<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-idr-entropy-label-16" category="std" consensus="true" submissionType="IETF" xml:lang="en" updates="6790, 7447" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="NHC">BGP Next Hop Dependent Characteristics Attribute</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-idr-entropy-label-16"/>
    <author initials="B." surname="Decraene" fullname="Bruno Decraene" role="editor">
      <organization>Orange</organization>
      <address>
        <email>bruno.decraene@orange.com</email>
      </address>
    </author>
    <author initials="J. G." surname="Scudder" fullname="John G. Scudder" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <email>jgs@juniper.net</email>
      </address>
    </author>
    <author initials="K." surname="Kompella" fullname="Kireeti Kompella">
      <organization>Juniper Networks</organization>
      <address>
        <email>kireeti@juniper.net</email>
      </address>
    </author>
    <author initials="S." surname="Mohanty" fullname="Satya Mohanty">
      <organization>Zscaler</organization>
      <address>
        <email>smohanty@zscaler.com</email>
      </address>
    </author>
    <author initials="B." surname="Wen" fullname="Bin Wen">
      <organization>Comcast</organization>
      <address>
        <email>Bin_Wen@comcast.com</email>
      </address>
    </author>
    <author initials="K." surname="Wang" fullname="Kevin Wang">
      <organization>Juniper Networks</organization>
      <address>
        <email>kfwang@juniper.net</email>
      </address>
    </author>
    <author initials="S." surname="Krier" fullname="Serge Krier">
      <organization>Cisco Systems</organization>
      <address>
        <email>sekrier@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="26"/>
    <area>rtg</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>bgp</keyword>
    <keyword>nhc</keyword>
    <keyword>entropy label</keyword>
    <abstract>
      <?line 76?>

<t>RFC 5492 allows a BGP speaker to advertise its capabilities to its peer. When a route is propagated beyond the immediate peer, it is useful to allow certain characteristics to be conveyed further.  In particular, it is useful to advertise forwarding plane features.</t>
      <t>This specification defines a BGP transitive attribute to carry such information, the "Next Hop Dependent Characteristics Attribute," or NHC. Unlike the capabilities defined by RFC 5492, the characteristics conveyed in the NHC apply solely to the routes advertised by the BGP UPDATE that contains the particular NHC.</t>
      <t>This specification also defines an NHC characteristic that can be used to advertise the ability to process the MPLS Entropy Label as an egress LSR for all NLRI advertised in the BGP UPDATE.  It updates RFC 6790 and RFC 7447 concerning this BGP signaling.</t>
    </abstract>
  </front>
  <middle>
    <?line 84?>

<section anchor="intro">
      <name>Introduction</name>
      <t><xref target="RFC5492"/> allows a Border Gateway Protocol (BGP) speaker to advertise its capabilities to its peer. When a route is propagated beyond the immediate peer, it is useful to allow certain characteristics to be conveyed further.  In particular, it may be useful to advertise forwarding plane features.</t>
      <t>This specification defines a BGP optional transitive attribute to carry such information, the "Next Hop Dependent Characteristics Attribute", or NHC.</t>
      <t>Since the NHC is intended chiefly for conveying information about forwarding plane features, it needs to be regenerated whenever the BGP route's next hop is changed. Since owing to the properties of BGP transitive attributes this can't be guaranteed (an intermediate router that doesn't implement this specification would be expected to propagate the NHC as opaque data), the NHC encodes the next hop of its originator, or the router that most recently updated the attribute. If the NHC passes through a router that changes the next hop without regenerating the NHC, they will fail to match when later examined, and the recipient can act accordingly. This scheme allows NHC support to be introduced into a network incrementally. Informally, the intent is that,</t>
      <ul spacing="normal">
        <li>
          <t>If a router is not changing the next hop, it can obliviously propagate the NHC just like any other optional transitive attribute.</t>
        </li>
        <li>
          <t>If a router is changing the next hop, then it has to be able to vouch for every characteristic it includes in the NHC.</t>
        </li>
      </ul>
      <t>Complete details are provided in <xref target="tbrc"/>.</t>
      <t>An NHC carried in a given BGP UPDATE message conveys information that relates to all Network Layer Reachability Information (NLRI) advertised in that particular UPDATE, and only to those NLRI. A different UPDATE message originated by the same source might not include an NHC, and if so, NLRI carried in that UPDATE would not be affected by the NHC. By implication, if a router wishes to use NHC to describe all NLRI it originates, it needs to include an NHC with each UPDATE it sends.</t>
      <t>Informally, a characteristic included in a given NHC should not be thought of as a characteristic of the next hop, but rather a characteristic of the path, that depends on the ability of the next hop to support it. Hence it is said to be "dependent on" the next hop.</t>
      <t>This specification also defines an NHC characteristic, called "ELCv3", to advertise the ability to process the Multiprotocol Label Switching (MPLS) Entropy Label as an egress Label Switching Router (LSR) for all NLRI advertised in the BGP UPDATE.  It updates <xref target="RFC6790"/> and <xref target="RFC7447"/> with regard to this BGP signaling, this is further discussed in <xref target="elcv3"/>. Although ELCv3 is only relevant to NLRI of labeled address families, a future NHC characteristic might be applicable to non-labeled NLRI, or to both, irrespective of labels. (The term "labeled address family" is defined in the first paragraph of Section 3.5 of <xref target="RFC9012"/>. In this document, we use the term "labeled NLRI" as a short form of "NLRI of a labeled address family.")</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="tbrc">
      <name>BGP Next Hop Dependent Characteristics Attribute</name>
      <section anchor="encoding">
        <name>Encoding</name>
