home.social

#rpki — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #rpki, aggregated by home.social.

  1. La cybersécuritay, c'est compliquay. Comment la Corée du Nord a coupé sa liaison Internet en voulant la sécuriser. labs.ripe.net/author/romain_fo

    #BGP #RPKI

  2. 🚨 More new routing insights on Radar!

    - Track #RPKI ROA deployment history at a global/country/ASN level, going back 3+ years for valid prefixes & address space

    radar.cloudflare.com/routing/r

    - Country level announced IP address space graphs now include a "Show top ASes" toggle. Stacked area graphs make it easier to identify the providers behind large address space withdrawals.

    Example: radar.cloudflare.com/routing/i

  3. rpki-client 9.8 released

    Routing security matters to all of us (even those of us who seldom give the subject any thought), and the rpki-client project announced the release of a new version of their Resource Public Key Infrastructure (RPKI) client, with a number of improvements.

    The announcement reads

    • List: openbsd-announce
    • Subject: rpki-client 9.8 released
    • From: Sebastian Benoit
    • Date: 2026-04-14 23:20:42

      rpki-client 9.8 has just been released and will be available in the rpki-client directory of any OpenBSD mirror soon.
      It is recommended
      that all users upgrade to this version for improved reliability.

      rpki-client is a FREE, easy-to-use implementation of the Resource
      Public Key Infrastructure (RPKI) for Relying Parties to facilitate
      validation of BGP announcements. The program queries the global RPKI
      repository system and validates untrusted network inputs. The program
      outputs validated ROA payloads, BGPsec Router keys, and ASPA payloads
      in configuration formats suitable for OpenBGPD and BIRD, and supports
      emitting CSV and JSON for consumption by other routing stacks.

      See RFC 6480 and RFC 6811 for a description of how RPKI and BGP Prefix
      Origin Validation help secure the global Internet routing system.

      rpki-client was primarily developed by Kristaps Dzonsons, Claudio Jeker,
      Job Snijders, Theo Buehler, Theo de Raadt, and Sebastian Benoit as part
      of the OpenBSD Project.

      This release includes the following changes to the previous release:

      • Various refactoring for improved compatibility with various libcryptoimplementations and in CA/BGPsec certificate handling.
      • Fixed an accounting issue in HTTP gzip compression detection.
      • Added a warning in extra verbose mode (-vv) about standardsnon-compliant Issuer and Subject ASN.1 string encodings.
      • Added a check for canonical encoding of ASPA eContent in alignmentwith draft-ietf-sidrops-aspa-profile-22.
      • Ensure that a repository timeout correctly stops repositoryprocessing. Thanks to Fedor Vompe from Deutsche Telekom for reporting.
      • Fixed a defect in Canonical Cache Representation ROAIPAddressFamilysort order. As a result, rpki-client 9.8 cannot parse rpki-client9.7's .ccr files and vice versa. Thanks to Bart Bakker from RIPE NCCfor reporting.
      • Fixed an issue in the parser for the locally configured constraints.Thanks to Daniel Anderson.
      • A malicious RRDP Publication Server can cause a NULL dereference.Thanks to Daniel Anderson for reporting.
      • A malicious RPKI Publication Server can cause an incorrect error exit.Thanks to Yuheng Zhang, Qi Wang, Jianjun Chen from Tsinghua University,and Teatime Lab for reporting.

    Go read ALL about it here!

    undeadly.org/cgi?action=articl

    #rpki #client #resource #public #key #infrastructure #openBSD #OpenSource #programming #networking

  4. On Tuesday, 7 April, the Global Internet Standards Testing Community (GISTC) held its 3rd online meeting, which was chaired by Alena Muravska from @ripencc.

    The GISTC brings together organisations from all over the world around #InternetStandards the Internet.nl test tool and open-source code.

    Its goal is to enable knowledge exchange, coordination of efforts, and of course to collaboratively improve the adoption of modern internet standards like #IPv6, #DNSSEC, #DANE, #DMARC, and #RPKI.

    1/3

  5. Weekend Reads

    * Email address obfuscation in 2026
    spencermortensen.com/articles/
    * Profile of Kimwolf botnet researcher
    wsj.com/tech/kimwolf-hack-resi
    * Quantifying AI data center heat impacts
    arxiv.org/abs/2603.20897
    * Characterizing invalid routes via Tunnels
    arxiv.org/abs/2603.29207
    * Detecting anomalous topology, routes, and congestion
    arxiv.org/abs/2603.25875

    #EMail #Kimwolf #AI #RPKI #BGP

  6. 🚀 Ah, the noble quest to secure the Internet's mailman! 🌍 #BGP is still as safe as letting toddlers handle your bank transactions. But fear not, because #ISPs will definitely implement #RPKI and save the day...right after they solve world peace and cure aging. 😂
    isbgpsafeyet.com/ #InternetSecurity #CyberSecurity #Humor #HackerNews #ngated

  7. Last week I was in Stockholm for the route servers workshop organised by #Euro-IX. I presented my work on the #Debian packaging of software like #BIRD, #OpenBGPD and the #RPKI validators.

    Slides are available at linux.it/~md/text/ixp-debian-r .

  8. Interesting discussion about distribution / decentralization / de facto concentration of the #RPKI at #IETF125, which reminds me of discussions about the fediverse, Bluesky, etc.

  9. "RPKI has been around for a while... more than a decade..."

    🤔

    🧐

    😱

    "more than a decade"??

    ... I remember when it began... 😃

    #IETF #IETF125 #RPKI #RoutingSecurity #MANRS

  10. "ARIN's Director of Customer Technical Services, Brad Gorman, is bringing RPKI expertise to the Toronto Network Operators Group's inaugural full-day conference."

    Learn:
    🔹 What RPKI actually does
    🔹 Why it matters for YOUR network
    🔹 How to deploy it safely
    🔹 Where to start (no theory overload!)

    See ARIN"S original post here: instagram.com/p/DV2VLbfDTN4/

    Join us on April 13th and check out the full agenda here:

    tornog.ca/events/tornog-1/agen

    #TORNOG #RPKI #RoutingSecurity #Toronto #NetworkOperations

  11. The agenda for TORNOG 1 is live! tornog.ca/events/tornog-1/agen

    Join us for the the inaugural TORNOG full day conference on April 13th, at the MaRS Centre in Toronto!

    #Toronto #RPKI #Fiber #IX #Sovereignty #AutonomousResilience #CloudNetwork #NetworkAutomation

  12. Krill 0.16.0 is now available.

    This release of our #RPKI Certification Authority reverts back to downloading the RISwhois data and processing it locally for analysing ROAs rather than using an external API.

    The Krill daemon will now also listen on a Unix socket which allows it to use the name of the local user for authentication, making it unnecessary to specify the authentication token when using krillc locally.

    community.nlnetlabs.nl/t/krill

  13. #ASPA is an emerging standard intended to help further improve routing security. You can now track ASPA deployment at a global, country/region, and ASN level on Cloudflare Radar, including real-time searching for ASPA entries.

    Explore it at radar.cloudflare.com/routing#r

    #RPKI

  14. We just published 0.16.0-RC1 of our #RPKI Certification Authority Krill, which reverts back to downloading the RISwhois data and processing it locally for analysing ROAs rather than using an external API.

    In addition, there are quite a few fixes and improvements. For instance, there now is a man page for the config file, so you can now do man krill.conf for information about the config.

    community.nlnetlabs.nl/t/krill

  15. Still seeing this on a dead #RPKI PP. I hope this thing isn't used to validate routes on a real network:

    GET /rrdp/notification.xml HTTP/1.1 RIPE NCC RPKI Validator/3.1-2020.08.20.14.52

  16. @jhaas @drscriptt Meanwhile, as more #RPKI invalid #BGP routes are dropped, we are working on making the invisible visible again with Rotonda. ripe91.ripe.net/programme/meet

  17. @drscriptt @jhaas I remember launching #RPKI in 2011. It took years of publishing ROAs, learning from mistakes and fixing bad quality ROAs before the operator community got to the point where they felt comfortable dropping invalid routes.

    ASPA will be the same, although perhaps a bit quicker because of the huge installed base of (ASPA capable) validators: rov-measurements.nlnetlabs.net

  18. Routinator, our RPKI validation software, now sees more than 1000 Autonomous System Provider Authorization (ASPA) objects in the wild. These are published by operators to detect and prevent BGP route leaks.

    ASPAs can be created in the hosted RPKI services of the RIPE NCC and ARIN, as well as our open-source RPKI Certification Authority software, Krill.

    Open-source routing projects such as BIRD, OpenBGPD and FRRouting already offer support for ASPA, while major commercial vendor support is expected later this year.

