SlideShare a Scribd company logo
1 of 42
Download to read offline
BGP Security Threats
and Challenges
Geoff Huston AM
Chief Scientist, APNIC
Why do we keep
seeing these
headlines?
The Problem
We designed and built a dynamic self-learning (and self-healing)
routing system that operates without any centrality of authorisation or
control
This is extraordinarily flexible, robust, and scalable, as we have seen
BGP just scales (so far!)
1M BGP Routes
The Problem
We designed and built a dynamic self-learning (and self-healing)
routing system that operates without any centrality of authorisation or
control
This is extraordinarily flexible, robust, and scalable, as we have seen
The problem is that nobody can tell when the routing information
being passed inside this routing system is untrue
The Threat
Falsifying routing information can cause:
• Traffic diversion
• Service impersonation
• Denial of service
Which can lead to outcomes of service disruption and potential theft.
Attacks to routing can be highly targeted or very broadly based
The Threat
Route hijacking is not necessarily an end in itself, but can be a part of a
larger attack
• The April ‘18 MyEtherWallet raid was an attack involving a domain name
registrar, the DNS, a susceptible certificate authority and a BGP route
injection to work
Sometimes its not a hostile attack but a result of accidental self-harm
• Facebook managed to remove the IP prefixes of its own name servers from
BGP on October 5th, causing a global 6-hour outage of the entire Facebook
platform
Counter Measures
• Improving the resilience of host systems cannot mitigate this threat –
routing attacks rely on the host performing “normally”
• Improved application design can mitigate some of the impacts of a
routing attack
• Use of TLS provides an end-to-end encrypted session so that traffic diversion
cannot reveal session contents
• TLS also can provide server authentication so that service impersonation is more
challenging when TLS is being used
• But the problem of disruption remains
• And we can’t “fix” this at the ends
• We need to address this vulnerability within the routing system itself
The Routing Security Goal
Can we devise changes to operational practices, or operational
tools or routing technologies that manage the inter-domain
routing system that could prevent the propagation of false or
artificial routing information across the Internet?
This is a Very Challenging
Goal
• It’s a problem as old as the concept of a distributed inter-domain
routing system
• Each actor applies local policy constraints on local topology
knowledge to guide its local route object propagation decisions
• No single actor has sufficient “whole of system” data to determine
the difference between what it should’ve learned and what it has
learned – the routing system has no higher knowledge that it can use
to filter incoming routing information to discard “lies”
BGP has “Tunnel Vision”
What BGP “sees” What BGP “wants”
The Ideal
We want the interdomain routing system to advertise the correct
reachability information for “legitimately connected” prefixes at all
times
That means that we want to avoid:
• propagating reachability for bogus address prefixes
• propagating incorrect paths for reachable prefixes
• blocking paths for legitimately connected prefixes
The Problem Space
• While we’d like to think we understand the provenance for each and
every IP address, that is not exactly the case
• And even if we did, we have no precise knowledge as to which
network has the authority to originate a route object for that address
• And even then, we have no exact knowledge of the inter-domain
topology of the network
• And even then, we have no clear knowledge of the local policy
constraints that are applied to the propagation of reachability and
topology information
The Problem
All of which means that we have no clear model of “truth” to compare
to the information flow in the routing system
• Which ASes have a legitimate authority to announce a prefix into the inter-
domain routing system?
• Which ASes are interconnected?
• What route policies are applied to each pair-wise AS interconnection?
• What is the “best” route to the prefix destination?
A Weaker Routing Security Goal
Can we devise changes to operational practices, or operational
tools or routing technologies that manage the inter-domain
routing system that could resist attempts to inject false or
contrived routing information across the Internet?
What Data would we Like?
• An (impossible) ideal data set is the “reference set” that describes a
‘correct’ route object set that should be visible at any vantage point in
the network
• And access to a set of credentials that support any such attestation of
“correctness”
• As a compromise we could settle for a reference set that describes a
‘stable’ route object set that should be visible at any vantage point in
the network
What we want and don’t want
• BGP anomaly detectors and observatories are all well and good, but
they have not proved to be all that useful to the operations
community
• They are a bit like smoke alarms – they can’t prevent the root cause, but
