Internet-Draft BMP-RPKI-MON-REQS October 2025
Wang, et al. Expires 22 April 2026 [Page]
Workgroup:
GROW
Internet-Draft:
draft-wang-grow-bmp-rpki-mon-reqs-02
Published:
Intended Status:
Informational
Expires:
Authors:
S. Wang
Beijing Zhongguancun Laboratory
M. Xu
Beijing Zhongguancun Laboratory
Y. Wang
Beijing Zhongguancun Laboratory
J. Zhang
Beijing Zhongguancun Laboratory

Requirements for Monitoring RPKI-Related Processes on Routers Using BMP

Abstract

This document outlines requirements for extending the BGP Monitoring Protocol (BMP) to provide comprehensive monitoring of RPKI-related processes on routers on routers, including RPKI data acquisition, RPKI-related policy configuration, route validation, and the impact of validation on routing decisions. The proposed extensions aim to standardize router-side monitoring on RPKI within BMP, addressing scalability and interoperability limitations in existing implementations.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 22 April 2026.

Table of Contents

1. Introduction

The Resource Public Key Infrastructure (RPKI) enhances BGP security by enabling cryptographic validation of route origins [RFC6483] [RFC6811] and AS paths [I-D.ietf-sidrops-aspa-verification]. Despite growing adoption of RPKI, standard implementations of the BGP Monitoring Protocol (BMP) [RFC7854] do not natively support monitoring of RPKI-related data. This limitation hampers visibility into RPKI validation processes and their impact on network operations.

While existing proposals aim to extend BMP for specific aspects of RPKI monitoring, such as reporting invalid routes [I-D.ietf-grow-bmp-path-marking-tlv] [I-D.ietf-grow-bmp-rel] or providing validation statistics [I-D.ietf-grow-bmp-bgp-rib-stats], a comprehensive and end-to-end monitoring framework for RPKI lifecycle on the router is still lacking. This document defines requirements and extensions for BMP to monitor four key stages:

2. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].

3. Requirements Overview

The BMP extension for RPKI monitoring SHOULD:

Consequently, this document identifies four key stages in the RPKI lifecycle on routers which necessitate detailed monitoring and reporting:

3.1. RPKI Data Acquisition

To ensure accurate and timely acquisition of RPKI data, network administrators require BMP to provide real-time, consistent monitoring on the health and status of all RPKI data sources. These sources include connections to RPKI caches, local static configurations, and i/eBGP peers. This enables rapid detection and response to faults or outages in data provisioning. Accordingly, BMP SHOULD report the connection parameters, synchronization states, and error metrics for each source.

3.2. RPKI Policy Configuration

Routing policies on the router may change dynamically, therefore real-time monitoring is necessary to ensure correct implementation and prompt misconfiguration detection of RPKI-based policies. To achieve this, BMP SHOULD report global RPKI enforcement status, RPKI-related validation rules and policies for each peer.

3.3. Route Validation with RPKI

Routers from different vendors implement RPKI-based route validation—including origin validation and path validation —with varying approaches. To facilitate accurate troubleshooting against validation outcomes, BMP SHOULD report the RPKI validation state as well as the related rules that contribute to the state.

3.4. Impact of RPKI Validation on Routing

A router may implement numerous routing policies, resulting in complex routing behavior that obscures the influence of RPKI validation on decision-making. To provide visibility into this impact, BMP should report both intended outcomes and unintended side effects that are caused by the RPKI validation process.

4. RPKI Data Acquisition

BMP SHOULD enumerate all sources of RPKI data on the monitored router. These sources include the RPKI-to-Router (RTR) protocol with RPKI cache servers, static configurations, iBGP sessions with the other router within the same AS, and eBGP sessions with the other ASes (mostly upstream providers). For each source, BMP SHOULD report the following relevant information:

For RTR sources:

For iBGP sources:

For eBGP sources:

For static configuration sources:

To convey this information, a new BMP message type RPKI_SOURCE (Type = TBD1) SHOULD be defined. This message SHALL use the standard BMP common header followed by Type-Length-Value (TLV) elements per [I-D.ietf-grow-bmp-tlv]. TLVs SHALL be grouped per RPKI data source. Each group SHALL use a Group TLV to index Stateless parsing TLVs containing the above fields. A dedicated TLV within each group SHOULD specify the source type to ensure consistency and scalability.

