<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.13 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-sidrops-aspa-analysis-00" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="ASPA analysis">An Analysis of ASPA-based AS_PATH Verification</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-aspa-analysis-00"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization/>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@vip.sina.com</email>
      </address>
    </author>
    <date year="2024" month="May" day="22"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 62?>
<t>Autonomous System Provider Authorization (ASPA) is very helpful in detecting and mitigating route leaks (valley-free violations) and a majority of forged-origin hijacks. This document does an analysis on ASPA-based AS_PATH verification to help people understand its strengths and deficiencies.</t>
      <t>The document can help people deploy ASPA properly and provide some potential directions of enhancing ASPA.</t>
    </abstract>
  </front>
  <middle>
    <?line 68?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Autonomous System Provider Authorization (ASPA) is a technique for verifying AS_PATHs in BGP updates <xref target="I-D.ietf-sidrops-aspa-verification"/><xref target="I-D.ietf-sidrops-aspa-profile"/>. Each AS can register ASPA records (also ASPA objects) in the RPKI to authorize a set of ASes as its providers. An AS can obtain ASes' ASPA records through RTRv2 protocol <xref target="I-D.ietf-sidrops-8210bis"/> and conduct AS_PATH verification based the records. ASPA-based AS_PATH verification can detect and mitigate route leaks violating the valley-free principle and path manipulations such as forged-origin or forged-path-segment attacks.</t>
      <t>ASPA can significantly enhance AS_PATH verification and is promising to be widely deployed. Despite of the strengths of ASPA, there are also some deficiencies. This document provides a detailed analysis on the strengths and deficiencies of ASPA.</t>
      <t>The document can help people deploy ASPA properly and provide some potential directions of enhancing ASPA.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The usage of terms follows <xref target="I-D.ietf-sidrops-aspa-verification"/><xref target="I-D.ietf-sidrops-aspa-profile"/>.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="aspa-strengths-and-disclaimers">
      <name>ASPA Strengths and Disclaimers</name>
      <t>ASPA records can be registered by an AS to authorize all its provider ASes. For the two ASes with mutual transit relationship, the two ASes will put each other AS into its own ASPA record (i.e., each AS considers the other AS as its provider).</t>
      <section anchor="protecting-against-route-leak">
        <name>Protecting Against Route Leak</name>
        <t>In full ASPA deployment (within a given region of interest), all "route leaks" (valley-free violations <xref target="RFC7908"/>) are detectable. Route leaks involve one of the following four valley-free violations:</t>
        <ul spacing="normal">
          <li>
            <t>A route is propagated through a P2C (Provider-to-Customer) link and then a C2P (Customer-to-Provider) link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2P (Peer-to-Peer) link and then a C2P link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2P link and then a P2P link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2C link and then a P2P link.</t>
          </li>
        </ul>
        <t>It is expected that in partial ASPA deployment, not all route leaks are detectable.</t>
      </section>
      <section anchor="protecting-against-path-manipulation">
        <name>Protecting Against Path Manipulation</name>
        <t>Path manipulation can be path forgery or path tampering (i.e., insertion or removal of unique ASN) in this document. Forged-origin hijack and fake link-based hijack are all path manipulations.</t>
        <t>In full ASPA deployment (within a given region of interest), ASPA protects against a majority of forged-origin hijacks. Each AS can attest its upstream ASes, so provider or lateral peer cannot be deceived. Customer could be deceived because ASPA does not provide attestations to downstream ASes or peering ASes.</t>
        <t>Even in full ASPA deployment, not all path manipulation attacks can be detected. ASPA does not guarantee path correctness like that provided by BGPsec <xref target="RFC8205"/>.</t>
      </section>
    </section>
    <section anchor="aspa-deficiencies">
      <name>ASPA Deficiencies</name>
      <t>This section describes the deficiencies of ASPA-based AS_PATH verification in detail.</t>
      <section anchor="hard-to-detect-bogus-records">
        <name>Hard to Detect Bogus Records</name>
        <t>An AS can unilaterally authorize a set of its provider ASes. Under the one-direction authorization, an AS may intentionally or unintentionally register bogus records that are hard to be discovered. An AS maliciously registers bogus records that open a door to potential attacks.</t>
        <t><xref target="fig-bogus"/> shows an example of path manipulation attack based on bogus ASPA records. AS4 lies in that the nonadjacent AS3 is its provider in the ASPA record. The attack cannot be detected even when AS1, AS2, AS3, and AS5 register ASPA records correctly and enable ASPA-based AS_PATH verification locally. As a result, AS5 will wrongly consider its traffic to AS1 traverses AS3, while the real forwarding path to AS1 is through AS2 instead of AS3.</t>
        <figure anchor="fig-bogus">
          <name>Path manipulation based on bogus ASPA records</name>
          <artwork><![CDATA[
              +-------+
              |AS1(P1)|Originate route
              +-------+
     path[1] /        \
            /(C2P)     \(C2P)
    +-------+           +-------+
    |  AS2  |           |  AS3  |
    +-------+           +-------+
           \             *
  path[2,1] \(C2P)      * (faked C2P in AS4's
             \         *   bogus ASPA)
              +-------+ ASPA{AS4, [AS2, AS3]}
              |  AS4  | Offender
              +-------+
      path[4,3,1] |(C2P)
              +-------+
              |  AS5  | Victim
              +-------+
  * All ASes register ASPA records
  * AS4's record states a faked C2P link with AS3
  * AS5 enables ASPA-based path verification
]]></artwork>
        </figure>
      </section>
      <section anchor="fail-to-detect-aspath-manipulation-by-a-provider">
        <name>Fail to Detect AS_PATH Manipulation by a Provider</name>
        <t>ASPA-based AS_PATH verification cannot effectively detect the AS_PATH maliciously shortened by a provider, which has been acknowledged in <xref target="I-D.ietf-sidrops-aspa-verification"/>.</t>
        <t><xref target="fig-path-shortened"/> shows an example. AS1 originates the BGP route and propagates the route to other ASes. The AS_PATH received by AS5 is path[4,3,2,1]. However, AS5 maliciously shortens the path by falsely claim a fake link with AS2 before AS5 propagates the route to AS6. AS6's traffic to AS1 may be hijacked by AS5 if the path[5,2,1] is shorter than any other AS_PATHs. In the example, AS5 may not intend to drop data traffic from AS6. That is, AS5 (provider) wants AS6 (customer) to prefer AS5's transit path for increasing revenue.</t>
        <t>In this case, the attack cannot be detected even when all the ASes register the correct ASPA records and all the ASes other than AS5 enable ASPA-based AS_PATH verification.</t>
        <figure anchor="fig-path-shortened">
          <name>AS_PATH maliciously shortened by a provider</name>
          <artwork><![CDATA[
                  +-------+
                  |  AS4  |    path[4,3,2,1]
                  +-------+----------------
      path[3,2,1]/         \               \
                /(C2P)      \               \(C2P)
        +-------+            \path[4,3,2,1] +-------+
        |  AS3  |             \             |  AS7  |
        +-------+              \            +-------+
  path[2,1] |             (C2P) \             /
      (C2P) |                    \ Offender  /
        +-------+ (Fake link) +-------+     /
        |  AS2  |*************|  AS5  |    /
        +-------+             +-------+   /path[7,4,3,2,1]
    path[1] |          path[5,2,1]|      /
      (C2P) |     (path shoterned)|(C2P)/(C2P)
        +-------+             +-------+/
        |AS1(P1)|             |  AS6  | Victim
        +-------+             +-------+
      Originate route
]]></artwork>
        </figure>
        <t>AS_PATH manipulation by a provider may also be used to do malicious route leaks. ASPA is not designed for defensing path manipulation. So, some malicious route leaks with path manipulation involved cannot be prevented.</t>
        <t><xref target="fig-malicious-leak"/> shows an example. AS2 is AS1's provider and arguably it may not leak its customer's prefix (P2) intentionally. But to increase revenue, AS2 may maliciously leak P2 with a modified AS_PATH (i.e., AS3 is removed) to AS4 for attracting more traffic to traverse AS2. Sometimes this attack may happen and goes undetected.</t>
        <figure anchor="fig-malicious-leak">
          <name>Malicious route leak</name>
          <artwork><![CDATA[
        +-------+
        |  AS4  |-------------
        +-------+             \
P1 path[2,1]|                  \
P2 path[2,1]|                   \ P2 path[3,1]
       (C2P)|                    \(C2P)
        +-------+ P2 path[3,1]+-------+
Offender|  AS2  |-------------|  AS3  |
        +-------+    (P2P)    +-------+
               \             /
      P1 path[1]\           /P2 path[1]
                 \(C2P)    /(C2P)
                  +---------+
                  |   AS1   |Originate route
                  | (P1&P2) |
                  +---------+
]]></artwork>
        </figure>
        <!-- ## Cannot Distinguish Leak and Hijack for an Invalid AS_PATH
Existing ASPA verification algorithm can identify Invalid AS_PATHs, but it cannot distinguish leak and hijack for an Invalid AS_PATH. The main reason is that ASPA records only focus on registering all provider ASes while not indicating the adjacency/topology information. When the Hop-check(x, y) function returns "Not provider+", the algorithm does not know whether the real cause of the result is i) ASy is ASx's customer/peer instead of provider or ii) link(x,y) is a fake link. Therefore, when the algorithm returns Invalid, it is not able to indicate whether the path is caused by a fake link-based hijack or not. 

For operators, it's instructive to know the type of an Invalid AS_PATH. If there exists no hijack, the Invalid AS_PATH is likely to be an unintentional route leak. Otherwise, the network may be attacked by path manipulation attacks.  -->

</section>
      <section anchor="not-directly-applicable-to-ibgp-ingress-and-ebgp-egress-verification">
        <name>Not Directly Applicable to IBGP Ingress and EBGP Egress Verification</name>
        <t>IBGP ingress verification and eBGP egress verification are meaningful in many scenarios. IBGP ingress verification is to check the AS_PATH received through iBGP connections. IBGP ingress verification helps an AS do verification on any BGP routers like non-ASBRs. EBGP egress verification means verifying the AS_PATH before sending it to the neighbor AS. It can prevent an AS from sending routes with Invalid AS_PATH to its neighbor ASes (just like eBGP egress RPKI-ROV <xref target="RFC8893"/>).</t>
        <t>However, current ASPA document <xref target="I-D.ietf-sidrops-aspa-verification"/> does not specify how to do iBGP ingress verification. For iBGP ingress verification, the router (e.g., an RR) conducting the verification may not have BGP sessions with the neighbor AS that propagates the route and thus does not know the local BGP role with respect to the neighbor AS. Even so, iBGP ingress verification is doable because the router can obtain the local BGP role from the ASPA records of local AS. In <xref target="fig-egress-veri"/>, when RR wants to do iBGP ingress verification, it can look up AS2's own ASPA records. If AS1 is listed as a provider, then apply the Downstream verification algorithm. If AS1 is not listed as a provider, then apply the Upstream verfication algorithm. Such an iBGP ingress verification also works correctly in RS and RS-client scenarios.</t>
        <figure anchor="fig-egress-veri">
          <name>IBGP and eBGP verification</name>
          <artwork><![CDATA[
          +-------------------------------+
          | AS2                           |
   path[1]| +-----+    +-----+    +-----+ |path[2,1]
AS1-------|->ASBR1|----> RR  |---->ASBR2|-|----->AS3
         /| +-----+   /+-----+    +-----+ |\
        / |          /                    | \
       /  +---------/---------------------+  \
      /            /                          \
  eBGP ingress   iBGP ingress              eBGP egress
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-sidrops-aspa-verification"/> does not specify how to do eBGP egress verification either. To try to do this, the router should add its own AS (i.e., AS2) to the AS_PATH and then performs ASPA-based AS_PATH verification from the perspective of next-hop AS (see Section 7.2 in version-15 of <xref target="I-D.ietf-sidrops-aspa-verification"/>). According to the verification result, the router decides to propagate the route or not. 
In <xref target="fig-egress-veri"/>, ASBR2 would add its own AS (i.e., AS2) to the AS_PATH. If the BGP role of ASBR2 with respect to AS3 is customer/lateral peer/RS/RS-client, the Upstream verification algorithm will be conducted. If the BGP role of ASBR2 with respect to AS3 is provider, the Downstream verification algorithm will be performed. The verification process also works well in mutual transit scenarios.</t>
        <!-- The problem of eBGP egress verification described above is that not all Invalid AS_PATHs (leaked routes) can be prevented from being propagated. Suppose the next-hop AS (i.e., neighbor AS3) is a lateral peer or provider. When the preceding AS (i.e., neighbor AS1) is also a lateral peer or provider but does not have an ASPA registered, the verification result can be Unknown (rather than Invalid). The route leak cannot be prevented in the case.  -->

<t>The relationship between AS1 and AS2 can sometimes be obtained by ASBR2 from AS2's ASPA records. If AS1 is listed as a provider in the AS2's ASPA records, then the above route leak can be detected and prevented. If AS1 is not listed in the AS2's ASPA records, ASBR2 cannot decide AS1 is a lateral peer or a customer. Therefore, the above route leak cannot be detected directly.</t>
        <t>Overall, iBGP ingress verification is doable with help of local AS's own ASPA records, while it is not possible to do eBGP egress verification correctly without more complexity.</t>
      </section>
      <section anchor="not-applicable-to-complex-relationship-scenarios">
        <name>Not Applicable to Complex Relationship Scenarios</name>
        <t>AS relationships in practical networks may be more complex than the traditional P2C/P2P model <xref target="as-rela-1"/><xref target="as-rela-2"/>. In ASPA, only the complex relationship of mutual transit relationship has been considered. The followings are some other complex scenarios that are not covered by ASPA:</t>
        <ul spacing="normal">
          <li>
            <t>Hybrid relationship <xref target="as-rela-1"/><xref target="as-rela-2"/>. Two ASes may agree to have different traditional relationships for different Points-of-Presence (PoPs). A hybrid relationship may be dependent on IP versions or/and PoP locations (see <xref target="fig-hybrid-rela"/> for examples), even prefixes (i.e., different relationships/policies for different prefixes).</t>
          </li>
        </ul>
        <figure anchor="fig-hybrid-rela">
          <name>Hybrid relationship</name>
          <artwork><![CDATA[
+-------+  Europe P2C  +-------+
|       |-------------->       |
|  AS1  |              |  AS2  |
|       |-------------->       |
+-------+   Asia P2P   +-------+

      (a) Location-dependent


+-------+   IPv6 P2C   +-------+
|       |-------------->       |
|  AS1  |              |  AS2  |
|       |-------------->       |
+-------+   IPv4 P2P   +-------+

      (b) IP version-dependent
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Partial transit relationship <xref target="as-rela-1"/><xref target="as-rela-2"/>. For a customer, the provider offers transit only toward the provider's peers and customers (or specific regions), but not the provider's providers, or restricts transit to a specific geographic region. <xref target="fig-hybrid-rela"/> shows an example. AS2 is the partial transit provider of AS1. AS2 should only propagate AS1's route to AS4 (i.e., AS2's peer) and AS5 (i.e., AS2's customer), but should not propagate the route to AS3 (i.e., AS2's provider).</t>
          </li>
        </ul>
        <figure anchor="fig-partial-transit">
          <name>Partial transit relationship</name>
          <artwork><![CDATA[
        +-------+
        |  AS3  |
        +-------+
  path[2,1] |
(route leak)|
            |
       (C2P)|
        +-------+  path[2,1]  +-------+
Offender|  AS2  |-------------|  AS4  |
        +-------+    (P2P)    +-------+
     Partial|    \                |
     transit|     \ path[2,1]     | path[4,2,1]
            |      ----------     |
    path[1] |           (C2P)\    |(C2P)
        +-------+             +-------+
        |  AS1  |             |  AS5  |
        +-------+             +-------+
      Originate route
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Persistent valley-path (legitimate valley-path) (<xref target="valley-path"/>). There may be legitimate valley-paths, i.e., violating the valley-free principle but the AS_PATH is legitimate. According to BGP data analysis, the persistent valley-path can be 10% of all BGP paths.</t>
          </li>
        </ul>
        <figure anchor="fig-valley-path">
          <name>Persistent valley-path</name>
          <artwork><![CDATA[
  Originate route
    +-------+             +-------+
    |AS1(P1)|             |  AS3  |
    +-------+             +-------+
            \             /
      path[1]\           / path[2,1] (not route leak)
              \(C2P)    /(C2P)
              +---------+
              |   AS2   |
              +---------+
]]></artwork>
        </figure>
        <t>ASPA records do not support the registration of complex relationships except the mutual transit relationship. As a result, in the complex scenarios, AS_PATH cannot be effectively protected by ASPA-based AS_PATH verification.</t>
      </section>
      <section anchor="reduced-protection-capability-in-partial-deployment">
        <name>Reduced Protection Capability in Partial Deployment</name>
        <t>To verfify an AS_PATH, ASPA verification algorithms need to check each hop of the AS_PATH. When ASPA records of the ASes along the path are partially registered, not all hops in the path can be checked. In such partial deployment scenarios, ASPA may have a reduced protection capacity.</t>
        <t><xref target="fig-partial-deploy"/> shows two examples of partial deployment. In <xref target="fig-partial-deploy"/> (a), AS3 cannot detect the route leak of P1 induced by AS2 if AS1 has no ASPA record registered. This is because the Hop-check(AS1, AS2) function returns "No Attestation" and the final verification result is Unknown. In <xref target="fig-partial-deploy"/> (b), AS3 is deceived by AS2 who falsely claims AS1 is AS2's neighbor. The attack in the example is undetectable because AS1 registers no ASPA record and AS3 cannot judge the validity of the link between AS1 and AS2.</t>
        <figure anchor="fig-partial-deploy">
          <name>Partial deployment</name>
          <artwork><![CDATA[
                            +-------+
                            |  AS3  |
                            +-------+
                            /
                           / path[2,1] (route leak)
   No ASPA                /(C2P)
  +-------+  (P2P)  +-------+
  |AS1(P1)|---------|  AS2  | Offender
  +-------+ path[1] +-------+
Originate route

