<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc strict="no"?>
<?rfc rfcedstyle="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="info" docName="draft-wang-grow-bmp-rpki-mon-reqs-00" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" symRefs="true" version="3">
  <front>
    <title abbrev="BMP-RPKI-MON-REQS"> Requirements for Monitoring RPKI-Related Processes on Routers Using BMP </title>
    <seriesInfo name="Internet-Draft" value="draft-wang-grow-bmp-rpki-mon-reqs-00"/>

    <author fullname="Shuhe Wang" initials="S." surname="Wang">
      <organization>Beijing Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street/>
          <street>Building 8, CourtYard 1, Zhongguancun East Road, Haidian District</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangsh@mail.zgclab.edu.cn</email>
      </address>
    </author>

    <author fullname="Mingwei Xu" initials="M." surname="Xu">
      <organization>Beijing Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street/>
          <street>Building 8, CourtYard 1, Zhongguancun East Road, Haidian District</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xmw@cernet.edu.cn</email>
      </address>
    </author>

    <author fullname="Yangyang Wang" initials="Y." surname="Wang">
      <organization>Beijing Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street/>
          <street>Building 8, CourtYard 1, Zhongguancun East Road, Haidian District</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wyy@cernet.edu.cn</email>
      </address>
    </author>

    <author fullname="Jia Zhang" initials="J." surname="Zhang">
      <organization>Beijing Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street/>
          <street>Building 8, CourtYard 1, Zhongguancun East Road, Haidian District</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangj@mail.zgclab.edu.cn</email>
      </address>
    </author>


    
    
    <date year="2025"/>
    <area>Routing Area</area>
    <workgroup>GROW</workgroup>
    <keyword>RPKI BMP RTR ROV ASPA</keyword>
    <abstract>
      <t>
        This document outlines requirements for extending the BGP Monitoring Protocol (BMP) to provide comprehensive monitoring of RPKI-related processes on routers, including data retrieval from RPKI caches, policy configuration, route validation, and the impact of validation on routing decisions. The proposed extensions aim to standardize RPKI monitoring within BMP, addressing scalability and interoperability limitations in existing implementations.
      </t>
    </abstract>
  </front>

  <middle>
    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t>
        The Resource Public Key Infrastructure (RPKI) enhances BGP security by enabling cryptographic validation of route origins <xref target="RFC6483" format="default"/> <xref target="RFC6811" format="default"/> and AS paths <xref target="I-D.ietf-sidrops-aspa-verification" format="default"/>. Despite growing adoption of RPKI, standard implementations of the BGP Monitoring Protocol (BMP) <xref target="RFC7854" format="default"/> do not natively support monitoring of RPKI-related data. This limitation hampers visibility into RPKI validation processes and their impact on network operations.
      </t>
      <t>
        While existing proposals aim to extend BMP for specific aspects of RPKI monitoring—such as reporting invalid routes <xref target="I-D.ietf-grow-bmp-path-marking-tlv" format="default"/> <xref target="I-D.ietf-grow-bmp-rel" format="default"/> or providing validation statistics <xref target="I-D.ietf-grow-bmp-bgp-rib-stats" format="default"/>—they fall short of offering comprehensive, end-to-end monitoring of the RPKI lifecycle on routers. This document defines requirements and extensions for BMP to monitor four key stages:
      </t>
      <ul spacing="normal">
        <li>Retrieval of RPKI data from caches;</li>
        <li>Configuration of RPKI policies;</li>
        <li>Validation of routes using RPKI;</li>
        <li>Impact of RPKI validation on routing decisions.</li>
      </ul>
    </section>

