[Sidrops] Re: WG Action: Rechartered SIDR Operations (sidrops)

Russ Housley <housley@vigilsec.com> Thu, 08 January 2026 17:30 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: sidrops@mail2.ietf.org
Delivered-To: sidrops@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id F3AFDA4E52F7 for <sidrops@mail2.ietf.org>; Thu, 8 Jan 2026 09:30:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.799
X-Spam-Level:
X-Spam-Status: No, score=-2.799 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=vigilsec.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vxJWsmbD_nQZ for <sidrops@mail2.ietf.org>; Thu, 8 Jan 2026 09:30:28 -0800 (PST)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 6F2C1A4E52F2 for <sidrops@ietf.org>; Thu, 8 Jan 2026 09:30:28 -0800 (PST)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id 563111A2DB3 for <sidrops@ietf.org>; Thu, 8 Jan 2026 12:30:28 -0500 (EST)
Received: from smtpclient.apple (pool-96-255-71-95.washdc.fios.verizon.net [96.255.71.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id 48EA31A2E54 for <sidrops@ietf.org>; Thu, 8 Jan 2026 12:30:28 -0500 (EST)
From: Russ Housley <housley@vigilsec.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3826.700.81\))
Date: Thu, 08 Jan 2026 12:30:18 -0500
References: <176789295482.4047702.15942476514132730923@dt-datatracker-5656579b89-p6k4r>
To: IETF SIDRops <sidrops@ietf.org>
In-Reply-To: <176789295482.4047702.15942476514132730923@dt-datatracker-5656579b89-p6k4r>
Message-Id: <531AE145-7578-4CC2-8FE6-5853962DB635@vigilsec.com>
X-Mailer: Apple Mail (2.3826.700.81)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vigilsec.com; h=from:content-type:content-transfer-encoding:mime-version:subject:date:references:to:in-reply-to:message-id; s=pair-202402141609; bh=o2GC+qgju8yp91qmT8pOxoAipfw1NsklMGHYlQDOZWs=; b=vBoyEqDC9BwaXm6x7g4NaNQPUAWjGrYMbgZ9WWxzr54laUk6ASv4vLiH2iKBokqrMfAMZXM8O77GIZjdRPkEa4DfBJ9D8BQ2TNC7iwWxL+1q9ppFxeFDIoAPeLTby3SFDWJHsPztntQu5jEwfDYKMhosVWn0iI41+tm+dH8Rl51pqDkRbi56BaRtmUVZMwH2/jtPXxFjKauIx5j7KQmrTi9MGJChW8KAr/zIQTPOr8xBgV2X/cw6mmRylfb/A/ADm+YRyq+zrbxt+3/z/aq2sh+mRF5H4OpKtVHDYxAgxynk/Fe5QshjcX0TZi/siOxgAUmo0ReEb3VdlEZy6meyvQ==
X-Scanned-By: mailmunge 3.09
Message-ID-Hash: TA4JHPDLKLRB5BRVU3A4SI4BGEZIRSBY
X-Message-ID-Hash: TA4JHPDLKLRB5BRVU3A4SI4BGEZIRSBY
X-MailFrom: housley@vigilsec.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-sidrops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Sidrops] Re: WG Action: Rechartered SIDR Operations (sidrops)
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/hzfKLJ8hYQ5owp87mPvyZq1dIas>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Owner: <mailto:sidrops-owner@ietf.org>
List-Post: <mailto:sidrops@ietf.org>
List-Subscribe: <mailto:sidrops-join@ietf.org>
List-Unsubscribe: <mailto:sidrops-leave@ietf.org>

Thanks to everyone that assisted in the creations an d approval of the new charter.

Russ

> On Jan 8, 2026, at 12:22 PM, The IESG <iesg-secretary@ietf.org> wrote:
> 
> The SIDR Operations (sidrops) WG in the Operations and Management Area of the
> IETF has been rechartered. For additional information, please contact the
> Area Directors or the WG Chairs.
> 
> SIDR Operations (sidrops)
> -----------------------------------------------------------------------
> Current status: Active WG
> 
> Chairs:
>  Russ Housley <housley@vigilsec.com>
>  Luigi Iannone <ggx@gigix.net>
> 
> Secretaries:
>  Krishnaswamy Ananthamurthy <kriswamy@cisco.com>
> 
> Assigned Area Director:
>  Mohamed Boucadair <mohamed.boucadair@orange.com>
> 
> Operations and Management Area Directors:
>  Mahesh Jethanandani <mjethanandani@gmail.com>
>  Mohamed Boucadair <mohamed.boucadair@orange.com>
> 
> Technical advisors:
>  Keyur Patel <keyur@arrcus.com>
>  Chris Morrow <christopher.morrow@gmail.com>
> 
> Mailing list:
>  Address: sidrops@ietf.org
>  To subscribe: https://www.ietf.org/mailman/listinfo/sidrops
>  Archive: https://mailarchive.ietf.org/arch/browse/sidrops/
> 
> Group page: https://datatracker.ietf.org/group/sidrops/
> 
> Charter: https://datatracker.ietf.org/doc/charter-ietf-sidrops/
> 
> The global deployment of Secure Inter-Domain Routing (SIDR), consisting of
> Resource Public Key Infrastructure (RPKI), Origin Validation of BGP
> announcements, and BGPsec (RFC 8205), is still underway, creating an Internet
> Routing System consisting of SIDR-aware and non-SIDR-aware networks. This
> deployment must be properly handled to avoid the division of the Internet
> into separate networks. SIDR Operations Working Group (SIDROPS WG) is
> responsible for continuing the development of SIDR technology, encouraging
> its deployment, while ensuring as secure of a global routing system as
> possible, during the transition. Specifically, SIDROPS is responsible for the
> maintenance of all SIDR components, except BGPsec.
> 
> The SIDROPS WG is focused on deployment and operational issues, their
> mitigations, and experiences with SIDR technologies that are part of the
> global routing system, as well as the RPKI repositories and RPKI
> Certification Authority (CA) systems that form part of the SIDR architecture.
> 
> SIDROPS will solicit input from a variety of contributors, including but not
> limited to, CA Operators, Regional/National and Local Internet Registries,
> Relying Party software developers, researchers, participants of the
> measurements community, and network operators.
> 
> The goals of SIDROPS WG are:
> 
> * Maintain RPKI technology stack.
> 
> * Maintain RPKI-Router protocol, including specifying extensions, updates,
> and new protocol versions.
> 
> * Identify operational issues with a SIDR-aware Internet and with interaction
> with the non-SIDR-aware Internet.
> 
> * Develop solutions for identified issues. This includes in particular:
> 
>    + Developing guidelines for the operation of SIDR-aware networks and
>    providing operational guidance on how to deploy and operate SIDR
>    technologies in existing and new networks (Informational/BCP).
> 
>    + Standardizing protocols and protocol extensions to improve operational
>    efficiency and security of SIDR such as Autonomous System Provider
>    Authorization (ASPA) and reliable cache synchronization mechanisms.
> 
> * Standardize manageability (e.g., YANG data models) and OAM solutions
> related to SIDR operations.
> 
> * Document common SIDROPS terminology as Informational RFC.
> 
> Given the importance of routing security to the overall stability of the
> Internet, the WG will not submit protocol specifications for publication to
> the IESG before demonstrating at least two interoperable implementations. See
> RFC 5657 (part of BCP 9) for guidance on what implementation reports should
> contain and BCP 205 for guidance on how to raise awareness of running code.
> 
> BGPsec maintenance, extensions, and updates belong to IDR WG. SIDROPS may
> provide input to IDR, as needed, and will cooperate with that WG in reviewing
> solutions to BGPsec operational and deployment problems. Documenting the
> operational aspects of securing the Internet routing system other than SIDR
> belongs to GROW WG.
> 
> Gaps in other protocols which impact SIDR operation are the responsibility of
> the WGs that own those protocols.
> 
> Milestones:
> 
>  Mar 2026 - Submit draft-ietf-sidrops-8210bis to the IESG for publication
> 
>  Mar 2026 - Submit draft-ietf-sidrops-aspa-profile to the IESG for
>  publication
> 
>  Mar 2026 - Submit draft-ietf-sidrops-aspa-verification to the IESG for
>  publication
> 
>  Jul 2026 - Submit draft-ietf-sidrops-aspa-notation to the IESG for
>  publication
> 
>  Jul 2026 - Submit draft-ietf-sidrops-aspa-slurm to the IESG for publication
> 
> 
>