<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fu-sidrops-enhanced-slurm-filter-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Enhanced SLURM Filters">Filtering Out RPKI Data by Type based on Enhanced SLURM Filters</title>
    <seriesInfo name="Internet-Draft" value="draft-fu-sidrops-enhanced-slurm-filter-02"/>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="02"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>
<t>Simplified Local Internet Number Resource Management with the RPKI (SLURM) helps operators create a local view of the global RPKI by generating sets of filters and assertions. This document proposes to filter out RPKI data by type based on enhanced SLURM filters. Only the RPKI data types that the network or routers are interested in will appear in the Relying Party's output.</t>
    </abstract>
  </front>
  <middle>
    <?line 56?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Relying Party (RP) collects signed RPKI objects from global RPKI publication points. The RPKI data passing RP's validation will appear in RP's output. Then, the RPKI-to-Router (RTR) protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/> will synchronize the validated RPKI data from RP to routers. Currently, four types of RPKI data including IPv4 Prefix, IPv6 Prefix, Router Key, and ASPA are supported in the RTR protocol.</t>
      <t>However, in some cases, routers may be interested in a part of RPKI data types, instead of all <xref target="I-D.geng-sidrops-rtr-selective-sync"/>. In such cases, storing unused data on the router is unreasonable, and synchronizing all types of data will induce some unnecessary transmission and storage overhead. Besides, multiple types of data can be transmitted together.  The router cannot use any type of these data unless it waits for all data to complete transmission.</t>
      <t>Furthermore, there may be more types of RPKI data in the RPKI repositories and RPs, which makes the above problem more significant and worse. The followings are example types, and some of them may be possibly supported in the RPKI system in the future:
- Secured Routing Policy Specification Language (RPSL) <xref target="RFC7909"/>
- Signed Prefix Lists <xref target="I-D.ietf-sidrops-rpki-prefixlist"/> 
- Autonomous Systems Cones <xref target="I-D.ietf-grow-rpki-as-cones"/>
- Mapping Origin Authorizations (MOAs) <xref target="I-D.ietf-sidrops-moa-profile"/>
- Signed SAVNET-Peering Information (SiSPI) <xref target="I-D.chen-sidrops-sispi"/>
- Path validation with RPKI <xref target="I-D.van-beijnum-sidrops-pathrpki"/>
- Signed Groupings of Autonomous System Numbers <xref target="I-D.spaghetti-sidrops-rpki-asgroup"/></t>
      <t>To deal with the problem, configuring routers directly ignoring the     uninterested RPKI data transmitted by RTR protocol may not be a good    solution.  While storage overhead is avoided, transmission delay is   <br/>
not optimized.  Extending RTR protocol for supporting selective synchronization of RPKI data is an alternative solution <xref target="I-D.geng-sidrops-rtr-selective-sync"/>.  Both of the two solutions       require the upgrade of router software.</t>
      <t>SLURM provides a simple way to enable an RP to establish a local and customized view of the RPKI (<xref target="RFC8416"/>, <xref target="I-D.ietf-sidrops-aspa-slurm"/>). It defines Validation Output Filters to filter out specific RPKI data items and Locally Added Assertions to add RPKI data items. Unfortunately, SLURM cannot efficiently filter out RPKI data by type, i.e., filter out all the RPKI data belonging to a specific type.</t>
      <t>This document proposes enhanced SLURM filters which can filter out RPKI data by type. With enhanced SLURM filters, operators can efficiently select which type of RPKI data need to be synchronized to routers.</t>
      <t>The proposed method requires some modifications on the SLURM-related process of RP software. Upgrades of RTR implementations and router software implementations are not involved.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-uc">
      <name>Use Case</name>
      <t>One of use cases is IPv6-only network.  Suppose a IPv6-only network wants to enable ROV on BGP border routers.  The routers should be only interested in IPv6-related BGP validation because the routers can only receive IPv6 routes from neighbor ASes.  Therefore, IPv4 Prefix data is not useful for the network.  An example of IPv6-only network is New China Education and Research Network (named Future Internet Technology Infrastructure, FITI).</t>
      <artwork><![CDATA[
                     +------------+
                     | Rely Party |
                     +------------+
                      /          \
                     / Sync RPKI  \
                    /  data by RTR \
         +---------/----------------\---------+
   IPv6  |        /                  \        |IPv6
   routes| +----------+          +----------+ |routes
   ------->|BGP router|          |BGP router| |------>
         | +----------+          +----------+ |
         |             IPv6-only              |
         +------------------------------------+

]]></artwork>
      <t>As described in Section 1, there may be more types of RPKI data in the RPKI repositories and RPs. Thus, there will be more use cases where a network does not need all types of RPKI data in the future.</t>
    </section>
    <section anchor="sec-design">
      <name>Enhanced SLURM Filters</name>
      <t>This section proposes two optional designs.</t>
      <section anchor="design-1-rpki-data-type-filters">
        <name>Design 1: RPKI Data Type Filters</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object containing the following members:</t>
        <ul spacing="normal">
          <li>
            <t>A "slurmVersion" member that <bcp14>MUST</bcp14> be set to 3, encoded as a number</t>
          </li>
          <li>
            <t>A "validationOutputFilters" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly four members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixFilters" member, see Section 3.3.1 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecFilters" member, see section 3.3.2 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaFilters" member, see Section 3.1 <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
              <li>
                <t>A "typeFilters" member</t>
              </li>
            </ul>
          </li>
          <li>
            <t>A "locallyAddedAssertions" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly three members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixAssertions" member, see Section 3.4.1 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecAssertions" member, see Section 3.4.2 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaAssertions" member, see Section 3.2 <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following JSON structure with JSON members represents a SLURM file that has no filters or assertions:</t>
        <artwork><![CDATA[
  {
    "slurmVersion": 2,
    "validationOutputFilters": {
      "aspaFilters": [],
      "bgpsecFilters": [],
      "prefixFilters": [],
      "typeFilters": []
    },
    "locallyAddedAssertions": {
      "aspaAssertions": [],
      "bgpsecAssertions": [],
      "prefixAssertions": []
    }
  }
]]></artwork>
        <section anchor="rpki-data-type-filters">
          <name>RPKI Data Type Filters</name>
          <t>There are currently four types of RPKI data (which follows the RTR PDU definitions). The number of data types may increase with time.</t>
          <ul spacing="normal">
            <li>
              <t>IPv4 Prefix</t>
            </li>
            <li>
              <t>IPv6 Prefix</t>
            </li>
            <li>
              <t>Router Key</t>
            </li>
            <li>
              <t>ASPA</t>
            </li>
          </ul>
          <t>The RP can configure zero or at most four RPKI Data Type Filters ("Type Filter" for short). Each Type Filter contains a single 'rpkiDataType' and optionally a single 'comment'.</t>
          <ul spacing="normal">
            <li>
              <t>The 'rpkiDataType' member <bcp14>MUST</bcp14> be one of the values, i.e., "IPv4 Prefix", "IPv6 Prefix", "Router Key", and "ASPA".</t>
            </li>
            <li>
              <t>It is <bcp14>RECOMMENDED</bcp14> that an explanatory comment is included with each Type Filter so that it can be shown to users of the RP software.</t>
            </li>
          </ul>
          <t>Any RPKI data item that matches any configured Type Filter <bcp14>MUST</bcp14> be removed from the RP's output.</t>
          <t>A RPKI data item is considered to match with a Type Filter if the following condition applies: The item is considered to match if the RPKI data type of the item is equal to the "rpkiDataType" value of Type Filter.</t>
          <t>The following example JSON structure represents a "typeFilter" member with one object as described above:</t>
          <artwork><![CDATA[
  "typeFilter": [
    {
      "rpkiDataType": "IPv4 Prefix", 
      "comment": "Filter out VRPs with IPv4 Prefixes"
    }
  ]
]]></artwork>
          <t>When a type of RPKI data is to be filtered out, the corresponding Filters and Assertions <bcp14>MUST</bcp14> be ignored. In the above JSON example, the prefixFilters with IPv4 prefixes and the prefixAssertions with IPv4 prefixes will be ignored by RP.</t>
        </section>
      </section>
      <section anchor="design-2-special-asns">
        <name>Design 2: Special ASNs</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object which has the same structure as <xref target="I-D.ietf-sidrops-aspa-slurm"/>, except that the "slurmVersion" member <bcp14>MUST</bcp14> be set to 3.</t>
        <t>The structure of ROA filters, BGPsec filters, and ASPA filters are not changed.</t>
        <t>To filter out a specific type of RPKI data, a special value (e.g., 65535. The value is TBD) can be set to the "asn" member of the above filters.</t>
