<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hmntsharma-grow-bmp-over-tls-01" category="info" submissionType="independent" updates="7854" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="BMP over TLS (BMPS)">BMPS: Transport Layer Security for BGP Monitoring Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hmntsharma-grow-bmp-over-tls-01"/>
    <author fullname="Hemant Sharma">
      <organization>Vodafone</organization>
      <address>
        <email>hemant.sharma@vodafone.com</email>
      </address>
    </author>
    <author fullname="Steven Clarke">
      <organization>Vodafone</organization>
      <address>
        <email>steven.clarke@vodafone.com</email>
      </address>
    </author>
    <author fullname="Asad Arafat">
      <organization>Nokia</organization>
      <address>
        <email>asad.arafat@nokia.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="08"/>
    <area>Ops &amp; Management</area>
    <workgroup>GROW</workgroup>
    <keyword>BMP Security</keyword>
    <keyword>BMP over TLS</keyword>
    <keyword>BMPS</keyword>
    <abstract>
      <?line 63?>

<t>The BGP Monitoring Protocol (BMP) defines the communication between a BMP station and multiple routers, referred to as network elements (NEs). This document describes BMP over TLS, which uses Transport Layer Security (TLS) to ensure secure transport between the NE and the BMP monitoring station. It updates <xref target="RFC7854"/> regarding BMP session establishment and termination.</t>
    </abstract>
  </front>
  <middle>
    <?line 67?>

<section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The BGP Monitoring Protocol (BMP), as defined in <xref target="RFC7854"/>, facilitates communication between NEs and a BMP station. Keeping this communication secure is important because it includes sharing sensitive information about BGP peers and monitored prefixes.</t>
      <t>The  <xref section="11" sectionFormat="of" target="RFC7854"/> , "Security Considerations" acknowledges that while routes in public networks are generally not confidential, BGP is also utilized in private L3VPN <xref target="RFC4364"/> networks where confidentiality is crucial. It highlights that without mutual authentication through secure transport mechanisms, the channel is vulnerable to various attacks and recommends using IPSec <xref target="RFC4303"/> in tunnel mode with pre-shared keys for enhanced security in such scenarios.</t>
      <t>Additionally, a recent draft proposal, <xref target="I-D.ietf-grow-bmp-tcp-ao"/>, titled "TCP-AO Protection for BGP Monitoring Protocol (BMP)" suggests an alternative approach using the TCP Authentication Option <xref target="RFC5925"/>. This method authenticates the endpoints of the TCP session, thereby safeguarding its integrity. TCP-AO is beneficial in situations where full IPSec security may not be feasible, although unlike IPSec, it does not encrypt the session traffic.</t>
      <t>Alternatively, Transport Layer Security (TLS), offers endpoint authentication, data encryption, and data integrity defined in the Transport Layer Security (TLS) Protocol Version 1.3 <xref target="RFC8446"/>.</t>
      <t>The BGP Monitoring Protocol (BMP) <xref target="RFC7854"/> relies on the TCP protocol to establish BGP sessions between routers.  There are ongoing discussions within the IETF <xref target="I-D.draft-liu-grow-bmp-over-quic"/> to replace TCP with the QUIC protocol <xref target="RFC9000"/>. QUIC brings many features compared to TCP including security, the support of multiple streams or datagrams.</t>
      <t>QUIC is suitable for BMP transport <xref target="I-D.draft-liu-grow-bmp-over-quic"/> and has the potential to replace a BMP connection for each "logical router" by a single QUIC connection with streams for the messages from each "logical router". However it's deployment is dependent on the adoption of QUIC in router management stacks which have historically lagged behind server developments due to their cautious approach and slower development rate.</t>
      <t>This document describes how BMP can operate over TCP/TLS.  Experience in implementing BGP over TLS/TCP <xref target="I-D.draft-wirtgen-bgp-tls"/> showed that this is less costly than porting a BGP implementation over QUIC and the similarities suggest that the same is true for BMP.</t>
      <t>This document describes how to utilize TLS to secure BMP sessions between a monitoring station (acting as the server) and a Network Element (acting as the client). Unlike BGP, where either side can act as the server, BMP's role distinction simplifies the implementation of TLS in a client-server model. Henceforth, the term BMP over TLS will be referred to as BMPS.</t>
