<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-sidrops-aspa-analysis-01" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="ASPA analysis">An Analysis of ASPA-based AS_PATH Verification</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-aspa-analysis-01"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization/>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@vip.sina.com</email>
      </address>
    </author>
    <author initials="Y." surname="Wang" fullname="Yangyang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangyy@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="June" day="29"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 69?>
<t>Autonomous System Provider Authorization (ASPA) is very helpful in detecting and mitigating route leaks (valley-free violations) and a majority of forged-origin hijacks. This document does an analysis on ASPA-based AS_PATH verification to help people understand its strengths and deficiencies.</t>
      <t>The document can help people deploy ASPA properly and provide some potential directions of enhancing ASPA.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Autonomous System Provider Authorization (ASPA) is a technique for verifying AS_PATHs in BGP updates <xref target="I-D.ietf-sidrops-aspa-verification"/><xref target="I-D.ietf-sidrops-aspa-profile"/>. Each AS can register ASPA records (also ASPA objects) in the RPKI to authorize a set of ASes as its providers. An AS can obtain ASes' ASPA records through RTRv2 protocol <xref target="I-D.ietf-sidrops-8210bis"/> and conduct AS_PATH verification based the records. ASPA-based AS_PATH verification can detect and mitigate route leaks violating the valley-free principle and path manipulations such as forged-origin or forged-path-segment attacks.</t>
      <t>ASPA can significantly enhance AS_PATH verification and is promising to be widely deployed. Despite of the strengths of ASPA, there are also some deficiencies. This document provides a detailed analysis on the strengths and deficiencies of ASPA.</t>
      <t>The document can help people deploy ASPA properly and provide some potential directions of enhancing ASPA.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The usage of terms follows <xref target="I-D.ietf-sidrops-aspa-verification"/><xref target="I-D.ietf-sidrops-aspa-profile"/>.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="aspa-strengths-and-disclaimers">
      <name>ASPA Strengths and Disclaimers</name>
      <t>ASPA records can be registered by an AS to authorize all its provider ASes. For the two ASes with mutual transit relationship, the two ASes will put each other AS into its own ASPA record (i.e., each AS considers the other AS as its provider).</t>
      <section anchor="protecting-against-route-leak">
        <name>Protecting Against Route Leak</name>
        <t>In full ASPA deployment (within a given region of interest), all "route leaks" (valley-free violations <xref target="RFC7908"/>) are detectable. Route leaks involve one of the following four valley-free violations:</t>
        <ul spacing="normal">
          <li>
            <t>A route is propagated through a P2C (Provider-to-Customer) link and then a C2P (Customer-to-Provider) link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2P (Peer-to-Peer) link and then a C2P link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2P link and then a P2P link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2C link and then a P2P link.</t>
          </li>
        </ul>
        <t>It is expected that in partial ASPA deployment, not all route leaks are detectable.</t>
      </section>
      <section anchor="protecting-against-path-manipulation">
        <name>Protecting Against Path Manipulation</name>
        <t>Path manipulation can be path forgery or path tampering (i.e., insertion or removal of unique ASN) in this document. Forged-origin hijack and fake link-based hijack are all path manipulations.</t>
        <t>In full ASPA deployment (within a given region of interest), ASPA protects against a majority of forged-origin hijacks. Each AS can attest its upstream ASes, so provider or lateral peer cannot be deceived. Customer could be deceived because ASPA does not provide attestations to downstream ASes or peering ASes.</t>
        <t>Even in full ASPA deployment, not all path manipulation attacks can be detected. ASPA does not guarantee path correctness like that provided by BGPsec <xref target="RFC8205"/>.</t>
      </section>
    </section>
    <section anchor="aspa-deficiencies">
      <name>ASPA Deficiencies</name>
      <t>This section describes the deficiencies of ASPA-based AS_PATH verification in detail.</t>
      <section anchor="hard-to-detect-bogus-records">
        <name>Hard to Detect Bogus Records</name>
        <t>An AS can unilaterally authorize a set of its provider ASes. Under the one-direction authorization, an AS may intentionally or unintentionally register bogus records that are hard to be discovered. An AS maliciously registers bogus records that open a door to potential attacks.</t>
