limiting the power of rpki authorities
play

Limiting the Power of RPKI Authorities Kris Shrishak Haya Shulman - PowerPoint PPT Presentation

Applied Networking Research Workshop 2020 acm sigcomm Limiting the Power of RPKI Authorities Kris Shrishak Haya Shulman TU Darmstadt and Fraunhofer SIT Motivation - Resource Public Key Infrastructure (RPKI) secures the interdomain routing


  1. Applied Networking Research Workshop 2020 acm sigcomm Limiting the Power of RPKI Authorities Kris Shrishak Haya Shulman TU Darmstadt and Fraunhofer SIT

  2. Motivation - Resource Public Key Infrastructure (RPKI) secures the interdomain routing against prefix and subprefix hijacks - However, significant power lies with the Regional Internet Registries (RIRs) This Work - Distributed RPKI system that relies on threshold signatures - Prevention rather than detection - Ensures that any change to the RPKI objects requires a joint action by a number of RIRs, avoiding unilateral IP address takedowns - No changes required at Relying Parties 1 / 19

  3. Outline RPKI MPC Our work

  4. Prefix hijacks 2 / 19

  5. RPKI RPKI [RFC 6480] is a hierarchical PKI that includes: Routing Certificate (RC) Binds IP prefix to a public key Route Origin Authorization (ROA) Binds the prefix to AS - Signed by the public key associated with the RC Route Origin Validation (ROV) Validates the origin of BGP route announcements RPKI is a prerequisite for BGPSec [RFC 8205] that provides path validation. 3 / 19

  6. Delegated and Hosted RPKI Delegated RPKI - Members run their own CA - Member generates its own certificate, gets it signed by the parent CA 1 https://ripe77.ripe.net/presentations/156-RPKI-deployment-at-scale-RIPE-1.pdf 4 / 19

  7. Delegated and Hosted RPKI Delegated RPKI - Members run their own CA - Member generates its own certificate, gets it signed by the parent CA Hosted RPKI - RIR runs the CA for the members and manages the keys and repo - Convenient option for members as they do need to run their own CAs - Even some large providers such as Cloudflare use hosted RPKI 1 1 https://ripe77.ripe.net/presentations/156-RPKI-deployment-at-scale-RIPE-1.pdf 4 / 19

  8. Delegated and Hosted RPKI Delegated RPKI - Members run their own CA - Member generates its own certificate, gets it signed by the parent CA Hosted RPKI - RIR runs the CA for the members and manages the keys and repo - Convenient option for members as they do need to run their own CAs - Even some large providers such as Cloudflare use hosted RPKI 1 1 https://ripe77.ripe.net/presentations/156-RPKI-deployment-at-scale-RIPE-1.pdf 4 / 19

  9. Power imbalance - RPKI authorities can revoke and allocations - RPKI authorities can unilaterally takedown IP prefixes - Law enforcement 2 3 - ASes not necessarily in the same country as the RIR (no recourse, loss of business) - RIRs do not usually collude with each other, and often disagree with each other when it comes to their response to law enforcement agencies 4 2 RIPE NCC Blocks Registration in RIPE Registry Following Order from Dutch Police (2011) 3 ICANN Tells U.S. Court That ccTLDs Are Not “Property” — Files Motion to Quash in U.S. Legal Action Aimed at Seizing Top-Level Domains (2014) 4 M. Mueller, M. van Eeten, and B. Kuerbis. In important case, RIPE-NCC seeks legal clarity on how it responds to foreign court orders (2011) 5 / 19

  10. Prior Works - Adding transparency logs and .dead objects to signify consent 5 - Relying parties take a part of the burden - Detection after the fact - Parent manages the signing in hosted RPKI and can sign the .dead objects itself - Blockchain to replace RPKI 6 - Scalability - Deployment issues such as consensus algorithm and incentive for the nodes to run the blockchain - If Proof-of-Stake is used, large providers will become powerful players; another form of power imbalance 5 Heilman, et. al. From the consent of the routed: Improving the transparency of the RPKI (SIGCOMM’14) 6 Adiseshu Hari and T. V. Lakshman. The Internet blockchain: A distributed, tamper-resistant transaction framework for the Internet (HotNets’16) 6 / 19

  11. Outline RPKI MPC Our work

  12. Multiparty Computation (MPC) x 2 Trusted Third Party x 1 x 3 7 / 19

  13. Multiparty Computation (MPC) x 2 x 2 MPC Trusted Third Party x 1 x 1 x 3 x 3 7 / 19

  14. MPC Threshold Signatures Traditional Signatures Threshold Signatures { sk 1 , sk 2 , sk 3 } ← Share (sk) sk sk 2 MPC Indistinguishable sk 1 sk 3 8 / 19

  15. MPC Threshold Signatures Traditional Signatures Threshold Signatures { sk 1 , sk 2 , sk 3 } ← Share (sk) sk sk 2 MPC Indistinguishable sk 1 sk 3 8 / 19

  16. Outline RPKI MPC Our work

  17. Threat model Individual RIRs not entirely trusted x 2 x 2 MPC x 1 x 3 x 3 9 / 19

  18. Threat model Individual RIRs not entirely trusted x 2 x 2 Adversary power - Passive - Active MPC x 1 x 3 x 3 9 / 19

  19. Threat model Individual RIRs not entirely trusted x 2 x 2 Adversary power - Passive - Active MPC x 1 How many can be corrupt? - Minority x 3 x 3 9 / 19

