<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-guo-idr-bgp-security-policy-community-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="BGP Security Policy Community">BGP Communities for Security Policy Intent</title>
    <seriesInfo name="Internet-Draft" value="draft-guo-idr-bgp-security-policy-community-01"/>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Capital Normal University</organization>
      <address>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="13"/>
    <area>Routing</area>
    <workgroup>Inter-Domain Routing</workgroup>
    <keyword>BGP Community</keyword>
    <keyword>Routing Security</keyword>
    <abstract>
      <?line 58?>

<t>This document specifies a set of standardized BGP community to signal inter-AS routing security policy intent. The initial focus is on RPKI-based Route Origin Validation (ROV) using ROAs <xref target="RFC6482"/> <xref target="RFC6811"/> <xref target="RFC9582"/>. ROV produces validation outcomes such as "Valid", "Invalid", and "NotFound", but the operational treatment of "NotFound" and similar ambiguous cases is entirely a matter of local policy and often differs across networks.</t>
      <t>This document defines transitive community that allows an Origin AS to explicitly express its security policy expectations regarding how its own originated routes <bcp14>SHOULD</bcp14> be treated when downstream Autonomous Systems (ASes) perform ROA-based origin validation. A typical example is an Origin AS indicating a preference for strict handling of ambiguous validation outcomes (e.g., NotFound) for its prefixes.</t>
      <t>Unlike validation states, these community does not assert correctness, authorization, or RPKI deployment status, which is confront to <xref target="AVOID-RPKI-STATE-IN-BGP"/>. Instead, they communicate origin-declared policy intent to all downstream ASes, enabling them to correlate this intent with locally derived validation results. By enabling explicit signaling of security expectations without exporting validation state, this mechanism allows downstream ASes to make more informed policy decisions while reducing the risk of accidental outages caused by misalignment between origin expectations and downstream local policies.</t>
      <t>The mechanism is orthogonal to existing routing security validation technologies and does not alter their semantics or deployment models.</t>
    </abstract>
  </front>
  <middle>
    <?line 68?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Inter-domain routing security mechanisms intentionally separate validation from policy. While this separation improves robustness, it also creates persistent operational ambiguity.</t>
      <t>Internet routing security relies on distributed validation mechanisms like RPKI ROA-based Route Origin Validation (ROV) <xref target="RFC6480"/> <xref target="RFC6482"/> <xref target="RFC6811"/> <xref target="RFC9582"/>. However, there is a functional gap between "knowing a route's validity state" and "knowing the origin's policy intent".</t>
      <t>These security mechanisms are typically enforced locally only. No standardized method exists for an AS to signal its security policy expectations for its originated prefixes as they propagate through the inter-domain routing system. <xref target="AVOID-RPKI-STATE-IN-BGP"/> advises against carrying actual RPKI-derived validation state in BGP, in particular using transitive attributes such as BGP Communities. This is an important safeguard, but it leaves downstream ASes with only their local validation state and no explicit information about the origin’s security policy intent.</t>
      <t>For example, when a Transit AS observes an RPKI "NotFound" state for a route, it cannot, based on RPKI state alone, distinguish between:</t>
      <ul spacing="normal">
        <li>
          <t>an Origin AS that has intentionally not deployed ROAs (and may consider "NotFound" operationally acceptable for the time being);</t>
        </li>
        <li>
          <t>and an Origin AS that has deployed ROAs but is experiencing a configuration error or a hijack attempt (and may consider "NotFound" operationally undesirable or suspicious).</t>
        </li>
      </ul>
      <t>From the point of view of the validation algorithm, these cases all appear as "NotFound". Without additional information about the origin's expectations, downstream ASes must treat them according to their own local policies, which may or may not align with the origin's operational intent.</t>
      <!--
Existing operational practice shows that some operators already use locally-defined BGP communities to request specific propagation or filtering behavior (e.g., blackholing as in {{RFC7999}}), and in some cases to tag prefixes that are expected to be RPKI-protected or subject to stricter handling. These ad-hoc practices illustrate an underlying need to express security-related intent, but they are operator-specific, non-interoperable, and sometimes blur the boundary between policy intent and validation state.
-->

<t>By allowing the Origin AS to signal a stricter security policy intent, downstream ASes can apply different local policies to otherwise identical validation outcomes based on the origin-declared preference. This signaling does not reveal the underlying cause of a "NotFound" state, and it does not carry validation results. Instead, it exposes the origin’s desired treatment of its routes under such ambiguity (for example, that the origin prefers its routes to be handled more strictly when validation is inconclusive).</t>
      <t>Current mechanisms do not allow an Origin AS to express, in a standardized way:</t>
      <ul spacing="normal">
        <li>
          <t>whether it prefers strict handling to be applied to ambiguous validation outcomes for its own routes;</t>
        </li>
        <li>
          <t>whether certain propagation behaviors are explicitly expected or operationally acceptable for its routes;</t>
        </li>
        <li>
          <t>and whether "NotFound" or similar outcomes are considered operationally acceptable for its routes.</t>
        </li>
      </ul>
      <t>As a result, downstream networks frequently face situations where routing information is technically acceptable according to their local validation policy, yet operationally unexpected from the perspective of the Origin AS. In large-scale deployments, this ambiguity may lead to:</t>
      <ul spacing="normal">
        <li>
          <t>inconsistent treatment of identical prefixes;</t>
        </li>
        <li>
          <t>difficulty distinguishing misconfiguration from malicious behavior at an operational level.</t>
        </li>
      </ul>
      <t>By signaling security policy intent, an Origin AS can explicitly inform the network of its operational expectations regarding routing security for its own prefixes. For example, an Origin AS may indicate that it prefers downstream ASes to apply stricter handling for its prefixes when their local ROV results are ambiguous.</t>
      <t>This signaling enables downstream ASes, if they choose to honor it, to better align their local policies with the origin's expectations, while still deriving and using their own validation results locally. The mechanism defined in this document is explicitly designed to follow the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/> by avoiding the carriage of RPKI-derived validation state in BGP and instead signaling only origin-declared policy intent.</t>
      <section anchor="goals-and-non-goals">
        <name>Goals and Non-Goals</name>
        <t>This document is scoped to signaling origin-declared policy intent for ROA-based origin validation only. It does not attempt to define new validation mechanisms or to standardize local routing policies.</t>
        <t>The goal of this document is to provide a mechanism for an Origin AS to explicitly express a routing security policy intent to downstream ASes: namely, that routes originated by this AS <bcp14>SHOULD</bcp14> be subject to a stricter local policy when downstream ASes perform ROA-based origin validation.</t>
        <t>The community defined in this document is intended to convey only the Origin AS's intent concerning the desired treatment of its own routes. They do not:</t>
        <ul spacing="normal">
          <li>
            <t>assert or reveal whether the Origin AS has actually deployed RPKI, ROAs, or ROV locally;</t>
          </li>
          <li>
            <t>export or encode any RPKI validation state (e.g., "Valid", "Invalid", "NotFound");</t>
          </li>
          <li>
            <t>and guarantee that downstream ASes will enforce or even interpret the signaled intent in a particular way.</t>
          </li>
        </ul>
        <t>Enforcement of any stricter policy remains entirely a local decision of each downstream AS. An Origin AS can request stricter handling via this community, but it cannot enforce that request on other ASes.</t>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<dl newline="true">
          <dt>Strict:</dt>
          <dd>
            <t>In this document, the term "Strict" as used in community names (namely, "ROA-Strict") refers solely to the Origin AS's stated policy preference regarding the handling of ambiguous or unfavorable validation outcomes for its own originated routes. It does not imply any mandated filtering, dropping, or preference change by downstream ASes, and it <bcp14>MUST NOT</bcp14> be interpreted as a remote instruction to suppress routes.</t>
          </dd>
          <dt>Security Policy Community:</dt>
          <dd>
            <t>A BGP Large Community defined by this document to convey origin-declared routing security policy intent for the origin's own prefixes.</t>
          </dd>
          <dt>Validation State:</dt>
          <dd>
            <t>A locally derived outcome of a security validation mechanism, such as RPKI Prefix Origin Validation ("Valid", "Invalid", "NotFound"). Validation state is explicitly out of scope for the community defined in this document and <bcp14>MUST NOT</bcp14> be encoded or inferred from them.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="architecture-and-operations">
      <name>Architecture and Operations</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>The mechanism defined in this document operates entirely within the BGP control plane and does not alter protocol message formats or path selection procedures.</t>
        <t>This Security Policy Community uses BGP Large Community <xref target="RFC8092"/>. Its format is "Global-Administrator:Action-ID:Parameter".</t>
