Why not to use RPKI (Was Re: Argus: a hijacking alarm system)
Danny McPherson
danny at tcb.net
Fri Jan 20 14:11:41 UTC 2012
On Jan 20, 2012, at 8:08 AM, Yang Xiang wrote:
>
> I think network operators are only careless, but not trust-less,
> so black-hole hijacking is the majority case.
This is aligned with the discussion on route leaks at the proposed
interim SIDR meeting just after NANOG.
Even with RPKI and BGPSEC fully deployed we still have this
vulnerability, which commonly manifests itself today even by
accident.
RPKI-enabled BGPSEC would give you some assurances that the
ASes in the AS_PATH represent the list of ASes through which the
NLRI traveled, but nothing about whether it should have traversed
those ASes in the first place -- so we still need something somewhere
to mitigate that threat.
See this draft for more information:
<http://tools.ietf.org/html/draft-foo-sidr-simple-leak-attack-bgpsec-no-help-01>
-danny
More information about the NANOG
mailing list