  20. Threat model Individual RIRs not entirely trusted x 2 x 2 Adversary power - Passive - Active MPC x 1 How many can be corrupt? - Minority - Majority x 3 x 3 9 / 19

  21. System Setup Trust Anchor RPKI Threshold Signature RIR CA DB Module repos Hosted RPKI repos RPKI Threshold Signature Hosted CA DB Module 10 / 19

  22. Distributed RPKI RIPE NCC Threshold Signature repos CA repos Module ARIN AFRINIC MPC LACNIC APNIC 11 / 19

  23. Threshold signatures for RPKI { sk 1 , sk 2 , sk 3 , sk 4 , sk 5 } ← Share (sk) 12 / 19

  24. Threshold signatures for RPKI { sk 1 , sk 2 , sk 3 , sk 4 , sk 5 } ← Share (sk) sk 2 sk 4 consent MPC sk 1 sk 5 sk 3 repos repos 12 / 19

  25. Threshold signatures for RPKI { sk 1 , sk 2 , sk 3 , sk 4 , sk 5 } ← Share (sk) sk 2 sk 4 consent MPC sk 1 sk 5 sk 3 repos repos 12 / 19

  26. Threshold signatures for RPKI { sk 1 , sk 2 , sk 3 , sk 4 , sk 5 } ← Share (sk) sk 2 sk 4 consent MPC sk 1 sk 5 sk 3 repos repos 12 / 19

  27. Threshold signatures for RPKI { sk 1 , sk 2 , sk 3 , sk 4 , sk 5 } ← Share (sk) sk 2 sk 4 consent MPC sk 1 sk 5 sk 3 repos repos 12 / 19

  28. Threshold signatures for RPKI { sk 1 , sk 2 , sk 3 , sk 4 , sk 5 } ← Share (sk) Threshold signing should not be expensive sk 2 sk 4 consent MPC sk 1 sk 5 sk 3 repos repos 12 / 19

  29. Threshold Signature in 3 phases Preprocessing Preprocessing - Member independent - Member independent - Message independent MPC Online phase 13 / 19

  30. Threshold Signature in 3 phases Preprocessing Preprocessing - Member independent - Member independent - Message independent MPC Online phase 13 / 19

  31. Threshold Signature in 3 phases sk 2 Preprocessing Preprocessing - Member independent - Member independent sk 4 - Message independent MPC Online phase sk 1 sk 5 sk 3 13 / 19

  32. Threshold Signature in 3 phases sk 2 , M Preprocessing Preprocessing - Member independent - Member independent sk 4 , M - Message independent MPC Online phase sk 1 , M sk 5 , M sk 3 , M 13 / 19

  33. Deployment Scenarios - Two-layered - Is compatible with delegated RPKI - Upper layer generates a distributed TA to the five RIRs - Distributed key generation - All RIRs have the same subjectPublicKeyInfo in their TAL - Lower layer uses the threshold signing module for the Hosted CAs - Generates signed objects - Not entirely immune to state coercion - Flat - Combines RIR CA and hosted CA - Replaces the hierarchical RPKI with a flat architecture - Not compatible with delegated RPKI 14 / 19

  34. Evaluations Frankfurt 85.6 | 142 114.9 | 109 203.7 | 56 283.2 | 39 180.6 | 64 N. Virginia Mumbai 228.3 | 49 119.9 | 99 301.0 | 36 196.7 | 57 Sao Paolo Sydney 308.7 | 35 Figure: Latency in milliseconds | Bandwidth in Mbits/s between regions 15 / 19

  35. Evaluations ❤❤❤❤❤❤❤❤❤❤❤ Adversary power Passive Active Majority ❤ Honest Shamir Mal. Shamir Dishonest Semi. OT MASCOT Table: Four MPC protocols LAN WAN Preprocessing Online Preprocessing Online MASCOT 209 529 20 0 . 95 Semi OT 1042 662 111 2 . 05 Mal. Shamir 699 714 91 3 . 53 Shamir 1020 769 265 3 . 54 Table: Breakdown of throughput for preprocessing (tuples/sec) and online phases (signatures/sec) 16 / 19

  36. ROAs AFRINIC ARIN RIPENCC AFRINIC ARIN RIPENCC 100000 100000 APNIC LACNIC APNIC LACNIC 80000 80000 ROAs removed ROAs added 60000 60000 40000 40000 20000 20000 0 0 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 - - - - - - - - - - - - 5 6 7 8 9 0 5 6 7 8 9 0 1 1 1 1 1 2 1 1 1 1 1 2 0 0 0 0 0 0 0 0 0 0 0 0 2 2 2 2 2 2 2 2 2 2 2 2 Dates Dates Figure: Number of ROAs added and removed from March 2015 to February 2020 17 / 19

  37. Evaluations In the WAN setting, - MASCOT: 0.95 signatures/sec or 82080 signatures/day - Shamir: 3.53 signatures/sec or 304992 signatures/day - Even our slowest protocol is able to satisfy the requirements on an average day. - Our other protocols are able to generate enough signatures even on peak days 18 / 19

  38. Summary of our work - Distributed RPKI with a stronger threat model - Using threshold signatures in preprocessing model - No changes at Relying Parties - Technical solution that requires legal and policy barriers to be addressed to make the work truly practical 19 / 19

  39. kris.shrishak@sit.tu-darmstadt.de RIPE NCC Threshold Signature repos CA repos Module ARIN AFRINIC MPC LACNIC APNIC

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend