<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-sidrops-rtr-yang-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="YANG Data Model for RTR">YANG Data Model for RPKI to Router Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rtr-yang-04"/>
    <author initials="Y." surname="Liu" fullname="Yisong Liu">
      <organization>China Mobile</organization>
	   <address>
        <postal>
          <street>32 Xuanwumen West Street</street>

          <!-- Reorder these if your country does things differently -->

          <city>Beijing</city>

          <region>Xicheng District</region>

          <code>100053</code>

          <country>China</country>
        </postal>
        <email>liuyisong@chinamobile.com</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
	  <address>
        <postal>
          <street>8 Yongjia North Road</street>
          <city>Beijing</city>
          <region>Haidian District</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>      
    </author>
    <author initials="H." surname="Wang" fullname="Haibo Wang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>rainsword.wang@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Roy" fullname="Jishnu Roy">
      <organization>HPE</organization>
      <address>
        <postal>
          <street>1133 Innovation Way</street>
          <city>Sunnyvale</city>
          <region>CA</region>
          <code>94089</code>
          <country>United States of America</country>
        </postal>
        <email>jishnu.roy@hpe.com</email>
      </address>
    </author>
    <author initials="J." surname="Haas" fullname="Jeffrey Haas">
      <organization>HPE</organization>
	   <address>
        <postal>
          <street>1133 Innovation Way</street>
          <city>Sunnyvale</city>
          <region>CA</region>
          <code>94089</code>
          <country>United States of America</country>
        </postal>
        <email>jeffrey.haas@hpe.com</email>
      </address>
    </author>
    <author initials="H." surname="Liu" fullname="Hongwei Liu">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>liu.hongwei3@zte.com.cn</email>
      </address>
    </author>
    <author initials="D." surname="Ma" fullname="Di Ma">
      <organization>ZDNS</organization>
      <address>
        <postal>
          <street>Floor 21, Block B, Greenland Center</street>
          <city>Chaoyang Beijing, 100102</city>
          <country>China</country>
        </postal>
        <email>madi@zdns.cn</email>
      </address>
    </author>
    <date year="2026" month="April" day="03"/>
    <area>Ops</area>
    <workgroup>SIDROPS Working Group</workgroup>
    <keyword>YANG, RPKI, RTR</keyword>
    <abstract>
      <?line 91?>

<t>This document defines YANG data models for managing
   Resource Public Key Infrastructure (RPKI) to Router Protocol
   (RFC6810 and RFC8210).</t>
    </abstract>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC6810"/> and <xref target="RFC8210"/> describes a protocol to deliver Resource
   Public Key Infrastructure (RPKI) prefix origin data and router keys
   from a trusted cache server to a router, referred to as the RPKI to Router (RTR)
   protocol.</t>
      <t><xref target="I-D.ietf-sidrops-8210bis"/> describes version 2 of the RTR protocol, which
   adds a new Autonomous System Provider Authorization (ASPA)) PDU type.</t>
      <t>This document defines YANG <xref target="RFC7950"/> data models for
   managing RTR protocol (<xref target="RFC6810"/>, <xref target="RFC8210"/>, and
   <xref target="I-D.ietf-sidrops-8210bis"/>).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="model-overview">
      <name>Model Overview</name>
      <t>Two YANG data models are defined in this document.</t>
      <t>The ietf-rpki-rtr.yang data model provides the methods for
   managing RTR protocol. It includes:</t>
      <ul spacing="normal">
        <li>
          <t>Connectivity parameters, such as RPKI cache server IP address and
destination port.</t>
        </li>
        <li>
          <t>Session parameters, such as purge time, refresh time, response
time.</t>
        </li>
        <li>
          <t>Session status and statistics, such as session ID, serial number,
number of received and transmitted messages.</t>
        </li>
      </ul>
      <t>The ietf-rpki-table.yang data model provides the methods for
   managing records of RTR protocol and the corresponding state hash which is a hash value
   used in the Canonical Cache Representation (CCR) content <xref target="I-D.ietf-sidrops-rpki-ccr"/>.
   It includes:</t>
      <ul spacing="normal">
        <li>
          <t>Validated ROA Payload (VRP) records.</t>
        </li>
        <li>
          <t>Router key records.</t>
        </li>
        <li>
          <t>ASPA records.</t>
        </li>
        <li>
          <t>CCR state hash, which is optional and is used to verify the integrity and consistency of RPKI data
originating from the RPKI cache.</t>
        </li>
      </ul>
    </section>
    <section anchor="rpki-to-router-yang-module">
      <name>RPKI to Router YANG Module</name>
      <section anchor="tree-view">
        <name>Tree View</name>
        <t>The complete tree of the "ietf-rpki-rtr" YANG module is
   represented as following. See <xref target="RFC8340"/> for an explanation of the
   symbols used.</t>
        <artwork type="ascii-art"><![CDATA[
module: ietf-rpki-rtr
  augment /rt:routing/rt:control-plane-protocols
            /rt:control-plane-protocol:
    +--rw rpki-rtr
       +--rw sessions
          +--rw session* [server-address]
             +--rw server-address           inet:ip-address
             +--rw server-port?             inet:port-number
             +--rw local-address?           union
             +--rw local-port?              inet:port-number
             +--rw enabled?                 boolean
             +--rw preference?              uint32
             +--rw description?             string
             +--ro session-state?           enumeration
             +--rw enable-authentication?   boolean
             +--rw authentication
             |  +--rw (option)?
             |     +--:(md5)
             |     |  +--rw md5-password?   ianach:crypt-hash
             |     +--:(ssh)
             |     |  +--rw client-identity
             |     |  |  +--rw username?  string
             |     |  |  +--rw public-key!
             |     |  |                   {userauth-publickey}?
             |     |  |  +--rw password!
             |     |  |                   {userauth-password}?
             |     |  |  +--rw hostbased!
             |     |  |                   {userauth-hostbased}?
             |     |  |  +--rw none?      empty {userauth-none}?
             |     |  |  +--rw certificate!
             |     |  |                   {sshcmn:ssh-x509-certs}?
             |     |  +--rw server-authentication
             |     |  |  +--rw ssh-host-keys!
             |     |  |  +--rw ca-certs!  {sshcmn:ssh-x509-certs}?
             |     |  |  +--rw ee-certs!  {sshcmn:ssh-x509-certs}?
             |     |  +--rw transport-params
             |     |  |       {ssh-client-transport-params-config}?
             |     |  +--rw keepalives!   {ssh-client-keepalives}?
             |     |     +--rw max-wait?       uint16
             |     |     +--rw max-attempts?   uint8
             |     +--:(tcp-ao-keychain)
             |        +--rw keychain-name?  key-chain:key-chain-ref
             +--rw vrp-limit
             |  +--rw max-number?              uint64
             |  +--rw threshold-percentage?    uint8
             |  +--rw over-threshold-action?   enumeration
             |  +--rw reconnect-interval?      uint32
             +--rw aspa-limit
             |  +--rw max-number?              uint64
             |  +--rw threshold-percentage?    uint8
             |  +--rw over-threshold-action?   enumeration
             |  +--rw reconnect-interval?      uint32
             +--ro statistics
             |  +--ro total-vrp-records? yang:zero-based-counter64
             |  +--ro ipv4-vrp-records?  yang:zero-based-counter64
             |  +--ro ipv6-vrp-records?  yang:zero-based-counter64
             |  +--ro router-key-records?
             |  |                        yang:zero-based-counter64
             |  +--ro aspa-records? yang:zero-based-counter64
             +--ro connection-data
             |  +--ro flaps?                        uint32
             |  +--ro last-session-up-down?         yang:timestamp
             |  +--ro last-update-sync-timestamp?   yang:timestamp
             |  +--ro last-full-sync-timestamp?     yang:timestamp
             |  +--ro last-serial-query-timestamp?  yang:timestamp
             |  +--ro last-reset-query-timestamp?   yang:timestamp
             |  +--ro last-eod-received?            yang:timestamp
             |  +--ro last-config-change-timestamp? yang:timestamp
             |  +--ro last-error-timestamp?         yang:timestamp
             |  +--ro last-connection-error-timestamp?
             |  |                                   yang:timestamp
             |  +--ro last-connection-timestamp?    yang:timestamp
             |  +--ro error-reason?                 string
             +--ro protocol-data
             |  +--ro protocol-version?   uint32
             |  +--ro refresh-time?       yang:timestamp
             |  +--ro response-time?      yang:timestamp
             |  +--ro purge-time?         yang:timestamp
             |  +--ro hold-time?          yang:timestamp
             |  +--ro record-lifetime?    yang:timestamp
             |  +--ro retry-interval?     uint32
             |  +--ro expire-interval?    uint32
             |  +--ro session-id?         uint16
             |  +--ro serial-full?        uint32
             |  +--ro serial-incremental? uint32
             |  +--ro in-total-messages?  yang:zero-based-counter64
             |  +--ro out-total-messages? yang:zero-based-counter64
             +--ro pdu-counters
             |  +--ro serial-notify?    yang:zero-based-counter64
             |  +--ro cache-response?   yang:zero-based-counter64
             |  +--ro ipv4-prefix?      yang:zero-based-counter64
             |  +--ro ipv6-prefix?      yang:zero-based-counter64
             |  +--ro end-of-data?      yang:zero-based-counter64
             |  +--ro cache-reset?      yang:zero-based-counter64
             |  +--ro reset-query?      yang:zero-based-counter64
             |  +--ro serial-query?     yang:zero-based-counter64
             +--ro error-pdu-counters
                +--ro corrupt-data?      yang:zero-based-counter64
                +--ro internal-error?    yang:zero-based-counter64
                +--ro unsupported-protocol-version?
                |                        yang:zero-based-counter64
                +--ro unsupported-pdu-type?
                |                        yang:zero-based-counter64
                +--ro unexpected-protocol-version?
                |                        yang:zero-based-counter64
                +--ro no-data-available? yang:zero-based-counter64
                +--ro invalid-request?   yang:zero-based-counter64
                +--ro withdrawal-unknown-record?
                |                        yang:zero-based-counter64
                +--ro duplicate-announcement-received?
                                         yang:zero-based-counter64
]]></artwork>
      </section>
      <section anchor="yang-module">
        <name>YANG Module</name>
        <sourcecode type="yang" markers="true" name="ietf-rpki-rtr@2026-03-31.yang"><![CDATA[
module ietf-rpki-rtr {
  yang-version "1.1";
  namespace "urn:ietf:params:xml:ns:yang:ietf-rpki-rtr";
  prefix "rpki-rtr";
  import ietf-yang-types {
    prefix "yang";
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-inet-types {
    prefix "inet";
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-routing {
    prefix rt;
    reference
      "RFC 8349: A YANG Data Model for Routing Management
                 (NMDA Version)";
  }
  import iana-crypt-hash {
    prefix "ianach";
    reference
      "RFC 7317: A YANG Data Model for System Management";
  }
  import ietf-ssh-client {
    prefix "ssh";
    reference
      "RFC 9644: YANG Groupings for SSH Clients and SSH Servers";
  }
  import ietf-interfaces {
    prefix "if";
    reference
      "RFC 8343: A YANG Data Model for Interface Management";
  }
  import ietf-key-chain {
    prefix key-chain;
    reference
      "RFC 8177: YANG Data Model for Key Chains";
  }

  organization
    "IETF Secure Inter-Domain Routing Operations (SIDROPS)
     Working Group";

  contact
    "WG Web:   <https://datatracker.ietf.org/wg/sidrops/>
     WG List:  SIDROPS <mailto:sidrops@ietf.org>