simply alarm after it happens
• What we would like is some form of route acceptance model that
can be used as an acceptance filter for incoming route updates
So, we’ve been working on this…
We observed that we needed to improve “verifiable truth” in addressing and routing:
• We wanted to use the technology of digital signatures to allow receivers to validate
aspects of the routing information being passed to them
• We designed a Public Key Infrastructure to bind public/private key pairs to ownership or
IP address prefixes and/or Autonomous System Numbers
• We published tools to allow network operators to use this RPKI to generate digital
authorizations
• Prefix holders could provide verifiable “authorities” for an AS to advertise the prefix into
the inter-domain routing space (ROAs)
• Network operators could then filter routing information and discard those routes that do
not match these ROAs (ROV Filtering)
• And we hoped that network operators would see the common benefit in adoption this
technology
A Word of Caution
“And we hoped that network operators would see the common benefit in adoption
this technology”
• “Common Benefit” is extremely hard to identify in something as large and diverse
as the Internet
• The economics of this situation work against it
• The integrity of common infrastructure is everyone’s problem which in turn quickly becomes
nobody’s problem
• Which implies that just identifying a benefit for all does not imply that each
individual network perceives that self interest align to common interest
• Which means that adoption is likely to be slow and not necessarily going to
complete anytime soon
How are we doing with RPKI
tool adoption?
Lets look at some RPKI tool
Adoption Measurements
Lets look at the metrics of adoption of RPKI
• Number of published ROAS
• Number of Route Objects that are validated by RAOS
• Number of clients that perform a regular fetch of RPKI material
• Adoption of Route Filtering
Populating the RPKI - ROAs
280,000 ROAs are published today
Applying ROAs to Routes
IPv4 Routes that are ”covered” by a ROA
Applying ROAs to Routes
IPv6 Routes that are ”covered” by a ROA
RPKI Clients
• How many clients regularly maintain a local cache of the entire RPKI
product set ?
Filtering RoV routes
What proportion of users are behind networks that filter ROV-invalid
routes?
RoV Filtering
• This is an unexpected result
• Only some 15% of users cannot reach a prefix when it is advertised
using a ROV-invalid prefix
• And this has been constant measurement for the past ~12 months
• It seems that few edge networks have been performing ROV dropping
• And similarly few transit networks have taken up ROV-dropping
• And there is sufficient diversity in the inter-AS topology that even if
some paths are filtered out, alternate transit paths sill provide access
Where is RoV Filtering?
Where is RoV Filtering?
But – all this is not enough!
This is only one part of the overall effort to secure the routing system
It is still possible to mount a routing attack by reproducing the
originating AS with a faked AS Path
To complement Routing Origination Validation we need to provide a
means to validate the information in the AS Path
How about ASPA?
• AS Provider Attestations allows a network to list those networks that
act as a transit provider to this network
• Its being developed in the IETF at the moment, but it looks quite
promising:
• It supports partial deployment models
• It’s a “light weight” approach compared to BGPSEC
• It shifts the burden from the defender to the attacker
• It’s likely to be entering trials and tests in the coming months
Other Activity
• The BGP Code of Practice – ISOC’s MANRS
• Its hard to be convinced that folk will listen when nobody has been listening
for the BCP38 source address filtering for more twenty years!
• BGPSEC
• A heavyweight BGP implementation of AS Path signing developed in the IETF
• Its hard to see this going anywhere at all! I think its DOA.
• Blockchain
• Its currently fashionable
• But it doesn’t really address the core routing security issue
• Its not the ledger / registry model that’s the issue here – the challenge is how to
integrate this information into the BGP protocol, not the derivation of trust and authority
in the overall address architecture
What can you do right now?
What can you do right now?
1. Sign your IP address holdings
What can you do right now?
1. Sign your IP address holdings
2. Generate ROAs to describe your announcements
Use of ROAS in Taiwan
What can you do right now?
1. Sign your IP address holdings
2. Generate ROAs to describe your announcements
The Taiwan numbers look good!
What can you do right now?
1. Sign your IP address holdings
2. Generate ROAs to describe your announcements
3. Filter invalid routes from BGP updates
Filtering RoV routes - Taiwan
What proportion of users are behind networks that filter ROV-invalid
routes?
Filtering RoV routes - Taiwan
What proportion of users are behind networks that filter ROV-invalid
routes?
What can you do?
1. Sign your IP address holdings
2. Generate ROAs to describe your announcements
3. Filter invalid routes from BGP updates
Could do better!
Thank You!

