Proceedings of the Internet Measurement Conference 2019
DOI: 10.1145/3355369.3355596
|View full text |Cite
|
Sign up to set email alerts
|

RPKI is Coming of Age

Abstract: Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) announces routes for IP space it does not control. To address this issue, the Resource Public Key Infrastructure (RPKI) was developed starting in 2008, with deployment beginning in 2011. This paper performs the first comprehensive, longitudinal study of the deployment, coverage, and quality of RPKI. We use a unique dataset containin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(9 citation statements)
references
References 28 publications
2
7
0
Order By: Relevance
“…Despite its strong attestation, however, it has not been widely deployed yet due to the negative impact of misissued ROA, the certificate dependencies in the hierarchy of RPKI [27], [29], and its incapability of route-leak protection. Also, RPKI depends on the Public Key Infrastructure (PKI) managed by RIRs, the quality of RPKI deployment and its management is significantly different across the RIRs; for example, we found that on March 1st, 2023, 59.2% of IP prefixes in RIPE NCC, the European RIR, were covered by ROA objects, while only 23.9% of IP prefixes in AFRINIC, the RIR for Africa, were done ( §III), consistent with findings reported in 2019 [17]. Because of this limitation, Mutually Agreed Norms for Routing Security (MANRS) recommends the use of both IRR and RPKI [60].…”
Section: Introductionsupporting
confidence: 84%
See 3 more Smart Citations
“…Despite its strong attestation, however, it has not been widely deployed yet due to the negative impact of misissued ROA, the certificate dependencies in the hierarchy of RPKI [27], [29], and its incapability of route-leak protection. Also, RPKI depends on the Public Key Infrastructure (PKI) managed by RIRs, the quality of RPKI deployment and its management is significantly different across the RIRs; for example, we found that on March 1st, 2023, 59.2% of IP prefixes in RIPE NCC, the European RIR, were covered by ROA objects, while only 23.9% of IP prefixes in AFRINIC, the RIR for Africa, were done ( §III), consistent with findings reported in 2019 [17]. Because of this limitation, Mutually Agreed Norms for Routing Security (MANRS) recommends the use of both IRR and RPKI [60].…”
Section: Introductionsupporting
confidence: 84%
“…We find that the number of BGP announcements and the number of covered BGP announcements increased on those dates, but the number of valid BGP announcements was almost the same as the other days. We also find that AS37468, operated by Angola Cables, made more than 176K BGP announcements on July 19th, 2018, which it did not announce for the four weeks around that day, which aligns with the report in [17].…”
Section: ) Bgp Coverage By Irr and Rpkisupporting
confidence: 76%
See 2 more Smart Citations
“…Since many IP spaces are not covered in ROA records, ROV may identify the validation result of an illegitimate BGP announcement as "unknown" and thus improperly accepts it. What's worse, it is also frequently observed that ROV may mistakenly discard legitimate BGP announcements due to incomplete or misconfigured ROA records [49], [48]. Therefore, to improve the accuracy and effectiveness of ROV, it is necessary to increase the deployment rate of ROA.…”
Section: Technical Reasons the Technical Reasons Can Be Classified In...mentioning
confidence: 99%