        <t>The BGP Next Hop Dependent Characteristics attribute (NHC attribute, or just NHC) is an optional, transitive BGP path attribute with type code 39. The NHC always includes a network layer address identifying the next hop of the route the NHC accompanies. The NHC signals potentially useful information related to the forwarding plane features, so it is desirable to make it transitive to ensure propagation across BGP speakers (e.g., route reflectors) that do not change the next hop and are therefore not in the forwarding path. The next hop data is to ensure correctness if it traverses BGP speakers that do not understand the NHC. This is further explained below.</t>
        <t>The Attribute Data field of the NHC attribute is encoded as a header portion that identifies the router that created or most recently updated the attribute, followed by one or more Type-Length-Value (TLV) triples:</t>
        <figure anchor="nhcformat">
          <name>NHC Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Address Family Identifier   |     SAFI      | Next Hop Len  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~             Network Address of Next Hop (variable)            ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~                 Characteristic TLVs (variable)                ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The meanings of the header fields (Address Family Identifier, SAFI or Subsequent Address Family Identifier, Length of Next Hop, and Network Address of Next Hop) are as given in Section 3 of <xref target="RFC4760"/>.</t>
        <t>In turn, each Characteristic is a TLV:</t>
        <figure>
          <name>Characteristic TLV Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |      Characteristic Code      |      Characteristic Length    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~                Characteristic Value (variable)                ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>Characteristic Code: a two-octet unsigned integer that indicates the type of characteristic advertised and unambiguously identifies an individual characteristic.</t>
        <t>Characteristic Length: a two-octet unsigned integer that indicates the length, in octets, of the Characteristic Value field.  A length of 0 indicates that the Characteristic Value field is zero-length, i.e. it has a null value.</t>
        <t>Characteristic Value: a variable-length field.  It is interpreted according to the value of the Characteristic Code.</t>
        <t>A BGP speaker <bcp14>MUST NOT</bcp14> include more than one instance of a characteristic with the same Characteristic Code, Characteristic Length, and Characteristic Value.  Note, however, that processing multiple instances of such a characteristic does not require special handling, as additional instances do not change the meaning of the announced characteristic; thus, a BGP speaker <bcp14>MUST</bcp14> be prepared to accept such multiple instances.</t>
        <t>BGP speakers <bcp14>MAY</bcp14> include more than one instance of a characteristic (as identified by the Characteristic Code) with different Characteristic Value.  Processing of these characteristic instances is specific to the Characteristic Code and <bcp14>MUST</bcp14> be described in the document introducing the new characteristic.</t>
        <t>Characteristic TLVs <bcp14>MUST</bcp14> be placed in the NHC in increasing order of Characteristic Code. (In the event of multiple instances of a characteristic with the same Characteristic Code as discussed above, no further sorting order is defined here.)  Although the major sorting order is mandated, an implementation <bcp14>MUST</bcp14> elect to be prepared to consume characteristics in any order, for robustness reasons.</t>
      </section>
      <section anchor="sending">
        <name>Sending the NHC</name>
        <t>Suppose a BGP speaker S has a route R it wishes to advertise with next hop N to its peer.</t>
        <t>If S is originating R into BGP, it <bcp14>MAY</bcp14> include an NHC attribute with it, that carries characteristic TLVs that describe aspects of R. S <bcp14>MUST</bcp14> set the next hop depicted in the header portion of the NHC to be equal to N, using the encoding given above.</t>
        <t>If S has received R from some other BGP speaker, two possibilities exist. First, S could be propagating R without changing N. In that case, S does not need to take any special action, it <bcp14>SHOULD</bcp14> simply propagate the NHC unchanged unless specifically configured otherwise. Indeed, we observe that this is no different from the default action a BGP speaker takes with an unrecognized optional transitive attribute -- it is treated as opaque data and propagated.</t>
        <t>Second, S could be changing R in some way, and in particular, it could be changing N. If S has changed N it <bcp14>MUST NOT</bcp14> propagate the NHC unchanged. It <bcp14>SHOULD</bcp14> include a newly-constructed NHC attribute with R, constructed as described above in the "originating R into BGP" case. Any given characteristic TLV carried by the newly-constructed NHC attribute might use information from the received NHC attribute as input to its construction, possibly as straightforwardly as simply copying the TLV. The details of how the characteristics in the new NHC are constructed are specific to the definition of each characteristics. Any characteristic TLVs received by S that are for characteristics not supported by S will not be included in the newly-constructed NHC attribute S includes with R.</t>
        <t>An implementation <bcp14>SHOULD</bcp14> propagate the NHC and its contained characteristics by default. An implementation <bcp14>SHOULD</bcp14> provide configuration control of whether any given characteristic is propagated. An implementation <bcp14>MAY</bcp14> provide finer-grained control on propagation based on attributes of the peering session, as discussed in <xref target="Security_NHC"/>.</t>
        <t>Due to the nature of BGP optional transitive path attributes, any BGP speaker that does not implement this specification will propagate the NHC, the requirements of this section notwithstanding. Such a speaker will not update the NHC, however.</t>
        <t>Certain NLRI formats do not include a next hop at all, one example being the Flow Specification NLRI <xref target="RFC8955"/>. The NHC <bcp14>MUST NOT</bcp14> be sent with such NLRI.</t>
        <section anchor="llnh">
          <name>Link-Local-Only Next Hops</name>
          <t>In some cases, the BGP speaker sending a route might encode only a link-local address and no global address. In such a case, a problem arises because there is no expectation of global uniqueness of such an address, and the "semantic match" discussed in <xref target="receiving"/> could yeild a false positive. An illustration is provided in <xref target="falsepos"/>.</t>
          <t>To mitigate this problem, if a BGP speaker originates a route whose next hop has no global part, it <bcp14>MUST</bcp14> include a BGPID TLV (<xref target="bgpid"/>).</t>
        </section>
        <section anchor="nhcaggregation">
          <name>Aggregation</name>
          <t>When aggregating routes, the above rules for constructing a new NHC <bcp14>MUST</bcp14> be followed. The decision of whether to include the NHC with the aggregate route and what its form will be, depends in turn on whether any characteristics are eligible to be included with the aggregate route.  If there are no eligible characteristics, the NHC <bcp14>MUST NOT</bcp14> be included.</t>
          <t>The specification for an individual characteristic must define how that characteristic is to be aggregated. If no rules are defined for a given characteristic, that characteristic <bcp14>MUST NOT</bcp14> be aggregated. Rules for aggregating the ELCv3 are found in <xref target="elcv3aggregation"/>.</t>
          <t>(Route aggregation is described in <xref target="RFC4271"/>. Although prefix aggregation -- combining two or more more-specific prefixes to form one less-specific prefix -- is one application of aggregation, we note that another is when two or more routes for the same prefix are selected to be used for multipath forwarding.)</t>
        </section>
      </section>
      <section anchor="receiving">
        <name>Receiving the NHC</name>
        <t>An implementation receiving routes with a NHC <bcp14>SHOULD NOT</bcp14> discard the attribute or its contained characteristics by default. An implementation <bcp14>SHOULD</bcp14> provide configuration control of whether any given characteristic is processed. An implementation <bcp14>MAY</bcp14> provide finer-grained control on propagation based on attributes of the peering session, as discussed in <xref target="Security_NHC"/>.</t>
        <t>When a BGP speaker receives a BGP route that includes the NHC, it <bcp14>MUST</bcp14> compare the address given in the header portion of the NHC and illustrated in <xref target="nhcformat"/> to the next hop of the BGP route. If the two match, the NHC may be further processed. If the two do not match, it means some intermediate BGP speaker that handled the route in transit both does not support NHC, and changed the next hop of the route. In this case, the contents of the NHC cannot be used, and the NHC <bcp14>MUST</bcp14> be discarded without further processing, except that the contents <bcp14>MAY</bcp14> be logged.</t>
        <t>In considering whether the next hop "matches", a semantic match is sought. While bit-for-bit equality is a trivial test of matching, there may be certain cases where the two are not bit-for-bit equal, but still "match". An example is when an MP_REACH Next Hop encodes both a global and a link-local IPv6 address. In that case, the link-local address might be removed during Internal BGP (IBGP) propagation, the two would still be considered to match if they were equal on the global part. See Section 3 of <xref target="RFC2545"/>. In other cases, only a link-local address might be present. This is discussed in <xref target="llnh"/>; in such a case further information is required to permit matching, this is discussed in <xref target="bgpid"/>.</t>
        <t>A BGP speaker receiving a Characteristic Code that it supports behaves as defined in the document defining the Characteristic Code.  A BGP speaker receiving a Characteristic Code that it does not support <bcp14>MUST</bcp14> ignore that Characteristic Code.  In particular, the receipt of an unrecognized Characteristic Code <bcp14>MUST NOT</bcp14> be handled as an error.</t>
        <t>The presence of a characteristic <bcp14>SHOULD NOT</bcp14> influence route selection or route preference, unless tunneling is used to reach the BGP next hop, the selected route has been learned from External BGP (that is, the next hop is in a different Autonomous System), or by configuration (see following).  Indeed, it is in general impossible for a node to know that all BGP routers of the Autonomous System (AS) will understand a given characteristic, and if different routers within an AS were to use a different preference for a route, forwarding loops could result unless tunneling is used to reach the BGP next hop. Following this reasoning, if the administrator of the network is confident that all routers within the AS will interpret the presence of the characteristic in the same way, they could relax this restriction by configuration.</t>
      </section>
      <section anchor="attribute-error-handling">
        <name>Attribute Error Handling</name>
        <t>An NHC is considered malformed if the length of the attribute, encoded in the Attribute Length field of the BGP Path Attribute header (Section 4.3 of <xref target="RFC4271"/>), is inconsistent with the lengths of the contained characteristic TLVs. In other words, the sum of the sizes (Characteristic Length plus 4) of the contained characteristic TLVs, plus the length of the NHC header (<xref target="nhcformat"/>), must be equal to the overall Attribute Length.</t>
        <t>A BGP UPDATE message with a malformed NHC <bcp14>SHALL</bcp14> be handled using the approach of "attribute discard" defined in <xref target="RFC7606"/>.</t>
        <t>Unknown Characteristic Codes <bcp14>MUST NOT</bcp14> be considered to be an error.</t>
        <t>An NHC that contains no characteristic TLVs <bcp14>MAY</bcp14> be considered malformed, although it is observed that the prescribed behavior of "attribute discard" is semantically no different from that of having no TLVs to process. There is no reason to propagate an NHC that contains no characteristic TLVs.</t>
        <t>A document that specifies a new NHC Characteristic should provide specifics regarding what constitutes an error for that NHC Characteristic.</t>
        <t>If a characteristic TLV is malformed, that characteristic TLV <bcp14>SHOULD</bcp14> be ignored and removed.  Other characteristic TLVs <bcp14>SHOULD</bcp14> be processed as usual. If a given characteristic TLV requires different error-handling treatment than described in the previous sentences, its specification should provide specifics.</t>
