diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc8893.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc8893.txt')
-rw-r--r-- | doc/rfc/rfc8893.txt | 227 |
1 files changed, 227 insertions, 0 deletions
diff --git a/doc/rfc/rfc8893.txt b/doc/rfc/rfc8893.txt new file mode 100644 index 0000000..bedcceb --- /dev/null +++ b/doc/rfc/rfc8893.txt @@ -0,0 +1,227 @@ + + + + +Internet Engineering Task Force (IETF) R. Bush +Request for Comments: 8893 Internet Initiative Japan & Arrcus +Updates: 6811 R. Volk +Category: Standards Track +ISSN: 2070-1721 J. Heitz + Cisco + September 2020 + + + Resource Public Key Infrastructure (RPKI) Origin Validation for BGP + Export + +Abstract + + A BGP speaker may perform Resource Public Key Infrastructure (RPKI) + origin validation not only on routes received from BGP neighbors and + routes that are redistributed from other routing protocols, but also + on routes it sends to BGP neighbors. For egress policy, it is + important that the classification use the 'effective origin AS' of + the processed route, which may specifically be altered by the + commonly available knobs, such as removing private ASes, + confederation handling, and other modifications of the origin AS. + This document updates RFC 6811. + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc8893. + +Copyright Notice + + Copyright (c) 2020 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction + 2. Suggested Reading + 3. Egress Processing + 4. Operational Considerations + 5. Security Considerations + 6. IANA Considerations + 7. References + 7.1. Normative References + 7.2. Informative References + Acknowledgments + Authors' Addresses + +1. Introduction + + This document does not change the protocol or semantics of [RFC6811], + BGP prefix origin validation. It highlights an important use case of + origin validation in external BGP (eBGP) egress policies, explaining + specifics of correct implementation in this context. + + The term 'effective origin AS' as used in this document refers to the + Route Origin Autonomous System Number (ASN) [RFC6811] of the UPDATE + to be sent to neighboring BGP speakers. + + The effective origin AS of a BGP UPDATE is decided by configuration + and outbound policy of the BGP speaker. A validating BGP speaker + MUST apply Route Origin Validation policy semantics (see Section 2 of + [RFC6811] and Section 4 of [RFC8481]) after applying any egress + configuration and policy. + + This effective origin AS of the announcement might be affected by + removal of private ASes, confederation [RFC5065], migration + [RFC7705], etc. Any AS_PATH modifications resulting in effective + origin AS change MUST be taken into account. + + This document updates [RFC6811] by clarifying that implementations + must use the effective origin AS to determine the Origin Validation + state when applying egress policy. + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and + "OPTIONAL" in this document are to be interpreted as described in + BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all + capitals, as shown here. + +2. Suggested Reading + + It is assumed that the reader understands BGP [RFC4271], the RPKI + [RFC6480], Route Origin Authorizations (ROAs) [RFC6482], RPKI-based + Prefix Validation [RFC6811], and Origin Validation Clarifications + [RFC8481]. + +3. Egress Processing + + BGP implementations supporting RPKI-based origin validation MUST + provide the same policy configuration primitives for decisions based + on the validation state available for use in ingress, redistribution, + and egress policies. When applied to egress policy, validation state + MUST be determined using the effective origin AS of the route as it + will (or would) be announced to the peer. The effective origin AS + may differ from that of the route in the RIB due to commonly + available knobs, such as removal of private ASes, AS path + manipulation, confederation handling, etc. + + Egress policy handling can provide more robust protection for + outbound eBGP than relying solely on ingress (iBGP, eBGP, connected, + static, etc.) redistribution being configured and working correctly + -- i.e., better support for the robustness principle. + +4. Operational Considerations + + Configurations may have a complex policy where the effective origin + AS may not be easily determined before the outbound policies have + been run. It SHOULD be possible to specify a selective origin + validation policy to be applied after any existing non-validating + outbound policies. + + An implementation SHOULD be able to list announcements that were not + sent to a peer, e.g., because they were marked Invalid, as long as + the router still has them in memory. + +5. Security Considerations + + This document does not create security considerations beyond those of + [RFC6811] and [RFC8481]. By facilitating more correct validation, it + attempts to improve BGP reliability. + +6. IANA Considerations + + This document has no IANA actions. + +7. References + +7.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, + DOI 10.17487/RFC2119, March 1997, + <https://www.rfc-editor.org/info/rfc2119>. + + [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A + Border Gateway Protocol 4 (BGP-4)", RFC 4271, + DOI 10.17487/RFC4271, January 2006, + <https://www.rfc-editor.org/info/rfc4271>. + + [RFC5065] Traina, P., McPherson, D., and J. Scudder, "Autonomous + System Confederations for BGP", RFC 5065, + DOI 10.17487/RFC5065, August 2007, + <https://www.rfc-editor.org/info/rfc5065>. + + [RFC6482] Lepinski, M., Kent, S., and D. Kong, "A Profile for Route + Origin Authorizations (ROAs)", RFC 6482, + DOI 10.17487/RFC6482, February 2012, + <https://www.rfc-editor.org/info/rfc6482>. + + [RFC6811] Mohapatra, P., Scudder, J., Ward, D., Bush, R., and R. + Austein, "BGP Prefix Origin Validation", RFC 6811, + DOI 10.17487/RFC6811, January 2013, + <https://www.rfc-editor.org/info/rfc6811>. + + [RFC7705] George, W. and S. Amante, "Autonomous System Migration + Mechanisms and Their Effects on the BGP AS_PATH + Attribute", RFC 7705, DOI 10.17487/RFC7705, November 2015, + <https://www.rfc-editor.org/info/rfc7705>. + + [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC + 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, + May 2017, <https://www.rfc-editor.org/info/rfc8174>. + + [RFC8481] Bush, R., "Clarifications to BGP Origin Validation Based + on Resource Public Key Infrastructure (RPKI)", RFC 8481, + DOI 10.17487/RFC8481, September 2018, + <https://www.rfc-editor.org/info/rfc8481>. + +7.2. Informative References + + [RFC6480] Lepinski, M. and S. Kent, "An Infrastructure to Support + Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480, + February 2012, <https://www.rfc-editor.org/info/rfc6480>. + +Acknowledgments + + Thanks to reviews and comments from Linda Dunbar, Nick Hilliard, + Benjamin Kaduk, Chris Morrow, Keyur Patel, Alvaro Retana, Job + Snijders, Robert Sparks, and Robert Wilton. + +Authors' Addresses + + Randy Bush + Internet Initiative Japan & Arrcus + 5147 Crystal Springs + Bainbridge Island, WA 98110 + United States of America + + Email: randy@psg.com + + + Rüdiger Volk + + Email: ietf@rewvolk.de + + + Jakob Heitz + Cisco + 170 West Tasman Drive + San Jose, CA 95134 + United States of America + + Email: jheitz@cisco.com |