{"id":28281,"date":"2024-12-03T12:14:25","date_gmt":"2024-12-03T12:14:25","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=28281"},"modified":"2024-12-03T12:14:26","modified_gmt":"2024-12-03T12:14:26","slug":"war-story-rpki-is-working-as-intended","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/","title":{"rendered":"War story: RPKI is working as intended"},"content":{"rendered":"\n<p><strong>Written by <\/strong><a href=\"https:\/\/www.fastly.com\/blog\/job-snijders\"><strong>Job Snijders<\/strong><\/a><strong>, Principal Software Engineer<\/strong><\/p>\n\n\n\n<p><strong><em>Originally published in <\/em><\/strong><a href=\"https:\/\/www.fastly.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><em>Fastly blog<\/em><\/strong><\/a><\/p>\n\n\n\n<p>To be very forward, this really is a story about something that turned out to be no problem at all. But sometimes boring stories deserve to be told. To provide context for this one, we have to go back to February 2008. Back then &#8211; through no fault of their own- one of the world\u2019s most popular video-sharing platforms suffered a disastrous multi-hour outage, interrupting millions of video viewings. The impact was so significant that even mainstream media reported extensively on what was essentially an arcane routing incident. But, nowadays we\u2019re hearing less and less about incidents like these, even though the Internet is bigger than ever. Three weeks ago Fastly was the target of a BGP hijack, similar to what happened in 2008, but this time barely anyone noticed. Why is that? Something has changed. In this article, I\u2019ll delve into one of the Internet\u2019s most remarkable, yet untold, success stories.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A crash course on how Internet routing works<\/strong><\/h2>\n\n\n\n<p>At its core, the Internet is a\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_backbone\" target=\"_blank\" rel=\"noreferrer noopener\">backbone<\/a>\u00a0spanning hundreds of thousands of interconnected\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Router_(computing)\" target=\"_blank\" rel=\"noreferrer noopener\">routers<\/a>\u00a0managed by roughly 85,000 organizations to deliver data to millions of digital destinations. To establish what part of the Internet is attached where \u2014 what direction to send data packets to reach a given Internet destination (an IP address) \u2014 all these routers exchange messages with each other using an industry-standard protocol format called\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Border_Gateway_Protocol\" target=\"_blank\" rel=\"noreferrer noopener\">BGP<\/a>. The totality of this whooshing exchange of routing information oftentimes is referred to as\u00a0<em>the global Internet routing system<\/em>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-mapa-de-internet-del-proyecto-opte-1024x1024.jpg\" alt=\"\" class=\"wp-image-28275\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-mapa-de-internet-del-proyecto-opte-1024x1024.jpg 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-mapa-de-internet-del-proyecto-opte-300x300.jpg 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-mapa-de-internet-del-proyecto-opte-330x330.jpg 330w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-mapa-de-internet-del-proyecto-opte-768x768.jpg 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-mapa-de-internet-del-proyecto-opte.jpg 1318w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Internet Map by The Opte Project &#8211; Originally from the English Wikipedia, CC BY 2.5,\u00a0<\/em><a href=\"https:\/\/commons.wikimedia.org\/w\/index.php?curid=1538544\"><em>https:\/\/commons.wikimedia.org\/w\/index.php?curid=1538544<\/em><\/a><\/figcaption><\/figure>\n\n\n\n<p>One of the key factors for routers to decide which of many paths to use for sending data is the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Longest_prefix_match\" target=\"_blank\" rel=\"noreferrer noopener\">Longest Prefix Match<\/a>\u00a0(LPM) algorithm. In a nutshell: more detailed information about a destination is preferred over less granular information. Think of punching into your car\u2019s navigation system your destination\u2019s street and city versus inputting only the city name. Both approaches will bring you closer to your destination, but of course, being more specific is likely to result in a better route. Put differently, the Internet would not work without LPM.<\/p>\n\n\n\n<p>A major contributor to the Internet\u2019s amazing year-to-year growth is that basically anyone can easily connect to it and almost immediately start sending and receiving data. You hook your router up to neighboring routers from other organizations and then use BGP to send a message into the routing system. In doing so, you tell the Internet that your IP addresses are now reachable via a specified \u201cnexthop\u201d. The corollary is that the most obvious vulnerability in the routing system is unauthorized origination of routes to IP addresses. More on that thorny aspect in the next section!<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--28281\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/times-up-how-rpki-roas-perpetually-are-about-to-expire\/\">Time\u2019s Up! How RPKI ROAs Perpetually Are About to Expire<\/a><\/div><\/div><\/section>\n\n\n<h2 class=\"wp-block-heading\"><strong>What happened in 2008?<\/strong><\/h2>\n\n\n\n<p>A large nation-state\u2019s incumbent telecommunications operator was instructed to censor a popular video-sharing platform within its national borders. Of the various mechanisms to block access to a particular internet service, BGP is one of the simpler (albeit blunter) ways to blackhole undesired traffic. In the course of normal network operations, not every BGP message is intended or expected to be distributed into the global system. A network operator might intend for some BGP messages to only be distributed to its own routers for its own private purposes, constraining the scope to its own administrative domain.<\/p>\n\n\n\n<p>Unfortunately \u2014 due to a configuration mistake \u2014 the BGP messages intended to comply with the country\u2019s censorship order were also passed on to adjacent networks outside of the country, who, in turn, distributed them to their adjacent networks, and so on. In the blink of an eye, routers around the world received BGP messages that a specific set of the video platform\u2019s IP addresses (remember the LPM algorithm!) were now being served from infrastructure in Pakistan. As that wasn\u2019t at all where the video platform was actually attached, Internet data packets ended up being dropped on the floor, globally disrupting this video platform\u2019s online presence. RIPE NCC did a good&nbsp;<a href=\"https:\/\/www.ripe.net\/about-us\/news\/youtube-hijacking-a-ripe-ncc-ris-case-study\/\">write-up<\/a>&nbsp;on the technical details and&nbsp;<a href=\"https:\/\/www.nytimes.com\/2008\/02\/26\/technology\/26tube.html\">NY Times<\/a>,&nbsp;<a href=\"https:\/\/www.cnet.com\/culture\/how-pakistan-knocked-youtube-offline-and-how-to-make-sure-it-never-happens-again\/\">CNET<\/a>,&nbsp;<a href=\"https:\/\/arstechnica.com\/uncategorized\/2008\/02\/insecure-routing-redirects-youtube-to-pakistan\/\">Ars Technica<\/a>, and&nbsp;<a href=\"https:\/\/www.nbcnews.com\/id\/wbna23339712\">NBC News<\/a>&nbsp;also covered the incident.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Fast forward to 2024<\/strong><\/h2>\n\n\n\n<p>A very similar routing incident happened to Fastly just last week, but this time around no headlines were made. While this incident would\u2019ve severely affected Fastly a few years ago, this time the impact was negligible. What gives? While the specific players and motivations differ from the famous 2008 incident, at its heart, the technical details were the same. In this more recent case, the state incumbent of another large nation generated BGP messages hijacking some of Fastly\u2019s IP address space for the purpose of disrupting Internet traffic. What makes now different from then?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>RPKI improves the routing system\u2019s reliability<\/strong><\/h2>\n\n\n\n<p>The big difference between 2008 and 2024 is that nowadays the Internet industry uses a cryptographically verifiable mechanism called\u00a0<a href=\"https:\/\/www.fastly.com\/blog\/fastly-drives-improved-internet-routing-security-with-global-push-to-adopt\" target=\"_blank\" rel=\"noreferrer noopener\">RPKI<\/a>\u00a0to assess plausibility of BGP messages in a fully automated fashion. The RPKI is a distributed database through which networks can publish their routing intentions in\u00a0<a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc9582.html\" target=\"_blank\" rel=\"noreferrer noopener\">Route Origin Authorizations (ROAs)<\/a>, in turn enabling other networks to validate BGP messages against this database using a service called Route Origin Validation (ROV). By rejecting messages that fail this validation, the RPKI-invalid routes can be\u00a0<a href=\"https:\/\/www.kentik.com\/blog\/how-much-does-rpki-rov-reduce-the-propagation-of-invalid-routes\/\" target=\"_blank\" rel=\"noreferrer noopener\">kept out of circulation<\/a>, limiting their ability to cause disruption.<\/p>\n\n\n\n<p>Publishing ROAs is easy! All five\u00a0<a href=\"https:\/\/nro.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">RIRs<\/a>\u00a0offer RPKI certification services as part of their standard membership services. Since Fastly publishes ROAs for all of its IP addresses, Internet Exchanges and major carriers like NTT, Comcast, AT&amp;T, Cogent, Arelion, and Lumen can automatically ignore problematic BGP messages (like as the ones that were hijacking Fastly\u2019s IP space in this latest incident!).\u00a0<em>Because<\/em>\u00a0the industry at large is using RPKI, the only measurable impact on our traffic delivery was towards the disruptor itself, the rest of the world remained oblivious of this incident. A very serious BGP hijack happened and Fastly came out just fine. RPKI works as intended.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>RPKI is a mature technology<\/strong><\/h2>\n\n\n\n<p>RPKI\u2019s story started two decades ago when X.509 certificate syntax was extended to support encoding IP addresses and Autonomous System numbers via\u00a0<a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc3779\" target=\"_blank\" rel=\"noreferrer noopener\">RFC 3779<\/a>. (X.509 is the underpinning of web security mechanisms like \u201chttps:\/\/\u201d that we\u2019re all familiar with.) In the following years, a design for an architecture materialized,\u00a0 imposing order on the unwieldy ever-growing global routing system (<a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc6480\" target=\"_blank\" rel=\"noreferrer noopener\">RFC 6480<\/a>). Then the five RIRs (APNIC, ARIN, RIPE NCC, LACNIC, and AfriNIC) got to work to build user-facing systems through which operators can configure ROAs. In 2018 and 2019, open-source projects like\u00a0<a href=\"https:\/\/www.rpki-client.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">rpki-client<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.nlnetlabs.nl\/projects\/routing\/routinator\/\" target=\"_blank\" rel=\"noreferrer noopener\">routinator<\/a>\u00a0were kicked off to securely bridge the gap between the RIR systems and BGP routers. And finally, in the year 2020, there was a\u00a0<a href=\"https:\/\/rpki-monitor.antd.nist.gov\/ROV#div2\" target=\"_blank\" rel=\"noreferrer noopener\">sharp increase<\/a>\u00a0in the adoption of RPKI by the largest ISPs, IXPs, and cloud providers enabling the RPKI system to be more effective in providing broad benefits to the Internet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Realizing fundamental changes, like what RPKI did for the Internet, is a matter of extreme patience and perseverance. This is because the Internet, by design, has no centralized or top-down administration. The Internet\u2019s routing system is a voluntary collaboration between close to 100,000 organizations. Change comes from leading by example, educational outreach to peers and business partners, and an iterative engineering approach to resolve any obstacles discovered along the way. Hundreds of engineers and scientists cumulatively dedicated hundreds of years to meticulously perform heart surgery on a running system, embracing RPKI and improving Internet reliability. Even now work continues in the\u00a0<a href=\"https:\/\/www.ietf.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">IETF<\/a>\u00a0to further improve the dependability and performance of the RPKI.<\/p>\n\n\n\n<p>It came as no surprise to me when the\u00a0<a href=\"https:\/\/www.whitehouse.gov\/oncd\/briefing-room\/2024\/09\/03\/press-release-white-house-office-of-the-national-cyber-director-releases-roadmap-to-enhance-internet-routing-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Executive Branch<\/a>\u00a0of the US Government recognized the societal benefits of using RPKI and endorsed the technology to begin to address the vulnerabilities inherent in BGP. Ultimately, the RPKI is a system that helps networks stay in their own lane, allowing everyone to safely zip along the digital highway.<\/p>\n\n\n\n<p><em>Joel Jaeggli (Fastly), Tony Tauber (Comcast), and Doug Madory (Kentik) contributed to this article.<\/em><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by Job Snijders, Principal Software Engineer Originally published in Fastly blog To be very forward, this really is a story about something that turned out to be no problem at all. But sometimes boring stories deserve to be told. To provide context for this one, we have to go back to February 2008. Back [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":28278,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[919],"tags":[1280],"archivo":[1345,1451],"taxonomy-authors":[1500],"tipo_autor":[],"class_list":["post-28281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-routing","tag-routing","archivo-editions","archivo-highlights-2023","taxonomy-authors-job-snijders-en"],"acf":{"author":" Job Snijders","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | War story: RPKI is working as intended<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | War story: RPKI is working as intended\" \/>\n<meta property=\"og:description\" content=\"Written by Job Snijders, Principal Software Engineer Originally published in Fastly blog To be very forward, this really is a story about something that turned out to be no problem at all. But sometimes boring stories deserve to be told. To provide context for this one, we have to go back to February 2008. Back [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-03T12:14:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-03T12:14:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"War story: RPKI is working as intended\",\"datePublished\":\"2024-12-03T12:14:25+00:00\",\"dateModified\":\"2024-12-03T12:14:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/\"},\"wordCount\":1362,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png\",\"keywords\":[\"Routing\"],\"articleSection\":[\"Routing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/\",\"name\":\"LACNIC Blog | War story: RPKI is working as intended\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png\",\"datePublished\":\"2024-12-03T12:14:25+00:00\",\"dateModified\":\"2024-12-03T12:14:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"War story: RPKI is working as intended\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | War story: RPKI is working as intended","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | War story: RPKI is working as intended","og_description":"Written by Job Snijders, Principal Software Engineer Originally published in Fastly blog To be very forward, this really is a story about something that turned out to be no problem at all. But sometimes boring stories deserve to be told. To provide context for this one, we have to go back to February 2008. Back [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-12-03T12:14:25+00:00","article_modified_time":"2024-12-03T12:14:26+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"War story: RPKI is working as intended","datePublished":"2024-12-03T12:14:25+00:00","dateModified":"2024-12-03T12:14:26+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/"},"wordCount":1362,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png","keywords":["Routing"],"articleSection":["Routing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/","url":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/","name":"LACNIC Blog | War story: RPKI is working as intended","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png","datePublished":"2024-12-03T12:14:25+00:00","dateModified":"2024-12-03T12:14:26+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/war-story-rpki-is-working-as-intended\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"War story: RPKI is working as intended"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/rpki-seguridad-enrutamiento-internet-collaboracion.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":28272,"post_title":"Historia de guerra: RPKI est\u00e1 funcionando seg\u00fan lo previsto","slug":"historia-de-guerra-rpki-esta-funcionando-segun-lo-previsto","href":"https:\/\/blog.lacnic.net\/historia-de-guerra-rpki-esta-funcionando-segun-lo-previsto\/"},{"locale":"pt_BR","id":28287,"post_title":"Hist\u00f3ria de guerra: o RPKI est\u00e1 funcionando conforme planejado","slug":"historia-de-guerra-o-rpki-esta-funcionando-conforme-planejado","href":"https:\/\/blog.lacnic.net\/pt-br\/historia-de-guerra-o-rpki-esta-funcionando-conforme-planejado\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=28281"}],"version-history":[{"count":1,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28281\/revisions"}],"predecessor-version":[{"id":28283,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28281\/revisions\/28283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/28278"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=28281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=28281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=28281"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=28281"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=28281"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=28281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}