<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-drr-architecture-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Decentralized RPKI Repository Architecture">Decentralized RPKI Repository Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-drr-architecture-01"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Su" fullname="Yingying Su">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>suyy@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="January" day="06"/>
    <area>General [REPLACE]</area>
    <workgroup>sidrops</workgroup>
    <abstract>
      <?line 49?>

<t>The Resource Public Key Infrastructure (RPKI) plays a crucial role in securing inter-domain routing. However, the current RPKI Repository system suffers from fundamental limitations in reliability, scalability, and consistency. In particular, single-point failures at repository publication points (PPs), the growing number of bidirectional connections between PPs and relying parties (RPs), and the lack of a globally consistent historical RPKI data view pose significant risks to the resilience, integrity, and authority of the global RPKI ecosystem.</t>
      <t>This document proposes the Decentralized RPKI Repository (dRR), a novel repository architecture that decouples RPKI object signing authority from RPKI object management authority (e.g., storage and distribution). dRR introduces a distributed group of certificate servers (CSs) and a layer of Monitors to achieve robust, scalable, and auditable RPKI data management. The architecture maintains full compatibility with the existing RPKI trust model rooted in the five RIR trust anchors, enabling incremental deployment without disrupting current relying parties (RPs) validation semantics. By doing so, dRR addresses longstanding repository challenges and enhances the overall efficiency and trustworthiness of RPKI-based routing security.</t>
    </abstract>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Resource Public Key Infrastructure has become a cornerstone for securing inter-domain routing, providing mechanisms to validate the association between Internet number resources (INR) and the entities authorized to originate them. While RPKI has proven effective in mitigating certain types of BGP hijacks, the current repository system exhibits critical architectural shortcomings.</t>
      <t>In particular, the coupling between repository PPs and certification authorities (CAs) results in three fundamental challenges. First, the system is prone to reliability issues: a failure or attack on any PP may prevent RPs from obtaining a complete or timely RPKI data view. Second, the existing model lacks scalability, as the anticipated growth in the number of PPs and RPs—driven by broader deployment of ROAs and ROV—exacerbates synchronization load and connection overhead. Third, the current architecture cannot guarantee the consistency and integrity of the RPKI data retrieved by RPs. Maintaining a consistent and complete RPKI data view helps improve the accuracy of ROV, facilitates misconfiguration diagnosis, and enhances RPKI system's transparency. These issues are discussed in detail in <xref target="rpki-repo-ps"/>.</t>
      <t>To address these concerns, this document introduces the Decentralized RPKI Repository (dRR), which extends and enhances the existing RPKI repository architecture. dRR is founded on the principle of decoupling RPKI object signing from data management. It replaces traditional PP-based storage with a distributed and decentralized group of certificate servers (CSs), each CS operating as an equal peer that collaboratively hosts RPKI data. INR holders can proactively upload their RPKI objects to any trusted CSs within this group, thereby retaining greater operational control.</t>
      <t>Additionally, dRR incorporates Monitors as middleware components that aggregate updates from the CS group and proactively distribute RPKI data to RPs. This design reduces the number of direct connections between RPs and repository nodes and improves both the scalability and timeliness of RPKI data distribution.</t>
      <t>Through this architecture, dRR aims to enhance the robustness, scalability, and consistency of the global RPKI system while preserving compatibility with existing hierarchical trust anchors and RPKI data validation processes.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology-and-definitions">
      <name>Terminology and Definitions</name>
      <t>This document assumes familiarity with the concepts described in "A Profile for Resource Certificate Repository Structure" <xref target="RFC6481"/>, "The RPKI Repository Delta Protocol (RRDP)" <xref target="RFC8182"/>, and "An Infrastructure to Support Secure Internet Routing" <xref target="RFC6480"/>.</t>
      <t>This document defines the following terminology:</t>
      <t><strong>Decentralized RPKI Repository (dRR):</strong>
The new RPKI repository architecture proposed in this document. dRR consists of multiple Certificate Servers (CSs) that collaboratively store and distribute RPKI data, along with Monitors that act as middleware between the CS group and RPs.</t>
      <t><strong>Certificate Server (CS):</strong>
A core component of the dRR system. A CS is a node responsible for hosting RPKI objects. All CS nodes within dRR collectively form a group.</t>
      <t><strong>Monitor:</strong>
Represents a key middleware component in dRR that sits between CS nodes and RPs. A Monitor retrieves RPKI data from CS nodes and proactively pushes updates to its connected RPs.</t>
      <t><strong>Object Issuance Information (OII):</strong>
Metadata associated with a newly issued RPKI object. An OII is signed by the CA that issued the object and includes the fingerprint of the object along with its intended storage locations within the CS nodes. The OII allows the CS members to verify the authenticity of the newly issued RPKI object.</t>
      <t><strong>Object Revocation Information (ORI):</strong>
Metadata associated with an RPKI object that is to be revoked. An ORI is signed by the INR holder of the object. It includes the fingerprint of the object to be revoked and serves to prove that the impacted party has authorized the revocation. The ORI enables the CS members to verify the legitimacy of the revocation.</t>
      <t><strong>Verifiable Update Information (VUI):</strong>
Cryptographic metadata generated by a Monitor when proactively distributing updates to an RP. A VUI enables the RP to verify both the authenticity and the completeness of the received RPKI update data.</t>
      <t>These terms are used throughout this document.</t>
    </section>
    <section anchor="design-principles-and-objectives">
      <name>Design Principles and Objectives</name>
      <t>The design of dRR is guided by two primary principles:</t>
      <ul spacing="normal">
        <li>
          <t>Preserve the existing hierarchical trust model: dRR does not modify the hierarchical certificate issuance framework rooted in the five RIR trust anchors, which <bcp14>MUST</bcp14> remain the foundational basis of the global RPKI trust model. The roles and trust relationships of CAs and INR holders remain unchanged.</t>
        </li>
        <li>
          <t>Separate data management from data signing: While certificate issuance continues to be handled by existing RPKI authorities, the storage and distribution of RPKI objects are explicitly delegated to INR holders and a decentralized set of infrastructure components. INR holders <bcp14>SHALL</bcp14> maintain direct control over where and how their RPKI data is hosted. RPs <bcp14>MUST</bcp14> continue to perform cryptographic validation of all received data, preserving end-to-end trust guarantees.</t>
        </li>
      </ul>
      <t>Building on these principles, the dRR architecture serves exclusively as an alternative repository layer. It provides mechanisms for the upload, hosting, and storage of resource certificates (RCs), ROAs, and potentially newer signed objects such as autonomous system provider authorization (ASPA) and signed prefix list (SPLs). The design paradigm establishes a decentralized RPKI data management platform, effectively redefining the boundaries of responsibility between RPKI authorities and INR holders. It also supports both incremental and full data synchronization for RPs, thereby fulfilling all core repository functions without altering existing validation semantics.</t>
      <t>The architecture of dRR is explicitly designed to meet the following objectives:</t>
      <ul spacing="normal">
        <li>
          <t>Compatibility: dRR <bcp14>MUST NOT</bcp14> alter the hierarchical RPKI certificate issuance architecture. It <bcp14>SHALL</bcp14> remain fully compatible with the current RPKI Repository system and <bcp14>SHALL</bcp14> support incremental deployment alongside existing PPs without disrupting established validation or synchronization workflows.</t>
        </li>
        <li>
          <t>Reliability: dRR <bcp14>SHALL</bcp14> ensure high availability of RPKI data through distributed storage. A single RPKI object <bcp14>MAY</bcp14> be redundantly stored across multiple physically isolated repository nodes. Consequently, the integrity and accessibility of RPKI data as consumed by RPs <bcp14>SHALL NOT</bcp14> be compromised even if individual nodes experience failures.</t>
        </li>
        <li>
          <t>Scalability: The dRR architecture <bcp14>SHALL</bcp14> prevent uncontrolled growth in the number of repository nodes required to host data. It <bcp14>SHOULD</bcp14> enable efficient synchronization mechanisms that ensure RPs receive timely updates of RPKI data, regardless of the scale of ROA and ROV deployment.</t>
        </li>
        <li>
          <t>Consistency and Auditability: dRR <bcp14>SHALL</bcp14> maintain a complete and consistent historical record of RPKI data and operations, ensuring that RPs obtain accurate and consistent RPKI data, thereby enhancing system transparency, enabling robust auditing, and facilitating misconfiguration diagnosis.</t>
        </li>
      </ul>
      <t>By adhering to these principles and objectives, dRR aims to enhance the reliability, scalability, consistency, and Auditability of the RPKI repository layer while ensuring full interoperability with the existing RPKI infrastructure.</t>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <section anchor="key-components">
        <name>Key Components</name>
        <t>The dRR architecture replaces the conventional RPKI Repository system with two principal components: a <strong>distributed Certificate Server group</strong> (CS group) and a layer of <strong>middleware Monitors</strong>.</t>
        <section anchor="certificate-server-group">
          <name>Certificate Server Group</name>
          <t>The CS group consists of multiple independent certificate server nodes that collectively host and store RPKI data. Each CS node participates equally in this group and operates under a data sharing protocol to maintain a consistent view of hosted RPKI objects and object operations. INR holders <bcp14>MAY</bcp14> upload their RC, ROAs, or other signed objects issued by RPKI authorities to any subset of trusted CS nodes they choose.</t>
          <t>This decentralized model decouples data storage and management responsibilities from certificate signing authorities. As a result:</t>
          <ul spacing="normal">
            <li>
              <t>INR holders maintain operational control and management over their RPKI data.</t>
            </li>
            <li>
              <t>RPKI objects <bcp14>MAY</bcp14> be simultaneously stored across multiple CS nodes, improving redundancy and availability.</t>
            </li>
          </ul>
        </section>
        <section anchor="middleware-monitors">
          <name>Middleware Monitors</name>
          <t>Monitors act as intermediaries between the CS group and RPs. Each Monitor <bcp14>SHALL</bcp14>:</t>
          <ul spacing="normal">
            <li>
              <t>Receive OII and ORI from the CS group.</t>
            </li>
            <li>
              <t>Retrieve newly published from the specified CS nodes based on OII.</t>
            </li>
            <li>
              <t>Generate VUI according OII and ORI, and proactively push both VUI and the associated newly added RPKI objects to the RPs it serves.</t>
            </li>
            <li>
              <t>Maintain a full dRR-protected RPKI data snapshot.</t>
            </li>
          </ul>
          <t>This two-tier proactive data distribution architecture contrasts with the traditional model in which each RP <bcp14>MUST</bcp14> periodically poll multiple PPs to obtain updates. By aggregating and pushing updates, Monitors reduce synchronization delays and alleviate load on both the repository infrastructure and RPs.</t>
        </section>
        <section anchor="key-differences-from-the-current-system">
          <name>Key Differences from the Current System</name>
          <t>Compared to the existing RPKI repository architecture, the key differences introduced by dRR include:</t>
          <ul spacing="normal">
            <li>
              <t>Flexible Data Storage: Under dRR, INR holders actively upload their RPKI objects to selected CS nodes. They <bcp14>SHALL</bcp14> have the freedom to choose multiple trusted nodes for storing their data. By decoupling RPKI object signing authority from data management responsibilities, dRR transfers operational control of RPKI data directly to the legitimate INR holders. In contrast, the current model requires that data signed by a CA <bcp14>MUST</bcp14> be stored exclusively at the PP operated or designated by that CA, which is a single point storage model.</t>
            </li>
            <li>
              <t>Two-tier Push Model: dRR introduces a layered proactive distribution mechanism. CS nodes <bcp14>SHALL</bcp14> push OII and ORI and cryptographic proofs to a designated set of Mnitors. Each Monitor <bcp14>SHALL</bcp14> then retrieve newly added RPKI data from the specific CS nodes according to the OII, and <bcp14>SHALL</bcp14> generate VUI and proactively distribute both the VUI and the newly added RPKI objects to its designated set of RPs. In dRR, each CS typically serves a defined group of Monitors, and each Monitor, in turn, serves a defined group of RPs. For today’s RPKI Repository, the full set of PPs and RPs must establish a large number of bidirectional connections, which increases the load and pressure of data synchronization.</t>
            </li>
            <li>
              <t>Consistency of RPKI Data View: In dRR, newly uploaded objects and object revocation statements <bcp14>SHALL</bcp14> be publicly disseminated across the CS group through OII and ORI. This process ensures the consistency and integrity of the RPKI data view seen by the CS node, thereby ensuring the integrity of data view seen by RPs and the ROV accuracy. It also helps to enhance the transparency of the system and provide audit functions. By comparison, existing PPs operate in isolation, each maintaining and managing its own data view without inter-node validation or transparency.</t>
            </li>
          </ul>
          <t>The distributed CS group is the core component enabling decentralization in dRR. Each server node participates in a protocol to build a cross-domain trust network, thereby forming a data hosting platform that operates independently of any single RPKI authority. All server nodes function as equal participants, collectively providing certificate hosting services to INR holders within the RPKI system. The middleware layer of Monitors acts as the central hub for data propagation. It receives consensus-validated RPKI data and associated operations from CS group and, based on a proactive push model, delivers new RPKI objects to RPs.</t>
        </section>
      </section>
      <section anchor="cs-group-construction">
        <name>CS Group Construction</name>
        <t>The CS group is comprised of multiple CS nodes. The following principles govern the operation and structure of these nodes:</t>
        <t>a) Each CS operates independently of any RPKI authority. All CS nodes <bcp14>SHALL</bcp14> be equal peers and <bcp14>SHALL</bcp14> collectively form a group to provide secure and reliable hosting services for INR holders.</t>
        <t>b) Any entity seeking to join the CS group <bcp14>MUST</bcp14> undergo security validation performed by the existing CS group members.</t>
        <t>c) All operations within the group—including the registration of new CS nodes, registration of INR holders, publication of RPKI objects, and object revocation—<bcp14>MUST</bcp14> achieve consensus among all participating CS group members.</t>
        <t>The initialization of the CS group, along with the registration mechanisms for CS nodes and INR holders, are described below.</t>
        <ul spacing="normal">
          <li>
            <t>Initialization of the CS group: The initial CS group <bcp14>SHALL</bcp14> be established jointly by the five RIRs: RIPE NCC, APNIC, AFRINIC, LACNIC, and ARIN. During initialization, each RIR <bcp14>SHALL</bcp14> register its CS node within the group. The registration information for each CS node <bcp14>MUST</bcp14> include: (1) A unique identifier for the CS node; (2) The node's unique public key; (3) A digital signature generated using the private key corresponding to that public key.</t>
          </li>
          <li>
            <t>Registration of CS Nodes: Entities that meet the eligibility requirements <bcp14>MAY</bcp14> apply to operate RPKI object hosting servers and join the CS group. This process proceeds as follows: (1) The applying entity submits its registration information to one of the five RIRs; (2) Upon successful completion of identity, security, and reliability verification (for example, evaluation of the applicant's reputation or its capability to operate on robust platforms such as CDNs), the RIR <bcp14>SHALL</bcp14> publish the entity's registration information to the CS group; (3) The existing group members <bcp14>SHALL</bcp14> validate the identity of the new CS node and verify the provided signatures; (4) If a majority of group members approve, consensus <bcp14>SHALL</bcp14> be reached and the entity's registration information <bcp14>SHALL</bcp14> be permanently recorded in the group's global ledger. The entity <bcp14>SHALL</bcp14> then formally become a member of the CS group and <bcp14>MAY</bcp14> provide hosting services to INR holders. If consensus is not achieved, the entity <bcp14>SHALL NOT</bcp14> be admitted into the CS group.</t>
          </li>
          <li>
            <t>Registration of INR Holders. Any INR holder deploying dRR <bcp14>MUST</bcp14> first complete identity registration within the CS group. The process is as follows: (1) The INR holder submits its registration information to one trusted CS node; (2) The receiving CS node <bcp14>SHALL</bcp14> publish the registration information to the group, triggering a validation process by the group members. (3) If a majority of members validate the registration successfully, the INR holder's information <bcp14>SHALL</bcp14> be recorded in the group's global ledger. If consensus is not achieved, registration <bcp14>SHALL</bcp14> fail.</t>
          </li>
        </ul>
        <t>It is important to note that any RPKI authority inherently holds an RC certificate issued by its parent authority (or, in the case of RIRs, a self-issued RC root certificate). Therefore, for the purposes of dRR, an RPKI authority is also treated as an INR holder and <bcp14>MUST</bcp14> undergo the same INR holder registration process within the CS group.</t>
      </section>
      <section anchor="cs-group-operation">
        <name>CS Group Operation</name>
        <t>Within dRR, INR holders actively manage the distribution of their RPKI objects by uploading them to one or more trusted CS nodes. The CS group ensures the integrity and transparency of these operations by requiring that both the publication of new objects and the revocation of existing objects be represented as OII and ORI records. These records <bcp14>MUST</bcp14> be disseminated across the group and permanently recorded in the group's global ledger. This immutable, time-ordered ledger provides a comprehensive audit trail of all RPKI object operations.</t>
        <section anchor="publication-of-new-objects">
          <name>Publication of New Objects</name>
          <t>To publish a new RPKI object, the INR holder submits the newly issued object—signed by its parent RPKI authority—to multiple trusted CS nodes for secure storage. The INR holder also submits the corresponding OII to a designated CS node, which <bcp14>SHALL</bcp14> publish this OII to the CS group.</t>
          <ul spacing="normal">
            <li>
              <t>If consensus on the OII is achieved among group members, the OII <bcp14>SHALL</bcp14> be permanently recorded in the group's global ledger. The object is then officially protected by the group and becomes available for retrieval and synchronization by RPs.</t>
            </li>
            <li>
              <t>If consensus is not reached, the publication process <bcp14>SHALL</bcp14> fail, and the object <bcp14>SHALL NOT</bcp14> be incorporated into the group's authoritative dataset.</t>
            </li>
          </ul>
          <t>An OII, as defined by this document, <bcp14>MUST</bcp14> include at a minimum: (1) The identifiers of the issuer and recipient as recorded in the group's registration system; (2) The parent certificate of the newly issued object; (3) A unique hash fingerprint of the object; (4) A list of CS nodes that store the object; (5) A signature generated by the RPKI authority.</t>
        </section>
        <section anchor="revocation-of-existing-objects">
          <name>Revocation of Existing Objects</name>
          <t>When an RPKI authority intends to revoke an RPKI object previously issued to a subordinate INR holder, it <bcp14>MUST</bcp14> first request an ORI from that INR holder. The RPKI authority then submits the ORI to one or more trusted CS nodes, which <bcp14>SHALL</bcp14> propagate the ORI to the remaining group members.</t>
          <ul spacing="normal">
            <li>
              <t>If consensus on the ORI is achieved among group members, the ORI <bcp14>SHALL</bcp14> be written to the global ledger. The corresponding object <bcp14>SHALL</bcp14> then be revoked and removed from the storage of all participating CS nodes.</t>
            </li>
            <li>
              <t>If consensus is not achieved, the revocation <bcp14>SHALL</bcp14> fail, and the object <bcp14>SHALL</bcp14> remain valid in the group.</t>
            </li>
          </ul>
          <t>An ORI, as defined by this document, <bcp14>MUST</bcp14> include at a minimum: (1) The unique hash fingerprint of the object to be revoked; (2) An authorization signature generated by the INR holders; (3) (Optional) Additional endorsements from affected subordinate INR holders when applicable.</t>
          <t>By ensuring that all publication and revocation operations undergo group-wide consensus and are permanently logged, dRR provides INR holders and RPs with a verifiable and tamper-evident history of RPKI object management. This decentralized model significantly strengthens accountability and mitigates the risks associated with unilateral control by any single RPKI authority.</t>
        </section>
      </section>
      <section anchor="monitor-operation">
        <name>Monitor Operation</name>
        <t>A Monitor in the dRR architecture acts as a middleware entity responsible for bridging the CS group and RPs. Its primary function is to facilitate the efficient dissemination of updated RPKI data to RPs.</t>
        <t>Whenever the CS group reaches consensus on a new set of OII and ORI, the participating CS nodes <bcp14>SHALL</bcp14> proactively push these confirmed records to their connected Monitors. Each Monitor <bcp14>SHALL</bcp14> then:</t>
        <ul spacing="normal">
          <li>
            <t>Retrieve the newly added or updated RPKI objects from the relevant CS nodes based on the received OIIs.</t>
          </li>
          <li>
            <t>Use the OIIs and ORIs to generate VUI, which cryptographically binds the latest updates to a verifiable proof.</t>
          </li>
          <li>
            <t>Proactively push the VUI, along with the newly retrieved RPKI objects, to the set of RPs it serves.</t>
          </li>
          <li>
            <t>Maintain a real-time full dRR-protected RPKI data snapshot to serve newly added RPs.</t>
          </li>
        </ul>
        <t>This process ensures that RPs receive not only the updated data but also the cryptographic means to verify both the authenticity and the completeness of each update.</t>
      </section>
    </section>
    <section anchor="drr-operation-procedures">
      <name>dRR Operation Procedures</name>
      <t>The primary functions of an RPKI Repository are to store, manage, and synchronize certificates and signed objects, including the publication and revocation of such data. The following subsections describe how these processes are handled in the dRR system.</t>
      <section anchor="publication-and-synchronization">
        <name>Publication and Synchronization</name>
