Is BGP safe yet?

(isbgpsafeyet.com)

254 points | by janandonly 4 days ago ago

96 comments

  • maltalex 4 days ago ago

    RPKI doesn't make BGP safe, it makes it safer. BGP hijacks can still happen.

    RPKI only secures the ownership information of a given prefix, not the path to that prefix. Under RPKI, an attacker can still claim to be on the path to a victim AS, and get the victim's traffic sent to it.

    The solution to this was supposed to be BGPSec, but it's widely seen as un-deployable.

    • rot256 4 days ago ago

      I think that way to solve BGPs security problems might be to use a new cryptographic hammer, "Proof-Carraying Data", where messages come with cryptographic proofs that they were produced correctly. This allows you to basically just run BGP, but every AS proves that it ran it correctly. The proofs take constant time to verify, regardless of how large the network is, or how many hops the routing message has taken. Feasibility is helped by latency not being super critical in BGP and BGP being a pretty simple protocol; which makes computing these proofs plausible.

      https://rot256.dev/post/bgp-pcd/

      Proof-carrying data has come a long way in the last 10 years.

      EDIT: you would still need RPKI, but not BGPSec

    • impl 4 days ago ago

      I believe the current attempt at mitigation for this is ASPA[0]. It still has a long way to go, but there are some big names behind it.

      [0]: https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-asp...

      • greyface- 4 days ago ago

        It has a long way to go, in the same sense that ROA had a long way to go when Cloudflare first launched this site in 2020. ASPA records are fully supported by both RIPE and ARIN these days.

    • heyethan 4 days ago ago

      RPKI makes prefix ownership verifiable, but the path is still largely trust-based.

      It feels like we’ve secured the part that’s easiest to validate, not necessarily the part that matters most.

    • altairprime 4 days ago ago

      “Safe” the platonic ideal is an impossibility. Any cryptographic solution depends ultimately on handshake agreements between fallible human executives and/or fallible human registries, and there’s no known alternative to that today. Is RPKI “safe”, relative to not RPKI? Yes, obviously, it is. Is it reasonable to interpret “safe” as ‘no further improvement is required’? Never: this is the Internet; one could expect the domain to be repurposed to cover more than RPKI someday. Yes, short-sighted leaders may use “RPKI is safe” as justification to withhold investment forward past it; but that outcome is certain regardless of how they justify it.

    • diablevv 4 days ago ago

      [dead]

    • hugo1789 4 days ago ago

      I think RPKI is good enough. As we have TLS on top it doesn't need to be perfect.

      • maltalex 4 days ago ago

        Only with certificate pinning or something similar. Otherwise, the attacker can get valid TLS certificates for any domain hosted on the hijacked IP addresses.

      • rot256 4 days ago ago

        For LetsEncrypt, routing is authentication: if packets routed to the IP in the A record end up at your place, you can get a cert for that domain.

        • gerdesj 4 days ago ago

          DNSSEC and DNS-01 challenges might do the trick at the cost of significant effort, provided LE could be directed to check, similar to the way MTA-STS works.

          • fanf2 4 days ago ago

            Let’s Encrypt has been doing DNSSEC validation for years. DNSSEC could have prevented the jabber.ru MITM attack.

      • zymhan 4 days ago ago

        Those two things address orthogonal issues

    • Retr0id 4 days ago ago

      > and get the victim's traffic sent to it

      This sounds "obviously bad" but the intricacies of routing aren't really my field, could you expand on why this is bad? (i.e. what specific bad things does it enable)

      • maltalex 4 days ago ago

        Here are some examples:

        The attacker can impersonate the victim, get a valid x509 certificate issued to it, and create a perfect replica of their website/api/whatever.

        The attacker can perform a man-in-the-middle attack on the victim - record traffic, inject traffic, manipulate traffic, etc.

        The attacker can just deny access to the victim - just drop packets meant for the victim.

  • nemomarx 4 days ago ago

    This actually shows pretty good coverage for this feature, it seems to me. The big American isps do it, the mobile ones do too...

    How many major isps would we want to implement it to be "safe" and what would that look like? Is this a regional thing? They've only listed 4 unsafe ones on the site and that doesn't seem like a major issue, but maybe they're very large somewhere.

