{"id":263,"date":"2017-09-28T10:33:15","date_gmt":"2017-09-28T10:33:15","guid":{"rendered":"http:\/\/rtechblog.psg.com\/?p=263"},"modified":"2019-10-25T08:01:30","modified_gmt":"2019-10-25T08:01:30","slug":"the-resource-public-key-infrastructure-rpki-to-router-protocol-version-1","status":"publish","type":"post","link":"https:\/\/rtechblog.rg.net\/?p=263","title":{"rendered":"The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1"},"content":{"rendered":"<pre>        RFC 8210\n\n        Title:      The Resource Public Key Infrastructure \n                    (RPKI) to Router Protocol, Version 1 \n        Author:     R. Bush, \n                    R. Austein\n        Status:     Standards Track\n        Stream:     IETF\n        Date:       September 2017\n        Mailbox:    randy@psg.com, \n                    sra@hactrn.net\n        Pages:      35\n        Characters: 78467\n        Updates:    RFC 6810\n\n        I-D Tag:    draft-ietf-sidr-rpki-rtr-rfc6810-bis-09.txt\n\n        URL:        https:\/\/www.rfc-editor.org\/info\/rfc8210\n\n        DOI:        10.17487\/RFC8210\n\nIn order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache.  This document describes a protocol to deliver them.\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>RFC 8210 Title: The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1 Author: R. Bush, R. Austein Status: Standards Track Stream: IETF Date: September 2017 Mailbox: randy@psg.com, sra@hactrn.net Pages: 35 Characters: 78467 Updates: RFC 6810 I-D Tag: draft-ietf-sidr-rpki-rtr-rfc6810-bis-09.txt URL: https:\/\/www.rfc-editor.org\/info\/rfc8210 DOI: 10.17487\/RFC8210 In order to verifiably validate the origin Autonomous Systems and Autonomous [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,9,7],"tags":[],"class_list":["post-263","post","type-post","status-publish","format-standard","hentry","category-ietf","category-routers","category-security"],"_links":{"self":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=263"}],"version-history":[{"count":2,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/263\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/263\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}