The Use of Maxlength in the RPKI

Y Gilad, S Goldberg, K Sriram, J Snijders, B Maddison - 2018 - open.bu.edu
The use of maxLength in the RPKI Toggle navigation Boston University Libraries OpenBU
Toggle navigation View Item OpenBU BU Open Access Articles BU Open Access Articles View …

The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects

N Rodday, Í Cunha, R Bush… - … on Network and …, 2023 - ieeexplore.ieee.org
The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better
understand and improve RPKI deployment, measuring route origin authorization (ROA) …

[PDF][PDF] Resource public key infrastructure (RPKI) technical analysis

A Durand - ICANN Office of the Chief Technology Officer, 2020 - icann-hamster.nl
Executive Summary Border Gateway Protocol (BGP) is the routing protocol used by Internet
service providers (ISPs) over the Internet. It has been around since the early 1990s. BGP …

Lowering legal barriers to rpki adoption

CS Yoo, DA Wishnick - U of Penn Law School, Public Law …, 2019 - papers.ssrn.com
Across the Internet, mistaken and malicious routing announcements impose significant costs
on users and network operators. To make routing announcements more reliable and secure …

Maxlength considered harmful to the RPKI

Y Gilad, O Sagga, S Goldberg - … of the 13th International Conference on …, 2017 - dl.acm.org
User convenience and strong security are often at odds, and most security applications need
to find some sort of balance between these two (often opposing) goals. The Resource Public …

Validation algorithms for a secure internet routing PKI

D Montana, M Reynolds - Public Key Infrastructure: 5th European PKI …, 2008 - Springer
A PKI in support of secure Internet routing was first proposed in [1] and refined in later
papers, eg,[2]. In this “Resource” PKI (RPKI) the resources managed are IP address …

RFC 7909: Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures

R Kisteleki, B Haberman - 2016 - dl.acm.org
This document describes a method that allows parties to electronically sign Routing Policy
Specification Language objects and validate such electronic signatures. This allows relying …

[PDF][PDF] Adventures in RPKI (non) Deployment

W George - North Amer. Netw. Operators Group (NANOG) …, 2014 - archive.nanog.org
Adventures in RPKI (non) deployment Page 1 Adventures in RPKI (non) deployment Wes
George wesley.george@twcable.com @wesgeorge Page 2 Background March 2013 FCC …

Rpkiller: Threat analysis from an RPKI relying party perspective

K Van Hove, J van der Ham… - arXiv preprint arXiv …, 2022 - arxiv.org
The Resource Public Key Infrastructure (RPKI) aims to secure internet routing by creating an
infrastructure where resource holders can make attestations about their resources. RPKI …

RFC 6489: Certification Authority (CA) Key Rollover in the Resource Public Key Infrastructure (RPKI)

G Huston, G Michaelson, S Kent - 2012 - dl.acm.org
This document describes how a Certification Authority (CA) in the Resource Public Key
Infrastructure (RPKI) performs a planned rollover of its key pair. This document also notes …