<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-hbq-bgp-tls-auth-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TLS Authentication for BGP">TLS Authentication for BGP</title>

    <author fullname="Jeffrey Haas">
      <organization>HPE</organization>
      <address>
        <email>jeffrey.haas@hpe.com</email>
      </address>
    </author>
    <author fullname="Bob Beck">
      <organization>OpenSSL</organization>
      <address>
        <email>beck@obtuse.com</email>
      </address>
    </author>
    <author fullname="Yingzhen Qu">
      <organization>Futurewei Technologies</organization>
      <address>
        <email>yingzhen.ietf@gmail.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="01"/>

    <area>AREA</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>BGP</keyword> <keyword>TLS</keyword> <keyword>transport layer security</keyword> <keyword>PKI</keyword>

    <abstract>


<?line 83?>

<t>The Border Gateway Protocol, Version 4 (BGP-4) (RFC 4271) uses TCP (RFC 9293) as
its transport layer protocol.  There are proposals to run BGP over TLS-based
transport protocols, including QUIC.  This document discusses authentication
considerations for running BGP over TLS protocols and defines a PKI framework to
provide for authenticating BGP peering sessions.</t>



    </abstract>



  </front>

  <middle>


<?line 92?>

<section anchor="introduction"><name>Introduction</name>

<t>The Border Gateway Protocol, Version 4 (BGP-4) <xref target="RFC4271"/> uses TCP <xref target="RFC9293"/>
as its transport layer protocol.  TCP provides a sequenced, reliable byte stream
for BGP to deliver its PDUs for a BGP session. BGP is provides its own
framing layer.  TCP provides no security mechanisms, including authentication,
data integrity, or privacy, for its users. (See <xref target="RFC4949"/> for definitions of
these properties.)</t>

<t>Attacks against BGP running over TCP lead to the development of TCP-MD5
<xref target="RFC2385"/> and later the TCP Authentication Option (TCP-AO) <xref target="RFC5925"/>.  These
mechanisms protect against disrupting the TCP stream.  In particular, it
provides for data integrity of the TCP stream and also provides a form of
authentication via using shared secrets needed to implement these mechanisms.
<xref section="1.2" sectionFormat="of" target="RFC5925"/> discusses how TCP-AO is not intended to replace the
use of IPsec <xref target="RFC4301"/> or TLS <xref target="RFC8446"/>.</t>

<t>There are proposals to run BGP over alternative transport protocols, including
QUIC <xref target="I-D.draft-retana-idr-bgp-quic"/> <xref target="RFC9000"/>.  QUIC leverages TLS version
1.3 <xref target="RFC9001"/>, which provides for authentication and also privacy.  Data
integrity is also a property of TLS, however when TLS is carried over TCP, it
does not provide protection of the TCP stream.</t>

<t>TLS makes use of certificates as part of its authentication infrastructure.
This document defines a public key infrastructure (PKI) <xref target="RFC5280"/> profile for
authenticating BGP peering sessions when carried over TLS transport.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>AS: Autonomous System.</t>

<t>ASN: Autonomous System Number.</t>

<t>CA: Certificate Authority.</t>

<t>RPKI: Resource Public Key Infrastructure.</t>

</section>
<section anchor="a-history-of-securing-bgp-transport-sessions"><name>A History of Securing BGP Transport Sessions</name>

<t>Modernly, BGP-4 <xref target="RFC4271"/> doesn't provide for authentication of its sessions
within the protocol.  An earlier version of BGP-4 defined in <xref target="RFC1771"/>
attempted to define an authentication mechanism, however it was problematic and
not deployed.</t>

<t>BGP's security issues using TCP were noted in <xref target="RFC1773"/> and later as part of
<xref target="RFC4272"/>.  By that time, the use of TCP-MD5 - even with its deficiencies -
were part of best current operational practice.</t>

<t>Securing BGP using IPsec has been offered as an option, as was typical of IETF
routing protocols carried over TCP. However, the general deployment of routing
protocols using IPsec has been problematic for various reasons.  While many
implementations offer IPsec as an authentication option, it is not commonly
deployed.</t>

