@@ -310,15 +310,23 @@ By following the chain back to the root certificate, it is possible to
310310establish that *C * is legitimately able to advertise the prefix
311311allocated to it by *A *.
312312
313- *C * can now create a Route Origin Authorization (ROA) which it signs
313+ At this point we have created a set of bindings between public keys,
314+ which are held by entities such as Internet Registries, ISPs, and end
315+ customers, and IP address prefixes allocated to those entities. The
316+ next step is to create a Route Origin Authorization (ROA), which
317+ cryptographically associates a prefix with an AS that is authorized to
318+ originate routing advertisements for that prefix.
319+
320+ In our example above, *C * can create an ROA which it signs
314321with its private key. The ROA contains the AS number of *C * and the
315322prefix or prefixes that it wishes to advertise. Anyone who looks at
316323the ROA and the resource certificate chain that leads from the root CA to *C *
317324can validate that it has been signed with the private key
318325belonging to the entity authorized to advertise the prefixes in the
319326ROA. Because the ROA also contains the AS number for *C *, we now know
320327that we should trust advertisements of this prefix if they originate
321- from the stated AS.
328+ from the stated AS. An ROA may also limit the maximum length of the prefix to
329+ protect against bogus advertisements of more specific routes to a sub-prefix.
322330
323331
324332Rather than being passed around in real time like certificates in TLS,
@@ -364,7 +372,9 @@ prefixes.
364372
365373.. rubric :: path validation
366374
375+ example - path shortening attack
367376
377+ cryptographic signature on all BGP adverts
368378
369379
370380
0 commit comments