<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ramseyer-grow-peering-api-06" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title>Peering API</title>
    <seriesInfo name="Internet-Draft" value="draft-ramseyer-grow-peering-api-06"/>
    <author fullname="Carlos Aguado">
      <organization>Amazon</organization>
      <address>
        <email>crlsa@amazon.com</email>
      </address>
    </author>
    <author fullname="Matt Griswold">
      <organization>FullCtl</organization>
      <address>
        <email>grizz@20c.com</email>
      </address>
    </author>
    <author fullname="Jenny Ramseyer">
      <organization>Meta</organization>
      <address>
        <email>ramseyer@meta.com</email>
      </address>
    </author>
    <author fullname="Arturo Servin">
      <organization>Google</organization>
      <address>
        <email>arturolev@google.com</email>
      </address>
    </author>
    <author fullname="Tom Strickx">
      <organization>Cloudflare</organization>
      <address>
        <email>tstrickx@cloudflare.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="04"/>
    <keyword>BGP</keyword>
    <keyword>peering</keyword>
    <keyword>configuration</keyword>
    <abstract>
      <?line 67?>

<t>We propose an API standard for BGP Peering, also known as interdomain interconnection through global Internet Routing.
This API offers a standard way to request public (settlement-free) peering, verify the status of a request or BGP session, and list potential connection locations.
The API is backed by PeeringDB OIDC, the industry standard for peering authentication.
We also propose future work to cover private peering, and alternative authentication methods.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bgp.github.io/draft-ietf-peering-api/draft-peering-api-ramseyer-protocol.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ramseyer-grow-peering-api/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bgp/draft-ietf-peering-api"/>.</t>
    </note>
  </front>
  <middle>
    <?line 74?>

<section anchor="problems">
      <name>Introduction</name>
      <t>The Peering API is a mechanism that allows networks to automate interdomain interconnection  between two Autonomous Systems (AS) through the Border Gateway Protocol 4 (<xref target="RFC4271"/>).
Using the API, networks will be able to automatically request and accept peering interconnections between Autonomous Systems in public or private scenarios in a time faster than it would take to configure sessions manually.
By speeding up the peering turn-up process and removing the need for manual involvement in peering, the API and automation will ensure that networks can get interconnected as fast, reliably, cost-effectively, and efficiently as possible.
As a result, this improves end-user performance for all applications using networks interconnection supporting the Peering API.</t>
      <section anchor="justification">
        <name>Business Justification</name>
        <t>By using the Peering API, entities requesting and accepting peering can significantly improve the process to turn up interconnections by:</t>
        <ul spacing="normal">
          <li>
            <t>Reducing in person-hours spent configuring peering</t>
          </li>
          <li>
            <t>Reducing configuration mistakes by reducing human interaction</t>
          </li>
          <li>
            <t>And by peering, reducing network latency through expansion of interconnection relationships</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions">
      <name>Conventions and Terminology</name>
      <t>All terms used in this document will be defined here:</t>
      <ul spacing="normal">
        <li>
          <t>Initiator: Network that wants to peer</t>
        </li>
        <li>
          <t>Receiver: Network that is receiving communications about peering</t>
        </li>
        <li>
          <t>Configured: peering session that is set up on one side</t>
        </li>
        <li>
          <t>Established: session is already defined as per BGP-4 specification  <xref section="8.2.2" sectionFormat="of" target="RFC4271"/></t>
        </li>
      </ul>
    </section>
    <section anchor="audience">
      <name>Audience</name>
      <t>The Peering API aims to simplify peering interconnection configuration.
To that end, the API can be called by either a human or some automation.
A network engineer can submit API requests through a client-side tool, and configure sessions by hand or through existing tooling.
Alternately, an automated service can request BGP sessions through some trigger or regularly scheduled request (for example, upon joining a new peering location, or through regular polling of potential peers).
That automated client can then configure the client sessions through its own tooling.
For ease of exchanging peering requests, the authors suggest peers to maintain both a client and a server for the API.
Toward the goal of streamlining peering configuration, the authors encourage peers to automate their network configuration wherever possible, but do not require full automation to use this API.</t>
    </section>
    <section anchor="protocol">
      <name>Protocol</name>
      <t>The Peering API follows the Representational State Transfer (<xref target="rest"/>) architecture where sessions, locations, and maintenance events are the resources the API represents and is modeled after the OpenAPI standard <xref target="openapi"/>.
Using the token bearer model (<xref target="RFC6750"/>), a client application can request to add or remove peering sessions, list potential interconnection locations, and query for upcoming maintenance events on behalf of the AS resource owner.</t>
      <section anchor="example-peering-request-negotiation">
        <name>Example Peering Request Negotiation</name>
        <t>Diagram of the Peering Request Process</t>
        <artwork><![CDATA[
+-------------------+                    +-------------------+
|     Step 1        |                    |     Step 2        |
|    Network 1      |------------------->|    Network 1      |
|  Identifies need  |                    |   Checks details  |
+-------------------+                    +-------------------+
                                                 |
                                                 v
+-------------------+                    +-------------------+
|      Step 4       |                    |      Step 3       |
|    Network 1      |<-------------------|    Network 1      |
|  gets approval    |                    |     Public or     |
|      token        |                    | Private Peering   |
+-------------------+                    +-------------------+
        |
        v
+-------------------+                    +-------------------+
|      Step 5       |                    |      Step 6       |
|  Network 1 finds  |------------------->|    Network 1      |
| common locations  |                    |  request peering  |
+-------------------+                    +-------------------+
                                                  |
                                                  v
+-------------------+                   +--------------------+
|      Step 8       |                   |       Step 7       |
|     Network 2     |<------------------|     Network 2      |
| accepts or reject |                   |      verifies      |
|    sessions       |                   |     credentials    |
+-------------------+                   +--------------------+
       /     \
      /       \
     /         \
(yes)           (no)
      \          |
       \         +-------------------------------|
        \                                        |
         \                                       |
          v                                      |
+---------------+          +----------------+    |
|    Step 9     |          |    Step 10     |    |
| Sessions are  |          | Network 1 or 2 |    |
|  provisioned  |--------->| checks session |    |
|     status    |          | until it is up |    |
+---------------+          +----------------+    |
                                   |             |
                      +------------+             |
                      |                          |
                      v                          |
            +-------------+                      |
            |   Step 11   |                      |
            |   Request   |<---------------------+
            |  Terminate  |
            +-------------+







