<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fu-sidrops-enhanced-slurm-filter-05" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Enhanced SLURM Filters">Filtering Out RPKI Data by Type based on Enhanced SLURM Filters</title>
    <seriesInfo name="Internet-Draft" value="draft-fu-sidrops-enhanced-slurm-filter-05"/>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy44@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="24"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 52?>
<t>Simplified Local Internet Number Resource Management with the RPKI (SLURM) helps operators create a local view of the global RPKI by generating sets of filters and assertions. This document proposes to filter out RPKI data by type based on enhanced SLURM filters. Only the RPKI data types that the network or routers are interested in will appear in the Relying Party's output.</t>
    </abstract>
  </front>
  <middle>
    <?line 55?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Relying Party (RP) collects signed RPKI objects from global RPKI publication points. The RPKI data passing RP's validation will appear in RP's output. Then, the RPKI-to-Router (RTR) protocol <xref target="RFC6810"/><xref target="RFC8210"/><xref target="I-D.ietf-sidrops-8210bis"/> will synchronize the validated RPKI data from RP to routers. Currently, four types of RPKI data including IPv4 Prefix, IPv6 Prefix, Router Key, and ASPA are supported in the RTR protocol.</t>
      <t>However, in some cases, routers may be interested in a part of RPKI data types, instead of all. In such cases, synchronizing all types of data to routers is unreasonable.</t>
      <t>Furthermore, there may be more types of RPKI data in the RPKI repositories and RPs in the future. Ignoring the router's requirements and directly synchronizing all types of data to the router may induce unnecessary and non-negligible transmission and storage overheads. The followings are example types, and some of them may be possibly supported in the RPKI system in the future:</t>
      <ul spacing="normal">
        <li>
          <t>Secured Routing Policy Specification Language (RPSL) <xref target="RFC7909"/></t>
        </li>
        <li>
          <t>Signed Prefix Lists <xref target="I-D.ietf-sidrops-rpki-prefixlist"/></t>
        </li>
        <li>
          <t>Autonomous Systems Cones <xref target="I-D.ietf-grow-rpki-as-cones"/></t>
        </li>
        <li>
          <t>Mapping Origin Authorizations (MOAs) <xref target="I-D.ietf-sidrops-moa-profile"/></t>
        </li>
        <li>
          <t>Signed SAVNET-Peering Information (SiSPI) <xref target="I-D.chen-sidrops-sispi"/></t>
        </li>
        <li>
          <t>Path validation with RPKI <xref target="I-D.van-beijnum-sidrops-pathrpki"/></t>
        </li>
        <li>
          <t>Signed Groupings of Autonomous System Numbers <xref target="I-D.spaghetti-sidrops-rpki-asgroup"/></t>
        </li>
      </ul>
      <t>SLURM provides a simple way to enable an RP to establish a local and customized view of the RPKI (<xref target="RFC8416"/>, <xref target="I-D.ietf-sidrops-aspa-slurm"/>). It defines Validation Output Filters to filter out specific RPKI data items and Locally Added Assertions to add RPKI data items. Although SLURM supports filtering out all IPv4 or IPv6 prefixes through the all-zero address prefixes, it does not support filtering out all RPKI data of other specified types.</t>
      <t>This document proposes enhanced SLURM filters which can filter out RPKI data by type. With enhanced SLURM filters, operators can efficiently select which type of RPKI data need to be synchronized to routers.</t>
      <t>The proposed method requires some modifications on the SLURM-related process of RP software. Upgrades of the RTR protocol implementations and router software implementations are not involved.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-uc">
      <name>Use Case</name>
      <t>One of use cases is IPv6-only network. Suppose a IPv6-only network wants to enable ROV on BGP border routers. The routers are only interested in IPv6-related BGP validation because the routers can only receive IPv6 routes from neighbor ASes. Therefore, IPv4 Prefix data, Router Key data, and any other data except IPv6 prefix data are not useful for the network. An example of IPv6-only network is New China Education and Research Network (named Future Internet Technology Infrastructure, FITI).</t>
      <artwork><![CDATA[
                     +------------+
                     | Rely Party |
                     +------------+
                      /          \
                     / Sync RPKI  \
                    /  data by RTR \
         +---------/----------------\---------+
   IPv6  |        /                  \        |IPv6
   routes| +----------+          +----------+ |routes
   ------->|BGP router|          |BGP router| |------>
