| Internet-Draft | Destination-IP-Origin-AS Filter | February 2026 |
| Wang, et al. | Expires 1 September 2026 | [Page] |
This document defines an extension to the Border Gateway Protocol (BGP) Flow Specification (FlowSpec) to enable filtering based on the Origin Autonomous System (AS) of the destination IP address. This extension is particularly useful in mitigating Distributed Denial of Service (DDoS) attacks where the target IP addresses are dynamic but belong to a specific destination AS.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 1 September 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
BGP Flow Specification (FlowSpec), defined in [RFC8955] and [RFC8956], allows for the dissemination of traffic filtering rules. Current FlowSpec components support filtering by destination prefix, source prefix, and various Layer 4 parameters.¶
In certain DDoS mitigation scenarios, an operator may need to apply rate-limiting or filtering to all traffic destined for a particular network (Autonomous System), even when the specific target IP prefixes within that AS are numerous or rapidly changing. Manually updating hundreds of prefix-based FlowSpec rules is inefficient. This document introduces a new FlowSpec component that allows operators to use the Destination Origin AS as a matching criterion.¶
This document proposes a new flow specification component type that is encoded in the BGP Flowspec NLRI. The following new component type is defined.¶
Destination-IP-Origin-AS¶
Type TBD1 - Destination-IP-Origin-AS¶
Encoding: <type (1 octet), [op, value]+>¶
Contains a set of {operator, value} pairs that are used to match the Destination-IP-Origin-AS (i.e. the origin AS number of the destination IP address).¶
The operator byte is encoded as:¶
0 1 2 3 4 5 6 7
+---+---+---+---+---+---+---+---+
| e | a | len | 0 |lt |gt |eq |
+---+---+---+---+---+---+---+---+
Where:¶
e - end-of-list bit. Set in the last {op, value} pair in the list.¶
a - AND bit. If unset, the previous term is logically ORed with the current one. If set, the operation is a logical AND. It MUST be unset in the Destination-IP-Origin-AS filter.¶
len - The length of the value field for this operator given as (1 << len). This encodes 1 (len=00), 2 (len=01), 4 (len=10), and 8 (len=11) octets.¶
lt - less than comparison between data and value.¶
gt - greater than comparison between data and value.¶
eq - equality between data and value.¶
The bits lt, gt, and eq can be combined to produce match the Destination-IP-Origin-AS filter or a range of Destination-IP-Origin-AS filter(e.g. less than AS1 and greater than AS2).¶
The value field is encoded as:¶
0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------------------------------------------------------+ ~ Destination-IP-Origin-AS (4 octets) ~ +---------------------------------------------------------------+
Per section 10 of [RFC8955] , If a receiving BGP speaker cannot support this new Flow Specification component type, it MUST discard the NLRI value field that contains such unknown components. Since the NLRI field encoding (Section 4 of [RFC8955]) is defined in the form of a 2-tuple <length, NLRI value>, message decoding can skip over the unknown NLRI value and continue with subsequent remaining NLRI.¶
In cases of multi-homed prefixes with multiple Origin ASes, the match succeeds if any of the valid Origin ASes match the filter.¶
When a BGP speaker receives a FlowSpec update containing the Destination Origin AS component:¶
It MUST determine the Origin AS of the destination IP of the transit packet by performing a lookup in its local BGP RIB.¶
If the packet's destination IP matches a prefix whose BGP path has an AS_PATH where the rightmost AS (the origin) matches the value in the FlowSpec rule, the action (e.g., rate-limit, discard) MUST be applied.¶
This section describes how to use this function in a simple scenario. Considering the topology shown in Figure 3. In AS64597's R1, if the ISP AS64597 wants to redirect all packets originating from IP Prefix 61 to AS64598:¶
"first go to R3, then forward them to AS64598", the ISP AS64597 can use the traditional method or the method defining in this draft.¶
+---------+
| BGP FS |
| Server |
+----|----+
|
|
/
/
************/************ IP Prefix 81
* / * IP Prefix 82
IP Prefix 61 * / AS64597 * IP Prefix 83
* / * IP Prefix 84
+-------+ * +---+/ +---+ * +-------+
+AS64596+-------+ R1+---------+ R2|------+AS64598+
+-------+ * +-+-+\ +---+ */ +-------+
* \ |\ /
* \ | \ /* IP Prefix 91
* \ | /\* IP Prefix 92
* \ | / \ IP Prefix 93
* \ |/ *\ IP Prefix 94
* \ +-+-+ * \ +-------+
* \-+ R3+------+AS64599+
* +---+ * +-------+
* *
*************************
Using the traditional method, the ISP AS64597 needs to setup multiple "Destination Prefix + Source Prefix" rules in Router R1 as following:¶
+--------------+--------------+-------------------------+
| Destination | Source Prefix| Redirect to IP Nexthop |
| Prefix | | |
+--------------+--------------+-------------------------+
| IP Prefix 81 | IP Prefix 61 | R3 |
+--------------+--------------+-------------------------+
| IP Prefix 82 | IP Prefix 61 | R3 |
+--------------+--------------+-------------------------+
| IP Prefix 83 | IP Prefix 61 | R3 |
+--------------+--------------+-------------------------+
| IP Prefix 84 | IP Prefix 61 | R3 |
+--------------+--------------+-------------------------+
| More ... |
+--------------+--------------+-------------------------+
Using the method defining in this draft, the ISP AS64597 needs to setup only one "Destination Origin AS + Source Prefix" rule in Router R1 as following:¶
+--------------+--------------+-------------------------+ | Destination | Source Prefix| Redirect to IP Nexthop | | IP Origin AS | | | +--------------+--------------+-------------------------+ | 64598 | IP Prefix 61 | R3 | +--------------+--------------+-------------------------+
Obviously, the new method defining in this draft saves a lot of entry spaces on the control plane and forwarding plane, and it would greatly simplify the operation of the control plane, and the more destination prefixes an AS has, the more obvious the benefit.¶
In addition to the security considerations in [RFC8955], operators must be aware of:¶
Routing Inconsistency: If different routers in the network have different views of the BGP table, the "Origin AS" for a given IP may differ, leading to inconsistent filter application.¶
AS_PATH Manipulation: An attacker could potentially spoof or prepend ASes to bypass filters if the local BGP table is compromised.¶
Validation: Implementations SHOULD ensure that FlowSpec rules are validated against the originating peer to prevent unauthorized AS-based filtering across administrative boundaries.¶
IANA is requested to a new entry in "Flow Spec component types registry" with the following values:¶
+---------+--------------+---------------------------------+ | Type | RFC or Draft | Description | +---------+--------------+---------------------------------+ | TBD1 | This Draft | Destination-IP-Origin-AS | +---------+--------------+---------------------------------+¶
TBD¶
The authors would like to acknowledge the review and inputs from Gang Yan, Robert Raszuk, Jeffray Haas, Linda Dunbar, Zhenbin Li, Rainbow Wu, Jie Dong and Ziqing Cao.¶