RFC 9319: The Use of maxLength in the Resource Public Key Infrastructure (RPKI)

Y Gilad, S Goldberg, K Sriram, J Snijders, B Maddison - 2022 - dl.acm.org
This document recommends ways to reduce the forged-origin hijack attack surface by
prudently limiting the set of IP prefixes that are included in a Route Origin Authorization …

RFC 9455: Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes

Z Yan, R Bush, G Geng, T de Kock, J Yao - 2023 - dl.acm.org
When using the Resource Public Key Infrastructure (RPKI), address space holders need to
issue Route Origin Authorization (ROA) object (s) to authorize one or more Autonomous …

The Use of Maxlength in the RPKI

Y Gilad, S Goldberg, K Sriram, J Snijders, B Maddison - 2018 - open.bu.edu
The use of maxLength in the RPKI Toggle navigation Boston University Libraries OpenBU
Toggle navigation View Item OpenBU BU Open Access Articles BU Open Access Articles View …

[PDF][PDF] Resource public key infrastructure (RPKI) technical analysis

A Durand - ICANN Office of the Chief Technology Officer, 2020 - icann-hamster.nl
Executive Summary Border Gateway Protocol (BGP) is the routing protocol used by Internet
service providers (ISPs) over the Internet. It has been around since the early 1990s. BGP …

A tale of two synergies: Uncovering RPKI practices for RTBH at IXPs

I Livadariu, R Fontugne, A Phokeer, M Candela… - … Conference on Passive …, 2024 - Springer
Abstract Denial of Service (DoS) attacks and route hijacking have become the most
predominant network attacks. To address these threats, network operators currently rely on …

The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects

N Rodday, Í Cunha, R Bush… - … on Network and …, 2023 - ieeexplore.ieee.org
The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better
understand and improve RPKI deployment, measuring route origin authorization (ROA) …

RoVista: Measuring and analyzing the route origin validation (ROV) in RPKI

W Li, Z Lin, MI Ashiq, E Aben, R Fontugne… - Proceedings of the …, 2023 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) is a system to add security to the Internet
routing. In recent years, the publication of Route Origin Authorization (ROA) objects, which …

Measuring the effectiveness of routing defenses through the lens of DROP

L Oliver-Dowling - 2022 - researchcommons.waikato.ac.nz
This work analyzes the properties of 712 prefixes that appeared in Spamhaus'“Don't Route
Or Peer”(DROP) list over a nearly three-year period from June 2019 to March 2022. The 712 …

The CURE to vulnerabilities in RPKI validation

D Mirdita, H Schulmann, N Vogel… - arXiv preprint arXiv …, 2023 - arxiv.org
Over recent years, the Resource Public Key Infrastructure (RPKI) has seen increasing
adoption, with now 37.8% of the major networks filtering bogus BGP routes. Systems interact …

Issuance Policies of Route Origin Authorization with a Single Prefix and Multiple Prefixes: A Comparative Analysis.

Z Lai, Z Yan, G Geng… - International Journal of …, 2024 - search.ebscohost.com
Abstract Resource Public Key Infrastructure (RPKI) is a solution to mitigate the security
issues faced by inter-domain routing. Within the RPKI framework, Route Origin Authorization …