Skip to main content

The Use of maxLength in the Resource Public Key Infrastructure (RPKI)
draft-ietf-sidrops-rpkimaxlen-15

Revision differences

Document history

Date Rev. By Action
2024-01-26
15 Gunter Van de Velde Request closed, assignment withdrawn: Joel Jaeggli Last Call OPSDIR review
2024-01-26
15 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue
2022-10-12
15 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2022-09-27
15 (System) RFC Editor state changed to AUTH48
2022-09-02
15 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2022-08-19
15 (System) IANA Action state changed to No IANA Actions from In Progress
2022-08-19
15 (System) RFC Editor state changed to EDIT
2022-08-19
15 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2022-08-19
15 (System) Announcement was received by RFC Editor
2022-08-19
15 (System) IANA Action state changed to In Progress
2022-08-19
15 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2022-08-19
15 Amy Vezza IESG has approved the document
2022-08-19
15 Amy Vezza Closed "Approve" ballot
2022-08-19
15 Amy Vezza Ballot approval text was generated
2022-08-19
15 (System) Removed all action holders (IESG state changed)
2022-08-19
15 Amy Vezza IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2022-08-15
15 Robert Wilton
[Ballot comment]
Hi,

I considered balloting this as a discuss (for a discussion), but this is outside my area of knowledge expertise.

Although the document …
[Ballot comment]
Hi,

I considered balloting this as a discuss (for a discussion), but this is outside my area of knowledge expertise.

Although the document indicates that the number of published ROAs should remain the same, since each ROA can list multiple prefixes, was any consideration to the potential increase in VRPs (if that is the right term) that this change will cause and whether this may negatively affect routers that are consuming the ROAs/VRPs?

Am I right in assuming that the number of valid ROAs that can be announced should effectively be bound by the number of BGP prefixes advertised for an AS and hence this shouldn't be a problem?

But other that the question above, I found this document to be very easy and pleasant to read.

Regards,
Rob
2022-08-15
15 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2022-08-14
15 Ben Maddison New version available: draft-ietf-sidrops-rpkimaxlen-15.txt
2022-08-14
15 Ben Maddison New version accepted (logged-in submitter: Ben Maddison)
2022-08-14
15 Ben Maddison Uploaded new revision
2022-08-11
14 Andrew Alston [Ballot comment]
Clearing my discuss thanks to the change submitted in the latest revision.  My thanks to the authors for the quick response.
2022-08-11
14 Andrew Alston [Ballot Position Update] Position for Andrew Alston has been changed to No Objection from Discuss
2022-08-11
14 (System) Changed action holders to Warren Kumari (IESG state changed)
2022-08-11
14 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-08-11
14 Ben Maddison New version available: draft-ietf-sidrops-rpkimaxlen-14.txt
2022-08-11
14 Ben Maddison New version accepted (logged-in submitter: Ben Maddison)
2022-08-11
14 Ben Maddison Uploaded new revision
2022-08-11
13 Warren Kumari Ballot writeup was changed
2022-08-11
13 (System) Changed action holders to Sharon Goldberg, Kotikalapudi Sriram, Job Snijders, Warren Kumari, Yossi Gilad, Ben Maddison (IESG state changed)
2022-08-11
13 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2022-08-11
13 Andrew Alston
[Ballot discuss]
Thanks for the solid work on this document, for the most part, I found it clear and easy to parse.

In Section 1, …
[Ballot discuss]
Thanks for the solid work on this document, for the most part, I found it clear and easy to parse.

In Section 1, I see the following:

Each ROA contains a set of IP prefixes, and an AS number of
  an AS authorized to originate all the IP prefixes in the set
  [RFC6482].

While I have some idea of what this means - it's confusing and I believe will cause confusion on the part of other readers.  It's confusing to the point where I'm not even sure exactly what the wording should be, but reading that, an AS number of an AS doesn't seem right at all.

Let's discuss and see if we can find a way to come to text on this section that is less confusing.