        <t><xref target="fig-bogus"/> shows an example of path manipulation attack based on bogus ASPA records. AS4 lies in that the nonadjacent AS3 is its provider in the ASPA record. The attack cannot be detected even when AS1, AS2, AS3, and AS5 register ASPA records correctly and enable ASPA-based AS_PATH verification locally. As a result, AS5 will wrongly consider its traffic to AS1 traverses AS3, while the real forwarding path to AS1 is through AS2 instead of AS3.</t>
        <figure anchor="fig-bogus">
          <name>Path manipulation based on bogus ASPA records</name>
          <artwork><![CDATA[
              +-------+
              |AS1(P1)|Originate route
              +-------+
     path[1] /        \
            /(C2P)     \(C2P)
    +-------+           +-------+
    |  AS2  |           |  AS3  |
    +-------+           +-------+
           \             *
  path[2,1] \(C2P)      * (faked C2P in AS4's
             \         *   bogus ASPA)
              +-------+ ASPA{AS4, [AS2, AS3]}
              |  AS4  | Offender
              +-------+
      path[4,3,1] |(C2P)
              +-------+
              |  AS5  | Victim
              +-------+
  * All ASes register ASPA records
  * AS4's record states a faked C2P link with AS3
  * AS5 enables ASPA-based path verification
]]></artwork>
        </figure>
      </section>
      <section anchor="fail-to-detect-aspath-manipulation-by-a-provider">
        <name>Fail to Detect AS_PATH Manipulation by a Provider</name>
        <t>ASPA-based AS_PATH verification cannot effectively detect the AS_PATH maliciously shortened by a provider, which has been acknowledged in <xref target="I-D.ietf-sidrops-aspa-verification"/>.</t>
        <t><xref target="fig-path-shortened"/> shows an example. AS1 originates the BGP route and propagates the route to other ASes. The AS_PATH received by AS5 is path[4,3,2,1]. However, AS5 maliciously shortens the path by falsely claim a fake link with AS2 before AS5 propagates the route to AS6. AS6's traffic to AS1 may be hijacked by AS5 if the path[5,2,1] is shorter than any other AS_PATHs. In the example, AS5 may not intend to drop data traffic from AS6. That is, AS5 (provider) wants AS6 (customer) to prefer AS5's transit path for increasing revenue.</t>
        <t>In this case, the attack cannot be detected even when all the ASes register the correct ASPA records and all the ASes other than AS5 enable ASPA-based AS_PATH verification.</t>
        <figure anchor="fig-path-shortened">
          <name>AS_PATH maliciously shortened by a provider</name>
          <artwork><![CDATA[
                  +-------+
                  |  AS4  |    path[4,3,2,1]
                  +-------+----------------
      path[3,2,1]/         \               \
                /(C2P)      \               \(C2P)
        +-------+            \path[4,3,2,1] +-------+
        |  AS3  |             \             |  AS7  |
        +-------+              \            +-------+
  path[2,1] |             (C2P) \             /
      (C2P) |                    \ Offender  /
        +-------+ (Fake link) +-------+     /
        |  AS2  |*************|  AS5  |    /
        +-------+             +-------+   /path[7,4,3,2,1]
    path[1] |          path[5,2,1]|      /
      (C2P) |     (path shoterned)|(C2P)/(C2P)
        +-------+             +-------+/
        |AS1(P1)|             |  AS6  | Victim
        +-------+             +-------+
      Originate route
]]></artwork>
        </figure>
        <t>AS_PATH manipulation by a provider may also be used to do malicious route leaks. ASPA is not designed for defensing path manipulation. So, some malicious route leaks with path manipulation involved cannot be prevented.</t>
        <t><xref target="fig-malicious-leak"/> shows an example. AS2 is AS1's provider and arguably it may not leak its customer's prefix (P2) intentionally. But to increase revenue, AS2 may maliciously leak P2 with a modified AS_PATH (i.e., AS3 is removed) to AS4 for attracting more traffic to traverse AS2. Sometimes this attack may happen and goes undetected.</t>
        <figure anchor="fig-malicious-leak">
          <name>Malicious route leak</name>
          <artwork><![CDATA[
        +-------+
        |  AS4  |-------------
        +-------+             \
P1 path[2,1]|                  \
P2 path[2,1]|                   \ P2 path[3,1]
       (C2P)|                    \(C2P)
        +-------+ P2 path[3,1]+-------+
Offender|  AS2  |-------------|  AS3  |
        +-------+    (P2P)    +-------+
               \             /
      P1 path[1]\           /P2 path[1]
                 \(C2P)    /(C2P)
                  +---------+
                  |   AS1   |Originate route
                  | (P1&P2) |
                  +---------+
]]></artwork>
        </figure>
        <!-- ## Cannot Distinguish Leak and Hijack for an Invalid AS_PATH
Existing ASPA verification algorithm can identify Invalid AS_PATHs, but it cannot distinguish leak and hijack for an Invalid AS_PATH. The main reason is that ASPA records only focus on registering all provider ASes while not indicating the adjacency/topology information. When the Hop-check(x, y) function returns "Not provider+", the algorithm does not know whether the real cause of the result is i) ASy is ASx's customer/peer instead of provider or ii) link(x,y) is a fake link. Therefore, when the algorithm returns Invalid, it is not able to indicate whether the path is caused by a fake link-based hijack or not. 

