<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-idr-fc-path-attribute-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="FC Path Attribute">A profile for FC path attribute</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-idr-fc-path-attribute-01"/>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Jinsi Wu">
      <organization>Tsinghua University</organization>
      <address>
        <email>wjs24@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="August" day="25"/>
    <area>Routing</area>
    <workgroup>Inter-Domain Routing</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 85?>

<t>This document specifies a mechanism for embedding a new path attribute, known as the FC path attribute, into BGP UPDATE messages. The FC (Forwarding Commitment) is a cryptographically signed object to certify an AS's routing intent on its directly connected hops. By incorporating the FC path attribute into BGP UPDATE messages. This mechanism provides enhanced route authenticity and lays the groundwork for improved data-plane forwarding verification. This mechanism is backward compatible, which means a router that supports the attribute can interoperate with a router that doesn't, allowing partial deployment across the Internet.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://FCBGP.github.io/FC-path-attribute/draft-wang-idr-fc-path-attribute.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wang-idr-fc-path-attribute/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FCBGP/FC-path-attribute"/>.</t>
    </note>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes the FC path attribute, a new attribute for providing path security for Border Gateway Protocol (BGP) <xref target="RFC4271"/> route advertisements. That is, a BGP speaker who receives a valid BGP UPDATE message with FC path attribute has the following property: every Autonomous System (AS) on the path of ASes listed in the UPDATE message with a corresponding FC has explicitly authorized the advertisement of the route from the former AS to the subsequent AS in the path. This allows verification of the AS path in the BGP UPDATE messages and data-plane forwarding.</t>
      <t>The FC path attribute is an optional and transitive BGP path attribute. This attribute can be used by a BGP speaker supporting it to generate, propagate, and validate BGP UPDATE messages containing this attribute to obtain the above assurances.</t>
      <t>An FC path attribute consists mainly of one or multiple Forwarding Commitments (FC). The FC path attribute is intended to be used to supplement BGP origin validation <xref target="RFC6483"/> <xref target="RFC6811"/>. As the AS_PATH attribute is preserved, and each Forwarding Commitment (FC) is a publicly Verifiable code certifying the correctness of a three-hop pathlet, the FC path attribute can provide More security than BGPsec <xref target="RFC8205"/> in the case of partial deployment.</t>
      <t>The FC path attribute needs to be associated with an additional mechanism for providing the distribution of AS numbers and managing keys. The Resource Public Key Infrastructure (RPKI) <xref target="RFC8209"/> is one of the options.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="the-fc-path-attribute">
      <name>The FC Path Attribute</name>
      <t>The FC path attribute is an optional and transitive BGP path attribute within the BGP UPDATE
message. BGP speakers do not recognize the FC path attribute <bcp14>SHOULD</bcp14> still transmit this
attribute to their neighbors. AS a result, there is no need to establish a new BGP capability as
defined in <xref target="RFC5492"/>.</t>
      <t>The FC path attribute consists mainly of one or multiple Forward Commitments (FC). The FC
carries the secured information regarding the intent of an AS to propagate the route between
neighboring ASes, and includes the digital signature used to protect the information. The FC path
attribute is independent and doesn't affect other attributes in the BGP UPDATE message.
