<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-sidrops-sispi-05" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Signed SAVNET-Peering Information">A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-05"/>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="17"/>
    <area>Ops</area>
    <workgroup>SIDR Operations</workgroup>
    <abstract>
      <?line 74?>

<t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter-domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
    </abstract>
  </front>
  <middle>
    <?line 78?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="inter-domain-ps"/>.</t>
      <t>Inter-domain SAVNET <xref target="savnet"/> proposes to exchange SAV-specific information among ASes to solve the problems of existing inter-domain SAV mechanisms. Two SAV-specific information exchanging protocols (or SAVNET protocols for short) are shown to achieve higher validation accuracy and lower operational overhead in large-scale emulations <xref target="emu-9-savs"/>. However, operators face significant difficulties in deploying SAVNET protocols. To benefit Internet routing, supporting incremental deployment is an essential requirement of SAVNET protocols <xref target="inter-domain-ps"/>. As illustrated in the Section 9.2 of <xref target="savnet"/>, during the partial or incremental deployment of SAVNET protocols, protocol-speaking agents (or SAVNET agents) within the SAVNET-adopting ASes need to find and establish connections with other SAVNET agents. Currently, there is no mechanism to achieve this automatically, and operators of SAVNET-adopting ASes must configure peering SAVNET relationship by hand, which is slow and error-prone.</t>
      <t>The neighbor discovery and connection setup process of SAV protocols can be done in an automatic and correct manner, with the introduction of a public registry that contains all ASes which both deploy SAVNET and are willing to setup SAVNET peering relationships. A newly adopting AS can use this registry as a reference, and pick appropriate ASes to setup SAVNET peering relationship.</t>
      <t>The Resource Public Key Infrastructure (RPKI) is the most suitable to host this public registry, because the primary purpose of RPKI is to improve routing security <xref target="RFC6480"/>, and defending against address spoofing is a main aspect of routing security. To this end, a mechanism is needed to facilitate holders of Automous System (AS) identifiers to declare their deployment of SAVNET <xref target="savnet"/>. The digitally Signed SAVNET-Peering Information (SiSPI) object described in this document serves the function.</t>
      <t>A SiSPI object is a cryptographically verifiable attestation signed by the holder of an AS identifier. It contains the identification information of one AS, which means the listed AS has deployed SAVNET and can perform SAV on its data plane.</t>
      <t>The SiSPI object makes use of the template for RPKI digitally signed objects <xref target="RFC6488"/>, which defines a Crytopgraphic Message Syntax (CMS) <xref target="RFC5652"/> wrapper for the SiSPI content as well as a generic validation procedure for RPKI signed objects. In accordance with Section 4 of <xref target="RFC6488"/>, this document defines:</t>
      <ol spacing="normal" type="1"><li>
          <t>The object identifier (OID) that identifies the SiSPI object. This OID appears in the eContentType field of the enCapContentInfo object as well as the content-type signed attribute within the signerInfo structure.</t>
        </li>
        <li>
          <t>The ASN.1 syntax for the SiSPI eContent, which is the payload that specifies the AS deploying SAVNET. The SiSPI eContent is encoded using the ASN.1 Distinguished Encoding Rules (DER) <xref target="X.690"/>.</t>
        </li>
        <li>
          <t>The steps required to validate a SiSPI beyond the validation steps specified in <xref target="RFC6488"/>.</t>
        </li>
      </ol>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document makes use of the terms and concepts described in "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile" <xref target="RFC5280"/>, "X.509 Extensions for IP Address and AS Identifiers" <xref target="RFC3779"/>, "Signed Object Template for the Resource Public Key Infrastructure (RPKI)" <xref target="RFC6488"/>, and "A Profile for X.509 PKIX Resource Certificates" <xref target="RFC6487"/>. The readers should be familiar with the terms and concepts.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sav-content">
      <name>The SiSPI ContentType</name>
      <t>The content-type for a SiSPI object is defined as id-ct-rpkiSiSPI, which has the numerical value of 1.2.840.113549.1.9.16.1.TBD. This OID <bcp14>MUST</bcp14> appear both within the eContentType in the encapContentInfo structure as well as the ContentType signed attribute within the signerInfo structure (see <xref target="RFC6488"/>).</t>
    </section>
    <section anchor="sav-econtent">
      <name>The SiSPI eContent</name>
      <t>The content of a SiSPI object identifies a single AS that has deployed SAVNET <xref target="savnet"/> for inter-domain SAV and a list of its IP addresses. The eContent of a SiSPI object is an instance of SAVNETAttestation, formally defined by the following ASN.1 <xref target="X.680"/> module:</t>
      <artwork><![CDATA[
RpkiSiSPI-2024
     { iso(1) member-body(2) us(840) rsadsi(113549)
       pkcs(1) pkcs9(9) smime(16) mod(0)
       id-mod-rpkiSiSPI-2024-2024(TBD0) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  CONTENT-TYPE
  FROM CryptographicMessageSyntax-2010 -- in [RFC6268]
    { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
      pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

