<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-shen-sidrops-region-verification-03"
     ipr="trust200902">
  <front>
    <title abbrev="">Verification of Routes Using Region Authorization</title>

    <author fullname="Chen Shen" initials="C." surname="Shen">
      <organization>CAICT</organization>

      <address>
        <postal>
          <street>No.52, Hua Yuan Bei Road</street>

          <city>Beijing</city>

          <code>100191</code>

          <region/>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>shenchen@caict.ac.cn</email>
      </address>
    </author>

    <author fullname="Nan Geng" initials="N." surname="Geng">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street>Huawei Campus, No. 156 Beiqing Road</street>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>gengnan@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Yisong Liu" initials="Y." surname="Liu">
      <organization>China Mobile</organization>

      <address>
        <postal>
          <street>32 Xuanwumenxi Ave.</street>

          <city>Beijing</city>

          <region/>

          <code>100032</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>liuyisong@chinamobile.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Wenyan Yu" initials="W." surname="Yu">
      <organization>CAICT</organization>

      <address>
        <postal>
          <street>No.52, Hua Yuan Bei Road</street>

          <city>Beijing</city>

          <region/>

          <code>100191</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>yuwenyan@caict.ac.cn</email>

        <uri/>
      </address>
    </author>

    <author fullname="Haibo Wang" initials="H." surname="Wang">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street>Huawei Campus, No. 156 Beiqing Road</street>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>rainsword.wang@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Shunwan Zhuang" initials="S." surname="Zhuang">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street>Huawei Campus, No. 156 Beiqing Road</street>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>zhuangshunwan@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Shuanglong Chen" initials="S." surname="Chen">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street>Huawei Campus, No. 156 Beiqing Road</street>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>chenshuanglong@huawei.com</email>

        <uri/>
      </address>
    </author>

    <date day="02" month="March" year="2026"/>

    <area>Ops &amp; Mgmt Area</area>

    <workgroup>SIDROPS</workgroup>

    <keyword>Region Verification</keyword>

    <keyword>Draft</keyword>

    <abstract>
      <t>BGP routing security is becoming a major issue that affects the
      normal running of Internet services. Currently, there are many
      solutions, including ROA authentication and ASPA authentication, to
      prevent route source hijacking, path hijacking, and route leaking.
      However, on an actual network, large ISPs with multiple ASes can use
      carefully constructed routes to bypass ROA and ASPA authentication to
      attack the target network.</t>

      <t>This document defines an region-based authentication method for large
      ISPs with many ASes to prevent traffic hijacking within ISPs.</t>
    </abstract>

    <note title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref
      target="RFC2119">RFC 2119</xref>.</t>
    </note>
  </front>

  <middle>
    <section title="Introduction">
      <t>The design of the Border Gateway Protocol (BGP) lacks a mechanism to
      validate BGP attributes, which is prone to BGP hijacking and BGP route
      leaks <xref target="RFC7908"/>.</t>

      <t><xref target="RFC6811"/> defines a method for verifying the origin of
      BGP prefixes, which can resolve the most common source AS hijacking.
      <xref target="I-D.ietf-sidrops-aspa-verification"/> defines an AS-pairs
      based authentication method to resolve AS-Path hijacking and route
      leaking.</t>

      <t>However, even if these two technologies are deployed on large ISP
      networks with many ASes, there are still risks of being attacked by
      carefully constructed path hijacking.</t>
    </section>

    <section title="Terminology">
      <t>OV: Origin Validation</t>

      <t>RPKI: Resource Public Key Infrastructure</t>

      <t>RP: Relying Party</t>

      <t>RBA: Region Based Authorization</t>
    </section>

    <section title="Problem Statement">
      <t>Currently, some large ISPs have more than one public ASes to
      facilitate management. In these ISPs, only one or very few ASes are used
      to connect to external ISPs. However, the sub-ASes of these ISPs also
      exchange routes to provide services for different customers. Therefore,
      the route access between these sub-ASes may still be subjected to a
      well-crafted attack.</t>

