[Sidrops] RPKI protocol development (was: Re: Update on Re-chartering)
Nick Hilliard <nick@foobar.org> Sat, 18 October 2025 20:17 UTC
Return-Path: <nick@foobar.org>
X-Original-To: sidrops@mail2.ietf.org
Delivered-To: sidrops@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id C87BB76A7A30; Sat, 18 Oct 2025 13:17:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.198
X-Spam-Level:
X-Spam-Status: No, score=-4.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kvQaPosn9qaA; Sat, 18 Oct 2025 13:17:25 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [46.182.8.5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id ED1DF76A7A25; Sat, 18 Oct 2025 13:17:24 -0700 (PDT)
Received: from crumpet.local (vpn.ibn.ie [46.182.8.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.netability.ie (Postfix) with ESMTPSA id 1090D9CE7C; Sat, 18 Oct 2025 21:17:13 +0100 (IST)
To: mohamed.boucadair@orange.com
From: Nick Hilliard <nick@foobar.org>
Message-ID: <d2fc0eec-6873-1649-d875-34808691a9c7@foobar.org>
Date: Sat, 18 Oct 2025 21:17:10 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 26.0; rv:52.0) Gecko/20100101 PostboxApp/7.0.65
MIME-Version: 1.0
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Message-ID-Hash: 4P6TZVJJTPR2SLZVWDLSCLOIUCF66WS2
X-Message-ID-Hash: 4P6TZVJJTPR2SLZVWDLSCLOIUCF66WS2
X-MailFrom: nick@foobar.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-sidrops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: IETF SIDRops <sidrops@ietf.org>, SIDROps Chairs <sidrops-chairs@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Sidrops] RPKI protocol development (was: Re: Update on Re-chartering)
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/G_ZByJKYkX-KMVxD1dfGPJpItIQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Owner: <mailto:sidrops-owner@ietf.org>
List-Post: <mailto:sidrops@ietf.org>
List-Subscribe: <mailto:sidrops-join@ietf.org>
List-Unsubscribe: <mailto:sidrops-leave@ietf.org>
mohamed.boucadair@orange.com wrote on 17/10/2025 13:45: > The two-step approach was initially meant to unlock quickly > draft-ietf-sidrops-manifest-numbers. However, given that it seems that > the authors of that draft are not in rush, the discussion around exact > language for adding implementation requirement into the charter, and > some charter item proposal (e.g., from Chongfeng), I have withdrawn the > recharter from the last week IESG telechat so that we go straight with > more changes to the charter. Hi Med, Chairs, We have a number of serious real world operational problems with the RPKI at moment and speaking with my DFZ operator hat on, there is urgency about the status of some of the protocol documents which are currently in the sidrops pipeline. The first problem relates to ASPA. This is the first inter-domain AS path filtering policy mechanism that looks like it's going to fit the sweet spot of 1. providing enough functionality to be useful, 2. straightforward to configure and 3. scalable and automable. Operationally we urgently need a functional AS path filtering policy mechanism because the tools we have at the moment don't work properly, which is one of the reasons that we're continually seeing inadvertent routing leaks on the internet. For the few organisations who do non-trivial as-path filtering, we're still stuck in the dark ages of configuration blobs pulled from IRR databases and local sources, and this mechanism doesn't work for most organisations due to implementation complexity, reliability and overhead. The second problem relates to RPKI Repository cache synchronisation. In the real world, we are continually seeing both RIR and NIR (national internet registry) RPKI Repositories going off-line. To clarify, entire regional chunks of the RPKI routinely become unavailable. Operationally, this isn't ok. This is understood to be largely a consequence of the inefficiency of rsync and rrdp causing the repositories to become overloaded with cache sync requests and falling over due to resource exhaustion. This is directly impacting both the perceived and operational reliability of the RPKI. Operationally, we need a cache synchronisation protocol which is significantly more efficient than either rsync or rrdp. If the preliminary figures about its efficiency are in any way accurate, the Erik protocol shows significant algorithmic performance gain over both rsync and rrdp. The third problem relates to protocol specification maturity. RPKI affects real world routing decisions right at the bottom of the global routing stack. It's been a nuisance that this has caused problems for the sidrops wg at the IETF, but more importantly we've run into problems in the real world due to specification problems in rfc8210. We're too far down the routing stack to have the luxury of shipping RFCs which risk having interoperability problems. This ask has been requested repeatedly over the last couple of years. Can we please prioritise modification of the WG charter to include protocol development, or implement an appropriate alternative, e.g. a new WG aimed at protocol maintenance / development ("sidrmaint"?), so that: 1. rfc8210bis, aspa-profile and aspa-verification can be wglc'd, including a mandate for interoperability reports 2. rpki-erik-protocol can be adopted so that we can work on fixes for the current operational problems affecting the major RPKI Repositories. Nick
- [Sidrops] RPKI protocol development (was: Re: Upd… Nick Hilliard