Internet DRAFT - draft-li-sidrops-roa-granularity-problem-statement

draft-li-sidrops-roa-granularity-problem-statement







SIDROPS                                                            Y. Li
Internet-Draft                                                 CNIC, CAS
Intended status: Best Current Practice                            J. Yao
Expires: 25 April 2024                                             CNNIC
                                                                   D. Ma
                                                                    ZDNS
                                                         23 October 2023


On the Operational Granularity of RPKI ROA Management: Problem Statement
                            and Requirements
         draft-li-sidrops-roa-granularity-problem-statement-00

Abstract

   When using the Resource Public Key Infrastructure (RPKI) to perform
   route origin validation (ROV) with route origin authorizations
   (ROAs), there have been security and usability issues identified and
   reported.  This memo revisits these issues from the perspective of
   the operational granularity of ROA management, demonstrates problems
   and their root cause with the existing ROA encoding scheme,
   summarizes design requirements to address them, and evaluates three
   potential solutions.  Though neither of existing solutions satisfies
   all requirements, a hybrid solution composed of two existing schemes
   is recommended to use in ROA management.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 25 April 2024.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.




Li, et al.                Expires 25 April 2024                 [Page 1]

Internet-Draft         ROA Operational Granularity          October 2023


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Requirements Language . . . . . . . . . . . . . . . . . . . .   3
   3.  Problem Statement . . . . . . . . . . . . . . . . . . . . . .   3
     3.1.  Scattered Authorization Issuance  . . . . . . . . . . . .   3
     3.2.  Partial Authorization Revocation  . . . . . . . . . . . .   5
     3.3.  Multi-Authorization Resolution  . . . . . . . . . . . . .   6
     3.4.  A Brief Summary . . . . . . . . . . . . . . . . . . . . .   7
   4.  Requirements for Encoding and Managing ROAs . . . . . . . . .   8
     4.1.  Fine Granularity  . . . . . . . . . . . . . . . . . . . .   8
     4.2.  Incremental Update  . . . . . . . . . . . . . . . . . . .   8
     4.3.  High Efficiency and Scalability . . . . . . . . . . . . .   9
   5.  Evaluation of Potential Solutions . . . . . . . . . . . . . .   9
     5.1.  Single-prefix ROA . . . . . . . . . . . . . . . . . . . .   9
     5.2.  Minimal ROA . . . . . . . . . . . . . . . . . . . . . . .   9
     5.3.  Hanging ROA . . . . . . . . . . . . . . . . . . . . . . .  10
     5.4.  Requirements Satisfaction . . . . . . . . . . . . . . . .  10
     5.5.  Performance Evaluation  . . . . . . . . . . . . . . . . .  11
   6.  Recommendations . . . . . . . . . . . . . . . . . . . . . . .  11
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  12
   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  12
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  12
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .  12
     9.2.  Informative References  . . . . . . . . . . . . . . . . .  12
   Appendix A.  Statistic Results  . . . . . . . . . . . . . . . . .  13
     A.1.  Scattered Authorization Issuance  . . . . . . . . . . . .  13
     A.2.  Partial Authorization Revocation  . . . . . . . . . . . .  13
     A.3.  Multi-Authorization Resolution  . . . . . . . . . . . . .  14
   Appendix B.  Performance Evaluation . . . . . . . . . . . . . . .  14
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  16

1.  Introduction

   In the RPKI, an ROA is an attestation that the owner of an IP address
   block has authorized an autonomous system (AS) to originate routes in
   BGP for one or more prefixes within this address block[RFC6482].
   ROAs are used to identify route hijacking with RPKI-
   ROV[RFC6483][RFC6811].



Li, et al.                Expires 25 April 2024                 [Page 2]

Internet-Draft         ROA Operational Granularity          October 2023


   However, there are quite a few concerns about ROAs, in terms of
   security, reachability and scalability.  These issues have been
   noticed from way back, but were attributed to the partial deployment
   of RPKI or human errors in configuring ROAs all the while.  Departure
   from this widely accepted understanding, this memo explores the root
   cause of these issues in a new perspective, demonstrates problems
   with the existing ROA encoding scheme, and reveals that the root
   cause of them is the coarse-grained management of ROAs.  For this
   reason, some security or usability issues will retain even when the
   RPKI finishes its deployment and all operators are careful enough.

