<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-martin-grow-rpki-generated-loa-00" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>Generating a Letter of Agency to reflect RPKI Validity</title>
    <seriesInfo name="Internet-Draft" value="draft-martin-grow-rpki-generated-loa-00"/>
    <author fullname="Algin Martin">
      <organization>Cloudflare</organization>
      <address>
        <email>algin@cloudflare.com</email>
      </address>
    </author>
    <author fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="16"/>
    <keyword>RPKI</keyword>
    <keyword>LOA</keyword>
    <keyword>routing</keyword>
    <abstract>
      <?line 32?>

<t>Letters of Agency (LOA) are commonly used to authorise network
providers to accept and propagate routing information received from
others. The Resource Public Key Infrastructure (RPKI) can be used
to perform a similar function, with the advantage that RPKI-signed
objects can be validated automatically and in a more robust manner
than manual processing of documents. However, some network operators
have established processes that expect and require LOAs to be
exchanged, despite their limitations. This document proposes a
format for constructing a LOA in the case where RPKI validation
is available, with the goal of enabling a transition to a future
where LOAs are no longer needed.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-martin-grow-rpki-generated-loa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Global Routing Operations Working Group mailing list (<eref target="mailto:grow@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/grow/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/grow/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ableyjoe/draft-martin-grow-rpki-generated-loa"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Some organisations use IP addresses that have been assigned or
allocated for their use and that are independent of any particular
network service provider. For such address space to be reachable
on the global Internet, routing information must be proagated from
one or more originating autonomous systems and must be received by
other adjacent or further distant autonomous systems in order for
traffic directed at those addresses to be sent in the right direction.</t>
      <t>It is best current practice for network operators not to accept
routing information from adjacent networks indiscriminately, but
rather to filter routing information to ensure that Internet traffic
is not routed inappropriately.  Network operators are expected to
accept routing information selectively, filtering and allowing only
route advertisements that they have reason to believe are legitimate.</t>
      <t>In the case of routing information that is being received directly
from a customer network, or is being originated by the network
provider on the customer's behalf, such legitimacy has often been
determined by the customer issuing a Letter of Agency (LOA), a
document that provides authorisation for one operator to act on
behalf of another. Such letters are commonly exchanged in the form
of electronic documents exchanged over insecure mechanisms like
e-mail with no integrity protection or strong authentication. For
more discussion about LOAs, see <xref target="loa"/>. Some limitations of this
practice are discussed briefly in <xref target="security"/>.</t>
      <t>The RPKI provides an opportunity to provide equivalent authorisation
to a Letter of Agency in a form that is independently verifiable
and cryptographically strong. However, many network operators have
established workflows that include LOAs, and at the time of writing
many customers are not practised in the management of RPKI-signed
objects.</t>
      <t>This document describes a template for constructing a Letter of
Agency in the case where RPKI verification of a request to exchange
routing informationi is possible. We propose that network operators
accept such documents, with corresponding crypytographic validation
of associated signed objects, in place of a conventional LOA.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="authorisation">
      <name>RPKI Authorisation of Routing Data</name>
      <t>Suppose a customer requests that a network provide connectivity for
their addresses, represented by an IP prefix. The provider is
requested to either originate or accept the prefix from the customer's
network using the Border Gateway Protocol (BGP) <xref target="RFC4271"/>. The
prefix will propagate from the provider's network with the AS_PATH
attribute "... P+ C*" where P is the provider's Autonomous System
Number (ASN), C is the customer's ASN, + denotes one or more
repetitions and * denotes zero or more repetitions.</t>
      <t>For example, a customer with ASN C who advertises prefix A to the
provider's ASN P might intend that the prefix propagates to adjacent
networks of the provider with the AS_PATH "... P C". A different
customer who directs the provider to originate prefix B on their
behalf might intend that the prefix propagates to adjacent networks
of the provider with the AS_PATH "... P".</t>
      <t>The RPKI can be used to sign and publish objects that reflect these
intentions. The two object types used for this purpose are the
Route Origin Authorization (ROA) and Autonomous System
Provider Authorization (ASPA) objects.</t>
      <section anchor="route-origin-authorization-roa-objects">
        <name>Route Origin Authorization (ROA) Objects</name>
        <t>ROAs are described in <xref target="RFC9582"/>. A valid ROA provides authorisation for
a particular set of prefixes to be originated from a particular ASN.</t>
        <t>In the examples above, a signed ROA might authorise prefix A to be
originated from ASN C, and another signed ROA might authorise prefix
B to be originated from ASN P.</t>
      </section>
      <section anchor="autonomous-system-proider-authorization-aspa-objects">
        <name>Autonomous System Proider Authorization (ASPA) Objects</name>
        <t>ASPAs are described in <xref target="I-D.ietf-sidrops-aspa-profile"/>. A valid ASPA
provides authorization for a particular prefix to propagate along
particular edges in a graph of connected autonomous systems.</t>
        <t>In the examples above, a signed ASPA might authorise prefix A to
exhibit the AS_PATH "... P C".</t>
      </section>
    </section>
    <section anchor="bring-your-own-ip-byoip-considerations">
      <name>Bring Your Own IP (BYOIP) Considerations</name>
      <t>Originating routes on behalf of customers has long been a common
function of network operators. At the time of writing it is also
common for other types of provider, e.g. those that provide services
such as content distribution or cloud compute. Such service providers
sometimes use the phrase "Bring Your Own IP" (BYOIP) to describe
the practice of using customer-supplied addresses to make services
available on behalf of those customers.</t>
      <t>The provider may have many distinct and unrelated customers. A
customer who authorises the provider to attach their BYOIP prefixes
to their account does not normally authorise the use of those
prefixes by other customers. In order to ensure that a particular
BYOIP prefix is attached to an account that is authorised to use
it, a provider requires further authorisation from the customer.</t>
      <t><xref target="RFC9323"/> provides a profile for RPKI Signed Checklists (RSCs)
which can be used by a resource holder as an attestation.</t>
      <t>In the case of the examples in <xref target="authorisation"/>, the customer
responsible for BYOIP prefix A might sign an attestation that
authorises the use of that prefix with their account and make that
attestation available to the provider. The attestion might be
signed with the ROA or the ASPA associated with prefix A.
Similarly, the customer responsible for BYOIP prefix B might
sign a checklist authorising using the ROA associated with prefix B.</t>
      <t>Authorisation of particular BYOIP prefixes to be attached to
particular provider accounts is necessarily provider-specific. Other
mechanisms are possible.</t>
      <t>From the perspective of an adjacent network operator, the details
of how a service provider manages appropriate safeguards relating
to BYOIP are not important, and those details are not generally
considered necessary to explain in a LOA.</t>
    </section>
    <section anchor="constructing-a-loa-based-on-rpki-validation">
      <name>Constructing a LOA based on RPKI Validation</name>
      <t>A LOA constructed according to this specification is referred to
as an RPKI Letter of Agency (RPKI LOA).</t>
      <t>An RPKI LOA is intended to be a human-readable representation of
validation that can be performed by automated systems. Consequently,
there is no benefit in an RPKI LOA being machine-readable. Automatic
verification of authorisation to originate or propagate a prefix
SHOULD use RPKI-signed objects and perform signature validation
directly and SHOULD NOT attempt to process the contents of an RPKI
LOA.</t>
      <t>This document specifies an ordering and a list of details that MUST
be included in a LOA for it to be consistent with this specification,
but provides few normative requirements for presentation or precise
wording. This is intended to provide sufficient consistency for the
LOA to be clear and familiar while leaving flexibility for providers
to be able to include additional information and adopt a style that
suits their particular circumstances.</t>
      <t>This section describes a number of sections, all of which MUST be
