<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-sidrops-rtr-selective-sync-04" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="Selective Synchronization for RTR">Selective Synchronization for RPKI to Router Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-rtr-selective-sync-04"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhuang" fullname="Shunwan Zhuang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuangshunwan@huawei.com</email>
      </address>
    </author>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="October" day="11"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 61?>
<t>The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid some unnecessary synchronizations. The router can obtain only the data that it really needs, and it does not need to save the data that are not needed.</t>
    </abstract>
  </front>
  <middle>
    <?line 64?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The RPKI-to-Router (RTR) protocol is a simple but reliable approach, which help synchronize the validated RPKI data from a trusted cache to routers. There are already several versions of the protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/>. The supported types of data that can be transferred increase, which is shown in <xref target="tab-version"/>.</t>
      <table anchor="tab-version">
        <name>Supported data types in different versions of the RTR protocol</name>
        <thead>
          <tr>
            <th align="center">Version 0</th>
            <th align="center">Version 1</th>
            <th align="center">Version 2</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
          </tr>
          <tr>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center">Router Key</td>
            <td align="center">Router Key</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">ASPA</td>
          </tr>
        </tbody>
      </table>
      <t>The RTR protocol keeps the synchronization of all types of data, and selective synchronization is not supported. However, routers may be interested in a part of data types, instead of all. In such cases, storing unused data on the router is unreasonable, and synchronizing all types of data will induce some unnecessary transmission and storage overhead. Since multiple types of data are transmitted together, the router cannot use any type of these data unless it waits for all data to complete transmission. Furthermore, there may be more types of data in the cache, which makes the above issue more significant and worse. The followings are example types, and some of them may be possibly supported in the RTR protocol in the future:</t>
      <ul spacing="normal">
        <li>
          <t>Secured Routing Policy Specification Language (RPSL) <xref target="RFC7909"/></t>
        </li>
        <li>
          <t>Signed Prefix Lists <xref target="I-D.ietf-sidrops-rpki-prefixlist"/></t>
        </li>
        <li>
          <t>Autonomous Systems Cones <xref target="I-D.ietf-grow-rpki-as-cones"/></t>
        </li>
        <li>
          <t>Mapping Origin Authorizations (MOAs) <xref target="I-D.xie-sidrops-moa-profile"/></t>
        </li>
        <li>
          <t>Signed SAVNET-Peering Information (SiSPI) <xref target="I-D.chen-sidrops-sispi"/></t>
        </li>
        <li>
          <t>Path validation with RPKI <xref target="I-D.van-beijnum-sidrops-pathrpki"/></t>
        </li>
        <li>
          <t>Signed Groupings of Autonomous System Numbers <xref target="I-D.spaghetti-sidrops-rpki-asgroup"/></t>
        </li>
        <li>
          <t>Autonomous System Relationship Authorization (ASRA) [I-D.sriram-sidrops-asra-verification]</t>
        </li>
      </ul>
      <t>This document describes the synchronization problem of the RTR protocol and provides some possible solutions.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-ps">
      <name>Problem Statement</name>
      <t>The RTR protocol does not distinguish data types in the cache. Different types of data share one serial number and one End of Data PDU. When the Relying Party (RP) synchronizes the cache to the router, various PDUs, such as IPv4 Prefix, IPv6 Prefix, Router Key, and ASPA, are mixed. The router cannot select one or more really required PDUs or deny receiving a certain kind of PDU. For example, if the router supports RTR v2 but does not support or enable ASPA, the ASPA PDU messages will still be transmitted. Another example is the router in an IPv6-only network unreasonably has to receive IPv4 RPKI data. Overall, the transimitted Data PDU type cannot be flexibly selected by the router.</t>
      <t>The negative effects of the above problem are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Storing unused data on the router, which is unreasonable.</t>
        </li>
        <li>
          <t>Unnecessary transmission and storage overhead.</t>
        </li>
        <li>
          <t>Inefficient end-of-transmission acknowledgment. Multiple types of data are transmitted together. The router cannot use any type of these data unless it waits for all data to complete transmission.</t>
        </li>
      </ul>
      <t>The above negative effects will become worse when there are more kinds of RPKI data available <xref target="I-D.van-beijnum-sidrops-pathrpki"/><xref target="I-D.ietf-grow-rpki-as-cones"/><xref target="I-D.spaghetti-sidrops-rpki-asgroup"/>. 
