<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jiang-sidrops-psvro-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="PSVRO">Route Origin Registry Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-jiang-sidrops-psvro-02"/>
    <author fullname="Shenglin Jiang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jiangshl@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xingang Shi">
      <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>shixg@cernet.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="May" day="19"/>
    <workgroup>SIDROPS</workgroup>
    <abstract>
      <?line 106?>

<t>Prefix hijacking, i.e., unauthorized announcement of a prefix, has emerged as a major security threat in the Border Gateway Protocol (BGP), garnering widespread attention. To migrate such attacks while supporting legitimate Multiple Origin ASes (MOAS), higher requirements are placed on the route origin registry. This document serves to outline the problem statement for current route origin registry.</t>
    </abstract>
  </front>
  <middle>
    <?line 110?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) is ubiquitously used for inter-domain routing. However, it lacks built-in security validation on whether its UPDATE information is legitimate <xref target="RFC4272"/>. This poses concerns regarding prefix hijacking, where unauthorized announcements of prefixes can occur, simulating legitimate Multiple Origin ASes (MOAS).</t>
      <t>Unfortunately, the current route origin registry, such as Internet Routing Registry (IRR) <xref target="RFC1786"/> and Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/>, are not effective in distinguishing between legitimate MOAS and prefix hijacking. There is a pressing need for an verifiable route origin registry that can support registration and protection of legitimate MOAS, thereby mitigating the threats posed by prefix hijacking to the routing system.</t>
      <t>This document will primarily analyze the various scenarios of MOAS and highlight the limitations of the current route origin registry. By examining these issues, our primary objective is to offer valuable insights to network operators, researchers, and policymakers for improving the security and robustness of the global routing system.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="working-definition-of-route-origin-registry">
      <name>Working Definition of Route Origin Registry</name>
      <t>Route origin registry refers to a system that records the mapping of IP prefixes to the ASes authorised to announce them. Resource holders can register route origin mapping relationships in route origin registry by themselves or delegate to others.</t>
      <t>IRR and RPKI currently offer functionalities related to route origin registry. IRRs, which have been in operation since 1995, serve as a globally distributed database for routing information. They record the binding relationship between IPs and Autonomous Systems (ASes) via Route(6) objects, which are defined by the Routing Policy Specification Language (RPSL).</t>
      <t>On the other hand, the RPKI, which was developed starting in 2008, provides a formally verifiable framework. The RPKI is based on resource certificates that extend the X.509 standard. It records the mapping between IP prefixes and their authorised ASes via Route Origin Authorization (ROA) objects. These ROA objects contain essential information such as the prefix, origin ASN, and MaxLength.</t>
    </section>
    <section anchor="prefix-hijacking-and-legitimate-moas">
      <name>Prefix Hijacking and Legitimate MOAS</name>
      <t><xref target="RFC1930"/> suggests that a prefix should typically have a single Autonomous System (AS) as its origin, with a few exceptions. However, CAIDA's analysis on BGP routing data <xref target="CAIDA"/> reveals that MOAS has always been a common phenomenon. There are various reasons that contribute to the emergence of MOAS prefixes:</t>
      <ul spacing="normal">
        <li>
          <t><strong><em>Aggregation</em></strong>. According to <xref target="RFC1930"/>, aggregation could result in prefix originated from multiple possible ASes. For example, if the "Prefix 0/24" originates from ASx and the "Prefix 1/24" originates from ASy, aggregating them into "Prefix 0/23" with the originates from [ASx, ASy] may result in the loss of the specific origin AS information if the ATOMIC_AGGREGATE attributes of the aggregation announcements are not specific.</t>
        </li>
        <li>
          <t><strong><em>Business consideration</em></strong>. Companies often choose providers that offer high-speed and reliable data services to host their servers. For efficient resource allocation, a parent organization that owns a large chunk of IP addresses may divide its address space among one or more child organizations, which choose different providers and ask them to announce the same prefix. For example, a multi-national company may advertise its prefix from multiple locations where it has offices.</t>
        </li>
        <li>
          <t><strong><em>Multi-homing</em></strong>. When multi-homing occur without the use of BGP, it can result in MOAS conflicts. Assuming ASx is connected to two providers, ISP1 and ISP2. ISP1 is connected to ASx using BGP, while ISP2 is connected to ASx through static routes or Interior Gateway Protocol (IGP). Both ISP1 and ISP2 advertise prefixes that belong to ASx.</t>
        </li>
        <li>