ct-rpkiSiSPI CONTENT-TYPE ::=
  { TYPE SAVNETAttestation IDENTIFIED BY id-ct-rpkiSiSPI }

id-ct-rpkiSiSPI OBJECT IDENTIFIER ::=
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
    pkcs-9(9) id-smime(16) id-ct(1) TBD1 }

SAVNETAttestation ::= SEQUENCE {
  version [0]   INTEGER DEFAULT 0,
  asID          ASID,
  addresses     SEQUENCE OF IPFamilyAddresses }

ASID ::= INTEGER (0..4294967295)

IPFamilyAddresses ::= SEQUENCE {
  ipFamily    IP-ADDRESS-FAMILY.&afi ({IPAddressFamilySet}),
  ipAddresses IP-ADDRESS-FAMILY.&IPAddresses ({IPAddressFamilySet}{@ipFamily}) }

IP-ADDRESS-FAMILY ::= CLASS {
     &afi          OCTET STRING (SIZE(2)) UNIQUE,
     &IPAddresses
   } WITH SYNTAX { AFI &afi IP &IPAddresses }

IPAddressFamilySet IP-ADDRESS-FAMILY ::= { ipAddressFamilyIPv4 | ipAddressFamilyIPv6 }

ipAddressFamilyIPv4 IP-ADDRESS-FAMILY ::= { AFI afi-IPv4 IP IPv4Addresses }

ipAddressFamilyIPv6 IP-ADDRESS-FAMILY ::= { AFI afi-IPv6 IP IPv6Addresses }

afi-IPv4 OCTET STRING ::= '0001'H

afi-IPv6 OCTET STRING ::= '0002'H

IPv4Addresses ::= SEQUENCE (SIZE(1..MAX)) OF IPAddress{ub-IPv4}

IPv6Addresses ::= SEQUENCE (SIZE(1..MAX)) OF IPAddress{ub-IPv6}

ub-IPv4 INTEGER ::= 32

ub-IPv6 INTEGER ::= 128

IPAddress {INTEGER: ub} ::= BIT STRING (SIZE(0..ub))

END
]]></artwork>
      <t>Note that this content appears as the eContent within the encapContentInfo as specified in <xref target="RFC6488"/>.</t>
      <section anchor="version">
        <name>version</name>
        <t>The version number of the SAVNETAttestation that compiles with this specification <bcp14>MUST</bcp14> be 2 and <bcp14>MUST</bcp14> be explicitly encoded.</t>
      </section>
      <section anchor="asid">
        <name>asID</name>
        <t>The asID field contains the AS number that has deployed SAVNET and can perform SAV on the data plane.</t>
      </section>
      <section anchor="addresses">
        <name>addresses</name>
        <t>The addresses field contains a SEQUENCE of IPFamilyAddresses, which stores the router's IP addresses within the AS whose ID is asID, which is utilized for establishing SAVNET connections.</t>
        <section anchor="element-ipfamilyaddresses">
          <name>Element IPFamilyAddresses</name>
          <t>This field contains a SEQUENCE which contains one instance of ipFamily and one instance of ipAddresses.</t>
          <section anchor="ipfamily">
            <name>ipFamily</name>
            <t>This field contains an OCTET STRING which is either '0001'H (IPv4) or '0002'H (IPv6).</t>
          </section>
          <section anchor="ipaddresses">
            <name>ipAddresses</name>
            <t>This field contains a SEQUENCE of IPAddress instances.</t>
          </section>
          <section anchor="element-ipaddress">
            <name>Element IPAddress</name>
            <t>This element is length bounded through the Information Object Class IP-ADDRESS-FAMILY and its type is a BIT STRING.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="sav-v">
      <name>SiSPI Validation</name>
      <t>Before, a relying party can use a SiSPI object to validate the deployment of SAVNET for inter-domain SAV, the relying party <bcp14>MUST</bcp14> first validate the SiSPI object. To validate a SiSPI object, the relying party <bcp14>MUST</bcp14> perform all the validation checks specified in <xref target="RFC6488"/> as well as the following additional specific validation steps of the Signed AS List.</t>
      <ul spacing="normal">
        <li>
          <t>The contents of the CMS eContent field <bcp14>MUST</bcp14> adhere to all the constraints described in <xref target="sav-content"/>.</t>
        </li>
        <li>
          <t>The AS Identifier Delegation Extension <xref target="RFC3779"/> <bcp14>MUST</bcp14> be present in the end-entity (EE) certificate (contained within the SiSPI object), and the asID in the SiSPI object eContent <bcp14>MUST</bcp14> be contained within the set of AS numbers specified by the EE certificate's AS Identifier Delegation Extension.</t>
        </li>
        <li>
          <t>The EE certificate's AS Identifier Delegation Extension <bcp14>MUST NOT</bcp14> contain any ''inherit'' elements.</t>
        </li>
        <li>
          <t>The IP Address Delegation Extension <xref target="RFC3779"/> <bcp14>MUST</bcp14> be absent.</t>
        </li>
      </ul>
      <t>The pseudocode for SiSPI validation is as follows:</t>
      <artwork><![CDATA[
function ValidateSiSPI(sispiObject, eeCertificate):
    // Step 1: Validate the SiSPI object using the generic RPKI 
    //         validation procedure.
    // This includes checking the CMS wrapper, signature, and 
    //         certification path.
    if not IsValidRPKISignedObject(sispiObject):
        return False, "Invalid RPKI Signed Object"

    // Step 2: Check the content-type of the SiSPI object.
    if not sispiObject.eContentType == SAVNETAuthzOID:
        return False, "Invalid content-type"

    // Step 3: Parse the eContent of the SiSPI object as 
    //         SAVNETAttestation.
    sispiContent = ParseSAVNETAttestation(sispiObject.eContent)
    if sispiContent is None:
        return False, "Unable to parse SAVNETAttestation"

    // Step 4: Ensure the version number is explicitly set to 2.
    if not (sispiContent.version exists and sispiContent.version==2):
        return False, "Invalid version"

    // Step 5: Validate the AS Identifier Delegation Extension in
    //         the EE certificate.
    if not ValidateASIdExt(eeCertificate, sispiContent.asID):
        return False, "AS Identifier Extension validation failed"

    // Step 6: Ensure the EE certificate's AS Identifier Delegation
    //         Extension does not contain 'inherit'.
    if "inherit" in eeCertificate.asIdentifiers:
        return False, 
               "AS Identifier Delegation Extension contains 'inherit'"

    // Step 7: Ensure the IP Address Delegation Extension is absent.
    if HasIPAddressDelegationExtension(eeCertificate):
        return False, "IP Address Delegation Extension is present"

    // Step 8: Determine if all validation checks are successful.
    return True, "SiSPI object is valid"

function ValidateASIdentifierExtension(eeCertificate, asID):
    // Check if the asID is within the set of AS numbers 
    //   specified by the AS Identifier Delegation Extension.
    return asID in eeCertificate.asIdentifiers

