Document Action: 'An Infrastructure to Support Secure Internet Routing' to Informational RFC (draft-ietf-sidr-arch-13.txt)

The IESG <> Tue, 31 May 2011 16:07 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id EEED9E07DC; Tue, 31 May 2011 09:07:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id HBSvk6vQb+cU; Tue, 31 May 2011 09:07:38 -0700 (PDT)
Received: from (localhost []) by (Postfix) with ESMTP id 2C7A7E08A1; Tue, 31 May 2011 09:07:34 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: IETF-Announce <>
Subject: Document Action: 'An Infrastructure to Support Secure Internet Routing' to Informational RFC (draft-ietf-sidr-arch-13.txt)
X-Test-IDTracker: no
X-IETF-IDTracker: 3.55
Message-ID: <>
Date: Tue, 31 May 2011 09:07:34 -0700
Cc: sidr mailing list <>, sidr chair <>, RFC Editor <>
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 31 May 2011 16:07:43 -0000

The IESG has approved the following document:
- 'An Infrastructure to Support Secure Internet Routing'
  (draft-ietf-sidr-arch-13.txt) as an Informational RFC

This document is the product of the Secure Inter-Domain Routing Working

The IESG contact persons are Stewart Bryant and Adrian Farrel.

A URL of this Internet Draft is:

Technical Summary

This document describes an architecture for an infrastructure to
support improved security of Internet routing. The foundation of this
architecture is a public key infrastructure (PKI) that represents the
allocation hierarchy of IP address space and Autonomous System (AS)
Numbers; and a distributed repository system for storing and
disseminating the data objects that comprise the PKI, as well as
other signed objects necessary for improved routing security. As an
initial application of this architecture, the document describes how
a legitimate holder of IP address space can explicitly and verifiably
authorize one or more ASes to originate routes to that address space.
Such verifiable authorizations could be used, for example, to more
securely construct BGP route filters. 

Working Group Summary

This draft's first version came early in the working group history.
It has been presented many times and has gone through many versions
but the outline remains essentially the same, indicating consistency
in the working group thinking.  

Document Quality

The document is well written and clear. It does not describe a protocol,
so there are no "implementations" per se. However, it serves as the
reference point for the other working group drafts, so the authors of
this draft and the authors of the other drafts have worked to ensure
that they remain mutually consistent.

Several implementations exist of the PKI expressed in this architecture.
Implementation experience has been reflected in changes in the


Sandra Murphy is the Document Shepherd for this document.
Stewart Bryant is the Responsible Area Director.