Step 1 [Human]: Network 1 identifies that it would be useful to peer with Network 2 to interchange traffic more optimally


Step 2 [Human]: Network 1 checks technical and other peering details about Network 2 to check if peering is possible


Step 3 [Human]: Network 1 decides in type (Public or PNI) of peering and facility


Step 4 [API]: Network 1 gets approval/token that is authorized to ‘speak’ on behalf of Network 1’s ASN.


Step 5 [API]: Network 1 checks PeeringDB for common places between Network 1 and Network 2.
API: GET /locations


Step 6 [API]: Network 1 request peering with Network 2
API:      POST /add_sessions


Step 7 [API]: Network 2 verifies Network 1 credentials, check requirements for peering


Step 8 [API]: Network 2 accepts or rejects session(s)
API Server gives yes/no for request


Step 9 [API]: If yes, sessions are provisioned, Networks 1 or Network 2 can check status
API: /sessions Get session status


Step 10 [API]: API keeps polling until sessions are up


Step 11 [API]: Process Terminate
]]></artwork>
      </section>
      <section anchor="example-api-flow">
        <name>Example API Flow</name>
        <t>The diagram below outlines the proposed API flow.</t>
        <artwork><![CDATA[
OIDC Authentication

+-----------+                 +-------+                    +-----------+
| Initiator |                 | Peer  |                    | PeeringDB |
+-----------+                 +-------+                    +-----------+
      |                           |                              |
      | OIDC Authentication       |                              |
      |--------------------------------------------------------->|
      |                           |                              |
      |                                        Provide auth code |
      |<---------------------------------------------------------|
      |                           |                              |
      | Send auth code to Peer    |                              |
      |--------------------------------------------------------->|
      |                           |                              |
      |                           | Exchange auth code for token |
      |                           |----------------------------->|
      |                           |                              |
      |                           |                 Return token |
      |                           |<-----------------------------|
      |                           |
      | Peer determines permissions based on token
      |                           |
      | Send OK back to Initiator |
      |<--------------------------|

Operations, loop until peering is complete.

List Locations

+-----------+                                                  +-------+
| Initiator |                                                  | Peer  |
+-----------+                                                  +-------+
      |                                                            |
      | QUERY peering locations (peer type, ASN, auth code)        |
      |----------------------------------------------------------->|
      |                                                            |
      |                               Reply with peering locations |
      |                            or errors (401, 406, 451, etc.) |
      |<-----------------------------------------------------------|


