Merely doing RPKI ROV does not provide any guarantees where your packet ends up. We conducted an experiment where we look into the impact of RPKI ROV on whether the packet ends up in the intended location based on active beaconing with two servers.
Koen van Hove
Likes on articles
About the author
Koen van Hove is a researcher at the University of Twente on the topic of network security, with a focus on DoS-risks. His most notable contributions are to the DDoS Clearing House and RPKI Relying Party Resiliency Platform.
Links & Social
The security RPKI provides is clear, but what about the security of the infrastructure itself? For example, is it possible to disrupt RPKI Relying Party software by, say, introducing a malicious CA/repository into the tree? The short answer is: yes. For a longer answer, read on...
Showing 2 article(s)