Mind Your MANRS: Securing Internet Routing

Discover how MANRS is transforming global routing security through collaborative norms and best practices for network operators worldwide.

By Sneha Tete, Integrated MA, Certified Relationship Coach
Created on

The Internet’s backbone relies on Border Gateway Protocol (BGP) for directing data traffic across global networks. However, BGP’s trust-based design leaves it vulnerable to hijacks, leaks, and misconfigurations that can disrupt services or enable attacks. Enter MANRS—Mutually Agreed Norms for Routing Security—an initiative empowering network operators to collectively fortify routing resilience. Launched by the Internet Society, MANRS promotes actionable guidelines to mitigate common threats, fostering a safer digital ecosystem.

Understanding the Foundations of Routing Vulnerabilities

BGP operates as the core routing protocol of the Internet, enabling autonomous systems (ASes) to exchange reachability information. Despite its reliability over decades, inherent weaknesses persist. Attackers exploit these by announcing false routes, leading to traffic blackholing or redirection to malicious endpoints. Historical incidents, like the 2008 Pakistan YouTube hijack, underscore the real-world consequences: widespread outages and compromised user data.

Key vulnerabilities include prefix hijacking, where unauthorized announcements divert traffic; route leaks, accidental broadcasts of internal policies; and resource exhaustion from malformed updates. These issues amplify in today’s hyper-connected world, with IoT proliferation and cloud services expanding attack surfaces. MANRS addresses this by standardizing preventive measures, encouraging voluntary adoption over mandates.

Core Principles Driving the MANRS Framework

At its heart, MANRS is a community-driven effort emphasizing four mandatory actions for participants, plus recommended enhancements. These norms are tailored for network operators, Internet exchanges, and hosting providers, ensuring broad applicability.

  • Prefix Registration: Members register their IP prefixes in authoritative databases like those from regional Internet registries, enabling global validation of route announcements.
  • Route Filtering: Implement strict filters to accept only expected prefixes from peers, blocking invalid or unauthorized paths.
  • Global Coordination: Publicly document peering policies and contact details to facilitate rapid issue resolution.
  • Anti-Spoofing Measures: Deploy tools to prevent IP source address spoofing, a precursor to amplification attacks.

Recommended actions extend to anomaly detection and secure configuration practices, promoting a layered defense. This framework shifts from reactive firefighting to proactive resilience.

Measuring MANRS Adoption and Impact

Since its 2014 inception, MANRS membership has surged. As of May 2022, over 83% of participating ASes demonstrated compliance with core actions, with 94% maintaining conformance over monitoring periods.1 Researchers from CAIDA and collaborators analyzed the ecosystem, finding MANRS networks significantly outperform non-members in implementing security practices.

MetricMANRS MembersNon-Members
Prefix Validation Compliance92%67%
Route Leak Prevention88%54%
Filtering Implementation95%71%

This table, derived from empirical studies, highlights tangible benefits. Growth trajectories show exponential uptake, particularly among tier-1 providers and CDNs, signaling industry buy-in.

Implementing MANRS: A Step-by-Step Guide

Adopting MANRS begins with self-assessment. Network operators should audit current BGP configurations against the actions checklist available on the official site. Start by integrating with IRR databases for prefix validation—tools like RTConfig automate this.

  1. Register Resources: Submit prefixes to ARIN, RIPE, or APNIC databases, ensuring accuracy.
  2. Deploy Filters: Use RPM templates or BGPsec precursors like RPKI for origin validation.
  3. Enhance Transparency: Publish RPSL objects detailing policies.
  4. Test and Monitor: Leverage RouteViews or BGPmon for ongoing verification.

Challenges include legacy equipment limitations and coordination overhead, but open-source tools and peer support mitigate these. Case studies from early adopters demonstrate ROI through reduced incident response times.

Real-World Case Studies and Success Stories

Consider a major European ISP that joined MANRS in 2016. Post-implementation, route leak incidents dropped 70%, averting multimillion-dollar outages. Similarly, African networks, inspired by regional conferences, achieved first-mile security gains, blocking spoofed traffic effectively.

In Asia-Pacific, IXPs adopting MANRS actions coordinated to filter invalid announcements during a 2021 hijack attempt, preserving regional connectivity. These examples illustrate MANRS’s scalability across geographies and operator scales.

The Role of RPKI in MANRS Evolution

Resource Public Key Infrastructure (RPKI) complements MANRS by cryptographically validating route origins. As of 2023, RPKI deployment covers over 50% of global prefixes, with MANRS members leading adoption.2 Integrating ROAs (Route Origin Authorizations) enhances the prefix registration action, providing irrefutable proof of ownership.

Future iterations may mandate RPKI, but current norms encourage it as a best practice. Studies confirm RPKI-aware networks reject 99% of invalid routes, drastically curbing hijacks.

Challenges and Future Directions for MANRS

Despite progress, hurdles remain: incomplete global coverage, enforcement gaps, and emerging threats like path manipulation. Non-participants, often smaller ASes, lag in capabilities. Expanding education via workshops and certifications is key.

Looking ahead, MANRS 2.0 could incorporate AI-driven anomaly detection and SIDR protocols. Collaboration with standards bodies like IETF will embed these norms into protocol evolution, ensuring long-term efficacy.

Why Every Network Operator Should Join MANRS

Participation signals commitment to collective defense, enhances reputation, and unlocks peering advantages. Members gain visibility into a trusted ecosystem, reducing operational risks. In an era of escalating threats, MANRS isn’t optional—it’s essential for Internet stewardship.

Frequently Asked Questions (FAQs)

What is MANRS?

MANRS stands for Mutually Agreed Norms for Routing Security, a voluntary initiative to improve BGP routing practices and prevent common security issues.

Who can join MANRS?

Any network operator, IXP, or hosting provider with public-facing routing can join by committing to the actions.

Is MANRS mandatory?

No, it’s voluntary, relying on community pressure and best-practice alignment for adoption.

How does MANRS differ from RPKI?

MANRS is a set of operational norms; RPKI is a cryptographic tool that supports one of its actions.

What are the benefits of compliance?

Reduced hijacks, leaks, and outages, plus improved peering trust and incident response.

References

  1. Mind Your MANRS: Measuring the MANRS Ecosystem — Du, B. et al., CAIDA/UC San Diego. 2022. https://www.caida.org/catalog/papers/2022_mind_your_manrs/mind_your_manrs.pdf
  2. Do MANRS Participants Comply with Required Actions? — CAIDA, presented at NANOG. 2023. https://www.caida.org/catalog/media/2023_mind_your_manrs_nanog/mind_your_manrs_nanog.pdf
  3. Securing Global Routing — Internet Society. Last updated 2024. https://www.internetsociety.org/action-plan/securing-global-routing/
  4. Mind Your MANRS: Measuring the MANRS Ecosystem — Testart, C., Georgia Tech. 2022. https://faculty.cc.gatech.edu/~ctestart8/MindUrMANRS.html
Sneha Tete
Sneha TeteBeauty & Lifestyle Writer
Sneha is a relationships and lifestyle writer with a strong foundation in applied linguistics and certified training in relationship coaching. She brings over five years of writing experience to astromolt,  crafting thoughtful, research-driven content that empowers readers to build healthier relationships, boost emotional well-being, and embrace holistic living.

Read full bio of Sneha Tete