<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-sidrops-rpki-has-no-identity-07" indexInclude="true" ipr="trust200902" number="9255" prepTime="2022-06-08T21:48:34" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="6" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-sidrops-rpki-has-no-identity-07" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9255" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title>The 'I' in RPKI Does Not Stand for Identity</title>
    <seriesInfo name="RFC" value="9255" stream="IETF"/>
    <author fullname="Randy Bush" initials="R." surname="Bush">
      <organization abbrev="Arrcus &amp; IIJ Research" showOnFrontPage="true">Arrcus &amp; Internet Initiative Japan Research</organization>
      <address>
        <postal>
          <street>5147 Crystal Springs</street>
          <city>Bainbridge Island</city>
          <region>WA</region>
          <code>98110</code>
          <country>United States of America</country>
        </postal>
        <email>randy@psg.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security" showOnFrontPage="true">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon</city>
          <region>VA</region>
          <code>20170</code>
          <country>United States of America</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date month="06" year="2022"/>
    <area>ops</area>
    <workgroup>sidrops</workgroup>
    <keyword>Public Key Infrastructure</keyword>
    <keyword>Security</keyword>
    <keyword>X.509</keyword>
    <keyword>Certificate</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">There is a false notion that Internet Number Resources (INRs) in
    the RPKI can be associated with the real-world identity of the
    'holder' of an INR.  This document specifies that RPKI does not
    associate to the INR holder.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9255" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2022 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-rpki-is-for-authorizati">The RPKI is for Authorization</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-discussion">Discussion</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t indent="0" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.2">
                <t indent="0" pn="section-toc.1-1.6.2.2.1"><xref derivedContent="6.2" format="counter" sectionFormat="of" target="section-6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">The Resource Public Key Infrastructure (RPKI), see <xref target="RFC6480" format="default" sectionFormat="of" derivedContent="RFC6480"/>, "represents the allocation hierarchy of IP
    address space and Autonomous System (AS) numbers," which are
    collectively known as Internet Number Resources (INRs).  Since
    initial deployment, the RPKI has grown to include other similar
    resource and routing data, e.g., Router Keying for BGPsec <xref target="RFC8635" format="default" sectionFormat="of" derivedContent="RFC8635"/>.</t>
      <t indent="0" pn="section-1-2">In security terms, the phrase "Public Key" implies there is also
    a corresponding private key <xref target="RFC5280" format="default" sectionFormat="of" derivedContent="RFC5280"/>.  The RPKI
    provides strong authority to the current holder of INRs; however,
    some people have a desire to use RPKI private keys to sign
    arbitrary documents as the INR 'holder' of those resources with the
    inappropriate expectation that the signature will be considered an
    attestation to the authenticity of the document content.  But, in
    reality, the RPKI certificate is only an authorization to speak for
    the explicitly identified INRs; it is explicitly not intended for
    authentication of the 'holders' of the INRs.  This situation is
    emphasized in <xref target="RFC6480" section="2.1" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6480#section-2.1" derivedContent="RFC6480"/>.</t>
      <t indent="0" pn="section-1-3">It has been suggested that one could authenticate real-world
    business transactions with the signatures of INR holders.  For example,
    Bill's Bait and Sushi (BB&amp;S) could use the private key attesting
    to that they are the holder of their AS in the RPKI to sign a Letter
    of Authorization (LOA) for some other party to rack and stack
    hardware owned by BB&amp;S.  Unfortunately, while this may be
    technically possible, it is neither appropriate nor meaningful.</t>
      <t indent="0" pn="section-1-4">The 'I' in RPKI actually stands for "Infrastructure," as in
    Resource Public Key Infrastructure, not for "Identity".  In fact,
    the RPKI does not provide any association between INRs and the real-world holder(s) of those INRs.  The RPKI provides authorization to
    make assertions only regarding Internet Number Resources, such as IP
    prefixes or AS numbers, and data such as <xref target="I-D.ietf-sidrops-aspa-profile" format="default" sectionFormat="of" derivedContent="ASPA-PROFILE">Autonomous System Provider Authorization (ASPA) records</xref>.</t>
      <t indent="0" pn="section-1-5">In short, avoid the desire to use RPKI certificates for any
    purpose other than the verification of authorizations associated
    with the delegation of INRs or attestations related to INRs.
