<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-fcbgp-experiment-00" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="fcbgp-testbed-and-deployment-experience">Forwarding Commitment BGP Testbed and Deployment Experience</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-fcbgp-experiment-00"/>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author fullname="Ziwei Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lizw@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="June" day="10"/>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 83?>

<t>Forwarding Commitment BGP (FC-BGP) enables the establishment of a secure inter-domain routing system by providing security for the path of Autonomous Systems (ASs) through which a BGP UPDATE message passes. In an effort to enhance the validation of FC-BGP, a prototype implementation of the FC-BGP was developed and an evaluation was conducted on the FITI high-performance IPv6 backbone network. This document reports on the prototype implementation and the results of the evaluation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://FCBGP.github.io/FCBGP-experiment/draft-li-fcbgp-experiment.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-li-sidrops-fcbgp-experiment/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FCBGP/FCBGP-experiment"/>.</t>
    </note>
  </front>
  <middle>
    <?line 87?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The current inter-domain routing system lacks a mechanism in BGP to ensure the authenticity of path attributes announced by an Autonomous System (AS). This deficiency exposes a broad attack surface and enables risks such as traffic interception, denial-of-service, and man-in-the-middle attacks<xref target="RFC4272"/>.Forwarding Commitment BGP (FC-BGP) is a novel forwarding-path verification framework designed to address these security challenges inherent in today's inter-domain routing system. By introducing a Forwarding Commitment (FC), FC-BGP offers a solution that integrates seamlessly with the existing routing infrastructure. Through the use of FCs to provide a verifiable view of routing intent, FC-BGP ensures that the actual forwarding path conforms to declared routing policies.</t>
      <t>As part of the development of the Forwarding Commitment BGP (FC-BGP) framework, we implemented a FC-BGP prototype and deployed the prototype in the operational networks of 40 Autonomous Systems (ASes) within the Future Internet Technology Infrastructure (FITI). The evaluation demonstrates that FC-BGP achieves significant performance improvements in large-scale network deployments and that even limited deployment yields substantial security benefits. This document first describes a FC-BGP prototype solution, then outlines the experimental environment, and finally presents the experimental results. It is anticipated that this document will provide useful insights for those interested in this subject and serve as preliminary input for future IETF work in this area.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="a-prototype-fc-bgp-implementation">
      <name>A Prototype FC-BGP Implementation</name>
      <figure anchor="fig-atta-ex">
        <name>An FC-BGP UPDATE propagation example.</name>
        <artwork><![CDATA[
AS(65536) --> AS(65537) --> AS(65538)
                      \
                       \--> AS(65539)
]]></artwork>
      </figure>
      <t>This section describes a prototype implementation of FC-BGP, using a simplified topology as illustrated in <xref target="fig-atta-ex"/>. Only the essential operations are highlighted here; readers are referred to <xref target="FC-BGP-Protocol"/> for the complete protocol specification.</t>
      <t>In this example, all Autonomous Systems (ASes) are standard ASes; Route Servers (RSes) and AS Confederations are not considered. Additionally, no AS Path Protection (ASPP) mechanisms are applied.</t>
      <t>For the purposes of discussion, it is assumed that:</t>
      <ol spacing="normal" type="1"><li>
          <t>AS 65536 owns the prefix 192.0.2.0/24.</t>
        </li>
        <li>
          <t>AS 65537 receives an FC-BGP UPDATE message for the prefix 192.0.2.0/24 from AS 65536.</t>
        </li>
        <li>
          <t>AS 65537 then propagates the route to AS 65538 and AS 65539.</t>
        </li>
      </ol>
      <t>An FC-BGP speaker <bcp14>SHOULD</bcp14> propagate an FC-BGP UPDATE message to downstream ASs only after completing the validation and best route path selection.</t>
      <section anchor="fc-generation-at-the-originating-as">
        <name>FC Generation at the Originating AS</name>
        <t>When preparing to propagate a route, the FC-BGP speaker in AS 65536 performs the following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Constructs the FC segment:  </t>
            <t>
Sets the Previous AS Number (PASN) to 0 (NULL).  </t>
            <t>
Sets the Current AS Number (CASN) to 65536.  </t>
            <t>
Sets the Next AS Number (NASN) to 65537.</t>
          </li>
          <li>
            <t>Computes the signature as follows: Signature=ECDSA(SHA256(PASN, CASN, NASN, Prefix, Prefix Length)).</t>
          </li>
          <li>
            <t>Constructs the FC Path attribute by embedding the newly generated FC segment.</t>
          </li>
          <li>
            <t>Encapsulates the route announcement in a BGP UPDATE message and transmits it to AS 65537.</t>
          </li>
        </ol>
      </section>
      <section anchor="fc-verification-at-the-receiving-as">
        <name>FC Verification at the Receiving AS</name>
        <t>Upon receiving the UPDATE message, the FC-BGP speaker in AS 65537:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extracts the FC Path attribute.</t>
          </li>
          <li>
            <t>Retrieves the list of FC segments.</t>
          </li>
          <li>
            <t>Identifies the FC segment where CASN == 65536.</t>
          </li>
          <li>
            <t>Verifies that:  </t>
            <t>
PASN == 0.  </t>
            <t>
NASN == 65537.</t>
          </li>
          <li>
            <t>Retrieves the corresponding public key using the Subject Key Identifier (SKI) field.</t>
          </li>
          <li>
            <t>Verifies the signature using the algorithm indicated by the Algorithm ID field.</t>
          </li>
        </ol>
        <t>If the signature matches, the AS hop from 65536 to 65537 is considered verified. This process repeats for each FC segment corresponding to the AS_PATH entries if applicable.</t>
        <t>If AS 65537 does not support FC-BGP, its BGP speaker <bcp14>MUST</bcp14> propagate the UPDATE message without validating the FC Path attribute.</t>
      </section>
      <section anchor="fc-generation-at-intermediate-ases">
        <name>FC Generation at Intermediate ASes</name>
        <t>An FC-BGP speaker <bcp14>MUST</bcp14> generate a distinct UPDATE message for each downstream neighbor. Each UPDATE message <bcp14>MUST</bcp14> announce only a single IP prefix and <bcp14>MUST NOT</bcp14> aggregate multiple prefixes.</t>
        <t>This restriction is necessary because different prefixes may follow different routing policies, resulting in different Forwarding Commitments. Aggregating prefixes could cause errors in FC generation and validation.</t>
        <t>Thus, AS 65537 generates:</t>
        <t>An UPDATE message for AS 65538 with NASN set to 65538.</t>
        <t>A separate UPDATE message for AS 65539 with NASN set to 65539.</t>
        <t>For each UPDATE to a downstream neighbor (e.g., AS 65538), the FC-BGP speaker in AS 65537:</t>
        <ol spacing="normal" type="1"><li>
            <t>Encapsulates the route prefix into a single UPDATE message.</t>
          </li>
          <li>
            <t>Constructs a new FC segment:  </t>
            <t>
Sets the Previous AS Number (PASN) to 65536.  </t>
            <t>
Sets the Current AS Number (CASN) to 65537.  </t>
            <t>
Sets the Next AS Number (NASN) to 65538.  </t>
            <t>
Computes the SHA-256 digest over (PASN, CASN, NASN, IP Prefix Address, IP Prefix Length).  </t>
            <t>
Signs the digest using ECDSA.  </t>
            <t>
Fills in the Signature and other required FC fields.</t>
          </li>
          <li>
            <t>Prepends the newly created FC segment to the existing FC List.</t>
          </li>
          <li>
            <t>Completes the FC Path attribute.</t>
          </li>
          <li>
            <t>Continues with standard BGP UPDATE processing and transmission.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="fc-bgp-testbed">
      <name>FC-BGP Testbed</name>
      <section anchor="fiti">
        <name>FITI</name>
        <t>The prototypes of our solutions for FC-BGP are implemented and tested on Future Internet Technology Infrastructure(FITI). FITI is a major scientific and technological infrastructure project in China, constructed and operated by the National Development and Reform Commission, the Ministry of Education, Tsinghua University, and other participating universities. The FITI high-performance backbone network connects 40 universities across 35 cities in 31 provinces, autonomous regions, and municipalities, with backbone links supporting bandwidths of up to 1.2 Tbps. FITI has been assigned 4096 Autonomous System Numbers (ASNs) by APNIC, along with a 240a:a000::/20 IPv6 address block. With geographically distributed sites across China, FITI provides a genuine internet environment suitable for large-scale network experimentation.</t>
      </section>
      <section anchor="fc-bgp-testbed-on-fiti-infrastructure">
        <name>FC-BGP Testbed on FITI Infrastructure</name>
        <t>The FC-BGP testbed was deployed on the FITI backbone network, as illustrated in <xref target="fig-rs-x"/>. FITI provides a network environment comprising 40 interconnected ASes located in cities such as Beijing, Shanghai, Nanjing, and Shenzhen. These ASes are capable of running the BGP protocol, support customizable routing policies, and reflect realistic physical and geographical topologies. Each AS can host multiple routers. The FC-BGP mechanism was implemented in 31 of the ASes, including deployment on commercial H3C CR16000 or CR19000 routers in a subset of them. After software updates, these 31 ASes were fully FC-BGP-enabled, supporting route exchange as well as FC attribute transmission and reception. The remaining 9 ASes did not deploy FC-BGP and were used to construct a partial deployment scenario.The testbed is fully capable of supporting the evaluation requirements for the FC-BGP solution.</t>
        <t>GitHub repository: https://github.com/fcbgp/fcbgp-implementation</t>
      </section>
    </section>
    <section anchor="test-experience-and-results">
      <name>Test Experience and Results</name>
      <t>The prototype implementation of FC-BGP, as described in Section 2, was deployed on the testbed outlined in Section 3. The functionality of the FC-BGP prototype and its compatibility under partial deployment scenarios were evaluated. All features were successfully tested, as detailed in the experimental results presented in this section.</t>
      <section anchor="test-experience">
        <name>Test Experience</name>
        <ol spacing="normal" type="1"><li>
            <t>Functional testing of FC-BGP is conducted to verify the protocol's compliance with its specification in terms of message construction and operational behavior. The evaluation focuses on verifying that a BGP speaker is able to correctly construct BGP UPDATE messages containing the FC path attribute and that the message format conforms to the FC-BGP specification. In addition, the tests validate that the FC-BGP implementation correctly performs AS path validation procedures.</t>
          </li>
        </ol>
        <figure anchor="fig-rs-x">
          <name>FC-BGP Testbed on FITI Infrastructure.</name>
          <artwork><![CDATA[
+--------------+
|    Urumqi    |                                             ...
