<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-stealthy-hijacking-02" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Stealthy BGP Hijacking Risk">Risk of Stealthy BGP Hijacking under Incomplete Adoption of Route Origin Validation (ROV)</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-stealthy-hijacking-02"/>
    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Chen" fullname="Yihao Chen">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>yh-chen21@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Xu" fullname="Yi Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>y-xu22@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="April" day="11"/>
    <area>Operations and Management</area>
    <workgroup>SIDROPS Working Group</workgroup>
    <keyword>Resource Public Key Infrastructure</keyword>
    <keyword>Route Origin Validation</keyword>
    <keyword>BGP Hijacking</keyword>
    <abstract>
      <?line 168?>

<t>This document describes how incomplete adoption of Route Origin Validation (ROV) makes certain forms of BGP hijacking less visible on the control plane while still capable of diverting traffic. We explain the underlying mechanism, define the form of the threat, analyze an real-world incident that exemplifies the issue, and discuss potential countermeasures to mitigate its impact.</t>
    </abstract>
  </front>
  <middle>
    <?line 172?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>BGP hijacking occurs when an Autonomous System (AS), accidentally or maliciously, mis-announces an address prefix it is not authorized to originate. ASes that accept such announcement may divert traffic destined for the prefix to an incorrect AS instead of the actual prefix holder. To mitigate this risk, Route Origin Validation (ROV) <xref target="RFC6811"/> was introduced as part of the Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/>. ROV-enabled ASes validate route announcements using Route Origin Authorizations (ROAs) <xref target="RFC9582"/>, which specify which ASes are permitted to originate specfic prefixes. The best current practice <xref target="RFC7115"/> suggests configuring routing policies to drop or give a very low preference to routes deemed invalid by ROV.</t>
      <t>However, ROV adoption across the Internet is incomplete and expected to remain so for the foreseeable future. In such a state, invalid announcements may still propagate through non-ROV ASes to a certain extent, before being dropped by ROV-enabled ASes. This limited propagation creates a situation where some ASes never receive the invalid routes and are therefore unware of the ongoing incident (e.g., potential BGP hijacking). Yet they are not fully protected either, as the traffic they originate, along the data forwarding path,  may traverse a non-ROV AS that has accepted the invalid route. This non-ROV AS will forward traffic towards the incorrect origin AS. As a result, the traffic originating ASes unknowingly fall victim to BGP hijacking, unless they conduct active measurements (e.g., traceroute) or receive alerts from other network operators who spot the incident. In effect, BGP hijacking becomes stealthier in this case, due to incomplete adoption of ROV across global ASes.</t>
      <t>The objective of this document is to highlight the side effect of incomplete ROV adoption on BGP hijacking, which results in highly stealthy BGP hijacking that is invisible to victims on the control plane. This document defines this form of BGP hijacking, explains its underlying mechanisms, analyzes a real-world incident, and discusses possible detection and mitigation approaches.</t>
      <t>The rest of this document is structured as follows: Section 2 details the side effect of ROV in incomplete adoption. Section 3 defines the resulting stealthy BGP hijacking. Section 4 analyzes a representative real-world incident. Section 5 discusses potential detection and mitigation strategies. Finally, Section 6 concludes the document.</t>
    </section>
    <section anchor="problem">
      <name>Side Effect of Incomplete ROV Adoption</name>
      <t>This section explains how BGP hijacking can still succeed and even become stealthier under incomplete ROV adoption. <xref target="control-plane"/> illustrates the control-plane behavior when a malicious AS initiates a BGP hijacking attempt. In this scenario, AS G (the hijacker) announces a (sub-)prefix legitimately owned by AS E (the target). ROV-enabled ASes B and D filter out the invalid announcement, so only AS C and F may accept the hijacker's route into their routing tables, depending on their routing policies.</t>
      <figure anchor="control-plane">
        <name>BGP hijacking under incomplete ROV adoption</name>
        <artwork><![CDATA[
          <==           <==           <==           <==           
  +------+      +------+      +------+      +------+      +------+
