Reporting on Border Gateway Protocol Risk Mitigation Progress; Secure Internet Routing, 51284-51293 [2024-13048]

Download as PDF 51284 Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules Dated: June 11, 2024. Lauren K. Roth, Associate Commissioner for Policy. [FR Doc. 2024–13236 Filed 6–14–24; 8:45 am] BILLING CODE 4164–01–P FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 1 [PS Docket Nos. 24–146, 22–90; RIN 3060– AL83; FCC 24–62; FR ID 225236] Reporting on Border Gateway Protocol Risk Mitigation Progress; Secure Internet Routing Federal Communications Commission ACTION: Proposed rule. AGENCY: In this document, the Federal Communications Commission (Commission) seeks to increase the security of the information routed across the internet by proposing certain reporting obligations on providers of broadband internet access service (BIAS providers) and their use of the Border Gateway Protocol (BGP). Internet traffic can be disrupted, intercepted, and blackholed—when a service provider drops traffic addressed to a targeted IP address or range of addresses by redirecting it to a null route—due to either accidental or deliberate adversarial manipulation of security vulnerabilities inherent to BGP. Together, the intended effect of the plans, filings, and measures the Commission proposes would be to mitigate such threats. BIAS providers would be required to develop BGP Routing Security Risk Management Plans that describe their plans for and progress in implementing security measures that utilize the Resource Public Key Infrastructure (RPKI). Nine of the largest service providers would be required to file specific additional data on a quarterly basis. The FCC also seeks comment on issues related to implementing RPKI-based security measures. SUMMARY: Comments are due on or before July 17, 2024 and reply comments are due on or before August 1, 2024. Written comments on the Paperwork Reduction Act proposed information collection requirements must be submitted by the public and other interested parties on or before August 16, 2024. ADDRESSES: You may submit comments, identified by PS Docket Nos. 24–146 and 22–90, by any of the following methods: khammond on DSKJM1Z7X2PROD with PROPOSALS DATES: VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 • Federal Communications Commission’s website: https:// www.apps.fcc.gov/ecfs/. Follow the instructions for submitting comments. • Mail: Parties who choose to file by paper must file an original and one copy of each filing. If more than one docket or rulemaking number appears in the caption of this proceeding, filers must submit two additional copies for each additional docket or rulemaking number. Filings can be sent by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail. All filings must be addressed to the Commission’s Secretary, Office of the Secretary, Federal Communications Commission. Commercial overnight mail (other than U.S. Postal Service Express Mail and Priority Mail) must be sent to 9050 Junction Drive, Annapolis Junction, MD 20701. U.S. Postal Service first-class, Express, and Priority mail must be addressed to 45 L Street NE, Washington, DC 20554. Effective March 19, 2020, and until further notice, the Commission no longer accepts any hand or messenger delivered filings. This is a temporary measure taken to help protect the health and safety of individuals, and to mitigate the transmission of COVID–19. See FCC Announces Closure of FCC Headquarters Open Window and Change in Hand-Delivery Policy, Public Notice, DA 20–304 (March 19, 2020). https://www.fcc.gov/document/fcccloses-headquarters-open-window-andchanges-hand-delivery-policy. People with Disabilities. To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an email to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at 202–418–0530 (voice), 202– 418–0432 (TTY). FOR FURTHER INFORMATION CONTACT: George Donato, Associate Division Chief, Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, (202) 418–0729, or by email to george.donato@fcc.gov; or James Zigouris, Attorney-Advisor, Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, (202) 418– 0697, or by email to james.zigouris@ fcc.gov; or Bradley Rosen, AttorneyAdvisor, Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, (202) 418–0226, or by email to bradley.rosen@fcc.gov. For additional information concerning the Paperwork Reduction Act information collection PO 00000 Frm 00008 Fmt 4702 Sfmt 4702 requirements contained in this document, send an email to PRA@ fcc.gov or contact Nicole Ongele, Office of Managing Director, Performance Evaluation and Records Management, 202–418–2991, or by email to PRA@ fcc.gov. SUPPLEMENTARY INFORMATION: This is a summary of the Commission’s Notice of Proposed Rulemaking (NPRM), PS Docket Nos. 24–146 and 22–90; FCC 24– 62, adopted June 6, 2024, and released June 7, 2024. The full text of this document is available by downloading the text from the Commission’s website at: https://www.fcc.gov/document/fccproposes-internet-routing-securityreporting-requirements-0. When the FCC Headquarters reopens to the public, the full text of this document will also be available for public inspection and copying during regular business hours in the FCC Reference Center, 45 L Street NE, Washington, DC 20554. To request materials in accessible formats for people with disabilities (Braille, large print, electronic files, audio format), send an email to FCC504@fcc.gov or call the Consumer & Governmental Affairs Bureau at 202–418–0530 (voice), 202– 418–0432 (TTY). Ex Parte Rules—Permit-But-Disclose: This proceeding shall be treated as a ‘‘permit-but-disclose’’ proceeding in accordance with the Commission’s ex parte rules, with a limited exception described in the following paragraph. 47 CFR 1.1200, 1.1206. Persons making ex parte presentations must file a copy of any written presentation or a memorandum summarizing any oral presentation within two business days after the presentation (unless a different deadline applicable to the Sunshine period applies). Persons making oral ex parte presentations are reminded that memoranda summarizing the presentation must (1) list all persons attending or otherwise participating in the meeting at which the ex parte presentation was made, and (2) summarize all data presented and arguments made during the presentation. If the presentation consisted in whole or in part of the presentation of data or arguments already reflected in the presenter’s written comments, memoranda or other filings in the proceeding, the presenter may provide citations to such data or arguments in his or her prior comments, memoranda, or other filings (specifying the relevant page and/or paragraph numbers where such data or arguments can be found) in lieu of summarizing them in the memorandum. Documents shown or given to Commission staff during ex parte meetings are deemed to E:\FR\FM\17JNP1.SGM 17JNP1 khammond on DSKJM1Z7X2PROD with PROPOSALS Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules be written ex parte presentations and must be filed consistent with § 1.1206(b). In proceedings governed by § 1.49(f) or for which the Commission has made available a method of electronic filing, written ex parte presentations and memoranda summarizing oral ex parte presentations, and all attachments thereto, must be filed through the electronic comment filing system available for that proceeding, and must be filed in their native format (e.g., .doc, .xml, .ppt, searchable .pdf). Participants in this proceeding should familiarize themselves with the Commission’s ex parte rules. In order to facilitate the free exchange of exploratory ideas among the staff of the federal agencies working toward the critical goal of promoting secure internet routing, we find the public interest requires a limited modification of the ex parte status in this proceeding. See 47 CFR 1.1200(a). Communications between the Commission staff and staff of the Federal Government entities with a formal role in these internet security matters, i.e., Office of the National Cyber Director (ONCD), Cybersecurity and Infrastructure Security Agency (CISA), Department of Justice (DOJ), Office of the Director of National Intelligence, National Institute of Standards and Technology (NIST), and National Telecommunications and Information Administration (NTIA) shall be exempt from the rules requiring disclosure in permit-but-disclose proceedings and exempt from the prohibitions during the Sunshine Agenda period. See generally 47 CFR 1.1206, 1.1203. To be clear, while the Commission recognizes that consultation with these entities is critically important, the Commission will rely in its decision-making only on facts and arguments that are placed in the public record for this proceeding. To this end, the enumerated Federal Government entities, like all interested parties, should submit in the public record of this proceeding comments, reply comments, and other presentations presenting those facts and arguments they wish the Commission to rely on in its decision-making process. If the presentation made by staff of one of the federal agencies enumerated above is of ‘‘substantial significance and clearly intended to affect the ultimate decision,’’ the Commission will rely on such presented information in its decision-making process only if it coordinates in advance with the agency involved to ensure that such agency retains control over the timing and extent of any disclosure that may impact VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 that agency’s jurisdictional responsibilities. See 47 CFR 1.1206(b)(3). Paperwork Reduction Act: This document may contain proposed modified information collection requirements. Therefore, the Commission seeks comment on potential new or revised information collections subject to the Paperwork Reduction Act of 1995. If the Commission adopts any new or revised information collection requirements, the Commission will publish a notice in the Federal Register inviting the general public and the Office of Management and Budget to comment on the information collection requirements, as required by the Paperwork Reduction Act of 1995, Public Law 104–13. In addition, pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107–198, see 44 U.S.C. 3506(c)(4), the Commission seeks specific comments on how it might further reduce the information collection burden for small business concerns with fewer than 25 employees. Regulatory Flexibility Act: The Regulatory Flexibility Act of 1980, as amended (RFA), requires an agency to prepare a regulatory flexibility analysis for notice-and-comment rulemakings, unless the agency certifies that ‘‘the rule will not, if promulgated, have a significant economic impact on a substantial number of small entities.’’ The Commission seeks comment on potential rule and policy changes contained in the document, and accordingly, has prepared an IRFA. The IRFA for this document in PS Docket Nos. 24–146 and 22–90 is set forth below in this document and written public comments are requested. Comments must be filed by the deadlines for comments on the NPRM indicated under the DATES section of this document and must have a separate and distinct heading designating them as responses to the IRFA. The Commission reminds commenters to file in the appropriate dockets: PS Docket Nos. 24–146 and 22–90. Providing Accountability Through Transparency Act: Consistent with the Providing Accountability Through Transparency Act, Public Law 118–9, a summary of this document will be available on https://www.fcc.gov/ proposed-rulemakings. Synopsis Introduction and Background 1. Today, we are seeking comment on several proposals targeted towards improving the security of internet routing, in particular of BGP, which, as PO 00000 Frm 00009 Fmt 4702 Sfmt 4702 51285 detailed above includes key vulnerabilities capable of impacting this nation’s critical infrastructure. We intend these proposals to apply to providers of broadband internet access service on a mass market retail basis (BIAS), based primarily on our authority under Title II of the Communications Act. Our proposals take into account our understanding of the current state of industry participation in RPKI-based approaches to routing security, including the deployment of Route Origin Validation (ROV), from our active and continuing engagement on these issues with industry stakeholders and other government agencies. In short, there is an apparent wide disparity in the percentage of originated routes covered by Route Origin Authorizations (ROAs) and limited or incomplete support for ROV. Further action is urgently required. 2. As of May 2024, only 38% of U.S. networks allow for the validation of their routing information by registering and maintaining ROAs in the RPKI. That figure is derived from data found in Cloudflare’s Radar, and it is confirmed by data in the MANRS Observatory. The MANRS Observatory provides trend data for the maintenance of routing information in the RPKI by the networks participating in MANRS. There are other measurement tools publicly available online that reveal similar data, such as NIST’s RPKI Monitor. Looking at an earlier date, as of December 2024, 36% of traffic originating from non-U.S. Federal Government networks was covered by a valid ROA, but less than 1% of traffic originating from U.S. Federal Government networks was covered by a valid ROA. Thus, we observe that the use of RPKI services across the internet has continued to increase over the past several years through service providers seeking to secure their BGP architectures. Despite the increasing deployment of RPKI-based security measures by some service providers in the United States, service providers that participate in BGP routing will need to make additional progress to reduce exposure to the types of communications attacks described and the ensuing risks. 3. Thus, consistent with comments filed by DOD, DOJ, and CISA in response to the Secure internet Routing NOI, we are proposing reporting obligations on service providers intended to help assess, prioritize, and maintain plans for utilizing the RPKI architecture to further BGP operational security. As the agency with regulatory authority in this area, we intend to continue our close collaboration with E:\FR\FM\17JNP1.SGM 17JNP1 51286 Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules khammond on DSKJM1Z7X2PROD with PROPOSALS other federal agencies which have been actively considering similar secure internet routing issues through National Cybersecurity Strategy initiatives. We seek comment on how the deployment of RPKI and other solutions may promote accountability through collaboration among key internet stakeholders, such as private, government, regulated, and unregulated entities, and between the United States and our global partners. Our proposals are largely focused on the preparation and filing of BGP Routing Security Risk Management Plans, but we do seek comment on certain additional measures that we believe hold promise for facilitating the implementation of RPKI-based routing security. A. BGP Routing Security Risk Management Plans 4. We propose to require service providers to prepare and maintain BGP Routing Security Risk Management Plans (BGP Plans) describing and attesting to the specific efforts they have made, and further plan to undertake, to create and maintain ROAs in the RPKI. We expect that requiring service providers to prepare plans on how they have and will institute RPKI, a solution developed through an open standards setting process, can promote participation in the standards setting process. The Commission continues to strongly support open standards setting processes, and that is also a core goal of strategic objective 4.1 of the National Cybersecurity Strategy. We seek comment on the impact that our reporting proposals may have on this goal. 5. Under our proposals, BGP Plans can be risk-based performance plans, but would have to describe and attest to the extent to which the service provider conducts ROV filtering at the interconnection points between the service provider and its peers and clients, as well as describe any other methods at their disposal. These plans are to be updated on an annual basis. The following subsections discuss which service providers would be required to confidentially file their BGP Plans with the Commission, in addition to discussing the details that we propose should be included in all BGP Plans, whether filed with the Commission or not. Should the Commission promote risk-based solutions among service providers? 1. Initial BGP Plans 6. We propose to require certain large service providers to file initial BGP Plans with the Commission. In particular, we propose to impose this VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 filing requirement on all Tier 1 service providers as well as the other most significant service providers, which would currently include: AT&T, Inc.; Altice USA; Charter Communications; Comcast Corporation; Cox Communications, Inc.; Lumen Technologies, Inc.; T-Mobile USA, Inc.; Telephone & Data Systems (including US Cellular); and Verizon Communications, Inc. These significant providers are likely to originate routes covering a large proportion of the IP address space in the United States and will play critical roles ensuring effective implementation of ROV filtering. The initial BGP plans prepared by service providers other than those suggested above would not need to be filed with the Commission but should be made available to FCC staff upon request. We propose, but seek comment on, a requirement that BGP Plans submitted to the Commission should be attested by a corporate officer at each service provider. 7. We seek comment on whether we should require the filing of BGP Plans by a different set of service providers than those identified above. If so, commenters should explain the reasons for, and factors involved with, reaching that determination, and the feasibility of using particular metrics. For instance, should only the most significant service providers based on number of clients, or number of public peers, need to file? Or, should we choose based on other criteria, such as several of the following: the size of the address space under their control (through legacy ownership or assigned by ARIN), the number of customers, or the number of originated routes? 