An Analysis of ASPA-based AS_PATH Verification
draft-geng-sidrops-aspa-analysis-01
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Nan Geng , Mingqing(Michael) Huang , Yangyang Wang | ||
Last updated | 2024-12-31 (Latest revision 2024-06-29) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources |
GitHub Repository
|
||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Autonomous System Provider Authorization (ASPA) is very helpful in detecting and mitigating route leaks (valley-free violations) and a majority of forged-origin hijacks. This document does an analysis on ASPA-based AS_PATH verification to help people understand its strengths and deficiencies. The document can help people deploy ASPA properly and provide some potential directions of enhancing ASPA.
Authors
Nan Geng
Mingqing(Michael) Huang
Yangyang Wang
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)