<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-marenamat-idr-scrub-bgp-origin-00" category="std" consensus="true" submissionType="IETF" updates="4271, 7606" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Scrubbing BGP ORIGIN Attribute</title>
    <seriesInfo name="Internet-Draft" value="draft-marenamat-idr-scrub-bgp-origin-00"/>
    <author fullname="Maria Matejka">
      <organization>CZ.NIC</organization>
      <address>
        <postal>
          <street>Milesovska 1136/5</street>
          <city>Praha</city>
          <code>13000</code>
          <country>Czechia</country>
        </postal>
        <email>maria.matejka@nic.cz</email>
        <email>mq@jmq.cz</email>
      </address>
    </author>
    <date year="2025" month="November" day="03"/>
    <area>Routing</area>
    <workgroup>Inter-Domain Routing</workgroup>
    <keyword>EGP</keyword>
    <keyword>attribute manipulation</keyword>
    <abstract>
      <?line 66?>

<t>The BGP Origin attribute in its original meaning has been out of use for years.
Yet, the BGP Origin attribute has high priority in the best route
selection algorithm, right after the AS Path length, and it's being used
inconsistently over the Internet to manipulate the route preference.</t>
      <t>This document updates RFC 4271 and RFC 7606 by making the BGP Origin attribute
half-optional and explicitly allowing its scrubbing to zero (IGP).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://marenamat.github.io/ietf-draft-marenamat-idr-scrub-bgp-origin/draft-marenamat-idr-scrub-bgp-origin.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-marenamat-idr-scrub-bgp-origin/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Inter-Domain Routing Working Group mailing list (<eref target="mailto:idr@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/idr/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/idr/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/marenamat/ietf-draft-marenamat-idr-scrub-bgp-origin"/>.</t>
    </note>
  </front>
  <middle>
    <?line 76?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Origins of the BGP Origin attribute stem from times when BGP was not the only
full internet routing protocol, and was slowly replacing EGP (<xref target="RFC904"/>). First
seen in the first published BGP draft as the Direction field in the UPDATE
message (see <xref section="3.4" sectionFormat="of" target="RFC1105"/>), later refined into the
Origin attribute (see <xref section="5" sectionFormat="of" target="RFC1163"/>)
with just three values: IGP, EGP and Incomplete.</t>
      <t>While the attribute itself has been long established, even in 1995 in <xref target="RFC1771"/>,
it is not being formally specified to be used for best route selection. Instead,
using the origin attribute was suggested in <xref target="RFC1772"/> to be used
as an indicator of better route, together with AS Path Length and more criteria.</t>
      <t>It's hard to dig through the archives to find out what happened when and why,
but it's safe to assume that most of the BGP implementations of that time
simply used a very similar tie breaking algorithm without formal specification,
as documented e.g. in <xref target="bird-bgp-commit"/>. With that, the tie breaking in its
current form, specified in <xref section="9.1.2.2" sectionFormat="of" target="RFC4271"/>, was most probably
simply copied from the existing stuff out there.</t>
      <t>In the year 2006, there might still have been some remnants of EGP infrastructure,
and deprecating the BGP Origin attribute altogether wasn't probably a good idea then.</t>
      <t>In September 2025, a short look <xref target="rewriting-bgp-origin"/> into the global IPv4 routing table
shows that about 9% of the DFZ routing table bears BGP Origin value INCOMPLETE
and under 1% there are still some routes with BGP Origin value EGP. With these routes,
several transit providers rewrite the BGP Origin value to IGP to raise their priority
in the best route selection. Rather curiously, there are even several IPv6
routes with BGP Origin value EGP.</t>
      <t>Therefore, this document makes the first needed steps to deprecate the BGP
Origin attribute in the future by updating the rules for its origination,
