<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-sidrops-rtr-selective-sync-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Selective Synchronization for RTR">Selective Synchronization for RPKI to Router Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-rtr-selective-sync-02"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhuang" fullname="Shunwan Zhuang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuangshunwan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Individual</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@vip.sina.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="03"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 54?>
<t>The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid some unnecessary synchronizations. The router can obtain only the data that it really needs, and it does not need to save the data that are not needed.</t>
    </abstract>
  </front>
  <middle>
    <?line 57?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The RPKI-to-Router (RTR) protocol is a simple but reliable approach, which help synchronize the validated RPKI data from a trusted cache to routers. There are already several versions of the protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/>. The supported types of data that can be transferred increase, which is shown in <xref target="tab-version"/>.</t>
      <table anchor="tab-version">
        <name>Supported data types in different versions of the RTR protocol</name>
        <thead>
          <tr>
            <th align="center">Version 0</th>
            <th align="center">Version 1</th>
            <th align="center">Version 2</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
          </tr>
          <tr>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center">Router Key</td>
            <td align="center">Router Key</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">ASPA</td>
          </tr>
        </tbody>
      </table>
      <t>The RTR protocol keeps the synchronization of all types of data, and selective synchronization is not supported. However, routers may be interested in a part of data types, instead of all. In such cases, storing unused data on the router is unreasonable, and synchronizing all types of data will induce some unnecessary transmission and storage overhead. Since multiple types of data are transmitted together, the router cannot use any type of these data unless it waits for all data to complete transmission. Furthermore, there may be more types of data in the cache, , which makes the above issue more significant and worse. The followings are example types, and some of them may be possibly supported in the RTR protocol in the future:</t>
      <ul spacing="normal">
        <li>
          <t>Secured Routing Policy Specification Language (RPSL) <xref target="RFC7909"/></t>
        </li>
        <li>
          <t>Signed Prefix Lists <xref target="I-D.ietf-sidrops-rpki-prefixlist"/></t>
        </li>
        <li>
          <t>Autonomous Systems Cones <xref target="I-D.ietf-grow-rpki-as-cones"/></t>
        </li>
        <li>
          <t>Mapping Origin Authorizations (MOAs) <xref target="I-D.xie-sidrops-moa-profile"/></t>
        </li>
        <li>
          <t>Signed SAVNET-Peering Information (SiSPI) <xref target="I-D.chen-sidrops-sispi"/></t>
        </li>
        <li>
          <t>Path validation with RPKI <xref target="I-D.van-beijnum-sidrops-pathrpki"/></t>
        </li>
        <li>
          <t>Signed Groupings of Autonomous System Numbers <xref target="I-D.spaghetti-sidrops-rpki-asgroup"/></t>
        </li>
      </ul>
      <t>This document describes the synchronization problem of the RTR protocol and provides some possible solutions.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-ps">
      <name>Problem Statement</name>
      <t>The RTR protocol does not distinguish data types in the cache. Different types of data share one serial number and one End of Data PDU. When the Relay Party (RP) synchronizes the cache to the router, various PDUs, such as IPv4 Prefix, IPv6 Prefix, Router Key, and ASPA, are mixed. The router cannot select one or more really required PDUs or deny receiving a certain kind of PDU. For example, if the router supports RTR v2 but does not support or enable ASPA, the ASPA PDU messages will still be transmitted. Another example is the router in an IPv6-only network unreasonably has to receive IPv4 RPKI data. Overall, the transimitted Data PDU type cannot be flexibly selected by the router.</t>
      <t>The negative effects of the above problem are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Storing unused data on the router, which is unreasonable.</t>
        </li>
        <li>
          <t>Unnecessary transmission and storage overhead.</t>
        </li>
        <li>
          <t>Inefficient end-of-transmission acknowledgment. Multiple types of data are transmitted together. The router cannot use any type of these data unless it waits for all data to complete transmission.</t>
        </li>
      </ul>
      <t>The above negative effects will become worse when there are more kinds of RPKI data available <xref target="I-D.van-beijnum-sidrops-pathrpki"/><xref target="I-D.ietf-grow-rpki-as-cones"/><xref target="I-D.spaghetti-sidrops-rpki-asgroup"/>. 
