RFC 9455: Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes

Z Yan, R Bush, G Geng, T de Kock, J Yao - 2023 - dl.acm.org
When using the Resource Public Key Infrastructure (RPKI), address space holders need to
issue Route Origin Authorization (ROA) object (s) to authorize one or more Autonomous …

Issuance Policies of Route Origin Authorization with a Single Prefix and Multiple Prefixes: A Comparative Analysis.

Z Lai, Z Yan, G Geng… - International Journal of …, 2024 - search.ebscohost.com
Abstract Resource Public Key Infrastructure (RPKI) is a solution to mitigate the security
issues faced by inter-domain routing. Within the RPKI framework, Route Origin Authorization …

RFC 6482: A Profile for Route Origin Authorizations (ROAs)

M Lepinski, S Kent, D Kong - 2012 - dl.acm.org
This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a
digitally signed object that provides a means of verifying that an IP address block holder has …

[PDF][PDF] A quantitative analysis of the Resource Public Key Infrastructure adoption of authoritative Domain Name System servers

P Sander - 2022 - nlnetlabs.nl
The Domain Name System (DNS) and the Border Gateway Protocol (BGP) are two
fundamental building blocks of the Internet. These protocols were not designed with security …

RFC 9582: A Profile for Route Origin Authorizations (ROAs)

J Snijders, B Maddison, M Lepinski, D Kong, S Kent - 2024 - dl.acm.org
This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a
digitally signed object that provides a means of verifying that an IP address block holder has …

RFC 9324: Policy Based on the Resource Public Key Infrastructure (RPKI) without Route Refresh

R Bush, K Patel, P Smith, M Tinka - 2022 - dl.acm.org
A BGP speaker performing policy based on the Resource Public Key Infrastructure (RPKI)
should not issue route refresh to its neighbors because it has received new RPKI data. This …

The Use of Maxlength in the RPKI

Y Gilad, S Goldberg, K Sriram, J Snijders, B Maddison - 2018 - open.bu.edu
The use of maxLength in the RPKI Toggle navigation Boston University Libraries OpenBU
Toggle navigation View Item OpenBU BU Open Access Articles BU Open Access Articles View …

RFC 9319: The Use of maxLength in the Resource Public Key Infrastructure (RPKI)

Y Gilad, S Goldberg, K Sriram, J Snijders, B Maddison - 2022 - dl.acm.org
This document recommends ways to reduce the forged-origin hijack attack surface by
prudently limiting the set of IP prefixes that are included in a Route Origin Authorization …

RFC 8210: The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1

R Bush, R Austein - 2017 - dl.acm.org
In order to verifiably validate the origin Autonomous Systems and Autonomous System
Paths of BGP announcements, routers need a simple but reliable mechanism to receive …

[PDF][PDF] Resource public key infrastructure (RPKI) technical analysis

A Durand - ICANN Office of the Chief Technology Officer, 2020 - icann-hamster.nl
Executive Summary Border Gateway Protocol (BGP) is the routing protocol used by Internet
service providers (ISPs) over the Internet. It has been around since the early 1990s. BGP …