Internet DRAFT - draft-li-sidrops-roa-granularity-problem-statement
draft-li-sidrops-roa-granularity-problem-statement
SIDROPS Y. Li
Internet-Draft CNIC, CAS
Intended status: Best Current Practice J. Yao
Expires: 25 April 2024 CNNIC
D. Ma
ZDNS
23 October 2023
On the Operational Granularity of RPKI ROA Management: Problem Statement
and Requirements
draft-li-sidrops-roa-granularity-problem-statement-00
Abstract
When using the Resource Public Key Infrastructure (RPKI) to perform
route origin validation (ROV) with route origin authorizations
(ROAs), there have been security and usability issues identified and
reported. This memo revisits these issues from the perspective of
the operational granularity of ROA management, demonstrates problems
and their root cause with the existing ROA encoding scheme,
summarizes design requirements to address them, and evaluates three
potential solutions. Though neither of existing solutions satisfies
all requirements, a hybrid solution composed of two existing schemes
is recommended to use in ROA management.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 25 April 2024.
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
Li, et al. Expires 25 April 2024 [Page 1]
Internet-Draft ROA Operational Granularity October 2023
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3
3. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 3
3.1. Scattered Authorization Issuance . . . . . . . . . . . . 3
3.2. Partial Authorization Revocation . . . . . . . . . . . . 5
3.3. Multi-Authorization Resolution . . . . . . . . . . . . . 6
3.4. A Brief Summary . . . . . . . . . . . . . . . . . . . . . 7
4. Requirements for Encoding and Managing ROAs . . . . . . . . . 8
4.1. Fine Granularity . . . . . . . . . . . . . . . . . . . . 8
4.2. Incremental Update . . . . . . . . . . . . . . . . . . . 8
4.3. High Efficiency and Scalability . . . . . . . . . . . . . 9
5. Evaluation of Potential Solutions . . . . . . . . . . . . . . 9
5.1. Single-prefix ROA . . . . . . . . . . . . . . . . . . . . 9
5.2. Minimal ROA . . . . . . . . . . . . . . . . . . . . . . . 9
5.3. Hanging ROA . . . . . . . . . . . . . . . . . . . . . . . 10
5.4. Requirements Satisfaction . . . . . . . . . . . . . . . . 10
5.5. Performance Evaluation . . . . . . . . . . . . . . . . . 11
6. Recommendations . . . . . . . . . . . . . . . . . . . . . . . 11
7. Security Considerations . . . . . . . . . . . . . . . . . . . 12
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 12
9.1. Normative References . . . . . . . . . . . . . . . . . . 12
9.2. Informative References . . . . . . . . . . . . . . . . . 12
Appendix A. Statistic Results . . . . . . . . . . . . . . . . . 13
A.1. Scattered Authorization Issuance . . . . . . . . . . . . 13
A.2. Partial Authorization Revocation . . . . . . . . . . . . 13
A.3. Multi-Authorization Resolution . . . . . . . . . . . . . 14
Appendix B. Performance Evaluation . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16
1. Introduction
In the RPKI, an ROA is an attestation that the owner of an IP address
block has authorized an autonomous system (AS) to originate routes in
BGP for one or more prefixes within this address block[RFC6482].
ROAs are used to identify route hijacking with RPKI-
ROV[RFC6483][RFC6811].
Li, et al. Expires 25 April 2024 [Page 2]
Internet-Draft ROA Operational Granularity October 2023
However, there are quite a few concerns about ROAs, in terms of
security, reachability and scalability. These issues have been
noticed from way back, but were attributed to the partial deployment
of RPKI or human errors in configuring ROAs all the while. Departure
from this widely accepted understanding, this memo explores the root
cause of these issues in a new perspective, demonstrates problems
with the existing ROA encoding scheme, and reveals that the root
cause of them is the coarse-grained management of ROAs. For this
reason, some security or usability issues will retain even when the
RPKI finishes its deployment and all operators are careful enough.
Further, this memo summarizes the requirements in designing an
efficient and concrete solution to resolve security and usability
issues with ROAs, evaluates two possible solutions with these design
principles and suggests the future direction for improvement.
2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. Problem Statement
With the existing ROA encoding scheme, an IP prefix, as the root
prefix, along with a maxLength parameter specifies the authorization
of an AS originating a set of IP prefixes covered by the root prefix.
