<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-sidrops-fc-verification-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="FC-based AS_PATH Verification">BGP AS_PATH Verification Based on Forwarding Commitment (FC) Objects</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-sidrops-fc-verification-00"/>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Shenglin Jiang">
      <organization>ZGC Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jiangshl@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Yangfei Guo">
      <organization>ZGC Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="19"/>
    <area/>
    <workgroup>SIDR Operations</workgroup>
    <abstract>
      <?line 72?>

<t>The Forwarding Commitment (FC) is an RPKI object that attests to the complete routing intents description which an Autonomous System (AS) would obey in Border Gateway Protocol (BGP) route propagation. This document specifies an FC-based AS Path Verification methodology to mitigate, even solve, AS Path forgery and route leaks. This document also explains the various BGP security threats that FC can help address and provides operational considerations associated with FC deployment.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://FCBGP.github.io/fc-verification/draft-xu-sidrops-fc-verification.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-xu-sidrops-fc-verification/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SIDR Operations  mailing list (<eref target="mailto:sidrops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sidrops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/sidrops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FCBGP/fc-verification"/>.</t>
    </note>
  </front>
  <middle>
    <?line 76?>

<section anchor="Introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) is vulnerable to route hijacks and route leaks <xref target="RFC7908"/>. Some existing BGP extensions can partially solve or alleviate these problems. Resource Public Key Infrastructure (RPKI) based route origin validation (RPKI-ROV) <xref target="RFC6480"/> <xref target="RFC6811"/> <xref target="RFC9319"/> <xref target="RFC9582"/> and Signed Prefix List-based Route Origin Verification (SPL-ROV) <xref target="I-D.ietf-sidrops-rpki-prefixlist"/> can be used to detect and filter accidental mis-originations. BGPsec is designed to provide security for the AS-path attribute in the BGP UPDATE message <xref target="RFC8205"/>. <xref target="RFC9234"/> and Autonomous System Provider Authorization (ASPA) <xref target="I-D.ietf-sidrops-aspa-profile"/> aim at detecting and mitigating accidental route leaks.</t>
      <t>However, there are still some issues that need to be addressed. ASPA is a genius mechanism to verify BGP AS-path attribute content, which only stores customer-to-provider information in RPKI. Autonomous System Relationship Authorization (ASRA) has listed several security problems with ASPA in <xref section="2" sectionFormat="of" target="I-D.geng-sidrops-asra-profile"/>. Though the validity of the ASPA/ASRA objects is verified, the relationship between two BGP neighbors cannot be attested. When two ASes announce mutually exclusive relationships, for example, AS A says AS B is its Provider and AS B says AS A is its Provider, no other ASes can verify their real relationships.</t>
      <t>The Forwarding Commitment (FC) <xref target="I-D.guo-sidrops-fc-profile"/> is a Resource Public Key Infrastructure (RPKI) object that attests to the complete routing intents description an Autonomous System (AS) would obey in Border Gateway Protocol (BGP) route propagation.</t>
      <t>This document specifies an FC-based AS Path Verification methodology to prevent AS path forgery in the BGP AS-path attribute of advertised routes. FC-based AS_PATH verification also detects and mitigates route leaks.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="DefinitionOfCommonlyUsedTerms">
      <name>Definition of Commonly Used Terms</name>
      <t>The definitions and semantics of Forwarding Commitment (FC) provided in <xref target="I-D.guo-sidrops-fc-profile"/> are applied here.</t>
      <ul spacing="normal">
        <li>
          <t><strong>Route is ineligible</strong>: The term has the same meaning as in <xref target="RFC4271"/>, i.e., "route is ineligible to be installed in Loc-RIB and will be excluded from the next phase of route selection."</t>
        </li>
        <li>
          <t><strong>AS-path</strong>: This term defines a sequence of ASes listed in the BGP UPDATE AS_PATH or AS4_PATH attribute. In this document, the terms AS-path, AS_PATH, and AS4_PATH are interchangeably used.</t>
        </li>
        <li>
          <t><strong>TotallyValid</strong>: This is one of the verification results of using FC objects to verify AS_PATH. This means the FCs of each AS in AS_PATH are all with the 'originASes' field.</t>
        </li>
        <li>
          <t><strong>VFP</strong>: Validated FC Payload (see <xref target="ForwardingCommitment"/>).</t>
