<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-sidrops-aspa-analysis-02" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="ASPA analysis">An Analysis of ASPA-based AS_PATH Verification</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-aspa-analysis-02"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Lab</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Wang" fullname="Yangyang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangyy@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="February" day="21"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 69?>
<t>Autonomous System Provider Authorization (ASPA) is very helpful in detecting and mitigating route leaks (valley-free violations) and a majority of forged-origin hijacks. This document does an analysis on ASPA-based AS_PATH verification to help people understand its strengths and deficiencies, and some potential directions of enhancing ASPA are provided.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Autonomous System Provider Authorization (ASPA) is a technique for verifying AS_PATHs in BGP updates <xref target="I-D.ietf-sidrops-aspa-verification"/><xref target="I-D.ietf-sidrops-aspa-profile"/>. Each AS can register ASPA records (also ASPA objects) in the RPKI to authorize a set of ASes as its providers. An AS can obtain ASes' ASPA records through RTRv2 protocol <xref target="I-D.ietf-sidrops-8210bis"/> and conduct AS_PATH verification based the records. ASPA-based AS_PATH verification can detect and mitigate route leaks violating the valley-free principle and path manipulations such as forged-origin or forged-path-segment attacks.</t>
      <t>ASPA can significantly enhance AS_PATH verification and is promising to be widely deployed. Despite of the strengths of ASPA, there are also some deficiencies. This document provides a detailed analysis on the strengths and deficiencies of ASPA. The document can help people deploy ASPA properly and provide some potential directions of enhancing ASPA.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The usage of terms follows <xref target="I-D.ietf-sidrops-aspa-verification"/><xref target="I-D.ietf-sidrops-aspa-profile"/>.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="aspa-strengths-and-disclaimers">
      <name>ASPA Strengths and Disclaimers</name>
      <t>ASPA records can be registered by an AS to authorize all its provider ASes. For the two ASes with mutual transit relationship, the two ASes will put each other AS into its own ASPA record (i.e., each AS considers the other AS as its provider).</t>
      <section anchor="protecting-against-route-leak">
        <name>Protecting Against Route Leak</name>
        <t>In full ASPA deployment (within a given region of interest), all "route leaks" (valley-free violations <xref target="RFC7908"/>) are detectable. Route leaks involve one of the following four valley-free violations:</t>
        <ul spacing="normal">
          <li>
            <t>A route is propagated through a P2C (Provider-to-Customer) link and then a C2P (Customer-to-Provider) link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2P (Peer-to-Peer) link and then a C2P link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2P link and then a P2P link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2C link and then a P2P link.</t>
          </li>
        </ul>
        <t>It is expected that in partial ASPA deployment, not all route leaks are detectable.</t>
      </section>
      <section anchor="protecting-against-path-manipulation">
        <name>Protecting Against Path Manipulation</name>
        <t>Path manipulation can be path forgery or path tampering (i.e., insertion or removal of unique ASN) in this document. Forged-origin hijack and fake link-based hijack are all path manipulations.</t>
        <t>In full ASPA deployment (within a given region of interest), ASPA protects against a majority of forged-origin hijacks. Each AS can attest its upstream ASes, so provider or lateral peer cannot be deceived. Customer could be deceived because ASPA does not provide attestations to downstream ASes or peering ASes.</t>
        <t>Even in full ASPA deployment, not all path manipulation attacks can be detected. ASPA does not guarantee path correctness like that provided by BGPsec <xref target="RFC8205"/>.</t>
      </section>
    </section>
    <section anchor="aspa-deficiencies">
      <name>ASPA Deficiencies</name>
      <t>This section describes the deficiencies of ASPA-based AS_PATH verification in detail.</t>
      <section anchor="hard-to-detect-bogus-records">
        <name>Hard to Detect Bogus Records</name>
        <t>An AS can unilaterally authorize a set of its provider ASes. Under the one-direction authorization, an AS may intentionally or unintentionally register bogus records that are hard to be discovered. An AS maliciously registers bogus records that open a door to potential attacks.</t>
        <t><xref target="fig-bogus"/> shows an example of path manipulation attack based on bogus ASPA records. AS4 lies in that the nonadjacent AS3 is its provider in the ASPA record. The attack cannot be detected even when AS1, AS2, AS3, and AS5 register ASPA records correctly and enable ASPA-based AS_PATH verification locally. As a result, AS5 will wrongly consider its traffic to AS1 traverses AS3, while the real forwarding path to AS1 is through AS2 instead of AS3.</t>
