<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-sidrops-rtr-selective-sync-06" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Selective Synchronization for RTR">Selective Synchronization Extension for RPKI-to-Router Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-rtr-selective-sync-06"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhuang" fullname="Shunwan Zhuang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuangshunwan@huawei.com</email>
      </address>
    </author>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy44@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 68?>
<t>The RPKI-to-Router (RTR) protocol synchronizes all the verified RPKI data to routers. This document proposes to extend the existing RTR protocol to support selective data synchronization. Selective synchronization can avoid unnecessary transmissions. The router can receive only the data that it really needs.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The RPKI-to-Router (RTR) protocol helps synchronize the validated RPKI data from a trusted cache to routers. There are already several versions of the protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/>. The supported types of data that can be transferred increase, which is shown in <xref target="tab-version"/>.</t>
      <table anchor="tab-version">
        <name>Supported data types in different versions of the RTR protocol</name>
        <thead>
          <tr>
            <th align="center">Version 0</th>
            <th align="center">Version 1</th>
            <th align="center">Version 2</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
            <td align="center">IPv4 Prefix</td>
          </tr>
          <tr>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
            <td align="center">IPv6 Prefix</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center">Router Key</td>
            <td align="center">Router Key</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">ASPA</td>
          </tr>
        </tbody>
      </table>
      <t>However, in some cases, routers may be interested in a part of RPKI data types, instead of all. In such cases, synchronizing all types of data to routers is unreasonable.</t>
      <t>Furthermore, there may be more types of RPKI data in the RPKI repositories and RPs in the future. Ignoring the router's requirements and directly synchronizing all types of data to the router may induce unnecessary and non-negligible transmission overheads. The followings are example types, and some of them may be possibly supported in the RPKI system in the future:</t>
      <ul spacing="normal">
        <li>
          <t>Secured Routing Policy Specification Language (RPSL) <xref target="RFC7909"/></t>
        </li>
        <li>
          <t>Signed Prefix Lists <xref target="I-D.ietf-sidrops-rpki-prefixlist"/></t>
        </li>
        <li>
          <t>Autonomous Systems Cones <xref target="I-D.ietf-grow-rpki-as-cones"/></t>
        </li>
        <li>
          <t>Mapping Origin Authorizations (MOAs) <xref target="I-D.xie-sidrops-moa-profile"/></t>
        </li>
        <li>
          <t>Signed SAVNET-Peering Information (SiSPI) <xref target="I-D.chen-sidrops-sispi"/></t>
        </li>
        <li>
          <t>Path validation with RPKI <xref target="I-D.van-beijnum-sidrops-pathrpki"/></t>
        </li>
        <li>
          <t>Signed Groupings of Autonomous System Numbers <xref target="I-D.spaghetti-sidrops-rpki-asgroup"/></t>
        </li>
        <li>
          <t>Autonomous System Relationship Authorization (ASRA) <xref target="I-D.geng-sidrops-asra-profile"/></t>
        </li>
      </ul>
      <t>This document extends the RTR protocol to support selective data synchronization. The RTR client can subscribe to specific types of RPKI data from the server via the Subscribe PDU. After a successful subscription, the server will only synchronize the subscribed types of RPKI data to the corresponding client, reducing unnecessary data transmission and improving efficiency.
The extension is valuable for scenarios where routers require only specific RPKI data types to meet their operational needs.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-solution">
      <name>Subscribing Data PDU</name>
      <t>This document defines a new type of PDU for the RTR protocol, specifically named the Subscribing Data PDU. The purpose of this new RTR PDU is to enable a router to explicitly indicate to the RTR server the specific types of RPKI data it is interested in receiving. 
The format of the Subscribing Data PDU is illustrated in <xref target="fig-subscribe"/>, which outlines the structure and arrangement of each field within the PDU.</t>
      <figure anchor="fig-subscribe">
        <name>Format of Subscribing Data PDU</name>
        <artwork><![CDATA[
0          8          16         24        31
.-------------------------------------------.
| Protocol |   PDU    |                     |
| Version  |   Type   |         Zero        |
|          |          |                     |
+-------------------------------------------+
|                                           |
|                  Length                   |
|                                           |
+-------------------------------------------+
|  Data    |          |         | Data      |
|  Type 1  | ...      | ...     | Type N    |
|          |          |         |           |
`-------------------------------------------'
]]></artwork>
      </figure>
      <t>The Subscribing Data PDU contains the following data elements. Note that all fields within the Subscribing Data PDU, except for the newly introduced PDU Type field and Data Type fields, retain the same meanings as defined in the existing RTR protocol <xref target="I-D.ietf-sidrops-8210bis"/>.</t>
      <ul spacing="normal">
        <li>
          <t>Protocol Version: An 8-bit unsigned integer. To support this new PDU type, a new version of the RTR protocol (e.g., 3) will be required, as the existing protocol version does not include provisions for this subscription mechanism.</t>
        </li>
        <li>
          <t>PDU Type: An 8-bit unsigned integer. A new PDU Type value (TBD) is required for the Subscribing Data PDU.</t>
        </li>
        <li>
          <t>Zero: All bits <bcp14>SHOULD</bcp14> be set to 0. The field <bcp14>MUST</bcp14> be ignored when parsing the PDU.</t>
        </li>
        <li>
          <t>Length: A 32-bit unsigned integer which has as its value the count of the octets in the entire PDU, including the 8 octets of header which includes the length field. The meaning and limitation keep same as the existing RTR protocol.</t>
        </li>
        <li>
          <t>Data Types: A list of 8-bit unsigned integers, where each integer specifies a Data Type that the router intends to subscribe to. It is explicitly defined that the values assigned to these Data Type fields are consistent with the PDU Type values that have already been allocated to different types of RTR data in the existing RTR protocol, ensuring consistency with the existing RTR protocol specifications and avoiding any ambiguity in data type identification.
Currently, the valid values for the Data Type fields (corresponding to the supported RTR data types) are as follows: 4 for IPv4 Prefix data, 6 for IPv6 Prefix data, 9 for Router Key data, and 11 for Autonomous System Provider Authorization (ASPA) data. Additional valid values may be added in future protocol versions as new RTR data types are defined. If the Subscribing Data PDU does not carry any Data Type fields, this indicates that the router subscribes to all data types supported by the current version of the RTR protocol.</t>
        </li>
      </ul>
    </section>
    <section anchor="process-of-subscribing-data">
      <name>Process of Subscribing Data</name>
      <t>A router may send a Subscribing Data PDU to subscribe to specific RTR data at any stage after establishing an RTR session with the RTR server. It is required that a single Subscribing Data PDU carry the complete subscription information. The subscription information <bcp14>MUST NOT</bcp14> be split and carried across multiple Subscribing Data PDUs. If the router intends to update its existing subscription, it can send a new Subscribing Data PDU, which will overwrite the previous subscription entirely. When the router changes its subscription information, it shall determine how to handle the data it has already received and stored locally that is not within the scope of the new subscription (e.g., deleting data that is no longer in the new subscription scope).</t>
      <t>If a router does not send any Subscribing Data PDU after establishing the RTR session, or if the sent Subscribing Data PDU does not carry any Data Type fields, this indicates that the router subscribes to all data types supported by the current version of the RTR protocol. If the Data Type fields carried in the Subscribing Data PDU contain duplicate values, the RTR server shall simply ignore the duplicate entries and only process each unique Data Type value once, ensuring that the subscription configuration is consistent and free of redundant entries.</t>
      <t>The RTR server is required to maintain subscription information for each active RTR session individually. When synchronizing data (either full synchronization or incremental synchronization) to the router through a session, the server shall check the subscription information corresponding to that session and only synchronize the data types that the router has subscribed to, thereby avoiding the transmission of unnecessary data.</t>
      <t>It is important to note that the server's implementation of the Serial Number remains unchanged. The cache still maintains a single Serial Number, regardless of the subscription configurations of different sessions. This design minimizes the need for extensive modifications to existing RTR protocol implementations.</t>
