[180418] in North American Network Operators' Group
Re: Routing Insecurity (Re: BGP in the Washington Post)
daemon@ATHENA.MIT.EDU (Dale W. Carder)
Tue Jun 2 11:16:43 2015
X-Original-To: nanog@nanog.org
Date: Tue, 02 Jun 2015 10:12:33 -0500
From: "Dale W. Carder" <dwcarder@wisc.edu>
To: Roland Dobbins <rdobbins@arbor.net>
In-reply-to: <7B872CEF-2A5C-4DCD-A384-17AA8EE9BBEC@arbor.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
Thus spake Roland Dobbins (rdobbins@arbor.net) on Tue, Jun 02, 2015 at 03:05:13PM +0700:
>
> On 2 Jun 2015, at 11:07, Mark Andrews wrote:
>
> >If you have secure BGP deployed then you could extend the authenication
> >to securely authenticate source addresses you emit and automate
> >BCP38 filter generation and then you wouldn't have to worry about
> >DNS, NTP, CHARGEN etc. reflecting spoofed traffic
>
> This can be and is done by networks which originate routes and which
> practice good network hygiene, no PKI required.
>
> But then we get into the customer of my customer (of my customer, of my
> customer . . .) problem, and this aren't quite so clear.
>
> There are also potentially significant drawbacks to incorporating PKI into
> the routing space, including new potential DoS vectors against PKI-enabled
> routing elements, the potential for enumeration of routing elements, and the
> possibility of building a true 'Internet kill switch' with effects far
> beyond what various governmental bodies have managed to do so far in the DNS
> space.
>
> Once governments figured out what the DNS was, they started to use it as a
> ban-hammer - what happens in a PKIed routing system once they figure out
> what BGP is?
>
> But nobody seems to be discussing these potential drawbacks, very much.
Start here:
https://www.cs.bu.edu/~goldbe/papers/hotRPKI_full.pdf
Dale