On 6 Jun 2024, at 04:52, Marco d'Itri <m...@linux.it> wrote:
> 
>> At the moment of writing both the NTT and the RADB 'IRR mirror
>> aggregators' support RPKI-based filtering for ROUTE/ROUTE6 objects. This
>> is a fairly recent development and means that anyone using the bgpq3,
>> bgpq4, or irrtoolset's peval utility will enjoy a view on the IRR that
>> is informed by a cryptographically signed source of truth (the RPKI).
>> It's only been 6 months since RADB deployed RPKI-filtering, have the
>> effects of this been studied?
> We are aware of this, but it is not relevant because as you noted there 
> are still ~50% of prefixes which are not protected by RPKI.
> As long as non-authoritative IRRs are used then it will be possible to 
> hijack both allocated and unallocated IP space by creating bogus 
> route/route6 objects.
> And if RPKI coverage were universal then we would not need IRRs (at 
> least for route/route6 objects) and this would not matter anyway.

RPKI and Route Objects don’t prevent hijacks.  Routing policies, filters and 
good practice prevent hijacks.

An RPKI ROA will tell you how a given piece of IP space should be routed 
(origin ASN, prefix length), not from whom you should accept it.

A route object will give a similar signal, the strength / validity of which may 
be seen to vary based on the IRR in which was published.

But if a bad actor manages to masquerade as somebody else’s ASN, either 
directly or via ‘downstream’ routes then neither of the above help.  If 
anything there is a risk that if we blindly consider a route that matches a 
route object / ROA to be beyond doubt we may be less able to identify such 
actions.


-Ronan

_______________________________________________
connect-wg mailing list
connect-wg@ripe.net
https://lists.ripe.net/mailman/listinfo/connect-wg

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/connect-wg

Reply via email to