   Further, this memo summarizes the requirements in designing an
   efficient and concrete solution to resolve security and usability
   issues with ROAs, evaluates two possible solutions with these design
   principles and suggests the future direction for improvement.

2.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

3.  Problem Statement

   With the existing ROA encoding scheme, an IP prefix, as the root
   prefix, along with a maxLength parameter specifies the authorization
   of an AS originating a set of IP prefixes covered by the root prefix.
   These IP prefixes form a full binary tree rooted at the root prefix,
   and are referred to as a prefix block throughout this memo.  In case
   that the maxLength parameter is missing, only the ROA prefix is
   authorized.  Below, the problems with this scheme are demonstrated
   from the perspective of ROA management, and will retain even when the
   RPKI deployment is complete and there is no human errors.

3.1.  Scattered Authorization Issuance

   Authorization issuance is the most common and important operation in
   managing ROAs.  As the network management becomes more and more
   flexible, route origin authorizations issued to an AS is always
   scattered, for business or engineering purposes, such as resource
   reservation, resource allocation, route aggregation, traffic
   engineering, to name only a few.  In this case, it's difficult to
   determine a proper maxLength parameter in ROA encoding.  On one hand,
   a too-short maxLength parameter can render the legitimate BGP routes
   that carry the IP prefixes covered by but not included in this ROA
   "invalid"; on the other hand, a too-long maxLength parameter can lead
   to forged-origin sub-prefix hijack[RFC9319].




Li, et al.                Expires 25 April 2024                 [Page 3]

Internet-Draft         ROA Operational Granularity          October 2023


   Take the example shown in Figure 1 for instance.  The resource holder
   owns an IP address block starting from 202.127.16.0 to
   202.127.31.255, and issues an AS to originate 4 IP prefixes, A
   (202.127.16.0/20), B (202.127.16.0/21), C (202.127.24.0/21) and E
   (202.127.20.0/22), within this address block.  In case that the
   maxLength parameter is set to 21, a BGP route carrying the prefix E
   will be identified as "invalid" in RPKI ROV and thus becomes
   unreachable.  While if the maxLength parameter is set to 22, three
   other prefixes D, F, G will be included in the authorization.  In
   this case, the attacker can use these more specific prefixes to
   hijack part of the traffic destined for the prefixes A, B or C,
   leading to security risks.

+--------------------------------------------------------------------------+
|                            A=202.127.16.0/20                             |
+------------------------------------+-------------------------------------+
|           B=202.127.16.0/21        |         C=202.127.24.0/21           |
+--------------------------------------------------------------------------+
|XXXXXXX D XXXXXX| E=202.127.20.0/22 |XXXXXXX F XXXXXXX|XXXXXXXX G XXXXXXXX|
+--------------------------------------------------------------------------+
Figure 1: an example of scattered authorization issuance.

   This dilemma is a natural consequence of the fact that the
   authorization is managed at a granularity of the bundle of several IP
   prefixes.  This operational granularity is too coarse and is the root
   cause of the tradeoff to make between security and reachability.
   Worse yet, this granularity issue is essentially resulted from the
   fundamental encoding scheme taken by ROAs, and is thus hard to
   resolve completely within the existing framework.

   A statistical study on 10 BGP RIBs, collected from the same collector
   at Jan 1st every year since 2014 till now, and with corresponding ROA
   records demonstrates how the potential security and reachability
   issues resulted by the dilemma in ROA encoding would be.  In a RIB, a
   secure route prefix is the one that can be validated via ROAs; while,
   correspondingly, a route prefix that will be identified as "invalid"
   via ROAs is called unauthorized route prefix.  Besides, the
   authorized but not routed prefixes may be utilized by the attacker to
   hijack all or part of the traffic destined for other routed prefixes.
   These affected prefixes are thus called insecure route prefixes.











Li, et al.                Expires 25 April 2024                 [Page 4]

Internet-Draft         ROA Operational Granularity          October 2023


   As clearly demonstrated in Table 1, the fast growth of RPKI
   deployment does help increase the number of route prefixes protected
   by ROAs.  Correspondingly, the increasing speed of the number of
   unauthorized route prefixes has slowed down obviously since 2019.
   However, the number of insecure route prefixes increases as well,
   with a similar trend as the increasing of secure route prefixes.  In
   a word, the promotion of RPKI deployment can help protect more route
   prefixes but will also bring in more security risks due to improper
   configuration of ROAs.

3.2.  Partial Authorization Revocation

   In comparison with the authorization issuance, authorization
   revocation is an infrequent operation in managing ROAs, but it is
   important to keep the authorization status up-to-date.  In case that
   the authorization revocation is not performed timely and properly,
   the IP prefixes that are no longer authorized to be originated by an
   AS will remain authorized, opening an attack vector to route
   hijacking as a result.

   With the existing framework of managing ROAs, there is no "update"
   operation defined.  Consequently, the operational granularity in
   authorization revocation is the whole ROA that previously issued.  In
   case that only a part of the authorization is required to revoke, two
   steps are mandatory.  First, all previously issued ROAs that contain
   this part should be withdrawal, this adds a burden to the network
   operator because he has to remember all previously issued ROAs and
   what IP prefixes are authorized in each of them.  Second, all the IP
   prefixes from the other parts of original ROAs should be authorized
   again, triggering the case of "scattered authorization issuance".

   Take the example shown in Figure 2 for instance.  The original ROA
   contains 7 IP prefixes, where the authorization of two prefixes C
   (202.127.24.0/21) and F (202.127.24.0/22) is required to revoke.
   Then, the whole ROA should be withdrawal and the authorization of the
   rest 5 prefixes (A, B, D, E, G ) should be issued again.

+--------------------------------------------------------------------------+
|                            A=202.127.16.0/20                             |
+------------------------------------+-------------------------------------+
|           B=202.127.16.0/21        |         [C=202.127.24.0/21]         |
+--------------------------------------------------------------------------+
|D=202.127.16.0/22| E=202.127.20.0/22|[F=202.127.24.0/22]|G=202.127.28.0/22|
+--------------------------------------------------------------------------+
Figure 2: an example of partial authorization revocation






Li, et al.                Expires 25 April 2024                 [Page 5]

Internet-Draft         ROA Operational Granularity          October 2023


   A statistical study on 10 months of RPKI data records summarizes the
   instances of authorization revocations every month.  The results are
   shown in Table 2.  There are 13~147 partial authorization revocations
   everyday on average, which have taken a non-negligible part
   (8.2%~49.8%) of total instances of revocations.

3.3.  Multi-Authorization Resolution

   Generally, different ASes may issue their ROAs independently without
   any negotiation.  Thus, it's possible that their ROAs may overlap,
   leading to multi-authorization where the same set of IP prefixes are
   authorized to be originated from different ASes.

   In some cases, multi-authorization is useful, such as for the purpose
   of supporting MOAS or for the mitigation of DDoS attacks[RFC9319];
   but it may also be extremely harmful in some other cases, such as the
   case that one AS allocates a sub IP address space to its customer and
   their ROAs overlap.  In this case, the attacker can use those IP
   prefixes authorized to but won't be used by the provider (which has
   been allocated to the customer) for route hijacking.

   For example, suppose the provider owns an IP address block starting
   from 202.127.16.0/20, and is authorized to originate any IP prefix
   within this address block that is with a length not longer than 22.
   Then, it allocates a sub address block starting from 202.127.24.0/21
   to its customer, which is authorized to originate any IP prefix
   within this sub address block that is with a length not longer than
   23.  As a result, their ROAs overlap, where the intersection contains
   3 IP prefixes, C (202.127.24.0/21), F (202.127.24.0/22) and G
   (202.127.24.0/22).  Generally, the provider will not announce BGP
   routes with these IP prefixes any more, since they have been
   allocated to the customer, but they are still included in the
   provider's ROA.  This opens a near-permanent attack vector to route
   hijacking, where the attacker can use the IP prefixes in the
   intersection to hijack part of the traffic destined for the IP prefix
   A (202.127.16.0/20) owned by the provider, or that destined for the
   IP prefix C (202.127.24.0/21) owned by the customer.

   To resolve this security risk, the provider should revoke the
   authorization of IP prefixes in the intersection between its ROA and
   its customer's ROA, triggering partial authorization revocation as a
   result.









Li, et al.                Expires 25 April 2024                 [Page 6]

Internet-Draft         ROA Operational Granularity          October 2023


   A statistical study on 10 BGP RIBs and corresponding ROA records
   collected at the same day was conducted to evaluate the multi-
   authorization between two ASes, and the results are shown in Table 3.
   The case of possible resource allocation accounts for 48.8% ~ 76.3%
   of all instances in a day, where there is a potential security risk
   as discussed above.

