The security RPKI provides is clear, but what about the security of the infrastructure itself? For example, is it possible to disrupt RPKI Relying Party software by, say, introducing a malicious CA/repository into the tree? The short answer is: yes. For a longer answer, read on...
Koen van Hove
Likes on articles
About the author
Koen van Hove is a researcher at the University of Twente on the topic of network security, with a focus on DoS-risks. His most notable contributions are to the DDoS Clearing House and RPKI Relying Party Resiliency Platform.