<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-rpki-moasgroup-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="rpki-moasgroup">A Profile for Signed Group of Multiple-Origin Autonomous Systems for Use in the Resource Public Key Infrastructure (RPKI)</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-rpki-moasgroup-00"/>
    <author fullname="Qi Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liq23@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Operations and Management</area>
    <workgroup>SIDR Operations</workgroup>
    <abstract>
      <?line 60?>

<t>This document defines a "Signed MOAS Group", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to authenticate the collective announcement of IP prefixes by Multiple Origin Autonomous System (MOAS). The Signed MOAS Group includes two parts: an IP prefix and a list of Autonomous Systems (ASes) authorized to announce the prefix. At least one of these ASes <bcp14>SHOULD</bcp14> be authorized to announce the prefix by the prefix owner through a Route Origin Authorization (ROA). The validation of a Signed MOAS Group confirms that the authorized ASes and other listed ASes have collectively agreed to announce the prefix, ensuring that the announcement is legitimate, accurate, and consensually authorized.</t>
    </abstract>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a "Signed MOAS Group", a Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> <xref target="RFC626"/> protected content type to carry an IP prefix and a list of Autonomous Systems (ASes) authorized to announce this prefix. The Signed MOAS Group allows multiple ASes to collaboratively and securely announce an IP prefix, supporting scenarios such as business partnerships, traffic engineering, and DDoS protection services.</t>
      <t>A Signed MOAS Group object consists of two components: an IP prefix and a list of Autonomous Systems (ASes) intended to announce the prefix collaboratively, which allows other RPKI-validating routing entities to audit the collection of announcements from multiple originating AS. At least one AS in the AS list <bcp14>SHOULD</bcp14> be authorized to announce the prefix by the prefix owner through a corresponding ROA, which means the IP prefix in the ROA <bcp14>SHOULD</bcp14> match the IP prefix in the Signed MOAS Group and the AS number in the ROA <bcp14>SHOULD</bcp14> appear in the AS list. The object is collectively signed by the listed ASes using a multi-signature technique, and the aggregated global signature is attached to the Signed MOAS Group object, ensuring that the announcement could be legitimately proposed by all participating ASes and is verifiable by any RPKI-validating remote routing entities.</t>
      <t>To validate a Signed MoasGroup object, a relying party (RP) aggregates the public keys of all ASes in the AS list into a global public key, which is subsequently used to verify the multi-signature of the Signed MOAS Group object. There are three possible validation outcomes. First, if the Signed MOAS Group is verified and at least one corresponding ROA is found, it is considered valid. Second, if the Signed MOAS Group is verified but no corresponding ROA is found, it is deemed suspicious. Lastly, if the Signed MOAS Group cannot be verified, it is considered invalid.</t>
      <t>The Signed MOAS Group provides a mechanism for securely managing multi-origin AS announcements, offering a robust and flexible solution to handle modern routing requirements. Any prefixes announced by ASes that are not included in a ROA or a validated Signed MOAS Group <bcp14>SHOULD</bcp14> be regarded as invalid, though their handling is subject to local routing policies. The intent is to offer a secure and authenticated method for managing MOAS scenarios, enhancing the overall security and integrity of the routing system.</t>
      <t>Signed MOAS Group objects follow the Signed Object Template for the RPKI <xref target="RFC6488"/>.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="signed-moasgroup-econtenttype">
      <name>Signed MoasGroup eContentType</name>
      <t>The eContentType for a MoasGroup is defined as id-ct-rpkiSignedMoasGroup, with Object Identifier (OID) 1.2.840.113549.1.9.16.1.TBD.</t>
      <t>This OID <bcp14>MUST</bcp14> appear within both the eContentType in the encapContentInfo object and the ContentType signed attribute in the signerInfo object (see <xref target="RFC6488"/>).</t>
    </section>
    <section anchor="sec_econtent">
      <name>Signed MoasGroup eContent</name>
      <t>The content of a MoasGroup is a single IP prefix and a list of ASes. A MoasGroup is formally defined as follows:</t>
      <artwork><![CDATA[
RpkiSignedMoasGroup-2024
  { iso(1) member-body(2) us(840) rsadsi(113549)
   pkcs(1) pkcs9(9) smime(16) mod(0)
   id-mod-rpkiSignedMoasGroup-2024(TBD) }

   DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
CONTENT-TYPE
FROM CryptographicMessageSyntax-2010 -- in [RFC6268]
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
    pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) };

ct-rpkiSignedMoasGroup CONTENT-TYPE ::=
{ TYPE RpkiSignedMoasGroup
  IDENTIFIED BY id-ct-rpkiSignedMoasGroup }

id-ct-rpkiSignedMoasGroup OBJECT IDENTIFIER ::=
{ iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
  pkcs-9(9) id-smime(16) id-ct(1) TBD }

RpkiSignedMoasGroup ::= SEQUENCE {
  version [0]           INTEGER DEFAULT 0,
  ipAddressPrefix       AddressFamilyIPAddress,
  asList                SEQUENCE (SIZE(0..MAX)) OF ASID,
}

ASID ::= INTEGER (1..4294967295)

AddressFamilyIPAddress ::= SEQUENCE {
  addressFamily         ADDRESS-FAMILY.&afi ({AddressFamilySet}),
  prefix        ADDRESS-FAMILY.&Prefix ({AddressFamilySet}{@addressFamily}) }

ADDRESS-FAMILY ::= CLASS {
  &afi          OCTET STRING (SIZE(2)) UNIQUE,
  &Prefix
} WITH SYNTAX { AFI &afi PREFIX-TYPE &Prefix }

AddressFamilySet ADDRESS-FAMILY ::= { addressFamilyIPv4 | addressFamilyIPv6 }

addressFamilyIPv4 ADDRESS-FAMILY ::= { AFI afi-IPv4 PREFIX-TYPE AddressesIPv4 }
addressFamilyIPv6 ADDRESS-FAMILY ::= { AFI afi-IPv6 PREFIX-TYPE AddressesIPv6 }

afi-IPv4 OCTET STRING ::= '0001'H
afi-IPv6 OCTET STRING ::= '0002'H

AddressesIPv4 ::= Prefix{32}
AddressesIPv6 ::= Prefix{128}

Prefix {INTEGER: len} ::= SEQUENCE {
  address       BIT STRING (SIZE(0..len)) }

END
]]></artwork>
      <section anchor="version">
        <name>Version</name>
        <t>The version number of the RpkiSignedMoasGroup <bcp14>MUST</bcp14> be 0.</t>
      </section>
      <section anchor="aslist">
        <name>asList</name>
        <t>This field contains the AS numbers that are intended to originate routes to the given IP address prefixes. The AS numbers that are authorized by ROA <bcp14>SHOULD</bcp14> be put in front of other AS numbers. The AS numbers <bcp14>MUST NOT</bcp14> duplicate.</t>
      </section>
      <section anchor="ipaddressprefix">
        <name>ipAddressPrefix</name>
        <t>This field contains an AddressFamilyIPAddress which contains one instance of addressFamily and one instance of prefix.</t>
        <section anchor="addressfamily">
          <name>addressFamily</name>
          <t>This field contains an OCTET STRING which is either '0001'H (IPv4) or '0002'H (IPv6).</t>
        </section>
        <section anchor="prefix">
          <name>prefix</name>
          <t>This field contains a BIT STRING, its length bounded through the addressFamily field. The type is a BIT STRING, see <xref section="2.2.3.8" sectionFormat="of" target="RFC3779"/> for more information.</t>
        </section>
      </section>
    </section>
    <section anchor="signed-moasgroup-validation">
      <name>Signed MoasGroup Validation</name>
      <t>To validate a MoasGroup, the relying party <bcp14>MUST</bcp14> perform all the validation checks specified in <xref target="RFC6488"/>. In addition, the RP <bcp14>MUST</bcp14> perform the following validation steps:</t>
      <ol spacing="normal" type="1"><li>
          <t>The contents of the CMS eContent field <bcp14>MUST</bcp14> conform to all of the constraints described in Section <xref target="sec_econtent"/>.</t>
        </li>
        <li>
          <t>The RP <bcp14>MUST</bcp14> verify the signatures of the Signed MOAS Group. This involves aggregating the public keys of all ASes listed in the AS list into a global public key. The aggregated global public key is subsequently used to verify the global signature attached to the Signed MOAS Group object.</t>
        </li>
        <li>
          <t>The RP <bcp14>MUST</bcp14> check for the existence of a corresponding ROA for the IP prefix in the Signed MOAS Group. The IP prefix in the ROA <bcp14>MUST</bcp14> match the IP prefix in the Signed MOAS Group, and the AS number in the ROA <bcp14>MUST</bcp14> appear in the AS list.</t>
        </li>
        <li>
          <t>A Signed MOAS Group has three possible validation outcomes. (1) Valid: If the Signed MOAS Group is verified and at least one corresponding ROA is found, it is considered valid. (2) Suspicious: If the Signed MOAS Group is verified but no corresponding ROA is found, the Signed MOAS Group is considered suspicious. (3) Invalid: If the Signed MOAS Group cannot be verified, it is considered invalid.</t>
        </li>
      </ol>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>To aggregate the signatures of all ASes in the AS list, the Signed MOAS Group <bcp14>MUST</bcp14> use BLS Signatures with BLS12-381 elliptic curve <xref target="I-D.draft-ietf-cose-bls-key-representations-05"/>. This ensures that the signatures can be efficiently combined into a single global signature.</t>
      <t>The ASes in the AS List that are authorized by the ROA <bcp14>SHOULD</bcp14> be placed at the beginning of the AS list, ahead of any non-authorized ASes. This ordering can improve the efficiency of the RP's validation process. It is highly <bcp14>RECOMMENDED</bcp14> that the RP only verifies whether the first AS and the prefix can be validated by the ROA.</t>
      <t>Multiple valid Signed MOAS Group objects can exist that contain the same IP prefix. However, it is highly <bcp14>RECOMMENDED</bcp14> that an AS only participate in one Signed MOAS Group for the same IP prefix. If the AS List of a Signed MOAS Group needs modification, it is highly <bcp14>RECOMMENDED</bcp14> to revoke the current Signed MOAS Group and sign a new one.</t>
      <!-- The construction of an 'allowlist' for a given EBGP session using Signed MOAS Group(s) complements best practices {{RFC7454}} and rejecting RPKI-invalid BGP route announcements {{RFC6811}}. In other words, if a given BGP route is covered by an RPKI Signed MOAS Group, but is also "invalid" from a Route Origin Validation perspective, it is RECOMMENDED to reject the route announcement. -->

