<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zhang-sidrops-prioritized-route-validation-00" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Prioritized Resource Data">RPKI-based Validation with Prioritized Resource Data</title>
    <seriesInfo name="Internet-Draft" value="draft-zhang-sidrops-prioritized-route-validation-00"/>
    <author initials="J." surname="Zhang" fullname="Jia Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangj@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Xu" fullname="Mingwei Xu">
      <organization>CERNET</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xmw@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Xie" fullname="Chongfeng Xie">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xiechf@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Wang" fullname="Yangyang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangyy@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="October" day="19"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 64?>
<t>RPKI ROAs and other digitally signed objects provide a practical solution to validate BGP routes for preventing route hijacks.
During ROV operations, validation data may be sourced not only from issued ROAs but also from other local sources. These data sources can vary in terms of credibility, and ROV operations may therefore require different response actions for invalid or unknown routes. This document takes ROV as an example to describe a flexible RPKI-based route validation using multi-priority data, and outlines relevant use cases, framework, and requirements for ROV operations that involve multi-priority data.</t>
    </abstract>
  </front>
  <middle>
    <?line 68?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>RPKI Route Origin Authorizations (ROAs) and other digitally signed objects provide a practical solution to validate BGP routes for preventing route hijacks. For example, Route Origin Validation (ROV) built on ROAs stands as a practical and effective approach to combat prefix origin hijacking. In ROV operations, the validating data utilized is not limited to ROAs alone; it may also include various types of local data from other sources. These additional data sources can exhibit varying levels of credibility, with some being highly reliable due to their authoritative origins and others being less credible due to potential inconsistencies or lack of verification. Correspondingly, ROV operations need to be flexible enough to take different actions when dealing with invalid routes and unknown routes. This document takes ROV as an example to describe a flexible RPKI-based route validation using multi-priority data, and elaborates the gap analysis, framework, and specify the key requirements for implementing ROV with multi-priority data in current RPKI infrastructure.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="gap-analysis">
      <name>Gap analysis</name>
      <t>RPKI-based Route Origin Validation (ROV) fundamentally relies on Route Origin Authorization (ROA) data. However, it is recognized that ROA deployment has the following deployment issues: incomplete coverage of routes in the global routing table, the existence of ROAs with erroneous registrations, and the common practice where network operators locally filter certain Validated ROA Payload (VRP) data or supplement it with external sources (e.g., data inferred through machine learning). Technologies like SLURM (Simplified Local Internet Number Resource Management) can be used to apply such local modifications.</t>
      <t>Due to such mixed data sources, the credibility of the data varies to different degrees and is no longer uniform. Accordingly, network operators require the ability to apply different actions to validation results based on the credibility of the underlying data. This approach offers benefits such as the following use case: an ISP (Internet Service Provider) might supplement RPKI ROAs with data derived from its own operational experience, but assign a lower credibility to this supplementary data. In this scenario, when a route is validated as "invalid" by RPKI ROAs, the router can discard the route; if a route is validated as "invalid" by supplementary data with medium credibility, the router can be configured to trigger an alert.</t>
      <t>However, current RPKI technology does not support such operations. Regardless of the source of the validation data, the same type of validation result triggers the same operation. This fails to meet the need for customized processing of different scenarios in network operations. This document describes a RPKI validation framework and requirements with multi-priority data to make RPKI-based validation processing more flexible and operable.</t>
    </section>
    <section anchor="framework">
      <name>Framework</name>
      <t>This document proposes a framework shown as the following figure. It sopports RPKI-based validation with prioritized resource data.</t>
      <artwork><![CDATA[
                +-----------------+
                | RP/Cache server |
                | +-------------+ |
                | | prioritized | |<-----RPKI data
                | | resource    | |<-----AI data
                | | data        | |<-----Locally 
                | +-------------+ |      imported data
                +-----------------+
                  /             \
                 / RTR PDUs with \
                / priority levels \
               /                   \
 +-----------\/-----+        +------\/----------+
 |      Router      |        |      Router      |
 |+----------------+|        |+----------------+|
 ||route validation||        ||route validation||
 ||with prioritized||        ||with prioritized||
 ||resource data   ||        ||resource data   ||
 |+----------------+|        |+----------------+|
 +------------------+        +------------------+
]]></artwork>
      <t>The RP/Cache server collects and manages resouce data (e.g., ROA/other digitally signed objects, like ASPA) which are from different sources such as RPKI repository, AI inference, and local import. The data from different sources will be set to different priorities. The RP/Cache server needs to decide how to merge these data from different sources.</t>
      <t>The data will be syncronized from the RP/Cache server to routers through tools like RTR. Routers will do BGP route validation with priorities being taken into consideration. Particularly, the validaiton output for a route can be Valid, Unknown, or Invalid-<em>level</em>. A route validated as invalid will be marked with Invalid as well as a credibility level of the validation result. For example, "Invalid-<em>1</em>" means the validation result of invalid is derived based on the source data with the priority of <em>1</em> and thus has a credibility level of <em>1</em>.</t>