        <figure anchor="fig-bogus">
          <name>Path manipulation based on bogus ASPA records</name>
          <artwork><![CDATA[
              +-------+
              |AS1(P1)|Originate route
              +-------+
     path[1] /        \
            /(C2P)     \(C2P)
    +-------+           +-------+
    |  AS2  |           |  AS3  |
    +-------+           +-------+
           \             *
  path[2,1] \(C2P)      * (faked C2P in AS4's
             \         *   bogus ASPA)
              +-------+ ASPA{AS4, [AS2, AS3]}
              |  AS4  | Offender
              +-------+
      path[4,3,1] |(C2P)
              +-------+
              |  AS5  | Victim
              +-------+
  * All ASes register ASPA records
  * AS4's record states a faked C2P link with AS3
  * AS5 enables ASPA-based path verification
]]></artwork>
        </figure>
      </section>
      <section anchor="fail-to-detect-aspath-manipulation-by-a-provider">
        <name>Fail to Detect AS_PATH Manipulation by a Provider</name>
        <t>ASPA-based AS_PATH verification cannot effectively detect the AS_PATH maliciously shortened by a provider, which has been acknowledged in <xref target="I-D.ietf-sidrops-aspa-verification"/>.</t>
        <t><xref target="fig-path-shortened"/> shows an example. AS1 originates the BGP route and propagates the route to other ASes. The AS_PATH received by AS5 is path[4,3,2,1]. However, AS5 maliciously shortens the path by falsely claim a fake link with AS2 before AS5 propagates the route to AS6. AS6's traffic to AS1 may be hijacked by AS5 if the path[5,2,1] is shorter than any other AS_PATHs. In the example, AS5 may not intend to drop data traffic from AS6. That is, AS5 (provider) wants AS6 (customer) to prefer AS5's transit path for increasing revenue.</t>
        <t>In this case, the attack cannot be detected even when all the ASes register the correct ASPA records and all the ASes other than AS5 enable ASPA-based AS_PATH verification.</t>
        <figure anchor="fig-path-shortened">
          <name>AS_PATH maliciously shortened by a provider</name>
          <artwork><![CDATA[
                  +-------+
                  |  AS4  |    path[4,3,2,1]
                  +-------+----------------
      path[3,2,1]/         \               \
                /(C2P)      \               \(C2P)
        +-------+            \path[4,3,2,1] +-------+
        |  AS3  |             \             |  AS7  |
        +-------+              \            +-------+
  path[2,1] |             (C2P) \             /
      (C2P) |                    \ Offender  /
        +-------+ (Fake link) +-------+     /
        |  AS2  |*************|  AS5  |    /
        +-------+             +-------+   /path[7,4,3,2,1]
    path[1] |          path[5,2,1]|      /
      (C2P) |     (path shoterned)|(C2P)/(C2P)
        +-------+             +-------+/
        |AS1(P1)|             |  AS6  | Victim
        +-------+             +-------+
      Originate route
]]></artwork>
        </figure>
        <t>AS_PATH manipulation by a provider may also be used to do malicious route leaks. ASPA is not designed for defensing path manipulation. So, some malicious route leaks with path manipulation involved cannot be prevented.</t>
        <t><xref target="fig-malicious-leak"/> shows an example. AS2 is AS1's provider and arguably it may not leak its customer's prefix (P2) intentionally. But to increase revenue, AS2 may maliciously leak P2 with a modified AS_PATH (i.e., AS3 is removed) to AS4 for attracting more traffic to traverse AS2. Sometimes this attack may happen and goes undetected.</t>
        <figure anchor="fig-malicious-leak">
          <name>Malicious route leak</name>
          <artwork><![CDATA[
        +-------+
        |  AS4  |-------------
        +-------+             \
P1 path[2,1]|                  \
P2 path[2,1]|                   \ P2 path[3,1]
       (C2P)|                    \(C2P)
        +-------+ P2 path[3,1]+-------+
Offender|  AS2  |-------------|  AS3  |
        +-------+    (P2P)    +-------+
               \             /
      P1 path[1]\           /P2 path[1]
                 \(C2P)    /(C2P)
                  +---------+
                  |   AS1   |Originate route
                  | (P1&P2) |
                  +---------+
]]></artwork>
        </figure>
        <!-- ## Cannot Distinguish Leak and Hijack for an Invalid AS_PATH
Existing ASPA verification algorithm can identify Invalid AS_PATHs, but it cannot distinguish leak and hijack for an Invalid AS_PATH. The main reason is that ASPA records only focus on registering all provider ASes while not indicating the adjacency/topology information. When the Hop-check(x, y) function returns "Not provider+", the algorithm does not know whether the real cause of the result is i) ASy is ASx's customer/peer instead of provider or ii) link(x,y) is a fake link. Therefore, when the algorithm returns Invalid, it is not able to indicate whether the path is caused by a fake link-based hijack or not. 

