUWSz1KI3P6ofakwaUI2V55gMouHmNWLTuew
NlNPCJFMHtt0e2PGQwZ7qugFQEMDMJl+MTzt5mlKl4ARSwQeArrjblzn8xY2
Xle+vAFsi0Qaq0X1LNrYgKA2UDaogJyq/nxsREBoag4ysWdFJKFHVAJSUuZa
FOwuFU50zulKJ182tVA4PNY4xZz4t82+eIeDm2BQwDHL4ip0uX71nnr5jnbY
c2fDlvQt1ZJLFErGSGTEENVFqzetG8G9PHlEcq8k9xFiW8G0sVD6K6A/ZZ49
n9r/fdDfMwYjlmd/0egPSdGWAFBNqpuDwbrMek0ouMMgZYZNpgQfLn0mM9f2
si20A26WGrcANEVkeqdNVug7s8wBf0PTWHnvb6lad4nIsNVuai+Gyt6WSksP
46Eh0t3cQJZpeokhJRaTCSbpV3jL4ukHBqktZoCoTz3bC0BNmCl9ZMMeZKTG
tSvwuIk23+K5+q7PDgvf6F3f26SdKKM6tplm1hpQakhky5aJcmPq0IMJOWiX
4c2LyHxszARdMlMoKGN4in2AOSkM6osMk2y8RIYMfCXMV3pBGu7ZNzFNTWIK
cVG7pkdhTGCpv8ne5UU1KdVExJOFXULGGKqxb3olH3EJ+VwmkIi8Nx0mAu/W
TfODnFDjVVM7UNnwIw11E5nhGZzLL0jykYhBkuh+aHd0nz5BqzI6jU2vERTW
Eg/nWkUOpL533DRs3DY7oz2adpgEm8u66HsjEYIggM9Gx9P2LV1wo4KpteZa
Meq+ACQQHO/OtFahpJUp3FG3p7WtmfyNG5khh9Rp4R8ZfQ+XBmIP75xjC4Ki
EE5G1ZSamYLUzNONoR2bREuPN65cBxDK0PwFbzWRw10rF4abMghptdbgVbu+
pxTRgYY2ecZmjxguSe2T5BNifoG2h01CMi2M8djGrF0/yLTmoH9PRdSxfWSU
jV4y8nn7BjUIZjE1TaH0/i8q1yPXZl3pqkZ4iwS2k3uLzSAvT+gnJpqNVk0v
ajparm0iATjujypMJYJuZD3IdjYNTgfNbih5wr0LSjq+oMFZ2VBMzjwILxPI
UrGrgJqMITabdkERfbMzgSRaYMB9gRAHCkoufZcCVibUlUwZ9atXr+z/tjQG
doIg+C8mA17FrjgAAA==

-->

</rfc>
