Global Information Lookup Global Information

Resource Public Key Infrastructure information


Resource Public Key Infrastructure (RPKI), also known as Resource Certification, is a specialized public key infrastructure (PKI) framework to support improved security for the Internet's BGP routing infrastructure.

RPKI provides a way to connect Internet number resource information (such as Autonomous System numbers and IP addresses) to a trust anchor. The certificate structure mirrors the way in which Internet number resources are distributed. That is, resources are initially distributed by the IANA to the regional Internet registries (RIRs), who in turn distribute them to local Internet registries (LIRs), who then distribute the resources to their customers. RPKI can be used by the legitimate holders of the resources to control the operation of Internet routing protocols to prevent route hijacking and other attacks. In particular, RPKI is used to secure the Border Gateway Protocol (BGP) through BGP Route Origin Validation (ROV), as well as Neighbor Discovery Protocol (ND) for IPv6 through the Secure Neighbor Discovery protocol (SEND).

The RPKI architecture is documented in RFC 6480. The RPKI specification is documented in a spread out series of RFCs: RFC 6481, RFC 6482, RFC 6483, RFC 6484, RFC 6485, RFC 6486, RFC 6487, RFC 6488, RFC 6489, RFC 6490, RFC 6491, RFC 6492, and RFC 6493. SEND is documented in RFC 6494 and RFC 6495. These RFCs are a product of the IETF's SIDR ("Secure Inter-Domain Routing") working group,[1] and are based on a threat analysis which was documented in RFC 4593. These standards cover BGP origin validation, while path validation is provided by BGPsec, which has been standardized separately in RFC 8205. Several implementations for prefix origin validation already exist.[2]

  1. ^ "Secure Inter-Domain Routing (SIDR)". datatracker.ietf.org.
  2. ^ Resource Public Key Infrastructure (RPKI) Router Implementation Report (RFC 7128), R. Bush, R. Austein, K. Patel, H. Gredler, M. Waehlisch, February, 2014

and 28 Related for: Resource Public Key Infrastructure information

Request time (Page generated in 0.8801 seconds.)

Resource Public Key Infrastructure

Last Update:

Resource Public Key Infrastructure (RPKI), also known as Resource Certification, is a specialized public key infrastructure (PKI) framework to support...

Word Count : 1675

Public key infrastructure

Last Update:

A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and...

Word Count : 4048

Public key certificate

Last Update:

HTTPS, a protocol for securely browsing the web. In a typical public-key infrastructure (PKI) scheme, the certificate issuer is a certificate authority...

Word Count : 4444

Neighbor Discovery Protocol

Last Update:

uses Cryptographically Generated Addresses (CGA) and the Resource Public Key Infrastructure (RPKI) to provide an alternative mechanism for securing NDP...

Word Count : 1150

BGP hijacking

Last Update:

hijacking incidents shows this is not always the case. The Resource Public Key Infrastructure (RPKI) is designed to authenticate route origins via cryptographic...

Word Count : 2595

Secure Neighbor Discovery

Last Update:

ICMPv6 packet types used in NDP. SEND was updated to use the Resource Public Key Infrastructure (RPKI) by RFC 6494 and RFC 6495 which define use of a SEND...

Word Count : 327

Domain Name System Security Extensions

Last Update:

DNSCrypt DNSCurve Extension Mechanisms for DNS (EDNS) TSIG Resource Public Key Infrastructure (RPKI) Herzberg, Amir; Shulman, Haya (2014). "Retrofitting...

Word Count : 7669

List of TCP and UDP port numbers

Last Update:

Persian army. ... Bush; Austein (2013-01-01). "RFC 6810 - The Resource Public Key Infrastructure (RPKI) to Router Protocol". Archived from the original on...

Word Count : 12679

APNIC

Last Update:

resource holder's right-of-use. Resource Public Key Infrastructure (RPKI) is the validation structure for Resource Certification that enables public network...

Word Count : 1874

Border Gateway Protocol

Last Update:

registry – Organization responsible for managing network numbering Resource Public Key Infrastructure – Internet routing security framework Route filtering – Process...

Word Count : 7966

Archival Resource Key

Last Update:

An Archival Resource Key (ARK) is a multi-purpose URL suited to being a persistent identifier for information objects of any type. It is widely used by...

Word Count : 1284

Automatic Certificate Management Environment

Last Update:

and their users' servers, allowing the automated deployment of public key infrastructure at very low cost. It was designed by the Internet Security Research...

Word Count : 645

Internet Routing Registry

Last Update:

highly automated, and it would be very harmful for the ASNs. Resource Public Key Infrastructure Autonomous system (Internet) "4.2.1 Description of the AUT-NUM...

Word Count : 357

Enterprise resource planning

Last Update:

Enterprise resource planning (ERP) is the integrated management of main business processes, often in real time and mediated by software and technology...

Word Count : 8891

Web of trust

Last Update:

between a public key and its owner. Its decentralized trust model is an alternative to the centralized trust model of a public key infrastructure (PKI),...

Word Count : 3392

Natural resource

Last Update:

Civil Society, Public Debate and Natural Resource Management', in Indra Overland (ed.) Public Brainpower: Civil Society and Natural Resource Management,...

Word Count : 3222

Sustainable urban infrastructure

Last Update:

growth have generated a need for sustainable infrastructure that is high performing, cost-effective, resource-efficient and environmentally-friendly. The...

Word Count : 3151

Certificate revocation

Last Update:

certificate until expiry. Hence, revocation is an important part of a public key infrastructure. Revocation is performed by the issuing certificate authority...

Word Count : 3599

Online Certificate Status Protocol

Last Update:

specifically addressing certain problems associated with using CRLs in a public key infrastructure (PKI). Messages communicated via OCSP are encoded in ASN.1 and...

Word Count : 1704

Resource curse

Last Update:

The resource curse, also known as the paradox of plenty or the poverty paradox, is the phenomenon of countries with an abundance of natural resources (such...

Word Count : 10678

Cloud computing

Last Update:

characterized as the intersection of public-resource computing and cloud computing, where a cloud computing infrastructure is built using volunteered resources...

Word Count : 8002

Certificate authority

Last Update:

Large organizations or government bodies may have their own PKIs (public key infrastructure), each containing their own CAs. Any site using self-signed certificates...

Word Count : 5156

Enrollment over Secure Transport

Last Update:

describes an X.509 certificate management protocol targeting public key infrastructure (PKI) clients that need to acquire client certificates and associated...

Word Count : 334

Public service

Last Update:

resource use. They provide analysis about factors in social provisioning and assess that improving beneficial provisioning-factors and infrastructure...

Word Count : 2019

Infrastructure asset management

Last Update:

Infrastructure asset management is the integrated, multidisciplinary set of strategies in sustaining public infrastructure assets such as water treatment...

Word Count : 2636

ACS Group

Last Update:

y la Competencia (CNMC) for bidding collusion in public tenders for building and civil infrastructure works. Dragados Pulice John Picone Schiavone Prince...

Word Count : 729

Public utility

Last Update:

A public utility company (usually just utility) is an organization that maintains the infrastructure for a public service (often also providing a service...

Word Count : 4203

Resource mobilization

Last Update:

businesses, governments, etc.). The organization's infrastructure efficiency is a key resource in itself. Resource mobilization theory can be divided into two...

Word Count : 1676

PDF Search Engine © AllGlobal.net