<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Origin on Wirez</title><link>https://wirez.top/tags/origin/</link><description>Recent content in Origin on Wirez</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 20 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://wirez.top/tags/origin/index.xml" rel="self" type="application/rss+xml"/><item><title>RPKI route validation cuts $4.44M breach risk</title><link>https://wirez.top/posts/rpki-route-validation-cuts-444m-breach-risk/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/rpki-route-validation-cuts-444m-breach-risk/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With cybercrime costing $10.5 trillion in 2026, ignoring &lt;strong>cryptographic route validation&lt;/strong> is financial negligence. The stability of the global network now demands that operators abandon fragile manual databases for &lt;strong>RPKI Route Origin Authorizations&lt;/strong> to prevent catastrophic hijacking. Readers will examine the critical transition from the error-prone &lt;strong>Internet Routing Registry&lt;/strong> to modern cryptographic standards that bind prefixes to origin ASNs automatically. We dissect the mechanics of &lt;strong>AS path authorization&lt;/strong>, detailing how routers drop invalid routes in real-time rather than relying on outdated static lists. Finally, the analysis covers practical deployment using &lt;strong>MyAPNIC&lt;/strong> and &lt;strong>DASH monitoring&lt;/strong> to visualize complex data streams. &lt;a href="https://blog.apnic.net/2025/12/12/nro-rpki-program-2025-in-review/" target="_blank" rel="noopener noreferrer">APNIC&amp;#039;s nro rpki program 2025 in review&lt;/a>&lt;/p></description></item><item><title>Route server blind spots break ASSET filtering</title><link>https://wirez.top/posts/route-server-blind-spots-break-asset-filtering/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/route-server-blind-spots-break-asset-filtering/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">A single misconfigured prefix can cascade across &lt;strong>multi-terabit&lt;/strong> exchanges because current &lt;strong>Route Server&lt;/strong> models often fail to verify the origin ASN against authorized lists.&lt;/p></description></item><item><title>BGP hijacking in 2025: When forged docs beat RPKI</title><link>https://wirez.top/posts/bgp-hijacking-in-2025-when-forged-docs-beat-rpki/</link><pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/bgp-hijacking-in-2025-when-forged-docs-beat-rpki/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">In July 2025, attackers bypassed cryptographic safeguards by manipulating a multinational provider through forged documents and social engineering. This incident proves that &lt;strong>BGP route hijacking&lt;/strong> has evolved from a purely technical exploit into a hybrid threat where human deception defeats &lt;strong>RPKI validation&lt;/strong>. While networks obsess over protocol anomalies, adversaries now target the administrative onboarding processes that grant legitimacy to malicious routes.&lt;/p></description></item><item><title>RPKI stops hijacking: Why 43% IPv4 coverage matters</title><link>https://wirez.top/posts/rpki-stops-hijacking-why-43-ipv4-coverage-matters/</link><pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/rpki-stops-hijacking-why-43-ipv4-coverage-matters/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With &lt;a href="https://en.wikipedia.org/wiki/IPv4" target="_blank" rel="noopener noreferrer">IPv4&lt;/a> ROA coverage hitting 43.17% per Kentik data, &lt;strong>RPKI adoption&lt;/strong> is no longer optional for serious network operators.&lt;/p>
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">The upcoming &lt;a href="https://www.arin.net/" target="_blank" rel="noopener noreferrer">ARIN&lt;/a> Deep Dive in Albuquerque highlights that &lt;strong>routing security&lt;/strong> has shifted from theoretical best practice to immediate operational necessity. &lt;a href="https://www.arin.net/resources/manage/rpki/hybrid/" target="_blank" rel="noopener noreferrer">ARIN&amp;#039;s hybrid&lt;/a> While the global PKI market explodes, the real story lies in the sharp divergence between networks that validate BGP announcements and those still vulnerable to hijacking. This article dissects the critical mechanics of &lt;strong>Resource Public Key Infrastructure&lt;/strong>, arguing that understanding the distinction between hosted and delegated models is now a core competency for any engineer managing autonomous systems.&lt;/p></description></item><item><title>Route origin security gaps in East Asia's IPv4</title><link>https://wirez.top/posts/route-origin-security-gaps-in-east-asias-ipv4/</link><pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/route-origin-security-gaps-in-east-asias-ipv4/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Global &lt;strong>Route Origin Authorization&lt;/strong> coverage hit 60.3% in February 2026, yet APNIC&amp;#039;s uneven 55. &lt;a href="https://blog.apnic.net/2026/02/20/rpkis-2025-year-in-review/" target="_blank" rel="noopener noreferrer">APNIC&amp;#039;s rpkis 2025 year in review&lt;/a> 5% adoption rate exposes critical interconnectivity risks.