relaxing its handling and deprecating all other its values than zero.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="tolerance-of-missing-or-malformed-bgp-origin-attribute">
      <name>Tolerance of missing or malformed BGP Origin attribute</name>
      <t>The ORIGIN attribute is considered malformed if its length is not 1
as specified by <xref section="4.3" sectionFormat="of" target="RFC4271"/>, or its value is not one of these
specified by <xref target="RFC4271"/>. It is considered absent if it's not included in the
UPDATE message at all.</t>
      <t>Unless explicitly configured by a network operator to do otherwise,
if the ORIGIN attribute is malformed or absent, BGP speakers <bcp14>SHOULD</bcp14>
accept such UPDATE message. In such case, before the path attributes are processed any further:</t>
      <ul spacing="normal">
        <li>
          <t>If the ORIGIN attribute is absent, the BGP speaker <bcp14>MUST</bcp14> add a new ORIGIN attribute
with the value of 0 (IGP).</t>
        </li>
        <li>
          <t>If the ORIGIN attribute length is not 1, the BGP speaker <bcp14>MUST</bcp14> replace that
attribute with a new ORIGIN attribute with the value of 0 (IGP).</t>
        </li>
        <li>
          <t>If the ORIGIN attribute value is not 0 (IGP), the BGP speaker <bcp14>SHOULD</bcp14> rewrite
that value to 0 (IGP).</t>
        </li>
      </ul>
      <t>The BGP speaker <bcp14>SHOULD</bcp14> allow logging the original ORIGIN attribute value.</t>
      <t>Per the above specification, this document updates
<xref section="7.1" sectionFormat="of" target="RFC7606"/>
by accepting routes with a malformed or absent ORIGIN attribute.</t>
    </section>
    <section anchor="update-to-the-bgp-origin-attribute-values">
      <name>Update to the BGP Origin attribute values</name>
      <t>The values of the BGP Origin attribute are specified in
<xref section="4.3" sectionFormat="of" target="RFC4271"/>, the Path attribute part, a) ORIGIN (Type Code 1).</t>
      <t>Unless explicitly configured by a network operator to do otherwise,
BGP speakers <bcp14>MUST NOT</bcp14> advertise BGP UPDATE messages with the ORIGIN
attribute containing any other value than 0 (IGP), including manually
configured static routes.</t>
      <t>Additionally, BGP speakers <bcp14>SHOULD</bcp14> rewrite any ORIGIN attribute value
to 0 (IGP) if it contains any other value, even a valid one, before processing
the path attributes any further.</t>
      <t>If explicitly configured by a network operator to do so, BGP speakers
<bcp14>MAY</bcp14> also advertise BGP UPDATE messages without including the ORIGIN attribute at all.</t>
      <t>Per the above specification, this document updates <xref section="4.3" sectionFormat="of" target="RFC4271"/>
by deprecating ORIGIN attribute values 1 (EGP) and 2 (INCOMPLETE), and
<xref section="5.1.1" sectionFormat="of" target="RFC4271"/> by effectively making the attribute optional.</t>
    </section>
    <section anchor="additional-notes">
      <name>Additional Notes</name>
      <t>The ORIGIN scrubbing is designed to happen on the receiving side, so that
the best route selection algorithm is entered with it being always zero,
effectively rendering the step b) of <xref section="9.1.2.2" sectionFormat="of" target="RFC4271"/> void.
Yet, if somebody wants to per-use the attribute locally for any custom purpose,
the algorithms are still there.</t>
      <t>For the purposes of route aggregation as of <xref section="9.2.2.2" sectionFormat="of" target="RFC4271"/>,
with the scrubbed ORIGINs on input, all the ORIGINs on the output are also
going to be 0 (IGP).</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>All the results achievable by manipulating this attribute may be instead achieved
by other techniques, most notably by AS Path Stuffing, LOCAL_PREF, and MED <xref target="I-D.ietf-grow-as-path-prepending"/>.</t>
      <t>The implementations may offer a configuration option to not send the ORIGIN
attribute at all. The network operator must be sure, though, that the other
side actually employs the algorithms specified in this document, otherwise
all their routes would be treated as withdraw.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Originating a route with a non-zero value of the ORIGIN attribute makes
the route prone to unwanted prioritization by the intermediate AS's.