3.4.  A Brief Summary

   As the growth of the Internet and the RPKI deployment, and in regard
   to flexible network operations, ROA management has to deal with
   scattered authorization issuance, partial authorization revocation
   and multi-authorization resolution.  However, with the existing
   scheme, the operational granularity of issuing route origin
   authorizations is a bundle of IP prefixes that share the same prefix
   length, while the operational granularity of authorization revocation
   is a whole ROA.  This sharply complicates the management of ROAs in
   the mentioned scenarios, resulting in non-negligible security and
   usability issues.

   The logical relation among the problems stated above are shown in
   Figure 3.  More specifically, it opens attack vector to route
   hijacking that if the partial authorization revocation or the multi-
   authorization resolution does not complete timely or properly.
   Actually, the key operation of the multi-authorization resolution is
   to perform partial authorization revocation, where the key operation
   turns to be scattered authorization issuance finally.  To complete
   this kind of issuance, there is a bad dilemma in determining the
   maxLength parameter to balance the security and usability.  Besides,
   to properly perform partial authorization revocation, the network
   operator has to record all previously issued ROAs and what IP
   prefixes they contain.  This can also be treated as a usability
   issue.

   Accordingly, all the problems stated in this memo are essentially
   caused by the coarse-grained management of route origin
   authorizations with the existing scheme, and thus has nothing to do
   with the RPKI deployment and human errors.  In another word, these
   security and usability issues will retain even when the RPKI finishes
   its deployment and all network operators are careful enough.











Li, et al.                Expires 25 April 2024                 [Page 7]

Internet-Draft         ROA Operational Granularity          October 2023


 +-----+  more BGP    +---------------------------------------------------+
 |  u  |announcements |                                                   |
 |  s  <--------------+ growth of the Internet and the deployment of RPKI |
 |  a  |  more origin |                                                   |
 |  b  |authorizations|increasing of the flexibility in network management|
 |  i  |              +-----+-------------------+------------------+------+
 |  l  |                    |                   |                  |
 |  i  |                    |                   |                  |
 |  t  |  too-short   +-----v-------+    +------v------+    +------v------+
 |  y  |  maxLength   |  Scattered  |    |   Partial   |    |   Multi-    |
 |     <--------------+Authorization<--+-+Authorization<----+Authorization|
 |  i  |              |  Issuance   |  | | Revocation  |    | Resolution  |
 |  s  |              +-------------+  | +-------------+    +-------------+
 |  s  |                    |too-long  |        |Fail              |Fail
 |  u  |                    |maxLength |        |                  |
 |  e  |              +-----v----------+--------v------------------v------+
 |     |              |                  security issue                   |
 +--^--+              +----------------+----------------------------------+
    |                                  |
    +----------------------------------+
    record all previously issued ROAs and what IP prefixes they contain

Figure 3: logical relation among stated problems.

4.  Requirements for Encoding and Managing ROAs

   In order to address the security and usability issues demonstrated
   above, a new scheme for encoding and managing ROAs is required.  This
   memo summarizes the requirements and four design principles in
   response to security, reachability and scalability issues.

4.1.  Fine Granularity

   Given that the coarse granularity in authorization management is the
   root cause of the dilemma between security and reachability, the most
   important design principle is to break this limitation with a
   solution that achieves fine-grained authorization management,
   especially that enables the management at the prefix granularity.

4.2.  Incremental Update

   To facilitate authorization revocation and thus multi-authorization
   resolution, the support of incremental update of authorizations is
   important.  This allows an ROA to be updated on demand without
   excessive withdrawal or redundant authorizations.






Li, et al.                Expires 25 April 2024                 [Page 8]

Internet-Draft         ROA Operational Granularity          October 2023


4.3.  High Efficiency and Scalability

   At last, the encoding efficiency as well as the scalability of the
   whole scheme should be taken into consideration, in regard to the
   fast growth of global routing tables and RPKI deployment.  In another
   word, the management of ROAs should not add too much burden to
   network operators or BGP routers, when there are more and more origin
   authorizations and BGP routes.

5.  Evaluation of Potential Solutions

   In the current literature, there are 3 potential solutions that might
   be able to satisfy above requirements to some extent.  The first two
   of them are extensions over the existing scheme, while the last one
   introduces a novel encoding scheme.

