Your IP address could not be determined at this time.

ARIN's Operational Test and Evaluation environment (OT&E)

OT&E is an environment containing a copy of production-like data that allows developers to experiment with ARIN interactions without affecting production data. ARIN's OT&E does not support email-based interactions, but allows for experimentation with three main ARIN services:

Note: OT&E exists solely for experimental usage and research, and is not linked to ARIN’s production system.

Accessing OT&E

To request access to OT&E, log into your ARIN Online account and use ASK ARIN to request access to the environment using "Other" as the message topic. Once vetted, ARIN will grant OT&E environment access and send additional usage instructions. ARIN encourages all OT&E users to subscribe and participate on the arin-tech-discuss@arin.net mailing list for information sharing and outage information.

OT&E Hosts

The following URLs should be used when interacting with ARIN's OT&E services in place of their production counterparts.

API Keys

OT&E services require Application Programming Interface (API) keys. To create an API Key:

  • Log into ARIN Online
  • Select WEB ACCOUNT on the left
  • Find the API Key Management area
  • Select Create API Key

Note: OT&E data is refreshed on the first Monday of each month to mirror production. If you created an API key in production since the last refresh, you must create a separate one within OT&E to use until the next refresh occurs.

Whois-RWS

Whois-RWS functionality within OT&E is a mirror of production. Remember to use http://whois.ote.arin.net in place of http://whois.arin.net. For more information on Whois-RWS usage, visit ARIN’s Whois-RWS page.

Reg-RWS

Reg-RWS functionality within OT&E is a mirror of production. Remember to use https://www.ote.arin.net or https://reg.ote.arin.net as RESTful calls to https://www.arin.net or https://reg.arin.net will affect production data. For more information on Reg-RWS usage, visit ARIN’s RESTful Interfaces page.

RPKI

ARIN resource holders may request certificates and manage Route Origin Authorizations (ROAs) within OT&E, using the same methods as production. OT&E also contains a repository of certificates and ROAs, and handles key rollovers and revocations. For more information on RPKI usage, visit ARIN's RPKI Home Page. For ROA Request signing instructions, visit the RPKI FAQ page.

Note: OT&E ROA Requests should be signed using a SEPARATE ROA Request Generation Key Pair than the one you use in production.

Public Key for Testing Purposes

-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuC6QLHirotHv+XOpaFpN
9VHtBKp5WCj7bbhYNxuC77HRa9EOzOtzYAiSp2L2TaKndny/kRH7BBzYCQWSLSk3
woHL+Z4RgP+QSLnRsNibYXH9Sx6NCPZamHGsNC0IyJ9MWhtDikl1Tms6wVOSPqlz
M1YMEm9Qv4WrCorlf9t1+owI+1MDYy/TlG0pnJ4xZnGGc1hq5kOTrsNmGEAyO+xi
ZIXe86BPF4ZAjkUZSktfubX5br+qURwPR9mqCr2ckR0Uev1/pZRa9vCZXInkBMv0
rkogZLLnkXch/MceCnhBtgfVCVDR7ueRBv1qGtUgB8O9L1G4B7ybeAmcp6XN0kpp
7QIDAQAB
-----END PUBLIC KEY-----

Private Key for Testing Purposes

-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

 

In order to validate using ARIN's OT&E data, you will have to use the following Trust Anchor Locator (TAL). Note that this TAL differs from the production TAL:

rsync://rpki.ote.arin.net/repository/arin-rpki-ta.cer

MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA65jF7qjQzl77O5uaKPdisQu7apf9mhA
txH2fbckYL7CFEzrw/Z1XaSd2gmofJbtYBcpa3iqBGquKH0X+ab0sGolHedL+wipqgkH4zstk3A
Wc+lBd8e7sn0jSqnFL0xQaL2uoHtJetqus39ud0LsWi0OB+COyMXz2jA76j6WsNbE7VUwLLx1pN
g7uGGcfFKrzqPvGMzWDynTC4fZfOe2UCtw2YgSsJdjEMdw1PT5RjDI5jtKemguPGeGp0YKmZguq
1qgrl5rj2qEuF7hLkWxQsl/J5skfAVm8XjoNMhg069ojxeiQPToOFNlV2VliFenG8Zb3FRIRbbi
l1Q5l7qs1FQIDAQAB

Validators

The OT&E TALmust then be plugged into an RPKI validator to allow for the fetching and validation of ARIN OT&E repository objects. ARIN recommends the following validators:

Advanced Search

Registration Services Help Desk

Interacting With ARIN

Monday through Friday
7:00 AM to 7:00 PM ET
Phone: +1.703.227.0660
Fax: +1.703.997.8844
Email: hostmaster@arin.net
Tips for Calling the Help Desk