Although the FC path attribute would not modify the AS_PATH path attribute, it is <bcp14>REQUIRED</bcp14> to
never use the AS_SET or AS_CONFED_SET according to <xref target="RFC6472"/>.</t>
      <section anchor="forwarding-commitment">
        <name>Forwarding Commitment</name>
        <t>A detailed description of the Forwarding Commitment information in the FC path attribute is provided here. The specification for the Forwarding Commitment is provided in <xref target="fig_FC_structure"/>.</t>
        <figure anchor="fig_FC_structure">
          <name>The structure of Forwarding Commitment(FC)</name>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|           Previous Autonomous System Number (PASN)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|           Current Autonomous System Number (CASN)             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|           Nexthop Autonomous System Number (NASN)             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~               Subject Key Identifier (SKI)                    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Algorithm ID |     Flags     |       Signature Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~                          Signature                            ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>In the FC path attribute, all ASs <bcp14>MUST</bcp14> use 4-byte AS numbers in FC segments. Existing 2-byte AS numbers are converted into 4-byte AS numbers by setting the two high-order octets of the 4-octet field to 0 <xref target="RFC6793"/>.</t>
        <t>FC segment includes the following parts.</t>
        <dl newline="true">
          <dt>Previous Autonomous System Number (PASN, 4 octets):</dt>
          <dd>
            <t>The PASN is the AS number of the previous hop AS from which the BGP speaker receives the BGP UPDATE message. If the current AS has no previous AS hop, it <bcp14>MUST</bcp14> be filled with 0.</t>
          </dd>
          <dt>Current Autonomous System Number (CASN, 4 octets):</dt>
          <dd>
            <t>The CASN is the AS number of the BGP speaker that added this FC segment to the FC path attribute.</t>
          </dd>
          <dt>Nexthop Autonomous System Number (NASN, 4 octets):</dt>
          <dd>
            <t>The NASN is the AS number of the next hop AS to which the BGP speaker will send the BGP UPDATE message.</t>
          </dd>
          <dt>Subject Key Identifier (SKI, 20 octets):</dt>
          <dd>
            <t>The SKI is a unique identifier for the public key used for signature verification. If the SKI length exceeds 20 octets, it should retrieve the leftmost 20 octets.</t>
          </dd>
          <dt>Algorithm ID (1 octet):</dt>
          <dd>
            <t>The current assigned value is 1, indicating that SHA256 is used to hash the content to be signed, and ECDSA is used for signing. It follows the algorithm suite defined in <xref target="RFC8208"/> and its updates. Each FC segment has an Algorithm ID, so there is no need to worry about sudden changes in its algorithm. The key in FC-BGP uses the BGPsec Router Key, so its generation and management follow <xref target="RFC8635"/>.</t>
          </dd>
          <dt>Flags (1 octet):</dt>
          <dd>
            <t>Several flag bits. The leftmost bit of the Flags field is the Confed_Segment flag (Flags-CS). The Flags-CS flag is set to 1 to indicate that the BGP speaker that constructed this FC segment is sending the UPDATE message to a peer AS within the same AS confederation <xref target="RFC5065"/>. In all other cases, the Flags-CS flag is set to 0. The second leftmost bit (i.e., the second highest) of the Flags field is the Route_Server flag (Flags-RS). The Flags-RS flag is set to 1 to indicate that a route server adds this FC segment, but the AS number will never appear in the AS_PATH attribute. If the AS number of a router server is inserted into AS_PATH, this Flags-RS flag <bcp14>MUST</bcp14> be set to 0. The third leftmost bit (i.e., the third highest) of the Flags field is the Only_to_Customer flag (Flags-OTC). The Flags-OTC flag is set to 1 to indicate that the FC segment's issuer AS sends routes to its customer or peer. If this Flags-OTC flag is set, the next route propagation will only be permitted to the following customers. The remaining 5 bits of the Flags field are unassigned. They <bcp14>MUST</bcp14> be set to 0 by the sender and ignored by the receiver.</t>
          </dd>
          <dt>Signature Length (2 octets):</dt>
          <dd>
            <t>It only contains the length of the Signature field in octets, not including other fields.</t>
          </dd>
          <dt>Signature (variable length):</dt>
          <dd>
            <t>The signature content and order are Signature=ECDSA(SHA256(PASN, CASN, NASN, Prefix, Prefix Length)), where the Prefix is the IP address prefix which is encapsulated in the BGP UPDATE, i.e., NLRI, and only one prefix is used each time. When hashing and signing, the full IP address and IP prefix length are used, i.e., IPv4 uses 4 octets and IPv6 uses 16 octets.</t>
          </dd>
        </dl>
      </section>
      <section anchor="fc-path-attribute">
        <name>FC Path Attribute</name>
        <t>A detailed description of the FC Path Attribute is provided here. The FC path attribute is in Type-Length-Value format. The specification for the FC Path Attribute is provided in <xref target="fig_fc_path_attr"/>.</t>
        <figure anchor="fig_fc_path_attr">
          <name>FC Path Attribute Structure</name>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Flags     |     Type      |         FCList Length         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~                             FCList                            ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <dl newline="true">
          <dt>Flags (1 octet):</dt>
          <dd>
            <t>The FC path attribute is an optional, transitive, and extended-length path attribute.</t>
          </dd>
          <dt>Type (1 octet):</dt>
          <dd>
            <t>The current value is TBD.</t>
          </dd>
          <dt>FCList Length (2 octets):</dt>
          <dd>
            <t>The value is the total length of the FCList in octets.</t>
          </dd>
          <dt>FCList (variable length):</dt>
          <dd>
            <t>The value is a sequence of FC segments in order.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="the-fc-path-attribute-in-bgp-update-messages">
      <name>The FC Path Attribute in BGP UPDATE Messages</name>
      <t><xref target="sec_construct_fc_path_attr"/> specifies how a BGP speaker supporting the FC path attribute generates or modifies the FC path attribute in a BGP UPDATE message.</t>
      <t><xref target="sec_process_fc_path_attr"/> specifies how a BGP speaker supporting the FC path attribute processes a BGP UPDATE message containing the FC path attribute upon receiving it.</t>
      <section anchor="sec_construct_fc_path_attr">
        <name>Constructing the FC Path Attribute</name>
        <t>A BGP speaker supporting the FC path attribute <bcp14>SHOULD</bcp14> generate a new FC segment or even a new FC path attribute when it propagates a route to its external neighbors. For internal neighbors, the FC path attribute message remains unchanged.</t>
        <t>The information protected by the signature on an FC path attribute includes the AS number of the peer to whom the UPDATE message is being sent. Therefore, if a BGP speaker supporting FC wishes to send a BGP UPDATE message to multiple BGP peers, it <bcp14>MUST</bcp14> generate a separate BGP UPDATE message containing the FC path attribute for each unique peer AS to whom the UPDATE message is sent.</t>
        <t>The BGP speaker supporting the FC path attribute follows a specific process to create the attribute for the ongoing UPDATE message. Firstly, it generates a new FC segment. If there is already an existing FC path attribute, the speaker <bcp14>MUST</bcp14> prepend the new FC segment to the FCList. Otherwise, the speaker generates the FC path attribute and inserts it into the UPDATE message.</t>
        <t>There are three AS numbers in one FC segment. The Previous AS number (PASN) is typically set to the AS number from which the UPDATE message receives. However, if the speaker is located in the origin AS, the PASN <bcp14>SHOULD</bcp14> be filled with 0. The Nexthop AS number (NASN) is set to the AS number of the peer to whom the route is advertised. So if there are several neighbors, the speaker <bcp14>SHOULD</bcp14> generate separate FCs for different neighbors. But it would never develop a new FC segment for the iBGP neighbor.</t>
        <t>The Subject Key Identifier field (SKI) within the new FC segment is populated with the identifier found in the Subject Key Identifier extension of the router certificate associated with the speaker. This identifier enables others to identify the appropriate certificate to employ when verifying signatures in FC segments attached to the router advertisement.</t>
        <t>Typically, the Flags field is set to 0, but the speaker <bcp14>SHOULD</bcp14> modify it based on section 3.1. The Algorithm ID field is set to 1, and the Signature Length field is populated with the length (in octets) of the value in the Signature field.</t>
        <t>The Signature field in the new FC segment is a variable-length field. It contains a digital signature encapsulated in DER format that binds the prefix, its length, and triplet (PASN, CASN, NASN) to the RPKI router certificate corresponding to the FC-BGP speaker. The digital signature is computed as follows:         Signature=ECDSA(SHA256(PASN, CASN, NASN, Prefix, Prefix Length)).</t>
      </section>
      <section anchor="sec_process_fc_path_attr">
        <name>Processing the FC Path Attribute</name>
        <t>AS supporting FC path attribute <bcp14>MUST</bcp14> additionally follow the instructions in this section for processing BGP UPDATE messages containing the FC path attribute, after which the speaker can continue advertising the BGP route. As a prerequisite, the recipient <bcp14>SHOULD</bcp14> have access to certificates.</t>