<t>Mechanisms such as TCP-MD5, TCP-AO, and IPsec provide for authenticating a BGP
session through the use of shared secrets. These are used to provision their
mechanisms for a given BGP peering session and are tied to a pair of IP
addresses for the session.</t>

</section>
<section anchor="why-authenticate-bgp"><name>Why Authenticate BGP</name>

<t>Pair-wise authentication of BGP session endpoints provide assurance that each
side of the BGP session is the expected party.  However, this authentication
only provides assurance that each side has provided the necessary credential for
the mechanism and that it is associated with the BGP speaker's IP address.</t>

<t>Validating that each party supplying this information is a trusted party
requires additional scrutiny.  Nothing in the BGP protocol or IP address
assignment for a BGP speaker attests to whether that party is legitimate or not.
For example, a fraudulent party claiming to be the trusted party could be
supplying the credentials to secure the session.  This permits the fradulent
party to participate in BGP routing in the same role as the trusted party for
devious reasons.</t>

<t>A trusted channel for distributing these security credentials is thus needed.</t>

</section>
<section anchor="using-tls-certificates-for-bgp"><name>Using TLS Certificates for BGP</name>

<t>TLS 1.3 is leveraged by many protocols to provide for authentication, data
integrity, and privacy.  It leverages PKI certificates to validate the TLS
session.  Some of the details for validating certificates are left to
applications using those certificates.</t>

<t>The web PKI is inappropriate for validating TLS sessions protecting BGP.  Many
resources addressed by web PKI certificates are particular to websites and a
certificate validation model where a large number of trust anchors are
distributed to web browsers and other HTTPS clients for validation of TLS
sessions.</t>

<t>The resources appropriate for validation in the BGP protocol include the
Autonomous System (AS) number for the peering session, and the IP address for
the peering session.</t>

</section>
<section anchor="authenticating-bgp-using-tls-certificates"><name>Authenticating BGP Using TLS Certificates</name>

<t>Authenticating BGP peering sessions needs only to be done in a pair-wise fashion
between two BGP speakers.  Authentication of BGP sessions using this profile
rely upon end entity certificates carried in TLS that contain the following
fields:</t>

<t><list style="symbols">
  <t>One or more "ASIdentifer" fields for that BGP speaker's local AS numbers.</t>
  <t>Optionally, one or more "IPAddress" fields for that BGP speaker's local IP
address endpoints for the BGP session.</t>
</list></t>

<section anchor="high-level-validation-procedure"><name>High Level Validation Procedure</name>

<t><list style="numbers" type="1">
  <t>The local BGP speaker receiving the end entity certificate from the remote
BGP speaker validates the TLS certificate; details of this validation are
described in subsequent sections.</t>
  <t>If the certificate has been successfully validated, the received ASIdentifier
is checked against the expected remote AS for the BGP session.</t>
  <t>If the ASIdentifier successfully validates, and an IPAddress field is
present, the IPAddress prefix is validated against the remote peer's expected
IP endpoints.</t>
  <t>If all of these procedures have succeded, the peer has been authenticated and
the BGP protocol may use this TLS session.  Otherwise, the session should be
closed.</t>
</list></t>

</section>
<section anchor="as-level-trust-anchors"><name>AS-level Trust Anchors</name>

<t>Since BGP sessions are pair-wise, in principle the peering session could be
provisioned with the local end entity certificate and the expected remote
end entity certificate.  This is somewhat similar to provisioning per-session
shared secrets for other mechanisms.  In the absence of additional validation,
it also is no better from a trust perspective: How did you get this end
certificate in the first place and why do you trust it?</t>

<t>Consider the case where the end entity certificates are issued by a certificate
authority that is operating at the BGP AS level.  If all end entity certificates
protecting BGP peering sessions are issued by their AS-level CA, and the AS's CA
certificate is used as the trust anchor for the session, then all that is
required to be installed on a BGP speaker is the remote peer's AS-level CA
certificate.</t>

<t>Unlike per-session end entity certificates, the AS-level CA certificate may be
made available through channels where validation of authenticity of the
certificate is easier.  This permits service providers to have a higher degree
of confidence that the end entity certificate supplied during the TLS handshake
has been issued by the service provider.</t>

</section>
<section anchor="trusted-third-party-trust-anchors"><name>Trusted Third Party Trust Anchors</name>

<t>An option that may appeal to some service providers to validate AS-level
certificates is to permit a trusted third party to be a mutual parent in the
validation hierarchy.  One such example might include the Regional Internet
Registries (RIRs) that are already issuing AS numbers to service providers for
BGP use.  While RIRs appear at first glance to be a natural fit for such 
mutual trusted third parties, any party that has the trust of two parties
participating in validation can serve this purpose.</t>

<t>The core proposition to this model is that the third party is trusted.  Such a
party can issue certificates that would permit validation to proceed in a
pair-wise fashion for a service provider using this trust relationship.</t>

</section>
</section>
<section anchor="issuing-end-entity-certificates"><name>Issuing End Entity Certificates</name>

<t>In models where an AS-level CA exists, end entity certificates protecting BGP
peering sessions are created on an as-needed basis and provisioned onto the
protected systems.</t>

<t>This may be "push" model where a centralized provisioning system creates and
distributes the end entity certificates and associated BGP peering configuration
for each BGP speaker.</t>

<t>Another possible model is a "pull" model where sufficient trust exists between
the requesting BGP speaker and the AS-level certificate infrastructure.  Such a
model has some resemblance to the use cases enabled by the ACME protocol
<xref target="RFC8555"/>.</t>

</section>
<section anchor="bgp-tls-certificate-profile"><name>BGP TLS Certificate Profile</name>

<section anchor="introduction-1"><name>Introduction</name>

<t>This document defines a profile for X.509 Public Key Certificates intended for
use in identifying BGP autonomous systems (ASes) by their registered Autonomous
System Number (ASN) for purposes of TLS authentication. This profile specifies
the use of a new Subject Alternative Name (SAN) extension type to carry the ASN,
facilitating the verification of the certificate holder's identity as a
legitimate holder of the  AS and supporting cryptographic authentication in
routing and network security protocols. It defines a new Other Name for
inclusion in the X.509 Subject Alternate Name (SAN) to carry an AS number.</t>

<t>The intention of this document is to define a certificate profile for use in a
TLS handshake for transport connections used by protocols to exchange routing
information.</t>

<t>X.509 certificates are a foundational element of public key infrastructure
(PKI), providing cryptographic binding between a public key and an identity. In
the context of network routing and infrastructure security, such as RPKI
(Resource Public Key Infrastructure) or future secure routing mechanisms, it is
essential to cryptographically bind a public key to an AS's unique
identifier—the Autonomous System Number (ASN).</t>

<t>This profile specifies the minimal requirements and constraints for X.509
certificates used to identify an AS solely by its ASN. It leverages existing
X.509 standards, primarily <xref target="RFC5280"/>, and defines a specific approach for ASN
inclusion in the Subject Alternative Name extension.</t>

<t>Unlike the Autonomous System identifier delegation extension from <xref target="RFC3779"/>,
this profile is not intended to reflect the association of routing ip addresses
to AS numbers for purposes of validating routing decisions. This profile is
intended for use cases in which an endpoint is to be identified as a specific
ASN endpoint of a TLS connection, for securing routing control connections,
such as BGP.</t>

<t>This profile is intended to provide a mechanism whereby an AS can reliably
generate short lived end entity certificates to reliably identify TLS connection
endpoints.</t>

<t>TLS can be used with fixed certificates or pre-shared keys, and may be very
appropriate to use in that model for certain uses in this space where the two
relying parties at each end of a connection have decided to trust each other by
some out of band mechanism. The focus of this draft is to establish a
certificate profile for a PKI that enables the ability to establish trust via
either a mutually operated, or third party CA in a reliable manner, with short
lived end-entity certificates provisioned automatically from an intermediate
certificate dedicated to this purpose for an ASN.</t>

</section>
<section anchor="certificate-fields-and-extensions"><name>Certificate Fields and Extensions</name>

<t>This profile extends the base X.509 certificate profile defined in <xref target="RFC5280"/>.
The following table specifies the requirements for critical fields and
extensions.</t>

<section anchor="version"><name>Version</name>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Requirement</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>version</c>
      <c><bcp14>MUST</bcp14></c>
      <c>Set to 2 (meaning X.509 version 3).</c>
</texttable>

</section>
<section anchor="temporal-validity"><name>Temporal Validity</name>

<t>End entity certificates using this profile <bcp14>MUST NOT</bcp14> be valid for more than two
weeks. Revocation methods <bcp14>SHOULD NOT</bcp14> be used to verify the continued validity of
end entity certificates. Automated methods <bcp14>SHOULD</bcp14> be used to provision end
entity certificates to devices that use them.</t>

<t>Intermediate certificates using this profile <bcp14>MUST NOT</bcp14> be valid for more than one
year. Revocation methods <bcp14>SHOULD</bcp14> be used  to verify the continued validity of
intermediate certificates.</t>

</section>
<section anchor="subject-and-subject-public-key-info"><name>Subject and Subject Public Key Info</name>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Requirement</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>subject</c>
      <c><bcp14>SHOULD NOT</bcp14></c>
      <c>Certificates in this profile are primarily identified by the ASN in the SAN extension. The subject field <bcp14>SHOULD</bcp14> be empty (an empty sequence of RDNs).</c>
      <c>subjectPublicKeyInfo</c>
      <c><bcp14>MUST</bcp14></c>
      <c>Contains the public key associated with the AS.</c>
      <c>subjectKeyIdentifier</c>
      <c><bcp14>MUST</bcp14></c>
      <c>Contains the subjectKeyIdentifier for the public key.</c>
      <c>authorityKeyIdentifier</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Contains the authorityKeyIdentifier for the public key of the certificate’s issuer, if the certificate is not self-signed.</c>
</texttable>

</section>
<section anchor="extensions"><name>Extensions</name>

<t>The following extensions are mandatory or critical for this profile:</t>

<section anchor="basic-constraints"><name>Basic Constraints</name>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Requirement</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>basicConstraints</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14> be present. If the certificate is an End-Entity certificate (AS identity), CA <bcp14>MUST</bcp14> be set to FALSE. If the certificate is for a CA that issues AS Identity Certificates, CA <bcp14>MUST</bcp14> be set to TRUE.</c>
</texttable>

</section>
<section anchor="key-usage"><name>Key Usage</name>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Requirement</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>keyUsage</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14> be present. For End-Entity AS Identity Certificates, digitalSignature <bcp14>MUST</bcp14> be asserted.</c>
</texttable>

</section>
<section anchor="extended-key-usage-eku"><name>Extended Key Usage (EKU)</name>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Requirement</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>extKeyUsage</c>
      <c><bcp14>MUST</bcp14></c>
      <c>EKU values <bcp14>SHOULD</bcp14> be one or both of TLS client authentication, and TLS server authentication. Other EKU values <bcp14>SHOULD NOT</bcp14> be present.</c>
</texttable>

</section>
<section anchor="subject-alternative-name-san-critical"><name>Subject Alternative Name (SAN) - Critical</name>

<t>The ASN is carried within the GeneralName type using a specific OID.</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Requirement</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>subjectAlternativeName</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> be marked as CRITICAL.</c>
      <c>ASIdentifier</c>
      <c><bcp14>MUST</bcp14></c>
      <c>The ASN <bcp14>MUST</bcp14> be carried in a GeneralName of type otherName. The OID and structure of this otherName are defined below.</c>
      <c>IPAddress</c>
      <c><bcp14>MAY</bcp14></c>
      <c>One or more IP addresses <bcp14>MAY</bcp14> be carried in the certificate.</c>
</texttable>

<t>Other SAN names <bcp14>SHOULD NOT</bcp14> be present.</t>

</section>
<section anchor="rfc-3779-extensions"><name>RFC 3779 Extensions</name>