        </li>
      </ul>
    </section>
    <section anchor="ForwardingCommitment">
      <name>Forwarding Commitment (FC)</name>
      <t>Forwarding Commitment (FC) objects encapsulate the routing intent description of an Autonomous System (AS). Unlike most RPKI-signed objects, FC objects possess a distinct design regarding verification results. Since FC objects reference Route Origin Authorizations (ROAs) within their content, the verification outcomes for FC are categorized into four distinct states: TotallyValid, Valid, Invalid, and Unknown.</t>
      <t>It is <bcp14>RECOMMENDED</bcp14> that all routing intents be explicitly enumerated within a single FC object. However, due to the inherent complexity of routing intents, providing a comprehensive list can be challenging. Consequently, it is <bcp14>RECOMMENDED</bcp14> to include routing intents with the originASes field designated as 'NONE' when the issuer is unable to specify which routes will be propagated from previousASes to nexthopASes. It may have a few of these routingIntents with the originASes field set as 'NONE'.</t>
      <t>In general, there exists a singular valid FC object corresponding to a specific asID. However, in instances where multiple valid FC objects containing the same asID are present, the union of the resulting routingIntent members constitutes the comprehensive set of members. This complete set, which may arise from either a single or multiple FCs, is locally maintained by a Relying Party (RP) or a compliant router. Such an object is referred to as the Validated FC Payload (VFP) for the asID.</t>
      <t>Except for the empty originASes, there would also be empty previousASes and nexthopASes in a routing intent. It is <bcp14>NOT RECOMMENDED</bcp14> to describe routing intent without nexthopASes as this does not help verify BGP AS_PATH.</t>
      <t>It is <bcp14>REQUIRED</bcp14> at least one routing intent description in an FC object. Otherwise, the empty FC object means no routes can be transited or transformed from this asID.</t>
    </section>
    <section anchor="bgp-aspath-verification-algorithm-using-fc">
      <name>BGP AS_PATH Verification Algorithm Using FC</name>
      <t>FCs describe the local routing intents of an AS. It can be used to verify the AS-path attribute in the BGP UPDATE message.</t>
      <t>Before the AS_PATH verification procedure, it can first perform prefix origin verification with ROA-ROV defined in <xref section="2" sectionFormat="of" target="RFC6811"/> or SPL-ROV defined in <xref section="4" sectionFormat="of" target="I-D.ietf-sidrops-spl-verification"/>.</t>
      <t>An eBGP router that conforms to this specification <bcp14>MUST</bcp14> implement FC-based AS_PATH verification procedures specified below.</t>
      <t>For each received BGP route:</t>
      <ol spacing="normal" type="1"><li>
          <t>Query all the FCs that are issued by the ASes that are in the AS-path attribute;</t>
        </li>
        <li>
          <t>If all ASes on the AS-path have their FCs with the BGP AS-path conforming to all ASes routing intents and the route is also specified in the originASes field, the verification result is TotallyValid;</t>
        </li>
        <li>
          <t>Else, if the originASes field is missing but all ASes on the AS-path have their FCs with the BGP AS-path conforming to all ASes routing intents, the verification result is Valid;</t>
        </li>
        <li>
          <t>Else, if none of the AS on the AS path has its FC, the verification result is Unknown;</t>
        </li>
        <li>
          <t>Else, if some of the ASes on the AS path have their FCs but others ASes do not have their FCs, the verification result is Invalid.</t>
        </li>
      </ol>
      <section anchor="MitigationPolicy">
        <name>Mitigation Policy</name>
        <t>The specific configuration of a mitigation policy based on AS_PATH verification using FC is at the discretion of the network operator. However, the following mitigation policy is highly recommended.</t>
        <t><strong>Invalid</strong>: If the AS_PATH is determined to be Invalid, then the route <bcp14>SHOULD</bcp14> be considered ineligible for route selection and <bcp14>MUST</bcp14> be kept in the Adj-RIB-In for potential future re-evaluation (see <xref target="RFC9324"/>).</t>
        <t><strong>TotallyValid, Valid, or Unknown</strong>: When a route is evaluated as Unknown (using FC-based AS_PATH verification), it <bcp14>SHOULD</bcp14> be treated at the same preference level as a route evaluated as Valid. But TotallyValid has the highest priority in BGP route selection while Valid has a second priority.</t>
      </section>
    </section>
    <section anchor="OperationalConsiderations">
      <name>Operational Considerations</name>
