<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-sidrops-fcbgp-framework-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="fcbgp-framework">Framework of Forwarding Commitment BGP</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-sidrops-fcbgp-framework-00"/>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang@cnu.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Li Qi">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="July" day="05"/>
    <area>Routing</area>
    <workgroup>Secure Inter-Domain Routing</workgroup>
    <keyword>BGP Security</keyword>
    <keyword>Inter-Domain Forwarding</keyword>
    <abstract>
      <?line 68?>

<t>This document defines a standard profile for the framework of Forwarding Commitment BGP (FC-BGP). Forwarding Commitment（FC）is a cryptographically signed code to certify an AS's routing intent on its directly connected hops. Based on FC, the goal of FC-BGP is to build a secure inter-domain system that can simultaneously authenticate AS_PATH attribute in BGP-UPDATE and validate network forwarding on the dataplane.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://LucasWang86.github.io/fcbgp--framework/draft-wang-sidr-fcbgpframework.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wang-sidrops-fcbgp-framework/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Inter-Domain Routing Working Group mailing list (<eref target="mailto:sidr@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sidr/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/sidr/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/LucasWang86/fcbgp--framework"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The fundamental cause of the path manipulation attacks in Internet inter-domain routing is that the de facto Border Gateway Protocol (BGP) <xref target="RFC4271"/> does not have built-in mechanisms to authenticate routing announcements. As a result, an adversary can announce virtually arbitrary paths to a prefix while the network cannot effectively verify the authenticity of the route announcements.</t>
      <t>In addition to the lack of control plane authentication, ensuring that the actual forwarding paths in the dataplane comply with the control plane decisions is also missing in today's inter-domain routing system. This fundamentally limits ASes from filtering unwanted traffic which takes an unauthorized AS path.</t>
      <t>The representative schemes to secure inter-domain routing are RPKI <xref target="RFC6480"/> and BGPsec <xref target="RFC8205"/>. RPKI provides a foundation for validating the origins of BGP routes. Meanwhile, BGPsec directly builds the path authentication of BGP routes into the BGP path construction itself, where an AS is required to iteratively verify the signatures of each prior AS hop before extending the verification chain with its own approval. As a result, a single legacy or malicious AS can terminate the verification chain, preventing the downstream ASes from reinstating the verification process. This creates the well-known chicken-and-egg problem where the early adopters receive no deployment benefits which further limits new adoption.</t>
      <t>Finally, due to the lack of practical protocols to check the consistency between the dataplane forwarding and control-plane decisions, enforcing path authorization in the inter-domain forwarding has been not possible to date.</t>
      <t>This document specifies a framework named FC-BGP, an incrementally deployable security augment to the Internet inter-domain routing and forwarding. FC-BGP relies on the Resource Public Key Infrastructure (RPKI) certificates that attest to the allocation of AS number and IP address resources. To support FC-BGP, a BGP speaker needs to possess a private key associated with an RPKI router certificate <xref target="RFC8209"/> that corresponds to the BGP speaker's AS number.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="threat-model-and-assumptions">
      <name>Threat Model and Assumptions</name>
      <t>We assume that ASes participating in FC-BGP have access to RPKI, which stores authoritative information about the mapping between AS numbers and their owned IP prefixes, as well as ASes' public keys. Given the above assumptions, we consider the following adversary:</t>
      <ol spacing="normal" type="1"><li>On the control plane, the adversary can launch path manipulation attacks. This means that the adversary will try to manipulate the routing paths to victim ASes or prefixes by sending bogus BGP updates. For example, the adversary might try to reroute traffic to the victim ASes/prefixes through ASes that they control, in order to perform (encrypted) traffic analysis.</li>
        <li>On the dataplane, the adversary can spoof source addresses and send unwanted network traffic to the victim ASes prefixes.</li>
      </ol>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <figure anchor="figure1">
        <name>Overview of FC-BGP.</name>
        <artwork><![CDATA[
          |     1.BGP Announcement Path        |
          +---------------------+------------->|
Control   |            ^        |              |
Plane     |    1.1     |        |    1.2       |
          | Generation |        v Validation   |
     +----+---+      +-+----------+       +----+---+
     |        |      | Forwarding |       |        |
     |  AS A  |      | Commitment |       |  AS B  |
     |        |      |    (FC)    |       |        |
     +----+---+      +----------+-+       +----+---+
          |            ^        |              |
 Data     |    2.2     |        |    2.1       |
 Plane    | Validation |        |  Binding     |
          |            |        v              |
          |<-----------+-----------------------+
          |         2.Forwarding Path          |
]]></artwork>
      </figure>
      <t>An overview of FC-BGP is shown in <xref target="figure1"/>. The key primitive in FC-BGP is the Forwarding Commitment (FC), which is a publicly verifiable code that certifies an AS's routing intent on one of its directly connected hops, i.e., an FC indicates whether the AS is willing to carry traffic for a specific prefix over the hop.