        <t>An Origin AS attaches one Security Policy Community when originating a route. This community is propagated unchanged unless explicitly removed or modified by policy.</t>
        <t>Intermediate and receiving ASes on the propagation path may choose to:</t>
        <ul spacing="normal">
          <li>
            <t>ignore the community;</t>
          </li>
          <li>
            <t>log or monitor their presence;</t>
          </li>
          <li>
            <t>correlate them with local validation results;</t>
          </li>
          <li>
            <t>and incorporate them into local policy decisions.</t>
          </li>
        </ul>
        <t>No mandatory processing behavior is defined, and no interoperability dependency is introduced.</t>
      </section>
      <section anchor="policy-signaling-versus-validation-state">
        <name>Policy Signaling Versus Validation State</name>
        <t>This document makes a strict distinction between:</t>
        <ul spacing="normal">
          <li>
            <t>validation state, which is derived locally from cryptographic or registry-based mechanisms; and</t>
          </li>
          <li>
            <t>policy intent, which reflects the Origin AS's operational expectations for its own routes.</t>
          </li>
        </ul>
        <t>The community defined herein exclusively signal policy intent. They do not encode validation outcomes, confidence levels, or security posture of any AS.</t>
        <t>Downstream ASes <bcp14>MUST NOT</bcp14> interpret these communities as an indication that validation has been successfully performed, nor as a substitute for local validation.</t>
        <t>Implementations and operators <bcp14>MUST NOT</bcp14> configure policies that set, clear, or modify the Security Policy Community defined in this document based solely on per-route validation outcomes (for example, if validation is Valid, then attach ROA-Strict). Doing so would effectively re-export validation state in BGP Communities, contrary to the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/>. This design explicitly aligns with the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/>, and avoids propagating dynamic security state within BGP.</t>
      </section>
      <section anchor="transitivity-considerations">
        <name>Transitivity Considerations</name>
        <t>All communities defined in this document are specified as transitive, with the intent that the origin-declared policy intent can be observed by all ASes along the AS-PATH.</t>
        <t>Intermediate ASes may apply local policy that removes or modifies communities, such behavior is outside the scope of this specification. This specification does not impose any requirement on intermediate ASes to preserve these communities. Preservation is an operational choice intended to maximize the visibility of origin-declared policy intent.</t>
      </section>
      <section anchor="origin-as-behavior">
        <name>Origin AS Behavior</name>
        <t>An Origin AS that chooses to signal security policy intent <bcp14>SHOULD</bcp14> attach the appropriate Security Policy Community when originating a route. The communities are intended to reflect a relatively stable per-origin policy posture, not per-route or per-event state.</t>
        <t>For example, an AS 65001 that wishes to indicate a strict policy posture with respect to ROA-based validation ambiguity for a given prefix may attach the following Large Community:</t>
        <ul spacing="normal">
          <li>
            <t><tt>65001:1000:1</tt> (ROA-Strict, default strict policy posture)</t>
          </li>
        </ul>
        <t>An Origin AS <bcp14>MUST NOT</bcp14> attach the Security Policy Communities defined in this document as a function of per-route validation outcomes. Instead, the communities are intended to describe the Origin AS's policy intent independent of the current dynamic validation state of any one route.</t>
        <t>This mechanism does not require the Origin AS to disclose whether it has deployed RPKI, ROAs, or ROV, and the presence or absence of these communities <bcp14>MUST NOT</bcp14> be interpreted as such disclosure.</t>
      </section>
      <section anchor="intermediate-as-behavior">
        <name>Intermediate AS Behavior</name>
        <t>A receiving AS that chooses to process these communities <bcp14>SHOULD</bcp14>, when using Large Communities, verify that the Global Administrator ASN in the Large Community matches the rightmost (Origin) AS in the AS_PATH. If they do not match, the community <bcp14>MUST</bcp14> be ignored for the purpose of interpreting origin policy intent, in order to limit unauthorized policy signaling.</t>
        <t>If this plausibility check succeeds, a receiving AS <bcp14>MAY</bcp14> correlate the presence of a ROA-Strict community with its locally derived validation results as part of its local policy framework.</t>
        <t>For example, a local policy may, if configured by the operator, treat a route carrying a ROA-Strict community as less acceptable when the local RPKI validation state is NotFound. Such behavior is illustrative only and is not mandated by this specification.</t>
        <t>A receiving AS <bcp14>MUST NOT</bcp14> treat the presence of a ROA-Strict community as evidence that validation has already been performed, or that a particular validation outcome exists.</t>
      </section>
      <section anchor="Parameter-Extensibility">
        <name>Parameter Field Extensibility</name>