    • toast0 4 days ago ago

      > How many major isps would we want to implement it to be "safe" and what would that look like?

      It would be "enough" if all the major transit ISPs did it and it would be helpful if all the major residential ISPs did it. If non-RPKI routes can't propagate through transit ISPs, that makes it a much less useful thing to do.

    • KomoD 4 days ago ago

      We want more than just major isps.

      They've listed way more than 4 (and those 4 are also massive), click "Show all".

      There's 254 operators marked as unsafe.

    • chrismustcode 4 days ago ago

      I'm on sky in the UK which is marked as not safe due to no RPKI.

      It's not on the list so imagine there is a fair few missing, would be neat to have a table you could filter by country, provider type (cloud/isp etc) based on real results from users.

      edit: there's a show all button to expand the table

      • SCdF 4 days ago ago

        If you're interested, Community Fibre is a yes from this website

      • badgersnake 4 days ago ago

        I get the same result for A&A, but frankly I trust them more than some random site with (apparently) an axe to grind.

        • jsty 4 days ago ago
          • OJFord 4 days ago ago

            And here we are six years on... I have a lot of respect for A&A, but I do find it hard to sympathise with that page.

        • tialaramex 4 days ago ago

          My hope would be that A&A have a process manually whitelisting the route that made the test fail because in fact (as of course it would be) it's actually deliberately not signed but it is really their route.

          But on some level that's like assuming the reason the guy with the handgun is on your plane is that he's a sky marshal and not that some idiot let a concealed handgun through security. I mean, sure, maybe, but, maybe not.

          Without asking it's just a guess and I haven't asked. Maybe I should.

          • tialaramex 4 days ago ago

            And now thanks to jsty's sibling comment I don't have to ask, thanks! It does seem like they've been more than "cautious" enough at this point and should just implement RPKI.

    • philipwhiuk 4 days ago ago

      Click show all.

      Major ISPs like British Telecom (core UK telephony), NTT Docomo (Japan), Vodafone Espana (showing that Vodafone isn't doing it globally), Starlink (showing it's not a old tech problem), Rogers (US ISP) are listed unsafe.

      I think the 31 is a misleadingly positive picture.

    • asveikau 4 days ago ago

      I got a fail on T-Mobile USA. It seems in the full list that T-Mobile is listed as both passing and failing.

      • RyJones 4 days ago ago

        T-Mobile consists of at least five distinct networks depending on when your carrier was purchased, last time I was talking with some of the network security guys in Factoria. It’s been four years - they may have converged some of them.

        • Melatonic 4 days ago ago

          Also failing here in the Los Angeles area. Used to be on Sprint before the acquisition. Probably location dependent

          • asveikau 4 days ago ago

            I got the failure message in San Francisco.

            Not sure if it makes a difference, but I had a T-Mobile SIM card I bought in Seattle in 2010 and was carrying from phone to phone for years, but I recently replaced the SIM because I heard newer t-mobile SIMs can do better finding 5g coverage.

      • ck2 4 days ago ago

        same

             T-Mobile USA, AS21928 does NOT implement BGP safely
  • ifwinterco 4 days ago ago

    Ironic this is from Cloudfare, probably the single entity most likely to be responsible for breaking the internet in 2026

    • pocksuppet 3 days ago ago

      That's just how entrepreneurship is done these days. You aim to mislead the public in ways that benefit you, and somehow it actually works. If RPKI benefits you, you roll out a campaign that RPKI is great and necessary for internet safety. If you want to know all your users' real names, you roll out a campaign that age verification via identity document is needed to keep children safe on the internet. If your company sells separate measles, mumps and rubella vaccines, you roll out a campaign that the combined MMR vaccine makes children autistic. If your company sells weapons, you roll out a campaign to subsidize movies and video games that portray war as awesome and manly. If your company sells cigarettes but only men are buying them, you roll out a campaign that sells the freedom to smoke as a benefit of feminism. All of these things actually happened.

  • greyface- 4 days ago ago

    RPKI isn't just ROAs anymore, and BGP hijacks can happen at other places than just the first/last hop. Why hasn't this site been updated to test ASPA-invalid prefixes in addition to ROA-invalid ones?

