Browse Prior Art Database

Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures (RFC7909) Disclosure Number: IPCOM000246795D
Original Publication Date: 2016-Jun-01
Included in the Prior Art Database: 2016-Jul-01
Document File: 28 page(s) / 31K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

R. Kisteleki: AUTHOR [+1]


Objects stored in resource databases, like the RIPE DB, are generally protected by an authentication mechanism: anyone creating or modifying an object in the database has to have proper authorization to do so, and therefore has to go through an authentication procedure (provide a password, certificate, email signature, etc.). However, for objects transferred between resource databases, the authentication is not guaranteed. This means that when a Routing Policy Specification Language (RPSL) object is downloaded from a database, the consumer can reasonably claim that the object is authentic if it was locally created, but cannot make the same claim for an object imported from a different database. Also, once such an object is downloaded from the database, it becomes a simple (but still structured) text file with no integrity protection. More importantly, the authentication and integrity guarantees associated with these objects do not always ensure that the entity that generated them is authorized to make the assertions implied by the data contained in the objects.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 9% of the total text.

Internet Engineering Task Force (IETF)                      R. Kisteleki Request for Comments: 7909                                      RIPE NCC Updates: 2622, 4012                                          B. Haberman Category: Standards Track                                        JHU APL ISSN: 2070-1721                                                June 2016

      Securing Routing Policy Specification Language (RPSL) Objects        with Resource Public Key Infrastructure (RPKI) Signatures


   This document describes a method that allows parties to    electronically sign Routing Policy Specification Language objects and    validate such electronic signatures.  This allows relying parties to    detect accidental or malicious modifications of such objects.  It    also allows parties who run Internet Routing Registries or similar    databases, but do not yet have authentication (based on Routing    Policy System Security) of the maintainers of certain objects, to    verify that the additions or modifications of such database objects    are done by the legitimate holder(s) of the Internet resources    mentioned in those objects.  This document updates RFCs 2622 and 4012    to add the signature attribute to supported RPSL objects.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Further information on    Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at

 Kisteleki & Haberman         Standards Track                    [Page 1]
 RFC 7909                      Securing RPSL                    June 2016

 Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    ( in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.  Code Components extracted from this document must    include Simplified BSD License text as described in Section 4.e of    the Trust Legal Provisions and are provided without warranty as  ...