Route filtering and RPKI
Network operators rely on IRR records to determine which autonomous systems (ASNs) are authorized to announce specific IP prefixes. Based on these records, operators configure filtering policies on their routers to block unauthorized announcements — a practice known as route filtering.
However, IRR records alone are not cryptographically verified, which means they can be inaccurate or outdated. Resource Public Key Infrastructure (RPKI) addresses this gap by adding cryptographic validation. With RPKI, the association between an IP prefix and its authorized ASN is signed and verifiable, allowing network operators to confirm that a route announcement is legitimate before accepting it.
When you register your prefix with one of the five Regional Internet Registries (RIRs)1, you can create a Route Origin Authorization (ROA) — a cryptographically signed object that declares which ASN is authorized to originate your prefix. ROAs are publicly verifiable, and you can check your prefixes using Cloudflare's RPKI Portal ↗ or other sources such as Routinator ↗.
-
AFRINIC, APNIC, ARIN, LACNIC, and RIPE. ↩