5. RPKI Policy Configuration

BMP SHOULD report the RPKI-related policy configuration, which may be applied globally (uniformly applied across all peers) or on a per-peer basis (For example, only applied to the provider). The reported information SHOULD include:

To convey this information, a new BMP message type RPKI_POLICY (Type = TBD2) SHOULD be defined. For global policy configurations, this message SHALL comprise the BMP common header followed by TLVs that specify the validation rules and the actions associated with each non-valid state (i.e., Invalid and Not-Found), such as filtering, priority reduction, tagging, etc. For per-peer policy configurations, the message SHALL include an additional per-peer header, followed by TLVs that detail the RPKI rules and policies specific to each peer.

Note that since the size of the total validation rule set could be really large, BMP could only convey the route features of enabled validation rules. These features could be logical combination (AND/OR) of a series of conditions (the origin ASes should be within a certain set, the origin ASes should be a certain role such as the customer, the rule source should only be static or iBGP, etc). The network administrator could combine the features and per-route specific information in the next section to obtain the total validation rules.

6. Route Validation with RPKI

BMP SHOULD be extended to report both statistical summaries of validation results on a per-peer basis and detailed validation information for each route. For each peer, BMP messages SHOULD include counts of received routes categorized by their RPKI validation states. To improve clarity and emphasize RPKI-specific data, it is RECOMMENDED that a dedicated RPKI Statistics Message RPKI_STAT(Type = TBD3) be introduced by enhancing the original Statistics Report Message.This message specifically report the following RPKI-related statistics:

This separation enhances readability and could easily extend to support any future RPKI-related objects.

For any individual route, since it may go through multiple types of validations, and may hit multiple validation rules, BMP SHOULD report not only the overall validation state, but also every validation rule which is hit. Therefore, for per-route validation report, it is RECOMMENDED that a dedicated Validation Report Message RPKI_VALIDATION (Type = TBD4) be defined, by enhancing the original Route Monitoring Message with additional TLVs. These TLVs should describe:

Note that if the overall validation state is Valid, the specific validation state for every relevant validation rule should be valid; if the overall validation state is Unknown, there shouldn't be any relevant validation rule; if the overall validation state is Invalid, there should be at least one relevant validation rule whose specific validation state is Invalid.

7. Impact of RPKI Validation on Routing

BMP SHOULD report the consequences of RPKI validation on route selection, with a particular focus on routes whose selection status is altered by RPKI validation:

For each route affected by RPKI validation, the BMP extension SHOULD report:

Furthermore, the BMP message SHOULD include information about the alternate best route:

This facilitates a direct comparison of routing decisions with and without RPKI, thereby enhancing the understanding of RPKI's influence on BGP path selection.

To enable per-route reporting of RPKI's impact on BGP routing, it is RECOMMENDED that a dedicated Validation Impact Message RPKI_IMPACT (Type = TBD5) be defined, by enhancing the original Route Monitoring Message with additional TLVs, to capture changes in route handling due to RPKI validation and policies. When a route is affected—such as being dropped, deprioritized, or superseded by another route-due to RPKI validation, such message could be triggered to report the incident. This message SHOULD include:

8. Security Considerations

8.1. Transmission Security

To ensure the integrity and authenticity of the transmitted monitoring data on RPKI, BMP MUST support the following requirements:

8.2. Operational Security

To ensure the extended BMP aligns with router's original configuration, BMP MUST support the followign requirements:

9. IANA Considerations

This document requires IANA to assign values for new BMP message types (TBD1-TBD5) and their associated TLVs. The registration procedures for these assignments SHALL follow the policy outlined in [RFC7854].

