<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-idr-entropy-label-08" category="std" consensus="true" submissionType="IETF" xml:lang="en" updates="6790, 7447" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="RCA">BGP Router Capabilities Attribute</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-idr-entropy-label-08"/>
    <author initials="B." surname="Decraene" fullname="Bruno Decraene" role="editor">
      <organization>Orange</organization>
      <address>
        <email>bruno.decraene@orange.com</email>
      </address>
    </author>
    <author initials="J. G." surname="Scudder" fullname="John G. Scudder" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <email>jgs@juniper.net</email>
      </address>
    </author>
    <author initials="W." surname="Henderickx" fullname="Wim Henderickx">
      <organization>Nokia</organization>
      <address>
        <email>wim.henderickx@nokia.com</email>
      </address>
    </author>
    <author initials="K." surname="Kompella" fullname="Kireeti Kompella">
      <organization>Juniper Networks</organization>
      <address>
        <email>kireeti@juniper.net</email>
      </address>
    </author>
    <author initials="S." surname="Mohanty" fullname="Satya Mohanty">
      <organization>Cisco Systems</organization>
      <address>
        <email>satyamoh@cisco.com</email>
      </address>
    </author>
    <author initials="J." surname="Uttaro" fullname="James Uttaro">
      <organization>Independent Contributor</organization>
      <address>
        <email>juttaro@ieee.org</email>
      </address>
    </author>
    <author initials="B." surname="Wen" fullname="Bin Wen">
      <organization>Comcast</organization>
      <address>
        <email>Bin_Wen@comcast.com</email>
      </address>
    </author>
    <date year="2023" month="August" day="25"/>
    <area>rtg</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>bgp</keyword>
    <keyword>rca</keyword>
    <keyword>entropy label</keyword>
    <abstract>
      <?line 69?>

<t>RFC 5492 allows a BGP speaker to advertise its capabilities to its peer. When a route is propagated beyond the immediate peer, it is useful to allow certain capabilities to be conveyed further.  In particular, it is useful to advertise forwarding plane features.</t>
      <t>This specification defines a BGP transitive attribute to carry such capability information, the "Router Capabilities Attribute," or RCA. Unlike the capabilities defined by RFC 5492, those conveyed in the RCA apply solely to the routes advertised by the BGP UPDATE that contains the particular RCA.</t>
      <t>This specification also defines an RCA capability that can be used to advertise the ability to process the MPLS Entropy Label as an egress LSR for all NLRI advertised in the BGP UPDATE.  It updates RFC 6790 and RFC 7447 concerning this BGP signaling.</t>
    </abstract>
  </front>
  <middle>
    <?line 77?>

<section anchor="intro">
      <name>Introduction</name>
      <t><xref target="RFC5492"/> allows a Border Gateway Protocol (BGP) speaker to advertise its capabilities to its peer. When a route is propagated beyond the immediate peer, it is useful to allow certain capabilities to be conveyed further.  In particular, it may be useful to advertise forwarding plane features.</t>
      <t>This specification defines a BGP optional transitive attribute to carry such capability information, the "Router Capabilities Attribute", or RCA. (Note that this specification should not be confused with RFC 5492 BGP Capabilities.)</t>
      <t>Since the RCA is intended chiefly for conveying information about forwarding plane features, it needs to be regenerated whenever the BGP route's next hop is changed. Since owing to the properties of BGP transitive attributes this can't be guaranteed (an intermediate router that doesn't implement this specification would be expected to propagate the RCA as opaque data), the RCA encodes the next hop of its originator. If the RCA passes through a router that changes the next hop without regenerating the RCA, they will fail to match when later examined, and the recipient can act accordingly. This scheme allows RCA support to be introduced into a network incrementally. Complete details are provided in <xref target="tbrc"/>.</t>
      <t>An RCA carried in a given BGP UPDATE message conveys information that relates to all Network Layer Reachability Information (NLRI) advertised in that particular UPDATE, and only to those NLRI. A different UPDATE message originated by the same source might not include an RCA, and if so, NLRI carried in that UPDATE would not be affected by the RCA. By implication, if a router wishes to use RCA to describe all NLRI it originates, it needs to include an RCA with each UPDATE it sends. In this respect, despite its similar naming, the RCA is unlike RFC 5492 BGP Capabilities.</t>
      <t>This specification also defines an RCA capability, called "ELCv3", to advertise the ability to process the Multiprotocol Label Switching (MPLS) Entropy Label as an egress Label Switching Router (LSR) for all NLRI advertised in the BGP UPDATE.  It updates <xref target="RFC6790"/> and <xref target="RFC7447"/> with regard to this BGP signaling, this is further discussed in <xref target="elcv3"/>. Although ELCv3 is only relevant to NLRI of labeled address families, in general, a future RCA capability might be applicable to NLRI of any address family.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="tbrc">
      <name>BGP Router Capabilities Attribute</name>
      <section anchor="encoding">
        <name>Encoding</name>
        <t>The BGP Router Capabilities attribute (RCA attribute, or just RCA) is an optional, transitive BGP path attribute with type code 39. The RCA always includes a network layer address identifying the next hop of the route the RCA accompanies. The RCA signals potentially useful information, so it is desirable to make it transitive; the next hop data is to ensure correctness if it traverses BGP speakers that do not understand the RCA. This is further explained below.</t>
        <t>The Attribute Data field of the RCA attribute is encoded as a header portion that identifies the originator of the attribute, followed by one or more capability Type-Length-Value (TLV) triples:</t>
        <figure anchor="rcaformat">
          <name>RCA Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Address Family Identifier   |     SAFI      | Next Hop Len  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~             Network Address of Next Hop (variable)            ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~                   Capability TLVs (variable)                  ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The meanings of the header fields (Address Family Identifier, SAFI or Subsequent Address Family Identifier, Length of Next Hop, and Network Address of Next Hop) are as given in Section 3 of <xref target="RFC4760"/>.</t>
        <t>In turn, each Capability is a TLV:</t>
        <figure>
          <name>Capability TLV Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |        Capability Code        |        Capability Length      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~                  Capability Value (variable)                  ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>Capability Code: a two-octet unsigned binary integer that indicates the type of capability advertised and unambiguously identifies an individual capability.</t>
        <t>Capability Length: a two-octet unsigned binary integer that indicates the length, in octets, of the Capability Value field.  A length of 0 indicates that no Capability Value field is present.</t>
        <t>Capability Value: a variable-length field.  It is interpreted according to the value of the Capability Code.</t>
        <t>A BGP speaker <bcp14>MUST NOT</bcp14> include more than one instance of a capability with the same Capability Code, Capability Length, and Capability Value.  Note, however, that processing multiple instances of such a capability does not require special handling, as additional instances do not change the meaning of the announced capability; thus, a BGP speaker <bcp14>MUST</bcp14> be prepared to accept such multiple instances.</t>
        <t>BGP speakers <bcp14>MAY</bcp14> include more than one instance of a capability (as identified by the Capability Code) with different Capability Value.  Processing of these capability instances is specific to the Capability Code and <bcp14>MUST</bcp14> be described in the document introducing the new capability.</t>
        <t>Capability TLVs <bcp14>MUST</bcp14> be placed in the RCA in increasing order of Capability Code. (In the event of multiple instances of a capability with the same Capability Code as discussed above, no further sorting order is defined here.)  Although the major sorting order is mandated, an implementation <bcp14>MUST</bcp14> elect to be prepared to consume capabilities in any order, for robustness reasons.</t>
      </section>
      <section anchor="sending-the-rca">
        <name>Sending the RCA</name>
        <t>Suppose a BGP speaker S has a route R it wishes to advertise with next hop N to its peer.</t>
        <t>If S is originating R into BGP, it <bcp14>MAY</bcp14> include an RCA attribute with it, that carries capability TLVs that describe aspects of R. S <bcp14>MUST</bcp14> set the header portion of the RCA to be equal to N, using the encoding given above.</t>
        <t>If S has received R from some other BGP speaker, two possibilities exist. First, S could be propagating R without changing N. In that case, S need take no special action, it <bcp14>SHOULD</bcp14> simply propagate the RCA unchanged unless specifically configured otherwise. Indeed, we observe that this is no different from the default action a BGP speaker takes with an unrecognized optional transitive attribute -- it is treated as opaque data and propagated.</t>
        <t>Second, S could be changing R in some way, and in particular, it could be changing N. If S has changed N it <bcp14>MUST NOT</bcp14> propagate the RCA unchanged. It <bcp14>SHOULD</bcp14> include a newly-constructed RCA attribute with R, constructed as described above in the "originating R into BGP" case. Any given capability TLV carried by the newly-constructed RCA attribute might use information from the received RCA attribute as input to its construction, possibly as straightforwardly as simply copying the TLV; the details of this are specific to the definition of each capability. Any capability TLVs received by S that are for capabilities not supported by S will not be included in the version of R constructed by S.</t>
        <t>An implementation <bcp14>SHOULD</bcp14> send the RCA and its contained capabilities by default. An implementation <bcp14>SHOULD</bcp14> provide configuration control of whether any given capability is sent. An implementation <bcp14>MAY</bcp14> provide finer-grained control on propagation based on attributes of the peering session, as discussed in <xref target="Security_RCA"/>.</t>
        <t>We note that due to the nature of BGP optional transitive path attributes, any BGP speaker that does not implement this specification will propagate the RCA, the requirements of this section notwithstanding. Such a speaker will not update the RCA, however.</t>
      </section>
      <section anchor="receiving">
        <name>Receiving the RCA</name>
        <t>An implementation <bcp14>SHOULD</bcp14> accept the RCA and its contained capabilities by default. An implementation <bcp14>SHOULD</bcp14> provide configuration control of whether any given capability is accepted. An implementation <bcp14>MAY</bcp14> provide finer-grained control on propagation based on attributes of the peering session, as discussed in <xref target="Security_RCA"/>.</t>
        <t>When a BGP speaker receives a BGP route that includes the RCA, it <bcp14>MUST</bcp14> compare the address given in the header portion of the RCA and illustrated in <xref target="rcaformat"/> to the next hop of the BGP route. If the two match, the RCA may be further processed. If the two do not match, it means some intermediate BGP speaker that handled the route in transit both does not support RCA, and changed the next hop of the route. In this case, the contents of the RCA cannot be used, and the RCA <bcp14>MUST</bcp14> be discarded without further processing, except that the contents <bcp14>MAY</bcp14> be logged.</t>
        <t>In considering whether the next hop "matches", a semantic match is sought. While bit-for-bit equality is a trivial test of matching, there may be certain cases where the two are not bit-for-bit equal, but still "match". An example is when a MP_REACH Next Hop encodes both a global and a link-local IPv6 address. In that case the link-local address might be removed during Internal BGP (IBGP) propagation, the two would still be considered to match if they were equal on the global part. See Section 3 of <xref target="RFC2545"/>.</t>
        <t>A BGP speaker receiving a Capability Code that it supports behaves as defined in the document defining the Capability Code.  A BGP speaker receiving a Capability Code that it does not support <bcp14>MUST</bcp14> ignore that Capability Code.  In particular, it <bcp14>MUST NOT</bcp14> be handled as an error.</t>
        <t>The presence of a capability <bcp14>SHOULD NOT</bcp14> influence route selection or route preference, unless tunneling is used to reach the BGP next hop or the selected route has been learned from External BGP (that is, the next hop is in a different Autonomous System).  Indeed, it is in general impossible for a node to know that all BGP routers of the Autonomous System (AS) will understand a given capability, and if different routers within an AS were to use a different preference for a route, forwarding loops could result unless tunneling is used to reach the BGP next hop.</t>
      </section>
      <section anchor="attribute-error-handling">
        <name>Attribute Error Handling</name>
        <t>An RCA is considered malformed if the length of the attribute is inconsistent with the lengths of the contained capability TLVs.</t>
        <t>A BGP UPDATE message with a malformed RCA <bcp14>SHALL</bcp14> be handled using the approach of "attribute discard" defined in <xref target="RFC7606"/>.</t>
        <t>Unknown Capability Codes <bcp14>MUST NOT</bcp14> be considered to be an error.</t>
        <t>An RCA that contains no capability TLVs <bcp14>MAY</bcp14> be considered malformed, although it is observed that the prescribed behavior of "attribute discard" is semantically no different from that of having no TLVs to process.</t>
        <t>A document that specifies a new RCA Capability should provide specifics regarding what constitutes an error for that RCA Capability.</t>
        <t>If a capability TLV is malformed, that capability TLV <bcp14>SHOULD</bcp14> be ignored and removed.  Other capability TLVs <bcp14>SHOULD</bcp14> be processed as usual. If a given capability TLV requires different error-handling treatment than described in the previous sentences, its specification should provide specifics.</t>
      </section>
      <section anchor="network-operation-considerations">
        <name>Network Operation Considerations</name>
        <t>In the corner case where multiple nodes use the same IP address as their BGP next hop, such as with anycast nodes as described in <xref target="RFC4786"/>, a BGP speaker <bcp14>MUST NOT</bcp14> advertise a given capability unless all nodes sharing this same IP address support this capability. The network operator operating those anycast nodes is responsible for ensuring that an anycast node does not advertise a capability not supported by all nodes sharing this anycast address.  The means for accomplishing this are beyond the scope of this document.</t>
