Securing RPSL Objects with RPKI Signatures

The information below is for an old version of the document
Document Type Expired Internet-Draft (sidr WG)
Last updated 2010-07-10 (latest revision 2010-03-08)
Replaces draft-kisteleki-sidr-rpsl-sig
Stream IETF
Intended RFC status (None)
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream WG state WG Document
Document shepherd None
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document describes a method to allow parties to electronically sign RPSL-like objects and validate such electronic signatures. This allows relying parties to detect accidental or malicious modifications on such objects. It also allows parties who run Internet Routing Registries or similar databases, but do not yet have RPSS-like authentication of the maintainers of certain objects, to verify that the additions or modifications of such database objects are done by the legitimate holder(s) of the Internet resources mentioned in those objects.


Robert Kisteleki (
Brian Haberman (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)