Proceedings of the 13th International Conference on Emerging Networking EXperiments and Technologies 2017
DOI: 10.1145/3143361.3143363
|View full text |Cite
|
Sign up to set email alerts
|

MaxLength Considered Harmful to the RPKI

Abstract: User convenience and strong security are often at odds, and most security applications need to nd some sort of balance between these two (often opposing) goals. The Resource Public Key Infrastructure (RPKI), a security infrastructure built on top of interdomain routing, is not immune to this issue. The RPKI uses the maxLength attribute to reduce the amount of information that must be explicitly recorded in its cryptographic objects. MaxLength also allows operators to easily recon gure their networks without mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
16
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(25 citation statements)
references
References 14 publications
1
16
0
1
Order By: Relevance
“…Interestingly, we find that the use of MaxLength has been decreasing and only 11.2% of IP prefixes in VRPs use it in our latest snapshot. This aligns with a previous report [26].…”
Section: Too-specific Announcementssupporting
confidence: 94%
See 3 more Smart Citations
“…Interestingly, we find that the use of MaxLength has been decreasing and only 11.2% of IP prefixes in VRPs use it in our latest snapshot. This aligns with a previous report [26].…”
Section: Too-specific Announcementssupporting
confidence: 94%
“…It has been argued that the use of MaxLength is harmful [24,26]. The reasoning is, that by allowing more specific announcements the prefix holder makes itself vulnerable to malicious hijacks where the origin ASN is spoofed by prepending it to the BGP path.…”
Section: Discussion 71 Maxlengthmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, deploying these extensions is not trivial and requires trained staff [5] and financial investment, and (iii) Exposure of business relationships through peering agreements in the RPKI [4]. In addition, the RPKI faces implementation [10] and transparency [11] challenges.…”
Section: Introductionmentioning
confidence: 99%