Request session status

+-----------+                                                  +-------+
| Initiator |                                                  | Peer  |
+-----------+                                                  +-------+
      |                                                            |
      | QUERY request status using request ID & auth code          |
      |----------------------------------------------------------->|
      |                                                            |
      |                                  Reply with session status |
      |                                      (200, 404, 202, etc.) |
      |<-----------------------------------------------------------|
]]></artwork>
      </section>
      <section anchor="auth">
        <name>AUTH</name>
        <t>First, the initiating OAuth2 Client is also the Resource Owner (RO) so it can follow the OAuth2 client credentials grant <xref section="4.4" sectionFormat="of" target="RFC6749"/>.
In this example, the client will use PeeringDB OIDC credentials to acquire a JWT access token that is scoped for use with the receiving API.
On successful authentication, PeeringDB provides the Resource Server (RS) with the client's email (for potential manual discussion), along with the client's usage entitlements (known as OAuth2 scopes), to confirm the client is permitted to make API requests on behalf of the initiating AS.</t>
      </section>
      <section anchor="request">
        <name>REQUEST</name>
        <ol spacing="normal" type="1"><li>
            <t>ADD SESSION (CLIENT BATCHED REQUEST)</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>The initiator's client provides a set of the following information, where local always refers to the receiver and peer always refers to the initiator:
            </t>
            <ul spacing="normal">
              <li>
                <t>Structure:
                </t>
                <ol spacing="normal" type="1"><li>
                    <t>Local ASN</t>
                  </li>
                  <li>
                    <t>Local IP</t>
                  </li>
                  <li>
                    <t>Peer ASN</t>
                  </li>
                  <li>
                    <t>Peer IP</t>
                  </li>
                  <li>
                    <t>Local BGP Role according to <xref target="RFC9234"/></t>
                  </li>
                  <li>
                    <t>Peer BGP Role according to <xref target="RFC9234"/></t>
                  </li>
                  <li>
                    <t>Local insert ASN (optional to support route servers)</t>
                  </li>
                  <li>
                    <t>Peer insert ASN (optional to support route servers)</t>
                  </li>
                  <li>
                    <t>Local monitoring session (optional to support monitoring systems)</t>
                  </li>
                  <li>
                    <t>Peer monitoring session (optional to support monitoring systems)</t>
                  </li>
                  <li>
                    <t>Peer Type (public or private)</t>
                  </li>
                  <li>
                    <t>Session Secret (optional with encoding agreed outside of this specification)</t>
                  </li>
                  <li>
                    <t>Location (Commonly agreed identifier of the BGP speaker, e.g. PeeringDB IX lan ID)</t>
                  </li>
                </ol>
              </li>
            </ul>
          </li>
          <li>
            <t>The receiver's expected actions:
            </t>
            <ul spacing="normal">
              <li>
                <t>The server confirms requested clientASN in list of authorized ASNs.</t>
              </li>
              <li>
                <t>Optional: checks traffic levels, prefix limit counters, other desired internal checks.</t>
              </li>
            </ul>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>ADD SESSIONS (SERVER BATCHED RESPONSE)</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>APPROVAL CASE
            </t>
            <ul spacing="normal">
              <li>
                <t>Server returns a list with the structure for each of the acceptable peering sessions. Note: this structure may also contain additional attributes such as the server generated session ID.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>PARTIAL APPROVAL CASE
            </t>
            <ul spacing="normal">
              <li>
                <t>Server returns a list with the structure for each of the acceptable peering sessions as in the approval case. The server also returns a list of sessions that have not deemed as validated or acceptable to be created. The set of sessions accepted and rejected is disjoint and the join of both sets matches the cardinality of the requested sessions.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>REJECTION CASE
            </t>
            <ul spacing="normal">
              <li>
                <t>Server returns an error message which indicates that all of the sessions requested have been rejected and the reason for it.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="clientconfig">
        <name>CLIENT CONFIGURATION</name>
        <t>The client then configures the chosen peering sessions asynchronously using their internal mechanisms.
The client SHOULD pull and use additional information on the new peering from public sources as required to ensure routing security, e.g., AS-SETs to configure appropriate filters.
For every session that the server rejected, the client removes that session from the list to be configured.</t>
      </section>
      <section anchor="serverconfig">
        <name>SERVER CONFIGURATION</name>
        <t>The server configures all sessions that are in its list of approved peering sessions from its reply to the client.
The server SHOULD pull and use additional information on the new peering from public sources to ensure routing security, e.g., AS-SETs to configure appropriate filters.</t>
      </section>
      <section anchor="monitoring">
        <name>MONITORING</name>
        <t>Both client and server wait for sessions to establish.
At any point, client may send a "GET STATUS" request to the server, to request the status of the session (by session ID).
The client will send a structure along with the request, as follows:</t>
        <ul spacing="normal">
          <li>
            <t>structure (where local refers to the server and peer refers to the client):
            </t>
            <ul spacing="normal">
              <li>
                <t>Session ID</t>
              </li>
              <li>
                <t>Local ASN</t>
              </li>
              <li>
                <t>Local IP</t>
              </li>
              <li>
                <t>Peer ASN</t>
              </li>
              <li>
                <t>Peer IP</t>
              </li>
              <li>
                <t>Local BGP Role (<xref target="RFC9234"/>)</t>
              </li>
              <li>
                <t>Peer BGP Role (<xref target="RFC9234"/>)</t>
              </li>
              <li>
                <t>Local insert ASN (optional, as defined above)</t>
              </li>
              <li>
                <t>Peer insert ASN (optional, as defined above)</t>
              </li>
              <li>
                <t>Local monitoring session (optional, as defined above)</t>
              </li>
              <li>
                <t>Peer monitoring session (optional, as defined above)</t>
              </li>
              <li>
                <t>Peer Type</t>
              </li>
              <li>
                <t>Session secret (optional, as defined above)</t>
              </li>
              <li>
                <t>Location</t>
              </li>