More Related Content

What's hot

Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User APNIC
 
Strengthen DNS Through Infrastructure Design
Strengthen DNS Through Infrastructure DesignStrengthen DNS Through Infrastructure Design
Strengthen DNS Through Infrastructure DesignAPNIC
 
Measuring the end user
Measuring the end userMeasuring the end user
Measuring the end userAPNIC
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24APNIC
 
IPv6 Tutorial RIPE 60
IPv6 Tutorial RIPE 60IPv6 Tutorial RIPE 60
IPv6 Tutorial RIPE 60RIPE Meetings
 
Measuring IPv6 ISP performance
Measuring IPv6 ISP performanceMeasuring IPv6 ISP performance
Measuring IPv6 ISP performanceAPNIC
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAPNIC
 
Measuring latency from the browser
Measuring latency from the browserMeasuring latency from the browser
Measuring latency from the browserAPNIC
 
PANDI Meeting 12: Supporting resilience and security in Internet routing
PANDI Meeting 12: Supporting resilience and security in Internet routingPANDI Meeting 12: Supporting resilience and security in Internet routing
PANDI Meeting 12: Supporting resilience and security in Internet routingAPNIC
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTAPNIC
 
DNSSEC Measurement APTLD 71
DNSSEC Measurement APTLD 71DNSSEC Measurement APTLD 71
DNSSEC Measurement APTLD 71Siena Perry
 
Universal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readinessUniversal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readinessAPNIC
 
VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateAPNIC
 
APNIC Update for ARIN 35
APNIC Update for ARIN 35APNIC Update for ARIN 35
APNIC Update for ARIN 35APNIC
 
IDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesiaIDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesiaAPNIC
 
APNIC Updates by Zen Chuan Ng
APNIC Updates by Zen Chuan NgAPNIC Updates by Zen Chuan Ng
APNIC Updates by Zen Chuan NgMyNOG
 
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...APNIC
 
ARM 7: IPv6 deployment - where are we now?
ARM 7: IPv6 deployment - where are we now?ARM 7: IPv6 deployment - where are we now?
ARM 7: IPv6 deployment - where are we now?APNIC
 

What's hot (20)

Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User
 
Strengthen DNS Through Infrastructure Design
Strengthen DNS Through Infrastructure DesignStrengthen DNS Through Infrastructure Design
Strengthen DNS Through Infrastructure Design
 
Measuring the end user
Measuring the end userMeasuring the end user
Measuring the end user
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24
 
IPv6 Tutorial RIPE 60
IPv6 Tutorial RIPE 60IPv6 Tutorial RIPE 60
IPv6 Tutorial RIPE 60
 
Measuring IPv6 ISP performance
Measuring IPv6 ISP performanceMeasuring IPv6 ISP performance
Measuring IPv6 ISP performance
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership Program
 
Measuring latency from the browser
Measuring latency from the browserMeasuring latency from the browser
Measuring latency from the browser
 
PANDI Meeting 12: Supporting resilience and security in Internet routing
PANDI Meeting 12: Supporting resilience and security in Internet routingPANDI Meeting 12: Supporting resilience and security in Internet routing
PANDI Meeting 12: Supporting resilience and security in Internet routing
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
 
DNSSEC Measurement APTLD 71
DNSSEC Measurement APTLD 71DNSSEC Measurement APTLD 71
DNSSEC Measurement APTLD 71
 
Universal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readinessUniversal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readiness
 
VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment Update
 
APNIC Update for ARIN 35
APNIC Update for ARIN 35APNIC Update for ARIN 35
APNIC Update for ARIN 35
 
APNIC Update: ARIN 37
APNIC Update: ARIN 37APNIC Update: ARIN 37
APNIC Update: ARIN 37
 
IDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesiaIDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesia
 
APNIC Updates by Zen Chuan Ng
APNIC Updates by Zen Chuan NgAPNIC Updates by Zen Chuan Ng
APNIC Updates by Zen Chuan Ng
 
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
 
ARM 7: IPv6 deployment - where are we now?
ARM 7: IPv6 deployment - where are we now?ARM 7: IPv6 deployment - where are we now?
ARM 7: IPv6 deployment - where are we now?
 

