<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-drr-architecture-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Decentralized RPKI Repository Architecture">Decentralized RPKI Repository Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-drr-architecture-00"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Su" fullname="Yingying Su">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>suyy@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>General [REPLACE]</area>
    <workgroup>sidrops</workgroup>
    <abstract>
      <?line 43?>

<t>The Resource Public Key Infrastructure (RPKI) plays a crucial role in securing inter-domain routing. However, the current RPKI Repository system suffers from fundamental limitations in reliability, scalability, and security. In particular, single-point failures at repository publication points (PPs), the growing number of bidirectional connections with relying parties (RPs), and the lack of mechanisms to mitigate misbehavior by certification authorities (CAs) pose significant risks to the integrity, authority, and resilience of the global RPKI ecosystem.</t>
      <t>This document proposes the Decentralized RPKI Repository (dRR), a novel repository architecture that decouples RPKI object signing from data distribution. dRR introduces a distributed federation of certificate servers (CSs) and a layer of Monitors to achieve robust, scalable, and auditable RPKI data management. The architecture maintains full compatibility with the existing RPKI trust model rooted in the five RIR trust anchors, enabling incremental deployment without disrupting current relying parties (RPs) validation semantics. By doing so, dRR addresses longstanding repository challenges and enhances the overall trustworthiness and efficiency of RPKI-based routing security.</t>
    </abstract>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Resource Public Key Infrastructure has become a cornerstone for securing inter-domain routing, providing mechanisms to validate the association between Internet number resources (INR) and the entities authorized to originate them. While RPKI has proven effective in mitigating certain types of BGP hijacks, the current repository system exhibits critical architectural shortcomings.</t>
      <t>In particular, the tight coupling between repository PPs and CAs results in three fundamental challenges. First, the system is prone to reliability issues: a failure or attack on any PP may prevent RPs from obtaining a complete or timely view of RPKI data. Second, the existing model lacks scalability, as the anticipated growth in the number of PPs and RPs—driven by broader deployment of ROAs and ROV—exacerbates synchronization load and connection overhead. Third, the architecture provides limited protections against misbehavior by CAs, leaving INR holders and RPs without effective means to detect or mitigate unilateral tampering of signed RPKI objects. These issues are discussed in detail in <xref target="rpki-repo-ps"/>.</t>
      <t>To address these concerns, this document introduces the Decentralized RPKI Repository (dRR), which extends and enhances the existing RPKI repository architecture. dRR is founded on the principle of decoupling RPKI object signing from data distribution. It replaces traditional PP-based storage with a distributed and decentralized federation of certificate servers (CSs), each operating as an equal peer that collaboratively hosts RPKI data. INR holders can proactively upload their RPKI objects to any trusted CSs within this federation, thereby retaining greater operational control.</t>
      <t>Additionally, dRR incorporates Monitors as middleware components that aggregate updates from the CS federation and proactively distribute RPKI data to RPs. This design reduces the number of direct connections between RPs and repository nodes and improves both the scalability and timeliness of RPKI data distribution.</t>
      <t>Through this architecture, dRR aims to enhance the robustness, scalability, and security of the global RPKI system while preserving compatibility with existing hierarchical trust anchors and RPKI data validation processes.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology-and-definitions">
      <name>Terminology and Definitions</name>
      <t>This document assumes familiarity with the concepts described in "A Profile for Resource Certificate Repository Structure" <xref target="RFC6481"/>, "The RPKI Repository Delta Protocol (RRDP)" <xref target="RFC8182"/>, and "An Infrastructure to Support Secure Internet Routing" <xref target="RFC6480"/>.</t>
      <t>This document defines the following terminology:</t>
      <t><strong>Decentralized RPKI Repository (dRR):</strong>
The new RPKI repository architecture proposed in this document. dRR consists of multiple Certificate Servers (CSs) that collaboratively store and distribute RPKI data, along with Monitors that act as middleware between the CS federation and RPs.</t>
      <t><strong>Certificate Server (CS):</strong>
A core component of the dRR system. A CS is a node responsible for hosting RPKI objects. All CS nodes within dRR collectively form a federation.</t>
      <t><strong>Monitor:</strong>
