<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fu-sidrops-enhanced-slurm-filter-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Enhanced SLURM Filters">Filtering Out RPKI Data by Type based on Enhanced SLURM Filters</title>
    <seriesInfo name="Internet-Draft" value="draft-fu-sidrops-enhanced-slurm-filter-01"/>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="01"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>
<t>Simplified Local Internet Number Resource Management with the RPKI (SLURM) helps operators create a local view of the global RPKI by generating sets of filters and assertions. This document proposes to filter out RPKI data by type based on enhanced SLURM filters. Only the RPKI data types that the network or routers are interested in will appear in the Relying Party's output.</t>
    </abstract>
  </front>
  <middle>
    <?line 56?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Relying Party (RP) collects signed RPKI objects from global RPKI publication points. The RPKI data passing RP's validation will appear in RP's output. Then, the RPKI-to-Router (RTR) protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/> will synchronize the validated RPKI data from RP to routers. Currently, four types of RPKI data including IPv4 Prefix, IPv6 Prefix, Router Key, and ASPA are supported in the RTR protocol.</t>
      <t>However, in some cases, routers may be interested in a part of RPKI data types, instead of all <xref target="I-D.geng-sidrops-rtr-selective-sync"/>. In such cases, storing unused data on the router is unreasonable, and synchronizing all types of data will induce some unnecessary transmission and storage overhead. Besides, multiple types of data can be transmitted together. The router cannot use any type of these data unless it waits for all data to complete transmission.</t>
      <t>Furthermore, there may be more types of RPKI data in the RPKI repositories and RPs, which makes the above problem more significant and worse. The followings are example types, and some of them may be possibly supported in the RPKI system in the future:</t>
      <ul spacing="normal">
        <li>
          <t>Secured Routing Policy Specification Language (RPSL) <xref target="RFC7909"/></t>
        </li>
        <li>
          <t>Signed Prefix Lists <xref target="I-D.ietf-sidrops-rpki-prefixlist"/></t>
        </li>
        <li>
          <t>Autonomous Systems Cones <xref target="I-D.ietf-grow-rpki-as-cones"/></t>
        </li>
        <li>
          <t>Mapping Origin Authorizations (MOAs) <xref target="I-D.xie-sidrops-moa-profile"/></t>
        </li>
        <li>
          <t>Signed SAVNET-Peering Information (SiSPI) <xref target="I-D.chen-sidrops-sispi"/></t>
        </li>
        <li>
          <t>Path validation with RPKI <xref target="I-D.van-beijnum-sidrops-pathrpki"/></t>
        </li>
        <li>
          <t>Signed Groupings of Autonomous System Numbers <xref target="I-D.spaghetti-sidrops-rpki-asgroup"/></t>
        </li>
      </ul>
      <t>To deal with the problem, configuring routers directly ignoring the uninterested RPKI data transmitted by RTR protocol may not be a good solution. While storage overhead is avoided, transmission delay is not optimized. Extending RTR protocol for supporting selective synchronization of RPKI data is an alternative solution <xref target="I-D.geng-sidrops-rtr-selective-sync"/>. Both of the two solutions require the upgrade of router software.</t>
      <t>SLURM provides a simple way to enable an RP to establish a local and customized view of the RPKI (<xref target="RFC8416"/>, <xref target="I-D.ietf-sidrops-aspa-slurm"/>). It defines Validation Output Filters to filter out specific RPKI data items and Locally Added Assertions to add RPKI data items. Unfortunately, SLURM cannot efficiently filter out RPKI data by type, i.e., filter out all the RPKI data belonging to a specific type.</t>
      <t>This document proposes enhanced SLURM filters which can filter out RPKI data by type. With enhanced SLURM filters, operators can efficiently select which type of RPKI data need to be synchronized to routers.</t>
      <t>The proposed method requires some modifications on the SLURM-related process of RP software. Upgrades of RTR implementations and router software implementations are not involved.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-uc">
      <name>Use Case</name>
      <t>One of use cases is IPv6-only network. Suppose a IPv6-only network wants to enable ROV on BGP border routers. The routers should be only interested in IPv6-related BGP validation because the routers can only receive IPv6 routes from neighbor ASes. Therefore, IPv4 Prefix data is not useful for the network. An example of IPv6-only network is New China Education and Research Network (named Future Internet Technology Infrastructure, FITI).</t>
      <artwork><![CDATA[
                  +------------+
                  | Rely Party |
                  +------------+
                   /          \
                  / Sync RPKI  \
                 /  data by RTR \
      +---------/----------------\---------+
IPv6  |        /                  \        |IPv6
routes| +----------+          +----------+ |routes
------->|BGP router|          |BGP router| |------>
      | +----------+          +----------+ |
      |             IPv6-only              |
      +------------------------------------+
]]></artwork>
      <t>As described in <xref target="sec-intro"/>, there may be more types of RPKI data in the RPKI repositories and RPs. Thus, there will be more use cases where a network does not need all types of RPKI data in the future.</t>
    </section>
    <section anchor="sec-design">
      <name>Enhanced SLURM Filters</name>
      <t>This section proposes two optional designs.</t>
      <section anchor="design-1-rpki-data-type-filters">
        <name>Design 1: RPKI Data Type Filters</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object containing the following members:</t>
        <ul spacing="normal">
          <li>
            <t>A "slurmVersion" member that <bcp14>MUST</bcp14> be set to 3, encoded as a number</t>
          </li>
          <li>
            <t>A "validationOutputFilters" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly four members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixFilters" member, see Section 3.3.1 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecFilters" member, see section 3.3.2 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaFilters" member, see Section 3.1 <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
              <li>
                <t>A "typeFilters" member</t>
              </li>
            </ul>
          </li>
          <li>
            <t>A "locallyAddedAssertions" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly three members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixAssertions" member, see Section 3.4.1 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecAssertions" member, see Section 3.4.2 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaAssertions" member, see Section 3.2 <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following JSON structure with JSON members represents a SLURM file that has no filters or assertions:</t>
        <artwork><![CDATA[
  {
    "slurmVersion": 2,
    "validationOutputFilters": {
      "aspaFilters": [],
      "bgpsecFilters": [],
      "prefixFilters": [],
      "typeFilters": []
    },
    "locallyAddedAssertions": {
      "aspaAssertions": [],
      "bgpsecAssertions": [],
      "prefixAssertions": []
    }
  }
]]></artwork>
        <section anchor="rpki-data-type-filters">
          <name>RPKI Data Type Filters</name>
          <t>There are currently four types of RPKI data (which follows the RTR PDU definitions). The number of data types may increase with time.</t>
          <ul spacing="normal">
            <li>
              <t>IPv4 Prefix</t>
            </li>
            <li>
              <t>IPv6 Prefix</t>
            </li>
            <li>
              <t>Router Key</t>
            </li>
            <li>
              <t>ASPA</t>
            </li>
          </ul>
          <t>The RP can configure zero or at most four RPKI Data Type Filters ("Type Filter" for short). Each Type Filter contains a single 'rpkiDataType' and optionally a single 'comment'.</t>
          <ul spacing="normal">
            <li>
              <t>The 'rpkiDataType' member <bcp14>MUST</bcp14> be one of the values, i.e., "IPv4 Prefix", "IPv6 Prefix", "Router Key", and "ASPA".</t>
            </li>
            <li>
              <t>It is <bcp14>RECOMMENDED</bcp14> that an explanatory comment is included with each Type Filter so that it can be shown to users of the RP software.</t>
            </li>
          </ul>
          <t>Any RPKI data item that matches any configured Type Filter <bcp14>MUST</bcp14> be removed from the RP's output.</t>
          <t>A RPKI data item is considered to match with a Type Filter if the following condition applies: The item is considered to match if the RPKI data type of the item is equal to the "rpkiDataType" value of Type Filter.</t>
          <t>The following example JSON structure represents a "typeFilter" member with one object as described above:</t>
          <artwork><![CDATA[
  "typeFilter": [
    {
      "rpkiDataType": "IPv4 Prefix", 
      "comment": "Filter out VRPs with IPv4 Prefixes"
    }
  ]
]]></artwork>
          <t>When a type of RPKI data is to be filtered out, the corresponding Filters and Assertions <bcp14>MUST</bcp14> be ignored. In the above JSON example, the prefixFilters with IPv4 prefixes and the prefixAssertions with IPv4 prefixes will be ignored by RP.</t>
        </section>
      </section>
      <section anchor="design-2-special-asns">
        <name>Design 2: Special ASNs</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object which has the same structure as <xref target="I-D.ietf-sidrops-aspa-slurm"/>, except that the "slurmVersion" member <bcp14>MUST</bcp14> be set to 3.</t>
        <t>The structure of ROA filters, BGPsec filters, and ASPA filters are not changed.</t>
        <t>To filter out a specific type of RPKI data, a special value (e.g., 65535. The value is TBD) can be set to the "asn" member of the above filters.</t>
