<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc strict="no"?>
<?rfc rfcedstyle="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="info" docName="draft-wang-grow-bmp-rpki-mon-reqs-02" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" symRefs="true" version="3">
  <front>
    <title abbrev="BMP-RPKI-MON-REQS">  Requirements for Monitoring RPKI-Related Processes on Routers Using BMP </title>
    <seriesInfo name="Internet-Draft" value="draft-wang-grow-bmp-rpki-mon-reqs-02"/>

    <author fullname="Shuhe Wang" initials="S." surname="Wang">
      <organization>Beijing Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street/>
          <street>Building 8, CourtYard 1, Zhongguancun East Road, Haidian District</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangsh@mail.zgclab.edu.cn</email>
      </address>
    </author>

    <author fullname="Mingwei Xu" initials="M." surname="Xu">
      <organization>Beijing Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street/>
          <street>Building 8, CourtYard 1, Zhongguancun East Road, Haidian District</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xmw@cernet.edu.cn</email>
      </address>
    </author>

    <author fullname="Yangyang Wang" initials="Y." surname="Wang">
      <organization>Beijing Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street/>
          <street>Building 8, CourtYard 1, Zhongguancun East Road, Haidian District</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wyy@cernet.edu.cn</email>
      </address>
    </author>

    <author fullname="Jia Zhang" initials="J." surname="Zhang">
      <organization>Beijing Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street/>
          <street>Building 8, CourtYard 1, Zhongguancun East Road, Haidian District</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangj@mail.zgclab.edu.cn</email>
      </address>
    </author>


    
    
    <date year="2025"/>
    <area>Routing Area</area>
    <workgroup>GROW</workgroup>
    <keyword>RPKI BMP RTR ROV ASPA</keyword>
    <abstract>
      <t>
        This document outlines requirements for extending the BGP Monitoring Protocol (BMP) to provide comprehensive monitoring of RPKI-related processes on routers on routers, including RPKI data acquisition, RPKI-related policy configuration, route validation, and the impact of validation on routing decisions. The proposed extensions aim to standardize router-side monitoring on RPKI within BMP, addressing scalability and interoperability limitations in existing implementations.
      </t>
    </abstract>
  </front>

  <middle>
    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t>
        The Resource Public Key Infrastructure (RPKI) enhances BGP security by enabling cryptographic validation of route origins <xref target="RFC6483" format="default"/> <xref target="RFC6811" format="default"/> and AS paths <xref target="I-D.ietf-sidrops-aspa-verification" format="default"/>. Despite growing adoption of RPKI, standard implementations of the BGP Monitoring Protocol (BMP) <xref target="RFC7854" format="default"/> do not natively support monitoring of RPKI-related data. This limitation hampers visibility into RPKI validation processes and their impact on network operations.
      </t>
      <t>
        While existing proposals aim to extend BMP for specific aspects of RPKI monitoring, such as reporting invalid routes <xref target="I-D.ietf-grow-bmp-path-marking-tlv" format="default"/> <xref target="I-D.ietf-grow-bmp-rel" format="default"/> or providing validation statistics <xref target="I-D.ietf-grow-bmp-bgp-rib-stats" format="default"/>, a comprehensive and end-to-end monitoring framework for RPKI lifecycle on the router is still lacking. This document defines requirements and extensions for BMP to monitor four key stages:
      </t>
      <ul spacing="normal">
        <li>Acquisition of RPKI data;</li>
        <li>Configuration of RPKI policies;</li>
        <li>Validation of routes using RPKI;</li>
        <li>Impact of RPKI validation on routing decisions.</li>
      </ul>
    </section>

    <section numbered="true" toc="default">
      <name>Requirements Language</name>
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119" format="default"/>.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Requirements Overview</name>
      <t>
       The BMP extension for RPKI monitoring SHOULD:
      </t>
      <ul spacing="normal">
        <li>Monitor extensible RPKI data transport from various sources to routers, including through RPKI-to-Router Protocol (RTR) <xref target="RFC8210" format="default"/>, BGP <xref target="RFC4271" format="default"/>, or static configurations;</li>
        <li>Enable real-time monitoring of the route validation process on the router <xref target="RFC6811" format="default"/>;</li>
        <li>Facilitate the correlation between RPKI validation states and BGP routing decisions;</li>
        <li>Scale efficiently across diverse validation types.</li>
      </ul>
      <t>
        Consequently, this document identifies four key stages in the RPKI lifecycle on routers which necessitate detailed monitoring and reporting:
      </t>

