Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3603269.3610843acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster
Public Access

Poster: Taking the Low Road: How RPKI Invalids Propagate

Published: 01 September 2023 Publication History

Abstract

The Border Gateway Protocol (BGP) includes no mechanism to verify the correctness of routing information exchanged between networks. To defend against unauthorized use of address space, the IETF developed the Resource Public Key Infrastructure (RPKI), a cryptographically attested database system that facilitates validation of BGP messages. Networks can use RPKI to check whether the Autonomous System (AS) at the origin of the AS path in a BGP announcement is authorized to originate the IP prefixes being announced.

References

[1]
Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, and Nick Sullivan. 2019. RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. In Proceedings of the Internet Measurement Conference (Amsterdam, Netherlands) (IMC '19). Association for Computing Machinery, New York, NY, USA, 406--419.
[2]
Ben Du, Gautam Akiwate, Thomas Krenc, Cecilia Testart, Alexander Marder, Bradley Huffaker, Alex C Snoeren, and KC Claffy. 2022. IRR Hygiene in the RPKI Era. In International Conference on Passive and Active Network Measurement. Springer, 321--337.
[3]
Ben Du, Cecilia Testart, Romain Fontugne, Gautam Akiwate, Alex C. Snoeren, and kc claffy. 2022. Mind Your MANRS: Measuring the MANRS Ecosystem. In Proceedings of the 22nd ACM Internet Measurement Conference (Nice, France) (IMC '22). Association for Computing Machinery, New York, NY, USA, 716--729.
[4]
Romain Fontugne, Anant Shah, and Emile Aben. 2018. The (thin) bridges of as connectivity: Measuring dependency using as hegemony. In International Conference on Passive and Active Network Measurement. Springer, 216--227.
[5]
Geoff Huston and Joao Damas. 2020. Measuring Route Origin Validation. https://www.potaroo.net/ispcol/2020-06/rov.html
[6]
Internet Initiative Japan. 2023. Internet Health Report. ttps://ihr.iijlab.net/ihr/en-us/rov
[7]
Kevin Klercq, Willem Toorop, and Koen van Hove. 2023. ImpROVement. RIPE 86. https://ripe86.ripe.net/wp-content/uploads/presentations/144-ImpROVement.pdf
[8]
Cecilia Testart, Philipp Richter, Alistair King, Alberto Dainotti, and David Clark. 2020. To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today. In International Conference on Passive and Active Network Measurement. Springer, 71--87.

Cited By

View all
  • (2024)Sublet Your Subnet: Inferring IP Leasing in the WildProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3689010(328-336)Online publication date: 4-Nov-2024
  • (2024)The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future ProspectsIEEE Transactions on Network and Service Management10.1109/TNSM.2023.332745521:2(2353-2373)Online publication date: Apr-2024
  • (2024)A path forward: improving Internet routing security by enabling zones of trustJournal of Cybersecurity10.1093/cybsec/tyae02310:1Online publication date: 14-Dec-2024
  • Show More Cited By

Index Terms

  1. Poster: Taking the Low Road: How RPKI Invalids Propagate

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 Conference
      September 2023
      1217 pages
      ISBN:9798400702365
      DOI:10.1145/3603269
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 September 2023

      Check for updates

      Author Tags

      1. BGP
      2. RPKI
      3. route origin validation
      4. routing security

      Qualifiers

      • Poster

      Funding Sources

      • US NSF

      Conference

      ACM SIGCOMM '23
      Sponsor:
      ACM SIGCOMM '23: ACM SIGCOMM 2023 Conference
      September 10, 2023
      NY, New York, USA

      Acceptance Rates

      Overall Acceptance Rate 462 of 3,389 submissions, 14%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)103
      • Downloads (Last 6 weeks)11
      Reflects downloads up to 26 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Sublet Your Subnet: Inferring IP Leasing in the WildProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3689010(328-336)Online publication date: 4-Nov-2024
      • (2024)The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future ProspectsIEEE Transactions on Network and Service Management10.1109/TNSM.2023.332745521:2(2353-2373)Online publication date: Apr-2024
      • (2024)A path forward: improving Internet routing security by enabling zones of trustJournal of Cybersecurity10.1093/cybsec/tyae02310:1Online publication date: 14-Dec-2024
      • (2023)IRRegularities in the Internet Routing RegistryProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624843(104-110)Online publication date: 24-Oct-2023

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media