<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-sidrops-bgpsec-transition-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="BGPsec Transition">Transition to Full BGPsec Deployment: Transitive-BGPsec is Incompatible with BGPsec</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-sidrops-bgpsec-transition-01"/>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="December" day="07"/>
    <area/>
    <workgroup>Secure Inter-Domain Routing</workgroup>
    <keyword>BGPsec</keyword>
    <keyword>inter-domain routing</keyword>
    <abstract>
      <?line 57?>

<t>This document elaborates on the reasons why it is unfeasible to reconstruct the native-BGPsec as a transitive approach, such that a BGP update with a correctly signed BGPsec_PATH attribute can traverse legacy areas and afterwards it can still be properly processed by subsequent native-BGPsec speakers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://FCBGP.github.io/BGPsec-Transition/draft-wang-sidrops-bgpsec-transition.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wang-sidrops-bgpsec-transition/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FCBGP/BGPsec-Transition"/>.</t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) <xref target="RFC4271"/> is vulnerable to route leaks and hijacking attacks.</t>
      <t>Native BGPsec, as defined in <xref target="RFC8205"/>, extends BGP to enhance the security of AS path information. Nevertheless, native BGPsec encounters challenges in achieving incremental deployment. It utilizes an optional non-transitive BGP path attribute to deliver digital signatures. Yet, when BGPsec messages traverse BGPsec-unemployed, the last BGPsec-aware router falls back to native BGP protocol to ensure backward compatibility, by completely removing the BGPsec-related path attribute (i.e., the BGPsec_PATH attribute).</t>
      <t>The principal objectives are to make BGPsec transit transparently over BGPsec-unemployed areas, instead of completely falling back to legacy BGP.</t>
      <t>In order to transit across areas where BGPsec has not been deployed, the most straightforward approach is to transform the native BGPsec into transitive BGPsec. However, this document will illustrate that it is unfeasible to render BGPsec as a transitive approach for traversing undeployed areas while still being compatible with native BGPsec. In other words, transitive BGPsec is not compatible with BGPsec.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<dl>
          <dt>BGP:</dt>
          <dd>
            <t>BGP, native BGP, and/or legacy BGP are the BGP version 4 defined in <xref target="RFC4271"/> and/or multiprotocol BGP defined in <xref target="RFC4760"/>. It does not support BGPsec or native BGPsec.</t>
          </dd>
          <dt>BGPsec:</dt>
          <dd>
            <t>BGPsec, native BGPsec, and/or traditional BGPsec are the BGPsec approach defined in <xref target="RFC8205"/>.</t>
          </dd>
          <dt>T-BGPsec:</dt>
          <dd>
            <t>T-BGPsec or transitive BGPsec means that the transitive BGPsec approach is defined in this document.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="transitive-bgpsec-modifications">
      <name>Transitive BGPsec Modifications</name>
      <t>Transitive BGPsec, in essence, describes that the BGPsec_PATh must be transitive and compliant with native BGPsec.</t>
      <section anchor="transitive-bgpsec-negotiation">
        <name>Transitive BGPsec Negotiation</name>
        <t>As stated in <xref section="2.2" sectionFormat="of" target="RFC8205"/>, for a BGPsec router to successfully negotiate with its peer, it must transmit the BGPsec Capabilities that are in accordance with those of its peers in the BGP OPEN message. A transitive path attribute, instead, does not require the negotiation of capabilities with peers. In the event that a peer fails to comprehend the transitive path attribute, it simply forwards it to downstream BGP speakers.</t>
        <t>In transitive BGPsec, negotiating the BGPsec capability is not required. However, a BGPsec router is obligated to inform its peer that it supports transitive BGPsec. In this case, the reuse of the BGPsec capability is essential. Nevertheless, there is no requirement to utilize the Dir field and the AFI field. Transitive BGPsec reuses the native BGPsec capability format. Consequently, the version field of the BGPsec capability must be updated to 1, while the remaining fields should be filled with 0.</t>
        <t>If a BGPsec router negotiates with its peers and the version value of the BGPsec capability is set to 1, this implies that the router supports transitive BGPsec. In this scenario, the BGPsec capability serves two purposes. Firstly, it notifies the peer that this particular BGP speaker is capable of supporting transitive BGPsec. Secondly, it differentiates transitive BGPsec from native BGPsec.</t>
        <t>For the sake of compatibility, this document designates that it still supports native BGPsec in this version.</t>
      </section>
      <section anchor="the-transitive-bgpsecpath-attribute">
        <name>The Transitive BGPsec_PATH Attribute</name>
        <t>Given that the objective is to expedite the incremental deployment of BGPsec, this document considers the least possible modifications to BGPsec. Consequently, all of the packet formats of the BGPsec_PATH attribute defined in <xref target="RFC8205"/> are reutilized in the establishment of transitive BGPsec, including the BGPsec_PATH attribute format, Secure_Path format, Secure_Path Segment format, Signature_Block format, and Signature_Block Segment format.</t>
        <t>In native BGPsec, the BGPsec_PATH attribute is an optional non-transitive BGP path attribute. However, within this document, the BGPsec_PATH attribute is defined as an optional transitive BGP path attribute. It is important to note that the attribute code should remain the same as that of the native BGPsec_PATH attribute.</t>
      </section>
      <section anchor="updating-and-receiving-bgp-update-message">
        <name>Updating and Receiving BGP UPDATE message</name>
        <!-- It is unnecessary to elaborate on the processing of the BGP UPDATE messages. -->
<t>TBD.</t>
      </section>
    </section>
    <section anchor="question-compatibility-with-native-bgpsec">
      <name>Question: Compatibility with Native BGPsec</name>
      <t>Taking the topology presented in <xref target="fig-mix-deployment"/> as an example:</t>
      <ul spacing="normal">
        <li>
          <t>AS A, AS B, and AS C are regions with continuous native BGPsec deployments. Specifically, AS A, AS B, and AS C implement native BGPsec. Additionally, AS C also implements transitive BGPsec.</t>
        </li>
        <li>
          <t>AS D and AS E are areas with legacy BGP deployments. These areas do not implement native BGPsec, transitive BGPsec, or any other related security mechanisms.</t>
        </li>
        <li>
          <t>AS F deploys native BGPsec.</t>
        </li>
      </ul>
      <figure anchor="fig-mix-deployment">
        <name>Example: Mix Deployment Scenario</name>
        <artwork><![CDATA[
+---+     +---+     +---+     +---+     +---+     +---+
| A | --> | B | --> | C | --> | D | --> | E | --> | F | --> ...