              <li>
                <t>Status</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The server then responds with the same structure, with the information that it understands (status, etc).</t>
      </section>
      <section anchor="completion">
        <name>COMPLETION</name>
        <t>If both sides report that the session is established, then peering is complete.
If one side does not configure sessions within the server's acceptable configuration window (TimeWindow), then the server is entitled to remove the configured sessions and report "Unestablished" to the client.</t>
      </section>
    </section>
    <section anchor="endpoints_and_specs">
      <name>API Endpoints and Specifications</name>
      <t>Each peer needs a public API endpoint that will implement the API protocol.
This API should be publicly listed in peeringDB and also as a potential expansion of <xref target="RFC9092"/> which could provide endpoint integration to WHOIS (<xref target="RFC3912"/>).
Each API endpoint should be fuzz-tested and protected against abuse.  Attackers should not be able to access internal systems using the API.
Every single request should come in with a unique GUID called RequestID that maps to a peering request for later reference.
This GUID format should be standardized across all requests.
This GUID should be provided by the receiver once it receives the request and must be embedded in all communication.
If there is no RequestID present then that should be interpreted as a new request and the process starts again.
An email address is needed for communication if the API fails or is not implemented properly (can be obtained through PeeringDB).</t>
      <t>For a programmatic specification of the API, please see the public Github (<xref target="autopeer"/>).</t>
      <t>This initial draft fully specifies the Public Peering endpoints.
Private Peering and Maintenance are under discussion, and the authors invite collaboration and discussion from interested parties.</t>
      <section anchor="datatypes">
        <name>DATA TYPES</name>
        <t>Please see specification (<xref target="autopeer"/>) for OpenAPI format.</t>
        <t>Peering Location</t>
        <t>Contains string field listing the desired peering location in format <tt>pdb:ix:$IX_ID</tt>, and an enum specifying peering type (public or private).</t>
        <t>Session Status</t>
        <t>Status of BGP Session, both as connection status and approval status (Established, Pending, Approved, Rejected, Down, Unestablished, etc)</t>
        <t>Session Array</t>
        <t>Array of potential BGP sessions, with request UUID.
  Request UUID is optional for client, and required for server.
  Return URL is optional, and indicates the client's Peering API endpoint.
  The client's return URL is used by the server to request additional sessions.
  Client may provide initial UUID for client-side tracking, but the server UUID will be the final definitive ID.
  RequestID will not change across the request.</t>
        <t>BGP Session</t>
        <t>A structure that describes a BGP session and contains the following elements:</t>
        <ul spacing="normal">
          <li>
            <t>local_asn (ASN of requestor)</t>
          </li>
          <li>
            <t>local_ip (IP of requestor, v4 or v6)</t>
          </li>
          <li>
            <t>peer_asn (server ASN)</t>
          </li>
          <li>
            <t>peer_ip (server-side IP)</t>
          </li>
          <li>
            <t>local_bgp_role (BGP role according to <xref target="RFC9234"/>)</t>
          </li>
          <li>
            <t>peer_bgp_role (BGP role according to <xref target="RFC9234"/>)</t>
          </li>
          <li>
            <t>local_insert_asn (optional, to support route servers, defaults to true)</t>
          </li>
          <li>
            <t>peer_insert_asn (optional, to support route servers, defaults to true)</t>
          </li>
          <li>
            <t>local_monitoring_session (optional, to support monitoring systems, defaults to false)</t>
          </li>
          <li>
            <t>peer_monitoring_session (optional, to support monitoring systems, defaults to false)</t>
          </li>
          <li>
            <t>peer_type (public or private)</t>
          </li>
          <li>
            <t>session_secret (optional, as defined above)</t>
          </li>
          <li>
            <t>location (Peering Location, as defined above)</t>
          </li>
          <li>
            <t>status (Session Status, as defined above)</t>
          </li>
          <li>
            <t>session_id (of individual session and generated by the server)</t>
          </li>
        </ul>
        <t>As not all elements are reflected in the <xref target="autopeer"/> OpenAPI definition to date, we define the missing fields here to be reflected in <xref target="autopeer"/> in the future.</t>
        <ul spacing="normal">
          <li>
            <t>local_bgp_role and peer_bgp_role: these field describe the BGP roles of the local and peer side of the session according to <xref target="RFC9234"/> represented by an integer. The roles for both sides MUST be set in a way that does not violate role correctness as defined in Section 4.2 of <xref target="RFC9234"/>.</t>
          </li>
          <li>
            <t>local_insert_asn and peer_insert_asn: these fields define whether the local or peer side will insert their ASN into the AS path attribute of forwarded BGP routes. They are mostly relevant to route servers. The fields are boolean and optional. If not provided, they default to true.</t>
          </li>
          <li>
            <t>local_monitoring_session and peer_monitoring_session: these fields define whether the local or peer side of the session will forward routes to other ASes or not. As the role of monitoring systems is not defined in <xref target="RFC9234"/>, we add this role via a boolean, optional flag. If not provided, they default to false. local_monitoring_session and peer_monitoring_sessions MUST NOT be true at the same time for the same session to avoid a role mismatch.</t>
          </li>
        </ul>
        <t>Error</t>
        <t>API Errors, for field validation errors in requests, and request-level errors.</t>
        <t>The above is sourced largely from the linked OpenAPI specification.</t>
      </section>
      <section anchor="endpoints">
        <name>Endpoints</name>
        <t>(As defined in <xref target="autopeer"/>).
On each call, there should be rate limits, allowed senders, and other optional restrictions.</t>
        <section anchor="public_peering_ix">
          <name>Public Peering over an Internet Exchange (IX)</name>
          <ul spacing="normal">
            <li>
              <t><tt>/sessions</tt>: ADD/RETRIEVE sessions visible to the calling PEER
              </t>
              <ul spacing="normal">
                <li>
                  <t>Batch create new session resources
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Establish new BGP sessions between peers, at the desired exchange.</t>
                    </li>
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>POST /sessions</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request body: Session Array</t>
                        </li>
                        <li>
                          <t>Responses:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>200 OK:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: Session Array (all sessions in request accepted for configuration). Should not all the sessions be accepted, the response also contains a list of sessions and the respective errors.</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>422:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Please contact us, human intervention required</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>List all session resources. The response is paginated.