     Editor:   Yisong Liu
               <mailto:liuyisong@chinamobile.com>
     Editor:   Changwang Lin
               <mailto:linchangwang.04414@h3c.com>
     Editor:   Haibo Wang
               <mailto:rainsword.wang@huawei.com>
     Editor:   Jishnu Roy
               <mailto:jishnu.roy@hpe.com>
     Editor:   Jeffrey Haas
               <mailto:jeffrey.haas@hpe.com>
     Editor:   Hongwei Liu
               <mailto:liu.hongwei3@zte.com.cn>
     Editor:   Di Ma
               <mailto:madi@zdns.cn>";

  description
    "This module describes a YANG model for the Resource Public
     Key Infrastructure (RPKI) to Router (RTR) protocol management.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2026 IETF Trust and the persons identified as
     authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry group
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2026-03-31 {
    description
      "Initial Version";
    reference
      "RFC XXXX: YANG Data Model for RPKI to Router Protocol";
  }
  typedef ipv4-pfx-len {
    type uint8 {
      range "0 .. 32";
    }
    description
      "IPv4 Prefix Length.";
  }
  typedef ipv6-pfx-len {
    type uint8 {
      range "0 .. 128";
    }
    description
      "IPv6 Prefix Length.";
  }
  typedef subject-key-id {
    type binary {
      length 20;
    }
    description
      "Subject Key Identifier.";
  }
  identity rpki-rtr {
    base rt:routing-protocol;
    description
      "RTR protocol.";
  }
  grouping records-limit {
    description
      "Limit of records that can be received from the RPKI
       cache server.";
    leaf max-number {
      type uint64;
      description
        "Configures the maximum number of records that can be
         received from the RPKI cache server.";
    }
    leaf threshold-percentage {
      type uint8 {
        range "0..100";
      }
      units "percent";
      description
        "Configures the threshold percentage for record maximum
         number.";
    }
    leaf over-threshold-action {
      type enumeration {
        enum alert-only {
          description
            "Generates alert messages.";
        }
        enum discard {
          description
            "Discards excess records.";
        }
        enum reconnect {
          description
            "Diconncets with the RPKI cache server,
             and tries to reconnect after reconnection
             timer expires.";
        }
        enum idle-forever {
          description
            "Diconncets with the RPKI cache server
             forever.";
        }
      }
      description
        "The action to taken when record number exceeds
         threshold.";
    }
    leaf reconnect-interval {
      type uint32 {
        range "1..30000";
      }
      units "minutes";
      description
        "Time interval for the reconnection timer.";
    }
  }
  augment "/rt:routing/rt:control-plane-protocols/"
        + "rt:control-plane-protocol" {
    when "derived-from-or-self(rt:type, 'rpki-rtr')" {
      description
        "This augmentation is valid for a routing protocol
         instance of RTR.";
    }
    description
      "RTR protocol augmentation of ietf-routing module
       control-plane-protocol.";
    container rpki-rtr {
      description
        "Configuration parameters for the RTR protocol.";
      container sessions {
        description
          "Parameters of RPKI sessions to cache servers.";
        list session {
          key "server-address";
          description
            "Each entry contains parameters for a RPKI session
             identified by the 'server-address' key.";
          leaf server-address {
            type inet:ip-address;
            mandatory true;
            description
              "The IP address of the RPKI cache server resembling
               a session";
          }
          leaf server-port {
            type inet:port-number;
            description
              "The remote port for the connection
               to the RPKI cache server";
          }
          leaf local-address {
            type union {
              type inet:ip-address;
              type if:interface-ref;
            }
            description
              "The local IP (either IPv4 or IPv6) address to use for
               the connection to the RPKI cache server. This may be
               expressed as either an IP address or reference to the
               name of an interface.";
          }
          leaf local-port {
            type inet:port-number;
            description
              "The local port for the connection
               to the RPKI cache server";
          }
          leaf enabled {
            type boolean;
            default "true";
            description
              "Whether the RPKI cache server is enabled.";
          }
          leaf preference {
            type uint32;
            description
              "The router's preference to connect to that cache.
               The lower the value, the more preferred.";
          }
          leaf description {
            type string;
            description
              "Textual description of the RPKI cache server";
          }
          leaf session-state {
            type enumeration {
              enum idle {
                description
                  "The session is down.";
              }
              enum connect {
                description
                  "The session is waiting for the underlying
                   transport session to be established.";
              }
              enum establish {
                description
                  "The session is up.";
              }
              enum ex-incr {
                description
                  "Incremental update of records in progress.";
              }
              enum ex-full {
                description
                  "Full update of records in progress.";
              }
            }
            config false;
            description
              "The session state.";
          }
          leaf enable-authentication {
            type boolean;
            default "false";
            description
              "Whether the session is secured.";
          }
          container authentication {
            when "../enable-authentication = 'true'";
            description
              "Container for describing how a particular session
               is to be secured.";
            choice option {
              description
                "Choice for session secruring methods.";
              case md5 {
                leaf md5-password {
                  type ianach:crypt-hash;
                  description
                    "The password for md5 authentication.";
                }
                description
                  "Uses TCP-MD5 to secure the session.";
              }
              case ssh {
                uses ssh:ssh-client-grouping {
                  reference
                    "RFC 9644: YANG Groupings for SSH Clients and
                               SSH Servers";
                }
                description
                  "Uses SSH to secure the session.";
              }
              case tcp-ao-keychain {
                leaf keychain-name {
                  type key-chain:key-chain-ref;
                  description
                    "Name of key chain.";
                  reference
                    "RFC 8177: YANG Data Model for Key Chains";
                }
                description
                  "Uses key-chain to secure the session.";
              }
            }
          }
          container vrp-limit {
            description
              "Limit of Validated ROA Payload records that can be
               received from the RPKI cache server.";
            uses records-limit;
          }
          container aspa-limit {
            description
              "Limit of Autonomous System Provider Authorization
               (ASPA) records that can be received from the RPKI
               cache server.";
            uses records-limit;
          }
          container statistics {
            config false;
            description
              "Statistics of the RPKI cache server.";
            leaf total-vrp-records {
              type yang:zero-based-counter64;
              description
                "The total number of Validated ROA Payloads
                 received from the RPKI cache server.";
            }
            leaf ipv4-vrp-records {
              type yang:zero-based-counter64;
              description
                "The number of Validated ROA Payloads for IPv4
                 prefixes received from the RPKI cache server.";
            }
            leaf ipv6-vrp-records {
              type yang:zero-based-counter64;
              description
                "The number of Validated ROA Payloads for IPv6
                 prefixes received from the RPKI cache server.";
            }
            leaf router-key-records {
              type yang:zero-based-counter64;
              description
                "The number of router keys received from the RPKI
                 cache server.";
            }
            leaf aspa-records {
              type yang:zero-based-counter64;
              description
                "The number of ASPAs received from the RPKI
                 cache server.";
            }
          }
          container connection-data {
            config false;
            description
              "State information relating to the connection
               with the RPKI cache server.";
            leaf flaps {
              type uint32;
              description
                "Count for number of flaps observed on the
                 session.";
            }
            leaf last-session-up-down {
              type yang:timestamp;
              description
                "This timestamp indicates the time that the
                 RPKI-RTR session last transitioned in or out
                 of the UP state. The value is the timestamp in
                 microseconds relative to the Unix Epoch (Jan 1,
                 1970 00:00:00 UTC). The RPKI-RTR session uptime
                 can be computed by clients as the difference
                 between this value and the current time
                 in UTC (assuming the session is in the UP
                 state, per the session-state leaf).";
              reference
                "RFC 6810: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol";
            }
            leaf last-update-sync-timestamp {
              type yang:timestamp;
              description
                "Time of last serial sync with cache server.";
            }
            leaf last-full-sync-timestamp {
              type yang:timestamp;
              description
                "Time of last reset sync with cache server.";
            }
            leaf last-serial-query-timestamp {
              type yang:timestamp;
              description
                "Time of last serial query sent to cache server.";
            }
            leaf last-reset-query-timestamp {
              type yang:timestamp;
              description
                "Time of last reset query sent to cache server.";
            }
            leaf last-eod-received {
              type yang:timestamp;
