On the risk of misbehaving RPKI authorities

  • Authors:
  • Danny Cooper;Ethan Heilman;Kyle Brogle;Leonid Reyzin;Sharon Goldberg

  • Affiliations:
  • Boston University, Boston, MA;Boston University, Boston, MA;Stanford University, Stanford, CA;Boston University, Boston, MA;Boston University, Boston, MA

  • Venue:
  • Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of the most devastating attacks on interdomain routing. The threat model for the RPKI supposes that authorities are trusted and routing is under attack. Here we discuss the risks that arise when this threat model is flipped: when RPKI authorities are faulty, misconfigured, compromised, or compelled to misbehave. We show how design decisions that elegantly address the vulnerabilities in the original threat model have unexpected side effects in this flipped threat model. In particular, we show new targeted attacks that allow RPKI authorities, under certain conditions, to limit access to IP prefixes, and discuss the risk that transient RPKI faults can take IP prefixes offline. Our results suggest promising directions for future research, and have implications on the design of security architectures that are appropriate for the untrusted and error-prone Internet.