         | +----------+          +----------+ |
         |             IPv6-only              |
         +------------------------------------+

]]></artwork>
      <t>As described in Section <xref target="sec-intro"/>, there may be more types of RPKI data in the RPKI repositories and RPs. Thus, there will be more use cases where a network does not need all types of RPKI data in the future.</t>
    </section>
    <section anchor="sec-design">
      <name>Enhanced SLURM Filters</name>
      <t>This section proposes two optional designs.</t>
      <section anchor="design-1-define-a-matchall-member-in-filters">
        <name>Design 1: Define a "matchAll" member in filters</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object which has the same structure as <xref target="I-D.ietf-sidrops-aspa-slurm"/>, except that the "slurmVersion" member <bcp14>MUST</bcp14> be set to 3 (TBD). A new member called "matchAll" is defined for the ROA Prefix filters, BGPsec filters, ASPA filters, and possibly new types of filters defined in the future. The value of the "matchAll" member <bcp14>MUST</bcp14> be "true".</t>
        <t>To filter out a specific type of RPKI data, the RP can configure exactly one filter of the specific type which includes the "matchAll" member. If a filter includes the "matchAll" member, it may only optionally contain the "comment" member and <bcp14>SHOULD NOT</bcp14> include any other members besides "comment". When a filter containing the "matchAll" member exists, no other filters of the same type should exist—regardless of whether those other filters contain the "matchAll" member or not.</t>
        <t>Example 1：Filter out all the VRPs with IPv4 and IPv6 Prefixes</t>
        <artwork><![CDATA[
  "prefixFilters": [
    {
      "matchAll": true, 
      "comment": "Filter out all the VRPs with IPv4 and IPv6 Prefixes"
    }
  ]
]]></artwork>
        <t>If one want to filter either IPv4 or IPv6 prefixes, just reuse the existing SLURM mechanism, that is, filtering by using all-zero address prefixes.</t>
        <t>Example 1.1：Filter out all the VRPs with IPv4 Prefixes</t>
        <artwork><![CDATA[
  "prefixFilters": [
    {
      "prefix": 0.0.0.0/0, 
      "comment": "Filter out all the VRPs with IPv4 Prefixes"
    }
  ]
]]></artwork>
        <t>Example 1.2：Filter out all the VRPs with IPv6 Prefixes</t>
        <artwork><![CDATA[
  "prefixFilters": [
    {
      "prefix": ::/0, 
      "comment": "Filter out all the VRPs with IPv6 Prefixes"
    }
  ]
]]></artwork>
        <t>Example 2：Filter out all the Router Keys</t>
        <artwork><![CDATA[
  "bgpsecFilters": [
    {
      "matchAll": true, 
      "comment": "Filter out all the Router Keys"
    }
  ]
]]></artwork>
      </section>
      <section anchor="design-2-rpki-data-type-filters">
        <name>Design 2: RPKI Data Type Filters</name>
        <t>A SLURM file consists of a single JSON <xref target="RFC8259"/> object containing the following members:</t>
        <ul spacing="normal">
          <li>
            <t>A "slurmVersion" member that <bcp14>MUST</bcp14> be set to 3 (TBD), encoded as a number</t>
          </li>
          <li>
            <t>A "validationOutputFilters" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly four members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixFilters" member, see Section 3.3.1 of <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecFilters" member, see section 3.3.2 of <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaFilters" member, see Section 3.1 of <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
              <li>
                <t>A "typeFilters" member</t>
              </li>
            </ul>
          </li>
          <li>
            <t>A "locallyAddedAssertions" member whose value is an object. The object <bcp14>MUST</bcp14> contain exactly three members:  </t>
            <ul spacing="normal">
              <li>
                <t>A "prefixAssertions" member, see Section 3.4.1 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "bgpsecAssertions" member, see Section 3.4.2 <xref target="RFC8416"/></t>
              </li>
              <li>
                <t>A "aspaAssertions" member, see Section 3.2 <xref target="I-D.ietf-sidrops-aspa-slurm"/></t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following JSON structure with JSON members represents a SLURM file that has no filters or assertions:</t>
        <artwork><![CDATA[
  {
    "slurmVersion": 3,
    "validationOutputFilters": {
      "aspaFilters": [],
      "bgpsecFilters": [],
      "prefixFilters": [],
      "typeFilters": []
    },
    "locallyAddedAssertions": {
      "aspaAssertions": [],
      "bgpsecAssertions": [],
      "prefixAssertions": []
    }
  }
]]></artwork>
        <section anchor="rpki-data-type-filters">
          <name>RPKI Data Type Filters</name>
          <t>There are currently four types of RPKI data. More types may be defined in the future.</t>
          <ul spacing="normal">
            <li>
              <t>IPv4 Prefix</t>
            </li>
            <li>
              <t>IPv6 Prefix</t>
            </li>
            <li>
              <t>Router Key</t>
            </li>
            <li>
              <t>ASPA</t>
            </li>
          </ul>
          <t>The RP can configure zero or at most four RPKI Data Type Filters ("Type Filter" for short). Each Type Filter contains a single 'rpkiDataType' and optionally a single 'comment'.</t>
          <ul spacing="normal">
            <li>
              <t>The 'rpkiDataType' member <bcp14>MUST</bcp14> be one of the values, i.e., "IPv4 Prefix", "IPv6 Prefix", "Router Key", and "ASPA".</t>
            </li>
            <li>
              <t>It is <bcp14>RECOMMENDED</bcp14> that an explanatory comment is included with each Type Filter so that it can be shown to users of the RP software.</t>
            </li>
          </ul>
          <t>Any RPKI data item that matches any configured Type Filter <bcp14>MUST</bcp14> be removed from the RP's output.</t>
          <t>A RPKI data item is considered to match with a Type Filter if the following condition applies: The item is considered to match if the RPKI data type of the item is equal to the "rpkiDataType" value of Type Filter.</t>
          <t>The following example JSON structure represents a "typeFilter" member with one object as described above:</t>
          <artwork><![CDATA[
  "typeFilter": [
    {
      "rpkiDataType": "Router Key", 
      "comment": "Filter out all Router Keys"
    }
  ]
]]></artwork>
          <t>In the example, all the Router Keys will be filtered out by SLURM.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations in Section 6 of <xref target="RFC8416"/> are also applied to this document.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Much thanks for the valuable comments or feedback from Job Snijders, Jeff Haas, Ying Wang, and Randy Bush.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8416" target="https://www.rfc-editor.org/info/rfc8416" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8416.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-24" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Arrcus, DRL, &amp; IIJ Research</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <author fullname="Tom Harrison" initials="T." surname="Harrison">
              <organization>Asia Pacific Network Information Centre</organization>
            </author>
            <date day="5" month="February" year="2026"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data, Router Keys, and ASPA data from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-24"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-slurm" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-slurm-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-slurm.xml">
          <front>
            <title>Simplified Local Internet Number Resource Management (SLURM) with RPKI Autonomous System Provider Authorizations (ASPA)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Ben Cartwright-Cox" initials="B." surname="Cartwright-Cox">
              <organization>Port 179 Ltd</organization>
            </author>
            <date day="16" month="November" year="2025"/>
            <abstract>
              <t>ISPs may want to establish a local view of exceptions to the Resource Public Key Infrastructure (RPKI) data in the form of local filters or additional attestations. This document defines an addendum to RFC 8416 by specifying a format for local filters and local assertions for Autonomous System Provider Authorizations (ASPA) for use with the RPKI.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-slurm-04"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7909" target="https://www.rfc-editor.org/info/rfc7909" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7909.xml">
          <front>
            <title>Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures</title>
            <author fullname="R. Kisteleki" initials="R." surname="Kisteleki"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications of such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have authentication (based on Routing Policy System Security) of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects. This document updates RFCs 2622 and 4012 to add the signature attribute to supported RPSL objects.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7909"/>
          <seriesInfo name="DOI" value="10.17487/RFC7909"/>
        </reference>
        <reference anchor="I-D.van-beijnum-sidrops-pathrpki" target="https://datatracker.ietf.org/doc/html/draft-van-beijnum-sidrops-pathrpki-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.van-beijnum-sidrops-pathrpki.xml">