Represents a key middleware component in dRR that sits between CS nodes and RPs. A Monitor retrieves RPKI data from CS nodes and proactively pushes updates to RPs.</t>
      <t><strong>Object Issuance Information (OII):</strong>
Metadata associated with a newly issued RPKI object. An OII is signed by the CA that issued the object and includes the fingerprint of the object along with its intended storage locations within the CS nodes. The OII allows the CS federation to verify the authenticity of the newly issued RPKI object and to record it in the federation’s global ledger.</t>
      <t><strong>Object Revocation Information (ORI):</strong>
Metadata associated with an RPKI object that is to be revoked. An ORI is signed by the INR holder of the object, along with any affected subordinate INR holders. It includes the fingerprint of the object to be revoked and serves to prove that all impacted parties have authorized the revocation. The ORI enables the CS federation to verify the legitimacy of the revocation and to record it in the federation’s global ledger.</t>
      <t><strong>Verifiable Update Information (VUI):</strong>
Cryptographic metadata generated by a Monitor when proactively distributing updates to an RP. A VUI enables the RP to verify both the authenticity and the completeness of the received RPKI update data.</t>
      <t>These terms are used throughout this document.</t>
    </section>
    <section anchor="design-principles-and-objectives">
      <name>Design Principles and Objectives</name>
      <t>The design of dRR is guided by two primary principles:</t>
      <ul spacing="normal">
        <li>
          <t>Preserve the existing hierarchical trust model: dRR does not modify the hierarchical certificate issuance framework rooted in the five RIR trust anchors, which <bcp14>MUST</bcp14> remain the foundational basis of the global RPKI trust model. The roles and trust relationships of CAs and INR holders remain unchanged.</t>
        </li>
        <li>
          <t>Separate distribution from signing: While certificate issuance continues to be handled by existing RPKI authorities, the storage and operational management of RPKI objects are explicitly delegated to INR holders and a decentralized set of infrastructure components. INR holders <bcp14>SHALL</bcp14> maintain direct control over where and how their RPKI data is hosted. RPs <bcp14>MUST</bcp14> continue to perform cryptographic validation of all received data, preserving end-to-end trust guarantees.</t>
        </li>
      </ul>
      <t>Building on these principles, the dRR architecture serves exclusively as an alternative repository layer. It provides mechanisms for the upload, hosting, and storage of resource certificates (RCs), ROAs, and potentially newer signed objects such as autonomous system provider authorization (ASPA) and signed prefix list (SPLs). The design paradigm establishes a decentralized RPKI data management platform, effectively redefining the boundaries of responsibility between RPKI authorities and INR holders and mitigating the risks associated with unilateral operational control. It also supports both incremental and full data synchronization for RPs, thereby fulfilling all core repository functions without altering existing validation semantics.</t>
      <t>The architecture of dRR is explicitly designed to meet the following objectives:</t>
      <ul spacing="normal">
        <li>
          <t>Compatibility: dRR <bcp14>MUST NOT</bcp14> alter the hierarchical RPKI certificate issuance architecture. It <bcp14>SHALL</bcp14> remain fully compatible with the current RPKI Repository system and <bcp14>SHALL</bcp14> support incremental deployment alongside existing PPs without disrupting established validation or synchronization workflows.</t>
        </li>
        <li>
          <t>Reliability: dRR <bcp14>SHALL</bcp14> ensure high availability of RPKI data through distributed storage. A single RPKI object <bcp14>MAY</bcp14> be redundantly stored across multiple physically isolated repository nodes. Consequently, the integrity and accessibility of RPKI data as consumed by RPs <bcp14>SHALL NOT</bcp14> be compromised even if individual nodes experience failures.</t>
        </li>
        <li>
          <t>Scalability: The dRR architecture <bcp14>SHALL</bcp14> prevent uncontrolled growth in the number of repository nodes required to host data. It <bcp14>SHOULD</bcp14> enable efficient synchronization mechanisms that ensure RPs receive timely updates of RPKI data, regardless of the scale of deployment.</t>
        </li>
        <li>
          <t>Security and Auditability: By decoupling RPKI object signing from data storage and empowering INR holders to control their own RPKI objects, dRR <bcp14>SHALL</bcp14> actively mitigate risks stemming from malicious or negligent behavior by RPKI authorities. The system <bcp14>SHALL</bcp14> also maintain a complete and consistent historical record of RPKI data and operations, thereby supporting robust auditing capabilities for verifying the correctness and continuity of repository activities.</t>
        </li>
      </ul>
      <t>By adhering to these principles and objectives, dRR aims to enhance the robustness, transparency, scalability, and security of the RPKI repository layer while ensuring full interoperability with the existing RPKI infrastructure.</t>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <section anchor="key-components">
        <name>Key Components</name>
        <t>The dRR architecture replaces the conventional RPKI Repository system with two principal components: a <strong>distributed Certificate Server federation</strong> (CS federation) and a layer of <strong>middleware Monitors</strong>.</t>
        <section anchor="certificate-server-federation">
          <name>Certificate Server Federation</name>
          <t>The CS federation consists of multiple independent certificate server nodes that collectively host and store RPKI data. Each CS node participates equally in this federation and operates under a shared consensus protocol to maintain a consistent view of hosted RPKI objects. INR holders <bcp14>MAY</bcp14> upload their RC certificates, ROAs, or other signed objects issued by RPKI authorities to any subset of trusted CS nodes they choose.</t>
          <t>This decentralized model decouples data storage and management responsibilities from certificate signing authorities. As a result:</t>
          <ul spacing="normal">
            <li>
              <t>INR holders maintain operational control and management over their RPKI data.</t>
            </li>
            <li>
              <t>RPKI objects <bcp14>MAY</bcp14> be simultaneously stored across multiple CS nodes, improving redundancy and availability.</t>
            </li>
            <li>
              <t>No single CA can unilaterally manage or tamper with the stored data.</t>
            </li>
          </ul>
        </section>
        <section anchor="middleware-monitors">
          <name>Middleware Monitors</name>
          <t>Monitors act as intermediaries between the CS federation and RPs. Each Monitor <bcp14>SHALL</bcp14>:</t>
          <ul spacing="normal">
            <li>
              <t>Receive OII and ORI from the CS federation.</t>
            </li>
            <li>
              <t>Retrieve newly published from the specified CS nodes based on OII.</t>
            </li>
            <li>
              <t>Generate VUI according OII and ORI and proactively push both VUI and the associated newly added RPKI objects to the RPs it serves.</t>
            </li>
            <li>
              <t>Maintain a full dRR-protected RPKI data snapshot.</t>
            </li>
          </ul>
          <t>This two-tier proactive data distribution architecture contrasts with the traditional model in which each RP <bcp14>MUST</bcp14> periodically poll multiple PPs to obtain updates. By aggregating and pushing updates, Monitors reduce synchronization delays and alleviate load on both the repository infrastructure and RPs.</t>
        </section>
        <section anchor="key-differences-from-the-current-system">
          <name>Key Differences from the Current System</name>
          <t>Compared to the existing RPKI repository architecture, the key differences introduced by dRR include:</t>
          <ul spacing="normal">
            <li>
              <t>Flexible Data Storage: Under dRR, INR holders actively upload their RPKI objects to selected CS nodes. They <bcp14>SHALL</bcp14> have the freedom to choose one or more trusted nodes for storing their data. By decoupling RPKI object signing authority from data storage and management responsibilities, dRR transfers operational and management control of RPKI data directly to the legitimate INR holders. By contrast, the current model requires that data signed by a CA <bcp14>MUST</bcp14> be stored exclusively at the PP operated or designated by that CA.</t>
            </li>
            <li>
              <t>Federated Transparency:The CS nodes in dRR collectively operate under a consensus protocol. Specifically, newly uploaded objects and object revocation statements <bcp14>SHALL</bcp14> be publicly disseminated across the CS federation through OII and ORI. Only after consensus is reached among the nodes does a new object become valid or an old certificate become invalid. This process provides a transparent and auditable view of all data storage and operational changes, which in turn enhances the overall security of the system by allowing stakeholders to independently verify repository behaviors. By comparison, existing PPs operate in isolation, each maintaining and managing its own data view without inter-node validation or transparency.</t>
            </li>
            <li>
              <t>Two-tier Push Model: dRR introduces a layered proactive distribution mechanism. CS nodes <bcp14>SHALL</bcp14> push OII and ORI and cryptographic proofs to a designated set of Mnitors. Each Monitor <bcp14>SHALL</bcp14> then retrieve newly added RPKI data from the specific CS nodes according to the OII, and <bcp14>SHALL</bcp14> generate VUI and proactively distribute both the VUI and the newly added RPKI objects to its designated set of RPs. In dRR, each CS typically serves a defined group of Monitors, and each Monitor, in turn, serves a defined group of RPs. For today’s RPKI Repository, the full set of PPs and RPs must establish a large number of bidirectional connections, which increases the load and pressure of data synchronization.</t>
