{"id":144,"date":"2013-01-18T00:45:13","date_gmt":"2013-01-18T00:45:13","guid":{"rendered":"http:\/\/rtechblog.psg.com\/?p=144"},"modified":"2013-01-18T01:32:22","modified_gmt":"2013-01-18T01:32:22","slug":"rfc-6810","status":"publish","type":"post","link":"https:\/\/rtechblog.rg.net\/?p=144","title":{"rendered":"RFC 6810  The Resource Public Key Infrastructure (RPKI) to Router Protocol"},"content":{"rendered":"<p>        RFC 6810<\/p>\n<p>        Title:      The Resource Public Key Infrastructure<br \/>\n                    (RPKI) to Router Protocol<br \/>\n        Author:     R. Bush, R. Austein<br \/>\n        Status:     Standards Track<br \/>\n        Stream:     IETF<br \/>\n        Date:       January 2013<br \/>\n        Mailbox:    randy@psg.com,<br \/>\n                    sra@hactrn.net<br \/>\n        Pages:      27<br \/>\n        Characters: 59714<br \/>\n        Updates\/Obsoletes\/SeeAlso:   None<\/p>\n<p>        I-D Tag:    draft-ietf-sidr-rpki-rtr-26.txt<\/p>\n<p>        URL:        http:\/\/www.rfc-editor.org\/rfc\/rfc6810.txt<\/p>\n<p>In order to verifiably validate the origin Autonomous Systems of BGP<br \/>\nannouncements, routers need a simple but reliable mechanism to<br \/>\nreceive Resource Public Key Infrastructure (RFC 6480) prefix origin<br \/>\ndata from a trusted cache.  This document describes a protocol to<br \/>\ndeliver validated prefix origin data to routers.  [STANDARDS-TRACK]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RFC 6810 Title: The Resource Public Key Infrastructure (RPKI) to Router Protocol Author: R. Bush, R. Austein Status: Standards Track Stream: IETF Date: January 2013 Mailbox: randy@psg.com, sra@hactrn.net Pages: 27 Characters: 59714 Updates\/Obsoletes\/SeeAlso: None I-D Tag: draft-ietf-sidr-rpki-rtr-26.txt URL: http:\/\/www.rfc-editor.org\/rfc\/rfc6810.txt In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,9,7],"tags":[],"class_list":["post-144","post","type-post","status-publish","format-standard","hentry","category-ietf","category-routers","category-security"],"_links":{"self":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=144"}],"version-history":[{"count":2,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/144\/revisions"}],"predecessor-version":[{"id":148,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/144\/revisions\/148"}],"wp:attachment":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}