<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-haas-idr-path-attribute-filtering-02" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Path Attribute Filtering">BGP-4 Path Attribute Filtering Capability</title>

    <author initials="J." surname="Haas" fullname="Jeffrey Haas">
      <organization>HPE</organization>
      <address>
        <postal>
          <street>1133 Innovation Way</street>
          <city>Sunnyvale</city>
          <region>CA</region>
          <code>94089</code>
          <country>United States of America</country>
        </postal>
        <email>jhaas@juniper.net</email>
      </address>
    </author>
    <author initials="J." surname="Scudder" fullname="John Scudder">
      <organization>HPE</organization>
      <address>
        <postal>
          <street>1133 Innovation Way</street>
          <city>Sunnyvale</city>
          <region>CA</region>
          <code>94089</code>
          <country>United States of America</country>
        </postal>
        <email>jgs@juniper.net</email>
      </address>
    </author>

    <date year="2025" month="August" day="20"/>

    <area>RTG</area>
    <workgroup>idr</workgroup>
    

    <abstract>


<?line 51?>

<t>Path Attributes in the BGP-4 protocol (RFC 4271) carry data
   associated with BGP routes.  Many of the Path Attributes carried in
   BGP are intended for limited scope deployment.  However, the
   extension mechanism defined by BGP that carries these attributes
   often carries them farther than necessary, sometimes with unfortunate
   results.</t>

<t>This document defines a mechanism using BGP Capabilities (RFC 5492)
   that permits eBGP speakers to determine what Path Attributes should
   be permitted to cross external BGP routing boundaries.</t>



    </abstract>



  </front>

  <middle>


<?line 64?>

<section anchor="intro"><name>Introduction</name>

<t>A BGP Route (Section 1.1 of <xref target="RFC4271"/>) is a tuple consisting of a set
   of Path Attributes (Section 5 of <xref target="RFC4271"/>) and sets of network
   reachability carried as Network Layer Reachability Information
   (NLRI).  Some of these Path Attributes are defined as part of the
   core BGP-4 protocol.  Path Attributes are the main extension
   mechanism defined by BGP, and may be scoped as "transitive" or "non-
   transitive."</t>

<t>Non-Transitive Path Attributes require the BGP speaker to understand
   the attribute in order to determine if it will be locally used and
   perhaps later propagated to additional BGP speakers.  Unrecognized
   non-transitive Path Attributes are discarded by the receiving BGP
   speaker.</t>

<t>Transitive Path Attributes, when not understood by the receiving BGP
   speaker, are required to be propagated to other BGP speakers.</t>

<t>Some Path Attributes defined by BGP extensions are intended to be
   used in limited scopes, such as a single BGP Autonomous System (AS).
   When such attributes are distributed beyond the expected scope, this
   is called an "Attribute Escape" <xref target="I-D.haas-idr-bgp-attribute-escape"/>.</t>

<t>Such attribute escapes may lead to improper BGP protocol behavior
   when received outside of their expected scope, and may lead to
   incorrect forwarding, or be a serious security consideration.</t>

<t>This document defines a mechanism exchanged through BGP Capabilities
   <xref target="RFC5492"/> where BGP speakers can more appropriately scope both Path
   Attributes to prevent escape, and to limit the distribution of routes
   that carry escaped Path Attributes.</t>

<section anchor="req-lang"><name>Specification of Requirements</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="capability"><name>BGP Path Attribute Filtering Capability</name>

<t>The BGP Path Attribute Filtering Capability is encoded as follows:</t>

<t><list style="symbols">
  <t>Capability Code of (TBD).</t>
  <t>Capability Length of 0..32 octets.</t>
  <t>Capability Value contains a bit-string padded to an octet boundary where
a bit is set if this BGP speaker considers the corresponding BGP Path
Attribute from the remote BGP speaker to be unwanted.  Bit number 0 is
the most significant bit of the first octet, bit number 1 is the second
most significant bit of the first octet, and so on.</t>
</list></t>

<figure title="Example encoding for Capability Value" anchor="encoding"><artset><artwork  type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="400" width="464" viewBox="0 0 464 400" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
<path d="M 8,64 L 8,96" fill="none" stroke="black"/>
<path d="M 24,64 L 24,96" fill="none" stroke="black"/>
<path d="M 40,64 L 40,96" fill="none" stroke="black"/>
<path d="M 56,64 L 56,96" fill="none" stroke="black"/>
<path d="M 72,64 L 72,96" fill="none" stroke="black"/>
<path d="M 88,64 L 88,96" fill="none" stroke="black"/>
<path d="M 104,64 L 104,96" fill="none" stroke="black"/>
<path d="M 112,160 L 112,168" fill="none" stroke="black"/>
<path d="M 120,64 L 120,96" fill="none" stroke="black"/>
<path d="M 120,176 L 120,184" fill="none" stroke="black"/>
<path d="M 136,64 L 136,96" fill="none" stroke="black"/>
<path d="M 144,240 L 144,248" fill="none" stroke="black"/>
<path d="M 152,64 L 152,96" fill="none" stroke="black"/>
<path d="M 168,64 L 168,96" fill="none" stroke="black"/>
<path d="M 184,64 L 184,96" fill="none" stroke="black"/>
<path d="M 200,64 L 200,96" fill="none" stroke="black"/>
<path d="M 216,64 L 216,96" fill="none" stroke="black"/>
<path d="M 232,64 L 232,96" fill="none" stroke="black"/>
<path d="M 248,64 L 248,96" fill="none" stroke="black"/>
<path d="M 264,64 L 264,96" fill="none" stroke="black"/>
<path d="M 280,64 L 280,96" fill="none" stroke="black"/>
<path d="M 296,64 L 296,96" fill="none" stroke="black"/>
<path d="M 312,64 L 312,96" fill="none" stroke="black"/>
<path d="M 328,64 L 328,96" fill="none" stroke="black"/>
<path d="M 344,64 L 344,96" fill="none" stroke="black"/>
<path d="M 360,64 L 360,96" fill="none" stroke="black"/>
<path d="M 376,64 L 376,96" fill="none" stroke="black"/>
<path d="M 392,64 L 392,96" fill="none" stroke="black"/>
<path d="M 8,64 L 392,64" fill="none" stroke="black"/>
<path d="M 8,96 L 392,96" fill="none" stroke="black"/>
<g class="text">
<text x="16" y="36">0</text>
<text x="176" y="36">1</text>
<text x="336" y="36">2</text>
<text x="16" y="52">0</text>
<text x="32" y="52">1</text>
<text x="48" y="52">2</text>
<text x="64" y="52">3</text>
<text x="80" y="52">4</text>
<text x="96" y="52">5</text>
<text x="112" y="52">6</text>
<text x="128" y="52">7</text>
<text x="144" y="52">8</text>
<text x="160" y="52">9</text>
<text x="176" y="52">0</text>
<text x="192" y="52">1</text>
<text x="208" y="52">2</text>
<text x="224" y="52">3</text>
<text x="240" y="52">4</text>
<text x="256" y="52">5</text>
<text x="272" y="52">6</text>
<text x="288" y="52">7</text>
<text x="304" y="52">8</text>
<text x="320" y="52">9</text>
<text x="336" y="52">0</text>
<text x="352" y="52">1</text>
<text x="368" y="52">2</text>
<text x="384" y="52">3</text>
<text x="16" y="84">1</text>
<text x="32" y="84">0</text>
<text x="48" y="84">0</text>
<text x="64" y="84">0</text>
<text x="80" y="84">0</text>
<text x="96" y="84">1</text>
<text x="112" y="84">0</text>
<text x="128" y="84">0</text>
<text x="144" y="84">0</text>
<text x="160" y="84">1</text>
<text x="176" y="84">1</text>
<text x="192" y="84">1</text>
<text x="208" y="84">1</text>
<text x="224" y="84">1</text>
<text x="240" y="84">0</text>
<text x="256" y="84">0</text>
<text x="272" y="84">1</text>
<text x="288" y="84">0</text>
<text x="304" y="84">0</text>
<text x="320" y="84">1</text>
<text x="336" y="84">1</text>
<text x="352" y="84">1</text>
<text x="368" y="84">1</text>
<text x="384" y="84">1</text>
<text x="20" y="132">In</text>
<text x="52" y="132">this</text>
<text x="108" y="132">example,</text>
<text x="164" y="132">bits</text>
<text x="200" y="132">are</text>
<text x="240" y="132">clear</text>
<text x="280" y="132">for</text>
<text x="316" y="132">Path</text>
<text x="384" y="132">Attributes:</text>
<text x="52" y="164">Origin</text>
<text x="96" y="164">(1)</text>
<text x="56" y="180">AS_PATH</text>
<text x="104" y="180">(2)</text>
<text x="60" y="196">NEXT_HOP</text>
<text x="116" y="196">(3),</text>
<text x="92" y="212">MULTI_EXIT_DISCR</text>
<text x="180" y="212">(4),</text>
<text x="92" y="228">ATOMIC_AGGREGATE</text>
<text x="180" y="228">(6),</text>
<text x="68" y="244">AGGREGATOR</text>
<text x="128" y="244">(7)</text>
<text x="72" y="260">COMMUNITIES</text>
<text x="140" y="260">(8),</text>
<text x="80" y="276">MP_REACH_NLRI</text>
<text x="160" y="276">(14),</text>
<text x="88" y="292">MP_UNREACH_NLRI</text>
<text x="176" y="292">(15),</text>
<text x="60" y="308">AS4_PATH</text>
<text x="120" y="308">(17),</text>
<text x="84" y="324">AS4_AGGREGATOR</text>
<text x="168" y="324">(18).</text>
<text x="32" y="356">Other</text>
<text x="76" y="356">path</text>
<text x="140" y="356">attributes</text>
<text x="216" y="356">through</text>
<text x="288" y="356">attribute</text>
<text x="340" y="356">23</text>
<text x="368" y="356">are</text>
<text x="424" y="356">unwanted.</text>
<text x="28" y="372">Path</text>
<text x="92" y="372">attributes</text>
<text x="148" y="372">24</text>
<text x="176" y="372">and</text>
<text x="220" y="372">beyond</text>
<text x="264" y="372">are</text>
<text x="320" y="372">accepted.</text>
</g>
</svg>
</artwork><artwork  type="ascii-art"><![CDATA[
    0                   1                   2
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |1|0|0|0|0|1|0|0|0|1|1|1|1|1|0|0|1|0|0|1|1|1|1|1|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