8. We do not propose in this NPRM to set specific industry-wide substantive requirements with industry-wide deadlines. BGP Plans are intended to establish a mechanism by which the Commission, working in coordination with other federal agencies, can assess a service provider’s actions to prioritize routing security through use of the RPKI architecture, measure its progress over time to evaluate the reasonableness of its BGP routing security risk management plan, and verify its commitments to following it. In addition, the development of BGP Plans by all service providers would be important for securing BGP operations in the near term because it would require service providers to consider the benefits of creating and maintaining ROAs and conducting ROV filtering. We recognize that service providers often have different network architectures and different technologies, partly as a reflection of the types of customers and PO 00000 Frm 00010 Fmt 4702 Sfmt 4702 services offered, and that these differences may have affected the speed with which they have deployed RPKI and may affect their plans going forward. We seek comment on whether our proposals address these issues and promote the implementation of routing security among U.S. service providers. The specific BGP Plan requirements concerning ROAs and ROV are discussed seriatim. We seek comment generally on whether it would be helpful for the Public Safety and Homeland Security Bureau (PSHSB) to develop a standardized template for preparing BGP Plans. We also seek comment on how service providers should respond if mandatory elements of a BGP Plan do not apply to their particular circumstances. a. Creating and Maintaining Route Origin Authorizations 9. Registering and maintaining updated ROAs with the appropriate internet registry is a critical and necessary step for securing BGP operation in the near term. At present, only the holders of specific IP address prefixes can register ROAs for originated routes that pertain to those prefixes. As a result, a service provider is able to directly register and manage ROAs only when it controls the IP address prefix(es) in question. An effective path forward must therefore take into account the difference in the service provider’s route origination control over the IP prefix(es) assigned to it by ARIN. The information we would require service providers to submit would depend on the various categories of IP address prefixes for which a service provider can be the route originator. In the subsections below, we discuss the different cases that we have observed in which the service provider either does or does not control the IP address prefix(es) assigned or allocated to it and route originations for the same. We anticipate that most service providers will be originating routes for prefixes drawn from all these cases. We would evaluate RPKI deployment in each set of circumstances differently depending on what type of control the service provider has over route originations to various IP address prefix(es). i. Cases Where the Service Provider Controls the ASNs and IP Address Prefix(es) 10. We first consider where a service provider has full authority to register ROAs because it controls the associated IP address prefix(es). ROAs are registered with the responsible regional registry, which is ARIN for the United States and North America. ARIN assigns E:\FR\FM\17JNP1.SGM 17JNP1 khammond on DSKJM1Z7X2PROD with PROPOSALS Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules ASNs and IP address prefixes to the Local Internet Registries (LIRs). As set out in the ARIN Manual, LIRs are ‘‘generally ISPs whose customers are primarily end users and possibly other ISPs.’’ The ISP might in turn designate a subset of the IP address space it holds to be used by its customers, but in the current ARIN operational convention only the original ISP can register ROAs even for reallocated address space. 11. For these cases, we propose that BGP Plans would be required to include a detailed description of the service provider’s process for assessing and prioritizing the creation and maintenance of ROAs which cover the routes originating from their networks. We contemplate that general statements that a service provider is following a risk-based approach would not be sufficient to satisfy the requirement for a detailed description. Rather, we believe there should be sufficient reporting to understand whether each service provider is taking meaningful action to assess its risk posture and that it prioritizes implementing protections accordingly. The BGP Plan would incorporate and explain in detail factors affecting the service provider’s ability to register and maintain ROAs for its IP address prefix(es). We seek comment on whether a BGP Plan should include specific goals for the service provider pertaining to ROA registrations as well as estimated timetables for attaining those goals. We seek comment on what criteria providers should include in their BGP Plans for measuring progress in deployment of BGP origin validation, as well as what specific details should be provided to describe the service provider’s plans for creating and maintaining ROAs going forward. We seek comment as well on whether there are alternatives to ROAs or to specific ROA registration goals that would ensure continued progress in the implementation of RPKI, and if so, what they would be. We propose that the initial BGP Plans that are to be filed with the Commission should be filed no later than 90 days after the effective date of the requirement. 12. We seek comment on the criteria by which we should evaluate the relevance of individual BGP Plans filed with, or reviewed by, the Commission. We recognize, for instance, that different service providers are in substantially different positions regarding the extent to which they control the ASN and the IP address prefixes that they originate. We also understand that some service providers have fewer in-house resources available than others. We recognize as well that the processes for creating ROAs for legacy number resources VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 originally issued to the service provider by an Internet Registry prior to the creation of ARIN may raise additional issues, and we seek comment on how our proposals may address those issues. Finally, we anticipate receiving detailed explanations if a service provider contends that ‘‘multi-homing,’’ traffic engineering, or some other factor significantly reduces its ability to increase and maintain ROA coverage for IP prefixes they control. Regarding multi-homing, are there measures that would facilitate coordinating all necessary ROAs for all the ASNs that may originate routes to the same prefix? What are factors that might inhibit such coordination? If at least one ROA registration of the IP prefix is valid, is that sufficient to protect the IP prefix even if there are other invalid registrations for that prefix? 13. To help ensure that we are accurately measuring and tracking the status of ROA registrations, we seek comment regarding the metrics offered by several publicly available tools. The NIST RPKI Monitor is one example of these tools, but there are others available, too. We seek comment on the relative merits of such publicly available tools that track the status of ROA registrations covering route originations, including their utility in measuring providers’ execution of their individual BGP Plans. Which, if any, are perceived to be more accurate or comprehensive than others? Should the FCC select one tool, based on comments submitted, to use to track ROA coverage? Or, should the FCC use a subset of public monitoring tools and cross-reference among them to track and analyze ROA coverage? ii. Cases Where the Service Provider Does Not Control the IP Address Prefix(es) 14. We next consider the information we propose to require in an initial BGP Plan in cases where we understand that service providers are unable to register a ROA because that service provider does not control the IP address prefix(es) in question. This apparently can happen in three instances: (1) A service provider can contractually reassign one or more IP address prefixes to downstream providers or other client customers, who are then the entities able to register ROAs for those prefixes. (2) A party may obtain its own IP prefix directly from ARIN and use the service provider as its upstream provider. (3) A party may obtain its own ASN and IP prefix directly from ARIN and contract with the service provider to propagate the route. In those cases, we understand that the entity which controls the PO 00000 Frm 00011 Fmt 4702 Sfmt 4702 51287 associated IP address prefix(es) in the RIR (ARIN), would have to register ROAs for those prefixes. In order to implement RPKI-based improvements to BGP security architectures successfully and to create a healthy ecosystem, it is essential that every entity that controls IP address prefixes effects all necessary coordination to register the associated ROAs. 15. For these cases, we propose to require that a service provider’s initial BGP Plan describe the status of the ROA registrations for routes they originate within these three cases. We propose that the BGP Plan explain the reason(s) why the service provider is unable to register particular sets of IP prefixes. The Plan should also describe in detail the service provider’s efforts and plans for facilitating the ROA registrations for the IP prefixes that have been transferred and not under its control. Among other issues, we believe that BGP Plans would need to describe the steps that the service provider takes to identify and address cases in which customers or clients with their own IP prefixes are multi-homed and the frequency it encounters multi-homing. In multi-homing situations where it is the responsibility of the customer or client to create and register, rather than the service provider, the chances for errors in ROA registration may be greater, potentially resulting in the customer’s traffic becoming blackholed through a given provider. We understand that in many cases, the service provider will have direct contractual relationships with the holder of the IP address prefixes and will be, or can be, made aware of the ROA registration status of those prefixes with ARIN. Although the service provider itself is not able at this time to register ROAs in these circumstances, we are seeking comment on the steps that service providers can or should do to help secure ROAs for the IP address space held by downstream clients. b. Route Origin Validation Filtering 16. The implementation of ROV is necessary to determine whether received route advertisements are legitimate when checked against ROAs in the RPKI repositories. ROV is the step in origin validation predicated on the existence of ROAs, and is the key action that facilitates detection of invalid or unknown route originations that indicate a prefix is being incorrectly advertised, either maliciously or accidentally, by a service provider or enterprise network. For the RPKI to be effective, most if not all service providers will need either to conduct ROV filtering in their interconnections E:\FR\FM\17JNP1.SGM 17JNP1 khammond on DSKJM1Z7X2PROD with PROPOSALS 51288 Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules with other service providers, or to have contractual commitments with third parties to have routes propagated to them subject to ROV filtering. Moreover, to fully realize the origin validation benefits of the RPKI, some service providers may need to perform ROV filtering in interconnections with their clients. In this way, the service provider examines incoming BGP routing announcements from its peers in addition to its clients. In cases where a service provider is downstream from a more widely accessed provider (e.g., stub networks), there could be great benefits from the downstream provider relying on the ROV filtering performed by its upstream provider. 17. We propose that the BGP Plan of a Tier 1 service provider should describe the extent to which it has implemented ROV filtering at its interconnection points with its peers as well as its customers, and to what extent ROV has been disabled or not deployed within its network. We also propose that BGP Plans describe, to the extent applicable, any contractual requirements a service provider may have for upstream third-parties to provide ROV filtering for incoming routes. We seek comment on whether this information would be required of all BGP Plans, whether filed with the Commission or made available upon request. We believe that this information is likely to be most relevant for Tier 3 service providers who do not have peering relationships and solely rely on contracts with other upstream service providers. We seek comment on the use of this information to monitor the effective deployment of ROV. 18. We also seek comment on two proposals regarding the implementation of ROV filtering that potentially may affect the ROV information that needs to be included in certain providers’ BGP Plans. We seek comment, first, on whether it would be sufficient if a corporate officer or other responsible official at a Tier 1 service provider attests that it supports ROV for all directly connected peers with settlement-free access as well as their directly connected clients, including other service providers. We seek comment, second, on whether it would be sufficient if such official within a Tier 2 service provider attests that it is implementing ROV filtering in peering relationships with other Tier 2 providers, and have contractual relationships with Tier 1 providers that require Tier 1 providers to perform ROV filtering on traffic being terminated to the Tier 2 provider. We seek comment as to whether there are circumstances where Tier 2 service providers need not VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 provide ROV support for clients that participate in BGP routing. We also seek comment on the extent to which, if we adopt such proposals, ROV information needs to be included in a provider’s BGP Plan. 19. We recognize that there are no publicly available resources that allow comprehensive third-party measurement and validation regarding the extent that service providers conduct ROV filtering. Third-party measurement methodologies involve some degree of sampling and estimation and come with varying strengths and weaknesses. For example, APNIC, Cloudflare, and Virginia Tech (RoVISTA), are examples of entities which have developed methodologies using various sampling techniques to assess the degree of ROV filtering prevalent, and which make the resulting assessments public. We propose to monitor a limited set of respected consensus methodologies to determine whether the set, as a whole, shows consistent trends and patterns. We seek comment on whether there are particular approaches or sources that we should monitor for determining the extent to which an essential set of service providers is performing ROV filtering and executing on its BGP Plan. 20. We note that there are several publicly available, open-source software packages that validate BGP routing information based on information stored in the RPKI. We seek comment on the maturity of the open-source software used in route validation, the degree to which these are currently deployed by service providers, the extent to which such deployments verify that secure software design principles including testing for trustworthy operation have been utilized, and the extent to which such software receives continued support by contributors. We seek comment on the inclusion of deployment decisions in the BGP Plan, to include mitigation plans in cases where the public domain software is no longer supported or available. We also seek comment on other validators not listed by ARIN. 2. Subsequent BGP Plans 21. We propose that subsequent BGP Plans do not need to be filed with the Commission by large service providers that file an attestation that they have registered and maintained ROAs covering at least 90% of originated routes for IP address prefixes under their control. In other words, after the initial filings, large service providers that continue to have at least 90% of the originated IP address prefixes that they control covered by ROAs would not PO 00000 Frm 00012 Fmt 4702 Sfmt 4702 need to submit information about their process and future plans for assessing and prioritizing the creation and maintenance of ROAs in the RPKI, nor of their plans to conduct ROV filtering. Such a service provider, however, would be obligated to make its BGP Plan available to the Commission upon request from its staff. We anticipate that we may establish specific goals and deadlines for ROA registration in the future if progress is deemed insufficient after collaboration with federal interagency partners. 22. We seek comment as to whether the 90% ROA coverage metric is a reasonable standard for determining when the large service providers identified above should no longer be required to file BGP Plans after the filing of their initial plans. Commenters disagreeing with use of that standard should propose an alternative standard, along with reasons why the alternative better serves the overall purposes of this proceeding. 23. We also seek comment on the content that needs to be included in the BGP Plans prepared after the initial Plans. We anticipate that subsequent Plans would largely consist of updates to the initial Plans, so that the burden of preparing such Plans would be significantly less than preparing the initial Plans. We seek comment on that conclusion and on what information should be included in subsequent Plans. We seek comment on when the requirement to prepare subsequent BGP Plans annually should sunset, such as in five years. Would the information included in these plans become less important as the RPKI is extensively deployed? To that end, we seek comment on the frequency with which the Commission should revisit the form and content of BGP Plans. 3. BGP Plan Issues for Service Providers Other Than the Largest Providers 24. As discussed above, we are proposing to require service providers other than the largest providers as defined in this NPRM to prepare their BGP Plans generally in accordance with the same provisions. Such service providers would not have to file their BGP Plans with the Commission but would still need to make them available to the Commission upon receiving a request from its staff. We believe that the development of a BGP Plan—even if never requested by the Commission— would be important for securing BGP in the near term because it would require service providers to consider the benefits of creating and maintaining ROAs and conducting ROV filtering. We also think that those provisions E:\FR\FM\17JNP1.SGM 17JNP1 Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules khammond on DSKJM1Z7X2PROD with PROPOSALS generally take into account the different circumstances of various service providers. 