5.1.  Single-prefix ROA

   A straightforward solution is to eliminate the maxLength parameter
   for exact authorization issuance, by organizing ROAs as several
   single-prefix authorizations.  In this way, authorizations are
   managed prefix by prefix and thus efficient efficient incremental
   updates can be achieved, since the only update operation toward an
   ROA, namely a single-prefix authorization, is to revoke it.

   The only but a big drawback of this solution is the encoding
   efficiency and its scalability.  Every authorized prefix has to be
   managed as separate authorizations, adding up the management burden.
   In addition, the encoding of the authorization of a big prefix block
   (such as the AS0 ROAs) produces a huge number of entries, which may
   increase exponentially.

5.2.  Minimal ROA

   On basis of the single-prefix ROA, all authorized prefixes that form
   a full binary tree are aggregated into one ROA, with the maxLength
   parameter added back to specify the longest length of the IP prefixes
   contained in this authorization.  This is called minimal ROA[RFC9319]
   and it minimizes the use of maxLength parameter while keeping the
   feature of exact authorization issuance.  Essentially, it improves
   the encoding efficiency and scalability over the single-prefix ROA,
   but lacks in the support of efficient incremental updates.









Li, et al.                Expires 25 April 2024                 [Page 9]

Internet-Draft         ROA Operational Granularity          October 2023


5.3.  Hanging ROA

   Hanging ROA proposes to use a bitmap to encode a set of authorized IP
   prefixes.  This solution has a very good nature to support
   authorization management at the prefix granularity.  Besides, it can
   enable flexible and efficient incremental updates with the help of
   bit-masking operations.  However, this solution may become
   inefficient in dealing with a big prefix block, where either a rather
   long bitmap or a large number of bitmaps are required, restricting
   its scalability.

5.4.  Requirements Satisfaction

   Figure 4 compares the 3 schemes in view of their satisfaction to
   every design requirements.  In terms of encoding efficiency and
   scalability, two scenarios are evaluated separately, where the
   differences are the number and the volume of authorizations to
   encode.  In the first case, there are only a few big prefix blocks,
   each containing 64 or more IP prefixes, to encode; while there are a
   large number of small prefix blocks to encode in the second case.

+-------------+-----------+-----------+-------------------------------------+
|             |           |           | encoding efficiency and scalability |
|             |operational|support of +----------------+--------------------+
|             |granularity|incremental|case1: a few big|case2: lots of small|
|             |           |updates    |prefix blocks   |prefix blocks       |
+---------------------------------------------------------------------------+
|Single-prefix|   prefix  |    Yes    |       Bad      |       Bad          |
|     ROA     |           |           |                |                    |
+---------------------------------------------------------------------------+
|   Minimal   |  a set of |    No     |       Good     |       Bad          |
|     ROA     |  prefixes |           |                |                    |
+---------------------------------------------------------------------------+
|   Hanging   |   prefix  |    Yes    |       Bad      |       Good         |
|     ROA     |           |           |                |                    |
+-------------+-----------+-----------+----------------+--------------------+
Figure 4: summary of 3 potential solutions.


   In summary, both the single-prefix ROA and the hanging ROA manage
   authorizations at the prefix granularity, and thus support efficient
   incremental updates.  In regard to the encoding efficiency and
   scalability, the minimal ROA and the hanging ROA are better than the
   single-prefix ROA, but they are good at different scenarios.
   unfortunately, neither of the 3 potential solutions can perfectly
   satisfy all design requirements.





Li, et al.                Expires 25 April 2024                [Page 10]

Internet-Draft         ROA Operational Granularity          October 2023


5.5.  Performance Evaluation

   10 sets of authorized route prefixes are generated with 10 BGP RIBs
   and their corresponding ROA records collected at the same day, and
   are used to evaluate the encoding efficiency and scalability of the 3
   schemes.  In encoding each of the 10 sets, the number of encoded
   blocks in IPv4 and IPv6 are measured respectively.

   The results are recorded in Table 4.  Clearly, the hanging ROA has
   the highest encoding efficiency, and reduces the encoding cost in
   IPv4 by 30.4% ~ 66.9% and 27.1% ~ 65.1% in comparison with the
   single-prefix ROA and the minimal ROA respectively, while the
   reductions in IPv6 are 1.5% ~ 47.1% and 1.5% ~ 45.9% respectively.

   Table 5 shows the detailed results about the minimal ROA and the
   hanging ROA with different settings of defining what are big prefix
   blocks.  Since in both scheme, AS0 ROAs are maintained in the same
   form, they are eliminated from the results.  It is clear that the
   minimal ROA is more efficient to encode big prefix blocks than the
   hanging ROA; while the hanging ROA outperforms the minimal ROA in
   encoding small prefix blocks.  Besides, there is no prefix block that
   contains more than 63 prefixes, namely the difference between the
   prefix length and the maxLength is 6 or larger, in both IPv4 and
   IPv6.  This reflects the trend that more and more network operators
   prefer to issue exact authorizations.

6.  Recommendations

   For authorization issuance, it is recommended to authorize exactly
   what are about to use in BGP with a hybrid encoding scheme.  More
   specifically, hanging ROA should always be adopted to ensure
   efficient fine-grained management, unless when there is a need to
   authorize a big prefix block that contains more than 63 prefixes.
   Then, minimal ROA should be adopted alternatively.

   Once the authorization status changes, the corresponding updates
   toward previously issued ROAs should be performed timely and
   properly, especially those for authorization revocation.

   In case of resource allocation, the customer should obtain its
   authorizations as soon as possible to avoid reachability issues,
   while the provider should make careful checks and timely operations
   (revocations) to ensure that there is no unnecessary intersection
   between its ROA and its customer's ROA.







Li, et al.                Expires 25 April 2024                [Page 11]

Internet-Draft         ROA Operational Granularity          October 2023


7.  Security Considerations

   This document analyzes and reveals the root cause of potential
   security risks under RPKI-ROV.

   The recommended hybrid ROA encoding scheme MAY improve the security
   of using RPKI-ROV, and MUST NOT bring in additional security issues.

8.  IANA Considerations

   This document has no IANA actions.

9.  References

9.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC6482]  Lepinski, M., Kent, S., and D. Kong, "A Profile for Route
              Origin Authorizations (ROAs)", RFC 6482,
              DOI 10.17487/RFC6482, February 2012,
              <https://www.rfc-editor.org/info/rfc6482>.

   [RFC6483]  Huston, G. and G. Michaelson, "Validation of Route
              Origination Using the Resource Certificate Public Key
              Infrastructure (PKI) and Route Origin Authorizations
              (ROAs)", RFC 6483, DOI 10.17487/RFC6483, February 2012,
              <https://www.rfc-editor.org/info/rfc6483>.

   [RFC6811]  Mohapatra, P., Scudder, J., Ward, D., Bush, R., and R.
              Austein, "BGP Prefix Origin Validation", RFC 6811,
              DOI 10.17487/RFC6811, January 2012,
              <https://www.rfc-editor.org/info/rfc6811>.

   [RFC9319]  Gilad, Y., Goldberg, S., Sriram, K., Snijders, J., and B.
              Maddison, "The Use of maxLength in the Resource Public Key
              Infrastructure (RPKI)", RFC 9319, DOI 10.17487/RFC9319,
              January 2012, <https://www.rfc-editor.org/info/rfc9319>.

9.2.  Informative References








Li, et al.                Expires 25 April 2024                [Page 12]

Internet-Draft         ROA Operational Granularity          October 2023


   [RFC3410]  Case, J., Mundy, R., Partain, D., and B. Stewart,
              "Introduction and Applicability Statements for Internet-
              Standard Management Framework", RFC 3410,
              DOI 10.17487/RFC3410, December 2002,
              <https://www.rfc-editor.org/info/rfc3410>.

Appendix A.  Statistic Results

A.1.  Scattered Authorization Issuance

   +============+=====+=====+=====+=====+=====+=====+=====+=====+=====+=====+
   |            |2014-|2015-|2016-|2017-|2018-|2019-|2020-|2021-|2022-|2023-|
   |            |     |     |     |     |     |     |     |     |     |     |
   |            |     |     |     |     |     |     |     |     |     |     |
   |            |     |     |     |     |     |     |     |     |     |     |
   |            |07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|
   +============+=====+=====+=====+=====+=====+=====+=====+=====+=====+=====+
   |secure route| 15K | 22K | 28K | 38K | 52K | 101K| 166K| 256K| 335K| 412K|
   |   prefix   |     |     |     |     |     |     |     |     |     |     |
   +------------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
   |  insecure  |  9K | 11K | 13K | 16K | 18K | 37K | 49K | 71K | 95K | 127K|
   |route prefix|     |     |     |     |     |     |     |     |     |     |
   +------------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
   |unauthorized|  4K |  3K |  3K |  6K | 12K |  7K |  8K | 10K |  8K |  9K |
   |route prefix|     |     |     |     |     |     |     |     |     |     |
   +------------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
   |   total    | 546K| 596K| 661K| 724K| 802K| 893K| 967K|1065K|1132K|1178K|
   +------------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+

         Table 1: Statistics on different kinds of route prefixes.