        <t>First, the integrity of the UPDATE message containing the FC path attribute <bcp14>MUST</bcp14> be checked. The speaker <bcp14>SHOULD</bcp14> check the FC path attribute to ensure that the entire FC path attribute is syntactically correct, the triplet (PASN, CASN, NASN) fields in each FC segment follow the order in AS_PATH, and each FC segment contains one signature with the supported Algorithm ID.</t>
        <t>If any of the checks for the FC path attribute fail, indicating a syntactical or protocol error, it is considered an error. In such cases, FC speakers are <bcp14>REQUIRED</bcp14> to handle these errors using the "treat-as-withdraw" approach as defined in <xref target="RFC7607"/>. Otherwise, the speaker iterates through the FC segments. It <bcp14>SHOULD</bcp14> proceed to validate the signature using the supported algorithm suites. In detail, it <bcp14>SHOULD</bcp14> locate the public key needed to verify the signature in the current segment, compute the digest function, and use the signature validation algorithm to verify the signature in the current segment.</t>
        <t>If all FC segments are marked as 'Valid', then the validation algorithm terminates and the UPDATE message is deemed 'Valid'. Otherwise, the UPDATE message is deemed 'Not Valid'.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>When the FC path attribute is used in conjunction with origin validation, the following security guarantees can be achieved: The source AS in a route announcement is authorized; BGP speakers on the AS path are authorized to propagate the route announcements; The forwarding path of packets is consistent with the routing path announced by the BGP speakers.</t>
      <t>The FC path attribute is designed to enhance the security of control plane routing in the Internet at the network layer. Specifically, it allows an AS to independently prove its BGP routing decisions with publicly verifiable cryptography commitments, based on which any on-path AS can verify the authenticity of a BGP path. More crucially, the above security guarantees offered by the FC path attribute are binary, i.e., secure or non-secure. Instead, the security benefits are strictly monotonically increasing as the deployment rate of the FC path attribute increases.</t>
      <section anchor="mitigation-of-denial-of-service-attacks">
        <name>Mitigation of Denial-of-Service Attacks</name>
        <t>The FC path attribute involves numerous cryptographic operations, which makes BGP speakers supporting it vulnerable to Denial-of-Service (DoS) attacks. This section addresses the mitigation strategies tailored for the specific DoS threats.</t>
        <t>To reduce the impact of DoS attacks, speakers <bcp14>SHOULD</bcp14> employ an UPDATE validation algorithm that prioritizes inexpensive checks (such as syntax checks) before proceeding to more resource-intensive operations (like signature verification).</t>
        <t>Moreover, the transmission of UPDATE messages with the FC path attribute, which entails a multitude of signatures, is a potential vector for denial-of-service attacks. To counter this, implementations of the validation algorithm must cease signature verification immediately upon encountering an invalid signature. This prevents prolonged sequences of invalid signatures from being exploited for DoS purposes. Additionally, implementations can further mitigate such attacks by limiting validation efforts to only those UPDATE messages that, if found to be valid, would be chosen as the best path. In other words, if an UPDATE message      includes a route that would be disqualified by the best path selection process for some reason (such as an excessively long AS path), it is <bcp14>OPTIONAL</bcp14> to include its FC path attribute validity status.</t>
      </section>
      <section anchor="route-server">
        <name>Route Server</name>
        <t>When the Route Server populates its FC Segment into the FC path attribute, it is secure as the path is fully deployed.</t>
        <t>When the Route Server fails to insert the FC Segment, no matter whether its ASN is listed in the AS path, it is considered a partial deployment, which poses a risk of path forgery.</t>
      </section>
      <section anchor="three-as-numbers">
        <name>Three AS Numbers</name>
        <t>An FC segment contains only partial path information, and FCs in the FCList are independent. To prevent BGP Path Splicing attacks, we propose to use the triplet (Previous AS Number, Current AS Number, Nexthop AS Number) to locate the pathlet information.</t>
        <t>But if there is no previous hop, i.e., this is the origin AS that tries to add its FC segment to the BGP UPDATE message, the Previous AS Number <bcp14>SHOULD</bcp14> be populated with 0. But, carefully, AS 0 <bcp14>SHOULD</bcp14> only be used in this case.</t>
        <t>In the context of BGP <xref target="RFC4271"/>, to detect an AS routing loop, it scans the full AS path (as specified in the AS_PATH attribute) and checks that the autonomous system number of the local system does not appear in the AS path. As outlined in <xref target="RFC7607"/>, Autonomous System 0 was listed in the IANA Autonomous System Number Registry as "Reserved - May be used to identify non-routed networks". So, there should be no AS 0 in the AS_PATH attribute of the BGP UPDATE message. Therefore, AS 0 could be used to populate the PASN field when no previous AS hops in the AS path.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requires the following IANA actions:</t>
      <t>This document requests the assignment of a new attribute code described in Section 1 in the "FC Path Attributes" registry. The attribute code for this new path attribute, "FC_PATH", is to provide consistency between the control and data planes. This document is the reference for the new attribute.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
          <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC5065">
        <front>
          <title>Autonomous System Confederations for BGP</title>
          <author fullname="P. Traina" initials="P." surname="Traina"/>
          <author fullname="D. McPherson" initials="D." surname="McPherson"/>
          <author fullname="J. Scudder" initials="J." surname="Scudder"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol designed for Transmission Control Protocol/Internet Protocol (TCP/IP) networks. BGP requires that all BGP speakers within a single autonomous system (AS) must be fully meshed. This represents a serious scaling problem that has been well documented in a number of proposals.</t>
            <t>This document describes an extension to BGP that may be used to create a confederation of autonomous systems that is represented as a single autonomous system to BGP peers external to the confederation, thereby removing the "full mesh" requirement. The intention of this extension is to aid in policy administration and reduce the management complexity of maintaining a large autonomous system.</t>
            <t>This document obsoletes RFC 3065. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5065"/>
        <seriesInfo name="DOI" value="10.17487/RFC5065"/>
      </reference>
      <reference anchor="RFC5492">
        <front>
          <title>Capabilities Advertisement with BGP-4</title>
          <author fullname="J. Scudder" initials="J." surname="Scudder"/>
          <author fullname="R. Chandra" initials="R." surname="Chandra"/>
          <date month="February" year="2009"/>
          <abstract>
            <t>This document defines an Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.</t>
            <t>This document obsoletes RFC 3392. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5492"/>
        <seriesInfo name="DOI" value="10.17487/RFC5492"/>
      </reference>
      <reference anchor="RFC6472">
        <front>
          <title>Recommendation for Not Using AS_SET and AS_CONFED_SET in BGP</title>
          <author fullname="W. Kumari" initials="W." surname="Kumari"/>
          <author fullname="K. Sriram" initials="K." surname="Sriram"/>
          <date month="December" year="2011"/>
          <abstract>
            <t>This document recommends against the use of the AS_SET and AS_CONFED_SET types of the AS_PATH in BGPv4. This is done to simplify the design and implementation of BGP and to make the semantics of the originator of a route more clear. This will also simplify the design, implementation, and deployment of ongoing work in the Secure Inter-Domain Routing Working Group. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="172"/>
        <seriesInfo name="RFC" value="6472"/>
        <seriesInfo name="DOI" value="10.17487/RFC6472"/>
      </reference>
      <reference anchor="RFC6483">
        <front>
          <title>Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs)</title>
          <author fullname="G. Huston" initials="G." surname="Huston"/>
          <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
          <date month="February" year="2012"/>
          <abstract>
            <t>This document defines the semantics of a Route Origin Authorization (ROA) in terms of the context of an application of the Resource Public Key Infrastructure to validate the origination of routes advertised in the Border Gateway Protocol. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6483"/>
        <seriesInfo name="DOI" value="10.17487/RFC6483"/>
      </reference>
      <reference anchor="RFC6793">
        <front>
          <title>BGP Support for Four-Octet Autonomous System (AS) Number Space</title>
          <author fullname="Q. Vohra" initials="Q." surname="Vohra"/>
          <author fullname="E. Chen" initials="E." surname="Chen"/>
          <date month="December" year="2012"/>
          <abstract>
            <t>The Autonomous System number is encoded as a two-octet entity in the base BGP specification. This document describes extensions to BGP to carry the Autonomous System numbers as four-octet entities. This document obsoletes RFC 4893 and updates RFC 4271. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6793"/>
