Internet DRAFT - draft-fu-sidr-unexpected-scenarios
draft-fu-sidr-unexpected-scenarios
Secure Inter-Domain Routing Y. Fu
Internet-Draft Z. Yan
Intended status: Informational X. Liu
Expires: March 16, 2017 C. Wang
CNNIC
September 12, 2016
Scenarios of unexpected resource assignment in RPKI
draft-fu-sidr-unexpected-scenarios-02
Abstract
There are some unexpected scenarios where a CA allocates resources to
the sub-node caused by misoperation or malicious operation of CA in
RPKI. Then some mechanisms may be needed to avoid these scenarios to
happen. This document describes these scenarios and related
experiments are presented.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on March 16, 2017.
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
Fu, et al. Expires March 16, 2017 [Page 1]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. The scenarios of unexpected resource assignment . . . . . . . 3
3.1. Unauthorized resource assignment . . . . . . . . . . . . 3
3.2. Resource reassignment . . . . . . . . . . . . . . . . . . 3
3.3. Resource transfer . . . . . . . . . . . . . . . . . . . . 4
4. Experimental Result . . . . . . . . . . . . . . . . . . . . . 4
4.1. Unauthorized resource assignment . . . . . . . . . . . . 4
4.1.1. Completely unauthorized assignment . . . . . . . . . 4
4.1.2. Partially unauthorized assignment . . . . . . . . . . 6
4.2. Resource reassignment . . . . . . . . . . . . . . . . . . 8
4.2.1. Matching case . . . . . . . . . . . . . . . . . . . . 8
4.2.2. Intersection case . . . . . . . . . . . . . . . . . . 10
4.2.3. Subset case . . . . . . . . . . . . . . . . . . . . . 12
4.3. Resource transfer . . . . . . . . . . . . . . . . . . . . 14
5. Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.1. The CA function enhancement . . . . . . . . . . . . . . . 15
5.2. The RP function enhancement . . . . . . . . . . . . . . . 15
6. Security Considerations . . . . . . . . . . . . . . . . . . . 15
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 15
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 15
9.1. Normative References . . . . . . . . . . . . . . . . . . 15
9.2. Informative References . . . . . . . . . . . . . . . . . 16
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16
1. Introduction
n RPKI, CAs (Certification Authorities) are organized in a
hierarchical structure which is aligned to the existing INR (Internet
Number Resources, including IP prefixes and AS numbers) allocation
hierarchy. Each INR allocation requires corresponding resource
certificates to attest to it. Two important resource certificates
[RFC6480] are needed during this allocation process, and they are CA
certificates and EE (End-entity) certificates: CA certificates attest
to the INR holdings; EE certificates are primarily used for the
validation of ROAs (Route Origin Authorizations) [RFC6482] which is
used to verify whether an AS is permitted to originate routes to
specific IP prefixes. Besides, Manifest [RFC6486] is used to ensure
the integrity of the repository. So the operation of CA is very
important for the RPKI deployment and applications based on it.
Fu, et al. Expires March 16, 2017 [Page 2]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
Considering misoperation and malicious operation are inevitable and
the significant impact they may cause, this draft describes and
analyzes some scenarios of the unexpected resource assignment caused
by CA in RPKI deployment. Then some experiments are given to show
these scenarios more clearly. Some suggestions are also proposed to
avoid corresponding side-effects.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. The scenarios of unexpected resource assignment
As described in [RFC6480], the holder of resource ( IP addresses and
AS numbers ) may reallocate portions of that block, to the sub-node,
subject to contractual constraints established by the registries.
But some scenarios of unexpected resource allocation may be caused by
the misoperaion of malicious operation of the CA as below: for
simplicity, we describe some scenarios with the AS number allocation
case.
