summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9234.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc9234.txt')
-rw-r--r--doc/rfc/rfc9234.txt648
1 files changed, 648 insertions, 0 deletions
diff --git a/doc/rfc/rfc9234.txt b/doc/rfc/rfc9234.txt
new file mode 100644
index 0000000..c1677e8
--- /dev/null
+++ b/doc/rfc/rfc9234.txt
@@ -0,0 +1,648 @@
+
+
+
+
+Internet Engineering Task Force (IETF) A. Azimov
+Request for Comments: 9234 Qrator Labs & Yandex
+Category: Standards Track E. Bogomazov
+ISSN: 2070-1721 Qrator Labs
+ R. Bush
+ IIJ & Arrcus
+ K. Patel
+ Arrcus
+ K. Sriram
+ USA NIST
+ May 2022
+
+
+ Route Leak Prevention and Detection Using Roles in UPDATE and OPEN
+ Messages
+
+Abstract
+
+ Route leaks are the propagation of BGP prefixes that violate
+ assumptions of BGP topology relationships, e.g., announcing a route
+ learned from one transit provider to another transit provider or a
+ lateral (i.e., non-transit) peer or announcing a route learned from
+ one lateral peer to another lateral peer or a transit provider.
+ These are usually the result of misconfigured or absent BGP route
+ filtering or lack of coordination between autonomous systems (ASes).
+ Existing approaches to leak prevention rely on marking routes by
+ operator configuration, with no check that the configuration
+ corresponds to that of the External BGP (eBGP) neighbor, or
+ enforcement of the two eBGP speakers agreeing on the peering
+ relationship. This document enhances the BGP OPEN message to
+ establish an agreement of the peering relationship on each eBGP
+ session between autonomous systems in order to enforce appropriate
+ configuration on both sides. Propagated routes are then marked
+ according to the agreed relationship, allowing both prevention and
+ detection of route leaks.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9234.
+
+Copyright Notice
+
+ Copyright (c) 2022 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Revised BSD License text as described in Section 4.e of the
+ Trust Legal Provisions and are provided without warranty as described
+ in the Revised BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 2. Requirements Language
+ 3. Terminology
+ 3.1. Peering Relationships
+ 4. BGP Role
+ 4.1. BGP Role Capability
+ 4.2. Role Correctness
+ 5. BGP Only to Customer (OTC) Attribute
+ 6. Additional Considerations
+ 7. IANA Considerations
+ 8. Security Considerations
+ 9. References
+ 9.1. Normative References
+ 9.2. Informative References
+ Acknowledgments
+ Contributors
+ Authors' Addresses
+
+1. Introduction
+
+ Route leaks are the propagation of BGP prefixes that violate
+ assumptions of BGP topology relationships, e.g., announcing a route
+ learned from one transit provider to another transit provider or a
+ lateral (i.e., non-transit) peer or announcing a route learned from
+ one lateral peer to another lateral peer or a transit provider
+ [RFC7908]. These are usually the result of misconfigured or absent
+ BGP route filtering or lack of coordination between autonomous
+ systems (ASes).
+
+ Existing approaches to leak prevention rely on marking routes by
+ operator configuration, with no check that the configuration
+ corresponds to that of the eBGP neighbor, or enforcement of the two
+ eBGP speakers agreeing on the relationship. This document enhances
+ the BGP OPEN message to establish an agreement of the relationship on
+ each eBGP session between autonomous systems in order to enforce
+ appropriate configuration on both sides. Propagated routes are then
+ marked according to the agreed relationship, allowing both prevention
+ and detection of route leaks.
+
+ This document specifies a means of replacing the operator-driven
+ configuration-based method of route leak prevention, described above,
+ with an in-band method for route leak prevention and detection.
+
+ This method uses a new configuration parameter, BGP Role, which is
+ negotiated using a BGP Role Capability in the OPEN message [RFC5492].
+ An eBGP speaker may require the use of this capability and
+ confirmation of the BGP Role with a neighbor for the BGP OPEN to
+ succeed.
+
+ An optional, transitive BGP Path Attribute, called "Only to Customer
+ (OTC)", is specified in Section 5. It prevents ASes from creating
+ leaks and detects leaks created by the ASes in the middle of an AS
+ path. The main focus/applicability is the Internet (IPv4 and IPv6
+ unicast route advertisements).
+
+2. Requirements Language
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+3. Terminology
+
+ The terms "local AS" and "remote AS" are used to refer to the two
+ ends of an eBGP session. The "local AS" is the AS where the protocol
+ action being described is to be performed, and "remote AS" is the AS
+ at the other end of the eBGP session in consideration.
+
+ The use of the term "route is ineligible" in this document has the
+ same meaning as in [RFC4271], i.e., "route is ineligible to be
+ installed in Loc-RIB and will be excluded from the next phase of
+ route selection."
+
+3.1. Peering Relationships
+
+ The terms for peering relationships defined and used in this document
+ (see below) do not necessarily represent business relationships based
+ on payment agreements. These terms are used to represent
+ restrictions on BGP route propagation, sometimes known as the Gao-
+ Rexford model [GAO-REXFORD]. The terms "Provider", "Customer", and
+ "Peer" used here are synonymous to the terms "transit provider",
+ "customer", and "lateral (i.e., non-transit) peer", respectively,
+ used in [RFC7908].
+
+ The following is a list of BGP Roles for eBGP peering and the
+ corresponding rules for route propagation:
+
+ Provider: MAY propagate any available route to a Customer.
+
+ Customer: MAY propagate any route learned from a Customer, or that
+ is locally originated, to a Provider. All other routes MUST NOT
+ be propagated.
+
+ Route Server (RS): MAY propagate any available route to a Route
+ Server Client (RS-Client).
+
+ Route Server Client (RS-Client): MAY propagate any route learned
+ from a Customer, or that is locally originated, to an RS. All
+ other routes MUST NOT be propagated.
+
+ Peer: MAY propagate any route learned from a Customer, or that is
+ locally originated, to a Peer. All other routes MUST NOT be
+ propagated.
+
+ If the local AS has one of the above Roles (in the order shown), then
+ the corresponding peering relationship with the remote AS is
+ Provider-to-Customer, Customer-to-Provider, RS-to-RS-Client, RS-
+ Client-to-RS, or Peer-to-Peer (i.e., lateral peers), respectively.
+ These are called normal peering relationships.
+
+ If the local AS has more than one peering Role with the remote AS,
+ such a peering relation is called "Complex". An example is when the
+ peering relationship is Provider-to-Customer for some prefixes while
+ it is Peer-to-Peer for other prefixes [GAO-REXFORD].
+
+ A BGP speaker may apply policy to reduce what is announced, and a
+ recipient may apply policy to reduce the set of routes they accept.
+
+ Violation of the route propagation rules listed above may result in
+ route leaks [RFC7908]. Automatic enforcement of these rules should
+ significantly reduce route leaks that may otherwise occur due to
+ manual configuration mistakes.
+
+ As specified in Section 5, the OTC Attribute is used to identify all
+ the routes in the AS that have been received from a Peer, a Provider,
+ or an RS.
+
+4. BGP Role
+
+ The BGP Role characterizes the relationship between the eBGP speakers
+ forming a session. One of the Roles described below SHOULD be
+ configured at the local AS for each eBGP session (see definitions in
+ Section 3) based on the local AS's knowledge of its Role. The only
+ exception is when the eBGP connection is Complex (see Section 6).
+ BGP Roles are mutually confirmed using the BGP Role Capability
+ (described in Section 4.1) on each eBGP session.
+
+ Allowed Roles for eBGP sessions are:
+
+ Provider: the local AS is a transit provider of the remote AS;
+
+ Customer: the local AS is a transit customer of the remote AS;
+
+ RS: the local AS is a Route Server (usually at an Internet exchange
+ point), and the remote AS is its RS-Client;
+
+ RS-Client: the local AS is a client of an RS and the RS is the
+ remote AS; and
+
+ Peer: the local and remote ASes are Peers (i.e., have a lateral
+ peering relationship).