      <t>There may be scenarios where data on the RTR server is updated, and the server sends a Serial Notify PDU to the router to inform it of the new data availability. However, when the router sends a Serial Query PDU to request the updated data, all requested data may be filtered out by the server. This occurs when the updated data does not match any of the data types the router has subscribed to.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>The proposal requires a new version value (e.g., 3) for the RTR protocol.</t>
      <t>All of the PDU types in the IANA "rpki-rtr-pdu" registry <xref target="iana-pdu"/> in protocol versions 0, 1, and 2 are also allowed in protocol version 3, with the addition of the new Subscribing Data PDU. The type value of the new PDU needs to be allocated. The "rpki-rtr-pdu" registry needs to be updated as follows:</t>
      <artwork><![CDATA[
      Protocol   PDU
      Version    Type  Description
      --------   ----  ---------------
        0-2        0   Serial Notify
        0-2        1   Serial Query
        0-2        2   Reset Query
        0-2        3   Cache Response
        0-2        4   IPv4 Prefix
        0-2        6   IPv6 Prefix
        0-2        7   End of Data
        0-2        8   Cache Reset
          0        9   Reserved
        1-2        9   Router Key
        0-2       10   Error Report
        0-1       11   Reserved
          2       11   ASPA
          3      TBD   Subscribing Data
        0-3      255   Reserved
]]></artwork>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="I-D.ietf-sidrops-8210bis"/> also applies to this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-24" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Arrcus, DRL, &amp; IIJ Research</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <author fullname="Tom Harrison" initials="T." surname="Harrison">
              <organization>Asia Pacific Network Information Centre</organization>
            </author>
            <date day="5" month="February" year="2026"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data, Router Keys, and ASPA data from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-24"/>
        </reference>
        <reference anchor="iana-pdu" target="https://www.iana.org/assignments/rpki#rpki-rtr-pdu">
          <front>
            <title>rpki-rtr-pdu</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="10" month="December" year="2025"/>
            <abstract>
              <t>This document defines a "Signed Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (the subject AS) may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the subject AS produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by the subject AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-05"/>
        </reference>
        <reference anchor="I-D.xie-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-xie-sidrops-moa-profile-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.xie-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <author fullname="Di Ma" initials="D." surname="Ma">
              <organization>ZDNS</organization>
            </author>
            <date day="26" month="September" year="2024"/>
            <abstract>
              <t>For the authenticity of the mapping origin of IPv4 address block in IPv6-only networks, this document defines a standard profile for Mapping Origin Authorizations (MOAs). MOA is a cryptographically signed object that provides a means of verifying that the holder of a set of IPv4 prefixes has authorized an IPv6 mapping prefix to originate mapping for those prefixes. When receiving the MOA objects from the relying parties, PE devices can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-xie-sidrops-moa-profile-06"/>
        </reference>
        <reference anchor="I-D.chen-sidrops-sispi" target="https://datatracker.ietf.org/doc/html/draft-chen-sidrops-sispi-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.chen-sidrops-sispi.xml">
          <front>
            <title>A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="September" year="2025"/>
            <abstract>
              <t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-04"/>
        </reference>
        <reference anchor="I-D.geng-sidrops-asra-profile" target="https://datatracker.ietf.org/doc/html/draft-geng-sidrops-asra-profile-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.geng-sidrops-asra-profile.xml">
          <front>
            <title>A Profile for Autonomous System Relationship Authorization (ASRA)</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>NIST</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="17" month="October" year="2025"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Relationship Authorization (ASRA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASRA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its customers and lateral peers. When validated, an ASRA's eContent can be used for detection and mitigation of BGP AS path manipulation attacks together with Autonomous System Provider Authorization (ASPA). ASRA is complementary to ASPA.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-asra-profile-02"/>
        </reference>
      </references>
    </references>
    <?line 201?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
