<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ramseyer-grow-peering-api-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title>Peering API</title>
    <seriesInfo name="Internet-Draft" value="draft-ramseyer-grow-peering-api-05"/>
    <author fullname="Carlos Aguado">
      <organization>Amazon</organization>
      <address>
        <email>crlsa@amazon.com</email>
      </address>
    </author>
    <author fullname="Matt Griswold">
      <organization>FullCtl</organization>
      <address>
        <email>grizz@20c.com</email>
      </address>
    </author>
    <author fullname="Jenny Ramseyer">
      <organization>Meta</organization>
      <address>
        <email>ramseyer@meta.com</email>
      </address>
    </author>
    <author fullname="Arturo Servin">
      <organization>Google</organization>
      <address>
        <email>arturolev@google.com</email>
      </address>
    </author>
    <author fullname="Tom Strickx">
      <organization>Cloudflare</organization>
      <address>
        <email>tstrickx@cloudflare.com</email>
      </address>
    </author>
    <date year="2024" month="May" day="30"/>
    <keyword>BGP</keyword>
    <keyword>peering</keyword>
    <keyword>configuration</keyword>
    <abstract>
      <?line 67?>

<t>We propose an API standard for BGP Peering, also known as interdomain interconnection through global Internet Routing.
This API offers a standard way to request public (settlement-free) peering, verify the status of a request or BGP session, and list potential connection locations.
The API is backed by PeeringDB OIDC, the industry standard for peering authentication.
We also propose future work to cover private peering, and alternative authentication methods.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bgp.github.io/draft-ietf-peering-api/draft-peering-api-ramseyer-protocol.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ramseyer-grow-peering-api/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bgp/draft-ietf-peering-api"/>.</t>
    </note>
  </front>
  <middle>
    <?line 74?>

<section anchor="problems">
      <name>Introduction</name>
      <t>The Peering API is a mechanism that allows networks to automate interdomain interconnection  between two Autonomous Systems (AS) through the Border Gateway Protocol 4 (<xref target="RFC4271"/>).
Using the API, networks will be able to automatically request and accept peering interconnections between Autonomous Systems in public or private scenarios in a time faster than it would take to configure sessions manually.
By speeding up the peering turn-up process and removing the need for manual involvement in peering, the API and automation will ensure that networks can get interconnected as fast, reliably, cost-effectively, and efficiently as possible.
As a result, this improves end-user performance for all applications using networks interconnection supporting the Peering API.</t>
      <section anchor="justification">
        <name>Business Justification</name>
        <t>By using the Peering API, entities requesting and accepting peering can significantly improve the process to turn up interconnections by:</t>
        <ul spacing="normal">
          <li>
            <t>Reducing in person-hours spent configuring peering</t>
          </li>
          <li>
            <t>Reducing configuration mistakes by reducing human interaction</t>
          </li>
          <li>
            <t>And by peering, reducing network latency through expansion of interconnection relationships</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions">
      <name>Conventions and Terminology</name>
      <t>All terms used in this document will be defined here:</t>
      <ul spacing="normal">
        <li>
          <t>Initiator: Network that wants to peer</t>
        </li>
        <li>
          <t>Receiver: Network that is receiving communications about peering</t>
        </li>
        <li>
          <t>Configured: peering session that is set up on one side</t>
        </li>
        <li>
          <t>Established: session is already defined as per BGP-4 specification  <xref section="8.2.2" sectionFormat="of" target="RFC4271"/></t>
        </li>
      </ul>
    </section>
    <section anchor="audience">
      <name>Audience</name>
      <t>The Peering API aims to simplify peering interconnection configuration.
To that end, the API can be called by either a human or some automation.
A network engineer can submit API requests through a client-side tool, and configure sessions by hand or through existing tooling.
Alternately, an automated service can request BGP sessions through some trigger or regularly scheduled request (for example, upon joining a new peering location, or through regular polling of potential peers).
That automated client can then configure the client sessions through its own tooling.
For ease of exchanging peering requests, the authors suggest peers to maintain both a client and a server for the API.
Toward the goal of streamlining peering configuration, the authors encourage peers to automate their network configuration wherever possible, but do not require full automation to use this API.</t>
    </section>
    <section anchor="protocol">
      <name>Protocol</name>
      <t>The Peering API follows the Representational State Transfer (<xref target="rest"/>) architecture where sessions, locations, and maintenance events are the resources the API represents and is modeled after the OpenAPI standard <xref target="openapi"/>.
Using the token bearer model (<xref target="RFC6750"/>), a client application can request to add or remove peering sessions, list potential interconnection locations, and query for upcoming maintenance events on behalf of the AS resource owner.</t>
      <section anchor="example-peering-request-negotiation">
        <name>Example Peering Request Negotiation</name>
        <t>Diagram of the Peering Request Process</t>
        <artwork><![CDATA[
+-------------------+                    +-------------------+
|     Step 1        |                    |     Step 2        |
|    Network 1      |------------------->|    Network 1      |
|  Identifies need  |                    |   Checks details  |
+-------------------+                    +-------------------+
                                                 |
                                                 v
+-------------------+                    +-------------------+
|      Step 4       |                    |      Step 3       |
|    Network 1      |<-------------------|    Network 1      |
|  gets approval    |                    |     Public or     |
|      token        |                    | Private Peering   |
+-------------------+                    +-------------------+
        |
        v
+-------------------+                    +-------------------+
|      Step 5       |                    |      Step 6       |
|  Network 1 finds  |------------------->|    Network 1      |
| common locations  |                    |  request peering  |
+-------------------+                    +-------------------+
                                                  |
                                                  v
+-------------------+                   +--------------------+
|      Step 8       |                   |       Step 7       |
|     Network 2     |<------------------|     Network 2      |
| accepts or reject |                   |      verifies      |
|    sessions       |                   |     credentials    |
+-------------------+                   +--------------------+
       /     \
      /       \
     /         \
(yes)           (no)
      \          |
       \         +-------------------------------|
        \                                        |
         \                                       |
          v                                      |
+---------------+          +----------------+    |
|    Step 9     |          |    Step 10     |    |
| Sessions are  |          | Network 1 or 2 |    |
|  provisioned  |--------->| checks session |    |
|     status    |          | until it is up |    |
+---------------+          +----------------+    |
                                   |             |
                      +------------+             |
                      |                          |
                      v                          |
            +-------------+                      |
            |   Step 11   |                      |
            |   Request   |<---------------------+
            |  Terminate  |
            +-------------+







Step 1 [Human]: Network 1 identifies that it would be useful to peer with Network 2 to interchange traffic more optimally


Step 2 [Human]: Network 1 checks technical and other peering details about Network 2 to check if peering is possible


Step 3 [Human]: Network 1 decides in type (Public or PNI) of peering and facility


Step 4 [API]: Network 1 gets approval/token that is authorized to ‘speak’ on behalf of Network 1’s ASN.


Step 5 [API]: Network 1 checks PeeringDB for common places between Network 1 and Network 2.
API: GET /locations


Step 6 [API]: Network 1 request peering with Network 2
API:      POST /add_sessions


Step 7 [API]: Network 2 verifies Network 1 credentials, check requirements for peering


Step 8 [API]: Network 2 accepts or rejects session(s)
API Server gives yes/no for request


Step 9 [API]: If yes, sessions are provisioned, Networks 1 or Network 2 can check status
API: /sessions Get session status


Step 10 [API]: API keeps polling until sessions are up


Step 11 [API]: Process Terminate
]]></artwork>
      </section>
      <section anchor="example-api-flow">
        <name>Example API Flow</name>
        <t>The diagram below outlines the proposed API flow.</t>
        <artwork><![CDATA[
OIDC Authentication

+-----------+                 +-------+                    +-----------+
| Initiator |                 | Peer  |                    | PeeringDB |
+-----------+                 +-------+                    +-----------+
      |                           |                              |
      | OIDC Authentication       |                              |
      |--------------------------------------------------------->|
      |                           |                              |
      |                                        Provide auth code |
      |<---------------------------------------------------------|
      |                           |                              |
      | Send auth code to Peer    |                              |
      |--------------------------------------------------------->|
      |                           |                              |
      |                           | Exchange auth code for token |
      |                           |----------------------------->|
      |                           |                              |
      |                           |                 Return token |
      |                           |<-----------------------------|
      |                           |
      | Peer determines permissions based on token
      |                           |
      | Send OK back to Initiator |
      |<--------------------------|

Operations, loop until peering is complete.

List Locations

+-----------+                                                  +-------+
| Initiator |                                                  | Peer  |
+-----------+                                                  +-------+
      |                                                            |
      | QUERY peering locations (peer type, ASN, auth code)        |
      |----------------------------------------------------------->|
      |                                                            |
      |                               Reply with peering locations |
      |                            or errors (401, 406, 451, etc.) |
      |<-----------------------------------------------------------|


Request session status

+-----------+                                                  +-------+
| Initiator |                                                  | Peer  |
+-----------+                                                  +-------+
      |                                                            |
      | QUERY request status using request ID & auth code          |
      |----------------------------------------------------------->|
      |                                                            |
      |                                  Reply with session status |
      |                                      (200, 404, 202, etc.) |
      |<-----------------------------------------------------------|
]]></artwork>
      </section>
      <section anchor="auth">
        <name>AUTH</name>
        <t>First, the initiating OAuth2 Client is also the Resource Owner (RO) so it can follow the OAuth2 client credentials grant <xref section="4.4" sectionFormat="of" target="RFC6749"/>.
In this example, the client will use PeeringDB OIDC credentials to acquire a JWT access token that is scoped for use with the receiving API.
On successful authentication, PeeringDB provides the Resource Server (RS) with the client's email (for potential manual discussion), along with the client's usage entitlements (known as OAuth2 scopes), to confirm the client is permitted to make API requests on behalf of the initiating AS.</t>
      </section>
      <section anchor="request">
        <name>REQUEST</name>
        <ol spacing="normal" type="1"><li>
            <t>ADD SESSION (CLIENT BATCHED REQUEST)</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>The initiator's client provides a set of:
            </t>
            <ul spacing="normal">
              <li>
                <t>Structure:
                </t>
                <ol spacing="normal" type="1"><li>
                    <t>Local ASN (receiver)</t>
                  </li>
                  <li>
                    <t>Local IP</t>
                  </li>
                  <li>
                    <t>Peer ASN (initiator)</t>
                  </li>
                  <li>
                    <t>Peer IP</t>
                  </li>
                  <li>
                    <t>Peer Type (public or private)</t>
                  </li>
                  <li>
                    <t>MD5 (optional with encoding agreed outside of this specification)</t>
                  </li>
                  <li>
                    <t>Location (Commonly agreed identifier of the BGP speaker, e.g. PeeringDB IX lan ID)</t>
                  </li>
                </ol>
              </li>
            </ul>
          </li>
          <li>
            <t>The receiver's expected actions:
            </t>
            <ul spacing="normal">
              <li>
                <t>The server confirms requested clientASN in list of authorized ASNs.</t>
              </li>
              <li>
                <t>Optional: checks traffic levels, prefix limit counters, other desired internal checks.</t>
              </li>
            </ul>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>ADD SESSIONS (SERVER BATCHED RESPONSE)</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>APPROVAL CASE
            </t>
            <ul spacing="normal">
              <li>
                <t>Server returns a list with the structure for each of the acceptable peering sessions. Note: this structure may also contain additional attributes such as the server generated session ID.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>PARTIAL APPROVAL CASE
            </t>
            <ul spacing="normal">
              <li>
                <t>Server returns a list with the structure for each of the acceptable peering sessions as in the approval case. The server also returns a list of sessions that have not deemed as validated or acceptable to be created. The set of sessions accepted and rejected is disjoint and the join of both sets matches the cardinality of the requested sessions.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>REJECTION CASE
            </t>
            <ul spacing="normal">
              <li>
                <t>Server returns an error message which indicates that all of the sessions requested have been rejected and the reason for it.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="clientconfig">
        <name>CLIENT CONFIGURATION</name>
        <t>The client then configures the chosen peering sessions asynchronously using their internal mechanisms.
For every session that the server rejected, the client removes that session from the list to be configured.</t>
      </section>
      <section anchor="serverconfig">
        <name>SERVER CONFIGURATION</name>
        <t>The server configures all sessions that are in its list of approved peering sessions from its reply to the client.</t>
      </section>
      <section anchor="monitoring">
        <name>MONITORING</name>
        <t>Both client and server wait for sessions to establish.
At any point, client may send a "GET STATUS" request to the server, to request the status of the session (by session ID).
The client will send a structure along with the request, as follows:</t>
        <ul spacing="normal">
          <li>
            <t>structure:
            </t>
            <ul spacing="normal">
              <li>
                <t>Session ID</t>
              </li>
              <li>
                <t>Local ASN (server)</t>
              </li>
              <li>
                <t>Local IP</t>
              </li>
              <li>
                <t>Peer ASN (client)</t>
              </li>
              <li>
                <t>Peer IP</t>
              </li>
              <li>
                <t>Peer Type</t>
              </li>
              <li>
                <t>MD5 (optional, as defined above)</t>
              </li>
              <li>
                <t>Location</t>
              </li>
              <li>
                <t>Status</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The server then responds with the same structure, with the information that it understands (status, etc).</t>
      </section>
      <section anchor="completion">
        <name>COMPLETION</name>
        <t>If both sides report that the session is established, then peering is complete.
If one side does not configure sessions within the server's acceptable configuration window (TimeWindow), then the server is entitled to remove the configured sessions and report "Unestablished" to the client.</t>
      </section>
    </section>
    <section anchor="endpoints_and_specs">
      <name>API Endpoints and Specifications</name>
      <t>Each peer needs a public API endpoint that will implement the API protocol.
This API should be publicly listed in peeringDB and also as a potential expansion of <xref target="RFC9092"/> which could provide endpoint integration to WHOIS (<xref target="RFC3912"/>).
Each API endpoint should be fuzz-tested and protected against abuse.  Attackers should not be able to access internal systems using the API.
Every single request should come in with a unique GUID called RequestID that maps to a peering request for later reference.
This GUID format should be standardized across all requests.
This GUID should be provided by the receiver once it receives the request and must be embedded in all communication.
If there is no RequestID present then that should be interpreted as a new request and the process starts again.
An email address is needed for communication if the API fails or is not implemented properly (can be obtained through PeeringDB).</t>
      <t>For a programmatic specification of the API, please see the public Github (<xref target="autopeer"/>).</t>
      <t>This initial draft fully specifies the Public Peering endpoints.
Private Peering and Maintenance are under discussion, and the authors invite collaboration and discussion from interested parties.</t>
      <section anchor="datatypes">
        <name>DATA TYPES</name>
        <t>Please see specification (<xref target="autopeer"/>) for OpenAPI format.</t>
        <t>Peering Location</t>
        <t>Contains string field listing the desired peering location in format <tt>pdb:ix:$IX_ID</tt>, and an enum specifying peering type (public or private).</t>
        <t>Session Status</t>
        <t>Status of BGP Session, both as connection status and approval status (Established, Pending, Approved, Rejected, Down, Unestablished, etc)</t>
        <t>Session Array</t>
        <t>Array of potential BGP sessions, with request UUID.
  Request UUID is optional for client, and required for server.
  Return URL is optional, and indicates the client's Peering API endpoint.
  The client's return URL is used by the server to request additional sessions.
  Client may provide initial UUID for client-side tracking, but the server UUID will be the final definitive ID.
  RequestID will not change across the request.</t>
        <t>BGP Session</t>
        <t>A structure that describes a BGP session and contains the following elements:</t>
        <ul spacing="normal">
          <li>
            <t>local_asn (ASN of requestor)</t>
          </li>
          <li>
            <t>local_ip (IP of requestor, v4 or v6)</t>
          </li>
          <li>
            <t>peer_asn (server ASN)</t>
          </li>
          <li>
            <t>peer_ip (server-side IP)</t>
          </li>
          <li>
            <t>peer_type (public or private)</t>
          </li>
          <li>
            <t>md5 (optional, as defined above)</t>
          </li>
          <li>
            <t>location (Peering Location, as defined above)</t>
          </li>
          <li>
            <t>status (Session Status, as defined above)</t>
          </li>
          <li>
            <t>session_id (of individual session and generated by the server)</t>
          </li>
        </ul>
        <t>Error</t>
        <t>API Errors, for field validation errors in requests, and request-level errors.</t>
        <t>The above is sourced largely from the linked OpenAPI specification.</t>
      </section>
      <section anchor="endpoints">
        <name>Endpoints</name>
        <t>(As defined in <xref target="autopeer"/>).
On each call, there should be rate limits, allowed senders, and other optional restrictions.</t>
        <section anchor="public_peering_ix">
          <name>Public Peering over an Internet Exchange (IX)</name>
          <ul spacing="normal">
            <li>
              <t><tt>/sessions</tt>: ADD/RETRIEVE sessions visible to the calling PEER
              </t>
              <ul spacing="normal">
                <li>
                  <t>Batch create new session resources
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Establish new BGP sessions between peers, at the desired exchange.</t>
                    </li>
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>POST /sessions</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request body: Session Array</t>
                        </li>
                        <li>
                          <t>Responses:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>200 OK:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: Session Array (all sessions in request accepted for configuration). Should not all the sessions be accepted, the response also contains a list of sessions and the respective errors.</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>422:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Please contact us, human intervention required</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>List all session resources. The response is paginated.
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Given a request ID, query for the status of that request.</t>
                    </li>
                    <li>
                      <t>Given an ASN without request ID, query for status of all connections between client and server.</t>
                    </li>
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>GET /sessions</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request parameters:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>asn (requesting client's asn)</t>
                            </li>
                            <li>
                              <t>request_id (optional, UUID of request)</t>
                            </li>
                            <li>
                              <t>max_results (integer to indicate an upper bound for a given response page)</t>
                            </li>
                            <li>
                              <t>next_token (opaque and optional string received on a previous response page and which allows the server to produce the next page of results. Its absence indicates to the server that the first page is expected)</t>
                            </li>
                          </ul>
                        </li>
                        <li>
                          <t>Response:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>200: OK
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: Session Array of sessions in request_id, if provided. Else, all existing and in-progress sessions between client ASN and server.
                                  </t>
                                  <ul spacing="normal">
                                    <li>
                                      <t>next_token (opaque and optional string the server expects to be passed back on the request for the next page. Its absence indicates to the client that no more pages are available)</t>
                                    </li>
                                  </ul>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error (example: request_id is invalid)</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t><tt>/sessions/{session_id}</tt>: Operate on individual sessions
              </t>
              <ul spacing="normal">
                <li>
                  <t>Retrieve an existing session resource
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>GET /sessions/{session_id}</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request parameters:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>session_id returned by the server on creation or through the session list operation.</t>
                            </li>
                          </ul>
                        </li>
                        <li>
                          <t>Responses:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>200 OK:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: Session structure with current attributes</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error (example: session_id is invalid)</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>404:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>The session referred by the specified session_id does not exist or is not visible to the caller</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>Delete a session.
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Given a session ID, delete it which effectively triggers an depeering from the initiator.</t>
                    </li>
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>DELETE /sessions/{session_id}</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request parameters:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>session_id returned by the server on creation or through the session list operation.</t>
                            </li>
                          </ul>
                        </li>
                        <li>
                          <t>Response:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>204: OK
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: empty response as the session is processed and hard deleted</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error (example: session_id is invalid)</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>404:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>The session referred by the specified session_id does not exist or is not visible to the caller</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>422:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Please contact us, human intervention required</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="utility_api">
          <name>UTILITY API CALLS</name>
          <t>Endpoints which provide useful information for potential interconnections.</t>
          <ul spacing="normal">
            <li>
              <t><tt>/locations</tt>: LIST POTENTIAL PEERING LOCATIONS
              </t>
              <ul spacing="normal">
                <li>
                  <t>List potential peering locations, both public and private. The response is paginated.
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>GET /locations</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request parameters:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>asn (Server ASN, with which to list potential connections)</t>
                            </li>
                            <li>
                              <t>location_type (Optional: Peering Location)</t>
                            </li>
                            <li>
                              <t>max_results (integer to indicate an upper bound for a given response page)</t>
                            </li>
                            <li>
                              <t>next_token (opaque and optional string received on a previous response page and which allows the server to produce the next page of results. Its absence indicates to the server that the first page is expected)</t>
                            </li>
                          </ul>
                        </li>
                        <li>
                          <t>Response:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>200: OK
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: List of Peering Locations.
                                  </t>
                                  <ul spacing="normal">
                                    <li>
                                      <t>next_token (opaque and optional string the server expects to be passed back on the request for the next page. Its absence indicates to the client that no more pages are available)</t>
                                    </li>
                                  </ul>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="private-peering-draft">
          <name>Private Peering (DRAFT)</name>
          <ul spacing="normal">
            <li>
              <t>ADD/AUGMENT PNI</t>
            </li>
            <li>
              <t>Parameters:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Peer ASN</t>
                </li>
                <li>
                  <t>Facility</t>
                </li>
                <li>
                  <t>email address (contact)</t>
                </li>
                <li>
                  <t>Action type: add/augment</t>
                </li>
                <li>
                  <t>LAG struct:
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>IPv4</t>
                    </li>
                    <li>
                      <t>IPv6</t>
                    </li>
                    <li>
                      <t>Circuit ID</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>Who provides LOA? (and where to provide it).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Response:
              </t>
              <ul spacing="normal">
                <li>
                  <t>200:
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>LAG struct, with server data populated</t>
                    </li>
                    <li>
                      <t>LOA or way to receive it</t>
                    </li>
                    <li>
                      <t>Request ID</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>40x: rejections</t>
                </li>
              </ul>
            </li>
            <li>
              <t>REMOVE PNI
              </t>
              <ul spacing="normal">
                <li>
                  <t>As ADD/AUGMENT in parameters. Responses will include a requestID and status.</t>
                </li>
              </ul>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="session_negotiation">
      <name>Public Peering Session Negotiation</name>
      <t>As part of public peering configuration, this draft must consider how the client and server should handshake at which sessions to configure peering.
At first, a client will request sessions A, B, and C.
The server may choose to accept all sessions A, B, and C.
At this point, configuration proceeds as normal.
However, the server may choose to reject session B.
At that point, the server will reply back with A and C marked as "Accepted," and B as "Rejected."
The server will then configure A and C, and wait for the client to configure A and C.
If the client configured B as well, it will not come up.</t>
      <t>This draft encourages peers to set up garbage collection for unconfigured or down peering sessions, to remove stale configuration and maintain good router hygiene.</t>