A.2.  Partial Authorization Revocation

   +============+====+====+====+=====+====+====+====+=======+====+====+
   |            |2022|2022|2022| 2023|2023|2023|2023|  2023 |2023|2023|
   |            |    |    |    |     |    |    |    |       |    |    |
   |            |    |    |    |     |    |    |    |       |    |    |
   |            |-10 |-11 |-12 | -01 |-02 |-03 |-04 |  -05  |-06 |-07 |
   +============+====+====+====+=====+====+====+====+=======+====+====+
   |   total    |3235|3268|3696|51137|9051|6715|5644| 10428 |5958|4727|
   | instances  |    |    |    |     |    |    |    |       |    |    |
   |            |    |    |    |     |    |    |    |       |    |    |
   |            |    |    |    |     |    |    |    |       |    |    |
   |     of     |    |    |    |     |    |    |    |       |    |    |
   |  complete  |    |    |    |     |    |    |    |       |    |    |
   | revocation |    |    |    |     |    |    |    |       |    |    |
   +------------+----+----+----+-----+----+----+----+-------+----+----+
   |   total    |3207|409 |979 | 4583|2670|2795|1624|  1759 |2969|1293|



Li, et al.                Expires 25 April 2024                [Page 13]

Internet-Draft         ROA Operational Granularity          October 2023


   | instances  |    |    |    |     |    |    |    |       |    |    |
   |            |    |    |    |     |    |    |    |       |    |    |
   |            |    |    |    |     |    |    |    |       |    |    |
   | of partial |    |    |    |     |    |    |    |       |    |    |
   | revocation |    |    |    |     |    |    |    |       |    |    |
   +------------+----+----+----+-----+----+----+----+-------+----+----+

        Table 2: Statistics of authorization revocation instances.

A.3.  Multi-Authorization Resolution

   +==========+=====+=====+=====+=====+=====+=====+=====+=====+=====+=====+
   |          |2014-|2015-|2016-|2017-|2018-|2019-|2020-|2021-|2022-|2023-|
   |          |     |     |     |     |     |     |     |     |     |     |
   |          |     |     |     |     |     |     |     |     |     |     |
   |          |     |     |     |     |     |     |     |     |     |     |
   |          |07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|07-21|
   +==========+=====+=====+=====+=====+=====+=====+=====+=====+=====+=====+
   | possible |  38 |  70 |  70 |  87 | 170 | 551 | 643 | 1701| 2410| 2615|
   |   MOAS   |     |     |     |     |     |     |     |     |     |     |
   |          |     |     |     |     |     |     |     |     |     |     |
   |          |     |     |     |     |     |     |     |     |     |     |
   |          | (7%)| (9%)| (5%)| (4%)| (4%)| (7%)| (6%)| (6%)| (6%)| (6%)|
   +----------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
   | resource | 439 | 580 | 951 | 1664| 2124| 4923| 6708|19052|24995|29739|
   |allocation|     |     |     |     |     |     |     |     |     |     |
   |          |     |     |     |     |     |     |     |     |     |     |
   |          |     |     |     |     |     |     |     |     |     |     |
   |          |(76%)|(74%)|(72%)|(67%)|(49%)|(63%)|(64%)|(69%)|(67%)|(65%)|
   +----------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
   |  other   |  97 | 135 | 299 | 732 | 2056| 2316| 3183| 6746|10098|13572|
   |  cases   |     |     |     |     |     |     |     |     |     |     |
   |          |     |     |     |     |     |     |     |     |     |     |
   |          |     |     |     |     |     |     |     |     |     |     |
   |          |(17%)|(17%)|(23%)|(29%)|(47%)|(30%)|(30%)|(25%)|(27%)|(30%)|
   +----------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+

            Table 3: Statistics of multi-authorization instances

Appendix B.  Performance Evaluation











Li, et al.                Expires 25 April 2024                [Page 14]