        <t>The following example JSON structure represents a "prefixFilters" member with one object as described above:</t>
        <artwork><![CDATA[
  "prefixFilters": [
    {
      "asn": 65535, 
      "comment": "Filter out VRPs with IPv4 and IPv6 Prefixes"
    }
  ]
]]></artwork>
        <t>When a type of RPKI data is to be filtered out, the corresponding Filters and Assertions <bcp14>MUST</bcp14> be ignored. In the above JSON example, the other prefixFilters and all the prefixAssertions will be ignored by RP.</t>
        <t>To filter only IPv4 Prefixes, two special values can be used, i.e., one is for IPv4 and the other is for IPv6. The concret design is TBD.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations in Section 6 of <xref target="RFC8416"/> are also applied to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8416" target="https://www.rfc-editor.org/info/rfc8416" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8416.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-16" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>IIJ Research, Arrcus, &amp; DRL</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data and Router Keys from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-16"/>
        </reference>
        <reference anchor="I-D.geng-sidrops-rtr-selective-sync" target="https://datatracker.ietf.org/doc/html/draft-geng-sidrops-rtr-selective-sync-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.geng-sidrops-rtr-selective-sync.xml">
          <front>
            <title>Selective Synchronization for RPKI to Router Protocol</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Shunwan Zhuang" initials="S." surname="Zhuang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yu Fu" initials="Y." surname="Fu">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="11" month="October" year="2024"/>
            <abstract>
              <t>The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid some unnecessary synchronizations. The router can obtain only the data that it really needs, and it does not need to save the data that are not needed.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-rtr-selective-sync-04"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-slurm" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-slurm-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-slurm.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management (SLURM) with RPKI Autonomous System Provider Authorizations (ASPA)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Ben Cartwright-Cox" initials="B." surname="Cartwright-Cox">
              <organization>Port 179 Ltd</organization>
            </author>
            <date day="27" month="November" year="2024"/>
            <abstract>
              <t>ISPs may want to establish a local view of exceptions to the Resource Public Key Infrastructure (RPKI) data in the form of local filters or additional attestations. This document defines an addendum to RFC 8416 by specifying a format for local filters and local assertions for Autonomous System Provider Authorizations (ASPA) for use with the RPKI.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-slurm-02"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>This document defines a "Signed Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (the subject AS) may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the subject AS produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by the subject AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-04"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-moa-profile-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <author fullname="Di Ma" initials="D." surname="Ma">
              <organization>ZDNS</organization>
            </author>
            <date day="9" month="October" year="2024"/>
            <abstract>
              <t>This document proposes a new approach by leveraging Resource Public Key Infrastructure (RPKI) architecture to verify the authenticity of the mapping origin of an IPv4 address block. MOA is a newly defined cryptographically signed object, it provides a means that the address holder can authorize an IPv6 mapping prefix to originate mapping for one or more IPv4 prefixes. When receiving the MOA objects from the relying partie, PE device can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-moa-profile-00"/>
        </reference>
        <reference anchor="I-D.chen-sidrops-sispi" target="https://datatracker.ietf.org/doc/html/draft-chen-sidrops-sispi-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.chen-sidrops-sispi.xml">
          <front>
            <title>A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="25" month="September" year="2024"/>
            <abstract>
              <t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-02"/>
        </reference>
      </references>
    </references>
    <?line 235?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
