RPKI & ROA
Resource Public Key Infrastructure information for AS202941
RPKI Enabled
All AS202941 route announcements are covered by valid ROAs.
Our RPKI Policy
AS202941 takes routing security seriously:
- ROA Coverage: All our prefixes have valid Route Origin Authorizations
- RPKI Validation: We validate received routes against RPKI
- Invalid Routes: We reject RPKI invalid routes
- Unknown Routes: We accept RPKI unknown (not-found) routes
RPKI Validation Policy
| RPKI State | Action | Local Preference |
|---|---|---|
| Valid | Accept | +20 |
| Unknown | Accept | Normal |
| Invalid | Reject | N/A |
Recommendations for Peers
Best Practices
- Create ROAs for all your prefixes
- Use maxLength appropriately (don't set too high)
- Implement RPKI validation on your network
- Drop RPKI invalid routes
- Prefer RPKI valid routes over unknown
RPKI Resources
ASPA (Future)
We are monitoring the development of Autonomous System Provider Authorization (ASPA) and plan to implement it once it reaches broader adoption. ASPA will help prevent route leaks by authorizing upstream providers.