    #OpenSource #OpenStandards #IETF #RPKI #BGP #RoutingSecurity

  19. We've added an Autonomous System Provider Authorization (ASPA) for our ASN (401720) which we operate many of our core services on.

    console.rpki-client.org/AS4017

    What is an ASPA? arin.net/resources/manage/rpki

    #ARIN #RPKI #BGP

  20. The @ripencc recently added the ability to specify Autonomous System Provider Authorization (ASPA) objects in their #RPKI dashboard.

    Routinator currently sees 322 published ASPAs. 🚀

    Did you review your provider-customer relationships yet?

    #OpenSource #RoutingSecurity #BGP

    ripe.net/manage-ips-and-asns/r

  21. If you or your colleagues have ROAs in the #AFRINIC #RPKI repository, see this email from @job

    Those with a non-conformant subject name can reissue the ROA themselves, the others will need to be fixed by the registry.

    lists.afrinic.net/pipermail/db

  22. ROA Planner, as seen on the #NANOG list:

    rootbeer.testing.ns.internet2.

    "The implementation remains fragile and will be unavailable intermittently, but we hope to improve it over the next couple of weeks."

    aka beta test.

    #RPKI

  23. Members of the Dutch Internet Standards Platform, Alena Muravska (@ripencc ) and @wouterkobes (@forumstandaardisatie), will take part in #SEEDIG10 on 10 and 11 October in Athens. Together with other panelists, they will share their perspectives and expertise during the session 'Securing the Internet Routing in the SEE Region' on 10 October.

    More information can be found on the #SEEDIG10 event page: seedig.net/seedig-10/

    #InternetStandards #RoutingSecurity #RPKI #SEEDIG

  24. We have just released the second release candidate for Krill 0.15.0. The release contains a lot of internal refactoring, along with a couple of changes.

    The most important one is the way multi-user authentication works.If you are not running Krill with just the admin token, you may want to read krill.docs.nlnetlabs.nl/en/v0.. We’ll write a migration guide before the full 0.15.0 release. github.com/NLnetLabs/krill/rel

  25. 📍 We’re bringing some of our top training courses to #Paris!

    🗓 26 May – #RIPEDatabase
    🗓 27 May – #IPv6 #Security
    🗓 28 May – #BGP #RPKI #IRR

    🎓 Full-day, hands-on & expert-led.
    Non-members welcome if spots are available.

    𝐒𝐞𝐜𝐮𝐫𝐞 𝐲𝐨𝐮𝐫 𝐬𝐩𝐨𝐭 𝐧𝐨𝐰: learning.ripe.net/w/

    #RIPE #Training #Networking #DNS

  26. And to finish off this release-packed Thursday, we're happy to offer the first Release Candidate of our proxy RTRTR, version 0.3.2-rc1. This release adds support to the JSON input and output, and more… github.com/NLnetLabs/rtrtr/rel

  27. also available in English:
    Adoption of RPKI/ROV security protocol progressing very quickly -- Next step is implementation of ASPA

    Although RPKI/ROV is being adopted very quickly, it's still early days for the other two RPKI-based protocols. Anyone now running RPKI with ROV will be able to take the next step to ASPA in the next few years. Where BGPsec is concerned, it's a question of waiting for the next generation of routing systems.

    #RPKI #ASPA #BGPsec #BGP #IPv6 #InternetSecurity

  28. op SIDN.nl:
    RPKI/ROV-beveiligingsprotocol maakt razendsnelle adoptie door -- Volgende stap is implementatie van ASPA
    sidn.nl/nieuws-en-blogs/rpki-r

    Waar RPKI/ROV een heel snelle adoptie heeft doorgemaakt, is het voor de andere twee RPKI-gebaseerde protocollen nog net te vroeg. Wie nu RPKI met ROV heeft draaien, zal een dezer jaren de vervolgstap naar ASPA kunnen maken. Voor BGPsec is het wachten op de volgende generatie routersystemen.

    #RPKI #ASPA #BGPsec #BGP #IPv6 #InternetSecurity

  29. This is great news! I have long been a huge of Internet.nl as a test site for compliance with the latest standards- and now they have added #RPKI into their scoring. (The RPKI test was there for the last 2 years, but didn’t count toward the score - now it does!)

    This is a way to hopefully get people paying more attention to #RoutingSecurity and #MANRS

    From: @internet_nl
    mastodon.nl/@internet_nl/11390

  30. Routinator offered support for Autonomous System Provider Authorization (ASPA) as an experimental feature for a number of years already. Standardization has now progressed far enough in the that we feel comfortable making a core feature in Routinator 0.14.1. github.com/NLnetLabs/routinato