        <seriesInfo name="DOI" value="10.17487/RFC6793"/>
      </reference>
      <reference anchor="RFC6811">
        <front>
          <title>BGP Prefix Origin Validation</title>
          <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
          <author fullname="J. Scudder" initials="J." surname="Scudder"/>
          <author fullname="D. Ward" initials="D." surname="Ward"/>
          <author fullname="R. Bush" initials="R." surname="Bush"/>
          <author fullname="R. Austein" initials="R." surname="Austein"/>
          <date month="January" year="2013"/>
          <abstract>
            <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6811"/>
        <seriesInfo name="DOI" value="10.17487/RFC6811"/>
      </reference>
      <reference anchor="RFC7607">
        <front>
          <title>Codification of AS 0 Processing</title>
          <author fullname="W. Kumari" initials="W." surname="Kumari"/>
          <author fullname="R. Bush" initials="R." surname="Bush"/>
          <author fullname="H. Schiller" initials="H." surname="Schiller"/>
          <author fullname="K. Patel" initials="K." surname="Patel"/>
          <date month="August" year="2015"/>
          <abstract>
            <t>This document updates RFC 4271 and proscribes the use of Autonomous System (AS) 0 in the Border Gateway Protocol (BGP) OPEN, AS_PATH, AS4_PATH, AGGREGATOR, and AS4_AGGREGATOR attributes in the BGP UPDATE message.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7607"/>
        <seriesInfo name="DOI" value="10.17487/RFC7607"/>
      </reference>
      <reference anchor="RFC8205">
        <front>
          <title>BGPsec Protocol Specification</title>
          <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
          <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8205"/>
        <seriesInfo name="DOI" value="10.17487/RFC8205"/>
      </reference>
      <reference anchor="RFC8208">
        <front>
          <title>BGPsec Algorithms, Key Formats, and Signature Formats</title>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <author fullname="O. Borchert" initials="O." surname="Borchert"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 7935 ("The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure").</t>
            <t>This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8208"/>
        <seriesInfo name="DOI" value="10.17487/RFC8208"/>
      </reference>
      <reference anchor="RFC8209">
        <front>
          <title>A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests</title>
          <author fullname="M. Reynolds" initials="M." surname="Reynolds"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the Border Gateway Protocol (BGP), as part of an extension to that protocol known as BGPsec. BGP is the standard for inter-domain routing in the Internet; it is the "glue" that holds the Internet together. BGPsec is being developed as one component of a solution that addresses the requirement to provide security for BGP. The goal of BGPsec is to provide full AS path validation based on the use of strong cryptographic primitives. The end entity (EE) certificates specified by this profile are issued to routers within an AS. Each of these certificates is issued under a Resource Public Key Infrastructure (RPKI) Certification Authority (CA) certificate. These CA certificates and EE certificates both contain the AS Resource extension. An EE certificate of this type asserts that the router or routers holding the corresponding private key are authorized to emit secure route advertisements on behalf of the AS(es) specified in the certificate. This document also profiles the format of certification requests and specifies Relying Party (RP) certificate path validation procedures for these EE certificates. This document extends the RPKI; therefore, this document updates the RPKI Resource Certificates Profile (RFC 6487).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8209"/>
        <seriesInfo name="DOI" value="10.17487/RFC8209"/>
      </reference>
      <reference anchor="RFC8635">
        <front>
          <title>Router Keying for BGPsec</title>
          <author fullname="R. Bush" initials="R." surname="Bush"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <author fullname="K. Patel" initials="K." surname="Patel"/>
          <date month="August" year="2019"/>
          <abstract>
            <t>BGPsec-speaking routers are provisioned with private keys in order to sign BGPsec announcements. The corresponding public keys are published in the Global Resource Public Key Infrastructure (RPKI), enabling verification of BGPsec messages. This document describes two methods of generating the public-private key pairs: router-driven and operator-driven.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8635"/>
        <seriesInfo name="DOI" value="10.17487/RFC8635"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 305?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