3.1. Unauthorized resource assignment
For this scenario, a CA allocates a block of IP address which does
not belong to him to subordinate node. That is, this CA doesn't own
this block of IP Prefixes actually. So the sub-node cannot use these
addresses. But in RPKI scenario, this assignment could be operated
successfully. This scenario may be caused by misoperation of the CA
or on purpose.
According to the resources to be allocated, we divide this case into
two kinds of scenarios: Completely unauthorized assignment and
Partially unauthorized assignment.
(1) Completely unauthorized assignment: the resources to be allocated
to subordinate node are without the ownership of CA.
(2) Partially unauthorized assignment: the resources to be allocated
to subordinate node are with the partially ownership of CA.
3.2. Resource reassignment
In this scenario, a CA reassign the resource to one sub-node which
has been already assigned to another sub-node. This scenario could
be sorted into three types:
Fu, et al. Expires March 16, 2017 [Page 3]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
(1) Matching: the block of IP address which is reassigned is the same
as which has been already assigned to the other sub-node.
(2) Subset: The block of IP address which is reassigned is smaller
than which has been already assigned to the other sub-node.
(3) Intersection: The block of IP address which is reassigned has
overlap with which has been already assigned to the other sub-node.
3.3. Resource transfer
In practice, resource transfer between two Internet registries is
reasonably achievable for most useful operational needs. For the
resource transfer, a block of IP addresses will be transferred from
one sub-node to the other. This scenario is described in
[I-D.ymbk-sidr-transfer] in more detail. The resource reassignment
may happened in this scenario by the misoperation of the CA.
4. Experimental Result
We test the scenarios described above in our testbed. In this
section, we present the test results for each case and analyze these
results.
4.1. Unauthorized resource assignment
4.1.1. Completely unauthorized assignment
The test scenario is described in Figure 1: APNIC allocates AS number
65551 and IP prefixes of 192.0.3.128/26 to TWNIC. But APNIC doesn't
own this resource completely. We simulated this process of
assignment on our testbed and the result is illustrated in Figure 2.
Fu, et al. Expires March 16, 2017 [Page 4]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
ASNs;
+-------------+ 64496-64511,65536-65551
| | IP prefixes:
| IANA +---------192.0.2.0/24,198.51.100.0/24
| | 203.0.113.0/24
+------|------+
|
+-------------+ ASNs
| | 64497-64510,65537-65550
| | IP prefixes:
| APNIC ---------192.0.2.128/25,
| | 198.51.100.128/25
-------|------+ 203.0.113.128/25
| | |
----------------| | |---------------
| | |
+-----------+ +------|------+ +-----------+
| JPNIC | | TWNIC | | CNNIC |
+-----|-----+ +------|------+ +----|------+
| | |
ASNs: ASNs: ASNs:
65540-65550 65551 64498-64505
IP prefixes IP prefixes IP prefixes:
203.0.113.128/26 192.0.3.128/26 192.0.2.128/26
198.51.100.128/26
Figure 1: The network architecture of the completely unauthorized
assignment
We test this case with the tools offered by http://rpki.net/. The
result (as described in Figure 2) shows: APNIC has allocated the
unauthorized resources (ASNs: 65551, IP prefixes: 192.0.3.128/26) to
TWNIC successfully, but TWNIC did not receive these resources
actually.
