<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-sidrops-rtr-selective-sync-05" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Selective Synchronization for RTR">Selective Synchronization for RPKI to Router Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-rtr-selective-sync-05"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhuang" fullname="Shunwan Zhuang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuangshunwan@huawei.com</email>
      </address>
    </author>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="April" day="14"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 61?>
<t>The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid some unnecessary synchronizations. The router can obtain only the data that it really needs, and it does not need to save the data that are not needed.</t>
    </abstract>
  </front>
  <middle>
    <?line 64?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The RPKI-to-Router (RTR) protocol is a simple but reliable approach, which help synchronize the validated RPKI data from a trusted cache to routers. There are already several versions of the protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/>. The supported types of data that can be transferred increase, which is shown in <xref target="tab-version"/>.</t>
      <table anchor="tab-version">
        <name>Supported data types in different versions of the RTR protocol</name>
        <thead>
          <tr>
            <th align="center">Version 0</th>
            <th align="center">Version 1</th>
            <th align="center">Version 2</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
          </tr>
          <tr>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center">Router Key</td>
            <td align="center">Router Key</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">ASPA</td>
          </tr>
        </tbody>
      </table>
      <t>The RTR protocol keeps the synchronization of all types of data, and selective synchronization is not supported. However, routers may be interested in a part of data types, instead of all. In such cases, storing unused data on the router is unreasonable, and synchronizing all types of data will induce some unnecessary transmission and storage overhead. Since multiple types of data are transmitted together, the router cannot use any type of these data unless it waits for all data to complete transmission. Furthermore, there may be more types of data in the cache, which makes the above issue more significant and worse. The followings are example types, and some of them may be possibly supported in the RTR protocol in the future:</t>
      <ul spacing="normal">
        <li>
          <t>Secured Routing Policy Specification Language (RPSL) <xref target="RFC7909"/></t>
        </li>
        <li>
          <t>Signed Prefix Lists <xref target="I-D.ietf-sidrops-rpki-prefixlist"/></t>
        </li>
        <li>
          <t>Autonomous Systems Cones <xref target="I-D.ietf-grow-rpki-as-cones"/></t>
        </li>
        <li>
          <t>Mapping Origin Authorizations (MOAs) <xref target="I-D.xie-sidrops-moa-profile"/></t>
        </li>
        <li>
          <t>Signed SAVNET-Peering Information (SiSPI) <xref target="I-D.chen-sidrops-sispi"/></t>
        </li>
        <li>
          <t>Path validation with RPKI <xref target="I-D.van-beijnum-sidrops-pathrpki"/></t>
        </li>
        <li>
          <t>Signed Groupings of Autonomous System Numbers <xref target="I-D.spaghetti-sidrops-rpki-asgroup"/></t>
        </li>
        <li>
          <t>Autonomous System Relationship Authorization (ASRA) [I-D.sriram-sidrops-asra-verification]</t>
        </li>
      </ul>
      <t>This document describes the synchronization problem of the RTR protocol and provides some possible solutions.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-ps">
      <name>Problem Statement</name>
      <t>The RTR protocol does not distinguish data types in the cache. Different types of data share one serial number and one End of Data PDU. When the Relying Party (RP) synchronizes the cache to the router, various PDUs, such as IPv4 Prefix, IPv6 Prefix, Router Key, and ASPA, are mixed. The router cannot select one or more really required PDUs or deny receiving a certain kind of PDU. For example, if the router supports RTR v2 but does not support or enable ASPA, the ASPA PDU messages will still be transmitted. Another example is the router in an IPv6-only network unreasonably has to receive IPv4 RPKI data. Overall, the transimitted Data PDU type cannot be flexibly selected by the router.</t>
      <t>The negative effects of the above problem are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Storing unused data on the router, which is unreasonable.</t>
        </li>
        <li>
          <t>Unnecessary transmission and storage overhead.</t>
        </li>
        <li>
          <t>Inefficient end-of-transmission acknowledgment. Multiple types of data are transmitted together. The router cannot use any type of these data unless it waits for all data to complete transmission.</t>
        </li>
      </ul>
      <t>The above negative effects will become worse when there are more kinds of RPKI data available <xref target="I-D.van-beijnum-sidrops-pathrpki"/><xref target="I-D.ietf-grow-rpki-as-cones"/><xref target="I-D.spaghetti-sidrops-rpki-asgroup"/>. 
The main problem of the RTR protocol is the lack of selective synchronization capability.</t>
      <t>How about using different RTR versions for controlling the synchronized data, e.g., using RTR v0 if ASPA data are unwanted? This is not a good solution. First, the data selection is restricted to RTR versions and thus is not flexible either. Second, upgrading the version of RTR for future new RPKI data is not a proper choice, which is also a problem of existing RTR design. Specifically, existing RTR protocol has low extension capability. When there are new PDUs defined for transmission, a new RTR version needs to be issued. The new version protocol is not well compatible with the older ones, which induces some challenges on version negotiation, protocol implementation, and deployment. This document will primarily focus on the solving the inflexible synchronization problem. How to define an extensible protocol needs to be further discussed.</t>
    </section>
    <section anchor="sec-solution">
      <name>Preliminary Solutions</name>
      <t>This section preliminarily proposes some independent solutions for achieving selective synchronization in the RTR protocol, while trying to keep the protocol's simplicity. A new protocol version may not necessarily be required.</t>
      <section anchor="subscribing-data-pdu">
        <name>Subscribing Data PDU</name>
        <t>Define a new type of PDU called Subscribing Data PDU. The new PDU will indicate the data types that the router is interested in. An example format of the PDU is shown in <xref target="fig-subscribe"/>. The field of PDU type is TBD. The Data Type fields indicate the interested data types (i.e., 4: IPv4 Prefix, 6: IPv6 Prefix, 9: Router Key, 11: ASPA).</t>
        <t>The router can send the Subscribing Data PDU to the cache. After finishing the subscribing, the following PDUs, including Serial Notify, Serial Query, Reset Query, Cache Response, and Cache Reset, are only for the subscribed data. If the router wants to modify the subscription, a new Subscribing Data PDU can be sent for overwriting the previous subscription.</t>
        <figure anchor="fig-subscribe">
          <name>An example format of Subscribing Data PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |         zero        |
|          |          |                     |
+-------------------------------------------+
|                                           |
|                  Length                   |
|                                           |
+-------------------------------------------+
|  Data    |          |         | Data      |
|  Type 1  | ...      | ...     | Type N    |
|          |          |         |           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
      <section anchor="pdus-with-data-type-field">
        <name>PDUs with Data Type Field</name>
        <t>The existing PDUs, including Serial Notify, Serial Query, Reset Query, Cache Response, and Cache Reset, can be extended to carry the Data Type field. The values of the Data Type field can be 4 for IPv4 Prefix, for IPv6 Prefix, 9 for Router Key, and 11 for ASPA. An example format of the extended Serial Query PDU is shown in <xref target="fig-serial"/>. A router can send the extended Serial Query PDU for requesting a specific type of data.</t>
        <figure anchor="fig-serial">
          <name>An example format of extended Serial Query PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |     Session ID      |
|    2     |    1     |                     |
+-------------------------------------------+
|                                           |
|                 Length=16                 |
|                                           |
+-------------------------------------------+
|                                           |
|                  Data Type                |
|                                           |
+-------------------------------------------+
|                                           |
|               Serial Number               |
|                                           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
      <section anchor="end-of-specific-data-pdu">
        <name>End of Specific Data PDU</name>
        <t>End of Data PDU tells the router that all the requested data are synchronized. The End of Specific Data PDU can be defined for indicating a specific type of data has been synchronized. An example format of End of Specific Data PDU is shown in <xref target="fig-end-pdu"/>. The field of PDU type is TBD. The Data Type field indicate the interested data types (i.e., 4: IPv4 Prefix, 6: IPv6 Prefix, 9: Router Key, 11: ASPA).</t>
        <t>The type of data specified in End of Specific Data PDU will become ready for use. The router does not need to wait for all the data to complete transmission before it can use the specified data.</t>
        <figure anchor="fig-end-pdu">
          <name>An example format of End of Specific Data PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |     Session ID      |
|          |          |                     |
+-------------------------------------------+
|                                           |
|                 Length=24                 |
|                                           |
+-------------------------------------------+
|                                           |
|               Serial Number               |
|                                           |
+-------------------------------------------+
|                                           |
|              Refresh Interval             |
|                                           |
+-------------------------------------------+
|                                           |
|               Retry Interval              |
|                                           |
+-------------------------------------------+
|                                           |
|              Expire Interval              |
|                                           |
+-------------------------------------------+
|                                           |
|                 Data Type                 |
|                                           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-19" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Arrcus, DRL, &amp; IIJ Research</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="10" month="April" year="2025"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data, Router Keys, and ASPA data from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-19"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>This document defines a "Signed Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (the subject AS) may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the subject AS produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by the subject AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-04"/>
        </reference>
        <reference anchor="I-D.xie-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-xie-sidrops-moa-profile-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.xie-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <author fullname="Di Ma" initials="D." surname="Ma">
              <organization>ZDNS</organization>
            </author>
            <date day="26" month="September" year="2024"/>
            <abstract>
              <t>For the authenticity of the mapping origin of IPv4 address block in IPv6-only networks, this document defines a standard profile for Mapping Origin Authorizations (MOAs). MOA is a cryptographically signed object that provides a means of verifying that the holder of a set of IPv4 prefixes has authorized an IPv6 mapping prefix to originate mapping for those prefixes. When receiving the MOA objects from the relying parties, PE devices can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-xie-sidrops-moa-profile-06"/>
        </reference>
        <reference anchor="I-D.chen-sidrops-sispi" target="https://datatracker.ietf.org/doc/html/draft-chen-sidrops-sispi-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.chen-sidrops-sispi.xml">
          <front>
            <title>A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="18" month="March" year="2025"/>
            <abstract>
              <t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-03"/>
        </reference>
      </references>
    </references>
    <?line 226?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9VabXMbtxH+fr8ClT/UbnQ3oqo6NieJQ1tyooneIsrJOJnM
FLwDSVTHwwXAiaIt5bf0t/SXdXcB3AvfbCetW3PG1h1eFovF7rMPlozjOLLS
5qLPhiIXqZU3gg0XRTrVqpBvuJWqYGOl2eXFd8fMKnapKis0u9DKqlTlER+N
tLh55+yryyhTacFnsFCm+djGE1FMYiMzrUoTa6tjEyTEBiTEe3+L1MioXFhh
+lFVZpwe8E8/SuH/idKLPjM2i0w1mkljYLGrRQkLHB9dvYwiWeo+s7oydn9v
7+nefsS14H0Gy0Vzpa8nWlUlzHcaRNdiAa0ZTC5gf4Ww8SGqGUW8slOl+xGL
I8ZkYfrsLGHfgPLw6vZzxovQoPSEh4332bcVnwsJzWLGZd5nuOWCF19PqT1J
1Qz6UmlhG8+F/IckEamqCos7ezGVBW8tO0zYTzCztfBwWhVzWLxu3r78Gxpm
3KTfqcTrhL2sagVeV+6tuy7NYa8K6WT71cfVovfk8dcpdlbUl6TFhyx9muCO
Wts/hQm/wr+6uavGT1NVTCbQlVYFO+EjpbkFl2k0InPMfv0a35I3kzTno0Rk
1XupFRVKzzh6K3gGu3z54vGT3p5/fLLvHo/jw0QKO669HDtGEpw4ksV4af7n
T/eehkk3vIhHsHJRzeq5JbdTXV7LjmDw4XmMrTE3caoKDBDXbUo+mQprZRNi
bphz+3Xa0YBSi7G8zaWxYcytFPWQmeIwQo1lLkJ3OhVF3W+kKUHDJEmiKI5j
xkfGap7a6GoqCEFiq2KPIA8BEx6x0uMIMzVqCMN4njMLU26ElmMpMoc+EPoc
IUiTAJOwq6k0DGClmonCoqhSGZgNQ8StFUVGMsQtbAa9BNZrloMxpipLpS2r
ccctYLrwlbSQbamLpRB7/EbJjBk1E6wqCpEKY7heLA8lZYXXnOapkeUS/hT5
gtR0m5tyy6RlAFQ5tBdCZGaXcdgJNGYK9lYoS820AQ46decCxNVDRJYwdwwz
mWW5iKIHCG5aZVVK6r99YEQaS2y6f48TAluDdeSszAUbVahkLvkIXngJY3g6
3WXzqUynbCrysn2e7ih5LhG722c51moGMgmjoSMFGWLpgAVsCDfFc7BJBnYV
4BM8R89AvDdMjUl8reXbt3/y0Xh/754x6uh5Uzze37vT8Q6BxoU0QqIby+KZ
jUA7zQszFlrDKFmkoJQRYd9gIDNV8wI6QA3LR7HXEheIojv2g3tle6x57rWe
99lddNeP6dP/bOUBOtnxxc0BJF8MUrb1zY193Ond9AZj25+7kOS/E4uVt5Wx
3bfB8GJQv0Vv++xByw6MmMaXO8Pa0M6+ZG0wWibHYFqM5eXjbcfuzn3kvLUd
