<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fu-sidrops-enhanced-slurm-filter-03" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Enhanced SLURM Filters">Filtering Out RPKI Data by Type based on Enhanced SLURM Filters</title>
    <seriesInfo name="Internet-Draft" value="draft-fu-sidrops-enhanced-slurm-filter-03"/>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>
<t>Simplified Local Internet Number Resource Management with the RPKI (SLURM) helps operators create a local view of the global RPKI by generating sets of filters and assertions. This document proposes to filter out RPKI data by type based on enhanced SLURM filters. Only the RPKI data types that the network or routers are interested in will appear in the Relying Party's output.</t>
    </abstract>
  </front>
  <middle>
    <?line 56?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Relying Party (RP) collects signed RPKI objects from global RPKI publication points. The RPKI data passing RP's validation will appear in RP's output. Then, the RPKI-to-Router (RTR) protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/> will synchronize the validated RPKI data from RP to routers. Currently, four types of RPKI data including IPv4 Prefix, IPv6 Prefix, Router Key, and ASPA are supported in the RTR protocol.</t>
      <t>However, in some cases, routers may be interested in a part of RPKI data types, instead of all <xref target="I-D.geng-sidrops-rtr-selective-sync"/>. In such cases, storing unused data on the router is unreasonable, and synchronizing all types of data will induce some unnecessary transmission and storage overhead. Besides, multiple types of data can be transmitted together.  The router cannot use any type of these data unless it waits for all data to complete transmission.</t>
      <t>Furthermore, there may be more types of RPKI data in the RPKI repositories and RPs, which makes the above problem more significant and worse. The followings are example types, and some of them may be possibly supported in the RPKI system in the future:
- Secured Routing Policy Specification Language (RPSL) <xref target="RFC7909"/>
- Signed Prefix Lists <xref target="I-D.ietf-sidrops-rpki-prefixlist"/> 
- Autonomous Systems Cones <xref target="I-D.ietf-grow-rpki-as-cones"/>
- Mapping Origin Authorizations (MOAs) <xref target="I-D.ietf-sidrops-moa-profile"/>
- Signed SAVNET-Peering Information (SiSPI) <xref target="I-D.chen-sidrops-sispi"/>
- Path validation with RPKI <xref target="I-D.van-beijnum-sidrops-pathrpki"/>
- Signed Groupings of Autonomous System Numbers <xref target="I-D.spaghetti-sidrops-rpki-asgroup"/></t>
      <t>To deal with the problem, configuring routers directly ignoring the     uninterested RPKI data transmitted by RTR protocol may not be a good    solution.  While storage overhead is avoided, transmission delay is   <br/>
not optimized.  Extending RTR protocol for supporting selective synchronization of RPKI data is an alternative solution <xref target="I-D.geng-sidrops-rtr-selective-sync"/>.  Both of the two solutions       require the upgrade of router software.</t>
      <t>SLURM provides a simple way to enable an RP to establish a local and customized view of the RPKI (<xref target="RFC8416"/>, <xref target="I-D.ietf-sidrops-aspa-slurm"/>). It defines Validation Output Filters to filter out specific RPKI data items and Locally Added Assertions to add RPKI data items. Unfortunately, SLURM cannot efficiently filter out RPKI data by type, i.e., filter out all the RPKI data belonging to a specific type.</t>
      <t>This document proposes enhanced SLURM filters which can filter out RPKI data by type. With enhanced SLURM filters, operators can efficiently select which type of RPKI data need to be synchronized to routers.</t>
      <t>The proposed method requires some modifications on the SLURM-related process of RP software. Upgrades of RTR implementations and router software implementations are not involved.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-uc">
      <name>Use Case</name>
      <t>One of use cases is IPv6-only network.  Suppose a IPv6-only network wants to enable ROV on BGP border routers.  The routers should be only interested in IPv6-related BGP validation because the routers can only receive IPv6 routes from neighbor ASes.  Therefore, IPv4 Prefix data is not useful for the network.  An example of IPv6-only network is New China Education and Research Network (named Future Internet Technology Infrastructure, FITI).</t>
      <artwork><![CDATA[
                     +------------+
                     | Rely Party |
                     +------------+
                      /          \
                     / Sync RPKI  \
                    /  data by RTR \
         +---------/----------------\---------+
   IPv6  |        /                  \        |IPv6
   routes| +----------+          +----------+ |routes
   ------->|BGP router|          |BGP router| |------>
         | +----------+          +----------+ |
         |             IPv6-only              |
         +------------------------------------+

]]></artwork>
      <t>As described in Section 1, there may be more types of RPKI data in the RPKI repositories and RPs. Thus, there will be more use cases where a network does not need all types of RPKI data in the future.</t>
    </section>
    <section anchor="sec-design">
      <name>Enhanced SLURM Filters</name>
      <t>This section proposes two optional designs.</t>
      <section anchor="design-1-rpki-data-type-filters">
        <name>Design 1: RPKI Data Type Filters</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object containing the following members:</t>
        <ul spacing="normal">
          <li>
            <t>A "slurmVersion" member that <bcp14>MUST</bcp14> be set to 3, encoded as a number</t>
          </li>
          <li>
            <t>A "validationOutputFilters" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly four members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixFilters" member, see Section 3.3.1 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecFilters" member, see section 3.3.2 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaFilters" member, see Section 3.1 <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
              <li>
                <t>A "typeFilters" member</t>
              </li>
            </ul>
          </li>
          <li>
            <t>A "locallyAddedAssertions" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly three members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixAssertions" member, see Section 3.4.1 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecAssertions" member, see Section 3.4.2 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaAssertions" member, see Section 3.2 <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following JSON structure with JSON members represents a SLURM file that has no filters or assertions:</t>
        <artwork><![CDATA[
  {
    "slurmVersion": 2,
    "validationOutputFilters": {
      "aspaFilters": [],
      "bgpsecFilters": [],
      "prefixFilters": [],
      "typeFilters": []
    },
    "locallyAddedAssertions": {
      "aspaAssertions": [],
      "bgpsecAssertions": [],
      "prefixAssertions": []
    }
  }
]]></artwork>
        <section anchor="rpki-data-type-filters">
          <name>RPKI Data Type Filters</name>
          <t>There are currently four types of RPKI data (which follows the RTR PDU definitions). The number of data types may increase with time.</t>
          <ul spacing="normal">
            <li>
              <t>IPv4 Prefix</t>
            </li>
            <li>
              <t>IPv6 Prefix</t>
            </li>
            <li>
              <t>Router Key</t>
            </li>
            <li>
              <t>ASPA</t>
            </li>
          </ul>
          <t>The RP can configure zero or at most four RPKI Data Type Filters ("Type Filter" for short). Each Type Filter contains a single 'rpkiDataType' and optionally a single 'comment'.</t>
          <ul spacing="normal">
            <li>
              <t>The 'rpkiDataType' member <bcp14>MUST</bcp14> be one of the values, i.e., "IPv4 Prefix", "IPv6 Prefix", "Router Key", and "ASPA".</t>
            </li>
            <li>
              <t>It is <bcp14>RECOMMENDED</bcp14> that an explanatory comment is included with each Type Filter so that it can be shown to users of the RP software.</t>
            </li>
          </ul>
          <t>Any RPKI data item that matches any configured Type Filter <bcp14>MUST</bcp14> be removed from the RP's output.</t>
          <t>A RPKI data item is considered to match with a Type Filter if the following condition applies: The item is considered to match if the RPKI data type of the item is equal to the "rpkiDataType" value of Type Filter.</t>
          <t>The following example JSON structure represents a "typeFilter" member with one object as described above:</t>
          <artwork><![CDATA[
  "typeFilter": [
    {
      "rpkiDataType": "IPv4 Prefix", 
      "comment": "Filter out VRPs with IPv4 Prefixes"
    }
  ]
]]></artwork>
          <t>When a type of RPKI data is to be filtered out, the corresponding Filters and Assertions <bcp14>MUST</bcp14> be ignored. In the above JSON example, the prefixFilters with IPv4 prefixes and the prefixAssertions with IPv4 prefixes will be ignored by RP.</t>
        </section>
      </section>
      <section anchor="design-2-special-asns">
        <name>Design 2: Special ASNs</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object which has the same structure as <xref target="I-D.ietf-sidrops-aspa-slurm"/>, except that the "slurmVersion" member <bcp14>MUST</bcp14> be set to 3.</t>
        <t>The structure of ROA filters, BGPsec filters, and ASPA filters are not changed.</t>
        <t>To filter out a specific type of RPKI data, a special value (e.g., 65535. The value is TBD) can be set to the "asn" member of the above filters.</t>
