<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-sidr-frameworkoffcbgp-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="fcbgp">Framework of Forwarding Commitment BGP</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-sidr-frameworkoffcbgp-00"/>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author fullname="Zhuotao liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Routing</area>
    <workgroup>Secure Inter-Domain Routing</workgroup>
    <keyword>BGP Security</keyword>
    <keyword>Inter-Domain Forwarding</keyword>
    <abstract>
      <?line 68?>

<t>This document defines a standard profile for the framework of Forwarding Commitment BGP (FC-BGP). Forwarding Commitment（FC）is a cryptographically signed code to certify an AS's routing intent on its directly connected hops. Based on FC, the goal of FC-BGP is to build a secure inter-domain system that can simultaneously authenticate AS_PATH attribute in BGP-UPDATE and validate network forwarding on the dataplane.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://LucasWang86.github.io/framework-of-fcbgp/draft-wang-sidr-frameworkoffcbgp.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wang-sidr-frameworkoffcbgp/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Inter-Domain Routing Working Group mailing list (<eref target="mailto:sidr@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sidr/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/sidr/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/LucasWang86/framework-of-fcbgp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The fundamental cause of the path manipulation attacks in Internet inter-domain routing is that the de facto Border Gateway Protocol (BGP) <xref target="RFC4271"/> does not have built-in mechanisms to authenticate routing announcements. As a result, an adversary can announce virtually arbitrary paths to a prefix while the network cannot effectively verify the authenticity of the route  announcements.</t>
      <t>In addition to the lack of control plane authentication, ensuring that the actual forwarding paths in the dataplane comply with the control plane decisions is also missing in today's inter-domain routing system. This fundamentally limits ASes from filtering unwanted traffic which takes an unauthorized AS path.</t>
      <t>The representative schemes to secure inter-domain routing are RPKI <xref target="RFC6480"/> and BGPsec <xref target="RFC8205"/>. RPKI provides a foundation for validating the origins of BGP routes. Meanwhile, BGPsec directly builds the path authentication of BGP routes into the BGP path construction itself, where an AS is required to iteratively verify the signatures of each prior AS hop before extending the verification chain with its own approval. As a result, a single legacy or malicious AS can terminate the verification chain, preventing the downstream ASes from reinstating the verification process. This creates the well-known chicken-and-egg problem where the early adopters receive no deployment benefits which further limits new adoption.</t>
      <t>Finally, due to the lack of practical protocols to check the consistency between the dataplane forwarding and control-plane decisions, enforcing path authorization in the inter-domain forwarding has been not possible to date.</t>
      <t>This document specifies a framework named FC-BGP, an incrementally deployable security augment to the Internet inter-domain routing and forwarding. FC-BGP 
relies on the Resource Public Key Infrastructure (RPKI) certificates that attest to the allocation of AS number and IP address resources. To support FC-BGP, a BGP speaker needs to possess a private key associated with an RPKI router certificate <xref target="RFC8209"/> that corresponds to the BGP speaker's AS number.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <figure anchor="figure1">
        <name>Overview of FC-BGP.</name>
        <artwork><![CDATA[
          |     1.BGP Announcement Path        |
          +---------------------+------------->|
Control   |            ^        |              |
Plane     |    1.1     |        |    1.2       |
          | Generation |        v Validation   |
     +----+---+      +-+----------+       +----+---+
     |        |      | Forwarding |       |        |
     |  AS A  |      | Commitment |       |  AS B  |
     |        |      |    (FC)    |       |        |
     +----+---+      +----------+-+       +----+---+
          |            ^        |              |
 Data     |    2.2     |        |    2.1       |
 Plane    | Validation |        |  Binding     |
          |            |        v              |
          |<-----------+-----------------------+
          |         2.Forwarding Path          |
]]></artwork>
      </figure>
      <t>Overview of FC-BGP is shown in <xref target="figure1"/>. The key primitive in FC-BGP is the Forwarding Commitment (FC), which is a publicly verifiable code that certifies an AS's routing intent on one of its directly connected hops, i.e., an FC indicates whether the AS is willing to carry traffic for a specific prefix over the hop.
