Evolution of RPKI: Towards Higher Levels of Security in Regional Routing

25/01/2023

Evolution of RPKI: Towards Higher Levels of Security in Regional Routing

Routing policies are advancing in the region with RPKI at the forefront and hand in hand with simpler processes and initiatives by large companies and content providers. However, if optimal security margins are to be achieved, more operators need to become involved.

In recent years we have witnessed growth in the adoption of routing policies, which is good news for the entire Internet ecosystem. Yet there is still a long way to go.

According to LACNIC CTO Carlos Martínez, operators in the region should not ignore the risks of not doing anything about routing security issues. “Although between 2021 and 2022 we observed the evolution and growth of the measures implemented by operators, particularly RPKI (Resource Public Key Infrastructure), the reality is that many have not done anything: approximately half of our members have yet to publicly express their routing policies,” he said.

Routing is based on the automated Border Gateway Protocol (BGP), which is responsible for providing addresses so that traffic can travel from an IP address to its destination in the most efficient way possible. The problem is that BGP itself does not include any mechanisms to check whether an organization has the right to use the IP resources.

This allows for unsafe routing scenarios: route hijacking and route leaks.

BGP hijacking occurs when a network falsely claims to know how to reach its destination and thus manages to divert a portion of the traffic that passes through it. While most of these situations are caused by configuration errors, some malicious actors can analyze, modify, or eliminate traffic to cause a denial-of-service attack. “Cryptocurrency exchanges have recently suffered this type of attacks where a portion of the traffic is hijacked and the blockchain’s ability to generate consensus is eliminated. It is worth noting that there is a lot of money committed to this type of attacks,” Martínez added

A route leak is the propagation of routing announcements beyond their intended reach. “The network announces that it can reach a destination that it cannot actually reach but adds that the path it will use to get there is better than any other existing path. Traffic sent to this destination is lost, as it does not know which path it must use to get there. This is generally caused by configuration errors in the source autonomous system; however, from a technological point of view, route leaks are a little more difficult to mitigate than route hijacking,” Martínez explained.

(Free access, no subscription required)

Routing Policies: From LoAs to RPKI

Various techniques have been used over the years to check whether the information received via BGP is legitimate. The first of these were LoAs (letters of authorization), an official document from a service provider or client authorizing a third party to gain access to that client’s information from a telecommunications provider.

“Basically, in this type of documents, someone takes responsibility for all the routes. The funny thing about LOAs is that they are manually signed and scanned PDF letters, an incredibly precarious situation,” Martínez said.

Subscribe
Notify of

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments