<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jiang-sidrops-psvro-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PSVRO">Route Origin Registry Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-jiang-sidrops-psvro-03"/>
    <author fullname="Shenglin Jiang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jiangshl@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xingang Shi">
      <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>shixg@cernet.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="November" day="12"/>
    <workgroup>SIDROPS</workgroup>
    <abstract>
      <?line 106?>

<t>Prefix hijacking, i.e., unauthorized announcement of a prefix, has emerged as a major security threat in the Border Gateway Protocol (BGP), garnering widespread attention. To migrate such attacks while supporting legitimate Multiple Origin AS (MOAS), higher requirements are placed on the route origin registry. This document serves to outline the problem statement for current route origin registry.</t>
    </abstract>
  </front>
  <middle>
    <?line 110?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) is ubiquitously used for inter-domain routing. However, it lacks built-in security validation on whether its UPDATE information is legitimate <xref target="RFC4272"/>. This poses concerns regarding prefix hijacking, where unauthorized announcements of prefixes can occur, simulating legitimate Multiple Origin AS (MOAS).</t>
      <t>Unfortunately, the current route origin registry, such as Internet Routing Registry (IRR) <xref target="RFC1786"/> and Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/>, are not effective in distinguishing between legitimate MOAS and prefix hijacking. There is a pressing need for an verifiable route origin registry that can support registration and protection of legitimate MOAS, thereby mitigating the threats posed by prefix hijacking to the routing infrastructure.</t>
      <t>This document analyzes multiple scenarios involving MOAS events and identifies limitations inherent in the current route origin registry mechanisms. The intent is to provide guidance and insights to network operators, researchers, and policymakers aimed at enhancing the security and resilience of the global routing infrastructure.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="working-definition-of-route-origin-registry">
      <name>Working Definition of Route Origin Registry</name>
      <t>Route origin registry refers to a infrastructure that records the mapping of IP prefixes to the ASes authorised to announce them. Resource holders can register prefix-origin pairs in route origin registry by themselves or delegate to others.</t>
      <t>IRR and RPKI currently offer functionalities related to route origin registry. IRRs, which have been in operation since 1995, serve as a globally distributed database for routing information. They record the binding relationship between IPs and AS via Route(6) objects, which are defined by the Routing Policy Specification Language (RPSL).</t>
      <t>On the other hand, the RPKI, which was developed starting in 2008, provides a formally verifiable framework. The RPKI is based on resource certificates that extend the X.509 standard. It records the mapping between IP prefixes and their authorised ASes via Route Origin Authorization (ROA) objects. These ROA objects contain essential information such as the prefix, origin ASN, and MaxLength.</t>
    </section>
    <section anchor="prefix-hijacking-and-legitimate-moas">
      <name>Prefix Hijacking and Legitimate MOAS</name>
      <t><xref target="RFC1930"/> suggests that a prefix should typically have a single AS as its origin, with a few exceptions. However, CAIDA's analysis on BGP routing data <xref target="CAIDA"/> reveals that MOAS has always been a common phenomenon. There are various reasons that contribute to the emergence of MOAS prefixes:</t>
