In 2008, Pakistan Telecom accidentally hijacked YouTube by announcing their IP prefix.In 2018, a BGP leak sent Google traffic through China and Russia. RPKI exists to prevent this.

The Trust Problem with BGP

BGP has no authentication. When an AS announces "I own 8.8.8.0/24," other routers simply believe it. This enables:

  • Accidental Hijacking: Misconfigurations leak internal routes to the global table.
  • Malicious Hijacking: Attackers announce victim prefixes to intercept or blackhole traffic.
  • Route Leaks: Customer/peer routes accidentally propagated to other peers.

RPKI: Cryptographic Route Authorization

Resource Public Key Infrastructure (RPKI) lets IP address holders cryptographically sign which AS numbers are authorized to announce their prefixes.

  • ROA (Route Origin Authorization): A signed object stating "AS64496 is allowed to announce 192.0.2.0/24 with max prefix length /24"
  • Validators: Software that downloads ROAs from the five Regional Internet Registries and builds a validated cache
  • RTR Protocol: Routers query validators to get the validated prefix-to-AS mappings

Route Origin Validation (ROV)

When a router receives a BGP announcement, it checks the prefix and origin AS against RPKI data:

  • Valid: ROA exists and matches. Accept with high local preference.
  • Invalid: ROA exists but does NOT match. Reject or deprioritize.