        <t>The following example JSON structure represents a "prefixFilters" member with one object as described above:</t>
        <artwork><![CDATA[
  "prefixFilters": [
    {
      "asn": 65535, 
      "comment": "Filter out VRPs with IPv4 and IPv6 Prefixes"
    }
  ]
]]></artwork>
        <t>When a type of RPKI data is to be filtered out, the corresponding Filters and Assertions <bcp14>MUST</bcp14> be ignored. In the above JSON example, the other prefixFilters and all the prefixAssertions will be ignored by RP.</t>
        <t>To filter only IPv4 Prefixes, two special values can be used, i.e., one is for IPv4 and the other is for IPv6. The concret design is TBD.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations in Section 6 of <xref target="RFC8416"/> are also applied to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8416" target="https://www.rfc-editor.org/info/rfc8416" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8416.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>IIJ Research, Arrcus, &amp; DRL</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. RFC 6810 describes version 0, and RFC 8210 describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-12"/>
        </reference>
        <reference anchor="I-D.geng-sidrops-rtr-selective-sync" target="https://datatracker.ietf.org/doc/html/draft-geng-sidrops-rtr-selective-sync-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.geng-sidrops-rtr-selective-sync.xml">
          <front>
            <title>Selective Synchronization for RPKI to Router Protocol</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Shunwan Zhuang" initials="S." surname="Zhuang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Individual</organization>
            </author>
            <date day="29" month="June" year="2024"/>
            <abstract>
              <t>The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid some unnecessary synchronizations. The router can obtain only the data that it really needs, and it does not need to save the data that are not needed.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-rtr-selective-sync-03"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-slurm" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-slurm-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-slurm.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management (SLURM) with RPKI Autonomous System Provider Authorizations (ASPA)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Ben Cartwright-Cox" initials="B." surname="Cartwright-Cox">
              <organization>Port 179 Ltd</organization>
            </author>
            <date day="21" month="May" year="2024"/>
            <abstract>
              <t>ISPs may want to establish a local view of exceptions to the Resource Public Key Infrastructure (RPKI) data in the form of local filters or additional attestations. This document defines an addendum to RFC 8416 by specifying a format for local filters and local assertions for Autonomous System Provider Authorizations (ASPA) for use with the RPKI.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-slurm-01"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="21" month="March" year="2024"/>
            <abstract>
              <t>This document defines a "Signed Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (the subject AS) may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the subject AS produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by the subject AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-03"/>
        </reference>
        <reference anchor="I-D.xie-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-xie-sidrops-moa-profile-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.xie-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <author fullname="Di Ma" initials="D." surname="Ma">
              <organization>ZDNS</organization>
            </author>
            <date day="15" month="June" year="2024"/>
            <abstract>
              <t>For the authenticity of the mapping origin of IPv4 address block in IPv6-only networks, this document defines a standard profile for Mapping Origin Authorizations (MOAs). MOA is a cryptographically signed object that provides a means of verifying that the holder of a set of IPv4 prefixes has authorized an IPv6 mapping prefix to originate mapping for those prefixes. When receiving the MOA objects from the relying parties, PE devices can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-xie-sidrops-moa-profile-05"/>
        </reference>
        <reference anchor="I-D.chen-sidrops-sispi" target="https://datatracker.ietf.org/doc/html/draft-chen-sidrops-sispi-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.chen-sidrops-sispi.xml">
          <front>
            <title>A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <date day="22" month="February" year="2024"/>
            <abstract>
              <t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-00"/>
        </reference>
      </references>
    </references>
    <?line 235?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