+
+4.1. BGP Role Capability
+
+ The BGP Role Capability is defined as follows:
+
+ Code: 9
+
+ Length: 1 (octet)
+
+ Value: integer corresponding to the speaker's BGP Role (see Table 1)
+
+ +=======+==============================+
+ | Value | Role name (for the local AS) |
+ +=======+==============================+
+ | 0 | Provider |
+ +-------+------------------------------+
+ | 1 | RS |
+ +-------+------------------------------+
+ | 2 | RS-Client |
+ +-------+------------------------------+
+ | 3 | Customer |
+ +-------+------------------------------+
+ | 4 | Peer (i.e., Lateral Peer) |
+ +-------+------------------------------+
+ | 5-255 | Unassigned |
+ +-------+------------------------------+
+
+ Table 1: Predefined BGP Role Values
+
+ If the BGP Role is locally configured, the eBGP speaker MUST
+ advertise the BGP Role Capability in the BGP OPEN message. An eBGP
+ speaker MUST NOT advertise multiple versions of the BGP Role
+ Capability. The error handling when multiple BGP Role Capabilities
+ are received is described in Section 4.2.
+
+4.2. Role Correctness
+
+ Section 4.1 describes how the BGP Role encodes the relationship on
+ each eBGP session between ASes.
+
+ The mere receipt of the BGP Role Capability does not automatically
+ guarantee the Role agreement between two eBGP neighbors. If the BGP
+ Role Capability is advertised, and one is also received from the
+ peer, the Roles MUST correspond to the relationships in Table 2. If
+ the Roles do not correspond, the BGP speaker MUST reject the
+ connection using the Role Mismatch Notification (code 2, subcode 11).
+
+ +===============+================+
+ | Local AS Role | Remote AS Role |
+ +===============+================+
+ | Provider | Customer |
+ +---------------+----------------+
+ | Customer | Provider |
+ +---------------+----------------+
+ | RS | RS-Client |
+ +---------------+----------------+
+ | RS-Client | RS |
+ +---------------+----------------+
+ | Peer | Peer |
+ +---------------+----------------+
+
+ Table 2: Allowed Pairs of Role
+ Capabilities
+
+ For backward compatibility, if the BGP Role Capability is sent but
+ one is not received, the BGP Speaker SHOULD ignore the absence of the
+ BGP Role Capability and proceed with session establishment. The
+ locally configured BGP Role is used for the procedures described in
+ Section 5.
+
+ An operator may choose to apply a "strict mode" in which the receipt
+ of a BGP Role Capability from the remote AS is required. When
+ operating in the "strict mode", if the BGP Role Capability is sent
+ but one is not received, the connection is rejected using the Role
+ Mismatch Notification (code 2, subcode 11). See comments in
+ Section 8.
+
+ If an eBGP speaker receives multiple but identical BGP Role
+ Capabilities with the same value in each, then the speaker considers
+ them to be a single BGP Role Capability and proceeds [RFC5492]. If
+ multiple BGP Role Capabilities are received and not all of them have
+ the same value, then the BGP speaker MUST reject the connection using
+ the Role Mismatch Notification (code 2, subcode 11).
+
+ The BGP Role value for the local AS (in conjunction with the OTC
+ Attribute in the received UPDATE message) is used in the route leak
+ prevention and detection procedures described in Section 5.
+
+5. BGP Only to Customer (OTC) Attribute
+
+ The OTC Attribute is an optional transitive Path Attribute of the
+ UPDATE message with Attribute Type Code 35 and a length of 4 octets.
+ The purpose of this attribute is to enforce that once a route is sent
+ to a Customer, a Peer, or an RS-Client (see definitions in
+ Section 3.1), it will subsequently go only to the Customers. The
+ attribute value is an AS number (ASN) determined by the procedures
+ described below.
+
+ The following ingress procedure applies to the processing of the OTC
+ Attribute on route receipt:
+
+ 1. If a route with the OTC Attribute is received from a Customer or
+ an RS-Client, then it is a route leak and MUST be considered
+ ineligible (see Section 3).
+
+ 2. If a route with the OTC Attribute is received from a Peer (i.e.,
+ remote AS with a Peer Role) and the Attribute has a value that is
+ not equal to the remote (i.e., Peer's) AS number, then it is a
+ route leak and MUST be considered ineligible.
+
+ 3. If a route is received from a Provider, a Peer, or an RS and the
+ OTC Attribute is not present, then it MUST be added with a value
+ equal to the AS number of the remote AS.
+
+ The following egress procedure applies to the processing of the OTC
+ Attribute on route advertisement:
+
+ 1. If a route is to be advertised to a Customer, a Peer, or an RS-
+ Client (when the sender is an RS), and the OTC Attribute is not
+ present, then when advertising the route, an OTC Attribute MUST
+ be added with a value equal to the AS number of the local AS.
