Security

The fix for BGP's weaknesses has big, scary, issues of its own, boffins find

Bother, given the White House has bet big on RPKI – just like we all rely on immature internet infrastructure that usually works


The Resource Public Key Infrastructure (RPKI) protocol has "software vulnerabilities, inconsistent specifications, and operational challenges" according to a pre-press paper from a trio of German researchers.

RPKI was designed to fix problems caused by the fact that Border Gateway Protocol (BGP) – the protocol that manages the routes traffic can traverse across the internet – was not secure by design. The newer protocol theoretically fixes that by adding Route Origin Validation (ROV) and Route Origin Authorization (ROA) – techniques that let network operators verify that advertised routes are authentic and represent accurate BGP announcements.

In early September, the White House made RPKI part of its Roadmap to Enhancing Internet Routing Security – an initiative US national cyber director Harry Coker, Jr, said would "mitigate a longstanding vulnerability and lead to a more secure internet that is vital to our national security and the economic prosperity of all Americans."

And the rest of us, too, given that one impact of an attack on BGP could be to re-route traffic away from a website's actual address to another that hosts malware.

But according to a pre-press paper [PDF] by Haya Schulmann and Niklas Vogel of Germany's National Research Center for Applied Cybersecurity and Goethe-Universität Frankfurt, and Michael Waidner from the Center and TU Darmstadt, RPKI is far from perfect.

Schulmann and Vogel summarized the paper in a post on the Asia Pacific Network Information Center's blog:

The RPKI specifications, RPKI software packages, and RPKI repository implementations are still not sufficiently stable and contain critical vulnerabilities. Overall, at least 53 vulnerabilities in RPKI software packages were disclosed, including persistent DoS, authentication bypass, cache poisoning, and remote-code-execution. While the large majority of these vulnerabilities were swiftly fixed, they still raise the question of the resilience of implementations and the potential existence of other zero days.

The trio are optimistic that the many packages comprising RPKI will be improved. But for now they worry it is "attractive for attackers, with the relative abundance of vulnerabilities that have potentially devastating consequences for RPKI validation and might even open a backdoor into the local network running the vulnerable software component."

That's not just a theory. The paper outlines a Remote Code Execution attack the authors discovered during their research.

They also fear supply chain attacks that embed backdoors in open source RPKI components.

One saving grace is that the researchers found many operators struggle to keep their RPKI code patched, as it lacks automated means to do so – so a supply chain attack might take a while to have any effect. Of course, slow patching also means some users may not have patched dangerous flaws: the trio reckon 41.2 percent of those who use RPKI "are vulnerable to at least one long-disclosed attack."

But they also worry that RPKI may not scale well, and that lack of automation tools means misconfigurations are possible. If that happens, the benefits of the protocol – making verifiable info about routes available – will be hard to realize.

The paper assesses RPKI as "far from being fully mature" and the authors therefore ask "Did the White House push for the adoption of an immature technology, potentially doing more harm than good?"

Their answer is probably not, because all internet technologies were deployed before being perfected – even BGP – but were battle-tested and improved over time.

The authors therefore suggest using their paper as a To-Do list for those who work on RPKI.

"The roadmap of the White House is a huge leap for RPKI, and therefore also for internet routing, to truly mature and meet the expectations of security, reliability, and scalability for production-level deployments across the global internet," the authors conclude. ®

Send us news
9 Comments

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Check out this free automated tool that hunts for exposed AWS secrets in public repos

You can find out if your GitHub codebase is leaking keys ... but so can miscreants

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

C++ creator calls for help to defend programming language from 'serious attacks'

Bjarne Stroustrup wants standards body to respond to memory-safety push as Rust monsters lurk at the door

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Coordinates of millions of smartphones feared stolen, sparking yet another lawsuit against data broker

Fourth time’s the harm?

Bybit declares war on North Korea's Lazarus crime-ring to regain $1.5B stolen from wallet

Up to $140M in bounty rewards for return of Ethereum allegedly pilfered by hermit nation

100-plus spies fired after NSA internal chat board used for kinky sex talk

National intel boss slams naughty nattering on work systems as 'egregious violation of trust'

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it