{"id":29031,"date":"2025-02-26T14:07:21","date_gmt":"2025-02-26T14:07:21","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=29031"},"modified":"2025-02-27T14:59:04","modified_gmt":"2025-02-27T14:59:04","slug":"trust-anchor-key-tak-secure-key-rotation-in-rpki","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/","title":{"rendered":"Trust Anchor Key (TAK): Secure Key Rotation in RPKI"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/autor\/carlos-martinez\">&nbsp;<\/a><a href=\"https:\/\/blog.lacnic.net\/en\/author\/carlos-martinez\/\">Carlos Martinez Cagnazzo<\/a>, Chief Technical Officer at LACNIC<\/p>\n\n\n\n<p>The<strong> rotation of secure keys in RPKI<\/strong> has historically been a topic that had not generated enough interest to elevate the discussion to a higher level.&nbsp; This issue primarily affects <strong>Trust Anchor operators<\/strong>\u2014a small community of five individuals representing the five Regional Internet Registries (RIRs).<\/p>\n\n\n\n<p>Some time ago, we started discussing this matter and identified a shared operational concern. As a next step, we collaborated with George G. Michaelson, Tom Harrison, Tim Bruijnzeels, Rob Austein and myself to draft the RFC <a href=\"https:\/\/datatracker.ietf.org\/doc\/rfc9691\/\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;A Profile for Resource Public Key Infrastructure (RPKI) Trust Anchor Keys (TAKs).&#8221;<\/a> This document, which has now been published, introduces<strong> a new object<\/strong> within RPKI called the <strong>Trust Anchor Key (TAK).<\/strong> Previously, given that this issue affects a relatively small community, <strong>we first had to demonstrate to the IETF working group that it was indeed a significant challenge<\/strong>.<\/p>\n\n\n\n<p>Why did we face this need at RPKI? <strong>Encryption algorithms have a limited lifespan<\/strong>\u2014sometimes measured in decades, while in other cases, it can be much shorter. Basically, it is always advisable to change them for security reasons. Beyond that, attacking this type of algorithms is a common academic exercise, continuously studied and tested.<\/p>\n\n\n\n<p>As a result, anyone responsible for safeguarding encrypted information must anticipate the need to <strong>switch encryption algorithms at some point.<\/strong> When an encryption algorithm is changed, the key must also be replaced. This is because different algorithms typically require keys of varying lengths, making the generation of a new key essential.<\/p>\n\n\n\n<p>What\u2019s the challenge? The difficulty arises because, in RPKI, Relying Parties (RPs) use a special list called TAL (Trust Anchor Locator) to find and verify trusted authority certificates. However, until now, there has been <strong>no automatic mechanism to notify RPs when the TAL is updated. <\/strong><strong>&nbsp;This means that Trust Anchor operators had no way to ensure that RPs would be aware of critical changes, such as security key updates.<\/strong><strong><\/strong><\/p>\n\n\n\n<p>The purpose of the RFC is to introduce an object that facilitates the registration and communication of the Trust Anchor certificate\u2019s location along with its current public key. In addition, it also documents the future public key that will replace the current one and the location of its certificate. <strong>This object enables RPs to automatically receive updates on these changes, allowing Trust Anchors to plan the transition to a new key without the risk of invalidating the RPKI tree.<\/strong><\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--29031\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/rpki-the-invisible-pillar-holding-the-internet-together\/\">RPKI: The Invisible Pillar Holding the Internet Together<\/a><\/div><\/div><\/section>\n\n\n<p>How does it work? Before processing any other data, an RP first checks for the presence of a Trust Anchor Key (TAK) object.<strong> If the TAK only references the current public key, the RP will continue to operate as usual. If the TAK includes a future public key, the RP initiates a 30-day waiting period before accepting it. During this time, the RP continues the normal validation process using the existing key.<\/strong><strong><\/strong><\/p>\n\n\n\n<p>With the RFC now published, the next step is implementing this functionality for Trust Anchor operators, which <strong>we<\/strong> <strong>estimate will be ready between the end of this year and the next.<\/strong><\/p>\n\n\n\n<p>This is a good opportunity to emphasize the importance of <strong>keeping validators up to date<\/strong>. Otherwise, they run the risk of continuing to use outdated keys, which could lead to Trust Anchor certificates being rejected, invalidating legitimate routes, and causing network connectivity disruptions.<\/p>\n\n\n\n<p>Additionally, if validators are not updated, they could become vulnerable to attacks such as identity spoofing or the use of compromised keys. Moreover, an outdated validator would force network operators to perform manual updates, increasing operational workload and the risk of human error. Finally, it may not be compatible with new practices and standards, leaving the network exposed to interoperability issues and loss of confidence in the routing security infrastructure.<\/p>\n\n\n\n<p>In short, organizations and network operators relying on RPKI <strong>should follow best practices to ensure the resilience and security of their infrastructure<\/strong>.<strong> Keeping validators up to date is a fundamental part of this strategy.<\/strong><strong><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By &nbsp;Carlos Martinez Cagnazzo, Chief Technical Officer at LACNIC The rotation of secure keys in RPKI has historically been a topic that had not generated enough interest to elevate the discussion to a higher level.&nbsp; This issue primarily affects Trust Anchor operators\u2014a small community of five individuals representing the five Regional Internet Registries (RIRs). Some [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":28963,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[919],"tags":[1280],"archivo":[1345,1451],"taxonomy-authors":[1198],"tipo_autor":[],"class_list":["post-29031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-routing","tag-routing","archivo-editions","archivo-highlights-2023","taxonomy-authors-carlos-martinez-en"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Trust Anchor Key (TAK): Secure Key Rotation in RPKI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Trust Anchor Key (TAK): Secure Key Rotation in RPKI\" \/>\n<meta property=\"og:description\" content=\"By &nbsp;Carlos Martinez Cagnazzo, Chief Technical Officer at LACNIC The rotation of secure keys in RPKI has historically been a topic that had not generated enough interest to elevate the discussion to a higher level.&nbsp; This issue primarily affects Trust Anchor operators\u2014a small community of five individuals representing the five Regional Internet Registries (RIRs). Some [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-26T14:07:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-27T14:59:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Trust Anchor Key (TAK): Secure Key Rotation in RPKI\",\"datePublished\":\"2025-02-26T14:07:21+00:00\",\"dateModified\":\"2025-02-27T14:59:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/\"},\"wordCount\":671,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png\",\"keywords\":[\"Routing\"],\"articleSection\":[\"Routing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/\",\"name\":\"LACNIC Blog | Trust Anchor Key (TAK): Secure Key Rotation in RPKI\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png\",\"datePublished\":\"2025-02-26T14:07:21+00:00\",\"dateModified\":\"2025-02-27T14:59:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust Anchor Key (TAK): Secure Key Rotation in RPKI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Trust Anchor Key (TAK): Secure Key Rotation in RPKI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Trust Anchor Key (TAK): Secure Key Rotation in RPKI","og_description":"By &nbsp;Carlos Martinez Cagnazzo, Chief Technical Officer at LACNIC The rotation of secure keys in RPKI has historically been a topic that had not generated enough interest to elevate the discussion to a higher level.&nbsp; This issue primarily affects Trust Anchor operators\u2014a small community of five individuals representing the five Regional Internet Registries (RIRs). Some [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2025-02-26T14:07:21+00:00","article_modified_time":"2025-02-27T14:59:04+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Trust Anchor Key (TAK): Secure Key Rotation in RPKI","datePublished":"2025-02-26T14:07:21+00:00","dateModified":"2025-02-27T14:59:04+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/"},"wordCount":671,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png","keywords":["Routing"],"articleSection":["Routing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/","url":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/","name":"LACNIC Blog | Trust Anchor Key (TAK): Secure Key Rotation in RPKI","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png","datePublished":"2025-02-26T14:07:21+00:00","dateModified":"2025-02-27T14:59:04+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/trust-anchor-key-tak-secure-key-rotation-in-rpki\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Trust Anchor Key (TAK): Secure Key Rotation in RPKI"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/02\/trust-anchor-key-tak-seguridad-rpki.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":28976,"post_title":"Trust Anchor Key (TAK): transici\u00f3n de claves seguras en RPKI","slug":"trust-anchor-key-rpki","href":"https:\/\/blog.lacnic.net\/trust-anchor-key-rpki\/"},{"locale":"pt_BR","id":29046,"post_title":"Trust Anchor Key (TAK): transi\u00e7\u00e3o de chaves seguras no RPKI","slug":"trust-anchor-key-tak-transicao-de-chaves-seguras-no-rpki","href":"https:\/\/blog.lacnic.net\/pt-br\/trust-anchor-key-tak-transicao-de-chaves-seguras-no-rpki\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/29031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=29031"}],"version-history":[{"count":3,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/29031\/revisions"}],"predecessor-version":[{"id":29036,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/29031\/revisions\/29036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/28963"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=29031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=29031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=29031"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=29031"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=29031"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=29031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}