Internet-Draft | Guidelines for RPKI CA Operators | August 2025 |
Sweetser | Expires 3 March 2026 | [Page] |
This document provides operational guidelines for Resource Public Key Infrastructure (RPKI) delegated Certification Authorities (CAs) and registry operators managing such delegations. It addresses common operational issues including CA availability problems, publication quality issues, and lifecycle management. The guidelines aim to improve the overall health and efficiency of the RPKI ecosystem by establishing best practices for CA operations and delegation management.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 3 March 2026.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The Resource Public Key Infrastructure (RPKI) [RFC6480] provides a framework for securing Internet routing through cryptographic attestation of IP address and AS number allocations. Regional Internet Registries (RIRs) and National Internet Registries (NIRs) may delegate RPKI certification authority (CA) operations to resource holders, allowing them to manage their own certificate issuance and publication.¶
While RPKI delegation provides operational flexibility and autonomy for resource holders, it also introduces potential failure modes that can negatively impact the broader RPKI ecosystem. Poorly operated delegated CAs can cause significant resource waste for RPKI validators, degrade overall system performance, and undermine confidence in RPKI deployment.¶
This document establishes operational guidelines for both delegated CA operators and registry operators managing such delegations. The guidelines address common operational issues including CA availability problems, publication inconsistencies, and lifecycle management challenges.¶
The recommendations in this document are based on operational experience from RPKI deployments worldwide and analysis of problematic CA behaviors observed in production systems.A¶
[RFC6481] will inform readers of requirements on repository content structure, directory structure, naming of directories and managaing rollovers.¶
[RFC8182] provides details of efficient alternative to [RFC5781][rsync] and key operational efficiencies like caching and CDN deployment.¶
As as of writing this I-D session desynchronization issues are being handled under [RFC9697].¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This document uses the following terms:¶
Delegated CA: A certification authority that has been delegated RPKI certificate issuance authority by a registry operator, and is operated by the resource holder rather than the registry.¶
Registry Operator: An organization (typically an RIR or NIR) that delegates RPKI CA authority to resource holders and maintains oversight of such delegations.¶
Publication Point: A repository location where RPKI objects (certificates, manifests, CRLs, ROAs, etc.) are published and made available to relying parties.¶
Flapping CA: A delegated CA that exhibits rapid or frequent changes in operational state, causing instability for relying party validators.¶
Dead CA: A delegated CA that is persistently non-functional or unreachable for extended periods.¶
Manifest: An RPKI signed object that lists the contents of a publication repository and provides integrity protection [RFC9286].¶
Relying Party (RP): An entity that uses RPKI data to make routing decisions, typically through RPKI validator software.¶
Current RPKI delegation practices allow for several problematic operational scenarios that negatively impact the RPKI ecosystem. Analysis of production RPKI systems has identified recurring patterns of CA misbehavior that waste validator resources and degrade system performance.¶
Delegated CAs may experience various availability problems:¶
Dead CAs: Some delegated CAs become completely offline for extended periods (weeks to months), yet remain referenced in the RPKI hierarchy. RPKI validators continue attempting to fetch data from these CAs, resulting in hundreds of thousands of failed synchronization attempts over time.¶
Flapping CAs: Certain delegated CAs exhibit intermittent availability patterns, rapidly cycling between online and offline states. This "flapping" behavior causes cache thrashing in RPKI validators and creates uncertainty about the current state of published objects.¶
Slow CAs: Some delegated CAs respond to requests but with excessive latency, causing validator timeouts and retry storms. These CAs may appear functional but create significant operational burden.¶
Partial Failures: Delegated CAs may have some publication endpoints functioning while others fail, leading to inconsistent data availability and validator confusion.¶
