{"id":77359,"date":"2018-04-06T14:14:05","date_gmt":"2018-04-06T14:14:05","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/04\/new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security\/"},"modified":"2025-11-27T16:58:56","modified_gmt":"2025-11-27T16:58:56","slug":"new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security\/","title":{"rendered":"Nouveau RFC 8360 \u2013 la validation du RPKI r\u00e9examin\u00e9 \u2013 offre des procedures d&rsquo;une validation alternative pour am\u00e9liorer la s\u00e9curit\u00e9 de routage"},"content":{"rendered":"<p><a href=\"https:\/\/www.rfc-editor.org\/info\/rfc8360\">RFC 8360, Resource Public Key Infrastructure (RPKI) Validation Reconsidered<\/a>, est maintenant publi\u00e9 dans les librairies du RFC.<\/p>\n<h3><strong>RPKI, c<\/strong><strong>&lsquo;est quoi ?<\/strong><\/h3>\n<p>Resource Public Key Infrastructure (RPKI) vise \u00e0 am\u00e9liorer la s\u00e9curit\u00e9 du syst\u00e8me de routage Internet, en particulier le protocole BGP (Border Gateway Protocol), en \u00e9tablissant une hi\u00e9rarchie de confiance pour les routes BGP. Aujourd&rsquo;hui, la plupart des entreprises sont persuad\u00e9s que les mises \u00e0 jour de routage sont envoy\u00e9es par des exp\u00e9diteurs autoris\u00e9s. C&rsquo;est de cette fa\u00e7on que des mauvais acteurs et des mauvaises configurations peuvent causer des probl\u00e8mes de routage massifs. Avec RPKI, l&rsquo;organisation destinataire peut v\u00e9rifier que l&rsquo;organisation d&rsquo;envoi est autoris\u00e9e \u00e0 envoyer la mise \u00e0 jour de routage.<\/p>\n<p>RPKI fonctionne en \u00e9mettant des certificats de ressources X.509 aux d\u00e9tenteurs d&rsquo;adresses IP et de num\u00e9ros AS pour prouver l&rsquo;affectation de ces ressources. Ces certificats sont d\u00e9livr\u00e9s aux registres Internet locaux (RIL) par l&rsquo;un des cinq registres Internet r\u00e9gionaux (RIR) qui allouent et affectent ces ressources dans leurs r\u00e9gions de service.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/new-rfc-8360-rpki-validation-reconsidered-offers-alternative-validation-procedures-improve-routing-security\/\">Pour savoir plus sur RPKI et RFC cliquez ici<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RFC 8360, Resource Public Key Infrastructure (RPKI) Validation Reconsidered, est maintenant publi\u00e9 dans les librairies du RFC. RPKI, c&lsquo;est quoi ? Resource Public Key Infrastructure (RPKI) vise \u00e0 am\u00e9liorer la s\u00e9curit\u00e9 du syst\u00e8me de routage Internet, en particulier le protocole BGP (Border Gateway Protocol), en \u00e9tablissant une hi\u00e9rarchie de confiance pour les routes BGP. Aujourd&rsquo;hui, [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":65483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,6187,185,2589,151,169,2545,4909,4775,183,146],"tags":[3376,6250,6254,6283],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4046],"class_list":["post-77359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-comment-fonctionne-internet","category-confiance","category-garantir-bgp","category-ietf-fr-2","category-les-normes-internet-ouvertes","category-manrs-fr","category-renforcer-internet","category-securite-fr","category-technologie","category-deploy360-fr","tag-ietf-fr","tag-les-normes-pour-la-securisation-du-routage-mutuellement-agreees-manrs","tag-protocole-bgp-border-gateway-protocol","tag-securite-du-routage","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",4912,3264,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-300x199.jpg",300,199,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg",768,510,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-1024x680.jpg",1024,680,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",1536,1021,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",2048,1361,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-250x166.jpg",250,166,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",300,199,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",400,266,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",600,399,false]},"uagb_author_info":{"display_name":"Andrei Robachevsky","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/robachevsky\/"},"uagb_comment_info":0,"uagb_excerpt":"RFC 8360, Resource Public Key Infrastructure (RPKI) Validation Reconsidered, est maintenant publi\u00e9 dans les librairies du RFC. RPKI, c&lsquo;est quoi ? Resource Public Key Infrastructure (RPKI) vise \u00e0 am\u00e9liorer la s\u00e9curit\u00e9 du syst\u00e8me de routage Internet, en particulier le protocole BGP (Border Gateway Protocol), en \u00e9tablissant une hi\u00e9rarchie de confiance pour les routes BGP. Aujourd&rsquo;hui,\u2026","authors":[{"term_id":4046,"user_id":28,"is_guest":0,"slug":"robachevsky","display_name":"Andrei Robachevsky","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/10\/Andrei-Robachevsky_2_resized-e1642680748321.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/10\/Andrei-Robachevsky_2_resized-e1642680748321.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/77359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=77359"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/77359\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/65483"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=77359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=77359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=77359"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=77359"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=77359"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=77359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}