    <section numbered="true" toc="default">
      <name>Requirements Language</name>
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119" format="default"/>.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Requirements Overview</name>
      <t>
       The BMP extension for RPKI monitoring SHOULD:
      </t>
      <ul spacing="normal">
        <li>Monitor extensible RPKI data transport from caches to routers <xref target="RFC8210" format="default"/>;</li>
        <li>Enable real-time monitoring of the route validation process on the router <xref target="RFC6811" format="default"/>;</li>
        <li>Facilitate the correlation between RPKI validation states and BGP routing decisions;</li>
        <li>Scale efficiently across diverse validation types.</li>
      </ul>
      <t>
        Consequently, this document identifies four key stages in the RPKI lifecycle on routers which necessitate detailed monitoring and reporting:
      </t>

      <section numbered="true" toc="default">
        <name>RPKI Data Retrieval from Caches</name>
        <t>
    To ensure accurate and timely retrieval of RPKI data from caches, router operators require BMP to provide real-time, consistent monitoring capabilities. This enables rapid detection and response to faults or outages in cache connectivity. Accordingly, BMP SHOULD report the following information for each RPKI cache connection:
  </t>
  <ul spacing="normal">
    <li>The RTR protocol version (e.g., <xref target="RFC6810"/> or <xref target="RFC8210"/>) and connection parameters, such as the cache's IP address and port;</li>
    <li>The synchronization state (e.g., completed, in progress, or failed) and the freshness of retrieved data, indicated by the timestamp of the last successful synchronization;</li>
    <li>Error metrics, including counts of timeouts, failed synchronization attempts, and other connectivity issues.</li>
  </ul>
      </section>

      <section numbered="true" toc="default">
        <name>RPKI Policy Configuration</name>
        <t>Routing policies may change dynamically, necessitating real-time monitoring to ensure correct implementation of RPKI-based policies and prompt detection of misconfigurations. To achieve this, BMP SHOULD report the following details regarding RPKI policy configuration:</t>
<ul spacing="normal">
  <li>The enforcement status of RPKI validation mechanisms, such as ROV (<xref target="RFC6811"/>) and ASPA (<xref target="I-D.ietf-sidrops-aspa-verification"/>), and indicating whether they are applied globally or per-peer;</li>
  <li>The validation rules derived from RPKI data, such as Validated ROA Payloads (VRPs) or ASPA entries;</li>
  <li>The configured actions for routes in Valid, Invalid, and Not-Found validation states (e.g., accept, reject, or adjust preference).</li>
</ul>
      </section>

      <section numbered="true" toc="default">
        <name>Route Validation with RPKI</name>
        <t>
  Routers from different vendors implement RPKI-based route validation—including origin validation and path validation —with varying approaches. To facilitate accurate troubleshooting, verification against expected RPKI validation outcomes, and identification of implementation errors, BMP SHOULD report the following details:
</t>
<ul spacing="normal">
  <li>The validation state of each route (Valid, Invalid, or Not-Found), along with the specific reason for that state, such as a prefix length exceeding the ROA’s maxLength, an origin AS mismatch with the ROA, or an AS path violating ASPA customer-provider relationships;</li>
  <li>Statistical summaries of validation outcomes aggregated per peer, including counts of routes in each validation state.</li>
</ul>
      </section>

      <section numbered="true" toc="default">
        <name>Impact of RPKI Validation on Routing</name>
        <t>
  A router may implement numerous routing policies, resulting in complex routing behavior that obscures the influence of RPKI validation on decision-making. To provide visibility into this impact, including both intended outcomes and unintended side effects, BMP SHOULD report the following information regarding the effects of RPKI validation on routing decisions:
</t>
<ul spacing="normal">
  <li>Routes demoted or superseded as a result of RPKI validation, including their prefixes and updated selection status;</li>
  <li>Comparisons of the best paths selected with RPKI validation enabled versus those selected without it, highlighting changes in path preference or selection.</li>
</ul>
      </section>
    </section>