25. Nevertheless, we also seek comment here on whether the information that these service providers would need to include in their BGP Plans should differ from the information required in the BGP Plans filed by the large service providers. If so, what information would not be needed, and why? In addition, to what extent should the required information change if they have maintained the 90% ROA threshold described above during the previous year? 26. We seek comment as well on whether to adopt significantly limited requirements for Tier 3 service providers—that is, those service providers that do not have peering relationships with any other providers and connect to the internet only through upstream transit providers. What information should be included in the BGP Plans prepared by such Tier 3 service providers? For instance, would it be sufficient for their BGP plans to attest to all of the Org_ID information used in ARIN’s WHOIS entries and to their ROA registration of their IP prefix(es), as well as to whether they have default BGP route(s) to their upstream provider(s) that all implement ROV on their traffic? B. BGP Routing Security Information— Quarterly Reports 27. In addition to the preparation of BGP plans, we propose to require a set of the largest service providers as defined in this NPRM to file specific data on a quarterly basis, which would be made publicly available by provider. We anticipate that such quarterly filings would allow the Commission to measure progress in ROA registration and maintenance and assess the reasonableness of the service provider’s BGP Plan (not only on an industry-wide basis but also by individual and types of service providers). Tier 1 service providers would need to file the quarterly data described in the paragraph below, which would show the extent to which the service provider has maintained that coverage. We propose that the first quarterly report be filed 30 days after the necessary steps are concluded to allow the relevant rule to take effect, and not from the date of publication of the adopted rule in the Federal Register. 28. We propose to include, and seek comment on including, the following information in quarterly reports concerning both ARIN allocated resources (i.e., ASN and IP prefix) and legacy number resources originally VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 issued to the service provider by an Internet Registry prior to the creation of ARIN: (i) List of all Registry Org_IDs for all AS and address allocations to the service provider (obtained from WHOIS); (ii) list of all ASNs held by service provider; (iii) list of ASNs held by service provider that it uses to originate routes; (iv) list of address holdings that have been reassigned or reallocated; (v) list of IP prefixes in originated routes that are covered by ROAs (grouped by originating AS number); and (vi) list of IP prefixes in originated routes that are not covered by a ROA (grouped by originating ASN). We seek comment as well on obtaining ROV-related data, including the extent to which ROV filtering is performed by the Tier 1 service provider for both directly connected peers with settlement-free access as well as their directly connected clients, including other service providers. We anticipate that much of the information requested would not vary by quarter, but that certain key data points related to ROA registrations could be tracked on a quarterly basis and would promote the Commission’s ability to assess RPKI trends. We seek comment as well on whether it would be helpful for PSHSB to develop a standardized template for quarterly data reporting. 29. As noted above, there may be special challenges in the cases of ROAs for routes pertaining to networks that are multi-homed, and so the prevalence of such routes may well be relevant in assessing the security of the BGP routing system. To what extent are service providers aware of multi-homing scenarios for the routes they originate, and can they enumerate and report on these use cases? Are there other sources of information on these cases? We believe that quarterly reporting is necessary, at least initially, to measure on a reasonably timely basis the evolution of RPKI-derived routing security, and to determine whether additional steps are needed—whether regulatory or otherwise—to encourage continued progress. We also believe that the data proposed for collection should be readily available within the individual service providers. In addition, once collected, it should not be burdensome to be updated on a quarterly basis. For instance, ARIN repositories are updated every five minutes, and the NIST RPKI Monitor updates its analyses every six hours to reflect the corresponding route collector updates. We seek comment as to whether the reporting obligations in this context should be reduced if a service provider files with the Commission an PO 00000 Frm 00013 Fmt 4702 Sfmt 4702 51289 attestation that—as specified above with regard to subsequent BGP Plans—it has achieved and maintained ROAs covering at least 90% of originated routes in IP address prefixes that it controls. In those cases, would semiannual or annual reporting be sufficient for monitoring that service provider’s progress toward full RPKI implementation? Would any data reporting be necessary? We seek comment on this approach. 30. In addition, this proposed direct reporting by service providers provides data, even though in the public domain, that is difficult, if not impossible, to reliably aggregate from publicly available sources. For instance, many service providers, especially the most widely accessed service providers, possess resources obtained from ARIN, including ASNs and IP address prefixes, under a wide variety of different Org IDs that are subject to change at any time. In addition, each publicly available measurement tool may have its own set of approaches and assumptions. We believe that direct reporting by a service provider of the requested information would not be burdensome because that information should be readily available to it. Reporting that information would help ensure that Commission staff and the service providers are considering BGP progress from the same set of facts. We seek comment on these observations. 31. We further seek comment on the utility of requiring non-public information related to the above, including the following: (i) number of invalid routes received from peers and customers; (ii) proportion of invalid routes received relative to the total routes received per peer and customer; (iii) number of routes filtered in cases where the service provider itself implements RPKI–ROV; (iv) number of observed instances, if any, where RPKI– ROV processes were shown to incorrectly deem routes invalid due to inaccurate ROAs or other reasons; and (v) number of origin hijack instances pertinent to routes for service providers’ address space that were (a) detected and (b) undetected during the reporting period. 32. Service Providers Other Than the Largest Providers. We propose that service providers other than the largest providers as defined in this NPRM do not need to file quarterly data reports, and we have proposed significantly limited data reporting requirements to be included in their annual BGP Plans. E:\FR\FM\17JNP1.SGM 17JNP1 khammond on DSKJM1Z7X2PROD with PROPOSALS 51290 Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules C. Confidential Treatment of BGP Plans and FOIA 33. We propose to treat the BGP Plans as confidential under our rules; we tentatively conclude that such Plans will contain highly confidential and competitively sensitive business information that the companies would not publicly reveal, and may also contain trade secrets. We seek comment on this conclusion, and on whether there are any other BGP routing security submissions that we might require that should be treated as confidential. We note that, pursuant to § 0.461(d)(3) of our rules, when the Commission receives a request under the Freedom of Information Act (FOIA) for inspection of records that are presumed confidential or have been submitted with a request for confidential treatment, the custodian of the records shall provide a copy of the request to the submitter of the information, who will be given 10 calendar days to submit a detailed written statement specifying the grounds for any objection to disclosure. If the submitter fails to respond, it will be considered to have no objection to disclosure. We seek comment on whether this notice process is routinely necessary for filings with the Commission of BGP Plan reports or of any other submissions we conclude should be treated as presumptively confidential. In particular, should staff have discretion, upon consideration of all the circumstances, whether to initiate the notice process for any such reports or to deny such requests, other than from governmental entities that may be granted confidential access in connection with their official functions, outright? Is there any appreciable possibility, given the competitive sensitivity of the information contained in such reports and its potential misuse to cause network harm, that a submitter might not treat this information as confidential and object to its disclosure? If not, what is the benefit of routinely undertaking the notice process? Are there particular considerations, for example, the type of information requested within the reports or the stated public interest purpose for the request, that may militate in favor of disclosure after notice to the submitter? Are there objective criteria, such as the age of the reports, under which confirmation of the submitter’s continued confidential treatment of the information and justification of its objection to disclosure should always be required? Are there any legal limitations on our ability to withhold the reports under Exemption 4 of the FOIA without confirming the submitter’s objection to VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 a specific information request? We invite comment on these and any other questions relating to our affording confidential treatment to any such reports. D. Other Issues 1. Possible Conditions on Service Provider Contracts 34. Based on our continuous engagement with industry and government stakeholders on BGP issues, we understand that a substantial portion of IP address prefixes issued by ARIN for the United States are prefixes for which service providers cannot register ROAs. As detailed above, these prefixes include circumstances in which the service provider has contractually reassigned IP prefixes received from ARIN to downstream providers or other client customers and therefore no longer controls the IP prefix for purposes of ROA registration. These cases also include circumstances in which the client customer has obtained the IP prefix (and possibly an ASN) directly from ARIN and therefore is the party able to register a ROA for those prefixes. In all these circumstances, we understand, the service provider has a contractual relationship with the holder of the IP address prefixes who is able to register ROAs with ARIN. 35. Given the substantial presence of these situations in the United States, it is critical to develop an overall strategy to address secure internet routing issues and implement solutions that facilitate more widespread registration of ROAs for these prefixes—the foundational step necessary to enable RPKI-based BGP security measures towards securing the nation’s communications from adversaries seeking to exploit BGP’s inherent vulnerabilities, and thereby promote public safety and protect against serious national security threats. We propose above that BGP Plans address in detail the steps that a service provider is taking to address these issues. We continue to recognize as well the continuing importance of outreach and education efforts. However, we are concerned that these steps may not be enough. 36. For instance, from our continuing stakeholder engagement, we understand that service providers believe that they are not in a position to insist in these situations that client customers register ROAs for these IP address prefixes. Unlike some internet participants that have successfully adopted policies that require ROA registration for interconnection, service providers believe that they are not in a position to adopt similar policies and practices PO 00000 Frm 00014 Fmt 4702 Sfmt 4702 because client customers are likely to have alternative options for their upstream service provider who would not insist that the IP address holder take the additional step of registering ROAs. 37. Because the benefits that the RPKI-based approach to a more secure BGP can contribute to national security are so great, we must consider all possible tools and options at our disposal in order to address these potential collective action issues. We therefore are seeking comment on the additional proposals below, which we believe to be in line with the whole-ofgovernment approach to ‘‘develop and drive adoption of solutions that will improve the security of the internet ecosystem and support research to understand and address reasons for slow adoption.’’ 38. In particular, we seek comment on possible conditions that the Commission should require service providers to place on current and future contracts. There are three separate cases to consider in this context: (i) where the IP address prefix was originally held by the service provider holding the ASN, who then reallocated/reassigned the prefix to a client; (ii) where the IP address was obtained directly from ARIN by the client; and (iii) where the service provider is propagating routes where the client has obtained both the ASN and the IP address prefixes that are to be originated. 39. We seek comment in such cases on the possibility of the following conditions to address cases where the service provider does not hold the IP address prefix in a route without a corresponding ROA: (i) prohibiting entry into new contracts unless those contracts contain plans for registering ROAs for the originated routes; (ii) requiring service providers to insist on ROA registrations by existing clients with IP prefixes it has transferred to them, or to ‘‘take back’’ any IP prefixes it has leased to clients; and (iii) requiring service providers, at the time of contract renewal (or after a set period, such as two years), to insist on having a plan for ROA registration from their client. We are, at the same time, mindful of our goal in this proceeding to avoid substantive BGP implementation obligations enforced by the Commission in favor of a reporting regime. 40. Again, we seek to address any potential for collective action issues under these circumstances. Would a service provider or its customer be likely to encounter any disincentives for the registration of ROAs, particularly if, in the absence of any conditions, other service providers are free not to do so? We seek comment on the likelihood that E:\FR\FM\17JNP1.SGM 17JNP1 khammond on DSKJM1Z7X2PROD with PROPOSALS Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules a service provider might lose customers if it wanted to require ROA registration (and/or ROV filtering) to be implemented by their peering or downstream neighbor. Assuming that a peering or downstream service provider (e.g., Tier 3 provider) might well choose a different transit provider to connect their customers to the internet if the alternate transit provider did not require the downstream service provider to register and maintain accurate ROA objects pertaining to its IP address prefixes, to what extent can providers of transit or other interconnectivity services incorporate mandatory language into the corresponding contractual agreements? 41. To address these potential collective action barriers to widespread ROA registration, we seek comment on requiring that providers’ contracts in these cases to provide for the registration of ROAs for the relevant IP address prefixes. For instance, as identified above, we seek comment on requiring service providers not to enter into new contracts to route traffic unless ROAs are registered for the relevant IP address prefixes. Should such contracts also require the holder of the IP prefix to maintain the active ROAs? We also seek comment on requiring service providers to mandate that clients with whom they have a direct contractual relationship to register their IP prefixes with ARIN. If a client refuses to register assigned prefixes, could a service provider ‘‘take back’’ unregistered IP address prefixes it has leased to others so as to enable the service provider to register ROAs for those prefixes? We recognize possible disruptions in certain cases that may outweigh the benefits, and so seek comment on imposing certain requirements at the time of contract renewal. In order to judge the potential benefits and costs of any such requirements, we seek comment on whether general industry standards exist for setting the term of any such contracts. We also recognize that any such requirement would depend on the provisions and terms of the existing contracts, as well as when their contracts are set to renew. We further seek comment on the percentage of client contracts that extend beyond two years of the publication of this proceeding. For instance, if a substantial percentage of contracts are five years or longer, should the Commission consider imposing requirements no later than a set time period, such as two years from the effective date of the adoption of rules. 42. In summary, we seek comment about the benefits and drawbacks of considering these and any other VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 regulatory approaches to encourage the creation and maintenance of ROAs in the RPKI through contractual requirements between service providers and their customers, and the provisioners of internet resources. 2. Possible ROV and ROA Requirements for Service Providers 43. We have sought comment above on whether the ROV implementation content of the BGP Plans of Tier 1 and Tier 2 service providers should differ depending on whether they are able to attest to certain ROV implementation. We here seek comment on proposals to require certain levels of implementation of ROV by Tier 1 and Tier 2 service providers. In particular, we seek comment on whether Tier 1 service providers should be required to achieve the ROV deployment described above within one year of the effective date of such a requirement, and whether Tier 2 service providers should be required to achieve the ROV deployment described above within two years of the effective date. As described above, ROV implementation is a critical piece of successful RPKI implementation, and we believe that those target dates are reasonable given the current state of ROV deployment. We seek comment on whether ROV implementation requirements would be consistent with the Commission’s expressed construction of the proposals contained in this NPRM to establish a framework for multistakeholder collaboration instead of a rigid regulatory mandate. 