<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-rpki-repository-problem-statement-03" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RPKI Repository Problem Statement and Analysis">RPKI Repository Problem Statement and Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-rpki-repository-problem-statement-03"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Su" fullname="Yingying Su">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>suyy@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy44@chinatelecom.cn</email>
      </address>
    </author>
    <date year="2026" month="February" day="28"/>
    <area>General [REPLACE]</area>
    <workgroup>sidrops</workgroup>
    <abstract>
      <?line 89?>

<t>With the increasing deployment of Route Origin Authorizations (ROAs) and Route Origin Validation (ROV), the Resource Public Key Infrastructure (RPKI) has become a critical component for securing inter-domain routing. RPKI leverages cryptographic certificates to validate the authenticity and authorization of IP address and AS number allocations. All RPKI objects are stored in distributed repositories and periodically retrieved by relying parties (RPs). This document presents a data-driven analysis of the current RPKI repository system, including a global survey of AS administrators and an empirical evaluation of repository operations. The analysis reveals that the existing repository architecture suffers from limited scalability and suboptimal efficiency, and is highly sensitive to failures. As the number of ROAs and RPs increases, the growing number of point-to-point connections between repositories and RPs, coupled with the pull-based data synchronization model, significantly degrades the system's scalability and performance. Moreover, a failure or attack on any Publication Point (PP) can prevent RPs from obtaining a complete and up-to-date view of RPKI data. This document further outlines the fundamental requirements for building a scalable, resilient,and efficient RPKI repository architecture to address these limitations.</t>
    </abstract>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>To establish a trustworthy mapping between AS numbers and IP prefixes, RPKI arranges the Certificate Authorities (CAs) in a hierarchy that mirrors IP address allocation, and five RIRs are trust anchors. Each CA in RPKI holds a Resource Certificate (RC) issued by its parent authority, which attests to a binding of the entity's public key to a set of allocated Internet Number Resources (INRs, such as IP address blocks and AS numbers). CAs can issue subordinate RCs to reallocate their resources or issue ROAs (leaf nodes) to authorize ASes to originate specific IP prefixes.</t>
      <t>As shown in <xref target="repo-arc"/>, each CA in RPKI will upload the objects it signs, such as manifests, CRLs, RCs, and ROAs, to the repository Publication Point (PP) it specifies. These PPs naturally form a tree structure that mirrors the RPKI certificate tree and collectively form the global RPKI Repository. Relying Parties (RPs), as entities that help ASes request RPKI data, periodically traverse RCs from five root RCs (held by RIRs) and access the PPs specified in their Subject Information Access (SIA) fields to fetch all RPKI objects, and then validate them. Finally, the ASes served by the RPs can use the verified ROAs to guide routers to perform ROV.</t>
      <figure anchor="repo-arc">
        <name>The RPKI certificate tree and RPKI Repository structure.</name>
        <artwork><![CDATA[
           +-------+ 
           |  RC A |                   +-----------------+          
           |       |                   |        PP       |
           |  SIA--+------------------>| RC B,RC C,ROA A |-----+
           +-------+                   +-----------------+     |
          /    |    \                                          |
         /     |     \                                         |
        /      |      \                                        |
 +----+\/+ +-+\/+--+ +\/+----+                                 |
 |  RC B | | ROA A | |  RC C |         +-----------------+     |
 |       | |       | |       |         |        PP       |     |
 |  SIA  | |       | |  SIA--+-------->|       RC D      |-----|             
 +----|--+ +-------+ +-------+         +-----------------+     | 
    | |                  |                                     |
    | |                  |             +-----------------+     |
    | +------------------|------------>|        PP       |     |      
    |                    |             |       ROA B     |-----|
 +-+\/+--+           +-+\/+--+         +-----------------+     | 
 | ROA B |           |  RC D |         +-----------------+     | 
 |       |           |       |         |        PP       |     |    
 |       |           |  SIA--+-------->|       ....      |-----+
 +-------+           +-------+         +-----------------+     |   
                                                       +-----+\/+-+