Fu, et al. Expires March 16, 2017 [Page 5]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
root@ubuntu:~#rpkic -i cnnic show_received_resources
Parent: apnic
notBefore: 2015-07-15T15:53:25Z
notAfter: 2016-07-14T15:36:05Z
URI: rsync://localhost/rpki/iana/apnic/BqHiZw817JRhXby5cljw-Iy75c4.cer
SIA URI: rsync://localhost/rpki/iana/apnic/cnnic/
AIA URI: rsync://localhost/rpki/iana/RAseYE67qlpBd34u5UqhMjwq8c0.cer
ASN: 64498-64505
IPv4: 192.0.2.128/26,198.51.100.128/26
IPv6:
root@ubuntu:~# rpkic -i jpnic show_received_resources
Parent: apnic
notBefore: 2015-07-15T15:25:54Z
notAfter: 2016-07-14T15:20:04Z
URI: rsync://localhost/rpki/iana/apnic/NSt9KXs-a2py_OGZlol4fipm1lQ.cer
SIA URI: rsync://localhost/rpki/iana/apnic/jpnic/
AIA URI: rsync://localhost/rpki/iana/RAseYE67qlpBd34u5UqhMjwq8c0.cer
ASN: 65540-65550
IPv4: 203.0.113.128/26
IPv6:
root@ubuntu:~# rpkic -i twnic show_received_resources
root@ubuntu:~#
Figure 2: The test result of completely unauthorized assignment
4.1.2. Partially unauthorized assignment
The test scenario is described in Figure 3: APNIC allocates ASNs (
9700-9818 ) to JPNIC. But APNIC only take the ownership of ASNs (
9801-9818 ). We simulated this process of assignment on our testbed
and the result is illustrated in Figure 4.
Fu, et al. Expires March 16, 2017 [Page 6]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
+-------------+
| | ASNs:
| IANA +---------9800-9819,132176-132191
+------|------+
|
+-------------+
| | ASNs:
| APNIC ---------9801-9818,132177-132190
| |
--------------+
| |
----------------| |---------------
| |
+-----------+ +-----------+
| JPNIC | | CNNIC |
+-----|-----+ +----|------+
| |
ASNs: ASNs:
9700-9818 132178-132189
Figure 3: The network architecture of partially unauthorized
assignment
Our test result for this scenario (as described in Figure 4) shows:
APNIC think that it has allocated the partially unauthorized
resources to JPNIC successfully, but JPNIC only received the legal
part (ASNs 9801-9818), without the illegal part (ASNs 9700-9800).
Fu, et al. Expires March 16, 2017 [Page 7]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
root@ubuntu:~# rpkic -i apnic show_child_resources
Child: cnnic
ASN: 132178-132179
IPv4: 203.0.113.0/26,218.214.108.0/26
Child: jpnic
ASN: 9700-9818
IPv4: 218.241.104.0/26
root@ubuntu:~#rpkic -i cnnic show_received_resources
Parent: apnic
notBefore: 2015-08-31T15:45:37Z
notAfter: 2016-08-30T12:24:04Z
URI: rsync://192.168.137.139/rpki/iana/apnic/t4jbcdikZIF9RGeLpZ0fiBd59Uw.cer
SIA URI: rsync://192.168.137.139/rpki/iana/apnic/cnnic/
AIA URI: rsync://192.168.137.139/rpki/iana/HFOgArj0R8dF5vZ-7beqS0CzT2w.cer
ASN: 132178-132189
IPv4: 203.0.113.0/26,218.214.108.0/26
IPv6:
root@ubuntu:~# rpkic -i jpnic show_received_resources
Parent: apnic
notBefore: 2015-08-31T15:47:38Z
notAfter: 2016-08-30T12:25:25Z
URI: rsync://192.168.137.139/rpki/iana/apnic/V4CxZVxBkwwIiBruCy7k7DESUvg.cer
SIA URI: rsync://192.168.137.139/rpki/iana/apnic/jpnic/
AIA URI: rsync://192.168.137.139/rpki/iana/HFOgArj0R8dF5vZ-7beqS0CzT2w.cer
ASN: 9801-9818
IPv4: 218.241.104.0/26
IPv6:
Figure 4: The test result of partially unauthorized assignment
4.2. Resource reassignment
In the "Resource reassignment" case, we mean that a CA allocate the
resources, which have been allocated to one subordinate CA ( e.g.
CNNIC ), to another subordinate CA ( e.g. JPNIC ). This case may
also be caused by misoperation of CA or on purpose. And it may
result in resource conflicts in the Internet.