      <section title="Route hijacking risk within a single ISP">
        <t><figure>
            <artwork><![CDATA[         /--------------------------\
         |          ISP1            |
 +----+  |    ,..,                  |
 |user|  |   /    \                 |
 |    |-----| AS   |                |
 +----+  |  |65002 -                |
         |   \    / `.              |
         |    `'-`    \    ,..,     |   /--------\
         |             `. /    \    |   |  ISP10 |
         |               '  AS  ---------        |
         |               ,65001 |   |   | AS65500|
         |              / \    /    |   |        |
         |             /   `'-`     |   \--------/
         |     ,..,   /             |
         |    /    \ /              |
 +----+  |   |  AS  /               |
 |serv-------|65003 |               |
 |er  |  |    \    /                |
 +----+  |     `'-`                 |
         |                          |
         \--------------------------/  
Figure 1 Route hijacking risk within a single ISP               ]]></artwork>
          </figure>As shown in the Figure 1. ISP1 has AS65001, AS65002, and
        AS65003 and connects to an external ISP, such as AS65500. There is a
        server connect to the AS65003, and a user connecte to the AS65002.
        AS65003 advertises the server's route to AS65002, and AS65002 uses the
        route to provide services for users.</t>

        <t>After the AS65500 obtains the route for the server, it can spoof
        the route and change the source AS to AS65003. In this way, the
        spoofed route is advertised to AS65001 with AS-Path AS65500 AS65003.
        AS65001 selects routes between the routes advertised by AS65003 and
        AS65500. Therefore, AS65001 may preferentially select the forged
        routes of AS65500. As a result, subsequent traffic from users to the
        server is hijacked to AS65500.</t>

        <t>IIn actual deployment, to facilitate traffic adjustment, the mask
        of the address in the ROA database registered by ISP1 may be in a
        certain range. In this case, the AS65500 can more easily hijack
        traffic by using more specific prefixes and spoofing the source
        AS.</t>

        <t>The scenario described here can be prevented by ASPA because the AS
        pair (AS65500,AS65003) does not exist..</t>
      </section>

      <section title="Route hijacking risk between multiple ISPs">
        <t><figure>
            <artwork><![CDATA[                                                                    
         /---------------------\      /--------------------\         
         |         ISP1        |      |       ISP2         |         
 +----+  |    ,-.              |      |             ,-.    |         
 |user|  |   /   \             |      |            /   \   |         
 |    |-----| AS  |            |      |           | AS  |  |         
 +----+  |  |65002\            |      |           |65106|  |         
         |   \   / \    ,-.    |      |   ,-.     .\   /   |         
         |    '-'   \  /   \   |      |  /   \   `  '-'    |         
         |           '| AS  |  |      | | AS  |-`          |         
         |    ,-.    .|65001------------|65104|     ,-.    |         
         |   /   \  `  \   /   |      |  \   / `.  /   \   |  +----+ 
         |  | AS  -`    '\'    |      |   '\'    '| AS  |  |  |serv| 
         |  |65003|       \    |      |    ,      |65105|-----|er  | 
         |   \   /         ,   |      |   /        \   /   |  +----+ 
         |    '-'          \   |      |  /          '-'    |         
         \------------------\--/      \-/------------------/         
                             \        .'                             
                              \      /                               
                              \     /                                
                        /------\---/--------\                        
                        |       '.-,        |                        
                        |      /    \       |                        
                        |     | AS   |      |                        
                        |     |65500 |      |                        
                        |      \    /       |                        
                        |       `'-`        |                        
                        |       ISP3        |                        
                        \-------------------/                        
Figure 2 Route hijacking risk between multiple ISPs
]]></artwork>
          </figure>As shown in Figure 2. ISP1 has AS65001, AS65002, and
        AS65003 and connects to external ISPs, such as AS65500 and ISP2's
        AS65104. ISP2 has AS65104, AS65105, and AS65106, and connects to
        external ISPs such as AS65500 and ISP1's AS65001. There is a server
        connect to AS65105, and a user connect to AS65002. AS65105 advertises
        the server's route to AS65002 through the BGP peer. AS65002 then
        provides services for users.</t>

        <t>The AS65500 can also obtain the route for the server from AS65104.
        The AS65500 can spoof the route of the server and change the source AS
        to AS65105. In this way, the AS65500 constructs a more specific
        prefix, which AS-Path is AS65500 AS65104 AS65105, and advertises the
        route to AS65001. The traffic from the user to the server will be
        hijacked to AS65500.</t>

        <t>In this scenario it also can't be prevented by ASPA.</t>
      </section>
    </section>

    <section title="Region Based Authorization">
      <t>An RBA is a digital signature object that contains two types of data.
      One type is to bind multiple ASNs of an ISP to an region ID. The region
      ID represents the ISP and is signed by the administrator of the ISP. The
      RBA certifies which ASNs an ISP has. An AS should belongs to only one
      ISP. The second type is to bind an ISP's region ID to a region
      confederation ID, which is signed by the ISP's administrator. The region
      ID and region confederation ID introduced here can be allocated and
      managed by a unified structure.</t>
    </section>

    <section title="Region Based Verification Procedure">
      <t>To solve this problem, a region-based verification is introduced.
      This method is applicable to large ISPs with multiple ASes. In addition
      to OV verification, region-based verification is performed to prevent
      the attack scenarios mentioned in section 3.</t>

      <section title="Singe region verification">
        <t>As shown in Figure 1, ISP1 can be set to area 1, including AS65001,
        AS65002, and AS65003.</t>

        <t>When a device learns a route, it will verifie whether the route is
        a local region route based on basic OV verification.</t>

        <t>The verification process is as follows:</t>

        <t>1) Perform OV verification on the route. If the OV verification
        result is valid, then perform area verification.</t>

        <t>2) Check whether the route's origin AS is belong to local
        region.</t>

        <t>3) If not, it indicates that the route is not a local region route.
        No additional verification is required in single region
        scenarios..</t>

        <t>4) If the route's origin AS is belong to local region, check
        whether the peer that learns the route is belong to local region.</t>

        <t>5) If the peer that learns a route is not belong to local region,
        the route verification result is invalid.</t>

        <t>If the route verification result is invalid, the route can be
        consider as an invalid route and is not involved in route selection.
        This prevents routes belong to local region from being learned by
        external ASs and prevents possible route hijacking.</t>
      </section>

      <section title="Multiple region verification">
        <t>For the case of Figure 2, region confederations can be set. ISP1 is
        set to region 1, including AS65001, AS65002, and AS65003. ISP2 is set
        to region 2, including AS65104, AS65105, and AS6. In addition, the
        region of ISP1 and ISP2 form a regional confederation, which is set to
        regional confederation 1.</t>

        <t>The verification process is as follows:</t>

        <t>1) First, perform the step of region verification. After single
        region verification step 2, if the route's origin AS is not belong to
        local region, then check whether the route belongs to the local
        confederation.</t>

        <t>2) If the route belongs to the local confederation, check whether
        the peer that learned the route is belong to the local
        confederation.</t>

        <t>3) If the peer is not belong to the local confederation, the route
        verification result is invalid.</t>

        <t>4) Optionally, further checking whether the peer is the region to
        which the route belongs maybe done. If the region to which the route
        belongs does not match the region to which the learned peer belongs,
        the route may be considered as the lowest preference.</t>

        <t>If the route verification result is invalid, the route can be
        consider as an invalid route and is not involved in route selection.
        This prevents routes belong to local region from being learned by
        external ASs and prevents possible route hijacking.</t>
      </section>

      <section title="Obtaining Region Information">
        <t>The region information and region confederation information can be
        obtained in either of the following ways:</t>

        <t>1) Obtained through the RP. When the region information is
        registered through RPKI, it can be obtained through RP.</t>

        <t>2) Static configuration. When RP is not ready, this can be achieved
        through manual configuration.</t>

        <t>Generally, the RPKI mode is recommended..</t>
      </section>

      <section title="Comparing with routing policy">
        <t>The verification here can also be implemented through routing
        policies.</t>

        <t>For region verification scenarios, regular expression-based
        policies&#65292;such as denying all routes whose origin AS is the
        local ISP's ASes, can be configured by the external peers to filter
        routes.</t>

        <t>However, in this mode, complex policies need to be configured based
        on the AS planning of the ISP. In addition, these policies need to be
        integrated with existing routing policies, which is complex to
        use.</t>

        <t>The RPKI mechanism can be used to verify the area information
        obtained from the RP, which simplifies the deployment.</t>
      </section>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>NA</t>
    </section>

    <section anchor="Acknowledgements" title="Acknowledgements">
      <t>NA</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>
    </references>

    <references title="Informative References">
      <?rfc include="reference.RFC.7908"?>

      <?rfc include="reference.RFC.6811"?>

      <?rfc include="reference.I-D.ietf-sidrops-aspa-verification"?>
    </references>
  </back>
</rfc>
