<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-sidrops-bgpsec-transition-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="BGPsec Transition">Transition to Full BGPsec Deployment: Transitive-BGPsec is Incompatible with BGPsec</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-sidrops-bgpsec-transition-00"/>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="June" day="08"/>
    <area/>
    <workgroup>Secure Inter-Domain Routing</workgroup>
    <keyword>BGPsec</keyword>
    <keyword>inter-domain routing</keyword>
    <abstract>
      <?line 57?>

<t>This document elaborates on the reasons why it is unfeasible to reconstruct the native-BGPsec as a transitive approach, such that a BGP update with a correctly signed BGPsec_PATH attribute can traverse legacy areas and afterwards it can still be properly processed by subsequent native-BGPsec speakers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://FCBGP.github.io/BGPsec-Transition/draft-wang-sidrops-bgpsec-transition.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wang-sidrops-bgpsec-transition/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FCBGP/BGPsec-Transition"/>.</t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) <xref target="RFC4271"/> is vulnerable to route leaks and hijacking attacks.</t>
      <t>Native BGPsec, as defined in <xref target="RFC8205"/>, extends BGP to enhance the security of AS path information. Nevertheless, native BGPsec encounters challenges in achieving incremental deployment. It utilizes an optional non-transitive BGP path attribute to deliver digital signatures. Yet, when BGPsec messages traverse BGPsec-unemployed, the last BGPsec-aware router falls back to native BGP protocol to ensure backward compatibility, by completely removing the BGPsec-related path attribute (i.e., the BGPsec_PATH attribute).</t>
      <t>The principal objectives are to make BGPsec transit transparently over BGPsec-unemployed areas, instead of completely falling back to legacy BGP.</t>
      <t>In order to transit across areas where BGPsec has not been deployed, the most straightforward approach is to transform the native BGPsec into transitive BGPsec. However, this document will illustrate that it is unfeasible to render BGPsec as a transitive approach for traversing undeployed areas while still being compatible with native BGPsec. In other words, transitive BGPsec is not compatible with BGPsec.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<dl>
          <dt>BGP:</dt>
          <dd>
            <t>BGP, native BGP, and/or legacy BGP are the BGP version 4 defined in <xref target="RFC4271"/> and/or multiprotocol BGP defined in <xref target="RFC4760"/>. It does not support BGPsec or native BGPsec.</t>
          </dd>
          <dt>BGPsec:</dt>
          <dd>
            <t>BGPsec, native BGPsec, and/or traditional BGPsec are the BGPsec approach defined in <xref target="RFC8205"/>.</t>
          </dd>
          <dt>T-BGPsec:</dt>
          <dd>
            <t>T-BGPsec or transitive BGPsec means that the transitive BGPsec approach is defined in this document.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="transitive-bgpsec-modifications">
      <name>Transitive BGPsec Modifications</name>
      <t>Transitive BGPsec, in essence, describes that the BGPsec_PATh must be transitive and compliant with native BGPsec.</t>
      <section anchor="transitive-bgpsec-negotiation">
        <name>Transitive BGPsec Negotiation</name>
        <t>As stated in <xref section="2.2" sectionFormat="of" target="RFC8205"/>, for a BGPsec router to successfully negotiate with its peer, it must transmit the BGPsec Capabilities that are in accordance with those of its peers in the BGP OPEN message. A transitive path attribute, instead, does not require the negotiation of capabilities with peers. In the event that a peer fails to comprehend the transitive path attribute, it simply forwards it to downstream BGP speakers.</t>
        <t>In transitive BGPsec, negotiating the BGPsec capability is not required. However, a BGPsec router is obligated to inform its peer that it supports transitive BGPsec. In this case, the reuse of the BGPsec capability is essential. Nevertheless, there is no requirement to utilize the Dir field and the AFI field. Transitive BGPsec reuses the native BGPsec capability format. Consequently, the version field of the BGPsec capability must be updated to 1, while the remaining fields should be filled with 0.</t>
        <t>If a BGPsec router negotiates with its peers and the version value of the BGPsec capability is set to 1, this implies that the router supports transitive BGPsec. In this scenario, the BGPsec capability serves two purposes. Firstly, it notifies the peer that this particular BGP speaker is capable of supporting transitive BGPsec. Secondly, it differentiates transitive BGPsec from native BGPsec.</t>
        <t>For the sake of compatibility, this document designates that it still supports native BGPsec in this version.</t>
      </section>
      <section anchor="the-transitive-bgpsecpath-attribute">
        <name>The Transitive BGPsec_PATH Attribute</name>
        <t>Given that the objective is to expedite the incremental deployment of BGPsec, this document considers the least possible modifications to BGPsec. Consequently, all of the packet formats of the BGPsec_PATH attribute defined in <xref target="RFC8205"/> are reutilized in the establishment of transitive BGPsec, including the BGPsec_PATH attribute format, Secure_Path format, Secure_Path Segment format, Signature_Block format, and Signature_Block Segment format.</t>
        <t>In native BGPsec, the BGPsec_PATH attribute is an optional non-transitive BGP path attribute. However, within this document, the BGPsec_PATH attribute is defined as an optional transitive BGP path attribute. It is important to note that the attribute code should remain the same as that of the native BGPsec_PATH attribute.</t>