<t><xref target="RFC3779"/> extensions used for validating the RPKI <bcp14>SHOULD NOT</bcp14> be present.</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Requirement</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>id-pe-ipAddrBlocks</c>
      <c><bcp14>SHOULD NOT</bcp14></c>
      <c>This profile is deliberately separate from RPKI.</c>
      <c>id-pe-autonomousSysIds</c>
      <c><bcp14>SHOULD NOT</bcp14></c>
      <c>This profile is deliberately separate from RPKI.</c>
</texttable>

</section>
</section>
</section>
<section anchor="as-identifier-encoding-in-subject-alternative-name"><name>AS Identifier Encoding in Subject Alternative Name</name>

<t>The ASN <bcp14>SHALL</bcp14> be included in the Subject Alternative Name extension using the
otherName choice of the GeneralName type.</t>

<t>The specific OID for the AS Identifier is:</t>

<figure><artwork><![CDATA[
    id-pe-ASIdentifier OBJECT IDENTIFIER ::= {
        iso(1) identified-organization(3) dod(6)
        internet(1) private(4) enterprise(1) {IANA-Assigned-Oid}
    }
]]></artwork></figure>

<t>NOTE: A specific OID <bcp14>MUST</bcp14> be obtained from IANA for this profile before final
standardization. For this draft, we use the placeholder id-pe-ASIdentifier.</t>

<t>The ASIdentifier structure, defined by this OID, <bcp14>SHALL</bcp14> be an ASN.1 INTEGER
representing the AS Number. AS Numbers range from 1 to 4,294,967,295.</t>

<figure><artwork><![CDATA[
    ASIdentifier ::= INTEGER (1..4294967295)
]]></artwork></figure>

<t>The ASN.1 structure within the SAN extension will look like this:</t>

<figure><artwork><![CDATA[
    SubjectAlternativeName ::= GeneralNames

    GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName

    GeneralName ::= CHOICE {
        ... (other choices)
        otherName [8] OtherName,
        ... (other choices)
    }

    OtherName ::= SEQUENCE {
        type-id    OBJECT IDENTIFIER (id-pe-ASIdentifier),
        value      [0] EXPLICIT ANY DEFINED BY type-id
    }
]]></artwork></figure>

<t>When encoding the ASN:</t>

<t><list style="numbers" type="1">
  <t>The type-id is set to id-pe-ASIdentifier.</t>
  <t>The value is the ASN.1 INTEGER representation of the AS Number (e.g., AS
64496 would be encoded as the integer 64496).</t>
</list></t>

</section>
<section anchor="end-entity-certificate-issuance"><name>End Entity Certificate Issuance</name>

<t>Any intermediate certificates used to issue end entity certificates using this
profile <bcp14>MUST</bcp14> include all id-pe-ASIdentifier names as the end entity certificate.
Such intermediate certificates <bcp14>MAY</bcp14> include SAN IP address name constraints as
per <xref target="RFC5280"/> and if present they <bcp14>MUST</bcp14> be marked critical</t>

</section>
<section anchor="intermediate-ca-issuance"><name>Intermediate CA Issuance</name>

<t>The intermediate certificate for an AS can sign any leaf certificate for that AS
that will then be able to authenticate a connection.</t>

<t>Out Of Band Trust Anchor Exchange Relying parties using this model exchange
trust anchors out of band.  Relying parties using this model may decide to
validate mutual trust out of band. Appropriate care should be taken in any such
scenario which is out of scope of this document. With trust mutually
established, they may exchange trust anchors which will in turn be trusted to
sign end entity certificates for each of them. This could take the form of a
self signed intermediate certificate that is elided as a trust anchor by each
party.  Each party in this case must take appropriate care that such a trust
anchor is not considered trusted in other places.</t>

<t>Third Party Trusted Certificate Authority Third party certificate authorities
<bcp14>SHOULD</bcp14> validate requests for intermediate certificates using this profile by the
following method:</t>

<t>For every AS in an intermediate certificate request:</t>

<t><list style="symbols">
  <t>Validate a CMS message containing the public key of the certificate is
signed by the corresponding key for the AS in a currently validated RPKI tree.</t>
  <t>This signature is considered to be “proof of control of the AS” for these
purposes.</t>
</list></t>