Thanks

Andrew
2022-08-11
13 Andrew Alston [Ballot Position Update] New position, Discuss, has been recorded for Andrew Alston
2022-08-10
13 Paul Wouters [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters
2022-08-10
13 Roman Danyliw
[Ballot comment]
Thank you to Sean Turner for the SECDIR review.

** Section 5.

  In general, except in some special cases, operators SHOULD avoid …
[Ballot comment]
Thank you to Sean Turner for the SECDIR review.

** Section 5.

  In general, except in some special cases, operators SHOULD avoid
  using the maxLength attribute in their ROAs, since its inclusion will
  usually make the ROA non-minimal.

The clause “except in some special cases” seems unneeded as its implied by the use of the SHOULD (rather than a MUST).
2022-08-10
13 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2022-08-10
13 John Scudder
[Ballot comment]
Thanks for this. Clearly there’s more work to be done given the significant issues you identify with respect to, e.g., scrubbing services, but …
[Ballot comment]
Thanks for this. Clearly there’s more work to be done given the significant issues you identify with respect to, e.g., scrubbing services, but your document provides a good map and motivation for that future work.

One minor suggestion, in

  As discussed in [LSG16], this means that the hijacker will attract
  less traffic than he

Perhaps consider a non-gendered pronoun, as in “they” or “it”, or some other rewording?
2022-08-10
13 John Scudder [Ballot Position Update] New position, Yes, has been recorded for John Scudder
2022-08-10
13 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2022-08-10
13 Ben Maddison New version available: draft-ietf-sidrops-rpkimaxlen-13.txt
2022-08-10
13 Ben Maddison New version accepted (logged-in submitter: Ben Maddison)
2022-08-10
13 Ben Maddison Uploaded new revision
2022-08-09
12 Murray Kucherawy
[Ballot comment]
Thanks to Jean Mahoney for her ARTART review.

I agree with Alvaro's point about updating RFC 7115.  Also, should it become part …
[Ballot comment]
Thanks to Jean Mahoney for her ARTART review.

I agree with Alvaro's point about updating RFC 7115.  Also, should it become part of BCP 185 when published?  Also if you're extending what RFC 7115 says, shouldn't it be a normative reference?

It seems to me like RFC 8205 should also be normative rather than informative, but about that I'm less certain.

The last SHOULD in Section 1 seems a little out of place since it's just an introduction.  The real normative stuff is specified later in the document.

I'm not sure how or if the first two SHOULDs in Section 5 are related.  If they are related, are they not redundant?  If so, I suggest lower-casing the first one as the second one seems more direct.  Thanks for including some prose right below that describing when one might legitimately decide not to do what the SHOULD says.

In the last paragraph of Section 5, the triple SHOULD makes the whole paragraph feel mushy.  I would at least consider lower-casing the second one; it doesn't seem like wiggle room is appropriate there.

NITS
----

In Section 5.1:

OLD:

  Operational requirements may require that [...]

NEW:

  Operational requirements may stipulate that [...]
2022-08-09
12 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2022-08-09
12 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2022-08-09
12 Sean Turner Request for Last Call review by SECDIR Completed: Ready. Reviewer: Sean Turner. Sent review to list.
2022-08-08
12 Alvaro Retana
[Ballot comment]

(1) The running example makes the text clear -- but by being a minimal example (only a couple of prefixes are involved) it …
[Ballot comment]

(1) The running example makes the text clear -- but by being a minimal example (only a couple of prefixes are involved) it may oversimplify the potential operational complexity of maintaining a set of minimal ROAs. 

In particular, operators with short prefixes and many advertisements of both IPv4 and IPv6 may have a harder time keeping up with changes.  I would love to see some text around the challenges that applying the recommendations at scale may bring, which may also "result in a self-inflicted denial of service" (to use the description in §7).



(2) This text in §5 talks about the maintenance steps (review, replace, repeat):

  Operators that have existing ROAs published in the RPKI system SHOULD
  perform a review of such objects, especially where they make use of
  the maxLength attribute, to ensure that the set of included prefixes
  is "minimal" with respect to the current BGP origination and routing
  policies.  Published ROAs SHOULD be replaced as necessary.  Such an
  exercise SHOULD be repeated whenever the operator makes changes to
  either policy.

I assume that throughout the document "SHOULD" is used because, even though this is a BCP, the practice is only recommended.  That is not an issue for me, except for the last recommendation above: the "exercise SHOULD be repeated whenever the operator makes changes to either policy".  If the recommendations in this document are followed, a review of the system should be required, not just recommended.



(3) I find the Security Considerations misleading because none of the potential issues (even ones that could "result in a self-inflicted denial of service") are listed there.  I realize that previous versions had text that was moved elsewhere -- I won't insist on changing it back; this comment is here just for the record.



(4) "The recommendations complement and extend those in [RFC7115]."

It seems to me that this document should formally Update rfc7115 as there are related considerations mentioned there.  I checked the archive but couldn't find a related discussion.  Was an Update considered?



(5) [For the Responsible AD.]  I expect that this document will become part of BCP 185 (with rfc7115).  If so, please indicate that somewhere.
2022-08-08
12 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2022-08-08
12 Éric Vyncke
[Ballot comment]
# Éric Vyncke, INT AD, comments for draft-ietf-sidrops-rpkimaxlen-12
CC @evyncke

Thank you for the work put into this document. It is clear, detailed, …
[Ballot comment]
# Éric Vyncke, INT AD, comments for draft-ietf-sidrops-rpkimaxlen-12
CC @evyncke

Thank you for the work put into this document. It is clear, detailed, with several explanations.

Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education *especially* for one about the use of IPv4-only RFC 1918).

Special thanks to Chris Morrow for the shepherd's detailed write-up including the WG consensus, even if I would have appreciated the justification of the intended status.

I hope that this review helps to improve the document,

Regards,

-éric


## COMMENTS

### Abstract

Comment to be ignored, it is only to signal that this is smart:
```
  ... context of destination-based Remotely Triggered
  Discard Route (RTDR) (elsewhere referred to as "Remotely Triggered
  Black Hole") ...
```
Only regret is that the acronym does not match the RTBH, which is so well known. Again, this comment to be ignored.


### Section 1, freshness of the I-D

`measurements taken in June 2017`, it is 5 years ago. Is the situation still identical ? or has there been some progress ?

### Section 1, reference to detailed explanations

As section 3 provides a description of the hijack attack, it would be nice to put a forward internal reference to it in section 1 (after the external reference).

### Use of IPv4-only RFC 1918

Rather than using RFC 1918 network prefixes instead of the documentation ones, why not using the IPv6 documentation prefix ? After all, we are in 2022 ;-) BTW, I will really appreciate a reply on this (was about to raise a DISCUSS to ensure getting an explanation).

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
2022-08-08
12 Éric Vyncke [Ballot Position Update] New position, Yes, has been recorded for Éric Vyncke
2022-08-06
12 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2022-07-30
12 Acee Lindem Request for Last Call review by RTGDIR Completed: Ready. Reviewer: Acee Lindem. Review has been revised by Acee Lindem.
2022-07-29
12 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2022-07-29
12 Job Snijders New version available: draft-ietf-sidrops-rpkimaxlen-12.txt
2022-07-29
12 Job Snijders New version accepted (logged-in submitter: Job Snijders)
2022-07-29
12 Job Snijders Uploaded new revision
2022-07-26
11 Cindy Morgan Placed on agenda for telechat - 2022-08-11
2022-07-26
11 Warren Kumari Ballot has been issued
2022-07-26
11 Warren Kumari [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari
2022-07-26
11 Warren Kumari Created "Approve" ballot
2022-07-26
11 Warren Kumari IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2022-07-20
11 Jean Mahoney Request for Last Call review by ARTART Completed: Ready with Nits. Reviewer: Jean Mahoney. Sent review to list.
2022-07-20
11 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2022-07-14
11 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2022-07-14
11 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-sidrops-rpkimaxlen-11, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-sidrops-rpkimaxlen-11, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