44. In the sections above we propose that the largest service providers prepare and file BGP Plans that address the service providers’ plans for registering and maintaining ROAs in the RPKI. Here, we seek comment on whether the Commission should establish goals and timelines for the largest service providers to register ROAs covering the routes they originate. If so, how should the Commission determine reasonably achievable goals and timelines for service providers? What factors should we consider in making those determinations? Should we set goals and timelines on an individualized basis for the largest providers dependent on the service provider’s individual circumstances? To what extent should the registration of certain ROAs in the RPKI be prioritized, and what should be the basis for identifying those ROAs and defining reasonable prioritization? Can we set meaningful goals and/or timelines on a standardized basis for those providers or for all service providers subject to this NPRM? Is there a floor below which ROA registration levels should raise PO 00000 Frm 00015 Fmt 4702 Sfmt 4702 51291 particular concern regarding whether ROAs registrations are being timely deployed? If so, commenters should provide specific suggestions, along with justifications. 3. Outreach and Education 45. We see a clear need for additional education efforts by the service providers, various stakeholder groups, ARIN, and governmental entities. As described below, we believe that a number of holders of IP address prefix(es) do not fully appreciate the importance of registering ROAs for their IP address prefix(es) to help protect those critical resources from being compromised in the internet routing system, with potentially disastrous consequences described in the examples above. Education about the substantial benefits of registering ROAs is a necessity. To what extent can or should large service providers as defined in this NPRM take steps to support ROA registration by other, downstream providers? We also think it is important to increase the options for holders of IP prefixes to register ROAs for those prefixes. 46. We seek comment in this context on steps we should consider to facilitate the creation and maintenance of ROAs in the RPKI. There are resources available to help entities of all sizes. For example, the RIRs provide guidance to help populate RPKI, including the registration and maintenance of ROAs. We seek comment on the extent to which such implementation guidance and resources help service providers of all sizes create and maintain ROAs over the IP address(es) that they originate from their networks. Are there any aspects that would be better served or supported by a government-led educational campaign seeking to drive awareness of the issue and facilitate increases in the proportions of ROAs to route originations in the RPKI repositories? If so, would the inclusion of our federal partners, for example, CISA, NIST, and ONCD in such a campaign, facilitate driving both awareness of the seriousness of the issue, as well as provide educational support for the process involved with accurately registering and actively maintaining ROAs in the RPKI infrastructure? What would the metric for ‘‘success’’ be for such an educational campaign? Should we request volunteers to join workshops to encourage and facilitate the creation and maintenance of ROAs? Additionally, how should we treat those cases where a downstream service provider holds its own or reassigned IP address space? E:\FR\FM\17JNP1.SGM 17JNP1 51292 Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules 47. We separately seek comment on the extent to which a government-led educational campaign could facilitate service providers increasing their level of ROV filtering on their own networks. Should we consider the relative size of the service provider in addition to the Tier category to which it might be considered to belong? Should such a campaign educate on both ROV filtering and ROA object registration and maintenance, or should they target them as separate campaigns? What would a metric for ‘‘success’’ be for such an educational campaign? Should we request volunteers to join workshops to encourage and facilitate the use of ROV filtering on certain parts of the networks they control? khammond on DSKJM1Z7X2PROD with PROPOSALS 4. ARIN Processes 48. ARIN is the RIR serving the United States and other countries within its coverage area. It maintains a RPKI repository publication point, offers hosted RPKI services, and is the source from which would-be resource holders/ network operators/service providers within the United States obtain internet number resources, such as ASNs and IP addresses. ARIN is also the entity that enables U.S. service providers to register, update, and publish ROAs. Beyond providing additional educational materials, conducting workshops, and outreach, ARIN has at least two initiatives that could facilitate the uptake of RPKI-based routing security measures: (i) ARIN had referred for community consultation a question from one of its members, that was filed in the form of a ticket, asking if reassigned address space holders can register their prefixes with ROAs, and thus take advantage of the benefits of RPKI origin validation; and (ii) ARIN is considering changes in its ROA creation processes to flag instances where attempted ROA registrations raise the possibility of misconfigurations. 5. Beyond RPKI Origin Validation— Further Efforts To Secure Internet Routing 49. Although the regulations proposed with this NPRM focus on securing route origination, we seek comment on techniques and architecture towards path validation as well. Path validation ensures the integrity and authenticity of the AS Path attribute. The only standard designed to address issues with path validation and plausibility is BGPsec. Implementing this is challenging due to the intensive cryptographic operations involved. A less complete guarantee on path security is offered by a work-inprogress effort from the IETF, known as autonomous system provider VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 authorization (ASPA). This effort is designed to detect invalid BGP AS_ PATHs by registering ASPA objects in the RPKI containing verifiable, attested information as to probable ASNs in the path. In addition, the ASPA approach accommodates incremental deployment, and ‘‘provides benefits to early adopters in the context of limited deployment.’’ These methods, however, are still undergoing discussion among the academic and standards community and are not ready for implementation. Although this NPRM focuses on issues with origin validation and the techniques currently available to address them, achieving a truly secure routing system will involve steps beyond deploying RPKI-based origin validation. We do not propose at this time to require service providers to implement measures or disclose efforts regarding path validation, but we note that their implementation is expected to be a critical, future step that service providers would need to take to secure their routing systems. We seek comment on the maturity of this work-in-progress and any anticipated timeline in which ASPA can be deployed after it has been standardized. Appendix A Technical Appendix: Additional Background on Inter-Domain Routing 1. Information traverses the internet in the data fields of internet protocol (IP) packets. Each version of IP (of which there are currently two established standards, IPv4 and IPv6) specifies the most fundamental formats and semantics of internet data transfer. Every IP packet includes a source and destination address, to indicate the source and destination of that IP packet, representing the corresponding endpoints. These networked endpoints may communicate through a medium access layer mechanism if the communicating endpoints are on a local area/non-routed network. Alternatively, when the networked endpoints are on separate networks, the endpoints communicate via IP routers that compile reachability data using routing protocols. In any sizable collection of networked endpoints, for reasons of resilient design and network management, individual Local Area Network segments are connected by IP routers that support one or more routing protocols. 2. Routing protocols implement the signaling mechanisms that exchange reachability information between or within independent networks, as to destinations available and the network paths by which to reach them. There are PO 00000 Frm 00016 Fmt 4702 Sfmt 4702 specialized categories of routing protocols for signaling, depending on whether the routing protocols are deployed within independent networks (Interior Gateway Protocols or IGPs) or between independently managed networks (External Gateway Protocols or EGPs). Each category of routing protocol has different performance characteristics and functional optimizations. Of the two major candidate protocols, Inter Domain Routing Protocol and the Border Gateway Protocol (BGP), that were considered for use as EGPs, BGP emerged as the ubiquitous deployment choice. As mentioned earlier, the internet consists of approximately 70,000 independently administered and managed networks at the time of writing. These networks use BGP to signal reachability information to reflect both technical priorities and business objectives, in terms of permitting a choice of the next hop of the path to carry their external traffic. In this way, BGP is termed as a ‘‘path vector’’ routing protocol. However, since BGP also supports business priorities by allowing path selection, BGP is also said to support policy based routing. 3. The networks interconnected by BGP are termed BGP Autonomous Systems (ASes) and are referred to by their Autonomous System Numbers (ASNs). An AS may include one or multiple separate networks, collectively all under the technical administration of a single entity. For BGP purposes, a network path is denoted as a string of ASNs termed an AS Path. The AS Path is one of the ‘‘BGP path attributes’’ or control variables used in signaling BGP reachability that influences how each BGP speaker selects routes to a specific destination. Originally, the AS Path was intended to reflect the initial ASN originating an advertisement for a prefix, as well as the succession of ASes traversed by a BGP update (the basic BGP message carrying signaling information). However, no means were provided to verify whether this attribute was correct or false in any way. Deliberations on how best to address this type of risk and others have occurred since at least 1997. As these and other references cited note, there are additional vulnerabilities that go beyond the ones described in this section. 4. A BGP route can be defined as a destination prefix associated with a string of BGP Path attributes. Attributes provide the semantics that affect how the BGP logic in each BGP speaker processes the routes it receives from other BGP speakers. The BGP hijacks referred to in this document deal with E:\FR\FM\17JNP1.SGM 17JNP1 khammond on DSKJM1Z7X2PROD with PROPOSALS Federal Register / Vol. 89, No. 117 / Monday, June 17, 2024 / Proposed Rules incidents associated with manipulating the AS Path attribute, including distorting or falsifying the Origin AS, or the originated route specificity. Some of the relatively more well-known routing incidents have involved these attack vectors. 5. Internet addressing conventions have implications for BGP routing, since BGP routers advertise the reachability of destination addresses to which they can find a path. Reachability information exchange occurs by exchanging BGP protocol data units or packets that contain the necessary information using the formats and semantics specified in BGP standard documents. To allow BGP routing to scale, Internet Service Providers (ISPs) are required to aggregate the IP address space in the route advertisements they originate into a compacted contiguous block that forms the ‘‘network prefix.’’ Doing so reduces the number of route table entries needed to cover the full scope of available internet destinations, thus diminishing the size of the routing table in those routers central to routing topology in the so-called ‘‘default-free zone.’’ Since memory and route look up speeds both affect router operation, this form of aggregation allows the number of addressable endpoints to grow and the internet to scale while still retaining acceptable performance in the routers that carry the most comprehensive sets of routes, in effect constituting a connectivity core for the internet. However, a route that is more specific than one that is aggregated is preferred by the BGP state machine, so announcing this will preferentially attract traffic relative to a route advertising an aggregate. This attack vector is somewhat distinct from AS PATH manipulation and has been used in prior BGP hijack incidents as well. 6. Details of the concepts introduced above are further explained in several accessible reference works, including the primer entitled ‘‘Security of the Internet’s Routing Infrastructure,’’ issued by the Broadband Internet Technical Advisory Group (BITAG). For more information beyond the summary descriptions in this section, readers are referred to the text on ‘‘Network Routing’’ in the Morgan Kaufman series in Networking or, for simplified review, the BITAG document as well as the OECD publication on routing security. Federal Communications Commission. Marlene Dortch, Secretary. [FR Doc. 2024–13048 Filed 6–14–24; 8:45 am] BILLING CODE 6712–01–P VerDate Sep<11>2014 16:30 Jun 14, 2024 Jkt 262001 FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 90 and 95 [ET Docket No. 19–138, DA 24–538; FR ID 225149] Use of the 5.850–5.925 GHz Band Federal Communications Commission. ACTION: Proposed rule. AGENCY: In this document, the Office of Engineering and Technology invites supplemental comment to address issues regarding the use of geofencing in cellular-vehicle-to-everything on-board units to reduce out-of-band emission power limits around specified federal radiolocation services. DATES: Interested parties may file comments on or before July 5, 2024. ADDRESSES: Pursuant to sections 1.415 and 1.419 of the Commission’s rules, 47 CFR 1.415, 1.419, interested parties may file comments on or before the dates provided in the ‘‘Dates’’ section of this Proposed Rule. Comments may be filed using the Commission’s Electronic Comment Filing System (ECFS). You may submit comments, identified by ET Docket No. 19–138 and referencing this public notice, by any of the following methods: • Electronic Filers: Comments may be filed electronically using the internet by accessing the ECFS: https:// www.fcc.gov/ecfs/. • Paper Filers: Parties who choose to file by paper must file an original and one copy of each filing. • Filings can be sent by hand or messenger delivery, by commercial overnight courier, or by First-Class or overnight U.S. Postal Service mail. All filings must be addressed to the Commission’s Secretary, Office of the Secretary, Federal Communications Commission. • All hand-delivered or messengerdelivered paper filings for the Commission’s Secretary are accepted between 8:00 a.m. and 4:00 p.m. at 9050 Junction Drive, Annapolis Junction, MD 20701. All hand deliveries must be held together with rubber bands or fasteners. Any envelopes and boxes must be disposed of before entering the building. • Commercial overnight deliveries (other than U.S. Postal Service Express Mail and Priority Mail) must be sent to 9050 Junction Drive, Annapolis Junction, MD 20701. • U.S. Postal Service First-Class, Express, and Priority mail must be addressed to Secretary, Federal Communications Commission, 45 L Street NE, Washington, DC 20554. SUMMARY: PO 00000 Frm 00017 Fmt 4702 Sfmt 4702 51293 • People with Disabilities: Contact the Commission to request reasonable accommodations (accessible format documents, sign language interpreters, CART, etc.) by email: FCC504@fcc.gov or phone: 202–418–0530 or TTY: 202– 418–0432. • Availability of Documents: Comments and ex parte submissions will be available via ECFS. Documents will be available electronically in ASCII, Microsoft Word, and/or Adobe Acrobat. FOR FURTHER INFORMATION CONTACT: Brian Butler of the Office of Engineering and Technology, at Brian.Butler@fcc.gov or 202–418–2702. SUPPLEMENTARY INFORMATION: This is a summary of the Office of Engineering and Technology’s Public Notice in ET Docket No. 19–138, DA 24–538, released June 11, 2024. The full text of this document is available for public inspection at the following internet address: https://www.fcc.gov/document/ oet-seeks-comment-board-unit-powerlimits-c-v2x-operations. Regulatory Flexibility Analysis. The Further Notice of Proposed Rulemaking (FNPRM) in ET Docket No. 19–138 included an Initial Regulatory Flexibility Analysis (‘‘IRFA’’) pursuant to 5 U.S.C. 603, exploring the potential impact on small entities of the Commission’s proposals. Use of the 5.850–5.925 GHz Band, 86 FR 23323, 23333–36 (May 3, 2021). We invite parties to file supplemental comments on the IRFA in light of this request to refresh the record. Paperwork Reduction Act Analysis. This document does not contain any new or modified information collection requirements subject to the Paperwork Reduction Act of 1995, Public Law 104– 13. Thus, it does not contain any new or modified information collection burden for small business concerns with fewer than 25 employees, pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107–198, see 44 U.S.C. 3506(c)(4). Ex Parte Presentations. This proceeding shall be treated as ‘‘permitbut-disclose’’ in accordance with the Commission’s ex parte rules. Persons making ex parte presentations must file a copy of any written presentation or a memorandum summarizing any oral presentation within two business days after the presentation (unless a different deadline applicable to the Sunshine period applies). Persons making oral ex parte presentations are reminded that memoranda summarizing the presentation must (1) list all persons attending or otherwise participating in the meeting at which the ex parte presentation was made, and (2) E:\FR\FM\17JNP1.SGM 17JNP1