      <t>Network operators can do configurations on routers to taken different policies on the invalid routes with different credibility levels. For example, suppose there are two ROA records on a router: 1) the prefix of 192.0.1.0/24 is authorized to AS 65001, which has a high priority of <em>1</em> and 2) the prefix of 192.0.2/24 is authorized to AS 65002, which has a relatively low priority of <em>2</em>. For the route with the prefix of 192.0.1.0/24 and the origin of AS 65003, the validation result will be invalid-<em>1</em>. Operators can configure the router to discard the route because the validation result is with a high credibility level. For the route with the prefix of 192.0.2.0/24 and the origin of AS 65003, the validation result will be invalid-<em>2</em>. Operators can choose to set a lower priority for this route to influence the route selection outcome. This is because the validation result is with a relatively low credibility level and adopting a conservative handling policy to the route may be safer.</t>
      <t>The proposed framework brings two main benefits:</t>
      <ul spacing="normal">
        <li>
          <t>Enhancing BGP route handling after route validation. When the resource data are from multiple data sources with different levels of credibility, operators can implement customized priority settings to the resource data and apply different handling policies.</t>
        </li>
        <li>
          <t>Improving early deployment benefits and promoting the deployment of RPKI-based routing validation techniques. When the registration rate of RPKI data is not high, operators can supplement data with techniques like AI while still being able to take "discarding" action on invalid routes with high credibility levels.</t>
        </li>
      </ul>
    </section>
    <section anchor="requirements-for-multi-priority-rpki-rov">
      <name>Requirements for Multi-Priority RPKI ROV</name>
      <t>This section outlines the requirements for extending the RPKI architecture to support the processing and propagation of RPKI data with multiple priority levels. These requirements are necessary to enable differentiated handling of routing validation results based on their perceived credibility, such as those derived from authoritative sources (e.g., RPKI ROAs) versus inferred or supplemental sources (e.g., AI-inferred data).</t>
      <ol spacing="normal" type="1"><li>
          <t>Priority Setting. Implementations processing RPKI data on local cache (e.g., Relying Party software) <bcp14>SHOULD</bcp14> support the assignment of a priority level to each validated RPKI object. The priority <bcp14>MAY</bcp14> be configurable based on the data source (e.g., RPKIsigned, locally imported, or AI-inferred). The priority value <bcp14>SHOULD</bcp14> be represented in a standardized format to ensure interoperability.</t>
        </li>
        <li>
          <t>Multi-Priority Data Merge. Implementations <bcp14>SHOULD</bcp14> merge data from multiple sources according to a defined algorithm. This algorithm <bcp14>SHOULD</bcp14> specify how to handle conflicts, including rules for merging data of the same priority and for superseding lower-priority data with higher-priority data.</t>
        </li>
        <li>
          <t>SLURM Support for Priority Marking. The SLURM mechanism <bcp14>SHOULD</bcp14> be extended to allow local exceptions and additions to include a priority attribute. This enables network operators to override or supplement RPKI data with local policies that reflect differentiated credibility.</t>
        </li>
        <li>
          <t>RTR Support for Priority Marking. The RPKI-to-Router (RTR) protocol <bcp14>MUST</bcp14> be extended to convey the priority of the validation data it delivers. This enables routers to apply appropriate local policy based on the credibility of the origin. To provide flexibility in deployment, two implementation models <bcp14>MAY</bcp14> be supported. Network operators <bcp14>SHOULD</bcp14> choose which implementation to deploy based on their specific operational preferences and infrastructure:  </t>
          <t>
4.1. One single local cache server transmits data of multiple priority levels. The protocol <bcp14>SHOULD</bcp14> be extended to include a new field within its Protocol Data Units (PDUs) to explicitly carry the priority level for each payload data item. This model allows a router to maintain a single, simple transport session with one cache server while receiving a mixed-priority data set.  </t>
          <t>
4.2. A router establishes transport sessions with multiple local cache servers, where each server is designated to provide data for a specific priority level (e.g., a primary server provides high-priority RPKI-validated data, and a secondary server provides low-priority supplemental data). The protocol itself remains unchanged, as the priority is derived from the configuration of the router-to-server association.</t>
        </li>
        <li>
          <t>BGP route validation (e.g., ROV, ASPA, etc.) with Priority Awareness. BGP route validation processes <bcp14>SHOULD</bcp14> be enhanced to support a multi-priority data model. The validation process <bcp14>SHOULD</bcp14> annotate the resulting validation state (Valid, Invalid) with an indication of the priority level, which identifies the priority tier of the data that was used to reach that conclusion. For example, an "Invalid" result derived from a local override (high-priority) <bcp14>MUST</bcp14> be distinguishable from an "Invalid" result derived from inferred data (low-priority). This annotated validation state <bcp14>SHOULD</bcp14> then be used to inform subsequent routing policy actions. Implementations <bcp14>SHOULD</bcp14> provide flexible policy mechanisms that allow network operators to define actions (e.g., reject, depreference, warn, accept) based on both the validation state (e.g., Invalid) and its associated assurance level (e.g., High or Low).</t>
        </li>
        <li>
          <t>Router Handling of Priority-Based Invalid Routes. BGP speakers <bcp14>SHOULD</bcp14> support configurable policies to handle invalid routes based on the priority of the validation data. For example, routes invalidated by high-priority data <bcp14>MAY</bcp14> be deprioritized or discarded, while those invalidated by low-priority data <bcp14>MAY</bcp14> be retained with a warning.</t>
        </li>
        <li>
          <t>BMP Support for Priority in Validation Reports. The BGP Monitoring Protocol (BMP) <bcp14>SHOULD</bcp14> be extended to include priority information in reports of BGP route validation results. This enables network operators to monitor and analyze routing decisions based on data credibility.</t>
        </li>
      </ol>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document defines a framework for handling RPKI data with multiple levels of priority (assurance), which introduces new considerations beyond those of the base RPKI system <xref target="RFC6480"/>.</t>
      <t>Amplification of RPKI Repository Failures: If a high-priority source (e.g., a primary RTR cache) becomes stale or unavailable, the system may fall back to low-priority data. This could lead to a mass re-evaluation of routes from a 'Unknown' state to a 'Valid' or 'Invalid' state based on less credible information, potentially causing widespread routing churn. Implementations should include mechanisms to detect such scenarios and allow operators to define appropriate fallback behaviors.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA action.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
      </references>
    </references>
    <?line 172?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
