<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jiang-sidrops-psvro-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="PSVRO">Route Origin Registry Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-jiang-sidrops-psvro-00"/>
    <author fullname="Shenglin Jiang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jiangshl@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xingang Shi">
      <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>shixg@cernet.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="May" day="29"/>
    <workgroup>SIDROPS</workgroup>
    <abstract>
      <?line 106?>

<t>Prefix hijacking, i.e., unauthorized announcement of a prefix, has emerged as a major security threat in the Border Gateway Protocol (BGP), garnering widespread attention. To migrate such attacks while supporting legitimate  Multiple Origin ASes (MOAS), higher requirements are placed on the route origin registry system. This document serves to outline the problem statement for current route origin registry system.</t>
    </abstract>
  </front>
  <middle>
    <?line 110?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) is ubiquitously used for inter-domain routing. However, it lacks built-in security validation on whether its UPDATE information is legitimate <xref target="RFC4272"/>. This poses concerns regarding prefix hijacking, where unauthorized announcements of prefixes can occur, simulating legitimate Multiple Origin ASes (MOAS).</t>
      <t>Unfortunately, the current route origin registry system, such as Internet Routing Registry (IRR) <xref target="RFC1786"/> and Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/>, are not effective in distinguishing between legitimate MOAS and prefix hijacking. There is a pressing need for an verifiable route origin registry system that can support registration and protection of legitimate MOAS, thereby mitigating the threats posed by prefix hijacking to the routing system.</t>
      <t>This document will primarily analyze the various scenarios of MOAS and highlight the limitations of the current route origin registry system. By examining these issues, our primary objective is to offer valuable insights to network operators, researchers, and policymakers for improving the security and robustness of the global routing system.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="working-definition-of-route-origin-registry">
      <name>Working Definition of Route Origin Registry</name>
      <t>Route origin registry refers to a system that records the mapping of IP prefixes to the ASes authorised to announce them. Resource holders can register route origin mapping relationships in route origin registry by themselves or delegate to others.</t>
      <t>IRR and RPKI currently offer functionalities related to route origin registry. IRRs, which have been in operation since 1995, serve as a globally distributed database for routing information. They record the binding relationship between IPs and Autonomous Systems (ASes) via Route(6) objects, which are defined by the Routing Policy Specification Language (RPSL).</t>
      <t>On the other hand, the RPKI system, which was developed starting in 2008, provides a formally verifiable framework. The RPKI system is based on resource certificates that extend the X.509 standard. It records the mapping between IP prefixes and their authorised ASes via Route Origin Authorization (ROA) objects. These ROA objects contain essential information such as the prefix, origin ASN, and MaxLength.</t>
    </section>
    <section anchor="prefix-hijacking-and-legitimate-moas">
      <name>Prefix Hijacking and Legitimate MOAS</name>
      <t><xref target="RFC1930"/> suggests that a prefix should typically have a single Autonomous System (AS) as its origin, with a few exceptions. However, CAIDA's analysis on BGP routing data <xref target="CAIDA"/> reveals that MOAS have become a common phenomenon. There are various reasons that contribute to the emergence of MOAS prefixes:</t>
      <ul spacing="normal">
        <li>
          <t><strong><em>Aggregation</em></strong>. According to <xref target="RFC1930"/>, aggregation could result in prefix originated from multiple possible ASes. For example, if the "Prefix 0/24" originates from ASx and the "Prefix 1/24" originates from ASy, aggregating them into "Prefix 0/23" with the originates from [ASx, ASy] may result in the loss of the specific origin AS information if the ATOMIC_AGGREGATE attributes of the aggregation announcements are not specific.</t>
        </li>
        <li>
          <t><strong><em>Business consideration</em></strong>. Companies often choose providers that offer high-speed and reliable data services to host their servers. For efficient resource allocation, a parent organization that owns a large chunk of IP addresses may divide its address space among one or more child organizations, which choose different providers and ask them to announce the same prefix. For example, a multi-national company may advertise its prefix from multiple locations where it has offices.</t>
        </li>
        <li>
          <t><strong><em>Multi-homing</em></strong>. When multi-homing occur without the use of BGP, it can result in MOAS conflicts. Assuming ASx is connected to two providers, ISP1 and ISP2. ISP1 is connected to ASx using BGP, while ISP2 is connected to ASx through static routes or Interior Gateway Protocol (IGP). Both ISP1 and ISP2 advertise prefixes that belong to ASx.</t>
        </li>
        <li>
          <t><strong><em>Internet eXchanges</em></strong>. When a prefix is associated with an exchange point, it becomes directly accessible from all the ASes connected to that exchange point. Each AS at the exchange point has the capability to advertise the prefix as if it originates directly from their own AS.</t>
        </li>
        <li>
          <t><strong><em>Anycast</em></strong>. Anycast is often employed by content distribution networks (CDNs) to direct the requests of their customers to the nearest servers, ensuring speedy data delivery to their customers.</t>
        </li>
        <li>
          <t><strong><em>Prefix hijacking and misconfigurations</em></strong>. A malicious AS may advertise prefixes belonging to another organization to attract its traffic. An AS may also make such annoucements unintentionally due to misconfiguration.</t>
        </li>
      </ul>
      <t>Distinguishing between prefix hijacking, misconfiguration, and legitimate MOAS can be a complex task. The challenge arises from the resemblance of these behaviors, as they often display similar characteristics. Moreover, accurately identifying and classifying these situations necessitates a route origin registry with high coverage and accuracy.</t>
    </section>
    <section anchor="problems-in-current-route-origin-registry">
      <name>Problems in Current Route Origin Registry</name>
      <section anchor="security-risks-from-partial-adoption">
        <name>Security Risks from Partial Adoption</name>
        <t>As the adoption of RPKI continues to grow, the number of address prefixes registered within RPKI is gradually increasing. However, recent reports from the Number Resource Organization (NRO) <xref target="NRO"/> indicate that the coverage of IP prefixes within ROAs is still relatively low, and the adoption rate of route origin validation (ROV), as measured by Mutually Agreed Norms for Routing Security (MANRS) <xref target="MANRS"/>, is even significantly lower than the coverage of ROAs. Similarly, <xref target="IRRegularities"/> also notes a decreasing trend in IP Prefix coverage in certain IRRs.</t>
        <t>On the other hand, it becomes evident that currently active IRRs and RPKI offer limited coverage for MOAS, particularly in the case of IPv6. They typically only allow registration of address blocks for self-managed purposes, posing a significant obstacle in supporting many legitimate MOAS prefixes.</t>
        <t>Limited IP prefix coverage within the current route origin registry, especially for MOAS prefixes, hinders the complete validation of route announcements, significantly limiting the motivation for network operators to utilize route origin registry system.</t>
      </section>
      <section anchor="inconsistency-between-different-route-origin-registries">
        <name>Inconsistency between Different Route Origin Registries</name>
        <t>Based on the analysis presented in the previous sections, it is evident that relying solely on a single source of route origin registry is insufficient in route origin validation. To address this issue effectively, it is recommended to integrate the RPKI and multiple active IRRs.</t>
        <t>However, it is important to note that this fusion approach may encounter several limitations. As highlighted in <xref target="IRRegularities"/>, inconsistencies exist among the Route(6) objects across different IRRs. This inconsistency can be attributed to the chronic neglect by IRR customers. For instance, some companies may register Route(6) objects in some IRRs but fail to update them in all the route origin registries, resulting in outdated and stale Route(6) objects. Furthermore, it is observed that a higher number of IRRs exhibit lower consistency with RPKI. In practice, different networks often use different data and methodologies to perform route validation and filtering, resulting in disparate outcome, especially when ROA and IRR data conflict with each other.</t>
        <t>As a result, while integrating the RPKI and multiple active IRRs can improve the effectiveness of route origin validation, it is essential to address the issues of inconsistencies between different route origin registries.</t>
      </section>
      <section anchor="insufficiency-of-resource-certification">
        <name>Insufficiency of Resource Certification</name>
        <t>As mentioned in <xref target="RFC7682"/>, the lack of certification and incentives for maintaining up-to-date data within IRRs leads to low accuracy of the information. Recent measurement <xref target="IRRegularities"/> reveals that IRRs with low update activity exhibit lower overlap with BGP announcements than those with high update activity. This indicates that IRRs with lower activity may contain a higher proportion of outdated and stale Route(6) objects, thereby impacting the reliability of the route origin registry.</t>
        <t>RPKI is a hierarchical Public Key Infrastructure (PKI) that binds Internet Number Resources (INRs) such as Autonomous System Numbers (ASNs) and IP addresses to public keys via certificates. However, there is a risk of conflicts in INRs ownership when misconfiguration or malicious operations occur at the upper tier, resulting in multiple lower tiers being allocated the same INRs. Additionally, the existence of legitimate MOAS necessitates the authorization of binding between a prefix with multiple ASes, further complicating the issue. Balancing the protection of legitimate MOAS while minimizing risks in INRs certificates presents a challenging problem that requires innovative solutions. Furthermore, it is worth noting that RPKI Relying Parties (RPs) <xref target="RFC8897"/> have not yet standardized the process of constructing certificate chains and handling exceptions such as Certificate Revocation Lists (CRLs) and Manifests. This lack of standardization has resulted in different views on the RPKI records by RPs who adopt different implementations. Consequently, ASes served by different RPs may have varying validation results for the same route announcement.</t>
        <t>Consequently, the absence of data validation and standardization in operations within the IRR or RPKI framework means that there is no guarantee of the accuracy of the data registered in any route origin registry.</t>
      </section>
      <section anchor="synchronization-and-management">
        <name>Synchronization and Management</name>
        <t>The current practice in IRRs involves the use of the Near-Real-Time Mirroring (NRTM) protocol <xref target="NRTMv4"/> to replicate and synchronize Route(6) object from other IRRs. Similarly, the RPKI system relies on the RPKI Repository Delta Protocol (RRDP) <xref target="RFC8182"/> to synchronize and update data. However, these network protocols exhibit several weaknesses that need to be addressed.</t>
        <ul spacing="normal">
          <li>
            <t>The absence of a mechanism to notify other mirrors when updates occur results in synchronization delays and data inconsistency issues. This can be problematic when timeliness and accuracy are crucial.</t>
          </li>
          <li>
            <t>The absence of validation for replicated data from mirrored sources in both IRRs and RPKI is a legitimate concern. This situation creates a considerable risk for inconsistencies and conflicts with the current data.</t>
          </li>
          <li>
            <t>The absence of application security mechanisms within these protocols is another area of vulnerability. This lack of security measures exposes the system to unauthorized access and compromise on data integrity.</t>
          </li>
        </ul>
        <t>Although some approaches attempt to optimise the quality of the route origin registry, e.g. RIPE NCC, IRRdv4 using RPKI to validate/filter IRR Route(6) objects, and <xref target="RFC8416"/> proposing that RPs can customise route origin with local data, the problem of inconsistency persists due to the limited coverage of RPKI and the lack of effective mechanisms to resolve conflicting data between IRRs. It is crucial to establish a effective communication mechanism among multiple route origin registry, enabling negotiation and cross-validation of conflicting or special-purpose route origin information.</t>
      </section>
      <section anchor="summary">
        <name>Summary</name>
        <t>The current route origin registry systems, namely IRRs and RPKI, are facing challenges as the increased occurrence of MOAS prefixes. These challenges mainly include low adoption rates, global inconsistency, insufficient resource certification, and incomplete multi-source collaboration mechanisms.</t>
        <t>To address these challenges, it is imperative to continue striving towards the development of a verifiable route origin registry system that can effectively discern between prefix hijacking and legitimate MOAS, while ensuring a globally unified perspective on route origin and maintaining a high level of resilience.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There is no security consideration in this draft.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There is no IANA consideration in this draft.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1786">
          <front>
            <title>Representation of IP Routing Policies in a Routing Registry (ripe-81++)</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="E. Gerich" initials="E." surname="Gerich"/>
            <author fullname="L. Joncheray" initials="L." surname="Joncheray"/>
            <author fullname="J-M. Jouanigot" surname="J-M. Jouanigot"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="M. Terpstra" initials="M." surname="Terpstra"/>
            <author fullname="J. Yu" initials="J." surname="Yu"/>
            <date month="March" year="1995"/>
            <abstract>