  • dorianmariecom 4 days ago ago

    i'm getting:

      Free SAS ISP signed unsafe
    
    but when testing i'm getting a success

    Your ISP (Free SAS, AS12322) implements BGP safely. It correctly drops invalid prefixes. Tweet this → Details fetch https://valid.rpki.isbgpsafeyet.com correctly accepted valid prefixes

    fetch https://invalid.rpki.isbgpsafeyet.com correctly rejected invalid prefixes

  • olivier5199 4 days ago ago

    An ISP is marked as unsafe in the table, yet running the test says it is. (same ASN)

    • john_strinlai 4 days ago ago

      the last update on the table was feb 3. presumably rpki was implemented between then and now

      • arnorhs 4 days ago ago

        ISP's often have different infrastructure for different sets of customers (regional, mobile/landline differences etc) - often due to legacy M&As etc..

  • surround 4 days ago ago

    The graphic that shows that a hijacker can route traffic to their malicious website is a little misleading. Since the SSL certificate would be invalid, browsers would block the connection and show a warning.

    I guess the attack could still be used for denial of service.

    • icedchai 4 days ago ago

      Once you have control of the destination, you could get a valid SSL certificate with Letsencrypt or whatever.

      • surround 4 days ago ago

        Wow I'm surprised, you're right, and it has happened before:

        > the attacker issued and registered a free temporary 3-month certificate for the developers[.]kakao.com domain through SSL certificate issuer called ZeroSSL. Because the routing policy was already manipulated by the BGP Hijacking, the attacker was able to register the certificate.

        https://medium.com/s2wblog/post-mortem-of-klayswap-incident-...

        • sureglymop 4 days ago ago

          You could mitigate this by monitoring certificate transparency logs for unwanted certificates issued for your domain.

          Currently there are no good monitors though aka the system is a bit broken.

        • pocksuppet 3 days ago ago
          • icedchai 3 days ago ago

            It sounds like that one may have been the result of a "lawful intercept", so perhaps not necessarily BGP hijacking. If you have legitimate control of the ASN/network, it's not a hijack.

  • commandersaki 4 days ago ago

    I think the test for BGP is Safe is when we stop using it and instead use SCION: https://en.wikipedia.org/wiki/SCION_(Internet_architecture).

    • pigggg 4 days ago ago

      SCION is generally considered snake oil within the network operator community. Its weird single vendor for profit company that ships it's software, the fact that no router hw asic fwding supports what they want to do and then the general scummy inclusion of block chain / crypto as well as some "green washing" for PR hype.

      Sure the swiss have their toy but no one is taking it seriously.

      • xyquadrat 4 days ago ago

        Hmm, I'd disagree. The fact that Anapaya Systems (the for profit company mentioned) has the only commercial implementation/adjacent software is a problem, yes. But "snake oil" doesn't quite match up with the fact that SCION right now provides the backbone for the Swiss financial network moving 200 billion CHF each day [1], so at least some level of workable technology has to be there. And for no one to be taking it seriously, there's a decently long list of multinational ISPs at the very least taking steps towards offering SCION to customers [2] (e.g. British Telecom has expressed enough interest that they have various recent marketing videos on Anapaya's YouTube channel). Finally, I'm not sure what you mean regarding the "scummy inclusion of block chain / crypto" - as someone who has worked on SCION-based projects I never heard anything about this. Apparently a blockchain company invested in Anapaya, but that doesn't really change anything about the protocol itself, does it?

        [1] https://www.scion.org/ssfn-scion/ [2] https://www.scion.org/isps/

        • pigggg 4 days ago ago

          I don't think the swiss banking network is really the right thing to point to. Folks measure networks in bps/pps, not financial transactions - nevermind the actual control plane bits (num of prefixes, as paths, etc.). Plus it's all within one country where you have the luxury of being able to directly influence and steer those companies into adopting this.

          As for BT - they're just one broadband ISP operating primarily in a single country. I don't see that moving the needle - you're missing CDNs, traditional large scale "tier 1s" and cloud or large hosting networks.

          RPKI got to where it is today through community engagement by folks like Job S. and others - hitting the conferences, direct engagement with operators and raising the bar from a software quality and standards perspective - which still continues today. That's how you get the internet to adopt something that is considered the new normal.