        <t><xref target="publication"/> illustrates the end-to-end process by which a new RPKI certificate or signed object is published and subsequently synchronized to RPs within the dRR system.</t>
        <t>The sequence proceeds as follows:</t>
        <t>Step 1. Request Object: The INR holder submits a request to the relevant RPKI authority to obtain resources along with the corresponding RC or signed objects (such as ROAs, ASPAs, or SPLs).</t>
        <t>Step 2. Issue Object and OII: The RPKI authority issues the requested RC or signed object (collectively referred to as objects) and returns these, along with the associated OII, to the INR holder.</t>
        <t>Step 3. Upload the Object and OII: The INR holder uploads the object to multiple trusted CS nodes and submits the corresponding OII to one of the CS nodes hosting the object.</t>
        <t>Step 4. Object Hosting: The selected CS nodes store the uploaded RPKI object on behalf of the INR holder.</t>
        <t>Step 5. Consensus in the group: One of the hosting CS nodes submits the OII to the CS group. CS members execute a consensus protocol to collectively validate the OII. If consensus is achieved, the OII is permanently recorded in the group's global ledger, completing the object publication.</t>
        <t>Step 6. Push OII to Monitors: The CS nodes push the consensus-approved OII to their connected Monitors.</t>
        <t>Step 7. Retrieving the Object by Monitors: Each Monitor retrieves the newly published object from the relevant CS nodes according to the details in the OII.</t>
        <t>Step 8. Pushing Data to RPs: The Monitor generates a VUI record based on the new OII and proactively distributes bboth the VUI and the newly retrieved RPKI data to its designated RPs. This enables RPs to verify the authenticity and completeness of the received updates.</t>
        <t>This coordinated process ensures that newly issued RPKI object is reliably stored, transparently validated through group consensus, and efficiently delivered to RPs with cryptographic assurances of integrity and completeness.</t>
        <figure anchor="publication">
          <name>RPKI object publication and synchronization procedure in dRR.</name>
          <artwork><![CDATA[
                                +---------------------------------------+
                                |                CS group               |
     +-------------+            | +------+                    +------+  |
     |     CA      |            | |  CS  |         ...        |  CS  |  |
     +-+/\+--------+            | +------+  +------>-------+  +------+  |
         |     |                |           |              |            |
1.request|     |                |           /\ 5.publicize \/           |
  object |     |2.object & OII  |           |     OII      |            |
         |     |                |           |              |            | 
         |     |                |           +-------<------+            |
     +-------+\/+--+   3.upload object & OII    +------+  4.storing     |
     | INR holder  |--------------------------->|  CS  |    object      |
     +-------------+            |               +------+                |
                                +-----+/\+------------------------------+
                                  |     | 
                        6.push ORI|     |7.fetch object
                                  |     | 
                                  |     |
                              +-+\/+---------+ 8.push VUI/object +--------+
                              |    Monitor   |------------------>|   RP   |
                              +--------------+                   +--------+ ~~~~~~~~~~
]]></artwork>
        </figure>
      </section>
      <section anchor="revocation-and-synchronization">
        <name>Revocation and Synchronization</name>
        <t><xref target="revocation"/> illustrates the process by which an existing RPKI object is revoked within the dRR system and how this revocation information is synchronized to RPs:</t>
        <t>Step 1. Revocation request: The RPKI authority initiates a revocation by requesting the INR holder to revoke a specific RPKI object.</t>
        <t>Step 2. Issue ORI: Upon agreeing to the revocation, the INR holder generates and signs an ORI, which serves as verifiable proof that the INR holder (and any affected subordinate holders) consent to the revocation.</t>
        <t>Step 3. Upload ORI: The RPKI authority submits the signed ORI to one of the trusted CS nodes.</t>
        <t>Step 4. Group consensus: The receiving CS node publishes the ORI to the CS group. group members execute a consensus protocol to validate and accept the ORI. If consensus is reached, the ORI is recorded in the group's global ledger, the object is officially revoked, and it is removed from all relevant CS storage. If consensus fails, the revocation does not proceed.</t>
        <t>Step 5. Push to Monitors: CS nodes proactively push the consensus-approved ORI to their connected Monitors.</t>
        <t>Step 6. Push to RPs: Monitors generate a VUI based on the new ORI and proactively push both the revocation data and the VUI to the RPs they serve. This enables RPs to verify the authenticity and completeness of the revocation update.</t>
        <t>This process ensures that object revocations in dRR are cryptographically proven, transparently recorded across the group, and rapidly synchronized to relying parties through proactive distribution.</t>
        <figure anchor="revocation">
          <name>RPKI object revocation and synchronization procedure in dRR.</name>
          <artwork><![CDATA[
                               +---------------------------------------+
                     3.upload  |                CS Group               |
    +-------------+    ORI     | +------+                    +------+  |
    |     CA      |------------->|  CS  |         ...        |  CS  |  |
    +-------+/\+--+            | +------+  +------>-------+  +------+  |
        |     |                |           |              |            |
1.revoke|     |                |           /\ 4.publicize \/           |
 object |     |2.ORI           |           |     ORI      |            |
        |     |                |           |              |            | 
        |     |                |           +-------<------+            |
    +-+\/+--------+            |               +------+                |
    | INR holder  |            |               |  CS  |                |
    +-------------+            |               +------+                |
                               +---------------------------------------+
                                     |      
                           5.push ORI|      
                                     |      
                                     |      
                             +-----+\/+-----+   6.push VUI    +--------+
                             |    Monitor   |---------------->|   RP   |
                             +--------------+                 +--------+ ~~~~~~~~~~
]]></artwork>
        </figure>
        <t>It should be noted that in practice, the CS group may concurrently process multiple OIIs and ORIs. Similarly, a single CS node <bcp14>MAY</bcp14> aggregate and push multiple OIIs and ORIs to connected Monitors within the same operation. As a result, the VUI generated by a Monitor and delivered to RPs <bcp14>MAY</bcp14> encapsulate multiple new object publications and multiple object revocations in a single update.</t>
      </section>
    </section>
    <section anchor="drr-participants-and-roles">
      <name>dRR Participants and Roles</name>
      <t>The dRR system is explicitly designed to support a diverse set of operational participants to ensure technical neutrality, operational robustness, and broad stakeholder representation.</t>
      <t><strong>Operators of Certificate Servers</strong>. Within the CS group, nodes <bcp14>MAY</bcp14> be operated not only by the five RIRs—RIPE NCC, APNIC, AFRINIC, LACNIC, and ARIN—but also by other qualified entities. These <bcp14>MAY</bcp14> include large Internet Service Providers (ISPs), national Internet registries, Content Delivery Network (CDN) service providers, or other infrastructure organizations capable of reliably hosting RPKI data and serving RPs. By enabling a mix of technical and geographic participation, the CS group mitigates risks associated with centralized control and improves the resilience of the overall repository system.</t>
      <t><strong>Operators of Monitors</strong>. In the dRR architecture, the Monitor role is intended to serve multiple RPs that typically exist within the same trust domain as the Monitor itself. For example, these RPs <bcp14>MAY</bcp14> include multiple Autonomous Systems (ASes) under the operational control of the same ISP, or networks within the jurisdiction of a single governmental or national organization. This trust relationship allows Monitors to efficiently aggregate updates from the CS group and securely distribute RPKI data to affiliated RPs, thereby reducing synchronization overhead and enhancing overall system efficiency.</t>
      <t>By explicitly supporting a multi-party operational model for both CS group nodes and Monitors, the dRR architecture fosters participation from a range of organizational types and jurisdictions. This approach helps achieve a balanced ecosystem that reflects diverse operational interests while reducing systemic dependencies on any single class of stakeholder. The inclusion of varied participants is fundamental to ensuring the long-term neutrality, transparency, and accountability of the RPKI data distribution infrastructure. Whether and how CS nodes provide services to INR holders on a compensated basis is out of scope for this document.</t>
    </section>
    <section anchor="benefits-and-improvements">
      <name>Benefits and Improvements</name>
      <t>By introducing a group of CS nodes and a layer of Monitors, dRR May address several longstanding challenges of the current RPKI Repository system and achieves tangible operational benefits:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Improving Scalability and Mitigating P1:</strong>