function HasIPAddressDelegationExtension(eeCertificate):
    // Check for the presence of the IP Address Delegation 
    //   Extension.
    return "ipAddresses" in eeCertificate.extensions
]]></artwork>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="rpki-signed-object-registry">
        <name>RPKI Signed Object Registry</name>
        <t>Please add an item for the SiSPI object file extension to the RPKI Signed Object registry (https://www.iana.org/assignments/rpki/rpki.xhtml#signed-objects) as follows:</t>
        <artwork><![CDATA[
Name                              | OID                                    | Reference
-----------------------------------------------------------------------------------------------------
Signed SAVNET-Peering Information | 1.2.840.113549.1.9.16.1.TBD            | draft-chen-sidrops-sispi
]]></artwork>
      </section>
      <section anchor="rpki-repository-name-scheme-registry">
        <name>RPKI Repository Name Scheme Registry</name>
        <t>Please add an item for the SiSPI object file extension to the "RPKI Repository Name Scheme" registry created by <xref target="RFC6481"/> as follows:</t>
        <artwork><![CDATA[
Filename
Extension | RPKI Object                       | Reference
------------------------------------------------------------------------
   .sav   | Signed SAVNET-Peering Information | draft-chen-sidrops-sispi
]]></artwork>
      </section>
      <section anchor="smi-security-for-smime-module-identifier-1284011354919160">
        <name>SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)</name>
        <t>IANA is requested to allocate the following in the "SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)" registry:</t>
        <artwork><![CDATA[
Decimal | Description                | Reference
---------------------------------------------------------------
TBD     | id-mod-rpkiSiSPI-2024-2024 | draft-chen-sidrops-sispi
]]></artwork>
      </section>
      <section anchor="media-type-registry">
        <name>Media Type Registry</name>
        <t>The IANA is requested to register the media type application/rpki-sispi in the "Media Type" registry as follows:</t>
        <artwork><![CDATA[
Type name: application
Subtype name: rpki-sispi
Required parameters: N/A
Optional parameters: N/A
Encoding considerations: binary
Security considerations: Carries Signed SAVNET-Peering Information.
  This media type contains no active content. See
  Section 4 of draft-chen-sidrops-sispi for further information.
Interoperability considerations: None
Published specification: draft-chen-sidrops-sispi
Applications that use this media type: RPKI operators
Additional information:
  Content: This media type is a signed object, as defined
      in {{RFC6488}}, which contains a payload of an AS identifer
      as defined in draft-chen-sidrops-sispi.
Magic number(s): None
File extension(s): .sav
Macintosh file type code(s):
Person & email address to contact for further information:
Li Chen <lichen@zgclab.edu.cn>
Intended usage: COMMON
Restrictions on usage: None
Change controller: IETF
]]></artwork>
      </section>
    </section>
    <section anchor="using-sispi">
      <name>Using SiSPI</name>
      <t>A router can use the AS_Path from BGP announcements, ASPA objects, and SiSPI to find the closest ASes to set up SAVNET peering, as described below:</t>
      <ol spacing="normal" type="1"><li>
          <t>BGP AS_Paths Analysis:  </t>
          <ul spacing="normal">
            <li>
              <t>Collect AS paths from BGP announcements.</t>
            </li>
            <li>
              <t>Determine the frequency or preference of certain AS paths based on routing policies, which may involve path attributes like AS path length, origin type, local preference, and MED (Multi-Exit Discriminator).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>ASPA Verification:  </t>
          <ul spacing="normal">
            <li>
              <t>Use ASPA objects to verify the legitimacy of customer-provider AS relationships.</t>
            </li>
            <li>
              <t>Ensure that the AS paths conform to the customer-provider relationships indicated by the ASPAs, thereby validating the correctness of the routing information.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Peering Candidates Determination:  </t>
          <ul spacing="normal">
            <li>
              <t>Identify the ASes that frequently appear on the preferred paths to various destinations, implying they are topologically 'close' or significant transit providers.</t>
            </li>
            <li>
              <t>Among these ASes, rank those according to their frequency in an descending order, since the frequency indicates the weight of traffic from the local AS and higher frequency represents more volume of traffic to transmit for the local AS.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>SiSPI Objects Utilization:  </t>
          <ul spacing="normal">
            <li>
              <t>Retrieve SiSPI objects from the RPKI repository to determine which ASes have deployed SAVNET.</t>
            </li>
            <li>
              <t>Filter the previously identified candidate ASes by checking whether they have a valid SiSPI object, which would indicate their readiness to establish SAVNET peering.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Peering Candidates Selection:  </t>
