<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
     which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
     please see http://xml.resource.org/authoring/README.html. -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="3"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space 
     (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" docName="draft-wang-idr-flowspec-dip-origin-as-filter-08"
     ipr="trust200902">
  <front>
    <title abbrev="Destination-IP-Origin-AS Filter">Destination-IP-Origin-AS
    Filter for BGP Flow Specification</title>

    <author fullname="Haibo Wang" initials="H." surname="Wang">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street>156 Beiqing Road</street>

          <city>Beijing</city>

          <code>100095</code>

          <country>P.R. China</country>
        </postal>

        <email>rainsword.wang@huawei.com</email>
      </address>
    </author>

    <author fullname="Aijun Wang" initials="A." surname="Wang">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>P.R. China</country>
        </postal>

        <email>wangaj3@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Shunwan Zhuang" initials="S." surname="Zhuang">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street>156 Beiqing Road</street>

          <city>Beijing</city>

          <code>100095</code>

          <country>P.R. China</country>
        </postal>

        <email>zhuangshunwan@huawei.com</email>
      </address>
    </author>

    <date day="20" month="October" year="2023"/>

    <!---->

    <abstract>
      <t>BGP Flowspec mechanism (BGP-FS) <xref target="RFC8955"/> <xref
      target="RFC8956"/> propagates both traffic Flow Specifications and
      Traffic Filtering Actions by making use of the BGP NLRI and the BGP
      Extended Community encoding formats. This document specifies a new
      BGP-FS component type to support AS-level filtering. The match field is
      the origin AS number of the destination IP address that is encoded in
      the Flowspec NLRI. This function is applied in a single administrative
      domain.</t>
    </abstract>

    <note title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref
      target="RFC2119"/>.</t>
    </note>
  </front>

  <middle>
    <section title="Introduction">
      <t>BGP Flow Specification (BGP-FS) <xref target="RFC8955"/> <xref
      target="RFC8956"/> defines a new BGP NLRI to distribute traffic flow
      specification rules via BGP (<xref target="RFC4271"/>). BGP-FS policies
      have a match condition that may be n-tuple match in a policy, and an
      action that modifies the packet and forwards/drops the packet. Via BGP,
      new filter rules can be sent to all BGP peers simultaneously without
      changing router configuration, and the BGP peer can install these routes
      in the forwarding table. BGP-FS defines Network Layer Reachability
      Information (NLRI) format used to distribute traffic flow specification
      rules. NLRI (AFI=1, SAFI=133) is for IPv4 unicast filtering. NLRI
      (AFI=1, SAFI=134) is for BGP/MPLS VPN filtering.<xref
      target="I-D.ietf-idr-flowspec-l2vpn"/>[I-D.ietf-idr-flowspec-l2vpn]
      extends the flow-spec rules for layer 2 Ethernet packets.</t>

      <t>This document specifies a new BGP-FS component type to support
      AS-level filtering. The match field is the origin AS number of the
      destination IP address that is encoded in the Flowspec NLRI. This
      function is applied in a single administrative domain.</t>

      <t/>
    </section>

    <section title="Definitions and Acronyms">
      <t><list style="symbols">
          <t>FS: Flow Specification</t>

          <t>Destination-IP-Origin-AS: The origin AS number of the destination
          IP address</t>
        </list></t>
    </section>

    <section title="The Flow Specification Encoding for Destination-IP-Origin-AS Filter">
      <t>This document proposes a new flow specification component type that
      is encoded in the BGP Flowspec NLRI. The following new component type is
      defined.</t>

      <t><list style="symbols">
          <t>Destination-IP-Origin-AS</t>
        </list></t>

      <t>Type TBD1 - Destination-IP-Origin-AS</t>

      <t>Encoding: &lt;type (1 octet), [op, value]+&gt;</t>

      <t>Contains a set of {operator, value} pairs that are used to match the
      Destination-IP-Origin-AS (i.e. the origin AS number of the destination
      IP address).</t>

      <t>The operator byte is encoded as:</t>

      <t><figure align="center">
          <artwork><![CDATA[    0   1   2   3   4   5   6   7
  +---+---+---+---+---+---+---+---+ 
  | e | a |  len  | 0 |lt |gt |eq | 
  +---+---+---+---+---+---+---+---+

 Figure 1: Numeric Operator (numeric_op)
]]></artwork>
        </figure></t>

      <t>Where:</t>

      <t>e - end-of-list bit. Set in the last {op, value} pair in the
      list.</t>

      <t>a - AND bit. If unset, the previous term is logically ORed with the
      current one. If set, the operation is a logical AND. It MUST be unset in
      the Destination-IP-Origin-AS filter.</t>

      <t>len - The length of the value field for this operator given as (1
      &lt;&lt; len). This encodes 1 (len=00), 2 (len=01), 4 (len=10), and 8
      (len=11) octets.</t>

      <t>lt - less than comparison between data and value.</t>

      <t>gt - greater than comparison between data and value.</t>

      <t>eq - equality between data and value.</t>

      <t>The bits lt, gt, and eq can be combined to produce match the
      Destination-IP-Origin-AS filter or a range of Destination-IP-Origin-AS
      filter(e.g. less than AS1 and greater than AS2).</t>

      <t>The value field is encoded as:</t>

      <t><figure align="center">
          <artwork><![CDATA[   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +---------------------------------------------------------------+
  ~       Destination-IP-Origin-AS  (4 octets)                    ~
  +---------------------------------------------------------------+