These IP prefixes form a full binary tree rooted at the root prefix,
and are referred to as a prefix block throughout this memo. In case
that the maxLength parameter is missing, only the ROA prefix is
authorized. Below, the problems with this scheme are demonstrated
from the perspective of ROA management, and will retain even when the
RPKI deployment is complete and there is no human errors.
3.1. Scattered Authorization Issuance
Authorization issuance is the most common and important operation in
managing ROAs. As the network management becomes more and more
flexible, route origin authorizations issued to an AS is always
scattered, for business or engineering purposes, such as resource
reservation, resource allocation, route aggregation, traffic
engineering, to name only a few. In this case, it's difficult to
determine a proper maxLength parameter in ROA encoding. On one hand,
a too-short maxLength parameter can render the legitimate BGP routes
that carry the IP prefixes covered by but not included in this ROA
"invalid"; on the other hand, a too-long maxLength parameter can lead
to forged-origin sub-prefix hijack[RFC9319].
Li, et al. Expires 25 April 2024 [Page 3]
Internet-Draft ROA Operational Granularity October 2023
Take the example shown in Figure 1 for instance. The resource holder
owns an IP address block starting from 202.127.16.0 to
202.127.31.255, and issues an AS to originate 4 IP prefixes, A
(202.127.16.0/20), B (202.127.16.0/21), C (202.127.24.0/21) and E
(202.127.20.0/22), within this address block. In case that the
maxLength parameter is set to 21, a BGP route carrying the prefix E
will be identified as "invalid" in RPKI ROV and thus becomes
unreachable. While if the maxLength parameter is set to 22, three
other prefixes D, F, G will be included in the authorization. In
this case, the attacker can use these more specific prefixes to
hijack part of the traffic destined for the prefixes A, B or C,
leading to security risks.
+--------------------------------------------------------------------------+
| A=202.127.16.0/20 |
+------------------------------------+-------------------------------------+
| B=202.127.16.0/21 | C=202.127.24.0/21 |
+--------------------------------------------------------------------------+
|XXXXXXX D XXXXXX| E=202.127.20.0/22 |XXXXXXX F XXXXXXX|XXXXXXXX G XXXXXXXX|
+--------------------------------------------------------------------------+
Figure 1: an example of scattered authorization issuance.
This dilemma is a natural consequence of the fact that the
authorization is managed at a granularity of the bundle of several IP
prefixes. This operational granularity is too coarse and is the root
cause of the tradeoff to make between security and reachability.
Worse yet, this granularity issue is essentially resulted from the
fundamental encoding scheme taken by ROAs, and is thus hard to
resolve completely within the existing framework.
A statistical study on 10 BGP RIBs, collected from the same collector
at Jan 1st every year since 2014 till now, and with corresponding ROA
records demonstrates how the potential security and reachability
issues resulted by the dilemma in ROA encoding would be. In a RIB, a
secure route prefix is the one that can be validated via ROAs; while,
correspondingly, a route prefix that will be identified as "invalid"
via ROAs is called unauthorized route prefix. Besides, the
authorized but not routed prefixes may be utilized by the attacker to
hijack all or part of the traffic destined for other routed prefixes.
These affected prefixes are thus called insecure route prefixes.
Li, et al. Expires 25 April 2024 [Page 4]
Internet-Draft ROA Operational Granularity October 2023
As clearly demonstrated in Table 1, the fast growth of RPKI
deployment does help increase the number of route prefixes protected
by ROAs. Correspondingly, the increasing speed of the number of
unauthorized route prefixes has slowed down obviously since 2019.
However, the number of insecure route prefixes increases as well,
with a similar trend as the increasing of secure route prefixes. In
a word, the promotion of RPKI deployment can help protect more route
prefixes but will also bring in more security risks due to improper
configuration of ROAs.
3.2. Partial Authorization Revocation
In comparison with the authorization issuance, authorization
revocation is an infrequent operation in managing ROAs, but it is
important to keep the authorization status up-to-date. In case that
the authorization revocation is not performed timely and properly,
the IP prefixes that are no longer authorized to be originated by an
AS will remain authorized, opening an attack vector to route
hijacking as a result.
With the existing framework of managing ROAs, there is no "update"
operation defined. Consequently, the operational granularity in
authorization revocation is the whole ROA that previously issued. In
case that only a part of the authorization is required to revoke, two
steps are mandatory. First, all previously issued ROAs that contain
this part should be withdrawal, this adds a burden to the network
operator because he has to remember all previously issued ROAs and
what IP prefixes are authorized in each of them. Second, all the IP
prefixes from the other parts of original ROAs should be authorized
again, triggering the case of "scattered authorization issuance".
Take the example shown in Figure 2 for instance. The original ROA
contains 7 IP prefixes, where the authorization of two prefixes C
(202.127.24.0/21) and F (202.127.24.0/22) is required to revoke.
Then, the whole ROA should be withdrawal and the authorization of the
rest 5 prefixes (A, B, D, E, G ) should be issued again.
+--------------------------------------------------------------------------+
| A=202.127.16.0/20 |
+------------------------------------+-------------------------------------+
| B=202.127.16.0/21 | [C=202.127.24.0/21] |
+--------------------------------------------------------------------------+
|D=202.127.16.0/22| E=202.127.20.0/22|[F=202.127.24.0/22]|G=202.127.28.0/22|
+--------------------------------------------------------------------------+
Figure 2: an example of partial authorization revocation
Li, et al. Expires 25 April 2024 [Page 5]
Internet-Draft ROA Operational Granularity October 2023
A statistical study on 10 months of RPKI data records summarizes the
instances of authorization revocations every month. The results are
shown in Table 2. There are 13~147 partial authorization revocations
everyday on average, which have taken a non-negligible part
(8.2%~49.8%) of total instances of revocations.
3.3. Multi-Authorization Resolution
Generally, different ASes may issue their ROAs independently without
any negotiation. Thus, it's possible that their ROAs may overlap,
leading to multi-authorization where the same set of IP prefixes are
authorized to be originated from different ASes.
In some cases, multi-authorization is useful, such as for the purpose
of supporting MOAS or for the mitigation of DDoS attacks[RFC9319];
but it may also be extremely harmful in some other cases, such as the
case that one AS allocates a sub IP address space to its customer and
their ROAs overlap. In this case, the attacker can use those IP
prefixes authorized to but won't be used by the provider (which has
been allocated to the customer) for route hijacking.
For example, suppose the provider owns an IP address block starting
from 202.127.16.0/20, and is authorized to originate any IP prefix
within this address block that is with a length not longer than 22.
Then, it allocates a sub address block starting from 202.127.24.0/21
to its customer, which is authorized to originate any IP prefix
within this sub address block that is with a length not longer than
23. As a result, their ROAs overlap, where the intersection contains
3 IP prefixes, C (202.127.24.0/21), F (202.127.24.0/22) and G
(202.127.24.0/22). Generally, the provider will not announce BGP
routes with these IP prefixes any more, since they have been
allocated to the customer, but they are still included in the
provider's ROA. This opens a near-permanent attack vector to route
hijacking, where the attacker can use the IP prefixes in the
intersection to hijack part of the traffic destined for the IP prefix
A (202.127.16.0/20) owned by the provider, or that destined for the
IP prefix C (202.127.24.0/21) owned by the customer.
To resolve this security risk, the provider should revoke the
authorization of IP prefixes in the intersection between its ROA and
its customer's ROA, triggering partial authorization revocation as a
result.
Li, et al. Expires 25 April 2024 [Page 6]
Internet-Draft ROA Operational Granularity October 2023
A statistical study on 10 BGP RIBs and corresponding ROA records
collected at the same day was conducted to evaluate the multi-
authorization between two ASes, and the results are shown in Table 3.
The case of possible resource allocation accounts for 48.8% ~ 76.3%
of all instances in a day, where there is a potential security risk
as discussed above.
3.4. A Brief Summary
As the growth of the Internet and the RPKI deployment, and in regard
to flexible network operations, ROA management has to deal with
scattered authorization issuance, partial authorization revocation
and multi-authorization resolution. However, with the existing
scheme, the operational granularity of issuing route origin
authorizations is a bundle of IP prefixes that share the same prefix
length, while the operational granularity of authorization revocation
is a whole ROA. This sharply complicates the management of ROAs in
the mentioned scenarios, resulting in non-negligible security and
usability issues.
The logical relation among the problems stated above are shown in
Figure 3. More specifically, it opens attack vector to route
hijacking that if the partial authorization revocation or the multi-
authorization resolution does not complete timely or properly.
Actually, the key operation of the multi-authorization resolution is
to perform partial authorization revocation, where the key operation
turns to be scattered authorization issuance finally. To complete
this kind of issuance, there is a bad dilemma in determining the
maxLength parameter to balance the security and usability. Besides,
to properly perform partial authorization revocation, the network
operator has to record all previously issued ROAs and what IP
prefixes they contain. This can also be treated as a usability
issue.
