Draft:Open MPIC
Submission declined on 13 May 2025 by Theroadislong (talk).
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
| ![]() |
Comment: one source only and that is a blog. Theroadislong (talk) 16:15, 13 May 2025 (UTC)
Developer(s) | Princeton University – Center for Information Technology Policy |
---|---|
Initial release | February 13, 2024 |
Written in | Various |
Platform | Cross-platform |
Type | Certificate validation / Web security |
License | Open source |
Website | CITP Website |
Open MPIC (Open Multi-Perspective Issuance Corroboration) is an open-source project developed by researchers at Princeton University to protect against BGP hijacking attacks during certificate issuance. It provides a scalable, API-based implementation of the Multi-Perspective Issuance Corroboration (MPIC) technique, which enhances the security of domain control validation used by Certificate Authorities (CAs).
Background
[edit]Domain control validation is a process used by CAs to verify that a requester has control over a given domain name before issuing a certificate. This process is vulnerable to BGP routing attacks, where an attacker reroutes traffic to impersonate a domain during validation. Such attacks can result in fraudulent certificates being issued.
The MPIC technique, proposed in a 2018 USENIX paper by Princeton researchers, mitigates this risk by performing validation from multiple, geographically distinct network vantage points. Because many BGP attacks are localized, validation from unaffected perspectives can detect inconsistencies and prevent certificate issuance.
Motivation
[edit]Several major CAs have implemented MPIC-like mechanisms. However, these implementations are often tied to proprietary infrastructure:
- Let's Encrypt uses MPIC in its Boulder CA but supports only ACME validations.
- Google Trust Services operates an internal MPIC system restricted to Google's environment.
- Cloudflare developed an HTTP API-based MPIC but does not yet support non-ACME methods.
Open MPIC was created to provide a flexible, cloud-agnostic implementation that can be deployed independently by any CA.
Features
[edit]- ACME and non-ACME support: Supports HTTP and DNS-based validation with flexible URL structures.
- RESTful API: Exposes MPIC functionality via secure HTTPS APIs.
- CAA compliance checking: Concurrent or on-demand retrieval of CAA records from multiple perspectives.
- Detailed logging: Complies with draft CA/B Forum MPIC logging requirements; includes perspective identifiers, validation results, and challenge metadata.
- Secure infrastructure: Uses TLS and encrypted channels for all communications; designed with best practices in mind.
- Automated deployment: Supports one-command deployment via cloud access tokens; includes configuration and monitoring scripts.
- Serverless option: Can operate entirely via serverless functions to reduce costs and complexity.
- High configurability: CA administrators can define quorum policies, network locations, and perspective counts.
- Cross-cloud compatibility: Designed to be cloud-provider agnostic to accommodate CA preferences and reduce vendor lock-in.
Adoption and Development
[edit]The project was announced on February 13, 2024, on the CITP blog.[1] The project is maintained by Princeton's Center for Information Technology Policy and published at its official site.[2]
Notably, engineers from Sectigo—a major public certificate authority—have contributed early feedback and real-world deployment insights to help shape the architecture of Open MPIC.
The project’s official repositories are available on GitHub at github.com/open-mpic, which includes the API specification, core Python library, and multiple deployment models. Interested contributors can engage with the maintainers through the GitHub issues pages or by contacting the team via the project email list.
See also
[edit]- Public key infrastructure
- Certificate Authority
- Domain validation
- BGP hijacking
- Let's Encrypt
- Google Trust Services
External links
[edit]References
[edit]- ^ "Announcing the Open Multi-Perspective Issuance Corroboration Project". CITP Blog. 2024-02-13. Retrieved 2025-05-13.
- ^ "Open Multi-Perspective Issuance Corroboration". Open MPIC. CITP, Princeton University. Retrieved 2025-05-13.
- in-depth (not just passing mentions about the subject)
- reliable
- secondary
- independent of the subject
Make sure you add references that meet these criteria before resubmitting. Learn about mistakes to avoid when addressing this issue. If no additional references exist, the subject is not suitable for Wikipedia.