Sabrina Tanamal
Lead IANA Services Specialist
2022-07-13
11 Acee Lindem Request for Last Call review by RTGDIR Completed: Has Nits. Reviewer: Acee Lindem.
2022-07-13
11 Roni Even Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Roni Even. Sent review to list.
2022-07-10
11 Luc André Burdet Request for Last Call review by RTGDIR is assigned to Acee Lindem
2022-07-10
11 Luc André Burdet Request for Last Call review by RTGDIR is assigned to Acee Lindem
2022-07-08
11 Barry Leiba Request for Last Call review by ARTART is assigned to Jean Mahoney
2022-07-08
11 Barry Leiba Request for Last Call review by ARTART is assigned to Jean Mahoney
2022-07-08
11 Tero Kivinen Closed request for Last Call review by SECDIR with state 'Withdrawn'
2022-07-08
11 Tero Kivinen Request for Last Call review by SECDIR is assigned to Sean Turner
2022-07-08
11 Tero Kivinen Request for Last Call review by SECDIR is assigned to Sean Turner
2022-07-07
11 Yaron Sheffer Assignment of request for Last Call review by SECDIR to Yaron Sheffer was rejected
2022-07-07
11 Tero Kivinen Request for Last Call review by SECDIR is assigned to Yaron Sheffer
2022-07-07
11 Tero Kivinen Request for Last Call review by SECDIR is assigned to Yaron Sheffer
2022-07-07
11 Alvaro Retana Requested Last Call review by RTGDIR
2022-07-07
11 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2022-07-07
11 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2022-07-07
11 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Joel Jaeggli
2022-07-07
11 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Joel Jaeggli
2022-07-06
11 Cindy Morgan IANA Review state changed to IANA - Review Needed
2022-07-06
11 Cindy Morgan
The following Last Call announcement was sent out (ends 2022-07-20):

From: The IESG
To: IETF-Announce
CC: draft-ietf-sidrops-rpkimaxlen@ietf.org, morrowc@ops-netman.net, sidrops-chairs@ietf.org, sidrops@ietf.org, warren@kumari.net …
The following Last Call announcement was sent out (ends 2022-07-20):

From: The IESG
To: IETF-Announce
CC: draft-ietf-sidrops-rpkimaxlen@ietf.org, morrowc@ops-netman.net, sidrops-chairs@ietf.org, sidrops@ietf.org, warren@kumari.net
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (The Use of maxLength in the RPKI) to Best Current Practice


The IESG has received a request from the SIDR Operations WG (sidrops) to
consider the following document: - 'The Use of maxLength in the RPKI'
  as Best Current Practice

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2022-07-20. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document recommends ways to reduce the forged-origin hijack
  attack surface by prudently limiting the set of IP prefixes that are
  included in a Route Origin Authorization (ROA).  One recommendation
  is to avoid using the maxLength attribute in ROAs except in some
  specific cases.  The recommendations complement and extend those in
  RFC 7115.  The document also discusses the creation of ROAs for
  facilitating the use of Distributed Denial of Service (DDoS)
  mitigation services.  Considerations related to ROAs and origin
  validation in the context of destination-based Remote Triggered Black
  Hole (RTBH) filtering are also highlighted.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-sidrops-rpkimaxlen/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    rfc6811: BGP Prefix Origin Validation (Proposed Standard - Internet Engineering Task Force (IETF))
    rfc6482: A Profile for Route Origin Authorizations (ROAs) (Proposed Standard - Internet Engineering Task Force (IETF))
    rfc4271: A Border Gateway Protocol 4 (BGP-4) (Draft Standard - Internet Engineering Task Force (IETF))