+---+     +---+     +---+     +---+     +---+     +---+
|                       |     |             |       |
|                       |     |             |       |
\                       /     \             /       |
 BGPsec Continuous Area      Non-BGPsec Area      BGPsec
]]></artwork>
      </figure>
      <t>AS A is capable of negotiating the BGPsec Capability with AS B. AS A disseminates a route prefix through a BGPsec UPDATE message to AS B.</t>
      <t>AS B can negotiate the BGPsec Capability independently with both AS A and AS C. It receives the BGPsec UPDATE message from AS A and validates it in accordance with the BGPsec specification. Subsequently, it modifies the BGPsec UPDATE message by incorporating its own information and forwards it to AS C.</t>
      <t>AS C obtains the BGPsec UPDATE message from AS B. AS C validates the BGPsec UPDATE message and makes the necessary modifications. In this scenario, because AS D is a legacy AS, AS C converts this message into a transitive BGPsec UPDATE message.</t>
      <t>AS D and AS E refrain from processing this transitive BGPsec message and instead forward it to the subsequent hop.</t>
      <t>AS F receives this transitive BGPsec UPDATE message from AS E. Because AS F deploys the native BGPsec, it will conduct a syntax check. However, the verification will fail because the message is not correctly formatted as a BGPsec UPDATE message.</t>
      <t>In summary, any native BGPsec speaker on the downstream of an undeployed region cannot properly process the transitive BGPsec UPDATE messages sent by upstream ASes.</t>
      <t>Thus, we conclude that the transitive BGPsec is not a viable option to make BGPsec incrementally deployable.</t>
      <t>A new intermediate protocol is required in the transition to full BGPsec deployment.</t>
      <section anchor="explainations">
        <name>Explainations</name>
        <t>Why we persistently on making a transitive BGP path security mechanism is that we would like to make the new one can achieve more benefit for the whole network, not just making some BGPsec islands.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no security considerations in this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4760">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC9774">
          <front>
            <title>Deprecation of AS_SET and AS_CONFED_SET in BGP</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="L. Hannachi" initials="L." surname="Hannachi"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>BCP 172 (i.e., RFC 6472) recommends not using AS_SET and AS_CONFED_SET AS_PATH segment types in the Border Gateway Protocol (BGP). This document advances that recommendation to a standards requirement in BGP; it prohibits the use of the AS_SET and AS_CONFED_SET path segment types in the AS_PATH. This is done to simplify the design and implementation of BGP and to make the semantics of the originator of a BGP route clearer. This will also simplify the design, implementation, and deployment of various BGP security mechanisms. This document updates RFC 4271 by deprecating the origination of BGP routes with AS_SET (Type 1 AS_PATH segment) and updates RFC 5065 by deprecating the origination of BGP routes with AS_CONFED_SET (Type 4 AS_PATH segment). Finally, it obsoletes RFC 6472.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9774"/>
          <seriesInfo name="DOI" value="10.17487/RFC9774"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8374">
          <front>
            <title>BGPsec Design Choices and Summary of Supporting Discussions</title>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="April" year="2018"/>
            <abstract>
              <t>This document captures the design rationale of the initial draft version of what became RFC 8205 (the BGPsec protocol specification). The designers needed to balance many competing factors, and this document lists the decisions that were made in favor of or against each design choice. This document also presents brief summaries of the arguments that aided the decision process. Where appropriate, this document also provides brief notes on design decisions that changed as the specification was reviewed and updated by the IETF SIDR Working Group and that resulted in RFC 8205. These notes highlight the differences and provide pointers to details and rationale regarding those design changes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8374"/>
          <seriesInfo name="DOI" value="10.17487/RFC8374"/>
        </reference>
      </references>
    </references>
    <?line 180?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