  | AS A |------| AS B |------| AS C |------| AS D |------| AS E |
  +------+      +----ROV      +------+      +----ROV      +-Target
                        <~~       |     ~~>                       
                                  |                               
                                  |                               
                                  |                               
                                  |     <~~         <~~           
    ==>  E's announcement         |         +------+      +------+
    ~~>  G's announcement         +---------| AS F |------| AS G |
                                            +------+      +-Hijker
                                         ==>           ==>        
]]></artwork>
      </figure>
      <t>Consider AS A as an example. AS A only receives a route to the legitimate origin (AS E), since its upstream provider AS B rejects the invalid route. As a result, from AS A's control-plane perspective, the only available route is valid, and one can expect traffic destined for the target to be correctly delivered. However, as shown in <xref target="data-plane"/>, from a global perspective, AS A's traffic is forwarded through AS C, which accpets the hijacker's route. In this case, the traffic is silently redirected to the hijacker.</t>
      <figure anchor="data-plane">
        <name>Discrepancy between control plane and data plane</name>
        <artwork><![CDATA[
   (Route in A's table)                                           
   ---------------------------------------------------------->    
                                                                  
  +------+      +------+      +------+      +------+      +------+
  | AS A |------| AS B |------| AS C |------| AS D |------| AS E |
  +------+      +----ROV      +------+      +----ROV      +-Target
                                  |                               
   --------------------------+    |                               
   (Actual forwarding path)  |    |                               
                             |    |                               
                             |    |                               
                             |    |         +------+      +------+
                             |    +---------| AS F |------| AS G |
                             |              +------+      +-Hijker
                             |                                    
                             +-------------------------------->   
]]></artwork>
      </figure>
      <t>Because AS A lacks a route to the hijacker, it remains unaware of the attack unless it conducts active measurements (e.g., traceroute) or receives external notifications. Its local control-plane protections are ineffective in detecting or responding to the hijack in this case. This highlights an unexpected side effect of incomplete ROV adoption: it prevents certain ASes from observing invalid routes, making ongoing hijacking more difficult to detect. We refer to such BGP hijacking, which compromises traffic forwarding while remaining invisible to affected ASes on the control plane, as stealthy BGP hijacking. An AS is susceptible to stealthy BGP hijacking if:</t>
      <ul spacing="normal">
        <li>
          <t>It has no route to the hijacker due to ROV filtering, and</t>
        </li>
        <li>
          <t>At least one non-ROV AS along the legitimate path accepts the hijacker's route.</t>
        </li>
      </ul>
      <t>This vulnerability applies to both BGP hijacking that targets a prefix and a sub-prefix and reflects a discrepancy between control-plane visibility and data-plane forwarding. The term "stealthy BGP hijacking" is formalized in Section 3.</t>
    </section>
    <section anchor="definition">
      <name>Definition of Stealthy BGP Hijacking</name>
      <t>From a control-plane-only standpoint, this section defines stealthy BGP hijacking under incomplete ROV adoption.</t>
      <section anchor="notation">
        <name>Notation and Terminology</name>
        <t>In this document, we use the following notation to describe BGP routes:</t>
        <t><tt>
p: V ... (M) ... O
</tt></t>
        <t>This notation represents a BGP route to prefix <tt>p</tt> as observed from a vantage point <tt>V</tt>. The sequence of ASes from <tt>V</tt> to the origin <tt>O</tt> may include one or more intermediate ASes <tt>M</tt>.</t>
        <t>The symbols used are defined as:</t>
        <dl>
          <dt><tt>p</tt>:</dt>
          <dd>
            <t>The IP prefix being routed.</t>
          </dd>
          <dt><tt>V</tt>:</dt>
          <dd>
            <t>The vantage point, i.e., the AS from which the route is observed (typically via a BGP route collector).</t>
          </dd>
          <dt><tt>M</tt>:</dt>
          <dd>
            <t>An intermediate AS, representing any AS that appears on the path from <tt>V</tt> to the origin <tt>O</tt>. There may be multiple such ASes, or may be none.</t>
          </dd>
          <dt><tt>O</tt>:</dt>
          <dd>
            <t>The origin AS, which originates the route and claims to originate the prefix <tt>p</tt>.</t>
          </dd>
        </dl>
        <t>We also define the following terminology for clarity in later discussions:</t>
        <dl>
          <dt>Conflict:</dt>
          <dd>
            <t>Two routes are said to be in conflict if they refer to the same prefix or to overlapping prefixes (e.g., one is a more specific sub-prefix of the other), but their origin ASes differ. This indicates a potential inconsistency in prefix ownership or announcement.</t>
          </dd>
          <dt>RPKI-invalid:</dt>
          <dd>
            <t>A route is considered RPKI-invalid if its prefix matches an ROA, but the origin AS does not match the AS specified, or the prefix exceeds the max length specified allowable for origination. This typically signals an unauthorized or misconfigured route announcement, which may lead to BGP hijacking.</t>
          </dd>
          <dt>RPKI-valid:</dt>
          <dd>
            <t>A route is considered RPKI-valid if its origin AS matches an ROA for the prefix under RPKI, and the route is not RPKI-invalid.</t>
          </dd>
          <dt>Risk-critical:</dt>
          <dd>
            <t>An AS is said to be risk-critical if it chooses to forward traffic towards an invalid route to the hijacker, while it also has route to the legitimate origin in its routing table.</t>
          </dd>
          <dt>Stealthy BGP Hijacking:</dt>
          <dd>
            <t>A stealthy BGP hijacking is a form of BGP hijacking in which a victim AS does not observe any conflicting or RPKI-invalid routes in its control plane due to ROV filtering, while its traffic is still diverted at the data plane via ASes that accept the invalid route. The defining characteristic is the discrepancy between control-plane visibility and data-plane forwarding, rather than additional damage beyond traffic diversion.</t>
          </dd>
        </dl>
      </section>
      <section anchor="stealthy-bgp-hijacking">
        <name>Stealthy BGP Hijacking Definition</name>
        <t>Based on the intuitive description in Section 3.1, we define stealthy BGP hijacking from a control-plane perspective as follows:</t>
        <t>Given a pair of observed routes:</t>
        <t><tt>
p1: V1 ... (M1) ... O1
p2: V2 ... (M2) ... O2
</tt></t>
        <t>A stealthy BGP hijacking is said to occur when the following conditions hold:</t>
        <ol spacing="normal" type="1"><li>
            <t>The two routes conflict, i.e., <tt>p2</tt> is equal to or a more specific sub-prefix of <tt>p1</tt>, and <tt>O2</tt> does not equal to <tt>O1</tt>.</t>
          </li>
          <li>
            <t>Their authorization states disagree, i.e., the prefix-origin <tt>p2-O2</tt> is RPKI-invalid, while <tt>p1-O1</tt> is RPKI-valid.</t>
          </li>
          <li>
            <t>The invalid route is invisible to the victim, i.e., vantage point <tt>V1</tt> has no observable route to prefix <tt>p2</tt> that is originated by <tt>O2</tt>.</t>
          </li>
          <li>
            <t>A risk-critical AS redirects traffic to the hijacker, i.e., there exists <tt>M1</tt> such that <tt>M1</tt> equals <tt>V2</tt>.</t>
          </li>
        </ol>
        <t>Under these conditions, <tt>O2</tt> is a potential hijacker that announces the prefix <tt>p2</tt>, which is owned by <tt>O1</tt>. The invalid route does not propagate to vantage point <tt>V1</tt>. As a result, <tt>V1</tt> observes only the legitimate route to <tt>p1</tt> and remains unaware of the conflicting route to <tt>p2</tt> originated by <tt>O1</tt>. However, due to the presence of a risk-critical AS <tt>M1</tt>, which appears in the legitimate path and also has a route to <tt>p2</tt>, traffic destined for <tt>p2</tt> is silently diverted to the hijacker.</t>
      </section>
    </section>
    <section anchor="example">
      <name>Real-World Incident Example</name>
      <t>This section presents an real-world incident consistent with the definition of stealthy BGP hijacking in <xref target="stealthy-bgp-hijacking"/>. The incident was last observed on April 24, 2025. As illustrated in <xref target="incident"/>, both AS37100 (SEACOM) and AS6762 (TISparkle) observe the prefix 203.127.0.0/16 announced by its legitimate origin, AS3758 (SingNet). Meanwhile, the sub-prefix 203.127.225.0/24 is announced by an unauthorized origin, AS17894 (Innove Communications). The two origins are located in different countries and have no link between them ever observed during the most recent month. According to the APNIC's ROV filtering measurement <xref target="APNIC"/>, AS37100 adopts ROV with a 100% filtering rate. Therefore, it discards the RPKI-invalid /24 route. However, traffic from AS37100 (or its downstream customers) to the /24 prefix is still hijacked when it transits through non-ROV AS6762, which accepts the /24 route.</t>