For operators, it's instructive to know the type of an Invalid AS_PATH. If there exists no hijack, the Invalid AS_PATH is likely to be an unintentional route leak. Otherwise, the network may be attacked by path manipulation attacks.  -->

</section>
      <section anchor="not-directly-applicable-to-ibgp-ingress-and-ebgp-egress-verification">
        <name>Not Directly Applicable to IBGP Ingress and EBGP Egress Verification</name>
        <t>IBGP ingress verification and eBGP egress verification are meaningful in many scenarios. IBGP ingress verification is to check the AS_PATH received through iBGP connections. IBGP ingress verification helps an AS do verification on any BGP routers like non-ASBRs. EBGP egress verification means verifying the AS_PATH before sending it to the neighbor AS. It can prevent an AS from sending routes with Invalid AS_PATH to its neighbor ASes (just like eBGP egress RPKI-ROV <xref target="RFC8893"/>).</t>
        <t>However, current ASPA document <xref target="I-D.ietf-sidrops-aspa-verification"/> does not specify how to do iBGP ingress verification. For iBGP ingress verification, the router (e.g., an RR) conducting the verification may not have BGP sessions with the neighbor AS that propagates the route and thus does not know the local BGP role with respect to the neighbor AS. Even so, iBGP ingress verification is doable because the router can obtain the local BGP role from the ASPA records of local AS. In <xref target="fig-egress-veri"/>, when RR wants to do iBGP ingress verification, it can look up AS2's own ASPA records. If AS1 is listed as a provider, then apply the Downstream verification algorithm. If AS1 is not listed as a provider, then apply the Upstream verfication algorithm. Such an iBGP ingress verification also works correctly in RS and RS-client scenarios.</t>
        <figure anchor="fig-egress-veri">
          <name>IBGP and eBGP verification</name>
          <artwork><![CDATA[
          +-------------------------------+
          | AS2                           |
   path[1]| +-----+    +-----+    +-----+ |path[2,1]
AS1-------|->ASBR1|----> RR  |---->ASBR2|-|----->AS3
         /| +-----+   /+-----+    +-----+ |\
        / |          /                    | \
       /  +---------/---------------------+  \
      /            /                          \
  eBGP ingress   iBGP ingress              eBGP egress
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-sidrops-aspa-verification"/> does not specify how to do eBGP egress verification either. To try to do this, the router should add its own AS (i.e., AS2) to the AS_PATH and then performs ASPA-based AS_PATH verification from the perspective of next-hop AS (see Section 7.2 in version-15 of <xref target="I-D.ietf-sidrops-aspa-verification"/>). According to the verification result, the router decides to propagate the route or not. 
In <xref target="fig-egress-veri"/>, ASBR2 would add its own AS (i.e., AS2) to the AS_PATH. If the BGP role of ASBR2 with respect to AS3 is customer/lateral peer/RS/RS-client, the Upstream verification algorithm will be conducted. If the BGP role of ASBR2 with respect to AS3 is provider, the Downstream verification algorithm will be performed. The verification process also works well in mutual transit scenarios.</t>
        <!-- The problem of eBGP egress verification described above is that not all Invalid AS_PATHs (leaked routes) can be prevented from being propagated. Suppose the next-hop AS (i.e., neighbor AS3) is a lateral peer or provider. When the preceding AS (i.e., neighbor AS1) is also a lateral peer or provider but does not have an ASPA registered, the verification result can be Unknown (rather than Invalid). The route leak cannot be prevented in the case.  -->