Accordingly, all the problems stated in this memo are essentially
caused by the coarse-grained management of route origin
authorizations with the existing scheme, and thus has nothing to do
with the RPKI deployment and human errors. In another word, these
security and usability issues will retain even when the RPKI finishes
its deployment and all network operators are careful enough.
Li, et al. Expires 25 April 2024 [Page 7]
Internet-Draft ROA Operational Granularity October 2023
+-----+ more BGP +---------------------------------------------------+
| u |announcements | |
| s <--------------+ growth of the Internet and the deployment of RPKI |
| a | more origin | |
| b |authorizations|increasing of the flexibility in network management|
| i | +-----+-------------------+------------------+------+
| l | | | |
| i | | | |
| t | too-short +-----v-------+ +------v------+ +------v------+
| y | maxLength | Scattered | | Partial | | Multi- |
| <--------------+Authorization<--+-+Authorization<----+Authorization|
| i | | Issuance | | | Revocation | | Resolution |
| s | +-------------+ | +-------------+ +-------------+
| s | |too-long | |Fail |Fail
| u | |maxLength | | |
| e | +-----v----------+--------v------------------v------+
| | | security issue |
+--^--+ +----------------+----------------------------------+
| |
+----------------------------------+
record all previously issued ROAs and what IP prefixes they contain
Figure 3: logical relation among stated problems.
4. Requirements for Encoding and Managing ROAs
In order to address the security and usability issues demonstrated
above, a new scheme for encoding and managing ROAs is required. This
memo summarizes the requirements and four design principles in
response to security, reachability and scalability issues.
4.1. Fine Granularity
Given that the coarse granularity in authorization management is the
root cause of the dilemma between security and reachability, the most
important design principle is to break this limitation with a
solution that achieves fine-grained authorization management,
especially that enables the management at the prefix granularity.
4.2. Incremental Update
To facilitate authorization revocation and thus multi-authorization
resolution, the support of incremental update of authorizations is
important. This allows an ROA to be updated on demand without
excessive withdrawal or redundant authorizations.
Li, et al. Expires 25 April 2024 [Page 8]
Internet-Draft ROA Operational Granularity October 2023
4.3. High Efficiency and Scalability
At last, the encoding efficiency as well as the scalability of the
whole scheme should be taken into consideration, in regard to the
fast growth of global routing tables and RPKI deployment. In another
word, the management of ROAs should not add too much burden to
network operators or BGP routers, when there are more and more origin
authorizations and BGP routes.
5. Evaluation of Potential Solutions
In the current literature, there are 3 potential solutions that might
be able to satisfy above requirements to some extent. The first two
of them are extensions over the existing scheme, while the last one
introduces a novel encoding scheme.
5.1. Single-prefix ROA
A straightforward solution is to eliminate the maxLength parameter
for exact authorization issuance, by organizing ROAs as several
single-prefix authorizations. In this way, authorizations are
managed prefix by prefix and thus efficient efficient incremental
updates can be achieved, since the only update operation toward an
ROA, namely a single-prefix authorization, is to revoke it.
The only but a big drawback of this solution is the encoding
efficiency and its scalability. Every authorized prefix has to be
managed as separate authorizations, adding up the management burden.
In addition, the encoding of the authorization of a big prefix block
(such as the AS0 ROAs) produces a huge number of entries, which may
increase exponentially.
5.2. Minimal ROA
On basis of the single-prefix ROA, all authorized prefixes that form
a full binary tree are aggregated into one ROA, with the maxLength
parameter added back to specify the longest length of the IP prefixes
contained in this authorization. This is called minimal ROA[RFC9319]
and it minimizes the use of maxLength parameter while keeping the
feature of exact authorization issuance. Essentially, it improves
the encoding efficiency and scalability over the single-prefix ROA,
but lacks in the support of efficient incremental updates.
Li, et al. Expires 25 April 2024 [Page 9]
Internet-Draft ROA Operational Granularity October 2023
5.3. Hanging ROA
Hanging ROA proposes to use a bitmap to encode a set of authorized IP
prefixes. This solution has a very good nature to support
authorization management at the prefix granularity. Besides, it can
enable flexible and efficient incremental updates with the help of
bit-masking operations. However, this solution may become
inefficient in dealing with a big prefix block, where either a rather
long bitmap or a large number of bitmaps are required, restricting
its scalability.