&lt;/p></description></item><item><title>RPKI validation gaps: Why 84% skip enforcement</title><link>https://wirez.top/posts/rpki-validation-gaps-why-84-skip-enforcement/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/rpki-validation-gaps-why-84-skip-enforcement/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With only 12.3% of analyzed ASes actively enforcing Route Origin Validation, global routing security remains critically fragile despite rising signature rates. The stark reality is that signing routes via &lt;strong>Resource Public Key Infrastructure&lt;/strong> means nothing without the mandatory filtering of invalid announcements at the network edge. Readers will examine the core mechanics of &lt;strong>Route Origin Validation&lt;/strong> and why current adoption metrics from APNIC data reveal a dangerous disconnect between signed prefixes and protected traffic. &lt;a href="https://blog.apnic.net/2025/07/22/how-can-rpki-can-be-made-quantum-safe/" target="_blank" rel="noopener noreferrer">APNIC&amp;#039;s how can rpki can be made quantum safe&lt;/a> We dissect the specific failure modes of legacy BGP verification and how &lt;strong>Autonomous System Provider Authorization&lt;/strong> closes the loop on path hijacking by cryptographically validating upstream relationships. The analysis moves beyond theory to present a concrete operational playbook for deploying these controls, drawing direct lessons from IDNIC&amp;#039;s successful mandate in Indonesia.&lt;/p></description></item><item><title>ASSET filtering beats linear scans for BGP</title><link>https://wirez.top/posts/asset-filtering-beats-linear-scans-for-bgp/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/asset-filtering-beats-linear-scans-for-bgp/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Matching a single ASN via tree lookup is exponentially faster than the legacy linear scanning found in older &lt;strong>as-path-set&lt;/strong> implementations.&lt;/p></description></item><item><title>Cloudflare data reveals origin server lag today</title><link>https://wirez.top/posts/cloudflare-data-reveals-origin-server-lag-today/</link><pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/cloudflare-data-reveals-origin-server-lag-today/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Over 60% of client connections now support post-quantum encryption, yet origin server readiness remains the critical blind spot. &lt;a href="https://blog.cloudflare.com/cloudflare-radars-2023-overview-of-new-tools-and-insights/" target="_blank" rel="noopener noreferrer">&lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a> radars 2023 overview of new tools and insights&lt;/a> &lt;strong>Cloudflare Radar&lt;/strong> exposes this disconnect by shifting visibility from edge metrics to the actual security posture of customer infrastructure. The platform&amp;#039;s latest update argues that true durability requires auditable proof of &lt;strong>hybrid key exchange&lt;/strong> deployment and rigorous &lt;strong>routing security&lt;/strong> validation, not just theoretical compatibility.&lt;/p></description></item><item><title>RPKI in 2025: Why Path Validation Matters Now</title><link>https://wirez.top/posts/rpki-in-2025-why-path-validation-matters-now/</link><pubDate>Fri, 20 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/rpki-in-2025-why-path-validation-matters-now/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With Unique &lt;a href="https://datatracker.ietf.org/doc/html/rfc9582" target="_blank" rel="noopener noreferrer">ASPA&lt;/a> Customer ASIDs surging 539% in 2025 per RPKIViews. Org data, the industry has decisively pivoted from simple origin checks to thorough path validation. Readers will examine how &lt;strong>RPKI&lt;/strong> evolved from a niche preference to a critical infrastructure component, underpinned by a 23% increase in ROA objects reaching over 344,000 entries according to ARIN and RIPE NCC trust anchors. &lt;a href="https://www.arin.net/vault/blog/2017/10/31/implementing-rpki-its-easier-than-you-think/" target="_blank" rel="noopener noreferrer">ARIN&amp;#039;s implementing rpki its easier than you think&lt;/a> We dissect the mechanics of &lt;strong>validation performance&lt;/strong>, noting that despite a 20% growth in total cache size, optimized implementations like rpki-client reduced wall time validation runs by 23% on standard hardware. The analysis further details the strategic imperative for &lt;strong>ASPA objects&lt;/strong>, where all Regional Internet Registries have committed to full service availability by late 2026.&lt;/p></description></item><item><title>RPKI path security: The shift past origin checks</title><link>https://wirez.top/posts/rpki-path-security-the-shift-past-origin-checks/</link><pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/rpki-path-security-the-shift-past-origin-checks/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">A 539% surge in Unique &lt;a href="https://datatracker.ietf.org/doc/html/rfc9582" target="_blank" rel="noopener noreferrer">ASPA&lt;/a> Customer ASIDs proves the &lt;strong>RPKI database&lt;/strong> has shifted from simple origin checks to complex path validation.&lt;/p></description></item></channel></rss>