Securing Internet Routing for Tomorrow

Explore strategies to bolster routing resiliency and security, ensuring the Internet remains robust against faults and threats.

By Medha deb
Created on

The Internet’s backbone relies on sophisticated routing systems that direct data across vast networks. As connectivity expands globally, ensuring these systems are both resilient and secure has become paramount. This article examines critical approaches to fortify routing infrastructure, drawing on established standards and collaborative efforts to mitigate risks from human error and malicious intent.

Understanding the Foundations of Internet Routing

At its core, Internet routing uses protocols like the Border Gateway Protocol (BGP) to exchange information between autonomous systems (ASes). BGP enables routers to learn optimal paths for data packets, adapting dynamically to network changes. However, its design, rooted in an era of fewer operators and higher trust levels, exposes vulnerabilities in today’s hyper-connected world.

Routers announce prefixes—ranges of IP addresses they manage—allowing peers to forward traffic accordingly. While this trust-based model has sustained the Internet for decades, incidents like prefix hijacking or misconfigurations have demonstrated its fragility. For instance, unintended announcements can divert traffic, causing outages or enabling surveillance.

Key Threats to Routing Integrity

Routing faces diverse challenges:

  • Configuration Errors: Human mistakes in prefix announcements lead to blackholing or loops, disrupting service for millions.
  • Route Leaks: Improperly filtered updates propagate incorrect paths, overwhelming networks.
  • Malicious Hijacks: Attackers falsely claim prefixes to intercept sensitive data or launch DDoS attacks.
  • Scalability Pressures: Proliferating ASes and IPv6 adoption strain BGP tables, risking instability.

These issues underscore the need for proactive measures beyond ad-hoc fixes.

Building Resilient Routing Architectures

Resiliency refers to a network’s capacity to sustain performance amid disruptions. Achieving this demands layered strategies:

  1. Implement Filtering: Validate inbound and outbound routes against authorized prefixes using IRR databases and AS_SETs.
  2. Maximal Prefix Limits: Cap advertisement sizes to prevent leaks from smaller ASes flooding larger ones.
  3. Peer Authentication: Use TCP MD5 or IPsec to protect BGP sessions from spoofing.

Table 1 illustrates common resiliency practices:

PracticeDescriptionBenefit
Customer Prefix FilteringAllow only customer-originated prefixesPrevents leaks
Peer Prefix LimitsRestrict peer advertisement volumeContains errors
AS Path Prepending ValidationCheck for artificial path inflationReduces manipulation

Advancing Security Through Cryptographic Validation

Best current operational practices (BCOPs) provide immediate gains, but cryptographic solutions offer long-term assurance. The Resource Public Key Infrastructure (RPKI) stands out as a cornerstone technology.

RPKI enables operators to issue digital certificates for IP prefixes and AS numbers, akin to HTTPS for websites. Route Origin Authorization (ROA) objects attest that a specific AS owns a prefix, allowing validators to cryptographically verify announcements.

Deployment involves:

  • Publishing ROAs via repositories.
  • Running validators to fetch and cache data.
  • Integrating validation into BGP decision processes.

According to the Internet Society’s Deploy360 program, widespread RPKI adoption could prevent most hijacks.

Global Initiatives Driving Adoption

Organizations like the Internet Society champion routing security through Deploy360, offering resources on RPKI, MANRS, and more. MANRS (Mutually Agreed Norms for Routing Security) defines four actions for operators:

  • Prevent propagation of incorrect routing information.
  • Prevent traffic engineering by unauthorized parties.
  • Facilitate global coordination.
  • Facilitate upstream provider coordination.

Over 1,000 networks participate, per MANRS reports. Regional forums, such as those by RIPE NCC and LACNIC, further accelerate implementation.

Overcoming Barriers to Widespread Deployment

Despite benefits, challenges persist:

Complexity: Setting up RPKI requires managing certificates and repositories, deterring smaller operators.

Interoperability: Varying validator implementations demand standardization.

Policy Hesitancy: Fear of over-validation dropping legitimate routes slows progress.

Solutions include automated tools, hosted services, and global validation overlays. For example, RIPE NCC’s validator simplifies RPKI for non-experts.

Measuring Progress and Future Directions

Metrics track adoption: global ROA coverage exceeds 80% for IPv4, per recent data. Yet, validation in routers lags at under 20%.

Future enhancements include BGPsec for path validation and SIDR (Secure Inter-Domain Routing) standards. IPv6 routing demands parallel focus, as dual-stack growth amplifies risks.

Practical Steps for Network Operators

  1. Audit Configurations: Review filters against peering policies.
  2. Deploy RPKI: Start with ROA issuance; integrate validators.
  3. Join MANRS: Commit publicly to norms.
  4. Monitor Incidents: Use tools like BGPmon for anomaly detection.
  5. Collaborate: Engage NANOG, regional forums.

Frequently Asked Questions (FAQs)

What is BGP Hijacking?

BGP hijacking occurs when an AS announces a prefix it doesn’t own, diverting traffic maliciously or erroneously.

How Does RPKI Prevent Hijacks?

RPKI uses ROAs to validate origin ASes; invalid announcements are ignored by validating routers.

Is RPKI Ready for Production?

Yes, with production validators and growing adoption; start with validation-only mode to build confidence.

What are MANRS Actions?

Four voluntary commitments to filter routes, tag hijacks, publish contact info, and coordinate globally.

Why Focus on Routing Security Now?

Geopolitical tensions and state actors increasingly target routing; resiliency ensures Internet freedom.

Conclusion: A Call to Collective Action

Securing Internet routing demands global cooperation. By embracing BCOPs, deploying RPKI, and supporting initiatives like MANRS, operators can forge a more robust Internet. The path ahead requires investment, but the payoff—a trustworthy, resilient network—benefits all users worldwide.

References

  1. Routing Security Resources — Internet Society. 2023. https://www.internetsociety.org/deploy360/routing/
  2. MANRS Implementation Guide for Network Operators — MANRS. 2024. https://manrs.org/netops/guide/
  3. RIPE NCC RPKI Validator — RIPE NCC. 2025-01-15. https://www.ripe.net/analyse/internet-measurements/rpkirpv01/
  4. Internet Number Resource Security Considerations — IETF RFC 9319. 2023-02. https://datatracker.ietf.org/doc/html/rfc9319
Medha Deb is an editor with a master's degree in Applied Linguistics from the University of Hyderabad. She believes that her qualification has helped her develop a deep understanding of language and its application in various contexts.

Read full bio of medha deb