Skip to main content

Validation Algorithms for a Secure Internet Routing PKI

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5057))

Abstract

A PKI in support of secure Internet routing was first proposed in [1] and refined in later papers, e.g., [2]. In this “Resource” PKI (RPKI) the resources managed are IP address allocations and Autonomous System number assignments. In a typical PKI the validation problem for each relying party is fairly simple in principle, and is well defined in the standards, e.g. RFC 3280 [3]. The RPKI presents a very different challenge for relying parties with regard to efficient certificate validation. In the RPKI every relying party needs to validate every certificate at fairly frequent intervals (e.g., daily). In addition, certificates on the validation path may be acquired from multiple repositories in an arbitrary order. These dramatic differences motivated us to develop performance-optimized validation algorithms for the RPKI. This paper describes the software developed by BBN for the RPKI, with a special focus on this optimized validation approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kent, S., Lynn, C., Seo, K.: Design and Analysis of the Secure Border Gateway Protocol (S-BGP). In: IEEE DISCEX Conference (2000)

    Google Scholar 

  2. Kent, S.: An Infrastructure Supporting Secure Internet Routing. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 116–129. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure - Certificate and Certificate Revocation List (CRL) Profile. RFC3280 (2002)

    Google Scholar 

  4. Rekhter, Y., Li, T.: A Border Gateway Protocol (BGP). RFC4271 (2006)

    Google Scholar 

  5. Murphy, S.: BGP Security Vulnerability Analysis. RFC4272 (2006)

    Google Scholar 

  6. Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (S-BGP). IEEE Journal on Selected Areas in Communications 18(4), 582–592 (2000)

    Article  Google Scholar 

  7. Goodell, G., Aiello, W., Griffin, T., Ioannidis, J., McDaniel, P., Rubin, A.: Working Around BGP: An Incremental Approach to Improving Security and Accuracy for Interdomain Routing. In: Network and Distributed System Security Symposium, pp. 73–85 (2003)

    Google Scholar 

  8. Hu, Y.-C., Perrig, A., Johnson, D.: Efficient Security Mechanisms for Routing Protocols. In: Network and Distributed System Security Symposium, pp. 57–73 (2003)

    Google Scholar 

  9. Wan, T., Kranakis, E., van Oorschot, P.C.: Pretty Secure BGP (psBGP). In: Network and Distributed System Security Symposium (2005)

    Google Scholar 

  10. Kent, S.: Securing BGP: S-BGP. The Internet Protocol Journal 6(3), 2–14 (2003)

    Google Scholar 

  11. White, R.: Securing BGP: soBGP. The Internet Protocol Journal 6(3), 15–22 (2003)

    Google Scholar 

  12. Housley, R., Polk, T.: Planning for PKI. Wiley Computer Publishers, Chichester (2001)

    Google Scholar 

  13. Opplinger, R.: Secure Messaging with PGP and S/MIME. Artech House Publishers (2000)

    Google Scholar 

  14. http://ietfreport.isoc.org/idref/draft-ietf-sidr-res-certs

  15. http://www.mysql.com

  16. http://mirin.apnic.net/bbn-svn/BBN_RPKI_software/trunk

  17. http://mirin.apnic.net/resourcecerts/wiki

  18. draft-ietf-sidr-arch-01.txt, http://ietfreport.isoc.org

  19. http://www.openssl.org

  20. http://www.cs.auckland.ac.nz/~pgut001/cryptlib

  21. http://ietfreport.isoc.org/idref/draft-ietf-sidr-roa-format

  22. http://subvert-rpki.hactrn.net

Download references

Author information

Authors and Affiliations

Authors

Editor information

Stig F. Mjølsnes Sjouke Mauw Sokratis K. Katsikas

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Montana, D., Reynolds, M. (2008). Validation Algorithms for a Secure Internet Routing PKI. In: Mjølsnes, S.F., Mauw, S., Katsikas, S.K. (eds) Public Key Infrastructure. EuroPKI 2008. Lecture Notes in Computer Science, vol 5057. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69485-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69485-4_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69484-7

  • Online ISBN: 978-3-540-69485-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics