RPKI and IRR – Frequently Asked Questions

September 15, 2023

RPKI and IRR – Frequently Asked Questions

Erika Vega, Guillermo Cicileo, Nicolás Antoniello

Typically, LACNIC events include RPKI (Public Resource Key Infrastructure) and IRR (Internet Routing Registry) tutorials in which we review the theory and technical aspects of best practices related to traffic exchange and peering routing security. In addition, the LACNIC 39 event held in Mérida also included a consultation session on secure routing and tools, where a series of questions were raised which we have consolidated in this document.

Who should create the ROA, the organization to which the IP address block has been delegated or the organization to which the autonomous system has been delegated?

Route Origin Attestations (ROAs) are digitally signed objects that describe a link between a set of prefixes (IPv4 or IPv6) and the autonomous system authorized to originate them in BGP announcements (in RPKI, this is known as ‘origin validation’ of a route or prefix). Therefore, the ROA must be created by the holder of the address block (the organization to which LACNIC has delegated the use of the prefix) and can be associated with any autonomous system, regardless of whether it is held by the same organization or by a third party.

(Free access, no subscription required)

What is the maximum length that should be used when creating an ROA?

When creating ROAs, we must take into account the maximum length of the prefixes we are advertising in BGP. As a general rule, we should only create ROAs that cover our advertisements. It is essential that the maximum length specified in an ROA is not shorter than that of a published prefix, because, for example, if the ROA allows /22 prefixes but we announce a /24, that announcement will not be allowed by the ROA and therefore both will be invalidated.

In certain cases, if we know we are going to deaggregate blocks from a larger block, we could use this maximum length to avoid having to create an ROA for each advertised prefix. However, this practice is generally not recommended, as it would enable potential origin spoofing attacks. For more information, see RFC 9319.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments