You must have a second factor to login to PeeringDB from 1 July 2025. If you automate updates using our API, you'll need to use an API Key. But anonymous usage will not be going away. You can query the website or API without authenticating. This change will impact users who make updates or need access to contact information published in PeeringDB. To prepare for this we have simplified our user interface. We now have a single control page for second factors. You can still choose from: TOTP U2F tokens, and Passkeys.

Fig: U2F Hardware Authentication Security Keys, Tony Webster, CC By 2.0

Users can have multiple second factors. For instance, TOTP in an app on a phone and a U2F token. And users can download and securely store backup codes in case other factors aren’t available. Some organizations might need to move users from role accounts to personal accounts. We don't limit the number of accounts affiliated with an organization. And we provide permissions to manage permissions for individual users.

 

Authored by: Sofia Silva Berenguer, RPKI Program Manager, NRO

Earlier this year we launched the NRO RPKI Program and we shared information about the program’s purpose and the outcomes that were guiding our efforts. One of our main goals is to raise awareness among the technical community that we are committed to providing a more consistent and uniformly secure, resilient, and reliable RPKI service.

An important outcome from this year’s work is the documentation of a problem statement for the current Trust Anchor configuration and the exploration of potential solutions. We hope to share a proposal for discussion with the technical community soon.

 

The ICP-2 created in 2001, identifies the criteria for an organisation seeking to become a new RIR. In October 2023, the Address Supporting Organization Address Council (ASO AC) was asked by the NRO Executive Council to update the ICP-2. As a next step, the ASO AC in consultation with its stakeholders worked on the proposed principles document which includes the core principles to be included in the next ICP-2 version and this was recently published. Additionally, on 8 October 2024, a survey was launched by the NRO seeking community feedback from all the RIR communities on those core principles.

The Internet relies on a robust and future-proof addressing system – enter IPv6 - in its ever-expanding capacity. Understanding the critical need to equip individuals with this essential knowledge, AFRINIC recently concluded its highly successful Cohort 5 of the "Zero to Certified IPv6 in 21 Days" workshop. This online training program transcended borders, welcoming a diverse audience eager to delve into the world of IPv6. The response was nothing short of astounding. The workshop's landing page witnessed a surge of interest, recording 563 hits, reflecting the growing recognition of IPv6's importance.

 

Authored by:Sofia Silva Berenguer, RPKI Program Manager, NRO

A few months ago we shared the outcomes that are guiding the work that we are doing as part of the NRO RPKI Program. We mentioned that we would like to know more about the community’s expectations with regard to consistency in RPKI implementation across the Regional Internet Registries (RIRs) with the end goal of defining what a single, global RPKI system would look like.

RFC 9518: Centralization, Decentralization, and Internet Standards has been published after more than two years of review, discussion, and revision. It covers what centralization is, how it can be both beneficial and harmful, the decentralization strategies we typically use to control it, and finally, what Internet standards bodies can do about it. It’s no secret that most people have been increasingly concerned about Internet centralization over the last decade.

Page 1 of 31