      <t>Multiple valid Forwarding Commitment objects which contain the same asID could exist. In such a case, the union of these objects forms the complete routing intent set of this AS. For a given asID, it is <bcp14>RECOMMENDED</bcp14> that a CA maintains a single Forwarding Commitment. If an AS holder publishes a Forwarding Commitment, then relying parties <bcp14>SHOULD</bcp14> assume that this object is complete for that issuer AS.</t>
      <t>If one AS receives a BGP UPDATE message with the issuer AS in the AS-path attribute which cannot match any routing intents of this issuer AS, it implies that there is an AS-path forgery in this message.</t>
    </section>
    <section anchor="SecurityConsiderations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="IANAConsiderations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC9582">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="RFC9234">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="I-D.guo-sidrops-fc-profile">
          <front>
            <title>A Profile for Forwarding Commitments (FCs)</title>
            <author fullname="Yangfei Guo" initials="Y." surname="Guo">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Xiaoliang Wang" initials="X." surname="Wang">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Ke Xu" initials="K." surname="Xu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Zhuotao liu" initials="Z." surname="liu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Qi" initials="L." surname="Qi">
              <organization>Tsinghua University</organization>
            </author>
            <date day="18" month="February" year="2025"/>
            <abstract>
              <t>   This document defines a Cryptographic Message Syntax (CMS) protected
   content type for Forwarding Commitments (FCs) objects used in
   Resource Public Key Infrastructure (RPKI).  An FC is a digitally
   signed object that provides a means of verifying whether an IP
   address block is received from AS a to AS b and announced from AS b
   to AS c.  When validated, an FC's eContent can be used for the
   detection and mitigation of route hijacking, especially providing
   protection for the AS_PATH attribute in BGP-UPDATE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-guo-sidrops-fc-profile-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
         </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="6" month="January" year="2025"/>
            <abstract>
              <t>   This document defines a Cryptographic Message Syntax (CMS) protected
   content type for Autonomous System Provider Authorization (ASPA)
   objects for use with the Resource Public Key Infrastructure (RPKI).
   An ASPA is a digitally signed object through which the issuer (the
   holder of an Autonomous System identifier), can authorize one or more
   other Autonomous Systems (ASes) as its upstream providers.  When
   validated, an ASPA's eContent can be used for detection and
   mitigation of route leaks.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-19"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a "Signed Prefix List", a Cryptographic Message
   Syntax (CMS) protected content type for use with the Resource Public
   Key Infrastructure (RPKI) to carry the complete list of prefixes
   which an Autonomous System (the subject AS) may originate to all or
   any of its routing peers.  The validation of a Signed Prefix List
   confirms that the holder of the subject AS produced the object, and
   that this list is a current, accurate and complete description of
   address prefixes that may be announced into the routing system
   originated by the subject AS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-04"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-spl-verification">
          <front>
            <title>Signed Prefix List (SPL) Based Route Origin Verification and Operational Considerations</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="14" month="December" year="2024"/>
            <abstract>
              <t>   The Signed Prefix List (SPL) is an RPKI object that attests to the
   complete list of prefixes which an Autonomous System (AS) may
   originate in the Border Gateway Protocol (BGP).  This document
   specifies an SPL-based Route Origin Verification (SPL-ROV)
   methodology and combines it with the ROA-based ROV (ROA-ROV) to
   facilitate an integrated mitigation strategy for prefix hijacks and
   AS forgery.  The document also explains the various BGP security
   threats that SPL can help address and provides operational
   considerations associated with SPL-ROV deployment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-spl-verification-01"/>
        </reference>
        <reference anchor="I-D.geng-sidrops-asra-profile">
          <front>
            <title>A Profile for Autonomous System Relationship Authorization (ASRA)</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>NIST</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a Cryptographic Message Syntax (CMS) protected
   content type for Autonomous System Relationship Authorization (ASRA)
   objects for use with the Resource Public Key Infrastructure (RPKI).