The main problem of the RTR protocol is the lack of selective synchronization capability.</t>
      <t>How about using different RTR versions for controlling the synchronized data, e.g., using RTR v0 if ASPA data are unwanted? This is not a good solution. First, the data selection is restricted to RTR versions and thus is not flexible either. Second, upgrading the version of RTR for future new RPKI data is not a proper choice, which is also a problem of existing RTR design. Specifically, existing RTR protocol has low extension capability. When there are new PDUs defined for transmission, a new RTR version needs to be issued. The new version protocol is not well compatible with the older ones, which induces some challenges on version negotiation, protocol implementation, and deployment. This document will primarily focus on the solving the inflexible synchronization problem. How to define an extensible protocol needs to be further discussed.</t>
    </section>
    <section anchor="sec-solution">
      <name>Preliminary Solutions</name>
      <t>This section preliminarily proposes some independent solutions for achieving selective synchronization in the RTR protocol, while trying to keep the protocol's simplicity. A new protocol version may not necessarily be required.</t>
      <section anchor="subscribing-data-pdu">
        <name>Subscribing Data PDU</name>
        <t>Define a new type of PDU called Subscribing Data PDU. The new PDU will indicate the data types that the router is interested in. An example format of the PDU is shown in <xref target="fig-subscribe"/>. The field of PDU type is TBD. The Data Type fields indicate the interested data types (i.e., 4: IPv4 Prefix, 6: IPv6 Prefix, 9: Router Key, 11: ASPA).</t>
        <t>The router can send the Subscribing Data PDU to the cache. After finishing the subscribing, the following PDUs, including Serial Notify, Serial Query, Reset Query, Cache Response, and Cache Reset, are only for the subscribed data. If the router wants to modify the subscription, a new Subscribing Data PDU can be sent for overwriting the previous subscription.</t>
        <figure anchor="fig-subscribe">
          <name>An example format of Subscribing Data PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |         zero        |
|          |          |                     |
+-------------------------------------------+
|                                           |
|                  Length                   |
|                                           |
+-------------------------------------------+
|  Data    |          |         | Data      |
|  Type 1  | ...      | ...     | Type N    |
|          |          |         |           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
      <section anchor="pdus-with-data-type-field">
        <name>PDUs with Data Type Field</name>
        <t>The existing PDUs, including Serial Notify, Serial Query, Reset Query, Cache Response, and Cache Reset, can be extended to carry the Data Type field. The values of the Data Type field can be 4 for IPv4 Prefix, for IPv6 Prefix, 9 for Router Key, and 11 for ASPA. An example format of the extended Serial Query PDU is shown in <xref target="fig-serial"/>. A router can send the extended Serial Query PDU for requesting a specific type of data.</t>
        <figure anchor="fig-serial">
          <name>An example format of extended Serial Query PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |     Session ID      |
|    2     |    1     |                     |
+-------------------------------------------+
|                                           |
|                 Length=16                 |
|                                           |
+-------------------------------------------+
|                                           |
|                  Data Type                |
|                                           |
+-------------------------------------------+
|                                           |
|               Serial Number               |
|                                           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
      <section anchor="end-of-specific-data-pdu">
        <name>End of Specific Data PDU</name>
        <t>End of Data PDU tells the router that all the requested data are synchronized. The End of Specific Data PDU can be defined for indicating a specific type of data has been synchronized. An example format of End of Specific Data PDU is shown in <xref target="fig-end-pdu"/>. The field of PDU type is TBD. The Data Type field indicate the interested data types (i.e., 4: IPv4 Prefix, 6: IPv6 Prefix, 9: Router Key, 11: ASPA).</t>
        <t>The type of data specified in End of Specific Data PDU will become ready for use. The router does not need to wait for all the data to complete transmission before it can use the specified data.</t>
        <figure anchor="fig-end-pdu">
          <name>An example format of End of Specific Data PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |     Session ID      |
|          |          |                     |
+-------------------------------------------+
|                                           |
|                 Length=24                 |
|                                           |
+-------------------------------------------+
|                                           |
|               Serial Number               |
|                                           |
+-------------------------------------------+
|                                           |
|              Refresh Interval             |
|                                           |
+-------------------------------------------+
|                                           |
|               Retry Interval              |
|                                           |
+-------------------------------------------+
|                                           |
|              Expire Interval              |
|                                           |
+-------------------------------------------+
|                                           |
|                 Data Type                 |
|                                           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-11" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>IIJ Research, Arrcus, &amp; DRL</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="21" month="September" year="2023"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. RFC 6810 describes version 0, and RFC 8210 describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-11"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="29" month="January" year="2024"/>
