News regarding leasing, buying or selling of IPv4 addresses.

Get in touch with us

How Resource Public Key Infrastructure (RPKI) helps prevent route hijacking and other attacks?

  • Posted at 2020-11-30 10:26:31
  • By Prefixx Team

How Resource Public Key Infrastructure (RPKI) helps prevent route hijacking and other attacks?

Can RPKI Prevent Route Hijacking?

The nuances of Internet Protocol and storage are such that an unknown network can announce or originate any route. It may be true that the network had no proper authorization to announce the route. The Internet Routing Registry (IRR) already has a system that assists BGP (Border Gateway Protocol) in managing the announcements of routes by networks.

The Great Amazon Hijack of 2018

Despite the many protocols and checks involved to ensure the safety of routes, hijacks, and leaks have happened. A typical example is the infamous hijack of Amazon in 2018. It is not important to find out if the Equinix Chicago IBX server was able to steal cryptocurrency. What matters is that massive unauthorized rerouting took place. 

The BGP Information Management

The Internet has a routing protocol. It is called BGP and it specifies and establishes routed peerings. The peerings are established between ASBR (Autonomous Systems Border Routers.) This protocol clear the way for information exchange on routable IP prefixes. Constant communication takes place between BGP enabled ASBRs that make available the details of Internet-routable IP prefixes. Such communications also specify the AS paths. 

RPKI to Tackle Route Hijacking and Leaks

The numerous endeavors to secure the routing infrastructure of the internet evolved into a specialized public key infrastructure. This key is known as RPKI (Resource Public Key Infrastructure). Another term used to refer to RPKI is Resource Certification. 

The Procedure Employed by RPKI

IP addresses and AS numbers are made available to 'trust anchors' by RPKI. This is achieved through an arrangement that connects Internet Number Resource Information by RPKI. A systematic distribution system that is routed through the IANA to the RIRs reaches the Local Internet Registries. The end-user accesses it from these local internet registries. Each receiver has its security system to ensure that hijackers are detected and warded off during the very first attempt itself. 

Validation by RPKI

The below objects are published in RPKI repositories:

· CRLs (Certificate Revocation Lists)
· Supporting Structures
· Certificates
· ROAs

RPKI uses the validation software known as RP (Relying Party.) Its function is to execute cryptographic validation after reclaiming content from repositories.

Rejection of Announcements

A set of valid ROAs is used by a validating router against BGP announcements that come in. It will detect the presence of any origin AS that does not have the approval to announce IP prefixes. All such BGP announcements which conflict with valid ROAs are branded as originating from unauthorized sources and will be rejected. 

Authentication by Genuine Sources

Relying parties can fulfill RPKI validation after examining the repository. This makes the protocol hassle-free for all parties while ensuring maximum security.

Internet Service Providers (ISPs) have tested the prototype implementations of RPKI standards. They found that the hijacking of prefixes within the capacity of an address can be detected easily. They include operational testing or misconfigurations.

Tactics of Attackers

Thorough BGP Hijacking: It begins when the attackers declare de-aggregation. This announcement is detected as more specific and hence trustworthy than the original owner of the prefix. 

Limited BGP Hijacking: The attacker employs ASs from two different origins and announces identical IP prefixes having the same length. This can confuse the BGP which will then operate its selection rules for the best path. 

How RPKI Stops Route Hijackers

Network operators are permitted by RPKI to determine cryptographically the permissions to announce prefixes. It has a definite system that the operators can use to determine the authenticity of the specific prefix announced by an Autonomous System. The smooth execution of this procedure is due to a signed private key put on the ROA generated by the operators. 

The Series of Checks and Simple Remedies

The validation process is done by the RPKI when the BGP routers ask them to verify the authenticity of an origin AS to announce a prefix. This procedure ensures that the RPKI validation has a minimum impact on the function of the BGP.

Get more information Contact us to discuss your IPv4
needs today!

No hidden fees, free consult


Company Name


Phone Number

Inquiry Type