Beyond availability, delegated CAs may exhibit poor publication practices:¶
Stale Manifests: CAs that rarely update their manifests cause validators to repeatedly attempt synchronization of unchanged data, wasting network bandwidth and processing resources.¶
Inconsistent Publication: CAs may publish incomplete or inconsistent object sets, with manifests referencing objects that are not available or publishing objects not listed in manifests.¶
Clock Skew: CAs with incorrect system time may publish objects with validity periods that cause premature expiration or rejection by validators.¶
Malformed Objects: CAs may publish syntactically invalid or incorrectly signed objects, causing validator errors and potentially undermining security.¶
Several operational practices by delegated CAs create ecosystem-wide problems:¶
Resource Churn: Frequent unnecessary certificate reissuance creates processing overhead for validators and may indicate poor operational practices.¶
Publication Storms: Bulk updates that overwhelm validators or publication infrastructure, often due to poor change management.¶
Inconsistent Policies: Conflicting or rapidly changing ROA/ASPA publications that create uncertainty for relying parties.¶
Delegated CA operators MUST implement robust infrastructure to ensure reliable service delivery¶
Delegated CA operators MUST follow disciplined publication practices to minimize validator burden:¶
Delegated CA operators MUST ensure the integrity and consistency of all published RPKI objects:¶
Flapping behavior represents one of the most disruptive operational problems for RPKI validators. CA operators and registry operators MUST implement measures to detect and prevent flapping behaviors.¶
Common flapping patterns include:¶
CA Operator Anti-Flapping Measures:¶
Registry Operator Flapping Detection:¶
Persistently non-functional CAs create significant waste in the RPKI ecosystem and MUST be managed through clear lifecycle policies.¶
A CA SHOULD be considered persistently non-functional if: - Valid manifest and CRL cannot be retrieved for more than 60 days - Multiple publication points are consistently unreachable - Published objects consistently fail validation - No response to operational communications for extended periods¶
CA operators MUST ensure their infrastructure provides adequate performance for the global validator ecosystem.¶
Delegated CA operators MUST implement comprehensive monitoring of their infrastructure and operations.¶
CA operators MUST implement alerting for:¶
Monitoring Infrastructure:¶
Registry operators MUST implement monitoring systems to oversee all delegated CAs under their authority.¶
Registry operators MUST monitor:¶
RPKI validator operators are encouraged to implement monitoring that can help identify problematic CAs.¶
Registry operators MUST establish clear requirements for CA delegation to ensure operational readiness.¶
Before approving delegation requests, registry operators SHOULD verify:¶
Documentation Requirements:¶
Validation Process:¶
Delegated CA operators MUST maintain high operational standards throughout the lifecycle of their delegation.¶
CA operators planning to discontinue operations MUST follow established procedures to minimize ecosystem disruption.¶
For planned CA retirement:¶
Registry operators bear responsibility for oversight of delegated CAs and enforcement of operational standards.¶
Registry operators MUST:¶
Registry operators SHOULD implement progressive enforcement: 1. Automated monitoring alerts and initial operator notification 2. Formal operator notification within 24-48 hours of issue detection 3. Public visibility of persistent issues within one week 4. Revocation procedures for issues persisting longer than 60-90 days¶
The specific timeframes MAY** be adjusted based on the severity of the operational issue and its impact on the RPKI ecosystem.¶
Registry operators SHOULD provide comprehensive support for delegated CA operators.¶
Organizations implementing these guidelines SHOULD consider phased deployment approaches.¶
Phase 1: Establish monitoring and measurement baseline¶
Phase 2: Implement basic operational standards¶
Phase 3: Advanced operational features¶
Coordination Requirements:¶
Effective implementation of these guidelines requires appropriate tooling and automation.¶
Recommended Tools:¶
Open Source Resources:¶
Integration Considerations:¶
Implementation of these operational guidelines has several security implications that MUST be carefully considered.¶
This document has no IANA actions.¶
Before requesting RPKI delegation, CA operators SHOULD verify:¶
Infrastructure Readiness:¶
Operational Procedures:¶
Regular operational tasks (monthly):¶
Quarterly tasks:¶