    Instead, recognize that these authorizations and attestations take
    place irrespective of the identity of an RPKI private key holder.</t>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-1.1">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t indent="0" pn="section-1.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>",
    "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be
    interpreted as described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they appear in all capitals, as
    shown here.
        </t>
      </section>
    </section>
    <section anchor="bottom" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-the-rpki-is-for-authorizati">The RPKI is for Authorization</name>
      <t indent="0" pn="section-2-1">The RPKI was designed and specified to sign certificates for use
    within the RPKI itself and to generate Route Origin Authorizations
    (ROAs) <xref target="RFC6480" format="default" sectionFormat="of" derivedContent="RFC6480"/> for use in routing.  Its design
    intentionally precluded use for attesting to real-world identity as,
    among other issues, it would expose the Certification Authority (CA)
    to liability.</t>
      <t indent="0" pn="section-2-2">That the RPKI does not authenticate real-world identity is by
    design.  If it tried to do so, aside from the liability, it would
    end in a world of complexity with no proof of termination.</t>
      <t indent="0" pn="section-2-3">Registries such as the Regional Internet Registries (RIRs)
    provide INR to real-world identity mapping through WHOIS <xref target="RFC3912" format="default" sectionFormat="of" derivedContent="RFC3912"/> and similar services.  They claim to be
    authoritative, at least for the INRs that they allocate.</t>
      <t indent="0" pn="section-2-4">That is, RPKI-based credentials of INRs <bcp14>MUST NOT</bcp14> be used to
    authenticate real-world documents or transactions.  That might be
    done with some formal external authentication of authority allowing
    an otherwise anonymous INR holder to authenticate the particular
    document or transaction.  Given such external, i.e. non-RPKI,
    verification of authority, the use of RPKI-based credentials adds no
    authenticity.</t>
    </section>
    <section anchor="discuss" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-discussion">Discussion</name>
      <t indent="0" pn="section-3-1"><xref target="RFC6480" section="2.1" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6480#section-2.1" derivedContent="RFC6480">the RPKI base document</xref> says explicitly "An important property of this PKI is that
    certificates do not attest to the identity of the subject."</t>
      <t indent="0" pn="section-3-2"><xref target="RFC7382" section="3.1" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7382#section-3.1" derivedContent="RFC7382">"Template for a Certification Practice Statement (CPS) for the Resource PKI (RPKI)"</xref> states that 
 the Subject name in each certificate SHOULD NOT be meaningful
 and goes on to explain this at some length.</t>
      <t indent="0" pn="section-3-3">Normally, the INR holder does not hold the private key attesting
    to their resources; the CA does.  The INR
    holder has a real-world business relationship with the CA for which
    they have likely signed real-world documents.</t>
      <t indent="0" pn="section-3-4">As the INR holder does not have the keying material, they rely on
    the CA, to which they presumably present credentials, to manipulate
    their INRs.  These credentials may be user ID and password (with two-factor 
    authentication one hopes), a hardware token, client browser
    certificates, etc.</t>
      <t indent="0" pn="section-3-5">Hence schemes such as Resource Tagged Attestations <xref target="I-D.ietf-sidrops-rpki-rta" format="default" sectionFormat="of" derivedContent="RPKI-RTA"/>
    and Signed Checklists <xref target="I-D.ietf-sidrops-rpki-rsc" format="default" sectionFormat="of" derivedContent="RPKI-RSC"/> must go to great
    lengths to extract the supposedly relevant keys from the CA.</t>
      <t indent="0" pn="section-3-6">For some particular INR, say, Bill's Bait and Sushi's Autonomous
    System (AS) number, someone out on the net probably has the
    credentials to the CA account in which BB&amp;S's INRs are
    registered. That could be the owner of BB&amp;S, Randy's Taco
    Stand, an IT vendor, or the Government of Elbonia.  One simply can
    not know.</t>
      <t indent="0" pn="section-3-7">In large organizations, INR management is often compartmentalized
    with no authority over anything beyond dealing with INR
    registration.  The INR manager for Bill's Bait and Sushi is unlikely
    to be authorized to conduct bank transactions for BB&amp;S, or even
    to authorize access to BB&amp;S's servers in some colocation
    facility.</t>
      <t indent="0" pn="section-3-8">Then there is the temporal issue.  The holder of that AS may be
    BB&amp;S today when some document was signed, and could be the
    Government of Elbonia tomorrow.  Or the resource could have been
    administratively moved from one CA to another, likely requiring a
    change of keys.  If so, how does one determine if the signature on
    the real-world document is still valid?</t>
      <t indent="0" pn="section-3-9">While Ghostbuster Records <xref target="RFC6493" format="default" sectionFormat="of" derivedContent="RFC6493"/> may seem to
    identify real-world entities, their semantic content is completely
    arbitrary and does not attest to holding of any INRs.  They are
    merely clues for operational support contact in case of technical
    RPKI problems.</t>
      <t indent="0" pn="section-3-10">Usually, before registering INRs, CAs require proof of an INR
    holding via external documentation and authorities.  It is somewhat
    droll that the CPS Template <xref target="RFC7382" format="default" sectionFormat="of" derivedContent="RFC7382"/> does not
    mention any diligence the CA must, or even might, conduct to assure
    the INRs are in fact owned by a registrant.</t>
      <t indent="0" pn="section-3-11">That someone can provide 'proof of possession' of the private key
    signing over a particular INR should not be taken to imply that they
    are a valid legal representative of the organization in possession
    of that INR. They could be in an INR administrative role, and not be a formal
   representative of the organization.</t>
      <t indent="0" pn="section-3-12">Autonomous System Numbers do not identify real-world entities.
    They are identifiers some network operators 'own' and are only used
    for loop detection in routing.  They have no inherent semantics other
    than uniqueness.</t>
    </section>
    <section anchor="security" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-4-1">Attempts to use RPKI data to authenticate real-world documents or
    other artifacts requiring identity, while possibly cryptographically
    valid within the RPKI, are misleading as to any authenticity.</t>
      <t indent="0" pn="section-4-2">When a document is signed with the private key associated with an
      RPKI certificate, the signer is speaking for the INRs (the IP address
      space and AS numbers) in the certificate.  This is not an identity; this
      is an authorization.  In schemes such as Resource Tagged Attestations
      <xref target="I-D.ietf-sidrops-rpki-rta" format="default" sectionFormat="of" derivedContent="RPKI-RTA"/> and Signed Checklists <xref target="I-D.ietf-sidrops-rpki-rsc" format="default" sectionFormat="of" derivedContent="RPKI-RSC"/>, the signed message further narrows
      this scope of INRs.  The INRs in the message are a subset of the INRs in
      the certificate.  If the signature is valid, the message content comes
      from a party that is authorized to speak for that subset of INRs.</t>
      <t indent="0" pn="section-4-3">Control of INRs for an entity could be used to falsely authorize
    transactions or documents for which the INR manager has no
    authority.</t>
    </section>
    <section anchor="iana" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-5-1">This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-sidrops-rpki-rsc" to="RPKI-RSC"/>
    <displayreference target="I-D.ietf-sidrops-rpki-rta" to="RPKI-RTA"/>
    <displayreference target="I-D.ietf-sidrops-aspa-profile" to="ASPA-PROFILE"/>
    <references pn="section-6">
      <name slugifiedName="name-references">References</name>
      <references pn="section-6.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" quoteTitle="true" derivedAnchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author initials="D." surname="Cooper" fullname="D. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Santesson" fullname="S. Santesson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Farrell" fullname="S. Farrell">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Boeyen" fullname="S. Boeyen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Polk" fullname="W. Polk">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="May"/>
            <abstract>
              <t indent="0">This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" quoteTitle="true" derivedAnchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author initials="M." surname="Lepinski" fullname="M. Lepinski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="February"/>
            <abstract>
              <t indent="0">This document describes an architecture for an infrastructure to support improved security of Internet routing.  The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security.  As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space.  Such verifiable authorizations could be used, for example, to more securely construct BGP route filters.   This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC7382" target="https://www.rfc-editor.org/info/rfc7382" quoteTitle="true" derivedAnchor="RFC7382">
          <front>
            <title>Template for a Certification Practice Statement (CPS) for the Resource PKI (RPKI)</title>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Kong" fullname="D. Kong">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Seo" fullname="K. Seo">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="April"/>
            <abstract>
              <t indent="0">This document contains a template to be used for creating a Certification Practice Statement (CPS) for an organization that is part of the Resource Public Key Infrastructure (RPKI), e.g., a resource allocation registry or an ISP.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="173"/>
          <seriesInfo name="RFC" value="7382"/>
          <seriesInfo name="DOI" value="10.17487/RFC7382"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8635" target="https://www.rfc-editor.org/info/rfc8635" quoteTitle="true" derivedAnchor="RFC8635">
          <front>
            <title>Router Keying for BGPsec</title>
            <author initials="R." surname="Bush" fullname="R. Bush">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Patel" fullname="K. Patel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="August"/>
            <abstract>
              <t indent="0">BGPsec-speaking routers are provisioned with private keys in order to sign BGPsec announcements.  The corresponding public keys are published in the Global Resource Public Key Infrastructure (RPKI), enabling verification of BGPsec messages.  This document describes two methods of generating the public-private key pairs: router-driven and operator-driven.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8635"/>
          <seriesInfo name="DOI" value="10.17487/RFC8635"/>
        </reference>
      </references>
      <references pn="section-6.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-07" derivedAnchor="ASPA-PROFILE">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov">
              <organization showOnFrontPage="true">Yandex</organization>
            </author>
            <author fullname="Eugene Uskov">
              <organization showOnFrontPage="true">JetLend</organization>
            </author>
            <author fullname="Randy Bush">
              <organization showOnFrontPage="true">Internet Initiative Japan</organization>
            </author>
            <author fullname="Keyur Patel">
              <organization showOnFrontPage="true">Arrcus, Inc.</organization>
            </author>
            <author fullname="Job Snijders">
              <organization showOnFrontPage="true">Fastly</organization>
            </author>
            <author fullname="Russ Housley">
              <organization showOnFrontPage="true">Vigil Security, LLC</organization>
            </author>
            <date month="January" day="31" year="2022"/>
            <abstract>
              <t indent="0">   This document defines a standard profile for Autonomous System
   Provider Authorization in the Resource Public Key Infrastructure.  An
   Autonomous System Provider Authorization is a digitally signed object
   that provides a means of validating that a Customer Autonomous System
   holder has authorized members of Provider set to be its upstream
   providers and for the Providers to send prefixes received from the
   Customer Autonomous System in all directions including providers and
   peers.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-07"/>
          <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-sidrops-aspa-profile-07.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC3912" target="https://www.rfc-editor.org/info/rfc3912" quoteTitle="true" derivedAnchor="RFC3912">
          <front>
            <title>WHOIS Protocol Specification</title>
            <author initials="L." surname="Daigle" fullname="L. Daigle">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2004" month="September"/>
            <abstract>
              <t indent="0">This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954.  The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet.  This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3912"/>
          <seriesInfo name="DOI" value="10.17487/RFC3912"/>
        </reference>
        <reference anchor="RFC6493" target="https://www.rfc-editor.org/info/rfc6493" quoteTitle="true" derivedAnchor="RFC6493">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) Ghostbusters Record</title>
            <author initials="R." surname="Bush" fullname="R. Bush">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="February"/>
            <abstract>