      </section>
      <section anchor="network-operation-considerations">
        <name>Network Operation Considerations</name>
        <t>In the corner case where multiple nodes use the same IP address as their BGP next hop, such as with anycast nodes as described in <xref target="RFC4786"/>, a BGP speaker <bcp14>MUST NOT</bcp14> advertise a given characteristic unless all nodes sharing this same IP address support this characteristic. The network operator operating those anycast nodes is responsible for ensuring that an anycast node does not advertise a characteristic not supported by all nodes sharing this anycast address.  The means for accomplishing this are beyond the scope of this document.</t>
      </section>
    </section>
    <section anchor="elcv3">
      <name>Entropy Label Characteristic (ELCv3)</name>
      <t>The foregoing sections define the NHC as a container for characteristic TLVs. The Entropy Label Characteristic is one such characteristic.</t>
      <t>When BGP <xref target="RFC4271"/> is used for distributing labeled NLRI as described in, for example, <xref target="RFC8277"/>, the route may include the ELCv3 as part of the NHC.  The inclusion of this characteristic with a route indicates that the egress of the associated Label Switched Path (LSP) can process entropy labels as an egress LSR for that route -- see Section 4.1 of <xref target="RFC6790"/>. Below, we refer to this for brevity as being "EL-capable."</t>
      <t>For historical reasons, this characteristic is referred to as "ELCv3", to distinguish it from the prior Entropy Label Capability (ELC) defined in <xref target="RFC6790"/> and deprecated in <xref target="RFC7447"/>, and the ELCv2 described in <xref target="I-D.scudder-bgp-entropy-label"/>.</t>
      <t>This section (and its subsections) replaces Section 5.2 of <xref target="RFC6790"/>, which was previously deprecated by <xref target="RFC7447"/>.</t>
      <section anchor="encoding-1">
        <name>Encoding</name>
        <t>The ELCv3 has characteristic code 1, characteristic length 0, and carries no value:</t>
        <figure>
          <name>ELCv3 TLV Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Characteristic Code = 1    |   Characteristic Length = 0   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
      </section>
      <section anchor="sending-the-elcv3">
        <name>Sending the ELCv3</name>
        <t>When a BGP speaker S has a route R it wishes to advertise with next hop N to its peer, it <bcp14>MAY</bcp14> include the ELCv3 characteristic if it knows that the egress of the associated LSP L is EL-capable, otherwise it <bcp14>MUST NOT</bcp14> include the ELCv3 characteristic. Specific conditions where S would know that the egress is EL-capable are if S:</t>
        <ul spacing="normal">
          <li>
            <t>Is itself the egress, and knows itself to be EL-capable, or</t>
          </li>
          <li>
            <t>Is re-advertising a BGP route it received with a valid ELCv3 characteristic, and is preserving the value of N as received, or</t>
          </li>
          <li>
            <t>Is re-advertising a BGP route it received with a valid ELCv3 characteristic, and is changing the next hop that it has received to N, and knows that this new next hop (normally itself) is EL-capable, or</t>
          </li>
          <li>
            <t>Is re-advertising a BGP route it received with a valid ELCv3 characteristic, and is changing the next hop that it has received to N, and knows (for example, through configuration) that  the new next hop (normally itself) even if not EL-capable will simply swap labels without popping the BGP-advertised label stack and processing the label below, as with a transit LSR, or</t>
          </li>
          <li>
            <t>Knows by implementation-specific means that the egress is EL-capable, or</t>
          </li>
          <li>
            <t>Is redistributing a route learned from another protocol, and that other protocol conveyed the knowledge that the egress of L was EL-capable. (For example, this might be known through the Label Distribution Protocol (LDP) ELC TLV, Section 5.1 of <xref target="RFC6790"/>.)</t>
          </li>
        </ul>
        <t>The ELCv3 <bcp14>MAY</bcp14> be advertised with routes that are labeled, such as those using SAFI 4 <xref target="RFC8277"/>. It <bcp14>MUST NOT</bcp14> be advertised with unlabeled routes.</t>
        <section anchor="elcv3aggregation">
          <name>Aggregation</name>
          <t>When forming an aggregate (see <xref target="nhcaggregation"/>), the aggregate route thus formed <bcp14>MUST NOT</bcp14> include the ELCv3 unless each constituent route would be eligible to include the ELCv3 according to the criteria given above.</t>
        </section>
      </section>
      <section anchor="receiving-the-elcv3">
        <name>Receiving the ELCv3</name>
        <t>(Below, we assume that "includes the ELCv3" implies that the containing NHC has passed the checks specified in <xref target="receiving"/>. If it had not passed, then the NHC would have been discarded and the ELCv3 would be deemed not to have been included.)</t>
        <t>When a BGP speaker receives an unlabeled route that includes the ELCv3, it <bcp14>MUST</bcp14> discard the ELCv3.</t>
        <t>When a BGP speaker receives a labeled route that includes the ELCv3, it indicates that it can safely insert an entropy label into the label stack of the associated LSP. This implies that the receiving BGP speaker if acting as ingress, <bcp14>MAY</bcp14> insert an entropy label as per Section 4.2 of <xref target="RFC6790"/>.</t>
      </section>
      <section anchor="elcv3-error-handling">
        <name>ELCv3 Error Handling</name>
        <t>The ELCv3 is considered malformed and must be disregarded if its length is other than zero.</t>
        <t>If more than one instance of the ELCv3 is included in an NHC, instances beyond the first <bcp14>MUST</bcp14> be disregarded.</t>
      </section>
    </section>
    <section anchor="bgpid">
      <name>BGP Identifier Characteristic</name>
      <t>As discussed in <xref target="llnh"/>, it might be possible that a route could be originated that has no global part in its next hop. To provide uniqueness in this case, it is sufficient to associate the BGP Identifier and AS Number of the route's sender. The BGP Identifier Characteristic (BGPID) provides a way to convey this information if required.</t>
      <section anchor="encoding-2">
        <name>Encoding</name>
        <t>The BGPID has characteristic code 3, characteristic length 8, and carries as its value the BGP Identifier and Autonomous System Number of its sender:</t>
        <figure>
          <name>BGPID TLV Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Characteristic Code = 3    |   Characteristic Length = 8   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        BGP Identifier                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                          AS Number                            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>BGP Identifier: The BGP Identifier (Section 4.2 of <xref target="RFC4271"/>, and <xref target="RFC6286"/>) of the route's sender.</t>
        <t>AS Number: The Autonomous System Number <xref target="RFC6793"/> of the route's sender. In cases where the sender might represent different Autonomous System Numbers to different peers (for example, <xref target="RFC5065"/>, <xref target="RFC7705"/>), the value used is the one that was in the sender's BGP OPEN to the peer concerned.</t>
      </section>
      <section anchor="sending-the-bgpid">
        <name>Sending the BGPID</name>
        <t>Under the circumstances described in <xref target="llnh"/> the BGPID <bcp14>MUST</bcp14> be included. Under other circumstances, the BGPID <bcp14>MAY</bcp14> be included.</t>
        <section anchor="aggregation">
          <name>Aggregation</name>
          <t>Since the BGPID, by definition, is regenerated whenever the next hop is changed and provides context to disambiguate the next hop carried in the NHC header, there is no case in which it might need to be aggregated.</t>
        </section>
      </section>
      <section anchor="rcv_bgpid">
        <name>Receiving the BGPID</name>
        <t>Under the circumstances described in <xref target="llnh"/>, a NEXT_HOP received from a given peer <bcp14>MUST NOT</bcp14> be considered a "semantic match" for the NHC unless the BGP Identifier and Autonomous System of that peer match the BGP Identifier and Autonomous System carried in the BGPID.</t>
        <t>Since the only case in which the BGPID might be needed to disambiguate the next hop carried in the NHC involves the immediate peer (see <xref target="falsepos"/> for more detail), the BGP Identifier and Autonomous System of the peer are readily derived, they are the values that were received in that peer's OPEN message.</t>
        <t>Other uses of the BGPID are beyond the scope of this document. In particular, if a route is received that has a global part to its NEXT_HOP and thus, does not match the circumstances described in <xref target="llnh"/>, but which nonetheless has a BGPID, this specification requires no specific action. In such a case, the BGPID can be disregarded.</t>
        <section anchor="not-receiving-the-bgpid">
          <name>Not Receiving the BGPID</name>
          <t>Under the circumstances described in <xref target="llnh"/>, if a BGPID is not present in the NHC, the next hop match described in <xref target="receiving"/> <bcp14>MUST</bcp14> be considered to have failed.</t>
        </section>
      </section>
      <section anchor="bgpid-error-handling">
        <name>BGPID Error Handling</name>
        <t>The BGPID is considered malformed and must be disregarded if its length is other than eight.</t>
        <t>If more than one instance of the BGPID is included in an NHC, instances beyond the first <bcp14>MUST</bcp14> be disregarded.</t>
        <t>The situation where a route is received which fails the test described in <xref target="rcv_bgpid"/> is not an error. However, it might indicate a misconfiguration in the network, and a message <bcp14>MAY</bcp14> be logged.</t>
      </section>
    </section>
    <section anchor="legacy-elc">
      <name>Legacy ELC</name>
      <t>The ELCv3 functionality introduced in this document replaces the "BGP Entropy Label Capability Attribute" (ELC attribute) that was introduced by <xref target="RFC6790"/>, and deprecated by <xref target="RFC7447"/>. The latter RFC specifies that the ELC attribute, BGP path attribute 28, "<bcp14>MUST</bcp14> be treated as any other unrecognized optional, transitive attribute". This specification revises that requirement.</t>
      <t>As the current specification was developed, it became clear that due to incompatibilities between how the ELC attribute is processed by different fielded implementations, the most prudent handling of attribute 28 is not to propagate it as an unrecognized optional, transitive attribute, but to discard it. Therefore, this specification updates <xref target="RFC7447"/>, by instead requiring that an implementation that receives the ELC attribute <bcp14>MUST</bcp14> discard any received ELC attribute.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>IANA has made a temporary allocation in the BGP Path Attributes registry of the Border Gateway Protocol (BGP) Parameters group. IANA is requested to make this allocation permanent, and to update its name and reference as shown below.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Code</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">39</td>
            <td align="left">BGP Next Hop Dependent Characteristic (NHC)</td>
            <td align="left">(this doc)</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to create a new registry called "BGP Next Hop Dependent Characteristic Codes" within the Border Gateway Protocol (BGP) Parameters group. The registry's allocation policy is First Come, First Served, except where designated otherwise in <xref target="preregistry"/>. It is seeded with the following values:</t>
      <table anchor="preregistry">
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
            <th align="left">Change Controller</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">reserved</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">ELCv3</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">NNHN</td>
            <td align="left">draft-wang-idr-next-next-hop-nodes-01</td>
            <td align="left">kfwang@juniper.net</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">BGPID</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">IFIT</td>
            <td align="left">draft-ietf-idr-bgp-ifit-capabilities-05</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">65400 - 65499</td>
            <td align="left">private use</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">65500 - 65534</td>