        <t>The "Parameter" field in the BGP Security Policy Community is explicitly designed for extensibility. Currently, a value of "1" conveys the default strict policy posture for the associated security action (e.g., ROA-Strict). Future assignments may introduce further parameters to support nuanced policy signaling, such as variant handling levels, time-limited policies, or security requirements specific to more recent routing security enhancements.</t>
        <t>Example encodings (illustrative only, not assigned in this document):</t>
        <ul spacing="normal">
          <li>
            <t><tt>65001:1000:1</tt> (ROA-Strict, default strict policy posture)</t>
          </li>
          <li>
            <t><tt>65001:1000:2</tt> (hypothetical future refinement of ROA-Strict behavior)</t>
          </li>
          <li>
            <t><tt>65001:1001:1</tt> (hypothetical new Action-ID for a future policy, e.g., ASPA-Strict)</t>
          </li>
        </ul>
        <t>The Action-ID and Parameter range is managed through IANA for orderly growth as the community adopts richer security policies.</t>
        <t>The extensibility of the Parameter field is intentionally limited to policy refinement and does not introduce conditional logic or dynamic state signaling.</t>
      </section>
    </section>
    <section anchor="applicability-and-deployment">
      <name>Applicability and Deployment</name>
      <section anchor="applicability-to-route-leak-and-hijack-detection">
        <name>Applicability to Route Leak and Hijack Detection</name>
        <t>Security policy communities may serve as additional context for routing analysis systems.</t>
        <t>For example, a route that violates an origin-authorized export constraint, while also exhibiting abnormal AS path patterns, may be flagged as anomalous with higher confidence when it also carries a strict policy community from the expected origin.</t>
        <t>Such signals can reduce false positives in detection systems by providing operator-declared intent, without asserting correctness. This document does not define detection algorithms or mitigation procedures.</t>
      </section>
      <section anchor="deployment-considerations">
        <name>Deployment Considerations</name>
        <t>The proposed mechanism is compatible with existing routing policies and does not require changes to BGP implementations. Deployment of this mechanism is expected to be incremental and partial.</t>
        <t>The proposed mechanism is intended for gradual deployment and interoperability with existing BGP technologies. Origin ASes may selectively signal policy intent for specific prefixes. In hybrid networks where both supporting and non-supporting ASes are present, policy communities will simply be ignored by legacy BGP speakers, providing backward compatibility. No coordination between ASes is required.</t>
        <t>Operators are encouraged to monitor for loss or modification of policy communities due to intermediate ASes that filter or rewrite BGP Community attributes, so as to ensure policy expectations are properly signaled end-to-end.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document defines a policy signaling mechanism using BGP communities. It does not define a security mechanism and does not provide independent security guarantees. It is not intended for real-time attack mitigation or automated incident response.</t>
      <t>This document follows the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/> by not carrying any RPKI-derived validation state in BGP. The communities defined here do not encode or imply specific validation outcomes (such as "Valid", "Invalid", or "NotFound"). Instead, they allow an Origin AS to express a relatively stable policy posture regarding how downstream ASes may treat ambiguous validation results for its routes, if they choose to do so.</t>
      <section anchor="authenticity-and-integrity">
        <name>Authenticity and Integrity</name>
        <t>The communities defined in this document are not cryptographically protected and may be modified, removed, or added in transit. This is consistent with existing BGP community usage and with the design goals of this document.</t>
        <t>No attempt is made to ensure integrity or authenticity of community propagation. Accordingly, these communities <bcp14>MUST NOT</bcp14> be treated as authoritative security assertions and <bcp14>MUST NOT</bcp14> be used as a basis for accepting otherwise invalid routes.</t>
        <t>The semantics defined herein apply only to communities that are plausibly originated by the Origin AS, as determined, in the case of Large Communities, by the Global Administrator field matching the rightmost AS in the AS_PATH. This check is intended solely to limit semantic impersonation and does not constitute a security guarantee.</t>
        <t>An adversary capable of hijacking a route may also attach, modify, or remove communities. It is worthing note that the mechanism is fail-closed with respect to adversarial injection of Security Policy Communities. An intermediate AS, or an active attacker on the path, could unilaterally attach a strict Security Policy Community to a route that did not originate it. However, this cannot weaken security posture: at worst, it causes the route to be treated under stricter assumptions (e.g., making certain ambiguous states appear more suspicious to detection systems) than the true origin may have intended. Because the communities do not grant additional reachability or override existing validation results, but only bias analysis and filtering towards more conservative handling, unauthorized addition of such communities can at most increase false positives, not reduce protections.</t>