      </section>
    </section>
    <section anchor="elcv3">
      <name>Entropy Label Capability (ELCv3)</name>
      <t>The foregoing sections define the RCA as a container for capability TLVs. The Entropy Label Capability is one such capability.</t>
      <t>When BGP <xref target="RFC4271"/> is used for distributing labeled NLRI as described in, for example, <xref target="RFC8277"/>, the route may include the ELCv3 as part of the RCA.  The inclusion of this capability with a route indicates that the egress of the associated Label Switched Path (LSP) can process entropy labels as an egress LSR for that route -- see Section 4.2 of <xref target="RFC6790"/>. Below, we refer to this for brevity as being "EL-capable."</t>
      <t>For historical reasons, this capability is referred to as "ELCv3", to distinguish it from the prior Entropy Label Capability (ELC) defined in <xref target="RFC6790"/> and deprecated in <xref target="RFC7447"/>, and the ELCv2 described in <xref target="I-D.scudder-bgp-entropy-label"/>.</t>
      <section anchor="encoding-1">
        <name>Encoding</name>
        <t>The ELCv3 has capability code 1, capability length 0, and carries no value:</t>
        <figure>
          <name>ELCv3 TLV Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |      Capability Code = 1      |       Capability Length = 0   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
      </section>
      <section anchor="sending-the-elcv3">
        <name>Sending the ELCv3</name>
        <t>When a BGP speaker S has a route R it wishes to advertise with next hop N to its peer, it <bcp14>SHOULD</bcp14> include the ELCv3 capability if it knows that the egress of the associated LSP L is EL-capable, otherwise it <bcp14>MUST NOT</bcp14> include the ELCv3 capability. Specific conditions where S would know that the egress is EL-capable are if S:</t>
        <ul spacing="normal">
          <li>Is itself the egress, and knows itself to be EL-capable, or</li>
          <li>Is re-advertising a BGP route it received with a valid ELCv3 capability, and is not changing the value of N, or</li>
          <li>Is re-advertising a BGP route it received with a valid ELCv3 capability, and is changing the value of N, and knows (for example, through configuration) that the router represented by N is either the LSP egress and is EL-capable, or that it will simply swap labels without popping the BGP-advertised label stack and processing the label below, as with a transit LSR, or</li>
          <li>Is redistributing a route learned from another protocol, and that other protocol conveyed the knowledge that the egress of L was EL-capable (for example, this might be known through the Label Distribution Protocol (LDP) ELC TLV, Section 5.1 of <xref target="RFC6790"/>).</li>
        </ul>
        <t>The ELCv3 <bcp14>MAY</bcp14> be advertised with routes that are labeled, such as those using SAFI 4 <xref target="RFC8277"/>. It <bcp14>MUST NOT</bcp14> be advertised with unlabeled routes.</t>
      </section>
      <section anchor="receiving-the-elcv3">
        <name>Receiving the ELCv3</name>
        <t>(Below, we assume that "includes the ELCv3" implies that the containing RCA has passed the checks specified in <xref target="receiving"/>. If it had not passed, then the RCA would have been discarded and the ELCv3 would be deemed not to have been included.)</t>
        <t>When a BGP speaker receives an unlabeled route that includes the ELCv3, it <bcp14>MUST</bcp14> discard the ELCv3.</t>
        <t>When a BGP speaker receives a labeled route that includes the ELCv3, it indicates the associated LSP supports entropy labels. This implies that the receiving BGP speaker if acting as ingress, <bcp14>MAY</bcp14> insert an entropy label as per Section 4.2 of <xref target="RFC6790"/>.</t>
      </section>
      <section anchor="elcv3-error-handling">
        <name>ELCv3 Error Handling</name>
        <t>The ELCv3 is considered malformed and must be disregarded if its length is other than zero.</t>
      </section>
    </section>
    <section anchor="legacy-elc">
      <name>Legacy ELC</name>
      <t>The ELCv3 functionality introduced in this document replaces the "BGP Entropy Label Capability Attribute" (ELC attribute) that was introduced by <xref target="RFC6790"/>, and deprecated by <xref target="RFC7447"/>. The latter RFC specifies that the ELC attribute, BGP path attribute 28, "<bcp14>MUST</bcp14> be treated as any other unrecognized optional, transitive attribute". This specification revises that requirement.</t>
      <t>As the current specification was developed, it became clear that due to incompatibilities between how the ELC attribute is processed by different fielded implementations, the most prudent handling of attribute 28 is not to propagate it as an unrecognized optional, transitive attribute, but to discard it. Therefore, this specification updates <xref target="RFC7447"/>, by instead requiring that an implementation that receives the ELC attribute <bcp14>MUST</bcp14> discard any received ELC attribute.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>IANA has made a temporary allocation in the BGP Path Attributes registry of the Border Gateway Protocol (BGP) Parameters group. IANA is requested to make this allocation permanent.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Code</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">39</td>
            <td align="left">BGP Router Capabilities (RCA)</td>
            <td align="left">(this doc)</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to create a new registry called "BGP Router Capability Codes" within the Border Gateway Protocol (BGP) Parameters group. The registry's allocation policy is First Come, First Served. It is seeded with the following values:</t>
      <table anchor="preregistry">
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
            <th align="left">Change Controller</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">reserved</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">ELCv3</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">65500 - 65534</td>
            <td align="left">reserved for experimental use</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">65535</td>
            <td align="left">reserved</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <section anchor="Security_RCA">
        <name>Considerations for the RCA</name>
        <t>The header portion of the RCA contains the next hop the attribute's originator included when sending it. This will typically be an IP address of the router in question. This may be an infrastructure address the network operator does not intend to announce beyond the border of its Autonomous System, and it may even be considered in some weak sense, confidential information.</t>
        <t>In order to be fit for purpose, the attribute needs to be able to propagate between Autonomous Systems when they are under the control of the same administrator, but for anticipated uses it need not be sent to other Autonomous Systems. At time of writing, work <xref target="I-D.uttaro-idr-bgp-oad"/> is underway to standardize a method of distinguishing between the two categories of external Autonomous Systems, and if such a distinction is available, an implementation can take advantage of it by constraining the RCA and its contained capabilities to only propagate by default to and from the former category of Autonomous Systems. If such a distinction is not available, a network operator may prefer to configure routers peering with Autonomous Systems not under their administrative control to not send or accept the RCA or its contained capabilities, unless there is an identified need to do so.</t>
        <t>The forgoing notwithstanding, control of RCA propagation can't be guaranteed in all cases -- if a border router doesn't implement this specification, the attribute, like all BGP optional transitive attributes, will propagate to neighboring Autonomous Systems. Similarly, if a border router receiving the attribute from an external Autonomous System doesn't implement this specification, it will store and propagate the attribute, the requirements of <xref target="receiving"/> notwithstanding. So, sometimes this information could leak beyond its intended scope. (Note that it will only propagate as far as the first router that does support this specification, at which point it will typically be discarded due to a non-matching next hop, per <xref target="receiving"/>.)</t>
        <t>If the attribute leaks beyond its intended scope, capabilities within it would potentially be exposed.  Specifications for individual capabilities should consider the consequences of such unintended exposure, and should identify any necessary constraints on propagation.</t>
      </section>
      <section anchor="considerations-for-the-elcv3-capability">
        <name>Considerations for the ELCv3 Capability</name>
        <t>Insertion of an ELCv3 by an attacker could cause forwarding to fail. Deletion of an ELCv3 by an attacker could cause one path in the network to be overutilized and another to be underutilized. However, we note that an attacker able to accomplish either of these (below, an "on-path attacker") could equally insert or remove any other BGP path attribute or message. The former attack described above denies service for a given route, which can be accomplished by an on-path attacker in any number of ways even absent ELCv3. The latter attack defeats an optimization but nothing more; it seems dubious that an attacker would go to the trouble of doing so rather than launching some more damaging attack.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2545">
          <front>
            <title>Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing</title>
            <author fullname="P. Marques" initials="P." surname="Marques"/>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <date month="March" year="1999"/>
            <abstract>
              <t>BGP-4 Multiprotocol Extensions (BGP-MP) defines the format of two BGP attributes (MP_REACH_NLRI and MP_UNREACH_NLRI) that can be used to announce and withdraw the announcement of reachability information. This document defines how compliant systems should make use of those attributes for the purpose of conveying IPv6 routing information. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2545"/>
          <seriesInfo name="DOI" value="10.17487/RFC2545"/>
        </reference>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4760">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC6790">
          <front>
            <title>The Use of Entropy Labels in MPLS Forwarding</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>Load balancing is a powerful tool for engineering traffic across a network. This memo suggests ways of improving load balancing across MPLS networks using the concept of "entropy labels". It defines the concept, describes why entropy labels are useful, enumerates properties of entropy labels that allow maximal benefit, and shows how they can be signaled and used for various applications. This document updates RFCs 3031, 3107, 3209, and 5036. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6790"/>
          <seriesInfo name="DOI" value="10.17487/RFC6790"/>
        </reference>
        <reference anchor="RFC7447">
          <front>
            <title>Deprecation of BGP Entropy Label Capability Attribute</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>The BGP Entropy Label Capability attribute is defined in RFC 6790. Regrettably, it has a bug: although RFC 6790 mandates that routers incapable of processing Entropy Labels must remove the attribute, fulfillment of this requirement cannot be guaranteed in practice. This specification deprecates the attribute. A forthcoming document will propose a replacement.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7447"/>
          <seriesInfo name="DOI" value="10.17487/RFC7447"/>
        </reference>
        <reference anchor="RFC7606">
          <front>
            <title>Revised Error Handling for BGP UPDATE Messages</title>
            <author fullname="E. Chen" initials="E." role="editor" surname="Chen"/>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>According to the base BGP specification, a BGP speaker that receives an UPDATE message containing a malformed attribute is required to reset the session over which the offending attribute was received. This behavior is undesirable because a session reset would impact not only routes with the offending attribute but also other valid routes exchanged over the session. This document partially revises the error handling for UPDATE messages and provides guidelines for the authors of documents defining new attributes. Finally, it revises the error handling procedures for a number of existing attributes.</t>
              <t>This document updates error handling for RFCs 1997, 4271, 4360, 4456, 4760, 5543, 5701, and 6368.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7606"/>
          <seriesInfo name="DOI" value="10.17487/RFC7606"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-idr-next-hop-capability">
          <front>
            <title>BGP Next-Hop dependent capabilities</title>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Kireeti Kompella" initials="K." surname="Kompella">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
              <organization>Nokia</organization>
            </author>
            <date day="8" month="June" year="2022"/>
            <abstract>
              <t>   RFC 5492 advertises the capabilities of the BGP peer.  When the BGP
   peer is not the same as the BGP Next-Hop, it is useful to also be
   able to advertise the capability of the BGP Next-Hop, in particular
   to advertise forwarding plane features.  This document defines a
   mechanism to advertise such BGP Next Hop dependent Capabilities.

   This document defines a new BGP non-transitive attribute to carry
   Next-Hop Capabilities.  This attribute is guaranteed to be deleted or
   updated when the BGP Next Hop is changed, in order to reflect the
   capabilities of the new BGP Next-Hop.

   This document also defines a Next-Hop capability to advertise the
   ability to process the MPLS Entropy Label as an egress LSR for all
   NLRI advertised in the BGP UPDATE.  It updates RFC 6790 with regard
   to this BGP signaling.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-next-hop-capability-08"/>
        </reference>
        <reference anchor="I-D.scudder-bgp-entropy-label">
          <front>
            <title>BGP Entropy Label Capability, Version 2</title>
            <author fullname="John Scudder" initials="J." surname="Scudder">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Kireeti Kompella" initials="K." surname="Kompella">
              <organization>Juniper Networks</organization>
            </author>
            <date day="28" month="April" year="2022"/>
            <abstract>
              <t>   RFC 6790 defined the Entropy Label Capability Attribute (ELC); RFC
   7447 deprecated that attribute.  This specification, dubbed "Entropy
   Label Capability Attribute version 2" (ELCv2), was intended to be
   offered for standardization, to replace the ELC as a way to signal
   that a BGP protocol speaker is capable of processing entropy labels.