The main problem of the RTR protocol is the lack of selective synchronization capability.</t>
      <t>How about using different RTR versions for controlling the synchronized data, e.g., using RTR v0 if ASPA data are unwanted? This is not a good solution. First, the data selection is restricted to RTR versions and thus is not flexible either. Second, upgrading the version of RTR for future new RPKI data is not a proper choice, which is also a problem of existing RTR design. Specifically, existing RTR protocol has low extension capability. When there are new PDUs defined for transmission, a new RTR version needs to be issued. The new version protocol is not well compatible with the older ones, which induces some challenges on version negotiation, protocol implementation, and deployment. This document will primarily focus on the solving the inflexible synchronization problem. How to define an extensible protocol needs to be further discussed.</t>
    </section>
    <section anchor="sec-solution">
      <name>Preliminary Solutions</name>
      <t>This section preliminarily proposes some independent solutions for achieving selective synchronization in the RTR protocol, while trying to keep the protocol's simplicity. A new protocol version may not necessarily be required.</t>
      <section anchor="subscribing-data-pdu">
        <name>Subscribing Data PDU</name>
        <t>Define a new type of PDU called Subscribing Data PDU. The new PDU will indicate the data types that the router is interested in. An example format of the PDU is shown in <xref target="fig-subscribe"/>. The field of PDU type is TBD. The Data Type fields indicate the interested data types (i.e., 4: IPv4 Prefix, 6: IPv6 Prefix, 9: Router Key, 11: ASPA).</t>
        <t>The router can send the Subscribing Data PDU to the cache. After finishing the subscribing, the following PDUs, including Serial Notify, Serial Query, Reset Query, Cache Response, and Cache Reset, are only for the subscribed data. If the router wants to modify the subscription, a new Subscribing Data PDU can be sent for overwriting the previous subscription.</t>
        <figure anchor="fig-subscribe">
          <name>An example format of Subscribing Data PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |         zero        |
|          |          |                     |
+-------------------------------------------+
|                                           |
|                  Length                   |
|                                           |
+-------------------------------------------+
|  Data    |          |         | Data      |
|  Type 1  | ...      | ...     | Type N    |
|          |          |         |           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
      <section anchor="pdus-with-data-type-field">
        <name>PDUs with Data Type Field</name>
        <t>The existing PDUs, including Serial Notify, Serial Query, Reset Query, Cache Response, and Cache Reset, can be extended to carry the Data Type field. The values of the Data Type field can be 4 for IPv4 Prefix, for IPv6 Prefix, 9 for Router Key, and 11 for ASPA. An example format of the extended Serial Query PDU is shown in <xref target="fig-serial"/>. A router can send the extended Serial Query PDU for requesting a specific type of data.</t>
        <figure anchor="fig-serial">
          <name>An example format of extended Serial Query PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |     Session ID      |
|    2     |    1     |                     |
+-------------------------------------------+
|                                           |
|                 Length=16                 |
|                                           |
+-------------------------------------------+
|                                           |
|                  Data Type                |
|                                           |
+-------------------------------------------+
|                                           |
|               Serial Number               |
|                                           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
      <section anchor="end-of-specific-data-pdu">
        <name>End of Specific Data PDU</name>
        <t>End of Data PDU tells the router that all the requested data are synchronized. The End of Specific Data PDU can be defined for indicating a specific type of data has been synchronized. An example format of End of Specific Data PDU is shown in <xref target="fig-end-pdu"/>. The field of PDU type is TBD. The Data Type field indicate the interested data types (i.e., 4: IPv4 Prefix, 6: IPv6 Prefix, 9: Router Key, 11: ASPA).</t>
        <t>The type of data specified in End of Specific Data PDU will become ready for use. The router does not need to wait for all the data to complete transmission before it can use the specified data.</t>
        <figure anchor="fig-end-pdu">
          <name>An example format of End of Specific Data PDU</name>
          <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |     Session ID      |
|          |          |                     |
+-------------------------------------------+
|                                           |
|                 Length=24                 |
|                                           |
+-------------------------------------------+
|                                           |
|               Serial Number               |
|                                           |
+-------------------------------------------+
|                                           |
|              Refresh Interval             |
|                                           |
+-------------------------------------------+
|                                           |
|               Retry Interval              |
|                                           |
+-------------------------------------------+
|                                           |
|              Expire Interval              |
|                                           |
+-------------------------------------------+
|                                           |
|                 Data Type                 |
|                                           |
`-------------------------------------------'
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-16" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>IIJ Research, Arrcus, &amp; DRL</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data and Router Keys from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-16"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>This document defines a "Signed Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (the subject AS) may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the subject AS produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by the subject AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-04"/>
        </reference>
        <reference anchor="I-D.xie-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-xie-sidrops-moa-profile-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.xie-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <author fullname="Di Ma" initials="D." surname="Ma">
              <organization>ZDNS</organization>
            </author>
            <date day="26" month="September" year="2024"/>
            <abstract>
              <t>For the authenticity of the mapping origin of IPv4 address block in IPv6-only networks, this document defines a standard profile for Mapping Origin Authorizations (MOAs). MOA is a cryptographically signed object that provides a means of verifying that the holder of a set of IPv4 prefixes has authorized an IPv6 mapping prefix to originate mapping for those prefixes. When receiving the MOA objects from the relying parties, PE devices can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-xie-sidrops-moa-profile-06"/>
        </reference>
        <reference anchor="I-D.chen-sidrops-sispi" target="https://datatracker.ietf.org/doc/html/draft-chen-sidrops-sispi-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.chen-sidrops-sispi.xml">
          <front>
            <title>A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="25" month="September" year="2024"/>
            <abstract>
              <t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-02"/>
        </reference>
      </references>
    </references>
    <?line 226?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