</section>
</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>In circumstances where a BGP session's certificate validation may not be
possible - for example, the validating trust anchors are not installed -
operators may have need to permit BGP sessions to be established without
validating the authenticity of the session.  Implementations <bcp14>MUST</bcp14> provide a
mechanism to permit sessions to establish in the absence of such validation.
One mechanism may be to make use of "Trust of First Use (TOFU)".  Another may be
to disable validation altogether.</t>

<t>While such practices are not recommended, operators have the option to do after
the fact validation of the sessions that have been expediently trusted in this
fashion.  Implementations <bcp14>MUST</bcp14> provide operational access to the running
session's certificates used for the running sessions.  Similarly,
implementations <bcp14>MUST</bcp14> provide logging facilities for when BGP sessions are
permitted to be established when validation either cannot be done or is
permitted even though validation has failed.</t>

<t>End entity certificates are recommended to have a life time no longer than two
weeks.  Implementations <bcp14>SHOULD</bcp14> validate certificates used for the first use of a
BGP session are valid within the expected life time.  Implementations <bcp14>MAY</bcp14> ignore
end entity certificate life time expiration that otherwise validates for
sessions that have previously been seen to be established.</t>

<t>Ignoring life time validation errors is a balance for the security stance of the
operator and a desire for BGP resiliency in the face of tardy certificate
updates.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="certificate-validation-security-considerations"><name>Certificate Validation Security Considerations</name>

<t>The security of this profile relies on:</t>

<t><list style="numbers" type="1">
  <t>Strong Identity Verification: The CA <bcp14>MUST</bcp14> strictly verify the applicant's
control of the ASN before issuance of an intermediate. Flaws in this process
can lead to impersonation.</t>
  <t>Criticality of SAN: Marking the subjectAlternativeName extension as critical
ensures that relying parties that do not understand the id-pe-ASIdentifier
OID will reject the certificate, preventing misinterpretation of the
certificate's identity.</t>
</list></t>

</section>
<section anchor="bgp-security-considerations"><name>BGP Security Considerations</name>

<t>Implementations <bcp14>MUST</bcp14> provide granular control over the certificate trust anchors
used to authenticate individual BGP sessions.</t>

<t>Use of this certificate profile for protecting BGP sessions carried over TLS
have the opportunity to reduce impersonation of authorized parties peering with
the BGP speaker.  Correct provisioning of the trust anchors used for validating
certificates is necessary to prevent such impersonation.</t>

<t>Trusted third party trust anchors provide opportunities for reduced operational
complexity and fewer certificates necessary for BGP speakers.  However, they
introduce the opportunity for impersonation attacks to be enabled by the these
parties.  Beware of who you trust.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests that IANA assign a unique OID under the SMI Security
Private Extensions arc for id-pe-ASIdentifier to be used within the otherName
field of the Subject Alternative Name extension.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC3779">
  <front>
    <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
    <author fullname="C. Lynn" initials="C." surname="Lynn"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="June" year="2004"/>
    <abstract>
      <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3779"/>
  <seriesInfo name="DOI" value="10.17487/RFC3779"/>
</reference>

<reference anchor="RFC4271">
  <front>
    <title>A Border Gateway Protocol 4 (BGP-4)</title>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
    <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
      <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
      <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
      <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4271"/>
  <seriesInfo name="DOI" value="10.17487/RFC4271"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>

<reference anchor="RFC9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>

<reference anchor="RFC9001">
  <front>
    <title>Using TLS to Secure QUIC</title>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9001"/>
  <seriesInfo name="DOI" value="10.17487/RFC9001"/>
</reference>

<reference anchor="RFC9293">
  <front>
    <title>Transmission Control Protocol (TCP)</title>
    <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="7"/>
  <seriesInfo name="RFC" value="9293"/>
  <seriesInfo name="DOI" value="10.17487/RFC9293"/>
</reference>


