Speaker
Ben Maddison
(Workonline Communications)
Description
We will discuss:
- Route leaks and the valley-free model
- The ASPA RPKI signed object and its authorisation model
- The ASPA verification procedure and how leaks are detected
- How ASPA compares to other technologies (esp. why BGPsec doesn't solve the same problem)
- The current state of work at the IETF and in implementations
- What operators can do to get involved
Primary author
Ben Maddison
(Workonline Communications)