<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-shi-sidrops-rpki-on-demand-01" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="On-Demand RPKI Retrieval">Considerations for On-Demand Retrieval of Multiple RPKI Object Types</title>
    <seriesInfo name="Internet-Draft" value="draft-shi-sidrops-rpki-on-demand-01"/>
    <author initials="J." surname="Shi" fullname="Jiayi Shi">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>sjy23@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Operations and Management</area>
    <workgroup>SIDROPS</workgroup>
    <keyword>RPKI</keyword>
    <abstract>
      <?line 62?>

<t>Currently, Relying Parties (RPs) retrieve the complete set of RPKI objects from repositories. This all-or-nothing model increases network traffic, synchronization latency, and computational overhead. This document examines these limitations and outlines directions for enabling more selective and efficient RPKI data access.</t>
    </abstract>
  </front>
  <middle>
    <?line 66?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/> provides a framework for validating the authenticity and integrity of routing information. It relies on cryptographically verifiable objects published at Publication Points (PPs), which Relying Parties (RPs) retrieve and process to support route validation.</t>
      <t>Current RPKI data retrieval assumes that RPs synchronize and cache the complete repository contents. The diversity of RPKI signed objects is expected to grow; beyond ROAs <xref target="RFC9582"/>, new object types such as ASPAs <xref target="I-D.ietf-sidrops-aspa-verification"/> and MOAs <xref target="I-D.ietf-sidrops-moa-profile"/> have already been proposed. Existing RP implementations do not support selective retrieval by object type. Consequently, operators that require only a subset of objects must still download and process the entire repository, increasing network traffic, synchronization latency, and computational overhead. For example, an AS that only requires Route Origin Authorizations (ROAs) will also download and process unrelated objects such as ASPAs and MOAs.</t>
      <t>This document analyzes these limitations and discusses directions for enabling selective, on-demand retrieval of RPKI objects to improve scalability and operational efficiency.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-review">
      <name>Problem Statement</name>
      <t>As the diversity and volume of RPKI objects grow, there would be an increasing need for RPs to retrieve only the objects of the required type in order to reduce unnecessary overhead. However, current RPKI transport protocols assume full repository synchronization. As a result, networks must download and process signed objects that are not required for their operational needs.</t>
      <t>Operational measurements indicate that the current RPKI repository contains roughly 340,000 ROA objects, totaling approximately 655 MB. Assuming the deployment of 70,000 ASPA objects of similar size per object, the additional data would amount to roughly 135 MB. For networks that only require ROAs, retrieving unrelated ASPA objects imposes unnecessary network traffic consumption and computational overhead. As new object types such as MOAs are introduced, these inefficiencies will increase further.</t>
    </section>
    <section anchor="sec-direction">
      <name>Directions and Design Considerations</name>
      <t>Type-based on-demand retrieval refers to the ability for RPs to selectively retrieve specific categories of RPKI signed objects. This section discusses high-level directions and design considerations for enabling such on-demand retrieval within existing RPKI transport protocols, including Rsync <xref target="RSYNC"/>, RRDP <xref target="RFC8182"/>, and Eric Synchronization Protocol <xref target="I-D.ietf-sidrops-rpki-erik-protocol"/>.</t>
      <section anchor="rsync-and-rrdp">
        <name>Rsync and RRDP</name>
        <t>Both Rsync and RRDP currently do not support type-based on-demand retrieval of RPKI signed objects, because neither protocol provides object-level granularity for fetching. An RP must first retrieve all updated objects before it can parse and identify specific object types. As a result, selective on-demand retrieval by object type is not achievable with current designs.</t>
        <t>To enable type-based on-demand retrieval, changes may be needed on the PP side, such as reorganizing repository files or exposing explicit object type metadata. With such modifications, RPs could fetch objects of a specific type without downloading the entire repository. Care must be taken to ensure that these changes do not introduce significant complexity or additional transport overhead.</t>
      </section>
      <section anchor="eric-synchronization-protocol">
        <name>Eric Synchronization Protocol</name>
        <t>The Erik Synchronization Protocol uses Merkle trees to detect differences between local and remote datasets, enabling RPs to efficiently identify and retrieve only objects that are missing or out of sync.</t>
        <t>Although the current specification does not explicitly address on-demand retrieval by RPKI object type, Erik’s object-level granularity and manifest-driven design naturally support this functionality. By leveraging object file names in manifests, RPs can filter and fetch only the required categories of signed objects.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document does not define new protocols, protocol extensions, or modifications to existing RPKI validation procedures or security mechanisms. Therefore, this document does not introduce new security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC9582" target="https://www.rfc-editor.org/info/rfc9582" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9582.xml">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="RFC8182" target="https://www.rfc-editor.org/info/rfc8182" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8182.xml">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-24" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-verification.xml">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>This document describes procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This AS_PATH verification enhances routing security by adding means to detect and mitigate route leaks and AS_PATH manipulations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-24"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-moa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-moa-profile-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-moa-profile.xml">
          <front>
            <title>A Profile for Mapping Origin Authorizations (MOAs)</title>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Guozhen Dong" initials="G." surname="Dong">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Xing Li" initials="X." surname="Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <author fullname="Di Ma" initials="D." surname="Ma">
              <organization>ZDNS</organization>
            </author>
            <date day="11" month="January" year="2026"/>
            <abstract>
              <t>This document proposes a new approach by leveraging Resource Public Key Infrastructure (RPKI) architecture to verify the authenticity of the mapping origin of an IPv4 address block. MOA is a newly defined cryptographically signed object that provides a means for the address holder can authorize an IPv6 mapping prefix to originate mapping for one or more IPv4 prefixes. When receiving the MOA objects from the relying parties, PE devices can verify and discard invalid address mapping announcements from unauthorized IPv6 mapping prefixes to prevent IPv4 prefix hijacking.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-moa-profile-03"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-erik-protocol" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-erik-protocol-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-erik-protocol.xml">
          <front>
            <title>The Erik Synchronization Protocol for use with the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Tim Bruijnzeels" initials="T." surname="Bruijnzeels">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Tom Harrison" initials="T." surname="Harrison">
              <organization>APNIC</organization>
            </author>
            <author fullname="Wataru Ohgai" initials="W." surname="Ohgai">
              <organization>JPNIC</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>This document specifies the Erik Synchronization Protocol for use with the Resource Public Key Infrastructure (RPKI). Erik Synchronization can be characterized as a data replication system using Merkle trees, a content-addressable naming scheme, concurrency control using monotonically increasing sequence numbers, and HTTP transport. Relying Parties can combine information retrieved via Erik Synchronization with other RPKI transport protocols. The protocol's design is intended to be efficient, fast, easy to implement, and robust in the face of partitions or faults in the network.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-erik-protocol-03"/>
        </reference>
        <reference anchor="RSYNC" target="https://rsync.samba.org">
          <front>
            <title>The rsync web pages</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 129?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