      <t>Related to rejection, if the server would like to configure additional sessions with the client, the server may either reject all the session that do not meet the criteria caused by such absence in the client's request or approve the client's request and issue a separate request to the client's server requesting those additional peering sessions D and E.
The server will configure D and E on their side, and D and E will become part of the sessions requested in the UUID.
The client may choose whether or not to accept those additional sessions.
If they do, the client should configure D and E as well.
If they do not, the client will not configure D and E, and the server should garbage-collect those pending sessions.</t>
      <t>As part of the IETF discussion, the authors would like to discuss how to coordinate which side unfilters first.
Perhaps this information could be conveyed over a preferences vector.</t>
    </section>
    <section anchor="private_peering">
      <name>Private Peering</name>
      <t>Through future discussion with the IETF, the specification for private peering will be solidified.
Of interest for discussion includes Letter of Authorization (LOA) negotiation, and how to coordinate unfiltering and configuration checks.</t>
    </section>
    <section anchor="maintenance">
      <name>Maintenance</name>
      <t>This draft does not want to invent a new ticketing system.
However, there is an opportunity in this API to provide maintenance notifications to peering partners.
If there is interest, this draft would extend to propose a maintenance endpoint, where the server could broadcast upcoming and current maintenance windows.</t>
      <t>A maintenance message would follow a format like:</t>
      <ul spacing="normal">
        <li>
          <t>Title: string</t>
        </li>
        <li>
          <t>Start Date: date maintenance start(s/ed): UTC</t>
        </li>
        <li>
          <t>End Date: date maintenance ends: UTC</t>
        </li>
        <li>
          <t>Area: string or enum</t>
        </li>
        <li>
          <t>Details: freeform string</t>
        </li>
      </ul>
      <t>The "Area" field could be a freeform string, or could be a parseable ENUM, like (BGP, PublicPeering, PrivatePeering, Configuration, Caching, DNS, etc).</t>
      <t>Past maintenances will not be advertised.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This document describes a mechanism to standardize the discovery, creation and maintenance of peering relationships across autonomous systems (AS) using an out-of-band application programming interface (API). With it, AS operators take a step to operationalize their peering policy with new and existing peers in ways that improve or completely replace manual business validations, ultimately leading to the automation of the interconnection. However, this improvement can only be fully materialized when operators are certain that such API follows the operational trust and threat models they are comfortable with, some of which are documented in BGP operations and security best practices (<xref target="RFC7454"/>). To that extent, this document assumes the peering API will be deployed following a strategy of defense in-depth and proposes the following common baseline threat model below.</t>
      <section anchor="threats">
        <name>Threats</name>
        <t>Each of the following threats assume a scenario where an arbitrary actor is capable of reaching the peering API instance of a given operator, the client and the operator follow their own endpoint security and maintenance practices, and the trust anchors in use are already established following guidelines outside of the scope of this document.</t>
        <ul spacing="normal">
          <li>
            <t>T1: A malicious actor with physical access to the IX fabric and peering API of the receiver can use ASN or IP address information to impersonate a different IX member to discover, create, update or delete peering information which leads to loss of authenticity, confidentiality, and authorization of the spoofed IX member.</t>
          </li>
          <li>
            <t>T2: A malicious actor with physical access to the IX fabric can expose a peering API for an IX member different of its own to accept requests on behalf of such third party and supplant it, leading to a loss of authenticity, integrity, non-repudiability, and confidentiality between IX members.</t>
          </li>
          <li>
            <t>T3: A malicious actor without physical access to the IX fabric but with access the the peering API can use any ASN to impersonate any autonomous system and overload the receiver's peering API internal validations leading to a denial of service.</t>
          </li>
        </ul>
        <section anchor="mitigations">
          <name>Mitigations</name>
          <t>The following list of mitigations address different parts of the threats identified above:</t>
          <ul spacing="normal">
            <li>
              <t>M1: Authorization controls - A initiator using a client application is authorized using the claims presented in the request prior to any interaction with the peering API (addresses T1, T2).</t>
            </li>
            <li>
              <t>M2: Proof of holdership - The initiator of a request through a client can prove their holdership of an Internet Number Resource (addresses T1, T3).</t>
            </li>
            <li>
              <t>M3: Request integrity and proof of possession - The peering API can verify HTTP requests signed with a key that is cryptographically bound to the authorized initiator (addresses T1, T2).</t>
            </li>
          </ul>
          <t>The Peering API does not enforce any kind of peering policy on the incoming requests. It is left to the peering API instance implementation to enforce the AS-specific peering policy. This document encourages each peer to consider the needs of their peering policy and implement request validation as desired.</t>
        </section>
      </section>
      <section anchor="authorization">
        <name>Authorization controls</name>
        <t>The peering API instance receives HTTP requests from a client application from a peering initiator. Those requests can be authorized using the authorization model based on OAuth 2.0 (<xref target="RFC6749"/>) with the OpenID Connect <xref target="oidc"/> core attribute set. The choice of OpenID Connect is to use a standardized and widely adopted authorization exchange format based on JSON Web Tokens (<xref target="RFC7519"/>) which allows interoperation with existing web-based application flows. JWT tokens also supply sufficient claims to implement receiver-side authorization decisions by third parties when used as bearer access tokens (<xref target="RFC9068"/>). The peering API instance (a resource server in OAuth2 terms) should follow the bearer token usage (<xref target="RFC6750"/>) which describes the format and validation of an access token obtained from the Oauth 2.0 Authorization Server. The resource server should follow the best practices for JWT access validation (<xref target="RFC8725"/>) and in particular verify that the access token is constrained to the resource server via the audience claim. Upon successful access token validation, the resource server should decide whether to proceed with the request based on the presence of expected and matching claims in the access token or reject it altogether. The core identity and authorization claims present in the access token may be augmented with specific claims vended by the Authorization Service. This document proposes to use PeeringDB's access token claims as a baseline to use for authorization, however the specific matching of those claims to an authorization business decision is specific to each operator and outside of this specification. Resource servers may also use the claims in the access token to present the callers' identity to the application and for auditing purposes.</t>
      </section>
      <section anchor="resource-holdership">
        <name>Proof of holdership</name>
        <t>The peering API defined in this document uses ASNs as primary identifiers to identify each party on a peering session besides other resources such as IP addresses. ASNs are explicitly expected in some API payloads but are also implicitly expected when making authorization business decisions such as listing resources that belong to an operator. Given that ASNs are Internet Number Resources assigned by RIRs and that the OAuth2 Authorization Server in use may not be operated by any of those RIRs, as it is the case of PeeringDB or any other commercial OAuth2 service, JWT claims that contain an ASN need be proved to be legitimately used by the initiator. This document proposes to attest ASN resource holdership using a mechanism based on RPKI (<xref target="RFC6480"/>) and in particular with the use of RPKI Signed Checklists (RSCs) (<xref target="RFC9323"/>).</t>
        <t>JWT access tokens can be of two kinds, identifier-based tokens or self-contained tokens (<xref section="1.4" sectionFormat="of" target="RFC6749"/>). Resource servers must validate them for every request. AS operators can hint other operators to validate whether a caller holds ownership of the ASN their request represent by issuing a signed checklist that is specific to the different validation methods as described below.</t>
        <t>For Identifier-based access tokens, if the Authorization Server supports metadata, ASN holders must create a signed checklist that contains the well-known Authorization Server Metadata URI and a digest of the JSON document contained (Section 3 of <xref target="RFC8414"/>). If the authorization server does not support metadata, the signed checklist contains the token introspection URI and its digest.</t>
        <t>Self-contained access tokens are cryptographically signed by the token issuer using a JSON Web Signature (JWS) (<xref target="RFC7515"/>). The cryptographic keys used for signature validation is exposed as a JSON Web Key (JWK) (<xref target="RFC7517"/>). ASN holders must create a signed checklist for the "jwks_uri" field of the Authorization Server Metadata URI and a digest of the JSON document contained (<xref section="3.2" sectionFormat="of" target="RFC8414"/>).</t>
        <t>Resource servers must validate the JWT access token in the following manner:</t>
        <ul spacing="normal">
          <li>
            <t>If the access token is identifier-based, the resource server must resolve what introspection endpoint to use for the given access token, that is, either resolved through the Authorization Server Metadata URI (<xref section="3" sectionFormat="of" target="RFC8414"/>) or pre-configured upon registration in the absence of metadata support.
            </t>
            <ul spacing="normal">
              <li>
                <t>The resource server must verify the metadata URI and its content with a signed checklist issued by the ASN contained in the access token claims.</t>
              </li>
              <li>
                <t>If the Authorization Server does not support metadata, the resource server must validate the introspection endpoint URI matches exactly the URI contained in a signed checklist issued by the ASN contained in the access token claims.</t>
              </li>
              <li>
                <t>Upon successful signed checklist validation, resource servers must use the introspection endpoint for regular access token validation process (<xref target="RFC7662"/>).</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the access token is self-contained, the resource server must follow the regular validation process for signed access tokens (<xref section="5.2" sectionFormat="of" target="RFC7515"/>).
            </t>
            <ul spacing="normal">
              <li>
                <t>After discovering the valid public keys used to sign the token, the resource server must validate that the JWKS URI where the public keys have been discovered, and the content of such JSON document referred by it, match the signed checklist issued by the ASN contained in the access token claims.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Resource servers must reject the request if any of these validations fail.</t>
          </li>
        </ul>
      </section>
      <section anchor="integrity-and-possession">
        <name>Request integrity and proof of possession</name>
        <t>The API described in this document follows REST (<xref target="rest"/>) principles over an HTTP channel to model the transfer of requests and responses between peers. Implementations of this API should use the best common practices for the API transport (<xref target="RFC9325"/>) such as TLS. However, even in the presence of a TLS channel with OAuth2 bearer tokens alone, neither the client application nor the API can guarantee the end-to-end integrity of the message request or the authenticity of its content. One mechanism to add cryptographic integrity and authenticity validation can be the use a mutual authentication scheme to negotiate the parameters of the TLS channel. This requires the use of a web PKI (<xref target="RFC5280"/>) to carry claims for use in authorization controls, to bind such PKI to ASNs for proof of holdership, and the use of client certificates on the application.</t>
        <t>Instead, this document proposes to address the message integrity property by cryptographically signing the parameters of the request with a key pair that creates a HTTP message signature to be included in the request (<xref target="RFC9421"/>). The client application controls the lifecycle of this key pair. The authenticity property of the messages signed with such key pair is addressed by binding the public key of the pair to the JWT access token in one of its claims of the access token using a mechanism that demonstrates proof of possession of the private key <xref target="RFC9449"/>. With these two mechanisms, the resource server should authenticate, authorize, and validate the integrity of the request using a JWT access token that can rightfully claim to represent a given ASN.</t>
      </section>
    </section>
    <section anchor="extensions">
      <name>Possible Extensions</name>
      <t>The authors acknowledge that route-server configuration may also be of interest for this proposed API, and look forward to future discussions in this area.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="autopeer" target="https://github.com/bgp/autopeer/">
          <front>
            <title>Github repository with the API specification and diagrams</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="oidc" target="https://openid.net/specs/openid-connect-core-1_0.html">
          <front>
            <title>OpenID.Core</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="rest" target="http://roy.gbiv.com/pubs/dissertation/top.htm">
          <front>
            <title>Architectural Styles and the Design of Network-based Software Architectures</title>
            <author initials="R. T." surname="Fielding" fullname="Roy Thomas Fielding">
              <organization/>
            </author>
            <date year="2000"/>
          </front>
        </reference>
        <reference anchor="openapi" target="https://spec.openapis.org/oas/v3.1.0">
          <front>
            <title>OpenAPI-v3.1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC6750">
          <front>
            <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6750"/>
          <seriesInfo name="DOI" value="10.17487/RFC6750"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC9068">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens</title>
            <author fullname="V. Bertocci" initials="V." surname="Bertocci"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>This specification defines a profile for issuing OAuth 2.0 access tokens in JSON Web Token (JWT) format. Authorization servers and resource servers from different vendors can leverage this profile to issue and consume access tokens in an interoperable manner.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9068"/>
          <seriesInfo name="DOI" value="10.17487/RFC9068"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC9323">
          <front>
            <title>A Profile for RPKI Signed Checklists (RSCs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="T. Harrison" initials="T." surname="Harrison"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of checksums (a 'checklist'). The objective is to allow for the creation of an attestation, termed an "RPKI Signed Checklist (RSC)", which contains one or more checksums of arbitrary digital objects (files) that are signed with a specific set of Internet Number Resources. When validated, an RSC confirms that the respective Internet resource holder produced the RSC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9323"/>
          <seriesInfo name="DOI" value="10.17487/RFC9323"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC9421">
          <front>
            <title>HTTP Message Signatures</title>
            <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <author fullname="M. Sporny" initials="M." surname="Sporny"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer and where the message may be transformed (e.g., by intermediaries) before reaching the verifier. This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9421"/>
          <seriesInfo name="DOI" value="10.17487/RFC9421"/>
        </reference>
        <reference anchor="RFC9449">
          <front>
            <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Waite" initials="D." surname="Waite"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9449"/>
          <seriesInfo name="DOI" value="10.17487/RFC9449"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC9092">
          <front>
            <title>Finding and Using Geofeed Data</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="M. Candela" initials="M." surname="Candela"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document specifies how to augment the Routing Policy Specification Language inetnum: class to refer specifically to geofeed data comma-separated values (CSV) files and describes an optional scheme that uses the Routing Public Key Infrastructure to authenticate the geofeed data CSV files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9092"/>
          <seriesInfo name="DOI" value="10.17487/RFC9092"/>
        </reference>
        <reference anchor="RFC3912">
          <front>
            <title>WHOIS Protocol Specification</title>
            <author fullname="L. Daigle" initials="L." surname="Daigle"/>
            <date month="September" year="2004"/>
            <abstract>
              <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3912"/>
          <seriesInfo name="DOI" value="10.17487/RFC3912"/>
        </reference>
        <reference anchor="RFC7454">
          <front>
            <title>BGP Operations and Security</title>
            <author fullname="J. Durand" initials="J." surname="Durand"/>
            <author fullname="I. Pepelnjak" initials="I." surname="Pepelnjak"/>
            <author fullname="G. Doering" initials="G." surname="Doering"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>The Border Gateway Protocol (BGP) is the protocol almost exclusively used in the Internet to exchange routing information between network domains. Due to this central nature, it is important to understand the security measures that can and should be deployed to prevent accidental or intentional routing disturbances.</t>
              <t>This document describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane filtering. It also describes measures to better control the flow of routing information, using prefix filtering and automation of prefix filters, max-prefix filtering, Autonomous System (AS) path filtering, route flap dampening, and BGP community scrubbing.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="194"/>
          <seriesInfo name="RFC" value="7454"/>
          <seriesInfo name="DOI" value="10.17487/RFC7454"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 649?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank their collaborators, who implemented API versions and provided valuable feedback on the design.</t>
      <ul spacing="normal">
        <li>
          <t>Ben Blaustein (Meta)</t>
        </li>
        <li>
          <t>Jakub Heichman (Meta)</t>
        </li>
        <li>
          <t>Stefan Pratter (20C)</t>
        </li>
        <li>
          <t>Ben Ryall (Meta)</t>
        </li>
        <li>
          <t>Erica Salvaneschi (Cloudflare)</t>
        </li>
        <li>
          <t>Job Snijders (Fastly)</t>
        </li>
        <li>
          <t>David Tuber (Cloudflare)</t>
        </li>
        <li>
          <t>Aaron Rose (Amazon)</t>
        </li>
        <li>
          <t>Prithvi Nath Manikonda (Amazon)</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