Agencies

[Federal Register Volume 89, Number 117 (Monday, June 17, 2024)]
[Proposed Rules]
[Pages 51284-51293]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-13048]


=======================================================================
-----------------------------------------------------------------------

FEDERAL COMMUNICATIONS COMMISSION

47 CFR Part 1

[PS Docket Nos. 24-146, 22-90; RIN 3060-AL83; FCC 24-62; FR ID 225236]


Reporting on Border Gateway Protocol Risk Mitigation Progress; 
Secure Internet Routing

AGENCY: Federal Communications Commission

ACTION: Proposed rule.

-----------------------------------------------------------------------

SUMMARY: In this document, the Federal Communications Commission 
(Commission) seeks to increase the security of the information routed 
across the internet by proposing certain reporting obligations on 
providers of broadband internet access service (BIAS providers) and 
their use of the Border Gateway Protocol (BGP). Internet traffic can be 
disrupted, intercepted, and blackholed--when a service provider drops 
traffic addressed to a targeted IP address or range of addresses by 
redirecting it to a null route--due to either accidental or deliberate 
adversarial manipulation of security vulnerabilities inherent to BGP. 
Together, the intended effect of the plans, filings, and measures the 
Commission proposes would be to mitigate such threats. BIAS providers 
would be required to develop BGP Routing Security Risk Management Plans 
that describe their plans for and progress in implementing security 
measures that utilize the Resource Public Key Infrastructure (RPKI). 
Nine of the largest service providers would be required to file 
specific additional data on a quarterly basis. The FCC also seeks 
comment on issues related to implementing RPKI-based security measures.

DATES: Comments are due on or before July 17, 2024 and reply comments 
are due on or before August 1, 2024. Written comments on the Paperwork 
Reduction Act proposed information collection requirements must be 
submitted by the public and other interested parties on or before 
August 16, 2024.

ADDRESSES: You may submit comments, identified by PS Docket Nos. 24-146 
and 22-90, by any of the following methods:
     Federal Communications Commission's website: https://www.apps.fcc.gov/ecfs/. Follow the instructions for submitting 
comments.
     Mail: Parties who choose to file by paper must file an 
original and one copy of each filing. If more than one docket or 
rulemaking number appears in the caption of this proceeding, filers 
must submit two additional copies for each additional docket or 
rulemaking number. Filings can be sent by commercial overnight courier, 
or by first-class or overnight U.S. Postal Service mail. All filings 
must be addressed to the Commission's Secretary, Office of the 
Secretary, Federal Communications Commission. Commercial overnight mail 
(other than U.S. Postal Service Express Mail and Priority Mail) must be 
sent to 9050 Junction Drive, Annapolis Junction, MD 20701. U.S. Postal 
Service first-class, Express, and Priority mail must be addressed to 45 
L Street NE, Washington, DC 20554.
    Effective March 19, 2020, and until further notice, the Commission 
no longer accepts any hand or messenger delivered filings. This is a 
temporary measure taken to help protect the health and safety of 
individuals, and to mitigate the transmission of COVID-19. See FCC 
Announces Closure of FCC Headquarters Open Window and Change in Hand-
Delivery Policy, Public Notice, DA 20-304 (March 19, 2020). https://www.fcc.gov/document/fcc-closes-headquarters-open-window-and-changes-hand-delivery-policy.
    People with Disabilities. To request materials in accessible 
formats for people with disabilities (braille, large print, electronic 
files, audio format), send an email to [email protected] or call the 
Consumer & Governmental Affairs Bureau at 202-418-0530 (voice), 202-
418-0432 (TTY).

FOR FURTHER INFORMATION CONTACT: George Donato, Associate Division 
Chief, Cybersecurity and Communications Reliability Division, Public 
Safety and Homeland Security Bureau, (202) 418-0729, or by email to 
[email protected]; or James Zigouris, Attorney-Advisor, 
Cybersecurity and Communications Reliability Division, Public Safety 
and Homeland Security Bureau, (202) 418-0697, or by email to 
[email protected]; or Bradley Rosen, Attorney-Advisor, 
Cybersecurity and Communications Reliability Division, Public Safety 
and Homeland Security Bureau, (202) 418-0226, or by email to 
[email protected]. For additional information concerning the 
Paperwork Reduction Act information collection requirements contained 
in this document, send an email to [email protected] or contact Nicole 
Ongele, Office of Managing Director, Performance Evaluation and Records 
Management, 202-418-2991, or by email to [email protected].

SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Notice 
of Proposed Rulemaking (NPRM), PS Docket Nos. 24-146 and 22-90; FCC 24-
62, adopted June 6, 2024, and released June 7, 2024. The full text of 
this document is available by downloading the text from the 
Commission's website at: https://www.fcc.gov/document/fcc-proposes-internet-routing-security-reporting-requirements-0. When the FCC 
Headquarters reopens to the public, the full text of this document will 
also be available for public inspection and copying during regular 
business hours in the FCC Reference Center, 45 L Street NE, Washington, 
DC 20554. To request materials in accessible formats for people with 
disabilities (Braille, large print, electronic files, audio format), 
send an email to [email protected] or call the Consumer & Governmental 
Affairs Bureau at 202-418-0530 (voice), 202-418-0432 (TTY).
    Ex Parte Rules--Permit-But-Disclose: This proceeding shall be 
treated as a ``permit-but-disclose'' proceeding in accordance with the 
Commission's ex parte rules, with a limited exception described in the 
following paragraph. 47 CFR 1.1200, 1.1206. Persons making ex parte 
presentations must file a copy of any written presentation or a 
memorandum summarizing any oral presentation within two business days 
after the presentation (unless a different deadline applicable to the 
Sunshine period applies). Persons making oral ex parte presentations 
are reminded that memoranda summarizing the presentation must (1) list 
all persons attending or otherwise participating in the meeting at 
which the ex parte presentation was made, and (2) summarize all data 
presented and arguments made during the presentation. If the 
presentation consisted in whole or in part of the presentation of data 
or arguments already reflected in the presenter's written comments, 
memoranda or other filings in the proceeding, the presenter may provide 
citations to such data or arguments in his or her prior comments, 
memoranda, or other filings (specifying the relevant page and/or 
paragraph numbers where such data or arguments can be found) in lieu of 
summarizing them in the memorandum. Documents shown or given to 
Commission staff during ex parte meetings are deemed to

[[Page 51285]]

be written ex parte presentations and must be filed consistent with 
Sec.  1.1206(b). In proceedings governed by Sec.  1.49(f) or for which 
the Commission has made available a method of electronic filing, 
written ex parte presentations and memoranda summarizing oral ex parte 
presentations, and all attachments thereto, must be filed through the 
electronic comment filing system available for that proceeding, and 
must be filed in their native format (e.g., .doc, .xml, .ppt, 
searchable .pdf). Participants in this proceeding should familiarize 
themselves with the Commission's ex parte rules.
    In order to facilitate the free exchange of exploratory ideas among 
the staff of the federal agencies working toward the critical goal of 
promoting secure internet routing, we find the public interest requires 
a limited modification of the ex parte status in this proceeding. See 
47 CFR 1.1200(a). Communications between the Commission staff and staff 
of the Federal Government entities with a formal role in these internet 
security matters, i.e., Office of the National Cyber Director (ONCD), 
Cybersecurity and Infrastructure Security Agency (CISA), Department of 
Justice (DOJ), Office of the Director of National Intelligence, 
National Institute of Standards and Technology (NIST), and National 
Telecommunications and Information Administration (NTIA) shall be 
exempt from the rules requiring disclosure in permit-but-disclose 
proceedings and exempt from the prohibitions during the Sunshine Agenda 
period. See generally 47 CFR 1.1206, 1.1203. To be clear, while the 
Commission recognizes that consultation with these entities is 
critically important, the Commission will rely in its decision-making 
only on facts and arguments that are placed in the public record for 
this proceeding. To this end, the enumerated Federal Government 
entities, like all interested parties, should submit in the public 
record of this proceeding comments, reply comments, and other 
presentations presenting those facts and arguments they wish the 
Commission to rely on in its decision-making process. If the 
presentation made by staff of one of the federal agencies enumerated 
above is of ``substantial significance and clearly intended to affect 
the ultimate decision,'' the Commission will rely on such presented 
information in its decision-making process only if it coordinates in 
advance with the agency involved to ensure that such agency retains 
control over the timing and extent of any disclosure that may impact 
that agency's jurisdictional responsibilities. See 47 CFR 1.1206(b)(3).
    Paperwork Reduction Act: This document may contain proposed 
modified information collection requirements. Therefore, the Commission 
seeks comment on potential new or revised information collections 
subject to the Paperwork Reduction Act of 1995. If the Commission 
adopts any new or revised information collection requirements, the 
Commission will publish a notice in the Federal Register inviting the 
general public and the Office of Management and Budget to comment on 
the information collection requirements, as required by the Paperwork 
Reduction Act of 1995, Public Law 104-13. In addition, pursuant to the 
Small Business Paperwork Relief Act of 2002, Public Law 107-198, see 44 
U.S.C. 3506(c)(4), the Commission seeks specific comments on how it 
might further reduce the information collection burden for small 
business concerns with fewer than 25 employees.
    Regulatory Flexibility Act: The Regulatory Flexibility Act of 1980, 
as amended (RFA), requires an agency to prepare a regulatory 
flexibility analysis for notice-and-comment rulemakings, unless the 
agency certifies that ``the rule will not, if promulgated, have a 
significant economic impact on a substantial number of small 
entities.'' The Commission seeks comment on potential rule and policy 
changes contained in the document, and accordingly, has prepared an 
IRFA. The IRFA for this document in PS Docket Nos. 24-146 and 22-90 is 
set forth below in this document and written public comments are 
requested. Comments must be filed by the deadlines for comments on the 
NPRM indicated under the DATES section of this document and must have a 
separate and distinct heading designating them as responses to the 
IRFA. The Commission reminds commenters to file in the appropriate 
dockets: PS Docket Nos. 24-146 and 22-90.
    Providing Accountability Through Transparency Act: Consistent with 
the Providing Accountability Through Transparency Act, Public Law 118-
9, a summary of this document will be available on https://www.fcc.gov/proposed-rulemakings.

Synopsis

Introduction and Background

    1. Today, we are seeking comment on several proposals targeted 
towards improving the security of internet routing, in particular of 
BGP, which, as detailed above includes key vulnerabilities capable of 
impacting this nation's critical infrastructure. We intend these 
proposals to apply to providers of broadband internet access service on 
a mass market retail basis (BIAS), based primarily on our authority 
under Title II of the Communications Act. Our proposals take into 
account our understanding of the current state of industry 
participation in RPKI-based approaches to routing security, including 
the deployment of Route Origin Validation (ROV), from our active and 
continuing engagement on these issues with industry stakeholders and 
other government agencies. In short, there is an apparent wide 
disparity in the percentage of originated routes covered by Route 
Origin Authorizations (ROAs) and limited or incomplete support for ROV. 
Further action is urgently required.
    2. As of May 2024, only 38% of U.S. networks allow for the 
validation of their routing information by registering and maintaining 
ROAs in the RPKI. That figure is derived from data found in 
Cloudflare's Radar, and it is confirmed by data in the MANRS 
Observatory. The MANRS Observatory provides trend data for the 
maintenance of routing information in the RPKI by the networks 
participating in MANRS. There are other measurement tools publicly 
available online that reveal similar data, such as NIST's RPKI Monitor. 
Looking at an earlier date, as of December 2024, 36% of traffic 
originating from non-U.S. Federal Government networks was covered by a 
valid ROA, but less than 1% of traffic originating from U.S. Federal 
Government networks was covered by a valid ROA. Thus, we observe that 
the use of RPKI services across the internet has continued to increase 
over the past several years through service providers seeking to secure 
their BGP architectures. Despite the increasing deployment of RPKI-
based security measures by some service providers in the United States, 
service providers that participate in BGP routing will need to make 
additional progress to reduce exposure to the types of communications 
attacks described and the ensuing risks.
    3. Thus, consistent with comments filed by DOD, DOJ, and CISA in 
response to the Secure internet Routing NOI, we are proposing reporting 
obligations on service providers intended to help assess, prioritize, 
and maintain plans for utilizing the RPKI architecture to further BGP 
operational security. As the agency with regulatory authority in this 
area, we intend to continue our close collaboration with

[[Page 51286]]

other federal agencies which have been actively considering similar 
secure internet routing issues through National Cybersecurity Strategy 
initiatives. We seek comment on how the deployment of RPKI and other 
solutions may promote accountability through collaboration among key 
internet stakeholders, such as private, government, regulated, and 
unregulated entities, and between the United States and our global 
partners. Our proposals are largely focused on the preparation and 
filing of BGP Routing Security Risk Management Plans, but we do seek 
comment on certain additional measures that we believe hold promise for 
facilitating the implementation of RPKI-based routing security.