<t>The relationship between AS1 and AS2 can sometimes be obtained by ASBR2 from AS2's ASPA records. If AS1 is listed as a provider in the AS2's ASPA records, then the above route leak can be detected and prevented. If AS1 is not listed in the AS2's ASPA records, ASBR2 cannot decide AS1 is a lateral peer or a customer. Therefore, the above route leak cannot be detected directly.</t>
        <t>Overall, iBGP ingress verification is doable with help of local AS's own ASPA records, while it is not possible to do eBGP egress verification correctly without more complexity.</t>
      </section>
      <section anchor="not-applicable-to-complex-relationship-scenarios">
        <name>Not Applicable to Complex Relationship Scenarios</name>
        <t>AS relationships in practical networks may be more complex than the traditional P2C/P2P model <xref target="as-rela-1"/><xref target="as-rela-2"/>. In ASPA, only the complex relationship of mutual transit relationship has been considered. The followings are some other complex scenarios that are not covered by ASPA:</t>
        <ul spacing="normal">
          <li>
            <t>Hybrid relationship <xref target="as-rela-1"/><xref target="as-rela-2"/>. Two ASes may agree to have different traditional relationships for different Points-of-Presence (PoPs). A hybrid relationship may be dependent on IP versions or/and PoP locations (see <xref target="fig-hybrid-rela"/> for examples), even prefixes (i.e., different relationships/policies for different prefixes).</t>
          </li>
        </ul>
        <figure anchor="fig-hybrid-rela">
          <name>Hybrid relationship</name>
          <artwork><![CDATA[
+-------+  Europe P2C  +-------+
|       |-------------->       |
|  AS1  |              |  AS2  |
|       |-------------->       |
+-------+   Asia P2P   +-------+

      (a) Location-dependent


+-------+   IPv6 P2C   +-------+
|       |-------------->       |
|  AS1  |              |  AS2  |
|       |-------------->       |
+-------+   IPv4 P2P   +-------+

      (b) IP version-dependent
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Partial transit relationship <xref target="as-rela-1"/><xref target="as-rela-2"/>. For a customer, the provider offers transit only toward the provider's peers and customers (or specific regions), but not the provider's providers, or restricts transit to a specific geographic region. <xref target="fig-hybrid-rela"/> shows an example. AS2 is the partial transit provider of AS1. AS2 should only propagate AS1's route to AS4 (i.e., AS2's peer) and AS5 (i.e., AS2's customer), but should not propagate the route to AS3 (i.e., AS2's provider).</t>
          </li>
        </ul>
        <figure anchor="fig-partial-transit">
          <name>Partial transit relationship</name>
          <artwork><![CDATA[
        +-------+
        |  AS3  |
        +-------+
  path[2,1] |
(route leak)|
            |
       (C2P)|
        +-------+  path[2,1]  +-------+
Offender|  AS2  |-------------|  AS4  |
        +-------+    (P2P)    +-------+
     Partial|    \                |
     transit|     \ path[2,1]     | path[4,2,1]
            |      ----------     |
    path[1] |           (C2P)\    |(C2P)
        +-------+             +-------+
        |  AS1  |             |  AS5  |
        +-------+             +-------+
      Originate route
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Persistent valley-path (legitimate valley-path) (<xref target="valley-path"/>). There may be legitimate valley-paths, i.e., violating the valley-free principle but the AS_PATH is legitimate. According to BGP data analysis, the persistent valley-path can be 10% of all BGP paths.</t>
          </li>
        </ul>
        <figure anchor="fig-valley-path">
          <name>Persistent valley-path</name>
          <artwork><![CDATA[
  Originate route
    +-------+             +-------+
    |AS1(P1)|             |  AS3  |
    +-------+             +-------+
            \             /
      path[1]\           / path[2,1] (not route leak)
              \(C2P)    /(C2P)
              +---------+
              |   AS2   |
              +---------+
]]></artwork>
        </figure>
        <t>ASPA records do not support the registration of complex relationships except the mutual transit relationship. As a result, in the complex scenarios, AS_PATH cannot be effectively protected by ASPA-based AS_PATH verification.</t>
      </section>
      <section anchor="reduced-protection-capability-in-partial-deployment">
        <name>Reduced Protection Capability in Partial Deployment</name>
        <t>To verfify an AS_PATH, ASPA verification algorithms need to check each hop of the AS_PATH. When ASPA records of the ASes along the path are partially registered, not all hops in the path can be checked. In such partial deployment scenarios, ASPA may have a reduced protection capacity.</t>
        <t><xref target="fig-partial-deploy"/> shows two examples of partial deployment. In <xref target="fig-partial-deploy"/> (a), AS3 cannot detect the route leak of P1 induced by AS2 if AS1 has no ASPA record registered. This is because the Hop-check(AS1, AS2) function returns "No Attestation" and the final verification result is Unknown. In <xref target="fig-partial-deploy"/> (b), AS3 is deceived by AS2 who falsely claims AS1 is AS2's neighbor. The attack in the example is undetectable because AS1 registers no ASPA record and AS3 cannot judge the validity of the link between AS1 and AS2.</t>
        <figure anchor="fig-partial-deploy">
          <name>Partial deployment</name>
          <artwork><![CDATA[
                            +-------+
                            |  AS3  |
                            +-------+
                            /
                           / path[2,1] (route leak)
   No ASPA                /(C2P)
  +-------+  (P2P)  +-------+
  |AS1(P1)|---------|  AS2  | Offender
  +-------+ path[1] +-------+
Originate route