Scrubbing the attribute removes this possible traffic redirection problem.</t>
      <t>Most notably, stuffing the AS Path by own AS Number is directly supported by
the Secure Path attribute as of <xref section="3.1" sectionFormat="of" target="RFC8205"/>, being more secure
and with higher priority than the ORIGIN attribute.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC7606">
          <front>
            <title>Revised Error Handling for BGP UPDATE Messages</title>
            <author fullname="E. Chen" initials="E." role="editor" surname="Chen"/>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>According to the base BGP specification, a BGP speaker that receives an UPDATE message containing a malformed attribute is required to reset the session over which the offending attribute was received. This behavior is undesirable because a session reset would impact not only routes with the offending attribute but also other valid routes exchanged over the session. This document partially revises the error handling for UPDATE messages and provides guidelines for the authors of documents defining new attributes. Finally, it revises the error handling procedures for a number of existing attributes.</t>
              <t>This document updates error handling for RFCs 1997, 4271, 4360, 4456, 4760, 5543, 5701, and 6368.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7606"/>
          <seriesInfo name="DOI" value="10.17487/RFC7606"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC904">
          <front>
            <title>Exterior Gateway Protocol formal specification</title>
            <author fullname="D.L. Mills" initials="D.L." surname="Mills"/>
            <date month="April" year="1984"/>
            <abstract>
              <t>RFC-904 is the specification of the Exterior Gateway Protocol (EGP). This memo updates portions of RFC-888 and RFC-827. This RFC specifies an official protocol of the DARPA community for use between gateways of different autonomous systems in the ARPA-Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="904"/>
          <seriesInfo name="DOI" value="10.17487/RFC0904"/>
        </reference>
        <reference anchor="RFC1105">
          <front>
            <title>Border Gateway Protocol (BGP)</title>
            <author fullname="K. Lougheed" initials="K." surname="Lougheed"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="June" year="1989"/>
            <abstract>
              <t>This RFC outlines a specific approach for the exchange of network reachability information between Autonomous Systems. Updated by RFCs 1163 and 1164. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1105"/>
          <seriesInfo name="DOI" value="10.17487/RFC1105"/>
        </reference>
        <reference anchor="RFC1163">
          <front>
            <title>Border Gateway Protocol (BGP)</title>
            <author fullname="K. Lougheed" initials="K." surname="Lougheed"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="June" year="1990"/>
            <abstract>
              <t>This RFC, together with its companion RFC-1164, "Application of the Border Gateway Protocol in the Internet", specify an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1163"/>
          <seriesInfo name="DOI" value="10.17487/RFC1163"/>
        </reference>
        <reference anchor="RFC1771">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="March" year="1995"/>
            <abstract>
              <t>This document, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1771"/>
          <seriesInfo name="DOI" value="10.17487/RFC1771"/>
        </reference>
        <reference anchor="RFC1772">
          <front>
            <title>Application of the Border Gateway Protocol in the Internet</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="P. Gross" initials="P." surname="Gross"/>
            <date month="March" year="1995"/>
            <abstract>
              <t>This document, together with its companion document, "A Border Gateway Protocol 4 (BGP-4)", define an inter-autonomous system routing protocol for the Internet. This document describes the usage of the BGP in the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1772"/>
          <seriesInfo name="DOI" value="10.17487/RFC1772"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="bird-bgp-commit" target="https://gitlab.nic.cz/labs/bird/-/commit/56a2bed46bf7713cd773b0fd0c097bcfc6345cc1">
          <front>
            <title>BIRD commit: adding real comparison of BGP routes (inspired by the Cisco one)</title>
            <author initials="M." surname="Mareš" fullname="Martin Mareš">
              <organization/>
            </author>
            <date year="2000" month="April" day="17"/>
          </front>
        </reference>
        <reference anchor="rewriting-bgp-origin" target="https://ripe91.ripe.net/programme/meeting-plan/sessions/30/GJ8PFJ/">
          <front>
            <title>Rewriting BGP Origin</title>
            <author initials="J." surname="Bensley" fullname="James Bensley">
              <organization>Inter.link</organization>
            </author>
            <date year="2025" month="October" day="22"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-grow-as-path-prepending">
          <front>
            <title>AS Path Prepending</title>
            <author fullname="Mike McBride" initials="M." surname="McBride">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Doug Madory" initials="D." surname="Madory">
              <organization>Kentik</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <author fullname="Robert Raszuk" initials="R." surname="Raszuk">
              <organization>NTT Network Innovations</organization>
            </author>
            <author fullname="Hongwei Li" initials="H." surname="Li">
              <organization>HPE</organization>
            </author>
            <author fullname="Jakob Heitz" initials="J." surname="Heitz">
              <organization>Cisco</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <date day="17" month="October" year="2025"/>
            <abstract>
              <t>   Autonomous System (AS) path prepending is a tool to manipulate the
   BGP AS_PATH attribute through prepending one or more Autonomous
   System Numbers (ASNs).  AS path prepending is used to deprioritize a
   route in the presence of a route with a shorter AS_PATH.  By
   prepending a local ASN multiple times, ASes can make advertised AS
   paths appear artificially longer.  However, excessive AS path
   prepending has caused routing issues in the Internet.  This document
   provides guidance for the use of AS path prepending, including
   alternative solutions, in order to avoid negatively affecting the
   Internet.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-as-path-prepending-17"/>
        </reference>
      </references>
    </references>
    <?line 217?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors wish to thank James Bensley, Gert Doering, Wolfgang Tremmel,
Ondřej Zajíček, and Alexander Zubkov for valuable comments, suggestions and
discussions on the topic and text of the document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
