…and, * the signature format used by Resource Public Key Infrastructure (RPKI) [ RFC6480 ] subscribers when they apply digital signatures to certificates and Certificate Revocation Lists (CRLs) [ RFC5280 ], Cryptographic Message Syntax (CMS) signed objects [ RFC5652 ] (e.g., Route…
…ates are referred to as "Resource Certificates" and are profiled in [RFC6487]. [RFC6480] envisioned using Resource Certificates to enable verification of manifests [RFC6486] and Route Origin Authorizations (ROAs) [RFC6482]. ROAs and manifests include the Resource Certificates use…
…tes are referred to as "Resource Certificates" and are profiled in [ RFC6487 ]. RFC6480 ] envisioned using Resource Certificates to enable verification of manifests [ RFC6486 ] and Route Origin Authorizations (ROAs) [ RFC6482 ]. ROAs and manifests include the Resource Certificate…
… Resource Public Key Infrastructure (RPKI) is to improve routing security. (See RFC6480 for more information.) As part of this system, a mechanism is needed to allow entities to verify that an Autonomous System (AS) has been given permission by an IP address block holder to adver…
…Table of Contents 1. Introduction The Resource Public Key Infrastructure (RPKI) RFC6480 makes use of signed objects RFC6488 called manifests RFC9286 . A manifest lists each file that an issuer intends to include within an RPKI repository RFC6481 , and can be used to detect certai…
…Table of Contents 1. Introduction The Resource Public Key Infrastructure (RPKI) RFC6480 makes use of a distributed repository system RFC6481 to make available a variety of objects needed by relying parties (RPs). Because all of the objects stored in the repository system are digi…
… 3. End-Entity (EE) Certificates and Signing Functions in the RPKI As noted in [RFC6480], the primary function of end-entity (EE) certificates in the RPKI is the verification of signed objects that relate to the usage of the INRs described in the certificate, e.g., Route Origin A…
… . End-Entity (EE) Certificates and Signing Functions in the RPKI As noted in [ RFC6480 ], the primary function of end-entity (EE) certificates in the RPKI is the verification of signed objects that relate to the usage of the INRs described in the certificate, e.g., Route Origin …
…ses and AS numbers as resources. The overall architecture of RPKI as defined in RFC6480 ] consists of three main components: o a public key infrastructure (PKI) with the necessary certificate objects, o digitally signed routing objects, and o a distributed repository system to ho…
…ums (a 'checklist'), for use with the Resource Public Key Infrastructure (RPKI) RFC6480 The CMS protected content type is intended to provide for the creation and validation of an RPKI Signed Checklist (RSC), a checksum listing signed with a specific set of Internet Number Resour…
…troduction The primary purpose of the Resource Public Key Infrastructure (RPKI) RFC6480 is to improve security in the global Internet routing system. As part of this infrastructure, a mechanism is needed for Autonomous Systems (AS) operators, in their capacity as customers, to de…
…le of Contents 1. Introduction In the Resource Public Key Infrastructure (RPKI) RFC6480 , Signed Objects are defined as Cryptographic Message Syntax (CMS) RFC5652 RFC6268 protected content types by way of a standard template RFC6488 That template includes an optional CMS signing-…
… data structures that are referred to as "signed objects" in the RPKI context [ RFC6480 ]. This document standardizes a template for specifying signed objects that can be validated using the RPKI. Lepinski, et al. Standards Track [Page 2] RFC 6488 RPKI Signed Object Template Febr…
…stations made in the context of the Resource Public Key Infrastructure (RPKI) [ RFC6480 ], relying parties (RPs) need access to all the X.509/PKIX Resource Certificates, Certificate Revocation Lists (CRLs), and signed objects that collectively define the RPKI. Each issuer of a ce…
…ous RPKI objects, uses, and interpretations described in the following: RFC3779 RFC6480 RFC6481 RFC6487 , and RFC6488 A process to construct and sign RPKI Trust Anchor constraints is specified in I-D.nro-sidrops-ta-constraints Such signed distributed constraints can serve as an i…