| +----------+ |                                              |
| |  FC-BGP  | |----+                                 +--------------+
| +----------+ |    |                                 |   Shenyang   |
+--------------+    |                   ...           | +----------+ |
                    |                    |         +--| |  FC-BGP  | |
                    |            +-------+------+  |  | +----------+ |
                   /             |    Beijing   |  |  +--------------+
        +----------\------------| +----------+ |--+
        |           | +----------+ |  FC-BGP  | +---...---+
        |           | |          | +----------+ |         |
        |           | |          +-------+------+         |
        |           | |                  |                |
        |           | |                  |               ...
        |     +-----+-+------+   +-------+------+         |
        |     |     Xi'an    |   |  Zhengzhou   |         |
        |  .  | +----------+ |   | +----------+ |         |
        |  .--| |  FC-BGP  | |   | |  FC-BGP  | |  +------+-------+
        |  .  | +----------+ |   | +----------+ |  |   Shanghai   |
        |     +------+-------+   +-------+------+  | +----------+ |   .
        |            |                   |         | |Legacy-BGP| |-- .
        |            |                   |         | +----------+ |   .
        |            |           +-------+------+  +------+-------+
+-------+------+     |           |     Wuhan    |         |
|     Lhasa    |     |           | +----------+ |         |
| +----------+ |    ... ---------| |Legacy-BGP| |------- ...
| |  FC-BGP  | |                 | +----------+ |         |
| +----------+ |                 +-------+------+         |
+--------------+                         |                |
                                         |                |
                                 +-------+------+         |
                                 |   Changsha   |         |
                                 | +----------+ |         |
                                 | |  FC-BGP  | |         |
                                 | +----------+ |        ...
                                 +-------+------+         |
                                         |                |
                                         |                |
               +--------------+  +-------+------+         |
               |    Nanning   |  |   Guangzhou  |         |
               | +----------+ |  | +----------+ |         |
               | |  FC-BGP  | |--| |  FC-BGP  | |---------+
               | +----------+ |  | +----------+ |
               +--------------+  +----+----+----+
               +--------------+       |    |     +--------------+
               |    Haikou    |       |    |     |   Shenzhen   |
               | +----------+ |       |    |     | +----------+ |
               | |  FC-BGP  | |-------+    +-----| |  FC-BGP  | |
               | +----------+ |                  | +----------+ |
               +--------------+                  +--------------+
]]></artwork>
        </figure>
        <ol spacing="normal" type="1"><li>
            <t>To assess the effectiveness and compatibility of FC-BGP in partial deployment scenarios, a testbed is constructed consisting of routers that support the FC-BGP mechanism and intermediate routers that do not support it. The goal of the testing is to confirm that routers without FC-BGP mechanism support can transparently forward BGP UPDATE messages containing FC path attributes without discarding or altering them. This ensures that FC path attributes are preserved even when traversing BGP routers that do not support the FC-BGP mechanism.</t>
          </li>
          <li>
            <t>Evaluate the compatibility of the FC-BGP prototype device in a variety of network scenarios. Verify the routing processing capabilities of the FC-BGP device under different address families, including IPv4 and IPv6. Test the compatibility of the FC-BGP prototype device, when functioning as a BGP route reflector (RR) and RR client, in networks composed of commercial routers from different vendors.</t>
          </li>
        </ol>
      </section>
      <section anchor="test-results">
        <name>Test Results</name>
        <ol spacing="normal" type="1"><li>
            <t>The test results indicated that the FC-BGP prototype correctly implemented the functionalities as defined in the protocol specification <xref target="FC-BGP-Protocol"/>. All FC-BGP-enabled BGP speakers were able to successfully generate FC-BGP UPDATE messages that conformed to the protocol specification, and the receiving AS was able to correctly perform the path validation procedure. The FC path validation mechanism functioned as intended, verifying each hop in the AS_PATH sequentially. In scenarios where the receiving AS did not support FC-BGP, the system was still able to forward FC-BGP UPDATE messages without disruption.</t>
          </li>
          <li>
            <t>Under partial deployment conditions, FC-BGP demonstrated good compatibility with legacy BGP routers. Commercial routers from different vendors that do not support FC-BGP (such as Huawei and Ruijie) were able to transparently forward UPDATE messages containing FC path attributes, and the integrity of these messages was preserved throughout the forwarding process. These results suggest that FC-BGP supports incremental deployment and remains compatible with existing BGP implementations. With respect to partial deployment, Section 5.1.1 of <xref target="FC-ARXIV"/> demonstrates that an adversary cannot forge a valid AS path when FC-BGP is fully deployed. Furthermore, Section 5.1.2 of <xref target="FC-ARXIV"/> analyzes the advantages of FC-BGP in partial deployment scenarios. The analysis shows that FC-BGP offers greater security benefits than BGPsec under partial deployment conditions.</t>
          </li>
          <li>
            <t>The test results indicated that the FC-BGP prototype device was capable of correctly receiving and processing routing information for all supported address families. When operating as a BGP RR, the FC-BGP prototype device correctly reflected both IPv4 and IPv6 routes to its clients. Additionally, when acting as a BGP RR client, the FC-BGP prototype device was able to properly receive routes from the RR. These results demonstrate that the FC-BGP prototype device exhibits strong compatibility across a variety of network scenarios.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>In conclusion, experimental results demonstrate that:</t>
      <ol spacing="normal" type="1"><li>
          <t>FC-BGP offers efficient and scalable AS path verification while preserving compatibility and stability with existing routing protocols. These advantages are achieved without the need for modifications to the current Internet architecture.</t>
        </li>
        <li>
          <t>Incremental deployment is a key design principle that was used in the experiment. The results indicate that, even with partial deployment, FC-BGP provides significant security benefits in protecting routing information, encouraging early adoption of the solution by service providers.</t>
        </li>
