{"id":121,"date":"2012-02-04T04:08:07","date_gmt":"2012-02-04T04:08:07","guid":{"rendered":"http:\/\/rtechblog.psg.com\/?p=121"},"modified":"2012-02-04T04:08:07","modified_gmt":"2012-02-04T04:08:07","slug":"rfc-6493","status":"publish","type":"post","link":"https:\/\/rtechblog.rg.net\/?p=121","title":{"rendered":"RFC 6493"},"content":{"rendered":"<pre>\r\n        Title:      The Resource Public Key Infrastructure \r\n                    (RPKI) Ghostbusters Record \r\n        Author:     R. Bush\r\n        Status:     Standards Track\r\n        Stream:     IETF\r\n        Date:       February 2012\r\n        Mailbox:    randy@psg.com\r\n        Pages:      8\r\n        Characters: 15491\r\n        Updates\/Obsoletes\/SeeAlso:   None\r\n\r\n        I-D Tag:    draft-ietf-sidr-ghostbusters-15.txt\r\n\r\n        URL:        http:\/\/www.rfc-editor.org\/rfc\/rfc6493.txt\r\n<\/pre>\n<p>In the Resource Public Key Infrastructure (RPKI), resource certificates completely obscure names or any other information that might be useful for contacting responsible parties to deal with issues of certificate expiration, maintenance, roll-overs, compromises, etc. \u00a0This document describes the RPKI Ghostbusters Record containing human contact information that may be verified (indirectly) by a Certification Authority (CA) certificate. \u00a0The data in the record are those of a severely profiled vCard.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title: The Resource Public Key Infrastructure (RPKI) Ghostbusters Record Author: R. Bush Status: Standards Track Stream: IETF Date: February 2012 Mailbox: randy@psg.com Pages: 8 Characters: 15491 Updates\/Obsoletes\/SeeAlso: None I-D Tag: draft-ietf-sidr-ghostbusters-15.txt URL: http:\/\/www.rfc-editor.org\/rfc\/rfc6493.txt In the Resource Public Key Infrastructure (RPKI), resource certificates completely obscure names or any other information that might be useful for contacting [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,12,3,7],"tags":[],"class_list":["post-121","post","type-post","status-publish","format-standard","hentry","category-above-layer-7","category-ietf","category-net-management","category-security"],"_links":{"self":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=121"}],"version-history":[{"count":2,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/121\/revisions"}],"predecessor-version":[{"id":123,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/121\/revisions\/123"}],"wp:attachment":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}