      </section>
      <section anchor="relationship-to-validation-mechanisms">
        <name>Relationship to Validation Mechanisms</name>
        <t>The communities defined in this document do not represent validation results, security states, or assertions of route correctness, legitimacy, or authorization.</t>
        <t>In particular, the presence or absence of a Security Policy Community <bcp14>MUST NOT</bcp14> be interpreted as indicating whether a route is valid or invalid under RPKI, BGPsec, or any other validation mechanism.</t>
        <t>These communities <bcp14>MUST NOT</bcp14> override locally derived validation results, including a "Valid" RPKI state. They may be correlated with validation outcomes as part of local policy or analysis, but they do not alter the semantics of those outcomes.</t>
        <t>Implementations and operators <bcp14>MUST NOT</bcp14> use these communities as a reason to skip or short-circuit local validation.</t>
      </section>
      <section anchor="policy-semantics-and-downstream-behavior">
        <name>Policy Semantics and Downstream Behavior</name>
        <t>The communities defined in this document express origin-authorized policy intent only. They do not define required actions.</t>
        <t>Downstream Autonomous Systems <bcp14>MAY</bcp14> ignore these communities entirely without violating this specification. Any routing, filtering, or preference decisions remain solely a matter of local policy.</t>
        <t>The absence of a policy community <bcp14>MUST NOT</bcp14> be interpreted as expressing the opposite intent.</t>
        <t>This document does not require or expect consistent interpretation or uniform behavior across Autonomous Systems. Differences in interpretation, deployment, and operational use are expected and acceptable.</t>
      </section>
      <section anchor="denial-of-service-and-abuse-considerations">
        <name>Denial-of-Service and Abuse Considerations</name>
        <t>This document intentionally avoids defining communities that directly request route suppression or traffic dropping. As a result, it reduces the risk that a malicious actor could trigger network-wide disruption through abuse of policy signaling.</t>
        <t>Nevertheless, operators should be aware that misconfiguration or abuse of these communities may influence local policy decisions if such decisions are explicitly configured to consider them. Operators are encouraged to avoid automated hard actions based solely on the presence of these communities, and to combine them with independently derived validation results and operational context.</t>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>Potential abuse scenarios include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>false or misleading signaling of policy intent;</t>
          </li>
          <li>
            <t>removal or modification of policy signals during propagation;</t>
          </li>
          <li>
            <t>inconsistent signaling across multiple origin points.</t>
          </li>
        </ul>
        <t>These risks are inherent to existing uses of BGP communities and do not introduce new attack vectors. Operators <bcp14>SHOULD</bcp14> correlate these signals with independently verifiable information when making security-related decisions.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>his document requests the creation of one new sub-registry under the "BGP Large Communities" registry. No other IANA actions are required.</t>
      <section anchor="bgp-security-policy-action-ids">
        <name>BGP Security Policy Action IDs</name>
        <t>This document defines new BGP Large Community values for signaling security policy intent. Large Communities are used, rather than Extended Communities, to avoid ASN exhaustion and ambiguity associated with 16-bit Global Administrator fields.</t>
        <t>IANA is requested to create a sub-registry titled "BGP Security Policy Action IDs" under the "BGP Large Communities" registry.</t>
        <t>Large Communities used for this purpose have the following format:</t>
        <artwork><![CDATA[
     Global-Administrator:Action-ID:Parameter
]]></artwork>
        <t>The Global-Administrator field <bcp14>MUST</bcp14> be set to the ASN of the Origin AS. The Action-ID field is an integer whose semantics are defined in the "BGP Security Policy Action IDs" sub-registry created by this document. The Parameter field is left to future documents or operator-specific conventions.</t>
        <t>The Action-ID space is globally coordinated by IANA so that the same Action-ID has the same semantics regardless of the Origin AS using it. The "Strict" qualifier expresses only an origin-declared preference and does not define any required downstream behavior.</t>
        <t>The initial contents of the "BGP Security Policy Action IDs" sub-registry are:</t>
        <artwork><![CDATA[
  Action ID | Name        | Policy Intent Description
  ------------------------------------------------------------------
  1000      | ROA-Strict  | Origin expresses a preference for strict
            |             | handling of its originated routes when
            |             | downstream RPKI validation results are
            |             | ambiguous or unfavorable (e.g., NotFound
            |             | or Invalid).
