BGP to doom us all
Steven M. Bellovin
smb at research.att.com
Sat Mar 1 01:19:58 UTC 2003
In message <3E5FDFC8.3000208 at whack.org>, Bruce Pinsky writes:
>
>Jim Deleskie wrote:
>>
>> http://news.com.com/2100-1009-990608.html?tag=fd_lede1_hed
>>
>> Seems the BGP will be the down fall of the internet, the sky is falling the
>> sky is falling
>
>
>What a crock of crap. Knowing who someone is doesn't stop them from causing
>intentional or unintentional problems. In fact, authentication is more likely
>
The problem that sBGP is trying to solve is *authorization*, not
identification. Briefly -- and please read the papers and the specs
before flaming -- every originating AS would have a certificate chain
rooted at their local RIR stating that they own a certain address
block. If an ISP SWIPs a block to some customer, that ISP (which owns
a certificate from the RIR for the parent block) would sign a
certificate granting the subblock to the customer. The customer could
then announce it via sBGP.
The other part sBGP is that it provides a chain of signatures of the
entire ASpath back to the originator.
Now -- there are clearly lots of issues here, including the fact that
the the authoritative address ownership data for old allocations is,
shall we say, a bit dubious. And the code itself is expensive to run,
since it involves a lot of digital signatures and verifications,
especially when things are thrashing because of a major backhoe hit.
But -- given things like the AS7007 incident, and given the possibility
-- probability? -- that it can happen again, can we afford to not do
sBGP? My own opinion is that sophisticated routing attacks are the
single biggest threat to the Internet.
--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (2nd edition of "Firewalls" book)
More information about the NANOG
mailing list