<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 4.0.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ling-sidrops-rov-tag-profile-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ROV_TAG">A Profile for ROV Deployment Transparency</title>

    <author fullname="Sitong Ling">
      <organization>Zhongguancun Lab</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lingst@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Capital Normal University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang@cnu.edu.cn</email>
      </address>
    </author>

    <date year="2026" month="February" day="10"/>

    <area>Security</area>
    <workgroup>SIDROPS</workgroup>
    <keyword>RPKI, ROV, BGP, security</keyword>

    <abstract>


<?line 83?>

<t>This document defines a Cryptographic Message Syntax (CMS) protected
content type for ROV Deployment Transparency (ROV_TAG) objects for use
with the Resource Public Key Infrastructure (RPKI).  An ROV_TAG is a
digitally signed object through which an Autonomous System (AS) that
has deployed Route Origin Validation (ROV) can declare its ROV
deployment status.  When validated, an ROV_TAG's eContent can be
used by ASes to identify which ASes have deployed ROV, enabling path
selection decisions when hijacked routes are detected (see Section 3).</t>



    </abstract>



  </front>

  <middle>


<?line 95?>

<section anchor="introduction"><name>Introduction</name>

<t>Route Origin Validation (ROV) <xref target="RFC6811"/> is a critical security
mechanism for BGP routing that uses the Resource Public Key
Infrastructure (RPKI) to verify the legitimacy of route
announcements.  However, ROV deployment is currently partial, with
a significant portion of ASes not yet having deployed ROV.</t>

<t>In partial ROV deployment scenarios, the main security concern is:</t>

<t>When an AS has deployed ROV and performs ROV validation, it may detect
a hijacked route announcement that was propagated by an upstream AS.
This indicates that the upstream AS has not deployed ROV or is not
properly performing ROV validation.  If the AS continues using paths
through that upstream AS, its traffic may be hijacked.  However, the AS
cannot determine which alternative paths go through upstream ASes that
have deployed ROV, making it difficult to make informed path selection
decisions to avoid the compromised upstream AS.</t>

<t>This document defines a profile for ROV Deployment Transparency
(ROV_TAG) objects that allows ASes to register their ROV deployment
status in RPKI.  This provides transparency about which ASes have
deployed ROV.  When an AS detects a hijacked route announcement from
an upstream AS, it can use ROV_TAG information to identify alternative
paths where the immediate upstream AS has deployed ROV, enabling it to
avoid paths through upstream ASes that have propagated hijacked routes
(see Section 3).</t>

<t>This CMS <xref target="RFC5652"/> protected content type definition conforms to the
<xref target="RFC6488"/> template for RPKI signed objects.  This document defines
the object identifier (OID), ASN.1 syntax, and validation steps for
ROV_TAG objects.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>This document uses the following terminology:</t>

<t><list style="symbols">
  <t><strong>Origin AS</strong>: The Autonomous System (AS) that originates a BGP route
announcement.  The Origin AS is defined as the last AS in the AS_PATH
attribute of the BGP route announcement, as specified in <xref target="RFC4271"/>.</t>
  <t><strong>Non-origin AS</strong>: Any AS in the AS_PATH of a BGP route announcement
that is not the Origin AS.  In an AS_PATH containing multiple ASes,
all ASes except the last one (the Origin AS) are non-origin ASes.</t>
</list></t>

</section>
</section>
<section anchor="the-rovtag"><name>The ROV_TAG</name>

<section anchor="the-rovtag-content-type"><name>The ROV_TAG Content Type</name>

<t>The content-type for an ROV_TAG is defined as id-ct-ROVTAG, which has
the numerical value of 1.2.840.113549.1.9.16.1.TBD.  This OID <bcp14>MUST</bcp14>
appear both within the eContentType in the encapContentInfo structure
as well as the content-type signed attribute within the signerInfo
structure (see <xref target="RFC6488"/>).</t>

</section>
<section anchor="the-rovtag-econtent"><name>The ROV_TAG eContent</name>

<t>The content of an ROV_TAG identifies the AS that has deployed ROV.</t>

<t>The eContent of an ROV_TAG is an instance of ROVDeploymentAttestation,
formally defined by the following ASN.1 module:</t>