      <ul spacing="normal">
        <li>
          <t><strong><em>Aggregation</em></strong>. According to <xref target="RFC1930"/>, aggregation could result in prefix originated from multiple possible ASes. For example, if the "Prefix 0/24" originates from ASx and the "Prefix 1/24" originates from ASy, aggregating them into "Prefix 0/23" with the originates from [ASx, ASy] may result in the loss of the specific origin AS information if the ATOMIC_AGGREGATE attributes of the aggregation announcements are not specific.</t>
        </li>
        <li>
          <t><strong><em>Business consideration</em></strong>. Companies often choose providers that offer high-speed and reliable data services to host their servers. For efficient resource allocation, a parent organization that owns a large chunk of IP addresses may divide its address space among one or more child organizations, which choose different providers and ask them to announce the same prefix. For example, a multi-national company may advertise its prefix from multiple locations where it has offices.</t>
        </li>
        <li>
          <t><strong><em>Multi-homing</em></strong>. When multi-homing occur without the use of BGP, it can result in MOAS conflicts. Assuming ASx is connected to two providers, ISP1 and ISP2. ISP1 is connected to ASx using BGP, while ISP2 is connected to ASx through static routes or Interior Gateway Protocol (IGP). Both ISP1 and ISP2 advertise prefixes that belong to ASx.</t>
        </li>
        <li>
          <t><strong><em>Internet eXchanges</em></strong>. When a prefix is associated with an exchange point, it becomes directly accessible from all the ASes connected to that exchange point. Each AS at the exchange point has the capability to advertise the prefix as if it originates directly from their own AS.</t>
        </li>
        <li>
          <t><strong><em>Anycast</em></strong>. Anycast is often employed by content distribution networks (CDNs) to direct the requests of their customers to the nearest servers, ensuring speedy data delivery to their customers.</t>
        </li>
        <li>
          <t><strong><em>Prefix hijacking and misconfigurations</em></strong>. A malicious AS may advertise prefixes belonging to another organization to attract its traffic. An AS may also make such annoucements unintentionally due to misconfiguration.</t>
        </li>
      </ul>
      <t>Distinguishing between prefix hijacking, misconfiguration, and legitimate MOAS is a complex task. The challenge arises from the resemblance of these behaviors, as they often display similar characteristics. Moreover, accurately identifying and classifying these situations necessitates a route origin registry with high coverage and accuracy.</t>
    </section>
    <section anchor="problems-in-current-route-origin-registry">
      <name>Problems in Current Route Origin Registry</name>
      <t>This section outlines several challenges faced by the current route origin registries in distinguishing legitimate MOAS events from malicious MOAS incidents, such as route hijacking.</t>
      <section anchor="security-risks-from-partial-adoption">
        <name>Security Risks from Partial Adoption</name>
        <t>As the adoption of RPKI continues to grow, the number of IP prefixes registered within RPKI is gradually increasing. However, recent reports from the Number Resource Organization (NRO) <xref target="NRO"/> indicate that the coverage of IP prefixes within ROAs is still relatively low, and the adoption rate of route origin validation (ROV), as measured by Mutually Agreed Norms for Routing Security (MANRS) <xref target="MANRS"/>, is even significantly lower than the coverage of ROAs. Similarly, <xref target="IRRegularities"/> also notes a decreasing trend in IP Prefix coverage in certain IRRs. When focusing on MOAS, their coverage is significantly lower and insufficient to distinguish between legitimate MOAS and route hijacking.</t>
        <t>Limited IP prefix coverage within the current route origin registry, especially for MOAS prefixes, hinders the complete validation of route announcements, significantly limiting the motivation for network operators to utilize route origin registry.</t>
      </section>
      <section anchor="inconsistency-between-different-route-origin-registries">
        <name>Inconsistency between Different Route Origin Registries</name>
        <t>Based on the analysis presented in the previous sections, it is evident that relying solely on a single source of route origin registry is insufficient in route origin validation. To address this issue effectively, it is recommended to integrate the RPKI and multiple active IRRs.</t>
        <t>However, it is important to note that this fusion approach may encounter several limitations. As highlighted in <xref target="IRRegularities"/>, inconsistencies exist among the Route(6) objects across different IRRs. This inconsistency can be attributed to the chronic neglect by IRR customers. For instance, some companies may register Route(6) objects in some IRRs but fail to update them in all route origin registries, resulting in outdated and stale Route(6) objects. Furthermore, it is observed that a higher number of IRRs exhibit lower consistency with RPKI. In practice, different networks often use different data and methodologies to perform route validation and filtering, resulting in disparate outcome, especially when ROA and IRR data conflict with each other.</t>
        <t>As a result, while integrating the RPKI and multiple active IRRs can improve the effectiveness of route origin validation, it is essential to address the issues of inconsistencies between different route origin registries.</t>
      </section>
      <section anchor="insufficiency-of-resource-certification">
        <name>Insufficiency of Resource Certification</name>
        <t>As mentioned in <xref target="RFC7682"/>, the lack of certification and incentives for maintaining up-to-date data within IRRs leads to low accuracy of the information. Recent measurement <xref target="IRRegularities"/> reveals that IRRs with low update activity exhibit lower overlap with BGP announcements than those with high update activity. This indicates that IRRs with lower activity may contain a higher proportion of outdated and stale Route(6) objects, thereby impacting the reliability of the route origin registry.</t>
        <t>RPKI is a hierarchical Public Key Infrastructure (PKI) that binds Internet Number Resources (INRs) such as AS Numbers and IP addresses to public keys via certificates. However, there is a risk of conflicts in INRs ownership when misconfiguration or malicious operations occur at the upper tier, resulting in multiple lower tiers being allocated the same INRs. Additionally, the existence of legitimate MOAS necessitates the authorization of binding between a prefix with multiple ASes, further complicating the issue. Balancing the protection of legitimate MOAS while minimizing risks in INRs certificates presents a challenging problem that requires innovative solutions. Furthermore, it is worth noting that RPKI Relying Parties (RPs) <xref target="RFC8897"/> have not yet standardized the process of constructing certificate chains and handling exceptions such as Certificate Revocation Lists (CRLs) and Manifests. This lack of standardization has resulted in different views on the RPKI records by RPs who adopt different implementations. Consequently, ASes served by different RPs may have varying validation results for the same route announcement.</t>
        <t>Consequently, the absence of data validation and standardization in operations within the IRR or RPKI framework means that there is no guarantee of the accuracy of the data registered in any route origin registry.</t>
      </section>
      <section anchor="synchronization-and-management">
        <name>Synchronization and Management</name>
        <t>The current practice in IRRs involves the use of the Near-Real-Time Mirroring (NRTM) protocol <xref target="NRTMv4"/> to replicate and synchronize Route(6) object from other IRRs. Similarly, the RPKI relies on the RPKI Repository Delta Protocol (RRDP) <xref target="RFC8182"/> to synchronize and update data. However, these network protocols exhibit several weaknesses that need to be addressed.</t>
        <ul spacing="normal">
          <li>
            <t>The absence of a mechanism to notify other mirrors when updates occur results in synchronization delays and data inconsistency issues. This can be problematic when timeliness and accuracy are crucial.</t>
          </li>
          <li>
            <t>The absence of validation for replicated data from mirrored sources in both IRRs and RPKI is a legitimate concern. This situation creates a considerable risk for inconsistencies and conflicts with the current data.</t>
          </li>
          <li>
            <t>The absence of application security mechanisms within these protocols is another area of vulnerability. This lack of security measures exposes the system to unauthorized access and compromise on data integrity.</t>
          </li>
        </ul>
        <t>Although some approaches attempt to optimise the quality of the route origin registry, e.g. RIPE NCC, IRRdv4 using RPKI to validate/filter IRR Route(6) objects, and <xref target="RFC8416"/> proposing that RPs can customise route origin with local data, the problem of inconsistency persists due to the limited coverage of RPKI and the lack of effective mechanisms to resolve conflicting data between IRRs. It is crucial to establish a effective communication mechanism among multiple route origin registry, enabling negotiation and cross-validation of conflicting or special-purpose route origin information.</t>
      </section>
      <section anchor="summary">
        <name>Summary</name>
        <t>The current route origin registry infrastructure, namely IRRs and RPKI, are facing challenges as the increased occurrence of MOAS prefixes. These challenges mainly include low adoption rates, global inconsistency, insufficient resource certification, and incomplete multi-source collaboration mechanisms.</t>
      </section>
    </section>
    <section anchor="requirements-for-new-route-origin-registry-mechanisms">
      <name>Requirements for New Route Origin Registry Mechanisms</name>
      <t>This section lists the requirements designed to guide the improvement of route origin registry mechanisms. These enhancements should prioritize multi-party collaboration to safeguard legitimate MOAS events while effectively filtering out malicious MOAS incidents.</t>
      <section anchor="allowlist-mechanism">
        <name>Allowlist Mechanism</name>
        <t>To ensure robust protection for legitimate MOAS events, prefix users should implement an allowlist mechanism as a complementary to the current resource-owner-centric infrastructure. This mechanism permits multiple users to be authorized to announce the same prefix concurrently. Moreover, users should be able to dynamically join or leave the allowlist based on practical business consideration.</t>
      </section>
      <section anchor="blocklist-mechanism">
        <name>Blocklist Mechanism</name>
        <t>One of the primary objectives of route origin validation is to suppress the propagation of malicious MOAS incidents and mitigate their impact. To enhance the efficiency and precision of anomaly detection, network participants should employ real-time anomaly monitoring and rapid consensus mechanisms to construct a blocklist. This blocklist enables the timely de-prioritization of anomalous routes, thereby reducing their disruptive effects on the routing infrastructure.</t>