            <abstract>
              <t>This document defines a "Signed Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (AS) may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the listed ASN produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by this AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-02"/>
        </reference>
        <reference anchor="I-D.xie-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-xie-sidrops-moa-profile-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.xie-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <date day="1" month="March" year="2024"/>
            <abstract>
              <t>For the authenticity of the mapping origin of IPv4 address block in IPv6-only networks, this document defines a standard profile for Mapping Origin Authorizations (MOAs). MOA is a cryptographically signed object that provides a means of verifying that the holder of a set of IPv4 prefixes has authorized an IPv6 mapping prefix to originate mapping for those prefixes. When receiving the MOA objects from the relying parties, PE devices can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-xie-sidrops-moa-profile-01"/>
        </reference>
        <reference anchor="I-D.chen-sidrops-sispi" target="https://datatracker.ietf.org/doc/html/draft-chen-sidrops-sispi-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.chen-sidrops-sispi.xml">
          <front>
            <title>A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <date day="22" month="February" year="2024"/>
            <abstract>
              <t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-00"/>
        </reference>
      </references>
    </references>
    <?line 218?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9VabXPbNhL+zl+Bcz40uYocy+dJE03bVImd1lO/qJbTTq/T
mYNISEJNEiwBSlYT97fcb7lfdrsLgC96S9Le5S6aSUziZbFY7D77YKUwDAMj
TSoGbCxSERu5EGy8yuN5qXL5GzdS5WyqSnY9+vaMGcWuVWVEyUalMipWacAn
k1Is3jr75jpIVJzzDBZKSj414Uzks1DLpFSFDktThtpLCDVICA+PAjXRKhVG
6EFQFQmnB/wzCGL4f6bK1YBpkwS6mmRSa1jsZlXAAmenNy+DQBblgJmy0ubo
8PApiOOl4AMGywVLVd7OSlUVMN9qENyKFbQmMDmH/eXChCeoZhDwysxVOQhY
GDAmcz1glxH7GpSHV7ufS577BlXOuN/4gH1T8aWQ0CwyLtMBwy3nPP9qTu1R
rDLoi6WBbTwX8hdJImJV5QZ39mIuc95adhyxv8PM1sLjeZUvYfG6ef/yv9Ew
bSf9QSUuIhTb0uECJvwK/+rmrg5neSIXMql42uhBamS/frWQRaRB/LvpEOSq
zDj6B5wFu3754vGT/qF7fHJkH8/Ck0gKM639CjsmEtwmkPl0bf5nTw+f+kkL
nocTWDmvsnpuwc28LG5lRzB4zTLE1pDrMFY5uqTt1gWfzYUxsnFqO8w62jbt
aEBRiqm8S6U2fsydFPWQTHEYoaYyFb47nou87tdSF6BhFEVBEIYh4xNtSh6b
4GYuKGZDo0IXsw8hCh+xwkUu03WcCs14mjIDUxailFMpEhvvEGwcg74kATpi
N3OpGQRylYncoKhCaZgNQ8SdEXlCMsQdbAZdAtZrloMxuioKVRpWR7pdQHcB
I2phyVoXi8Hb+ULJhGmVCVbluYiF1rxcrQ8lZYXTnOapieES/uTpitS0m5tz
w6RhAA0ptOdCJLrHOOwEGhMFe8uVoWbaAAedunMBVOohIomYPYZMJkkqguAB
wkmpkiom9V8/0CIOJTbdv8MJga3BOjIrUsEmFSqZSj6BF17AGB7Pe2w5l/Gc
zUVatM/THiVPJaJl+yynpcpAJqEidMQgQ6wdsIAN4aZ4CjZJwK4CfIKn6BmI
sJqpKYmvtXz9+i8uGu/v7TNGHT3visf7e3s6ziHQuADcJLqxLJ7ZBLQrea6n
oixhlMxjUEoLv28wkJ6rZQ4doIbhk9BpiQsEwRv2vX1lh6x57reej9ib4M0g
pM/g040H6GRno8UxpDsMUrb3zY593Ond9QZj2583Pq1+K1Ybbxtju2/D8WhY
vwWvB+xByw6McvsXB+Pa0Na+ZG0wWiKnYFqM5fXjbcfuwX1gvbUdz7dCFJqG
rgcpSCA4aR+pjSm9M7ClDbTaISDNqCV6Xs/7Jsv4Cv1BYn4W5L6wAc4KDohS
Ow6u2cNUZcB5nSYRBCFIBn+JwXegWxtVIj5VeaW9SdBWDV6AOlWOrqZyDDin
fa0zTt7YIltKaJI5BLvYhCdyY8dSrDRQgs8EU7DJOSgLsAfuLVhWpUZixHeF
Y0g6GYYCRs0EKAz2MR2YQyvCrmCJFUlw56kdZlV5CgohuC25NJrIGe7EIz2k
4gIpV0ffiL2sSlwsU6WgBUEZdxzYtKaqtKYkcOkxH6sZvxXWX/gE9gwm1pWb
ruUsh6wD2hsyDRAxLSxCTFWaqiXYW5MFxB3Patu4U0FL201mXinISlpOAM8b
gHFKdVzYtU0rU5WQXoMQMk9cIdBgAOIhj1Qq4xUbFyImBclXz4G+VHh0D69H
4/NH7CdHJn5GAbAVmO/i/BwSoQZkeva21H9/z2DysDIqV5mqNJBo8OBMsxdI
MToSNhnI/T3MvYCcgBpflXIG+xoSa/W5kD28uBrqR17ODoJBctwGxsPvL09v
wpEQFClnnj3B9h+O5Xh0VgvbpCMkZwTsyacgnLWU8E6JyM3bR7namnyN9Ikc
AA55w0LsssomiA5O6n4Wdk9A1qYwidBxKSdiO5KBYSD6s22YSL4HL0BuYTI5
ofM6DP60chwEKMADdi1+rWQpcEFde4+FVLh2oLsnmh1cvBrfHPTsX3Z5Rc/X
p9+9Ors+PcHn8TfD8/P6IXAjxt9cvTo/aZ6amS+uLi5OL0/sZGhlnabg4GL4
44ENoYOr0c3Z1eXw/MCGRNtAhDuqBl5wWYwmrgNvOQqt5y9G//pn/9hxgaN+
/yl4tCMD/c+O4WUJbmJXIwJmX8GoqwAcV/CSwByAKOaFNDzF4PbJHeEG6O1f
f0LL/Dxgn0/ion/8pWvADXcavc06jWSzzZaNydaIW5q2LFNbs9O+ZumuvsMf
O+/e7q3Gz5+lMhcs7D959mWABHLkfHBsgMvRkVgWWej7zaRcM9bEUvBK6vla
yq+hOWIndfbvArie46kDtEDCLiVwv5yCzJ2eYKc5pdYTHDs6eRWxH+A0bYSI
FBB4BCl5hej4qHvJqJdGj2rSVg9wopQY0yAM0zOmajj9FrvqtelTr8WPrEsh
B+qRq2byDsnDzUZOtNSD1IeUR2nHcf7SRmdCq2NnInJsjQXcXDHRs1iUdHW4
lXbjtOeXMNKlIyAc03YadllH09ksjoi71yfjL0E4nciF0x7nE5cD6SxD1jCD
GcQp4Cjh/0mHAERsCNIgNOqcKHWHwSDLIKuFFHC5MFj1aNOaFZtzurvZvQpr
8PqyELErYv6p1Y3Wlo59+KO3FMOZGBScpnD5o8RL5oaRk1VLK8RDPJpczOgm
zgQ4YGxq0mmZgUdduoVoRwH0gFGCfht1a10N2gyOLmbs1fsRMpxyloOOMpYY
JXDBDdU07M6Mb3O1TEUyw9iM2MX70bdtrvqfp2/W6ta6G7ZfWueKMYUR8yJw
diyPYgqDBX2fttNcJvmCy5Q8+J1S+ttIzDtmcNgNbibDgNyXn104pHBA2L/7
6gEZh09kKs0KDQXXDjRUhceAjtbckCiY/S0JDQ96w0U+TXFYlz04z+wxEc2i
npNE8w8RKijMa7egchz4xDNbXXE3Ic5mSiU1lQC8kaU2vab64DZk7054ISpl
bD2rqymnqkxVC3YhCucvrQMC51V5AloWs5InfjP+AoknDuJwv5YngwMtW05Q
q4vFIPThuZJx+4IOuVzZbn9UnfoQ0AjgeVFDsQGSeztKSAhXAAW21qTXz+6H
rteimoToCeQMJJK4hXZYQMKwe2msZes/nu/gBcXlEhznx7Q9DLe+FEhbIPDA
ndCuxHTRhCpNwCDo3LU56HLo6GI8h72KHFEepDYazJSR5Jm91lIY1ggwrgMP
NRFFqlYWdbqkliK6KGUGaRWweArt2qMkONTCn7HMa2fYwXzpGo72sEbElOKM
j5Nq9dpmm9qrIjIQWFbbmhjSGJFC9sgReseeHzsq45383pJz7fy6qKfgLupi
IxkPLCkKwGPcbk23LRzGcyloi3uqDZuXQToihO1yReZRVODoVLo+0bYYJ2Py
tyF5RW0Df4B4BbUFQZtpUPeJqFmGuxKMqwnRZ1zLJ9PgxBmZBHv0xyyLUYGX
si2TGv/Egb4EgVfVdqWSchFV1bpFjk4xBSlFzSbsfc8jK8ruFtumchZqp4/w
9bypFKlnSHYDMOnm+YntJZXxGxo7TncVbanS0vmhjAQg6PGgywYfD7qE8Omg
wwn7/QGB7COf+lplYO3L1Nus6YmpI8jDKc6CQwEaXaN8M82icV2icPRV5nFa
EY6OLXu+hICeglbu9btKlPB2DUnd+JcXxIqhqQA3duWmuk0Yy22JxxGKtdRw
5orYWYeCYkqhiMwUZLBVe0phWuC31Qiu8qoxuHA9ZETLUhpvAgjMBfH1tkQ0
9e+//x4cNsXJJ81j/3H9eHTsn/7WD6Lw3T9R8Kb+3pHKoKjrRkW0qYU2ZV4a
Qp7XHv2bKFV79LYS6y7Zn76H3p8G26Vs/6zXe+lzDnkCsso7jt4j+731Jqdg
O2zypu52mpCN+9gRRZEf4x/f2O7LDb13yG7r/Y/30PsT8kOshHdAivli+FaU
2xYIWPcGrCYWQVm9QbCXiGAELTVV+S9GvwtI+x2b5XgxL0sb1muwarF2wdNK
1PeqtSFe3jFFdwdYXUMLWe3392sX7n6fmhFj92SNWt/23nflEhqCiWS4Fa13
y0JFMLsKewzAjB2VrFOoBUiCJ8Y+EoAaC3u/PDtphRfo1sRGfyNM2rI/LEBZ
fPqiZcR9o/fJ/sDA2kTGR6S3RxZblftzev8JYLVa7EXVnVHroNVVEv3lr6HC
ayVGZuCS1alv2S/f3a8WXPh76ohkqX0Zt5C4ay2Phu17omOme/CELqMTAVfO
7kpbzbBz6U0cxBpTkVR/iFF/QELdMYUzkP0qYOde23Um+9MCtHTlv+lz57rx
mwssdNV1ruZGs6PWBQtMsVwl7e8HsJRG1LfWsJULPu5M4F62PnZk/08yQWO5
vaP3yf5YEfUD6n0tphDhc/ubxQWC8cehNyhuIA9sVfv/We/Tu0ICuHx0erM9
ROcDMgaX2/ZThl35gxiD/YGGNCv8YYSWiSh5p5DoevFr/ucn9PO74eVw+1jJ
c+7HgaZswuNbnDGsv9CxX9iD9vbrT5F8cTDlqRYHfhp+/g25ApJ5QS0AAA==

-->

</rfc>