      <figure anchor="incident">
        <name>A real-world stealthy BGP hijacking incident</name>
        <artwork><![CDATA[
  Route to 203.127.0.0/16                                           
@------------------@------------------------------------------>     
                                                                    
+---------+        +---------+        +---------+        +---------+
| AS37100 |--------| AS6762  |--------| AS7473  |--------| AS3758  |
| SEACOM  |        |TISparkle|        | SingTel |        | SingNet |
+---------+        +---------+        +---------+        +---------+
ROV-enabled        @    |                                           
                   |    |                                           
                   |    | +----------+   +---------+   +-----------+
                   |    +-| AS15412  |---| AS4775  |---|  AS17894  |
@: vantage point   |      | FLAG Tel |   |Globe Tel|   |Innove Comm|
                   |      +----------+   +---------+   +-----------+
                   |                                                
                   +------------------------------------------>     
                    Route to 203.127.225.0/24                       
]]></artwork>
      </figure>
      <t>An examination using AS37100's looking glass "lg-01-ams.nl" <xref target="SEACOM"/> corroborates the hijack. The command "show ip bgp 203.127.0.0/16" shows a valid route via the path 37100 6762 6461 7473 3758. Meanwhile, "show ip bgp 203.127.225.0/24" returns no matching routes, confirming that AS37100 does not have visibility of the route from the unauthorized origin AS17894. However, a traceroute from AS37100 to an address within 203.127.225.0/24 shows that the final hops traverse AS17894, indicating that traffic is indeed diverted to the illegitimate origin, demonstrating a successful hijack at the data plane, even though control-plane filtering is in place.</t>
      <t>We emphasize that the incident, while in the form of stealthy BGP hijacking, is likely caused by benign misconfigurations, given that AS17894 and AS3758 have business connections through their parent companies <xref target="SingTel"/> <xref target="GlobeTel"/>, We reported the incident to AS4775 (Globe Telecoms) on February 10, 2025, and received confirmationa that it would investigate. The original looking glass output is provided in <xref target="looking-glass-output"/>.</t>
    </section>
    <section anchor="measure">
      <name>Detection and Mitigation</name>
      <t>The definition of stealthy BGP hijacking naturally enables a practical detection method based on inconsistencies across routing tables. By comparing routing data from multiple vantage points, one can identify route pairs that satisfy the conditions outlined in <xref target="stealthy-bgp-hijacking"/>, and thereby enable timely alert of ongoing incidents. The routing data can be collected from self-operated ASes or public platforms, such as RouteViews <xref target="RouteViews"/> and RIPE RIS <xref target="RIPE_RIS"/>. The incident discussed in <xref target="incident"/> was discovered using this approach. In fact, an existing public monitoring service already applies this method to track stealthy BGP hijacking events in real time <xref target="Chen"/>.</t>
      <t>We emphasize that increasing ROV adoption across global ASes remains essential for improving BGP security. As the adoption rate increases, the feasibility and impact of stealthy BGP hijacking are expected to diminish significantly.</t>
      <t>Meanwhile, immediate countermeasures are available. One such approach is ROV++ <xref target="Morillo"/>, which extends the standard ROV with proactive rerouting and blackholing capabilities. In this proposal, when an AS enforcing ROV++ detects an RPKI-invalid route, it not only drops the invalid route but also initiates a route selection process that tries to find an alternative route that does not contain any ASes appearing on the invalid path, thus avoiding any risk-critical ASes. If no such alternative route exists, the AS blackholes the corresponding prefix, as operators arguably prefer controlled blackholing over potential hijacking by malicious actors.</t>
      <t>Similarly, Cisco's patent <xref target="Cisco"/> describes a poison-path routing policy that can mitigate stealth BGP hijacking. In this proposal, when a BGP router detects a route to a hijacked prefix, it searches for alternative routes that cover the hijacked prefix but share no ASes with the hijacked route. The router then selects such an alternative route, avoiding ASes that might divert traffic. While conceptually similar to ROV++'s rerouting mechanism, this poison-path policy is applicable to any AS, not limited to ROV adopters.</t>
      <t>While the aforementioned proactive mitigations are available, they tend to be overly aggressive as they nondeterministically overwrite normal routing policies at runtime. Considering the cause of stealthy BGP hijacking, the lack of transparency into dropped routes is what makes such hijacking subtle and less visible. As such, it is important to note that dropped routes often carry valuable signals of abnormal events in the global routing system, yet these signals are simply dropped along with the routes. Therefore, improving transparency of dropped routes presents another viable approach to mitigate not only stealthy BGP hijacking but also more general routing anomalies. For example, an information-sharing platform, such as a dedicated mailing list where ROV adopters can publish digests of dropped routes, could help potential victims identify risk-critical ASes and determine response actions on their own. We anticipate drafts on such a scheme in the future.</t>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>This document formalizes stealthy BGP hijacking, a threat enabled by incomplete ROV adoption that evades control-plane detection while still diverting traffic. We define its conditions, present a real-world case, and demonstrate how it can be detected via routing table comparisons across vantage points. While broader ROV adoption remains essential, mechanisms like ROV++ offer practical mitigation by enabling coordination among ROV-enabled ASes. Addressing this risk is critical for improving the security of interdomain routing.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The stealthy BGP hijacking behavior described in this document can be actively exploited by malicious ASes to divert traffic with less likelihood of being detected. While the success of such attacks depends on factors like accurate knowledge of ROV deployment, their impact can be significant, particularly in scenarios involving non-ROV transit. Detection and mitigation strategies are discussed in <xref target="measure"/>. Network operators are advised to adopt ROV where possible, explore collaborative defenses such as ROV++, and monitor both control- and data-plane behavior to identify and respond to suspicious routing activity.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC9582">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC7115">
          <front>
            <title>Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>Deployment of BGP origin validation that is based on the Resource Public Key Infrastructure (RPKI) has many operational considerations. This document attempts to collect and present those that are most critical. It is expected to evolve as RPKI-based origin validation continues to be deployed and the dynamics are better understood.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="185"/>
          <seriesInfo name="RFC" value="7115"/>
          <seriesInfo name="DOI" value="10.17487/RFC7115"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="APNIC" target="https://stats.labs.apnic.net/rpki">
          <front>
            <title>Measuring ROAs and ROV.</title>
            <author initials="G." surname="Huston" fullname="Geoff Huston">
              <organization>APNIC</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="SingTel" target="https://en.wikipedia.org/wiki/Singtel">
          <front>
            <title>Wikipedia - SingTel.</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="GlobeTel" target="https://en.wikipedia.org/wiki/Globe_Telecom">
          <front>
            <title>Wikipedia - Globe Telecom.</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="SEACOM" target="https://lg.seacomnet.com">
          <front>
            <title>Looking Glass lg-01-ams.nl.</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="RouteViews" target="http://routeviews.org/">
          <front>
            <title>MRT format RIBs and UPDATEs.</title>
            <author>
              <organization>University of Oregon Route Views Project</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="RIPE_RIS" target="https://ris.ripe.net/docs/">
          <front>
            <title>Routing Information Service (RIS).</title>
            <author>
              <organization>RIPE NCC</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="Morillo">
          <front>
            <title>ROV++: Improved Deployable Defense against BGP Hijacking.</title>
            <author initials="R." surname="Morillo" fullname="Reynaldo Morillo">
              <organization>University of Connecticut</organization>
            </author>
            <author initials="J." surname="Furuness" fullname="Justin Furuness">
              <organization>University of Connecticut</organization>
            </author>
            <author initials="C." surname="Morris" fullname="Cameron Morris">
              <organization>University of Connecticut</organization>
            </author>
            <author initials="J." surname="Breslin" fullname="James Breslin">
              <organization>University of Connecticut</organization>
            </author>
            <author initials="A." surname="Herzberg" fullname="Amir Herzberg">
              <organization>University of Connecticut</organization>
            </author>
            <author initials="B." surname="Wang" fullname="Bing Wang">
              <organization>University of Connecticut</organization>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="DOI" value="10.14722/ndss.2021.24438"/>
        </reference>
        <reference anchor="Chen" target="https://yhchen.cn/stealthy-bgp-hijacking/">
          <front>
            <title>Stealthy BGP Hijakcing Incidents.</title>
            <author initials="Y." surname="Chen" fullname="Yihao Chen">
              <organization>Tsinghua University</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="Cisco" target="https://patents.justia.com/patent/10015081">
          <front>
            <title>Poison-path routing policy.</title>
            <author initials="J." surname="Heitz" fullname="Jakob Heitz">
              <organization>Cisco Technology, Inc.</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 364?>

<section anchor="looking-glass-output">
      <name>Looking Glass Output</name>
      <t>All commands were executed on "lg-01-ams.nl" <xref target="SEACOM"/> on February 10, 2025.</t>
      <t><xref target="output-1"/> shows the output for executing "show ip bgp 203.127.0.0/16".</t>
      <t><xref target="output-2"/> shows the output for executing "show ip bgp 203.127.225.0/24".</t>
      <t><xref target="output-3"/> shows the output for executing "traceroute ip 203.127.225.1".</t>
      <figure anchor="output-1">
        <name>Output for "show ip bgp 203.127.0.0/16"</name>
        <artwork><![CDATA[
#################################################################
BGP routing table entry for 203.127.0.0/16, version 3804070796
Paths: (2 available, best #2, table default)
  Not advertised to any peer
  Refresh Epoch 1
  37100 6762 6461 7473 3758
    105.26.64.17 from 105.26.64.17 (105.16.0.131)
      Origin IGP, metric 0, localpref 100, valid, external
      Commnuity: 37100:1 37100:13
      path 108E73DC RPKI State valid
      rx pathid: 0, tx pathid: 0
  Refresh Epoch 1
  37100 6762 6461 7473 3758
    105.26.64.1 from 105.26.64.1 (105.16.0.131)
      Origin IGP, metric 0, localpref 100, valid, external, best
      Commnuity: 37100:1 37100:13
      path 0AB3654C RPKI State valid
      rx pathid: 0, tx pathid: 0x0
#################################################################
]]></artwork>
      </figure>
      <figure anchor="output-2">
        <name>Output for "show ip bgp 203.127.225.0/24"</name>
        <artwork><![CDATA[
#################################################################
% Network not in table
#################################################################
]]></artwork>
      </figure>
      <figure anchor="output-3">
        <name>Output for "traceroute ip 203.127.225.1"</name>
        <artwork><![CDATA[
#################################################################
Tracing the route to 203.127.225.1
VRF info: (vrf in name/id, vrf out name/id)
  1 ae-2-21.er-01-ams.nl.seacomnet.com (105.26.64.1) [AS 37100]
      0 msec 200 msec 0 msec
  2 ce-0-0-11.er-02-mrs.fr.seacomnet.com (105.16.8.209) [AS 37100]
      [MPLS: Label 2242 Exp 0] 200 msec
    ce-0-0-11.cr-01-mrs.fr.seacomnet.com (105.16.8.201) [AS 37100]
      [MPLS: Label 4474 Exp 0] 204 msec
    ce-0-0-11.cr-02-mrs.fr.seacomnet.com (105.16.8.209) [AS 37100]
      [MPLS: Label 2242 Exp 0] 20 msec
  3 ce-0-0-1.br-02-mrs.fr.seacomnet.com (105.16.33.253) [AS 37100]
      20 msec
    ce-0-0-2.br-02-mrs.fr.seacomnet.com (105.16.32.253) [AS 37100]
      24 msec
    ce-0-0-1.br-02-mrs.fr.seacomnet.com (105.16.33.253) [AS 37100]
      20 msec
  4 213.144.184.130 [AS 6762] 24 msec 20 msec 24 msec
  5 213.144.170.125 [AS 6762] 40 msec 44 msec 40 msec
  6 ae10.0.cjr01.mrs005.flagtel.com (62.216.131.154) [AS 15412]
      [MPLS: Label 7391 Exp 0] 172 msec 172 msec 168 msec
  7 ae1.0.cjr02.sin001.flagtel.com (62.216.129.181) [AS 15412]
      [MPLS: Label 3621 Exp 0] 168 msec 156 msec 156 msec
  8 ae18.0.cjr01.sin001.flagtel.com (62.216.137.165) [AS 15412]
      160 msec 160 msec 172 msec
  9 80.81.75.186 [AS 15412] 164 msec 164 msec 160 msec
 10 112.198.1.185 [AS 4775] 204 msec 216 msec 204 msec
 11  *  *  *
 12 120.28.4.38 [AS 4775] 220 msec 220 msec 216 msec
 13 202.126.45.138 [AS 17894] 224 msec
    202.126.45.134 [AS 17894] 220 msec 232 msec
 14 202.126.45.180 [AS 17894] 208 msec 216 msec 224 msec
 15  *  *  *
 16  *  *  *
#################################################################
]]></artwork>
      </figure>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