    </section>
    <section anchor="bmp-over-tls-bmps">
      <name>BMP over TLS (BMPS)</name>
      <section anchor="operational-summary">
        <name>Operational Summary</name>
        <t>The operation of BMPS is virtually the same as the original BMP specification defined in <xref target="RFC7854"/>, but with an additional layer of security using TLS.</t>
        <t>In BMPS, the BMP station functions as the TLS server, while NEs act as TLS clients. Following the completion of the TCP three-way handshake, as defined in <xref section="3.4" sectionFormat="of" target="RFC793"/>, each NE, functioning as a TLS client, initiates a TLS handshake with the BMP monitoring station, acting as the TLS server. Once the TLS connection is successfully established, NEs can immediately start transmitting BMP messages, as there is no separate BMP initiation or handshake phase.</t>
        <t>The following steps summarize the operational flow of BMPS:</t>
        <ol spacing="normal" type="1"><li>
            <t>The NE initiates and completes a TCP handshake.</t>
          </li>
          <li>
            <t>The NE initiates and completes a TLS handshake with the BMP monitoring station.</t>
          </li>
          <li>
            <t>BMP messages are transmitted by the NE according to <xref target="RFC7854"/>.</t>
          </li>
        </ol>
        <t>A BMPS session ends when the underlying TCP or TLS session is terminated for any reason.</t>
        <t>The <xref section="3.2" sectionFormat="of" target="RFC7854"/> states, "No BMP message is ever sent from the monitoring station to the router." To adhere to this standard, the monitoring station MUST listen on separate ports for BMP (non-TLS) and BMPS (TLS) sessions. This approach also offers a simplified "make before break" migration from BMP to BMPS.</t>
      </section>
      <section anchor="transport-layer-security">
        <name>Transport Layer Security</name>
        <t>In regular TLS connections, the server has a TLS certificate along with a public/private key pair, whereas the client does not.</t>
        <t>For BMP over TLS (BMPS), it is REQUIRED to implement mutual TLS (mTLS), wherein both the server (BMP station) and the client (network element) have certificates, and both sides authenticate each other using their respective public/private key pairs.</t>
        <t>A self-signed "root" TLS certificate is REQUIRED for mTLS, allowing an organization to act as its own certificate authority. The certificates issued to both the BMP station and NEs should correspond to this root certificate.</t>
        <t>The operational flow of BMP over TLS is similar to standard TLS operations:</t>
        <ol spacing="normal" type="1"><li>
            <t>The NE initiates the connection to the BMP station.</t>
          </li>
          <li>
            <t>The station presents its TLS certificate.</t>
          </li>
          <li>
            <t>The NE verifies the station's certificate.</t>
          </li>
          <li>
            <t>The NE presents its TLS certificate.</t>
          </li>
          <li>
            <t>The station verifies the NE's certificate.</t>
          </li>
          <li>
            <t>The TLS connection is established.</t>
          </li>
          <li>
            <t>The NE begins transmitting BMP data to the station over the encrypted TLS channel.</t>
          </li>
        </ol>
        <t>TLS version 1.3, defined in <xref target="RFC8446"/>, streamlines the handshake process and supports more robust cipher suites compared to the previous versions, enhancing both speed and security.</t>
        <t>The BMPS is REQUIRED to support TLS 1.3 which has become a dominant standard.</t>
      </section>
      <section anchor="operational-recommendations-for-bmps">
        <name>Operational Recommendations for BMPS</name>
        <t>The BMP over TLS (BMPS) is RECOMMENDED as an alternative mechanism to safeguard BMP sessions in scenarios where alternative protections like IPSec may not be feasible or deployed.</t>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note: This section is to be removed from the final draft before publishing as an RFC.</t>
      <t>This section records the progress of a working implementation of BMP over TLS by creating a fork of the original implementation of [GoBMP] (https://github.com/sbezverk/gobmp) here at [BMP-over-TLS] (https://github.com/asadarafat/gobmp).</t>
      <t>The objective of this section is to assist IETF in the decision process, to progress this draft to an RFC.</t>
      <t>There is a wiki section [Validating BMP‐over‐TLS with GoBMP and GoBGP] (https://github.com/asadarafat/gobmp/wiki/Validating-BMP%E2%80%90over%E2%80%90TLS-with-GoBMP-and-GoBGP) in the same github repository, with a detailed walktrhough and a recorded demo, which is intented to be used as a proof of concept.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The BMPS implementation increases computational demands due to continuous encryption and decryption processes, resulting in high CPU utilization and potential vulnerability to denial-of-service attacks.</t>
      <t>The TLS cipher suites that provide only data integrity validation without encryption SHOULD NOT be used by default.</t>
      <t>The BMPS implementation SHOULD follow the best practices and recommendations for using TLS, as per the Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) as defined in <xref target="RFC7525"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC2818">
          <front>
            <title>HTTP Over TLS</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This memo describes how to use Transport Layer Security (TLS) to secure Hypertext Transfer Protocol (HTTP) connections over the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2818"/>
          <seriesInfo name="DOI" value="10.17487/RFC2818"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>
        <reference anchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP. The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t>This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
        <reference anchor="I-D.ietf-grow-bmp-tcp-ao">
          <front>
            <title>TCP-AO Protection for BGP Monitoring Protocol (BMP)</title>
            <author fullname="Hemant Sharma" initials="H." surname="Sharma">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <date day="23" month="January" year="2026"/>
            <abstract>
              <t>   This document outlines the utilization of the TCP Authentication
   Option (TCP-AO), as specified in [RFC5925], for the authentication of
   BGP Monitoring Protocol (BMP) sessions, as specified in [RFC7854].
   TCP-AO provides for the authentication of BMP sessions established
   between routers and BMP stations at the TCP layer.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bmp-tcp-ao-03"/>
        </reference>
        <reference anchor="I-D.draft-liu-grow-bmp-over-quic">
          <front>
            <title>Using BMP over QUIC connection</title>
            <author fullname="Yisong Liu" initials="Y." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Paolo Lucente" initials="P." surname="Lucente">
              <organization>NTT</organization>
            </author>
            <author fullname="Mukul Srivastava" initials="M." surname="Srivastava">
              <organization>Hewlett Packard Enterprise</organization>
            </author>
            <date day="21" month="January" year="2026"/>
            <abstract>
              <t>   The BGP Monitoring Protocol (BMP) provides a convenient interface
   for obtaining route views by monitoring BGP sessions. BMP operates
   over TCP and is unidirectional (from client to server). QUIC
   provides multiple simultaneous streams to carry data in one
   direction, enabling much better efficiency and performance for both
   peers, in particular unidirectional streams can provide reverse data
   protection for the sender. QUIC also provides shorter handshake and
   includes TLS. This document describes how to use BMP over the QUIC
   transport protocol, named BMPoQUIC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-liu-grow-bmp-over-quic-05"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="I-D.draft-wirtgen-bgp-tls">
          <front>
            <title>BGP over TLS/TCP</title>
            <author fullname="Thomas Wirtgen" initials="T." surname="Wirtgen">
              <organization>UCLouvain</organization>
            </author>
            <author fullname="Olivier Bonaventure" initials="O." surname="Bonaventure">
              <organization>UCLouvain &amp; WELRI</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document specifies the utilization of TCP/TLS to support BGP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wirtgen-bgp-tls-03"/>
        </reference>
      </references>
    </references>
    <?line 162?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is the result of studying all the referenced RFCs and drawing some parallels from PCEPS <xref target="RFC8253"/>, leading to the specification for BMP over TLS (BMPS).</t>
      <t>We are grateful to the contributors of the RFCs listed in the References section. Their work has been instrumental in shaping and inspiring the development of this specification.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