    In this example, bits are clear for Path Attributes:

      Origin (1),
      AS_PATH (2),
      NEXT_HOP (3),
      MULTI_EXIT_DISCR (4),
      ATOMIC_AGGREGATE (6),
      AGGREGATOR (7),
      COMMUNITIES (8),
      MP_REACH_NLRI (14),
      MP_UNREACH_NLRI (15),
      AS4_PATH (17),
      AS4_AGGREGATOR (18).
      
    Other path attributes through attribute 23 are unwanted.
    Path attributes 24 and beyond are accepted.
]]></artwork></artset></figure>

<t>Bits 1, 2, 3, 6, 7, 14, 15, 17, 18 <bcp14>MUST</bcp14> be clear (value 0), because support for
   <xref target="RFC4271"/>, <xref target="RFC4760"/>, and <xref target="RFC6793"/> procedures are required when this
   specification is in use.</t>

<t>Any bit not explicitly represented (e.g., bits 24 and beyond in the above
   example) is deemed to be clear (value 0). That is, the default is to accept
   any path attribute not explicitly unwanted.</t>

</section>
<section anchor="operation"><name>Operation</name>

<t>A clear (value 0) bit in the Path Attribute Filtering capability
   indicates that the BGP speaker advertising it is willing to accept
   the corresponding Path Attribute and will process it according to
   the normal rules of the BGP protocol and the attribute in question.</t>

<t>A set (value 1) bit in the Path Attribute Filtering capability
   indicates that the BGP speaker advertising it is not willing to 
   accept the corresponding Path Attribute. We refer to such Path
   Attributes as "unwanted Path Attributes".</t>

<t>A BGP speaker <bcp14>MUST NOT</bcp14> send an unwanted Path Attribute to its peer.
   (Of course, this expectation will be met only by BGP speakers that
   support this specification; therefore a BGP speaker that implements
   this specification <bcp14>SHOULD</bcp14> be prepared for the possibility it will
   receive unwanted Path Attributes; this is discussed below.)</t>

<t>One strategy to accomplish the above requirement is for the BGP
   speaker to not advertise BGP routes containing the unwanted Path
   Attribute in question.  This might require a withdraw to be sent
   instead.  This is similar to treat-as-withdraw as defined in
   <xref target="RFC7606"/>.</t>

<t>Another strategy that could be used, when appropriate for the
   procedure covering a given BGP Path Attribute, is for the BGP speaker
   to remove the unwanted Path Attributes when it distributes the
   route to the remote BGP speaker.  This is similar to the Attribute
   Discard behavior defined in <xref target="RFC7606"/>.</t>

<t>Receiving BGP speakers <bcp14>SHOULD</bcp14> filter routes or discard unwanted Path
   Attributes if they are incorrectly sent by the remote BGP speaker.
   Minimally, a receiving BGP speaker receiving an unwanted Path
   Attribute <bcp14>SHOULD</bcp14> use treat-as-withdraw procedures. Receiving BGP
   speakers <bcp14>MAY</bcp14> accept the route and discard the unwanted Path Attribute
   if permitted to by local configuration.</t>

</section>
<section anchor="selecting-supported-path-attributes"><name>Selecting supported Path Attributes</name>

<t>Implementations <bcp14>MUST</bcp14>, as described in <xref target="encoding"/>, clear the 
   bits covering required core eBGP Path Attributes.</t>