              description
                "Time in microseconds at which last EOD was
                 received.";
            }
            leaf last-config-change-timestamp {
              type yang:timestamp;
              description
                "Time of last host, port, VRF or local interface
                 change.";
            }
            leaf last-error-timestamp {
              type yang:timestamp;
              description
                "Time of sending/receiving protocol error to/from
                 cache server.";
            }
            leaf last-connection-error-timestamp {
              type yang:timestamp;
              description
                "Time of last connection error to cache server.";
            }
            leaf last-connection-timestamp {
              type yang:timestamp;
              description
                "Time of last connection to cache server.";
            }
            leaf error-reason {
              type string;
              description
                "Reason for error in connection.";
            }
          }
          container protocol-data {
            config false;
            description
              "State parameters related to the RTR protocol";
            leaf protocol-version {
              type uint32;
              description
                "The version number of the RTR protocol.";
            }
            leaf refresh-time {
              type yang:timestamp;
              description
                "Configures the time a router waits in between
                 sending periodic serial queries to the RPKI
                 cache server.";
            }
            leaf response-time {
              type yang:timestamp;
              description
                "Configures the time a router waits for a response
                 after sending a serial or reset query to the RPKI
                 cache server.";
            }
            leaf purge-time {
              type yang:timestamp;
              description
                "Configures the time a router waits to keep data
                 from the RPKI cache server after the session
                 drops.";
            }
            leaf hold-time {
              type yang:timestamp;
              description
                "Hold-time for this session.";
            }
            leaf record-lifetime {
              type yang:timestamp;
              description
                "Record-lifetime this session.";
            }
            leaf retry-interval {
              type uint32;
              description
                "Number of seconds between poll error and cache
                 server poll";
            }
            leaf expire-interval {
              type uint32;
              description
                "Number of seconds to retain data synced from
                 cache server";
            }
            leaf session-id {
              type uint16;
              config false;
              description
                "When a cache server is started, it generates a
                 Session ID to identify the instance of the cache
                 and to bind it to the sequence of Serial Numbers
                 that cache instance will generate.";
              reference
                "RFC 6810: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol
                 RFC 8210: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol, Version 1";
            }
            leaf serial-full {
              type uint32;
              config false;
              description
                "A 32-bit strictly increasing unsigned integer which
                 wraps from 2^32-1 to 0. It denotes the logical
                 version of a cache. It resembles the latest full
                 query.";
              reference
                "RFC 6810: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol
                 RFC 8210: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol, Version 1";
            }
            leaf serial-incremental {
              type uint32;
              config false;
              description
                "A 32-bit strictly increasing unsigned integer which
                 wraps from 2^32-1 to 0. It denotes the logical
                 version of a cache. It resembles the latest
                 incremental query.";
              reference
                "RFC 6810: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol
                 RFC 8210: The Resource Public Key Infrastructure
                           (RPKI) to Router Protocol, Version 1";
            }
            leaf in-total-messages {
              type yang:zero-based-counter64;
              description
                "The total number of messages received from the
                 RPKI cache server.";
            }
            leaf out-total-messages {
              type yang:zero-based-counter64;
              description
                "The total number of messages transmitted to the
                 RPKI cache server.";
            }
          }
          container pdu-counters {
            config false;
            description
              "Counters of PDUs that are received from cache";
            leaf serial-notify {
              type yang:zero-based-counter64;
              description
                "Serial notify PDU count";
            }
            leaf cache-response {
              type yang:zero-based-counter64;
              description
                "Cache response PDU count";
            }
            leaf ipv4-prefix {
              type yang:zero-based-counter64;
              description
                "IPv4 prefix PDU count";
            }
            leaf ipv6-prefix {
              type yang:zero-based-counter64;
              description
                "Ipv6 prefix PDU count";
            }
            leaf end-of-data {
              type yang:zero-based-counter64;
              description
                "End of data PDU count";
            }
            leaf cache-reset {
              type yang:zero-based-counter64;
              description
                "Cache reset PDU count";
            }
            leaf reset-query {
              type yang:zero-based-counter64;
              description
                "Reset query PDU count";
            }
            leaf serial-query {
              type yang:zero-based-counter64;
              description
                "Serial query PDU count";
            }
          }
          container error-pdu-counters {
            config false;
            description
              "Counters of error PDUs that originate from router
               or cache server";
            leaf corrupt-data {
              type yang:zero-based-counter64;
              description
                "Corrupt data PDU count";
            }
            leaf internal-error {
              type yang:zero-based-counter64;
              description
                "Internal error PDU count";
            }
            leaf unsupported-protocol-version {
              type yang:zero-based-counter64;
              description
                "Unsupported protocol version PDU count";
            }
            leaf unsupported-pdu-type {
              type yang:zero-based-counter64;
              description
                "Unsupported PDU type count";
            }
            leaf unexpected-protocol-version {
              type yang:zero-based-counter64;
              description
                "Unexpected protocol version PDU count";
            }
            leaf no-data-available {
              type yang:zero-based-counter64;
              description
                "No data available PDU count";
            }
            leaf invalid-request {
              type yang:zero-based-counter64;
              description
                "Invalid request PDU count";
            }
            leaf withdrawal-unknown-record {
              type yang:zero-based-counter64;
              description
                "Withdrawal of unknown record PDU count";
            }
            leaf duplicate-announcement-received {
              type yang:zero-based-counter64;
              description
                "Duplicate announcement received PDU count";
            }
          }
        }
      }
    }
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="rpki-table-yang-module">
      <name>RPKI Table YANG Module</name>
      <section anchor="tree-view-1">
        <name>Tree View</name>
        <t>The complete tree of the "ietf-rpki-table" YANG module is
   represented as following. See <xref target="RFC8340"/> for an explanation of the
   symbols used.</t>
        <artwork type="ascii-art"><![CDATA[
module: ietf-rpki-table
  augment /rt:routing:
    +--ro vrp-tables
    |  +--ro vrp-table* [name]
    |     +--ro name                      string
    |     +--ro ccr-roapayloadstate-hash? ccr-hash
    |     +--ro ipv4
    |     |  +--ro vrps
    |     |  |  +--ro vrp* [prefix max-len asn source]
    |     |  |     +--ro prefix       inet:ipv4-prefix
    |     |  |     +--ro max-len      ipv4-pfx-len
    |     |  |     +--ro asn          inet:as-number
    |     |  |     +--ro source       union
    |     |  +--ro total-records?     yang:gauge32
    |     |  +--ro records-added?     yang:counter64
    |     |  +--ro records-deleted?   yang:counter64
    |     +--ro ipv6
    |        +--ro vrps
    |        |  +--ro vrp* [prefix max-len asn source]
    |        |     +--ro prefix       inet:ipv6-prefix
    |        |     +--ro max-len      ipv6-pfx-len
    |        |     +--ro asn          inet:as-number
    |        |     +--ro source       union
    |        +--ro total-records?     yang:gauge32
    |        +--ro records-added?     yang:counter64
    |        +--ro records-deleted?   yang:counter64
    +--ro router-key-tables
    |  +--ro router-key-table* [name]
    |     +--ro name                     string
    |     +--ro ccr-routerkeystate-hash? ccr-hash
    |     +--ro router-keys
    |        +--ro router-key* [ski asn key server-address]
    |           +--ro ski            subject-key-id
    |           +--ro asn            inet:as-number
    |           +--ro key            string
    |           +--ro server-address inet:ip-address
    +--ro aspa-tables
       +--ro aspa-table* [name]
          +--ro name                       string
          +--ro ccr-aspapayloadstate-hash? ccr-hash
          +--ro aspas* [customer-asn]
             +--ro customer-asn        inet:as-number
             +--ro server-address?     inet:ip-address
             +--ro provider-asns* [provider-asn]
                +--ro provider-asn     inet:as-number
]]></artwork>
      </section>
      <section anchor="yang-module-1">
        <name>YANG Module</name>
        <sourcecode type="yang" markers="true" name="ietf-rpki-table@2026-03-31.yang"><![CDATA[
module ietf-rpki-table {
  yang-version "1.1";
  namespace "urn:ietf:params:xml:ns:yang:ietf-rpki-table";
  prefix "rpki-table";
  import ietf-yang-types {
    prefix "yang";
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-inet-types {
    prefix "inet";
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-routing {
    prefix rt;
    reference
      "RFC 8349: A YANG Data Model for Routing Management
                 (NMDA Version)";
  }

