[Sidrops] RPKI protocol development (was: Re: Update on Re-chartering)

Nick Hilliard <nick@foobar.org> Sat, 18 October 2025 20:17 UTC

Return-Path: <nick@foobar.org>
X-Original-To: sidrops@mail2.ietf.org
Delivered-To: sidrops@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id C87BB76A7A30; Sat, 18 Oct 2025 13:17:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.198
X-Spam-Level:
X-Spam-Status: No, score=-4.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kvQaPosn9qaA; Sat, 18 Oct 2025 13:17:25 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [46.182.8.5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id ED1DF76A7A25; Sat, 18 Oct 2025 13:17:24 -0700 (PDT)
Received: from crumpet.local (vpn.ibn.ie [46.182.8.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.netability.ie (Postfix) with ESMTPSA id 1090D9CE7C; Sat, 18 Oct 2025 21:17:13 +0100 (IST)
To: mohamed.boucadair@orange.com
From: Nick Hilliard <nick@foobar.org>
Message-ID: <d2fc0eec-6873-1649-d875-34808691a9c7@foobar.org>
Date: Sat, 18 Oct 2025 21:17:10 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 26.0; rv:52.0) Gecko/20100101 PostboxApp/7.0.65
MIME-Version: 1.0
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Message-ID-Hash: 4P6TZVJJTPR2SLZVWDLSCLOIUCF66WS2
X-Message-ID-Hash: 4P6TZVJJTPR2SLZVWDLSCLOIUCF66WS2
X-MailFrom: nick@foobar.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-sidrops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: IETF SIDRops <sidrops@ietf.org>, SIDROps Chairs <sidrops-chairs@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Sidrops] RPKI protocol development (was: Re: Update on Re-chartering)
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/G_ZByJKYkX-KMVxD1dfGPJpItIQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Owner: <mailto:sidrops-owner@ietf.org>
List-Post: <mailto:sidrops@ietf.org>
List-Subscribe: <mailto:sidrops-join@ietf.org>
List-Unsubscribe: <mailto:sidrops-leave@ietf.org>

mohamed.boucadair@orange.com wrote on 17/10/2025 13:45:
> The two-step approach was initially meant to unlock quickly 
> draft-ietf-sidrops-manifest-numbers. However, given that it seems that 
> the authors of that draft are not in rush, the discussion around exact 
> language for adding implementation requirement into the charter, and 
> some charter item proposal (e.g., from Chongfeng), I have withdrawn the 
> recharter from the last week IESG telechat so that we go straight with 
> more changes to the charter.


Hi Med, Chairs,

We have a number of serious real world operational problems with the 
RPKI at moment and speaking with my DFZ operator hat on, there is 
urgency about the status of some of the protocol documents which are 
currently in the sidrops pipeline.

The first problem relates to ASPA. This is the first inter-domain AS 
path filtering policy mechanism that looks like it's going to fit the 
sweet spot of 1. providing enough functionality to be useful, 2. 
straightforward to configure and 3. scalable and automable. 
Operationally we urgently need a functional AS path filtering policy 
mechanism because the tools we have at the moment don't work properly, 
which is one of the reasons that we're continually seeing inadvertent 
routing leaks on the internet. For the few organisations who do 
non-trivial as-path filtering, we're still stuck in the dark ages of 
configuration blobs pulled from IRR databases and local sources, and 
this mechanism doesn't work for most organisations due to implementation 
complexity, reliability and overhead.

The second problem relates to RPKI Repository cache synchronisation. In 
the real world, we are continually seeing both RIR and NIR (national 
internet registry) RPKI Repositories going off-line. To clarify, entire 
regional chunks of the RPKI routinely become unavailable. Operationally, 
this isn't ok.

This is understood to be largely a consequence of the inefficiency of 
rsync and rrdp causing the repositories to become overloaded with cache 
sync requests and falling over due to resource exhaustion. This is 
directly impacting both the perceived and operational reliability of the 
RPKI. Operationally, we need a cache synchronisation protocol which is 
significantly more efficient than either rsync or rrdp. If the 
preliminary figures about its efficiency are in any way accurate, the 
Erik protocol shows significant algorithmic performance gain over both 
rsync and rrdp.

The third problem relates to protocol specification maturity. RPKI 
affects real world routing decisions right at the bottom of the global 
routing stack. It's been a nuisance that this has caused problems for 
the sidrops wg at the IETF, but more importantly we've run into problems 
in the real world due to specification problems in rfc8210. We're too 
far down the routing stack to have the luxury of shipping RFCs which 
risk having interoperability problems. This ask has been requested 
repeatedly over the last couple of years.

Can we please prioritise modification of the WG charter to include 
protocol development, or implement an appropriate alternative, e.g. a 
new WG aimed at protocol maintenance / development ("sidrmaint"?), so that:

1. rfc8210bis, aspa-profile and aspa-verification can be wglc'd, 
including a mandate for interoperability reports
2. rpki-erik-protocol can be adopted so that we can work on fixes for 
the current operational problems affecting the major RPKI Repositories.

Nick