
Happy New Year! If you want to know how Resource Public Key Infrastructure (RPKI) evolved throughout 2025, read on! 🙂
In this post, I’ll share some RPKI statistics, summarize highlights from the Internet Engineering Task Force (IETF) standards development process, and reflect on emerging trends.
Year-to-year growth of the distributed RPKI database
A straightforward method to compare 2024 and 2025 is to examine the absolute numbers. Table 1 was constructed using data collected by RPKIViews.org between 1 January and 31 December 2025, with the ARIN, AFRINIC, APNIC, LACNIC, and RIPE NCC Trust Anchors (TAs).
| 2024 | 2025 (diff) | |
| Total validated cache size (KB) | 767,245 | 923,058 (+20%) |
| Total number of files (object count) | 415,384 | 493,707 (+19%) |
| Wall time validation run (seconds) | 46 | 35 (-23%) |
| Wall time without outlier CA (seconds) | 26 | 33 (+27%) |
| Publication servers (FQDNs): | 53 | 60 (+13%) |
| Certification Authorities | 44,935 | 49,721 (+11%) |
| Route Origin Authorizations (ROAs) | 280,692 | 344,209 (+23%) |
| Uniq Validated ROA Payloads | 639,900 | 787,737 (+23%) |
| Average ROAIPAddresses per ROA | 2.3 | 1.8 (-22%) |
| Unique origin ASNs in ROAs | 47,282 | 52,661 (+11%) |
| IPv4 addresses covered | 2,726,513,768 | 2,783,187,105 (+2%) |
| Uniq IPv4 addresses covered | 1,658,281,248 | 1,818,913,944 (+10%) |
| IPv6 addresses covered |
17,392 * 1030 |
18,684 * 1030 (+7%) |
| Uniq IPv6 addresses covered |
15,139 * 1030 |
16,384 * 1030 (+8%) |
| Unique ASPA Customer ASIDs | 87 | 556 (+539%) |
Table 1 — End-of-year 2024 and end-of-year 2025 snapshot differences.
The number of IP addresses covered by RPKI Route Origin Authorizations (ROAs) grew by 10%. This is similar to the 2024 report. However, the Autonomous System Provider Authorization (ASPA) object count absolutely skyrocketed in 2025! The ‘Uniq ASPA Customer ASIDs’ field is a simple gauge counter for global ASPA deployment on the signer side.
At the time of writing, an ASPA record is published for about 0.5% of Autonomous Systems (ASes) in the Internet global routing system. That’s a very interesting development. The ability to publish ASPA objects became readily available in the RIPE NCC region in 2025, and as of January 2026, is also fully available through ARIN Online. APNIC will deploy support for ASPA objects by the end of Q2, 2026.
The ‘wall time validation run (seconds)’ metric is produced by revalidating the data contained in the two snapshots multiple times. The benchmark uses the same modern multi-threaded RPKI cache implementation, on the same four CPU core machine, without performing any network operations (for example, offline validation mode). This metric relates to the hypothesis that as RPKI grows (in size and number of objects), without also improving efficiency (information density), the overall processing time to validate the complete dataset will increase.
The 2025 benchmark environment: Rpki-client 9.7, OpenSSL 3.5.4, Debian 13, on Intel Xeon.
With every RPKI Certificate Authority (CA), first 2024, then 2025:
$ hyperfine -w2 'rpki-client -p4 -P 1735689171 -n -d rpki-20241231T235251Z/data /tmp'
Time (mean ± σ): 46.514 s ± 0.172 s [User: 173.345 s, System: 5.264 s]
Range (min … max): 46.257 s … 46.756 s 10 runs
$ hyperfine -w2 'rpki-client -p4 -P 1767225374 -n -d rpki-20251231T235614Z/data /tmp'
Time (mean ± σ): 35.046 s ± 0.206 s [User: 125.092 s, System: 5.894 s]
Range (min … max): 34.756 s … 35.444 s 10 runs
Without the outlier CA, first 2024, then 2025:
$ hyperfine -w2 'rpki-client -p4 -P 1735689171 -n -d rpki-20241231T235251Z/data /tmp'
Time (mean ± σ): 26.257 s ± 0.152 s [User: 92.878 s, System: 4.590 s]
Range (min … max): 26.069 s … 26.485 s 10 runs
$ hyperfine -w2 'rpki-client -p4 -P 1735689171 -n -d rpki-20251231T235614Z/data /tmp'
Time (mean ± σ): 32.903 s ± 0.143 s [User: 117.059 s, System: 5.444 s]
Range (min … max): 32.635 s … 33.127 s 10 runs
In 2025, the ‘wall time’ metric seemingly deflated. Unfortunately, further investigation shows that the 2024 numbers were heavily skewed by the products issued by a specific large CA under ARIN, an outlier, so to speak. In the 2024 snapshot, that single CA had 50,125 Manifest entries and 15,944 Certificate Revocation List (CRL) entries. In the 2025 snapshot, the same CA had 48,896 Manifest entries and only 33 CRL entries.
The key observation here is that the impact of large CRLs becomes more pronounced with longer Manifests. In conclusion, and discounting the products of that one outlier CA, the overall processing time of the RPKI increased by 25%.
Note: The ‘wall time’ metric is not comparable between successive annual reports (for example, next year I might use a different computer, or use a different validator implementation). Within the context of a single annual report, the comparison between the snapshots is like comparing apples to apples!
The ‘Average ROAIPAddresses per ROA’ metric shows how many IP prefixes, on average, are contained within a single ROA object. The higher the number of ‘ROAIPAddresses per ROA’ is, the higher computational efficiency is likely to be. ‘Efficiency’ in this context is how many ROAIPAddress entries are packed together and signed with a single End-Entity (EE) certificate. A higher number means more efficiency (and less relying party bandwidth consumption).
The RIPE NCC hosted CA system yields 6.6 prefixes per ROA, while the current ARIN and LACNIC approaches result in only 1.1 and 1.3 prefixes per ROA, respectively (almost the worst possible case). APNIC and its community lead in efficiency with 8.2 per ROA.
The impact that CA implementation choices have on the RPKI’s scalability remains an area of concern. Large CA operators (such as the Regional Internet Registries (RIRs)) need to take special care when deciding on parameters such as ROAIPAddress packing and certificate validity periods, in order to curb uneconomical Manifest and CRL growth. Issuing RPKI objects that aim for high information density helps improve predictable delivery trajectories towards relying parties.
Statistics on accumulating counters throughout the year
The statistics in Table 2 were produced using the RPKIViews 2024 amalgamation and RPKIViews 2025 amalgamation datasets. I believe these datasets are a near-complete collection of all signed RPKI data produced in those years. Almost every ROA! The objects in the Zenodo-hosted archives (2024, 2025) can be inspected with ‘rpki-client -jf’ (filemode).
| 2024 | 2025 (diff) | |
| Number of RPKIviews snapshots produced | 64,923 | 90,523 (+39%) |
| Newly discovered RPKI objects | 56,586,149 | 61,524,413 (+9%) |
| Avg number of new objects per second | 1.79 | 1.98 (+10%) |
| Median object size (bytes) | 1,924 | 1,924 (no change) |
| Mean object size (bytes) | 2,193 | 2,531 (+15%) |
| Cumulative size of all objects (KB) | 121,211,067 | 152,094,584 (+25%) |
Table 2 — Statistics on accumulating counters in 2025.
The numbers in Table 2 can be used to better understand RPKI transport protocol efficiency. More on that in 2026!
IETF SIDROPS: Working Group developments
Some fun updates from the IETF working group responsible for development and maintenance of the RPKI technology stack… SIDROPS.
This RPKI-focused design and implementation group now operates with a new charter. The most significant change is that RFC publication now requires multiple implementations to exist and interoperate.
ASPA — where are we at?
We are close to the Working Group’s last call! Depending on our luck, this might mean the specifications are published in late 2026. Word on the street is that various commercial-off-the-shelf hardware vendors are working on ASPA implementations, and several Border Gateway Protocol (BGP) open source projects already made ASPA verification implementations available to the wider public.
Other (new) work in SIDROPS
- A new scalable data synchronization protocol called Erik Synchronization is in the works. It is an HTTP-based protocol using Merkle trees, a content-addressable naming scheme, and concurrency control using monotonically increasing sequence numbers.
- What the Multi-Threaded Routing Toolkit (MRT) table dumps meant for researching BGP is what Canonical Cache Representation (CCR) is intended to be for the RPKI. CCR is a new, small, and efficient binary file format to record validation outcomes and hash markers.
SIDROPS finished work
One new clarification RFC was published: RFC 9829 — Handling of Resource Public Key.
Small point on housekeeping
The RPKIViews archive data collection approach and structure were revised at the start of 2026. Several RPKIviews gatherer nodes now use a Tar+Z standard spooling system to store raw data and associated snapshots in the CCR format.
The changes in how RPKIviews data is stored should have a positive effect, meaning more snapshots can be gathered per hour, while at the same time consuming less disk storage space than previously. I’m curious to see what this increase in data resolution might show us next year!
Final words
RPKI remains an important tool in the toolbox to identify and prevent routing incidents. Deployment of RPKI allows operators to improve network reliability by strengthening the security and integrity of their interconnection with the global Internet routing system. The system is working pretty well, and will continue to serve us well if special care is taken to continually monitor and optimize the RPKI’s data packing practises and delivery methods.
Shout out to Lee Hetherington, Matsuzaki ‘Maz’ Yoshinobu, Niels Bakker, Jeroen Lauwers, Jeroen Massar, Digital Ocean, Amazon Web Services, and Tom Scholl for their help with the RPKIViews.org project.
Job Snijders (Mastodon, homepage) is an Internet engineer who analyses and architects global networks for future growth. Job has been actively involved in the Internet community in both operational, engineering, and architectural capacities, as a frequent presenter at network operator events such as NANOG, ITNOG, DKNOG, RIPE, NLNOG, and APRICOT, and in several community projects for almost 20 years.
Adapted from the original at the SIDROPS mailing list.
The views expressed by the authors of this blog are their own and do not necessarily reflect the views of APNIC. Please note a Code of Conduct applies to this blog.