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Given a request ID, query for the status of that request.</t>
                    </li>
                    <li>
                      <t>Given an ASN without request ID, query for status of all connections between client and server.</t>
                    </li>
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>GET /sessions</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request parameters:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>asn (requesting client's asn)</t>
                            </li>
                            <li>
                              <t>request_id (optional, UUID of request)</t>
                            </li>
                            <li>
                              <t>max_results (integer to indicate an upper bound for a given response page)</t>
                            </li>
                            <li>
                              <t>next_token (opaque and optional string received on a previous response page and which allows the server to produce the next page of results. Its absence indicates to the server that the first page is expected)</t>
                            </li>
                          </ul>
                        </li>
                        <li>
                          <t>Response:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>200: OK
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: Session Array of sessions in request_id, if provided. Else, all existing and in-progress sessions between client ASN and server.
                                  </t>
                                  <ul spacing="normal">
                                    <li>
                                      <t>next_token (opaque and optional string the server expects to be passed back on the request for the next page. Its absence indicates to the client that no more pages are available)</t>
                                    </li>
                                  </ul>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error (example: request_id is invalid)</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t><tt>/sessions/{session_id}</tt>: Operate on individual sessions
              </t>
              <ul spacing="normal">
                <li>
                  <t>Retrieve an existing session resource
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>GET /sessions/{session_id}</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request parameters:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>session_id returned by the server on creation or through the session list operation.</t>
                            </li>
                          </ul>
                        </li>
                        <li>
                          <t>Responses:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>200 OK:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: Session structure with current attributes</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error (example: session_id is invalid)</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>404:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>The session referred by the specified session_id does not exist or is not visible to the caller</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>Delete a session.
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Given a session ID, delete it which effectively triggers an depeering from the initiator.</t>
                    </li>
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>DELETE /sessions/{session_id}</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request parameters:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>session_id returned by the server on creation or through the session list operation.</t>
                            </li>
                          </ul>
                        </li>
                        <li>
                          <t>Response:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>204: OK
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: empty response as the session is processed and hard deleted</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error (example: session_id is invalid)</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>404:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>The session referred by the specified session_id does not exist or is not visible to the caller</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>422:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Please contact us, human intervention required</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="utility_api">
          <name>UTILITY API CALLS</name>
          <t>Endpoints which provide useful information for potential interconnections.</t>
          <ul spacing="normal">
            <li>
              <t><tt>/locations</tt>: LIST POTENTIAL PEERING LOCATIONS
              </t>
              <ul spacing="normal">
                <li>
                  <t>List potential peering locations, both public and private. The response is paginated.
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>Below is based on OpenAPI specification: <xref target="autopeer"/>.</t>
                    </li>
                    <li>
                      <t><tt>GET /locations</tt>
                      </t>
                      <ul spacing="normal">
                        <li>
                          <t>Request parameters:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>asn (Server ASN, with which to list potential connections)</t>
                            </li>
                            <li>
                              <t>location_type (Optional: Peering Location)</t>
                            </li>
                            <li>
                              <t>max_results (integer to indicate an upper bound for a given response page)</t>
                            </li>
                            <li>
                              <t>next_token (opaque and optional string received on a previous response page and which allows the server to produce the next page of results. Its absence indicates to the server that the first page is expected)</t>
                            </li>
                          </ul>
                        </li>
                        <li>
                          <t>Response:
                          </t>
                          <ul spacing="normal">
                            <li>
                              <t>200: OK
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Contents: List of Peering Locations.
                                  </t>
                                  <ul spacing="normal">
                                    <li>
                                      <t>next_token (opaque and optional string the server expects to be passed back on the request for the next page. Its absence indicates to the client that no more pages are available)</t>
                                    </li>
                                  </ul>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>400:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Error</t>
                                </li>
                              </ul>
                            </li>
                            <li>
                              <t>403:
                              </t>
                              <ul spacing="normal">
                                <li>
                                  <t>Unauthorized to perform the operation</t>
                                </li>
                              </ul>
                            </li>
                          </ul>
                        </li>
                      </ul>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="private-peering-draft">