Upon receiving a BGP announcement, if AS A decides to accept the route and extends the path to its (selected) neighbor AS B, AS A commits its routing intent by generating a cryptographically-signed FC. Therefore, downstream on-path ASes (such as AS B) can validate the correctness of a BGP update by checking the FCs associated with the individual hops on the AS-path. Because the FCs are designed to be hop-specific and path-agnostic, a deployed AS can immediately certify its routing intent regardless of the deployment status of other ASes. This is fundamentally different from existing path-level BGP authentication protocol (e.g., BGPsec) where an on-path AS cannot approve any form of routing intent unless all on-path ASes are upgraded.</t>
      <t>FC-BGP is not bound to a specific FC propagation method and can use, but is not limited to, the following mechanisms:</t>
      <ol spacing="normal" type="1"><li>Extend BGP Update Message. Assign a new BGP Update Path Attribute to carry FCs.</li>
        <li>Propose a new propagation protocol that guarantees consistent FC propagation.</li>
        <li>Use existing network infrastructure, such as extending RPKI to add a new signed object to store FCs.</li>
      </ol>
      <t>Meanwhile, the flexibility of FCs further enables efficient forwarding validation on the dataplane. Specifically, because the FCs are self-proving, an AS can conceptually construct a certified AS-path using a list of consecutive per-hop FCs, and then binds its network traffic (identified by &lt; src-AS, dst-AS, prefix &gt;) to the path, such as &lt; AS B, AS A, P(B) &gt;, where P(B) is the prefix owned by AS B destined to AS A. This binding information essentially defines the authorized forwarding path for the traffic &lt; AS B, AS A, P(B) &gt;. Therefore, by advertising the binding information globally, both on-path and off-path ASes are aware of the desired forwarding paths so that they can collaboratively discard unwanted traffic that takes unauthorized paths.</t>
      <t>Similar to FC propagation, the propagation of binding messages in FC-BGP is not restricted to specific methods and can be, but is not limited to, the following:</t>
      <ol spacing="normal" type="1"><li>Propose a new propagation protocol that guarantees the consistency of binding messages.</li>
        <li>Use existing network infrastructure, such as extending RPKI to add a new signed object to store binding messages.</li>
      </ol>
    </section>
    <section anchor="forwarding-commitment">
      <name>Forwarding Commitment</name>
      <t>FC-BGP enhances the security of inter-domain routing and forwarding by building a publicly verifiable view of the forwarding commitments. At a high level, a routing commitment (FC) of an AS is a cryptographically-signed primitive that binds the AS's routing decisions (e.g. willing to forward traffic for a prefix via one of its directly-connected hops). With this view, ASes are able to:</t>
      <ol spacing="normal" type="1"><li>Evaluate the authenticity (or security) of the control plane BGP announcements based on committed routing decisions from relevant ASes.</li>
        <li>Ensure that the dataplane forwarding is consistent with the routing decisions committed in the control plane.</li>
      </ol>
      <t>Upon receiving a BGP announcement, an upgraded AS generates a corresponding FC that contains the core information of the announcement, such as prefixes, sending AS, and receiving AS, and will be signed with the sender's private key for security.</t>
    </section>
    <section anchor="bgp-path-validation">
      <name>BGP Path Validation</name>
      <figure anchor="figure2">
        <name>Example of FC-BGP.</name>
        <artwork><![CDATA[
                                            FClist:F(C,D,P)
                          FClist:F(B,C,P)          F(B,C,P)
       FClist:F(A,B,P)           F(A,B,P)          F(A,B,P)
     | AS Path:A       |  AS Path:A-B     | AS Path:A-B-C    |
     +---------------->+----------------->+----------------->|
     |                 |                  |                  |
     |                 |                  |                  |
     |                 |                  |                  |
+----+---+        +----+---+         +----+---+         +----+---+
|  AS A  +--------+  AS B  +---------+  AS C  +---------+  AS D  |
+----+---+        +----+---+         +----+---+         +----+---+
     |                 |                  |                  |
     |        F(C,D,P)-(src:P(D),dst:P(A))+<-----------------+
     |                 |                  |                  |
     |                 |                  |                  |
     |                 |<-----------------+------------------+
     |                 |      F(B,C,P)-(src:P(D),dst:P(A))   |
     |                 |                  |                  |
     |                 |                  |                  |
     |<----------------+------------------+------------------+
                   F(A,B,P)-(src:P(D),dst:P(A))
]]></artwork>
      </figure>
      <t>Consider an illustrative example using the four-AS topology shown in <xref target="figure2"/>. In this process, FC-BGP generates the corresponding FC and propagates to downstream ASes (e.g., adding it to the Path Attributes of the BGP updates), so that the receiving AS can validate the authenticity of the announcement. Suppose AS C receives a BGP announcement P(A): A-&gt;B-&gt;C from its neighbor B. If AS C decides to further advertise this path to its neighbor D based on its routing policy, it generates a FC F(C,D,P), propagates it  to AS D, and forwards the BGP update message to D.</t>
