<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-sidrops-sispi-03" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="Signed SAVNET-Peering Information">A Profile of Signed SAVNET-Peering Information (SiSPI) Object for Deploying Inter-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-sidrops-sispi-03"/>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="March" day="19"/>
    <area>Ops</area>
    <workgroup>SIDR Operations</workgroup>
    <abstract>
      <?line 73?>

<t>This document defines a "Signed SAVNET-Peering Information" (SiSPI) object, a Cryptographic Message Syntax (CMS) protected content type included in the Resource Public Key Infrastructure (RPKI). A SiSPI object is a digitally signed object which carries the list of Autonomous Systems (ASes) deploying inter-domain SAVNET. When validated, the eContent of a SiSPI object confirms that the holder of the listed ASN produces the object and the AS has deployed inter-domain SAV and is ready to establish neighbor relationship for preventing source address spoofing.</t>
    </abstract>
  </front>
  <middle>
    <?line 77?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="inter-domain-ps"/>.</t>
      <t>Inter-domain SAVNET <xref target="savnet"/> proposes to exchange SAV-specific information among ASes to solve the problems of existing inter-domain SAV mechanisms. Two SAV-specific information exchanging protocols (or SAVNET protocols for short) are shown to achieve higher validation accuracy and lower operational overhead in large-scale emulations <xref target="emu-9-savs"/>. However, operators face significant difficulties in deploying SAVNET protocols. To benefit Internet routing, supporting incremental deployment is an essential requirement of SAVNET protocols <xref target="inter-domain-ps"/>. As illustrated in the Section 9.2 of <xref target="savnet"/>, during the partial or incremental deployment of SAVNET protocols, protocol-speaking agents (or SAVNET agents) within the SAVNET-adopting ASes need to find and establish connections with other SAVNET agents. Currently, there is no mechanism to achieve this automatically, and operators of SAVNET-adopting ASes must configure peering SAVNET relationship by hand, which is slow and error-prone.</t>
      <t>The neighbor discovery and connection setup process of SAV protocols can be done in an automatic and correct manner, with the introduction of a public registry that contains all ASes which both deploy SAVNET and are willing to setup SAVNET peering relationships. A newly adopting AS can use this registry as a reference, and pick appropriate ASes to setup SAVNET peering relationship.</t>
      <t>The Resource Public Key Infrastructure (RPKI) is the most suitable to host this public registry, because the primary purpose of RPKI is to improve routing security <xref target="RFC6480"/>, and defending against address spoofing is a main aspect of routing security. To this end, a mechanism is needed to facilitate holders of Automous System (AS) identifiers to declare their deployment of SAVNET <xref target="savnet"/>. The digitally Signed SAVNET-Peering Information (SiSPI) object described in this document serves the function.</t>
      <t>A SiSPI object is a cryptographically verifiable attestation signed by the holder of an AS identifier. It contains the identification information of one AS, which means the listed AS has deployed SAVNET and can perform SAV on its data plane.</t>
      <t>The SiSPI object makes use of the template for RPKI digitally signed objects <xref target="RFC6488"/>, which defines a Crytopgraphic Message Syntax (CMS) <xref target="RFC5652"/> wrapper for the SiSPI content as well as a generic validation procedure for RPKI signed objects. In accordance with Section 4 of <xref target="RFC6488"/>, this document defines:</t>
      <ol spacing="normal" type="1"><li>
          <t>The object identifier (OID) that identifies the SiSPI object. This OID appears in the eContentType field of the enCapContentInfo object as well as the content-type signed attribute within the signerInfo structure.</t>
        </li>
        <li>
          <t>The ASN.1 syntax for the SiSPI eContent, which is the payload that specifies the AS deploying SAVNET. The SiSPI eContent is encoded using the ASN.1 Distinguished Encoding Rules (DER) <xref target="X.690"/>.</t>
        </li>
        <li>
          <t>The steps required to validate a SiSPI beyond the validation steps specified in <xref target="RFC6488"/>.</t>
        </li>
      </ol>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document makes use of the terms and concepts described in "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile" <xref target="RFC5280"/>, "X.509 Extensions for IP Address and AS Identifiers" <xref target="RFC3779"/>, "Signed Object Template for the Resource Public Key Infrastructure (RPKI)" <xref target="RFC6488"/>, and "A Profile for X.509 PKIX Resource Certificates" <xref target="RFC6487"/>. The readers should be familiar with the terms and concepts.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sav-content">
      <name>The SiSPI ContentType</name>
      <t>The content-type for a SiSPI object is defined as id-ct-rpkiSiSPI, which has the numerical value of 1.2.840.113549.1.9.16.1.TBD. This OID <bcp14>MUST</bcp14> appear both within the eContentType in the encapContentInfo structure as well as the ContentType signed attribute within the signerInfo structure (see <xref target="RFC6488"/>).</t>
    </section>
    <section anchor="sav-econtent">
      <name>The SiSPI eContent</name>
      <t>The content of a SiSPI object identifies a single AS that has deployed SAVNET <xref target="savnet"/> for inter-domain SAV and a list of its IP addresses. The eContent of a SiSPI object is an instance of SAVNETAttestation, formally defined by the following ASN.1 <xref target="X.680"/> module:</t>
      <artwork><![CDATA[
RpkiSiSPI-2024
     { iso(1) member-body(2) us(840) rsadsi(113549)
       pkcs(1) pkcs9(9) smime(16) mod(0)
       id-mod-rpkiSiSPI-2024-2024(TBD0) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  CONTENT-TYPE
  FROM CryptographicMessageSyntax-2010 -- in [RFC6268]
    { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
      pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

ct-rpkiSiSPI CONTENT-TYPE ::=
  { TYPE SAVNETAttestation IDENTIFIED BY id-ct-rpkiSiSPI }

id-ct-rpkiSiSPI OBJECT IDENTIFIER ::=
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
    pkcs-9(9) id-smime(16) id-ct(1) TBD1 }

SAVNETAttestation ::= SEQUENCE {
  version [0]   INTEGER DEFAULT 0,
  asID          ASID,
  addresses     SEQUENCE OF IPFamilyAddresses }

ASID ::= INTEGER (0..4294967295)

IPFamilyAddresses ::= SEQUENCE {
  ipFamily    IP-ADDRESS-FAMILY.&afi ({IPAddressFamilySet}),
  ipAddresses IP-ADDRESS-FAMILY.&IPAddresses ({IPAddressFamilySet}{@ipFamily}) }

IP-ADDRESS-FAMILY ::= CLASS {
     &afi          OCTET STRING (SIZE(2)) UNIQUE,
     &IPAddresses
   } WITH SYNTAX { AFI &afi IP &IPAddresses }

IPAddressFamilySet IP-ADDRESS-FAMILY ::= { ipAddressFamilyIPv4 | ipAddressFamilyIPv6 }

ipAddressFamilyIPv4 IP-ADDRESS-FAMILY ::= { AFI afi-IPv4 IP IPv4Addresses }

ipAddressFamilyIPv6 IP-ADDRESS-FAMILY ::= { AFI afi-IPv6 IP IPv6Addresses }

afi-IPv4 OCTET STRING ::= '0001'H

afi-IPv6 OCTET STRING ::= '0002'H

IPv4Addresses ::= SEQUENCE (SIZE(1..MAX)) OF IPAddress{ub-IPv4}

IPv6Addresses ::= SEQUENCE (SIZE(1..MAX)) OF IPAddress{ub-IPv6}

ub-IPv4 INTEGER ::= 32

ub-IPv6 INTEGER ::= 128

IPAddress {INTEGER: ub} ::= BIT STRING (SIZE(0..ub))

END
]]></artwork>
      <t>Note that this content appears as the eContent within the encapContentInfo as specified in <xref target="RFC6488"/>.</t>
      <section anchor="version">
        <name>version</name>
        <t>The version number of the SAVNETAttestation that compiles with this specification <bcp14>MUST</bcp14> be 2 and <bcp14>MUST</bcp14> be explicitly encoded.</t>
      </section>
      <section anchor="asid">
        <name>asID</name>
        <t>The asID field contains the AS number that has deployed SAVNET and can perform SAV on the data plane.</t>
      </section>
      <section anchor="addresses">
        <name>addresses</name>
        <t>The addresses field contains a SEQUENCE of IPFamilyAddresses, which stores the router's IP addresses within the AS whose ID is asID, which is utilized for establishing SAVNET connections.</t>
        <section anchor="element-ipfamilyaddresses">
          <name>Element IPFamilyAddresses</name>
          <t>This field contains a SEQUENCE which contains one instance of ipFamily and one instance of ipAddresses.</t>
          <section anchor="ipfamily">
            <name>ipFamily</name>
            <t>This field contains an OCTET STRING which is either '0001'H (IPv4) or '0002'H (IPv6).</t>
          </section>
          <section anchor="ipaddresses">
            <name>ipAddresses</name>
            <t>This field contains a SEQUENCE of IPAddress instances.</t>
          </section>
          <section anchor="element-ipaddress">
            <name>Element IPAddress</name>
            <t>This element is length bounded through the Information Object Class IP-ADDRESS-FAMILY and its type is a BIT STRING.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="sav-v">
      <name>SiSPI Validation</name>
      <t>Before, a relying party can use a SiSPI object to validate the deployment of SAVNET for inter-domain SAV, the relying party <bcp14>MUST</bcp14> first validate the SiSPI object. To validate a SiSPI object, the relying party <bcp14>MUST</bcp14> perform all the validation checks specified in <xref target="RFC6488"/> as well as the following additional specific validation steps of the Signed AS List.</t>
      <ul spacing="normal">
        <li>
          <t>The contents of the CMS eContent field <bcp14>MUST</bcp14> adhere to all the constraints described in <xref target="sav-content"/>.</t>
        </li>
        <li>
          <t>The AS Identifier Delegation Extension <xref target="RFC3779"/> <bcp14>MUST</bcp14> be present in the end-entity (EE) certificate (contained within the SiSPI object), and the asID in the SiSPI object eContent <bcp14>MUST</bcp14> be contained within the set of AS numbers specified by the EE certificate's AS Identifier Delegation Extension.</t>
        </li>
        <li>
          <t>The EE certificate's AS Identifier Delegation Extension <bcp14>MUST NOT</bcp14> contain any ''inherit'' elements.</t>
        </li>
        <li>
          <t>The IP Address Delegation Extension <xref target="RFC3779"/> <bcp14>MUST</bcp14> be absent.</t>
        </li>
      </ul>
      <t>The pseudocode for SiSPI validation is as follows:</t>
      <artwork><![CDATA[
function ValidateSiSPI(sispiObject, eeCertificate):
    // Step 1: Validate the SiSPI object using the generic RPKI 
    //         validation procedure.
    // This includes checking the CMS wrapper, signature, and 
    //         certification path.
    if not IsValidRPKISignedObject(sispiObject):
        return False, "Invalid RPKI Signed Object"

    // Step 2: Check the content-type of the SiSPI object.
    if not sispiObject.eContentType == SAVNETAuthzOID:
        return False, "Invalid content-type"

    // Step 3: Parse the eContent of the SiSPI object as 
    //         SAVNETAttestation.
    sispiContent = ParseSAVNETAttestation(sispiObject.eContent)
    if sispiContent is None:
        return False, "Unable to parse SAVNETAttestation"

    // Step 4: Ensure the version number is explicitly set to 2.
    if not (sispiContent.version exists and sispiContent.version==2):
        return False, "Invalid version"

    // Step 5: Validate the AS Identifier Delegation Extension in
    //         the EE certificate.
    if not ValidateASIdExt(eeCertificate, sispiContent.asID):
        return False, "AS Identifier Extension validation failed"

    // Step 6: Ensure the EE certificate's AS Identifier Delegation
    //         Extension does not contain 'inherit'.
    if "inherit" in eeCertificate.asIdentifiers:
        return False, 
               "AS Identifier Delegation Extension contains 'inherit'"

    // Step 7: Ensure the IP Address Delegation Extension is absent.
    if HasIPAddressDelegationExtension(eeCertificate):
        return False, "IP Address Delegation Extension is present"

    // Step 8: Determine if all validation checks are successful.
    return True, "SiSPI object is valid"

function ValidateASIdentifierExtension(eeCertificate, asID):
    // Check if the asID is within the set of AS numbers 
    //   specified by the AS Identifier Delegation Extension.
    return asID in eeCertificate.asIdentifiers

function HasIPAddressDelegationExtension(eeCertificate):
    // Check for the presence of the IP Address Delegation 
    //   Extension.
    return "ipAddresses" in eeCertificate.extensions
]]></artwork>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="rpki-signed-object-registry">
        <name>RPKI Signed Object Registry</name>
        <t>Please add an item for the SiSPI object file extension to the RPKI Signed Object registry (https://www.iana.org/assignments/rpki/rpki.xhtml#signed-objects) as follows:</t>
        <artwork><![CDATA[
Name                              | OID                                    | Reference
-----------------------------------------------------------------------------------------------------
Signed SAVNET-Peering Information | 1.2.840.113549.1.9.16.1.TBD            | draft-chen-sidrops-sispi
]]></artwork>
      </section>
      <section anchor="rpki-repository-name-scheme-registry">
        <name>RPKI Repository Name Scheme Registry</name>
        <t>Please add an item for the SiSPI object file extension to the "RPKI Repository Name Scheme" registry created by <xref target="RFC6481"/> as follows:</t>
        <artwork><![CDATA[
Filename
Extension | RPKI Object                       | Reference
------------------------------------------------------------------------
   .sav   | Signed SAVNET-Peering Information | draft-chen-sidrops-sispi
]]></artwork>
      </section>
      <section anchor="smi-security-for-smime-module-identifier-1284011354919160">
        <name>SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)</name>
        <t>IANA is requested to allocate the following in the "SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)" registry:</t>
        <artwork><![CDATA[
Decimal | Description                | Reference
---------------------------------------------------------------
TBD     | id-mod-rpkiSiSPI-2024-2024 | draft-chen-sidrops-sispi
]]></artwork>
      </section>
      <section anchor="media-type-registry">
        <name>Media Type Registry</name>
        <t>The IANA is requested to register the media type application/rpki-sispi in the "Media Type" registry as follows:</t>
        <artwork><![CDATA[
Type name: application
Subtype name: rpki-sispi
Required parameters: N/A
Optional parameters: N/A
Encoding considerations: binary
Security considerations: Carries Signed SAVNET-Peering Information.
  This media type contains no active content. See
  Section 4 of draft-chen-sidrops-sispi for further information.
Interoperability considerations: None
Published specification: draft-chen-sidrops-sispi
Applications that use this media type: RPKI operators
Additional information:
  Content: This media type is a signed object, as defined
      in {{RFC6488}}, which contains a payload of an AS identifer
      as defined in draft-chen-sidrops-sispi.
Magic number(s): None
File extension(s): .sav
Macintosh file type code(s):
Person & email address to contact for further information:
Li Chen <lichen@zgclab.edu.cn>
Intended usage: COMMON
Restrictions on usage: None
Change controller: IETF
]]></artwork>
      </section>
    </section>
    <section anchor="using-sispi">
      <name>Using SiSPI</name>
      <t>A router can use the AS_Path from BGP announcements, ASPA objects, and SiSPI to find the closest ASes to set up SAVNET peering, as described below:</t>
      <ol spacing="normal" type="1"><li>
          <t>BGP AS_Paths Analysis:  </t>
          <ul spacing="normal">
            <li>
              <t>Collect AS paths from BGP announcements.</t>
            </li>
            <li>
              <t>Determine the frequency or preference of certain AS paths based on routing policies, which may involve path attributes like AS path length, origin type, local preference, and MED (Multi-Exit Discriminator).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>ASPA Verification:  </t>
          <ul spacing="normal">
            <li>
              <t>Use ASPA objects to verify the legitimacy of customer-provider AS relationships.</t>
            </li>
            <li>
              <t>Ensure that the AS paths conform to the customer-provider relationships indicated by the ASPAs, thereby validating the correctness of the routing information.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Peering Candidates Determination:  </t>
          <ul spacing="normal">
            <li>
              <t>Identify the ASes that frequently appear on the preferred paths to various destinations, implying they are topologically 'close' or significant transit providers.</t>
            </li>
            <li>
              <t>Among these ASes, rank those according to their frequency in an descending order, since the frequency indicates the weight of traffic from the local AS and higher frequency represents more volume of traffic to transmit for the local AS.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>SiSPI Objects Utilization:  </t>
          <ul spacing="normal">
            <li>
              <t>Retrieve SiSPI objects from the RPKI repository to determine which ASes have deployed SAVNET.</t>
            </li>
            <li>
              <t>Filter the previously identified candidate ASes by checking whether they have a valid SiSPI object, which would indicate their readiness to establish SAVNET peering.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Peering Candidates Selection:  </t>
          <ul spacing="normal">
            <li>
              <t>From the set of candidate ASes with valid SiSPI objects, select candidates for SAVNET peering based on their rankings.</t>
            </li>
            <li>
              <t>The selection criteria may include additional factors such as existing peering policies, traffic volumes, and peering agreements.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Peering Establishment:  </t>
          <ul spacing="normal">
            <li>
              <t>Initiate peering negotiations with the selected candidate ASes.</t>
            </li>
            <li>
              <t>Upon successful negotiation, establish SAVNET peering relationships and configure the necessary SAVNET protocols.</t>
            </li>
          </ul>
        </li>
      </ol>
      <t>Based on the above steps, a description of the detailed procedure to establish SAVNET peering relationships is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Let the set of selected AS paths to all the potential destinations be denoted as ASPaths.</t>
        </li>
        <li>
          <t>Let i = 1. Validate ASPaths(i) using ASPA objects.</t>
        </li>
        <li>
          <t>Let the set of validated AS paths be denoted as ASPaths-V.</t>
        </li>
        <li>
          <t>If ASPaths(i) passes the validation of ASPA objects, add it to ASPaths-V.</t>
        </li>
        <li>
          <t>Increment i to i+1.</t>
        </li>
        <li>
          <t>If ASPaths(i) is null, then set i_max = i - 1 and go to Step 7. Else, go to Step 4.</t>
        </li>
        <li>
          <t>Let j = 1 and k = 1. Initialize AS-set S(1) = ASPaths-V(1)(1) and N(ASPaths-V(1)(1)) = 1.</t>
        </li>
        <li>
          <t>If ASPaths-V(j)(k) belongs to S, N(ASPaths-V(j)(k)) = N(ASPaths-V(j)(k)) + 1. Else, N(ASPaths-V(j)(k)) = 1 and S(J * k) = ASPaths-V(j)(k).</t>
        </li>
        <li>
          <t>Increment k to k+1.</t>
        </li>
        <li>
          <t>If ASPaths-V(j)(k) is null, then go to Step 11. Else, go to Step 8.</t>
        </li>
        <li>
          <t>Increment j to j+1.</t>
        </li>
        <li>
          <t>If ASPaths-V(j)(k) is null, then go to Step 13. Else, go to Step 8.</t>
        </li>
        <li>
          <t>Rank the AS-set N according to its values in descending order.</t>
        </li>
        <li>
          <t>Retrieve SiSPI objects from the RPKI repository and let the set of ASes within the SiSPI objects be denoted as O.</t>
        </li>
        <li>
          <t>Let m = 1. Create a SAVNET neighbor candidate set C.</t>
        </li>
        <li>
          <t>If N(m) belongs to O, add N(1) to C.</t>
        </li>
        <li>
          <t>Increate m to m + 1.</t>
        </li>
        <li>
          <t>If N(m) is null or the number of ASes in set C exceeds 4000, go to Step 19. Else, go to Step 16.</t>
        </li>
        <li>
          <t>Establish SAVNET peering relationship with the selected candidate ASes in set C.</t>
        </li>
      </ol>
    </section>
    <section anchor="newly-savnet-adopting-ases">
      <name>Newly SAVNET-adopting ASes</name>
      <t>The newly SAVNET-adopting ASes need to register the SiSPI object proactively to help other SAVNET-adopting ASes find it and establish SAVNET peering relationships, as well as using the SiSPI objects to establish SAVNET peering relationships with other SAVNET-adopting ASes.</t>
      <t>To register the SiSPI object, the newly SAVNET-adopting ASes should share its information as described in <xref target="sav-econtent"/>.</t>
      <t>To establish SAVNET peering relationships with other SAVNET-adopting ASes, the newly SAVNET-adopting ASes should collect BGP announcements, ASPA objects, and SiSPI objects, and run the procedures described in <xref target="using-sispi"/>.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC6481"/>, <xref target="RFC6485"/>, and <xref target="RFC6488"/> also apply to the SiSPI object.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6488">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC6485">
          <front>
            <title>The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists, and signed objects as well as for the relying parties (RPs) that verify these digital signatures. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6485"/>
          <seriesInfo name="DOI" value="10.17487/RFC6485"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules&amp;#59; Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Information technology - Abstract Syntax Notation One (ASN.1)&amp;#59; Specification of basic notation</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="savnet" target="https://datatracker.ietf.org/doc/draft-wu-savnet-inter-domain-architecture/">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="emu-9-savs" target="https://datatracker.ietf.org/meeting/118/materials/slides-118-savnet-emulations-of-nine-sav-mechanisms-with-sav-open-playground-00">
          <front>
            <title>Emulations of 9 SAV Mechanisms with SAV Open Playground</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