      <section numbered="true" toc="default">
        <name>RPKI Data Acquisition</name>
        <t>
    To ensure accurate and timely acquisition of RPKI data, network administrators require BMP to provide real-time, consistent monitoring on the health and status of all RPKI data sources. These sources include connections to RPKI caches, local static configurations, and i/eBGP peers. This enables rapid detection and response to faults or outages in data provisioning. Accordingly, BMP SHOULD report the connection parameters, synchronization states, and error metrics for each source.
  </t>
      </section>

      <section numbered="true" toc="default">
        <name>RPKI Policy Configuration</name>
        <t>Routing policies on the router may change dynamically, therefore real-time monitoring is necessary to ensure correct implementation and prompt misconfiguration detection of RPKI-based policies. To achieve this, BMP SHOULD report global RPKI enforcement status, RPKI-related validation rules and policies for each peer. </t>
      </section>

      <section numbered="true" toc="default">
        <name>Route Validation with RPKI</name>
        <t>
  Routers from different vendors implement RPKI-based route validation—including origin validation and path validation —with varying approaches. To facilitate accurate troubleshooting against validation outcomes, BMP SHOULD report the RPKI validation state as well as the related rules that contribute to the state. 
</t>
      </section>

      <section numbered="true" toc="default">
        <name>Impact of RPKI Validation on Routing</name>
        <t>
  A router may implement numerous routing policies, resulting in complex routing behavior that obscures the influence of RPKI validation on decision-making. To provide visibility into this impact, BMP should report both intended outcomes and unintended side effects that are caused by the RPKI validation process.
</t>
      </section>
    </section>

    <section numbered="true" toc="default">
      <name>RPKI Data Acquisition</name>
      <t>
        BMP SHOULD enumerate all sources of RPKI data on the monitored router. These sources include the RPKI-to-Router (RTR) protocol with RPKI cache servers, static configurations, iBGP sessions with the other router within the same AS, and eBGP sessions with the other ASes (mostly upstream providers). For each source, BMP SHOULD report the following relevant information:
      </t>

      <t>For RTR sources: </t>

      <ul spacing="normal">
        <li>The RPKI cache's designation as primary or backup, including its priority in the selection order;</li>
        <li>The version of the RTR protocol in use (e.g., version 0 <xref target="RFC6810" format="default"/>, version 1 <xref target="RFC8210" format="default"/>, or custom versions);</li>
        <li>The type of TCP connection established (e.g., plain TCP, TLS, SSH);</li>
        <li>The IP address and port number of the cache;</li>
        <li>The total number of RPKI records received, including ROAs and ASPAs;</li>
        <li>The current status of the connection (e.g., active or idle);</li>
        <li>The timestamp of the most recent synchronization;</li>
        <li>Errors and timeouts encountered;</li>
        <li>Any other relevant information.</li>
      </ul>

      <t> For iBGP sources: </t>
      <ul spacing="normal"> 
      <li> The IP address of the iBGP peer providing the RPKI data; </li>
      <li> The status of the iBGP session; </li>
      <li>The total number of RPKI records received, including ROAs and ASPAs;</li>
      <li>The current status of the connection (e.g., active or idle);</li>
      <li>The timestamp of the most recent synchronization;</li>
      <li>Errors and timeouts encountered;</li>
      <li>Any other relevant information.</li>
      </ul>

      <t> For eBGP sources: </t>
      <ul spacing="normal"> 
      <li> The IP address and AS number of the eBGP peer providing the RPKI data; </li>
      <li> The AS relationship between the eBGP peer and current AS; </li>
      <li> The status of the eBGP session; </li>
      <li>The total number of RPKI records received, including ROAs and ASPAs;</li>
      <li>The current status of the connection (e.g., active or idle);</li>
      <li>The timestamp of the most recent synchronization;</li>
      <li>Errors and timeouts encountered;</li>
      <li>Any other relevant information.</li>
      </ul>

      <t>For static configuration sources: </t>
      <ul spacing="normal">     
      <li>The number of statically configured RPKI records (ROAs and ASPAs);</li>
      <li>The timestamp of the last modification to the static configuration;</li>
      <li>Read/write errors of static configuration;</li>
      <li>Any other relevant information.</li>
      </ul>

      <t>
        To convey this information, a new BMP message type RPKI_SOURCE (Type = TBD1) SHOULD be defined. This message SHALL use the standard BMP common header followed by Type-Length-Value (TLV) elements per <xref target="I-D.ietf-grow-bmp-tlv"/>. TLVs SHALL be grouped per RPKI data source. Each group SHALL use a Group TLV to index Stateless parsing TLVs containing the above fields. A dedicated TLV within each group SHOULD specify the source type to ensure consistency and scalability.
      </t>

    </section>

    <section numbered="true" toc="default">
      <name>RPKI Policy Configuration</name>
      <t>
        BMP SHOULD report the RPKI-related policy configuration, which may be applied globally (uniformly applied across all peers) or on a per-peer basis (For example, only applied to the provider). The reported information SHOULD include:
      </t>
      <ul spacing="normal">
        <li>The enablement status of RPKI validation;</li>
        <li>The enabled set of validation rules derived from RPKI data, such as VRPs or ASPA entries;</li>
        <li>If enabled, the configured actions for routes with Invalid or Not-Found states.</li>
      </ul>
      <t>
        To convey this information, a new BMP message type RPKI_POLICY (Type = TBD2) SHOULD be defined. For global policy configurations, this message SHALL comprise the BMP common header followed by TLVs that specify the validation rules and the actions associated with each non-valid state (i.e., Invalid and Not-Found), such as filtering, priority reduction, tagging, etc. For per-peer policy configurations, the message SHALL include an additional per-peer header, followed by TLVs that detail the RPKI rules and policies specific to each peer. 
      </t>
      <t>
      Note that since the size of the total validation rule set could be really large, BMP could only convey the route features of enabled validation rules. These features could be logical combination (AND/OR) of a series of conditions (the origin ASes should be within a certain set, the origin ASes should be a certain role such as the customer, the rule source should only be static or iBGP, etc). The network administrator could combine the features and per-route specific information in the next section to obtain the total validation rules.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Route Validation with RPKI</name>
      <t>
        BMP SHOULD be extended to report both statistical summaries of validation results on a per-peer basis and detailed validation information for each route. For each peer, BMP messages SHOULD include counts of received routes categorized by their RPKI validation states. To improve clarity and emphasize RPKI-specific data, it is RECOMMENDED that a dedicated RPKI Statistics Message RPKI_STAT(Type = TBD3) be introduced by enhancing the original Statistics Report Message.This message specifically report the following RPKI-related statistics:
      </t>
      <ul spacing="normal">
        <li>The number of routes in each validation state: Valid, Invalid, and Not-Found;</li>
        <li>Optional statistics, such as the number of routes filtered as a result of RPKI validation.</li>
      </ul>
      <t>
        This separation enhances readability and could easily extend to support any future RPKI-related objects.
      </t>
      <t>
        For any individual route, since it may go through multiple types of validations, and may hit multiple validation rules, BMP SHOULD report not only the overall validation state, but also every validation rule which is hit. Therefore, for per-route validation report, it is RECOMMENDED that a dedicated Validation Report Message RPKI_VALIDATION (Type = TBD4) be defined, by enhancing the original Route Monitoring Message with additional TLVs. These TLVs should describe: 
      </t>
      <ul spacing="normal">
        <li> The overall validation state, including Valid, Invalid or Unknown; </li>
        <li> The types of validations the route goes through; </li>
        <li> The information of all relevant validation rules, including the rule content (ROA entry for origin validation, ASPA entry for path validation, AS group set for region validation, etc), the data source, the expiration date, and the specific validation state for each rule.</li>
      </ul>
      <t> Note that if the overall validation state is Valid, the specific validation state for every relevant validation rule should be valid; if the overall validation state is Unknown, there shouldn't be any relevant validation rule; if the overall validation state is Invalid, there should be at least one relevant validation rule whose specific validation state is Invalid.</t>
    </section>

    <section numbered="true" toc="default">
      <name>Impact of RPKI Validation on Routing</name>
      <t>
        BMP SHOULD report the consequences of RPKI validation on route selection, with a particular focus on routes whose selection status is altered by RPKI validation:
      </t>
      <ul spacing="normal">
        <li>Routes that are demoted due to RPKI validation (i.e., routes that would have been selected as the best path without RPKI but are not selected when RPKI is enabled);</li>
        <li>Routes that are promoted due to RPKI validation (i.e., routes that would not have been selected as the best path without RPKI but are selected when RPKI is enabled).</li>
      </ul>
      <t>
        For each route affected by RPKI validation, the BMP extension SHOULD report:
      </t>
      <ul spacing="normal">
        <li>The validation information, as detailed in the Route Validation stage;</li>
        <li>The actions applied to the route following validation, such as degradation of preference, attribute tagging, or exclusion from the selection process.</li>
      </ul>
      <t>
        Furthermore, the BMP message SHOULD include information about the alternate best route:
      </t>
      <ul spacing="normal">
        <li>For routes demoted due to RPKI, the message SHOULD report the new best route selected with RPKI enabled;</li>
        <li>For routes promoted due to RPKI, the message SHOULD report the best route that would have been selected without RPKI.</li>
      </ul>
      <t>
        This facilitates a direct comparison of routing decisions with and without RPKI, thereby enhancing the understanding of RPKI's influence on BGP path selection.
      </t>
      <t>
        To enable per-route reporting of RPKI's impact on BGP routing, it is RECOMMENDED that a dedicated Validation Impact Message RPKI_IMPACT (Type = TBD5) be defined, by enhancing the original Route Monitoring Message with additional TLVs, to capture changes in route handling due to RPKI validation and policies. When a route is affected—such as being dropped, deprioritized, or superseded by another route-due to RPKI validation, such message could be triggered to report the incident. This message SHOULD include:
      </t>
      <ul spacing="normal">
        <li>The prefix and attributes of the affected route;</li>
        <li>The RPKI validation state of the affected route;</li>
        <li>Details of all the relevant RPKI validation rules of the affected route;</li>
        <li>The policy action enforced on the affected route (e.g., drop, reduce priority, tag);</li>
        <li>Information of the alternate best route, including its prefix, attributes, and RPKI validation state.</li>
      </ul>
    </section>

  <section numbered="true" toc="default">
    <name>Security Considerations</name>


     <section numbered="true" toc="default">
        <name>Transmission Security</name>
        <t>
 To ensure the integrity and authenticity of the transmitted monitoring data on RPKI, BMP MUST support the following requirements: 
</t>
<ul spacing="normal"> 
        <li> Protocol safety: BMP MUST employ either TCP Authentication Option (TCP-AO) <xref target="RFC5925" format="default"/> or Transport Layer Security (TLS) to encrypt the monitoring sessions. </li>
        <li> data integrity: BMP should enforce mechanism like end-to-end signatures to ensure the integrity of critical data such as ROA validation result fields and AS_PATH change records, and validate the integrity of the received data prior to extracting the content of the data to prevent the propagation of tampered or corrupted information. The signing/verification keys could be dynamically derived from the RPKI certificate authority chain or managed through other secure mechanisms, and form a cross-verification mechanism with the source AS validation results of BGP UPDATE messages (where applicable) to prevent malicious rollback or tampering of the related monitoring data during transmission.</li>
         </ul>
      </section>


