<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-guo-sidrops-fc-profile-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="RPKI FC Profile">A Profile for Forwarding Commitments (FCs)</title>
    <seriesInfo name="Internet-Draft" value="draft-guo-sidrops-fc-profile-00"/>
    <author fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="February" day="19"/>
    <abstract>
      <?line 88?>

<t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Forwarding Commitments (FCs) objects used in Resource Public Key Infrastructure (RPKI). An FC is a digitally signed object that provides a means of verifying whether an IP address block is received from <tt>AS a</tt> to <tt>AS b</tt> and announced from <tt>AS b</tt> to <tt>AS c</tt>. When validated, an FC's eContent can be used for the detection and mitigation of route hijacking, especially providing protection for the AS_PATH attribute in BGP-UPDATE.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://fcbgp.github.io/fc-profile/draft-guo-sidrops-fc-profile.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-guo-sidrops-fc-profile/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FCBGP/fc-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) <xref target="RFC4271"/> was designed with no mechanisms to validate the security of BGP attributes. There are two types of BGP security issues, BGP Hijacks and BGP Route Leaks <xref target="RFC7908"/>, plague Internet security.</t>
      <t>The primary purpose of the Resource Public Key Infrastructure (RPKI) is to improve routing security.  (See <xref target="RFC6480"/> for more information.) As part of this system, a mechanism is needed to allow entities to verify that an IP address holder has permitted an AS to advertise a route along the propagation path. A Forwarding Commitment (FC) provides this function.</t>
      <t>A Forwarding Commitment (FC) is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream ASes or one or more other ASes as its downstream ASes. The upstream ASes, or previous ASes, mean that the issuer AS can receive BGP route updates from these ASes. The downstream ASes, or nexthop ASes, mean that the issuer AS would advertise the BGP route to these ASes.</t>
      <t>In this propagation model, it uses a Web of Trust, i.e., the issuer AS trusts its previous ASes and authorizes nexthop ASes to propagate its received routes. Then, all nexthop ASes would also accept the routes and proceed to send them to their next hops. The relationship among them is the signed FC, which attests that a downstream AS has been selected by the directly linked upstream AS to announce the routes.</t>
      <t>Initially, all ASes on the propagation path should sign one or more FCs independently if they want to propagate the route to its downstream ASes, and then be able to detect and filter malicious routes (e.g., route leaks and route hijacks). In addition, the FC can also attest that all ASes on a propagation path have received and selected this AS_PATH, which can be certified as a trusted path.</t>
      <t>The FC uses the template for RPKI digitally signed objects <xref target="RFC6488"/> for the definition of a Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> wrapper for the FC content as well as a generic validation procedure for RPKI signed objects.  As RPKI certificates issued by the current infrastructure are required to validate FC, we assume the mandatory-to-implement algorithms in <xref target="RFC6485"/> or its successor.</t>
      <t>To complete the specification of the FC (see <xref section="4" sectionFormat="of" target="RFC6488"/>), this document defines:</t>
      <ol spacing="normal" type="1"><li>
          <t>The object identifier (OID) that identifies the FC-signed object. This OID appears in the eContentType field of the encapContentInfo object as well as the content-type signed attribute within the signerInfo structure.</t>
        </li>
        <li>
          <t>The ASN.1 syntax for the FC content, which is the payload signed by the BGP speaker. The FC content is encoded using the ASN.1 <xref target="X.680"/> Distinguished Encoding Rules (DER) <xref target="X.690"/>.</t>
        </li>
        <li>
          <t>The steps required to validate an FC beyond the validation steps specified in <xref target="RFC6488"/>.</t>
        </li>
      </ol>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="the-fc-content-type">
      <name>The FC Content-Type</name>
      <t>The content-type for an FC is defined as ForwardingCommitment and has the numerical value of 1.2.840.113549.1.9.16.1.(TBD).</t>
      <t>This OID <bcp14>MUST</bcp14> appear both within the eContentType in the encapContentInfo object as well as the content-type signed attribute in the signerInfo object (see <xref target="RFC6488"/>).</t>
    </section>
    <section anchor="The-FC-eContent">
      <name>The FC eContent</name>
      <t>The content of an FC identifies a forwarding commitment that represents an AS's routing intent. Upon receiving a BGP-UPDATE message, other ASes can perform AS-path verification according to the validated FCs. An FC is an instance of ForwardingCommitmentAttestation, formally defined by the following ASN.1 <xref target="X.680"/> module:</t>
      <artwork><![CDATA[
RPKI-FC-2025
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
     pkcs-9(9) smime(16) modules(0) id-mod-rpki-FC-2025(TBD) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  CONTENT-TYPE
  FROM CryptographicMessageSyntax-2010 -- RFC 6268
    { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
      pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

id-ct-FC OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840)
    rsadsi(113549) pkcs(1) pkcs-9(9) id-smime(16) id-ct(1) fc(TDB) }

ct-FC CONTENT-TYPE ::=
    { TYPE ForwardingCommitmentAttestation IDENTIFIED BY id-ct-FC }

ForwardingCommitmentAttestation ::= SEQUENCE {
    version [0]         INTEGER DEFAULT 0,
    asID                ASID,
    routingIntents      SEQUENCE (SIZE(1..MAX)) OF ROUTING-INTENT }

ROUTING-INTENT ::= SEQUENCE {
    previousASes        SEQUENCE (SIZE(1..MAX)) OF ASID,
    nexthopASes         SEQUENCE (SIZE(1..MAX)) OF ASID,
    originASes          SEQUENCE (SIZE(0..MAX)) OF ASID OPTIONAL }

ASID ::= INTEGER (0..4294967295)

END
]]></artwork>
      <t>Note that this content appears as the eContent within the encapContentInfo (see <xref target="RFC6488"/>).</t>
      <section anchor="version">
        <name>version</name>
        <t>The version number of the ForwardingCommitmentAttestation <bcp14>MUST</bcp14> be 0.</t>
      </section>
      <section anchor="asid">
        <name>asID</name>
        <t>The asID field contains the AS number of the issuer AS associated with this FC.</t>
      </section>
      <section anchor="routingintents">
        <name>routingIntents</name>
        <t>The routingIntents field comprises a list of routing intents associated with the issuing asID. Each routing intent generally includes an upstream AS, a downstream AS, and a specified route set. To optimize space, the field may aggregate routing intents that share the same route set. Therefore, the routingIntents field indicates that for a route set represented by originASes, the issuing asID can receive routes from any AS in previousASes and subsequently forward them to any AS in nexthopASes.</t>
        <section anchor="previousases">
          <name>previousASes</name>
          <t>The previousASes field contains the upstream ASes' number of the issuer AS that can advertise the routes to the issuer AS.</t>
        </section>
        <section anchor="nexthopases">
          <name>nexthopASes</name>
          <t>The nexthopASes field contains the downstream ASes' number of the issuer AS that can receive advertised routes from the issuer AS.</t>
        </section>
        <section anchor="originases">
          <name>originASes</name>
          <t>The originASes field contains a set of ASes. It associates with ROAs <xref target="RFC9582"/>. This is an optional field. When it is blank, it means that all routes received from upstream ASes defined in the previousASes field could be advertised to downstream ASes defined in the nexthopASes field.</t>
        </section>
      </section>
    </section>
    <section anchor="forwarding-commitment-validation">
      <name>Forwarding Commitment Validation</name>
      <t>To validate an FC, the relying party <bcp14>MUST</bcp14> perform all the validation checks specified in <xref target="RFC6488"/> as well as the following additional FC-specific validation steps.</t>
      <ul spacing="normal">
        <li>
          <t>The contents of the CMS eContent field <bcp14>MUST</bcp14> conform to all the constraints described in <xref target="The-FC-eContent"/>.</t>
        </li>
        <li>
          <t>The Autonomous System Identifier Delegation Extension described in <xref target="RFC3779"/> is also used in Forwarding Commitment and <bcp14>MUST</bcp14> be present in the EE certificate contained in the CMS certificates field.</t>
        </li>
        <li>
          <t>The AS identifier present in the ForwardingCommitmentAttestation eContent 'asID' field <bcp14>MUST</bcp14> be contained in the AS Identifiers present in the certificate extension.</t>
        </li>
        <li>
          <t>The Autonomous System Identifier Delegation extension <bcp14>MUST NOT</bcp14> contain "inherit" elements.</t>
        </li>
        <li>
          <t>The IP Address Delegation Extension <xref target="RFC3779"/> is not used in Forwarding Commitment, and <bcp14>MUST NOT</bcp14> be present in the EE certificate.</t>
        </li>
      </ul>
    </section>
    <section anchor="operational-consideration">
      <name>Operational Consideration</name>
      <t>Multiple valid Forwarding Commitment objects which contain the same asID could exist. In such a case, the union of these objects forms the complete routing intent set of this AS. For a given asID, it is <bcp14>RECOMMENDED</bcp14> that a CA maintains a single Forwarding Commitment. If an AS holder publishes a Forwarding Commitment, then relying parties <bcp14>SHOULD</bcp14> assume that this object is complete for that issuer AS.</t>
      <t>If one AS receives a BGP UPDATE message with the issuer AS in the AS_PATH attribute which cannot match any routing intents of this issuer AS, it implies that there is an AS-path forgery in this message.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC6480"/>, <xref target="RFC6481"/>, <xref target="RFC6485"/>, <xref target="RFC6487"/> and <xref target="RFC6488"/> also apply to FCs.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="smi-security-for-smime-module-identifier-registry">
        <name>SMI Security for S/MIME Module Identifier registry</name>
        <t>Please add the id-mod-rpki-fc-2025 to the SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0) registry (https://www.iana.org/assignments/smi-numbers/smi-numbers.xml#security-smime-0) as follows:</t>
        <artwork><![CDATA[
Decimal  |  Description                 | Specification
----------------------------------------------------------------
TBD      | id-mod-rpki-fc-2025          | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="smi-security-for-smime-cms-content-type-registry">
        <name>SMI Security for S/MIME CMS Content Type registry</name>
        <t>Please add the FC to the SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1) registry (https://www.iana.org/assignments/smi-numbers/smi-numbers.xml#security-smime-1) as follows:</t>
        <artwork><![CDATA[
Decimal  |  Description                | Specification
----------------------------------------------------------------
TBD      |  id-ct-FC                   | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="rpki-signed-object-registry">
        <name>RPKI Signed Object registry</name>
        <t>Please add Forwarding Commitment to the RPKI Signed Object registry (https://www.iana.org/assignments/rpki/rpki.xhtml#signed-objects) as follows:</t>
        <artwork><![CDATA[
Name       | OID                         | Specification
----------------------------------------------------------------
Forwarding |                             |
Commitment | 1.2.840.113549.1.9.16.1.TBD | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="rpki-repository-name-scheme-registry">
        <name>RPKI Repository Name Scheme registry</name>
        <t>Please add an item for the Forwarding Commitment file extension to the "RPKI Repository Name Scheme" registry created by <xref target="RFC6481"/> as follows:</t>
        <artwork><![CDATA[
Filename  |
Extension | RPKI Object                   | Reference
-----------------------------------------------------------------
     .for | Forwarding Commitment         | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="media-type-registry">
        <name>Media Type registry</name>
        <t>The IANA is requested to register the media type application/rpki-fc in the "Media Type" registry as follows:</t>
        <artwork><![CDATA[
  Type name: application
  Subtype name: rpki-fc
  Required parameters: N/A
  Optional parameters: N/A
  Encoding considerations: binary
  Security considerations: Carries an RPKI FC [RFC-to-be].
      This media type contains no active content. See
      Section xxx of [RFC-to-be] for further information.
  Interoperability considerations: None
  Published specification: [RFC-to-be]
  Applications that use this media type: RPKI operators
  Additional information:
    Content: This media type is a signed object, as defined
        in [RFC6488], which contains a payload of a list of
        AS identifiers (ASIDs) as defined in [RFC-to-be].
    Magic number(s): None
    File extension(s): .for
    Macintosh file type code(s):
  Person & email address to contact for further information:
    Yangfei Guo <guoyangfei@zgclab.edu.cn>
  Intended usage: COMMON
  Restrictions on usage: None
  Change controller: IETF
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC6485">
          <front>
            <title>The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists, and signed objects as well as for the relying parties (RPs) that verify these digital signatures. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6485"/>
          <seriesInfo name="DOI" value="10.17487/RFC6485"/>
        </reference>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6488">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
        <reference anchor="X.680" target="https://itu.int/rec/T-REC-X.680-202102-I/en">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author initials="" surname="ITU-T">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="Recommendation ITU-T X.680" value=""/>
        </reference>
        <reference anchor="X.690" target="[https://itu.int/rec/T-REC-X.680-202102-I/en](https://www.itu.int/rec/T-REC-X.690-202102-I/en)">
          <front>
            <title>Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author initials="" surname="ITU-T">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="Recommendation ITU-T X.690" value=""/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC7908">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC9582">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
      </references>
    </references>
    <?line 296?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