   An ASRA is a digitally signed object through which the issuer (the
   holder of an Autonomous System identifier), can authorize one or more
   other Autonomous Systems (ASes) as its customers and lateral peers.
   When validated, an ASRA's eContent can be used for detection and
   mitigation of BGP AS path manipulation attacks together with
   Autonomous System Provider Authorization (ASPA).  ASRA is
   complementary to ASPA.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-asra-profile-00"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7908">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC9319">
          <front>
            <title>The Use of maxLength in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Y. Gilad" initials="Y." surname="Gilad"/>
            <author fullname="S. Goldberg" initials="S." surname="Goldberg"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>This document recommends ways to reduce the forged-origin hijack attack surface by prudently limiting the set of IP prefixes that are included in a Route Origin Authorization (ROA). One recommendation is to avoid using the maxLength attribute in ROAs except in some specific cases. The recommendations complement and extend those in RFC 7115. This document also discusses the creation of ROAs for facilitating the use of Distributed Denial of Service (DDoS) mitigation services. Considerations related to ROAs and RPKI-based Route Origin Validation (RPKI-ROV) in the context of destination-based Remotely Triggered Discard Route (RTDR) (elsewhere referred to as "Remotely Triggered Black Hole") filtering are also highlighted.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="185"/>
          <seriesInfo name="RFC" value="9319"/>
          <seriesInfo name="DOI" value="10.17487/RFC9319"/>
        </reference>
        <reference anchor="RFC9324">
          <front>
            <title>Policy Based on the Resource Public Key Infrastructure (RPKI) without Route Refresh</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="P. Smith" initials="P." surname="Smith"/>
