A first look at common RPKI publication practices
By: Moritz Müller-Brus , Lisa Bruder , Caspar Schutijser and more
Potential Business Impact:
Keeps internet routes safe from hackers.
The RPKI is crucial for securing the routing system of the Internet. With the RPKI, owners of Internet resources can make cryptographically backed claims, for example about the legitimate origin of their IP space. Thousands of networks use this information to detect malicious or accidental route hijacks. The RPKI consists out of 100 distributed repositories. However, public reports claim that some of these repositories are unreliable. A current Internet-Draft suggests best practices on how to operate these repositories, with the goal to improve deployment quality. Inspired by this draft, we take a first look at the operational practices of repositories of the RPKI. We mainly focus on the distribution of RPKI information. We find that there is a wide variety in deployment practices, of which some might risk the availability of parts of the information in the RPKI. This study creates a baseline for measuring the maturity of RPKI repositories in the future.
Similar Papers
Overview of Routing Approaches in Quantum Key Distribution Networks
Quantum Physics
Makes secret codes unhackable over long distances.
Route Planning and Online Routing for Quantum Key Distribution Networks
Networking and Internet Architecture
Makes secret messages unhackable by computers.
Assessing Resilience in Authoritative DNS Infrastructure Supporting Government Services
Networking and Internet Architecture
Makes government websites stay online during problems.