For operators, it's instructive to know the type of an Invalid AS_PATH. If there exists no hijack, the Invalid AS_PATH is likely to be an unintentional route leak. Otherwise, the network may be attacked by path manipulation attacks.  -->

</section>
      <section anchor="not-directly-applicable-to-ibgp-ingress-and-ebgp-egress-verification">
        <name>Not Directly Applicable to IBGP Ingress and EBGP Egress Verification</name>
        <t>IBGP ingress verification and eBGP egress verification are meaningful in many scenarios. IBGP ingress verification is to check the AS_PATH received through iBGP connections. IBGP ingress verification helps an AS do verification on any BGP routers like non-ASBRs. EBGP egress verification means verifying the AS_PATH before sending it to the neighbor AS. It can prevent an AS from sending routes with Invalid AS_PATH to its neighbor ASes (just like eBGP egress RPKI-ROV <xref target="RFC8893"/>).</t>
        <t>However, current ASPA document <xref target="I-D.ietf-sidrops-aspa-verification"/> does not specify how to do iBGP ingress verification. For iBGP ingress verification, the router (e.g., an RR) conducting the verification may not have BGP sessions with the neighbor AS that propagates the route and thus does not know the local BGP role with respect to the neighbor AS. Even so, iBGP ingress verification is doable because the router can obtain the local BGP role from the ASPA records of local AS. In <xref target="fig-egress-veri"/>, when RR wants to do iBGP ingress verification, it can look up AS2's own ASPA records. If AS1 is listed as a provider, then apply the Downstream verification algorithm. If AS1 is not listed as a provider, then apply the Upstream verfication algorithm. Such an iBGP ingress verification also works correctly in RS and RS-client scenarios.</t>
        <figure anchor="fig-egress-veri">
          <name>IBGP and eBGP verification</name>
          <artwork><![CDATA[
          +-------------------------------+
          | AS2                           |
   path[1]| +-----+    +-----+    +-----+ |path[2,1]
AS1-------|->ASBR1|----> RR  |---->ASBR2|-|----->AS3
         /| +-----+   /+-----+    +-----+ |\
        / |          /                    | \
       /  +---------/---------------------+  \
      /            /                          \
  eBGP ingress   iBGP ingress              eBGP egress
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-sidrops-aspa-verification"/> does not specify how to do eBGP egress verification either. To try to do this, the router should add its own AS (i.e., AS2) to the AS_PATH and then performs ASPA-based AS_PATH verification from the perspective of next-hop AS (see Section 7.2 in version-15 of <xref target="I-D.ietf-sidrops-aspa-verification"/>). According to the verification result, the router decides to propagate the route or not. 
In <xref target="fig-egress-veri"/>, ASBR2 would add its own AS (i.e., AS2) to the AS_PATH. If the BGP role of ASBR2 with respect to AS3 is customer/lateral peer/RS/RS-client, the Upstream verification algorithm will be conducted. If the BGP role of ASBR2 with respect to AS3 is provider, the Downstream verification algorithm will be performed. The verification process also works well in mutual transit scenarios.</t>
        <!-- The problem of eBGP egress verification described above is that not all Invalid AS_PATHs (leaked routes) can be prevented from being propagated. Suppose the next-hop AS (i.e., neighbor AS3) is a lateral peer or provider. When the preceding AS (i.e., neighbor AS1) is also a lateral peer or provider but does not have an ASPA registered, the verification result can be Unknown (rather than Invalid). The route leak cannot be prevented in the case.  -->