            <author fullname="M. Tinka" initials="M." surname="Tinka"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>A BGP speaker performing policy based on the Resource Public Key Infrastructure (RPKI) should not issue route refresh to its neighbors because it has received new RPKI data. This document updates RFC 8481 by describing how to avoid doing so by either keeping a full Adj-RIB-In or saving paths dropped due to ROV (Route Origin Validation) so they may be reevaluated with respect to new RPKI data.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9324"/>
          <seriesInfo name="DOI" value="10.17487/RFC9324"/>
        </reference>
      </references>
    </references>
    <?line 176?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71a63LbxhX+j6fYSj9seUTKkp3EVtI0lGQlamSLkWQnaSbT
WQJLYi0Qi+wuRDEevUufpU/W75xdgODFStqmzSQRLns51+98Z8Fer5d47Qt1
KLaOvh6KwdXfh4Prb8Q7ZfVYp9JrU4oj6VQmcHFq7EzaTJcTcWymU+2nqvTi
8enxjrgYvVepd1uJHI2susVyp8e9EU/ctOZWgr9qYuz8UDifJUlm0lJOIUZm
5dj37uqe05k1leuN095tZ2bv6dPE1aOpdg53fl5hztmr61MhtoUsnMHOusxU
pfC/0m/tii2VaW+slgXdnA2O8MdYXF1en24lZT0dKXuYZBDnMElN6VTpanco
vK1VAj2eJdIqiVW3kpmxNxNr6gp3V2cnl+KiUpaFgt7b4kbNMSI7xGVPlOrO
i4kq4wB+Vpc6NTZcu0ram4IsmWnnrR7VHqYqVDZRNrlVZQ1phPjobkIEzbfo
cip1gctosK+08uO+sRN6JW2a41XufeUO9/ZoJD3St6rfDNujB3sja2ZO7cU1
9mjuRPu8HrEnERp7K36gEQWM5nxnfR7ZDxP72qzO2fst5/ZzPy22kkTWPjeW
LNDDf/TPuC6KECDfKvFDHZ9C/ENx7WDGvJbibQm9rNN+Hl+nuDwUR0q/x4jm
malLT2F3nOtSxocqmPCuvlFf+bhcX2V1Py03ynCVq3IC74m/atmuzML87etj
cS5HBp5CcP+HcrynVV1efPXrJC3k6CFJfsTIsdLi69r84WJMajMPy/8OQX7Q
0hQkt/h+xSR/nH9mWPmu2efppwfPvhqbO3rVT800SUpjpwijW06dy9Pj5wef
7cfLT5+/eNpcvthvnr44ePrJIXADQetUGp69/OTFQXz98uDZc7o86530YYtu
0FbWjHWhmreUS+1ridxuB4jmn23g4HAg4vOEHmye2c2Hw87M7vNN29rqRmNb
NdZ3haasjNteDc87u65Nc1WxvmWctmFLQNqkI6/9iKaX65o6q62cLs/dqOvl
iq6JLscrnv3s5dMXjZOe7b9sLw/gr6TX6wk5AqjK1CfJda4eqlvaCVmKy+G3
Z8JwCRM+l15IT8jmhDe4VwjKaVUorwTw2NMyuvRYwolMudTqisvkLNdpTqsN
am9KMzW1E1dz59VUPB5c7YiZqQuU0ZGaY7o4QqlQVnwNCJ3JuRha401qCvEY
