| RPKI-CLIENT(8) | System Manager's Manual | RPKI-CLIENT(8) |
rpki-client — RPKI
validator to support BGP routing security
rpki-client |
[-0ABcjmnoRVvx] [-b
sourceaddr] [-d
cachedir] [-e
rsync_prog] [-H
fqdn] [-S
skiplist] [-s
timeout] [-t
tal] [outputdir] |
rpki-client |
[-Vv] [-d
cachedir] [-j]
[-t tal]
-f file ... |
The rpki-client utility queries the
Resource
Public Key Infrastructure (RPKI) repository system with a built-in
HTTPS client and openrsync(1)
to fetch all X.509 certificates, manifests, and revocation lists under a
given Trust Anchor. rpki-client
subsequently validates each Signed Object by constructing
and verifying a certification path for the certificate associated with the
Object (including checking relevant CRLs).
rpki-client produces lists of the
Validated ROA Payloads (VRPs),
BGPsec Router
Keys (BRKs), and Validated ASPA Payloads (VAPs) in
various formats.
The options are as follows:
-0-A-B-A.
The validated payload table names are
ROAS4,
ROAS6,
and
ASPAS.-b
sourceaddr-c-d
cachedirrpki-client will store the
cached repository data. Defaults to
/var/cache/rpki-client.-e
rsync_prog-rt and
--address flags and connect with rsync-protocol
locations.-f
file ...-n, and can be combined with
-j to emit a stream of
Concatenated
JSON.-H
fqdnrpki-client only connects to shortlisted hosts.
The shortlist filter is enforced during processing of the
Subject Information Access (SIA) extension in CA
certificates, thus applies to both RSYNC and RRDP connections. This option
can be used multiple times.-j-c for a description
of the fields.-m-n-o-B, -c, and
-j options are not specified this is the
default.-P
posix-seconds-R-S
skiplist#’ indicates the beginning of a
comment; characters up to the end of the line are not interpreted. The
skip filter is enforced during processing of the Subject
Information Access (SIA) extension in CA certificates, thus applies to
both RSYNC and RRDP connections. By default load entries from
/etc/rpki/skiplist.-s
timeout-t
talrpki-client will load all TAL files in
/etc/rpki. TAL are small files containing a public
key and URL endpoint address.-V-v-f is given, specify once to print more
information about the encapsulated X.509 certificate, twice to print the
certificate in PEM format.-x-f.rpki-client will write the
output files. Defaults to
/var/db/rpki-client/.By default rpki-client outputs validated
payloads in -o (OpenBGPD compatible) format.
rpki-client should be run hourly by
cron(8): use
crontab(1) to uncomment the
entry in root's crontab.
rpki-client can impose locally configured
constraints
on cryptographic products subordinate to publicly-trusted
Trust Anchors.
Constraining a Trust Anchor's effective signing authority to a limited set of Internet Number Resources allows Relying Parties to take advantage of the potential benefits of assuming trust, while deriving trust within a bounded scope.
Each .constraints file imposes constraints on the Trust Anchor reachable via the same-named .tal file. One entry per line. Entries can be IP prefixes, IP address ranges, AS identifiers, or AS identifier ranges. Ranges are a minimum and maximum separated by a hyphen (‘-’). Comments can be put anywhere in the file using a hash mark (‘#’), and extend to the end of the current line. deny entries may not overlap with other deny entries. allow entries may not overlap with other allow entries.
A given EE certificate's resources may not overlap with any deny entry, and must be fully contained within the allow entries.
rpki-client utilizes the following
environment variables:
http_proxy-t
tal is specified. The TAL files of the five Regional
Internet Registries are included.-S
skiplist is specified.The rpki-client utility exits 0 on
success, and >0 if an error occurs.
X.509 Extensions for IP Addresses and AS Identifiers, RFC 3779.
Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 5280.
Cryptographic Message Syntax (CMS), RFC 5652.
The rsync URI Scheme, RFC 5781.
An Infrastructure to Support Secure Internet Routing, RFC 6480.
A Profile for Resource Certificate Repository Structure, RFC 6481.
A Profile for X.509 PKIX Resource Certificates, RFC 6487.
Signed Object Template for the RPKI, RFC 6488.
The RPKI Ghostbusters Record, RFC 6493.
Policy Qualifiers in RPKI Certificates, RFC 7318.
The Profile for Algorithms and Key Sizes for Use in the RPKI, RFC 7935.
The RPKI Repository Delta Protocol (RRDP), RFC 8182.
A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests, RFC 8209.
RPKI Trust Anchor Locator, RFC 8630.
Manifests for the RPKI, RFC 9286.
A Profile for RPKI Signed Checklists (RSCs), RFC 9323.
A Profile for Route Origin Authorizations (ROAs), RFC 9582.
On the use of the CMS Signing-Time Attribute in RPKI Signed Objects, RFC 9589.
Finding and Using Geofeed Data, RFC 9632.
Same-Origin Policy for the RRDP, RFC 9674.
A Profile for RPKI Trust Anchor Keys, RFC 9691.
Detecting RRDP Session Desynchronization, RFC 9697.
A Profile for Autonomous System Provider Authorization (ASPA), https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile, Jun, 2023.
Constraining RPKI Trust Anchors, https://datatracker.ietf.org/doc/html/draft-snijders-constraining-rpki-trust-anchors, September, 2023.
A profile for Signed Prefix Lists for Use in the RPKI, https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist-02, Jan, 2024.
Relying Party Handling of RPKI CRL Number Extensions, https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-crl-numbers, May, 2024.
RPKI Manifest Number Handling, https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-manifest-numbers, June, 2024.
Tiebreaking RPKI Trust Anchors, https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-ta-tiebreaker, June, 2024.
rpki-client first appeared in
OpenBSD 6.7.
Kristaps Dzonsons <kristaps@bsd.lv>, Claudio Jeker <claudio@openbsd.org>, Theo Buehler <tb@openbsd.org>, and Job Snijders <job@openbsd.org>.
| January 17, 2025 | openbsd |