          <t><strong><em>Internet eXchanges</em></strong>. When a prefix is associated with an exchange point, it becomes directly accessible from all the ASes connected to that exchange point. Each AS at the exchange point has the capability to advertise the prefix as if it originates directly from their own AS.</t>
        </li>
        <li>
          <t><strong><em>Anycast</em></strong>. Anycast is often employed by content distribution networks (CDNs) to direct the requests of their customers to the nearest servers, ensuring speedy data delivery to their customers.</t>
        </li>
        <li>
          <t><strong><em>Prefix hijacking and misconfigurations</em></strong>. A malicious AS may advertise prefixes belonging to another organization to attract its traffic. An AS may also make such annoucements unintentionally due to misconfiguration.</t>
        </li>
      </ul>
      <t>Distinguishing between prefix hijacking, misconfiguration, and legitimate MOAS is a complex task. The challenge arises from the resemblance of these behaviors, as they often display similar characteristics. Moreover, accurately identifying and classifying these situations necessitates a route origin registry with high coverage and accuracy.</t>
    </section>
    <section anchor="problems-in-current-route-origin-registry">
      <name>Problems in Current Route Origin Registry</name>
      <t>This section outlines several challenges faced by the current route origin registries in distinguishing legitimate MOAS events from malicious MOAS incidents, such as route hijacking.</t>
      <section anchor="security-risks-from-partial-adoption">
        <name>Security Risks from Partial Adoption</name>
        <t>As the adoption of RPKI continues to grow, the number of address prefixes registered within RPKI is gradually increasing. However, recent reports from the Number Resource Organization (NRO) <xref target="NRO"/> indicate that the coverage of IP prefixes within ROAs is still relatively low, and the adoption rate of route origin validation (ROV), as measured by Mutually Agreed Norms for Routing Security (MANRS) <xref target="MANRS"/>, is even significantly lower than the coverage of ROAs. Similarly, <xref target="IRRegularities"/> also notes a decreasing trend in IP Prefix coverage in certain IRRs. When focusing on MOAS, their coverage is significantly lower and insufficient to distinguish between legitimate MOAS and route hijacking.</t>
        <t>Limited IP prefix coverage within the current route origin registry, especially for MOAS prefixes, hinders the complete validation of route announcements, significantly limiting the motivation for network operators to utilize route origin registry.</t>
      </section>
      <section anchor="inconsistency-between-different-route-origin-registries">
        <name>Inconsistency between Different Route Origin Registries</name>
        <t>Based on the analysis presented in the previous sections, it is evident that relying solely on a single source of route origin registry is insufficient in route origin validation. To address this issue effectively, it is recommended to integrate the RPKI and multiple active IRRs.</t>
        <t>However, it is important to note that this fusion approach may encounter several limitations. As highlighted in <xref target="IRRegularities"/>, inconsistencies exist among the Route(6) objects across different IRRs. This inconsistency can be attributed to the chronic neglect by IRR customers. For instance, some companies may register Route(6) objects in some IRRs but fail to update them in all the route origin registries, resulting in outdated and stale Route(6) objects. Furthermore, it is observed that a higher number of IRRs exhibit lower consistency with RPKI. In practice, different networks often use different data and methodologies to perform route validation and filtering, resulting in disparate outcome, especially when ROA and IRR data conflict with each other.</t>
        <t>As a result, while integrating the RPKI and multiple active IRRs can improve the effectiveness of route origin validation, it is essential to address the issues of inconsistencies between different route origin registries.</t>
      </section>
      <section anchor="insufficiency-of-resource-certification">
        <name>Insufficiency of Resource Certification</name>
        <t>As mentioned in <xref target="RFC7682"/>, the lack of certification and incentives for maintaining up-to-date data within IRRs leads to low accuracy of the information. Recent measurement <xref target="IRRegularities"/> reveals that IRRs with low update activity exhibit lower overlap with BGP announcements than those with high update activity. This indicates that IRRs with lower activity may contain a higher proportion of outdated and stale Route(6) objects, thereby impacting the reliability of the route origin registry.</t>
        <t>RPKI is a hierarchical Public Key Infrastructure (PKI) that binds Internet Number Resources (INRs) such as Autonomous System Numbers (ASNs) and IP addresses to public keys via certificates. However, there is a risk of conflicts in INRs ownership when misconfiguration or malicious operations occur at the upper tier, resulting in multiple lower tiers being allocated the same INRs. Additionally, the existence of legitimate MOAS necessitates the authorization of binding between a prefix with multiple ASes, further complicating the issue. Balancing the protection of legitimate MOAS while minimizing risks in INRs certificates presents a challenging problem that requires innovative solutions. Furthermore, it is worth noting that RPKI Relying Parties (RPs) <xref target="RFC8897"/> have not yet standardized the process of constructing certificate chains and handling exceptions such as Certificate Revocation Lists (CRLs) and Manifests. This lack of standardization has resulted in different views on the RPKI records by RPs who adopt different implementations. Consequently, ASes served by different RPs may have varying validation results for the same route announcement.</t>