      <t>When AS D receives the route from C, it can determine the authenticity of the current AS path by verifying the list of FCs correctly reflects the AS path.</t>
    </section>
    <section anchor="forwarding-validation">
      <name>Forwarding Validation</name>
      <t>AS shown in <xref target="figure2"/>, to enable forwarding validation, ASes need to announce the traffic-FCs binding relationships. Specifically, suppose AS D confirms that the AS-path C-&gt;B-&gt;A for reaching prefix P(A) is legitimate, it binds the traffic (src:P(D),dst:P(A)) (where P(D) is the prefix owned by AS D) with the FC list F(C,D,P)-F(B,C,P)-F(A,B,P), and then publicly announces the binding relationship.</t>
      <t>Upon receiving the relationship, other ASes can build traffic filtering rules based on the relationship to enable forwarding validation on dataplane. For instance, by interpreting the binding relationship produced by AS D, AS C confirms that the traffic (src:P(D), dst:P(A)) shall be forwarded over the link L(CD), and AS B confirms that the traffic shall be forwarded on link L(BC). Network traffic violating these binding rules is considered to take unauthorized paths.</t>
      <t>To enable network-wide forwarding verification, these binding rules may be further broadcast globally (instead of just informing the ASes on the AS-path) so that off-path ASes can also discard unauthorized flows.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="security-guarantees">
        <name>Security Guarantees</name>
        <t>When FC-BGP used in conjunction with origin validation, the following security guarantees can be achieved:</t>
        <ol spacing="normal" type="1"><li>The source AS in a route announcement is authorized.</li>
          <li>FC-BGP speakers on the AS-Path are authorized to propagate the route announcements.</li>
          <li>The forwarding path of packets is consistent with the routing path announced by the FC-BGP speakers.</li>
        </ol>
        <t>FC-BGP is designed to enhance the security of control plane routing and dataplane forwarding in the Internet at the network layer. Specifically, FC-BGP allows an AS to independently prove its BGP routing decisions with publicly verifiable cryptography commitments, based on which any on-path AS can verify the authenticity of a BGP path; meanwhile FC-BGP ensures the consistency between the control plane and dataplane, i.e., the network traffic shall take the forwarding path that is consistent with the control plane routing decisions, or otherwise be discarded. More crucially, the above security guarantees offered by FC-BGP are not binary, i.e., secure or non-secure. Instead, the security benefits are strictly monotonically increasing as the deployment rate of FC-BGP (i.e., the percentage of ASes that are upgraded to support FC-BGP) increases.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
          <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC8205">
        <front>
          <title>BGPsec Protocol Specification</title>
          <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
          <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8205"/>
        <seriesInfo name="DOI" value="10.17487/RFC8205"/>
      </reference>
      <reference anchor="RFC6480">
        <front>
          <title>An Infrastructure to Support Secure Internet Routing</title>
          <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="February" year="2012"/>
          <abstract>
            <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6480"/>
        <seriesInfo name="DOI" value="10.17487/RFC6480"/>
      </reference>
      <reference anchor="RFC8209">
        <front>
          <title>A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests</title>
          <author fullname="M. Reynolds" initials="M." surname="Reynolds"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the Border Gateway Protocol (BGP), as part of an extension to that protocol known as BGPsec. BGP is the standard for inter-domain routing in the Internet; it is the "glue" that holds the Internet together. BGPsec is being developed as one component of a solution that addresses the requirement to provide security for BGP. The goal of BGPsec is to provide full AS path validation based on the use of strong cryptographic primitives. The end entity (EE) certificates specified by this profile are issued to routers within an AS. Each of these certificates is issued under a Resource Public Key Infrastructure (RPKI) Certification Authority (CA) certificate. These CA certificates and EE certificates both contain the AS Resource extension. An EE certificate of this type asserts that the router or routers holding the corresponding private key are authorized to emit secure route advertisements on behalf of the AS(es) specified in the certificate. This document also profiles the format of certification requests and specifies Relying Party (RP) certificate path validation procedures for these EE certificates. This document extends the RPKI; therefore, this document updates the RPKI Resource Certificates Profile (RFC 6487).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8209"/>
        <seriesInfo name="DOI" value="10.17487/RFC8209"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 223?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