Similar to 36th TWNIC OPM: BGP security threats and challenges

NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityAPNIC
 
SANOG 33: Why is securing the Internet's routing system so hard
SANOG 33: Why is securing the Internet's routing system so hardSANOG 33: Why is securing the Internet's routing system so hard
SANOG 33: Why is securing the Internet's routing system so hardAPNIC
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityAPNIC
 
PacNOG 29: Routing security is more than RPKI
PacNOG 29: Routing security is more than RPKIPacNOG 29: Routing security is more than RPKI
PacNOG 29: Routing security is more than RPKIAPNIC
 
AusNOG 2022: Measuring RPKI use in BGP
AusNOG 2022: Measuring RPKI use in BGPAusNOG 2022: Measuring RPKI use in BGP
AusNOG 2022: Measuring RPKI use in BGPAPNIC
 
NANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI EffectivenessNANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI EffectivenessAPNIC
 
mnNOG 3: IP technology adoption in Mongolia
mnNOG 3: IP technology adoption in MongoliamnNOG 3: IP technology adoption in Mongolia
mnNOG 3: IP technology adoption in MongoliaAPNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
PacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet RoutingPacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet RoutingAPNIC
 
Global IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementGlobal IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementAPNIC
 
VNIXNOG 2019: Securing Internet Routing
VNIXNOG 2019: Securing Internet RoutingVNIXNOG 2019: Securing Internet Routing
VNIXNOG 2019: Securing Internet RoutingAPNIC
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreJonathan Habicht
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itAPNIC
 
mnNOG 2: Measuring RPKI
mnNOG 2: Measuring RPKImnNOG 2: Measuring RPKI
mnNOG 2: Measuring RPKIAPNIC
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
 
APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APNIC
 
btNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIbtNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIAPNIC
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger BlockchainAfraz Khan
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTSplunk
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensicsAnpumathews
 

Similar to 36th TWNIC OPM: BGP security threats and challenges (20)

NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)Security
 
SANOG 33: Why is securing the Internet's routing system so hard
SANOG 33: Why is securing the Internet's routing system so hardSANOG 33: Why is securing the Internet's routing system so hard
SANOG 33: Why is securing the Internet's routing system so hard
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing Security
 
PacNOG 29: Routing security is more than RPKI
PacNOG 29: Routing security is more than RPKIPacNOG 29: Routing security is more than RPKI
PacNOG 29: Routing security is more than RPKI
 
AusNOG 2022: Measuring RPKI use in BGP
AusNOG 2022: Measuring RPKI use in BGPAusNOG 2022: Measuring RPKI use in BGP
AusNOG 2022: Measuring RPKI use in BGP
 
NANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI EffectivenessNANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI Effectiveness
 
mnNOG 3: IP technology adoption in Mongolia
mnNOG 3: IP technology adoption in MongoliamnNOG 3: IP technology adoption in Mongolia
mnNOG 3: IP technology adoption in Mongolia
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
PacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet RoutingPacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet Routing
 
Global IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementGlobal IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem Statement
 
VNIXNOG 2019: Securing Internet Routing
VNIXNOG 2019: Securing Internet RoutingVNIXNOG 2019: Securing Internet Routing
VNIXNOG 2019: Securing Internet Routing
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyre
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying it
 
mnNOG 2: Measuring RPKI
mnNOG 2: Measuring RPKImnNOG 2: Measuring RPKI
mnNOG 2: Measuring RPKI
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives
 
btNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIbtNOG 7: Measuring RPKI
btNOG 7: Measuring RPKI
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger Blockchain
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 

More from APNIC

APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 

More from APNIC (20)

APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Recently uploaded

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...Sareena Khatun
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理F
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...MOHANI PANDEY
 

Recently uploaded (20)

