<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-sidrops-aspa-analysis-04" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ASPA analysis">An Analysis of ASPA-based AS_PATH Verification</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-aspa-analysis-04"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Lab</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Wang" fullname="Yangyang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangyy@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="February" day="25"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 69?>
<t>Autonomous System Provider Authorization (ASPA) is very helpful in detecting and mitigating route leaks (valley-free violations) and a majority of forged-origin hijacks. This document does an analysis on ASPA-based AS_PATH verification to help people understand its strengths and deficiencies, and some potential directions of enhancing ASPA are provided.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Autonomous System Provider Authorization (ASPA) is a technique for verifying AS_PATHs in BGP updates <xref target="I-D.ietf-sidrops-aspa-verification"/><xref target="I-D.ietf-sidrops-aspa-profile"/>. Each AS can register ASPA records (also ASPA objects) in the RPKI to authorize a set of ASes as its providers. An AS can obtain ASes' ASPA records through RTRv2 protocol <xref target="I-D.ietf-sidrops-8210bis"/> and conduct AS_PATH verification based the records. ASPA-based AS_PATH verification can detect and mitigate route leaks violating the valley-free principle and path manipulations such as forged-origin or forged-path-segment attacks.</t>
      <t>ASPA can significantly enhance AS_PATH verification and is promising to be widely deployed. Despite of the strengths of ASPA, there are also some deficiencies. This document provides a detailed analysis on the strengths and deficiencies of ASPA. The document can help people deploy ASPA properly and provide some potential directions of enhancing ASPA.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The usage of terms follows <xref target="I-D.ietf-sidrops-aspa-verification"/><xref target="I-D.ietf-sidrops-aspa-profile"/>.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="aspa-strengths-and-disclaimers">
      <name>ASPA Strengths and Disclaimers</name>
      <t>ASPA records can be registered by an AS to authorize all its provider ASes. For the two ASes with mutual transit relationship, the two ASes will put each other AS into its own ASPA record (i.e., each AS considers the other AS as its provider).</t>
      <section anchor="protecting-against-route-leak">
        <name>Protecting Against Route Leak</name>
        <t>In full ASPA deployment (within a given region of interest), all "route leaks" (valley-free violations <xref target="RFC7908"/>) are detectable. Route leaks involve one of the following four valley-free violations:</t>
        <ul spacing="normal">
          <li>
            <t>A route is propagated through a P2C (Provider-to-Customer) link and then a C2P (Customer-to-Provider) link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2P (Peer-to-Peer) link and then a C2P link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2P link and then a P2P link.</t>
          </li>
          <li>
            <t>A route is propagated through a P2C link and then a P2P link.</t>
          </li>
        </ul>
        <t>It is expected that in partial ASPA deployment, not all route leaks are detectable.</t>
      </section>
      <section anchor="protecting-against-path-manipulation">
        <name>Protecting Against Path Manipulation</name>
        <t>Path manipulation can be path forgery or path tampering (i.e., insertion or removal of unique ASN) in this document. Forged-origin hijack and fake link-based hijack are all path manipulations.</t>
        <t>In full ASPA deployment (within a given region of interest), ASPA protects against a majority of forged-origin hijacks. Each AS can attest its upstream ASes, so provider or lateral peer cannot be deceived. Customer could be deceived because ASPA does not provide attestations to downstream ASes or peering ASes.</t>
        <t>Even in full ASPA deployment, not all path manipulation attacks can be detected. ASPA does not guarantee path correctness like that provided by BGPsec <xref target="RFC8205"/>.</t>
      </section>
    </section>
    <section anchor="aspa-deficiencies">
      <name>ASPA Deficiencies</name>
      <t>This section describes the deficiencies of ASPA-based AS_PATH verification in detail.</t>
      <section anchor="hard-to-detect-bogus-records">
        <name>Hard to Detect Bogus Records</name>
        <t>An AS can unilaterally authorize a set of its provider ASes. Under the one-direction authorization, an AS may intentionally or unintentionally register bogus records that are hard to be discovered. An AS maliciously registers bogus records that open a door to potential attacks.</t>
        <t><xref target="fig-bogus"/> shows an example of path manipulation attack based on bogus ASPA records. AS5 lies in that the nonadjacent AS3 is its provider in the ASPA record. The attack cannot be detected even when AS1, AS2, AS3, AS4, and AS6 register ASPA records correctly and enable ASPA-based AS_PATH verification locally. As a result, AS6 will wrongly consider its traffic to AS1 traverses AS5 and AS3, while the real forwarding path to AS1 is through AS4 and AS2.</t>
