2014
DOI: 10.17487/rfc7115
|View full text |Cite
|
Sign up to set email alerts
|

Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI)

Abstract: Deployment of BGP origin validation that is based on the Resource Public Key Infrastructure (RPKI) has many operational considerations. This document attempts to collect and present those that are most critical. It is expected to evolve as RPKI-based origin validation continues to be deployed and the dynamics are better understood.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…A hijacker can intercept 100% of the tra c destined to any subpre x of 168.122.0.0/16 (up to length /24) except for those addresses in 168.122.225.0/24. For instance, to intercept all tra c for IP pre x 168.122.0.0/24, the hijacker performs a forged-origin subpre x hijack [6,9] by sending this BGP announcement:…”
Section: Forged-origin Subprefix Hijackmentioning
confidence: 99%
See 1 more Smart Citation
“…A hijacker can intercept 100% of the tra c destined to any subpre x of 168.122.0.0/16 (up to length /24) except for those addresses in 168.122.225.0/24. For instance, to intercept all tra c for IP pre x 168.122.0.0/24, the hijacker performs a forged-origin subpre x hijack [6,9] by sending this BGP announcement:…”
Section: Forged-origin Subprefix Hijackmentioning
confidence: 99%
“…Unlike the forged-origin subpre x hijack, this attack does not allow the hijacker to attract all of the tra c, and is thus signi cantly less e ective [16]. RFC 7115 [6]…”
Section: Forged-origin Subprefix Hijackmentioning
confidence: 99%
“…• There exists an AS-level PKI, that authenticates the public key of an asymmetric key pair ( , −1 ) for each participating AS and certifies its network resources; we rely on the SCION control-plane PKI [66] certifying AS numbers for a deployment in SCION and on RPKI [11] certifying AS numbers and IP address ranges for a deployment in today's Internet.…”
Section: Assumptionsmentioning
confidence: 99%
“…The main ideas behind PISKES are as follows. Autonomous systems (ASes) 1 can obtain certificates for their AS number and IP address range from a public-key infrastructure (PKI)-SCION's control-plane PKI [66] in a SCION deployment or the Resource Public Key Infrastructure (RPKI) [11] in today's Internet. PISKES uses such a PKI to bootstrap its own symmetric-key infrastructure.…”
Section: Introductionmentioning
confidence: 99%
“…If route origin validation is implemented, the reader SHOULD refer to the rules described in RFC 7115 [15]. In short, each external route received on a router SHOULD be checked against the Resource Public Key Infrastructure (RPKI) data set:…”
Section: Sidr -Secure Inter-domain Routingmentioning
confidence: 99%