<t>Common BGP features that are defined for Internet use <bcp14>SHOULD</bcp14> be
   clear by default between two BGP speakers.  These include:</t>

<t><list style="symbols">
  <t>Communities (8)</t>
  <t>Extended Communities (16)</t>
  <t>Large BGP Communities (32)</t>
  <t>BGPsec_Path (33)</t>
  <t>Only To Customer (OTC) (35)</t>
</list></t>

<t>BGP features required to support a given AFI/SAFI <bcp14>MUST</bcp14> also be
   clear when that address family is configured.  An example of this
   is the BGP-LS attribute (29) when the BGP-LS feature is in use.</t>

<!-- Should we say anything about what to do if a contradiction occurs, for example if the BGP-LS afi/safi is advertised by a peer that also advertises attribute 29 as unwanted? -->

</section>
<section anchor="error-handling"><name>Error Handling</name>

<t>If the received Capability Length for the Path Attributes Filtering
   Capability is greater than 32, the filtering capability <bcp14>MUST</bcp14> be ignored and
   treated as if not received by the BGP speaker.</t>

<t>To support core BGP features, <xref target="capability"/> requires that bits 1, 2, 3, 6,
   7, 14, 15, 17, 18 be clear (value 0). A BGP speaker receiving a Path
   Attribute Filtering Capability with these bits set (value 1) <bcp14>MAY</bcp14> reject the
   BGP session. If it does so, it uses a NOTIFICATION message with an error
   subcode of "Unsupported Capability".</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<section anchor="impacts-on-path-attribute-transitivity"><name>Impacts on Path Attribute Transitivity</name>

<t>The feature described in this document does not change the semantics of when
   a Path Attribute is intended to be transitive per RFC-4271 definition.
   However, it does act as a policy to limit the distribution of routes
   containing a transitive Path Attribute, or may cause that attribute to be
   filtered.</t>

</section>
<section anchor="impacts-on-incremental-deployment-of-new-features"><name>Impacts on Incremental Deployment of New Features</name>

<t>eBGP speakers using this features must be cognizant of the impact their
   filtering policies will have on the incremental deployment of new BGP
   features.</t>

</section>
<section anchor="considerations"><name>Path Attribute Content Filtering Considerations</name>

<t>Path Attributes originally defined for use solely for one AFI/SAFI may later
   be updated to be applicable for other AFI/SAFIs, including those used by the
   Internet.  Similarly, some Path Attribute features may be internally
   extensible in a way where filtering choices may be difficult to characterize
   using the coarse filtering feature defined by this document.</t>

<t>Documents defining new BGP Path Attributes <bcp14>MUST</bcp14> discuss their filtering,
   transitivity, and attribute escape considerations, and adopt strategies
   to limit unintentional escape of Path Attributes, or scoped sub-features
   of a Path Attribute. At a minimum, the new attribute's registration must
   provide values for the "Should Filter By Default" and "Filtering
   Profile" columns (see <xref target="iana"/>). This is, however, a minimum. If the
   attribute has needs more nuanced propagation control than the 
   all-or-nothing (per attribute type code) behavior offered by the present 
   specification, it must be specified and handled on a case-by-case basis.</t>

</section>
<section anchor="operational-visibility"><name>Operational Visibility</name>

<t>eBGP speakers that do not propagate a route on transmit or do not accept a
   route on reception due to unwanted Path Attributes <bcp14>SHOULD</bcp14> provide
   operationally visible feedback for this filtering behavior.  Using
   terminology consistent with BMP (<xref target="RFC7854"/>, et seq.) or the BGP YANG model
   (<xref target="I-D.ietf-idr-bgp-model"/>), routes that are not sent may have visibility in the
   Pre-Policy Adj-Ribs-Out view, but not be available in the Post-Policy
   Adj-Ribs-Out view.  Updates to BMP or BGP YANG may provide operational
   visibility to this filtering.  eBGP speakers that do not discard received
   routes with unwanted Path Attributes may be able to provide similar
   visibility in the Pre- and Post-Policy Adj-Ribs-In views.</t>

<t>Since utilizing treat-as-withdraw for routes received with unwanted Path
   Attributes is a likely implementation choice, implementations <bcp14>SHOULD</bcp14> provide
   operational visibility when treat-as-withdraw is done, via logging or
   aggregate statistics, on a per-BGP neighbor basis.  Such logging or aggregate
   statistics should include the unwanted Path Attribute codes that cause
   routes to be discarded.</t>

<t>For some unwanted Path Attributes, an implementation may choose to use
   attribute discard for the unwanted Path Attributes rather than using
   treat-as-withdraw for the entire route.  Implementations <bcp14>SHOULD</bcp14> provide
   operational visibility when attribute discard is done, via logging or
   aggregate statistics, on a per-BGP neighbor basis.  Such logging or aggregate
   statistics should include the Path Attribute codes that are discarded.</t>

<t>Future extensions to BMP or BGP YANG may be proposed to support these
   operational considerations.</t>

</section>
</section>
<section anchor="iana"><name>IANA Considerations</name>

<t>This document requests a new BGP Capability Code to be allocated from
   the First Come First Served range of the Capability Codes registry. The
   description should be "Path Attribute Filtering", and the reference
   should be this document.</t>

<t>This document requests that the "BGP Path Attributes" registry be
   updated to add two new columns, called "Should Filter By Default" and
   "Filtering Profile". These columns are to be seeded with the values
   shown in <xref target="recommendations"/>. This document should be added as a
   reference for the registry. Authors seeking guidance for how to populate
   these columns should refer to <xref target="considerations"/> and <xref target="filtering_reccs"/>.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The motivation for this feature is to attempt to address the numerous
   BGP security implications where BGP Path Attributes propagate beyond
   their intended scope.</t>

<t>The definition of a feature that limits the distribution of BGP Path
   Attributes unfortunately moves BGP's default behavior away from
   "distribute unknown things easily" and thus hampers incremental
   deployment of new features.  However, operators have already begun
   indiscriminate filtering of Path Attributes they do not themselves
   require.  This feature attempts to provide a more flexible negotiated
   mode to permit such filtering while at the same time not completely
   precluding incremental deployment of new features.</t>

</section>
<section anchor="profiles"><name>Recommendations for Future BGP Extensions</name>

<t>When a new BGP extension defines a new BGP Path Attribute, the specifying
document <bcp14>MUST</bcp14> define its expected filtering profile for routes containing the
new Path Attribute.  The following are suggested propagation policies for new
features:</t>

<t><list style="symbols">
  <t>Default deny: Without explicit configuration from the sending BGP speaker and
the receiving BGP speaker, routes containing the new Path Attribute are
considered unwanted.  Implementations supporting the Path Attribute Filtering
Capability <bcp14>SHOULD</bcp14> set the bit for this Path Attribute to 1 (unwanted) by
default.  The sending BGP speaker <bcp14>MUST NOT</bcp14> advertise routes containing such a
Path Attribute to the remote BGP speaker.  BGP speakers receiving routes
containing the unwanted Path Attribute <bcp14>SHOULD NOT</bcp14> accept the route into its
Adj-Rib-In for that peer (treat-as-withdraw).</t>
  <t>Default discard: Without explicit configuration from the sending BGP
speaker and the receiving BGP speaker, routes containing the new Path
Attribute are considered unwanted.  Implementations supporting the Path
Attribute Filtering Capability <bcp14>SHOULD</bcp14> set the bit of this Path Attribute to 1
(unwanted) by default.  <vspace blankLines='1'/>
The sending BGP speaker <bcp14>MUST</bcp14> use one of the following two options to avoid
sending the unwanted Path Attribute: it can either send the route to the
remote speaker after discarding the offending Path Attribute (attribute
discard) or it can avoid sending the route to such a peer.  <vspace blankLines='1'/>
The receiving BGP speaker <bcp14>SHOULD NOT</bcp14> accept routes with the offending Path
Attribute into its Adj-Rib-In for that peer (treat-as-withdraw) or <bcp14>MAY</bcp14>
discard the offending Path Attribute (attribute-discard). The choice of the
desired behavior to discard or to not propagate will depend on the
operational expectations for the feature.</t>
  <t>AFI/SAFI conditional: When the specified AFI/SAFI is configured for the BGP
session and the Path Attribute Filtering Capability is supported, the
filtering capability bit <bcp14>SHOULD</bcp14> be set to 0 (wanted) by default.  When that
AFI/SAFI is not configured, the defining specification should detail whether
the default filtering policy is wanted and the filtering capability
bit for that Path Attribute <bcp14>MUST</bcp14> be set accordingly.</t>
  <t>Default permit: Without explicit configuration from the sending BGP speaker
and the receiving BGP speaker, routes containing the new Path Attribute are
considered wanted.  Implementations supporting the Path Attribute Filtering
Capability <bcp14>SHOULD</bcp14> set the bit of this Path Attribute to 0 (wanted) by
default.</t>
</list></t>

</section>
<section anchor="filtering_reccs"><name>Recommendations for Filtering Path Attributes</name>

