Guest Post: How to configure the two most common routing daemons used in IXP environments.
Guest Post: RPKI updates need to work their way through certificate chains to a handful of ASes. What if they were more spread out?
The third post in this series examines the risks in BGP that make it important to ‘trust but verify’.
Twitter has begun Route Origin Authorization. Here’s what that actually means.
Guest Post: Follow this network operator’s test environment to learn how to set up RPKI.
There are many RPKI validators to choose from. If you could mix and match features, what would your ideal validator look like?
Guest Post: What happens when one person tries to convince network operators to apply MANRS actions across the AFRINIC region?
APNIC provided training on RPKI and presented on APNIC’s activities at vPhNOG 2.0, held online from 12 to 16 July 2021.
What exactly is a ‘key ceremony’ and why are they important for trust?
Guest Post: How do we fix invalid RPKI routes and whose job is it?