              <t indent="0">In the Resource Public Key Infrastructure (RPKI), resource certificates completely obscure names or any other information that might be useful for contacting responsible parties to deal with issues of certificate expiration, maintenance, roll-overs, compromises, etc.  This document describes the RPKI Ghostbusters Record containing human contact information that may be verified (indirectly) by a Certification Authority (CA) certificate.  The data in the record are those of a severely profiled vCard.  [STANDARDS- TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6493"/>
          <seriesInfo name="DOI" value="10.17487/RFC6493"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-rsc" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-rsc-08" derivedAnchor="RPKI-RSC">
          <front>
            <title>A profile for Resource Public Key Infrastructure (RPKI) Signed Checklists (RSC)</title>
            <author fullname="Job Snijders">
              <organization showOnFrontPage="true">Fastly</organization>
            </author>
            <author fullname="Tom Harrison">
              <organization showOnFrontPage="true">Asia Pacific Network Information Centre</organization>
            </author>
            <author fullname="Ben Maddison">
              <organization showOnFrontPage="true">Workonline Communications</organization>
            </author>
            <date month="May" day="26" year="2022"/>
            <abstract>
              <t indent="0">   This document defines a Cryptographic Message Syntax (CMS) profile
   for a general purpose listing of checksums (a 'checklist'), for use
   with the Resource Public Key Infrastructure (RPKI).  The objective is
   to allow an attestation, in the form of a listing of one or more
   checksums of arbitrary digital objects (files), to be signed "with
   resources", and for validation to provide a means to confirm a
   specific Internet Resource Holder produced the Signed Checklist.  The
   profile is intended to provide for the signing of an arbitrary
   checksum listing with a specific set of Internet Number Resources.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-rsc-08"/>
          <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-sidrops-rpki-rsc-08.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-rta" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-rta-00" derivedAnchor="RPKI-RTA">
          <front>
            <title>A profile for Resource Tagged Attestations (RTAs)</title>
            <author initials="G." surname="Michaelson" fullname="George G. Michaelson">
              <organization showOnFrontPage="true">Asia Pacific Network Information Centre</organization>
            </author>
            <author initials="G." surname="Huston" fullname="Geoff Huston">
              <organization showOnFrontPage="true">Asia Pacific Network Information Centre</organization>
            </author>
            <author initials="T." surname="Harrison" fullname="Tom Harrison">
              <organization showOnFrontPage="true">Asia Pacific Network Information Centre</organization>
            </author>
            <author initials="T." surname="Bruijnzeels" fullname="Tim Bruijnzeels">
              <organization showOnFrontPage="true">NLNet Labs B.V.</organization>
            </author>
            <author initials="M." surname="Hoffmann" fullname="Martin Hoffmann">
              <organization showOnFrontPage="true">NLNet Labs B.V.</organization>
            </author>
            <date month="January" day="21" year="2021"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-rta-00"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="acks" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.a-1">The authors thank <contact fullname="George Michaelson"/> and <contact fullname="Job Snijders"/> for lively
    discussion, <contact fullname="Geoff Huston"/> for some more formal text, <contact fullname="Ties de Kock"/> for
    useful suggestions, many directorate and IESG reviewers, and last
    but not least, Biff for the loan of Bill's Bait and Sushi.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Randy Bush" initials="R." surname="Bush">
        <organization abbrev="Arrcus &amp; IIJ Research" showOnFrontPage="true">Arrcus &amp; Internet Initiative Japan Research</organization>
        <address>
          <postal>
            <street>5147 Crystal Springs</street>
            <city>Bainbridge Island</city>
            <region>WA</region>
            <code>98110</code>
            <country>United States of America</country>
          </postal>
          <email>randy@psg.com</email>
        </address>
      </author>
      <author initials="R." surname="Housley" fullname="Russ Housley">
        <organization abbrev="Vigil Security" showOnFrontPage="true">Vigil Security, LLC</organization>
        <address>
          <postal>
            <street>516 Dranesville Road</street>
            <city>Herndon</city>
            <region>VA</region>
            <code>20170</code>
            <country>United States of America</country>
          </postal>
          <email>housley@vigilsec.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
