Difference between revisions of "P2pbgpsec"

From Technologia Incognita
Jump to: navigation, search
(Internet Governance view)
(reported problems in blogs and news)
Line 97: Line 97:
  
 
* Sharon Goldberg @goldbe "Slides from my three hour tutorial on BGP security at the Technion TCE Summer School on Computer Security" http://www.cs.bu.edu/~goldbe/papers/BGPsecurityGoldbe.pdf
 
* Sharon Goldberg @goldbe "Slides from my three hour tutorial on BGP security at the Technion TCE Summer School on Computer Security" http://www.cs.bu.edu/~goldbe/papers/BGPsecurityGoldbe.pdf
 +
 +
2018:
 +
* http://blog.ipspace.net/2017/12/bgp-tragedy-of-commons.html
 +
* https://blog.apnic.net/2018/01/16/really-need-new-bgp/
  
 
==Heartbleed==
 
==Heartbleed==

Revision as of 16:30, 16 January 2018

Projects
Participants
Skills
Status Dormant
Niche Software
Purpose Infrastructure

Peer 2 Peer BGP Security

wiki page for participants of p2p-sec mailing list: https://lists.puscii.nl/wws/arc/p2p-sec

Objectives

  • to contribute to creation and implementation of the distributed/decentralized (web-of-trust) BGP security.
  • to create connections between people who share simmilar concerns about the upcoming introduction of hierarchical BGP-security structures, based on PKI/X.509 technology
  • to provide space for disscussion & exchange of opinions, news, materials
  • to co-ordinate the efforts among various groups that work on the above topics

Problem statements

Internet Governance view

    • excellent summary by Milton Mueller, Brenden Kuerbis. (2010,09).
"Building a new governance hierarchy: RPKI and the future of Internet routing     and addressing. 

Retrieved from Internet Governance Project: http://internetgovernance.org/pdf/RPKI-VilniusIGPfinal.pdf

    • "Negotiating a New Governance Hierarchy: An Analysis of the Conflicting Incentives to Secure Internet Routing"

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2021835

Technical view

  • How broken is SSL: a talk by Moxie Marlinspike: "SSL And The Future Of Authenticity" at Defcon 2011:

http://www.youtube.com/watch?v=Z7Wl2FW2TcA

  • Basic threat scenario: Man in the Middle attack / prefix hijacking,

presented at Defcon, 2008, by Pilosov/Kapela: http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-pilosov-kapela.pdf

  • Enisa report on the routing security: :

http://www.enisa.europa.eu/act/res/technologies/tech/routing/state-of-the-art-deployment-and-impact-on-network-resilience

  • Jeroen Massar's presentaton on Routing Security

http://www.swinog.ch/meetings/swinog21/p/14_SwiNOG21%20-%20Security,%20DDOS%20Mitigation,%20AntiSpam.ppt

  • Sharon Goldberg: Should we secure routing with the RPKI (19 September 2013) , Princeton CS

http://www.cs.princeton.edu/ajax/abstract/467

  • Is the Juice Worth the Squeeze? BGP Security in Partial Deployment

Robert Lychev, Sharon Goldberg, Michael Schapira. SIGCOMM'13, Hong Kong, China. August 2013.

  http://arxiv.org/pdf/1307.2690v1
  http://arxiv.org/abs/1307.2690
  • Impacting IP Prefix Reachability via RPKI Manipulations

Kyle Brogle, Danny Cooper, Sharon Goldberg and Leonid Reyzin. Boston University Technical Report. January 4, 2013.

  http://www.cs.bu.edu/~goldbe/papers/RPKImanip.pdf
  http://www.cs.bu.edu/~goldbe/papers/RPKImanip.html
  • (October 08, 2013) Threat Model for BGP Path Security

http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-threats-07

  • From the Consent of the Routed: Improving the Transparency of the RPKI; Ethan Heilman, Danny Cooper, Leonid Reyzin and Sharon Goldberg.

SIGCOMM'14, Chicago, IL. August 2014. http://www.cs.bu.edu/~goldbe/papers/sigRPKI_full.pdf

"There are also potentially significant drawbacks to incorporating PKI into the routing space, including new potential DoS vectors against PKI-enabled routing elements, the potential for enumeration of routing elements, and the possibility of building a true 'Internet kill switch' with effects far beyond what various governmental bodies have managed to do so far in the DNS space.

