[Sidrops] Re: WG Action: Rechartered SIDR Operations (sidrops)
Russ Housley <housley@vigilsec.com> Thu, 08 January 2026 17:30 UTC
Return-Path: <housley@vigilsec.com>
X-Original-To: sidrops@mail2.ietf.org
Delivered-To: sidrops@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id F3AFDA4E52F7 for <sidrops@mail2.ietf.org>; Thu, 8 Jan 2026 09:30:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.799
X-Spam-Level:
X-Spam-Status: No, score=-2.799 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=vigilsec.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vxJWsmbD_nQZ for <sidrops@mail2.ietf.org>; Thu, 8 Jan 2026 09:30:28 -0800 (PST)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 6F2C1A4E52F2 for <sidrops@ietf.org>; Thu, 8 Jan 2026 09:30:28 -0800 (PST)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id 563111A2DB3 for <sidrops@ietf.org>; Thu, 8 Jan 2026 12:30:28 -0500 (EST)
Received: from smtpclient.apple (pool-96-255-71-95.washdc.fios.verizon.net [96.255.71.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id 48EA31A2E54 for <sidrops@ietf.org>; Thu, 8 Jan 2026 12:30:28 -0500 (EST)
From: Russ Housley <housley@vigilsec.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3826.700.81\))
Date: Thu, 08 Jan 2026 12:30:18 -0500
References: <176789295482.4047702.15942476514132730923@dt-datatracker-5656579b89-p6k4r>
To: IETF SIDRops <sidrops@ietf.org>
In-Reply-To: <176789295482.4047702.15942476514132730923@dt-datatracker-5656579b89-p6k4r>
Message-Id: <531AE145-7578-4CC2-8FE6-5853962DB635@vigilsec.com>
X-Mailer: Apple Mail (2.3826.700.81)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vigilsec.com; h=from:content-type:content-transfer-encoding:mime-version:subject:date:references:to:in-reply-to:message-id; s=pair-202402141609; bh=o2GC+qgju8yp91qmT8pOxoAipfw1NsklMGHYlQDOZWs=; b=vBoyEqDC9BwaXm6x7g4NaNQPUAWjGrYMbgZ9WWxzr54laUk6ASv4vLiH2iKBokqrMfAMZXM8O77GIZjdRPkEa4DfBJ9D8BQ2TNC7iwWxL+1q9ppFxeFDIoAPeLTby3SFDWJHsPztntQu5jEwfDYKMhosVWn0iI41+tm+dH8Rl51pqDkRbi56BaRtmUVZMwH2/jtPXxFjKauIx5j7KQmrTi9MGJChW8KAr/zIQTPOr8xBgV2X/cw6mmRylfb/A/ADm+YRyq+zrbxt+3/z/aq2sh+mRF5H4OpKtVHDYxAgxynk/Fe5QshjcX0TZi/siOxgAUmo0ReEb3VdlEZy6meyvQ==
X-Scanned-By: mailmunge 3.09
Message-ID-Hash: TA4JHPDLKLRB5BRVU3A4SI4BGEZIRSBY
X-Message-ID-Hash: TA4JHPDLKLRB5BRVU3A4SI4BGEZIRSBY
X-MailFrom: housley@vigilsec.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-sidrops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Sidrops] Re: WG Action: Rechartered SIDR Operations (sidrops)
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/hzfKLJ8hYQ5owp87mPvyZq1dIas>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Owner: <mailto:sidrops-owner@ietf.org>
List-Post: <mailto:sidrops@ietf.org>
List-Subscribe: <mailto:sidrops-join@ietf.org>
List-Unsubscribe: <mailto:sidrops-leave@ietf.org>
Thanks to everyone that assisted in the creations an d approval of the new charter. Russ > On Jan 8, 2026, at 12:22 PM, The IESG <iesg-secretary@ietf.org> wrote: > > The SIDR Operations (sidrops) WG in the Operations and Management Area of the > IETF has been rechartered. For additional information, please contact the > Area Directors or the WG Chairs. > > SIDR Operations (sidrops) > ----------------------------------------------------------------------- > Current status: Active WG > > Chairs: > Russ Housley <housley@vigilsec.com> > Luigi Iannone <ggx@gigix.net> > > Secretaries: > Krishnaswamy Ananthamurthy <kriswamy@cisco.com> > > Assigned Area Director: > Mohamed Boucadair <mohamed.boucadair@orange.com> > > Operations and Management Area Directors: > Mahesh Jethanandani <mjethanandani@gmail.com> > Mohamed Boucadair <mohamed.boucadair@orange.com> > > Technical advisors: > Keyur Patel <keyur@arrcus.com> > Chris Morrow <christopher.morrow@gmail.com> > > Mailing list: > Address: sidrops@ietf.org > To subscribe: https://www.ietf.org/mailman/listinfo/sidrops > Archive: https://mailarchive.ietf.org/arch/browse/sidrops/ > > Group page: https://datatracker.ietf.org/group/sidrops/ > > Charter: https://datatracker.ietf.org/doc/charter-ietf-sidrops/ > > The global deployment of Secure Inter-Domain Routing (SIDR), consisting of > Resource Public Key Infrastructure (RPKI), Origin Validation of BGP > announcements, and BGPsec (RFC 8205), is still underway, creating an Internet > Routing System consisting of SIDR-aware and non-SIDR-aware networks. This > deployment must be properly handled to avoid the division of the Internet > into separate networks. SIDR Operations Working Group (SIDROPS WG) is > responsible for continuing the development of SIDR technology, encouraging > its deployment, while ensuring as secure of a global routing system as > possible, during the transition. Specifically, SIDROPS is responsible for the > maintenance of all SIDR components, except BGPsec. > > The SIDROPS WG is focused on deployment and operational issues, their > mitigations, and experiences with SIDR technologies that are part of the > global routing system, as well as the RPKI repositories and RPKI > Certification Authority (CA) systems that form part of the SIDR architecture. > > SIDROPS will solicit input from a variety of contributors, including but not > limited to, CA Operators, Regional/National and Local Internet Registries, > Relying Party software developers, researchers, participants of the > measurements community, and network operators. > > The goals of SIDROPS WG are: > > * Maintain RPKI technology stack. > > * Maintain RPKI-Router protocol, including specifying extensions, updates, > and new protocol versions. > > * Identify operational issues with a SIDR-aware Internet and with interaction > with the non-SIDR-aware Internet. > > * Develop solutions for identified issues. This includes in particular: > > + Developing guidelines for the operation of SIDR-aware networks and > providing operational guidance on how to deploy and operate SIDR > technologies in existing and new networks (Informational/BCP). > > + Standardizing protocols and protocol extensions to improve operational > efficiency and security of SIDR such as Autonomous System Provider > Authorization (ASPA) and reliable cache synchronization mechanisms. > > * Standardize manageability (e.g., YANG data models) and OAM solutions > related to SIDR operations. > > * Document common SIDROPS terminology as Informational RFC. > > Given the importance of routing security to the overall stability of the > Internet, the WG will not submit protocol specifications for publication to > the IESG before demonstrating at least two interoperable implementations. See > RFC 5657 (part of BCP 9) for guidance on what implementation reports should > contain and BCP 205 for guidance on how to raise awareness of running code. > > BGPsec maintenance, extensions, and updates belong to IDR WG. SIDROPS may > provide input to IDR, as needed, and will cooperate with that WG in reviewing > solutions to BGPsec operational and deployment problems. Documenting the > operational aspects of securing the Internet routing system other than SIDR > belongs to GROW WG. > > Gaps in other protocols which impact SIDR operation are the responsibility of > the WGs that own those protocols. > > Milestones: > > Mar 2026 - Submit draft-ietf-sidrops-8210bis to the IESG for publication > > Mar 2026 - Submit draft-ietf-sidrops-aspa-profile to the IESG for > publication > > Mar 2026 - Submit draft-ietf-sidrops-aspa-verification to the IESG for > publication > > Jul 2026 - Submit draft-ietf-sidrops-aspa-notation to the IESG for > publication > > Jul 2026 - Submit draft-ietf-sidrops-aspa-slurm to the IESG for publication > > >