   Although ultimately a different specification was chosen for that
   purpose, at least one implementation of ELCv2 was shipped by Juniper
   Networks and is currently in use in service provider networks.  This
   document is published in order to document what was implemented.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-scudder-bgp-entropy-label-00"/>
        </reference>
        <reference anchor="I-D.uttaro-idr-bgp-oad">
          <front>
            <title>One Administrative Domain using BGP</title>
            <author fullname="Jim Uttaro" initials="J." surname="Uttaro">
              <organization>Individual Contributor</organization>
            </author>
            <author fullname="Alvaro Retana" initials="A." surname="Retana">
              <organization>Futurewei Technologies, Inc.</organization>
            </author>
            <author fullname="Pradosh Mohapatra" initials="P." surname="Mohapatra">
              <organization>Google</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus, Inc.</organization>
            </author>
            <author fullname="Bin Wen" initials="B." surname="Wen">
              <organization>Comcast</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document defines a new External BGP (EBGP) peering type known as
   EBGP-OAD, which is used between two EBGP peers that belong to One
   Administrative Domain (OAD).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-uttaro-idr-bgp-oad-02"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC5492">
          <front>
            <title>Capabilities Advertisement with BGP-4</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>This document defines an Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.</t>
              <t>This document obsoletes RFC 3392. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5492"/>
          <seriesInfo name="DOI" value="10.17487/RFC5492"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
      </references>
    </references>
    <?line 295?>

<section anchor="other-means-of-signaling-el-capability">
      <name>Other Means of Signaling EL Capability</name>
      <t>A router that supports this specification could also have other means to know that an egress is EL-capable, for example, it could support ELCv2 <xref target="I-D.scudder-bgp-entropy-label"/>, or it could know through configuration. If a router learns through any means that an egress is EL-capable, it <bcp14>MAY</bcp14> treat the egress as EL-capable. For example, reception of a valid ELCv2 would be sufficient (even if a valid ELCv3 is not received), and similarly, reception of a valid ELCv3 would be sufficient (even if a valid ELCv2 is not received). The details of which methods are accepted for signaling EL capability are beyond the scope of this specification but <bcp14>SHOULD</bcp14> be configurable by the user.</t>
    </section>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors of this specification thank Wes Hardaker and Gyan Mishra for their review and comments.</t>
      <t>This specification derives from two earlier documents, <xref target="I-D.ietf-idr-next-hop-capability"/> and <xref target="I-D.scudder-bgp-entropy-label"/>.</t>
      <t><xref target="I-D.ietf-idr-next-hop-capability"/> included the following acknowledgements:</t>
      <artwork><![CDATA[
    The Entropy Label Next-Hop Capability defined in this document is
    based on the ELC BGP attribute defined in section 5.2 of [RFC6790].

    The authors wish to thank John Scudder for the discussions on this
    topic and Eric Rosen for his in-depth review of this document.

    The authors wish to thank Jie Dong and Robert Raszuk for their
    review and comments.
]]></artwork>
      <t><xref target="I-D.scudder-bgp-entropy-label"/> included the following acknowledgements:</t>
      <artwork><![CDATA[
    Thanks to Swadesh Agrawal, Alia Atlas, Bruno Decraene, Martin
    Djernaes, John Drake, Adrian Farrell, Keyur Patel, Toby Rees, and
    Ravi Singh, for their discussion of this issue. 
]]></artwork>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Krier" fullname="Serge Krier">
        <organization>Cisco Systems</organization>
        <address>
          <email>sekrier@cisco.com</email>
        </address>
      </contact>
      <contact initials="K." surname="Wang" fullname="Kevin Wang">
        <organization>Juniper Networks</organization>
        <address>
          <email>kfwang@juniper.net</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