              <t>This document is an update to the original `ripe-81' proposal for representing and storing routing polices within the RIPE database. It incorporates several extensions proposed by Merit Inc. and gives details of a generalized IP routing policy representation to be used by all Internet routing registries. It acts as both tutorial and provides details of database objects and attributes that use and make up a routing registry. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1786"/>
          <seriesInfo name="DOI" value="10.17487/RFC1786"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC8416">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4272">
          <front>
            <title>BGP Security Vulnerabilities Analysis</title>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
              <t>This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4272"/>
          <seriesInfo name="DOI" value="10.17487/RFC4272"/>
        </reference>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7682">
          <front>
            <title>Considerations for Internet Routing Registries (IRRs) and Routing Policy Configuration</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="D. Mitchell" initials="D." surname="Mitchell"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The purpose of this document is to catalog issues that influenced the efficacy of Internet Routing Registries (IRRs) for inter-domain routing policy specification and application in the global routing system over the past two decades. Additionally, it provides a discussion regarding which of these issues are still problematic in practice, and which are simply artifacts that are no longer applicable but continue to stifle inter-provider policy-based filtering adoption and IRR utility to this day.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7682"/>
          <seriesInfo name="DOI" value="10.17487/RFC7682"/>
        </reference>
        <reference anchor="RFC8897">
          <front>
            <title>Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document provides a single reference point for requirements for Relying Party (RP) software for use in the Resource Public Key Infrastructure (RPKI). It cites requirements that appear in several RPKI RFCs, making it easier for implementers to become aware of these requirements. Over time, this RFC will be updated to reflect changes to the requirements and guidance specified in the RFCs discussed herein.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8897"/>
          <seriesInfo name="DOI" value="10.17487/RFC8897"/>
        </reference>
        <reference anchor="NRTMv4">
          <front>
            <title>Near Real Time Mirroring (NRTM) version 4</title>
            <author fullname="Sasha Romijn" initials="S." surname="Romijn">
              <organization>Reliably Coded</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Edward Shryane" initials="E." surname="Shryane">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Stavros Konstantaras" initials="S." surname="Konstantaras">
              <organization>AMS-IX</organization>
            </author>
            <date day="16" month="May" year="2024"/>
            <abstract>
              <t>   This document specifies a one-way synchronization protocol for
   Internet Routing Registry (IRR) records.  The protocol allows
   instances of IRR database servers to mirror IRR records, specified in
   the Routing Policy Specification Language (RPSL), between each other.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-nrtm-v4-04"/>
        </reference>
        <reference anchor="IRRegularities">
          <front>
            <title>IRRegularities in the internet routing registry</title>
            <author initials="B." surname="Du">
              <organization/>
            </author>
            <author initials="K." surname="Izhikevich">
              <organization/>
            </author>
            <author initials="S." surname="Rao">
              <organization/>
            </author>
            <author initials="G." surname="Akiwate">
              <organization/>
            </author>
            <author initials="C." surname="Testart">
              <organization/>
            </author>
            <author initials="" surname="AC Snoeren">
              <organization/>
            </author>
            <author initials="K." surname="Claffy">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the 2023 ACM on internet measurement conference" value=""/>
        </reference>
        <reference anchor="CAIDA" target="https://catalog.caida.org/dataset/routeviews_prefix2as">
          <front>
            <title>RouteViews Prefix to AS mappings</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="MANRS" target="https://observatory.manrs.org/">
          <front>
            <title>MANRS Observatory</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NRO" target="https://www.nro.net/about/rirs/statistics/">
          <front>
            <title>RIR Statistics</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 218?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Yangfei Guo, Di Ma, Qi Li, Shuhe Wang, Xiaoliang Wang, Hui Wang, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
