<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jiang-sidrops-psvro-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="PSVRO">Route Origin Registry Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-jiang-sidrops-psvro-04"/>
    <author fullname="Shenglin Jiang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jiangshl@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xingang Shi">
      <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>shixg@cernet.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="May" day="18"/>
    <workgroup>SIDROPS</workgroup>
    <abstract>
      <?line 106?>

<t>Prefix hijacking, i.e., unauthorized announcement of a prefix, has emerged as a major security threat in the Border Gateway Protocol (BGP), garnering widespread attention. To migrate such attacks while supporting legitimate Multiple Origin AS (MOAS), higher requirements are placed on the route origin registry. This document serves to outline the problem statement for current route origin registry.</t>
    </abstract>
  </front>
  <middle>
    <?line 110?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) is ubiquitously used for inter-domain routing. However, it lacks built-in security validation on whether its UPDATE information is legitimate <xref target="RFC4272"/>. This poses concerns regarding prefix hijacking, where unauthorized announcements of prefixes can occur, simulating legitimate Multiple Origin AS (MOAS).</t>
      <t>Unfortunately, the current route origin registry, such as Internet Routing Registry (IRR) <xref target="RFC2622"/> and Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/>, are not effective in distinguishing between legitimate MOAS and prefix hijacking. There is a pressing need for a verifiable route origin registry that can support registration and protection of legitimate MOAS, thereby mitigating the threats posed by prefix hijacking to the routing infrastructure.</t>
      <t>This document analyzes multiple scenarios involving MOAS events and identifies limitations inherent in the current route origin registry mechanisms. The intent is to provide guidance and insights to network operators, researchers, and policymakers aimed at enhancing the security and resilience of the global routing infrastructure.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="working-definition-of-route-origin-registry">
      <name>Working Definition of Route Origin Registry</name>
      <t>Route origin registry refers to an infrastructure that records the mapping of IP prefixes to the ASes authorised to announce them. Resource holders can register prefix-origin pairs in route origin registry by themselves or delegate to others.</t>
      <t>IRR and RPKI currently offer functionalities related to route origin registry. IRRs, which have been in operation since 1995, serve as a globally distributed database for routing information. They record the binding relationship between IPs and AS via Route(6) objects, which are defined by the Routing Policy Specification Language (RPSL).</t>
      <t>On the other hand, the RPKI, which was developed starting in 2008, provides a formally verifiable framework. The RPKI is based on resource certificates that extend the X.509 standard. It records the mapping between IP prefixes and their authorised ASes via Route Origin Authorization (ROA) objects. These ROA objects contain essential information such as the prefix, origin ASN, and MaxLength.</t>
    </section>
    <section anchor="prefix-hijacking-and-legitimate-moas">
      <name>Prefix Hijacking and Legitimate MOAS</name>
      <t><xref target="RFC1930"/> suggests that a prefix should typically have a single AS as its origin, with a few exceptions. However, CAIDA's analysis on BGP routing data <xref target="CAIDA"/> reveals that MOAS has always been a common phenomenon. There are various reasons that contribute to the emergence of MOAS prefixes:</t>
      <ul spacing="normal">
        <li>
          <t><strong><em>Aggregation</em></strong>. For example, if "Prefix 0/24" originates from ASx and "Prefix 1/24" originates from ASy, an aggregating router may combine them into "Prefix 0/23". In this case, the aggregating router has two options: it may include an AS_SET attribute containing both ASx and ASy in the aggregated announcement, resulting in a MOAS prefix; or it may omit the AS_SET and attach the ATOMIC_AGGREGATE attribute instead, indicating that route information has been suppressed.</t>
        </li>
        <li>
          <t><strong><em>Business consideration</em></strong>. Companies often choose providers that offer high-speed and reliable data services to host their servers. For efficient resource allocation, a parent organization that owns a large chunk of IP addresses may divide its address space among one or more child organizations, which choose different providers and ask them to announce the same prefix. For example, a multi-national company may advertise its prefix from multiple locations where it has offices.</t>
        </li>
        <li>