          As for your ISP list - I know there are networks listed there that aren't running scion in a production capacity (perhaps you can run scion in a virtualized environment on top of them which is different than those companies running it on their production network).

          As for the block chain - it was all the Sui stuff.

        • q3k 4 days ago ago

          > SCION right now provides the backbone for the Swiss financial network moving 200 billion CHF each day

          This is a meaningless benchmark - for a small group of trusted big enterprises with insurance policies and mutually signed contracts you could've just as well used OSPF with zero filters.

          The benchmark would be adoption by an actual large number of parties that don't/can't talk to eachother spread across the world. With a large chunk of them being malicious or incompetent to the point of being effectively malicious.

          • xyquadrat 4 days ago ago

            I'm not claiming that this shows SCION can replace the respective parts of the network stack right now, and you're right that at a global scale this is still an unproven technology. But I would argue that a technology needs a certain level of matureness / is not "snake oil" if it is deployed in a heavily regulated and comparatively conservative sector such as banking.

            • q3k 4 days ago ago

              Aren't heavily regulated sectors the one where you usually encounter snake oil? Useless WAFs and other security snake oil products, Microsoft 'collaboration' jank like Teams and Sharepoint, MitM proxies, etc?

            • pigggg 4 days ago ago

              I gotta say some of the proposed use cases are things no one is looking/asking for. One I recall was having a network decide to reach another network by avoiding countries that aren't carbon neutral (which could take longer hops and use more infra / more energy...) feels like they're trying to say they're the green/environmental friendly protocol.

            • raron 4 days ago ago

              Why does a routing protocol matter for the banking sector? With proper encryption the route the packets of transaction data takes should not matter at all.

        • tptacek 4 days ago ago

          IIRC, UBS used to use IRC (yes, that IRC) as a messaging "backbone", so I'm not sure this really counts as a POC.

        • tonetegeatinst 4 days ago ago

          200billion CHF....how big is that in bandwidth?

    • pocksuppet 3 days ago ago

      When we abandon prefix routing based on I-told-you-so and start using Yggdrasil (https://yggdrasil-network.github.io/) we're safe.

    • wussboy 4 days ago ago

      Why hasn't this happened?

      • benjojo12 4 days ago ago

        Because SCION is mostly said as a joke in the more serious carrier world.

        SCION is practically speaking proprietary, and has 1 and maybe a half implementations. I have a laundry list of real problems with SCION but SCION feels like one of those entities that would get quite legal-ey if discussed publicly.

      • dsr_ 4 days ago ago

        Because BGP works, is understood, and has been debugged by thousands of people and billions of sessions between dozens or hundreds of implementations.

        So the benefit of changing out all that infrastucture needs to be much higher than the cost.

        • genuineDSD 2 days ago ago

          You are right. And it'd be absolutely irresponsible to expect _everybody_ to drop things on the floor and adopt a new protocol (implementation) over night.

          However, it'd be equally irresponsible to ask for an innovation budget of 0 percent. The reason one bothers with new approaches is, of course, that fixing things on a conceptual level prevents many of the debugging sessions that you had to go through with the old approach. Why QUIC if there is TCP/TLS/HTTP?

          IPv4 and NAT are literally _everywhere_. It's tested and well-understood (one would think). But—and that's just my opinion—I sure hope that, one day, we will not have to deal with that mess no more ...

  • kevincloudsec 4 days ago ago

    rpki adoption is the new ipv6 adoption. it looks great until you realize it only validates who owns the prefix, not the path to get there lol

  • lucasay 4 days ago ago

    RPKI makes BGP safer, not safe. It helps prevent some hijacks, but attackers can still mess with routing paths. Feels like we’re patching a trust-based system rather than fixing it.

  • collabs 4 days ago ago

    Looks like Verizon does it correctly.

    > Your ISP (Verizon, AS701) implements BGP safely. It correctly drops invalid prefixes.

  • pocksuppet 3 days ago ago

    RPKI and ASPA keeps you safer from other networks, but less safe from the registries. Consider what happens if your registry's country sanctions your country and you are unable to update any records held at the registry.

    • greyface- 3 days ago ago

      Registries have always had the ability to revoke number assignments; RPKI just makes this revocation slightly more forceful. You're going to have a bad time announcing prefixes that don't belong to you, even in the absence of RPKI.

      We're all internetworking at the pleasure of IANA. Getting them out of the picture, and removing their ability to deplatform Internet participants, is a much larger task than just moving away from RPKI. We'd need to completely rethink how ASN and IP assignments are done.

      • pocksuppet a day ago ago

        Registries have tended to leave existing registration data alone in case of a situation like sanctions. They won't let you register more numbers, nor will they deregister them. If you just need the numbers, that's fine. If you also depend on the registry regularly taking data updates from you, that's a problem.

  • bilekas 4 days ago ago

    Google And digital ocean are huge players here but is there a reason they would only have partial coverage?

    TIM is listed as insecure yet my test is successful.

    > Your ISP (Telecom Italia S.p.a., AS3269) implements BGP safely. It correctly drops invalid prefixes

  • elashri 4 days ago ago

    Any reasons on why an ISP would not implement it other than effort/cost? Just for someone like me whose networks knowledge is very naive.

    • dec0dedab0de 4 days ago ago

      They may be worried that their larger clients don't have things configured correctly, and they don't want to break things for them.

      They may have older hardware that needs to be upgraded before they can use this feature.

      They might even have their own way of filtering that they think is good enough.

      Though, all of those really boil down to effort/cost.

  • NetOpWibby 4 days ago ago

    When was the last time this site was updated? It mentions Sprint, which hasn't existed for years.

    • dec0dedab0de 4 days ago ago

      I think it just goes by ASN. Looks like Comcast owns the Sprint ASN now.

  • RRRA 4 days ago ago

    Google being shown as unsafe makes me think they have some internal methods for filtering?

  • Levitating 4 days ago ago

    Does not take BGPSec[1] into account, just RPKI.

    [1]: https://en.wikipedia.org/wiki/BGPsec

  • NewsaHackO 4 days ago ago

    > A BGP hijack occurs when a malicious node deceives another node, lying about what the routes are for its neighbors. Without any security protocols, this misinformation can propagate from node to node, until a large number of nodes now know about, and attempt to use these incorrect, nonexistent, or malicious routes.

    But with HTTPS, they wouldn't be able to actually pose as another website, just delay/black hole the request so it doesn't reach its goal target, right? From the figure, it makes it seem like a person can use BGP to spoof a website and make a user visit a phished website, but that's not right, correct?

    • foobiekr 4 days ago ago

      BGP attacks have nothing to do with spoofed peers. They have to do with accepted peers behaving maliciously in terms of the AS Paths they advertise.

      Once you control BGP you control any IP and can subvert certificate issuance that effectively uses IP to validate certificate issuance requests. For example anything that relies on a file or dns at a specific IP. Once you have done so, you ARE the site, no matter what HSTS says.

      We’ve tried to solve this problem a few times with certificate pinning (dangerous) and more recently just giving up and using certificate transparency to try and mitigate the blast radius by hoping the duration can be curtailed. The whole system is incredibly fragile.

      As an aside, BGP should move over to TLS (not https, http is a terrible protocol for this) for other reasons (it’s a better option than tcp aom/md5). That this is not already the case should inform people’s opinion of where this stuff is on the security timeline.

    • infogulch 4 days ago ago

      Well if they can deceive certificate authorities that implement the ACME protocol like LetsEncrypt, then they could get a certificate for your site with the HTTP-01 challenge, see the paper Using BGP to Acquire Bogus TLS Certificates (2017) [1]. That paper suggested a mitigation they call Multiple Vantage Point Verification, which has already been implemented [2].

      [1]: https://petsymposium.org/2017/papers/hotpets/bgp-bogus-tls.p...

      [2]: https://community.letsencrypt.org/t/validating-challenges-fr...

      • tialaramex 4 days ago ago

        They don't need ACME to do that, ACME is just an automation standard - the same rules apply for getting a certificate via ACME such as 3.2.2.4.19 "Agreed upon change to website - ACME" as for the manual process 3.2.2.4.18 "Agreed upon change to website v2". The ACME version is just designed for machines to automate easily (and as a result wildly more common in use today)

        And Multi-perspective only helps against an attacker who is merely able to influence a local route, if they can ensure all your perspectives see the same thing the attacker wins.