<t>The relationship between AS1 and AS2 can sometimes be obtained by ASBR2 from AS2's ASPA records. If AS1 is listed as a provider in the AS2's ASPA records, then the above route leak can be detected and prevented. If AS1 is not listed in the AS2's ASPA records, ASBR2 cannot decide AS1 is a lateral peer or a customer. Therefore, the above route leak cannot be detected directly.</t>
        <t>Overall, iBGP ingress verification is doable with help of local AS's own ASPA records, while it is not possible to do eBGP egress verification correctly without more complexity.</t>
      </section>
      <section anchor="not-applicable-to-complex-relationship-scenarios">
        <name>Not Applicable to Complex Relationship Scenarios</name>
        <t>AS relationships in practical networks may be more complex than the traditional P2C/P2P model <xref target="as-rela-1"/><xref target="as-rela-2"/>. In ASPA, only the complex relationship of mutual transit relationship has been considered. The followings are some other complex scenarios that are not covered by ASPA:</t>
        <ul spacing="normal">
          <li>
            <t>Hybrid relationship <xref target="as-rela-1"/><xref target="as-rela-2"/>. Two ASes may agree to have different traditional relationships for different Points-of-Presence (PoPs). A hybrid relationship may be dependent on IP versions or/and PoP locations (see <xref target="fig-hybrid-rela"/> for examples), even prefixes (i.e., different relationships/policies for different prefixes).</t>
          </li>
        </ul>
        <figure anchor="fig-hybrid-rela">
          <name>Hybrid relationship</name>
          <artwork><![CDATA[
+-------+  Europe P2C  +-------+
|       |-------------->       |
|  AS1  |              |  AS2  |
|       |-------------->       |
+-------+   Asia P2P   +-------+

      (a) Location-dependent


+-------+   IPv6 P2C   +-------+
|       |-------------->       |
|  AS1  |              |  AS2  |
|       |-------------->       |
+-------+   IPv4 P2P   +-------+

      (b) IP version-dependent
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Partial transit relationship <xref target="as-rela-1"/><xref target="as-rela-2"/>. For a customer, the provider offers transit only toward the provider's peers and customers (or specific regions), but not the provider's providers, or restricts transit to a specific geographic region. <xref target="fig-hybrid-rela"/> shows an example. AS2 is the partial transit provider of AS1. AS2 should only propagate AS1's route to AS4 (i.e., AS2's peer) and AS5 (i.e., AS2's customer), but should not propagate the route to AS3 (i.e., AS2's provider).</t>
          </li>
        </ul>
        <figure anchor="fig-partial-transit">
          <name>Partial transit relationship</name>
          <artwork><![CDATA[
        +-------+
        |  AS3  |
        +-------+
  path[2,1] |
(route leak)|
            |
       (C2P)|
        +-------+  path[2,1]  +-------+
Offender|  AS2  |-------------|  AS4  |
        +-------+    (P2P)    +-------+
     Partial|    \                |
     transit|     \ path[2,1]     | path[4,2,1]
            |      ----------     |
    path[1] |           (C2P)\    |(C2P)
        +-------+             +-------+
        |  AS1  |             |  AS5  |
        +-------+             +-------+
      Originate route
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Persistent valley-path (legitimate valley-path) (<xref target="valley-path"/>). There may be legitimate valley-paths, i.e., violating the valley-free principle but the AS_PATH is legitimate. According to BGP data analysis, the persistent valley-path can be 10% of all BGP paths.</t>
          </li>
        </ul>
        <figure anchor="fig-valley-path">
          <name>Persistent valley-path</name>
          <artwork><![CDATA[
  Originate route
    +-------+             +-------+
    |AS1(P1)|             |  AS3  |
    +-------+             +-------+
            \             /
      path[1]\           / path[2,1] (not route leak)
              \(C2P)    /(C2P)
              +---------+
              |   AS2   |
              +---------+
]]></artwork>
        </figure>
        <t>ASPA records do not support the registration of complex relationships except the mutual transit relationship. As a result, in the complex scenarios, AS_PATH cannot be effectively protected by ASPA-based AS_PATH verification.</t>
      </section>
      <section anchor="reduced-protection-capability-in-partial-deployment">
        <name>Reduced Protection Capability in Partial Deployment</name>
        <t>To verfify an AS_PATH, ASPA verification algorithms need to check each hop of the AS_PATH. When ASPA records of the ASes along the path are partially registered, not all hops in the path can be checked. In such partial deployment scenarios, ASPA may have a reduced protection capacity.</t>
        <t><xref target="fig-partial-deploy"/> shows two examples of partial deployment. In <xref target="fig-partial-deploy"/> (a), AS3 cannot detect the route leak of P1 induced by AS2 if AS1 has no ASPA record registered. This is because the Hop-check(AS1, AS2) function returns "No Attestation" and the final verification result is Unknown. In <xref target="fig-partial-deploy"/> (b), AS3 is deceived by AS2 who falsely claims AS1 is AS2's neighbor. The attack in the example is undetectable because AS1 registers no ASPA record and AS3 cannot judge the validity of the link between AS1 and AS2.</t>
        <figure anchor="fig-partial-deploy">
          <name>Partial deployment</name>
          <artwork><![CDATA[
                            +-------+
                            |  AS3  |
                            +-------+
                            /
                           / path[2,1] (route leak)
   No ASPA                /(C2P)
  +-------+  (P2P)  +-------+
  |AS1(P1)|---------|  AS2  | Offender
  +-------+ path[1] +-------+
Originate route

