netsec-sig - Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
Subject: Internet2 Network Security SIG
List archive
- From: Andrew Gallo <>
- To:
- Subject: Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
- Date: Mon, 20 Aug 2018 11:07:03 -0400
- Ironport-phdr: 9a23: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
I'm really failing to see the big win here. It's not so much the use of maxlength that's the
issue, but rather having ROA's allowing announcements of prefixes which
you do not normally announce (which are more specifics of prefixes you normally do announce).
When you use maxlength, the attacker still needs to spoof origin AS in the AS_PATH
in order to hijack a prefix. By registering a bunch of /24's (or /48's) which
are not normally announced, you still opening yourself up to hijacks of those individual
prefixes with the same type of origin AS spoofing. For most networks, hijacking a few strategic
/24's or /48's will likely be just as deadly as hijacking a larger block.
-Larry Blunk
Merit
Yes, that is true, creating ROAs for all the /24s does create a large attack surface. BUT, it is still less than creating *all* the prefixes between /16 and /24
Creating a ROA that covers a /16 and all /24s is 257 prefixes, while 16-24 (inclusive) would be 511 total prefixes, some of which are pretty large.
You are correct in that this type of attack would require AS spoofing, which should (hopefully) be harder.
I think we're seeing the mismatch between real-time operational changes to the routing infrastructure (changing BGP advertisements) and the non-real-time data that is used to validate it.
We're also seeing a change in guidance from the standards bodies- the max length field was useful, but is no longer recommended.
Good discussion all around.
--
________________________________
Andrew Gallo
The George Washington University
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
- [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/15/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Michael H Lambert, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/21/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- RE: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Spurling, Shannon, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Jeff Bartig, 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
Archive powered by MHonArc 2.6.19.