Once governments figured out what the DNS was, they started to use it as a ban-hammer - what happens in a PKIed routing system once they figure out what BGP is? "

"So, what happens when the authorities in some locale start pressing for the cancellation of relevant certificates utilized in routing PKI, and/or order operators under their jurisdiction to reject same? "


reported problems in blogs and news

2015:

2016:

2018:

Heartbleed

Possible alternative technical approaches

  • "trust agility", a talk by Moxie Marlinspike: "SSL And The Future Of Authenticity" at Defcon 2011:

http://www.youtube.com/watch?v=Z7Wl2FW2TcA

https://www.eff.org/deeplinks/2011/11/sovereign-keys-proposal-make-https-and-email-more-secure

  • October 21, 2013: "Evolving the Web Public Key Infrastructure", IAB Security Program

http://tools.ietf.org/html/draft-tschofenig-iab-webpki-evolution-00

  • Various suggestions in comments on Scheider's blog post about Renesys artcle, November 2013

https://www.schneier.com/blog/archives/2013/11/rerouting_inter.html

Current solution: RPKI & sBGP

http://www.ripe.net/lir-services/resource-management/certification/community-development

Part 1: Route Hijacks"

In the news & blogs

  • Malcolm Hutty, from London Internet Exchange:

https://publicaffairs.linx.net/news/?p=6118

  • RIPE Members Vote To Continue RPKI Work, Nov 03, 2011 11:44 AM PDT

By Michele Nylon http://www.circleid.com/post/20111103_ripe_members_vote_to_continue_rpki_wo rk/

  • RPKI for PI users in RIPE region:

http://www.ripe.net/ripe/mail/archives/ncc-services-wg/2013-March/002212.html

  • NANOG: SIngle trust anchor?

http://mailman.nanog.org/pipermail/nanog/2013-August/060199.html

  • (after PRISM) "there's a circumstantial case that the NSA and GCHQ are either directly accessing Certificate Authority keys** or else actively stealing keys from US providers, possibly (or probably) without executives' knowledge. This only requires a small number of people with physical or electronic access to servers, so it's quite feasible.*** The one reason I would have ruled it out a few days ago is because it seems so obviously immoral if not illegal, and moreover a huge threat to the checks and balances that the NSA allegedly has to satisfy in order to access specific users' data via programs such as PRISM."

http://blog.cryptographyengineering.com/2013/09/on-nsa.html

  • (NSA breaking crypto, SSL, etc, by Schneider )

https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html

  • GOVERNMENTS WANT SUSPENDERS FOR SECURE ROUTING (24 September 2013)

http://www.internetgovernance.org/2013/09/24/keep-your-pants-on-governments-want-suspenders-for-secure-routing/

  • "...allowing the US the power to arbitrarily shut countries off the net is [...] what deployment of DNSSEC and the rPKI under the current models would do.

http://www.circleid.com/posts/20131027_nobody_has_proposed_sustainable_model_for_internet_governance_yet/

  • IETF in Vancouver, Sept-November 2013:

https://www.schneier.com/blog/archives/2013/09/take_back_the_i.html http://www.ietf.org/blog/2013/09/security-and-pervasive-monitoring/ http://www.ietf.org/blog/2013/11/strengthening-the-internet/ http://www.ietf.org/blog/2013/11/we-will-strengthen-the-internet/ http://www.ietf.org/media/2013-11-07-internet-privacy-and-security.html http://www.economist.com/news/science-and-technology/21589383-stung-revelations-ubiquitous-surveillance-and-compromised-software/


.Tradeoffs in Cyber Security
.Dan Geer, 9 October 13, UNCC
"For now — after years of warnings by Perlman, Bellovin, Kent, Clarke and many others — perhaps 
the most telling statistic is the percentage of Internet traffic currently secured by the 
new system of cryptographic network keys: zero."

Meshnets media

See also:

http://becha.home.xs4all.nl/hackers-philosophers-utopian-network-dec-2012-becha.pdf