<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fu-sidrops-enhanced-slurm-filter-04" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Enhanced SLURM Filters">Filtering Out RPKI Data by Type based on Enhanced SLURM Filters</title>
    <seriesInfo name="Internet-Draft" value="draft-fu-sidrops-enhanced-slurm-filter-04"/>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy44@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="04"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>
<t>Simplified Local Internet Number Resource Management with the RPKI (SLURM) helps operators create a local view of the global RPKI by generating sets of filters and assertions. This document proposes to filter out RPKI data by type based on enhanced SLURM filters. Only the RPKI data types that the network or routers are interested in will appear in the Relying Party's output.</t>
    </abstract>
  </front>
  <middle>
    <?line 56?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Relying Party (RP) collects signed RPKI objects from global RPKI publication points. The RPKI data passing RP's validation will appear in RP's output. Then, the RPKI-to-Router (RTR) protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/> will synchronize the validated RPKI data from RP to routers. Currently, four types of RPKI data including IPv4 Prefix, IPv6 Prefix, Router Key, and ASPA are supported in the RTR protocol.</t>
      <t>However, in some cases, routers may be interested in a part of RPKI data types, instead of all <xref target="I-D.geng-sidrops-rtr-selective-sync"/>. In such cases, storing unused data on the router is unreasonable, and synchronizing all types of data will induce some unnecessary transmission and storage overhead. Besides, multiple types of data can be transmitted together.  The router cannot use any type of these data unless it waits for all data to complete transmission.</t>
      <t>Furthermore, there may be more types of RPKI data in the RPKI repositories and RPs, which makes the above problem more significant and worse. The followings are example types, and some of them may be possibly supported in the RPKI system in the future:
- Secured Routing Policy Specification Language (RPSL) <xref target="RFC7909"/>
- Signed Prefix Lists <xref target="I-D.ietf-sidrops-rpki-prefixlist"/> 
- Autonomous Systems Cones <xref target="I-D.ietf-grow-rpki-as-cones"/>
- Mapping Origin Authorizations (MOAs) <xref target="I-D.ietf-sidrops-moa-profile"/>
- Signed SAVNET-Peering Information (SiSPI) <xref target="I-D.chen-sidrops-sispi"/>
- Path validation with RPKI <xref target="I-D.van-beijnum-sidrops-pathrpki"/>
- Signed Groupings of Autonomous System Numbers <xref target="I-D.spaghetti-sidrops-rpki-asgroup"/></t>
      <t>To deal with the problem, configuring routers directly ignoring the     uninterested RPKI data transmitted by RTR protocol may not be a good    solution.  While storage overhead is avoided, transmission delay is   <br/>
not optimized.  Extending RTR protocol for supporting selective synchronization of RPKI data is an alternative solution <xref target="I-D.geng-sidrops-rtr-selective-sync"/>.  Both of the two solutions       require the upgrade of router software.</t>