      </ol>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The purpose of this document is to report FC-BGP testbed and experimental results. Security considerations related to the solution mechanisms are discussed in <xref target="FC-BGP-Protocol"/> and <xref target="FC-ARXIV"/> for details.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FC-BGP-Protocol">
          <front>
            <title>FC-BGP Protocol Specification</title>
            <author fullname="Ke Xu" initials="K." surname="Xu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Xiaoliang Wang" initials="X." surname="Wang">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Zhuotao liu" initials="Z." surname="liu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Qi" initials="L." surname="Qi">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Yangfei Guo" initials="Y." surname="Guo">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="6" month="April" year="2025"/>
            <abstract>
              <t>   This document defines an extension, Forwarding Commitment BGP (FC-
   BGP), to the Border Gateway Protocol (BGP).  FC-BGP provides security
   for the path of Autonomous Systems (ASs) through which a BGP UPDATE
   message passes.  Forwarding Commitment (FC) is a cryptographically
   signed segment to certify an AS's routing intent on its directly
   connected hops.  Based on FC, FC-BGP aims to build a secure inter-
   domain system that can simultaneously authenticate the AS_PATH
   attribute in the BGP UPDATE message and alleviate route leaks in the
   BGP routing system.  The extension is backward compatible, which
   means a router that supports the extension can interoperate with a
   router that doesn't support the extension.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wang-sidrops-fcbgp-protocol-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4272">
          <front>
            <title>BGP Security Vulnerabilities Analysis</title>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
              <t>This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4272"/>
          <seriesInfo name="DOI" value="10.17487/RFC4272"/>
        </reference>
        <reference anchor="RFC5065">
          <front>
            <title>Autonomous System Confederations for BGP</title>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol designed for Transmission Control Protocol/Internet Protocol (TCP/IP) networks. BGP requires that all BGP speakers within a single autonomous system (AS) must be fully meshed. This represents a serious scaling problem that has been well documented in a number of proposals.</t>
              <t>This document describes an extension to BGP that may be used to create a confederation of autonomous systems that is represented as a single autonomous system to BGP peers external to the confederation, thereby removing the "full mesh" requirement. The intention of this extension is to aid in policy administration and reduce the management complexity of maintaining a large autonomous system.</t>
              <t>This document obsoletes RFC 3065. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5065"/>
          <seriesInfo name="DOI" value="10.17487/RFC5065"/>
        </reference>
        <reference anchor="ASPP">
          <front>
            <title>AS Path Prepending</title>
            <author fullname="Mike McBride" initials="M." surname="McBride">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Doug Madory" initials="D." surname="Madory">
              <organization>Kentik</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <author fullname="Robert Raszuk" initials="R." surname="Raszuk">