      </section>
      <section anchor="multi-party-governance">
        <name>Multi-party Governance</name>
        <t>Multi-party governance plays a pivotal role in the development of new route origin mechanisms. By integrating and cross-verifying data from multiple sources, this approach facilitates effective negotiation and resolution of data duplication and conflicts. It ensures the full utilization of the strengths of each data source, thereby enhancing the reliability and functionality of the infrastructure.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There is no security consideration in this draft.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There is no IANA consideration in this draft.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1786">
          <front>
            <title>Representation of IP Routing Policies in a Routing Registry (ripe-81++)</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="E. Gerich" initials="E." surname="Gerich"/>
            <author fullname="L. Joncheray" initials="L." surname="Joncheray"/>
            <author fullname="J-M. Jouanigot" surname="J-M. Jouanigot"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="M. Terpstra" initials="M." surname="Terpstra"/>
            <author fullname="J. Yu" initials="J." surname="Yu"/>
            <date month="March" year="1995"/>
            <abstract>
              <t>This document is an update to the original `ripe-81' proposal for representing and storing routing polices within the RIPE database. It incorporates several extensions proposed by Merit Inc. and gives details of a generalized IP routing policy representation to be used by all Internet routing registries. It acts as both tutorial and provides details of database objects and attributes that use and make up a routing registry. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1786"/>
          <seriesInfo name="DOI" value="10.17487/RFC1786"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC8416">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4272">
          <front>
            <title>BGP Security Vulnerabilities Analysis</title>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
              <t>This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4272"/>
          <seriesInfo name="DOI" value="10.17487/RFC4272"/>
        </reference>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7682">
          <front>
            <title>Considerations for Internet Routing Registries (IRRs) and Routing Policy Configuration</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="D. Mitchell" initials="D." surname="Mitchell"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The purpose of this document is to catalog issues that influenced the efficacy of Internet Routing Registries (IRRs) for inter-domain routing policy specification and application in the global routing system over the past two decades. Additionally, it provides a discussion regarding which of these issues are still problematic in practice, and which are simply artifacts that are no longer applicable but continue to stifle inter-provider policy-based filtering adoption and IRR utility to this day.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7682"/>
          <seriesInfo name="DOI" value="10.17487/RFC7682"/>
        </reference>
        <reference anchor="RFC8897">
          <front>
            <title>Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document provides a single reference point for requirements for Relying Party (RP) software for use in the Resource Public Key Infrastructure (RPKI). It cites requirements that appear in several RPKI RFCs, making it easier for implementers to become aware of these requirements. Over time, this RFC will be updated to reflect changes to the requirements and guidance specified in the RFCs discussed herein.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8897"/>
