The Relying Party Security Technology for Internet Routing (RPSTIR, pronounced "rip-stir") helps network operators detect and reject accidental, false route origin advertisements, thus reducing the likelihood of inadvertent Internet address space hijacking. Using the global Resource Public Key Infrastructure (RPKI), RPSTIR securely generates a list of authorized prefix-origin AS pairs. Routers retrieve this list via the RPKI-RTR protocol and use it to detect false origin announcements due to errors by network operators, e.g., the Pakistan Telecom hijack of YouTube address space. In addition to enabling operators to utilize RPKI data, RPSTIR also provides fine-grained diagnostic tools for those who publish RPKI data. This effort by Raytheon BBN was supported by the U.S. Department of Homeland Security's (DHS) Directorate for Science and Technology.
To subscribe to announcements, send email to firstname.lastname@example.org and reply to confirm.
Be the first to post a review of RPSTIR!