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
 

36th TWNIC OPM: BGP security threats and challenges

  • 1. BGP Security Threats and Challenges Geoff Huston AM Chief Scientist, APNIC
  • 2. Why do we keep seeing these headlines?
  • 3. The Problem We designed and built a dynamic self-learning (and self-healing) routing system that operates without any centrality of authorisation or control This is extraordinarily flexible, robust, and scalable, as we have seen
  • 4. BGP just scales (so far!) 1M BGP Routes
  • 5. The Problem We designed and built a dynamic self-learning (and self-healing) routing system that operates without any centrality of authorisation or control This is extraordinarily flexible, robust, and scalable, as we have seen The problem is that nobody can tell when the routing information being passed inside this routing system is untrue
  • 6. The Threat Falsifying routing information can cause: • Traffic diversion • Service impersonation • Denial of service Which can lead to outcomes of service disruption and potential theft. Attacks to routing can be highly targeted or very broadly based
  • 7. The Threat Route hijacking is not necessarily an end in itself, but can be a part of a larger attack • The April ‘18 MyEtherWallet raid was an attack involving a domain name registrar, the DNS, a susceptible certificate authority and a BGP route injection to work Sometimes its not a hostile attack but a result of accidental self-harm • Facebook managed to remove the IP prefixes of its own name servers from BGP on October 5th, causing a global 6-hour outage of the entire Facebook platform
  • 8. Counter Measures • Improving the resilience of host systems cannot mitigate this threat – routing attacks rely on the host performing “normally” • Improved application design can mitigate some of the impacts of a routing attack • Use of TLS provides an end-to-end encrypted session so that traffic diversion cannot reveal session contents • TLS also can provide server authentication so that service impersonation is more challenging when TLS is being used • But the problem of disruption remains • And we can’t “fix” this at the ends • We need to address this vulnerability within the routing system itself
  • 9. The Routing Security Goal Can we devise changes to operational practices, or operational tools or routing technologies that manage the inter-domain routing system that could prevent the propagation of false or artificial routing information across the Internet?
  • 10. This is a Very Challenging Goal • It’s a problem as old as the concept of a distributed inter-domain routing system • Each actor applies local policy constraints on local topology knowledge to guide its local route object propagation decisions • No single actor has sufficient “whole of system” data to determine the difference between what it should’ve learned and what it has learned – the routing system has no higher knowledge that it can use to filter incoming routing information to discard “lies”
  • 11. BGP has “Tunnel Vision” What BGP “sees” What BGP “wants”
  • 12. The Ideal We want the interdomain routing system to advertise the correct reachability information for “legitimately connected” prefixes at all times That means that we want to avoid: • propagating reachability for bogus address prefixes • propagating incorrect paths for reachable prefixes • blocking paths for legitimately connected prefixes
  • 13. The Problem Space • While we’d like to think we understand the provenance for each and every IP address, that is not exactly the case • And even if we did, we have no precise knowledge as to which network has the authority to originate a route object for that address • And even then, we have no exact knowledge of the inter-domain topology of the network • And even then, we have no clear knowledge of the local policy constraints that are applied to the propagation of reachability and topology information
  • 14. The Problem All of which means that we have no clear model of “truth” to compare to the information flow in the routing system • Which ASes have a legitimate authority to announce a prefix into the inter- domain routing system? • Which ASes are interconnected? • What route policies are applied to each pair-wise AS interconnection? • What is the “best” route to the prefix destination?
  • 15. A Weaker Routing Security Goal Can we devise changes to operational practices, or operational tools or routing technologies that manage the inter-domain routing system that could resist attempts to inject false or contrived routing information across the Internet?
  • 16. What Data would we Like? • An (impossible) ideal data set is the “reference set” that describes a ‘correct’ route object set that should be visible at any vantage point in the network • And access to a set of credentials that support any such attestation of “correctness” • As a compromise we could settle for a reference set that describes a ‘stable’ route object set that should be visible at any vantage point in the network
  • 17. What we want and don’t want • BGP anomaly detectors and observatories are all well and good, but they have not proved to be all that useful to the operations community • They are a bit like smoke alarms – they can’t prevent the root cause, but simply alarm after it happens • What we would like is some form of route acceptance model that can be used as an acceptance filter for incoming route updates
