{"id":19652,"date":"2023-01-25T17:07:23","date_gmt":"2023-01-25T17:07:23","guid":{"rendered":"https:\/\/news.lacnic.net\/?p=19652"},"modified":"2023-01-25T17:07:27","modified_gmt":"2023-01-25T17:07:27","slug":"evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/","title":{"rendered":"Evolution of RPKI: Towards Higher Levels of Security in Regional Routing"},"content":{"rendered":"\n<p><strong>Routing policies are advancing in the region with RPKI at the forefront and hand in hand with simpler processes and initiatives by large companies and content providers. However, if optimal security margins are to be achieved, more operators need to become involved.<\/strong><strong><\/strong><\/p>\n\n\n\n<p>In recent years we have witnessed growth in the adoption of routing policies, which is good news for the entire Internet ecosystem. Yet there is still a long way to go.<\/p>\n\n\n\n<p>According to LACNIC CTO Carlos Mart\u00ednez, operators in the region <strong>should not ignore the risks of not doing anything about routing security issues.<\/strong> \u201cAlthough between 2021 and 2022 we observed the evolution and growth of the measures implemented by operators, particularly RPKI (Resource Public Key Infrastructure), the reality is that many have not done anything: approximately half of our members have yet to publicly express their routing policies,\u201d he said.<\/p>\n\n\n\n<p>Routing is based on the automated Border Gateway Protocol (BGP), which is responsible for providing addresses so that traffic can travel from an IP address to its destination in the most efficient way possible.<strong> The problem is that BGP itself does not include any mechanisms to check whether an organization has the right to use the IP resources.<\/strong><strong><\/strong><\/p>\n\n\n\n<p>This allows for unsafe routing scenarios: <strong>route hijacking <\/strong>and<strong> route leaks.<\/strong><\/p>\n\n\n\n<p>BGP hijacking occurs when a network falsely claims to know how to reach its destination and thus manages to divert a portion of the traffic that passes through it. While most of these situations are caused by configuration errors, some malicious actors can analyze, modify, or eliminate traffic to cause a denial-of-service attack. \u201cCryptocurrency exchanges have recently suffered this type of attacks where a portion of the traffic is hijacked and the blockchain&#8217;s ability to generate consensus is eliminated. It is worth noting that there is a lot of money committed to this type of attacks,\u201d Mart\u00ednez added<\/p>\n\n\n\n<p>A route leak is the propagation of routing announcements beyond their intended reach. \u201cThe network announces that it can reach a destination that it cannot actually reach but adds that the path it will use to get there is better than any other existing path. Traffic sent to this destination is lost, as it does not know which path it must use to get there. This is generally caused by configuration errors in the source autonomous system; however, from a technological point of view, route leaks are a little more difficult to mitigate than route hijacking,\u201d Mart\u00ednez explained.<\/p>\n\n\n\n<p><strong>Routing Policies: From LoAs to RPKI<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Various techniques have been used over the years to check whether the information received via BGP is legitimate. The first of these were <strong>LoAs<\/strong> (letters of authorization), an official document from a service provider or client authorizing a third party to gain access to that client&#8217;s information from a telecommunications provider.<\/p>\n\n\n\n<p>\u201cBasically, in this type of documents, someone takes responsibility for all the routes. The funny thing about LOAs is that they are manually signed and scanned PDF letters, an incredibly precarious situation,\u201d Mart\u00ednez said.<\/p>\n\n\n\n<p><strong>For many years, Internet operation depended on LoAs<\/strong>. \u201cHere, it should be noted that there is no digital check or automation of any kind: the connection between two networks is only mediated by a piece of paper that announces the routes, with the enormous possibility of error that this entails,\u201d he stressed.<\/p>\n\n\n\n<p>Today, <strong>there is more awareness regarding the dangers of this procedure<\/strong>, although at company level they abound as an administrative formality.<\/p>\n\n\n\n<p>An <strong>Internet Routing Registry (IRR)<\/strong> is a database where operators can specify their routing policies and make this information publicly available so that other actors who are part of the Internet routing system can use it to configure their devices.<\/p>\n\n\n\n<p>Martinez explained that IRRs <strong>are marginally better than LoAs<\/strong> because an IRR is the description of a routing policy written in a language that can be automatically processed and transformed into router configuration. In the words of Mart\u00ednez, \u201cIn a way, human error is eliminated, but strictly speaking, a classic IRR has a lot of spoofing potential, as it is a hosted text file that lends itself to the unauthorized creation of objects.\u201d<\/p>\n\n\n\n<p>In turn, RPKI is a public key infrastructure framework <strong>designed to offer providers additional tools to check a client&#8217;s right to use specific Internet resources<\/strong>. It incorporates <strong>ROAs<\/strong> (Route Origin Attestations), i.e., digitally signed objects that describe an association between a set of prefixes (IPv4 or IPv6) and the autonomous system authorized to originate a route for these prefixes in BGP advertisements. This makes it possible to <strong>automatically<\/strong> compare the information received via BGP against the definitions contained in the RPKI ROAs.<\/p>\n\n\n\n<p><strong>Another Step Towards Security<\/strong><strong><\/strong><\/p>\n\n\n\n<p>In the opinion of Mart\u00ednez, RPKI allows an additional level of security <strong>because it largely eliminates human error<\/strong> from the routing configuration process.<strong> RPKI also highlights the key role of actors such as LACNIC.<\/strong> \u201cWe are in the right position to be the trust anchors for the entire system. Our efforts are aimed at verifying the validity of all our members\u2019 certificates and requiring all the necessary documentation to validate them,\u201d he explained.<\/p>\n\n\n\n<p>Hence the importance and our insistence that operators in the region <strong>express their routing policies<\/strong>. \u201cExpanding the signed coverage of IP space announced by LACNIC members and, with it, achieving a better and more stable operation partly depends on more of our members creating ROA objects in our systems,\u201d he observed.<\/p>\n\n\n\n<p>The analysis conducted by LACNIC shows that the objects created in the IRR were those that grew the most: more than 200%. \u201cOn the one hand, the reason for this is that they became popular once again and we developed software that makes them easy to use,\u201d he added.<\/p>\n\n\n\n<p>Likewise, global <strong>RPKI adoption has grown<\/strong> in recent years. \u201cWe at LACNIC have noticed this among our members, especially during the past year,\u201d Mart\u00ednez said.<\/p>\n\n\n\n<p>There are several underlying reasons for this, one of which relates to <strong>the actions of large companies<\/strong>. Major operators such as NTT or AT&amp;T and important content providers such as Cloudflare have recently started to drop BGP announcements based on their RPKI validity status.<\/p>\n\n\n\n<p>In the same sense, Mart\u00ednez highlights an interesting fact: towards the end of 2020, some large content providers such as Netflix and Google <strong>began to require that those wishing to exchange traffic directly with them must have some form of routing safeguard configured, either IRR or preferably RPKI<\/strong>. \u201cWhen the large content providers implemented this request, in both cases we clearly noticed the creation of a very large number of objects,\u201d Mart\u00ednez explained.<\/p>\n\n\n\n<p>Another reason for the increase in RPKI adoption has to do with the <strong>simplification of the process at a technological level<\/strong>. However, this sounds an alarm: <strong>it is important to verify that the information defined by each organization in RPKI is correct<\/strong>. Incorrect ROAs might eventually lead to a loss of connectivity with important operators, hence the importance of having precise routing policies.<\/p>\n\n\n\n<p>Mart\u00ednez pointed out that one of the most surprising things they often come across is operators\u2019 lack of knowledge of their own networks. \u201cIn order to create ROAs properly, an operator must know their own network or identify information that can sometimes get lost within the organization. ROAs must effectively follow their routing policy.\u201d<\/p>\n\n\n\n<p>In addition, <strong>potential extensions to the basic functions of RPKI<\/strong> have been proposed at the IETF.\u201cThese are all signs of the acceptance RPKI is gaining among operators seeking to guarantee global routing security. One of the current focuses is a set of techniques known as ASPA, because while RPKI solves the problem of route hijacking quite well, there is still a lot to be done in relation to route leaks and the addition of new functionalities in this sense is being studied,\u201d Mart\u00ednez explained.<\/p>\n\n\n\n<p>As more and more operators publicly document their routing policy, <strong>routing security in Latin America and the Caribbean is reaching new levels<\/strong>. \u201cNot only is the process increasingly less complex, at some point it may become a requirement, as is happening among large content operators. Why do it in a hurry if we can be proactive?\u201d Mart\u00ednez concluded.<\/p>\n\n\n\n<p>Members who hold resources directly assigned by LACNIC or by NIC Mexico can access the <a href=\"https:\/\/milacnic.lacnic.net\/\">MiLACNIC portal<\/a> to create their ROAs. Members in Brazil must complete the process using the tools provided by NIC.BR<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Routing policies are advancing in the region with RPKI at the forefront and hand in hand with simpler processes and initiatives by large companies and content providers. However, if optimal security margins are to be achieved, more operators need to become involved. In recent years we have witnessed growth in the adoption of routing policies, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":19666,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1327],"tags":[1292],"archivo":[1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-19652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interconnection","tag-interconnection","archivo-editions"],"acf":{"author":"","related_notes":[19244,17393]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Evolution of RPKI: Towards Higher Levels of Security in Regional Routing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Evolution of RPKI: Towards Higher Levels of Security in Regional Routing\" \/>\n<meta property=\"og:description\" content=\"Routing policies are advancing in the region with RPKI at the forefront and hand in hand with simpler processes and initiatives by large companies and content providers. However, if optimal security margins are to be achieved, more operators need to become involved. In recent years we have witnessed growth in the adoption of routing policies, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-25T17:07:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-25T17:07:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Evolution of RPKI: Towards Higher Levels of Security in Regional Routing\",\"datePublished\":\"2023-01-25T17:07:23+00:00\",\"dateModified\":\"2023-01-25T17:07:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/\"},\"wordCount\":1403,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg\",\"keywords\":[\"Interconnection\"],\"articleSection\":[\"Interconnection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/\",\"name\":\"LACNIC Blog | Evolution of RPKI: Towards Higher Levels of Security in Regional Routing\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg\",\"datePublished\":\"2023-01-25T17:07:23+00:00\",\"dateModified\":\"2023-01-25T17:07:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Evolution of RPKI: Towards Higher Levels of Security in Regional Routing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Evolution of RPKI: Towards Higher Levels of Security in Regional Routing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Evolution of RPKI: Towards Higher Levels of Security in Regional Routing","og_description":"Routing policies are advancing in the region with RPKI at the forefront and hand in hand with simpler processes and initiatives by large companies and content providers. However, if optimal security margins are to be achieved, more operators need to become involved. In recent years we have witnessed growth in the adoption of routing policies, [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2023-01-25T17:07:23+00:00","article_modified_time":"2023-01-25T17:07:27+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg","type":"image\/jpeg"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Evolution of RPKI: Towards Higher Levels of Security in Regional Routing","datePublished":"2023-01-25T17:07:23+00:00","dateModified":"2023-01-25T17:07:27+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/"},"wordCount":1403,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg","keywords":["Interconnection"],"articleSection":["Interconnection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/","url":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/","name":"LACNIC Blog | Evolution of RPKI: Towards Higher Levels of Security in Regional Routing","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg","datePublished":"2023-01-25T17:07:23+00:00","dateModified":"2023-01-25T17:07:27+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/evolution-of-rpki-towards-higher-levels-of-security-in-regional-routing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Evolution of RPKI: Towards Higher Levels of Security in Regional Routing"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/01\/lacnic-rpki.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":19649,"post_title":"La evoluci\u00f3n de RPKI: hacia mayores niveles de seguridad en el ruteo de la regi\u00f3n","slug":"la-evolucion-de-rpki-hacia-mayores-niveles-de-seguridad-en-el-ruteo-de-la-region","href":"https:\/\/blog.lacnic.net\/la-evolucion-de-rpki-hacia-mayores-niveles-de-seguridad-en-el-ruteo-de-la-region\/"},{"locale":"pt_BR","id":19655,"post_title":"A evolu\u00e7\u00e3o do RPKI: rumo a maiores n\u00edveis de seguran\u00e7a no roteamento da regi\u00e3o","slug":"a-evolucao-do-rpki-rumo-a-maiores-niveis-de-seguranca-no-roteamento-da-regiao","href":"https:\/\/blog.lacnic.net\/pt-br\/a-evolucao-do-rpki-rumo-a-maiores-niveis-de-seguranca-no-roteamento-da-regiao\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=19652"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19652\/revisions"}],"predecessor-version":[{"id":19654,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19652\/revisions\/19654"}],"acf:post":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/17393"},{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/19666"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=19652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=19652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=19652"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=19652"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=19652"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=19652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}