<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-guo-sidrops-rpa-profile-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Route Path Authorizations">A Profile for Route Path Authorizations (RPAs)</title>
    <seriesInfo name="Internet-Draft" value="draft-guo-sidrops-rpa-profile-00"/>
    <author fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="June" day="09"/>
    <abstract>
      <?line 89?>

<t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Route Path Authorizations (RPA) objects used in Resource Public Key Infrastructure (RPKI). An RPA is a digitally signed object that provides a means of verifying whether an IP address block is received from <tt>AS a</tt> to <tt>AS b</tt> and announced from <tt>AS b</tt> to <tt>AS c</tt>. When validated, an RPA's eContent can be used for the detection and mitigation of route hijacking, especially providing protection for the AS_PATH attribute in BGP-UPDATE. This object is a variant of the aut-num object in the Internet Routing Registry (IRR).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://fcbgp.github.io/rpki-rpa-profile/draft-guo-sidrops-rpa-profile.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-guo-sidrops-rpa-profile/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FCBGP/rpa-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) <xref target="RFC4271"/> was designed with no mechanisms to validate the security of BGP attributes. There are two types of BGP security issues, BGP Hijacks and BGP Route Leaks <xref target="RFC7908"/>, that plague Internet security.</t>
      <t>The primary purpose of the Resource Public Key Infrastructure (RPKI) is to improve route security.  (See <xref target="RFC6480"/> for more information.) As part of this system, a mechanism is needed to allow entities to verify that an IP address holder has permitted an AS to advertise a route along the propagation path. A Route Path Authorization (RPA) provides this function.</t>
      <t>An RPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier) can authorize one or more other Autonomous Systems (ASes) as its upstream ASes or one or more other ASes as its downstream ASes. The upstream ASes, or previous ASes, mean that the issuer AS can receive BGP route updates from these ASes. The downstream ASes, or next ASes, mean that the issuer AS would advertise the BGP route to these ASes.</t>
      <t>This propagation model uses a Web of Trust, i.e., the issuer AS trusts its upstream ASes and authorizes its downstream ASes to propagate its received routes. Then, all downstream ASes would also accept the routes and proceed to send them to their next hops. The relationship among them is the signed RPA, which attests that a downstream AS has been selected by the directly linked upstream AS to announce the routes. This introduces an ingress policy.</t>
      <t>Initially, all ASes on the propagation path should sign one or more RPAs independently if they want to propagate the route to their downstream ASes, and then be able to detect and filter malicious routes (e.g., route leaks and route hijacks). In addition, the RPA can also attest that all ASes on a propagation path have received and selected this AS_PATH, which can be certified as a trusted path.</t>
      <t>The RPA uses the template for RPKI digitally signed objects <xref target="RFC6488"/> for the definition of a Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> wrapper for the RPA content as well as a generic validation procedure for RPKI signed objects.  As RPKI certificates issued by the current infrastructure are required to validate RPA, we assume the mandatory-to-implement algorithms in <xref target="RFC6485"/> or its successor.</t>
      <t>To complete the specification of the RPA (see <xref section="4" sectionFormat="of" target="RFC6488"/>), this document defines:</t>
      <ol spacing="normal" type="1"><li>
          <t>The object identifier (OID) that identifies the RPA-signed object. This OID appears in the eContentType field of the encapContentInfo object as well as the content-type signed attribute within the signerInfo structure.</t>
        </li>
        <li>
          <t>The ASN.1 syntax for the RPA content, which is the payload signed by the BGP speaker. The RPA content is encoded using the ASN.1 <xref target="X.680"/> Distinguished Encoding Rules (DER) <xref target="X.690"/>.</t>
        </li>
        <li>
          <t>The steps required to validate an RPA beyond the validation steps specified in <xref target="RFC6488"/>.</t>
        </li>
      </ol>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="the-rpa-content-type">
      <name>The RPA Content-Type</name>
      <t>The content-type for an RPA is defined as RoutePathAuthorization and has the numerical value of 1.2.840.113549.1.9.16.1.(TBD).</t>
      <t>This OID <bcp14>MUST</bcp14> appear both within the eContentType in the encapContentInfo object as well as the content-type signed attribute in the signerInfo object (see <xref target="RFC6488"/>).</t>
    </section>
    <section anchor="The-RPA-eContent">
      <name>The RPA eContent</name>
      <t>The content of an RPA identifies feasible AS's route paths. Upon receiving a BGP-UPDATE message, other ASes can perform AS-path verification according to the validated RPAs. An RPA is an instance of RoutePathAuthorization, formally defined by the following ASN.1 <xref target="X.680"/> module:</t>
      <artwork><![CDATA[
RPKI-RPA-2025
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
     pkcs-9(9) smime(16) modules(0) id-mod-rpki-RPA-2025(TBD) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  CONTENT-TYPE
  FROM CryptographicMessageSyntax-2010 -- RFC 6268
    { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
      pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

  IPAddressFamily
  FROM IPAddrAndASCertExtn -- In [RFC3779]
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) mod(0) id-mod-ip-addr-and-as-ident(30) } ;

id-ct-RPA OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840)
    rsadsi(113549) pkcs(1) pkcs-9(9) id-smime(16) id-ct(1) rpa(TDB) }

ct-RPA CONTENT-TYPE ::=
    { TYPE RoutePathAuthorization IDENTIFIED BY id-ct-RPA }

RoutePathAuthorization ::= SEQUENCE {
    version [0]         INTEGER DEFAULT 0,
    asID                ASID,
    routePathBlocks     SEQUENCE (SIZE(1..MAX)) OF RoutePathDescription }

RoutePathDescription ::= SEQUENCE {
    previousHops        SEQUENCE (SIZE(0..MAX)) OF ASID,
    nextHops            SEQUENCE (SIZE(0..MAX)) OF ASID,
    origins             SEQUENCE (SIZE(0..MAX)) OF ASID OPTIONAL,
    prefixes            SEQUENCE (SIZE(0..MAX)) OF IPAddressFamily OPTIONAL }

ASID ::= INTEGER (0..4294967295)

END
]]></artwork>
      <t>Note that this content appears as the eContent within the encapContentInfo (see <xref target="RFC6488"/>).</t>
      <section anchor="the-version-element">
        <name>The version Element</name>
        <t>The version number of the RoutePathAuthorization entry <bcp14>MUST</bcp14> be 0.</t>
      </section>
      <section anchor="the-asid-element">
        <name>The asID Element</name>
        <t>The asID field contains the AS number of the issuer AS associated with this RPA.</t>
      </section>
      <section anchor="the-routepathblocks-element">
        <name>The routePathBlocks Element</name>
        <t>The routePathBlocks field comprises a list of feasible route paths associated with the issuing asID. Each feasible route path generally includes an upstream AS, a downstream AS, and a set of IP prefix blocks. This field may aggregate route paths that share the same IP prefix blocks to optimize space. Therefore, the routePathBlocks field indicates that for an IP prefix blocks represented by origins or prefixes, the issuing asID can receive routes from any AS in previousHops and subsequently forward them to any AS in nextHops. The origins and prefixes fields both indicate a set of IP prefix blocks. Both of them can be None; in that case, it means all IP prefix blocks can be forwarded according to the feasible route paths.</t>
        <section anchor="the-previoushops-element">
          <name>The previousHops Element</name>
          <t>The previousHops field contains the upstream AS Number (ASN) of the issuer AS that can advertise the routes to the issuer AS.</t>
        </section>
        <section anchor="the-nexthops-element">
          <name>The nextHops Element</name>
          <t>The nextHops field contains the downstream AS Number (ASN) of the issuer AS that can receive advertised routes from the issuer AS.</t>
        </section>
        <section anchor="the-origins-element">
          <name>The origins Element</name>
          <t>The origins field contains a set of ASes and is associated with Route Origin Authorization (ROA) <xref target="RFC9582"/> or Signed Prefix List (SPL) <xref target="SignedPrefixList"/>. This is an optional field. If populated, it indicates that all routes belonging to the specified origin ASes can be received from the upstream ASes in the previousHops field and advertised to the downstream ASes in the nextHops field.</t>
        </section>
        <section anchor="the-prefixes-element">
          <name>The prefixes Element</name>
          <t>The prefixes field contains IP prefix blocks. It is an optional field. If populated, it indicates that all routes specified can be received from the upstream ASes listed in the previousHops field and advertised to the downstream ASes in the nextHops field.</t>
        </section>
      </section>
    </section>
    <section anchor="rpa-validation">
      <name>RPA Validation</name>
      <t>To validate an RPA, the relying party <bcp14>MUST</bcp14> perform all the validation checks specified in <xref target="RFC6488"/> as well as the following additional RPA-specific validation steps.</t>
      <ul spacing="normal">
        <li>
          <t>The contents of the CMS eContent field <bcp14>MUST</bcp14> conform to all the constraints described in <xref target="The-RPA-eContent"/>.</t>
        </li>
        <li>
          <t>The Autonomous System Identifier Delegation Extension described in <xref target="RFC3779"/> is also used in RPA and <bcp14>MUST</bcp14> be present in the EE certificate contained in the CMS certificates field.</t>
        </li>
        <li>
          <t>The AS identifier in the RoutePathAuthorization eContent 'asID' field <bcp14>MUST</bcp14> be contained in the AS Identifiers in the certificate extension.</t>
        </li>
        <li>
          <t>The Autonomous System Identifier Delegation extension <bcp14>MUST NOT</bcp14> contain "inherit" elements.</t>
        </li>
        <li>
          <t>The IP Address Delegation Extension <xref target="RFC3779"/> is not used in RPA, and <bcp14>MUST NOT</bcp14> be present in the EE certificate.</t>
        </li>
      </ul>
    </section>
    <section anchor="operational-consideration">
      <name>Operational Consideration</name>
      <t>Multiple valid RPA objects that contain the same asID could exist. In such a case, the union of these objects forms the complete route path set of this AS. For a given asID, it is <bcp14>RECOMMENDED</bcp14> that a CA maintains a single RPA object. If an AS holder publishes an RPA object, then relying parties <bcp14>SHOULD</bcp14> assume that this object is complete for that issuer AS.</t>
      <t>If one AS receives a BGP UPDATE message with the issuer AS in the AS_PATH attribute that cannot match any route paths of this issuer AS, it implies that there is an AS-path forgery in this message.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC6480"/>, <xref target="RFC6481"/>, <xref target="RFC6485"/>, <xref target="RFC6487"/> and <xref target="RFC6488"/> also apply to RPAs.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="smi-security-for-smime-module-identifier-registry">
        <name>SMI Security for S/MIME Module Identifier registry</name>
        <t>Please add the id-mod-rpki-rpa-2025 to the SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0) registry (https://www.iana.org/assignments/smi-numbers/smi-numbers.xml#security-smime-0) as follows:</t>
        <artwork><![CDATA[
Decimal  |  Description                 | Specification
----------------------------------------------------------------
TBD      | id-mod-rpki-rpa-2025          | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="smi-security-for-smime-cms-content-type-registry">
        <name>SMI Security for S/MIME CMS Content Type registry</name>
        <t>Please add the RPA to the SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1) registry (https://www.iana.org/assignments/smi-numbers/smi-numbers.xml#security-smime-1) as follows:</t>
        <artwork><![CDATA[
Decimal  |  Description                | Specification
----------------------------------------------------------------
TBD      |  id-ct-RPA                   | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="rpki-signed-object-registry">
        <name>RPKI Signed Object registry</name>
        <t>Please add RPA to the RPKI Signed Object registry (https://www.iana.org/assignments/rpki/rpki.xhtml#signed-objects) as follows:</t>
        <artwork><![CDATA[
Name          | OID                         | Specification
----------------------------------------------------------------
Route Path    |                             |
Authorization | 1.2.840.113549.1.9.16.1.TBD | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="rpki-repository-name-scheme-registry">
        <name>RPKI Repository Name Scheme registry</name>
        <t>Please add an item for the Route Path Authorization file extension to the "RPKI Repository Name Scheme" registry created by <xref target="RFC6481"/> as follows:</t>
        <artwork><![CDATA[
Filename  |
Extension | RPKI Object                   | Reference
-----------------------------------------------------------------
     .rpa | Route Path Authorization      | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="media-type-registry">
        <name>Media Type registry</name>
        <t>The IANA is requested to register the media type application/rpki-rpa in the "Media Type" registry as follows:</t>
        <artwork><![CDATA[
  Type name: application
  Subtype name: rpki-rpa
  Required parameters: N/A
  Optional parameters: N/A
  Encoding considerations: binary
  Security considerations: Carries an RPKI RPA [RFC-to-be].
      This media type contains no active content. See
      Section xxx of [RFC-to-be] for further information.
  Interoperability considerations: None
  Published specification: [RFC-to-be]
  Applications that use this media type: RPKI operators
  Additional information:
    Content: This media type is a signed object, as defined
        in [RFC6488], which contains a payload of a list of
        AS identifiers (ASIDs) as defined in [RFC-to-be].
    Magic number(s): None
    File extension(s): .rpa
    Macintosh file type code(s):
  Person & email address to contact for further information:
    Yangfei Guo <guoyangfei@zgclab.edu.cn>
  Intended usage: COMMON
  Restrictions on usage: None
  Change controller: IETF
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC6485">
          <front>
            <title>The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists, and signed objects as well as for the relying parties (RPs) that verify these digital signatures. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6485"/>
          <seriesInfo name="DOI" value="10.17487/RFC6485"/>
        </reference>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6488">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
        <reference anchor="SignedPrefixList">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a "Signed Prefix List", a Cryptographic Message
   Syntax (CMS) protected content type for use with the Resource Public
   Key Infrastructure (RPKI) to carry the complete list of prefixes
   which an Autonomous System (the subject AS) may originate to all or
   any of its routing peers.  The validation of a Signed Prefix List
   confirms that the holder of the subject AS produced the object, and
   that this list is a current, accurate and complete description of
   address prefixes that may be announced into the routing system
   originated by the subject AS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-04"/>
        </reference>
        <reference anchor="X.680" target="https://itu.int/rec/T-REC-X.680-202102-I/en">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author initials="" surname="ITU-T">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="Recommendation ITU-T X.680" value=""/>
        </reference>
        <reference anchor="X.690" target="[https://itu.int/rec/T-REC-X.680-202102-I/en](https://www.itu.int/rec/T-REC-X.690-202102-I/en)">
          <front>
            <title>Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author initials="" surname="ITU-T">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="Recommendation ITU-T X.690" value=""/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC7908">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC9582">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
      </references>
    </references>
    <?line 306?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Tobias Fiebig, Kotikalapudi Sriram, Jeffery Hass, and Alexander Azimov for their valuable comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
