<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-sidrops-sispi-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Signed SAVNET-Peering Information">A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-00"/>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="February" day="22"/>
    <area>Ops</area>
    <workgroup>SIDR Operations</workgroup>
    <abstract>
      <?line 73?>

<t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter-domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
    </abstract>
  </front>
  <middle>
    <?line 77?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="inter-domain-ps"/>.</t>
      <t>Inter-domain SAVNET <xref target="savnet"/> proposes to exchange SAV-specific information among ASes to solve the problems of existing inter-domain SAV mechanisms. Two SAV-specific information exchanging protocols (or SAVNET protocols for short) are shown to achieve higher validation accuracy and lower operational overhead in large-scale emulations <xref target="emu-9-savs"/>. However, operators face significant difficulties in deploying SAVNET protocols. To benefit Internet routing, supporting incremental deployment is an essential requirement of SAVNET protocols <xref target="inter-domain-ps"/>. As illustrated in the Section 8 of <xref target="savnet"/>, during the partial or incremental deployment of SAVNET protocols, protocol-speaking agents (or SAVNET agents) within the SAVNET-adopting ASes need to find and establish connections with other SAVNET agents. Currently, there is no mechanism to achieve this automatically, and operators of SAVNET-adopting ASes must configure peering SAVNET relationship by hand, which is slow and error-prone.</t>
      <t>The neighbor discovery and connection setup process of SAV protocols can be done in an automatic and correct manner, with the introduction of a public registry that contains all ASes which both deploy SAVNET and are willing to setup SAVNET peering relationships. A newly adopting AS can use this registry as a reference, and pick appropriate ASes to setup SAVNET peering relationship.</t>
      <t>The Resource Public Key Infrastructure (RPKI) is the most suitable to host this public registry, because the primary purpose of RPKI is to improve routing security <xref target="RFC6480"/>, and defending against address spoofing is a main aspect of routing security. To this end, a mechanism is needed to facilitate holders of Automous System (AS) identifiers to declare their deployment of SAVNET <xref target="savnet"/>. The digitally Signed SAVNET-Peering Information (SiSPI) object described in this document serves the function.</t>
      <t>A SiSPI object is a cryptographically verifiable attestation signed by the holder of an AS identifier. It contains the identification information of one AS, which means the listed AS has deployed SAVNET and can perform SAV on its data plane.</t>
      <t>The SiSPI object makes use of the template for RPKI digitally signed objects <xref target="RFC6488"/>, which defines a Crytopgraphic Message Syntax (CMS) <xref target="RFC5652"/> wrapper for the SiSPI content as well as a generic validation procedure for RPKI signed objects. In accordance with Section 4 of <xref target="RFC6488"/>, this document defines:</t>
      <ol spacing="normal" type="1"><li>
          <t>The object identifier (OID) that identifies the SiSPI object. This OID appears in the eContentType field of the enCapContentInfo object as well as the content-type signed attribute within the signerInfo structure.</t>
        </li>
        <li>
          <t>The ASN.1 syntax for the SiSPI eContent, which is the payload that specifies the AS deploying SAVNET. The SiSPI eContent is encoded using the ASN.1 Distinguished Encoding Rules (DER) <xref target="X.690"/>.</t>
        </li>
        <li>
          <t>The steps required to validate a SiSPI beyond the validation steps specified in <xref target="RFC6488"/>.</t>
        </li>
      </ol>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document makes use of the terms and concepts described in "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile" <xref target="RFC5280"/>, "X.509 Extensions for IP Address and AS Identifiers" <xref target="RFC3779"/>, "Signed Object Template for the Resource Public Key Infrastructure (RPKI)" <xref target="RFC6488"/>, and "A Profile for X.509 PKIX Resource Certificates" <xref target="RFC6487"/>. The readers should be familiar with the terms and concepts.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sav-content">
      <name>The SiSPI Content Type</name>
      <t>The content-type for a SiSPI object is defined as SAVNETAuthz, which has the numerical value of 1.2.840.113549.1.9.16.1.52. This OID <bcp14>MUST</bcp14> appear both within the eContentType in the encapContentInfo structure as well as the content-type signed attribute within the signerInfo structure (see <xref target="RFC6488"/>).</t>
    </section>
    <section anchor="sav-econtent">
      <name>The SiSPI eContent</name>
      <t>The content of a SiSPI object identifies a single AS that has deployed SAVNET <xref target="savnet"/> for inter-domain SAV. The eContent of a SiSPI object is an instance of SAVNETAttestation, formally defined by the following ASN.1 <xref target="X.680"/> module:</t>
      <artwork><![CDATA[
SAVNETAttestation ::= SEQUENCE {
  version [0]   INTEGER DEFAULT 0,
  asID          ASID,
  address       IPAddress }

ASID ::= INTEGER (0..4294967295)
IPAddress ::= BIT STRING
]]></artwork>
      <t>Note that this content appears as the eContent within the encapContentInfo as specified in <xref target="RFC6488"/>.</t>
      <section anchor="version">
        <name>version</name>
        <t>The version number of the SAVNETAttestation that compiles with this specification <bcp14>MUST</bcp14> be 2 and <bcp14>MUST</bcp14> be explicitly encoded.</t>
      </section>
      <section anchor="asid">
        <name>asID</name>
        <t>The asID field contains the AS number that has deployed SAVNET and can perform SAV on the data plane.</t>
      </section>
      <section anchor="ipaddress">
        <name>IPAddress</name>
        <t>The IPAddress field stores the router's IP address within the AS whose ID is asID, which is utilized for establishing SAVNET connections.</t>
      </section>
    </section>
    <section anchor="sav-v">
      <name>SiSPI Validation</name>
      <t>Before, a relying party can use a SiSPI object to validate a routing announcement, the relying party <bcp14>MUST</bcp14> first validate the SiSPI object. To validate a SiSPI object, the relying party <bcp14>MUST</bcp14> perform all the validation checks specified in <xref target="RFC6488"/> as well as the following additional specific validation steps of the Signed AS List.</t>
      <ul spacing="normal">
        <li>
          <t>The AS Identifier Delegation Extension <xref target="RFC3779"/> <bcp14>MUST</bcp14> be present in the end-entity (EE) certificate (contained within the SiSPI object), and the asID in the SiSPI object eContent <bcp14>MUST</bcp14> be contained within the set of AS numbers specified by the EE certificate's AS Identifier Delegation Extension.</t>
        </li>
        <li>
          <t>The EE certificate's AS Identifier Delegation Extension <bcp14>MUST NOT</bcp14> contain any ''inherit'' elements.</t>
        </li>
        <li>
          <t>The IP Address Delegation Extension <xref target="RFC3779"/> <bcp14>MUST</bcp14> be absent.</t>
        </li>
      </ul>
      <t>The pseudocode for SiSPI validation is as follows:</t>
      <artwork><![CDATA[
function ValidateSiSPI(sispiObject, eeCertificate):
    // Step 1: Validate the SiSPI object using the generic RPKI 
    //         validation procedure.
    // This includes checking the CMS wrapper, signature, and 
    //         certification path.
    if not IsValidRPKISignedObject(sispiObject):
        return False, "Invalid RPKI Signed Object"

    // Step 2: Check the content-type of the SiSPI object.
    if not sispiObject.eContentType == SAVNETAuthzOID:
        return False, "Invalid content-type"

    // Step 3: Parse the eContent of the SiSPI object as 
    //         SAVNETAttestation.
    sispiContent = ParseSAVNETAttestation(sispiObject.eContent)
    if sispiContent is None:
        return False, "Unable to parse SAVNETAttestation"

    // Step 4: Ensure the version number is explicitly set to 2.
    if not (sispiContent.version exists and sispiContent.version==2):
        return False, "Invalid version"

    // Step 5: Validate the AS Identifier Delegation Extension in
    //         the EE certificate.
    if not ValidateASIdExt(eeCertificate, sispiContent.asID):
        return False, "AS Identifier Extension validation failed"

    // Step 6: Ensure the EE certificate's AS Identifier Delegation
    //         Extension does not contain 'inherit'.
    if "inherit" in eeCertificate.asIdentifiers:
        return False, 
               "AS Identifier Delegation Extension contains 'inherit'"

    // Step 7: Ensure the IP Address Delegation Extension is absent.
    if HasIPAddressDelegationExtension(eeCertificate):
        return False, "IP Address Delegation Extension is present"

    // Step 8: Determine if all validation checks are successful.
    return True, "SiSPI object is valid"

function ValidateASIdentifierExtension(eeCertificate, asID):
    // Check if the asID is within the set of AS numbers 
    //   specified by the AS Identifier Delegation Extension.
    return asID in eeCertificate.asIdentifiers