          <name>Private Peering (DRAFT)</name>
          <ul spacing="normal">
            <li>
              <t>ADD/AUGMENT PNI</t>
            </li>
            <li>
              <t>Parameters:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Peer ASN</t>
                </li>
                <li>
                  <t>Facility</t>
                </li>
                <li>
                  <t>email address (contact)</t>
                </li>
                <li>
                  <t>Action type: add/augment</t>
                </li>
                <li>
                  <t>LAG struct:
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>IPv4</t>
                    </li>
                    <li>
                      <t>IPv6</t>
                    </li>
                    <li>
                      <t>Circuit ID</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>Who provides LOA? (and where to provide it).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Response:
              </t>
              <ul spacing="normal">
                <li>
                  <t>200:
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>LAG struct, with server data populated</t>
                    </li>
                    <li>
                      <t>LOA or way to receive it</t>
                    </li>
                    <li>
                      <t>Request ID</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>40x: rejections</t>
                </li>
              </ul>
            </li>
            <li>
              <t>REMOVE PNI
              </t>
              <ul spacing="normal">
                <li>
                  <t>As ADD/AUGMENT in parameters. Responses will include a requestID and status.</t>
                </li>
              </ul>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="session_negotiation">
      <name>Public Peering Session Negotiation</name>
      <t>As part of public peering configuration, this draft must consider how the client and server should handshake at which sessions to configure peering.
At first, a client will request sessions A, B, and C.
The server may choose to accept all sessions A, B, and C.
At this point, configuration proceeds as normal.
However, the server may choose to reject session B.
At that point, the server will reply back with A and C marked as "Accepted," and B as "Rejected."
The server will then configure A and C, and wait for the client to configure A and C.
If the client configured B as well, it will not come up.</t>
      <t>This draft encourages peers to set up garbage collection for unconfigured or down peering sessions, to remove stale configuration and maintain good router hygiene.</t>
      <t>Related to rejection, if the server would like to configure additional sessions with the client, the server may either reject all the session that do not meet the criteria caused by such absence in the client's request or approve the client's request and issue a separate request to the client's server requesting those additional peering sessions D and E.
The server will configure D and E on their side, and D and E will become part of the sessions requested in the UUID.
The client may choose whether or not to accept those additional sessions.
If they do, the client should configure D and E as well.
If they do not, the client will not configure D and E, and the server should garbage-collect those pending sessions.</t>
      <t>As part of the IETF discussion, the authors would like to discuss how to coordinate which side unfilters first.
Perhaps this information could be conveyed over a preferences vector.</t>
    </section>
    <section anchor="private_peering">
      <name>Private Peering</name>
      <t>Through future discussion with the IETF, the specification for private peering will be solidified.
Of interest for discussion includes Letter of Authorization (LOA) negotiation, and how to coordinate unfiltering and configuration checks.</t>
    </section>
    <section anchor="maintenance">
      <name>Maintenance</name>
      <t>This draft does not want to invent a new ticketing system.
However, there is an opportunity in this API to provide maintenance notifications to peering partners.
If there is interest, this draft would extend to propose a maintenance endpoint, where the server could broadcast upcoming and current maintenance windows.</t>
      <t>A maintenance message would follow a format like:</t>
      <ul spacing="normal">
        <li>
          <t>Title: string</t>
        </li>
        <li>
          <t>Start Date: date maintenance start(s/ed): UTC</t>
        </li>
        <li>
          <t>End Date: date maintenance ends: UTC</t>
        </li>
        <li>
          <t>Area: string or enum</t>
        </li>
        <li>
          <t>Details: freeform string</t>
        </li>
      </ul>
      <t>The "Area" field could be a freeform string, or could be a parseable ENUM, like (BGP, PublicPeering, PrivatePeering, Configuration, Caching, DNS, etc).</t>
      <t>Past maintenances will not be advertised.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This document describes a mechanism to standardize the discovery, creation and maintenance of peering relationships across autonomous systems (AS) using an out-of-band application programming interface (API). With it, AS operators take a step to operationalize their peering policy with new and existing peers in ways that improve or completely replace manual business validations, ultimately leading to the automation of the interconnection. However, this improvement can only be fully materialized when operators are certain that such API follows the operational trust and threat models they are comfortable with, some of which are documented in BGP operations and security best practices (<xref target="RFC7454"/>). To that extent, this document assumes the peering API will be deployed following a strategy of defense in-depth and proposes the following common baseline threat model below.</t>
      <section anchor="threats">
        <name>Threats</name>
        <t>Each of the following threats assume a scenario where an arbitrary actor is capable of reaching the peering API instance of a given operator, the client and the operator follow their own endpoint security and maintenance practices, and the trust anchors in use are already established following guidelines outside of the scope of this document.</t>
        <ul spacing="normal">
          <li>
            <t>T1: A malicious actor with physical access to the IX fabric and peering API of the receiver can use ASN or IP address information to impersonate a different IX member to discover, create, update or delete peering information which leads to loss of authenticity, confidentiality, and authorization of the spoofed IX member.</t>
          </li>
          <li>
            <t>T2: A malicious actor with physical access to the IX fabric can expose a peering API for an IX member different of its own to accept requests on behalf of such third party and supplant it, leading to a loss of authenticity, integrity, non-repudiability, and confidentiality between IX members.</t>
          </li>
          <li>
            <t>T3: A malicious actor without physical access to the IX fabric but with access the the peering API can use any ASN to impersonate any autonomous system and overload the receiver's peering API internal validations leading to a denial of service.</t>
          </li>
        </ul>
        <section anchor="mitigations">
          <name>Mitigations</name>
          <t>The following list of mitigations address different parts of the threats identified above:</t>
          <ul spacing="normal">
            <li>
              <t>M1: Authorization controls - A initiator using a client application is authorized using the claims presented in the request prior to any interaction with the peering API (addresses T1, T2).</t>