included in an RPKI LOA. Some sections specify text to be included
verbatim, while other sections describe the information to be
included without prescribing particular text.</t>
      <t>Where this specification requires particular text to be included
verbatim, that text MUST be included in English. RPKI LOAs MAY also
include translations of that normative text in other languages.
All other parts of an RPKI ROA MAY use any languages or scripts.</t>
      <t>Each of the following sections MUST be separated so that they can
easily be distinguished from each other. Each section MAY include
a section heading.</t>
      <section anchor="introduction-1">
        <name>Introduction</name>
        <t>This section MUST begin with the following text, included verbatim:</t>
        <t>"This is an RPKI LOA that conforms to (this document)."</t>
        <t>This section MAY also include other introductory information, such as
useful external references or information about the resource holder.</t>
      </section>
      <section anchor="provenance-and-validity">
        <name>Provenance and Validity</name>
        <t>The name and contact details of the person or organisation issuing
the RPKI LOA should be included.</t>
        <t>The date at which the RPKI LOA was prepared should be included.</t>
      </section>
      <section anchor="route-origination-and-service-provider-authorisation">
        <name>Route Origination and Service Provider Authorisation</name>
        <t>This section MUST begin with the following text, included verbatim:</t>
        <t>"The following route originations have been authorised by the
publication of RPKI-signed ROA and/or ASPA objects. Relying parties
should perform their own validation of these objects in order to
confirm the details provided in this RPKI LOA."</t>
        <t>All prefixes that are the subject of the RPKI LOA MUST be included.</t>
        <t>Each prefix MUST be clearly annotated with the origin ASN and also
the provider ASN in the case where the origin AS is not the same
as the provider AS.</t>
        <t>This section MAY include references tools that a reader might use
in order to confirm the authorisations described in the document.
For example invocation syntax and example output from command-line
tools might be included in order to make it easier for a reader to
confirm the information described.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>LOAs do not provide strong authorisation because it is not
straightforward to authenticate their contents. Anecdotally, LOAs
are often accepted by unqualified staff without systematic or
thorough review. It is not clear that the exchange of LOAs provides
useful legal protection to any party in the event that a related
subsequent complaint was made.</t>
      <t>The form of LOA described in this document does not in itself provide
stronger authorisation; however, the contents do provide a means
by which the recipient of a LOA can obtain a measure of authentication
which is cryptographically strong. The recipient of an RPKI LOA who
reads and follows the directions within is able to obtain more
confidence about the authorised use of IP addresses described within
it than with a conventional LOA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC9582">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="25" month="June" year="2024"/>
            <abstract>
              <t>   This document defines a Cryptographic Message Syntax (CMS) protected
   content type for Autonomous System Provider Authorization (ASPA)
   objects for use with the Resource Public Key Infrastructure (RPKI).
   An ASPA is a digitally signed object through which the issuer (the
   holder of an Autonomous System identifier), can authorize one or more
   other Autonomous Systems (ASes) as its upstream providers.  When
   validated, an ASPA's eContent can be used for detection and
   mitigation of route leaks.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-18"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9323">
          <front>
            <title>A Profile for RPKI Signed Checklists (RSCs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="T. Harrison" initials="T." surname="Harrison"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of checksums (a 'checklist'). The objective is to allow for the creation of an attestation, termed an "RPKI Signed Checklist (RSC)", which contains one or more checksums of arbitrary digital objects (files) that are signed with a specific set of Internet Number Resources. When validated, an RSC confirms that the respective Internet resource holder produced the RSC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9323"/>
          <seriesInfo name="DOI" value="10.17487/RFC9323"/>
        </reference>
      </references>
    </references>
    <?line 270?>