        <figure anchor="fig-bogus">
          <name>Path manipulation based on bogus ASPA records</name>
          <artwork><![CDATA[
              +-------+
              |AS1(P1)|Originate route
              +-------+
     path[1] /(C2P)   \
      +-------+        \(C2P)
      |  AS2  |         +-------+
      +-------+         |  AS3  |
 path[2,1]|(C2P)        +-------+
          |                 *
      +-------+            *
      |  AS4  |           *
      +-------+          *(faked C2P in AS4's
            \           * bogus ASPA)
  path[4,2,1]\(C2P)    *
              +-------+ ASPA{AS4, [AS2, AS3]}
              |  AS5  | Offender
              +-------+
      path[5,3,1] |(C2P)
              +-------+
              |  AS6  | Victim
              +-------+
  * All ASes register ASPA records
  * AS5's record states a faked C2P link with AS3
  * AS6 enables ASPA-based path verification
]]></artwork>
        </figure>
      </section>
      <section anchor="fail-to-detect-aspath-manipulation-by-a-provider">
        <name>Fail to Detect AS_PATH Manipulation by a Provider</name>
        <t>ASPA-based AS_PATH verification cannot effectively detect the AS_PATH maliciously shortened by a provider, which has been acknowledged in <xref target="I-D.ietf-sidrops-aspa-verification"/>.</t>
        <t><xref target="fig-path-shortened"/> shows an example. AS1 originates the BGP route and propagates the route to other ASes. The AS_PATH received by AS5 is path[4,3,2,1]. However, AS5 maliciously shortens the path by falsely claim a fake link with AS2 before AS5 propagates the route to AS6. AS6's traffic to AS1 may be hijacked by AS5 if the path[5,2,1] is shorter than any other AS_PATHs. In the example, AS5 may not intend to drop data traffic from AS6. That is, AS5 (provider) wants AS6 (customer) to prefer AS5's transit path for increasing revenue.</t>
        <t>In this case, the attack cannot be detected even when all the ASes register the correct ASPA records and all the ASes other than AS5 enable ASPA-based AS_PATH verification.</t>
        <figure anchor="fig-path-shortened">
          <name>AS_PATH maliciously shortened by a provider</name>
          <artwork><![CDATA[
                  +-------+
                  |  AS4  |    path[4,3,2,1]
                  +-------+----------------
      path[3,2,1]/         \               \
                /(C2P)      \               \(C2P)
        +-------+            \path[4,3,2,1] +-------+
        |  AS3  |             \             |  AS7  |
        +-------+              \            +-------+
  path[2,1] |             (C2P) \             /
      (C2P) |                    \ Offender  /
        +-------+ (Fake link) +-------+     /
        |  AS2  |*************|  AS5  |    /
        +-------+             +-------+   /path[7,4,3,2,1]
    path[1] |          path[5,2,1]|      /
      (C2P) |     (path shoterned)|(C2P)/(C2P)
        +-------+             +-------+/
        |AS1(P1)|             |  AS6  | Victim
        +-------+             +-------+
      Originate route
]]></artwork>
        </figure>
        <t>AS_PATH manipulation by a provider may also be used to do malicious route leaks. ASPA is not designed for defensing path manipulation. So, some malicious route leaks with path manipulation involved cannot be prevented.</t>
        <t><xref target="fig-malicious-leak"/> shows an example. AS2 is AS1's provider and arguably it may not leak its customer's prefix (P2) intentionally. But to increase revenue, AS2 may maliciously leak P2 with a modified AS_PATH (i.e., AS3 is removed) to AS4 for attracting more traffic to traverse AS2. Sometimes this attack may happen and goes undetected.</t>
        <figure anchor="fig-malicious-leak">
          <name>Malicious route leak</name>
          <artwork><![CDATA[
        +-------+
        |  AS4  |-------------
        +-------+             \
P1 path[2,1]|                  \
P2 path[2,1]|                   \ P2 path[3,1]
       (C2P)|                    \(C2P)
        +-------+ P2 path[3,1]+-------+
Offender|  AS2  |-------------|  AS3  |
        +-------+    (P2P)    +-------+
               \             /
      P1 path[1]\           /P2 path[1]
                 \(C2P)    /(C2P)
                  +---------+
                  |   AS1   |Originate route
                  | (P1&P2) |
                  +---------+
]]></artwork>
        </figure>
        <!-- ## Cannot Distinguish Leak and Hijack for an Invalid AS_PATH
Existing ASPA verification algorithm can identify Invalid AS_PATHs, but it cannot distinguish leak and hijack for an Invalid AS_PATH. The main reason is that ASPA records only focus on registering all provider ASes while not indicating the adjacency/topology information. When the Hop-check(x, y) function returns "Not provider+", the algorithm does not know whether the real cause of the result is i) ASy is ASx's customer/peer instead of provider or ii) link(x,y) is a fake link. Therefore, when the algorithm returns Invalid, it is not able to indicate whether the path is caused by a fake link-based hijack or not. 

