{"id":170,"date":"2014-01-15T11:16:22","date_gmt":"2014-01-15T11:16:22","guid":{"rendered":"http:\/\/rtechblog.psg.com\/?p=170"},"modified":"2014-05-03T12:51:27","modified_gmt":"2014-05-03T12:51:27","slug":"rfc-7115-validation-operation-based-on-the-rpki","status":"publish","type":"post","link":"https:\/\/rtechblog.rg.net\/?p=170","title":{"rendered":"RFC 7115 Origin Validation Operation Based on the RPKI"},"content":{"rendered":"<p>       Title:      Origin Validation Operation Based on<br \/>\n                    the Resource Public Key Infrastructure (RPKI)<br \/>\n        Author:     R. Bush<br \/>\n        Status:     Best Current Practice<br \/>\n        Stream:     IETF<br \/>\n        Date:       January 2014<br \/>\n        Mailbox:    randy@psg.com<br \/>\n        Pages:      11<br \/>\n        Characters: 26033<br \/>\n        See Also:   BCP 185<\/p>\n<p>        I-D Tag:    draft-ietf-sidr-origin-ops-23.txt<\/p>\n<p>        URL:        http:\/\/www.rfc-editor.org\/rfc\/rfc7115.txt<\/p>\n<p>Deployment of BGP origin validation that is based on the Resource<br \/>\nPublic Key Infrastructure (RPKI) has many operational considerations.<br \/>\nThis document attempts to collect and present those that are most<br \/>\ncritical.  It is expected to evolve as RPKI-based origin validation<br \/>\ncontinues to be deployed and the dynamics are better understood.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title: Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI) Author: R. Bush Status: Best Current Practice Stream: IETF Date: January 2014 Mailbox: randy@psg.com Pages: 11 Characters: 26033 See Also: BCP 185 I-D Tag: draft-ietf-sidr-origin-ops-23.txt URL: http:\/\/www.rfc-editor.org\/rfc\/rfc7115.txt Deployment of BGP origin validation that is based on the Resource Public Key Infrastructure (RPKI) has [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,9,7],"tags":[],"class_list":["post-170","post","type-post","status-publish","format-standard","hentry","category-ietf","category-routers","category-security"],"_links":{"self":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=170"}],"version-history":[{"count":2,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/170\/revisions"}],"predecessor-version":[{"id":182,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/170\/revisions\/182"}],"wp:attachment":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}