Upon receiving a BGP announcement, if AS A decides to accept the route and extends the path to its (selected) neighbors AS B, the AS A commits its routing intent by generating a cryptographically-signed FC. Therefore, downstream on-path ASes (such as AS B) can validate the correctness of a BGP update by checking the FCs associated with the individual hops on the AS-path. Because the FCs are designed to be hop-specific and path-agnostic, a deployed AS can immediately certify its routing intent regardless of the deployment status of other ASes. This is fundamentally different from existing path-level BGP authentication protocol (e.g., BGPsec) where an on-path AS cannot approve any form of routing intent unless all on-path ASes are upgraded.</t>
      <t>FC-BGP is not bound to a specific FC propagation method and can use, but is not limited to, the following mechanisms:</t>
      <ol spacing="normal" type="1"><li>
          <t>Extend BGP Update Message. Assign a new BGP Update Path Attribute to carry FCs.</t>
        </li>
        <li>
          <t>Propose a new propagation protocol that guarantees consistent FC propagation.</t>
        </li>
        <li>
          <t>Use existing network infrastructure, such as extending RPKI to add a new signed object to store FCs.</t>
        </li>
      </ol>
      <t>Meanwhile, the flexibility of FCs further enables efficient forwarding validation on the dataplane. Specifically, because the FCs are self-proving, an AS can conceptually construct a certified AS-path using a list of consecutive per-hop FCs, and then binds its network traffic (identified by &lt; src-AS, dst-AS, prefix &gt;) to the path, such as &lt; AS B, AS A, P(B) &gt;, where P(B) is the prefix owned by AS B destined to AS A. This binding information essentially defines the authorized forwarding path for the traffic &lt; AS B, AS A, P(B) &gt;. Therefore, by advertising the binding information globally, both on-path and off-path ASes are aware of the desired forwarding paths so that they can collaboratively discard unwanted traffic that takes unauthorized paths.</t>
      <t>Similar to FC propagation, the propagation of binding messages in FC-BGP is not restricted to specific methods and can be, but is not limited to, the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Propose a new propagation protocol that guarantees the consistency of binding messages.</t>
        </li>
        <li>
          <t>Use existing network infrastructure, such as extending RPKI to add a new signed object to store binding messages.</t>
        </li>
      </ol>
    </section>
    <section anchor="forwarding-commitment">
      <name>Forwarding Commitment</name>
      <t>FC-BGP enhances the security of inter-domain routing and forwarding by building a publicly verifiable view on the forwarding commitments. At a high-level, a routing commitment (FC) of an AS is a cryptographically-signed primitive that binds the AS's routing decisions (e.g. willing to forward traffic for a prefix via one of its directly-connected hops). With this view, ASes are able to:</t>
      <ol spacing="normal" type="1"><li>
          <t>Evaluate the authenticity (or security) of the control plane BGP announcements based on committed routing decisions from relevant ASes.</t>
        </li>
        <li>
          <t>Ensure that the dataplane forwarding is consistent with the routing decisions committed in the control plane.</t>
        </li>
      </ol>
      <t>Upon receiving a BGP announcement, an upgraded AS generates a corresponding FC that contains the core information of the announcement, such as prefixes, sending AS and receiving AS, and will be signed with the sender's private key for security. See draft XXX for specific structure of FC.</t>
    </section>
    <section anchor="bgp-path-validation">
      <name>BGP Path Validation</name>
      <figure anchor="figure2">
        <name>Example of FC-BGP.</name>
        <artwork><![CDATA[
                                                      FClist:F(B,C,D,P)
                                  FClist:F(A,B,C,P)   F(A,B,C,P)
       FClist:F(Null,A,B,P)       F(Null,A,B,P)       F(Null,A,B,P)
     | AS Path:A            |     AS Path:A-B     |    AS Path:A-B-C    |
     +--------------------->+-------------------->+-------------------->|
     |                      |                     |                     |
     |                      |                     |                     |
     |                      |                     |                     |
+----+---+             +----+---+            +----+---+            +----+---+
|  AS A  +-------------+  AS B  +------------+  AS C  +------------+  AS D  |
+----+---+             +----+---+            +----+---+            +----+---+
     |                      |                     |                     |
     |              F(B,C,D,P)-(src:P(D),dst:P(A))+<--------------------+
     |                      |                     |                     |
     |                      |                     |                     |
     |                      +<--------------------+---------------------+
     |                      |    F(A,B,C,P)-(src:P(D),dst:P(A))         |
     |                      |                     |                     |
     |                      |                     |                     |
     |<---------------------+---------------------+---------------------+
                   F(Null,A,B,P)-(src:P(D),dst:P(A))
]]></artwork>
      </figure>
      <t>Consider an illustrative example using the four-AS topology shown in <xref target="figure2"/>. In this process, FC-BGP generates the corresponding FC and propagates to downstream ASes (e.g., adding it to the Path Attributes of the BGP updates), so that the receiving AS can validate the authenticity of the announcement. Suppose AS C receives a BGP announcement P(A): A-&gt;B-&gt;C from its neighbor B. If AS C decides to further advertise this path to its neighbor D based on its routing policy, it generates a FC F(B,C,D,P), propagates it  to AS D, and forwards the BGP update message to D.</t>
      <t>When AS D receives the route from C, it can determine the authenticity of the current AS path by verifying the list of FCs correctly reflects the AS path.</t>
    </section>
    <section anchor="forwarding-validation">
      <name>Forwarding Validation</name>
      <t>AS shown in <xref target="figure2"/>, to enable forwarding validation, ASes need to announce the traffic-FCs binding relationships. Specifically, suppose AS D confirms that the AS-path C-&gt;B-&gt;A for reaching prefix P(A) is legitimate, it binds the traffic (src:P(D),dst:P(A)) (where P(D) is the prefix owned by AS D) with the FC list F(B,C,D,P)-F(A,B,C,P)-F(Null,A,B,P), and then publicly announces the binding relationship.</t>
      <t>Upon receiving the relationship, other ASes can build traffic filtering rules based on the relationship to enable forwarding validation on dataplane. For instance, by interpreting the binding relationship produced by AS D, AS C confirms that the traffic (src:P(D), dst:P(A)) shall be forwarded over the link L(CD), and AS B confirms that the traffic shall be forwarded on link L(BC). Network traffic violating these binding rules is considered to take unauthorized paths.</t>
      <t>To enable network-wide forwarding verification, these binding rules may be further broadcast globally (instead of just informing the ASes on the AS-path) so that off-path ASes can also discard unauthorized flows.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
          <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC8205">
        <front>
          <title>BGPsec Protocol Specification</title>
          <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
          <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8205"/>
        <seriesInfo name="DOI" value="10.17487/RFC8205"/>
      </reference>
      <reference anchor="RFC6480">
        <front>
          <title>An Infrastructure to Support Secure Internet Routing</title>
          <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="February" year="2012"/>
          <abstract>
            <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6480"/>
        <seriesInfo name="DOI" value="10.17487/RFC6480"/>
      </reference>
      <reference anchor="RFC8209">
        <front>
          <title>A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests</title>
          <author fullname="M. Reynolds" initials="M." surname="Reynolds"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the Border Gateway Protocol (BGP), as part of an extension to that protocol known as BGPsec. BGP is the standard for inter-domain routing in the Internet; it is the "glue" that holds the Internet together. BGPsec is being developed as one component of a solution that addresses the requirement to provide security for BGP. The goal of BGPsec is to provide full AS path validation based on the use of strong cryptographic primitives. The end entity (EE) certificates specified by this profile are issued to routers within an AS. Each of these certificates is issued under a Resource Public Key Infrastructure (RPKI) Certification Authority (CA) certificate. These CA certificates and EE certificates both contain the AS Resource extension. An EE certificate of this type asserts that the router or routers holding the corresponding private key are authorized to emit secure route advertisements on behalf of the AS(es) specified in the certificate. This document also profiles the format of certification requests and specifies Relying Party (RP) certificate path validation procedures for these EE certificates. This document extends the RPKI; therefore, this document updates the RPKI Resource Certificates Profile (RFC 6487).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8209"/>
        <seriesInfo name="DOI" value="10.17487/RFC8209"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 207?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