]]></artwork>
      </section>
    </section>
    <section anchor="relationship-to-existing-and-future-mechanisms">
      <name>Relationship to Existing and Future Mechanisms</name>
      <t>This section clarifies the relationship between the mechanism defined in this document and existing routing policy, traffic engineering, and routing security mechanisms. The goal is to explicitly delineate scope and avoid overlap or semantic ambiguity.</t>
      <section anchor="relationship-to-rpki-and-roa">
        <name>Relationship to RPKI and ROA</name>
        <t>RPKI-based mechanisms such as ROA provide cryptographic or registry-backed validation outcomes for routing information. These mechanisms answer the question of whether a route is consistent with registered authorization data.</t>
        <t>The communities defined in this document do not provide validation and do not alter validation outcomes. They do not indicate that a route is valid, invalid, or authorized. Instead, they allow an Origin AS to express its operational expectations regarding how ambiguous or unfavorable validation outcomes (e.g., NotFound) <em>for its routes</em> may be handled by downstream ASes.</t>
        <t>This mechanism is therefore complementary to RPKI and related validation mechanisms. It operates strictly at the policy signaling layer and does not export validation state, consistent with the guidance in <xref target="AVOID-RPKI-STATE-IN-BGP"/>.</t>
      </section>
      <section anchor="relationship-to-avoid-rpki-state-in-bgp">
        <name>Relationship to "Avoid RPKI State in BGP"</name>
        <t><xref target="AVOID-RPKI-STATE-IN-BGP"/> provides guidance against carrying RPKI-derived validation state in BGP, particularly via transitive attributes such as BGP communities, because doing so can leak local validation outcomes and policy decisions into the global routing system.</t>
        <t>The mechanism described in this document has been explicitly designed to conform to that guidance:</t>
        <ul spacing="normal">
          <li>
            <t>It does not encode, infer, or transport validation states (e.g., "Valid", "Invalid", "NotFound") in BGP attributes;</t>
          </li>
          <li>
            <t>it does not attempt to synchronize or standardize local validation policies across ASes; and</t>
          </li>
          <li>
            <t>it uses communities only to carry origin-declared policy intent for the treatment of the origin's own routes.</t>
          </li>
        </ul>
        <t>As a result, downstream ASes remain responsible for performing their own validation and applying their own policies. The communities defined here are optional hints that can help align local policy decisions with the origin's expressed expectations, without exporting dynamic validation state in BGP.</t>
        <t>The work in <xref target="AVOID-RPKI-STATE-IN-BGP"/> argues that RPKI validation state (e.g., "Valid", "Invalid", "NotFound") and related information <bcp14>SHOULD NOT</bcp14> be propagated in BGP, in order to avoid leaking local validation outcomes and policy decisions into the global routing system.</t>
        <t>This document is aligned with that principle:</t>
        <ul spacing="normal">
          <li>
            <t>The communities defined here do not carry or reflect any RPKI validation state; and</t>
          </li>
          <li>
            <t>they do not reveal whether RPKI/ROV is deployed by the Origin AS or by any downstream AS.</t>
          </li>
        </ul>
        <t>Instead, this document only defines a way for the Origin AS to signal a policy intent to downstream ASes: "please apply stricter ROA-based validation policy to my originated routes, if you support such a policy." Whether and how a downstream AS uses this hint in its local policy is entirely at its own discretion.</t>
      </section>
      <section anchor="relationship-to-bgpsec">
        <name>Relationship to BGPsec</name>
        <t>BGPsec <xref target="RFC8205"/> provides cryptographic protection of the AS_PATH to ensure path integrity and origin authentication. BGPsec is designed to assert and verify routing correctness.</t>
        <t>The mechanism defined in this document does not provide cryptographic protection, path validation, or origin authentication. It does not attempt to replace or replicate BGPsec functionality. Instead, it provides an optional policy signal that may be used in conjunction with BGPsec or in environments where BGPsec is not deployed.</t>
      </section>
      <section anchor="relationship-to-bgp-color-and-color-aware-routing">
        <name>Relationship to BGP Color and Color-Aware Routing</name>
        <t>BGP Color and Color-Aware Routing mechanisms <xref target="RFC9871"/> are primarily intended to support traffic engineering and transport-specific constraints, such as latency, bandwidth, or SR policy selection.</t>