          <seriesInfo name="DOI" value="10.17487/RFC8897"/>
        </reference>
        <reference anchor="NRTMv4">
          <front>
            <title>Near Real Time Mirroring (NRTM) version 4</title>
            <author fullname="Sasha Romijn" initials="S." surname="Romijn">
              <organization>Reliably Coded</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Edward Shryane" initials="E." surname="Shryane">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Stavros Konstantaras" initials="S." surname="Konstantaras">
              <organization>AMS-IX</organization>
            </author>
            <date day="14" month="May" year="2025"/>
            <abstract>
              <t>   This document specifies a one-way synchronization protocol for
   Internet Routing Registry (IRR) records.  The protocol allows
   instances of IRR database servers to mirror IRR records, specified in
   the Routing Policy Specification Language (RPSL), between each other.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-nrtm-v4-07"/>
        </reference>
        <reference anchor="IRRegularities">
          <front>
            <title>IRRegularities in the internet routing registry</title>
            <author initials="B." surname="Du">
              <organization/>
            </author>
            <author initials="K." surname="Izhikevich">
              <organization/>
            </author>
            <author initials="S." surname="Rao">
              <organization/>
            </author>
            <author initials="G." surname="Akiwate">
              <organization/>
            </author>
            <author initials="C." surname="Testart">
              <organization/>
            </author>
            <author initials="" surname="AC Snoeren">
              <organization/>
            </author>
            <author initials="K." surname="Claffy">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the 2023 ACM on internet measurement conference" value=""/>
        </reference>
        <reference anchor="CAIDA" target="https://catalog.caida.org/dataset/routeviews_prefix2as">
          <front>
            <title>RouteViews Prefix to AS mappings</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="MANRS" target="https://observatory.manrs.org/">
          <front>
            <title>MANRS Observatory</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NRO" target="https://www.nro.net/about/rirs/statistics/">
          <front>
            <title>RIR Statistics</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 232?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Yangfei Guo, Di Ma, Qi Li, Shuhe Wang, Xiaoliang Wang, Hui Wang, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61b63IbN7L+z6fAUarOsVMkZdnaxFbt2Q0tOY5OrMuSci67
tbUFzoAkrLkwgxnRdMrvcp7lPNn5uhvAzFCUkq1KqhyRcwEaje6vv+4GR6PR
oLZ1Zk7UwbRsaqOuKru0hZqapXV1tVXXVTnPTK5mta5Nbor6YKDn88rc4Y3r
2Q/Tq4NBgjvLstqeKFssysEgLZNC5xgyrfSiHn2wuliOnE2rcu1Ga3dXlaNn
LwaumefWOVsW9XaNh8/f3Hyr1BdKZ67E2LZIzdrgf5hxqA5MauuysjqjL+eT
1/hTVvg0vfn2YFA0+dxUJ4MUgpwMkrJwpnCNO1F11ZgBJH0xwLiV0Rj3am0q
XWNWp3SRqgtd6KVf16asbpdV2azx2Oz8bHp1PTvAi7dmizvpCT6qkcL92hZL
5UzSVLbeytV1ZRb2o1rZDzq5xe32WQM5WaN3OrMpz4ybd6ZoDI+oujOqVroD
vimqOfgRktGkb+lZuZNrm+GOV+s31tSLcVkt5aaukhVurup67U4OD+lZumTv
zDg8eEgXDudVuXHm0I9yKG8vbb1q5jT4yhTLzBab1SFvm9zOoGVXd4ZvHxvL
q2NbyguHD1rAeFXn2cFgoJt6VWLroC78U2rRZJkYz8HMD6v+h14/4NsQXBf2
E6voRP19VRbLZaOLpCnUOz0voTvYIT+ZYG9O1GtjP9B28JWyKWqy0tOVLTRf
Ml6LLKBbZd98WiaZno9N2oyT4mCPVN8b9VMTRDlRNw6jrxqt3hdQbuXIIP7d
2T82t+ab2g/kp94z89+semf/2Jl/yeyzo98x9U94AApSs9XjAqj//MO2xK3s
x+U3iakKUz8s2N9XTVnrEor5g/fkkwyc2eaeegaDoqxyWOCdOeFXpt+eHn39
8qv45eXRy+fxy1fHL5+1d46P8NiAUHJ3hOPnX7cvHb160b709Ved4V6+fPW1
fLmc3lzcHQM2R2fs0yPgyGZUVHU+ujvmJ75Q59MpcDOhHTjxl+i/APjd28D5