5.4. Requirements Satisfaction
Figure 4 compares the 3 schemes in view of their satisfaction to
every design requirements. In terms of encoding efficiency and
scalability, two scenarios are evaluated separately, where the
differences are the number and the volume of authorizations to
encode. In the first case, there are only a few big prefix blocks,
each containing 64 or more IP prefixes, to encode; while there are a
large number of small prefix blocks to encode in the second case.
+-------------+-----------+-----------+-------------------------------------+
| | | | encoding efficiency and scalability |
| |operational|support of +----------------+--------------------+
| |granularity|incremental|case1: a few big|case2: lots of small|
| | |updates |prefix blocks |prefix blocks |
+---------------------------------------------------------------------------+
|Single-prefix| prefix | Yes | Bad | Bad |
| ROA | | | | |
+---------------------------------------------------------------------------+
| Minimal | a set of | No | Good | Bad |
| ROA | prefixes | | | |
+---------------------------------------------------------------------------+
| Hanging | prefix | Yes | Bad | Good |
| ROA | | | | |
+-------------+-----------+-----------+----------------+--------------------+
Figure 4: summary of 3 potential solutions.
In summary, both the single-prefix ROA and the hanging ROA manage
authorizations at the prefix granularity, and thus support efficient
incremental updates. In regard to the encoding efficiency and
scalability, the minimal ROA and the hanging ROA are better than the
single-prefix ROA, but they are good at different scenarios.
unfortunately, neither of the 3 potential solutions can perfectly
satisfy all design requirements.
Li, et al. Expires 25 April 2024 [Page 10]
Internet-Draft ROA Operational Granularity October 2023
5.5. Performance Evaluation
10 sets of authorized route prefixes are generated with 10 BGP RIBs
and their corresponding ROA records collected at the same day, and
are used to evaluate the encoding efficiency and scalability of the 3
schemes. In encoding each of the 10 sets, the number of encoded
blocks in IPv4 and IPv6 are measured respectively.
The results are recorded in Table 4. Clearly, the hanging ROA has
the highest encoding efficiency, and reduces the encoding cost in
IPv4 by 30.4% ~ 66.9% and 27.1% ~ 65.1% in comparison with the
single-prefix ROA and the minimal ROA respectively, while the
reductions in IPv6 are 1.5% ~ 47.1% and 1.5% ~ 45.9% respectively.
Table 5 shows the detailed results about the minimal ROA and the
hanging ROA with different settings of defining what are big prefix
blocks. Since in both scheme, AS0 ROAs are maintained in the same
form, they are eliminated from the results. It is clear that the
minimal ROA is more efficient to encode big prefix blocks than the
hanging ROA; while the hanging ROA outperforms the minimal ROA in
encoding small prefix blocks. Besides, there is no prefix block that
contains more than 63 prefixes, namely the difference between the
prefix length and the maxLength is 6 or larger, in both IPv4 and
IPv6. This reflects the trend that more and more network operators
prefer to issue exact authorizations.
6. Recommendations
For authorization issuance, it is recommended to authorize exactly
what are about to use in BGP with a hybrid encoding scheme. More
specifically, hanging ROA should always be adopted to ensure
efficient fine-grained management, unless when there is a need to
authorize a big prefix block that contains more than 63 prefixes.
Then, minimal ROA should be adopted alternatively.
Once the authorization status changes, the corresponding updates
toward previously issued ROAs should be performed timely and
properly, especially those for authorization revocation.
In case of resource allocation, the customer should obtain its
authorizations as soon as possible to avoid reachability issues,
while the provider should make careful checks and timely operations
(revocations) to ensure that there is no unnecessary intersection
between its ROA and its customer's ROA.
Li, et al. Expires 25 April 2024 [Page 11]
Internet-Draft ROA Operational Granularity October 2023
7. Security Considerations
This document analyzes and reveals the root cause of potential
security risks under RPKI-ROV.
The recommended hybrid ROA encoding scheme MAY improve the security
of using RPKI-ROV, and MUST NOT bring in additional security issues.
8. IANA Considerations
This document has no IANA actions.
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC6482] Lepinski, M., Kent, S., and D. Kong, "A Profile for Route
Origin Authorizations (ROAs)", RFC 6482,
DOI 10.17487/RFC6482, February 2012,
<https://www.rfc-editor.org/info/rfc6482>.