        • infogulch 4 days ago ago

          So there is a more general standard which the ACME protocol automates. Or perhaps another way to put it is that, the standard is written in a way that "just happens" to be nicely automatable.

          Yes this is why multi-perspective is described as a "mitigation" above. Ideally, ACME issuers have a large array of perspectives with additional perspectives added frequently to foil planned attacks. But real BGP security is the actual solution to this problem.

          • tialaramex 4 days ago ago

            Not exactly. There's a document, the Baseline Requirements or BRs: https://cabforum.org/working-groups/server/baseline-requirem...

            This document is essentially an agreement between the Trust Stores (largely the browser vendors such as Microsoft, Google, Apple, and Mozilla) on behalf of their Relying Parties (everybody) and the Certificate Authorities they choose to trust. It lays out the requirements on what the CAs may do and how they may do it, the numbers I quoted were sub-section numbers for what are sometimes called the "Blessed Methods" which these days are listed in those requirements - for how a CA shall check that say a certificate for news.ycombinator.com can be issued to this web server we're both using.

            This isn't a "standard" really, any more than you'd say the Geneva Conventions were standards. It specifies (that "- ACME" is from the document, it's not my addition) that you can use some ACME protocol features to achieve the name confirming requirement but it also specifies some ways to do so manually. Last month quite a few of the older methods were finally stopped for new issuance (though existing confirmations for those methods will keep working for a few years if you have them). Stuff like "Find the landline phone number for the company in a government directory and call them" which I'm not sure really still made sense when the BRs were first agreed, let alone last month when it was finally removed.

    • swisniewski 4 days ago ago

      You can use BGP hijacks to spoof another website.

      You just need to get a publicly trusted CA to mint a certificate for your new site.

      This can be done, for example, with let’s encrypt, using several of the various domain verification challenges they support.

      There are some protections against this, such as CAA records in DNS, which restrict which CAs can issue certs and depending on the CA which verification methods are allowed. That may not provide adequate protection.

      For example if you are using LE and are using verification mechanisms other than DNS then the attacker could trick LE to issuing it a cert.

      That also depends on the security of DNS, which can be tricky.

      So, yes, BGP hijacks can be used to impersonate other sites, even though they are using HTTPS.

      When you configure your domains, Make sure you setup CAA, locked down to your specific CA, and have DNS sec setup, as a minimum bar. Also avoid using DV mechanisms that only rely on control over an IP address, as that can be subverted via BGP.

    • jon-wood 4 days ago ago

      For anything major you're right, you'd expect them to be on the HSTS preload list in people's browsers which forces all requests over SSL which would then pick up an invalid certificate. That doesn't make this harmless though, just being able to blackhole traffic for something is a pretty significant attack - Pakistan a few years back accidentally caused YouTube to be unavailable ~worldwide when they only intended to make it unavailable within the country. There's also a lot of sites not on the preload list, and those you could fairly easily MITM, especially if you've also got access to a tame certificate issuer and I don't doubt that a nation state could persuade someone to issue them some certificates given the proper levers.

      • jeroenhd 4 days ago ago

        Only as long as all certificate authorities ensure that all networks they host servers on secure. If you can BGP spoof a domain-validating CA, you can get a valid certificate for any domain of your choice (unless maybe if that domain is DNSSEC-enabled, the CA does strict validation, and the domain has a CAA record for another CA that is not BGP-spoofable).

        Major news outlets, government websites from various countries, the American army, and many more all lack CAA records, for instance. Any CA can generate a valid certificate for those domains and it's up to the people watching the public certificate transparency logs to catch any malicious certificates.

    • dsr_ 4 days ago ago

      If you can inject arbitrary malicious routes, you can make ACME requests for a new cert.

  • undefined 4 days ago ago
    [deleted]
  • volemo 4 days ago ago

    Wikimedia is an ISP?

    • dec0dedab0de 4 days ago ago

      When they say ISP they mean anything with an ASN

  • nareyko 4 days ago ago

    [dead]