<section anchor="loa">
      <name>Letter of Agency</name>
      <t>A Letter of Agency (LOA) is a document used in telecommunications
to authorise a provider to act on behalf of a customer. LOAs were
originally specified for use in the United States and their use is
specified in the Code of Federal Regulations Title 47 / Chapter 1
/ Subchapter B / Part 64 / Subpart K, "S 64.1130 Letter of agency
form and content".</t>
      <t>LOAs were subsequently adopted more informally for use between
Internet providers in order to document and authorise the use of
IP addresses administered by a customer to be made reachable by an
Internet Service Provider. The acronym LOA is sometimes taken to
mean "Letter of Authorisation" despite its original meaning.</t>
    </section>
    <section anchor="example-rpki-loa">
      <name>Example RPKI LOA</name>
      <section anchor="customer-originates-a-prefix-to-provider">
        <name>Customer originates a prefix to provider</name>
        <artwork><![CDATA[
INTRODUCTION

This is an RPKI LOA that conforms to (this document).

PROVENANCE AND VALIDITY

This document was produced by Cloudflare on behalf of a customer at
2024-10-13 15:00 UTC. For more information about this document, please
contact Cloudflare as follows:

  Cloudflare, Inc
  101 Townsend Street
  San Francisco
  CA 94107
  USA

  rpki@cloudflare.com

ROUTE ORIGIN AND SERVICE PROVIDER AUTHORISATION

The following route originations have been authorised by the
publication of RPKI-signed ROA and/or ASPA objects. Relying parties
should perform their own validation of these objects in order to
confirm the details provided in this RPKI LOA.

  PREFIX                  ORIGIN AS       PROVIDER AS
  199.212.90.0/24         9327            13335
  199.212.91.0/24         9327            13335

Route origin authorisation can be verified by reference to published
signed RPKI objects, as illustrated by the following:

  https://rpki-validator.ripe.net/ui/199.212.90.0%2F24/9327
  https://rpki-validator.ripe.net/ui/199.212.91.0%2F24/9327
]]></artwork>
      </section>
      <section anchor="nederlands">
        <name>Provider originates customer BYOIP prefix in Dutch</name>
        <artwork><![CDATA[
INTRODUCTIE

This is an RPKI LOA that conforms to (this document).

Dit is een RPKI LOA die voldoet aan (dit document). Dit document
is in het Nederlands geschreven en is bedoeld voor een publiek dat
Nederlands spreekt.  Het is van belang dat kernzaken van dit document
ook in het Engels geschreven zijn.

HERKOMST EN GELDIGHEID

Dit document is in opdracht van een klant door Cloudflare geproduceerd
om 2024-10-13 15:00 UTC. Voor meer informatie over dit document
kunt u contact opnemen met Cloudflare via:

  Cloudflare, Inc
  101 Townsend Street
  San Francisco
  CA 94107
  USA

  rpki@cloudflare.com

OORSPRONG VAN ROUTES

The following route originations have been authorised by the
publication of RPKI-signed ROA and/or ASPA objects. Relying parties
should perform their own validation of these objects in order to
confirm the details provided in this RPKI LOA.

De volgende route-oorsprongen zijn geautoriseerd door de publicatie
van RPKI-ondertekende ROA en/of ASPA-objecten. Afhankelijke partijen
moeten hun eigen validatie van deze objecten uitvoeren om de details
in deze RPKI LOA te bevestigen.

  PREFIX                  OORSPRONG AS
  199.212.92.0/24         13335
  199.212.93.0/24         13335

Route-oorsprong autorisatie kan worden geverifieerd middels verwijzing
naar gepubliceerde ondertekende RPKI-objecten, zoals geïllustreerd
middels:

  https://rpki-validator.ripe.net/ui/199.212.92.0%2F24/13335
  https://rpki-validator.ripe.net/ui/199.212.93.0%2F24/13335
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Dirk-Jan van Helmond tried valiantly to repair the authors'
tremendously poor Dutch in <xref target="nederlands"/>. Any residual crimes
against language are the fault of the authors alone.  Lucas Pardue's
stylistic recommendations were all implemented with the result that
the document is now much more palatable to Lucas Pardue.</t>
      <t>These fine and wonderful other people also helped with this document
(your name goes here).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