 <section numbered="true" toc="default">
        <name>Operational Security</name>
        <t> To ensure the extended BMP aligns with router's original configuration, BMP MUST support the followign requirements: </t>
        <ul spacing="normal"> 
        <li>Protocol transparency: The monitoring data collection must strictly adhere to the "zero-intrusion" principle. For operations involving the RTR protocol <xref target="RFC8210" format="default"/>, only read-only interfaces are permitted to retrieve certificate synchronization status, and any modification to the router's local RPKI cache tree structure is prohibited. The polling frequency of monitoring probes should be restricted, and appropriate memory access layer protections must be implemented to prevent cache reconstruction triggered by monitoring data extraction. Additionally, the acquisition of collected ROA validation records should not interfere with real-time traffic processing.</li>
        <li> Forward compatibility: When the router does not enable the monitoring function recommended by this standard, or when the monitoring function fails, its native RPKI validation process <xref target="RFC6811" format="default"/> and BGP decision logic must maintain full functional consistency to prevent unintended routing policy changes caused by the monitoring mechanism.</li>
        </ul>
</section>

  </section>

    <section numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
         This document requires IANA to assign values for new BMP message types (TBD1-TBD5) and their associated TLVs. The registration procedures for these assignments SHALL follow the policy outlined in <xref target="RFC7854"/>.
      </t>
    </section>
  </middle>

  <back>
    <references>
      <name>References</name>

      <references>
        <name>Normative References</name>

        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>

        <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271">
        <front>
        <title>A Border Gateway Protocol 4 (BGP-4)</title>
        <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
        <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
        <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
        <date month="January" year="2006"/>
        <abstract>
        <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
        <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
        <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
        <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
        </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>

        <reference anchor="RFC5925" target="https://www.rfc-editor.org/info/rfc5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>

        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-23">
<front>
<title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
<author fullname="Alexander Azimov" initials="A." surname="Azimov">
<organization>Yandex</organization>
</author>
<author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
<organization>Qrator Labs</organization>
</author>
<author fullname="Randy Bush" initials="R." surname="Bush">
<organization>Internet Initiative Japan and Arrcus, Inc.</organization>
</author>
<author fullname="Keyur Patel" initials="K." surname="Patel">
<organization>Arrcus</organization>
</author>
<author fullname="Job Snijders" initials="J." surname="Snijders"/>
<author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
<organization>USA National Institute of Standards and Technology</organization>
</author>
<date day="22" month="September" year="2025"/>
<abstract>
<t>This document describes procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This AS_PATH verification enhances routing security by adding means to detect and mitigate route leaks and AS_PATH manipulations.</t>
</abstract>
</front>
<seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-23"/>
</reference>

        <reference anchor="RFC7854" target="https://www.rfc-editor.org/info/rfc7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>

        <reference anchor="RFC6483" target="https://www.rfc-editor.org/info/rfc6483">
          <front>
            <title>Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs)</title>
            <author initials="G." surname="Huston" fullname="G. Huston"/>
            <author initials="G" surname="Michaelson" fullname="G. Michaelson"/>
            <date year="2012" month="February"/>
          </front>
          <seriesInfo name="RFC" value="6483"/>
          <seriesInfo name="DOI" value="10.17487/RFC6483"/>
        </reference>

        <reference anchor="RFC6811" target="https://www.rfc-editor.org/info/rfc6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author initials="P." surname="Mohapatra" fullname="P. Mohapatra"/>
            <author initials="J." surname="Scudder" fullname="J. Scudder"/>
            <author initials="D." surname="Ward" fullname="D. Ward"/>
            <author initials="R." surname="Bush" fullname="R. Bush"/>
            <author initials="R." surname="Austein" fullname="R. Austein"/>
            <date year="2012" month="January"/>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>