2022-07-06
11 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2022-07-06
11 Warren Kumari Last call was requested
2022-07-06
11 Warren Kumari Last call announcement was generated
2022-07-06
11 Warren Kumari Ballot approval text was generated
2022-07-06
11 (System) Changed action holders to Warren Kumari (IESG state changed)
2022-07-06
11 Warren Kumari IESG state changed to Last Call Requested from Publication Requested
2022-07-06
11 Warren Kumari Ballot writeup was changed
2022-07-05
11 Job Snijders New version available: draft-ietf-sidrops-rpkimaxlen-11.txt
2022-07-05
11 (System) New version approved
2022-07-05
11 (System) Request for posting confirmation emailed to previous authors: Ben Maddison , Job Snijders , Kotikalapudi Sriram , Sharon Goldberg , Yossi Gilad
2022-07-05
11 Job Snijders Uploaded new revision
2022-06-09
10 Chris Morrow
# Document Shepherd Writeup

*This version is dated 8 April 2023.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering …
# Document Shepherd Writeup

*This version is dated 8 April 2023.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this writeup to give helpful context to Last Call and
Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in
completing it, is appreciated. The full role of the shepherd is further
described in [RFC 4858][2], and informally. You will need the cooperation of
authors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

The document went through 9 revisions in the WG, had good conversation during
meetings and on-list.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

No controversy was raised.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

no appeal/etc.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

not a protocol document.


### Additional Reviews

5. Does this document need review from other IETF working groups or external
  organizations? Have those reviews occurred?

No external reviews were required.


6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.


There are no applicable criteria.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

no yang

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.


These were not required.

### Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

The document is clearly written, and ready to be handed off to the Area Director.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. Do any such issues remain that would merit specific
    attention from subsequent reviews?

No issues remain.

11. What type of RFC publication is being requested on the IETF stream (Best
    Current Practice, Proposed Standard, Internet Standard, Informational,
    Experimental, or Historic)? Why is this the proper type of RFC? Do all
    Datatracker state attributes correctly reflect this intent?

Best Current Practice.

12. Has the interested community confirmed that any and all appropriate IPR
    disclosures required by [BCP 78][7] and [BCP 79][8] have been filed? If not,
    explain why. If yes, summarize any discussion and conclusion regarding the
    intellectual property rights (IPR) disclosures, including links to relevant
    emails.


Yes, all editors/authors confirmed no IPR claims.

13. Has each Author or Contributor confirmed their willingness to be listed as
    such? If the number of Authors/Editors on the front page is greater than 5,
    please provide a justification.

All editors/authors maintain willingness to be listed as such.

14. Identify any remaining I-D nits in this document. (See [the idnits tool][9]
    and the checkbox items found in Guidelines to Authors of Internet-Drafts).
    Simply running the idnits tool is not enough; please review the entire
    guidelines document.

There exist some check-nits warnings:
  1) use of private address space instead of documentation space
  2) 2119 boilerplate missing
  3) An extra reference (nist-800-189)
  4) Down-ref toward 6480 (judged not important to change)

These will be cleaned up as part of the next edit/push of the document.

15. Should any informative references be normative or vice-versa?

nope.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

n/a

17. Are there any normative downward references (see [RFC 3967][10],
    [BCP 97][11])? If so, list them.

Downref to RFC6480 - "An Infrastructure to Support Secure Internet Routing"

18. Are there normative references to documents that are not ready for
    advancement or are otherwise in an unclear state? If they exist, what is the
    plan for their completion?

None.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

no

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][12]).

There's not an IANA Considerations for this document, which seems to be fine.
The document discusses operational considerations in using/not-using the
'max length' field in a Route Origin Authorization (ROA) record.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

none.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://trac.ietf.org/trac/ops/wiki/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://trac.ietf.org/trac/iesg/wiki/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp78
[8]: https://www.rfc-editor.org/info/bcp79
[9]: https://www.ietf.org/tools/idnits/
[10]: https://www.rfc-editor.org/rfc/rfc3967.html
[11]: https://www.rfc-editor.org/info/bcp97
[12]: https://www.rfc-editor.org/rfc/rfc8126.html
2022-06-09
10 Chris Morrow Responsible AD changed to Warren Kumari
2022-06-09
10 Chris Morrow IETF WG state changed to Submitted to IESG for Publication from WG Document
2022-06-09
10 Chris Morrow IESG state changed to Publication Requested from I-D Exists
2022-06-09
10 Chris Morrow IESG process started in state Publication Requested
2022-05-03
10 Kotikalapudi Sriram New version available: draft-ietf-sidrops-rpkimaxlen-10.txt
2022-05-03
10 (System) New version approved
2022-05-03
10 (System) Request for posting confirmation emailed to previous authors: Ben Maddison , Job Snijders , Kotikalapudi Sriram , Sharon Goldberg , Yossi Gilad
2022-05-03
10 Kotikalapudi Sriram Uploaded new revision
2022-04-22
09 Chris Morrow
# Document Shepherd Writeup

*This version is dated 8 April 2023.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering …
# Document Shepherd Writeup

*This version is dated 8 April 2023.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this writeup to give helpful context to Last Call and
Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in
completing it, is appreciated. The full role of the shepherd is further
described in [RFC 4858][2], and informally. You will need the cooperation of
authors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

The document went through 9 revisions in the WG, had good conversation during
meetings and on-list.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

No controversy was raised.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

no appeal/etc.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

not a protocol document.


### Additional Reviews

5. Does this document need review from other IETF working groups or external
  organizations? Have those reviews occurred?

No external reviews were required.


6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.


There are no applicable criteria.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

no yang

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.


These were not required.

### Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

The document is clearly written, and ready to be handed off to the Area Director.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. Do any such issues remain that would merit specific
    attention from subsequent reviews?

No issues remain.

11. What type of RFC publication is being requested on the IETF stream (Best
    Current Practice, Proposed Standard, Internet Standard, Informational,
    Experimental, or Historic)? Why is this the proper type of RFC? Do all
    Datatracker state attributes correctly reflect this intent?

Best Current Practice.

12. Has the interested community confirmed that any and all appropriate IPR
    disclosures required by [BCP 78][7] and [BCP 79][8] have been filed? If not,
    explain why. If yes, summarize any discussion and conclusion regarding the
    intellectual property rights (IPR) disclosures, including links to relevant
    emails.


Yes, all editors/authors confirmed no IPR claims.

13. Has each Author or Contributor confirmed their willingness to be listed as
    such? If the number of Authors/Editors on the front page is greater than 5,
    please provide a justification.

All editors/authors maintain willingness to be listed as such.

14. Identify any remaining I-D nits in this document. (See [the idnits tool][9]
    and the checkbox items found in Guidelines to Authors of Internet-Drafts).
    Simply running the idnits tool is not enough; please review the entire
    guidelines document.

There exist some check-nits warnings:
  1) use of private address space instead of documentation space
  2) 2119 boilerplate missing
  3) An extra reference (nist-800-189)
  4) Down-ref toward 6480 (judged not important to change)

These will be cleaned up as part of the next edit/push of the document.

15. Should any informative references be normative or vice-versa?

nope.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

n/a

17. Are there any normative downward references (see [RFC 3967][10],
    [BCP 97][11])? If so, list them.

Downref to RFC6480 - "An Infrastructure to Support Secure Internet Routing"

18. Are there normative references to documents that are not ready for
    advancement or are otherwise in an unclear state? If they exist, what is the
    plan for their completion?

None.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

no

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][12]).

