(REPOSTED from the Routing Security SIG mail list at APNIC.)

Event: APNIC 61 / APRICOT 2026
Location: Jakarta, Indonesia
Date: Tuesday, 10 February 2026
Chairs: Terry Sweetser, Taiji Kimura

Executive Summary

The Routing Security SIG at APNIC 61 highlighted a maturing landscape in APAC’s routing hygiene. The standout theme of the session was the "Indonesia Success Story," demonstrating how a coordinated national effort between an NIR (IDNIC) and an IXP (IIX) can achieve >90% ROA coverage and enforce "Drop Invalid" policies at scale.

While RPKI ROA adoption is high in Southeast Asia, the session shifted focus toward the next frontier: Autonomous System Provider Authorization (ASPA). The presentations struck a balance between operational realities, real-world hijack incidents, academic research, and the standardization required to future-proof the RPKI transport layer.

Session Summaries

1. Securing the Indonesia Routing Table (The "Star" of the Show)

Speaker: Syarif Lumintarjo (IDNIC/APJII)
This was the operational highlight of the SIG, showcasing Indonesia as a global leader in RPKI deployment.

2. ASPA in the RPKI Dashboard

Speaker: Tim Bruijnzeels (RIPE NCC)
As ROA adoption saturates, the focus is moving to Autonomous System Provider Authorization (ASPA). Tim provided the technical "rulebook" for deployment based on the IETF profile draft-ietf-sidrops-aspa-profile.

3. Case Study: RPKI vs. Social Engineering

Speakers: Sanjaya (APNIC) & Carlos Martinez (LACNIC)
This session provided the "security justification" for ASPA, moving beyond simple fat-finger error correction.

4. RPKI APAC Update

Speaker: Shane Hermoso (APNIC)
Shane provided the regional "report card," revealing a sharp divide in the APAC region.

5. IETF SIDROPS Update

Speaker: Tom Harrison (APNIC)
Technical updates on the standards track aimed at addressing scalability issues in the RPKI ecosystem.

6. Research: MESec (Minimal-Exposure AS-Path Verification)

Speaker: Zhan Jiangou (Tsinghua University)

Observations & Chair’s Remarks

  1. Synthesized ASPA Deployment Advice: Combining the insights from Tim, Sanjaya, and Carlos, the SIG offers the following best practice advice for ASPA deployment:

    • Authorization: Create ASPA records authorizing only your transit providers (upstreams).

    • Exclusion: Explicitly exclude lateral peers to prevent route leaks.

    • Defense: View ASPA not just as a leak-prevention tool, but as a defense against social engineering attacks where unauthorized upstreams are tricked into propagating your space.

  2. Resilience via the Erik Protocol: The introduction of the Erik Synchronization Protocol is timely. As RPKI becomes mission-critical infrastructure, the fragility of current transport mechanisms is a liability. The Erik protocol represents a significant optimization for scaling and high resilience that the industry must track closely.

  3. ASPA Vendor "Catch Up": With the Autonomous System Provider Authorization profile nearing RFC status, the pressure shifts from standards bodies to vendors. There is now an urgent need for significant "catch up" by hardware vendors to bring ASPA support from "experimental" to "production-grade" in router firmware.

  4. The China Gap: While we celebrate the success in Southeast Asia, the low adoption rate in China remains a critical gap in the regional routing security posture. Targeted outreach to Chinese operators may be required to improve the overall health of the APAC routing table.

Report prepared by:
Terry Sweetser
Chair, APNIC Routing Security SIG

Transparency Note: This report was drafted with the assistance of Artificial Intelligence tools for transcript ingestion and summarization.