      </section>
      <section anchor="updating-and-receiving-bgp-update-message">
        <name>Updating and Receiving BGP UPDATE message</name>
        <!-- It is unnecessary to elaborate on the processing of the BGP UPDATE messages. -->
<t>TBD.</t>
      </section>
    </section>
    <section anchor="question-compatibility-with-native-bgpsec">
      <name>Question: Compatibility with Native BGPsec</name>
      <t>Taking the topology presented in <xref target="fig-mix-deployment"/> as an example:</t>
      <ul spacing="normal">
        <li>
          <t>AS A, AS B, and AS C are regions with continuous native BGPsec deployments. Specifically, AS A, AS B, and AS C implement native BGPsec. Additionally, AS C also implements transitive BGPsec.</t>
        </li>
        <li>
          <t>AS D and AS E are areas with legacy BGP deployments. These areas do not implement native BGPsec, transitive BGPsec, or any other related security mechanisms.</t>
        </li>
        <li>
          <t>AS F deploys native BGPsec.</t>
        </li>
      </ul>
      <figure anchor="fig-mix-deployment">
        <name>Example: Mix Deployment Scenario</name>
        <artwork><![CDATA[
+---+     +---+     +---+     +---+     +---+     +---+
| A | --> | B | --> | C | --> | D | --> | E | --> | F | --> ...
+---+     +---+     +---+     +---+     +---+     +---+
|                       |     |             |       |
|                       |     |             |       |
\                       /     \             /       |
 BGPsec Continuous Area      Non-BGPsec Area      BGPsec
]]></artwork>
      </figure>
      <t>AS A is capable of negotiating the BGPsec Capability with AS B. AS A disseminates a route prefix through a BGPsec UPDATE message to AS B.</t>
      <t>AS B can negotiate the BGPsec Capability independently with both AS A and AS C. It receives the BGPsec UPDATE message from AS A and validates it in accordance with the BGPsec specification. Subsequently, it modifies the BGPsec UPDATE message by incorporating its own information and forwards it to AS C.</t>
      <t>AS C obtains the BGPsec UPDATE message from AS B. AS C validates the BGPsec UPDATE message and makes the necessary modifications. In this scenario, because AS D is a legacy AS, AS C converts this message into a transitive BGPsec UPDATE message.</t>
      <t>AS D and AS E refrain from processing this transitive BGPsec message and instead forward it to the subsequent hop.</t>
      <t>AS F receives this transitive BGPsec UPDATE message from AS E. Because AS F deploys the native BGPsec, it will conduct a syntax check. However, the verification will fail because the message is not correctly formatted as a BGPsec UPDATE message.</t>
      <t>In summary, any native BGPsec speaker on the downstream of an undeployed region cannot properly process the transitive BGPsec UPDATE messages sent by upstream ASes.</t>
      <t>Thus, we conclude that the transitive BGPsec is not a viable option to make BGPsec incrementally deployable.</t>
      <t>A new intermediate protocol is required in the transition to full BGPsec deployment.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no security considerations in this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4760">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC9774">
          <front>
            <title>Deprecation of AS_SET and AS_CONFED_SET in BGP</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="L. Hannachi" initials="L." surname="Hannachi"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>BCP 172 (i.e., RFC 6472) recommends not using AS_SET and AS_CONFED_SET AS_PATH segment types in the Border Gateway Protocol (BGP). This document advances that recommendation to a standards requirement in BGP; it prohibits the use of the AS_SET and AS_CONFED_SET path segment types in the AS_PATH. This is done to simplify the design and implementation of BGP and to make the semantics of the originator of a BGP route clearer. This will also simplify the design, implementation, and deployment of various BGP security mechanisms. This document updates RFC 4271 by deprecating the origination of BGP routes with AS_SET (Type 1 AS_PATH segment) and updates RFC 5065 by deprecating the origination of BGP routes with AS_CONFED_SET (Type 4 AS_PATH segment). Finally, it obsoletes RFC 6472.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9774"/>
          <seriesInfo name="DOI" value="10.17487/RFC9774"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8374">
          <front>
            <title>BGPsec Design Choices and Summary of Supporting Discussions</title>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="April" year="2018"/>
            <abstract>
              <t>This document captures the design rationale of the initial draft version of what became RFC 8205 (the BGPsec protocol specification). The designers needed to balance many competing factors, and this document lists the decisions that were made in favor of or against each design choice. This document also presents brief summaries of the arguments that aided the decision process. Where appropriate, this document also provides brief notes on design decisions that changed as the specification was reviewed and updated by the IETF SIDR Working Group and that resulted in RFC 8205. These notes highlight the differences and provide pointers to details and rationale regarding those design changes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8374"/>
          <seriesInfo name="DOI" value="10.17487/RFC8374"/>
        </reference>
      </references>
    </references>
    <?line 176?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