For operators, it's instructive to know the type of an Invalid AS_PATH. If there exists no hijack, the Invalid AS_PATH is likely to be an unintentional route leak. Otherwise, the network may be attacked by path manipulation attacks.  -->

</section>
      <section anchor="not-directly-applicable-to-ibgp-ingress-and-ebgp-egress-verification">
        <name>Not Directly Applicable to IBGP Ingress and EBGP Egress Verification</name>
        <t>IBGP ingress verification and eBGP egress verification are meaningful in many scenarios. IBGP ingress verification is to check the AS_PATH received through iBGP connections. IBGP ingress verification helps an AS do verification on any BGP routers like non-ASBRs. EBGP egress verification means verifying the AS_PATH before sending it to the neighbor AS. It can prevent an AS from sending routes with Invalid AS_PATH to its neighbor ASes (just like eBGP egress RPKI-ROV <xref target="RFC8893"/>).</t>
        <t>However, current ASPA document <xref target="I-D.ietf-sidrops-aspa-verification"/> does not specify how to do iBGP ingress verification. For iBGP ingress verification, the router (e.g., an RR) conducting the verification may not have BGP sessions with the neighbor AS that propagates the route and thus does not know the local BGP role with respect to the neighbor AS. Even so, iBGP ingress verification is doable because the router can obtain the local BGP role from the ASPA records of local AS. In <xref target="fig-egress-veri"/>, when RR wants to do iBGP ingress verification, it can look up AS2's own ASPA records. If AS1 is listed as a provider, then apply the Downstream verification algorithm. If AS1 is not listed as a provider, then apply the Upstream verfication algorithm. Such an iBGP ingress verification also works correctly in RS and RS-client scenarios.</t>
        <figure anchor="fig-egress-veri">
          <name>IBGP and eBGP verification</name>
          <artwork><![CDATA[
          +-------------------------------+
          | AS2                           |
   path[1]| +-----+    +-----+    +-----+ |path[2,1]
AS1-------|->ASBR1|----> RR  |---->ASBR2|-|----->AS3
         /| +-----+   /+-----+    +-----+ |\
        / |          /                    | \
       /  +---------/---------------------+  \
      /            /                          \
  eBGP ingress   iBGP ingress              eBGP egress
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-sidrops-aspa-verification"/> does not specify how to do eBGP egress verification either. To try to do this, the router should add its own AS (i.e., AS2) to the AS_PATH and then performs ASPA-based AS_PATH verification from the perspective of next-hop AS (see Section 7.2 in version-15 of <xref target="I-D.ietf-sidrops-aspa-verification"/>). According to the verification result, the router decides to propagate the route or not. 
In <xref target="fig-egress-veri"/>, ASBR2 would add its own AS (i.e., AS2) to the AS_PATH. If the BGP role of ASBR2 with respect to AS3 is customer/lateral peer/RS/RS-client, the Upstream verification algorithm will be conducted. If the BGP role of ASBR2 with respect to AS3 is provider, the Downstream verification algorithm will be performed. The verification process also works well in mutual transit scenarios.</t>
        <!-- The problem of eBGP egress verification described above is that not all Invalid AS_PATHs (leaked routes) can be prevented from being propagated. Suppose the next-hop AS (i.e., neighbor AS3) is a lateral peer or provider. When the preceding AS (i.e., neighbor AS1) is also a lateral peer or provider but does not have an ASPA registered, the verification result can be Unknown (rather than Invalid). The route leak cannot be prevented in the case.  -->

