Resource Public Key Infrastructure (RPKI), also known as Resource Certification, is a specialized public key infrastructure (PKI) framework to support improved security for the Internet's BGP routing infrastructure.
RPKI provides a way to connect Internet number resource information (such as Autonomous System numbers and IP addresses) to a trust anchor. The certificate structure mirrors the way in which Internet number resources are distributed. That is, resources are initially distributed by the IANA to the regional Internet registries (RIRs), who in turn distribute them to local Internet registries (LIRs), who then distribute the resources to their customers. RPKI can be used by the legitimate holders of the resources to control the operation of Internet routing protocols to prevent route hijacking and other attacks. In particular, RPKI is used to secure the Border Gateway Protocol (BGP) through BGP Route Origin Validation (ROV), as well as Neighbor Discovery Protocol (ND) for IPv6 through the Secure Neighbor Discovery protocol (SEND).
The RPKI architecture is documented in RFC 6480. The RPKI specification is documented in a spread out series of RFCs: RFC 6481, RFC 6482, RFC 6483, RFC 6484, RFC 6485, RFC 6486, RFC 6487, RFC 6488, RFC 6489, RFC 6490, RFC 6491, RFC 6492, and RFC 6493. SEND is documented in RFC 6494 and RFC 6495. These RFCs are a product of the IETF's SIDR ("Secure Inter-Domain Routing") working group,[1] and are based on a threat analysis which was documented in RFC 4593. These standards cover BGP origin validation, while path validation is provided by BGPsec, which has been standardized separately in RFC 8205. Several implementations for prefix origin validation already exist.[2]
^Resource Public Key Infrastructure (RPKI) Router Implementation Report (RFC 7128), R. Bush, R. Austein, K. Patel, H. Gredler, M. Waehlisch, February, 2014
and 28 Related for: Resource Public Key Infrastructure information
HTTPS, a protocol for securely browsing the web. In a typical public-keyinfrastructure (PKI) scheme, the certificate issuer is a certificate authority...
uses Cryptographically Generated Addresses (CGA) and the ResourcePublicKeyInfrastructure (RPKI) to provide an alternative mechanism for securing NDP...
hijacking incidents shows this is not always the case. The ResourcePublicKeyInfrastructure (RPKI) is designed to authenticate route origins via cryptographic...
ICMPv6 packet types used in NDP. SEND was updated to use the ResourcePublicKeyInfrastructure (RPKI) by RFC 6494 and RFC 6495 which define use of a SEND...
Persian army. ... Bush; Austein (2013-01-01). "RFC 6810 - The ResourcePublicKeyInfrastructure (RPKI) to Router Protocol". Archived from the original on...
resource holder's right-of-use. ResourcePublicKeyInfrastructure (RPKI) is the validation structure for Resource Certification that enables public network...
An Archival ResourceKey (ARK) is a multi-purpose URL suited to being a persistent identifier for information objects of any type. It is widely used by...
and their users' servers, allowing the automated deployment of publickeyinfrastructure at very low cost. It was designed by the Internet Security Research...
highly automated, and it would be very harmful for the ASNs. ResourcePublicKeyInfrastructure Autonomous system (Internet) "4.2.1 Description of the AUT-NUM...
Enterprise resource planning (ERP) is the integrated management of main business processes, often in real time and mediated by software and technology...
between a publickey and its owner. Its decentralized trust model is an alternative to the centralized trust model of a publickeyinfrastructure (PKI),...
Civil Society, Public Debate and Natural Resource Management', in Indra Overland (ed.) Public Brainpower: Civil Society and Natural Resource Management,...
growth have generated a need for sustainable infrastructure that is high performing, cost-effective, resource-efficient and environmentally-friendly. The...
certificate until expiry. Hence, revocation is an important part of a publickeyinfrastructure. Revocation is performed by the issuing certificate authority...
specifically addressing certain problems associated with using CRLs in a publickeyinfrastructure (PKI). Messages communicated via OCSP are encoded in ASN.1 and...
The resource curse, also known as the paradox of plenty or the poverty paradox, is the phenomenon of countries with an abundance of natural resources (such...
characterized as the intersection of public-resource computing and cloud computing, where a cloud computing infrastructure is built using volunteered resources...
Large organizations or government bodies may have their own PKIs (publickeyinfrastructure), each containing their own CAs. Any site using self-signed certificates...
describes an X.509 certificate management protocol targeting publickeyinfrastructure (PKI) clients that need to acquire client certificates and associated...
resource use. They provide analysis about factors in social provisioning and assess that improving beneficial provisioning-factors and infrastructure...
Infrastructure asset management is the integrated, multidisciplinary set of strategies in sustaining publicinfrastructure assets such as water treatment...
y la Competencia (CNMC) for bidding collusion in public tenders for building and civil infrastructure works. Dragados Pulice John Picone Schiavone Prince...
A public utility company (usually just utility) is an organization that maintains the infrastructure for a public service (often also providing a service...
businesses, governments, etc.). The organization's infrastructure efficiency is a keyresource in itself. Resource mobilization theory can be divided into two...