<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-idr-frameworkoffcbgp-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="fcbgp">Framework of Forwarding Commitment BGP</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-idr-frameworkoffcbgp-00"/>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author fullname="Zhuotao liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Routing Area</area>
    <workgroup>idr</workgroup>
    <keyword>BGP Security</keyword>
    <keyword>Inter-Domain Forwarding</keyword>
    <abstract>
      <?line 68?>

<t>This document defines a standard profile for the framework of Forwarding Commitment BGP (FC-BGP). Forwarding Commitment（FC）is a cryptographically signed code to certify an AS's routing intent on its directly connected hops. Based on FC, the goal of FC-BGP is to build a secure inter-domain system that can simultaneously authenticate AS_PATH attribute in BGP-UPDATE and validate network forwarding on the dataplane.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://LucasWang86.github.io/framework-of-fcbgp/draft-wang-idr-frameworkoffcbgp.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wang-idr-frameworkoffcbgp/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        idr Working Group mailing list (<eref target="mailto:idr@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/idr/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/idr/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/LucasWang86/framework-of-fcbgp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The fundamental cause of the path manipulation attacks in Internet inter-domain routing is that the de facto Border Gateway Protocol (BGP) <xref target="RFC4271"/> does not have built-in mechanisms to authenticate routing announcements. As a result, an adversary can announce virtually arbitrary paths to a prefix while the network cannot effectively verify the authenticity of the route  announcements.</t>
      <t>In addition to the lack of control plane authentication, ensuring that the actual forwarding paths in the dataplane comply with the control plane decisions is also missing in today's inter-domain routing system. This fundamentally limits ASes from filtering unwanted traffic which takes an unauthorized AS path.</t>
      <t>The representative schemes to secure inter-domain routing are RPKI <xref target="RFC6480"/> and BGPsec <xref target="RFC8205"/>. RPKI provides a foundation for validating the origins of BGP routes. Meanwhile, BGPsec directly builds the path authentication of BGP routes into the BGP path construction itself, where an AS is required to iteratively verify the signatures of each prior AS hop before extending the verification chain with its own approval. As a result, a single legacy or malicious AS can terminate the verification chain, preventing the downstream ASes from reinstating the verification process. This creates the well-known chicken-and-egg problem where the early adopters receive no deployment benefits which further limits new adoption.</t>
      <t>Finally, due to the lack of practical protocols to check the consistency between the dataplane forwarding and control-plane decisions, enforcing path authorization in the inter-domain forwarding has been not possible to date.</t>
      <t>This document specifies a framework named FC-BGP, an incrementally deployable security augment to the Internet inter-domain routing and forwarding. FC-BGP 
relies on the Resource Public Key Infrastructure (RPKI) certificates that attest to the allocation of AS number and IP address resources. To support FC-BGP, a BGP speaker needs to possess a private key associated with an RPKI router certificate <xref target="RFC8209"/> that corresponds to the BGP speaker's AS number.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <figure anchor="figure1">
        <name>Overview of FC-BGP.</name>
        <artwork><![CDATA[
          |     1.BGP Announcement Path        |
          +---------------------+------------->|
Control   |            ^        |              |
Plane     |    1.1     |        |    1.2       |
          | Generation |        v Validation   |
     +----+---+      +-+----------+       +----+---+
     |        |      | Forwarding |       |        |
     |  AS A  |      | Commitment |       |  AS B  |
     |        |      |    (FC)    |       |        |
     +----+---+      +----------+-+       +----+---+
          |            ^        |              |
 Data     |    2.2     |        |    2.1       |
 Plane    | Validation |        |  Binding     |
          |            |        v              |
          |<-----------+-----------------------+
          |         2.Forwarding Path          |
]]></artwork>
      </figure>
      <t>Overview of FC-BGP is shown in <xref target="figure1"/>. The key primitive in FC-BGP is the Forwarding Commitment (FC), which is a publicly verifiable code that certifies an AS's routing intent on one of its directly connected hops, i.e., an FC indicates whether the AS is willing to carry traffic for a specific prefix over the hop.