+
+ 2. If a route already contains the OTC Attribute, it MUST NOT be
+ propagated to Providers, Peers, or RSes.
+
+ The above-described procedures provide both leak prevention for the
+ local AS and leak detection and mitigation multiple hops away. In
+ the case of prevention at the local AS, the presence of an OTC
+ Attribute indicates to the egress router that the route was learned
+ from a Peer, a Provider, or an RS, and it can be advertised only to
+ the Customers. The same OTC Attribute that is set locally also
+ provides a way to detect route leaks by an AS multiple hops away if a
+ route is received from a Customer, a Peer, or an RS-Client. For
+ example, if an AS sets the OTC Attribute on a route sent to a Peer
+ and the route is subsequently received by a compliant AS from a
+ Customer, then the receiving AS detects (based on the presence of the
+ OTC Attribute) that the route is a leak.
+
+ The OTC Attribute might be set at the egress of the remote AS or at
+ the ingress of the local AS, i.e., if the remote AS is non-compliant
+ with this specification, then the local AS will have to set the OTC
+ Attribute if it is absent. In both scenarios, the OTC value will be
+ the same. This makes the scheme more robust and benefits early
+ adopters.
+
+ The OTC Attribute is considered malformed if the length value is not
+ 4. An UPDATE message with a malformed OTC Attribute SHALL be handled
+ using the approach of "treat-as-withdraw" [RFC7606].
+
+ The BGP Role negotiation and OTC-Attribute-based procedures specified
+ in this document are NOT RECOMMENDED to be used between autonomous
+ systems in an AS Confederation [RFC5065]. If an OTC Attribute is
+ added on egress from the AS Confederation, its value MUST equal the
+ AS Confederation Identifier. Also, on egress from the AS
+ Confederation, an UPDATE MUST NOT contain an OTC Attribute with a
+ value corresponding to any Member-AS Number other than the AS
+ Confederation Identifier.
+
+ The procedures specified in this document in scenarios that use
+ private AS numbers behind an Internet-facing ASN (e.g., a data-center
+ network [RFC7938] or stub customer) may be used, but any details are
+ outside the scope of this document. On egress from the Internet-
+ facing AS, the OTC Attribute MUST NOT contain a value other than the
+ Internet-facing ASN.
+
+ Once the OTC Attribute has been set, it MUST be preserved unchanged
+ (this also applies to an AS Confederation).
+
+ The described ingress and egress procedures are applicable only for
+ the address families AFI 1 (IPv4) and AFI 2 (IPv6) with SAFI 1
+ (unicast) in both cases and MUST NOT be applied to other address
+ families by default. The operator MUST NOT have the ability to
+ modify the procedures defined in this section.
+
+6. Additional Considerations
+
+ Roles MUST NOT be configured on an eBGP session with a Complex
+ peering relationship. If multiple eBGP sessions can segregate the
+ Complex peering relationship into eBGP sessions with normal peering
+ relationships, BGP Roles SHOULD be used on each of the resulting eBGP
+ sessions.
+
+ An operator may want to achieve an equivalent outcome by configuring
+ policies on a per-prefix basis to follow the definitions of peering
+ relations as described in Section 3.1. However, in this case, there
+ are no in-band measures to check the correctness of the per-prefix
+ peering configuration.
+
+ The incorrect setting of BGP Roles and/or OTC Attributes may affect
+ prefix propagation. Further, this document does not specify any
+ special handling of an incorrect AS number in the OTC Attribute.
+
+ In AS migration scenarios [RFC7705], a given router may represent
+ itself as any one of several different ASes. This should not be a
+ problem since the egress procedures in Section 5 specify that the OTC
+ Attribute is to be attached as part of route transmission.
+ Therefore, a router is expected to set the OTC value equal to the ASN
+ it is currently representing itself as.
+
+ Section 6 of [RFC7606] documents possible negative impacts of "treat-
+ as-withdraw" behavior. Such negative impacts may include forwarding
+ loops or dropped traffic. It also discusses debugging considerations
+ related to this behavior.
+
+7. IANA Considerations
+
+ IANA has registered a new BGP Capability (Section 4.1) in the
+ "Capability Codes" registry within the "IETF Review" range [RFC5492].
+ The description for the new capability is "BGP Role". IANA has
+ assigned the value 9. This document is the reference for the new
+ capability.