<figure><artwork><![CDATA[
RPKI-ROV-TAG-2026
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
     pkcs-9(9) smime(16) modules(0) id-mod-rpki-rov-tag-2026(TBD) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  CONTENT-TYPE
  FROM CryptographicMessageSyntax-2010  -- RFC 6268
    { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
       pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

id-ct-ROVTAG OBJECT IDENTIFIER ::=
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
    pkcs-9(9) id-smime(16) id-ct(1) rovtag(TBD) }

ct-ROVTAG CONTENT-TYPE ::=
  { TYPE ROVDeploymentAttestation IDENTIFIED BY id-ct-ROVTAG }

ROVDeploymentAttestation ::= SEQUENCE {
  version        [0] INTEGER DEFAULT 0,
  asID           ASID,
  rovDeployed    BOOLEAN }

ASID ::= INTEGER (0..4294967295)

END
]]></artwork></figure>

<t>Note that this content appears as the eContent within the
encapContentInfo as specified in <xref target="RFC6488"/>.</t>

</section>
<section anchor="version"><name>version</name>

<t>The version number of the ROVDeploymentAttestation that complies with
this specification <bcp14>MUST</bcp14> be 0 and <bcp14>MUST</bcp14> be explicitly encoded.</t>

</section>
<section anchor="asid"><name>asID</name>

<t>The asID field contains the AS number of the Autonomous System that is
declaring its ROV deployment status.</t>

</section>
<section anchor="rovdeployed"><name>rovDeployed</name>

<t>The rovDeployed field is a BOOLEAN that indicates whether the AS has
deployed ROV.  Since only ASes that have deployed ROV register ROV_TAG
objects, this field <bcp14>MUST</bcp14> be set to TRUE.</t>

<t>For ASes that provide transit services (i.e., ASes that forward
traffic for other ASes) that have deployed ROV, it is <bcp14>RECOMMENDED</bcp14> that
they register an ROV_TAG object with rovDeployed set to TRUE.  Stub
ASes (end networks, content providers, etc. that do not provide transit
services) are <bcp14>NOT RECOMMENDED</bcp14> to register ROV_TAG objects, as they
typically appear as Origin ASes in BGP route announcements.</t>

</section>
<section anchor="rovtag-validation"><name>ROV_TAG Validation</name>

<t>To validate an ROV_TAG, a relying party <bcp14>MUST</bcp14> perform all the validation
checks specified in <xref target="RFC6488"/> as well as the following additional
ROV_TAG-specific validation steps:</t>

<t><list style="symbols">
  <t>The Autonomous System Identifier Delegation Extension <xref target="RFC3779"/>
<bcp14>MUST</bcp14> be present in the end-entity (EE) certificate contained within
the ROV_TAG.  The asID in the ROV_TAG eContent <bcp14>MUST</bcp14> match the ASId
specified by the EE certificate's Autonomous System Identifier
Delegation Extension.</t>
  <t>The Autonomous System Identifier Delegation Extension <bcp14>MUST</bcp14> contain
exactly one "id" element (Section 3.2.3.6 of <xref target="RFC3779"/>) and <bcp14>MUST
NOT</bcp14> contain any "inherit" elements (Section 3.2.3.3 of <xref target="RFC3779"/>)
or "range" elements (Section 3.2.3.7 of <xref target="RFC3779"/>).</t>
  <t>The IP Address Delegation Extension <xref target="RFC3779"/> <bcp14>MUST</bcp14> be absent.</t>
  <t>The rovDeployed field <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> be set to TRUE.
Since only ASes that have deployed ROV register ROV_TAG objects,
this field <bcp14>MUST</bcp14> always be TRUE.</t>
</list></t>

<t>If any of the above checks fail, the ROV_TAG in its entirety <bcp14>MUST</bcp14> be
considered invalid and an error <bcp14>SHOULD</bcp14> be logged.</t>

</section>
</section>
<section anchor="use-case-secure-path-selection"><name>Use Case: Secure Path Selection</name>

<t>In partial ROV deployment scenarios, when an AS filters a hijacked route
announcement received from an upstream AS through ROV validation, this
indicates that the upstream AS has accepted and propagated the hijacked
route.  This may occur because the upstream AS has not deployed ROV or
is not properly performing ROV validation.  In this situation, the AS
<bcp14>SHOULD</bcp14> avoid using paths through that upstream AS for traffic destined
to the affected prefix.</t>

<t>This use case describes a defensive mechanism that is triggered when
an AS detects a security problem.  Specifically:</t>

<t><list style="numbers" type="1">
  <t>The AS performs ROV validation and detects a hijacked route
announcement.</t>
  <t>The AS identifies that the hijacked route was propagated by an
upstream AS (the immediate upstream AS).</t>
  <t>The AS recognizes that <strong>the current path it is using also goes
through this same immediate upstream AS</strong> that propagated the hijacked
route.</t>
  <t><strong>At this point</strong>, if the AS continues using the current path through
that upstream AS, the data plane traffic will go through the hijacked
upstream AS, leading to the same hijacking.</t>
  <t>As a defensive measure, the AS can use ROV_TAG information obtained
from its RPKI Relying Party (RP) to identify alternative paths from
the BGP route announcements it has already received.  An alternative
path is one where the immediate upstream AS has deployed ROV (i.e.,
has registered an ROV_TAG object with rovDeployed set to TRUE).</t>
  <t>The AS checks the ROV deployment status of upstream ASes in the
AS_PATH of received route announcements against the ROV_TAG
information.  If such alternative paths exist, the AS <bcp14>MAY</bcp14> prefer them
over the path through the upstream AS that propagated the hijacked
route.</t>
</list></t>

<t>This approach is based on the following reasoning:</t>

<t><list style="symbols">
  <t>If an upstream AS has deployed ROV, it will filter invalid route
announcements and will not propagate hijacked routes.</t>
  <t>If an upstream AS has deployed ROV, it may also implement secure
path selection (i.e., avoid paths through upstream ASes that have
propagated hijacked route announcements when it detects such
announcements).  This creates a mechanism where ASes can prefer paths
through upstream ASes that have deployed ROV.  The logic is
straightforward: if an AS detects that an upstream AS has propagated
a hijacked route announcement (by filtering it through ROV validation),
it <bcp14>SHOULD</bcp14> select an alternative secure path.  Conversely, if no
hijacked route announcements are detected from an upstream AS, that
upstream AS is considered secure, and there is no need to select an
alternative path.</t>
  <t>Therefore, if an alternative path exists where the immediate
upstream AS has deployed ROV, that path is more likely to be secure
from that point forward, reducing the risk that traffic will be
hijacked.</t>
</list></t>

<t>The decision to use alternative paths is a matter of local policy.
An AS <bcp14>MAY</bcp14>:</t>

<t><list style="symbols">
  <t>Continue using normal BGP path selection when no hijacked route
announcements are detected.</t>
  <t>When an AS filters a hijacked route announcement received from an
upstream AS, consider alternative paths (where the immediate
upstream AS has deployed ROV) as a defensive measure to avoid the
path through the upstream AS that propagated the hijacked route.
This defensive measure is triggered only when a security problem
is detected.</t>
  <t>Fall back to normal BGP path selection if no alternative paths with
ROV-deployed upstream ASes are available.</t>
</list></t>

<t>This addresses the security vulnerability problem by enabling ASes to
avoid paths through upstream ASes that have propagated hijacked routes.
Such paths are identified through ROV validation.  When alternative
secure paths are available, this reduces the risk of route hijacking
even in partial ROV deployment scenarios.</t>

<t>Note: This is a heuristic defensive mechanism and does not provide
cryptographic security guarantees.  The use of alternative paths is
<bcp14>OPTIONAL</bcp14> and subject to local policy.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>This section discusses operational aspects of ROV_TAG deployment and
usage.</t>

<section anchor="querying-rovtag-information"><name>Querying ROV_TAG Information</name>

<t>ROV_TAG objects are stored in the RPKI repository alongside other RPKI
objects (e.g., ROAs, ASPAs).  Relying Parties (RPs) process ROV_TAG
objects as part of their standard RPKI repository synchronization and
validation procedures, as specified in <xref target="RFC6488"/>.</t>

<t>ASes obtain ROV_TAG information from their RPKI Relying Party (RP)
(e.g., through RPKI-to-Router protocols such as <xref target="RFC6810"/> or
<xref target="RFC8210"/>).  ASes can query this information efficiently to determine
whether upstream ASes have deployed ROV.  Real-time queries to the
RPKI repository or RP are not required during BGP path selection.</t>

</section>
<section anchor="performance-considerations"><name>Performance Considerations</name>

<t>The number of ASes that provide transit services is relatively small
compared to the total number of ASes, which means the total number of
ROV_TAG objects is expected to be manageable.  This results in minimal
storage and query overhead compared to other RPKI objects such as ROAs.</t>

<t>Query operations for ROV_TAG information can be performed efficiently
using standard data structures (e.g., hash tables keyed by AS number),
enabling fast lookups during BGP path selection.</t>

</section>
<section anchor="deployment-recommendations"><name>Deployment Recommendations</name>

<t>For ASes that provide transit services and have deployed ROV, it is
<bcp14>RECOMMENDED</bcp14> that they register an ROV_TAG object with rovDeployed set
to TRUE.  This provides transparency about ROV deployment.  It also
enables downstream ASes to make informed path selection decisions when
hijacked routes are detected.</t>

<t>Stub ASes (end networks, content providers, etc.) are <bcp14>NOT RECOMMENDED</bcp14>
to register ROV_TAG objects, as they typically appear as Origin ASes in
BGP route announcements.</t>

</section>
</section>
<section anchor="implementation-considerations"><name>Implementation Considerations</name>

<t>This section provides guidance for implementers of ROV_TAG support.</t>

<t>ROV_TAG is a new RPKI object type.  Existing RPKI RP implementations
that do not support ROV_TAG will simply ignore ROV_TAG objects during
repository synchronization, as per the RPKI validation rules specified
in <xref target="RFC6488"/>.  This ensures backward compatibility: ROV_TAG objects
do not interfere with existing RPKI operations, and ASes that have not
deployed ROV_TAG support can continue to operate normally.</t>

<t>RP implementations that support ROV_TAG <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Validate ROV_TAG objects according to the validation steps specified
in Section 2.6.</t>
  <t>Make validated ROV_TAG information available to ASes (e.g., through
RPKI-to-Router protocols such as <xref target="RFC6810"/> or <xref target="RFC8210"/>).</t>
</list></t>

<t>The number of ROV_TAG objects is expected to be relatively small
compared to other RPKI objects such as ROAs.  This is because only ASes
that provide transit services are expected to register ROV_TAG objects.</t>

<t>Implementers that choose to implement the secure path selection
described in Section 3 <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Obtain ROV_TAG information from the RPKI Relying Party (RP) (e.g.,
through RPKI-to-Router protocols such as <xref target="RFC6810"/> or <xref target="RFC8210"/>).</t>
  <t>Implement efficient ROV_TAG lookup mechanisms, such as hash tables
keyed by AS number, to quickly determine whether upstream ASes in the
AS_PATH have deployed ROV by querying the ROV_TAG information.</t>
  <t>Implement logic to detect when a hijacked route announcement is
received from an upstream AS and identify alternative paths where the
immediate upstream AS has deployed ROV.</t>
  <t>Provide configuration options to enable or disable secure path
selection.  This allows operators to make informed decisions based on
their operational requirements and risk tolerance.</t>
  <t>Log secure path selection decisions (e.g., when alternative paths are
selected) to facilitate troubleshooting and security auditing.</t>
  <t>Handle cases where ROV_TAG information is unavailable gracefully by
falling back to normal BGP path selection.</t>
</list></t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security considerations of <xref target="RFC6481"/>, <xref target="RFC6485"/>, and <xref target="RFC6488"/>
also apply to ROV_TAG objects.</t>

<t>There is no assumption of confidentiality for the data in an ROV_TAG;
it is anticipated that ROV_TAG objects will be stored in repositories
that are accessible to all ISPs, and perhaps to all Internet users.
The integrity of an ROV_TAG <bcp14>MUST</bcp14> be established through cryptographic
signing and validation according to <xref target="RFC6488"/>.</t>

<t>A fundamental limitation of ROV_TAG is that the information is
self-asserted: an AS may register an ROV_TAG with rovDeployed set to TRUE
but not actually perform ROV validation.  ROV_TAG does not provide
cryptographic verification that ROV validation is actually being
performed.  A malicious AS could register an ROV_TAG to attract traffic
when other ASes are looking for alternative paths.  However, several
factors mitigate this risk:</t>

<t><list style="symbols">
  <t>The secure path selection mechanism is defensive in nature - it is
triggered only when a security problem is detected (hijacked route),
not used for general path selection.  This reduces the opportunity
for exploitation.</t>
  <t>Registering an ROV_TAG in RPKI creates a public record.  ASes
generally care about their reputation in the routing community, and
false claims about ROV deployment could damage that reputation.
While this does not provide cryptographic verification, it does
provide some level of accountability.</t>
  <t>ASes could maintain local violation records (not in RPKI) to track
when upstream ASes that have registered ROV_TAG propagate invalid
route announcements.  Such mechanisms are non-standardized and
implementation-specific, but they demonstrate that ROV_TAG can
enable accountability even without cryptographic verification of
actual ROV deployment.</t>
</list></t>

<t>These factors reduce the risk of exploitation, though they do not
eliminate it entirely.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document will require IANA to assign values in several registries.
The specific assignments will be determined during the IETF review
process.  The following registrations are anticipated:</t>

<t><list style="symbols">
  <t>An OID for the RPKI-ROV-TAG-2026 ASN.1 module in the "SMI Security
for S/MIME Module Identifier" registry.</t>
  <t>An OID for the ROV_TAG content type in the "SMI Security for S/MIME
CMS Content Type" registry.</t>
  <t>An entry for ROV_TAG in the "RPKI Signed Object" registry.</t>
</list></t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC4271">
  <front>
    <title>A Border Gateway Protocol 4 (BGP-4)</title>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
    <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
      <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
      <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
      <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4271"/>
  <seriesInfo name="DOI" value="10.17487/RFC4271"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC3779">
  <front>
    <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
    <author fullname="C. Lynn" initials="C." surname="Lynn"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="June" year="2004"/>
    <abstract>
      <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3779"/>
  <seriesInfo name="DOI" value="10.17487/RFC3779"/>
</reference>
<reference anchor="RFC5652">
  <front>
    <title>Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2009"/>
    <abstract>
      <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="70"/>
  <seriesInfo name="RFC" value="5652"/>
  <seriesInfo name="DOI" value="10.17487/RFC5652"/>
</reference>
<reference anchor="RFC6481">
  <front>
    <title>A Profile for Resource Certificate Repository Structure</title>
    <author fullname="G. Huston" initials="G." surname="Huston"/>
    <author fullname="R. Loomans" initials="R." surname="Loomans"/>
    <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
    <date month="February" year="2012"/>
    <abstract>
      <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6481"/>
  <seriesInfo name="DOI" value="10.17487/RFC6481"/>
</reference>
<reference anchor="RFC6485">
  <front>
    <title>The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI)</title>
    <author fullname="G. Huston" initials="G." surname="Huston"/>
    <date month="February" year="2012"/>
    <abstract>
      <t>This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists, and signed objects as well as for the relying parties (RPs) that verify these digital signatures. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6485"/>
  <seriesInfo name="DOI" value="10.17487/RFC6485"/>
</reference>
<reference anchor="RFC6488">
  <front>
    <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
    <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
    <author fullname="A. Chi" initials="A." surname="Chi"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="February" year="2012"/>
    <abstract>
      <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6488"/>
  <seriesInfo name="DOI" value="10.17487/RFC6488"/>
</reference>
<reference anchor="RFC6810">
  <front>
    <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <date month="January" year="2013"/>
    <abstract>
      <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6810"/>
  <seriesInfo name="DOI" value="10.17487/RFC6810"/>
</reference>
<reference anchor="RFC6811">
  <front>
    <title>BGP Prefix Origin Validation</title>
    <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
    <author fullname="J. Scudder" initials="J." surname="Scudder"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <date month="January" year="2013"/>
    <abstract>
      <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6811"/>
  <seriesInfo name="DOI" value="10.17487/RFC6811"/>
</reference>
<reference anchor="RFC8210">
  <front>
    <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <date month="September" year="2017"/>
    <abstract>
      <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
      <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8210"/>
  <seriesInfo name="DOI" value="10.17487/RFC8210"/>
</reference>

<reference anchor="X.680" target="https://www.itu.int/rec/T-REC-X.680">
  <front>
    <title>Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="name" value="ITU-T Recommendation"/>
  <seriesInfo name="value" value="X.680"/>
</reference>
<reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
  <front>
    <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="name" value="ITU-T Recommendation"/>
  <seriesInfo name="value" value="X.690"/>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC6268">
  <front>
    <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="July" year="2011"/>
    <abstract>
      <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6268"/>
  <seriesInfo name="DOI" value="10.17487/RFC6268"/>
</reference>



    </references>

</references>


<?line 494?>

<section anchor="example-rovtag-econtent-payload"><name>Example ROV_TAG eContent Payload</name>

<t>Below is an example of a DER-encoded ROV_TAG eContent with annotation
following the '#' character.</t>

<t>Example: Transit AS with ROV deployed</t>

<t><spanx style="verb">
$ echo 30080201000203000D050201FF | xxd -r -ps | openssl asn1parse \
  -inform DER -dump -i
0:d=0  hl=2 l=   8 cons: SEQUENCE
2:d=1  hl=2 l=   1 prim:  INTEGER   :00        # version = 0
5:d=1  hl=2 l=   3 prim:  INTEGER   :0D05      # asID = 3333
10:d=1  hl=2 l=   1 prim:  BOOLEAN   :FF        # rovDeployed = TRUE
</spanx></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