            <td align="left">reserved for experimental use</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">65535</td>
            <td align="left">reserved</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <section anchor="Security_NHC">
        <name>Considerations for the NHC</name>
        <t>The header portion of the NHC contains the next hop the attribute's originator included when sending it, or that an intermediate router included when updating the attribute (in the latter case, the "contract" with the intermediate router is that it performed the checks in <xref target="receiving"/> before propagating the attribute). This will typically be an IP address of the router in question. This may be an infrastructure address the network operator does not intend to announce beyond the border of its Autonomous System, and it may even be considered in some weak sense, confidential information.</t>
        <t>A motivating application for this attribute is to convey information between Autonomous Systems that are under the control of the same administrator. In such a case, it would not need to be sent to other Autonomous Systems. At time of writing, work <xref target="I-D.uttaro-idr-bgp-oad"/> is underway to standardize a method of distinguishing between the two categories of external Autonomous Systems, and if such a distinction is available, an implementation can take advantage of it by constraining the NHC and its contained characteristic to only propagate by default to and from the former category of Autonomous Systems. If such a distinction is not available, a network operator may prefer to configure routers peering with Autonomous Systems not under their administrative control to not send or accept the NHC or its contained characteristic, unless there is an identified need to do so.</t>
        <t>The foregoing notwithstanding, control of NHC propagation can't be guaranteed in all cases -- if a border router doesn't implement this specification, the attribute, like all BGP optional transitive attributes, will propagate to neighboring Autonomous Systems. (This can be seen as a specific case of the general "attribute escape" phenomenon discussed in <xref target="I-D.haas-idr-bgp-attribute-escape"/>.) Similarly, if a border router receiving the attribute from an external Autonomous System doesn't implement this specification, it will store and propagate the attribute, the requirements of <xref target="receiving"/> notwithstanding. So, sometimes this information could leak beyond its intended scope. (Note that it will only propagate as far as the first router that does support this specification, at which point it will typically be discarded due to a non-matching next hop, per <xref target="receiving"/>.)</t>
        <t>If the attribute leaks beyond its intended scope, characteristics within it would potentially be exposed.  Specifications for individual characteristics should consider the consequences of such unintended exposure, and should identify any necessary constraints on propagation.</t>
      </section>
      <section anchor="considerations-for-the-elcv3-characteristic">
        <name>Considerations for the ELCv3 Characteristic</name>
        <t>Insertion of an ELCv3 by an attacker could cause forwarding to fail. Deletion of an ELCv3 by an attacker could cause one path in the network to be overutilized and another to be underutilized. However, we note that an attacker able to accomplish either of these (below, an "on-path attacker") could equally insert or remove any other BGP path attribute or message. The former attack described above denies service for a given route, which can be accomplished by an on-path attacker in any number of ways even absent ELCv3. The latter attack defeats an optimization but nothing more; it seems dubious that an attacker would go to the trouble of doing so rather than launching some more damaging attack.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2545">
          <front>
            <title>Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing</title>
            <author fullname="P. Marques" initials="P." surname="Marques"/>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <date month="March" year="1999"/>
            <abstract>
              <t>BGP-4 Multiprotocol Extensions (BGP-MP) defines the format of two BGP attributes (MP_REACH_NLRI and MP_UNREACH_NLRI) that can be used to announce and withdraw the announcement of reachability information. This document defines how compliant systems should make use of those attributes for the purpose of conveying IPv6 routing information. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2545"/>
          <seriesInfo name="DOI" value="10.17487/RFC2545"/>
        </reference>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4760">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC6286">
          <front>
            <title>Autonomous-System-Wide Unique BGP Identifier for BGP-4</title>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <author fullname="J. Yuan" initials="J." surname="Yuan"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>To accommodate situations where the current requirements for the BGP Identifier are not met, this document relaxes the definition of the BGP Identifier to be a 4-octet, unsigned, non-zero integer and relaxes the "uniqueness" requirement so that only Autonomous-System-wide (AS-wide) uniqueness of the BGP Identifiers is required. These revisions to the base BGP specification do not introduce any backward compatibility issues. This document updates RFC 4271. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6286"/>
          <seriesInfo name="DOI" value="10.17487/RFC6286"/>
        </reference>
        <reference anchor="RFC6790">
          <front>
            <title>The Use of Entropy Labels in MPLS Forwarding</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>Load balancing is a powerful tool for engineering traffic across a network. This memo suggests ways of improving load balancing across MPLS networks using the concept of "entropy labels". It defines the concept, describes why entropy labels are useful, enumerates properties of entropy labels that allow maximal benefit, and shows how they can be signaled and used for various applications. This document updates RFCs 3031, 3107, 3209, and 5036. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6790"/>
          <seriesInfo name="DOI" value="10.17487/RFC6790"/>
        </reference>
        <reference anchor="RFC6793">
          <front>
            <title>BGP Support for Four-Octet Autonomous System (AS) Number Space</title>
            <author fullname="Q. Vohra" initials="Q." surname="Vohra"/>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>The Autonomous System number is encoded as a two-octet entity in the base BGP specification. This document describes extensions to BGP to carry the Autonomous System numbers as four-octet entities. This document obsoletes RFC 4893 and updates RFC 4271. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6793"/>
          <seriesInfo name="DOI" value="10.17487/RFC6793"/>
        </reference>
        <reference anchor="RFC7447">
          <front>
            <title>Deprecation of BGP Entropy Label Capability Attribute</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>The BGP Entropy Label Capability attribute is defined in RFC 6790. Regrettably, it has a bug: although RFC 6790 mandates that routers incapable of processing Entropy Labels must remove the attribute, fulfillment of this requirement cannot be guaranteed in practice. This specification deprecates the attribute. A forthcoming document will propose a replacement.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7447"/>
          <seriesInfo name="DOI" value="10.17487/RFC7447"/>
        </reference>
        <reference anchor="RFC7606">
          <front>
            <title>Revised Error Handling for BGP UPDATE Messages</title>
            <author fullname="E. Chen" initials="E." role="editor" surname="Chen"/>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>According to the base BGP specification, a BGP speaker that receives an UPDATE message containing a malformed attribute is required to reset the session over which the offending attribute was received. This behavior is undesirable because a session reset would impact not only routes with the offending attribute but also other valid routes exchanged over the session. This document partially revises the error handling for UPDATE messages and provides guidelines for the authors of documents defining new attributes. Finally, it revises the error handling procedures for a number of existing attributes.</t>
              <t>This document updates error handling for RFCs 1997, 4271, 4360, 4456, 4760, 5543, 5701, and 6368.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7606"/>
          <seriesInfo name="DOI" value="10.17487/RFC7606"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9012">
          <front>
            <title>The BGP Tunnel Encapsulation Attribute</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
              <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9012"/>
          <seriesInfo name="DOI" value="10.17487/RFC9012"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.haas-idr-bgp-attribute-escape">
          <front>
            <title>BGP Attribute Escape</title>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <date day="20" month="September" year="2024"/>
            <abstract>
              <t>   BGP-4 [RFC 4271] has been very successful in being extended over the
   years it has been deployed.  A significant part of that success is
   due to its ability to incrementally add new features to its Path
   Attributes when they are marked "optional transitive".
   Implementations that are ignorant of a feature for an unknown Path
   Attribute that are so marked will propagate BGP routes with such
   attributes.

   Unfortunately, this blind propagation of unknown Path Attributes may
   happen for features that are intended to be used in a limited scope.
   When such Path Attributes inadvertently are carried beyond that
   scope, it can lead to things such as unintended disclosure of
   sensitive information, or cause improper routing.  In their worst
   cases, such propagation may be for malformed Path Attributes and lead
   to BGP session resets or crashes.

   This document calls such inadvertent propagation of BGP Path
   Attributes, "attribute escape".  This document further describes some
   of the scenarios that leads to this behavior and makes
   recommendations on practices that may limit its impact.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-haas-idr-bgp-attribute-escape-02"/>
        </reference>
        <reference anchor="I-D.ietf-idr-next-hop-capability">
          <front>
            <title>BGP Next-Hop dependent capabilities</title>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Kireeti Kompella" initials="K." surname="Kompella">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
              <organization>Nokia</organization>
            </author>
            <date day="8" month="June" year="2022"/>
            <abstract>
              <t>   RFC 5492 advertises the capabilities of the BGP peer.  When the BGP
   peer is not the same as the BGP Next-Hop, it is useful to also be
   able to advertise the capability of the BGP Next-Hop, in particular
   to advertise forwarding plane features.  This document defines a
   mechanism to advertise such BGP Next Hop dependent Capabilities.

   This document defines a new BGP non-transitive attribute to carry
   Next-Hop Capabilities.  This attribute is guaranteed to be deleted or
   updated when the BGP Next Hop is changed, in order to reflect the
   capabilities of the new BGP Next-Hop.

   This document also defines a Next-Hop capability to advertise the
   ability to process the MPLS Entropy Label as an egress LSR for all
   NLRI advertised in the BGP UPDATE.  It updates RFC 6790 with regard
   to this BGP signaling.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-next-hop-capability-08"/>
        </reference>
        <reference anchor="I-D.scudder-bgp-entropy-label">
          <front>
            <title>BGP Entropy Label Capability, Version 2</title>
            <author fullname="John Scudder" initials="J." surname="Scudder">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Kireeti Kompella" initials="K." surname="Kompella">
              <organization>Juniper Networks</organization>
            </author>
            <date day="28" month="April" year="2022"/>
            <abstract>
              <t>   RFC 6790 defined the Entropy Label Capability Attribute (ELC); RFC
   7447 deprecated that attribute.  This specification, dubbed "Entropy
   Label Capability Attribute version 2" (ELCv2), was intended to be
   offered for standardization, to replace the ELC as a way to signal
   that a BGP protocol speaker is capable of processing entropy labels.