            </li>
            <li>
              <t>M2: Proof of holdership - The initiator of a request through a client can prove their holdership of an Internet Number Resource (addresses T1, T3).</t>
            </li>
            <li>
              <t>M3: Request integrity and proof of possession - The peering API can verify HTTP requests signed with a key that is cryptographically bound to the authorized initiator (addresses T1, T2).</t>
            </li>
          </ul>
          <t>The Peering API does not enforce any kind of peering policy on the incoming requests. It is left to the peering API instance implementation to enforce the AS-specific peering policy. This document encourages each peer to consider the needs of their peering policy and implement request validation as desired.</t>
        </section>
      </section>
      <section anchor="authorization">
        <name>Authorization controls</name>
        <t>The peering API instance receives HTTP requests from a client application from a peering initiator. Those requests can be authorized using the authorization model based on OAuth 2.0 (<xref target="RFC6749"/>) with the OpenID Connect <xref target="oidc"/> core attribute set. The choice of OpenID Connect is to use a standardized and widely adopted authorization exchange format based on JSON Web Tokens (<xref target="RFC7519"/>) which allows interoperation with existing web-based application flows. JWT tokens also supply sufficient claims to implement receiver-side authorization decisions by third parties when used as bearer access tokens (<xref target="RFC9068"/>). The peering API instance (a resource server in OAuth2 terms) should follow the bearer token usage (<xref target="RFC6750"/>) which describes the format and validation of an access token obtained from the Oauth 2.0 Authorization Server. The resource server should follow the best practices for JWT access validation (<xref target="RFC8725"/>) and in particular verify that the access token is constrained to the resource server via the audience claim. Upon successful access token validation, the resource server should decide whether to proceed with the request based on the presence of expected and matching claims in the access token or reject it altogether. The core identity and authorization claims present in the access token may be augmented with specific claims vended by the Authorization Service. This document proposes to use PeeringDB's access token claims as a baseline to use for authorization, however the specific matching of those claims to an authorization business decision is specific to each operator and outside of this specification. Resource servers may also use the claims in the access token to present the callers' identity to the application and for auditing purposes.</t>
      </section>
      <section anchor="resource-holdership">
        <name>Proof of holdership</name>
        <t>The peering API defined in this document uses ASNs as primary identifiers to identify each party on a peering session besides other resources such as IP addresses. ASNs are explicitly expected in some API payloads but are also implicitly expected when making authorization business decisions such as listing resources that belong to an operator. Given that ASNs are Internet Number Resources assigned by RIRs and that the OAuth2 Authorization Server in use may not be operated by any of those RIRs, as it is the case of PeeringDB or any other commercial OAuth2 service, JWT claims that contain an ASN need be proved to be legitimately used by the initiator. This document proposes to attest ASN resource holdership using a mechanism based on RPKI (<xref target="RFC6480"/>) and in particular with the use of RPKI Signed Checklists (RSCs) (<xref target="RFC9323"/>).</t>
        <t>JWT access tokens can be of two kinds, identifier-based tokens or self-contained tokens (<xref section="1.4" sectionFormat="of" target="RFC6749"/>). Resource servers must validate them for every request. AS operators can hint other operators to validate whether a caller holds ownership of the ASN their request represent by issuing a signed checklist that is specific to the different validation methods as described below.</t>
        <t>For Identifier-based access tokens, if the Authorization Server supports metadata, ASN holders must create a signed checklist that contains the well-known Authorization Server Metadata URI and a digest of the JSON document contained (Section 3 of <xref target="RFC8414"/>). If the authorization server does not support metadata, the signed checklist contains the token introspection URI and its digest.</t>
        <t>Self-contained access tokens are cryptographically signed by the token issuer using a JSON Web Signature (JWS) (<xref target="RFC7515"/>). The cryptographic keys used for signature validation is exposed as a JSON Web Key (JWK) (<xref target="RFC7517"/>). ASN holders must create a signed checklist for the "jwks_uri" field of the Authorization Server Metadata URI and a digest of the JSON document contained (<xref section="3.2" sectionFormat="of" target="RFC8414"/>).</t>
        <t>Resource servers must validate the JWT access token in the following manner:</t>
        <ul spacing="normal">
          <li>
            <t>If the access token is identifier-based, the resource server must resolve what introspection endpoint to use for the given access token, that is, either resolved through the Authorization Server Metadata URI (<xref section="3" sectionFormat="of" target="RFC8414"/>) or pre-configured upon registration in the absence of metadata support.
            </t>
            <ul spacing="normal">
              <li>
                <t>The resource server must verify the metadata URI and its content with a signed checklist issued by the ASN contained in the access token claims.</t>
              </li>
              <li>
                <t>If the Authorization Server does not support metadata, the resource server must validate the introspection endpoint URI matches exactly the URI contained in a signed checklist issued by the ASN contained in the access token claims.</t>
              </li>
              <li>
                <t>Upon successful signed checklist validation, resource servers must use the introspection endpoint for regular access token validation process (<xref target="RFC7662"/>).</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the access token is self-contained, the resource server must follow the regular validation process for signed access tokens (<xref section="5.2" sectionFormat="of" target="RFC7515"/>).
            </t>
            <ul spacing="normal">
              <li>
                <t>After discovering the valid public keys used to sign the token, the resource server must validate that the JWKS URI where the public keys have been discovered, and the content of such JSON document referred by it, match the signed checklist issued by the ASN contained in the access token claims.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Resource servers must reject the request if any of these validations fail.</t>
          </li>
        </ul>
      </section>
      <section anchor="integrity-and-possession">
        <name>Request integrity and proof of possession</name>
        <t>The API described in this document follows REST (<xref target="rest"/>) principles over an HTTP channel to model the transfer of requests and responses between peers. Implementations of this API should use the best common practices for the API transport (<xref target="RFC9325"/>) such as TLS. However, even in the presence of a TLS channel with OAuth2 bearer tokens alone, neither the client application nor the API can guarantee the end-to-end integrity of the message request or the authenticity of its content. One mechanism to add cryptographic integrity and authenticity validation can be the use a mutual authentication scheme to negotiate the parameters of the TLS channel. This requires the use of a web PKI (<xref target="RFC5280"/>) to carry claims for use in authorization controls, to bind such PKI to ASNs for proof of holdership, and the use of client certificates on the application.</t>