          <front>
            <title>Path validation with RPKI</title>
            <author fullname="Iljitsch van Beijnum" initials="I." surname="van Beijnum">
              <organization>BGPexpert.com</organization>
            </author>
            <date day="20" month="June" year="2019"/>
            <abstract>
              <t>This memo adds the capability to validate the full BGP AS path to the RPKI mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-van-beijnum-sidrops-pathrpki-00"/>
        </reference>
        <reference anchor="I-D.ietf-grow-rpki-as-cones" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-rpki-as-cones-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-rpki-as-cones.xml">
          <front>
            <title>RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>NTT Ltd.</organization>
            </author>
            <author fullname="stucchi-lists@glevia.com" initials="" surname="stucchi-lists@glevia.com">
              <organization>Independent</organization>
            </author>
            <author fullname="Melchior Aelmans" initials="M." surname="Aelmans">
              <organization>Juniper Networks</organization>
            </author>
            <date day="24" month="April" year="2020"/>
            <abstract>
              <t>This document describes a way to define groups of Autonomous System numbers in RPKI [RFC6480]. We call them AS-Cones. AS-Cones provide a mechanism to be used by operators for filtering BGP-4 [RFC4271] announcements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-rpki-as-cones-02"/>
        </reference>
        <reference anchor="I-D.spaghetti-sidrops-rpki-asgroup" target="https://datatracker.ietf.org/doc/html/draft-spaghetti-sidrops-rpki-asgroup-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.spaghetti-sidrops-rpki-asgroup.xml">
          <front>
            <title>A profile for RPKI Signed Groupings of Autonomous System Numbers (ASGroup)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Fredrik Korsbäck" initials="F." surname="Korsbäck">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="16" month="November" year="2022"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry a general-purpose listing of Autonomous System Numbers (ASNs) and/or pointers to other groupings of ASNs, called an ASGroup. Additionally, the document specifies a mechanism for ASN holders to opt-out of being listed in a given ASGroup. The objective is to offer a RPKI-based successor to plain-text RFC 2622 'as-set' class objects. When validated, an ASGroup confirms that the respective ASN holder produced the ASGroup object.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-spaghetti-sidrops-rpki-asgroup-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-prefixlist" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-prefixlist.xml">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="10" month="December" year="2025"/>
            <abstract>
              <t>This document defines a "Signed Prefix List", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to carry the complete list of prefixes which an Autonomous System (the subject AS) may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the subject AS produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by the subject AS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-05"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-moa-profile-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <author fullname="Di Ma" initials="D." surname="Ma">
              <organization>ZDNS</organization>
            </author>
            <date day="11" month="January" year="2026"/>
            <abstract>
              <t>This document proposes a new approach by leveraging Resource Public Key Infrastructure (RPKI) architecture to verify the authenticity of the mapping origin of an IPv4 address block. MOA is a newly defined cryptographically signed object that provides a means for the address holder can authorize an IPv6 mapping prefix to originate mapping for one or more IPv4 prefixes. When receiving the MOA objects from the relying parties, PE devices can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-moa-profile-03"/>
        </reference>
        <reference anchor="I-D.chen-sidrops-sispi" target="https://datatracker.ietf.org/doc/html/draft-chen-sidrops-sispi-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.chen-sidrops-sispi.xml">
          <front>
            <title>A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="September" year="2025"/>
            <abstract>
              <t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter- domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-04"/>
        </reference>
      </references>
    </references>
    <?line 273?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