            </li>
          </ul>
          <t>The distributed CS federation is the core component enabling decentralization in dRR. Each server node participates in a consensus protocol to build a cross-domain trust network, thereby forming a data hosting platform that operates independently of any single RPKI authority. All server nodes function as equal participants, collectively providing certificate hosting services to INR holders within the RPKI system. The middleware layer of Monitors acts as the central hub for data propagation. It receives consensus-validated RPKI data and associated operations from CS federation and, based on a proactive push model, delivers new RPKI objects to RPs.</t>
        </section>
      </section>
      <section anchor="federation-construction">
        <name>Federation Construction</name>
        <t>The CS federation is comprised of multiple CS nodes. The following principles govern the operation and structure of these nodes:</t>
        <t>a) Each CS operates independently of any RPKI authority. All CS nodes <bcp14>SHALL</bcp14> be equal peers and <bcp14>SHALL</bcp14> collectively form a federation to provide secure and reliable hosting services for INR holders.</t>
        <t>b) Any entity seeking to join the CS federation <bcp14>MUST</bcp14> undergo security validation performed by the existing CS federation members.</t>
        <t>c) All operations within the federation—including the registration of new CS nodes, registration of INR holders, publication of RPKI objects, and object revocation—<bcp14>MUST</bcp14> achieve consensus among all participating CS federation members.</t>
        <t>The initialization of the CS federation, along with the registration mechanisms for CS nodes and INR holders, are described below.</t>
        <ul spacing="normal">
          <li>
            <t>Initialization of the CS Federation: The initial CS federation <bcp14>SHALL</bcp14> be established jointly by the five RIRs: RIPE NCC, APNIC, AFRINIC, LACNIC, and ARIN. During initialization, each RIR <bcp14>SHALL</bcp14> register its CS node within the federation. The registration information for each CS node <bcp14>MUST</bcp14> include: (1) A unique identifier for the CS node; (2) The node's unique public key; (3) A digital signature generated using the private key corresponding to that public key.</t>
          </li>
          <li>
            <t>Registration of CS Nodes: Entities that meet the eligibility requirements <bcp14>MAY</bcp14> apply to operate RPKI object hosting servers and join the CS federation. This process proceeds as follows: (1) The applying entity submits its registration information to one of the five RIRs; (2) Upon successful completion of identity, security, and reliability verification (for example, evaluation of the applicant's reputation or its capability to operate on robust platforms such as CDNs), the RIR <bcp14>SHALL</bcp14> publish the entity's registration information to the CS federation; (3) The existing federation members <bcp14>SHALL</bcp14> validate the identity of the new CS node and verify the provided signatures; (4) If a majority of federation members approve, consensus <bcp14>SHALL</bcp14> be reached and the entity's registration information <bcp14>SHALL</bcp14> be permanently recorded in the federation's global ledger. The entity <bcp14>SHALL</bcp14> then formally become a member of the CS federation and <bcp14>MAY</bcp14> provide hosting services to INR holders. If consensus is not achieved, the entity <bcp14>SHALL NOT</bcp14> be admitted into the CS federation.</t>
          </li>
          <li>
            <t>Registration of INR Holders. Any INR holder deploying dRR <bcp14>MUST</bcp14> first complete identity registration within the CS federation. The process is as follows: (1) The INR holder submits its registration information to one trusted CS node; (2) The receiving CS node <bcp14>SHALL</bcp14> publish the registration information to the federation, triggering a validation process by the federation members. (3) If a majority of members validate the registration successfully, the INR holder's information <bcp14>SHALL</bcp14> be recorded in the federation's global ledger. If consensus is not achieved, registration <bcp14>SHALL</bcp14> fail.</t>
          </li>
        </ul>
        <t>It is important to note that any RPKI authority inherently holds an RC certificate issued by its parent authority (or, in the case of RIRs, a self-issued RC root certificate). Therefore, for the purposes of dRR, an RPKI authority is also treated as an INR holder and <bcp14>MUST</bcp14> undergo the same INR holder registration process within the CS federation.</t>
      </section>
      <section anchor="federation-operation">
        <name>Federation Operation</name>
        <t>Within dRR, INR holders actively manage the distribution of their RPKI objects by uploading them to one or more trusted CS nodes. The CS federation ensures the integrity and transparency of these operations by requiring that both the publication of new objects and the revocation of existing objects be represented as OII and ORI records. These records <bcp14>MUST</bcp14> be disseminated across the federation and permanently recorded in the federation's global ledger. This immutable, time-ordered ledger provides a comprehensive audit trail of all RPKI object operations.</t>
        <section anchor="publication-of-new-objects">
          <name>Publication of New Objects</name>
          <t>To publish a new RPKI object, the INR holder submits the newly issued object—signed by its parent RPKI authority—to multiple trusted CS nodes for secure storage. The INR holder also submits the corresponding OII to a designated CS node, which <bcp14>SHALL</bcp14> publish this OII to the CS federation.</t>
          <ul spacing="normal">
            <li>
              <t>If consensus on the OII is achieved among federation members, the OII <bcp14>SHALL</bcp14> be permanently recorded in the federation's global ledger. The object is then officially protected by the federation and becomes available for retrieval and synchronization by RPs.</t>
            </li>
            <li>
              <t>If consensus is not reached, the publication process <bcp14>SHALL</bcp14> fail, and the object <bcp14>SHALL NOT</bcp14> be incorporated into the federation's authoritative dataset.</t>
            </li>
          </ul>
          <t>An OII, as defined by this document, <bcp14>MUST</bcp14> include at a minimum: (1) The identifiers of the issuer and recipient as recorded in the federation's registration system; (2) The parent certificate of the newly issued object; (3) A unique hash fingerprint of the object; (4) A list of CS nodes that store the object; (5) A signature generated by the RPKI authority.</t>
        </section>
        <section anchor="revocation-of-existing-objects">
          <name>Revocation of Existing Objects</name>
          <t>When an RPKI authority intends to revoke an RPKI object previously issued to a subordinate INR holder, it <bcp14>MUST</bcp14> first request an ORI from that INR holder. The RPKI authority then submits the ORI to one or more trusted CS nodes, which <bcp14>SHALL</bcp14> propagate the ORI to the remaining federation members.</t>
          <ul spacing="normal">
            <li>
              <t>If consensus on the ORI is achieved among federation members, the ORI <bcp14>SHALL</bcp14> be written to the global ledger. The corresponding object <bcp14>SHALL</bcp14> then be revoked and removed from the storage of all participating CS nodes.</t>
            </li>
            <li>
              <t>If consensus is not achieved, the revocation <bcp14>SHALL</bcp14> fail, and the object <bcp14>SHALL</bcp14> remain valid in the federation.</t>
            </li>
          </ul>
          <t>An ORI, as defined by this document, <bcp14>MUST</bcp14> include at a minimum: (1) The unique hash fingerprint of the object to be revoked; (2) An authorization signature generated by the INR holders; (3) (Optional) Additional endorsements from affected subordinate INR holders when applicable.</t>
          <t>By ensuring that all publication and revocation operations undergo federation-wide consensus and are permanently logged, dRR provides INR holders and RPs with a verifiable and tamper-evident history of RPKI object management. This decentralized model significantly strengthens accountability and mitigates the risks associated with unilateral control by any single RPKI authority.</t>
        </section>
      </section>
      <section anchor="monitor-operation">
        <name>Monitor Operation</name>
        <t>A Monitor in the dRR architecture acts as a middleware entity responsible for bridging the CS federation and RPs. Its primary function is to facilitate the efficient dissemination of updated RPKI data to RPs.</t>
        <t>Whenever the CS federation reaches consensus on a new set of OII and ORI, the participating CS nodes <bcp14>SHALL</bcp14> proactively push these confirmed records to their connected Monitors. Each Monitor <bcp14>SHALL</bcp14> then:</t>
        <ul spacing="normal">
          <li>
            <t>Retrieve the newly added or updated RPKI objects from the relevant CS nodes based on the received OIIs.</t>
          </li>
          <li>
            <t>Use the OIIs and ORIs to generate VUI, which cryptographically binds the latest updates to a verifiable proof.</t>
          </li>
          <li>
            <t>Proactively push the VUI, along with the newly retrieved RPKI objects, to the set of RPs it serves.</t>
          </li>
          <li>
            <t>Maintain a real-time full dRR-protected RPKI data snapshot to serve newly added RPs.</t>
          </li>
        </ul>
        <t>This process ensures that RPs receive not only the updated data but also the cryptographic means to verify both the authenticity and the completeness of each update.</t>
      </section>
    </section>
    <section anchor="drr-operation-procedures">
      <name>dRR Operation Procedures</name>
      <t>The primary functions of an RPKI Repository are to store, manage, and synchronize certificates and signed objects, including the publication and revocation of such data. The following subsections describe how these processes are handled in the dRR system.</t>