        <t>Consequently, the absence of data validation and standardization in operations within the IRR or RPKI framework means that there is no guarantee of the accuracy of the data registered in any route origin registry.</t>
      </section>
      <section anchor="synchronization-and-management">
        <name>Synchronization and Management</name>
        <t>The current practice in IRRs involves the use of the Near-Real-Time Mirroring (NRTM) protocol <xref target="NRTMv4"/> to replicate and synchronize Route(6) object from other IRRs. Similarly, the RPKI relies on the RPKI Repository Delta Protocol (RRDP) <xref target="RFC8182"/> to synchronize and update data. However, these network protocols exhibit several weaknesses that need to be addressed.</t>
        <ul spacing="normal">
          <li>
            <t>The absence of a mechanism to notify other mirrors when updates occur results in synchronization delays and data inconsistency issues. This can be problematic when timeliness and accuracy are crucial.</t>
          </li>
          <li>
            <t>The absence of validation for replicated data from mirrored sources in both IRRs and RPKI is a legitimate concern. This situation creates a considerable risk for inconsistencies and conflicts with the current data.</t>
          </li>
          <li>
            <t>The absence of application security mechanisms within these protocols is another area of vulnerability. This lack of security measures exposes the system to unauthorized access and compromise on data integrity.</t>
          </li>
        </ul>
        <t>Although some approaches attempt to optimise the quality of the route origin registry, e.g. RIPE NCC, IRRdv4 using RPKI to validate/filter IRR Route(6) objects, and <xref target="RFC8416"/> proposing that RPs can customise route origin with local data, the problem of inconsistency persists due to the limited coverage of RPKI and the lack of effective mechanisms to resolve conflicting data between IRRs. It is crucial to establish a effective communication mechanism among multiple route origin registry, enabling negotiation and cross-validation of conflicting or special-purpose route origin information.</t>
      </section>
      <section anchor="summary">
        <name>Summary</name>
        <t>The current route origin registry systems, namely IRRs and RPKI, are facing challenges as the increased occurrence of MOAS prefixes. These challenges mainly include low adoption rates, global inconsistency, insufficient resource certification, and incomplete multi-source collaboration mechanisms.</t>
      </section>
    </section>
    <section anchor="requirements-for-new-route-origin-registry-mechanisms">
      <name>Requirements for New Route Origin Registry Mechanisms</name>
      <t>This section lists the requirements designed to guide the improvement of route origin registry mechanisms. These enhancements should prioritize multi-party collaboration to safeguard legitimate MOAS events while effectively filtering out malicious MOAS incidents.</t>
      <section anchor="allowlist-mechanism">
        <name>Allowlist Mechanism</name>
        <t>To ensure robust protection for legitimate MOAS events, prefix users should implement an allowlist mechanism as a complementary to the current resource-owner-centric systems. This mechanism permits multiple users to be authorized to announce the same prefix concurrently. Moreover, users should be able to dynamically join or leave the allowlist based on practical business consideration.</t>
      </section>
      <section anchor="blocklist-mechanism">
        <name>Blocklist Mechanism</name>
        <t>One of the primary objectives of route origin validation is to suppress the propagation of malicious MOAS incidents and mitigate their impact. To enhance the efficiency and precision of anomaly detection, network participants should employ real-time anomaly monitoring and rapid consensus mechanisms to construct a blocklist. This blocklist enables the timely de-prioritization of anomalous routes, thereby reducing their disruptive effects on the routing system.</t>
      </section>
      <section anchor="multi-party-governance">
        <name>Multi-party Governance</name>
        <t>Multi-party governance plays a pivotal role in the development of new route origin mechanisms. By integrating and cross-verifying data from multiple sources, this approach facilitates effective negotiation and resolution of data duplication and conflicts. It ensures the full utilization of the strengths of each data source, thereby enhancing the reliability and functionality of the system.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There is no security consideration in this draft.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There is no IANA consideration in this draft.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1786">
          <front>
            <title>Representation of IP Routing Policies in a Routing Registry (ripe-81++)</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="E. Gerich" initials="E." surname="Gerich"/>
            <author fullname="L. Joncheray" initials="L." surname="Joncheray"/>
            <author fullname="J-M. Jouanigot" surname="J-M. Jouanigot"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="M. Terpstra" initials="M." surname="Terpstra"/>
            <author fullname="J. Yu" initials="J." surname="Yu"/>
            <date month="March" year="1995"/>
            <abstract>
              <t>This document is an update to the original `ripe-81' proposal for representing and storing routing polices within the RIPE database. It incorporates several extensions proposed by Merit Inc. and gives details of a generalized IP routing policy representation to be used by all Internet routing registries. It acts as both tutorial and provides details of database objects and attributes that use and make up a routing registry. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1786"/>
          <seriesInfo name="DOI" value="10.17487/RFC1786"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC8416">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4272">
          <front>
            <title>BGP Security Vulnerabilities Analysis</title>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
              <t>This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4272"/>
          <seriesInfo name="DOI" value="10.17487/RFC4272"/>
        </reference>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7682">
          <front>
            <title>Considerations for Internet Routing Registries (IRRs) and Routing Policy Configuration</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="D. Mitchell" initials="D." surname="Mitchell"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The purpose of this document is to catalog issues that influenced the efficacy of Internet Routing Registries (IRRs) for inter-domain routing policy specification and application in the global routing system over the past two decades. Additionally, it provides a discussion regarding which of these issues are still problematic in practice, and which are simply artifacts that are no longer applicable but continue to stifle inter-provider policy-based filtering adoption and IRR utility to this day.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7682"/>
          <seriesInfo name="DOI" value="10.17487/RFC7682"/>
        </reference>
        <reference anchor="RFC8897">
          <front>
            <title>Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document provides a single reference point for requirements for Relying Party (RP) software for use in the Resource Public Key Infrastructure (RPKI). It cites requirements that appear in several RPKI RFCs, making it easier for implementers to become aware of these requirements. Over time, this RFC will be updated to reflect changes to the requirements and guidance specified in the RFCs discussed herein.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8897"/>
          <seriesInfo name="DOI" value="10.17487/RFC8897"/>
        </reference>
        <reference anchor="NRTMv4">
          <front>
            <title>Near Real Time Mirroring (NRTM) version 4</title>
            <author fullname="Sasha Romijn" initials="S." surname="Romijn">
              <organization>Reliably Coded</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Edward Shryane" initials="E." surname="Shryane">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Stavros Konstantaras" initials="S." surname="Konstantaras">
              <organization>AMS-IX</organization>
            </author>
            <date day="14" month="May" year="2025"/>
            <abstract>
              <t>   This document specifies a one-way synchronization protocol for
   Internet Routing Registry (IRR) records.  The protocol allows
   instances of IRR database servers to mirror IRR records, specified in
   the Routing Policy Specification Language (RPSL), between each other.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-nrtm-v4-07"/>
        </reference>
        <reference anchor="IRRegularities">
          <front>
            <title>IRRegularities in the internet routing registry</title>
            <author initials="B." surname="Du">
              <organization/>
            </author>
            <author initials="K." surname="Izhikevich">
              <organization/>
            </author>
            <author initials="S." surname="Rao">
              <organization/>
            </author>
            <author initials="G." surname="Akiwate">
              <organization/>
            </author>
            <author initials="C." surname="Testart">
              <organization/>
            </author>
            <author initials="" surname="AC Snoeren">
              <organization/>
            </author>
            <author initials="K." surname="Claffy">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the 2023 ACM on internet measurement conference" value=""/>
        </reference>
        <reference anchor="CAIDA" target="https://catalog.caida.org/dataset/routeviews_prefix2as">
          <front>
            <title>RouteViews Prefix to AS mappings</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="MANRS" target="https://observatory.manrs.org/">
          <front>
            <title>MANRS Observatory</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NRO" target="https://www.nro.net/about/rirs/statistics/">
          <front>
            <title>RIR Statistics</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 232?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Yangfei Guo, Di Ma, Qi Li, Shuhe Wang, Xiaoliang Wang, Hui Wang, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
