Abstract
The Resource Public Key Infrastructure (RPKI) stores attestation objects for Internet resources. In this demo, we present RPKI MIRO, an open source software framework to monitor and inspect these RPKI objects. RPKI MIRO provides resource owners, RPKI operators, researchers, and lecturers with intuitive access to the content of the deployed RPKI repositories. It helps to optimize the repository structure and to identify failures.
- M. Lepinski and S. Kent, "An Infrastructure to Support Secure Internet Routing," IETF, RFC 6480, February 2012.Google Scholar
- J. Kloots, "RPKI Dashboard," http://rpki.surfnet.nl/, 2015.Google Scholar
- RIPE NCC, "RPKI Validator," https://github.com/RIPE-NCC/rpki-validator, 2015.Google Scholar
- LACNIC, "Origin Validation Looking Glass," http://www.labs.lacnic.net/rpkitools/looking_glass/, 2015.Google Scholar
- E. Heilman, D. Cooper, L. Reyzin, and S. Goldberg, "From the consent of the routed: Improving the transparency of the rpki," in Proc. of ACM SIGCOMM 2014. Google ScholarDigital Library
- T. Bruijnzeels, O. Muravskiy, B. Weber, R. Austein, and D. Mandelberg, "RPKI Repository Delta Protocol," IETF, Internet-Draft -- work in progress 00, February 2015.Google Scholar
- E. Osterweil, T. Manderson, R. White, and D. McPherson, "Sizing Estimates for a Fully Deployed RPKI," Verisign Labs, TR 1120005 version 2, December 2012.Google Scholar
- G. Huston, R. Loomans, B. Ellacott, and R. Austein, "A Protocol for Provisioning Resource Certificates," RFC 6492.Google Scholar
Index Terms
- RPKI MIRO: Monitoring and Inspection of RPKI Objects
Recommendations
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins
IMC '19: Proceedings of the Internet Measurement ConferenceDespite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) announces routes for IP space it does not control. To address this issue,...
Towards detecting BGP route hijacking using the RPKI
Special october issue SIGCOMM '12Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The scale of the problem can only be estimated.
The Resource Publication ...
RPKI MIRO: Monitoring and Inspection of RPKI Objects
SIGCOMM '15: Proceedings of the 2015 ACM Conference on Special Interest Group on Data CommunicationThe Resource Public Key Infrastructure (RPKI) stores attestation objects for Internet resources. In this demo, we present RPKI MIRO, an open source software framework to monitor and inspect these RPKI objects. RPKI MIRO provides resource owners, RPKI ...
Comments