This document discusses securing internet routing by validating route origins and paths. It describes some of the issues with the current routing system, including that there is no single authority and routing works based on rumors. It then introduces the Resource Public Key Infrastructure (RPKI) system, which uses digital signatures and certificates to validate route origins by tying IP addresses and autonomous system numbers to their legitimate holders. This allows for route origin validation using Route Origin Authorizations (ROAs). It notes that AS path validation is also needed to fully secure routing, but faces challenges in terms of resources and adoption. Basic routing security practices and industry initiatives are recommended in the meantime.