+
+ IANA has created and now maintains a new subregistry called "BGP Role
+ Value" within the "Capability Codes" registry. Registrations should
+ include a value, a role name, and a reference to the defining
+ document. IANA has registered the values in Table 3. Future
+ assignments may be made by the "IETF Review" policy as defined in
+ [RFC8126].
+
+ +=======+===============================+===============+
+ | Value | Role name (for the local AS) | Reference |
+ +=======+===============================+===============+
+ | 0 | Provider | This document |
+ +-------+-------------------------------+---------------+
+ | 1 | RS | This document |
+ +-------+-------------------------------+---------------+
+ | 2 | RS-Client | This document |
+ +-------+-------------------------------+---------------+
+ | 3 | Customer | This document |
+ +-------+-------------------------------+---------------+
+ | 4 | Peer (i.e., Lateral Peer) | This document |
+ +-------+-------------------------------+---------------+
+ | 5-255 | To be assigned by IETF Review | |
+ +-------+-------------------------------+---------------+
+
+ Table 3: IANA Registry for BGP Role
+
+ IANA has registered a new OPEN Message Error subcode named "Role
+ Mismatch" (see Section 4.2) in the "OPEN Message Error subcodes"
+ registry. IANA has assigned the value 11. This document is the
+ reference for the new subcode.
+
+ Due to improper use of the values 8, 9, and 10, IANA has marked
+ values 8-10 as "Deprecated" in the "OPEN Message Error subcodes"
+ registry. This document is listed as the reference.
+
+ IANA has also registered a new Path Attribute named "Only to Customer
+ (OTC)" (see Section 5) in the "BGP Path Attributes" registry. IANA
+ has assigned code value 35. This document is the reference for the
+ new attribute.
+
+8. Security Considerations
+
+ The security considerations of BGP (as specified in [RFC4271] and
+ [RFC4272]) apply.
+
+ This document proposes a mechanism that uses the BGP Role for the
+ prevention and detection of route leaks that are the result of BGP
+ policy misconfiguration. A misconfiguration of the BGP Role may
+ affect prefix propagation. For example, if a downstream (i.e.,
+ towards a Customer) peering link were misconfigured with a Provider
+ or Peer Role, it would limit the number of prefixes that can be
+ advertised in this direction. On the other hand, if an upstream
+ provider were misconfigured (by a local AS) with the Customer Role,
+ it may result in propagating routes that are received from other
+ Providers or Peers. But the BGP Role negotiation and the resulting
+ confirmation of Roles make such misconfigurations unlikely.
+
+ Setting the strict mode of operation for BGP Role negotiation as the
+ default may result in a situation where the eBGP session will not
+ come up after a software update. Implementations with such default
+ behavior are strongly discouraged.
+
+ Removing the OTC Attribute or changing its value can limit the
+ opportunity for route leak detection. Such activity can be done on
+ purpose as part of an on-path attack. For example, an AS can remove
+ the OTC Attribute on a received route and then leak the route to its
+ transit provider. This kind of threat is not new in BGP, and it may
+ affect any Attribute (note that BGPsec [RFC8205] offers protection
+ only for the AS_PATH Attribute).
+
+ Adding an OTC Attribute when the route is advertised from Customer to
+ Provider will limit the propagation of the route. Such a route may
+ be considered as ineligible by the immediate Provider or its Peers or
+ upper-layer Providers. This kind of OTC Attribute addition is
+ unlikely to happen on the Provider side because it will limit the
+ traffic volume towards its Customer. On the Customer side, adding an
+ OTC Attribute for traffic-engineering purposes is also discouraged
+ because it will limit route propagation in an unpredictable way.
+
+9. References
+
+9.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
+ Border Gateway Protocol 4 (BGP-4)", RFC 4271,
+ DOI 10.17487/RFC4271, January 2006,
+ <https://www.rfc-editor.org/info/rfc4271>.
+
+ [RFC5065] Traina, P., McPherson, D., and J. Scudder, "Autonomous
+ System Confederations for BGP", RFC 5065,
+ DOI 10.17487/RFC5065, August 2007,
+ <https://www.rfc-editor.org/info/rfc5065>.
+
+ [RFC5492] Scudder, J. and R. Chandra, "Capabilities Advertisement
+ with BGP-4", RFC 5492, DOI 10.17487/RFC5492, February
+ 2009, <https://www.rfc-editor.org/info/rfc5492>.
+
+ [RFC7606] Chen, E., Ed., Scudder, J., Ed., Mohapatra, P., and K.
+ Patel, "Revised Error Handling for BGP UPDATE Messages",
+ RFC 7606, DOI 10.17487/RFC7606, August 2015,
+ <https://www.rfc-editor.org/info/rfc7606>.
+
+ [RFC7908] Sriram, K., Montgomery, D., McPherson, D., Osterweil, E.,
+ and B. Dickson, "Problem Definition and Classification of
+ BGP Route Leaks", RFC 7908, DOI 10.17487/RFC7908, June
+ 2016, <https://www.rfc-editor.org/info/rfc7908>.
+
+ [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for
+ Writing an IANA Considerations Section in RFCs", BCP 26,
+ RFC 8126, DOI 10.17487/RFC8126, June 2017,
+ <https://www.rfc-editor.org/info/rfc8126>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+9.2. Informative References
+
+ [GAO-REXFORD]
+ Gao, L. and J. Rexford, "Stable Internet routing without
+ global coordination", IEEE/ACM Transactions on Networking,
+ Volume 9, Issue 6, pp. 689-692, DOI 10.1109/90.974523,
+ December 2001,
+ <https://ieeexplore.ieee.org/document/974523>.
+
+ [RFC4272] Murphy, S., "BGP Security Vulnerabilities Analysis",
+ RFC 4272, DOI 10.17487/RFC4272, January 2006,
+ <https://www.rfc-editor.org/info/rfc4272>.
+
+ [RFC7705] George, W. and S. Amante, "Autonomous System Migration
+ Mechanisms and Their Effects on the BGP AS_PATH
+ Attribute", RFC 7705, DOI 10.17487/RFC7705, November 2015,
+ <https://www.rfc-editor.org/info/rfc7705>.
+
+ [RFC7938] Lapukhov, P., Premji, A., and J. Mitchell, Ed., "Use of
+ BGP for Routing in Large-Scale Data Centers", RFC 7938,
+ DOI 10.17487/RFC7938, August 2016,
+ <https://www.rfc-editor.org/info/rfc7938>.
+
+ [RFC8205] Lepinski, M., Ed. and K. Sriram, Ed., "BGPsec Protocol
+ Specification", RFC 8205, DOI 10.17487/RFC8205, September
+ 2017, <https://www.rfc-editor.org/info/rfc8205>.
+
+Acknowledgments
+
+ The authors wish to thank Alvaro Retana, Bruno Decraene, Jeff Haas,
+ John Scudder, Sue Hares, Ben Maddison, Andrei Robachevsky, Daniel
+ Ginsburg, Ruediger Volk, Pavel Lunin, Gyan Mishra, and Ignas Bagdonas
+ for their reviews, comments, and suggestions during the course of
+ this work. Thanks are also due to many IESG reviewers whose comments
+ greatly helped improve the clarity, accuracy, and presentation in the
+ document.
+
+Contributors
+
+ Brian Dickson
+ Independent
+ Email: brian.peter.dickson@gmail.com
+
+
+ Doug Montgomery
+ USA National Institute of Standards and Technology
+ Email: dougm@nist.gov
+
+
+Authors' Addresses
+
+ Alexander Azimov
+ Qrator Labs & Yandex
+ Ulitsa Lva Tolstogo 16
+ Moscow
+ 119021
+ Russian Federation
+ Email: a.e.azimov@gmail.com
+
+
+ Eugene Bogomazov
+ Qrator Labs
+ 1-y Magistralnyy tupik 5A
+ Moscow
+ 123290
+ Russian Federation
+ Email: eb@qrator.net
+
+
+ Randy Bush
+ Internet Initiative Japan & Arrcus, Inc.
+ 5147 Crystal Springs
+ Bainbridge Island, Washington 98110
+ United States of America
+ Email: randy@psg.com
+
+
+ Keyur Patel
+ Arrcus
+ 2077 Gateway Place
+ Suite #400
+ San Jose, CA 95119
+ United States of America
+ Email: keyur@arrcus.com
+
+
+ Kotikalapudi Sriram
+ USA National Institute of Standards and Technology
+ 100 Bureau Drive
+ Gaithersburg, MD 20899
+ United States of America
+ Email: ksriram@nist.gov