In the vast, interconnected ocean of the global internet, the most critical components are often the smallest. Just as biological krill form the essential foundation of the marine food web—sustaining massive whales and maintaining ecological balance—the digital world has its own “Krill.” In the realm of technology and digital security, Krill is a specialized, open-source Resource Public Key Infrastructure (RPKI) daemon, designed to secure the very fabric of internet routing.
To understand “what the Krill eats,” we must look beyond biology and into the sophisticated data structures, cryptographic payloads, and routing protocols that fuel this essential tech tool. In this deep dive, we explore how Krill consumes data to prevent BGP hijacking, how it processes security certificates, and why its “diet” is fundamental to the stability of the global digital economy.

The Ecosystem of Krill: RPKI and the Fight for BGP Security
At its core, Krill is a technical solution developed by NLnet Labs, designed to help Internet Service Providers (ISPs) and large enterprises manage the security of their Border Gateway Protocol (BGP) announcements. BGP is the “map” of the internet, directing traffic between different networks. However, BGP was built on trust, making it vulnerable to “hijacking”—where a malicious actor or a misconfigured router claims to own a specific block of IP addresses, redirecting traffic to the wrong destination.
What is Krill in the Modern Tech Stack?
In the tech industry, Krill is an RPKI Certificate Authority (CA) software suite. It allows organizations to run their own RPKI engine, giving them autonomy over their digital assets. Instead of relying on third-party interfaces provided by Regional Internet Registries (RIRs), tech-forward companies use Krill to manage their routing security in-house. It “eats” administrative inputs and cryptographic requests to output a secure, validated environment for internet traffic.
The Vulnerability of the Global Routing Table
The global routing table is a massive, shifting database of where data should go. Without a security layer, this table is susceptible to “route leaks.” When we ask what Krill eats, we are essentially asking what information it requires to verify that a specific network (Autonomous System) has the legal right to announce a specific set of IP addresses. By consuming and processing these authorizations, Krill ensures that the “whales” of the internet—massive data centers and global ISPs—don’t swallow “poisoned” or redirected traffic.
The “Diet” of Krill: Consuming ROAs and Cryptographic Material
To function, Krill requires a steady stream of specific data types. In the technical sense, its “food” consists of Route Origin Authorizations (ROAs), X.509 certificates, and manifest files. Without these specific inputs, the software cannot generate the cryptographic proofs necessary to secure a network.
Route Origin Authorizations (ROAs) as Primary Sustenance
The primary “meal” for a Krill instance is the Route Origin Authorization (ROA). An ROA is a digitally signed object that provides a definitive statement about which Autonomous System (AS) is authorized to originate a particular IP prefix.
- Input: The administrator tells Krill: “I want AS 64500 to be the only one allowed to send traffic for 192.0.2.0/24.”
- Processing: Krill consumes this intent, checks it against the organization’s resource certificates, and signs it.
- Output: A cryptographically secure ROA that the rest of the world can trust.
Validated ROA Payloads (VRPs) and Manifests
Beyond basic ROAs, Krill “eats” and manages complex metadata. This includes manifests—files that list all other signed objects in the repository—and Certificate Revocation Lists (CRLs). This constant cycle of consumption and validation ensures that if a security key is compromised, the “food supply” is cleaned, and the invalid data is purged from the system. For a network engineer, managing what Krill eats is the difference between a secure network and a global routing catastrophe.

Why the “Krill” Must Be Fed: Preventing BGP Hijacking
In the tech world, “feeding” your security tools is not a one-time event; it is a continuous process of updates and monitoring. If Krill is not “fed” updated information about a company’s IP space, the security certificates expire. When certificates expire, the internet treats that network as “Unknown” or “Invalid,” which can lead to massive connectivity drops.
The High Cost of Routing Leaks
When Krill is underfed—meaning its data is stale or its ROAs are misconfigured—the consequences are severe. We have seen instances where major social media platforms, banks, and cryptocurrency exchanges have “disappeared” from the internet because their BGP routes were hijacked. These hijacks often occur because the “krill” (the small security nodes) were not properly configured to consume and validate the correct routing data. By maintaining a healthy “diet” of up-to-date ROAs, Krill acts as a shield against these multi-million dollar outages.
Real-World Case Studies of “Starving” Security
Consider a scenario where a large ISP fails to use an RPKI validator like Krill. A small, local ISP in a different country might accidentally announce a route for a major cloud provider’s traffic. Without the “Krill” to eat the valid data and spit out the “Invalid” markers for the fake route, the global internet might follow the fake path. This results in data interception, increased latency, and massive security breaches. Modern tech infrastructure relies on the automated, programmatic consumption of data that Krill provides to ensure that the shortest path is also the safest path.
Scaling the Digital Krill: Implementation and Future Trends
As we look toward the future of technology trends, the role of specialized software like Krill is expanding. We are moving away from centralized, manual security towards decentralized, automated systems. This evolution changes how the “Krill” eats, moving from manual human input to automated APIs and cloud-integrated systems.
Cloud-Native Deployments and Automation
Modern tech stacks are moving toward “Infrastructure as Code” (IaC). In this environment, Krill doesn’t just wait for a human to type in a command; it “eats” JSON payloads delivered via APIs. By integrating Krill into a CI/CD (Continuous Integration/Continuous Deployment) pipeline, tech companies can automate their routing security. When a new server cluster is spun up in the cloud, the system automatically feeds the new IP information to Krill, which immediately signs the ROAs and updates the global security table.
The Role of AI in Routing Security
As artificial intelligence (AI) begins to permeate digital security, we are seeing the emergence of “Smart Krill.” Future iterations of routing security software may use AI to analyze traffic patterns and suggest updates to the data Krill consumes. If an AI detects a potential hijack attempt in real-time, it could theoretically “feed” Krill the necessary data to re-route traffic or invalidate a suspicious announcement instantly. This represents the next frontier in digital security: a self-healing internet where the smallest nodes are the most intelligent.

Conclusion: The Essential Nature of the Smallest Nodes
When we ask, “What does the Krill eat?”, we find that the answer lies at the intersection of cryptography, network engineering, and global security. In the technology sector, Krill is not just a crustacean; it is a vital RPKI tool that “eats” Route Origin Authorizations and “digests” them into a secure, validated internet.
By ensuring that Krill is fed a steady, accurate diet of cryptographic data, organizations can protect themselves from the chaos of BGP hijacking and route leaks. Just as the biological ocean depends on the health of its krill, the digital ocean depends on the health and accuracy of its RPKI infrastructure. In an era where digital security is synonymous with business continuity, understanding and maintaining the “diet” of our digital Krill is no longer optional—it is a foundational requirement for a stable, secure, and thriving global internet.
aViewFromTheCave is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com. Amazon, the Amazon logo, AmazonSupply, and the AmazonSupply logo are trademarks of Amazon.com, Inc. or its affiliates. As an Amazon Associate we earn affiliate commissions from qualifying purchases.