10. References

10.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC4271]
Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, DOI 10.17487/RFC4271, , <https://www.rfc-editor.org/info/rfc4271>.
[RFC5925]
Touch, J., Mankin, A., and R. Bonica, "The TCP Authentication Option", RFC 5925, DOI 10.17487/RFC5925, , <https://www.rfc-editor.org/info/rfc5925>.
[I-D.ietf-sidrops-aspa-verification]
Azimov, A., Bogomazov, E., Bush, R., Patel, K., Snijders, J., and K. Sriram, "BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects", Work in Progress, Internet-Draft, draft-ietf-sidrops-aspa-verification-23, , <https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-23>.
[RFC7854]
Scudder, J., Ed., Fernando, R., and S. Stuart, "BGP Monitoring Protocol (BMP)", RFC 7854, DOI 10.17487/RFC7854, , <https://www.rfc-editor.org/info/rfc7854>.
[RFC6483]
Huston, G. and G. Michaelson, "Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs)", RFC 6483, DOI 10.17487/RFC6483, , <https://www.rfc-editor.org/info/rfc6483>.
[RFC6811]
Mohapatra, P., Scudder, J., Ward, D., Bush, R., and R. Austein, "BGP Prefix Origin Validation", RFC 6811, DOI 10.17487/RFC6811, , <https://www.rfc-editor.org/info/rfc6811>.
[RFC6810]
Bush, R. and R. Austein, "The Resource Public Key Infrastructure (RPKI) to Router Protocol", RFC 6810, DOI 10.17487/RFC6810, , <https://www.rfc-editor.org/info/rfc6810>.
[RFC8210]
Bush, R. and R. Austein, "The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1", RFC 8210, DOI 10.17487/RFC8210, , <https://www.rfc-editor.org/info/rfc8210>.
[I-D.ietf-grow-bmp-tlv]
Lucente, P. and Y. Gu, "BMP v4: TLV Support for BGP Monitoring Protocol (BMP) Route Monitoring and Peer Down Messages", Work in Progress, Internet-Draft, draft-ietf-grow-bmp-tlv-19, , <https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-tlv-19>.

10.2. Informative References

[I-D.ietf-grow-bmp-path-marking-tlv]
Cardona, C., Lucente, P., Francois, P., Gu, Y., and T. Graf, "BMP Extension for Path Status TLV", Work in Progress, Internet-Draft, draft-ietf-grow-bmp-path-marking-tlv-04, , <https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-path-marking-tlv-04>.
[I-D.ietf-grow-bmp-rel]
Lucente, P. and C. Cardona, "Logging of routing events in BGP Monitoring Protocol (BMP)", Work in Progress, Internet-Draft, draft-ietf-grow-bmp-rel-04, , <https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-rel-04>.
[I-D.ietf-grow-bmp-bgp-rib-stats]
Srivastava, M., Liu, Y., Lin, C., and J. Li, "Advanced BGP Monitoring Protocol (BMP) Statistics Types", Work in Progress, Internet-Draft, draft-ietf-grow-bmp-bgp-rib-stats-11, , <https://datatracker.ietf.org/doc/html/draft-ietf-grow-bmp-bgp-rib-stats-11>.

Authors' Addresses

Shuhe Wang
Beijing Zhongguancun Laboratory
Building 8, CourtYard 1, Zhongguancun East Road, Haidian District
Beijing
China
Mingwei Xu
Beijing Zhongguancun Laboratory
Building 8, CourtYard 1, Zhongguancun East Road, Haidian District
Beijing
China
Yangyang Wang
Beijing Zhongguancun Laboratory
Building 8, CourtYard 1, Zhongguancun East Road, Haidian District
Beijing
China
Jia Zhang
Beijing Zhongguancun Laboratory
Building 8, CourtYard 1, Zhongguancun East Road, Haidian District
Beijing
China