      <t>SLURM provides a simple way to enable an RP to establish a local and customized view of the RPKI (<xref target="RFC8416"/>, <xref target="I-D.ietf-sidrops-aspa-slurm"/>). It defines Validation Output Filters to filter out specific RPKI data items and Locally Added Assertions to add RPKI data items. Unfortunately, SLURM cannot efficiently filter out RPKI data by type, i.e., filter out all the RPKI data belonging to a specific type.</t>
      <t>This document proposes enhanced SLURM filters which can filter out RPKI data by type. With enhanced SLURM filters, operators can efficiently select which type of RPKI data need to be synchronized to routers.</t>
      <t>The proposed method requires some modifications on the SLURM-related process of RP software. Upgrades of RTR implementations and router software implementations are not involved.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-uc">
      <name>Use Case</name>
      <t>One of use cases is IPv6-only network.  Suppose a IPv6-only network wants to enable ROV on BGP border routers.  The routers should be only interested in IPv6-related BGP validation because the routers can only receive IPv6 routes from neighbor ASes.  Therefore, IPv4 Prefix data is not useful for the network.  An example of IPv6-only network is New China Education and Research Network (named Future Internet Technology Infrastructure, FITI).</t>
      <artwork><![CDATA[
                     +------------+
                     | Rely Party |
                     +------------+
                      /          \
                     / Sync RPKI  \
                    /  data by RTR \
         +---------/----------------\---------+
   IPv6  |        /                  \        |IPv6
   routes| +----------+          +----------+ |routes
   ------->|BGP router|          |BGP router| |------>
         | +----------+          +----------+ |
         |             IPv6-only              |
         +------------------------------------+

]]></artwork>
      <t>As described in Section 1, there may be more types of RPKI data in the RPKI repositories and RPs. Thus, there will be more use cases where a network does not need all types of RPKI data in the future.</t>
    </section>
    <section anchor="sec-design">
      <name>Enhanced SLURM Filters</name>
      <t>This section proposes two optional designs.</t>
      <section anchor="design-1-rpki-data-type-filters">
        <name>Design 1: RPKI Data Type Filters</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object containing the following members:</t>
        <ul spacing="normal">
          <li>
            <t>A "slurmVersion" member that <bcp14>MUST</bcp14> be set to 3, encoded as a number</t>
          </li>
          <li>
            <t>A "validationOutputFilters" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly four members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixFilters" member, see Section 3.3.1 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecFilters" member, see section 3.3.2 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaFilters" member, see Section 3.1 <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
              <li>
                <t>A "typeFilters" member</t>
              </li>
            </ul>
          </li>
          <li>
            <t>A "locallyAddedAssertions" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly three members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixAssertions" member, see Section 3.4.1 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecAssertions" member, see Section 3.4.2 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaAssertions" member, see Section 3.2 <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following JSON structure with JSON members represents a SLURM file that has no filters or assertions:</t>
        <artwork><![CDATA[
  {
    "slurmVersion": 2,
    "validationOutputFilters": {
      "aspaFilters": [],
      "bgpsecFilters": [],
      "prefixFilters": [],
      "typeFilters": []
    },
    "locallyAddedAssertions": {
      "aspaAssertions": [],
      "bgpsecAssertions": [],
      "prefixAssertions": []
    }
  }
]]></artwork>
        <section anchor="rpki-data-type-filters">
          <name>RPKI Data Type Filters</name>
          <t>There are currently four types of RPKI data (which follows the RTR PDU definitions). The number of data types may increase with time.</t>
          <ul spacing="normal">
            <li>
              <t>IPv4 Prefix</t>
            </li>
            <li>
              <t>IPv6 Prefix</t>
            </li>
            <li>
              <t>Router Key</t>
            </li>
            <li>
              <t>ASPA</t>
            </li>
          </ul>
          <t>The RP can configure zero or at most four RPKI Data Type Filters ("Type Filter" for short). Each Type Filter contains a single 'rpkiDataType' and optionally a single 'comment'.</t>
          <ul spacing="normal">
            <li>
              <t>The 'rpkiDataType' member <bcp14>MUST</bcp14> be one of the values, i.e., "IPv4 Prefix", "IPv6 Prefix", "Router Key", and "ASPA".</t>
            </li>
            <li>
              <t>It is <bcp14>RECOMMENDED</bcp14> that an explanatory comment is included with each Type Filter so that it can be shown to users of the RP software.</t>
            </li>
          </ul>
          <t>Any RPKI data item that matches any configured Type Filter <bcp14>MUST</bcp14> be removed from the RP's output.</t>
          <t>A RPKI data item is considered to match with a Type Filter if the following condition applies: The item is considered to match if the RPKI data type of the item is equal to the "rpkiDataType" value of Type Filter.</t>
          <t>The following example JSON structure represents a "typeFilter" member with one object as described above:</t>
          <artwork><![CDATA[
  "typeFilter": [
    {
      "rpkiDataType": "IPv4 Prefix", 
      "comment": "Filter out VRPs with IPv4 Prefixes"
    }
  ]
]]></artwork>
          <t>When a type of RPKI data is to be filtered out, the corresponding Filters and Assertions <bcp14>MUST</bcp14> be ignored. In the above JSON example, the prefixFilters with IPv4 prefixes and the prefixAssertions with IPv4 prefixes will be ignored by RP.</t>
        </section>
      </section>
      <section anchor="design-2-special-asns">
        <name>Design 2: Special ASNs</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object which has the same structure as <xref target="I-D.ietf-sidrops-aspa-slurm"/>, except that the "slurmVersion" member <bcp14>MUST</bcp14> be set to 3.</t>
        <t>The structure of ROA filters, BGPsec filters, and ASPA filters are not changed.</t>
        <t>To filter out a specific type of RPKI data, a special value (e.g., 65535. The value is TBD) can be set to the "asn" member of the above filters.</t>
        <t>The following example JSON structure represents a "prefixFilters" member with one object as described above:</t>
        <artwork><![CDATA[
  "prefixFilters": [
    {
      "asn": 65535, 
      "comment": "Filter out VRPs with IPv4 and IPv6 Prefixes"
    }
  ]
]]></artwork>
        <t>When a type of RPKI data is to be filtered out, the corresponding Filters and Assertions <bcp14>MUST</bcp14> be ignored. In the above JSON example, the other prefixFilters and all the prefixAssertions will be ignored by RP.</t>
        <t>To filter only IPv4 Prefixes, two special values can be used, i.e., one is for IPv4 and the other is for IPv6. The concret design is TBD.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations in Section 6 of <xref target="RFC8416"/> are also applied to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8416" target="https://www.rfc-editor.org/info/rfc8416" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8416.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-23" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Arrcus, DRL, &amp; IIJ Research</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data, Router Keys, and ASPA data from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-23"/>
        </reference>
        <reference anchor="I-D.geng-sidrops-rtr-selective-sync" target="https://datatracker.ietf.org/doc/html/draft-geng-sidrops-rtr-selective-sync-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.geng-sidrops-rtr-selective-sync.xml">
          <front>
            <title>Selective Synchronization for RPKI to Router Protocol</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Shunwan Zhuang" initials="S." surname="Zhuang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yu Fu" initials="Y." surname="Fu">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid some unnecessary synchronizations. The router can obtain only the data that it really needs, and it does not need to save the data that are not needed.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-rtr-selective-sync-05"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-slurm" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-slurm-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-slurm.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management (SLURM) with RPKI Autonomous System Provider Authorizations (ASPA)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Ben Cartwright-Cox" initials="B." surname="Cartwright-Cox">
              <organization>Port 179 Ltd</organization>
            </author>
            <date day="16" month="November" year="2025"/>
            <abstract>
              <t>ISPs may want to establish a local view of exceptions to the Resource Public Key Infrastructure (RPKI) data in the form of local filters or additional attestations. This document defines an addendum to RFC 8416 by specifying a format for local filters and local assertions for Autonomous System Provider Authorizations (ASPA) for use with the RPKI.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-slurm-04"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="10" month="December" year="2025"/>
            <abstract>
              <t>This document defines a "Signed Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (the subject AS) may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the subject AS produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by the subject AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-05"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-moa-profile-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <author fullname="Di Ma" initials="D." surname="Ma">
              <organization>ZDNS</organization>
            </author>
            <date day="19" month="July" year="2025"/>
            <abstract>
              <t>This document proposes a new approach by leveraging Resource Public Key Infrastructure (RPKI) architecture to verify the authenticity of the mapping origin of an IPv4 address block. MOA is a newly defined cryptographically signed object, it provides a means that the address holder can authorize an IPv6 mapping prefix to originate mapping for one or more IPv4 prefixes. When receiving the MOA objects from the relying partie, PE device can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-moa-profile-02"/>
        </reference>
        <reference anchor="I-D.chen-sidrops-sispi" target="https://datatracker.ietf.org/doc/html/draft-chen-sidrops-sispi-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.chen-sidrops-sispi.xml">
          <front>
            <title>A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="September" year="2025"/>
            <abstract>
              <t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-04"/>
        </reference>
      </references>
    </references>
    <?line 235?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81aWXMbNxJ+n1+BpR8sxSRjybISs7LJ0jpibXRwRckpl+MH
cAYkEQ+B2QFGMmMpv2V/y/6y7QNzkZTtpPKwrEo8g6PR3ejj6x71er3Ia5+q
gTjWqVe5NjNxUXhxOfrpRBxKL8VkKa6WmRIT6VQirBFHZi5NDM/j0+vLs7DP
RXIyydXN4KHpxMZGLuCcJJdT35sWPaeT3Gaup8KGnkuLfNGb0obe073ITpxN
lVduEBVZIukB/xlEMfx/ZvPlQDifRK6YLLRz2hpkdCBOjq6Oo0hn+UD4vHB+
9+nTF093I5krORBwYnRr8/ez3BYZ7GcmovdqCaMJbDZwulG+d4h8RpEs/Nzm
g0j0IiG0cQPxpi+OC3hhcd4U/GbzmTT6N+mBjYE4mGsjxZVKVWwXMKsWUqcD
MS2We3v/iHHS81w/NjAdaw+yvFT6V9A/vtvCeBSP6DTOPu+LHxUt4dPPpSkH
2gy8KuSt0vXJM1hkpPnHnMb7zNVnjo0iY/MFELwBlQtxeXzw7d7Ofvm4+/zF
+uj+tztPqwX8eNI77Gvlp9V948REu3IOOavmcp/3HGoGD+25pYk3kpAuk2wu
A7hoM11h85sXT1+U+26k6U1AQlMsqu2Z9PM8e69btMEgbns4CtR7sTWq4hAO
m82V97pmk5exDW1ikBZkuZrqD6l2fuOahZWwxIK9q3I+nitTzTvtMmCx3+9H
Ua/XE3LifC5jH431Ikv1VIOPndpYppXNivNiMVG5uFTOFnmsxJk0cqYWynhx
q/1c+Lliz94i59wWc5VmDnxC5dLb3IkYfMQrIUVKhG+0uhV2SvtmqZ3AEG2H
mADXhpswXjjlHa5iz3VCmkRI51SOpuj64mqunQD/L4gREDmzTjnhbdghbBlw
khBwfCvgqHZECcf0xYVJl7VItBc3AuW59DQBOkFfB98QcFXMXK7AleBROQ8k
tQHNpKmQWaZkjq9EUKVLlGwkc7987JDBrPB9wRex0EmSqih6hIrPbVLEKKj4
+MipuKdx6D5qURBbl6Nt8K4UDdtBzJkZOJq4tpNfaWya20VLxVkxSXVM3iwy
C1RJkU1ZM9AxHnE5Ag5vZKoTXr0iD02XAgAF06101vO2d0l6AQ6vLrfxbrwF
PsXHj38L3nx/z8/otfT8kD/f3/PJ6LTz3EIoUnRQ4KwUmFgnaS9HaALhXvri
oMhzsI902RVTsN5wlWBW9TZt4rRIUOaT0c2eGJF/dfFlv3oJ8vykgA4a4nA8
GtKluyLLbB7unDRwdVkJjFf7yt6qG5V3cd7ZhRIxGKDrVpazkEsxWTUevIbc
t9kkzpEMLJIJzskUVfoF0e7+vg9GBbzG8/J4B46JIhemQH+gEyxLwJwJ8K7C
gOM6a+QkVSx3fQ24GRmoFEok6K60AeNVLG1hjIqVczIHp8qlcSGnMjVgAiKJ
sKCgOQjVh6wBUiB/iyL1OkvVCv0YMhNoK1DyqC5vZwrYzvuCLDlwDwuN9QKE
g5OC63PIgREiVZgU+BIagpjU6CvgzigQK9uCY0E8BJzQYhuC5nGR43ELmyuy
eTCCcIc4tNnA6niSKwhTGpWvOKRdjkDa27mGq1nI9xRmgOUJqATNCBS/YLro