      Figure 2: Destination-IP-Origin-AS
]]></artwork>
        </figure></t>

      <t>Per section 10 of <xref target="RFC8955"/> , If a receiving BGP
      speaker cannot support this new Flow Specification component type, it
      MUST discard the NLRI value field that contains such unknown components.
      Since the NLRI field encoding (Section 4 of <xref target="RFC8955"/>) is
      defined in the form of a 2-tuple &lt;length, NLRI value&gt;, message
      decoding can skip over the unknown NLRI value and continue with
      subsequent remaining NLRI.</t>

      <t/>
    </section>

    <section title="Use Cases">
      <t>This section describes how to use this function in a simple scenario.
      Considering the topology shown in Figure 3. In AS64597's R1, if the ISP
      AS64597 wants to redirect all packets originating from IP Prefix 61 to
      AS64598:</t>

      <t>"first go to R3, then forward them to AS64598", the ISP AS64597 can
      use the traditional method or the method defining in this draft.</t>

      <t/>

      <t><figure align="center">
          <artwork><![CDATA[                         +---------+
                         | BGP FS  |
                         | Server  |
                         +----|----+
                              |
                              |
                              /
                             /
                ************/************  IP Prefix 81
                *          /            *  IP Prefix 82
  IP Prefix 61  *         / AS64597     *  IP Prefix 83
                *        /              *  IP Prefix 84
   +-------+    *  +---+/        +---+  *   +-------+
   +AS64596+-------+ R1+---------+ R2|------+AS64598+
   +-------+    *  +-+-+\        +---+  */  +-------+
                *        \         |\   /
                *         \        | \ /*  IP Prefix 91
                *          \       |  /\*  IP Prefix 92
                *           \      | /  \  IP Prefix 93
                *            \     |/   *\ IP Prefix 94
                *             \  +-+-+  * \ +-------+
                *              \-+ R3+------+AS64599+
                *                +---+  *   +-------+
                *                       *
                *************************
  Figure 3: Redirect the traffic using Flowspec

]]></artwork>
        </figure></t>

      <t>Using the traditional method, the ISP AS64597 needs to setup multiple
      "Destination Prefix + Source Prefix" rules in Router R1 as
      following:</t>

      <t><figure align="center">
          <artwork><![CDATA[    +--------------+--------------+-------------------------+
    | Destination  | Source Prefix| Redirect to IP Nexthop  |
    | Prefix       |              |                         |
    +--------------+--------------+-------------------------+
    | IP Prefix 81 | IP Prefix 61 |       R3                |
    +--------------+--------------+-------------------------+
    | IP Prefix 82 | IP Prefix 61 |       R3                |
    +--------------+--------------+-------------------------+
    | IP Prefix 83 | IP Prefix 61 |       R3                |
    +--------------+--------------+-------------------------+
    | IP Prefix 84 | IP Prefix 61 |       R3                |
    +--------------+--------------+-------------------------+
    |                  More ...                             |
    +--------------+--------------+-------------------------+

  Figure 4: Using the traditional method to redirect the traffic

]]></artwork>
        </figure></t>

      <t>Using the method defining in this draft, the ISP AS64597 needs to
      setup only one "Destination Origin AS + Source Prefix" rule in Router R1
      as following:</t>

      <t><figure align="center">
          <artwork><![CDATA[  +--------------+--------------+-------------------------+
  | Destination  | Source Prefix| Redirect to IP Nexthop  |
  | IP Origin AS |              |                         |
  +--------------+--------------+-------------------------+
  |  64598       | IP Prefix 61 |       R3                |
  +--------------+--------------+-------------------------+

  Figure 5: Using the AS-level filtering method to redirect the traffic

]]></artwork>
        </figure></t>

      <t>Obviously, the new method defining in this draft saves a lot of entry
      spaces on the control plane and forwarding plane, and it would greatly
      simplify the operation of the control plane, and the more destination
      prefixes an AS has, the more obvious the benefit.</t>

      <t/>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>No new security issues are introduced to the BGP protocol by this
      specification.</t>

      <t/>
    </section>

    <section title="IANA">
      <t>IANA is requested to a new entry in "Flow Spec component types
      registry" with the following values:</t>

      <t><figure align="center">
          <artwork><![CDATA[   +---------+--------------+---------------------------------+
   |   Type  | RFC or Draft |    Description                  |
   +---------+--------------+---------------------------------+
   |   TBD1  |  This Draft  |    Destination-IP-Origin-AS     |
   +---------+--------------+---------------------------------+
  
]]></artwork>
        </figure></t>
    </section>

    <section anchor="Contributors" title="Contributors">
      <t>TBD</t>
    </section>

    <section anchor="Acknowledgments" title="Acknowledgments">
      <t>The authors would like to acknowledge the review and inputs from Gang
      Yan, Robert Raszuk, Jeffray Haas, Linda Dunbar, Zhenbin Li, Rainbow Wu,
      Jie Dong and Ziqing Cao.</t>
    </section>
  </middle>

  <back>
    <references title="References">
      <?rfc include='reference.RFC.2119'?>

      <?rfc include='reference.RFC.4271'?>

      <?rfc include='reference.RFC.8955'?>

      <?rfc include='reference.RFC.8956'?>

      <?rfc include='reference.I-D.ietf-idr-flowspec-l2vpn'?>
    </references>
  </back>
</rfc>