                                                       |    RP    |
                                                       +----------+
]]></artwork>
      </figure>
      <t>With the increasing deployment of RPKI, in January 2026, ROAs cover 56% of active IPv4 prefixes and 58% of active IPv6 prefixes. Meanwhile, the number of independent repository instances has grown to 60. This document presents a measurement-based analysis of the reliability and scalability of the current RPKI repository architecture. Our study includes a large-scale survey of AS administrators from 2,500 randomly selected ROA-enabled ASes, along with an empirical assessment of repository deployment and operational status. The results indicate that the current architecture lacks the capability to provide reliable and resilient data access to RPs. Specifically, the RPKI system mandates that RPKI objects issued by a Certification Authority (CA) must be hosted at the PP operated by the same CA. As a result, any failure or unavailability of a PP can prevent RPs from accessing complete and up-to-date RPKI data. As delegated RPKI becomes more widespread, an increasing number of CAs are operating their own repository instances. However, many of these instances lack secure, highly available infrastructure, further impacting system reliability. In addition, the growing number of repository instances poses scalability and efficiency challenges: RPs are required to proactively traverse all known PPs and retrieve RPKI data in order to maintain and refresh their local caches.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>It is assumed that the reader is familiar with the terms and concepts described in "A Profile for Resource Certificate Repository Structure" <xref target="RFC6481"/>, "The RPKI Repository Delta Protocol (RRDP)" <xref target="RFC8182"/>, and "An Infrastructure to Support Secure Internet Routing" <xref target="RFC6480"/>.</t>
      </section>
    </section>
    <section anchor="scalability-and-efficient-analysis">
      <name>Scalability and Efficient Analysis</name>
      <t>In current RPKI infrastructure, refreshing the local cache of each RP involves traversing all repositories to fetch the updated RPKI objects. However, RPKI Repository has grown from 5 repositories run by five RIRs to more than 60 repositories and is expected to increase dramatically with the further deployment of ROA.</t>
      <t>On the one hand, with a deeper understanding of RPKI, ROA deployers prefer to adopt delegated RPKI to flexibly control their RPKI objects. In the survey, 45.3% of the AS administrators using hosted RPKI say they have plans to run their own repositories for flexible certificate signing and control. The result shows that delegated RPKI will emerge as a trend, and the number of independent repositories will inevitably increase. The work <xref target="beyond-limits"/> predicts that when ROA is fully deployed, the number of repositories will reach 10K and there will be 140K active RPs, the RPKI snapshot download would easily exceed 1 hour (on the premise that each repository is well accessible). Since RPs are required to check the updates of all repositories when refreshing their local caches, the increasing number of repositories will result in higher refresh costs. It may prevent RPs from obtaining routing information in a timely manner, and also prohibits the release of use cases such as temporary ROAs to enable ISPs to perform tactical traffic engineering to ease congestion.</t>
      <t>On the other hand, RPKI Repository is designed without a strict admission mechanism, allowing entities to apply for RC from RIRs or other RPKI CA entities, register as delegated CAs, and then operate repositories with a small fee and identity verification. Therefore, some repositories for unwanted purposes (measurement, attack experiments, etc.) are gradually emerging. Furthermore, the low barriers to running repositories and joining RPKI Repository will introduce unforeseen risks to RPs. For example, a malicious CA can create a large number of descendant RCs and operate numerous repositories to make RPs endlessly retrieve repositories, thus exhausting and paralyzing RPs. Although the most popular RP software, Routinator <xref target="routinator"/>, has set the default value for the maximum searchable RPKI-tree depth to 32 in its latest version 0.14.1, and the RPKI-client has set the default value to 12, neither has provided a value for RPKI-tree width (as it is difficult to set a reasonable threshold). Similarly, it is also challenging for RP softwares to clearly limit the maximum number of accessible repositories. In addition, a series of recent academic works have emerged that exploit repository vulnerabilities to cause repository downtime, thereby preventing it from providing normal services to RPs <xref target="behind-the-scenes"/>. There are also works <xref target="beyond-limits"/><xref target="stalloris"/> that manipulate malicious repositories to attack RPs, thus obstructing the synchronization of RPKI data.</t>
      <t>In addition, with the increasing rate of ROV deployment, more and more RPs will connect to RPKI Repository. It will undoubtedly increase the burden on the repositories. In summary, as RPKI deployment progresses further, RPs will need to access more repositories, and repositories will need to serve more RPs. This increase in the number of bidirectional connections and pull-based data synchronization mode will threaten the scalability and efficiency of the RPKI system.</t>
    </section>
    <section anchor="reliability-analysis">
      <name>Reliability Analysis</name>
      <t>Although the current RPKI Repository is globally distributed, each CA only stores the RPKI objects it issues in the unique PP it runs. If any PP fails (malfunctions or is attacked), RPs will not be able to fetch the RPKI objects issued by its CA, and the integrity of the global RPKI object view cannot be guaranteed.</t>
      <t>As of January, 2026, there are 52,803 RCs and 381,361 ROAs in RPKI Repository. For each RC, we extracts the SIA field that records the URI of its HTTPS-based RRDP file (Since all PPs now support RRDP and serve RPs through RRDP files, the analysis of the RPKI Repository focuses primarily on RRDP Repository). The result shows that there are currently 60 independent repository instances (SIA fields of RCs held by the same entity may share the same PP, therefore, the number of repositories is much lower than that of RCs).</t>
      <t>Next, the measurement focuses on the ASes where the repositories are located, their IP addresses, and whether they utilize CDNs. We uses 2,000 globally distributed DNS resolvers to resolve repositories' domain names, with the aim of finding the CNAME and all IP address records for each repository. Then, we use the IP-to-AS mapping information maintained by RIPE NCC <xref target="routing-history"/> to obtain the AS where each PP is located.</t>
      <t>Typically, CDN service providers will display their information in the domain name and CNAME record, such as including "cdn.cloudflare.net" or specify the CDN in the X-Via-CDN field, cache status field, or Server field in the HTTPS headers. In addition, if CDN acceleration is used, the latency of requesting HTTPS services from different geographic locations around the world will be relatively low. Therefore, it can determine whether the PP services are hosted on CDNs from the following aspects: (1) Whether the domain name and CNAME record contain information about CDN service providers; (2) The number of IP addresses returned by DNS resolvers and the geographical distribution of these IP addresses; (3) Whether the HTTPS request headers contain information about mainstream CDN providers; (4) The latency of accessing RRDP files from different geographic locations around the world.</t>
      <t>Measurement results show that although RRDP enables the use of Content Distribution Networks (CDNs) infrastructure for resilient service, only 10 out of 60 repositories are hosted in CDNs, with 8 being hosted on Cloudflare AS13335, 1 on Amazon AS16509 and 1 on Akamai 20940. It also shows that out of 60 repositories, 57 of them are hosted in a single AS. It means that the accessibility of these repositories is highly dependent on the reachability of a single AS. Worse still, among the repositories whose corresponding ASes have deployed ROAs, there are 14 of them carry the ROA of the ASes in which they are located. It means that once the repository goes down and the RPs cannot fetch its ROAs, the route of the AS that the repository locates in may be downgraded by ROV adopters. Then, even if the repository is restored, those ROV adopters still cannot access the repository, in which case the access of the repository depends on the reachability of the AS it locates in, while the reachability of the AS also depends on the access of the repository.</t>
      <t>Real-world incidents of repository breakdowns do occur at times. On 6 April 2020, the repository maintained by RIPE NCC suffered a sudden increase in connection to service <xref target="RIPE-downtime"/>, resulting in it appearing as down to many RPs for 7 hours (RIPE's services are already hosted on CDNs). On 15 May 2020, the Japan operated repository was out of service for 10 hours due to hardware failure <xref target="service-outage"/>, and between 26 Jan 2022 and 2 Feb 2022, due to full disk space, all ROAs in its repository again became invalid <xref target="disk-outage"/>. During 10 July 2024 to 12 July 2024, we also found that RPKI data synchronized through Routinator <xref target="routinator"/> once again had missing parts from RIPE NCC.</t>
    </section>
    <section anchor="summary-problems-of-the-current-rpki-repository">
      <name>Summary: Problems of the current RPKI Repository</name>
      <t>Based on the measurement and analysis described in the previous section, this section summarizes the main problems of the current RPKI Repository.</t>
