<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
    which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs),
    please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that
    most I-Ds might want to use.
    (Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space
    (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" docName="draft-liu-sidrops-rpki-rtr-over-quic-03"
ipr="trust200902" consensus="true">
  <!-- category values: std, bcp, info, exp, and historic
    ipr values: full3667, noModification3667, noDerivatives3667
    you can add the attributes updates="NNNN" and obsoletes="NNNN"
    they will automatically be output with "(if approved)" -->

  <!-- ***** FRONT MATTER ***** -->

  <front>

    <title abbrev="RPKI to Router over QUIC">
    RPKI to Router Protocol over QUIC</title>

    <!-- add 'role="editor"' below for the editors if appropriate -->

    <!-- Another author who claims to be an editor -->

    <author fullname="Shengnan Yue" initials="S."
            surname="Yue">
      <organization>China Mobile</organization>

      <address>
        <postal>
          <!--<street>8 Yongjia North Road</street>-->
          <!-- Reorder these if your country does things differently -->

          <!--<region>Haidian District</region>-->

          <!--<code>100094</code>-->

          <country>China</country>
        </postal>

        <email>yueshengnan@chinamobile.com</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>

    <author fullname="Changwang Lin" initials="C."
            surname="Lin">
      <organization>New H3C Technologies</organization>

      <address>
        <postal>
          <!--<street>8 Yongjia North Road</street>-->
          <!-- Reorder these if your country does things differently -->

          <city>Beijing</city>

          <!--<region>Haidian District</region>-->

          <!--<code>100094</code>-->

          <country>China</country>
        </postal>

        <email>linchangwang.04414@h3c.com</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>
    <author fullname="Jishnu Roy" initials="J."
            surname="Roy">
      <organization>HPE Networking</organization>

      <address>
        <postal>
          <street>1133 Innovation Way</street>
          <!-- Reorder these if your country does things differently -->

          <city>Sunnyvale</city>

          <!--<region></region>-->

          <code>CA 94089</code>

          <country>United States of America</country>
        </postal>

        <email>jishnu.roy@hpe.com</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>
    <author fullname="Di Ma" initials="D."
            surname="Ma">
      <organization>ZDNS</organization>

      <address>
        <postal>
          <street>Floor 21, Block B, Greenland Center</street>
          <!-- Reorder these if your country does things differently -->

          <city>Chaoyang Beijing, 100102</city>

          <!--<region></region>-->

          <!--<code></code>-->

          <country>China</country>
        </postal>

        <email>madi@zdns.cn</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>
    <author fullname="Yisong Liu" initials="Y."
            surname="Liu">
      <organization>China Mobile</organization>

      <address>
        <postal>
          <!--<street>8 Yongjia North Road</street>-->
          <!-- Reorder these if your country does things differently -->

          <city>Beijing</city>

          <!--<region>Haidian District</region>-->

          <!--<code>100094</code>-->

          <country>China</country>
        </postal>

        <email>liuyisong@chinamobile.com</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>

    <date year="2026" />

    <!-- Meta-data Declarations -->

    <area>General</area>

    <workgroup>SIDROPS</workgroup>

    <keyword>SIDROPS</keyword>
    <keyword>RPKI</keyword>
    <keyword>QUIC</keyword>

<abstract>
<t>
	The Resource Public Key Infrastructure (RPKI) to Router Protocol provides a simple but reliable mechanism to receive cryptographically
  validated RPKI prefix origin data and router keys from a trusted cache. RPKI to Router (RTR) Protocol can be carried over various
  transports such as TCP, SSH or else. QUIC provides practical and secure semantics for the RTR protocol, particularly fast connection
  establishment and multi-stream carrying, thereby reducing the time required to complete RTR data synchronization.
  This document describes how to use RTR Protocol over the QUIC transport protocol, named RTRoQUIC.
</t>

</abstract>

  </front>

  <middle>

<section anchor="Introduction" title="Introduction">
<t>
	In order to verifiably validate the origin Autonomous Systems (ASes) and AS paths of BGP announcements,
  the Resource Public Key Infrastructure (RPKI) to Router Protocol <xref target="RFC8210"/> provides a simple but reliable
  mechanism to receive cryptographically validated RPKI <xref target="RFC6480"/> prefix origin data and router keys from a trusted cache.
</t>
<t>
   The transport-layer session between a router and a cache carries the binary Protocol Data Units (PDUs) in a persistent session.
   To prevent cache spoofing and DoS attacks by illegitimate routers, it is highly desirable that the router and the cache
   be authenticated to each other. Integrity protection for payloads is also desirable to protect against Man-in-the-Middle (MITM) attacks.
</t>
<t>
   The RPKI to Router (RTR) Protocol is not bound to any particular transport protocol, but allows a mapping to define
   how it could be implemented over any specific transport protocol. At present, some secure transport protocols are
   defined to carry RTR Protocol: TCP-A0 transport <xref target="RFC5925"/>, Secure Shell version 2 (SSHv2) transport <xref target="RFC4252"/>,
   TCP MD5 transport <xref target="RFC5925"/>, TCP over IPsec transport <xref target="RFC4301"/>, and Transport Layer Security (TLS)
   transport <xref target="RFC8446"/>. However, because of the connection-oriented feature, almost all of the current
   secure transport protocols used by RTR Protocol is TCP based. As is well known, TCP has some shortcomings such as head-of-line blocking.
</t>
<t>
   QUIC <xref target="RFC9000"/> is a UDP-based multiplexed and secure transport protocol that provides connection-oriented
   and stateful interaction between a client and server. It can provide low latency and encrypted transport with resilient connections.
</t>
<t>
   QUIC uses multiple simultaneous streams to carry data in one direction. Each stream is a separate unidirectional or
   bidirectional channel consisting of an ordered stream of bytes. In Addition, each stream has its own flow control,
   which limit bytes sent on a stream, together with flow control of the connection.
</t>
<t>
   Compared with the current secure transport protocols used by RTR Protocol, QUIC offers the following advantages:
</t>
<ul>
   <li>Higher-speed connection establishment and restoration.
    <t>QUIC integrates TLS 1.3 into its core. For servers with which it has previously connected,
       the client can carry application data (such as an RTR session request) in the first packet,
       achieving "0-RTT" recovery. Even for the first connection, only one RTT is needed to
       complete the cryptographic handshake. In contrast, TCP+TLS requires at least 2-3 RTTs.</t>
    <t>This allows RTR caching servers or routers to almost instantly resume synchronization
       with the RPKI verification database after restarting or switching networks, greatly
       reducing the "blank period" of routing verification information caused by synchronization delays
       and improving the resilience and response speed of routing security.</t>
   </li>
   <li>Completely eliminate TCP head-of-line blocking and improve transmission efficiency.
    <t>QUIC implements multiple independent "streams" on top of UDP. In an RTR context, different PDUs
       can be mapped to different QUIC streams. Packet loss in one stream only affects the retransmission
       of that stream; data in other streams can continue to be processed and parsed by the application layer.</t>
    <t>In network environments with a certain packet loss rate, the overall completion time for RTR data synchronization
       will be shorter and more predictable.</t>
   </li>
   <li>Enhanced connectivity migration and network resilience.
    <t>QUIC connections use a connection ID instead of the traditional four-tuple (source/destination IP, port)
       for identification. When the client's network address changes (e.g., during router failover or mobile network switching),
       the QUIC connection can remain intact as long as the connection ID remains the same.</t>
    <t>RTR sessions can continue uninterrupted after a network layer failover, avoiding TCP connection drops and re-handshakes
       caused by IP address changes, thus further ensuring the continuity of RPKI data synchronization.</t>
   </li>
   <li>Built-in security.
    <t>QUIC's encryption and authentication are mandatory and built-in. This eliminates any risk of misconfiguration
       leading to plaintext transmission.</t>
   </li>
</ul>
<t>
   Therefore, QUIC is the appropriate and secure transport protocol choice for the RTR protocol message transmission mechanism.
   This document specifies how to use QUIC as the secure transport protocol for RTR Protocol.
</t>
</section>

<section anchor="Terminology-definitions" title="Terminology and Definitions">
<t>
  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
  NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
  "MAY", and "OPTIONAL" in this document are to be interpreted as
  described in BCP 14 <xref target="RFC2119"/> <xref
  target="RFC8174"/> when, and only when, they appear in all
  capitals, as shown here.
</t>
<t>
  In this document, the terms "client" and "server" are used to refer to the two ends of the QUIC connection.
  The client actively initiates the QUIC connection. The terms "router" and "cache" are used to refer to the
  two ends of the RTR Protocol session. A router establishes and keeps open a connection to one or more caches,
  generally, a "router" is a "client" meanwhile a "cache" is a "server".
</t>
<t>
  <list style="symbols">
  <t>
		Client: The endpoint that initiates a QUIC connection, the RTR router.
	</t>
  <t>
		Server: The endpoint that accepts a QUIC connection, the RTR cache.
	</t>
  </list>
</t>
</section>