3hCdQS5P+yACOcXOO4UQYG/hQjgOqQ9yUWkuXBteBYu/KLkFPpyeQKxbN2Fk
1C3Bzhbl0LTwRQ4JpSfGKoanhDyCQpGFgLIU40zFxB4Fi1NpZgXeLISo8em2
eBvS5zskwHGKPUucQh5zYMU/fC7ZQSCAzcPCW2MXtnBiTAw6cYBJtUVhPefe
38PeM4heBERzPQOxhgTBArRxYuvsYui2N3LSSKlEKEgwHr4+P7rqjRTj25MS
MID8W2M9Hp1U1NYTMNEZAWBoh1h4J+WHfZ9CGU1OfkTEQPcPd7ymopC/Kx19
GngA3ejKikRByqiye7DELjiFmepZQQKXESzROcQaMCRghoMKbsFfYRphrRHJ
Gt4LabkZMck40XEnCBdm1iZIBwB7gRoCF/95DrewFjgwWMkbC6Ej6bbDTKJS
oAjT+IuQss28XkAagWgjjj54ZSj0t5jAUBC8gpFICKaN8Mc31nZzdGgIIYia
JC8PfIu3XxCk3wE/Ly0oPCAjwBgVAWZfQPT4d6FzzoBFNstlQm4dYp6zU38L
EQCCFGMaEOgGwymo0mmKCbegDIhtikI6ssvpEm4IBrSbVxgNo0YMVY4lVbUg
G0O9twGiv+uGHPQAlL6/34bk4+Eiphod9XVt7xcEH8pabgW5uRBQmgomf0fO
CKCCxQ0TuHExrFAh0pBJsrqnL67ROX1BBRKkcFZPyBFqCsdoAgmfhI6Qe/uq
322uoQTYgk8TlVozIyewqPZSCiSAcOAB1LoZjIa8gEnvU4z1xc/oqJtpdJs4
HAg1pWUDDKeUKbImbxSlV/TFBvxKWvgKJVKlHIlYQCoGnw126jjxLGxSpQZX
ogxispeDe2IYAAKIEvj82pDFNRs5T4CLkhWj6gIxNIYV619fA2N4z9rc2PQG
/R5A9iNA48QjLnRVwmJxoGzH/Jo40Tm7Hl91uvyvOL+g58ujf12fXB4d4vP4
1fD0tHqIworxq4vr08P6qd55cHF2dnR+yJthVLSGos7Z8E2Hc3bnYnR1cnE+
PO1wEm7aDYrEF0MBFrIkKlG6CFQV53rCufzlwei//9nZC7B7d2fnBSTRgLt3
vtlDaE3AHU+zWPXcljh+GdVIH208lpn2MkU0AXc6t7dGIPCBQPPVW9TMu4H4
bhJnO3vfhwEUuDVY6qw1SDpbH1nbzErcMLThmEqbrfEVTbf5Hb5pvZd6bwx+
90MKwUv0dr794fsIS7RrQJEHgKRDeVbEkDUvDPkPQk4C2ZgQsIjokW5D0QhB
foyZBXHp+izEZ7TGOkJfXrxGh3n540hMwCBVXnteA+3SnRRpggZB5NrVBB1T
ehqSamCOiYolcuwbxDBMEBnI6wrzGJVCNBtKSqP0bA4MQR2kAisA1AgRN2qo
Ki0GJD4tOLU2amjYOzQVYgXtrasE9p9D8uHe1xFUFsw4YWcA8zKH2HUe1m5h
/yoRx4RW6wbGlYrnxqZ2tkSUlkvnc6iuC2T3+OTqZBvs+Pfff4/Ept+TXuP3
ZPOaOyrtQ1V+9+fpiK/rx182L/kaQJ0JSfGBNUCkzA4YMhuLah6+7q38fmnz
RjcOcq3zVfFXCY9rcQ8byF1T0icb5X8i7ngt7gpj39+hYbIF3tW7WqN3YWkt
0Jcd1lzf/NW21vrdbVLYJ35P2HqiIQToZvgdK+7g7PxFZSIWe4UriVGlXVKr
Y84tTcrKexKr2P8ombcK9rWTucjrY3zb3G4P0Q6kBKh/z1jGBSnrBhzgVsTY
1gCM5KUupNxDehM7g8aHAPoKULbzo2ENXhQWG47KQ+x1COxKweA/xxfnVE9i
q/hd6HThUi+1KYuPqiIGQEK1zwAylRiKDkHS1zAA7HXCJDf2KGsh0oF4AfH3
WRdCcGwTSquoT6qhApU6fjKEDexXBG/nGN9hVaFCVcBscrkeWKYDA98YAamE
oh5VzTO4B57HVfDKKV1gVVVG9qz/rL8jKlBebZ3MMrihjVtdY+vuhq2I4T9z
5s7nsH9FDK1uhVhQZspYnqB8jeT/Al1CnQzMPqDM9ZNWZdv7hD6/ZPdDKv38
3t3Pa7XV9mGfqJIal+00FoTHcAJwgJCubHoYWf5cYoSoag5sg1UsDsrM+JGC
Ytt/BmK3y8MPOcQg7BNtaxqIt++65UTbQltTbbtvTTXtCSdo/D6w84BJrXDT
mllj6KHZNfOpT4/wP0oFj7C+eCDEXXGEhv/isjf9YGt6i0szvmlX9ZdHh9dc
T2tiYZt9gUNU1SplcphztMEPMC4YhtcLqkR7TajGb/v1W93wxq7beDRkm4Pi
DNFh2QZS4jeVWzIZD5nIeZZks+hiq9N47XCXZQ5lOfB/JEHMxmzpzK4O/I+x
S4VEcdljLlpCmgEN1stiu8Aa6THK+BWj5JWtIbKUEd+asjfKYcaVhX6noaAO
v+43XmsVlRUb6qnTp2NPPEarRsnBvoYF+IcslQYL8qUIvOJS/goB6YYuSa3q
w1kmoH3ZA+cyDFIVJP/c1c2ZZhtoaJYrvRCmspA+nhOyWNZ3mbQOLLUDFbKF
oplxP59Qf/nBhL1CH0ShvA21CrcK6CyWqmUPQk9XcjXsSzSD+yxLAfkM6PY+
RVZPV/ovjUZ/tREKfYAi3tJgp2kLnZBYYEODs7KrUXNWFigrgbYVVhshqU5e
KDXZF+cp2YSI1OSvAmxzO4QUiihVuGrxPFg1zHJVsCZccFy3i14DdGRGGruU
61Qx6x3HrJ+h+BdyQxtIu9Br4AyBX08Lz5/7YgsRzGWWe6iln9MHsronV1oS
tYex/XJiGh85SKVBv93QbG5E/QbnWeCc6NcLGydtWFvC5HA4FUWjNhzdHfDX
C7CR4fjc/WkMyrEasyky56ASbZiKdJ9L6gA4P8Qq8/V35s1odRWoltZan4W3
dzGsG4BQQ0FCq9+rD5jVp/XQIYsB9M+4QXbVasauNDJb9tEtZ/HLPnnTlurP
IHzuP3/+7Dmnpgq+Xb083K4CGAtAkkpXCxi8l82j+iz/p1xyI3D+Q165BkHa
jol8D1jSP+iHeAmNhPL/7JAWK84Vt6S/xgjd7w1++IDTNawKy+5WQOryF4+m
JbnSVPAbdZmV8eI0f66tFFlzWc/ss+mBAwP68aESDTaIvECVS98ytV/iN0RK
LaFjzGWuC7MBbpevVR4KixuV/j7eU4X6ya1kCpmb01nC1t7o41IcEifD8+Fm
DjTghPvVbwYBrtMuGfMfw/BfkExk/B4JDuP3xt6mKuE/0nHRxwFjQ5X8vTMF
jlQHqb48jOj3P5qbG/euJwAA

-->

</rfc>