<t>The table below provides suggested default filtering behaviors for many BGP
Path Attributes. In addition to "yes" and "no", which indicate that an
implementation <bcp14>SHOULD</bcp14> either filter, or not filter, the given attribute by
default, "never" indicates that an implementation <bcp14>MUST NOT</bcp14> filter the given
attribute under any circumstances, and "-" indicates that no recommendation
is made.</t>

<t>The table also recommends filtering profiles, as defined in <xref target="profiles"/>.
Where no filtering recommendation is made, no profile is suggested either.</t>

<t>It is not recommended that BGP Path Attributes that are deprecated should be
filtered by default.  This permits their long term reassignment and re-use.
Operators with a strong filtering policy may consider filtering these to block
routes from older implementations of these features that may still be deployed.</t>

<t>Upon publication of this document as an RFC, this table will become
historic and the authoritative source of recommendations will be the
relevant IANA registry (<xref target="iana"/>).</t>

<texttable anchor="recommendations">
      <ttcol align='left'>Code Point</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Should Filter By Default</ttcol>
      <ttcol align='left'>Filtering Profile</ttcol>
      <c>0</c>
      <c>Reserved</c>
      <c>Yes</c>
      <c>Default deny</c>
      <c>1</c>
      <c>ORIGIN [RFC4271]</c>
      <c>Never</c>
      <c>Default permit</c>
      <c>2</c>
      <c>AS_PATH [RFC4271]</c>
      <c>Never</c>
      <c>Default permit</c>
      <c>3</c>
      <c>NEXT_HOP [RFC4271]</c>
      <c>Never</c>
      <c>Default permit</c>
      <c>4</c>
      <c>MULTI_EXIT_DISC [RFC4271]</c>
      <c>No</c>
      <c>Default permit</c>
      <c>5</c>
      <c>LOCAL_PREF [RFC4271]</c>
      <c>Yes</c>
      <c>Default discard</c>
      <c>6</c>
      <c>ATOMIC_AGGREGATE [RFC4271]</c>
      <c>No</c>
      <c>Default permit</c>
      <c>7</c>
      <c>AGGREGATOR [RFC4271]</c>
      <c>No</c>
      <c>Default permit</c>
      <c>8</c>
      <c>COMMUNITIES [RFC1997]</c>
      <c>No</c>
      <c>Default permit</c>
      <c>9</c>
      <c>ORIGINATOR_ID [RFC4456]</c>
      <c>Yes</c>
      <c>Default discard</c>
      <c>10</c>
      <c>CLUSTER_LIST [RFC4456]</c>
      <c>Yes</c>
      <c>Default discard</c>
      <c>11</c>
      <c>DPA (deprecated) [RFC6938]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>12</c>
      <c>ADVERTISER (historic) (deprecated) [RFC1863][RFC4223][RFC6938]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>13</c>
      <c>RCID_PATH / CLUSTER_ID (Historic) (deprecated) [RFC1863][RFC4223][RFC6938]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>14</c>
      <c>MP_REACH_NLRI [RFC4760]</c>
      <c>Never</c>
      <c>Default permit</c>
      <c>15</c>
      <c>MP_UNREACH_NLRI [RFC4760]</c>
      <c>Never</c>
      <c>Default permit</c>
      <c>16</c>
      <c>EXTENDED COMMUNITIES [Eric_Rosen][draft-ramachandra-bgp-ext-communities-00][RFC4360]</c>
      <c>No</c>
      <c>Default permit</c>
      <c>17</c>
      <c>AS4_PATH [RFC6793]</c>
      <c>Never</c>
      <c>Default permit</c>
      <c>18</c>
      <c>AS4_AGGREGATOR [RFC6793]</c>
      <c>Never</c>
      <c>Default permit</c>
      <c>19</c>
      <c>SAFI Specific Attribute (SSA) (deprecated) [Gargi_Nalawade][draft-kapoor-nalawade-idr-bgp-ssa-00][draft-nalawade-idr-mdt-safi-00][draft-wijnands-mt-discovery-00]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>20</c>
      <c>Connector Attribute (deprecated) [RFC6037]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>21</c>
      <c>AS_PATHLIMIT (deprecated) [draft-ietf-idr-as-pathlimit-02]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>22</c>
      <c>PMSI_TUNNEL [RFC6514]</c>
      <c>Yes</c>
      <c>Default deny</c>
      <c>23</c>
      <c>Tunnel Encapsulation [RFC9012]</c>
      <c>Yes</c>
      <c>Default deny</c>
      <c>24</c>
      <c>Traffic Engineering [RFC5543]</c>
      <c>Yes</c>
      <c>Default discard</c>
      <c>25</c>
      <c>IPv6 Address Specific Extended Community [RFC5701]</c>
      <c>No</c>
      <c>Default permit</c>
      <c>26</c>
      <c>AIGP [RFC7311]</c>
      <c>Yes</c>
      <c>Default discard</c>
      <c>27</c>
      <c>PE Distinguisher Labels [RFC6514]</c>
      <c>Yes</c>
      <c>Default deny</c>
      <c>28</c>
      <c>BGP Entropy Label Capability Attribute (deprecated) [RFC6790][RFC7447]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>29</c>
      <c>BGP-LS Attribute [RFC9552]</c>
      <c>Yes</c>
      <c>AFI/SAFI Conditional</c>
      <c>30</c>
      <c>Deprecated [RFC8093]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>31</c>
      <c>Deprecated [RFC8093]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>32</c>
      <c>LARGE_COMMUNITY [RFC8092]</c>
      <c>No</c>
      <c>Default permit</c>
      <c>33</c>
      <c>BGPsec_Path [RFC8205]</c>
      <c>Never</c>
      <c>Default permit</c>
      <c>34</c>
      <c>BGP Community Container Attribute (TEMPORARY - registered 2017-07-28, extension registered 2024-08-22, expires 2025-07-28) [draft-ietf-idr-wide-bgp-communities-11]</c>
      <c>No</c>
      <c>Default permit</c>
      <c>35</c>
      <c>Only to Customer (OTC) [RFC9234]</c>
      <c>Never</c>
      <c>Default permit</c>
      <c>36</c>
      <c>BGP Domain Path (D-PATH) (TEMPORARY - registered 2019-07-08, extension registered 2025-06-06, expires 2026-07-08) [draft-ietf-bess-evpn-ipvpn-interworking-10]</c>
      <c>Yes</c>
      <c>Default deny</c>
      <c>37</c>
      <c>SFP attribute [RFC9015]</c>
      <c>Yes</c>
      <c>Default deny</c>
      <c>38</c>
      <c>BFD Discriminator [RFC9026]</c>
      <c>Yes</c>
      <c>Default discard</c>
      <c>39</c>
      <c>BGP Next Hop Dependent Capabilities (NHC) (TEMPORARY - registered 2022-12-20, extension registered 2024-12-10, expires 2025-12-20) [draft-ietf-idr-entropy-label-13]</c>
      <c>Yes</c>
      <c>Default discard</c>
      <c>40</c>
      <c>BGP Prefix-SID [RFC8669]</c>
      <c>Yes</c>
      <c>Default discard</c>
      <c>41</c>
      <c>BIER [RFC9793]</c>
      <c>Yes</c>
      <c>Default deny</c>
      <c>42</c>
      <c>Edge Metadata Path Attribute (TEMPORARY - registered 2025-04-23, expires 2026-04-23) [draft-ietf-idr-5g-edge-service-metadata-27]</c>
      <c>Yes</c>
      <c>&#160;</c>
      <c>128</c>
      <c>ATTR_SET [RFC6368]</c>
      <c>Yes</c>
      <c>Default deny</c>
      <c>129</c>
      <c>Deprecated [RFC8093]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>241</c>
      <c>Deprecated [RFC8093]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>242</c>
      <c>Deprecated [RFC8093]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>243</c>
      <c>Deprecated [RFC8093]</c>
      <c>-</c>
      <c>&#160;</c>
      <c>255</c>
      <c>Reserved for development [RFC2042]</c>
      <c>Yes</c>
      <c>Default discard</c>
</texttable>