        <t>While both mechanisms use BGP communities as signaling vehicles, the semantics are fundamentally different. BGP Color expresses forwarding or transport preferences, whereas the communities defined in this document express origin-declared routing security policy intent.</t>
        <t>This document does not define path selection behavior, traffic steering, or forwarding constraints, and does not overlap with the objectives of Color-Aware Routing.</t>
      </section>
      <section anchor="relationship-to-only-to-customer-otc">
        <name>Relationship to Only-To-Customer (OTC)</name>
        <t>OTC <xref target="RFC9234"/> is a mechanism designed to assist in route leak prevention by signaling export intent at AS boundaries.</t>
        <t>The communities defined in this document differ from OTC in scope and semantics. OTC signals propagation constraints related to business relationships, whereas this document signals security policy expectations related to validation ambiguity for an origin's routes.</t>
        <t>These mechanisms are complementary and may coexist on the same routes. Neither mechanism subsumes the other.</t>
      </section>
      <section anchor="relationship-to-potential-aspa-based-extensions">
        <name>Relationship to Potential ASPA-Based Extensions</name>
        <t>This document focuses exclusively on ROA-based origin validation and the associated ROA-Strict intent community. Other validation mechanisms such as ASPA <xref target="ASPA-Profile"/> <xref target="ASPA-Verification"/> may, in the future, benefit from similar origin-intent signaling constructs.</t>
        <t>Any such ASPA-related communities, if defined, <bcp14>MUST</bcp14> follow the same core principles as this document:</t>
        <ul spacing="normal">
          <li>
            <t>they <bcp14>MUST NOT</bcp14> export ASPA-derived validation state in BGP;</t>
          </li>
          <li>
            <t>they <bcp14>MUST</bcp14> signal only relatively stable origin policy intent;</t>
          </li>
          <li>
            <t>and they <bcp14>MUST</bcp14> leave all enforcement decisions to downstream local policy.</t>
          </li>
        </ul>
        <t>The specification of ASPA-based policy communities, including any additional Action IDs, is out of scope for this document and is expected to be covered in separate documents if there is interest.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC8092">
          <front>
            <title>BGP Large Communities Attribute</title>
            <author fullname="J. Heitz" initials="J." role="editor" surname="Heitz"/>
            <author fullname="J. Snijders" initials="J." role="editor" surname="Snijders"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="I. Bagdonas" initials="I." surname="Bagdonas"/>
            <author fullname="N. Hilliard" initials="N." surname="Hilliard"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document describes the BGP Large Communities attribute, an extension to BGP-4. This attribute provides a mechanism to signal opaque information within separate namespaces to aid in routing management. The attribute is suitable for use with all Autonomous System Numbers (ASNs) including four-octet ASNs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8092"/>
          <seriesInfo name="DOI" value="10.17487/RFC8092"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6482">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6482"/>
          <seriesInfo name="DOI" value="10.17487/RFC6482"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC7999">
          <front>
            <title>BLACKHOLE Community</title>
            <author fullname="T. King" initials="T." surname="King"/>
            <author fullname="C. Dietzel" initials="C." surname="Dietzel"/>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="G. Doering" initials="G." surname="Doering"/>
            <author fullname="G. Hankins" initials="G." surname="Hankins"/>
            <date month="October" year="2016"/>
            <abstract>
              <t>This document describes the use of a well-known Border Gateway Protocol (BGP) community for destination-based blackholing in IP networks. This well-known advisory transitive BGP community named "BLACKHOLE" allows an origin Autonomous System (AS) to specify that a neighboring network should discard any traffic destined towards the tagged IP prefix.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7999"/>
          <seriesInfo name="DOI" value="10.17487/RFC7999"/>
        </reference>
        <reference anchor="RFC8097">
          <front>
            <title>BGP Prefix Origin Validation State Extended Community</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a new BGP opaque extended community to carry the origination Autonomous System (AS) validation state inside an autonomous system. Internal BGP (IBGP) speakers that receive this validation state can configure local policies that allow it to influence their decision process.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8097"/>