A. BGP Routing Security Risk Management Plans

    4. We propose to require service providers to prepare and maintain 
BGP Routing Security Risk Management Plans (BGP Plans) describing and 
attesting to the specific efforts they have made, and further plan to 
undertake, to create and maintain ROAs in the RPKI. We expect that 
requiring service providers to prepare plans on how they have and will 
institute RPKI, a solution developed through an open standards setting 
process, can promote participation in the standards setting process. 
The Commission continues to strongly support open standards setting 
processes, and that is also a core goal of strategic objective 4.1 of 
the National Cybersecurity Strategy. We seek comment on the impact that 
our reporting proposals may have on this goal.
    5. Under our proposals, BGP Plans can be risk-based performance 
plans, but would have to describe and attest to the extent to which the 
service provider conducts ROV filtering at the interconnection points 
between the service provider and its peers and clients, as well as 
describe any other methods at their disposal. These plans are to be 
updated on an annual basis. The following subsections discuss which 
service providers would be required to confidentially file their BGP 
Plans with the Commission, in addition to discussing the details that 
we propose should be included in all BGP Plans, whether filed with the 
Commission or not. Should the Commission promote risk-based solutions 
among service providers?
1. Initial BGP Plans
    6. We propose to require certain large service providers to file 
initial BGP Plans with the Commission. In particular, we propose to 
impose this filing requirement on all Tier 1 service providers as well 
as the other most significant service providers, which would currently 
include: AT&T, Inc.; Altice USA; Charter Communications; Comcast 
Corporation; Cox Communications, Inc.; Lumen Technologies, Inc.; T-
Mobile USA, Inc.; Telephone & Data Systems (including US Cellular); and 
Verizon Communications, Inc. These significant providers are likely to 
originate routes covering a large proportion of the IP address space in 
the United States and will play critical roles ensuring effective 
implementation of ROV filtering. The initial BGP plans prepared by 
service providers other than those suggested above would not need to be 
filed with the Commission but should be made available to FCC staff 
upon request. We propose, but seek comment on, a requirement that BGP 
Plans submitted to the Commission should be attested by a corporate 
officer at each service provider.
    7. We seek comment on whether we should require the filing of BGP 
Plans by a different set of service providers than those identified 
above. If so, commenters should explain the reasons for, and factors 
involved with, reaching that determination, and the feasibility of 
using particular metrics. For instance, should only the most 
significant service providers based on number of clients, or number of 
public peers, need to file? Or, should we choose based on other 
criteria, such as several of the following: the size of the address 
space under their control (through legacy ownership or assigned by 
ARIN), the number of customers, or the number of originated routes?
    8. We do not propose in this NPRM to set specific industry-wide 
substantive requirements with industry-wide deadlines. BGP Plans are 
intended to establish a mechanism by which the Commission, working in 
coordination with other federal agencies, can assess a service 
provider's actions to prioritize routing security through use of the 
RPKI architecture, measure its progress over time to evaluate the 
reasonableness of its BGP routing security risk management plan, and 
verify its commitments to following it. In addition, the development of 
BGP Plans by all service providers would be important for securing BGP 
operations in the near term because it would require service providers 
to consider the benefits of creating and maintaining ROAs and 
conducting ROV filtering. We recognize that service providers often 
have different network architectures and different technologies, partly 
as a reflection of the types of customers and services offered, and 
that these differences may have affected the speed with which they have 
deployed RPKI and may affect their plans going forward. We seek comment 
on whether our proposals address these issues and promote the 
implementation of routing security among U.S. service providers. The 
specific BGP Plan requirements concerning ROAs and ROV are discussed 
seriatim. We seek comment generally on whether it would be helpful for 
the Public Safety and Homeland Security Bureau (PSHSB) to develop a 
standardized template for preparing BGP Plans. We also seek comment on 
how service providers should respond if mandatory elements of a BGP 
Plan do not apply to their particular circumstances.
a. Creating and Maintaining Route Origin Authorizations
    9. Registering and maintaining updated ROAs with the appropriate 
internet registry is a critical and necessary step for securing BGP 
operation in the near term. At present, only the holders of specific IP 
address prefixes can register ROAs for originated routes that pertain 
to those prefixes. As a result, a service provider is able to directly 
register and manage ROAs only when it controls the IP address 
prefix(es) in question. An effective path forward must therefore take 
into account the difference in the service provider's route origination 
control over the IP prefix(es) assigned to it by ARIN. The information 
we would require service providers to submit would depend on the 
various categories of IP address prefixes for which a service provider 
can be the route originator. In the subsections below, we discuss the 
different cases that we have observed in which the service provider 
either does or does not control the IP address prefix(es) assigned or 
allocated to it and route originations for the same. We anticipate that 
most service providers will be originating routes for prefixes drawn 
from all these cases. We would evaluate RPKI deployment in each set of 
circumstances differently depending on what type of control the service 
provider has over route originations to various IP address prefix(es).
i. Cases Where the Service Provider Controls the ASNs and IP Address 
Prefix(es)
    10. We first consider where a service provider has full authority 
to register ROAs because it controls the associated IP address 
prefix(es). ROAs are registered with the responsible regional registry, 
which is ARIN for the United States and North America. ARIN assigns

[[Page 51287]]

ASNs and IP address prefixes to the Local Internet Registries (LIRs). 
As set out in the ARIN Manual, LIRs are ``generally ISPs whose 
customers are primarily end users and possibly other ISPs.'' The ISP 
might in turn designate a subset of the IP address space it holds to be 
used by its customers, but in the current ARIN operational convention 
only the original ISP can register ROAs even for reallocated address 
space.
    11. For these cases, we propose that BGP Plans would be required to 
include a detailed description of the service provider's process for 
assessing and prioritizing the creation and maintenance of ROAs which 
cover the routes originating from their networks. We contemplate that 
general statements that a service provider is following a risk-based 
approach would not be sufficient to satisfy the requirement for a 
detailed description. Rather, we believe there should be sufficient 
reporting to understand whether each service provider is taking 
meaningful action to assess its risk posture and that it prioritizes 
implementing protections accordingly. The BGP Plan would incorporate 
and explain in detail factors affecting the service provider's ability 
to register and maintain ROAs for its IP address prefix(es). We seek 
comment on whether a BGP Plan should include specific goals for the 
service provider pertaining to ROA registrations as well as estimated 
timetables for attaining those goals. We seek comment on what criteria 
providers should include in their BGP Plans for measuring progress in 
deployment of BGP origin validation, as well as what specific details 
should be provided to describe the service provider's plans for 
creating and maintaining ROAs going forward. We seek comment as well on 
whether there are alternatives to ROAs or to specific ROA registration 
goals that would ensure continued progress in the implementation of 
RPKI, and if so, what they would be. We propose that the initial BGP 
Plans that are to be filed with the Commission should be filed no later 
than 90 days after the effective date of the requirement.
    12. We seek comment on the criteria by which we should evaluate the 
relevance of individual BGP Plans filed with, or reviewed by, the 
Commission. We recognize, for instance, that different service 
providers are in substantially different positions regarding the extent 
to which they control the ASN and the IP address prefixes that they 
originate. We also understand that some service providers have fewer 
in-house resources available than others. We recognize as well that the 
processes for creating ROAs for legacy number resources originally 
issued to the service provider by an Internet Registry prior to the 
creation of ARIN may raise additional issues, and we seek comment on 
how our proposals may address those issues. Finally, we anticipate 
receiving detailed explanations if a service provider contends that 
``multi-homing,'' traffic engineering, or some other factor 
significantly reduces its ability to increase and maintain ROA coverage 
for IP prefixes they control. Regarding multi-homing, are there 
measures that would facilitate coordinating all necessary ROAs for all 
the ASNs that may originate routes to the same prefix? What are factors 
that might inhibit such coordination? If at least one ROA registration 
of the IP prefix is valid, is that sufficient to protect the IP prefix 
even if there are other invalid registrations for that prefix?
    13. To help ensure that we are accurately measuring and tracking 
the status of ROA registrations, we seek comment regarding the metrics 
offered by several publicly available tools. The NIST RPKI Monitor is 
one example of these tools, but there are others available, too. We 
seek comment on the relative merits of such publicly available tools 
that track the status of ROA registrations covering route originations, 
including their utility in measuring providers' execution of their 
individual BGP Plans. Which, if any, are perceived to be more accurate 
or comprehensive than others? Should the FCC select one tool, based on 
comments submitted, to use to track ROA coverage? Or, should the FCC 
use a subset of public monitoring tools and cross-reference among them 
to track and analyze ROA coverage?
ii. Cases Where the Service Provider Does Not Control the IP Address 
Prefix(es)
    14. We next consider the information we propose to require in an 
initial BGP Plan in cases where we understand that service providers 
are unable to register a ROA because that service provider does not 
control the IP address prefix(es) in question. This apparently can 
happen in three instances: (1) A service provider can contractually 
reassign one or more IP address prefixes to downstream providers or 
other client customers, who are then the entities able to register ROAs 
for those prefixes. (2) A party may obtain its own IP prefix directly 
from ARIN and use the service provider as its upstream provider. (3) A 
party may obtain its own ASN and IP prefix directly from ARIN and 
contract with the service provider to propagate the route. In those 
cases, we understand that the entity which controls the associated IP 
address prefix(es) in the RIR (ARIN), would have to register ROAs for 
those prefixes. In order to implement RPKI-based improvements to BGP 
security architectures successfully and to create a healthy ecosystem, 
it is essential that every entity that controls IP address prefixes 
effects all necessary coordination to register the associated ROAs.
    15. For these cases, we propose to require that a service 
provider's initial BGP Plan describe the status of the ROA 
registrations for routes they originate within these three cases. We 
propose that the BGP Plan explain the reason(s) why the service 
provider is unable to register particular sets of IP prefixes. The Plan 
should also describe in detail the service provider's efforts and plans 
for facilitating the ROA registrations for the IP prefixes that have 
been transferred and not under its control. Among other issues, we 
believe that BGP Plans would need to describe the steps that the 
service provider takes to identify and address cases in which customers 
or clients with their own IP prefixes are multi-homed and the frequency 
it encounters multi-homing. In multi-homing situations where it is the 
responsibility of the customer or client to create and register, rather 
than the service provider, the chances for errors in ROA registration 
may be greater, potentially resulting in the customer's traffic 
becoming blackholed through a given provider. We understand that in 
many cases, the service provider will have direct contractual 
relationships with the holder of the IP address prefixes and will be, 
or can be, made aware of the ROA registration status of those prefixes 
with ARIN. Although the service provider itself is not able at this 
time to register ROAs in these circumstances, we are seeking comment on 
the steps that service providers can or should do to help secure ROAs 
for the IP address space held by downstream clients.
b. Route Origin Validation Filtering
    16. The implementation of ROV is necessary to determine whether 
received route advertisements are legitimate when checked against ROAs 
in the RPKI repositories. ROV is the step in origin validation 
predicated on the existence of ROAs, and is the key action that 
facilitates detection of invalid or unknown route originations that 
indicate a prefix is being incorrectly advertised, either maliciously 
or accidentally, by a service provider or enterprise network. For the 
RPKI to be effective, most if not all service providers will need 
either to conduct ROV filtering in their interconnections

[[Page 51288]]

with other service providers, or to have contractual commitments with 
third parties to have routes propagated to them subject to ROV 
filtering. Moreover, to fully realize the origin validation benefits of 
the RPKI, some service providers may need to perform ROV filtering in 
interconnections with their clients. In this way, the service provider 
examines incoming BGP routing announcements from its peers in addition 
to its clients. In cases where a service provider is downstream from a 
more widely accessed provider (e.g., stub networks), there could be 
great benefits from the downstream provider relying on the ROV 
filtering performed by its upstream provider.
    17. We propose that the BGP Plan of a Tier 1 service provider 
should describe the extent to which it has implemented ROV filtering at 
its interconnection points with its peers as well as its customers, and 
to what extent ROV has been disabled or not deployed within its 
network. We also propose that BGP Plans describe, to the extent 
applicable, any contractual requirements a service provider may have 
for upstream third-parties to provide ROV filtering for incoming 
routes. We seek comment on whether this information would be required 
of all BGP Plans, whether filed with the Commission or made available 
upon request. We believe that this information is likely to be most 
relevant for Tier 3 service providers who do not have peering 
relationships and solely rely on contracts with other upstream service 
providers. We seek comment on the use of this information to monitor 
the effective deployment of ROV.
    18. We also seek comment on two proposals regarding the 
implementation of ROV filtering that potentially may affect the ROV 
information that needs to be included in certain providers' BGP Plans. 
We seek comment, first, on whether it would be sufficient if a 
corporate officer or other responsible official at a Tier 1 service 
provider attests that it supports ROV for all directly connected peers 
with settlement-free access as well as their directly connected 
clients, including other service providers. We seek comment, second, on 
whether it would be sufficient if such official within a Tier 2 service 
provider attests that it is implementing ROV filtering in peering 
relationships with other Tier 2 providers, and have contractual 
relationships with Tier 1 providers that require Tier 1 providers to 
perform ROV filtering on traffic being terminated to the Tier 2 
provider. We seek comment as to whether there are circumstances where 
Tier 2 service providers need not provide ROV support for clients that 
participate in BGP routing. We also seek comment on the extent to 
which, if we adopt such proposals, ROV information needs to be included 
in a provider's BGP Plan.
    19. We recognize that there are no publicly available resources 
that allow comprehensive third-party measurement and validation 
regarding the extent that service providers conduct ROV filtering. 
Third-party measurement methodologies involve some degree of sampling 
and estimation and come with varying strengths and weaknesses. For 
example, APNIC, Cloudflare, and Virginia Tech (RoVISTA), are examples 
of entities which have developed methodologies using various sampling 
techniques to assess the degree of ROV filtering prevalent, and which 
make the resulting assessments public. We propose to monitor a limited 
set of respected consensus methodologies to determine whether the set, 
as a whole, shows consistent trends and patterns. We seek comment on 
whether there are particular approaches or sources that we should 
monitor for determining the extent to which an essential set of service 
providers is performing ROV filtering and executing on its BGP Plan.
    20. We note that there are several publicly available, open-source 
software packages that validate BGP routing information based on 
information stored in the RPKI. We seek comment on the maturity of the 
open-source software used in route validation, the degree to which 
these are currently deployed by service providers, the extent to which 
such deployments verify that secure software design principles 
including testing for trustworthy operation have been utilized, and the 
extent to which such software receives continued support by 
contributors. We seek comment on the inclusion of deployment decisions 
in the BGP Plan, to include mitigation plans in cases where the public 
domain software is no longer supported or available. We also seek 
comment on other validators not listed by ARIN.
2. Subsequent BGP Plans
    21. We propose that subsequent BGP Plans do not need to be filed 
with the Commission by large service providers that file an attestation 
that they have registered and maintained ROAs covering at least 90% of 
originated routes for IP address prefixes under their control. In other 
words, after the initial filings, large service providers that continue 
to have at least 90% of the originated IP address prefixes that they 
control covered by ROAs would not need to submit information about 
their process and future plans for assessing and prioritizing the 
creation and maintenance of ROAs in the RPKI, nor of their plans to 
conduct ROV filtering. Such a service provider, however, would be 
obligated to make its BGP Plan available to the Commission upon request 
from its staff. We anticipate that we may establish specific goals and 
deadlines for ROA registration in the future if progress is deemed 
insufficient after collaboration with federal interagency partners.
    22. We seek comment as to whether the 90% ROA coverage metric is a 
reasonable standard for determining when the large service providers 
identified above should no longer be required to file BGP Plans after 
the filing of their initial plans. Commenters disagreeing with use of 
that standard should propose an alternative standard, along with 
reasons why the alternative better serves the overall purposes of this 
proceeding.
    23. We also seek comment on the content that needs to be included 
in the BGP Plans prepared after the initial Plans. We anticipate that 
subsequent Plans would largely consist of updates to the initial Plans, 
so that the burden of preparing such Plans would be significantly less 
than preparing the initial Plans. We seek comment on that conclusion 
and on what information should be included in subsequent Plans. We seek 
comment on when the requirement to prepare subsequent BGP Plans 
annually should sunset, such as in five years. Would the information 
included in these plans become less important as the RPKI is 
extensively deployed? To that end, we seek comment on the frequency 
with which the Commission should revisit the form and content of BGP 
Plans.
3. BGP Plan Issues for Service Providers Other Than the Largest 
Providers
    24. As discussed above, we are proposing to require service 
providers other than the largest providers as defined in this NPRM to 
prepare their BGP Plans generally in accordance with the same 
provisions. Such service providers would not have to file their BGP 
Plans with the Commission but would still need to make them available 
to the Commission upon receiving a request from its staff. We believe 
that the development of a BGP Plan--even if never requested by the 
Commission--would be important for securing BGP in the near term 
because it would require service providers to consider the benefits of 
creating and maintaining ROAs and conducting ROV filtering. We also 
think that those provisions

[[Page 51289]]

generally take into account the different circumstances of various 
service providers.
    25. Nevertheless, we also seek comment here on whether the 
information that these service providers would need to include in their 
BGP Plans should differ from the information required in the BGP Plans 
filed by the large service providers. If so, what information would not 
be needed, and why? In addition, to what extent should the required 
information change if they have maintained the 90% ROA threshold 
described above during the previous year?
    26. We seek comment as well on whether to adopt significantly 
limited requirements for Tier 3 service providers--that is, those 
service providers that do not have peering relationships with any other 
providers and connect to the internet only through upstream transit 
providers. What information should be included in the BGP Plans 
prepared by such Tier 3 service providers? For instance, would it be 
sufficient for their BGP plans to attest to all of the Org_ID 
information used in ARIN's WHOIS entries and to their ROA registration 
of their IP prefix(es), as well as to whether they have default BGP 
route(s) to their upstream provider(s) that all implement ROV on their 
traffic?

B. BGP Routing Security Information--Quarterly Reports

    27. In addition to the preparation of BGP plans, we propose to 
require a set of the largest service providers as defined in this NPRM 
to file specific data on a quarterly basis, which would be made 
publicly available by provider. We anticipate that such quarterly 
filings would allow the Commission to measure progress in ROA 
registration and maintenance and assess the reasonableness of the 
service provider's BGP Plan (not only on an industry-wide basis but 
also by individual and types of service providers). Tier 1 service 
providers would need to file the quarterly data described in the 
paragraph below, which would show the extent to which the service 
provider has maintained that coverage. We propose that the first 
quarterly report be filed 30 days after the necessary steps are 
concluded to allow the relevant rule to take effect, and not from the 
date of publication of the adopted rule in the Federal Register.
    28. We propose to include, and seek comment on including, the 
following information in quarterly reports concerning both ARIN 
allocated resources (i.e., ASN and IP prefix) and legacy number 
resources originally issued to the service provider by an Internet 
Registry prior to the creation of ARIN: (i) List of all Registry 
Org_IDs for all AS and address allocations to the service provider 
(obtained from WHOIS); (ii) list of all ASNs held by service provider; 
(iii) list of ASNs held by service provider that it uses to originate 
routes; (iv) list of address holdings that have been reassigned or 
reallocated; (v) list of IP prefixes in originated routes that are 
covered by ROAs (grouped by originating AS number); and (vi) list of IP 
prefixes in originated routes that are not covered by a ROA (grouped by 
originating ASN). We seek comment as well on obtaining ROV-related 
data, including the extent to which ROV filtering is performed by the 
Tier 1 service provider for both directly connected peers with 
settlement-free access as well as their directly connected clients, 
including other service providers. We anticipate that much of the 
information requested would not vary by quarter, but that certain key 
data points related to ROA registrations could be tracked on a 
quarterly basis and would promote the Commission's ability to assess 
RPKI trends. We seek comment as well on whether it would be helpful for 
PSHSB to develop a standardized template for quarterly data reporting.
    29. As noted above, there may be special challenges in the cases of 
ROAs for routes pertaining to networks that are multi-homed, and so the 
prevalence of such routes may well be relevant in assessing the 
security of the BGP routing system. To what extent are service 
providers aware of multi-homing scenarios for the routes they 
originate, and can they enumerate and report on these use cases? Are 
there other sources of information on these cases? We believe that 
quarterly reporting is necessary, at least initially, to measure on a 
reasonably timely basis the evolution of RPKI-derived routing security, 
and to determine whether additional steps are needed--whether 
regulatory or otherwise--to encourage continued progress. We also 
believe that the data proposed for collection should be readily 
available within the individual service providers. In addition, once 
collected, it should not be burdensome to be updated on a quarterly 
basis. For instance, ARIN repositories are updated every five minutes, 
and the NIST RPKI Monitor updates its analyses every six hours to 
reflect the corresponding route collector updates. We seek comment as 
to whether the reporting obligations in this context should be reduced 
if a service provider files with the Commission an attestation that--as 
specified above with regard to subsequent BGP Plans--it has achieved 
and maintained ROAs covering at least 90% of originated routes in IP 
address prefixes that it controls. In those cases, would semi-annual or 
annual reporting be sufficient for monitoring that service provider's 
progress toward full RPKI implementation? Would any data reporting be 
necessary? We seek comment on this approach.
    30. In addition, this proposed direct reporting by service 
providers provides data, even though in the public domain, that is 
difficult, if not impossible, to reliably aggregate from publicly 
available sources. For instance, many service providers, especially the 
most widely accessed service providers, possess resources obtained from 
ARIN, including ASNs and IP address prefixes, under a wide variety of 
different Org IDs that are subject to change at any time. In addition, 
each publicly available measurement tool may have its own set of 
approaches and assumptions. We believe that direct reporting by a 
service provider of the requested information would not be burdensome 
because that information should be readily available to it. Reporting 
that information would help ensure that Commission staff and the 
service providers are considering BGP progress from the same set of 
facts. We seek comment on these observations.
    31. We further seek comment on the utility of requiring non-public 
information related to the above, including the following: (i) number 
of invalid routes received from peers and customers; (ii) proportion of 
invalid routes received relative to the total routes received per peer 
and customer; (iii) number of routes filtered in cases where the 
service provider itself implements RPKI-ROV; (iv) number of observed 
instances, if any, where RPKI-ROV processes were shown to incorrectly 
deem routes invalid due to inaccurate ROAs or other reasons; and (v) 
number of origin hijack instances pertinent to routes for service 
providers' address space that were (a) detected and (b) undetected 
during the reporting period.
    32. Service Providers Other Than the Largest Providers. We propose 
that service providers other than the largest providers as defined in 
this NPRM do not need to file quarterly data reports, and we have 
proposed significantly limited data reporting requirements to be 
included in their annual BGP Plans.

[[Page 51290]]

C. Confidential Treatment of BGP Plans and FOIA

    33. We propose to treat the BGP Plans as confidential under our 
rules; we tentatively conclude that such Plans will contain highly 
confidential and competitively sensitive business information that the 
companies would not publicly reveal, and may also contain trade 
secrets. We seek comment on this conclusion, and on whether there are 
any other BGP routing security submissions that we might require that 
should be treated as confidential. We note that, pursuant to Sec.  
0.461(d)(3) of our rules, when the Commission receives a request under 
the Freedom of Information Act (FOIA) for inspection of records that 
are presumed confidential or have been submitted with a request for 
confidential treatment, the custodian of the records shall provide a 
copy of the request to the submitter of the information, who will be 
given 10 calendar days to submit a detailed written statement 
specifying the grounds for any objection to disclosure. If the 
submitter fails to respond, it will be considered to have no objection 
to disclosure. We seek comment on whether this notice process is 
routinely necessary for filings with the Commission of BGP Plan reports 
or of any other submissions we conclude should be treated as 
presumptively confidential. In particular, should staff have 
discretion, upon consideration of all the circumstances, whether to 
initiate the notice process for any such reports or to deny such 
requests, other than from governmental entities that may be granted 
confidential access in connection with their official functions, 
outright? Is there any appreciable possibility, given the competitive 
sensitivity of the information contained in such reports and its 
potential misuse to cause network harm, that a submitter might not 
treat this information as confidential and object to its disclosure? If 
not, what is the benefit of routinely undertaking the notice process? 
Are there particular considerations, for example, the type of 
information requested within the reports or the stated public interest 
purpose for the request, that may militate in favor of disclosure after 
notice to the submitter? Are there objective criteria, such as the age 
of the reports, under which confirmation of the submitter's continued 
confidential treatment of the information and justification of its 
objection to disclosure should always be required? Are there any legal 
limitations on our ability to withhold the reports under Exemption 4 of 
the FOIA without confirming the submitter's objection to a specific 
information request? We invite comment on these and any other questions 
relating to our affording confidential treatment to any such reports.

D. Other Issues

1. Possible Conditions on Service Provider Contracts
    34. Based on our continuous engagement with industry and government 
stakeholders on BGP issues, we understand that a substantial portion of 
IP address prefixes issued by ARIN for the United States are prefixes 
for which service providers cannot register ROAs. As detailed above, 
these prefixes include circumstances in which the service provider has 
contractually reassigned IP prefixes received from ARIN to downstream 
providers or other client customers and therefore no longer controls 
the IP prefix for purposes of ROA registration. These cases also 
include circumstances in which the client customer has obtained the IP 
prefix (and possibly an ASN) directly from ARIN and therefore is the 
party able to register a ROA for those prefixes. In all these 
circumstances, we understand, the service provider has a contractual 
relationship with the holder of the IP address prefixes who is able to 
register ROAs with ARIN.
    35. Given the substantial presence of these situations in the 
United States, it is critical to develop an overall strategy to address 
secure internet routing issues and implement solutions that facilitate 
more widespread registration of ROAs for these prefixes--the 
foundational step necessary to enable RPKI-based BGP security measures 
towards securing the nation's communications from adversaries seeking 
to exploit BGP's inherent vulnerabilities, and thereby promote public 
safety and protect against serious national security threats. We 
propose above that BGP Plans address in detail the steps that a service 
provider is taking to address these issues. We continue to recognize as 
well the continuing importance of outreach and education efforts. 
However, we are concerned that these steps may not be enough.
    36. For instance, from our continuing stakeholder engagement, we 
understand that service providers believe that they are not in a 
position to insist in these situations that client customers register 
ROAs for these IP address prefixes. Unlike some internet participants 
that have successfully adopted policies that require ROA registration 
for interconnection, service providers believe that they are not in a 
position to adopt similar policies and practices because client 
customers are likely to have alternative options for their upstream 
service provider who would not insist that the IP address holder take 
the additional step of registering ROAs.
    37. Because the benefits that the RPKI-based approach to a more 
secure BGP can contribute to national security are so great, we must 
consider all possible tools and options at our disposal in order to 
address these potential collective action issues. We therefore are 
seeking comment on the additional proposals below, which we believe to 
be in line with the whole-of-government approach to ``develop and drive 
adoption of solutions that will improve the security of the internet 
ecosystem and support research to understand and address reasons for 
slow adoption.''
    38. In particular, we seek comment on possible conditions that the 
Commission should require service providers to place on current and 
future contracts. There are three separate cases to consider in this 
context: (i) where the IP address prefix was originally held by the 
service provider holding the ASN, who then reallocated/reassigned the 
prefix to a client; (ii) where the IP address was obtained directly 
from ARIN by the client; and (iii) where the service provider is 
propagating routes where the client has obtained both the ASN and the 
IP address prefixes that are to be originated.
    39. We seek comment in such cases on the possibility of the 
following conditions to address cases where the service provider does 
not hold the IP address prefix in a route without a corresponding ROA: 
(i) prohibiting entry into new contracts unless those contracts contain 
plans for registering ROAs for the originated routes; (ii) requiring 
service providers to insist on ROA registrations by existing clients 
with IP prefixes it has transferred to them, or to ``take back'' any IP 
prefixes it has leased to clients; and (iii) requiring service 
providers, at the time of contract renewal (or after a set period, such 
as two years), to insist on having a plan for ROA registration from 
their client. We are, at the same time, mindful of our goal in this 
proceeding to avoid substantive BGP implementation obligations enforced 
by the Commission in favor of a reporting regime.
    40. Again, we seek to address any potential for collective action 
issues under these circumstances. Would a service provider or its 
customer be likely to encounter any disincentives for the registration 
of ROAs, particularly if, in the absence of any conditions, other 
service providers are free not to do so? We seek comment on the 
likelihood that

[[Page 51291]]

a service provider might lose customers if it wanted to require ROA 
registration (and/or ROV filtering) to be implemented by their peering 
or downstream neighbor. Assuming that a peering or downstream service 
provider (e.g., Tier 3 provider) might well choose a different transit 
provider to connect their customers to the internet if the alternate 
transit provider did not require the downstream service provider to 
register and maintain accurate ROA objects pertaining to its IP address 
prefixes, to what extent can providers of transit or other 
interconnectivity services incorporate mandatory language into the 
corresponding contractual agreements?
    41. To address these potential collective action barriers to 
widespread ROA registration, we seek comment on requiring that 
providers' contracts in these cases to provide for the registration of 
ROAs for the relevant IP address prefixes. For instance, as identified 
above, we seek comment on requiring service providers not to enter into 
new contracts to route traffic unless ROAs are registered for the 
relevant IP address prefixes. Should such contracts also require the 
holder of the IP prefix to maintain the active ROAs? We also seek 
comment on requiring service providers to mandate that clients with 
whom they have a direct contractual relationship to register their IP 
prefixes with ARIN. If a client refuses to register assigned prefixes, 
could a service provider ``take back'' unregistered IP address prefixes 
it has leased to others so as to enable the service provider to 
register ROAs for those prefixes? We recognize possible disruptions in 
certain cases that may outweigh the benefits, and so seek comment on 
imposing certain requirements at the time of contract renewal. In order 
to judge the potential benefits and costs of any such requirements, we 
seek comment on whether general industry standards exist for setting 
the term of any such contracts. We also recognize that any such 
requirement would depend on the provisions and terms of the existing 
contracts, as well as when their contracts are set to renew. We further 
seek comment on the percentage of client contracts that extend beyond 
two years of the publication of this proceeding. For instance, if a 
substantial percentage of contracts are five years or longer, should 
the Commission consider imposing requirements no later than a set time 
period, such as two years from the effective date of the adoption of 
rules.
    42. In summary, we seek comment about the benefits and drawbacks of 
considering these and any other regulatory approaches to encourage the 
creation and maintenance of ROAs in the RPKI through contractual 
requirements between service providers and their customers, and the 
provisioners of internet resources.
2. Possible ROV and ROA Requirements for Service Providers
    43. We have sought comment above on whether the ROV implementation 
content of the BGP Plans of Tier 1 and Tier 2 service providers should 
differ depending on whether they are able to attest to certain ROV 
implementation. We here seek comment on proposals to require certain 
levels of implementation of ROV by Tier 1 and Tier 2 service providers. 
In particular, we seek comment on whether Tier 1 service providers 
should be required to achieve the ROV deployment described above within 
one year of the effective date of such a requirement, and whether Tier 
2 service providers should be required to achieve the ROV deployment 
described above within two years of the effective date. As described 
above, ROV implementation is a critical piece of successful RPKI 
implementation, and we believe that those target dates are reasonable 
given the current state of ROV deployment. We seek comment on whether 
ROV implementation requirements would be consistent with the 
Commission's expressed construction of the proposals contained in this 
NPRM to establish a framework for multistakeholder collaboration 
instead of a rigid regulatory mandate.
    44. In the sections above we propose that the largest service 
providers prepare and file BGP Plans that address the service 
providers' plans for registering and maintaining ROAs in the RPKI. 
Here, we seek comment on whether the Commission should establish goals 
and timelines for the largest service providers to register ROAs 
covering the routes they originate. If so, how should the Commission 
determine reasonably achievable goals and timelines for service 
providers? What factors should we consider in making those 
determinations? Should we set goals and timelines on an individualized 
basis for the largest providers dependent on the service provider's 
individual circumstances? To what extent should the registration of 
certain ROAs in the RPKI be prioritized, and what should be the basis 
for identifying those ROAs and defining reasonable prioritization? Can 
we set meaningful goals and/or timelines on a standardized basis for 
those providers or for all service providers subject to this NPRM? Is 
there a floor below which ROA registration levels should raise 
particular concern regarding whether ROAs registrations are being 
timely deployed? If so, commenters should provide specific suggestions, 
along with justifications.
3. Outreach and Education
    45. We see a clear need for additional education efforts by the 
service providers, various stakeholder groups, ARIN, and governmental 
entities. As described below, we believe that a number of holders of IP 
address prefix(es) do not fully appreciate the importance of 
registering ROAs for their IP address prefix(es) to help protect those 
critical resources from being compromised in the internet routing 
system, with potentially disastrous consequences described in the 
examples above. Education about the substantial benefits of registering 
ROAs is a necessity. To what extent can or should large service 
providers as defined in this NPRM take steps to support ROA 
registration by other, downstream providers? We also think it is 
important to increase the options for holders of IP prefixes to 
register ROAs for those prefixes.
    46. We seek comment in this context on steps we should consider to 
facilitate the creation and maintenance of ROAs in the RPKI. There are 
resources available to help entities of all sizes. For example, the 
RIRs provide guidance to help populate RPKI, including the registration 
and maintenance of ROAs. We seek comment on the extent to which such 
implementation guidance and resources help service providers of all 
sizes create and maintain ROAs over the IP address(es) that they 
originate from their networks. Are there any aspects that would be 
better served or supported by a government-led educational campaign 
seeking to drive awareness of the issue and facilitate increases in the 
proportions of ROAs to route originations in the RPKI repositories? If 
so, would the inclusion of our federal partners, for example, CISA, 
NIST, and ONCD in such a campaign, facilitate driving both awareness of 
the seriousness of the issue, as well as provide educational support 
for the process involved with accurately registering and actively 
maintaining ROAs in the RPKI infrastructure? What would the metric for 
``success'' be for such an educational campaign? Should we request 
volunteers to join workshops to encourage and facilitate the creation 
and maintenance of ROAs? Additionally, how should we treat those cases 
where a downstream service provider holds its own or reassigned IP 
address space?

[[Page 51292]]

    47. We separately seek comment on the extent to which a government-
led educational campaign could facilitate service providers increasing 
their level of ROV filtering on their own networks. Should we consider 
the relative size of the service provider in addition to the Tier 
category to which it might be considered to belong? Should such a 
campaign educate on both ROV filtering and ROA object registration and 
maintenance, or should they target them as separate campaigns? What 
would a metric for ``success'' be for such an educational campaign? 
Should we request volunteers to join workshops to encourage and 
facilitate the use of ROV filtering on certain parts of the networks 
they control?
4. ARIN Processes
    48. ARIN is the RIR serving the United States and other countries 
within its coverage area. It maintains a RPKI repository publication 
point, offers hosted RPKI services, and is the source from which would-
be resource holders/network operators/service providers within the 
United States obtain internet number resources, such as ASNs and IP 
addresses. ARIN is also the entity that enables U.S. service providers 
to register, update, and publish ROAs. Beyond providing additional 
educational materials, conducting workshops, and outreach, ARIN has at 
least two initiatives that could facilitate the uptake of RPKI-based 
routing security measures: (i) ARIN had referred for community 
consultation a question from one of its members, that was filed in the 
form of a ticket, asking if reassigned address space holders can 
register their prefixes with ROAs, and thus take advantage of the 
benefits of RPKI origin validation; and (ii) ARIN is considering 
changes in its ROA creation processes to flag instances where attempted 
ROA registrations raise the possibility of misconfigurations.
5. Beyond RPKI Origin Validation--Further Efforts To Secure Internet 
Routing
    49. Although the regulations proposed with this NPRM focus on 
securing route origination, we seek comment on techniques and 
architecture towards path validation as well. Path validation ensures 
the integrity and authenticity of the AS Path attribute. The only 
standard designed to address issues with path validation and 
plausibility is BGPsec. Implementing this is challenging due to the 
intensive cryptographic operations involved. A less complete guarantee 
on path security is offered by a work-in-progress effort from the IETF, 
known as autonomous system provider authorization (ASPA). This effort 
is designed to detect invalid BGP AS_PATHs by registering ASPA objects 
in the RPKI containing verifiable, attested information as to probable 
ASNs in the path. In addition, the ASPA approach accommodates 
incremental deployment, and ``provides benefits to early adopters in 
the context of limited deployment.'' These methods, however, are still 
undergoing discussion among the academic and standards community and 
are not ready for implementation. Although this NPRM focuses on issues 
with origin validation and the techniques currently available to 
address them, achieving a truly secure routing system will involve 
steps beyond deploying RPKI-based origin validation. We do not propose 
at this time to require service providers to implement measures or 
disclose efforts regarding path validation, but we note that their 
implementation is expected to be a critical, future step that service 
providers would need to take to secure their routing systems. We seek 
comment on the maturity of this work-in-progress and any anticipated 
timeline in which ASPA can be deployed after it has been standardized.

Appendix A

Technical Appendix: Additional Background on Inter-Domain Routing

    1. Information traverses the internet in the data fields of 
internet protocol (IP) packets. Each version of IP (of which there are 
currently two established standards, IPv4 and IPv6) specifies the most 
fundamental formats and semantics of internet data transfer. Every IP 
packet includes a source and destination address, to indicate the 
source and destination of that IP packet, representing the 
corresponding endpoints. These networked endpoints may communicate 
through a medium access layer mechanism if the communicating endpoints 
are on a local area/non-routed network. Alternatively, when the 
networked endpoints are on separate networks, the endpoints communicate 
via IP routers that compile reachability data using routing protocols. 
In any sizable collection of networked endpoints, for reasons of 
resilient design and network management, individual Local Area Network 
segments are connected by IP routers that support one or more routing 
protocols.
    2. Routing protocols implement the signaling mechanisms that 
exchange reachability information between or within independent 
networks, as to destinations available and the network paths by which 
to reach them. There are specialized categories of routing protocols 
for signaling, depending on whether the routing protocols are deployed 
within independent networks (Interior Gateway Protocols or IGPs) or 
between independently managed networks (External Gateway Protocols or 
EGPs). Each category of routing protocol has different performance 
characteristics and functional optimizations. Of the two major 
candidate protocols, Inter Domain Routing Protocol and the Border 
Gateway Protocol (BGP), that were considered for use as EGPs, BGP 
emerged as the ubiquitous deployment choice. As mentioned earlier, the 
internet consists of approximately 70,000 independently administered 
and managed networks at the time of writing. These networks use BGP to 
signal reachability information to reflect both technical priorities 
and business objectives, in terms of permitting a choice of the next 
hop of the path to carry their external traffic. In this way, BGP is 
termed as a ``path vector'' routing protocol. However, since BGP also 
supports business priorities by allowing path selection, BGP is also 
said to support policy based routing.
    3. The networks interconnected by BGP are termed BGP Autonomous 
Systems (ASes) and are referred to by their Autonomous System Numbers 
(ASNs). An AS may include one or multiple separate networks, 
collectively all under the technical administration of a single entity. 
For BGP purposes, a network path is denoted as a string of ASNs termed 
an AS Path. The AS Path is one of the ``BGP path attributes'' or 
control variables used in signaling BGP reachability that influences 
how each BGP speaker selects routes to a specific destination. 
Originally, the AS Path was intended to reflect the initial ASN 
originating an advertisement for a prefix, as well as the succession of 
ASes traversed by a BGP update (the basic BGP message carrying 
signaling information). However, no means were provided to verify 
whether this attribute was correct or false in any way. Deliberations 
on how best to address this type of risk and others have occurred since 
at least 1997. As these and other references cited note, there are 
additional vulnerabilities that go beyond the ones described in this 
section.
    4. A BGP route can be defined as a destination prefix associated 
with a string of BGP Path attributes. Attributes provide the semantics 
that affect how the BGP logic in each BGP speaker processes the routes 
it receives from other BGP speakers. The BGP hijacks referred to in 
this document deal with

[[Page 51293]]

incidents associated with manipulating the AS Path attribute, including 
distorting or falsifying the Origin AS, or the originated route 
specificity. Some of the relatively more well-known routing incidents 
have involved these attack vectors.
    5. Internet addressing conventions have implications for BGP 
routing, since BGP routers advertise the reachability of destination 
addresses to which they can find a path. Reachability information 
exchange occurs by exchanging BGP protocol data units or packets that 
contain the necessary information using the formats and semantics 
specified in BGP standard documents. To allow BGP routing to scale, 
Internet Service Providers (ISPs) are required to aggregate the IP 
address space in the route advertisements they originate into a 
compacted contiguous block that forms the ``network prefix.'' Doing so 
reduces the number of route table entries needed to cover the full 
scope of available internet destinations, thus diminishing the size of 
the routing table in those routers central to routing topology in the 
so-called ``default-free zone.'' Since memory and route look up speeds 
both affect router operation, this form of aggregation allows the 
number of addressable endpoints to grow and the internet to scale while 
still retaining acceptable performance in the routers that carry the 
most comprehensive sets of routes, in effect constituting a 
connectivity core for the internet. However, a route that is more 
specific than one that is aggregated is preferred by the BGP state 
machine, so announcing this will preferentially attract traffic 
relative to a route advertising an aggregate. This attack vector is 
somewhat distinct from AS PATH manipulation and has been used in prior 
BGP hijack incidents as well.
    6. Details of the concepts introduced above are further explained 
in several accessible reference works, including the primer entitled 
``Security of the Internet's Routing Infrastructure,'' issued by the 
Broadband Internet Technical Advisory Group (BITAG). For more 
information beyond the summary descriptions in this section, readers 
are referred to the text on ``Network Routing'' in the Morgan Kaufman 
series in Networking or, for simplified review, the BITAG document as 
well as the OECD publication on routing security.

Federal Communications Commission.
Marlene Dortch,
Secretary.
[FR Doc. 2024-13048 Filed 6-14-24; 8:45 am]
BILLING CODE 6712-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.