piCIwUW1gRer6fX356MfCLTU67fX6rxwdrmq3UFnIMZb9fzZ8+PORWcqaxyt
EVNcmppQlaH2jAKKnQMSUzXbupqCigdR9eTybDZ7isv5unS2yXnQ7lQtToQr
BLC2AMhfjNX32u/ozq0fx8Fndm5Mx8BjRDn7wW3sh9vRGaxi33M3Nxh8UxZ7
741hN42fmHS5bICytsbqRc5dXbf3MYCqVwZ/arbwGFUqH3YP4gBRxy/ipZ6G
EZ8Tg20EfqlywaPSw2pyeqHKop0hN9o1FUc62H2xMJUpEtPO01Vwb5mvx+qs
uX/5+7E6/7Syt+bOJqv7t2djNdXl/etvx2pyazdY1P17p2N1g8iiq/r+vQlu
zoqSpN4ry2mmFwvx89PJ+dnk/g4wvfnBmo2DrXO0rks1mSGQrtekvT0qP24H
0dXSIOaFkAen0Vm5HCcaMZ3DKV7SztSHHPPvaJp/CSl4rh0PczG5nM7ui8WX
1dUcm3rHUPlvyVG2741zXVSOZfEAcbVHCedTZnIwMpv8e0vebDbjAoEbxnQI
XG+wVFu5QxdHOxwMRqOR0nMYsE7qweB6hxQNlR2b8VA1hRib/QQk0EUBFE7E
MGHA2nOpoVppBzg2kAJPga1hpz6A8wXiBVMHo6uDK70GRTOVeouFbDTT1rpM
ykw9AXg9HaqlhhdU5GIbmxqHOTRGrWvMCioBwytVbpcIVka5JlnRLQjt1GZl
M7q0XpcVe2gGD61tTg9eNFlt11nkzDCmJxdXkxmmWwErIU1lfmmsOJ0jAqrW
mU6wnFJk7vHD4PqQZWWdAoluWCe0wUAMGCueBh0y/Ora03IXaLlCTFHQTEWf
9w8s+5PbNM0MwhjiA6JfmTYJk9LBzW9pUUGsZm6xpLpsXLZVjcNaaF5GmVFa
IngWAcvG6rtyYxCAse01SCNpc97YrB7hmbiJLSsmpWxWpia9Wajr/fXZ5OaN
isGSwMx11f/rrz5ufv7sdYbYAU0B3Yg3OFq4rggZ79HzIc2E7XjQEhlL5S0a
EaGiTCDxUDmbA8V/tyVA5+9pATVmqk22HfLmPbpNQ2+AjrZHsHvqo0NMyp4g
nDwVBRD1+PyZA+zUuLKpEqOum3lmE3DVLcZYVBrvYJOB/uoJRXX/JlGTz5+H
bJdFWSuzWJiESAm5VEo+XSwbCyKGmeeI48YUvTVjfTztrnJpM0i51okzOyJQ
qjDeVqBLGIVdWA0D3q8CKAmOTVr3jhfuiBnIpGVtErGbxa5YrOXKzLcw9tou
ZbtI8QIZYiipwv1d2cnNgmfSV9tT35icpOubSB6z7SdYSB4MwCWmQJAvKcTf
ldkdDcKagicwCEB2S0ktFID3MgsJfTpqCxK6iIj2qJUgnicrpEIud6xvdkF6
l5EC2rnDLAr7l4KKG5nWMzh6oPC8rOR8s6zcECM7QzmhoS+sYtDfZJvrW1xR
2ubkIrCSAtMmQaHRj+kFjGAzS7QiMJFlVs519rA2v4DNdhDyHWhcg3RcsAh5
t6LE2yFIvp/dUOJPf9XlFX+evvnb+/PpmzP6PPtu8u5d/DDwT8y+u3r/7qz9
1L55enVx8ebyTF7GVdW7NEBQ/vlAlHBwdX1zfnU5eXcg29LbfRg5dDn3PA62
VHOoGiDAJGC6hnSuXp9e/9//Hh3D5/4DTvf86OgV3FW+vDz6+hhfgEWFzFYW
QFX5CvVtB6Am2BMaRWcZHGINY8loexwSpHJTKLIY6PHLf5Bm/nmi/jxP1kfH
f/EXaMG9i0FnvYuss/tX7r0sStxzac80UZu96zua7ss7+bn3Pei9c/HPf+Xw
Nzp6+de/cPwKZZEzOHFhAxjsrWMNBtO9bgT/J/PGNuod8xQQqkzCJkjW7Jki
zXF+3UYHDxmTGT77cELoQkP6iEL383GLz6syS2lWQjiRBDFPxht5Adca5Er5
aHpf7PmWx3QmI24AVE0NMJDwj3gCoZ+DWVAux4EBoB/gBAZWAugrZNEF4ycC
MKcklaHCDsv9AC/BcI4iJwg/yBnixJxCAh4pQ9UK4ZGWe/Tq1Z+GQlyEuQkO
YOq0kwMSY56DM3NU6EBECPeMa1u/A6ziuS1SyZIywcyVXcfQdH4t6AqsvbNa
rODJV09VOf+AQBEFJ6dNyV4kANCwIbxeM+Cp2dokQOdEVhQwiULn7B0F9CuB
Z9Yy9FCkEtRJyWGSDVadAvEzaCZVnNLI4kCxn70cBnwm1fBySTWdoAgzzA3h
s0A7bx+Ah5TF3LEKhgSeU4uoZIdkr+YjwoBo66fxn569osmLFDQI27ffmlv9
tSatZQhbdQ2aDTyqNlIdT6BEW0+mV5OocpYe+4tr4RKRs5pIIlgBBUEEhy7B
C8xHGK6kAWWgVJdDX7H9+M4Uy3o1ZgzwScZ3MYLTM+/6fGAwEKr06gUIDyZZ
LpFmeoWFfIMAtclSqrhCn7QhbOKaTHqZkXuTYERMRaChVEmwgWYDrSdmzRbZ
Yb2ch/6XE5LgsH9YIFVSgqmT/SMQ8GMQq8JbAHeRiikDJUA6Aw934mka2stz
jLJGhCgRgryPwKLJqu+IdzTkyNoRnxASBX2LwwWckpTKB2meJ2z7CRIE9eWX
X06WS6LOtB58Q8KekNV4dtTRJPajfZKKaRlzAFAhsnSvVtEWI8uiKvOWKYGD
OTvPBDjH6luAgPmoc9xCwiD04cBv7rPD58cH7UhORprMPgZDjU8ePfDktiOr
UJecgnbZneLFgWwpO/fOCP/AZEMa55/wm21nlfRwhpUExuM8eLRm289g5KnJ
zdXF+em/Jm/fTt+8pSwH6absUhyoq9p+ZhL4ephqLLv2uoGlwq1oyx3ApWo3
8LTM1+CKPDjgQSWrEgQ4oFDlTUXCAmWuIwzNCRHtZyaYxNZKkG4TiXmr0tUe
JBjpq7CJC8hkmbgGmII7lQKnQ/I3zbS2W8r3AmyoKYNUEfYJGZvi1odanaaU
RhDP1hRDmNuSK/obUIWmaeAbiM4FbZ/Ky4oGsbDJ7kwxDngdpHaxENbdaoPW
rd2tWMlOGFcO0Oxte8dotdj2qNASVslbofYtC63TO8JqJ3J73+g7RNCR88kp
smZCgJL0CQ+RXeZMc7Qqc5gx7+2PwAI/sVyVTJVNGUDDMiNPJ00CfDgXF9oR
LJghgCqCCH6E2RPnGh6H/MuyORWAbmEGyBpaRQ3V+ez6iNWFD8/H8nX3FRqm
4RSQ55eCCj2/90lkaGWzXHFdA17ETIQJDifDttxXmzh/e/10rF4jIPcF6ii9
JWtkaHMEZkEzTOkVG5Nt8xMlVogQrXpjjKCU1rkysYxnEgAKQn9+A5AGTGEV
zxFoc0yXIrdJiHPpJDEe73jXic9H1thXsYTx7pBj9UbDZCkEyYb2b7OZcMao
13qOFIyKY2Vn9W045Ri2IAk7CBeFZMnEpSm5mMy8bibFNgExlmAgn0kVAiYG
1l9uhU1RtCFfijSPfNvnmk49OT27dE9JNJlRMm0kgByNBfcsFbFcDeVVkVkX
yIHwSICZoaLuLtfyGKe2gk1gwNTu2fq3ugP5ZezWI9lQcuvI+O2y8Y1XWSWc
Fv7A8ZRrxNt9xiR25AOjLoQR9nGtZGjXWCz5PT6RN5MW47CZKxUl2Z78ENYE
pKeOjK9QCntuOIrvigwidLa/XHO/7rX7rnCq3bIOl24IvjIDlwQWChGF0WWZ
IbvTRAldNBguHuTzTLe5v6P0ABTKcnFBDHTrTQbmsc6wdmdzakzTuKQi+DcX
ksfqAuBdMonSBGZcOgtlk23YuSSDL/rvMqGzdeMhFP5E/lazgesHsih2YAp4
WCtmI5bP2M9zJttAMLnSysnYqS/JPJBicnHIhbKUVGvpAo2dtdqD3rgK7NOP