              <organization>NTT Network Innovations</organization>
            </author>
            <author fullname="Hongwei Li" initials="H." surname="Li">
              <organization>HPE</organization>
            </author>
            <author fullname="Jakob Heitz" initials="J." surname="Heitz">
              <organization>Cisco</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <date day="23" month="April" year="2025"/>
            <abstract>
              <t>   Autonomous System (AS) path prepending is a tool to manipulate the
   BGP AS_PATH attribute through prepending one or more Autonomous
   System Numbers (ASNs).  AS path prepending is used to deprioritize a
   route in the presence of a route with a shorter AS_PATH.  By
   prepending a local ASN multiple times, ASes can make advertised AS
   paths appear artificially longer.  However, excessive AS path
   prepending has caused routing issues in the Internet.  This document
   provides guidance for the use of AS path prepending, including
   alternative solutions, in order to avoid negatively affecting the
   Internet.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-as-path-prepending-15"/>
        </reference>
        <reference anchor="RFC7132">
          <front>
            <title>Threat Model for BGP Path Security</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <date month="February" year="2014"/>
            <abstract>
              <t>This document describes a threat model for the context in which External Border Gateway Protocol (EBGP) path security mechanisms will be developed. The threat model includes an analysis of the Resource Public Key Infrastructure (RPKI) and focuses on the ability of an Autonomous System (AS) to verify the authenticity of the AS path info received in a BGP update. We use the term "PATHSEC" to refer to any BGP path security technology that makes use of the RPKI. PATHSEC will secure BGP, consistent with the inter-AS security focus of the RPKI.</t>
              <t>The document characterizes classes of potential adversaries that are considered to be threats and examines classes of attacks that might be launched against PATHSEC. It does not revisit attacks against unprotected BGP, as that topic has already been addressed in the BGP-4 standard. It concludes with a brief discussion of residual vulnerabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7132"/>
          <seriesInfo name="DOI" value="10.17487/RFC7132"/>
        </reference>
        <reference anchor="FC-ARXIV" target="https://arxiv.org/abs/2309.13271">
          <front>
            <title>Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="September"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 312?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7Vc6XbbOJb+r6fAuH90PJEUL1ndXd2lcjZPpRy37VSqa3rO
HIiEJFQoQkWQtpVlnmWeZZ5svnsBkCBFL6nu0jmxLRK4uLj7AmQ0Gg1KXWbq
QGy9NMWlLFKdz8WhWS51uVR5Kb57dSLOlS2nKhUyT8VztcrMml+9uFqpQqs8
UVsDOZ0W6gJQZsl0vhqVbsYIM0ZpPWOkohmJLNXcFOsDgaeDQWqSXC6BR1rI
WTnK9MjqtDArO3IQ3VSGsrMzsNV0qa3VJi/XK0w6enH+Uog/CJlZAyR0jkUV
fuTl1lBsqVSXptAyoy9Hk+/wyxT46/T85dYgr5ZTVRwMUuBzMEhMblVuK3sg
yqJSA2xpfwC4hZKAe2qqEvTZwpNLU3yYF6ZaHQiP6OCDWuNpejAQI5Grq1LM
Va4KWQJLelTlOjEF/2lXsviQEaVTbctCT6sS5M1UOlfF4ELlFTD5gxAe/vtX
9MVt9D2WpXmv6BU9Xkqd0ZBv1ZVcrjI1TsySnssiWRyIRVmu7MGDB9HLBwAH
0LpcVFPi+iE4/IB/RjTewpBMEhcxJADhQWM3c6zNxqQHNeu6LBsvymW2NRjI
qlwY0FqIEf7RZ1ZlmeP790r8VPmnppgfiHOLjS4qKd7l+kIVVpdr/zrBnwfi
O6V/wYjwzFR5SdJ0uNC59A+Vo85V9UF9W3pwY5VW4yTvxeEnLU2mJej7XtaQ
/8XIXALyVVhn5/He/rczc0WvmHN9WP28qEwpjXijfyf6fHQLZLq6E5X+poHK
74PJr5ne2b0TEv8B8q1IE97/TkT5xS/wbaKKXJU34fKzvlRdmvy8MPl8Xsk8
qXLxRk4NDAGs3W9EJtMfL7/9OE8yOd1ExCHxd4jTDGi8qszvh8e8Mmu3Tgeb
QW6KJUzdhSLtfnk4ItNwUpjSJAbzjkbPxyT4HaO+8gNGO/uDgc5nMYzTl4cP
957sHcCqkw86U0lVAFvxY5WRVZ3qTJdaWTHJZba22ropj3YeP6Ipk6o0uVma
yoqztS3VEj4tn6nU22MrsBbBxazJ2cmJw1CrcjaC0b0cSTtayXIBBNmPOOIA
/JPdfcbofAGHUIofTKqyAEqcYEaNp6PC5PSnox8PmIbBzfIAJY7yUhWj1ICu
ufB+hR1s5IYvtBQ/woTOtJxmSvQ6aLvF0Nl7YfHVWOztD8Xezt6+W1UWc1U2
jkAWV/piDMl4IKf2wd7+zrMxtvRkdzAYjUYCz8pCJuVgcH0wcM8xd1uonLCy
olwoAUeBL9oueJiZCSms26eO91n4fVrHkulaQAIuNC9jA4OJnASTGECgNlhp
xb3Jmd3GIMCbL8TlQicLrEjYvTt5Pjl/IZbKWjknGNYqOwa1QVuhZoBditIA
9wU0QvE6FzLTKUsFreZ2NwQ4Fk7yukKT76Sd1aNonhsJe25Fqi5UZlY+RKKV
ALRyo+k9ooq0SsjH4wHPPTo/Egs9h4SpgsWesDk6uXgspjL5MDW5QghRUpAx
hrBpLGGSiokLicQmbIB0LZaECQ0olK0yGu+wbjAbO54vdZpmaoCYASJZGMKT
ApbBOQaDIwWteRMTM+BrQa6lSkBTbZcYzaxgMluSAVqXXD9AabI4hAtzV5Y+
+AGAPIfdSUAiSAUouKnAYPp2IIaaARDiyDUFj8bSfDEtjEwJJBASWHcmQVKi
QhDUQltgaisSFogtghVAcXtL1Ip2PQTkHHHiyMxGVhUXOlFDBgH+jHQ+whZG
jl5+Hfvpk7dTX76M76AzmhDNzYWzGn40mxpxwYqeOObNCth04j4Qsnqegywg
p0xTcJM1zqpGYUD3LFP5HFvU+UJ5jmFCKtd/tDcxbyy+W9N7ZjsboH4jQxvY
HgaJN7MZPCupuMkqRrdcSCck84KCRqAml6C4zdbiEuGiE7wrhLoENqAAe19I
2BsIHISEOOvUmQZX2B8ro6V9OyMBmnsisTW80OqSxjTgSmBaI+lEzzrUWACx
jIzJ7kQQqkn6x+ukCi6tAK0DzBViIsiZhapMLMYXZVAjr/HB3LFO387+mq1D
cRkpLNmNgHejzyR3LndSaVfVne7D4jh3hn15a8F6/nDnGqOpYDWJIX7+y6qs
XRHmI89LFrnJzHyNZzFzsAMYLNa+2IIAvSV8aemYzpT2u5DJQoNCkAQIL4s1
SBGbOuwdTOXdk4TCisBPjWwis9rwiSZxtN6aYQFAxWgN8qo0GiHWWmUpaTdc
GBaDEjcKMkUeNtOl7ZrSmS5sSRqWwAqxDdlgQhDxIREMpr8qkbYFp1fnN1hM
5Re6MPmSZZCwnSF4yjLycFBW2sLGFG+Z4Z1KNgxsHSGUKg1SGyN7qbOs1gTo
B8JPEA70XZTW+0wYQqftcMcAwlzWTJNfVFIyVmTVFJk/oEVUzGVBFmBVlQxj
5iWC0mnmQYBBCfCYnATCqAuy4xRDuXoANqr5u/MZyIJpKnix9cO7s3NKuem3
OH7Lf5+++Nu7o9MXz+nvs9eTN2/qPwZ+xNnrt+/ePG/+amYevv3hhxfHz91k
PBWtR4OtHyZ/33LE33p7cn709njyZqveQU1ISR7JQCgcrUAIVkA7CILAlPvu
8OT//nf3ofj06d9g4fd2d599+eK/PN198hBfLiEQbjWTk6Hjr2DyeiBXKyUL
ggIJEIlcabDbDonsdmEuc0FGGtT89/8kyvzXgfjzNFntPvyLf0Abbj0MNGs9
ZJptPtmY7IjY86hnmZqarecdSrfxnfy99T3QPXr457+SyojR7tO//mUwIBma
iJNawbzGHbWCl8Hgf/gzmJzde/zo0f7jbTEa/UX4b09a355u+xSl+/nHNc/F
P6LZz7bDUp8Q18/0fESOfaSuXLz+zdYkDyj60BIquJJzZ/9CWWXrC8k+qZpK
vGFsbMpNcWSINivrvK+lIbCX7O9XzhRDaqD6lTOzLJufPkWIIvAQb0kAXRxO
toaMX+0bWHc51szIVgACSd+fYH1kym68oBgRHr1wQcanT53sDaIeQvLE0A5K
74rwTtiVSuqwBSJ95LXNU2bIGnC9M6LFyV6ncJyCHv2JcyGFTKag9F3cO3Xj
cnrdzeFodm5K8uHIK7GrdCwmaaqdS8zWQ7ylaZyY0XY8d+5RyrfdRKwOErQ2
A+HHnPw4h1sVLrgEp1Jtk4orjkOhnb22FgbF2eqDwWB3TEuxtArouPUuG+bx
Suw+2xvvjPHvwd7D8WCvHvkElE+UvuD4tyNnIYWp06FNUIgnzLJedTzYjwCz
uwqy6h1WwaQtTRj1NNCVNYGCnBoJ8FV+UIXwpqIGdD2eFD/RvksIFiFlnVmU
M9jYIDgk5J2UizCAnpQeOY7JrMocp8jj/AHriVd1JVX4cO5toefwXgxycjYY
vHf7VQjSeBUT4+yAD+O0LWwQ6lSzzQcojlgzk2XmkmPlUiF3Zg4fcriDoMh6
WMB1ThqN17AsZ8q/OCnUhSZ5B+xjLjCLeyeTs+NtQmxH3Dt+9+bN9rg959An
W9GUwzDFM7g1/phKzNHg43jwEwzeJ3yXqyqwn2Ixyf5dWr89eyDOwtNvXhw+
P5vcgxfZe/SYsR2KQ/55zD9PWADDb/EGGUe52MYuHvbR5aSV31FSp4BmmgYR
yNUlpMNXyKFFDSnHg0dj8SKH20R41JHdkCUufY7Tm/RzrFjI3CJItKSsjcQ/
qSXqxzjd8jJ1ysoYJOrdCm+K+hENaC90izw9cSLz4opLKtcQhq3BqcI3Dpdp
TIY8yfmGQBHLqn1E7QzyDV3Zo9ADTCVeiW++CbICrrg9+tDcSeiJH7TjhOk4
mkO0edRFJjEQSgtKuIypmiIh4hDPeSwacubDy+/xtMYR8nj2/REyHgrLx4PH
LWRiUWzgyGxuEK4vqICQEmdcLYBeTepXR88DyMHRrANqKcsEmbFjC5iwMCtn
IZ12B80g2914DJ9SkutgDw6rkVCOTYU/6SNrhXQmpnebKIDrFvzvk8n5ayQC
RD/I3cx5lISyVYdubZxTgwHkuWy1ompOHQeQwMbSxOFgY8g2ZZDTOahGbVI9
MXsErdeUcu4HL6YJPDngPifAWARVhc6lnMmD5T2uimkVOYJcIeqYmgKKQG86
MxhyUGrvMARJREbVsODzSKFDYCzkfF4opsYS2ZOGW/HDOE1nHlL+U2jn6/E1
V8RRSnSmKpFUWkg1lTCIlWEqhGftbWL0tlsHGPqczdUbooH9pVm4Y48sAwlL
JabKUuEwQdhlCs6AwZp5xBpsufGSvLEKy9cSFLhBfgkM62FE7eO5AsOKblUZ
tOApeXs8gLskUl4//1n//Gc+TFIRU6lC1cd6cU+N5+Ma+afbdzSc/S7AywRy
N9PISht/NqqRS5LkbX6js+7zvLd56idf46mfusEtTw0fPIIThoDNKTQyFwGl
tkeGhnhnPHGVwfiR988eFRhJB9qDdGaXPb4b8RI5hg2FpbMmUqD0Fo8KSP6v
lS6cp2YTTOoGJ3PiWiQ28uoJNUdaPj0YyboIiFdv8Cf7+kOfVVzrIh8zNzGv
