Rpkiller: Threat Analysis from an RPKI Relying Party Perspective

03/02/2022
by   Koen van Hove, et al.
0

The Resource Public Key Infrastructure (RPKI) aims to secure internet routing by creating an infrastructure where resource holders can make attestations about their resources. RPKI Certificate Authorities issue these attestations and publish them at Publication Points. Relying Party software retrieves and processes the RPKI-related data from all publication points, validates the data and makes it available to routers so they can make secure routing decisions. In this work, we create a threat model for Relying Party software, where an attacker controls a Certificate Authority and Publication Point. We implement a prototype testbed to analyse how current Relying Party software implementations react to scenarios originating from that threat model. Our results show that all current Relying Party software was susceptible to at least one of the identified threats. In addition to this, we also identified threats stemming from choices made in the protocol itself. Taken together, these threats potentially allow an attacker to fully disrupt all RPKI Relying Party software on a global scale. We performed a Coordinated Vulnerability Disclosure to the implementers and have made our testbed software available for future studies.

READ FULL TEXT

page 7

page 12

research
05/12/2022

Stalloris: RPKI Downgrade Attack

We demonstrate the first downgrade attacks against RPKI. The key design ...
research
06/29/2022

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Identification of cyber threats is one of the essential tasks for securi...
research
02/18/2021

Security audit logging in microservice-based systems: survey of architecture patterns

Objective. Service-oriented architecture increases technical abilities f...
research
10/26/2022

Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling

Technological advances have enabled multiple countries to consider imple...
research
12/10/2018

JSSignature: Eliminating Third-Party-Hosted JavaScript Infection Threats Using Digital Signatures

Today, third-party JavaScript resources are indispensable part of the we...
research
08/23/2019

Design choices for productive, secure, data-intensive research at scale in the cloud

We present a policy and process framework for secure environments for pr...
research
05/20/2019

Secure Extensibility for System State Extraction via Plugin Sandboxing

We introduce a new mechanism to securely extend systems data collection ...

Please sign up or login with your details

Forgot password? Click here to reset