   Although ultimately a different specification was chosen for that
   purpose, at least one implementation of ELCv2 was shipped by Juniper
   Networks and is currently in use in service provider networks.  This
   document is published in order to document what was implemented.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-scudder-bgp-entropy-label-00"/>
        </reference>
        <reference anchor="I-D.uttaro-idr-bgp-oad">
          <front>
            <title>One Administrative Domain using BGP</title>
            <author fullname="Jim Uttaro" initials="J." surname="Uttaro">
              <organization>Individual Contributor</organization>
            </author>
            <author fullname="Alvaro Retana" initials="A." surname="Retana">
              <organization>Futurewei Technologies, Inc.</organization>
            </author>
            <author fullname="Pradosh Mohapatra" initials="P." surname="Mohapatra">
              <organization>Google</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus, Inc.</organization>
            </author>
            <author fullname="Bin Wen" initials="B." surname="Wen">
              <organization>Comcast</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a new External BGP (EBGP) peering type known as
   EBGP-OAD, which is used between two EBGP peers that belong to One
   Administrative Domain (OAD).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-uttaro-idr-bgp-oad-04"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC5065">
          <front>
            <title>Autonomous System Confederations for BGP</title>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol designed for Transmission Control Protocol/Internet Protocol (TCP/IP) networks. BGP requires that all BGP speakers within a single autonomous system (AS) must be fully meshed. This represents a serious scaling problem that has been well documented in a number of proposals.</t>
              <t>This document describes an extension to BGP that may be used to create a confederation of autonomous systems that is represented as a single autonomous system to BGP peers external to the confederation, thereby removing the "full mesh" requirement. The intention of this extension is to aid in policy administration and reduce the management complexity of maintaining a large autonomous system.</t>
              <t>This document obsoletes RFC 3065. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5065"/>
          <seriesInfo name="DOI" value="10.17487/RFC5065"/>
        </reference>
        <reference anchor="RFC5492">
          <front>
            <title>Capabilities Advertisement with BGP-4</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>This document defines an Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.</t>
              <t>This document obsoletes RFC 3392. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5492"/>
          <seriesInfo name="DOI" value="10.17487/RFC5492"/>
        </reference>
        <reference anchor="RFC7705">
          <front>
            <title>Autonomous System Migration Mechanisms and Their Effects on the BGP AS_PATH Attribute</title>
            <author fullname="W. George" initials="W." surname="George"/>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <date month="November" year="2015"/>
            <abstract>
              <t>This document discusses some existing commonly used BGP mechanisms for Autonomous System Number (ASN) migration that are not formally part of the BGP4 protocol specification. It is necessary to document these de facto standards to ensure that they are properly supported in future BGP protocol work.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7705"/>
          <seriesInfo name="DOI" value="10.17487/RFC7705"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
      </references>
    </references>
    <?line 392?>

<section anchor="falsepos">
      <name>A Case Where a Link-Local Next Hop Could Lead to a False Positive</name>
      <t>Consider a simple BGP peering topology, with four routers, in three Autonomous Systems:</t>
      <figure>
        <name>A Trivial Peering Topology</name>
        <artwork><![CDATA[
 +----+ +------------+ +----+
 |    | |            | |    |
 | A <---> B <--> C <---> D |
 |    | |            | |    |
 +----+ +------------+ +----+
  AS X       AS Y       AS Z   
]]></artwork>
      </figure>
      <t>Suppose A and D support NHC. B and C do not support NHC. In this case, when A originates a route with an attached NHC, if B propagates it to C, and C updates the NEXT_HOP when propagating it to D, D will follow the procedures of <xref target="receiving"/> and will discard the NHC without further processing.</t>
      <t>However, now suppose that on the peerings between A and B, and between C and D, only link-local addresses are used. Further, suppose that A uses link-local address L as its local address on its peering with B, and C also uses the same address, L, as its local address on its peering with D. In the situation described in the previous paragraph, D would have no way of detecting that C had violated the correctness assumptions of this specification, due to the collision between its address and A's.</t>
      <t>It can be seen that since the scope of a link-local address is, of course, only the local link, the problem to be solved is restricted to knowing whether an immediate peer whose link-local address appears in the NHC is truly the originator of that NHC, or if it might be an NHC-incapable speaker that has propagated an NHC that originated elsewhere, with a colliding address.</t>
      <t>It can further be seen that if the procedures of <xref target="bgpid"/> are followed, this issue is resolved since A will attach a BGPID TLV containing its own BGP Identifier and its AS Number, X. Even if C's BGP Identifier is the same as A's, its AS Number is different, and thus D will discard the NHC without further processing.</t>
    </section>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors of this specification thank Randy Bush, Mach Chen, Wes Hardaker, Jeff Haas, Susan Hares, Ketan Talaulikar, and Gyan Mishra for their review and comments.</t>
      <t>This specification derives from two earlier documents, <xref target="I-D.ietf-idr-next-hop-capability"/> and <xref target="I-D.scudder-bgp-entropy-label"/>.</t>
      <t><xref target="I-D.ietf-idr-next-hop-capability"/> included the following acknowledgements:</t>
      <artwork><![CDATA[
    The Entropy Label Next-Hop Capability defined in this document is
    based on the ELC BGP attribute defined in section 5.2 of [RFC6790].

    The authors wish to thank John Scudder for the discussions on this
    topic and Eric Rosen for his in-depth review of this document.

    The authors wish to thank Jie Dong and Robert Raszuk for their
    review and comments.
]]></artwork>
      <t><xref target="I-D.scudder-bgp-entropy-label"/> included the following acknowledgements:</t>
      <artwork><![CDATA[
    Thanks to Swadesh Agrawal, Alia Atlas, Bruno Decraene, Martin
    Djernaes, John Drake, Adrian Farrell, Keyur Patel, Toby Rees, and
    Ravi Singh, for their discussion of this issue. 
]]></artwork>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="W." surname="Henderickx" fullname="Wim Henderickx">
        <organization>Nokia</organization>
        <address>
          <email>wim.henderickx@nokia.com</email>
        </address>
      </contact>
      <contact initials="J." surname="Uttaro" fullname="James Uttaro">
        <organization>Independent Contributor</organization>
        <address>
          <email>juttaro@ieee.org</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