Upon receiving a BGP announcement, if AS A decides to accept the route and extends the path to its (selected) neighbors AS B, the AS A commits its routing intent by generating a cryptographically-signed FC. Therefore, downstream on-path ASes (such as AS B) can validate the correctness of a BGP update by checking the FCs associated with the individual hops on the AS-path. Because the FCs are designed to be hop-specific and path-agnostic, a deployed AS can immediately certify its routing intent regardless of the deployment status of other ASes. This is fundamentally different from existing path-level BGP authentication protocol (e.g., BGPsec) where an on-path AS cannot approve any form of routing intent unless all on-path ASes are upgraded.</t>
      <t>FC-BGP is not bound to a specific FC propagation method and can use, but is not limited to, the following mechanisms:</t>
      <ol spacing="normal" type="1"><li>
          <t>Extend BGP Update Message. Assign a new BGP Update Path Attribute to carry FCs.</t>
        </li>
        <li>
          <t>Propose a new propagation protocol that guarantees consistent FC propagation.</t>
        </li>
        <li>
          <t>Use existing network infrastructure, such as extending RPKI to add a new signed object to store FCs.</t>
        </li>
      </ol>
      <t>Meanwhile, the flexibility of FCs further enables efficient forwarding validation on the dataplane. Specifically, because the FCs are self-proving, an AS can conceptually construct a certified AS-path using a list of consecutive per-hop FCs, and then binds its network traffic (identified by &lt; src-AS, dst-AS, prefix &gt;) to the path, such as &lt; AS B, AS A, P(B) &gt;, where P(B) is the prefix owned by AS B destined to AS A. This binding information essentially defines the authorized forwarding path for the traffic &lt; AS B, AS A, P(B) &gt;. Therefore, by advertising the binding information globally, both on-path and off-path ASes are aware of the desired forwarding paths so that they can collaboratively discard unwanted traffic that takes unauthorized paths.</t>
      <t>Similar to FC propagation, the propagation of binding messages in FC-BGP is not restricted to specific methods and can be, but is not limited to, the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Propose a new propagation protocol that guarantees the consistency of binding messages.</t>
        </li>
        <li>
          <t>Use existing network infrastructure, such as extending RPKI to add a new signed object to store binding messages.</t>
        </li>
      </ol>
    </section>
    <section anchor="forwarding-commitment">
      <name>Forwarding Commitment</name>
      <t>FC-BGP enhances the security of inter-domain routing and forwarding by building a publicly verifiable view on the forwarding commitments. At a high-level, a routing commitment (FC) of an AS is a cryptographically-signed primitive that binds the AS's routing decisions (e.g. willing to forward traffic for a prefix via one of its directly-connected hops). With this view, ASes are able to:</t>
      <ol spacing="normal" type="1"><li>
          <t>Evaluate the authenticity (or security) of the control plane BGP announcements based on committed routing decisions from relevant ASes.</t>
        </li>
        <li>
          <t>Ensure that the dataplane forwarding is consistent with the routing decisions committed in the control plane.</t>
        </li>
      </ol>
      <t>Upon receiving a BGP announcement, an upgraded AS generates a corresponding FC that contains the core information of the announcement, such as prefixes, sending AS and receiving AS, and will be signed with the sender's private key for security. See draft XXX for specific structure of FC.</t>
    </section>
    <section anchor="bgp-path-validation">
      <name>BGP Path Validation</name>
      <figure anchor="figure2">
        <name>Example of FC-BGP.</name>
        <artwork><![CDATA[
                                                      FClist:F(B,C,D,P)
                                  FClist:F(A,B,C,P)   F(A,B,C,P)
       FClist:F(Null,A,B,P)       F(Null,A,B,P)       F(Null,A,B,P)
     | AS Path:A            |     AS Path:A-B     |    AS Path:A-B-C    |
     +--------------------->+-------------------->+-------------------->|
     |                      |                     |                     |
     |                      |                     |                     |
     |                      |                     |                     |
+----+---+             +----+---+            +----+---+            +----+---+
|  AS A  +-------------+  AS B  +------------+  AS C  +------------+  AS D  |
+----+---+             +----+---+            +----+---+            +----+---+
     |                      |                     |                     |
     |              F(B,C,D,P)-(src:P(D),dst:P(A))+<--------------------+
     |                      |                     |                     |
     |                      |                     |                     |
     |                      +<--------------------+---------------------+
     |                      |    F(A,B,C,P)-(src:P(D),dst:P(A))         |
     |                      |                     |                     |
     |                      |                     |                     |
     |<---------------------+---------------------+---------------------+
                   F(Null,A,B,P)-(src:P(D),dst:P(A))
]]></artwork>
      </figure>
      <t>Consider an illustrative example using the four-AS topology shown in <xref target="figure2"/>. In this process, FC-BGP generates the corresponding FC and propagates to downstream ASes (e.g., adding it to the Path Attributes of the BGP updates), so that the receiving AS can validate the authenticity of the announcement. Suppose AS C receives a BGP announcement P(A): A-&gt;B-&gt;C from its neighbor B. If AS C decides to further advertise this path to its neighbor D based on its routing policy, it generates a FC F(B,C,D,P), propagates it  to AS D, and forwards the BGP update message to D.</t>
      <t>When AS D receives the route from C, it can determine the authenticity of the current AS path by verifying the list of FCs correctly reflects the AS path.</t>
    </section>
    <section anchor="forwarding-validation">
      <name>Forwarding Validation</name>
      <t>AS shown in <xref target="figure2"/>, to enable forwarding validation, ASes need to announce the traffic-FCs binding relationships. Specifically, suppose AS D confirms that the AS-path C-&gt;B-&gt;A for reaching prefix P(A) is legitimate, it binds the traffic (src:P(D),dst:P(A)) (where P(D) is the prefix owned by AS D) with the FC list F(B,C,D,P)-F(A,B,C,P)-F(Null,A,B,P), and then publicly announces the binding relationship.</t>
      <t>Upon receiving the relationship, other ASes can build traffic filtering rules based on the relationship to enable forwarding validation on dataplane. For instance, by interpreting the binding relationship produced by AS D, AS C confirms that the traffic (src:P(D), dst:P(A)) shall be forwarded over the link L(CD), and AS B confirms that the traffic shall be forwarded on link L(BC). Network traffic violating these binding rules is considered to take unauthorized paths.</t>
      <t>To enable network-wide forwarding verification, these binding rules may be further broadcast globally (instead of just informing the ASes on the AS-path) so that off-path ASes can also discard unauthorized flows.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
          <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC8205">
        <front>
          <title>BGPsec Protocol Specification</title>
          <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
          <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8205"/>
        <seriesInfo name="DOI" value="10.17487/RFC8205"/>
      </reference>
      <reference anchor="RFC6480">
        <front>
          <title>An Infrastructure to Support Secure Internet Routing</title>
          <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="February" year="2012"/>
          <abstract>
            <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6480"/>
        <seriesInfo name="DOI" value="10.17487/RFC6480"/>
      </reference>
      <reference anchor="RFC8209">
        <front>
          <title>A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests</title>
          <author fullname="M. Reynolds" initials="M." surname="Reynolds"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the Border Gateway Protocol (BGP), as part of an extension to that protocol known as BGPsec. BGP is the standard for inter-domain routing in the Internet; it is the "glue" that holds the Internet together. BGPsec is being developed as one component of a solution that addresses the requirement to provide security for BGP. The goal of BGPsec is to provide full AS path validation based on the use of strong cryptographic primitives. The end entity (EE) certificates specified by this profile are issued to routers within an AS. Each of these certificates is issued under a Resource Public Key Infrastructure (RPKI) Certification Authority (CA) certificate. These CA certificates and EE certificates both contain the AS Resource extension. An EE certificate of this type asserts that the router or routers holding the corresponding private key are authorized to emit secure route advertisements on behalf of the AS(es) specified in the certificate. This document also profiles the format of certification requests and specifies Relying Party (RP) certificate path validation procedures for these EE certificates. This document extends the RPKI; therefore, this document updates the RPKI Resource Certificates Profile (RFC 6487).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8209"/>
        <seriesInfo name="DOI" value="10.17487/RFC8209"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 207?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