      <section anchor="publication-and-synchronization">
        <name>Publication and Synchronization</name>
        <t><xref target="publication"/> illustrates the end-to-end process by which a new RPKI certificate or signed object is published and subsequently synchronized to RPs within the dRR system.</t>
        <t>The sequence proceeds as follows:</t>
        <t>Step 1. Request Object: The INR holder submits a request to the relevant RPKI authority to obtain resources along with the corresponding RC or signed objects (such as ROAs, ASPAs, or SPLs).</t>
        <t>Step 2. Issue Object and OII: The RPKI authority issues the requested RC or signed object (collectively referred to as objects) and returns these, along with the associated OII, to the INR holder.</t>
        <t>Step 3. Upload the Object and OII: The INR holder uploads the object to multiple trusted CS nodes and submits the corresponding OII to one of the CS nodes hosting the object.</t>
        <t>Step 4. Object Hosting: The selected CS nodes store the uploaded RPKI object on behalf of the INR holder.</t>
        <t>Step 5. Consensus in the Federation: One of the hosting CS nodes submits the OII to the CS federation. Federation members execute a consensus protocol to collectively validate the OII. If consensus is achieved, the OII is permanently recorded in the federation's global ledger, completing the object publication.</t>
        <t>Step 6. Push OII to Monitors: The CS nodes push the consensus-approved OII to their connected Monitors.</t>
        <t>Step 7. Retrieving the Object by Monitors: Each Monitor retrieves the newly published object from the relevant CS nodes according to the details in the OII.</t>
        <t>Step 8. Pushing Data to RPs: The Monitor generates a VUI record based on the new OII and proactively distributes bboth the VUI and the newly retrieved RPKI data to its designated RPs. This enables RPs to verify the authenticity and completeness of the received updates.</t>
        <t>This coordinated process ensures that newly issued RPKI object is reliably stored, transparently validated through federation consensus, and efficiently delivered to RPs with cryptographic assurances of integrity and completeness.</t>
        <figure anchor="publication">
          <name>RPKI object publication and synchronization procedure in dRR.</name>
          <artwork><![CDATA[
                                +---------------------------------------+
                                |             CS Federation             |
     +-------------+            | +------+                    +------+  |
     |     CA      |            | |  CS  |         ...        |  CS  |  |
     +-+/\+--------+            | +------+  +------>-------+  +------+  |
         |     |                |           |              |            |
1.request|     |                |           /\ 5.publicize \/           |
  object |     |2.object & OII  |           |     OII      |            |
         |     |                |           |              |            | 
         |     |                |           +-------<------+            |
     +-------+\/+--+   3.upload object & OII    +------+  4.storing     |
     | INR holder  |--------------------------->|  CS  |    object      |
     +-------------+            |               +------+                |
                                +-----+/\+------------------------------+
                                  |     | 
                        6.push ORI|     |7.fetch object
                                  |     | 
                                  |     |
                              +-+\/+---------+ 8.push VUI/object +--------+
                              |    Monitor   |------------------>|   RP   |
                              +--------------+                   +--------+ ~~~~~~~~~~
]]></artwork>
        </figure>
      </section>
      <section anchor="revocation-and-synchronization">
        <name>Revocation and Synchronization</name>
        <t><xref target="revocation"/> illustrates the process by which an existing RPKI object is revoked within the dRR system and how this revocation information is synchronized to RPs:</t>
        <t>Step 1. Revocation request: The RPKI authority initiates a revocation by requesting the INR holder to revoke a specific RPKI object.</t>
        <t>Step 2. Issue ORI: Upon agreeing to the revocation, the INR holder generates and signs an ORI, which serves as verifiable proof that the INR holder (and any affected subordinate holders) consent to the revocation.</t>
        <t>Step 3. Upload ORI: The RPKI authority submits the signed ORI to one of the trusted CS nodes.</t>
        <t>Step 4. Federation consensus: The receiving CS node publishes the ORI to the CS federation. Federation members execute a consensus protocol to validate and accept the ORI. If consensus is reached, the ORI is recorded in the federation's global ledger, the object is officially revoked, and it is removed from all relevant CS storage. If consensus fails, the revocation does not proceed.</t>
        <t>Step 5. Push to Monitors: CS nodes proactively push the consensus-approved ORI to their connected Monitors.</t>