wbjD+ygyYSUnARnFdQ5ZUSZrFt5VKoWJFIvfKbViKH2+XL6nCmCamcJM5qQP
1NdYU+0KhTojnClucd3MhKVRgeZYNYtCFEreuNXtqdIKdVcVUpeOTXQrrSaN
iUUgmWqL3MYL1E4yI9n09FikEDZXRSVkllnlHG8DLW81DClMU+BkIagS42Es
eEI6Z1ItqUbOUF1oLdT4wsxJmn7w+VRnGeIN5fUMCGKyOmX1P2x3b+9DRDxs
fWh6WxdUu0eFIpsFS+T6vUxv3KptxIcPMSTv7/viykwVLIMMpDgha4AJgFOw
GqQ/Cr8HGSnmwfTERXCnbkk7sqRjv2PjKax+qZypbarEsB4VOkXxm0O7sZUI
byhUWyUeU/DuiBAAQSywnQlC7FYWOgsxwIN6lxfvdoK0hIf39/EagNhcUza1
10BCXJO2V3pSYvUho4s4h3Ix4C55v4uw31LUPQaANBv+FlZhF7LMSImaFoXB
MyQbcpH2Boh4uEqmqSZGh9gA9+sFFUN09COAk98QR0FWLBIDaxGOCG6O1cFV
r6JgR5YH5kUJSS/IXW+HJ4PrV8ga5+REBVNQoSDnBrugLES7rGf6MOxp6RUo
jP41WoMgfKMputWCVtVTiBX1pwiibWLK8u3CDN30TJJvzAz5bHdJD0QFSCuI
tS4KRBkCEmy5VjEPSxXMA3PHNFRZP9QYQkNirRoKTVWay1K7KY1lQJ6L0CKs
Gg+5Smi4GxHQlBTb4B3YMK1xMVW2502vakzT4jkMowP49jeY8lIVwb+5rtbN
eQlz5tIJih/o40h5GKX1dZNDAS+CdgCDD1cqwMKBMOOHKxo5/Do39SSPAIds
opUxLwTRcLDH1SoUDsewwSmgMnaDsF0NRsrPFADXzwzbsVR6koOhMSqUxrM/
uOyQO77P49DBFWN8CVoEGJjWvmbsUHdpUTtUxKVN3C7HuLqTVK8Y1QfCybmj
qyMSUEPONkY5hOlFM2SwOmRXlEYYCqkgCKVpjAU81Ba7UyR2Rej/Zs396eOE
6ucQgr8f9v7bov2/KtcJWeGPKdjAyVtaAWOrbonuYNZ6TiJIZQZPed2WBeDk
Wk/eJVqhqAfkcV3cgczLWIMSe6l+qbVVUzboOeh4DbAMnkcfLKgRdmLr9dur
a+q66a94c8HXl6++e3t2+eqErq++GZyftxdJHHH1zcXb85PF1WLm8cXr16/e
nITJeCqWHiVbrwc/4g2JvnUxvD67eDM43wp2WiIvVkX8o4iwsC8hiHRJCIwR
bsjjx8N//mP/OSDjTwD9g/1YGOnmxf5nVAFmyNGwG0NeuIVL5omsKiUJ6Ki0
I2kqDcBGcgKvXG5mRIKsgiGf/ESW+flQfDFKq/3nX8YHpPDSw8ZmSw/ZZutP
1iYHI254tGGb1ppLz1csvSzv4Mel+8bunYdf/AWtshK9/Rd/+TLh6DlB5S81
Bx0ClfCBLfiWQvNaWaD2h+3FmItxM4IG8PtI47J2TAhYh0ax9Dp1tOwDCBRL
Efv5QTSiUIEzC0B647OeePIk0B7CylIVICKoNE+eoNOFSAioKRcmyk2H1hjp
jDJKpduFChQ70/v7XaH7qo9ItuvLtQHqPLFDlvTcpL3LsyPWdEalfaRCHSBN
xtZMeU8+eaogAYNAWNqpIpS9/hbLH/EiyIx9WWg2JuEThv9SKyo3WIBhPxbZ
dZbU4Iih+vA8XLcg1AdmL6deKIuePRxl2G3W2I3lqFnFxvQkFjJRYOJzZod9
VuDakFnm76gmt1rgX1Oqpj4vQRu4SF14DouajiOogWjK9oLeRElis0N+C248
PeaZSqbEJMgMjd4cH/AEkwwa+igQU7LaI1BXVUSB350OSc53gZLDlhBgKOeF
kZl47BTxzEW8LsL1/n6nTwnzQCx/2N44MUkemNOoDifLCpaJrcdKpVwqlFRQ
PlYr++JtWegbhLpxnvlcL7LwuNFu196VAeOk3o+PPnWZ+sja4aVJFHiT89Bb
aQrKzlLoIJCU9HCpEVkiiw5U4WLgdthHIYLBW1rOuhYqWAjMAUFPTAp7kYvj
YbX+lZMAATMGPVmIjxxFkUQUdqJyV8Q/Z+VtuKDwflvelMB/+PTMU7x2UDVy
mKJY4yuc5sCgVHtifiVSybatMNUYQSFddCzTF207kNWqIUS6JAiDXwMzuotk
dmW73YiODFk81KqcGlhwTcKBplVDXgKYSth70keAlQE0ICFgbV03g+UZqda0
a1NnkTkhcWJUyFCcxaM3F29ePeIqG7ShlsbSRnXZ9OmBZM1jIxJYTwuVDT1r
wJJ4FR1Z8I6YTMCZm4pugVxeTMHzcgmtpRirWYQV1ypw9pvyO+UXgpPLy/hF
oGi6ND4ncNGBSEMbuoyFI2F/i/CvTMn+gJSyYZIp1j476Xhal6FcIB0cmclS
u1B4DVevLus4/qXmutQWKlqPwx2WcW1y1GVM/9DRUCrSrCUrACvpMwovi5zw
bPeGgy/ChwyCheLgCLMtTcfbpoUk00sL6ho8pTR3IG2cIzFbzYDNuxQEhUm5
MZpCK9IMXh7NuZUo5iTvUFqEO7qGHT5xCdtqsIUQJhboUofju2h5HeHFhm45
VvTNAA5032lPF9gtSfLqLlWVb5+qaUXp1sZIEwKhzWDqPWpGLUUmwUYnNJlU
riQRhyvkXeFp4SAlUNpVaKeoxZOllVlFrta4oY6Uj+qWWv9QHxfoFWgpnVig
NwA2UP19oIjoMnQ/LUxdkBFmcPRux0iL6A8luDRNKkfo8RaPNTmBjEs3dKCw
IEHUQwYnbIuPftUcFIToPp+CdgZGgJJ57BYWI4E4qtYgK9bCK7b7ysnVojv+
d46ZIOqRghIqTtzQnQG+UpWh9WV8pV3H2sLklbKkvQjHae3ZX3cqQxSKIJ3H
RZqXbTgNWZwFwqzx+G7z8OfN4cmDnxLu76HWoBSK9A1ZFoocUIJEjp06vNVA
WhCXWyBNqMCM5eGmtTVLuwplvirMrM8UKLA2q1IFBMpEK8phkuz3xXc1H3aj
QDQ8L1RhG+sLg0hwieq+Kzc7+PPkADEx5gV5hlkeyOUkEBDaqy0d3R4+GqeB
+2al1RgkWGgoG/cODCELE0QRV4vSBsITMJ2W6PKXz5NnffGqoMzU4831jTgy
fYaHVFD+/6D0g8JHqZ93pC477QB4eyuXiHKFs67T4wfXjZTt8+STzsp8qNqu
3NVZbNKZzMOnaC6MzkzA16VRD0oRWSRB2rZ4Hc+DMWJowAvnaAIWz8Kj2CG3
ZIEsrCe1lS2bb4+VKYvCMqPmlx4bU63tnCjaPEsLCpxa5TsMoVSeficRP+YY
2yEo9HpsCqQmrbO+O5bN9SRHEUe6omOhn3CQxk+eRO2pgzobL0EkH/lTQ6nL
9lS7Zdy+4YohSeKpx0i1X5c4T9qWm0r1Sr/MacZ4NKKDLdTzJvWz99SL98Dp
aFplKEA1asW45uNJq3oKUtTxvDp0ePEbZWjqlpvYtl3AYjHiSFs+BpaLJI9r
BkYcx4nHjWMewMkdrhoLC3j6MEfL+AX/qxbtVAGPFbRHs/fSxixqXxwhqrs6
tMce5EVFpclqw4fxdJzWAG/HuCB7RaRUPJdOHuCarJ3YD8dFF50Pg8fLHwY/
bHdeLr9DBrxe4b8bO+KGEgfqGYnxCitOmaUxXedTDcdcEVW4YS5dlkwnL3HN
WOY+fhrdcGIug8QoTpmdTjR9m6WtN3ZTXIfE8aBlu67TBG5SMlQlymuRm4JO
sis6WXc5n/dsnBLTx0b+zJ8tMTqGkER1nKogCcu+YM2tpoH6St+0alAPzHHM
JBGCxJpMAmz47taWiXbyR6tu47nwGWUqPfP4+Sba5sM5UVwx2Jb6gKa4B04e
fhTQ7LN03s7nQg1l2xZXzeemtbBs3qzF5PXFyUU7j8P7bPBmsL4APV2fvHSQ
TTkDcszzZRq+hSbhY/hIpje09iAljKDflfFRffLhMPziTWV/3hqDMqitRiTZ
joRq/wIOp7KAGCgAAA==

-->

</rfc>