    <section numbered="true" toc="default">
      <name>RPKI Data Retrieval from Caches</name>
      <t>
        BMP SHOULD enumerate all RPKI caches connected to the router. For each cache connection, BMP SHOULD report the following fields:
      </t>
      <ul spacing="normal">
        <li>The cache's designation as primary or backup, including its priority in the selection order;</li>
        <li>The version of the RTR protocol in use (e.g., version 0 <xref target="RFC6810" format="default"/>, version 1 <xref target="RFC8210" format="default"/>, or custom versions);</li>
        <li>The type of TCP connection established (e.g., plain TCP, TLS, SSH);</li>
        <li>The IP address and port number of the cache;</li>
        <li>The total number of RPKI records received, including ROAs and ASPAs;</li>
        <li>The current status of the connection (e.g., active or idle);</li>
        <li>The timestamp of the most recent synchronization;</li>
        <li>Counters for errors and timeouts encountered;</li>
        <li>Any other relevant information.</li>
      </ul>
      <t>
        To convey this information, a new BMP message type **RPKI_CONNECTION_REPORT** (Type = TBD1) SHOULD be defined. This message SHALL use the standard BMP common header followed by Type-Length-Value (TLV) elements per <xref target="I-D.ietf-grow-bmp-tlv"/>. For routers connected to multiple caches, TLVs SHALL be grouped per RTR connection. Each group SHALL use a Group TLV to index Stateless parsing TLVs containing the above fields, thereby ensuring consistency and scalability.
      </t>

    </section>

    <section numbered="true" toc="default">
      <name>RPKI Policy Configuration</name>
      <t>
        BMP SHOULD report the RPKI policy configuration, which may be applied globally (uniformly across all peers) or on a per-peer basis. The reported information SHOULD include:
      </t>
      <ul spacing="normal">
        <li>The enablement status of RPKI validation;</li>
        <li>If enabled, the complete set of validation rules derived from RPKI data, such as VRPs or ASPA entries;</li>
        <li>If enabled, the configured actions for routes determined to be in Invalid or Not-Found states.</li>
      </ul>
      <t>
        To convey this information, a new BMP message type **RPKI_POLICY_REPORT** (Type = TBD2) SHOULD be defined. For global policy configurations, this message SHALL comprise the BMP common header followed by TLVs that specify the validation rules and the actions associated with each non-valid state (i.e., Invalid and Not-Found), such as filtering, priority reduction, tagging, or no action. For per-peer policy configurations, the message SHALL include an additional per-peer header, followed by TLVs that detail the RPKI policies specific to each peer. 
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Route Validation with RPKI</name>
      <t>
        BMP SHOULD be extended to report both statistical summaries of validation results on a per-peer basis and detailed validation information for each route. For each peer, BMP messages SHOULD include counts of received routes categorized by their RPKI validation states. Existing proposals, such as <xref target="I-D.ietf-grow-bmp-bgp-rib-stats" format="default"/>, recommend extending the BMP Statistics Report Message with new Stat Type codes to accommodate RPKI-related statistics.
      </t>
      <t>
        However, to improve clarity and emphasize RPKI-specific data, it is RECOMMENDED that a dedicated **RPKI Statistics Section** be introduced within the BMP Statistics Report Message. This section SHOULD comprise predefined Stat Type TLVs for:
      </t>
      <ul spacing="normal">
        <li>The number of routes in each validation state: Valid, Invalid, and Not-Found;</li>
        <li>Optional statistics, such as the number of routes filtered as a result of RPKI validation.</li>
      </ul>
      <t>
        This separation enhances readability and facilitates future extensions for additional RPKI-related statistics, such as those pertaining to ASPA or BGPsec.
      </t>
      <t>
        For any individual route, BMP SHOULD report the validation state along with the specific reasons that led to that state. For instance:
      </t>
      <ul spacing="normal">
        <li>For Invalid routes, the message SHOULD include the relevant ROA or ASPA entry that caused the invalidation, detailing reasons such as a mismatch in the origin AS, a prefix length exceeding the ROA's maxLength, or an AS path that violates ASPA rules;</li>
        <li>For Not-Found routes, the message SHOULD indicate the absence of a corresponding ROA or other factors resulting in this state.</li>
      </ul>
      <t>
        For per-route validation report, existing drafts propose extending BMP by:
      </t>
      <ul spacing="normal">
        <li>Incorporating additional path TLVs into the Route Monitoring Message for invalid routes <xref target="I-D.ietf-grow-bmp-path-marking-tlv" format="default"/>;</li>
        <li>Defining a new Route Event Message type <xref target="I-D.ietf-grow-bmp-rel" format="default"/>, where the emergence of invalid routes is treated as a distinct event.</li>
      </ul>
      <t>
        To provide comprehensive report of RPKI validation for all routes, it is RECOMMENDED that a dedicated Validation Report Message **RPKI_VALIDATION_REPORT** (Type = TBD3) be defined. This message SHOULD contain TLVs that specify:
      </t>
      <ul spacing="normal">
        <li>The route's validation state;</li>
        <li>The relevant ROA or other validation records (like ASPAs);</li>
        <li>The rationale behind the validation decision, such as a mismatch in origin AS, an invalid prefix length, or the absence of a valid ROA.</li>
      </ul>
    </section>

    <section numbered="true" toc="default">
      <name>Impact of RPKI Validation on Routing</name>
      <t>
        BMP SHOULD report the consequences of RPKI validation on route selection, with a particular focus on routes whose selection status is altered by RPKI validation:
      </t>
      <ul spacing="normal">
        <li>Routes that are demoted due to RPKI validation (i.e., routes that would have been selected as the best path without RPKI but are not selected when RPKI is enabled);</li>
        <li>Routes that are promoted due to RPKI validation (i.e., routes that would not have been selected as the best path without RPKI but are selected when RPKI is enabled).</li>
      </ul>
      <t>
        For each route affected by RPKI validation, the BMP extension SHOULD report:
      </t>
      <ul spacing="normal">
        <li>The validation information, as detailed in the Route Validation stage;</li>
        <li>The actions applied to the route following validation, such as degradation of preference, attribute tagging, or exclusion from the selection process.</li>
      </ul>
      <t>
        Furthermore, the BMP message MAY include information about the alternate best route:
      </t>
      <ul spacing="normal">
        <li>For routes demoted due to RPKI, the message MAY report the new best route selected with RPKI enabled;</li>
        <li>For routes promoted due to RPKI, the message MAY report the best route that would have been selected without RPKI.</li>
      </ul>
      <t>
        This facilitates a direct comparison of routing decisions with and without RPKI, thereby enhancing the understanding of RPKI's influence on BGP path selection.
      </t>
      <t>
        To enable per-route reporting of RPKI's impact on BGP routing, the BMP extension can utilize the event-driven messaging mode proposed in <xref target="I-D.ietf-grow-bmp-rel" format="default"/>. A new Reason code **RPKI_IMPACT** (TBD4) SHOULD be defined for the Route Event Message, to capture changes in route handling due to RPKI validation and policies. When a route's treatment is altered due to RPKI—such as being dropped, deprioritized, or superseded by another route—an RPKI-related event SHOULD be generated and conveyed via a Route Event Message. This message SHOULD include:
      </t>
      <ul spacing="normal">
        <li>The prefix and attributes of the affected route;</li>
        <li>The RPKI validation state of the affected route;</li>
        <li>Details of the RPKI validation, including the relevant ROA or ASPA;</li>
        <li>The policy action enforced on the route (e.g., drop, reduce priority, tag);</li>
        <li>Information regarding the new best route selected, including its prefix, attributes, and RPKI validation state.</li>
      </ul>
    </section>