      (a) Route leak in partial deployment

                            +-------+
                            |  AS3  |
                            +-------+
                            /
                           / path[2,1] (path manipulation)
   No ASPA (no adjacency) /(C2P)
  +-------+         +-------+
  |AS1(P1)|*********|  AS2  | Offender
  +-------+ path[1] +-------+
Originate route

      (b) Forged-origin attack in partial deployment
]]></artwork>
        </figure>
        <!-- ........................................................................ -->

</section>
    </section>
    <section anchor="reasons-of-aspa-deficiencies">
      <name>Reasons of ASPA Deficiencies</name>
      <t>This section summarizes three main reasons that result in deficiencies of ASPA:</t>
      <ul spacing="normal">
        <li>
          <t>ASPA record is authorized in one direction, e.g., an AS can unilaterally claim that another AS is its provider without the consent of other ASes. Related deficiencies:
          </t>
          <ul spacing="normal">
            <li>
              <t>Hard to detect bogus records</t>
            </li>
          </ul>
        </li>
        <li>
          <t>An ASPA record only focuses on including all provider ASes while ignoring other topology or relationship information. Related deficiencies:
          </t>
          <ul spacing="normal">
            <li>
              <t>Hard to detect bogus records</t>
            </li>
            <li>
              <t>Fail to detect AS_PATH maliciously shortened by a provider</t>
            </li>
            <li>
              <t>Not directly applicable to iBGP Ingress and eBGP egress verification</t>
            </li>
            <li>
              <t>Not applicable to complex relationship scenarios</t>
            </li>
            <li>
              <t>Reduced protection capacity in partial deployment</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The kind of method that verifies AS_PATH based on relationships does not guarantee path correctness like that provided by BGPsec.
          </t>
          <ul spacing="normal">
            <li>
              <t>Not all malicious route leaks are prevented</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document does not involve security problems.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>No IANA requirements.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Much Thanks for the comments from Kotikalapudi Sriram and Yangyang Wang.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-17" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-sidrops-aspa-verification.xml">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="29" month="February" year="2024"/>
            <abstract>
              <t>This document describes procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This type of AS_PATH verification provides detection and mitigation of route leaks and improbable AS paths. It also provides protection, to some degree, against prefix hijacks with forged-origin or forged-path-segment.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-17"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-17" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="7" month="November" year="2023"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-17"/>
        </reference>
        <reference anchor="RFC7908" target="https://www.rfc-editor.org/info/rfc7908" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7908.xml">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>IIJ Research, Arrcus, &amp; DRL</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. RFC 6810 describes version 0, and RFC 8210 describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-12"/>
        </reference>
        <reference anchor="RFC8205" target="https://www.rfc-editor.org/info/rfc8205" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8205.xml">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8893" target="https://www.rfc-editor.org/info/rfc8893" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8893.xml">
          <front>
            <title>Resource Public Key Infrastructure (RPKI) Origin Validation for BGP Export</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Volk" initials="R." surname="Volk"/>
            <author fullname="J. Heitz" initials="J." surname="Heitz"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>A BGP speaker may perform Resource Public Key Infrastructure (RPKI) origin validation not only on routes received from BGP neighbors and routes that are redistributed from other routing protocols, but also on routes it sends to BGP neighbors. For egress policy, it is important that the classification use the 'effective origin AS' of the processed route, which may specifically be altered by the commonly available knobs, such as removing private ASes, confederation handling, and other modifications of the origin AS. This document updates RFC 6811.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8893"/>
          <seriesInfo name="DOI" value="10.17487/RFC8893"/>
        </reference>
        <reference anchor="as-rela-1" target="https://www.usenix.org/system/files/nsdi19-jin.pdf">
          <front>
            <title>Stable and Practical AS Relationship Inference with ProbLink</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="February"/>
          </front>
        </reference>
        <reference anchor="as-rela-2">
          <front>
            <title>Inferring Internet AS Relationships Based on BGP Routing Policies</title>
            <author>
              <organization/>
            </author>
            <date year="2011" month="January"/>
          </front>
        </reference>
        <reference anchor="valley-path" target="https://ieeexplore.ieee.org/document/6363987">
          <front>
            <title>Valley-free violation in Internet routing - Analysis based on BGP Community data</title>
            <author>
              <organization/>
            </author>
            <date year="2012" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 383?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
