Internet-Draft ROA-BCP April 2026
Zhang, et al. Expires 8 October 2026 [Page]
Workgroup:
SIDR Operations
Internet-Draft:
draft-zhang-sidrops-rpki-roa-bcp-02
Published:
Intended Status:
Best Current Practice
Expires:
Authors:
H. Zhang
CNNIC
H. Zou
CNIC
L. Zhang
CNNIC
X. Yang
CNNIC
D. Ma
ZDNS
Y. Li
CNIC

Best Current Practice for ROA Issuance Restrictions in RPKI

Abstract

This document specifies best current practices for Resource Public Key Infrastructure (RPKI) operators regarding Route Origin Authorizations (ROAs). It RECOMMENDS that a parent Certification Authority (CA) void issuing ROAs for Internet number resources delegated to a child CA. RPKI certification authorities(CA software) and relying party software are expected to support these practices by appropiate warning.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 3 October 2026.

Table of Contents

1. Introduction

The Resource Public Key Infrastructure (RPKI) [RFC6480] provides a framework to secure the Internet routing by associating IP address blocks with public key certificates. Route Origin Authorizations(ROAs) [RFC9582] allow the holder of an IP prefix to authorize an Autonomous System (AS) to originate routes for that prefix.

In the RPKI hierarchy, IP resources are delegated from a parent Certification Authority (CA) to a child CA. Upon delegation, the child CA typically gains effective operational authority over those resources. However, some RPKI implementations permit parent CAs to issue ROAs for delegated resources, leading to conflicts and undermining the RPKI trust model.

This document establishes a Best Current Practice (BCP) that RECOMMENDS restrictions on ROA issuance by parent CAs for delegated resources, while providing flexible operational guidance to support legitimate BGP practices such as announcing covering prefixes alongside more-specific customer announcements.

1.1. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

2. Problem Statement

When a parent CA delegates resources to a child CA, authority over those resources is generally expected transferred. However, parent CAs sometimes issue ROAs for those delegated resources. This can lead to the following issues:

These issues directly affect the security and stability of the Internet routing system, as RPKI data is used to validate route origins and influence routing decisions.

3. Best Current Practice

To ensure consistency and security in the RPKI ecosystem, the following practices are RECOMMENDED:

4. IANA Considerations

This memo includes no request to IANA.

5. Security Considerations

Failure to enforce ROA issuance restrictions can lead to serious security consequences, including:

This BCP primarily addresses misconfigurations and unintended authority overlaps. It does not prevent all possible actions by a malicious or compromised parent CA, which could still revoke child certificates, shrink resource sets, or re-delegate resources.

Strict enforcement at both the CA and relying party levels is essential to maintaining the integrity of the global routing system. This document reinforces the principle of least authority within the RPKI hierarchy.

6. Special Considerations

In operational environments, organizations may delegate resources internally to subsidiaries or to external customers while needing to announce covering prefixes themselves.

When the more-specific prefix belongs to a different legal entity requiring independent control of its BGP announcements, the parent/child CA model may be necessary. This document does not invalidate such configurations, nor does it impact the validity of BGP announcements containing both covering prefixes and more-specifics. The focus is strictly on minimizing cryptographic authority conflicts to prevent validation ambiguity.

Resources MAY appear on multiple CA certificates for legitimate purposes such as key rollovers and make-before-break transfers.

7. References

7.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/rfc/rfc2119>.
[RFC9582]
Snijders, J., Maddison, B., Lepinski, M., Kong, D., and S. Kent, "A Profile for Route Origin Authorizations (ROAs)", BCP 14, RFC 9582, DOI 10.17487/RFC9582, , <https://www.rfc-editor.org/rfc/rfc9582>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/rfc/rfc8174>.

7.2. Informative References

[RFC6480]
Lepinski, M. and S. Kent, "An Infrastructure to Support Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480, , <https://www.rfc-editor.org/rfc/rfc6480>.
[RFC6811]
Bush, B., "BGP Prefix Origin Validation", RFC 6811, DOI 10.17487/RFC6811, , <https://www.rfc-editor.org/rfc/rfc6811>.
[RFC8211]
Kent, S. and A. Chi, "Adverse Actions by a Certification Authority (CA) or Repository Manager in the Resource Public Key Infrastructure (RPKI)", RFC 8211, DOI 10.17487/RFC8211, , <https://www.rfc-editor.org/rfc/rfc8211>.

Authors' Addresses

Heng Zhang
CNNIC
Hui Zou
CNIC
Likun Zhang
CNNIC
Xue Yang
CNNIC
Di Ma
ZDNS
Yanbiao Li
CNIC