4.2.1. Matching case
For the matching case, the test scenario is described in Figure 5:
the resources to be allocated to JPNIC (ASNs 132178-132189) is
identical to those allocated to CNNIC (ASNs 132178-132189).
Fu, et al. Expires March 16, 2017 [Page 8]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
+-------------+
| | ASNs:
| IANA +---------9800-9819,132176-132191
+------|------+
|
+-------------+
| | ASNs:
| APNIC ---------9801-9818,132177-132190
| |
--------------+
| |
----------------| |---------------
| |
+-----------+ +-----------+
| JPNIC | | CNNIC |
+-----|-----+ +----|------+
| |
ASNs: ASNs:
132178-132189 132178-132189
Figure 5: The network architecture of matching case
We test this case with the tools offered by http://rpki.net/. The
result (as described in Fig 6) is that both CNNIC and JPNIC can
receive these ASNs at the same time. It may result in resource
confliction in the internet.
Fu, et al. Expires March 16, 2017 [Page 9]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
root@ubuntu:~# rpkic -i apnic show_child_resources
Child: cnnic
ASN: 132178-132189
IPv4: 203.0.113.0/26
Child: jpnic
ASN: 132178-132189
IPv4: 203.0.113.0/26
root@ubuntu:~# rpkic -i jpnic show_received_resources
Parent: apnic
notBefore: 2015-08-31T13:43:18Z
notAfter: 2016-08-30T12:25:25Z
URI: rsync://192.168.137.139/rpki/iana/apnic/V4CxZVxBkwwIiBruCy7k7DESUvg.cer
SIA URI: rsync://192.168.137.139/rpki/iana/apnic/cnnic/
AIA URI: rsync://192.168.137.139/rpki/iana/HFOgArj0R8dF5vZ-7beqS0CzT2w.cer
ASN: 132178-132189
IPv4: 203.0.113.0/26
IPv6:
root@ubuntu:~# rpkic -i cnnic show_received_resources
Parent: apnic
notBefore: 2015-08-31T13:39:19Z
notAfter: 2016-08-30T12:24:04Z
URI: rsync://192.168.137.139/rpki/iana/apnic/t4jbcdikZIF9RGeLpZ0fiBd59Uw.cer
SIA URI: rsync://192.168.137.139/rpki/iana/apnic/cnnic/
AIA URI: rsync://192.168.137.139/rpki/iana/HFOgArj0R8dF5vZ-7beqS0CzT2w.cer
ASN: 132178-132189
IPv4: 203.0.113.0/26
IPv6:
Figure 6: The test result of matching case
CNNIC and JPNIC receive the same resource assigned by the APNIC at
the same time. So the same resource could be allocated to the
different sub-node simultaneously.
4.2.2. Intersection case
As is shown in Figure 7, in the intersection case, there is an
overlap between the resources to be allocated to JPNIC (ASNs
132180-132190) and those allocated to CNNIC (ASNs 132177-132185).
Fu, et al. Expires March 16, 2017 [Page 10]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
+-------------+
| | ASNs:
| IANA +---------9800-9819,132176-132191
+------|------+
|
+-------------+
| | ASNs:
| APNIC ---------9801-9818,132177-132190
| |
--------------+
| |
----------------| |---------------
| |
+-----------+ +-----------+
| JPNIC | | CNNIC |
+-----|-----+ +----|------+
| |
ASNs: ASNs:
132180-132190 132177-132185
Figure 7: The network architecture of intersection case
Our test result (as described in Figure 8) shows that both CNNIC and
JPNIC can receive these ASNs.
