What is RPKI? Securing BGP Routing

RPKI (Resource Public Key Infrastructure) is a security framework that helps protect BGP routing from hijacks and misconfigurations. It provides a way for networks to cryptographically prove that they are authorized to announce specific IP address blocks, and for other networks to verify those claims.

The Problem: BGP Has No Built-In Security

BGP was designed in the late 1980s, when the internet was a small, trusted community. The protocol has no built-in mechanism to verify whether a network is actually authorized to announce a particular IP prefix. Any autonomous system can, in principle, announce any prefix — and other networks will accept it.

This has led to real-world incidents:

These incidents demonstrate why verifying the legitimacy of BGP announcements is critical.

How RPKI Works

RPKI adds a layer of cryptographic verification to BGP. Here is how it works:

1. Route Origin Authorizations (ROAs)

The holder of an IP address block creates a Route Origin Authorization (ROA) — a digitally signed statement that says: "AS number X is authorized to announce prefix Y with a maximum prefix length of Z."

For example, Google might create a ROA stating: "AS15169 is authorized to announce 8.8.8.0/24."

2. Certificate Chain

ROAs are signed using certificates issued by the Regional Internet Registries (RIRs: ARIN, RIPE, APNIC, AFRINIC, LACNIC). The certificate chain goes from the RIR down to the IP address holder, creating a verifiable trust hierarchy rooted in the organizations that allocate internet number resources.

3. Route Origin Validation (ROV)

Networks that implement RPKI can perform Route Origin Validation on every BGP route they receive. By checking the route against published ROAs, they determine the validation state of each route.

RPKI Validation States

When a BGP route is validated against RPKI, it receives one of three states:

RPKI Deployment Progress

RPKI adoption has grown significantly in recent years. Major networks including Cloudflare (AS13335), Google (AS15169), and many large ISPs now perform Route Origin Validation and reject RPKI-invalid routes. According to NIST, over 40% of global prefixes now have valid ROAs.

However, adoption is uneven. Some regions and network types have much higher coverage than others. Full protection requires both:

Beyond RPKI: BGPsec and ASPA

RPKI only validates the origin of a route — it does not verify the entire AS path. Two emerging standards aim to address this:

Check RPKI Status

When you look up any IP address or prefix, the looking glass automatically checks the RPKI validation status. Try these lookups to see RPKI in action:

See BGP routing data in real time

Open Looking Glass
More Articles
What is BGP? The Internet's Routing Protocol Explained
What is an Autonomous System (AS)?
What is a BGP Looking Glass?
How to Look Up an IP Address's BGP Route
Understanding BGP AS Paths
What is DNS? The Internet's Phone Book
What is an IP Address?
IPv4 vs IPv6: What's the Difference?
What is a Network Prefix (CIDR)?
What is an Internet Exchange Point (IXP)?
What is Peering? How Networks Interconnect
How Does Traceroute Work?
What is a CDN? Content Delivery Networks Explained
What is DNS over HTTPS (DoH)?
What is a BGP Hijack?
What are TLDs? Top-Level Domains Explained
What is Anycast? One IP, Many Servers
What is a Subnet? IP Subnetting Explained