        <t>Instead, this document proposes to address the message integrity property by cryptographically signing the parameters of the request with a key pair that creates a HTTP message signature to be included in the request (<xref target="RFC9421"/>). The client application controls the lifecycle of this key pair. The authenticity property of the messages signed with such key pair is addressed by binding the public key of the pair to the JWT access token in one of its claims of the access token using a mechanism that demonstrates proof of possession of the private key <xref target="RFC9449"/>. With these two mechanisms, the resource server should authenticate, authorize, and validate the integrity of the request using a JWT access token that can rightfully claim to represent a given ASN.</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="autopeer" target="https://github.com/bgp/autopeer/">
          <front>
            <title>Github repository with the API specification and diagrams</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="oidc" target="https://openid.net/specs/openid-connect-core-1_0.html">
          <front>
            <title>OpenID.Core</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="rest" target="http://roy.gbiv.com/pubs/dissertation/top.htm">
          <front>
            <title>Architectural Styles and the Design of Network-based Software Architectures</title>
            <author initials="R. T." surname="Fielding" fullname="Roy Thomas Fielding">
              <organization/>
            </author>
            <date year="2000"/>
          </front>
        </reference>
        <reference anchor="openapi" target="https://spec.openapis.org/oas/v3.1.0">
          <front>
            <title>OpenAPI-v3.1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC6750">
          <front>
            <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6750"/>
          <seriesInfo name="DOI" value="10.17487/RFC6750"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC9068">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens</title>
            <author fullname="V. Bertocci" initials="V." surname="Bertocci"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>This specification defines a profile for issuing OAuth 2.0 access tokens in JSON Web Token (JWT) format. Authorization servers and resource servers from different vendors can leverage this profile to issue and consume access tokens in an interoperable manner.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9068"/>
          <seriesInfo name="DOI" value="10.17487/RFC9068"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC9323">
          <front>
            <title>A Profile for RPKI Signed Checklists (RSCs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="T. Harrison" initials="T." surname="Harrison"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of checksums (a 'checklist'). The objective is to allow for the creation of an attestation, termed an "RPKI Signed Checklist (RSC)", which contains one or more checksums of arbitrary digital objects (files) that are signed with a specific set of Internet Number Resources. When validated, an RSC confirms that the respective Internet resource holder produced the RSC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9323"/>
          <seriesInfo name="DOI" value="10.17487/RFC9323"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC9421">
          <front>
            <title>HTTP Message Signatures</title>
            <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <author fullname="M. Sporny" initials="M." surname="Sporny"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer and where the message may be transformed (e.g., by intermediaries) before reaching the verifier. This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9421"/>
          <seriesInfo name="DOI" value="10.17487/RFC9421"/>
        </reference>
        <reference anchor="RFC9449">
          <front>
            <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Waite" initials="D." surname="Waite"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9449"/>
          <seriesInfo name="DOI" value="10.17487/RFC9449"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC9234">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="RFC9092">
          <front>
            <title>Finding and Using Geofeed Data</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="M. Candela" initials="M." surname="Candela"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document specifies how to augment the Routing Policy Specification Language inetnum: class to refer specifically to geofeed data comma-separated values (CSV) files and describes an optional scheme that uses the Routing Public Key Infrastructure to authenticate the geofeed data CSV files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9092"/>
          <seriesInfo name="DOI" value="10.17487/RFC9092"/>
        </reference>
        <reference anchor="RFC3912">
          <front>
            <title>WHOIS Protocol Specification</title>
            <author fullname="L. Daigle" initials="L." surname="Daigle"/>
            <date month="September" year="2004"/>
            <abstract>
              <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3912"/>
          <seriesInfo name="DOI" value="10.17487/RFC3912"/>
        </reference>
        <reference anchor="RFC7454">
          <front>
            <title>BGP Operations and Security</title>
            <author fullname="J. Durand" initials="J." surname="Durand"/>
            <author fullname="I. Pepelnjak" initials="I." surname="Pepelnjak"/>
            <author fullname="G. Doering" initials="G." surname="Doering"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>The Border Gateway Protocol (BGP) is the protocol almost exclusively used in the Internet to exchange routing information between network domains. Due to this central nature, it is important to understand the security measures that can and should be deployed to prevent accidental or intentional routing disturbances.</t>
              <t>This document describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane filtering. It also describes measures to better control the flow of routing information, using prefix filtering and automation of prefix filters, max-prefix filtering, Autonomous System (AS) path filtering, route flap dampening, and BGP community scrubbing.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="194"/>
          <seriesInfo name="RFC" value="7454"/>
          <seriesInfo name="DOI" value="10.17487/RFC7454"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 670?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank their collaborators, who implemented API versions and provided valuable feedback on the design.</t>
      <ul spacing="normal">
        <li>
          <t>Ben Blaustein (Meta)</t>
        </li>
        <li>
          <t>Jakub Heichman (Meta)</t>
        </li>
        <li>
          <t>Stefan Pratter (20C)</t>
        </li>
        <li>
          <t>Ben Ryall (Meta)</t>
        </li>
        <li>
          <t>Erica Salvaneschi (Cloudflare)</t>
        </li>
        <li>
          <t>Job Snijders (Fastly)</t>
        </li>
        <li>
          <t>David Tuber (Cloudflare)</t>
        </li>
        <li>
          <t>Aaron Rose (Amazon)</t>
        </li>
        <li>
          <t>Prithvi Nath Manikonda (Amazon)</t>
        </li>
        <li>
          <t>Matthias Wichtlhuber (DE-CIX)</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