  • 18. So, we’ve been working on this… We observed that we needed to improve “verifiable truth” in addressing and routing: • We wanted to use the technology of digital signatures to allow receivers to validate aspects of the routing information being passed to them • We designed a Public Key Infrastructure to bind public/private key pairs to ownership or IP address prefixes and/or Autonomous System Numbers • We published tools to allow network operators to use this RPKI to generate digital authorizations • Prefix holders could provide verifiable “authorities” for an AS to advertise the prefix into the inter-domain routing space (ROAs) • Network operators could then filter routing information and discard those routes that do not match these ROAs (ROV Filtering) • And we hoped that network operators would see the common benefit in adoption this technology
  • 19. A Word of Caution “And we hoped that network operators would see the common benefit in adoption this technology” • “Common Benefit” is extremely hard to identify in something as large and diverse as the Internet • The economics of this situation work against it • The integrity of common infrastructure is everyone’s problem which in turn quickly becomes nobody’s problem • Which implies that just identifying a benefit for all does not imply that each individual network perceives that self interest align to common interest • Which means that adoption is likely to be slow and not necessarily going to complete anytime soon
  • 20. How are we doing with RPKI tool adoption?
  • 21. Lets look at some RPKI tool Adoption Measurements Lets look at the metrics of adoption of RPKI • Number of published ROAS • Number of Route Objects that are validated by RAOS • Number of clients that perform a regular fetch of RPKI material • Adoption of Route Filtering
  • 22. Populating the RPKI - ROAs 280,000 ROAs are published today
  • 23. Applying ROAs to Routes IPv4 Routes that are ”covered” by a ROA
  • 24. Applying ROAs to Routes IPv6 Routes that are ”covered” by a ROA
  • 25. RPKI Clients • How many clients regularly maintain a local cache of the entire RPKI product set ?
  • 26. Filtering RoV routes What proportion of users are behind networks that filter ROV-invalid routes?
  • 27. RoV Filtering • This is an unexpected result • Only some 15% of users cannot reach a prefix when it is advertised using a ROV-invalid prefix • And this has been constant measurement for the past ~12 months • It seems that few edge networks have been performing ROV dropping • And similarly few transit networks have taken up ROV-dropping • And there is sufficient diversity in the inter-AS topology that even if some paths are filtered out, alternate transit paths sill provide access
  • 28. Where is RoV Filtering?
  • 29. Where is RoV Filtering?
  • 30. But – all this is not enough! This is only one part of the overall effort to secure the routing system It is still possible to mount a routing attack by reproducing the originating AS with a faked AS Path To complement Routing Origination Validation we need to provide a means to validate the information in the AS Path
  • 31. How about ASPA? • AS Provider Attestations allows a network to list those networks that act as a transit provider to this network • Its being developed in the IETF at the moment, but it looks quite promising: • It supports partial deployment models • It’s a “light weight” approach compared to BGPSEC • It shifts the burden from the defender to the attacker • It’s likely to be entering trials and tests in the coming months
  • 32. Other Activity • The BGP Code of Practice – ISOC’s MANRS • Its hard to be convinced that folk will listen when nobody has been listening for the BCP38 source address filtering for more twenty years! • BGPSEC • A heavyweight BGP implementation of AS Path signing developed in the IETF • Its hard to see this going anywhere at all! I think its DOA. • Blockchain • Its currently fashionable • But it doesn’t really address the core routing security issue • Its not the ledger / registry model that’s the issue here – the challenge is how to integrate this information into the BGP protocol, not the derivation of trust and authority in the overall address architecture
  • 33. What can you do right now?
  • 34. What can you do right now? 1. Sign your IP address holdings
  • 35. What can you do right now? 1. Sign your IP address holdings 2. Generate ROAs to describe your announcements
  • 36. Use of ROAS in Taiwan
  • 37. What can you do right now? 1. Sign your IP address holdings 2. Generate ROAs to describe your announcements The Taiwan numbers look good!
  • 38. What can you do right now? 1. Sign your IP address holdings 2. Generate ROAs to describe your announcements 3. Filter invalid routes from BGP updates
  • 39. Filtering RoV routes - Taiwan What proportion of users are behind networks that filter ROV-invalid routes?
  • 40. Filtering RoV routes - Taiwan What proportion of users are behind networks that filter ROV-invalid routes?
  • 41. What can you do? 1. Sign your IP address holdings 2. Generate ROAs to describe your announcements 3. Filter invalid routes from BGP updates Could do better!