          <ul spacing="normal">
            <li>
              <t>From the set of candidate ASes with valid SiSPI objects, select candidates for SAVNET peering based on their rankings.</t>
            </li>
            <li>
              <t>The selection criteria may include additional factors such as existing peering policies, traffic volumes, and peering agreements.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Peering Establishment:  </t>
          <ul spacing="normal">
            <li>
              <t>Initiate peering negotiations with the selected candidate ASes.</t>
            </li>
            <li>
              <t>Upon successful negotiation, establish SAVNET peering relationships and configure the necessary SAVNET protocols.</t>
            </li>
          </ul>
        </li>
      </ol>
      <t>Based on the above steps, a description of the detailed procedure to establish SAVNET peering relationships is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Let the set of selected AS paths to all the potential destinations be denoted as ASPaths.</t>
        </li>
        <li>
          <t>Let i = 1. Validate ASPaths(i) using ASPA objects.</t>
        </li>
        <li>
          <t>Let the set of validated AS paths be denoted as ASPaths-V.</t>
        </li>
        <li>
          <t>If ASPaths(i) passes the validation of ASPA objects, add it to ASPaths-V.</t>
        </li>
        <li>
          <t>Increment i to i+1.</t>
        </li>
        <li>
          <t>If ASPaths(i) is null, then set i_max = i - 1 and go to Step 7. Else, go to Step 4.</t>
        </li>
        <li>
          <t>Let j = 1 and k = 1. Initialize AS-set S(1) = ASPaths-V(1)(1) and N(ASPaths-V(1)(1)) = 1.</t>
        </li>
        <li>
          <t>If ASPaths-V(j)(k) belongs to S, N(ASPaths-V(j)(k)) = N(ASPaths-V(j)(k)) + 1. Else, N(ASPaths-V(j)(k)) = 1 and S(J * k) = ASPaths-V(j)(k).</t>
        </li>
        <li>
          <t>Increment k to k+1.</t>
        </li>
        <li>
          <t>If ASPaths-V(j)(k) is null, then go to Step 11. Else, go to Step 8.</t>
        </li>
        <li>
          <t>Increment j to j+1.</t>
        </li>
        <li>
          <t>If ASPaths-V(j)(k) is null, then go to Step 13. Else, go to Step 8.</t>
        </li>
        <li>
          <t>Rank the AS-set N according to its values in descending order.</t>
        </li>
        <li>
          <t>Retrieve SiSPI objects from the RPKI repository and let the set of ASes within the SiSPI objects be denoted as O.</t>
        </li>
        <li>
          <t>Let m = 1. Create a SAVNET neighbor candidate set C.</t>
        </li>
        <li>
          <t>If N(m) belongs to O, add N(1) to C.</t>
        </li>
        <li>
          <t>Increate m to m + 1.</t>
        </li>
        <li>
          <t>If N(m) is null or the number of ASes in set C exceeds 4000, go to Step 19. Else, go to Step 16.</t>
        </li>
        <li>
          <t>Establish SAVNET peering relationship with the selected candidate ASes in set C.</t>
        </li>
      </ol>
    </section>
    <section anchor="newly-savnet-adopting-ases">
      <name>Newly SAVNET-adopting ASes</name>
      <t>The newly SAVNET-adopting ASes need to register the SiSPI object proactively to help other SAVNET-adopting ASes find it and establish SAVNET peering relationships, as well as using the SiSPI objects to establish SAVNET peering relationships with other SAVNET-adopting ASes.</t>
      <t>To register the SiSPI object, the newly SAVNET-adopting ASes should share its information as described in <xref target="sav-econtent"/>.</t>
      <t>To establish SAVNET peering relationships with other SAVNET-adopting ASes, the newly SAVNET-adopting ASes should collect BGP announcements, ASPA objects, and SiSPI objects, and run the procedures described in <xref target="using-sispi"/>.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC6481"/>, <xref target="RFC7935"/>, and <xref target="RFC6488"/> also apply to the SiSPI object.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6488">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC7935">
          <front>
            <title>The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." role="editor" surname="Michaelson"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and certification requests as well as for the relying parties (RPs) that verify these digital signatures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7935"/>
          <seriesInfo name="DOI" value="10.17487/RFC7935"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules&amp;#59; Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Information technology - Abstract Syntax Notation One (ASN.1)&amp;#59; Specification of basic notation</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="savnet" target="https://datatracker.ietf.org/doc/draft-wu-savnet-inter-domain-architecture/">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author>
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="emu-9-savs" target="https://datatracker.ietf.org/meeting/118/materials/slides-118-savnet-emulations-of-nine-sav-mechanisms-with-sav-open-playground-00">
          <front>
            <title>Emulations of 9 SAV Mechanisms with SAV Open Playground</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