[RFC6483] Huston, G. and G. Michaelson, "Validation of Route
Origination Using the Resource Certificate Public Key
Infrastructure (PKI) and Route Origin Authorizations
(ROAs)", RFC 6483, DOI 10.17487/RFC6483, February 2012,
<https://www.rfc-editor.org/info/rfc6483>.
[RFC6811] Mohapatra, P., Scudder, J., Ward, D., Bush, R., and R.
Austein, "BGP Prefix Origin Validation", RFC 6811,
DOI 10.17487/RFC6811, January 2012,
<https://www.rfc-editor.org/info/rfc6811>.
[RFC9319] Gilad, Y., Goldberg, S., Sriram, K., Snijders, J., and B.
Maddison, "The Use of maxLength in the Resource Public Key
Infrastructure (RPKI)", RFC 9319, DOI 10.17487/RFC9319,
January 2012, <https://www.rfc-editor.org/info/rfc9319>.
9.2. Informative References
Li, et al. Expires 25 April 2024 [Page 12]
Internet-Draft ROA Operational Granularity October 2023
[RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart,
"Introduction and Applicability Statements for Internet-
Standard Management Framework", RFC 3410,
DOI 10.17487/RFC3410, December 2002,
<https://www.rfc-editor.org/info/rfc3410>.
Appendix A. Statistic Results
A.1. Scattered Authorization Issuance
+============+=====+=====+=====+=====+=====+=====+=====+=====+=====+=====+
| |2014-|2015-|2016-|2017-|2018-|2019-|2020-|2021-|2022-|2023-|
| | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| |07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|
+============+=====+=====+=====+=====+=====+=====+=====+=====+=====+=====+
|secure route| 15K | 22K | 28K | 38K | 52K | 101K| 166K| 256K| 335K| 412K|
| prefix | | | | | | | | | | |
+------------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
| insecure | 9K | 11K | 13K | 16K | 18K | 37K | 49K | 71K | 95K | 127K|
|route prefix| | | | | | | | | | |
+------------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
|unauthorized| 4K | 3K | 3K | 6K | 12K | 7K | 8K | 10K | 8K | 9K |
|route prefix| | | | | | | | | | |
+------------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
| total | 546K| 596K| 661K| 724K| 802K| 893K| 967K|1065K|1132K|1178K|
+------------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
Table 1: Statistics on different kinds of route prefixes.
A.2. Partial Authorization Revocation
+============+====+====+====+=====+====+====+====+=======+====+====+
| |2022|2022|2022| 2023|2023|2023|2023| 2023 |2023|2023|
| | | | | | | | | | | |
| | | | | | | | | | | |
| |-10 |-11 |-12 | -01 |-02 |-03 |-04 | -05 |-06 |-07 |
+============+====+====+====+=====+====+====+====+=======+====+====+
| total |3235|3268|3696|51137|9051|6715|5644| 10428 |5958|4727|
| instances | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| of | | | | | | | | | | |
| complete | | | | | | | | | | |
| revocation | | | | | | | | | | |
+------------+----+----+----+-----+----+----+----+-------+----+----+
| total |3207|409 |979 | 4583|2670|2795|1624| 1759 |2969|1293|
Li, et al. Expires 25 April 2024 [Page 13]
Internet-Draft ROA Operational Granularity October 2023
| instances | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| of partial | | | | | | | | | | |
| revocation | | | | | | | | | | |
+------------+----+----+----+-----+----+----+----+-------+----+----+
Table 2: Statistics of authorization revocation instances.