      (a) Route leak in partial deployment

                            +-------+
                            |  AS3  |
                            +-------+
                            /
                           / path[2,1] (path manipulation)
   No ASPA (no adjacency) /(C2P)
  +-------+         +-------+
  |AS1(P1)|*********|  AS2  | Offender
  +-------+ path[1] +-------+
Originate route

      (b) Forged-origin attack in partial deployment
]]></artwork>
        </figure>
        <!-- ........................................................................ -->

</section>
    </section>
    <section anchor="reasons-of-aspa-deficiencies">
      <name>Reasons of ASPA Deficiencies</name>
      <t>This section summarizes three main reasons that result in deficiencies of ASPA:</t>
      <ul spacing="normal">
        <li>
          <t>ASPA record is authorized in one direction, e.g., an AS can unilaterally claim that another AS is its provider without the consent of other ASes. Related deficiencies:
          </t>
          <ul spacing="normal">
            <li>
              <t>Hard to detect bogus records</t>
            </li>
          </ul>
        </li>
        <li>
          <t>An ASPA record only focuses on including all provider ASes while ignoring other topology or relationship information. Related deficiencies:
          </t>
          <ul spacing="normal">
            <li>
              <t>Hard to detect bogus records</t>
            </li>
            <li>
              <t>Fail to detect AS_PATH maliciously shortened by a provider</t>
            </li>
            <li>
              <t>Not directly applicable to iBGP Ingress and eBGP egress verification</t>
            </li>
            <li>
              <t>Not applicable to complex relationship scenarios</t>
            </li>
            <li>
              <t>Reduced protection capacity in partial deployment</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The kind of method that verifies AS_PATH based on relationships does not guarantee path correctness like that provided by BGPsec.
          </t>
          <ul spacing="normal">
            <li>
              <t>Not all malicious route leaks are prevented</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document does not involve security problems.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>No IANA requirements.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Much Thanks for the comments from Kotikalapudi Sriram.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-17" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-verification.xml">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="29" month="February" year="2024"/>
            <abstract>
              <t>This document describes procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This type of AS_PATH verification provides detection and mitigation of route leaks and improbable AS paths. It also provides protection, to some degree, against prefix hijacks with forged-origin or forged-path-segment.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-17"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-18" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="25" month="June" year="2024"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-18"/>
        </reference>
        <reference anchor="RFC7908" target="https://www.rfc-editor.org/info/rfc7908" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7908.xml">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>IIJ Research, Arrcus, &amp; DRL</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. RFC 6810 describes version 0, and RFC 8210 describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-12"/>
        </reference>
        <reference anchor="RFC8205" target="https://www.rfc-editor.org/info/rfc8205" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8205.xml">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8893" target="https://www.rfc-editor.org/info/rfc8893" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8893.xml">
          <front>
            <title>Resource Public Key Infrastructure (RPKI) Origin Validation for BGP Export</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Volk" initials="R." surname="Volk"/>
            <author fullname="J. Heitz" initials="J." surname="Heitz"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>A BGP speaker may perform Resource Public Key Infrastructure (RPKI) origin validation not only on routes received from BGP neighbors and routes that are redistributed from other routing protocols, but also on routes it sends to BGP neighbors. For egress policy, it is important that the classification use the 'effective origin AS' of the processed route, which may specifically be altered by the commonly available knobs, such as removing private ASes, confederation handling, and other modifications of the origin AS. This document updates RFC 6811.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8893"/>
          <seriesInfo name="DOI" value="10.17487/RFC8893"/>
        </reference>
        <reference anchor="as-rela-1" target="https://www.usenix.org/system/files/nsdi19-jin.pdf">
          <front>
            <title>Stable and Practical AS Relationship Inference with ProbLink</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="February"/>
          </front>
        </reference>
        <reference anchor="as-rela-2">
          <front>
            <title>Inferring Internet AS Relationships Based on BGP Routing Policies</title>
            <author>
              <organization/>
            </author>
            <date year="2011" month="January"/>
          </front>
        </reference>
        <reference anchor="valley-path" target="https://ieeexplore.ieee.org/document/6363987">
          <front>
            <title>Valley-free violation in Internet routing - Analysis based on BGP Community data</title>
            <author>
              <organization/>
            </author>
            <date year="2012" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 390?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