  organization
    "IETF Secure Inter-Domain Routing Operations (SIDROPS)
     Working Group";

  contact
    "WG Web:   <https://datatracker.ietf.org/wg/sidrops/>
     WG List:  SIDROPS <mailto:sidrops@ietf.org>

     Editor:   Yisong Liu
               <mailto:liuyisong@chinamobile.com>
     Editor:   Changwang Lin
               <mailto:linchangwang.04414@h3c.com>
     Editor:   Haibo Wang
               <mailto:rainsword.wang@huawei.com>
     Editor:   Jishnu Roy
               <mailto:jishnu.roy@hpe.com>
     Editor:   Jeffrey Haas
               <mailto:jeffrey.haas@hpe.com>
     Editor:   Hongwei Liu
               <mailto:liu.hongwei3@zte.com.cn>
     Editor:   Di Ma
               <mailto:madi@zdns.cn>";

  description
    "This module describes a YANG model for the Resource Public
     Key Infrastructure (RPKI) to Router (RTR) protocol data
     management.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2026 IETF Trust and the persons identified as
     authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry group
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2026-03-31 {
    description
      "Initial Version";
    reference
      "RFC XXXX: YANG Data Model for RPKI to Router Protocol";
  }
  typedef ipv4-pfx-len {
    type uint8 {
      range "0 .. 32";
    }
    description
      "IPv4 Prefix Length.";
  }
  typedef ipv6-pfx-len {
    type uint8 {
      range "0 .. 128";
    }
    description
      "IPv6 Prefix Length.";
  }
  typedef subject-key-id {
    type binary {
      length 20;
    }
    description
      "Subject Key Identifier.";
  }
  typedef ccr-hash {
    type binary {
      length 32;
    }
    description
      "Canonical Cache Representation (CCR) state hash.

       This represents a 256-bit SHA-256 hash of the canonical
       representation of RPKI data as defined in RFC YYYY.

       The hash provides a compact, verifiable representation
       of the complete state of RPKI validation data, enabling
       efficient synchronization and consistency verification
       between caches.";
    reference
      "RFC YYYY: A Profile for Resource Public Key Infrastructure
                 (RPKI) Canonical Cache Representation (CCR)";
  }
  grouping aspa-overall-records {
    description
      "Autonomous System Provider Authorization (ASPA) records
       received from all RPKI cache servers.";
    list aspas {
      key "customer-asn";
      description
        "An entry of ASPA.";
      leaf customer-asn {
        type inet:as-number;
        description
          "The AS number of a customer.";
      }
      leaf server-address {
        type inet:ip-address;
        description
          "IP address of the RPKI cache server.";
      }
      list provider-asns {
        key "provider-asn";
        description
          "Providers of the customer.";
        leaf provider-asn {
          type inet:as-number;
          description
            "The AS number of a provider.";
        }
      }
    }
  }

  augment "/rt:routing" {
    description
      "RPKI tables augmentation of ietf-routing module.";
    container vrp-tables {
      config false;
      description
        "List of tables containing Validated ROA Payloads
         received from all RPKI cache servers.";
      list vrp-table {
        key "name";
        description
          "Table of Validated ROA Payloads received from
           all RPKI cache servers.";
        leaf name {
          type string;
          description
            "Name of the Validated ROA Payload table.";
        }
        leaf ccr-roapayloadstate-hash {
          type ccr-hash;
          description
            "CCR state hash for the ROA payload.

             This hash represents the canonical state of this
             specific ROA entry as defined in the CCR specification.
             It is optional and can be used to verify the integrity
             and consistency of ROA data originating from the RPKI
             cache.";
          reference
            "RFC YYYY: A Profile for Resource Public Key
                       Infrastructure (RPKI) Canonical Cache
                       Representation (CCR)";
        }
        container ipv4 {
          config false;
          description
            "Container for IPv4 Validated ROA Payloads table.";
          container vrps {
            config false;
            description
              "Validated ROA Payloads received from the RPKI
               cache server.";
            list vrp {
              key "prefix max-len asn source";
              description
                "An entry of Validated ROA Payload.";
              leaf prefix {
                type inet:ipv4-prefix;
                description
                  "The IPv4 prefix of the Validated ROA
                   Payload.";
              }
              leaf max-len {
                type ipv4-pfx-len;
                description
                  "Denotes the longest prefix allowed. This
                   MUST NOT be less than the prefix length.";
              }
              leaf asn {
                type inet:as-number;
                description
                  "The origin AS number of the Validated ROA
                   Payload.";
              }
              leaf source {
                type union {
                  type string;
                  type inet:ip-address;
                }
                description
                  "String representing the source of the records
                   in this record-set.";
              }
            }
          }
          leaf total-records {
            type yang:gauge32;
            description
              "Number of prefix policy records.";
          }
          leaf records-added {
            type yang:counter64;
            description
              "Number of prefix policy records cumulatively added.";
          }
          leaf records-deleted {
            type yang:counter64;
            description
              "Number of prefix policy records cumulatively
               deleted.";
          }
        }
        container ipv6 {
          config false;
          description
            "Container for IPv6 Validated ROA Payloads table.";
          container vrps {
            config false;
            description
              "Validated ROA Payloads received from the RPKI cache
               server.";
            list vrp {
              key "prefix max-len asn source";
              description
                "An entry of Validated ROA Payload.";
              leaf prefix {
                type inet:ipv6-prefix;
                description
                  "The IPv6 prefix of the Validated ROA Payload.";
              }
              leaf max-len {
                type ipv6-pfx-len;
                description
                  "Denotes the longest prefix allowed. This
                   MUST NOT be less than the prefix length.";
              }
              leaf asn {
                type inet:as-number;
                description
                  "The origin AS number of the Validated ROA
                   Payload.";
              }
              leaf source {
                type union {
                  type string;
                  type inet:ip-address;
                }
                description
                  "Representing the source of the records in this
                   record-set. Either a server IP or a source file
                   of static records.";
              }
            }
          }
          leaf total-records {
            type yang:gauge32;
            description
              "Number of prefix policy records.";
          }
          leaf records-added {
            type yang:counter64;
            description
              "Number of prefix policy records cumulatively added.";
          }
          leaf records-deleted {
            type yang:counter64;
            description
              "Number of prefix policy records cumulatively
               deleted.";
          }
        }
      }
    }
    container router-key-tables {
      config false;
      description
        "List of router key table received from all RPKI cache
         servers.";
      list router-key-table {
        key "name";
        description
          "Table of router keys received from all RPKI cache
           servers.";
        leaf name {
          type string;
          description
            "Name of the router key table.";
        }
        leaf ccr-routerkeystate-hash {
          type ccr-hash;
          description
            "CCR state hash for the Router Key payload.

             This hash represents the canonical state of this
             specific Router Key entry as defined in the CCR
             specification. It is optional and can effectively
             verify the consistency of BGPsec router key data
             derived from the RPKI cache.";
          reference
            "RFC YYYY: A Profile for Resource Public Key
                       Infrastructure (RPKI) Canonical Cache
                       Representation (CCR)";
        }
        container router-keys {
          config false;
          description
            "Router keys received from the RPKI cache server.";
          list router-key {
            key "ski asn key server-address";
            description
              "An entry of router key.";
            leaf ski {
              type subject-key-id;
              description
                "A router key's Subject Key Identifier (SKI).";
              reference
                "RFC 6487: A Profile for X.509 PKIX Resource
                           Certificates";
            }
            leaf asn {
              type inet:as-number;
              description
                "The AS number of the router which the key
                 belongs to.";
            }
            leaf key {
              type string;
              description
                "A router key's subjectPublicKeyInfo value.";
              reference
                "RFC 8608: BGPsec Algorithms, Key Formats, and
                           Signature Formats";
            }
            leaf server-address {
              type inet:ip-address;
              description
                "IP address of the RPKI cache server.";
            }
          }
        }
      }
    }
    container aspa-tables {
      config false;
      description
        "List of tables of ASPAs received from all RPKI cache
         servers.";
      list aspa-table {
        key "name";
        description
          "Table of ASPAs received from all RPKI cache servers.";
        leaf name {
          type string;
          description
            "Name of the ASPA table.";
        }
        leaf ccr-aspapayloadstate-hash {
          type ccr-hash;
          description
            "CCR state hash for the ASPA payload.