A.3. Multi-Authorization Resolution
+==========+=====+=====+=====+=====+=====+=====+=====+=====+=====+=====+
| |2014-|2015-|2016-|2017-|2018-|2019-|2020-|2021-|2022-|2023-|
| | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| |07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|
+==========+=====+=====+=====+=====+=====+=====+=====+=====+=====+=====+
| possible | 38 | 70 | 70 | 87 | 170 | 551 | 643 | 1701| 2410| 2615|
| MOAS | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| | (7%)| (9%)| (5%)| (4%)| (4%)| (7%)| (6%)| (6%)| (6%)| (6%)|
+----------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
| resource | 439 | 580 | 951 | 1664| 2124| 4923| 6708|19052|24995|29739|
|allocation| | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| |(76%)|(74%)|(72%)|(67%)|(49%)|(63%)|(64%)|(69%)|(67%)|(65%)|
+----------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
| other | 97 | 135 | 299 | 732 | 2056| 2316| 3183| 6746|10098|13572|
| cases | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| |(17%)|(17%)|(23%)|(29%)|(47%)|(30%)|(30%)|(25%)|(27%)|(30%)|
+----------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
Table 3: Statistics of multi-authorization instances
Appendix B. Performance Evaluation
Li, et al. Expires 25 April 2024 [Page 14]
Internet-Draft ROA Operational Granularity October 2023
+----------+-----------------------+-----------------------+
| | IPv4 | IPv6 |
| +-------+-------+---------------+-------+-------+
| |single | | |single | | |
| |prefix |minimal|hanging|prefix |minimal|hanging|
| | ROA | ROA | ROA | ROA | ROA | ROA |
+----------------------------------------------------------+
|2014-07-21| 19289 | 17888 | 7394 | 1017 | 995 | 855 |
+----------------------------------------------------------+
|2015-07-21| 28512 | 26512 | 10562 | 1834 | 1804 | 1459 |
+----------------------------------------------------------+
|2016-07-21| 32523 | 30188 | 13069 | 2665 | 2627 | 2016 |
+----------------------------------------------------------+
|2017-07-21| 42553 | 39755 | 16366 | 4003 | 3919 | 2826 |
+----------------------------------------------------------+
|2018-07-21| 58925 | 54877 | 21815 | 5835 | 5693 | 3938 |
+----------------------------------------------------------+
|2019-07-21| 92366 | 86835 | 32095 | 10382 | 10228 | 6606 |
+----------------------------------------------------------+
|2020-07-21|163924 |155150 | 54198 | 19790 | 19456 | 11059 |
+----------------------------------------------------------+
|2021-07-21|240474 |222451 | 82579 | 34886 | 34059 | 18439 |
+----------------------------------------------------------+
|2022-07-21|323632 |298512 |113996 | 55957 | 54443 | 30281 |
+----------------------------------------------------------+
|2023-07-21|403635 |370282 |144493 | 76952 | 74137 | 41851 |
+----------------------------------+-------+-------+-------+
Table 4: Encoding cost with 3 schemes on 10 sets of authorizations.
Li, et al. Expires 25 April 2024 [Page 15]
Internet-Draft ROA Operational Granularity October 2023
+---------+-------------------------------+-------------------------------+
| | IPv4 | IPv6 |
| +---------------+-------------------------------+---------------+
| | Big | Small | Big | Small |
|threshold| prefix | prefix | prefix | prefix |
| of | block | block | block | block |
| block +---------------------------------------------------------------+
| size |minimal|hanging|minimal|hanging|minimal|hanging|minimal|hanging|
| | ROA | ROA | ROA | ROA | ROA | ROA | ROA | ROA |
+-------------------------------------------------------------------------+
| 1 | 11995 | 10952 | 358287| 136908| 878 | 1088 | 73259 | 40835 |
+-------------------------------------------------------------------------+
| 3 | 1894 | 2136 | 368388| 142816| 193 | 363 | 73944 | 41503 |
+-------------------------------------------------------------------------+
| 7 | 208 | 526 | 370074| 144094| 21 | 166 | 74116 | 41695 |
+-------------------------------------------------------------------------+
| 15 | 48 | 318 | 370234| 144221| 10 | 84 | 74127 | 41768 |
+-------------------------------------------------------------------------+
| 31 | 6 | 25 | 370276| 144479| 0 | 0 | 74137 | 41851 |
+-------------------------------------------------------------------------+
| 63 | 0 | 0 | 370282| 144493| 0 | 0 | 74137 | 41851 |
+---------+-------+-------+-----------------------+-------+-------+-------+
Table 5: Encoding cost with different settings of block size threshold.
Authors' Addresses
Yanbiao Li
CNIC, CAS
No.2 Dongsheng South Rd, Haidian District
Beijing
100083
China
Email: lybmath@cnic.cn
Jiankang Yao
CNNIC
No.4 South 4th Street, Zhongguancun
Beijing
100190
China
Email: yaojk@cnnic.cn
Di Ma
ZDNS
No.4 South 4th Street, Zhongguancun
Li, et al. Expires 25 April 2024 [Page 16]
Internet-Draft ROA Operational Granularity October 2023
Beijing
100190
China
Email: madi@zdns.cn
Li, et al. Expires 25 April 2024 [Page 17]