        <t>The following example JSON structure represents a "prefixFilters" member with one object as described above:</t>
        <artwork><![CDATA[
  "prefixFilters": [
    {
      "asn": 65535, 
      "comment": "Filter out VRPs with IPv4 and IPv6 Prefixes"
    }
  ]
]]></artwork>
        <t>When a type of RPKI data is to be filtered out, the corresponding Filters and Assertions <bcp14>MUST</bcp14> be ignored. In the above JSON example, the other prefixFilters and all the prefixAssertions will be ignored by RP.</t>
        <t>To filter only IPv4 Prefixes, two special values can be used, i.e., one is for IPv4 and the other is for IPv6. The concret design is TBD.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations in Section 6 of <xref target="RFC8416"/> are also applied to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8416" target="https://www.rfc-editor.org/info/rfc8416" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8416.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-21" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Arrcus, DRL, &amp; IIJ Research</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="11" month="June" year="2025"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data, Router Keys, and ASPA data from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-21"/>
        </reference>
        <reference anchor="I-D.geng-sidrops-rtr-selective-sync" target="https://datatracker.ietf.org/doc/html/draft-geng-sidrops-rtr-selective-sync-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.geng-sidrops-rtr-selective-sync.xml">
          <front>
            <title>Selective Synchronization for RPKI to Router Protocol</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Shunwan Zhuang" initials="S." surname="Zhuang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yu Fu" initials="Y." surname="Fu">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid some unnecessary synchronizations. The router can obtain only the data that it really needs, and it does not need to save the data that are not needed.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-rtr-selective-sync-05"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-slurm" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-slurm-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-slurm.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management (SLURM) with RPKI Autonomous System Provider Authorizations (ASPA)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Ben Cartwright-Cox" initials="B." surname="Cartwright-Cox">
              <organization>Port 179 Ltd</organization>
            </author>
            <date day="22" month="May" year="2025"/>
            <abstract>
              <t>ISPs may want to establish a local view of exceptions to the Resource Public Key Infrastructure (RPKI) data in the form of local filters or additional attestations. This document defines an addendum to RFC 8416 by specifying a format for local filters and local assertions for Autonomous System Provider Authorizations (ASPA) for use with the RPKI.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-slurm-03"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>This document defines a "Signed Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (the subject AS) may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the subject AS produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by the subject AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-04"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-moa-profile-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <author fullname="Di Ma" initials="D." surname="Ma">
              <organization>ZDNS</organization>
            </author>
            <date day="10" month="April" year="2025"/>
            <abstract>
              <t>This document proposes a new approach by leveraging Resource Public Key Infrastructure (RPKI) architecture to verify the authenticity of the mapping origin of an IPv4 address block. MOA is a newly defined cryptographically signed object, it provides a means that the address holder can authorize an IPv6 mapping prefix to originate mapping for one or more IPv4 prefixes. When receiving the MOA objects from the relying partie, PE device can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-moa-profile-01"/>
        </reference>
        <reference anchor="I-D.chen-sidrops-sispi" target="https://datatracker.ietf.org/doc/html/draft-chen-sidrops-sispi-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.chen-sidrops-sispi.xml">
          <front>
            <title>A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="18" month="March" year="2025"/>
            <abstract>
              <t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-03"/>
        </reference>
      </references>
    </references>
    <?line 235?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