    <section numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
        To ensure the integrity and authenticity of the transmitted RPKI data, BMP sessions MUST employ either TCP Authentication Option (TCP-AO) <xref target="RFC5925" format="default"/> or Transport Layer Security (TLS). Additionally, implementations SHOULD validate the integrity of RPKI data prior to processing to prevent the propagation of tampered or corrupted information.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
         This document requires IANA to assign values for new BMP message types (TBD1-TBD3), reason code (TBD4) and their associated TLVs. The registration procedures for these assignments SHALL follow the policy outlined in <xref target="RFC7854"/>.
      </t>
    </section>
  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>

        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>

        <reference anchor="RFC5925" target="https://www.rfc-editor.org/info/rfc5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>

        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-19">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan and Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="27" month="September" year="2024"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-19"/>
        </reference>

        <reference anchor="RFC7854" target="https://www.rfc-editor.org/info/rfc7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>

        <reference anchor="RFC6483" target="https://www.rfc-editor.org/info/rfc6483">
          <front>
            <title>Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs)</title>
            <author initials="G." surname="Huston" fullname="G. Huston"/>
            <author initials="G" surname="Michaelson" fullname="G. Michaelson"/>
            <date year="2012" month="February"/>
          </front>
          <seriesInfo name="RFC" value="6483"/>
          <seriesInfo name="DOI" value="10.17487/RFC6483"/>
        </reference>

        <reference anchor="RFC6811" target="https://www.rfc-editor.org/info/rfc6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author initials="P." surname="Mohapatra" fullname="P. Mohapatra"/>
            <author initials="J." surname="Scudder" fullname="J. Scudder"/>
            <author initials="D." surname="Ward" fullname="D. Ward"/>
            <author initials="R." surname="Bush" fullname="R. Bush"/>
            <author initials="R." surname="Austein" fullname="R. Austein"/>
            <date year="2012" month="January"/>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>

        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>

        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>

        <reference anchor="I-D.ietf-grow-bmp-tlv" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-tlv-15">
          <front>
            <title>BMP v4: TLV support for BMP Route Monitoring and Peer Down Messages</title>
            <author fullname="Paolo Lucente" initials="P." surname="Lucente">
              <organization>NTT</organization>
            </author>
            <author fullname="Yunan Gu" initials="Y." surname="Gu">
              <organization>Huawei</organization>
            </author>
            <date day="17" month="January" year="2025"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-tlv-15"/>
        </reference>
      </references>

      <references>
        <name>Informative References</name>

        <reference anchor="I-D.ietf-grow-bmp-path-marking-tlv" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-path-marking-tlv-02">
          <front>
            <title>BMP Extension for Path Status TLV</title>
            <author fullname="Camilo Cardona" initials="C." surname="Cardona">
              <organization>NTT</organization>
            </author>
            <author fullname="Paolo Lucente" initials="P." surname="Lucente">
              <organization>NTT</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Yunan Gu" initials="Y." surname="Gu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="16" month="September" year="2024"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-path-marking-tlv-02"/>
        </reference>

        <reference anchor="I-D.ietf-grow-bmp-rel" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-rel-02">
          <front>
            <title>Logging of routing events in BGP Monitoring Protocol (BMP)</title>
            <author fullname="Paolo Lucente" initials="P." surname="Lucente">
              <organization>NTT</organization>
            </author>
            <author fullname="Camilo Cardona" initials="C." surname="Cardona">
              <organization>NTT</organization>
            </author>
            <date day="8" month="July" year="2024"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-rel-02"/>
        </reference>

        <reference anchor="I-D.ietf-grow-bmp-bgp-rib-stats" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-bgp-rib-stats-07">
          <front>
            <title>Definition For New BGP Monitoring Protocol (BMP) Statistics Types</title>
            <author fullname="Mukul Srivastava" initials="M." surname="Srivastava">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Yisong Liu" initials="Y." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <author fullname="Jinming Li" initials="J." surname="Li">
              <organization>China Mobile</organization>
            </author>
            <date day="21" month="February" year="2025"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-bgp-rib-stats-07"/>
        </reference>
      </references>
    </references>
  </back>
</rfc>