whgWxzpnaCdmpOehj+IjAA7ZuXLh5c0fZnDm8Oj8yFUt6iSNg31TFXXlx7mA
UNcqOmU7WshVW6C0d66nhXIatwG4JryUv2AVS0Vt8p+Jh+znw4lknXopYcxu
FyzjRt2QnRq/9oi5FLDxosehVvg8Kl7SwFNFYa+zXD7FofE/6JxOJ3C5/kVa
uVhp2NdiHUZyQlVSV8ciTlRhDFVRuXzY3/rodj1oM7DbUKCHOy0gQiaFgX/e
f0TNS3a0udjfdZUxQKIyS5NuwvgSC30Rn05gADHXOBw6SaoXznTO3QF2yIT6
FHMudVouWCSqFcnw7nhPnE9X1rNugUB6qpB4IBd0VfqHO88e9/QunOZz2nuM
dBYMmZwcHx1SemywFGMixd7DHXkgd3Z2Dg4e7O24dlCo+U8zk3wYi/c0cq7M
vJCrBYkF1C0+QwIiNTTycsGo+sohyRp8R0UVGR3kNKpdggC65Po6SX1fVTYq
YcYpWqxbrAu0aFvqWdH8SH9AyHfPfJE7bo51BWJ4bR2ksCMugnS3WSMc7Y7y
0EKzjYBcudaPEzTl6g8CZA7gvXyFhpHvkg/F2UJCAaSGGZa5e0TidYYM9CP+
sZhbF02xwYAbY4pSs6LK8xCi1YXmxGTDOhJMsEGz1B95xmb8QQvBvlN+TBUc
yhVgLFaLtWUbQa9j6QhVJNY+DsDghhLk8AsDJ1AHUOxZi6CgjkNNP494FBs9
p3C+60G7RNyaJ1nF4U9Ukgc7Qe8lSEwFqdf7h+LwdPcxxJtOX+HPZ/SnX9ol
c1S9V6GhskT4xMUDa2blJRGyWlGb2wX4IDCQYBpfUvZDpzHW4eCB6/ilw1id
XfSgrmhXc06BL1WW0W94nCZRjd2Gp7ZvDjrqFHQSgnn4zK2e6pRDebfx2lFg
JuOFII/LarVxpoogmUiQJKKVTYBzoc2Y1gjKAc/gthVJULSjdjs3OGjXLwlV
oxBkeWcGbX2ly9fVlNvIlo7FrZvDAf5oFx0S4/MZ7udId2qz5ExJ06MDgN6N
cD+j41BvqHqy7kc19zNfn9sb9tqFQBbfhGlN2XfcmSGPcE7Ot5kjGrQ7a5Rp
kTUAUnyUBBltngb31c8bL2me5FxshADNFEdK/iWMBQUhjm0uMvD7LKXOQlOm
vxEUWkVx6yaug3VozkHyy3rDvBqJRU1gn+j6kweQQU51100vEYbnj44KdBgt
cckkU6ZV1mVsFNXFADqkCLU8Bz2Jm5FTtZAIqYuNhuHMwL4pPrzgkHFyLEtf
yamTAVhOEnhWHATbSUlaUKvQZtGHd1p6zfRhZPuIQdNCpNdRprOUZasL3M5N
ouo2nyLx5eVhLZE25GmqgR7o35b8Zid1oRHW2DX/m4Ioh7EpSdS4boPcH7U+
9wefqY/xrqiWv2r66/M1nY7+z3g8BoAI5v2vBCA+Y/7ncMyLlv/swNz26dnH
Jhq340IjyNvSUTTGpgv3OjDYeQtMe/HeflEvNs1DQOiS4nYwYdn7Nbqf74bN
g02YPioRHsYmibuL4vOPeER33XjO59ZqXVY1e6Y3oO3o+rmfbwIUXtw+d5Ny
d5/bN+CfnUuq1H533+MXYXhnpN3Pn/QfEaD5r/j3MyR9/nFhqtb6rbnjXqre
jdDjTQkOu289ut/aRJvRd13fKa6Lnnv2312il3Y9C3V5cA2z2s+wqTdqLpM1
7ZEt2G+F81vw2dzXBn17xebzBrz31aIRF//C+QfxBvmpbF7drM3R3M1XZDjr
Z5uU44/3Kxui1CXcVy3c+tygSH0eoPdzg/bf+vktc++g/Deud0jqYhdStBl8
h7m3Kv8Nc69h4j+xbmwpr/38M8RqEOg++FfO3ZSzu+PM0I+lqwAEfy1eVTKY
9xsI3WdL78rgzVitL3pzcL5+3TtSKPpx+4yGXJ97R/RS9rXUH9hJ1rSIIISQ
kQo0d6PvJoSb930NTe83+N8WKN4ek3897bufDUp2Tj9RMS0cfbpTUY/PPlG/
5dwIPmzvDzrOZpS6XqicnlDq1U62oyQ1vzHnppP4UT0krnFzE7fOeUMhiZOw
UE0r++pZnP7Hfc/W1NS0OrO6dEns3NChqlmd9nEL0PrKzkwXSzc7gApt2Y3F
6zofnDbXmrB5bDhbh5PJtyW3G4ltsxidUfJdSFMImQETnw4vfXe7dSq6B5Lk
xoLiU6KpO2tL5xoJU67AAxqhdxPB+kjuDqO88IWT+ihZSxx6KzWpojP4rjh4
AXlQbmwo7dZS4o8XrOs+oWu41g0hLqCFG0PtxfwSrvrTdHRD3X0ml5jXrnEe
nVw8ZCmiCv3Y1WW+dk9DR9hQsOKulfVVEFeq9GVe6p+enrojcKenIsk0HzEG
Seoj37SuoTojlowqroFLfAai2RmYmprCRjWlunC362S95PNYvijVHMboljea
LTWVjbhOXHYKcty9cZc38qYS1n+UsO8Yoqu3tUu8cdXIl+BC4ahViqtPL/Qe
XvOS7KtArlh2PW7D6G5Nc2CIS5abRStf6mluNPWVekLhfWNEYzcCIfmosrvs
kFJtsSmjcSuezrx4woYDKVb9WrlDodmaa1hRPZMPDm3sJJS0u6dT+LiNa2jR
ZmEEqYDutxzM1zUEjmxUUa18URNu4911VVeqXLpz5cNGVevrBikMsuk6FS5f
ZpyaxGaKO8x3U4pei+ZXvxcaQa8rSfc9WSEr/YtW223B6zfrX2XSGxFzt2oa
e2JVRFNpI2vtr8MRkd35xeaiizOEoTEVNNtW87kzXc3FDb9nkrDE9RLaXHEd
EWqBNOXzzBeO6+b+Zu3T+s4lHZui1hUdz9xg+bCu5j8a7465w8RWgC9RfvnS
c9tEUkGWHBMd7knoHBFfY5jzVSHSorrAysa2KYs7oxAaDFRGL6h5vTSFamOx
t4GFpPumH/1hBawuscW58yp3i2icskt/bZVvBLQvz/j7VXM+RVFsXmOhwXzF
Dm+u71o0+uO8728y7N458h3GpgfVWLfGbJBgRA43uuTlLvVy8b/g4+BexsiS
dZwspIRv2bhWQuwST0+HN2IYo8Ruk449GDC+5aud9nPUxv0f9qW2e2icZUUm
XQRq13sbpYIdoHN7qqippMLqbHr4vOlpVyUjEb+dK+pqActHilwWdIqgbQz9
GYBb4iZ/pQeRDTU86fh+Un8b9nepuji601pt2VUzd0HTXzpKZMZEqdsd8eHb
y4XO6qhTb+6DAJQyNvEbVwmDn65NXKSXfLTfXUdLay/kzirhAcnk0qQ1NnUH
KFx9rQ/z0H+ooekGAflr8lxH/RaSj/PQCVl3cxO4wZRyl50ZSgLCPeGNRmDo
L7e1k2cNfShOm++zm42EuMMP8a27TfOhOfLgyxD9morl8sRUhZy7uIJkWKZm
Fd9+ru9+TtfCX5UN67vYsrmxf+gP28rolpi/WuGgxbezXE7lLjl3D4vwZd7e
G3T1WklrLQzIZNnEczXSnasf/nJHOFWyeQGGVm55AZIb19N1mz2aHE96Nhrv
jA4L5caNlEmwzHwHmw678MWo5ENuLun/geEuPrJy97/TqPSbrZnMrOKLRm+f
vwWAMBLC+P+mRBZWxkcAAA==

-->

</rfc>