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Despite it is highly <bcp14>RECOMMENDED</bcp14> that a Signed MOAS Group <bcp14>SHOULD</bcp14> be validated by at least one ROA, the data contained in a Signed MOAS Group is still self-asserted by the group of AS holders. This means that the presence of an AS in the Signed MOAS Group does not inherently imply any authority from the IP prefix holder for the AS to originate a route for any prefixes. Such authority is separately conveyed in the RPKI through a ROA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="smi-security-for-smime-cms-content-type-1284011354919161">
        <name>SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)</name>
        <t>IANA is requested to allocate the following in the "SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">Id-ct-rpkiSignedMoasGroup</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rpki-signed-objects">
        <name>RPKI Signed Objects</name>
        <t>IANA is requested to register two OIDs in the "RPKI Signed Objects" registry <xref target="RFC6488"/> as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">OID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signed MoasGroup</td>
              <td align="left">1.2.840.113549.1.9.16.1.TBD</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rpki-repository-name-schemes">
        <name>RPKI Repository Name Schemes</name>
        <t>IANA is requested to add the Signed MoasGroup file extension to the "RPKI Repository Name Schemes" registry <xref target="RFC6481"/> as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Filename Extension</th>
              <th align="left">RPKI Object</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">.smg</td>
              <td align="left">Signed MoasGroup</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="smi-security-for-smime-module-identifier-1284011354919160">
        <name>SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)</name>
        <t>IANA is requested to allocate the following in the "SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">.TBD</td>
              <td align="left">id-mod-rpkiSignedMoasGroup-2024</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5652">
        <front>
          <title>Cryptographic Message Syntax (CMS)</title>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <date month="September" year="2009"/>
          <abstract>
            <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="70"/>
        <seriesInfo name="RFC" value="5652"/>
        <seriesInfo name="DOI" value="10.17487/RFC5652"/>
      </reference>
      <reference anchor="RFC626">
        <front>
          <title>On a possible lockup condition in IMP subnet due to message sequencing</title>
          <author fullname="L. Kleinrock" initials="L." surname="Kleinrock"/>
          <author fullname="H. Opderbeck" initials="H." surname="Opderbeck"/>
          <date month="March" year="1974"/>
        </front>
        <seriesInfo name="RFC" value="626"/>
        <seriesInfo name="DOI" value="10.17487/RFC0626"/>
      </reference>
      <reference anchor="RFC6488">
        <front>
          <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
          <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
          <author fullname="A. Chi" initials="A." surname="Chi"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="February" year="2012"/>
          <abstract>
            <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6488"/>
        <seriesInfo name="DOI" value="10.17487/RFC6488"/>
      </reference>
      <reference anchor="RFC3779">
        <front>
          <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
          <author fullname="C. Lynn" initials="C." surname="Lynn"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <author fullname="K. Seo" initials="K." surname="Seo"/>
          <date month="June" year="2004"/>
          <abstract>
            <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3779"/>
        <seriesInfo name="DOI" value="10.17487/RFC3779"/>
      </reference>
      <reference anchor="RFC6811">
        <front>
          <title>BGP Prefix Origin Validation</title>
          <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
          <author fullname="J. Scudder" initials="J." surname="Scudder"/>
          <author fullname="D. Ward" initials="D." surname="Ward"/>
          <author fullname="R. Bush" initials="R." surname="Bush"/>
          <author fullname="R. Austein" initials="R." surname="Austein"/>
          <date month="January" year="2013"/>
          <abstract>
            <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6811"/>
        <seriesInfo name="DOI" value="10.17487/RFC6811"/>
      </reference>
      <reference anchor="RFC7454">
        <front>
          <title>BGP Operations and Security</title>
          <author fullname="J. Durand" initials="J." surname="Durand"/>
          <author fullname="I. Pepelnjak" initials="I." surname="Pepelnjak"/>
          <author fullname="G. Doering" initials="G." surname="Doering"/>
          <date month="February" year="2015"/>
          <abstract>
            <t>The Border Gateway Protocol (BGP) is the protocol almost exclusively used in the Internet to exchange routing information between network domains. Due to this central nature, it is important to understand the security measures that can and should be deployed to prevent accidental or intentional routing disturbances.</t>
            <t>This document describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane filtering. It also describes measures to better control the flow of routing information, using prefix filtering and automation of prefix filters, max-prefix filtering, Autonomous System (AS) path filtering, route flap dampening, and BGP community scrubbing.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="194"/>
        <seriesInfo name="RFC" value="7454"/>
        <seriesInfo name="DOI" value="10.17487/RFC7454"/>
      </reference>
      <reference anchor="RFC6481">
        <front>
          <title>A Profile for Resource Certificate Repository Structure</title>
          <author fullname="G. Huston" initials="G." surname="Huston"/>
          <author fullname="R. Loomans" initials="R." surname="Loomans"/>
          <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
          <date month="February" year="2012"/>
          <abstract>
            <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6481"/>
        <seriesInfo name="DOI" value="10.17487/RFC6481"/>
      </reference>
      <reference anchor="I-D.draft-ietf-cose-bls-key-representations-05">
        <front>
          <title>Barreto-Lynn-Scott Elliptic Curve Key Representations for JOSE and COSE</title>
          <author fullname="Tobias Looker" initials="T." surname="Looker">
            <organization>Mattr</organization>
          </author>
          <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
            <organization>Self-Issued Consulting</organization>
          </author>
          <date day="17" month="March" year="2024"/>
          <abstract>
            <t>   This specification defines how to represent cryptographic keys for
   the pairing-friendly elliptic curves known as Barreto-Lynn-Scott
   (BLS), for use with the key representation formats of JSON Web Key
   (JWK) and COSE (COSE_Key).

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tplooker/draft-ietf-cose-bls-key-representations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-cose-bls-key-representations-05"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 247?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Shenglin Jiang, Yangfei Guo, Xingang Shi, Shuhe Wang, Xiaoliang Wang, Hui Wang, and Di Ma.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