function HasIPAddressDelegationExtension(eeCertificate):
    // Check for the presence of the IP Address Delegation 
    //   Extension.
    return "ipAddresses" in eeCertificate.extensions
]]></artwork>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="rpki-signed-object-registry">
        <name>RPKI Signed Object Registry</name>
        <t>Please add an item for the SiSPI object file extension to the RPKI Signed Object registry (https://www.iana.org/assignments/rpki/rpki.xhtml#signed-objects) as follows:</t>
        <artwork><![CDATA[
Name                              | OID
---------------------------------------------
Signed SAVNET-Peering Information | 1.2.840.113549.1.9.16.1.52
]]></artwork>
      </section>
      <section anchor="rpki-repository-name-scheme-registry">
        <name>RPKI Repository Name Scheme Registry</name>
        <t>Please add an item for the SiSPI object file extension to the "RPKI Repository Name Scheme" registry created by <xref target="RFC6481"/> as follows:</t>
        <artwork><![CDATA[
Filename
Extension | RPKI Object                       | Reference
------------------------------------------------------------------------
   .sav   | Signed SAVNET-Peering Information | draft-chen-sidrops-sispi
]]></artwork>
      </section>
      <section anchor="media-type-registry">
        <name>Media Type Registry</name>
        <t>The IANA is requested to register the media type application/rpki-sispi in the "Media Type" registry as follows:</t>
        <artwork><![CDATA[
Type name: application
Subtype name: rpki-sispi
Required parameters: N/A
Optional parameters: N/A
Encoding considerations: binary
Security considerations: Carries Signed SAVNET-Peering Information.
  This media type contains no active content. See
  Section 4 of draft-chen-sidrops-sispi for further information.
Interoperability considerations: None
Published specification: draft-chen-sidrops-sispi
Applications that use this media type: RPKI operators
Additional information:
  Content: This media type is a signed object, as defined
      in {{RFC6488}}, which contains a payload of an AS identifer
      as defined in draft-chen-sidrops-sispi.
Magic number(s): None
File extension(s): .sav
Macintosh file type code(s):
Person & email address to contact for further information:
Li Chen <lichen@zgclab.edu.cn>
Intended usage: COMMON
Restrictions on usage: None
Change controller: IETF
]]></artwork>
      </section>
    </section>
    <section anchor="using-sispi">
      <name>Using SiSPI</name>
      <t>A router can use the AS_Path from BGP announcements, ASPA objects, and SiSPI to find the closest ASes to set up SAVNET peering, as described below:</t>
      <ol spacing="normal" type="1"><li>
          <t>BGP AS_Paths Analysis:  </t>
          <ul spacing="normal">
            <li>
              <t>Collect AS paths from BGP announcements.</t>
            </li>
            <li>
              <t>Determine the frequency or preference of certain AS paths based on routing policies, which may involve path attributes like AS path length, origin type, local preference, and MED (Multi-Exit Discriminator).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>ASPA Verification:  </t>
          <ul spacing="normal">
            <li>
              <t>Use ASPA objects to verify the legitimacy of provider-customer AS relationships.</t>
            </li>
            <li>
              <t>Ensure that the AS paths conform to the provider-customer relationships indicated by the ASPAs, thereby validating the correctness of the routing information.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Closest AS Determination:  </t>
          <ul spacing="normal">
            <li>
              <t>Identify the ASes that frequently appear on the preferred paths to various destinations, implying they are topologically 'close' or significant transit providers.</t>
            </li>
            <li>
              <t>Among these ASes, prioritize those that have a direct provider-customer relationship with the local AS (as indicated by ASPA objects), since they are potentially the closest peers.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>SiSPI Objects Utilization:  </t>
          <ul spacing="normal">
            <li>
              <t>Retrieve SiSPI objects from the RPKI repository to determine which ASes have deployed SAVNET.</t>
            </li>
            <li>
              <t>Filter the previously identified closest ASes by checking whether they have a valid SiSPI object, which would indicate their readiness to establish SAVNET peering.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Peering Candidates Selection:  </t>
          <ul spacing="normal">
            <li>
              <t>From the set of closest ASes with valid SiSPI objects, select candidates for SAVNET peering.</t>
            </li>
            <li>
              <t>The selection criteria may include additional factors such as existing peering policies, traffic volumes, and peering agreements.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Peering Establishment:  </t>
          <ul spacing="normal">
            <li>
              <t>Initiate peering negotiations with the selected candidate ASes.</t>
            </li>
            <li>
              <t>Upon successful negotiation, establish SAVNET peering relationships and configure the necessary SAVNET protocols.</t>
            </li>
          </ul>
        </li>
      </ol>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC6481"/>, <xref target="RFC6485"/>, and <xref target="RFC6488"/> also apply to the SiSPI object.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6488">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC6485">
          <front>
            <title>The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists, and signed objects as well as for the relying parties (RPs) that verify these digital signatures. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6485"/>
          <seriesInfo name="DOI" value="10.17487/RFC6485"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules&amp;#59; Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Information technology - Abstract Syntax Notation One (ASN.1)&amp;#59; Specification of basic notation</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="savnet" target="https://datatracker.ietf.org/doc/draft-wu-savnet-inter-domain-architecture/">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="emu-9-savs" target="https://datatracker.ietf.org/meeting/118/materials/slides-118-savnet-emulations-of-nine-sav-mechanisms-with-sav-open-playground-00">
          <front>
            <title>Emulations of 9 SAV Mechanisms with SAV Open Playground</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