x+o8vle0U43b3S5fW5JwEu1WdrJIWG+uLSvKPG25Dov8ou3ETa279UNdU9oC
wSdpuZYS8URwRvsLnG1zbgm/t0UjxIAakZISybmM3Xw5ZLweQUmDPsFZVjpt
2NIhNtHYfhkZmCG0gkqCHeO7lGlien3V9cAnl9MrKnjiD0g2JZAJp8krD6Vx
53ekDKJdYc20q7UFYkvieUfWmNEiA/2MCuEGAkZ64OQH5Uc/PGV38P04toKL
ppZlT8D5cOkSfNFxWhxS07ZRyv0iWhB/IBIO6cgAYP3LgpNBTvIhH3SCZRb3
lklrGquZOB/VpH/9td+epHoywRIQjb0nNWE3gGCGS4mkK4+ncWhcpYSU0jsq
FfjguSgTCf9l0RZnCZ3ja26v6L5k2UQ6yXEj+sGjJen7Jv6OCq1Qbdzidn6/
07+jMG+YcvNO0eb0kifq+RSeTBuPnbXp9TeCWfTo/HB38SRoKK/mJaxN3qYJ
71VtSScwkMx+eqiZxM59XnBOAKcrkm1U3FmkvvvgDGYwGLwOFQc28pDHUk0f
r0l503OLO4Ycj32OORDbJYNPKKVljNWuzMiBKK8JybV33F3HiUBtXd8Uduti
rZa5kxfSAi7XWvBZ0zY3yN5FOCqG5DkdMWPeRaFWGoChmiP8INBzLb0RtuzB
oNvboklywiQtVkpuEwAG9xaN4yRuDeJMNI6iPjaCzp6YKkaHTieAODiHpYzq
9aLm+y46JJCM20qBwnzEZ58FhbpWtwSGJVSUqrY5j7gphy3bsxFKEeamTUvT
wMUS8PMCxLww2DewGqAXVRlbqsU5ETarJi4A48ZVnwhZn7/Fiuc9+agxSM+T
WArTIk7ajG18nfqNyUMx/IFoOfSZjS+34aGUuTptJWTK7msFEjcVMTfKGMN+
Sl+dli01It/P7QQ0EtF8XNk5NTcZsLr6iydokBQRDSPjIXW0qo+sWChR08tF
mdCy9RlkcWmZlUsrwRWeT9UEv/wOutDTC5vV3OTe0QLxLS2hqakpMelBGfUb
uEbHeRM2k2cPGaEsxZDhMr8dMwvQfoKQzwXnCcD1qPuwdcFjkEeKs0Xn5PrF
w+EzwkosHtZdZzfi6zzCrm8E0Gt1/IABBcSMaJNsOWYGcnEaS66BEeXC0IOf
+iNb5KBcHEIIogGS7ns+uBGdsVTAJ3Cn3jnFTlJhsx7V5YhtnjfDhyhWXmZ0
yqYAq4tUNVSNeuXzqfCl7smfPZG+V3fkGXjHaXTvdrx1RD769k7xM9NreZwK
m/0ylaceVGRpefbOiBF70m4NuycEMYEwP6FHKCBHn4QZ8dkMibC/w+Hb7jBs
kMb2NiulLkmfvTofiqmBsJIQQG86WpvAGh/pu3PbXYoPWG2nt79DXpEln19O
kSUHtg6KIY9IXapXDSM8kClvzVZq892OQIc6121HHkmWGGQo+TCbw5yU82Ma
6qkwJOymilxVi9lF2Z6jloKT59PNek280wph74BQp8618U+QW3I2J/VBk7YV
NhIIcTBNbch+h77yIT5t9rT9+0kfU5ZecwJvhA5SgINY2WFziyJSVWaIwM1x
Qcgce663FIaZsXqts04r/NETCR4mc7h3bj9xD4vzrKD6XiPH8yvOwX3OKIdY
5MiPJ1PcN6cRivKOkxIiVo0nEHtCGqINlghuIgJjDLbiqWdlnOyR+U2vnT8g
QodNARDcB6GC8xbmGtpJfGLGLzvxqE2IyxZP43VWRKuw/rw99csyut+2TKKp
n3ZemZq7MnTgLJWHnpxO30Ewf2bfLqhm5OEjQGwrm7xIZTExQcHmFvv5fF7g
tayG0BkDKkAB2K5SkrrOS5YoPWFbYGmn9EODXxpuqg6lkudZw3zbeY/GI+Ri
Pd7pitXdidwiogSBaP/3MwXATn9CNnDwFO8MHCh2CMGuRrq9WtdNfCjsU7pJ
qojdR4ocoY8UAaRAgt+ATAC/4jGP3SjEonTSfILrYvtYhjLbFsIsP7XCtz/N
kPMgITkLbEqFiCgnbbzL+1o31wWMrkZTBLfRjYVKL2xVlVw2fEKHp5+yx3IF
maoDdJoaxk7dbyPeLsUgFyW7F0mkAiFVP2HSnZy6Y1kZd146xjY1dMqZDm2q
M5NBV20tezo9uw7ud0QsgiTqykAy+ShKau5jvDMxRwyLa1lqyDQ2Rt8WPoDQ
1vLJLDnHEkJLSmcFueTXMTDdnjnyWY5dbP3yc9atk8Ah4oW4EMybyP3OLqcm
o+YmLYlNpp+DCJnzPu4TEo+B3BvguYCxJpO+V7d0x02yBFgEkji+v5SOm/Dh
g7DjXg4ppPGSqH3vAzMWMOceA9lcPFbBMbWD9v70oRc7ViQVVVCkmhL7c3z+
jaKxHKHsE1aucMYQHRuTwQl47/fs0dpHqrJzxrI9KtZxeen/eROhRfjyNf1M
ilXUZAXJyHxoF2jbkZlako3J2UvGLznbT2lb73gld0D8uoj851RLJyuQracE
gqYCp86odUVNIEoGQ95MOqkx8JpzbKq35aG38Uujf5O1IeUZL8GJz6/fqMvT
0yFtY3p37FtTvJUY1huGOZRUinHxPn+kNYiLHh/R4UumoK4TV8VeJSkmIXsS
eWZLhJGWPuyd591JXbaU8DkOgL74zzmFL2b1inoh4+omHe2Rzo4NMMQ5Qsxo
YPE4QjwMwnB2zsTBuxG9R6fzwTcdnXtox6YySlMEs2tBQioRkVQ9tC0FDckn
RJeAlBb/uVgx6hfQugLTWXBJYkfrpiL760/RzYUkyDR5rqVO/1unK/tHwYaK
fm6UbfuuLydnF5oZYKe475txvoRN9bNEJttz5CIckem8TnmgVMCzJjWS5XXL
y7A/f6yyZyjDfoVszxGh2O2h93x5UhrH4dEyy+QXW719dNIH6Z3UJMS6NJv9
jRB1EV/d6YlkVs7dmP7J+NRQDVSiEB1ZFa/2FYLww4DfdQwWqpQDqn5kf6hn
TZ1jIPSnsOI12O52Z8EUaPXCELu53xHzLRah8Z1iYltzodTzwe6LGOAEec6G
dNBqCAoqpZ9J1jsHYnQTCVLzfkmGIXEB36niOiNFpba0jrN1XLJt7DGTje3S
1h+84Yw4GxxRBaFCsN05uivxoB0XKJVTgzM6u4jlWUUbBB45TcGRM5xR7LYA
eyuk4ShuUjNgC6/0Z7U+lJbz08xoX1NqVx+PzXniCM+Z7z0rI5v0GtB8u7tJ
V0VklbAlQhEfDbh880jDR85j0zH2WKSiaKGXEdIeMhnfnebz68b3TKRgwTVu
b+ahfhZKVf5AfmKdHx5xHTMgHzHeqIYtRaSUL7Fr3fEU6ebTGbJsRNwqvg8s
519g++ZrpdeWCYr81HonvsRMENY2D/r0RhO/C/J70sA8jqQcRV+NGhIR+Ggb
HwdpCzigZ01IwKGe1LqqWXNMEhd13V/a7D+B/oX8eMMjwlsyuYIUOxh0ry/j
dfoJz5Z/2WDvypoPt3P9UxIfOfMZIKsAQvYMo4tWr7e9qmkn4tFB0G0Myf1D
Qp6MDqW1EHsKFIUyX/hoA/NuROWw3wS1yqmJpiWMPcrJ0V+ASXaIfnXrm01x
Z9iFqSW4rFfsBlwnlqNiLGi7Vf3fDXRrbVy57hxG7hYzd38uEPugp13H5TDT
5qeRnva8uz2/T79Jl5h2PrmcPDoUP/D4MPSbqjn4Fo03SW4LoI5Jlxx+Br+e
SMfApP99sNCZMwefhX0IJFJRhpwus7ee2+niVv2si+XCWPW2KYfqzCIPHsqP
v4dqtmrw8o+aKvw/Wfp9Mv0sW75/11j/ydTJOFQT4BVAo4YxU9pdwSk6v2QY
D/4fhGpi7whCAAA=

-->

</rfc>
