We demonstrate the first downgrade attacks against RPKI. The key design property in RPKI that allows our attacks is the tradeoff between connectivity and security: when networks cannot retrieve RPKI information from publication points, they make routing decisions in BGP without validating RPKI. We exploit this tradeoff to develop attacks that prevent the retrieval of the RPKI objects from the public repositories, thereby disabling RPKI validation and exposing the RPKI-protected networks to prefix hijack attacks. We demonstrate experimentally that at least 47% of the public repositories are vulnerable against a specific version of our attacks, a rate-limiting off-path downgrade attack. We also show that all the current RPKI relying party implementations are vulnerable to attacks by a malicious publication point. This translates to 20.4% of the IPv4 address space. We provide recommendations for preventing our downgrade attacks. However, resolving the fundamental problem is not straightforward: if the relying parties prefer security over connectivity and insist on RPKI validation when ROAs cannot be retrieved, the victim AS may become disconnected from many more networks than just the one that the adversary wishes to hijack. Our work shows that the publication points are a critical infrastructure for Internet connectivity and security. Our main recommendation is therefore that the publication points should be hosted on robust platforms guaranteeing a high degree of connectivity.
翻译:我们展示了对RPKI的第一次降级攻击。RPKI中允许我们发动攻击的关键设计财产是连接和安全之间的权衡:当网络无法从出版点检索RPKI的信息时,他们可以在不验证RPKI的情况下在BGP中做出路由决定。我们利用这一权衡来发展阻止从公共储存库中检索RPKI物体的攻击,从而阻止RPKI的验证工作,并使受RPKI保护的网络暴露于PRPKI攻击前,使RPKI无法进行第一次降级攻击。我们实验性地表明,至少47 %的公共储存库易受到我们攻击的具体版本的连接和安全性之间的权衡:当网络无法检索到我们的攻击时,对RPKIKI信息的至少47 %的公共库中至少有47 %的公共库中至少有4 % 的公共库中至少47 % 的公库中至少有47 % 的公库中至少4 的公库中至少4 的公库中至少4 的公库中, 的公库中至少47% 的公库库可以抵御我们的攻击,,, 一种特定的攻击是针对我们攻击的具体攻击, 一种特定版本,即不受了我们的攻击,即不受不受不受不受路中特定版本的攻击,即不受路点点点降级的低路攻击;当点攻击的限价限制,即低路点降降降级攻击;当的费率限制;当攻击;当有的网络,当网络,当网络中,当网络中,当网络中限,当我们攻击,当网络中限有多少多少多少多少多少多少多少多少的费率,当我们攻击,当我们攻击,当我们攻击的具体攻击。。我们攻击。我们还一个恶意攻击。我们还一个恶意点攻击中的所有方在恶意点攻击中,网络可能许多网络与许多网络与许多网络与许多网络与许多网络与许多,只有更多的更多的更多的更多的网络中,只有所有方在恶意攻击时,只有所有方在恶意攻击中,只有更多的,只有更多的,只有更多的网络中,只有更多的网络中,只有更多的更多的更多的更多的更多的更多的,只有更多的,只有更多的网络中,只有更多的可能更多,只有更多更多更多的人执行方都可能受到更多的更多的网络中,只有更多的更多的,只有更多的,只有一个恶意攻击,只有更多的,只有一个恶意