          <t><strong><em>Multi-homing</em></strong>. When multi-homing occur without the use of BGP, it can result in MOAS conflicts. Assuming ASx is connected to two providers, ISP1 and ISP2. ISP1 is connected to ASx using BGP, while ISP2 is connected to ASx through static routes or Interior Gateway Protocol (IGP). Both ISP1 and ISP2 advertise prefixes that belong to ASx.</t>
        </li>
        <li>
          <t><strong><em>Internet eXchanges</em></strong>. When a prefix is associated with an exchange point, it becomes directly accessible from all the ASes connected to that exchange point. Each AS at the exchange point has the capability to advertise the prefix as if it originates directly from their own AS.</t>
        </li>
        <li>
          <t><strong><em>Anycast</em></strong>. Anycast is often employed by content distribution networks (CDNs) to direct the requests of their customers to the nearest servers, ensuring speedy data delivery to their customers.</t>
        </li>
        <li>
          <t><strong><em>Prefix hijacking and misconfigurations</em></strong>. A malicious AS may advertise prefixes belonging to another organization to attract its traffic. An AS may also make such annoucements unintentionally due to misconfiguration.</t>
        </li>
      </ul>
      <t>Distinguishing between prefix hijacking, misconfiguration, and legitimate MOAS is a complex task. The challenge arises from the resemblance of these behaviors, as they often display similar characteristics. Moreover, accurately identifying and classifying these situations necessitates a route origin registry with high coverage and accuracy.</t>
    </section>
    <section anchor="problems-in-current-route-origin-registry">
      <name>Problems in Current Route Origin Registry</name>
      <t>This section outlines several challenges faced by the current route origin registry in distinguishing legitimate MOAS events from malicious MOAS incidents, such as route hijacking.</t>
      <section anchor="security-risks-from-partial-adoption">
        <name>Security Risks from Partial Adoption</name>
        <t>As the adoption of RPKI continues to grow, the number of IP prefixes registered within RPKI is gradually increasing. However, recent reports from the Number Resource Organization (NRO) <xref target="NRO"/> indicate that the coverage of IP prefixes within ROAs is still relatively low, and the adoption rate of route origin validation (ROV), as measured by Mutually Agreed Norms for Routing Security (MANRS) <xref target="MANRS"/>, is even significantly lower than the coverage of ROAs. Similarly, <xref target="IRRegularities"/> also notes a decreasing trend in IP Prefix coverage in certain IRRs. When focusing on MOAS, their coverage is significantly lower and insufficient to distinguish between legitimate MOAS and route hijacking.</t>
        <t>Limited IP prefix coverage within the current route origin registry, especially for MOAS prefixes, hinders the complete validation of route announcements, significantly limiting the motivation for network operators to utilize route origin registry.</t>
      </section>
      <section anchor="inconsistency-between-different-route-origin-registries">
        <name>Inconsistency between Different Route Origin Registries</name>
        <t>Based on the analysis presented in the previous sections, it is evident that relying solely on a single source of route origin registry is insufficient in route origin validation. To address this issue effectively, it is recommended to integrate the RPKI and multiple active IRRs.</t>
        <t>However, it is important to note that this fusion approach may encounter several limitations. As highlighted in <xref target="IRRegularities"/>, inconsistencies exist among the Route(6) objects across different IRRs. This inconsistency can be attributed to the chronic neglect by IRR customers. For instance, some companies may register Route(6) objects in some IRRs but fail to update them in all route origin registries, resulting in outdated and stale Route(6) objects. Furthermore, it is observed that a higher number of IRRs exhibit lower consistency with RPKI. In practice, different networks often use different data and methodologies to perform route validation and filtering, resulting in disparate outcome, especially when ROA and IRR data conflict with each other.</t>
        <t>As a result, while integrating the RPKI and multiple active IRRs can improve the effectiveness of route origin validation, it is essential to address the issues of inconsistencies between different route origin registries.</t>
      </section>
      <section anchor="insufficiency-of-resource-certification">
        <name>Insufficiency of Resource Certification</name>
        <t>As mentioned in <xref target="RFC7682"/>, the lack of certification and incentives for maintaining up-to-date data within IRRs leads to low accuracy of the information. Recent measurement <xref target="IRRegularities"/> reveals that IRRs with low update activity exhibit lower overlap with BGP announcements than those with high update activity. This indicates that IRRs with lower activity may contain a higher proportion of outdated and stale Route(6) objects, thereby impacting the reliability of the route origin registry.</t>