      <section anchor="p1-rpki-repository-is-costly-in-rp-refreshing">
        <name>P1: RPKI Repository is costly in RP refreshing.</name>
        <t>Refreshing the local cache of each RP involves traversing all repositories to fetch the updated RPKI objects. However, the binding of the repository PP to the CA causes the number of repository instances to increase dramatically with the further deployment of ROA (as the number of CAs that hold RCs increase). Furthermore, as AS administrators gain a deeper understanding of RPKI technology, delegated RPKI has emerged as a trend, CAs are more willing to maintain the repository PP themselves to achieve more flexible certificate signing and management. The growth in the number of repository instances increases the cost of RP refreshes, the growth in the number of RPs brings burdens to repositories, and both will threaten the scalability of RPKI.</t>
      </section>
      <section anchor="p2-every-rpki-object-is-a-singleton-in-rpki-repository">
        <name>P2: Every RPKI object is a singleton in RPKI Repository.</name>
        <t>Although the current RPKI Repository is globally distributed, RPKI does not provide distributed storage for RPKI objects. The binding of PP and CA causes each RPKI objects to be stored only in the PP run by the CA that issued the object, instead of being stored in multiple repository nodes. Therefore, the current RPKI Repository cannot guarantee that RP can obtain complete RPKI data when some repository nodes fail. Even worse, the singleton nature of RPKI objects also introduces unwanted interdependence between the accessibility of a CA's PP and the reachability of the AS that the PP locates. Since RPKI ensures the routing security and reachability of ASes, it is fair to expect PPs to remain accessible during any incident when corresponding ASes become unreachable.</t>
      </section>
    </section>
    <section anchor="new-requirements-for-rpki-repository">
      <name>New Requirements for RPKI Repository</name>
      <t>The following requirements are identified for a reliable, scalable and secure RPKI Repository architecture.</t>
      <section anchor="requirement-1-push-based-data-synchronization-mode">
        <name>Requirement 1: Push-based Data Synchronization Mode</name>
        <t>A push-based data synchronization mode is needed for RPKI Repository to efficiently serve tens of thousands of RPs in a timely and scalable manner.</t>
        <t>In the current pull-based model, RPs periodically fetch RPKI data from all repository PPs, which introduces unnecessary overhead and synchronization delays. In contrast, push-based synchronization allows repository nodes or intermediate proxies to proactively send updated RPKI objects to RPs once new data becomes available. This significantly reduces the synchronization interval, avoids redundant polling connections, and ensures that routing infrastructure can respond to critical changes (e.g., ROA issuance or revocation) with minimal delay. Moreover, timely RPKI update delivery is essential for ensuring routing correctness and enabling responsive policy enforcement, such as temporary ROA deployment for traffic engineering or emergency response. When RPs depend solely on periodic polling, such timely updates cannot be guaranteed, potentially leading to stale routing decisions. Therefore, adopting a push-based model helps decouple update propagation from RP polling schedules, enabling RPKI to better support high-speed and dynamic inter-domain routing environments.</t>
      </section>
      <section anchor="requirement-2-truly-distributed-storage">
        <name>Requirement 2: Truly Distributed Storage</name>
        <t>A truly distributed storage model is needed for RPKI Repository to provide reliable services for tens of thousands of RPs.</t>
        <t>It means that Resource Certificate (RC) and ROAs are no longer only stored at the repository operated by the CA that issued them, but can be stored at multiple RPKI Repository nodes (PP or other names). The truly distributed storage architecture breaks the singleton nature of RPKI objects. It ensures that any single point of failure in the RPKI Repository nodes will not affect the integrity of RPKI snapshot retrieval by RPs. Additionally, since RPKI Repository nodes are located in different ASes and a single RPKI object can be stored on multiple nodes, the unwanted interdependence between the accessibility of a PP's objects and the reachability of the PP's AS will be broken. Since RPKI ensures the routing security and reachability of ASes, it is fair to expect RPKI objects to remain accessible during any incident when the Repository node or its corresponding AS become unreachable.</t>
      </section>
      <section anchor="requirement-3-admission-mechanism">
        <name>Requirement 3: Admission Mechanism</name>
        <t>An admission mechanism is needed to effectively limit the unconstrained expansion of RPKI repository instances and enhance the scalability of RPKI infrastructure.</t>
        <t>As AS administrators gain a deeper understanding of RPKI technology, delegated RPKI has emerged as a trend, the number of repository instances has grown more than 12 times in the past five years. The rapid growth in the number of repositories increases the cost of RP refreshes and threatens the scalability of RPKI. Furthermore, since each repositories connects to all RPs in the world, the low barriers to running repositories and joining RPKI Repository will introduce unforeseen risks to RPs because some repositories may emerge with unexpected intentions. Regardless, RPs should ensure they establish connections with trusted and reliable nodes. Therefore, a secure and scalable RPKI Repository needs an admission mechanism to raise the threshold for operating repository nodes. For example, the addition of a new repository node should be reviewed by existing node members or other trusted entities. The review can include verifying node's real identity, the reputation of the node operator, and whether it can provide a robust, secure, and reliable service to RPs, among other factors.</t>
        <t>To implement an admission mechanism, it may be necessary to first implement "Decoupled from RPKI Authorities", because once repository nodes are bound to CAs, each CA has the right or need to operate its own repository.</t>
      </section>
      <section anchor="requirement-4-be-compatible-with-current-rpki">
        <name>Requirement 4: Be Compatible with Current RPKI</name>
        <t>Since the current RPKI is mature and widely deployed, the new RPKI Repository should not modify the RPKI hierarchical certificate issuance architecture and should not affect the existing RPKI certificate validation or the ROV process. It also should be compatible with current RPKI Repository architecture and supports incremental deployment.</t>
      </section>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>This section will outline the ethical considerations regarding the RPKI Repository measurement and the worldwide survey. First, we strictly limited the rate and number of DNS resolving packets (sending 130,000 packets over 24 hours) to avoid causing much burden on the Internet. For IP-to-AS mapping, we used open-source data provided by RIPE NCC. We conducted access experiments on the RPKI Repository from six globally distributed probes (India, Dubai, Silicon Valley, Frankfurt, Beijing, and São Paulo), with each RPKI repository being accessed fewer than 10 times to avoid DDoS attacks on the repositories. For the survey, we obtained the contact information of AS administrators from open-source WHOIS mailing lists and provided an option for administrators to opt out of the survey. We did not disclose any additional information about the participating administrators or their feedback and ensured that their responses would be used solely for research.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="routing-history" target="https://stat.ripe.net/docs/02.data-api/routing-history.html">
          <front>
            <title>routing history</title>
            <author>
              <organization>RIPE NCC</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="service-outage" target="https://www.nic.ad.jp/en/topics/2020/20200521-01.html">
          <front>
            <title>Service outage Roaweb and rpki repository (resolved)</title>
            <author>
              <organization>JAPNIC</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="disk-outage" target="https://www.nic.ad.jp/en/topics/2022/20220202-01.html">
          <front>
            <title>Service outage Disk full caused lost roa validity</title>
            <author>
              <organization>JAPNIC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="routinator" target="https://github.com/NLnetLabs/routinator">
          <front>
            <title>Routinator</title>
            <author>
              <organization>NLnet Labs</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="beyond-limits" target="https://dl.acm.org/doi/abs/10.1145/3603269.3604861">
          <front>
            <title>Beyond Limits How to Disable Validators in Secure Networks</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="stalloris" target="https://www.usenix.org/system/files/sec22fall_hlavacek.pdf">
          <front>
            <title>Stalloris RPKI Downgrade Attack</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="behind-the-scenes" target="https://dl.acm.org/doi/pdf/10.1145/3548606.3560645">
          <front>
            <title>Behind the Scenes of RPKI</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="RIPE-downtime" target="https://www.ripe.net/ support/service-announcements/rsync-rpki-repository-downtime">
          <front>
            <title>Rsync rpki repository</title>
            <author>
              <organization>RIPE NCC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