      (a) Route leak in partial deployment

                            +-------+
                            |  AS3  |
                            +-------+
                            /
                           / path[2,1] (path manipulation)
   No ASPA (no adjacency) /(C2P)
  +-------+         +-------+
  |AS1(P1)|*********|  AS2  | Offender
  +-------+ path[1] +-------+
Originate route

      (b) Forged-origin attack in partial deployment
]]></artwork>
        </figure>
        <!-- ........................................................................ -->

</section>
    </section>
    <section anchor="reasons-of-aspa-deficiencies">
      <name>Reasons of ASPA Deficiencies</name>
      <t>This section summarizes three main reasons that result in deficiencies of ASPA:</t>
      <ul spacing="normal">
        <li>
          <t>ASPA record is authorized in one direction, e.g., an AS can unilaterally claim that another AS is its provider without the consent of other ASes. Related deficiencies:
          </t>
          <ul spacing="normal">
            <li>
              <t>Hard to detect bogus records</t>
            </li>
          </ul>
        </li>
        <li>
          <t>An ASPA record only focuses on including all provider ASes while ignoring other topology or relationship information. Related deficiencies:
          </t>
          <ul spacing="normal">
            <li>
              <t>Hard to detect bogus records</t>
            </li>
            <li>
              <t>Fail to detect AS_PATH maliciously shortened by a provider</t>
            </li>
            <li>
              <t>Not directly applicable to iBGP Ingress and eBGP egress verification</t>
            </li>
            <li>
              <t>Not applicable to complex relationship scenarios</t>
            </li>
            <li>
              <t>Reduced protection capacity in partial deployment</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The kind of method that verifies AS_PATH based on relationships does not guarantee path correctness like that provided by BGPsec.
          </t>
          <ul spacing="normal">
            <li>
              <t>Not all malicious route leaks are prevented</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document does not involve security problems.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>No IANA requirement.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Much thanks for the comments and inputs from Kotikalapudi Sriram.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-20" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-verification.xml">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="4" month="January" year="2025"/>
            <abstract>
              <t>This document describes procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This AS_PATH verification enhances routing security by adding means to detect and mitigate route leaks and AS path manipulations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-20"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-19" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="6" month="January" year="2025"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-19"/>
        </reference>
        <reference anchor="RFC7908" target="https://www.rfc-editor.org/info/rfc7908" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7908.xml">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-16" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>IIJ Research, Arrcus, &amp; DRL</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data and Router Keys from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-16"/>
        </reference>
        <reference anchor="RFC8205" target="https://www.rfc-editor.org/info/rfc8205" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8205.xml">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8893" target="https://www.rfc-editor.org/info/rfc8893" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8893.xml">
          <front>
            <title>Resource Public Key Infrastructure (RPKI) Origin Validation for BGP Export</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Volk" initials="R." surname="Volk"/>
            <author fullname="J. Heitz" initials="J." surname="Heitz"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>A BGP speaker may perform Resource Public Key Infrastructure (RPKI) origin validation not only on routes received from BGP neighbors and routes that are redistributed from other routing protocols, but also on routes it sends to BGP neighbors. For egress policy, it is important that the classification use the 'effective origin AS' of the processed route, which may specifically be altered by the commonly available knobs, such as removing private ASes, confederation handling, and other modifications of the origin AS. This document updates RFC 6811.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8893"/>
          <seriesInfo name="DOI" value="10.17487/RFC8893"/>
        </reference>
        <reference anchor="as-rela-1" target="https://www.usenix.org/system/files/nsdi19-jin.pdf">
          <front>
            <title>Stable and Practical AS Relationship Inference with ProbLink</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="February"/>
          </front>
        </reference>
        <reference anchor="as-rela-2">
          <front>
            <title>Inferring Internet AS Relationships Based on BGP Routing Policies</title>
            <author>
              <organization/>
            </author>
            <date year="2011" month="January"/>
          </front>
        </reference>
        <reference anchor="valley-path" target="https://ieeexplore.ieee.org/document/6363987">
          <front>
            <title>Valley-free violation in Internet routing - Analysis based on BGP Community data</title>
            <author>
              <organization/>
            </author>
            <date year="2012" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 385?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