        <t>RPKI is a hierarchical Public Key Infrastructure (PKI) that binds Internet Number Resources (INRs) such as AS Numbers and IP addresses to public keys via certificates. However, there is a risk of conflicts in INRs ownership when misconfiguration or malicious operations occur at the upper tier, resulting in multiple lower tiers being allocated the same INRs. Additionally, the existence of legitimate MOAS necessitates the authorization of binding between a prefix with multiple ASes, further complicating the issue. Balancing the protection of legitimate MOAS while minimizing risks in INRs certificates presents a challenging problem that requires innovative solutions. Furthermore, it is worth noting that RPKI Relying Parties (RPs) <xref target="RFC8897"/> have not yet standardized the process of constructing certificate chains and handling exceptions such as Certificate Revocation Lists (CRLs) and Manifests. This lack of standardization has resulted in different views on the RPKI records by RPs who adopt different implementations. Consequently, ASes served by different RPs may have varying validation results for the same route announcement.</t>
        <t>Consequently, the absence of data validation and standardization in operations within the IRR or RPKI framework means that there is no guarantee of the accuracy of the data registered in any route origin registry.</t>
      </section>
      <section anchor="synchronization-and-management">
        <name>Synchronization and Management</name>
        <t>The current practice in IRRs involves the use of the Near-Real-Time Mirroring (NRTM) protocol <xref target="NRTMv4"/> to replicate and synchronize Route(6) object from other IRRs. Similarly, the RPKI relies on the RPKI Repository Delta Protocol (RRDP) <xref target="RFC8182"/> to synchronize and update data. However, these network protocols exhibit several weaknesses that need to be addressed.</t>
        <ul spacing="normal">
          <li>
            <t>The absence of a mechanism to notify other mirrors when updates occur results in synchronization delays and data inconsistency issues. This can be problematic when timeliness and accuracy are crucial.</t>
          </li>
          <li>
            <t>The absence of validation for replicated data from mirrored sources in both IRRs and RPKI is a legitimate concern. This situation creates a considerable risk for inconsistencies and conflicts with the current data.</t>
          </li>
          <li>
            <t>The absence of application security mechanisms within these protocols is another area of vulnerability. This lack of security measures exposes the system to unauthorized access and compromise on data integrity.</t>
          </li>
        </ul>
        <t>Although some approaches attempt to optimise the quality of the route origin registry, e.g. RIPE NCC, IRRdv4 using RPKI to validate/filter IRR Route(6) objects, and <xref target="RFC8416"/> proposing that RPs can customise route origin with local data, the problem of inconsistency persists due to the limited coverage of RPKI and the lack of effective mechanisms to resolve conflicting data between IRRs. It is crucial to establish an effective communication mechanism among multiple route origin registry, enabling negotiation and cross-validation of conflicting or special-purpose route origin information.</t>
      </section>
      <section anchor="summary">
        <name>Summary</name>
        <t>The current route origin registry infrastructure, namely IRRs and RPKI, are facing challenges due to the increased occurrence of MOAS prefixes. These challenges mainly include low adoption rates, global inconsistency, insufficient resource certification, and incomplete multi-source collaboration mechanisms.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There is no security consideration in this draft.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There is no IANA consideration in this draft.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2622">
          <front>
            <title>Routing Policy Specification Language (RPSL)</title>
            <author fullname="C. Alaettinoglu" initials="C." surname="Alaettinoglu"/>
            <author fullname="C. Villamizar" initials="C." surname="Villamizar"/>
            <author fullname="E. Gerich" initials="E." surname="Gerich"/>
            <author fullname="D. Kessens" initials="D." surname="Kessens"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="M. Terpstra" initials="M." surname="Terpstra"/>
            <date month="June" year="1999"/>
            <abstract>
              <t>RPSL allows a network operator to be able to specify routing policies at various levels in the Internet hierarchy; for example at the Autonomous System (AS) level. At the same time, policies can be specified with sufficient detail in RPSL so that low level router configurations can be generated from them. RPSL is extensible; new routing protocols and new protocol features can be introduced at any time. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2622"/>
          <seriesInfo name="DOI" value="10.17487/RFC2622"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC8416">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4272">
          <front>
            <title>BGP Security Vulnerabilities Analysis</title>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
              <t>This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4272"/>
          <seriesInfo name="DOI" value="10.17487/RFC4272"/>
        </reference>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7682">
          <front>
            <title>Considerations for Internet Routing Registries (IRRs) and Routing Policy Configuration</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="D. Mitchell" initials="D." surname="Mitchell"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The purpose of this document is to catalog issues that influenced the efficacy of Internet Routing Registries (IRRs) for inter-domain routing policy specification and application in the global routing system over the past two decades. Additionally, it provides a discussion regarding which of these issues are still problematic in practice, and which are simply artifacts that are no longer applicable but continue to stifle inter-provider policy-based filtering adoption and IRR utility to this day.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7682"/>
          <seriesInfo name="DOI" value="10.17487/RFC7682"/>
        </reference>
        <reference anchor="RFC8897">
          <front>
            <title>Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document provides a single reference point for requirements for Relying Party (RP) software for use in the Resource Public Key Infrastructure (RPKI). It cites requirements that appear in several RPKI RFCs, making it easier for implementers to become aware of these requirements. Over time, this RFC will be updated to reflect changes to the requirements and guidance specified in the RFCs discussed herein.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8897"/>
          <seriesInfo name="DOI" value="10.17487/RFC8897"/>
        </reference>
        <reference anchor="NRTMv4">
          <front>
            <title>Near Real Time Mirroring (NRTM) version 4</title>
            <author fullname="Sasha Romijn" initials="S." surname="Romijn">
              <organization>Reliably Coded</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Edward Shryane" initials="E." surname="Shryane">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Stavros Konstantaras" initials="S." surname="Konstantaras">
              <organization>AMS-IX</organization>
            </author>
            <date day="17" month="April" year="2026"/>
            <abstract>
              <t>   This document specifies a one-way synchronization protocol for
   Internet Routing Registry (IRR) records, called Near Real Time
   Mirroring version 4 (NRTMv4), in which files are distributed over
   HTTPS.  The protocol allows instances of IRR database servers to
   mirror IRR records, specified in the Routing Policy Specification
   Language (RPSL), between each other.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-nrtm-v4-11"/>
        </reference>
        <reference anchor="IRRegularities">
          <front>
            <title>IRRegularities in the internet routing registry</title>
            <author initials="B." surname="Du">
              <organization/>
            </author>
            <author initials="K." surname="Izhikevich">
              <organization/>
            </author>
            <author initials="S." surname="Rao">
              <organization/>
            </author>
            <author initials="G." surname="Akiwate">
              <organization/>
            </author>
            <author initials="C." surname="Testart">
              <organization/>
            </author>
            <author initials="" surname="AC Snoeren">
              <organization/>
            </author>
            <author initials="K." surname="Claffy">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the 2023 ACM on internet measurement conference" value=""/>
        </reference>
        <reference anchor="CAIDA" target="https://doi.org/10.21986/CAIDA.DATA.ROUTEVIEWS-PFX2AS-MAPPING">
          <front>
            <title>RouteViews Prefix to AS mappings</title>
            <author>
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="MANRS" target="https://observatory.manrs.org/">
          <front>
            <title>MANRS Observatory</title>
            <author>
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="NRO" target="https://www.nro.net/about/rirs/statistics/">
          <front>
            <title>NRO RIR Statistics</title>
            <author>
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 216?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Yangfei Guo, Di Ma, Qi Li, Shuhe Wang, Xiaoliang Wang, Hui Wang, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