</section>
<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank the following individuals whose comments
   contributed to the refinement of this document:
   Donatas Abraitis, Ignas Bagdonas, Bruno Decraene, David Lamparter, 
   Robert Raszuk.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC4271">
  <front>
    <title>A Border Gateway Protocol 4 (BGP-4)</title>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
    <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
      <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
      <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
      <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4271"/>
  <seriesInfo name="DOI" value="10.17487/RFC4271"/>
</reference>

<reference anchor="RFC5492">
  <front>
    <title>Capabilities Advertisement with BGP-4</title>
    <author fullname="J. Scudder" initials="J." surname="Scudder"/>
    <author fullname="R. Chandra" initials="R." surname="Chandra"/>
    <date month="February" year="2009"/>
    <abstract>
      <t>This document defines an Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.</t>
      <t>This document obsoletes RFC 3392. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5492"/>
  <seriesInfo name="DOI" value="10.17487/RFC5492"/>
</reference>

<reference anchor="RFC6793">
  <front>
    <title>BGP Support for Four-Octet Autonomous System (AS) Number Space</title>
    <author fullname="Q. Vohra" initials="Q." surname="Vohra"/>
    <author fullname="E. Chen" initials="E." surname="Chen"/>
    <date month="December" year="2012"/>
    <abstract>
      <t>The Autonomous System number is encoded as a two-octet entity in the base BGP specification. This document describes extensions to BGP to carry the Autonomous System numbers as four-octet entities. This document obsoletes RFC 4893 and updates RFC 4271. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6793"/>
  <seriesInfo name="DOI" value="10.17487/RFC6793"/>
</reference>

<reference anchor="RFC7606">
  <front>
    <title>Revised Error Handling for BGP UPDATE Messages</title>
    <author fullname="E. Chen" initials="E." role="editor" surname="Chen"/>
    <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
    <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
    <author fullname="K. Patel" initials="K." surname="Patel"/>
    <date month="August" year="2015"/>
    <abstract>
      <t>According to the base BGP specification, a BGP speaker that receives an UPDATE message containing a malformed attribute is required to reset the session over which the offending attribute was received. This behavior is undesirable because a session reset would impact not only routes with the offending attribute but also other valid routes exchanged over the session. This document partially revises the error handling for UPDATE messages and provides guidelines for the authors of documents defining new attributes. Finally, it revises the error handling procedures for a number of existing attributes.</t>
      <t>This document updates error handling for RFCs 1997, 4271, 4360, 4456, 4760, 5543, 5701, and 6368.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7606"/>
  <seriesInfo name="DOI" value="10.17487/RFC7606"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.haas-idr-bgp-attribute-escape">
   <front>
      <title>BGP Attribute Escape</title>
      <author fullname="Jeffrey Haas" initials="J." surname="Haas">
         <organization>Juniper Networks</organization>
      </author>
      <date day="9" month="April" year="2025"/>
      <abstract>
	 <t>   BGP-4 [RFC 4271] has been very successful in being extended over the
   years it has been deployed.  A significant part of that success is
   due to its ability to incrementally add new features to its Path
   Attributes when they are marked &quot;optional transitive&quot;.
   Implementations that are ignorant of a feature for an unknown Path
   Attribute that are so marked will propagate BGP routes with such
   attributes.

   Unfortunately, this blind propagation of unknown Path Attributes may
   happen for features that are intended to be used in a limited scope.
   When such Path Attributes inadvertently are carried beyond that
   scope, it can lead to things such as unintended disclosure of
   sensitive information, or cause improper routing.  In their worst
   cases, such propagation may be for malformed Path Attributes and lead
   to BGP session resets or crashes.

   This document calls such inadvertent propagation of BGP Path
   Attributes, &quot;attribute escape&quot;.  This document further describes some
   of the scenarios that leads to this behavior and makes
   recommendations on practices that may limit its impact.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-haas-idr-bgp-attribute-escape-03"/>
   
</reference>


<reference anchor="I-D.ietf-idr-bgp-model">
   <front>
      <title>YANG Model for Border Gateway Protocol (BGP-4)</title>
      <author fullname="Mahesh Jethanandani" initials="M." surname="Jethanandani">
         <organization>Kloud Services</organization>
      </author>
      <author fullname="Keyur Patel" initials="K." surname="Patel">
         <organization>Arrcus</organization>
      </author>
      <author fullname="Susan Hares" initials="S." surname="Hares">
         <organization>Huawei</organization>
      </author>
      <author fullname="Jeffrey Haas" initials="J." surname="Haas">
         <organization>Juniper Networks</organization>
      </author>
      <date day="21" month="October" year="2024"/>
      <abstract>
	 <t>   This document defines a YANG data model for configuring and managing
   BGP, including protocol, policy, and operational aspects, such as
   RIB, based on data center, carrier, and content provider operational
   requirements.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-model-18"/>
   
</reference>

<reference anchor="RFC4760">
  <front>
    <title>Multiprotocol Extensions for BGP-4</title>
    <author fullname="T. Bates" initials="T." surname="Bates"/>
    <author fullname="R. Chandra" initials="R." surname="Chandra"/>
    <author fullname="D. Katz" initials="D." surname="Katz"/>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <date month="January" year="2007"/>
    <abstract>
      <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4760"/>
  <seriesInfo name="DOI" value="10.17487/RFC4760"/>
</reference>

<reference anchor="RFC7854">
  <front>
    <title>BGP Monitoring Protocol (BMP)</title>
    <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
    <author fullname="R. Fernando" initials="R." surname="Fernando"/>
    <author fullname="S. Stuart" initials="S." surname="Stuart"/>
    <date month="June" year="2016"/>
    <abstract>
      <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7854"/>
  <seriesInfo name="DOI" value="10.17487/RFC7854"/>
</reference>




    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