Fu, et al. Expires March 16, 2017 [Page 11]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
root@ubuntu:~# rpkic -i apnic show_child_resources
Child: cnnic
ASN: 132177-132185
IPv4: 203.0.113.0/26,218.241.108.0/26
Child: jpnic
ASN: 132180-132190
IPv4: 218.241.104.0/26
root@ubuntu:~#rpkic -i cnnic show_received_resources
Parent: apnic
notBefore: 2015-08-31T14:58:54Z
notAfter: 2016-08-30T12:24:04Z
URI: rsync://192.168.137.139/rpki/iana/apnic/t4jbcdikZIF9RGeLpZ0fiBd59Uw.cer
SIA URI: rsync://192.168.137.139/rpki/iana/apnic/cnnic/
AIA URI: rsync://192.168.137.139/rpki/iana/HFOgArj0R8dF5vZ-7beqS0CzT2w.cer
ASN: 132177-132185
IPv4: 203.0.113.0/26,218.214.108.0/26
IPv6:
root@ubuntu:~# rpkic -i jpnic show_received_resources
Parent: apnic
notBefore: 2015-08-31T14:58:44Z
notAfter: 2016-08-30T12:25:25Z
URI: rsync://192.168.137.139/rpki/iana/apnic/V4CxZVxBkwwIiBruCy7k7DESUvg.cer
SIA URI: rsync://192.168.137.139/rpki/iana/apnic/jpnic/
AIA URI: rsync://192.168.137.139/rpki/iana/HFOgArj0R8dF5vZ-7beqS0CzT2w.cer
ASN: 132180-132090
IPv4: 218.241.104.0/26
IPv6:
Figure 8: The test result of intersection case
4.2.3. Subset case
For the subset case, the network architecture is described in
Figure 9: APNIC allocates the ASN 65540 and a block of IP address (
203.0.113.128/26 ) to JPNIC. Then it reallocated this resources to
CNNIC. These resources are the subset of CNNIC's resource.
Fu, et al. Expires March 16, 2017 [Page 12]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
ASNs:
+-------------+ 64496-64511,65536-65551
| | IP prefixes:
| IANA +---------192.0.2.0/24,198.51.100.0/24
| | 203.0.113.0/24
+------|------+
|
+-------------+ ASNs:
| | 64497-64510,65537-65550
| | IP prefixes:
| APNIC ---------192.0.2.128/25,
| | 198.51.100.128/25
--------------+ 203.0.113.128/25
| |
----------------| |---------------
| |
+-----------+ +-----------+
| JPNIC | | CNNIC |
+-----|-----+ +----|------+
| |
ASNs: ASNs:
65540 64498-64505,65540
IP prefixes IP prefixes:
203.0.113.128/26 192.0.2.128/26
198.51.100.128/26
203.0.113.128/26
Figure 9: The network architecture of subset case
We test this case with the tools offered by http://rpki.net/. The
result (as described in Fig 6 ) is that both CNNIC and JPNIC can
receive these ASNs and IP Prefixes at the same time. It may result
in resource confliction in the internet.
Fu, et al. Expires March 16, 2017 [Page 13]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
root@ubuntu:~# rpkic -i apnic show_child_resources
Child: cnnic
ASN: 64498-64505,65540
IPv4: 192.0.2.128/26,198.51.100.128/26,203.0.113.128/26
Child: jpnic
ASN: 65540
IPv4: 203.0.113.128/26
root@ubuntu:~# rpkic -i cnnic show_received_resources
Parent: apnic
notBefore: 2015-07-15T15:37:58Z
notAfter: 2016-07-14T15:36:05Z
URI: rsync://localhost/rpki/iana/apnic/BqHiZw817JRhXby5cljw-Iy75c4.cer
SIA URI: rsync://localhost/rpki/iana/apnic/cnnic/
AIA URI: rsync://localhost/rpki/iana/RAseYE67qlpBd34u5UqhMjwq8c0.cer
ASN: 64498-64505,65540
IPv4: 192.0.2.128/26,198.51.100.128/26,203.0.113.128/26
IPv6:
root@ubuntu:~# rpkic -i jpnic show_received_resources
Parent: apnic
notBefore: 2015-07-15T15:25:54Z
notAfter: 2016-07-14T15:20:04Z
URI: rsync://localhost/rpki/iana/apnic/NSt9KXs-a2py_OGZlol4fipm1lQ.cer
SIA URI: rsync://localhost/rpki/iana/apnic/jpnic/
AIA URI: rsync://localhost/rpki/iana/RAseYE67qlpBd34u5UqhMjwq8c0.cer
ASN: 65540
IPv4: 203.0.113.128/26
IPv6:
Figure 10: The test result of subset case
CNNIC and JPNIC could receive the same resources assigned by APNIC at
the same time. So the test result verify that the same resources
could be allocated to different sub-nodes simultaneously.
4.3. Resource transfer
This issue is described in [I-D.ymbk-sidr-transfer]. The most
serious problem caused by it is the address reassignment described
above.
5. Solutions
In order to avoid the above issues or reduce the related side-
effects, the following two solutions may be needed.
Fu, et al. Expires March 16, 2017 [Page 14]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
5.1. The CA function enhancement
We have designed a mechanism to enhance the CA function to avoid the
above misoperation or malicious operation. The detail information
will be given in the future.
5.2. The RP function enhancement
The enhancement of RP function is needed to discover these resource
assignment errors.
6. Security Considerations
TBD.
7. IANA Considerations
This draft does not request any IANA action.
8. Acknowledgements
The authors would like to thanks the valuable comments made by XXX
and other members of sidr WG.
This document was produced using the xml2rfc tool [RFC2629].
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[RFC6480] Lepinski, M. and S. Kent, "An Infrastructure to Support
Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480,
February 2012, <http://www.rfc-editor.org/info/rfc6480>.
[RFC6482] Lepinski, M., Kent, S., and D. Kong, "A Profile for Route
Origin Authorizations (ROAs)", RFC 6482,
DOI 10.17487/RFC6482, February 2012,
<http://www.rfc-editor.org/info/rfc6482>.
[RFC6486] Austein, R., Huston, G., Kent, S., and M. Lepinski,
"Manifests for the Resource Public Key Infrastructure
(RPKI)", RFC 6486, DOI 10.17487/RFC6486, February 2012,
<http://www.rfc-editor.org/info/rfc6486>.
Fu, et al. Expires March 16, 2017 [Page 15]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
9.2. Informative References
[I-D.ymbk-sidr-transfer]
Austein, R., Bush, R., Huston, G., and G. Michaelson,
"Resource Transfer in the Resource Public Key
Infrastructure", draft-ymbk-sidr-transfer-01 (work in
progress), July 2015.
[RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
DOI 10.17487/RFC2629, June 1999,
<http://www.rfc-editor.org/info/rfc2629>.
[RFC5914] Housley, R., Ashmore, S., and C. Wallace, "Trust Anchor
Format", RFC 5914, DOI 10.17487/RFC5914, June 2010,
<http://www.rfc-editor.org/info/rfc5914>.
Authors' Addresses
Yu Fu
CNNIC
No.4 South 4th Street, Zhongguancun
Hai-Dian District, Beijing, 100190
P.R. China
Email: fuyu@cnnic.cn
Zhiwei Yan
CNNIC
No.4 South 4th Street, Zhongguancun
Beijing, 100190
P.R. China
Email: yanzhiwei@cnnic.cn
Xiaowei Liu
CNNIC
No.4 South 4th Street, Zhongguancun
Beijing, 100190
P.R. China
Email: liuxiaowei@cnnic.cn
Fu, et al. Expires March 16, 2017 [Page 16]
Internet-Draft draft-fu-sidr-unexpected-scenarios-02 September 2016
Cuicui Wang
CNNIC
No.4 South 4th Street, Zhongguancun
Hai-Dian District, Beijing, 100190
P.R. China
Email: wangcuicui@cnnic.cn
Fu, et al. Expires March 16, 2017 [Page 17]