There's not an IANA Considerations for this document, which seems to be fine.
The document discusses operational considerations in using/not-using the
'max length' field in a Route Origin Authorization (ROA) record.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

none.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://trac.ietf.org/trac/ops/wiki/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://trac.ietf.org/trac/iesg/wiki/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp78
[8]: https://www.rfc-editor.org/info/bcp79
[9]: https://www.ietf.org/tools/idnits/
[10]: https://www.rfc-editor.org/rfc/rfc3967.html
[11]: https://www.rfc-editor.org/info/bcp97
[12]: https://www.rfc-editor.org/rfc/rfc8126.html
2022-04-21
09 Chris Morrow Changed consensus to Yes from Unknown
2022-04-21
09 Chris Morrow Intended Status changed to Best Current Practice from None
2022-04-21
09 Chris Morrow
# Document Shepherd Writeup

*This version is dated 8 April 2023.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering …
# Document Shepherd Writeup

*This version is dated 8 April 2023.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this writeup to give helpful context to Last Call and
Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in
completing it, is appreciated. The full role of the shepherd is further
described in [RFC 4858][2], and informally. You will need the cooperation of
authors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

The document went through 9 revisions in the WG, had good conversation during
meetings and on-list.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

No controversy was raised.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

no appeal/etc.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

not a protocol document.


### Additional Reviews

5. Does this document need review from other IETF working groups or external
  organizations? Have those reviews occurred?

No external reviews were required.


6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.


There are no applicable criteria.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

no yang

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.


These were not required.

### Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

The document is clearly written, and ready to be handed off to the Area Director.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. Do any such issues remain that would merit specific
    attention from subsequent reviews?

No issues remain.

11. What type of RFC publication is being requested on the IETF stream (Best
    Current Practice, Proposed Standard, Internet Standard, Informational,
    Experimental, or Historic)? Why is this the proper type of RFC? Do all
    Datatracker state attributes correctly reflect this intent?

Best Current Practice.

12. Has the interested community confirmed that any and all appropriate IPR
    disclosures required by [BCP 78][7] and [BCP 79][8] have been filed? If not,
    explain why. If yes, summarize any discussion and conclusion regarding the
    intellectual property rights (IPR) disclosures, including links to relevant
    emails.


Yes, all editors/authors confirmed no IPR claims.

13. Has each Author or Contributor confirmed their willingness to be listed as
    such? If the number of Authors/Editors on the front page is greater than 5,
    please provide a justification.

All editors/authors maintain willingness to be listed as such.

14. Identify any remaining I-D nits in this document. (See [the idnits tool][9]
    and the checkbox items found in Guidelines to Authors of Internet-Drafts).
    Simply running the idnits tool is not enough; please review the entire
    guidelines document.

There exist some check-nits warnings:
  1) use of private address space instead of documentation space
  2) 2119 boilerplate missing
  3) An extra reference (nist-800-189)
  4) Down-ref toward 6480 (judged not important to change)

These will be cleaned up as part of the next edit/push of the document.

15. Should any informative references be normative or vice-versa?

nope.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

n/a

17. Are there any normative downward references (see [RFC 3967][10],
    [BCP 97][11])? If so, list them.

Downref to RFC6480 - "An Infrastructure to Support Secure Internet Routing"

18. Are there normative references to documents that are not ready for
    advancement or are otherwise in an unclear state? If they exist, what is the
    plan for their completion?

There is a reference to draft:8210biz which is currently in the IESG queue.
There is a reference to draft-aspa-verification which is still progressing through the WG.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

no

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][12]).

There's not an IANA Considerations for this document, which seems to be fine.
The document discusses operational considerations in using/not-using the
'max length' field in a Route Origin Authorization (ROA) record.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

none.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://trac.ietf.org/trac/ops/wiki/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://trac.ietf.org/trac/iesg/wiki/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp78
[8]: https://www.rfc-editor.org/info/bcp79
[9]: https://www.ietf.org/tools/idnits/
[10]: https://www.rfc-editor.org/rfc/rfc3967.html
[11]: https://www.rfc-editor.org/info/bcp97
[12]: https://www.rfc-editor.org/rfc/rfc8126.html
2022-04-21
09 Chris Morrow Notification list changed to morrowc@ops-netman.net because the document shepherd was set
2022-04-21
09 Chris Morrow Document shepherd changed to Chris Morrow
2021-11-22
09 Ben Maddison New version available: draft-ietf-sidrops-rpkimaxlen-09.txt
2021-11-22
09 (System) New version accepted (logged-in submitter: Ben Maddison)
2021-11-22
09 Ben Maddison Uploaded new revision
2021-10-05
08 Ben Maddison New version available: draft-ietf-sidrops-rpkimaxlen-08.txt
2021-10-05
08 (System) New version accepted (logged-in submitter: Ben Maddison)
2021-10-05
08 Ben Maddison Uploaded new revision
2021-08-24
07 Kotikalapudi Sriram New version available: draft-ietf-sidrops-rpkimaxlen-07.txt
2021-08-24
07 (System) New version approved
2021-08-24
07 (System) Request for posting confirmation emailed to previous authors: Ben Maddison , Job Snijders , Kotikalapudi Sriram , Sharon Goldberg , Yossi Gilad
2021-08-24
07 Kotikalapudi Sriram Uploaded new revision
2021-02-22
06 Ben Maddison New version available: draft-ietf-sidrops-rpkimaxlen-06.txt
2021-02-22
06 (System) New version accepted (logged-in submitter: Ben Maddison)
2021-02-22
06 Ben Maddison Uploaded new revision
2020-11-02
05 Kotikalapudi Sriram New version available: draft-ietf-sidrops-rpkimaxlen-05.txt
2020-11-02
05 (System) New version approved
2020-11-02
05 (System) Request for posting confirmation emailed to previous authors: Kotikalapudi Sriram , sidrops-chairs@ietf.org, Job Snijders , Sharon Goldberg , Ben Maddison , Yossi Gilad
2020-11-02
05 Kotikalapudi Sriram Uploaded new revision
2020-05-09
04 Kotikalapudi Sriram New version available: draft-ietf-sidrops-rpkimaxlen-04.txt
2020-05-09
04 (System) New version approved
2020-05-09
04 (System) Request for posting confirmation emailed to previous authors: Sharon Goldberg , Job Snijders , Kotikalapudi Sriram , Yossi Gilad , Ben Maddison
2020-05-09
04 Kotikalapudi Sriram Uploaded new revision
2020-04-26
03 (System) Document has expired
2019-10-24
03 Sharon Goldberg New version available: draft-ietf-sidrops-rpkimaxlen-03.txt
2019-10-24
03 (System) New version approved
2019-10-24
03 (System) Request for posting confirmation emailed to previous authors: Job Snijders , Ben Maddison , Sharon Goldberg , sidrops-chairs@ietf.org, Yossi Gilad , Kotikalapudi Sriram
2019-10-24
03 Sharon Goldberg Uploaded new revision
2019-04-24
02 Kotikalapudi Sriram New version available: draft-ietf-sidrops-rpkimaxlen-02.txt
2019-04-24
02 (System) New version approved
2019-04-24
02 (System) Request for posting confirmation emailed to previous authors: Job Snijders , Kotikalapudi Sriram , Ben Maddison , Yossi Gilad , Sharon Goldberg
2019-04-24
02 Kotikalapudi Sriram Uploaded new revision
2018-10-22
01 Job Snijders New version available: draft-ietf-sidrops-rpkimaxlen-01.txt
2018-10-22
01 (System) New version approved
2018-10-22
01 (System) Request for posting confirmation emailed to previous authors: Job Snijders , Kotikalapudi Sriram , Ben Maddison , Yossi Gilad , Sharon Goldberg
2018-10-22
01 Job Snijders Uploaded new revision
2018-05-01
00 Chris Morrow This document now replaces draft-yossigi-rpkimaxlen instead of None
2018-05-01
00 Job Snijders New version available: draft-ietf-sidrops-rpkimaxlen-00.txt
2018-05-01
00 (System) WG -00 approved
2018-04-30
00 Job Snijders Set submitter to "Job Snijders ", replaces to draft-yossigi-rpkimaxlen and sent approval email to group chairs: sidrops-chairs@ietf.org
2018-04-30
00 Job Snijders Uploaded new revision