{"id":77371,"date":"2018-04-06T14:14:05","date_gmt":"2018-04-06T14:14:05","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/04\/new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security\/"},"modified":"2025-11-20T13:23:36","modified_gmt":"2025-11-20T13:23:36","slug":"new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2018\/04\/new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security\/","title":{"rendered":"Nuevo RFC 8360 \u2013 RPKI Validaci\u00f3n \u2013 Procedimientos de validaci\u00f3n alternativos para mejorar la seguridad de enrutamiento"},"content":{"rendered":"<p><a href=\"https:\/\/www.rfc-editor.org\/info\/rfc8360\">RFC 8360, Resource Public Key Infrastructure (RPKI) Validation Reconsidered<\/a>, ha sido publicado por RFC.<\/p>\n<h3><strong>Qu\u00e9 es RPKI?<\/strong><\/h3>\n<p>Key Border Gateway Protocol (BGP), una infraestructura de clave p\u00fablica (RPKI), se ha establecido para las rutas BGP. Hoy en d\u00eda, la mayor\u00eda de las organizaciones\u00a0simplemente conf\u00eda en que las actualizaciones de enrutamiento son enviadas por remitentes autorizados. As\u00ed es como los malos actores y las configuraciones incorrectas pueden causar problemas masivos de enrutamiento. Con RPKI, la organizaci\u00f3n receptora puede verificar que la organizaci\u00f3n est\u00e9 autorizada para enviar la actualizaci\u00f3n de enrutamiento.<\/p>\n<p>RPKI funciona mediante la emisi\u00f3n de certificados de recursos basados en X.509 y sus n\u00fameros. Estos Registros de Internet regionales (RIR) est\u00e1n disponibles para Registros de Internet locales (LIR).<\/p>\n<p><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/04\/new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security\/\">Saber m\u00e1s sobre RPKI y RFC<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RFC 8360, Resource Public Key Infrastructure (RPKI) Validation Reconsidered, ha sido publicado por RFC. Qu\u00e9 es RPKI? Key Border Gateway Protocol (BGP), una infraestructura de clave p\u00fablica (RPKI), se ha establecido para las rutas BGP. Hoy en d\u00eda, la mayor\u00eda de las organizaciones\u00a0simplemente conf\u00eda en que las actualizaciones de enrutamiento son enviadas por remitentes autorizados. [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":65484,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6188,186,168,2590,150,179,2546,4910,4777,184,147],"tags":[3378,6251,6255,6269],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4046],"class_list":["post-77371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-como-funciona-internet","category-confianza","category-normas-abiertos-de-internet","category-garantia-bgp-es","category-ietf-es-2","category-seguridad","category-manrs-es","category-fortalecimiento-de-internet","category-seguridad-es","category-tecnologia","category-deploy360-es","tag-ietf-es","tag-normas-mutuamente-acordadas-para-la-seguridad-del-enrutamiento-manrs","tag-protocolo-de-puerta-de-enlace-de-frontera-bgp","tag-seguridad-de-enrutamiento","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",4912,3264,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-300x199.jpg",300,199,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg",768,510,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-1024x680.jpg",1024,680,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",1536,1021,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",2048,1361,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-250x166.jpg",250,166,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",300,199,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",400,266,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",600,399,false]},"uagb_author_info":{"display_name":"Andrei Robachevsky","author_link":"https:\/\/www.internetsociety.org\/es\/author\/robachevsky\/"},"uagb_comment_info":0,"uagb_excerpt":"RFC 8360, Resource Public Key Infrastructure (RPKI) Validation Reconsidered, ha sido publicado por RFC. Qu\u00e9 es RPKI? Key Border Gateway Protocol (BGP), una infraestructura de clave p\u00fablica (RPKI), se ha establecido para las rutas BGP. Hoy en d\u00eda, la mayor\u00eda de las organizaciones\u00a0simplemente conf\u00eda en que las actualizaciones de enrutamiento son enviadas por remitentes autorizados.&hellip;","authors":[{"term_id":4046,"user_id":28,"is_guest":0,"slug":"robachevsky","display_name":"Andrei Robachevsky","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/10\/Andrei-Robachevsky_2_resized-e1642680748321.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/10\/Andrei-Robachevsky_2_resized-e1642680748321.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/77371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=77371"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/77371\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/65484"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=77371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=77371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=77371"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=77371"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=77371"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=77371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}