<t>The relationship between AS1 and AS2 can sometimes be obtained by ASBR2 from AS2's ASPA records. If AS1 is listed as a provider in the AS2's ASPA records, then the above route leak can be detected and prevented. If AS1 is not listed in the AS2's ASPA records, ASBR2 cannot decide AS1 is a lateral peer or a customer. Therefore, the above route leak cannot be detected directly.</t>
        <t>Overall, iBGP ingress verification is doable with help of local AS's own ASPA records, while it is not possible to do eBGP egress verification correctly without more complexity.</t>
      </section>
      <section anchor="not-applicable-to-complex-relationship-scenarios">
        <name>Not Applicable to Complex Relationship Scenarios</name>
        <t>AS relationships in practical networks may be more complex than the traditional P2C/P2P model <xref target="as-rela-1"/><xref target="as-rela-2"/>. In ASPA, only the complex relationship of mutual transit relationship has been considered. The followings are some other complex scenarios that are not covered by ASPA:</t>
        <ul spacing="normal">
          <li>
            <t>Hybrid relationship <xref target="as-rela-1"/><xref target="as-rela-2"/>. Two ASes may agree to have different traditional relationships for different Points-of-Presence (PoPs). A hybrid relationship may be dependent on IP versions or/and PoP locations (see <xref target="fig-hybrid-rela"/> for examples), even prefixes (i.e., different relationships/policies for different prefixes).</t>
          </li>
        </ul>
        <figure anchor="fig-hybrid-rela">
          <name>Hybrid relationship</name>
          <artwork><![CDATA[
+-------+  Europe P2C  +-------+
|       |-------------->       |
|  AS1  |              |  AS2  |
|       |-------------->       |
+-------+   Asia P2P   +-------+

      (a) Location-dependent


+-------+   IPv6 P2C   +-------+
|       |-------------->       |
|  AS1  |              |  AS2  |
|       |-------------->       |
+-------+   IPv4 P2P   +-------+

      (b) IP version-dependent
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Partial transit relationship <xref target="as-rela-1"/><xref target="as-rela-2"/>. For a customer, the provider offers transit only toward the provider's peers and customers (or specific regions), but not the provider's providers, or restricts transit to a specific geographic region. <xref target="fig-hybrid-rela"/> shows an example. AS2 is the partial transit provider of AS1. AS2 should only propagate AS1's route to AS4 (i.e., AS2's peer) and AS5 (i.e., AS2's customer), but should not propagate the route to AS3 (i.e., AS2's provider).</t>
          </li>
        </ul>
        <figure anchor="fig-partial-transit">
          <name>Partial transit relationship</name>
          <artwork><![CDATA[
        +-------+
        |  AS3  |
        +-------+
  path[2,1] |
(route leak)|
            |
       (C2P)|
        +-------+  path[2,1]  +-------+
Offender|  AS2  |-------------|  AS4  |
        +-------+    (P2P)    +-------+
     Partial|    \                |
     transit|     \ path[2,1]     | path[4,2,1]
            |      ----------     |
    path[1] |           (C2P)\    |(C2P)
        +-------+             +-------+
        |  AS1  |             |  AS5  |
        +-------+             +-------+
      Originate route
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Persistent valley-path (legitimate valley-path) (<xref target="valley-path"/>). There may be legitimate valley-paths, i.e., violating the valley-free principle but the AS_PATH is legitimate. According to BGP data analysis, the persistent valley-path can be 10% of all BGP paths.</t>
          </li>
        </ul>
        <figure anchor="fig-valley-path">
          <name>Persistent valley-path</name>
          <artwork><![CDATA[
  Originate route
    +-------+             +-------+
    |AS1(P1)|             |  AS3  |
    +-------+             +-------+
            \             /
      path[1]\           / path[2,1] (not route leak)
              \(C2P)    /(C2P)
              +---------+
              |   AS2   |
              +---------+
]]></artwork>
        </figure>
        <t>ASPA records do not support the registration of complex relationships except the mutual transit relationship. As a result, in the complex scenarios, AS_PATH cannot be effectively protected by ASPA-based AS_PATH verification.</t>
      </section>
      <section anchor="reduced-protection-capability-in-partial-deployment">
        <name>Reduced Protection Capability in Partial Deployment</name>
        <t>To verfify an AS_PATH, ASPA verification algorithms need to check each hop of the AS_PATH. When ASPA records of the ASes along the path are partially registered, not all hops in the path can be checked. In such partial deployment scenarios, ASPA may have a reduced protection capacity.</t>
        <t><xref target="fig-partial-deploy"/> shows two examples of partial deployment. In <xref target="fig-partial-deploy"/> (a), AS3 cannot detect the route leak of P1 induced by AS2 if AS1 has no ASPA record registered. This is because the Hop-check(AS1, AS2) function returns "No Attestation" and the final verification result is Unknown. In <xref target="fig-partial-deploy"/> (b), AS3 is deceived by AS2 who falsely claims AS1 is AS2's neighbor. The attack in the example is undetectable because AS1 registers no ASPA record and AS3 cannot judge the validity of the link between AS1 and AS2.</t>
        <figure anchor="fig-partial-deploy">
          <name>Partial deployment</name>
          <artwork><![CDATA[
                            +-------+
                            |  AS3  |
                            +-------+
                            /
                           / path[2,1] (route leak)
   No ASPA                /(C2P)
  +-------+  (P2P)  +-------+
  |AS1(P1)|---------|  AS2  | Offender
  +-------+ path[1] +-------+
Originate route

      (a) Route leak in partial deployment

                            +-------+
                            |  AS3  |
                            +-------+
                            /
                           / path[2,1] (path manipulation)
   No ASPA (no adjacency) /(C2P)
  +-------+         +-------+
  |AS1(P1)|*********|  AS2  | Offender
  +-------+ path[1] +-------+
Originate route

      (b) Forged-origin attack in partial deployment
]]></artwork>
        </figure>
        <!-- ........................................................................ -->

</section>
    </section>
    <section anchor="reasons-of-aspa-deficiencies">
      <name>Reasons of ASPA Deficiencies</name>
      <t>This section summarizes three main reasons that result in deficiencies of ASPA:</t>
      <ul spacing="normal">
        <li>
          <t>ASPA record is authorized in one direction, e.g., an AS can unilaterally claim that another AS is its provider without the consent of other ASes. Related deficiencies:
          </t>
          <ul spacing="normal">
            <li>
              <t>Hard to detect bogus records</t>
            </li>
          </ul>
        </li>
        <li>
          <t>An ASPA record only focuses on including all provider ASes while ignoring other topology or relationship information. Related deficiencies:
          </t>
          <ul spacing="normal">
            <li>
              <t>Hard to detect bogus records</t>
            </li>
            <li>
              <t>Fail to detect AS_PATH maliciously shortened by a provider</t>
            </li>
            <li>
              <t>Not directly applicable to iBGP Ingress and eBGP egress verification</t>
            </li>
            <li>
              <t>Not applicable to complex relationship scenarios</t>
            </li>
            <li>
              <t>Reduced protection capacity in partial deployment</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The kind of method that verifies AS_PATH based on relationships does not guarantee path correctness like that provided by BGPsec.
          </t>
          <ul spacing="normal">
            <li>
              <t>Not all malicious route leaks and path manipulations are prevented</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document does not involve security problems.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>No IANA requirement.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Much thanks for the comments and inputs from Kotikalapudi Sriram.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-24" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-verification.xml">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>This document describes procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This AS_PATH verification enhances routing security by adding means to detect and mitigate route leaks and AS_PATH manipulations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-24"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-22" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="6" month="February" year="2026"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-22"/>
        </reference>
        <reference anchor="RFC7908" target="https://www.rfc-editor.org/info/rfc7908" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7908.xml">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-24" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Arrcus, DRL, &amp; IIJ Research</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <author fullname="Tom Harrison" initials="T." surname="Harrison">
              <organization>Asia Pacific Network Information Centre</organization>
            </author>
            <date day="5" month="February" year="2026"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data, Router Keys, and ASPA data from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-24"/>
        </reference>
        <reference anchor="RFC8205" target="https://www.rfc-editor.org/info/rfc8205" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8205.xml">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8893" target="https://www.rfc-editor.org/info/rfc8893" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8893.xml">
          <front>
            <title>Resource Public Key Infrastructure (RPKI) Origin Validation for BGP Export</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Volk" initials="R." surname="Volk"/>
            <author fullname="J. Heitz" initials="J." surname="Heitz"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>A BGP speaker may perform Resource Public Key Infrastructure (RPKI) origin validation not only on routes received from BGP neighbors and routes that are redistributed from other routing protocols, but also on routes it sends to BGP neighbors. For egress policy, it is important that the classification use the 'effective origin AS' of the processed route, which may specifically be altered by the commonly available knobs, such as removing private ASes, confederation handling, and other modifications of the origin AS. This document updates RFC 6811.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8893"/>
          <seriesInfo name="DOI" value="10.17487/RFC8893"/>
        </reference>
        <reference anchor="as-rela-1" target="https://www.usenix.org/system/files/nsdi19-jin.pdf">
          <front>
            <title>Stable and Practical AS Relationship Inference with ProbLink</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="February"/>
          </front>
        </reference>
        <reference anchor="as-rela-2">
          <front>
            <title>Inferring Internet AS Relationships Based on BGP Routing Policies</title>
            <author>
              <organization/>
            </author>
            <date year="2011" month="January"/>
          </front>
        </reference>
        <reference anchor="valley-path" target="https://ieeexplore.ieee.org/document/6363987">
          <front>
            <title>Valley-free violation in Internet routing - Analysis based on BGP Community data</title>
            <author>
              <organization/>
            </author>
            <date year="2012" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 388?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