        <t>Step 6. Push to RPs: Monitors generate a VUI based on the new ORI and proactively push both the revocation data and the VUI to the RPs they serve. This enables RPs to verify the authenticity and completeness of the revocation update.</t>
        <t>This process ensures that object revocations in dRR are cryptographically proven, transparently recorded across the federation, and rapidly synchronized to relying parties through proactive distribution.</t>
        <figure anchor="revocation">
          <name>RPKI object revocation and synchronization procedure in dRR.</name>
          <artwork><![CDATA[
                               +---------------------------------------+
                     3.upload  |             CS Federation             |
    +-------------+    ORI     | +------+                    +------+  |
    |     CA      |------------->|  CS  |         ...        |  CS  |  |
    +-------+/\+--+            | +------+  +------>-------+  +------+  |
        |     |                |           |              |            |
1.revoke|     |                |           /\ 4.publicize \/           |
 object |     |2.ORI           |           |     ORI      |            |
        |     |                |           |              |            | 
        |     |                |           +-------<------+            |
    +-+\/+--------+            |               +------+                |
    | INR holder  |            |               |  CS  |                |
    +-------------+            |               +------+                |
                               +---------------------------------------+
                                     |      
                           5.push ORI|      
                                     |      
                                     |      
                             +-----+\/+-----+   6.push VUI    +--------+
                             |    Monitor   |---------------->|   RP   |
                             +--------------+                 +--------+ ~~~~~~~~~~
]]></artwork>
        </figure>
        <t>It should be noted that in practice, the CS federation may concurrently process multiple OIIs and ORIs. Similarly, a single CS node <bcp14>MAY</bcp14> aggregate and push multiple OIIs and ORIs to connected Monitors within the same operation. As a result, the VUI generated by a Monitor and delivered to RPs <bcp14>MAY</bcp14> encapsulate multiple new object publications and multiple object revocations in a single update.</t>
      </section>
    </section>
    <section anchor="drr-participants-and-roles">
      <name>dRR Participants and Roles</name>
      <t>The dRR system is explicitly designed to support a diverse set of operational participants to ensure technical neutrality, operational robustness, and broad stakeholder representation.</t>
      <t><strong>Operators of Certificate Servers</strong>. Within the CS federation, nodes <bcp14>MAY</bcp14> be operated not only by the five RIRs—RIPE NCC, APNIC, AFRINIC, LACNIC, and ARIN—but also by other qualified entities. These <bcp14>MAY</bcp14> include large Internet Service Providers (ISPs), national Internet registries, Content Delivery Network (CDN) service providers, or other infrastructure organizations capable of reliably hosting RPKI data and serving RPs. By enabling a mix of technical and geographic participation, the CS federation mitigates risks associated with centralized control and improves the resilience of the overall repository system.</t>
      <t><strong>Operators of Monitors</strong>. In the dRR architecture, the Monitor role is intended to serve multiple RPs that typically exist within the same trust domain as the Monitor itself. For example, these RPs <bcp14>MAY</bcp14> include multiple Autonomous Systems (ASes) under the operational control of the same ISP, or networks within the jurisdiction of a single governmental or national organization. This trust relationship allows Monitors to efficiently aggregate updates from the CS federation and securely distribute RPKI data to affiliated RPs, thereby reducing synchronization overhead and enhancing overall system efficiency.</t>
      <t>By explicitly supporting a multi-party operational model for both CS federation nodes and Monitors, the dRR architecture fosters participation from a range of organizational types and jurisdictions. This approach helps achieve a balanced ecosystem that reflects diverse operational interests while reducing systemic dependencies on any single class of stakeholder. The inclusion of varied participants is fundamental to ensuring the long-term neutrality, transparency, and accountability of the RPKI data distribution infrastructure. Whether and how CS nodes provide services to INR holders on a compensated basis is out of scope for this document.</t>
    </section>
    <section anchor="benefits-and-improvements">
      <name>Benefits and Improvements</name>
      <t>By introducing a federation of CS nodes and a layer of Monitors, dRR May address several longstanding challenges of the current RPKI Repository system and achieves tangible operational benefits:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Enhancing Reliability and Mitigating P1:</strong>
In dRR, each RPKI object can be simultaneously hosted across multiple CS nodes. This means that the failure or compromise of any single node does not jeopardize the availability or integrity of RPKI data as retrieved by RPs. Additionally, the federated structure inherently filters for participants with the capacity to provide robust, stable hosting, further improving the system's resilience against localized outages.</t>
        </li>
        <li>
          <t><strong>Improving Scalability and Mitigating P2:</strong>
dRR enhances scalability through two key mechanisms. First, the federation's controlled admission mechanism ensures that only vetted entities can operate CS nodes, effectively limiting the overall number of repository nodes while still supporting a globally distributed architecture. Second, dRR's two-tier data distribution model means that CS nodes only need to establish connections with their designated Monitors, and RPs in turn only maintain connections with their respective Monitors. This structured push model significantly reduces the volume of direct bidirectional connections between RPs and repository nodes, alleviating synchronization pressure and supporting large-scale deployment without compromising timeliness or efficiency.</t>
        </li>
        <li>
          <t><strong>Strengthening Security &amp; Accountability and Mitigating P3:</strong>
By decoupling RPKI object signing from data storage, dRR shifts operational control of published RPKI objects directly to INR holders. This substantially reduces the risk of unilateral deletions or modifications by upstream CAs and strengthens accountability. The transparent consensus mechanism within the federation also provides an auditable record of all publication and revocation operations.</t>
        </li>
      </ul>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <t>The incremental deployment of dRR is designed to align with the existing hierarchical structure of the RPKI system, following a top-down approach. Specifically, an RPKI object <bcp14>MAY</bcp14> be protected by dRR only if its parent RC is already under dRR protection. This section outlines deployment behaviors in partial adoption scenarios.</t>
      <t>(1) Certificate Management Model.</t>
      <t>When an RPKI authority adopts dRR, its subordinate INR holders <bcp14>MAY</bcp14> independently decide whether to deploy dRR. As a result:</t>
      <ul spacing="normal">
        <li>
          <t>An RPKI authority <bcp14>SHALL</bcp14> continue operating its traditional repository PP for as long as any of its subordinate INR holders have not deployed dRR, to ensure continued hosting of their RPKI objects.</t>
        </li>
        <li>
          <t>Only when all subordinate INR holders have fully transitioned to dRR <bcp14>MAY</bcp14> the RPKI authority discontinue operation of its PP.</t>
        </li>
        <li>
          <t>For subordinate INR holders that have not deployed dRR, their RPKI data management remains unchanged, and their objects <bcp14>SHALL</bcp14> continue to be stored in the authority's PP.</t>
        </li>
        <li>
          <t>For INR holders that have deployed dRR, their RPKI data <bcp14>SHALL NOT</bcp14> be stored in the parent RPKI authority's PP, and the corresponding PP manifest <bcp14>SHALL NOT</bcp14> include RCs or signed objects protected by dRR.</t>
        </li>
      </ul>
      <t>(2)Incremental Data Synchronization.</t>
      <t>During partial deployment phases, RPs <bcp14>SHOULD</bcp14> synchronize data from both dRR and the existing RPKI repository system to maintain a complete view of the RPKI state. This involves:</t>
      <ul spacing="normal">
        <li>
          <t>Updates via dRR: The RP applies updates proactively pushed by Monitors, using the received VUI and associated data. The RP <bcp14>SHALL</bcp14> add newly published objects indicated by OIIs and remove revoked objects as specified by ORIs.</t>
        </li>
        <li>
          <t>Updates via Traditional Repositories: The RP <bcp14>SHALL</bcp14> continue to periodically synchronize RPKI data not protected by dRR by querying all relevant repository PPs using protocols such as Rsync or RRDP.</t>
        </li>
      </ul>
      <t>(3)Full Data Synchronization.</t>
      <t>Similarly, during partial deployment, RPs <bcp14>MUST</bcp14> acquire full RPKI data snapshot from both dRR Monitor and the current RPKI repository to ensure full synchronization of all RPKI objects.</t>
      <t>dRR explicitly supports such phased deployment models. During incremental adoption, dRR continues to provide full security assurances for certificates under its protection, ensuring a consistent trust model throughout the transition process.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="rpki-repo-ps" target="https://datatracker.ietf.org/doc/draft-li-sidrops-rpki-repository-problem-statement/">
          <front>
            <title>RPKI Repository Problem Statement</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
          <seriesInfo name="Internet-Draft draft-li-sidrops-rpki-repository-problem-statement-01" value=""/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
