Skip to Content.
Sympa Menu

netsec-sig - Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes

Subject: Internet2 Network Security SIG

List archive

Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes


Chronological Thread 
  • From: Jeff Bartig <>
  • To: , Andrew Gallo <>
  • Subject: Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
  • Date: Mon, 20 Aug 2018 10:49:36 -0500
  • Authentication-results: gwu.edu; dkim=none (message not signed) header.d=none;gwu.edu; dmarc=none action=none header.from=internet2.edu;
  • Ironport-phdr: 9a23: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
  • Spamdiagnosticoutput: 1:0



Andrew Gallo wrote on 8/20/18 10:07 AM:

   I'm really failing to see the big win here.   It's not so much the use of maxlength that's the
issue, but rather having ROA's allowing announcements of prefixes which
you do not normally announce (which are more specifics of prefixes you normally do announce).
When you use maxlength, the attacker still needs to spoof origin AS in the AS_PATH
in order to hijack a prefix.    By registering a bunch of /24's (or /48's) which
are not normally announced, you still opening yourself up to hijacks of those individual
prefixes with the same type of origin AS spoofing.   For most networks, hijacking a few strategic
/24's or /48's will likely be just as deadly as hijacking a larger block.


 -Larry Blunk
  Merit

Yes, that is true, creating ROAs for all the /24s does create a large attack surface.  BUT, it is still less than creating *all* the prefixes between /16 and /24

Creating a ROA that covers a /16 and all /24s is 257 prefixes, while 16-24 (inclusive) would be 511 total prefixes, some of which are pretty large.

You are correct in that this type of attack would require AS spoofing, which should (hopefully) be harder.

Larry makes a good point.  Is there really much difference in the attack surface here?  In both examples, the /24s really define the attack surface.  I really don't see an evil attacker giving up because they couldn't announce /23s.  If /24s can be advertised in a hijacking attack, I think that would be preferred over other shorter prefixes.

Jeff

--
Jeff Bartig
Interconnection Architect
Internet2  AS11164 / AS11537
+1-608-616-9908



Archive powered by MHonArc 2.6.19.

Top of Page