             This hash represents the canonical state of this
             specific ASPA entry as defined in the CCR
             specification. It is optional and facilitates
             consistency checking for AS path validation data
             originating from the RPKI cache.";
          reference
            "RFC YYYY: A Profile for Resource Public Key
                       Infrastructure (RPKI) Canonical Cache
                       Representation (CCR)";
        }
        uses aspa-overall-records;
      }
    }
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to the RFC Editor - remove this section before publication, as
   well as remove the reference to <xref target="RFC7942"/>.</t>
      <t>This section records the status of known implementations of the
   protocol defined by this specification at the time of posting of this
   Internet-Draft, and is based on a proposal described in <xref target="RFC7942"/>.
   The description of implementations in this section is intended to
   assist the IETF in its decision processes in progressing drafts to
   RFCs. Please note that the listing of any individual implementation
   here does not imply endorsement by the IETF. Furthermore, no effort
   has been spent to verify the information presented here that was
   supplied by IETF contributors. This is not intended as, and must not
   be construed to be, a catalog of available implementations or their
   features. Readers are advised to note that other implementations may
   exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups
   to assign due consideration to documents that have the benefit of
   running code, which may serve as evidence of valuable experimentation
   and feedback that have made the implemented protocols more mature.
   It is up to the individual working groups to use this information as
   they see fit".</t>
      <section anchor="juniper-networks-hpe">
        <name>Juniper Networks (HPE)</name>
        <ul spacing="normal">
          <li>
            <t>Organization: Juniper Networks (HPE).</t>
          </li>
          <li>
            <t>Implementation: The following leaves/parameters in description are implemented.</t>
          </li>
          <li>
            <t>Description: YANG model leaves that are supported:
            </t>
            <ul spacing="normal">
              <li>
                <t>Ietf-rpki-rtr.yang</t>
              </li>
            </ul>
            <artwork type="ascii-art"><![CDATA[
     Server-address
     Session-state
     Total-vrp-records
     Ipv4-vrp-records
     Ipv6-vrp-records
     Refresh-time
     Hold-time
     Serial-incremental
     Serial-full
     Last-session-up-down
     Las-update-sync-timestamp
     Last-eod-received
     Last-serial-query-timestamp
     Last-reset-query-timestamp
     Flaps
]]></artwork>
            <ul spacing="normal">
              <li>
                <t>Ietf-rpki-table.yang</t>
              </li>
            </ul>
            <artwork type="ascii-art"><![CDATA[
     Ipv4 | ipv6: 
       Total-records
       Records-added
       Records-deleted.
]]></artwork>
          </li>
          <li>
            <t>Maturity Level: Ready-for-deployment</t>
          </li>
          <li>
            <t>Coverage:</t>
          </li>
          <li>
            <t>Version: Draft-03</t>
          </li>
          <li>
            <t>Licensing: N/A</t>
          </li>
          <li>
            <t>Implementation experience: Nothing specific.</t>
          </li>
          <li>
            <t>Contact: jishnu.roy@hpe.com</t>
          </li>
          <li>
            <t>Last updated: March 30, 2026</t>
          </li>
        </ul>
      </section>
      <section anchor="new-h3c-technologies">
        <name>New H3C Technologies</name>
        <ul spacing="normal">
          <li>
            <t>Organization: New H3C Technologies.</t>
          </li>
          <li>
            <t>Implementation: The following leaves/parameters in description are implemented.</t>
          </li>
          <li>
            <t>Description: "ietf-rpki-rtr" and "ietf-rpki-table" YANG modules
have been implemented in above-mentioned New H3C Products.</t>
          </li>
          <li>
            <t>Maturity Level: Ready-for-deployment</t>
          </li>
          <li>
            <t>Coverage: All data nodes of "ietf-rpki-rtr" and "ietf-rpki-table" YANG modules.</t>
          </li>
          <li>
            <t>Version: Draft-03</t>
          </li>
          <li>
            <t>Licensing: N/A</t>
          </li>
          <li>
            <t>Implementation experience: Nothing specific.</t>
          </li>
          <li>
            <t>Contact: li_meng_limeng@h3c.com</t>
          </li>
          <li>
            <t>Last updated: March 30, 2026</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section is modeled after the template described in Section 3.7.1
   of <xref target="RFC9907"/>.</t>
      <t>The "ietf-rpki-rtr" YANG module and "ietf-rpki-table" YANG module
   define data models that are designed to be accessed via YANG-based
   management protocols, such as Network Configuration
   Protocol (NETCONF) <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>.
   These YANG-based management protocols (1) have to use a secure transport layer
   (e.g., Secure Shell (SSH) <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>)
   and (2) have to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
   provides the means to restrict access for particular NETCONF or
   RESTCONF users to a preconfigured subset of all available NETCONF or
   RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in these YANG modules that
   are writable/creatable/deletable (i.e., config true, which is the
   default). All writable data nodes are likely to be sensitive or vulnerable
   in some network environments. Write operations (e.g., edit-config) and
   delete operations to these data nodes without proper protection or 
   authentication can have a negative effect on network operations.
   The following subtrees and data nodes have particular sensitivities/vulnerabilities:</t>
      <artwork><![CDATA[
  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:server-address

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:server-port

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:local-address

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:local-port

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:enabled

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:preference

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:description

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:enable-authentication

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:authentication

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:vrp-limit

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:aspa-limit
]]></artwork>
      <t>Some of the readable data nodes in these YANG modules may be
   considered sensitive or vulnerable in some network environments. It
   is thus important to control read access (e.g., via get, get-config,
   or notification) to these data nodes. Specifically, the following
   subtrees and data nodes have particular
   sensitivities/vulnerabilities:</t>
      <artwork><![CDATA[
  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:session-state

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:statistics

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:connection-data

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:protocol-data

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:pdu-counters

  rpki-rtr:rpki-rtr/rpki-rtr:sessions/rpki-rtr:session/rpki-
  rtr:error-pdu-counters

  rt:routing/rpki-table:vrp-tables/rpki-table:vrp-table

  rt:routing/rpki-table:router-key-tables/rpki-table:router-key-
  table

  rt:routing/rpki-table:aspa-tables/rpki-table:aspa-table
]]></artwork>
      <t>There are no particularly sensitive RPC or action operations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="rpki-to-router-yang-module-registry">
        <name>RPKI to Router YANG Module Registry</name>
        <t>IANA is requested to register the following URI in the "ns" registry
   within the "IETF XML Registry" group (<xref target="RFC3688"/>):</t>
        <artwork type="ascii-art"><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-rpki-rtr
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace
]]></artwork>
        <t>IANA is requested to register the following YANG modules in the
   "YANG Module Names" registry (<xref target="RFC6020"/>) within the "YANG
   Parameters" registry group.</t>
        <artwork type="ascii-art"><![CDATA[
   Name: ietf-rpki-rtr
   Maintained by IANA? N
   Namespace: urn:ietf:params:xml:ns:yang:ietf-rpki-rtr
   Prefix: rpki-rtr
   Reference: RFC XXXX
]]></artwork>
      </section>
      <section anchor="rpki-table-yang-module-registry">
        <name>RPKI Table YANG Module Registry</name>
        <t>IANA is requested to register the following URI in the "ns" registry
   within the "IETF XML Registry" group (<xref target="RFC3688"/>):</t>
        <artwork type="ascii-art"><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-rpki-table
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace
]]></artwork>
        <t>IANA is requested to register the following YANG module in the "YANG
   Module Names" registry (<xref target="RFC6020"/>) within the "YANG Parameters"
   registry group.</t>
        <artwork type="ascii-art"><![CDATA[
   Name: ietf-rpki-table
   Maintained by IANA? N
   Namespace: urn:ietf:params:xml:ns:yang:ietf-rpki-table
   Prefix: rpki-table
   Reference: RFC XXXX
]]></artwork>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Job Snijders, Santosh Kolenchery,
Ebben Xavier Aries, Tapasee Ratna Goutam and Haiyang Zhang for their
review and discussion of this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3688" target="https://www.rfc-editor.org/info/rfc3688" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3688.xml">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020" target="https://www.rfc-editor.org/info/rfc6020" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6020.xml">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6810" target="https://www.rfc-editor.org/info/rfc6810" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6810.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6810"/>
          <seriesInfo name="DOI" value="10.17487/RFC6810"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7950.xml">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="RFC8341" target="https://www.rfc-editor.org/info/rfc8341" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8341.xml">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-8210bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-8210bis-25" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-8210bis.xml">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 2</title>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Arrcus, DRL, &amp; IIJ Research</organization>
            </author>
            <author fullname="Rob Austein" initials="R." surname="Austein">
              <organization>Dragon Research Labs</organization>
            </author>
            <author fullname="Tom Harrison" initials="T." surname="Harrison">
              <organization>Asia Pacific Network Information Centre</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>In order to validate the origin Autonomous Systems (ASes) and Autonomous System relationships behind BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC6480) prefix origin data, Router Keys, and ASPA data from a trusted cache. This document describes a protocol to deliver them. This document describes version 2 of the RPKI-Router protocol. [RFC6810] describes version 0, and [RFC8210] describes version 1. This document is compatible with both.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-8210bis-25"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4252" target="https://www.rfc-editor.org/info/rfc4252" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4252.xml">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6241.xml">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC7942" target="https://www.rfc-editor.org/info/rfc7942" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC8040" target="https://www.rfc-editor.org/info/rfc8040" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8040.xml">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8340" target="https://www.rfc-editor.org/info/rfc8340" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8340.xml">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9907" target="https://www.rfc-editor.org/info/rfc9907" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9907.xml">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="March" year="2026"/>
            <abstract>
              <t>This document provides guidelines for authors and reviewers of specifications containing YANG data models, including IANA-maintained YANG modules. Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules.</t>
              <t>This document obsoletes RFC 8407; it also updates RFC 8126 by providing additional guidelines for writing the IANA considerations for RFCs that specify IANA-maintained YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="9907"/>
          <seriesInfo name="DOI" value="10.17487/RFC9907"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-rpki-ccr" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-ccr-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-rpki-ccr.xml">
          <front>
            <title>A Profile for Resource Public Key Infrastructure (RPKI) Canonical Cache Representation (CCR)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Bart Bakker" initials="B." surname="Bakker">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Tim Bruijnzeels" initials="T." surname="Bruijnzeels">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Theo Buehler" initials="T." surname="Buehler">
              <organization>OpenBSD</organization>
            </author>
            <date day="4" month="December" year="2025"/>
            <abstract>
              <t>This document specifies a Canonical Cache Representation (CCR) content type for use with the Resource Public Key Infrastructure (RPKI). CCR is a DER-encoded data interchange format which can be used to represent various aspects of the state of a validated cache at a particular point in time. The CCR profile is a compact and versatile format well-suited for a diverse set of applications such as audit trail keeping, validated payload dissemination, and analytics pipelines.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-ccr-02"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="M." surname="Chen" fullname="Mengxiao Chen">
        <organization>H3C</organization>
        <address>
          <postal>
            <country>China</country>
          </postal>
          <email>chen.mengxiao@h3c.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