z9dClIaGLgcpSCA4aR+piymzMbClC7TaISDzqDl63m7wTTbjC/QHiWxBkPvC
BjgrOSBK7Ti45i5mLwvO6zVJIAhBMvhLCr4D3QayEuJTVVQmmARt1eAFqFMV
6GqqwIDz2tc64+SVLbK5hCZZQLCLVXgiN/acyUkDJfhEMAWbnIKyAHvg3oLN
qtxKjPiucAxJL8NSwKiJAIXBPrYDc2hF2BUssSAJ/jyNx6yqyEEhBLc5l9YQ
VcSdBKQHklAiAezoiwxE42IzpQUtCMr448CmJVWlMyWBS4jUGb8WzluAFsD5
g+DKTzZyUkDOAd0tGQZIoREOH8Yqz9UcrG1o/+KWz2rL+DNBO7stzoJKkJOM
HAGaN/DiVeo4sG8bV7bSkFyjGPJOWiHMYPjhEV+oXKYLNixFSgqSp54Ahanw
4B5eXgxPHrGfPZX4BQXAVmC+j/ITSIMGcOnZuxL//T2DyYPKqkLNVGWA0IP/
zgx7gQSjI2GVf9zfw9xTyAio8bmWE9jXgBh0yITs4en5wDwKcjbQC5LjNzAc
/HB2dBVfCEFxchy4E2z/4VAOL45rYatkhORcAHcKCQhnzSW8Uxry87YRrrYm
3yB5IgeAQ16xEDurZiPEBi91OwcjuasyLkXu7DSVZddy7OFgeDmAIybZWmre
KMuN5rFjS84xfkGMbLOjTJhUy5FYD5JgdQCW2Tq4JceGlxsJIpyHe5dGXMkr
T2+AXTwA5X+tpBa4oKld06E13K8wljLDdk5fDa92dt1fdnZOz5dH3786vjw6
xOfht4OTk/oh8iOG356/OjlsnpqZL85PT4/ODt1kaGWdpmjndPB6x8XnzvnF
1fH52eBkx8Vb20AEaarGdIgHDFVuomA5itvnLy7+9c/egacZ+73eUwgXzzN6
nx/Ayxx80K1G3M69glEXEUSF4JryBGBcyktpeY7IEXgDIhkw57/8jJb5pc++
GKVl7+Ar34Ab7jQGm3UayWarLSuTnRHXNK1ZprZmp33J0l19B68778HurcYv
nuWyECzuPXn2VYTc9ML74NACTaQjcQS1NPer+b4mw5lj95U00yU2UaN+wg5r
YtHNDWaKpw64BVxAS6CVBUWwPz3BjgrK2oc49uLwVcJ+hNN0ESLyBYEy5PsF
gu+j7g2mXhx9qsmJuwBDWmK4gzjM/cgD4Pxb1G23zc12W+TLORUSrF1y1pm8
RWZytZJwHa+hDUA+pazmLxTaxWdGq2NnJgpsTYW8IRbBUqHpXnIt3dZp1y9h
pM92wGbG7Rzvk5qh07nZp4tBfTbhhoXTibl47XE+EUWQzmZISSYwgwgLHCb8
P+qwi4QNQBoER51ypenQI6QwZLWYQq4QFgs8bc60YFNOF0O3V+EMXt9EEnZO
14rc6UZrS09twuE7/uJNDAqOc7hZUl4nc8PI0aKlFSIiHk0hJnTNZwJcMLU1
o3XEI+AuXXGMZximzyj/v4sXtu4dbXpItz726sPYHk45LkBHmUqME7g9x2oc
d2em14Wa5yKbYHQm7PTDuOE6V/3Pc0NndWfdFdvPnXOlmMSI2BE8ewpJMYXB
gr5P22luqvyGy5w8+L0Yw7s40nsSBNgNbmaGAbktQ/twyOGAsH/zvQZyDh/J
XNoFGgruNGioCo8BHa25flEwhysYGh70thqcE4d1+YP3zF0mkkmy6yXR/D2E
Cgrz2i2o8gg+8cyVbvw1i7OJUllNJgBvpDZ2tylt+A25ixnetrRMnWd1NeVU
8qlqwT5E4fylc0Cg1KrIQMtyonkWNhNup3jiIA7362g4ONC85QS1ulhpQh+e
Kpm2b/+QzZXrDkfVKT4BkQAamTQMHiB5d0N9CuEKoMAVsszy2f3Y9VpUkxA9
g5yBPBW30A4LSBhuL421XHEpMB68//hcguPCmLaH4dbnAokLBB64E9qViDSa
UOUZGASduzYH3Tw9YUynsFdRIMqD1EaDibKSPHO3tRSGNQKM78BDzUSZq4VD
nS6tpYgutZxBWgUsHkO7CSgJDnUTzlgWtTNs4L50x0d7OCNiSvHGx0m1em2z
jd09FDkILGtcwQ2JjMghexQIvcPAkD2ZCU5+7+i58X5d1lNwF3Ulk4wHlhQl
4DFutybcDg7TqRS0xS2ljNW7Jh0RwrYmCgN7wepJp4z2Z+MqfTIlfxuQV9Q2
CAeIN1xXbXSZBnUfiZpl+EvBsBoRgca1QjKNDr2RSXBAf8yyGBV451szqfFP
HBjqG3jhaZdBKRdRya5bQelUapBS1GzCXScDsqLsbiVvLCex8fqIUCwcS5EH
huQ2AJOunh+6XlIZv4xy40xX0ZYqLZ0fykQAgh70u2zwcb9LCJ/2O5yw1+sT
yD4Kqa9VYzahBr7OmoGYeoo8GOMsOBQg0jXKN9McGtcVEE9fZZHmFeHo0PHn
MwjoMWjlX7+vhIa3S0jqNry8IFYMTSW4sa9l1W3COm5LPI5QrKWGN1fCjjsU
FFMKReRMQQZbtKeUtgV+a43gy7oGgwvXQ0Y019IGE0Bg3hBfb0tEU//222/R
XlP5fNI89h7Xj/sH4emvvSiJ3/+TRHf1V6xUY0VdV8qtTaG1qSHTEPK89ug3
Qqv26HX1202yP/sAvT+L1ktZ/1kuJtPnBPIEZJX3HL1F9gfrTU7BNtjkru72
mpCNe9iRJEkYEx7vXPfZit4bZLf1/vsH6P1n8kMss3dAioVK+1qUWxcIWFQH
rCYWQVm9QbCXiGAELTVV+S9Gvw9I9wWe43gp19qF9RKsOqy94Xkl6nvV0pAg
74CiuwOsvqGFrO6nCksX7l6PmhFjt2SNWt/23jflEhqCiWSwFq03y0JFMLsK
dwzAjD2VrFOoA0iCJ8Y+EYAaCne/PD5shRfo1sRGbyVM2rI/LkA5fPqyZcRt
o7fJ/sjA2kTGJ6R3QBZXl/tjev8BYHVabEXVjVHrodXXEsPlr6HCS0VGZuGS
1alvuW/2/U8ifPgH6ohkqX0Zd5C4aa2Ahu17omemW/CELqMjAVfO7kprzbBx
6VUcxBpTmVW/i1F/RELdMYU3kPsyYONe23Um97sFtHQVvkj057rygw4sdNV1
ruZGs6HWBQuMsVwl3Y8TsJRG1LfWsJULPu1M4F/WPnZk/08yQWO5raO3yf5U
EfUj6n0pxhDhU/fzzBsE409Db1DcQh5Yq/b/s95Ht6UEcPnk9GZbiM5HZAw+
t22nDJvyBzEG9/sPaRf4uwsjM6F5p5Doe/HHUM8P6bd9g7PB+rGSFzyMA03Z
iKfXEXz+DQFKlHL9LQAA

-->

</rfc>
