Internet-Draft | BMP-RPKI-MON-REQS | February 2025 |
Wang, et al. | Expires 31 August 2025 | [Page] |
This document outlines requirements for extending the BGP Monitoring Protocol (BMP) to provide comprehensive monitoring of RPKI-related processes on routers, including data retrieval from RPKI caches, policy configuration, route validation, and the impact of validation on routing decisions. The proposed extensions aim to standardize RPKI monitoring within BMP, addressing scalability and interoperability limitations in existing implementations.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 31 August 2025.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The Resource Public Key Infrastructure (RPKI) enhances BGP security by enabling cryptographic validation of route origins [RFC6483] [RFC6811] and AS paths [I-D.ietf-sidrops-aspa-verification]. Despite growing adoption of RPKI, standard implementations of the BGP Monitoring Protocol (BMP) [RFC7854] do not natively support monitoring of RPKI-related data. This limitation hampers visibility into RPKI validation processes and their impact on network operations.¶
While existing proposals aim to extend BMP for specific aspects of RPKI monitoring—such as reporting invalid routes [I-D.ietf-grow-bmp-path-marking-tlv] [I-D.ietf-grow-bmp-rel] or providing validation statistics [I-D.ietf-grow-bmp-bgp-rib-stats]—they fall short of offering comprehensive, end-to-end monitoring of the RPKI lifecycle on routers. This document defines requirements and extensions for BMP to monitor four key stages:¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].¶
The BMP extension for RPKI monitoring SHOULD:¶
Consequently, this document identifies four key stages in the RPKI lifecycle on routers which necessitate detailed monitoring and reporting:¶
To ensure accurate and timely retrieval of RPKI data from caches, router operators require BMP to provide real-time, consistent monitoring capabilities. This enables rapid detection and response to faults or outages in cache connectivity. Accordingly, BMP SHOULD report the following information for each RPKI cache connection:¶
Routing policies may change dynamically, necessitating real-time monitoring to ensure correct implementation of RPKI-based policies and prompt detection of misconfigurations. To achieve this, BMP SHOULD report the following details regarding RPKI policy configuration:¶
Routers from different vendors implement RPKI-based route validation—including origin validation and path validation —with varying approaches. To facilitate accurate troubleshooting, verification against expected RPKI validation outcomes, and identification of implementation errors, BMP SHOULD report the following details:¶
A router may implement numerous routing policies, resulting in complex routing behavior that obscures the influence of RPKI validation on decision-making. To provide visibility into this impact, including both intended outcomes and unintended side effects, BMP SHOULD report the following information regarding the effects of RPKI validation on routing decisions:¶
BMP SHOULD enumerate all RPKI caches connected to the router. For each cache connection, BMP SHOULD report the following fields:¶
To convey this information, a new BMP message type **RPKI_CONNECTION_REPORT** (Type = TBD1) SHOULD be defined. This message SHALL use the standard BMP common header followed by Type-Length-Value (TLV) elements per [I-D.ietf-grow-bmp-tlv]. For routers connected to multiple caches, TLVs SHALL be grouped per RTR connection. Each group SHALL use a Group TLV to index Stateless parsing TLVs containing the above fields, thereby ensuring consistency and scalability.¶
BMP SHOULD report the RPKI policy configuration, which may be applied globally (uniformly across all peers) or on a per-peer basis. The reported information SHOULD include:¶
To convey this information, a new BMP message type **RPKI_POLICY_REPORT** (Type = TBD2) SHOULD be defined. For global policy configurations, this message SHALL comprise the BMP common header followed by TLVs that specify the validation rules and the actions associated with each non-valid state (i.e., Invalid and Not-Found), such as filtering, priority reduction, tagging, or no action. For per-peer policy configurations, the message SHALL include an additional per-peer header, followed by TLVs that detail the RPKI policies specific to each peer.¶
BMP SHOULD be extended to report both statistical summaries of validation results on a per-peer basis and detailed validation information for each route. For each peer, BMP messages SHOULD include counts of received routes categorized by their RPKI validation states. Existing proposals, such as [I-D.ietf-grow-bmp-bgp-rib-stats], recommend extending the BMP Statistics Report Message with new Stat Type codes to accommodate RPKI-related statistics.¶
However, to improve clarity and emphasize RPKI-specific data, it is RECOMMENDED that a dedicated **RPKI Statistics Section** be introduced within the BMP Statistics Report Message. This section SHOULD comprise predefined Stat Type TLVs for:¶
This separation enhances readability and facilitates future extensions for additional RPKI-related statistics, such as those pertaining to ASPA or BGPsec.¶
For any individual route, BMP SHOULD report the validation state along with the specific reasons that led to that state. For instance:¶
For per-route validation report, existing drafts propose extending BMP by:¶
To provide comprehensive report of RPKI validation for all routes, it is RECOMMENDED that a dedicated Validation Report Message **RPKI_VALIDATION_REPORT** (Type = TBD3) be defined. This message SHOULD contain TLVs that specify:¶
BMP SHOULD report the consequences of RPKI validation on route selection, with a particular focus on routes whose selection status is altered by RPKI validation:¶
For each route affected by RPKI validation, the BMP extension SHOULD report:¶
Furthermore, the BMP message MAY include information about the alternate best route:¶
This facilitates a direct comparison of routing decisions with and without RPKI, thereby enhancing the understanding of RPKI's influence on BGP path selection.¶
To enable per-route reporting of RPKI's impact on BGP routing, the BMP extension can utilize the event-driven messaging mode proposed in [I-D.ietf-grow-bmp-rel]. A new Reason code **RPKI_IMPACT** (TBD4) SHOULD be defined for the Route Event Message, to capture changes in route handling due to RPKI validation and policies. When a route's treatment is altered due to RPKI—such as being dropped, deprioritized, or superseded by another route—an RPKI-related event SHOULD be generated and conveyed via a Route Event Message. This message SHOULD include:¶
To ensure the integrity and authenticity of the transmitted RPKI data, BMP sessions MUST employ either TCP Authentication Option (TCP-AO) [RFC5925] or Transport Layer Security (TLS). Additionally, implementations SHOULD validate the integrity of RPKI data prior to processing to prevent the propagation of tampered or corrupted information.¶
This document requires IANA to assign values for new BMP message types (TBD1-TBD3), reason code (TBD4) and their associated TLVs. The registration procedures for these assignments SHALL follow the policy outlined in [RFC7854].¶