          <seriesInfo name="DOI" value="10.17487/RFC8097"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC9234">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="RFC9582">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="RFC9871">
          <front>
            <title>BGP Color-Aware Routing (CAR)</title>
            <author fullname="D. Rao" initials="D." role="editor" surname="Rao"/>
            <author fullname="S. Agrawal" initials="S." role="editor" surname="Agrawal"/>
            <date month="November" year="2025"/>
            <abstract>
              <t>This document describes a BGP-based routing solution to establish end-to-end intent-aware paths across a multi-domain transport network. The transport network can span multiple service provider and customer network domains. The BGP intent-aware paths can be used to steer traffic flows for service routes that need a specific intent. This solution is called BGP Color-Aware Routing (BGP CAR).</t>
              <t>This document describes the routing framework and BGP extensions to enable intent-aware routing using the BGP CAR solution. The solution defines two new BGP SAFIs (BGP CAR SAFI and BGP VPN CAR SAFI) for IPv4 and IPv6. It also defines an extensible Network Layer Reachability Information (NLRI) model for both SAFIs that allows multiple NLRI types to be defined for different use cases. Each type of NLRI contains key and TLV-based non-key fields for efficient encoding of different per-prefix information. This specification defines two NLRI types: Color-Aware Route NLRI and IP Prefix NLRI. It defines non-key TLV types for the MPLS label stack, SR-MPLS label index, and Segment Routing over IPv6 (SRv6) Segment Identifiers (SIDs). This solution also defines a new Local Color Mapping (LCM) Extended Community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9871"/>
          <seriesInfo name="DOI" value="10.17487/RFC9871"/>
        </reference>
        <reference anchor="ASPA-Profile">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="6" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a Cryptographic Message Syntax (CMS) protected
   content type for Autonomous System Provider Authorization (ASPA)
   objects for use with the Resource Public Key Infrastructure (RPKI).
   An ASPA is a digitally signed object through which the issuer (the
   holder of an Autonomous System identifier), can authorize one or more
   other Autonomous Systems (ASes) as its upstream providers.  When
   validated, an ASPA's eContent can be used for detection and
   mitigation of route leaks.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-22"/>
        </reference>
        <reference anchor="ASPA-Verification">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
         </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   This document describes procedures that make use of Autonomous System
   Provider Authorization (ASPA) objects in the Resource Public Key
   Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP)
   AS_PATH attribute of advertised routes.  This AS_PATH verification
   enhances routing security by adding means to detect and mitigate
   route leaks and AS_PATH manipulations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-24"/>
        </reference>
        <reference anchor="AVOID-RPKI-STATE-IN-BGP">
          <front>
            <title>Guidance to Avoid Carrying RPKI Validation States in Transitive BGP Path Attributes</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Tobias Fiebig" initials="T." surname="Fiebig">
              <organization>Max-Planck-Institut fuer Informatik</organization>
            </author>
            <author fullname="Massimiliano Stucchi" initials="M." surname="Stucchi">
              <organization>Glevia GmbH</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This document provides guidance to avoid carrying Resource Public Key
   Infrastructure (RPKI) derived Validation States in transitive Border
   Gateway Protocol (BGP) Path Attributes.  Annotating routes with
   transitive attributes signaling Validation State may cause needless
   flooding of BGP UPDATE messages through the global Internet routing
   system, for example when Route Origin Authorizations (ROAs) are
   issued, or are revoked, or when RPKI-To-Router sessions are
   terminated.

   Operators SHOULD ensure Validation States are not signaled in
   transitive BGP Path Attributes.  Specifically, Operators SHOULD NOT
   associate Prefix Origin Validation state with BGP routes using
   transitive BGP Communities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-avoid-rpki-state-in-bgp-04"/>
        </reference>
      </references>
    </references>
    <?line 397?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
