--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2020-98d6a917e3
2020-04-20 19:49:32.354985
--------------------------------------------------------------------------------
Name : rpki-client
Product : Fedora EPEL 7
Version : 0.3.0
Release : 2.el7
URL :
https://github.com/kristapsdz/rpki-client/
Summary : RPKI client implementation
Description :
rpki-client is an implementation of RPKI (Resource Public Key
Infrastructure), specified by RFC 6480. It implements the client
side of RPKI, which is responsible for downloading, validating
and converting ROAs (Route Origin Authorisations) into VRPs
(Validated ROA Payloads). The client's output (VRPs) can be used
to perform BGP Origin Validation (RFC 6811).
The design focus of rpki-client is simplicity and security. To
wit, it implements RPKI components necessary for validating route
statements and omits superfluities (such as, for example, which
X509 certificate sections must be labelled "Critical").
--------------------------------------------------------------------------------
Update Information:
* New output format for BIRD 2.x * Bug fixes for output format for BIRD 1.x
* Mitigation regarding missing `*.roa` files * Further bug fixes and minor
enhancements
--------------------------------------------------------------------------------
ChangeLog:
* Sun Apr 5 2020 Robert Scheck <robert(a)fedoraproject.org> 0.3.0-2
- Apply fixes from upstream (rebase to commit 87683e9)
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update rpki-client' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------