dRR enhances scalability through two key mechanisms. First, the group's controlled admission mechanism ensures that only vetted entities can operate CS nodes, effectively limiting the overall number of repository nodes while still supporting a globally distributed architecture. Second, dRR's two-tier data distribution model means that CS nodes only need to establish connections with their designated Monitors, and RPs in turn only maintain connections with their respective Monitors. This structured push model significantly reduces the volume of direct bidirectional connections between RPs and repository nodes, alleviating synchronization pressure and supporting large-scale deployment without compromising timeliness or efficiency.</t>
        </li>
        <li>
          <t><strong>Enhancing Reliability and Mitigating P2:</strong>
In dRR, each RPKI object can be simultaneously hosted across multiple CS nodes. This means that the failure or compromise of any single node does not jeopardize the availability or integrity of RPKI data as retrieved by RPs. Additionally, the federated structure inherently filters for participants with the capacity to provide robust, stable hosting, further improving the system's resilience against localized outages.</t>
        </li>
        <li>
          <t><strong>Strengthening Auditability:</strong>
Each CS node in dRR maintains complete and consistent RPKI data, along with a record of all operations performed on the data. This enables dRR to provide reliable auditing capabilities for the RPKI system, thereby enhancing the transparency of RPKI data.</t>
        </li>
      </ul>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <t>The incremental deployment of dRR is designed to align with the existing hierarchical structure of the RPKI system, following a top-down approach. Specifically, an RPKI object <bcp14>MAY</bcp14> be protected by dRR only if its parent RC is already under dRR protection. This section outlines deployment behaviors in partial adoption scenarios.</t>
      <t>(1) Certificate Management Model.</t>
      <t>When an RPKI authority adopts dRR, its subordinate INR holders <bcp14>MAY</bcp14> independently decide whether to deploy dRR. As a result:</t>
      <ul spacing="normal">
        <li>
          <t>An RPKI authority <bcp14>SHALL</bcp14> continue operating its traditional repository PP for as long as any of its subordinate INR holders have not deployed dRR, to ensure continued hosting of their RPKI objects.</t>
        </li>
        <li>
          <t>Only when all subordinate INR holders have fully transitioned to dRR <bcp14>MAY</bcp14> the RPKI authority discontinue operation of its PP.</t>
        </li>
        <li>
          <t>For subordinate INR holders that have not deployed dRR, their RPKI data management remains unchanged, and their objects <bcp14>SHALL</bcp14> continue to be stored in the authority's PP.</t>
        </li>
        <li>
          <t>For INR holders that have deployed dRR, their RPKI data <bcp14>SHALL NOT</bcp14> be stored in the parent RPKI authority's PP, and the corresponding PP manifest <bcp14>SHALL NOT</bcp14> include RCs or signed objects protected by dRR.</t>
        </li>
      </ul>
      <t>(2)Incremental Data Synchronization.</t>
      <t>During partial deployment phases, RPs <bcp14>SHOULD</bcp14> synchronize data from both dRR and the existing RPKI repository system to maintain a complete view of the RPKI state. This involves:</t>
      <ul spacing="normal">
        <li>
          <t>Updates via dRR: The RP applies updates proactively pushed by Monitors, using the received VUI and associated data. The RP <bcp14>SHALL</bcp14> add newly published objects indicated by OIIs and remove revoked objects as specified by ORIs.</t>
        </li>
        <li>
          <t>Updates via Traditional Repositories: The RP <bcp14>SHALL</bcp14> continue to periodically synchronize RPKI data not protected by dRR by querying all relevant repository PPs using protocols such as Rsync or RRDP.</t>
        </li>
      </ul>
      <t>(3)Full Data Synchronization.</t>
      <t>Similarly, during partial deployment, RPs <bcp14>MUST</bcp14> acquire full RPKI data snapshot from both dRR Monitor and the current RPKI repository to ensure full synchronization of all RPKI objects.</t>
      <t>dRR explicitly supports such phased deployment models. During incremental adoption, dRR continues to provide full security assurances for certificates under its protection, ensuring a consistent trust model throughout the transition process.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="rpki-repo-ps" target="https://datatracker.ietf.org/doc/draft-li-sidrops-rpki-repository-problem-statement/">
          <front>
            <title>RPKI Repository Problem Statement</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
          <seriesInfo name="Internet-Draft draft-li-sidrops-rpki-repository-problem-statement-02" value=""/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