<reference anchor="I-D.draft-retana-idr-bgp-quic">
   <front>
      <title>BGP over QUIC</title>
      <author fullname="Alvaro Retana" initials="A." surname="Retana">
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname="Jeffrey Haas" initials="J." surname="Haas">
         <organization>Juniper Networks</organization>
      </author>
      <author fullname="Shuanglong Chen" initials="S." surname="Chen">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
         <organization>Nvidia</organization>
      </author>
      <date day="7" month="January" year="2026"/>
      <abstract>
	 <t>   This document specifies the procedures for BGP to use QUIC as a
   transport protocol with a mechanism to carry Network Layer protocols
   (AFI/SAFI) over multiple QUIC streams to achieve high resiliency.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-retana-idr-bgp-quic-08"/>
   
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC1771">
  <front>
    <title>A Border Gateway Protocol 4 (BGP-4)</title>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <author fullname="T. Li" initials="T." surname="Li"/>
    <date month="March" year="1995"/>
    <abstract>
      <t>This document, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1771"/>
  <seriesInfo name="DOI" value="10.17487/RFC1771"/>
</reference>

<reference anchor="RFC1773">
  <front>
    <title>Experience with the BGP-4 protocol</title>
    <author fullname="P. Traina" initials="P." surname="Traina"/>
    <date month="March" year="1995"/>
    <abstract>
      <t>The purpose of this memo is to document how the requirements for advancing a routing protocol to Draft Standard have been satisfied by Border Gateway Protocol version 4 (BGP-4). This report documents experience with BGP. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1773"/>
  <seriesInfo name="DOI" value="10.17487/RFC1773"/>
</reference>

<reference anchor="RFC2385">
  <front>
    <title>Protection of BGP Sessions via the TCP MD5 Signature Option</title>
    <author fullname="A. Heffernan" initials="A." surname="Heffernan"/>
    <date month="August" year="1998"/>
    <abstract>
      <t>This memo describes a TCP extension to enhance security for BGP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2385"/>
  <seriesInfo name="DOI" value="10.17487/RFC2385"/>
</reference>

<reference anchor="RFC4272">
  <front>
    <title>BGP Security Vulnerabilities Analysis</title>
    <author fullname="S. Murphy" initials="S." surname="Murphy"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
      <t>This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4272"/>
  <seriesInfo name="DOI" value="10.17487/RFC4272"/>
</reference>

<reference anchor="RFC4301">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>

<reference anchor="RFC4949">
  <front>
    <title>Internet Security Glossary, Version 2</title>
    <author fullname="R. Shirey" initials="R." surname="Shirey"/>
    <date month="August" year="2007"/>
    <abstract>
      <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="FYI" value="36"/>
  <seriesInfo name="RFC" value="4949"/>
  <seriesInfo name="DOI" value="10.17487/RFC4949"/>
</reference>

<reference anchor="RFC5925">
  <front>
    <title>The TCP Authentication Option</title>
    <author fullname="J. Touch" initials="J." surname="Touch"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="R. Bonica" initials="R." surname="Bonica"/>
    <date month="June" year="2010"/>
    <abstract>
      <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5925"/>
  <seriesInfo name="DOI" value="10.17487/RFC5925"/>
</reference>

<reference anchor="RFC8555">
  <front>
    <title>Automatic Certificate Management Environment (ACME)</title>
    <author fullname="R. Barnes" initials="R." surname="Barnes"/>
    <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
    <author fullname="D. McCarney" initials="D." surname="McCarney"/>
    <author fullname="J. Kasten" initials="J." surname="Kasten"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8555"/>
  <seriesInfo name="DOI" value="10.17487/RFC8555"/>
</reference>




    </references>

</references>


<?line 563?>

<section anchor="use-of-this-profile-for-non-bgp-purposes"><name>Use of this Profile for Non-BGP Purposes</name>

<t>Astute readers will note that while this document is written with a focus on BGP
operational matters that similar security considerations apply for all other
control plane protocols standardized by IETF that use TCP.  The primary
difference between the BGP use case and the more general-purpose control plane
use case is the lack of a protocol-recognized "AS" as the party used both for
protocol validation and as the identity for the CA certificates issuing end
entity certificates.</t>

<t>The authors will consider a future general-purpose "TLS for routing" profile in
the future based on experience in discussing this more specific use case.</t>

</section>
<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

