When BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites
نویسندگان
چکیده
Web content delivery is one of the most important services on the Internet. A secure access to websites is typically granted via SSL. However, traffic hijacking on the network layer may break this security model and makes additional protective mechanisms necessary. This paper presents a first quantitative analysis of the protection of web servers by RPKI, a recently deployed Resource Public Key Infrastructure to prevent hijacking in the Internet backbone. We introduce an initial methodology that accounts for distributed content deployment and shall enable the content owners to estimate and improve the security of the web ecosystem. For a current snapshot, we find that less popular websites are more likely to be secured than the prominent sites. Popular websites significantly rely on CDNs, which did not start to secure their IP prefixes. Whenever CDN-content is protected by RPKI, it is located in third party ISP networks. This hesitant deployment is the likely cause why popular content experiences re-
منابع مشابه
RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation
A major step towards secure Internet backbone routing started with the deployment of the Resource Public Key Infrastructure (RPKI). It allows for the cryptographic strong binding of an IP prefix and autonomous systems that are legitimate to originate this prefix. A fundamental design choice of RPKI-based prefix origin validation is the avoidance of cryptographic load at BGP routers. Cryptograph...
متن کاملMeasuring BGP Route Origin Registration and Validation
BGP, the de-facto inter-domain routing protocol, was designed without considering security. Recently, network operators have experienced hijacks of their network prefixes, often due to BGP misconfiguration by other operators, sometimes maliciously. In order to address this, prefix origin validation, based on a RPKI infrastructure, was proposed and developed. Today, many organizations are regist...
متن کاملAre We There Yet? On RPKI's Deployment and Security
The Resource Public Key Infrastructure (RPKI) binds IP address blocks to owners’ public keys. RPKI enables routers to perform Route Origin Validation (ROV), thus preventing devastating attacks such as IP prefix hijacking. Yet, despite extensive effort, RPKI’s deployment is frustratingly sluggish, leaving the Internet largely insecure. We tackle fundamental questions regarding today’s RPKI’s dep...
متن کاملUpdates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis
A fundamental change in the Internet backbone routing started in January 2011: The Resource Public Key Infrastructure (RPKI) has officially been deployed by the Regional Internet Registries. It leverages the validation of BGP prefix updates based on cryptographically verified data and may lead to secure inter-domain routing at last. In this talk, we present RTRlib, a highly efficient reference ...
متن کاملCryptographically secure detection of mirror worlds
The Resource Public Key Infrastructure (RPKI) has been introduced as a way of authorizing Border Gateway Protocol (BGP) route announcements. The highly centralized structure of the RPKI provides security guarantees against external threats, e.g. prefix hijacking, but allows for the unilateral revocation of allocated resources. Recent efforts propose changes to the RPKI to create accountability ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1408.0391 شماره
صفحات -
تاریخ انتشار 2014