<section anchor="Connection-management" title="Connection Management">

  <section anchor="Connection-establishment" title="Connection Establishment">
  <t>
    QUIC connection establishment is described in <xref target="RFC9000"/>. During establishing connection,
    RTRoQUIC support is indicated by selecting the Application-Layer Protocol Negotiation (ALPN) <xref target="RFC7301"/>
    token as listed in the IANA Section 7 in the TLS handshake.
  </t>
  <t>
    The router MUST also act as the client meanwhile the cache must also act as the server.
  </t>
  <t>
    The router should be the initiator of the QUIC connection to the cache meanwhile the cache acts as a connection acceptor.
  </t>
  <t>
    The QUIC protocol uses TLS 1.3 messages to secure the transport.
    TLS 1.3 supports Early Data (also known as 0-RTT data) <xref target="RFC9001"/>, and TLS 1.3 can be used without Early Data.
    Early Data provides weaker security than standard TLS, lacking forward secrecy and replay attack protection.
    Because RPKI data is used to verify the legitimacy of BGP route advertisements, any tampering, forgery, or leakage could
    lead to large-scale route hijacking, traffic disruption, or eavesdropping. Therefore, RPKI data security requirements
    are extremely high.
  </t>
  <t>
    This document specifies that RTRoQUIC implementations MUST NOT utilize Early Data (0-RTT).
    Clients MUST NOT include early_data extensions in ClientHello messages, and servers MUST reject such extensions if presented.
    Implementations MUST configure their TLS 1.3 stacks to disable 0-RTT functionality.
  </t>
  </section>

  <section anchor="Connection-termination" title="Connection Termination">

    <section anchor="QUIC-termination-process" title="QUIC Connection Termination Process">
      <t>
        The typical QUIC connection termination process is described in <xref target="RFC9000"/>.
      </t>
    </section>

    <section anchor="RTRoQUIC-termination-considerations" title="RTRoQUIC Considerations for Connection Termination">
      <t>
        When a RTR session is implemented based on a QUIC connection, the idle timeout should be disabled or the QUIC max_idle_timeout
        should be set appropriately in order to keep the QUIC connection persistent even if the RTR session is idle.
      </t>
      <t>
        When the cache and router support different versions, the checker should close the RTR session and the associated QUIC connection.
      </t>
      <t>
        When a router or cache is detecting the interruption of the QUIC connection, it SHOULD terminate the connection.
      </t>
    </section>

  </section>

</section>

<section anchor="Stream-mapping-usage" title="Stream Mapping and Usage">
  <t>
    Currently, there are eleven kinds of RTR Protocol Data Units (PDUs) exchanged between the cache and the router,
    namely Serial Notify PDU, Serial Query PDU, Reset Query PDU, Cache Response PDU, IPv4 Prefix PDU, IPv6 Prefix PDU,
    End of Data PDU, Cache Reset PDU, Router Key PDU, Error Report PDU and ASPA PDU <xref target="I-D.ietf-sidrops-8210bis"/>.
    The eleven kinds of RTR PDUs need to be mapped into QUIC streams.
  </t>
  <t>
    QUIC <xref target="RFC9000"/> is a UDP-based multiplexed and secure transport protocol that provides connection-oriented and stateful
    interaction between a client and server. It can provide low latency and encrypted transport with resilient connections.
  </t>
  <t>
    QUIC Streams provide a lightweight, ordered byte-stream abstraction to an application. Streams can be unidirectional or bidirectional
    meanwhile streams can be initiated by either the client or the server. Unidirectional streams carry data in one direction: from
    the initiator of the stream to its peer. Bidirectional streams allow for data to be sent in both directions.
  </t>
  <t>
    QUIC uses Stream ID to identify the stream. The least significant bit (0x1) of the stream ID identifies the initiator of the stream
    (client with the bit set to 0). The second least significant bit (0x2) of the stream ID distinguishes between bidirectional streams
    (with the bit set to 0) and unidirectional streams <xref target="RFC9000"/>.
  </t>
  <t>
    Since there are PDUs from Cache to Router and PDUs from Router to Cache,
    all RTR PDUs can be simply mapped into one bidirectional QUIC stream whose stream type is 0x0
    according to section 2.1 of <xref target="RFC9000"/>. The bidirectional stream SHOULD be created immediately
    by the Router after the connection is established between the Router and the Cache.
    And the bidirectional stream MUST be destroyed when the connection is terminated.
  </t>
  <t>
    Additionally, to improve transmission efficiency, RTR PDUs also can be mapped into multiple QUIC streams,
    with the stream type determined by the transmitted PDUs.
  </t>
  <section anchor="Multiple-Stream" title="Multiple Stream Usage">
    <t>
      According to the functional characteristics of RTR PDUs, RTR PDUs can be divided into two categories: Data PDUs and Control PDUs.
      Therefore, the transmission of RTR PDUs can occur through two types of channels: Data Channel and Control Channel.
    </t>
    <section anchor="Control-Channel" title="Control Channel">
      <t>
        The Control PDUs currently include Serial Notify PDU, Serial Query PDU, Reset Query PDU,
        Cache Reset PDU and Error Report PDU. Some of these PDUs are initiated by the cache and some are sent by the router.
        So this PDUs MAY be mapped into one bidirectional stream whose stream type is 0x0
        according to section 2.1 of <xref target="RFC9000"/>. The bidirectional control stream between Cache and Router
        is called the Control Channel. The Control Channel always uses QUIC stream 0, which is a client-initiated bidirectional stream.
      </t>
      <t>
        The Control Channel MUST be created immediately by the Router, after the connection establishment is done
        between the Router and the Cache. The Control Channel also MUST be destroyed when the connection is closed.
      </t>
    </section>
    <section anchor="Data-Channel" title="Data Channel">
      <t>
        Among all RTR PDUs, Cache Response PDU is always followed by payload PDUs and an End of Data PDU.
        And the payload PDUs include IPv4 Prefix PDU, IPv6 Prefix PDU, Router Key PDU and ASPA PDU.
        So Data PDUs include the Cache Response PDU, the payload PDUs and the End of Data PDU,
        which are from the cache (server) to the router (client),
        and these PDUs are ordered. The stream for transmitting these Data PDUs is called the Data Channel.
        For the order of Data PDUs, Cache Response PDU and End of Data PDU MUST be sent to all Data Channels (streams).
      </t>
      <t>
        According to above information, All Data PDUs are initiated by the cache and no reply is needed from the router,
        so Data PDUs can be mapped into one or more unidirectional stream whose stream type is 0x3
        according to section 2.1 of <xref target="RFC9000"/>. As shown in the figure 1, these unidirectional data channels
        SHOULD be created by the Cache, before the Cache sends the Cache Response PDU which is the first of all data channels.
        And the number of data channel SHOULD be controlled by the Cache through configuration for actual performance requirements.
        Furthermore, the data channels MUST be closed when the connection is terminated.
      </t>
      <t><figure>
             <artwork align="center" name="Figure 1"><![CDATA[
         +------------+                    +-----------+
         |   Router   |<------------------>|   Cache   |
         +------------+                    +-----------+
1. Connection     |                            |
   Establishment  |                            |
2. Create Control |--------------CC------------|
   Channel (CC)   |                            |
                  | 3. Send Serial/Reset Query |
                  |--------------CC----------->|
                  |                            |4. Create Data
                  |   5. Send Cache Response   |   Channels (DC)
                  |<-------------DC(1)---------|   If No DCs
                  |<-------------DC(n)---------|
                  |     6. Send Payload PDUs   |
                  |<-------------DC(1)---------|
                  |<-------------DC(n)---------|
                  |     7. Send End of Data    |
                  |<-------------DC(1)---------|
                  |<-------------DC(n)---------|
8. Connection     |                            |
   Termination    |                            |
   If Needed      |                            |

     Figure 1: Usage of Unidirectional Data Channels]]></artwork>
      </figure></t>
      <t>When receiving Data PDUs via n unidirectional Data Channels as shown in the figure 1,
         the first received Cache Response PDU is considered a valid PDU, and the last received End of Data PDU
         is considered a valid PDU.</t>
      <t>
        To improve operational flexibility, the Data PDUs also can be mapped into one or more bidirectional stream
        which is created by the Router, and the stream type is 0x0 according to section 2.1 of <xref target="RFC9000"/>.
        As shown in the figure 2, these bidirectional data channels SHOULD be created before the Router sends the Serial
        or Reset Query over the Control Channel. And the number of data channel also SHOULD be configured by the Router
        according to actual performance requirements. In addition, the bidirectional data channels could be closed
        when the Router receives the End of Data which is the last of all Data Channels.
      </t>
      <t><figure>
             <artwork align="center" name="Figure 2"><![CDATA[
         +------------+                    +-----------+
         |   Router   |<------------------>|   Cache   |
         +------------+                    +-----------+
1. Connection     |                            |
   Establishment  |                            |
2. Create Control |--------------CC------------|
   Channel (CC)   |                            |
3. Create Data    |--------------DC(1)---------|
   Channels (DC)  |--------------DC(n)---------|
   If No DCs      | 4. Send Serial/Reset Query |
                  |--------------CC----------->|
                  |   5. Send Cache Response   |
                  |<-------------DC(1)---------|
                  |<-------------DC(n)---------|
                  |     6. Send Payload PDUs   |
                  |<-------------DC(1)---------|
                  |<-------------DC(n)---------|
                  |     7. Send End of Data    |
                  |<-------------DC(1)---------|
                  |<-------------DC(n)---------|
8. Destroy DCs    |                            |
9. Connection     |                            |
   Termination    |                            |
   If Needed      |                            |

        Figure 2: Usage of Bidirectional Data Channels]]></artwork>
      </figure></t>
      <t>Also when receiving Data PDUs via n bidirectional Data Channels as shown in the figure 2,
         the first received Cache Response PDU is considered a valid PDU, and the last received End of Data PDU
         is considered a valid PDU.</t>
    </section>
    <section anchor="Use-Case" title="Use Case">
      <t>
        Since there are four types of payload PDUs, namely IPv4 Prefix PDU, IPv6 Prefix PDU, Router Key PDU and ASPA PDU,
        four data channels (streams) can be created to carry these four types of PDUs respectively, as shown in the figure 3.
      </t>
      <t><figure>
             <artwork align="center" name="Figure 3"><![CDATA[
+-------------------+             +------------------+
|  IPv4 Prefix PDU  |------------>|  Data Channel 1  |
+-------------------+             +------------------+
+-------------------+             +------------------+
|  IPv6 Prefix PDU  |------------>|  Data Channel 2  |
+-------------------+             +------------------+
+-------------------+             +------------------+
|  Router Key PDU   |------------>|  Data Channel 3  |
+-------------------+             +------------------+
+-------------------+             +------------------+
|  ASPA PDU         |------------>|  Data Channel 4  |
+-------------------+             +------------------+

                   Figure 3: Use Case]]></artwork>
      </figure></t>
    </section>
  </section>
</section>

<section anchor="Authentication" title="Endpoint Authentication">
<t>
	RTRoQUIC uses QUIC which uses TLS version 1.3 or greater. Therefore, the TLS handshake process can be used
  for RTRoQUIC endpoint authentication. A third-party authentication mechanism can also be applied
  for RTRoQUIC endpoint authentication, such as a TLS client certificate.
</t>
</section>

<section anchor="Operational" title="Operational Considerations">
<t>
	The decision to use RTRoQUIC instead of the TCP-based mechanism in <xref target="RFC8210"/> is an operational decision,
  and an implementation MUST provide a configuration mechanism to enable RTRoQUIC on the RTR session.
</t>
<t>
	Some connectivity problems (such as blocking UDP) could result in a failure to establish a QUIC connection.
  When this happens, the router SHOULD attempt to establish a TCP-based RTR session.
</t>
</section>

<section anchor="IANA" title="IANA Considerations">
<t>
	This document creates a new registration for the identification of RTRoQUIC in the
  "Application Layer Protocol Negotiation (ALPN) Protocol IDs registry established in <xref target="RFC7301"/>.
</t>
<t>
	The "RTRoQ" string identifies RTRoQUIC:
</t>
<list style="symbols">
  <t>
		Protocol: RTRoQUIC
	</t>
  <t>
		Identification Sequence: 0x52 0x54 0x52 0x6f 0x51 ("RTRoQ")
	</t>
  <t>
		Specification: This document
	</t>
  </list>
</section>

<section anchor="Security" title="Security Considerations">
<t>
  This document replaces the transport protocol layer of RTR from TCP to QUIC.
  The basic protocol specification of RTR is not modified, and
  therefore the new security risks are not introduced to the basic RTR protocol.
  RTRoQUIC enhances transport-layer security for RTR session according to <xref target="RFC9000"/>.
</t>
<t>
  This document does not require to support third-party authentication (e.g., backend Authentication)
  due to the fact that TLS does not specify this way of authentication. If third-party authentication is needed,
  TLS client certificates are recommended to be used here.
</t>
</section>

<!-- <section anchor="Acknowledgements" title="Acknowledgements">
<t>
	The author would like to thank Jeff Haas for his valuable input.
</t>
</section> -->

  </middle>

  <!--  *****BACK MATTER ***** -->

  <back>
  <references title="References" xmlns:xi="http://www.w3.org/2001/XInclude">
    <references title="Normative References">
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4252.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4301.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.5925.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8210.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8446.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.9000.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.9001.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml3//reference.I-D.ietf-sidrops-8210bis.xml"/>
    </references>
    <references title="Informative References">
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.6480.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.7301.xml"/>
    </references>
  </references>
  </back>
</rfc>