        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>

        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>

        <reference anchor="I-D.ietf-grow-bmp-tlv" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-tlv-19">
<front>
<title>BMP v4: TLV Support for BGP Monitoring Protocol (BMP) Route Monitoring and Peer Down Messages</title>
<author fullname="Paolo Lucente" initials="P." surname="Lucente">
<organization>NTT</organization>
</author>
<author fullname="Yunan Gu" initials="Y." surname="Gu">
<organization>Huawei</organization>
</author>
<date day="10" month="October" year="2025"/>
<abstract>
<t>Most of the BGP Monitoring Protocol (BMP) message types make provision for data in Type, Length, Value (TLV) format. However, Route Monitoring messages (which provide a snapshot of the monitored Routing Information Base) and Peer Down messages (which indicate that a peering session was terminated) do not. Supporting (optional) data in TLV format across all BMP message types provides consistent and extensible structures that would be useful among the various use- cases where conveying additional data to a monitoring station is required. This document updates RFC 7854 [RFC7854] to support TLV data in all message types. Additionally, this document introduces support for enterprise- specific TLVs in the BGP Monitoring Protocol by defining an Enterprise Bit (E-bit) that allows usage of per-vendor Type values.</t>
</abstract>
</front>
<seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-tlv-19"/>
</reference>

      </references>

      <references>
        <name>Informative References</name>

        <reference anchor="I-D.ietf-grow-bmp-path-marking-tlv" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-path-marking-tlv-04">
<front>
<title>BMP Extension for Path Status TLV</title>
<author fullname="Camilo Cardona" initials="C." surname="Cardona">
<organization>NTT</organization>
</author>
<author fullname="Paolo Lucente" initials="P." surname="Lucente">
<organization>NTT</organization>
</author>
<author fullname="Pierre Francois" initials="P." surname="Francois">
<organization>INSA-Lyon</organization>
</author>
<author fullname="Yunan Gu" initials="Y." surname="Gu">
<organization>Huawei</organization>
</author>
<author fullname="Thomas Graf" initials="T." surname="Graf">
<organization>Swisscom</organization>
</author>
<date day="25" month="August" year="2025"/>
<abstract>
<t>The BGP Monitoring Protocol (BMP) provides an interface for obtaining BGP path information, which is is conveyed through BMP Route Monitoring (RM) messages. This document specifies a BMP extension to convey the status of a path after being processed by the BGP process.</t>
</abstract>
</front>
<seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-path-marking-tlv-04"/>
</reference>

        <reference anchor="I-D.ietf-grow-bmp-rel" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-rel-04">
<front>
<title>Logging of routing events in BGP Monitoring Protocol (BMP)</title>
<author fullname="Paolo Lucente" initials="P." surname="Lucente">
<organization>NTT</organization>
</author>
<author fullname="Camilo Cardona" initials="C." surname="Cardona">
<organization>NTT</organization>
</author>
<date day="3" month="September" year="2025"/>
<abstract>
<t>The BGP Monitoring Protocol (BMP) does provision for BGP session event logging (Peer Up, Peer Down), state synchronization (Route Monitoring), debugging (Route Mirroring) and Statistics messages, among the others. This document defines a new Route Event Logging (REL) message type for BMP with the aim of covering use-cases with affinity to alerting, reporting and on-change analysis.</t>
</abstract>
</front>
<seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-rel-04"/>
</reference>

        <reference anchor="I-D.ietf-grow-bmp-bgp-rib-stats" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-bgp-rib-stats-11">
<front>
<title>Advanced BGP Monitoring Protocol (BMP) Statistics Types</title>
<author fullname="Mukul Srivastava" initials="M." surname="Srivastava">
<organization>Juniper Networks</organization>
</author>
<author fullname="Yisong Liu" initials="Y." surname="Liu">
<organization>China Mobile</organization>
</author>
<author fullname="Changwang Lin" initials="C." surname="Lin">
<organization>New H3C Technologies</organization>
</author>
<author fullname="Jinming Li" initials="J." surname="Li">
<organization>China Mobile</organization>
</author>
<date day="17" month="October" year="2025"/>
<abstract>
<t>RFC 7854 defines different BGP Monitoring Protocol (BMP) statistics message types to observe events that occur on a monitored router. This document defines new statistics type to monitor BMP Adj-RIB-In and Adj-RIB-Out Routing Information Bases (RIBs).</t>
</abstract>
</front>
<seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-bgp-rib-stats-11"/>
</reference>

      </references>
    </references>
  </back>
</rfc>