Internet-Draft         ROA Operational Granularity          October 2023


   +----------+-----------------------+-----------------------+
   |          |          IPv4         |         IPv6          |
   |          +-------+-------+---------------+-------+-------+
   |          |single |       |       |single |       |       |
   |          |prefix |minimal|hanging|prefix |minimal|hanging|
   |          | ROA   |  ROA  |  ROA  | ROA   |  ROA  |  ROA  |
   +----------------------------------------------------------+
   |2014-07-21| 19289 | 17888 |  7394 |  1017 |   995 |   855 |
   +----------------------------------------------------------+
   |2015-07-21| 28512 | 26512 | 10562 |  1834 |  1804 |  1459 |
   +----------------------------------------------------------+
   |2016-07-21| 32523 | 30188 | 13069 |  2665 |  2627 |  2016 |
   +----------------------------------------------------------+
   |2017-07-21| 42553 | 39755 | 16366 |  4003 |  3919 |  2826 |
   +----------------------------------------------------------+
   |2018-07-21| 58925 | 54877 | 21815 |  5835 |  5693 |  3938 |
   +----------------------------------------------------------+
   |2019-07-21| 92366 | 86835 | 32095 | 10382 | 10228 |  6606 |
   +----------------------------------------------------------+
   |2020-07-21|163924 |155150 | 54198 | 19790 | 19456 | 11059 |
   +----------------------------------------------------------+
   |2021-07-21|240474 |222451 | 82579 | 34886 | 34059 | 18439 |
   +----------------------------------------------------------+
   |2022-07-21|323632 |298512 |113996 | 55957 | 54443 | 30281 |
   +----------------------------------------------------------+
   |2023-07-21|403635 |370282 |144493 | 76952 | 74137 | 41851 |
   +----------------------------------+-------+-------+-------+
   Table 4: Encoding cost with 3 schemes on 10 sets of authorizations.























Li, et al.                Expires 25 April 2024                [Page 15]

Internet-Draft         ROA Operational Granularity          October 2023


+---------+-------------------------------+-------------------------------+
|         |              IPv4             |           IPv6                |
|         +---------------+-------------------------------+---------------+
|         |      Big      |     Small     |      Big      |     Small     |
|threshold|    prefix     |    prefix     |    prefix     |    prefix     |
|   of    |     block     |     block     |     block     |     block     |
|  block  +---------------------------------------------------------------+
|  size   |minimal|hanging|minimal|hanging|minimal|hanging|minimal|hanging|
|         |  ROA  |  ROA  |  ROA  |  ROA  |  ROA  |  ROA  |  ROA  |  ROA  |
+-------------------------------------------------------------------------+
|     1   | 11995 | 10952 | 358287| 136908| 878   | 1088  | 73259 | 40835 |
+-------------------------------------------------------------------------+
|     3   |  1894 |  2136 | 368388| 142816| 193   |  363  | 73944 | 41503 |
+-------------------------------------------------------------------------+
|     7   |   208 |   526 | 370074| 144094|  21   |  166  | 74116 | 41695 |
+-------------------------------------------------------------------------+
|    15   |    48 |   318 | 370234| 144221|  10   |   84  | 74127 | 41768 |
+-------------------------------------------------------------------------+
|    31   |     6 |    25 | 370276| 144479|   0   |    0  | 74137 | 41851 |
+-------------------------------------------------------------------------+
|    63   |     0 |     0 | 370282| 144493|   0   |    0  | 74137 | 41851 |
+---------+-------+-------+-----------------------+-------+-------+-------+

Table 5: Encoding cost with different settings of block size threshold.

Authors' Addresses

   Yanbiao Li
   CNIC, CAS
   No.2 Dongsheng South Rd, Haidian District
   Beijing
   100083
   China
   Email: lybmath@cnic.cn


   Jiankang Yao
   CNNIC
   No.4 South 4th Street, Zhongguancun
   Beijing
   100190
   China
   Email: yaojk@cnnic.cn


   Di Ma
   ZDNS
   No.4 South 4th Street, Zhongguancun



Li, et al.                Expires 25 April 2024                [Page 16]

Internet-Draft         ROA Operational Granularity          October 2023


   Beijing
   100190
   China
   Email: madi@zdns.cn















































Li, et al.                Expires 25 April 2024                [Page 17]