Skip to main content

Routing layer security on the public internet is hopeless

I have mostly come to the conclusion that trying to secure the routing layer of the internet is hopeless. Protocols like DNSSEC impose pretty significant costs on service providers and clients/recursive resolvers, and at the same time don't provide any substantive security guarantees that I'd be willing to rely on. I still want end-to-end security—confidentiality and integrity, in particular—of the data stream, something provided by TLS and support systems around TLS (e.g., certificate transparency).

DNSSEC doesn't even try to give me the one thing I'd really like out of the routing layer, which is privacy: it provides a base level of integrity...and that's it.

"Securing" BGP in a similar way would be worth even less, because routing decisions at that level can't even really be checked by clients as they don't have the context to understand why paths are configured with particular costs, nor do they know where state-level actor tap points exist, so it's not like they could sound an alarm on the existence of a suspicious route: how would you define or detect "suspicious"?

It's also worth considering that all widely-used protocols on the internet are built in layers: protocols at each layer are designed to create resiliency and add features beyond those which are provided by lower layers. Just as TCP takes IP and adds reliability and flow control, TLS takes TCP and adds a degree of end-to-end security. This is not simply chance or expediency: there's a reason things are built this way.

Note that I'm not claiming a perfect TLS provides us with all the security we want. The one gaping hole in TLS security that would be solved by a proper security design for the routing layer is that TLS provides confidentiality only of the actual bits being moved around: the metadata (routing information, size of data transferred, etc.) is wide open for analysis. But until something like TOR can accomplish this in a demonstrable (and preferably provable) way in an overlay network subject to constant surveillance, it's actually counterproductive to add some crypto at the lower layers, declare "we have routing layer security!", and call it a day.

Not only that, but the biggest problem with TLS—the trust model and how it is implemented in browsers—is not solved by adding DNSSEC-like security to the routing layer.

So, just to be clear, I'm not opposed to adding security to the routing layer... but it has to provide enough value to balance out the cost. What the TOR/Silk Road debacle tells me is that routing layer privacy is a hard problem: a protocol designed explicitly for privacy over untrusted networks nonetheless was vulnerable to targeted analysis. What makes me hopeless on this subject is that at some level even TOR relies on systems that know where packets are going to end up, so it's not clear that routing layer security of the sort I want is even possible.

Comments

Moneylove said…
I think you are right. What about multiple IP address on same unit and Encryption at the local device. Oh and masking local addresses
Good jjob

Popular posts from this blog

Liberal arts and civil society

Proponents of broader college attendance subsidized by the public treasury and disconnected from any concrete investment in an individual's marketable skills often make the claim that a liberal arts education is critical to the foundation of civil society. And they are probably right in that very specific claim, as it is hard to imagine this country's governing institutions having been founded by people who did not have a grounding in the liberalism of Locke and Burke. But not only is their claim insufficient to support either the social structure they advocate or fulfillment by the institutions they intend to deliver it, the problem with the idea of universal liberal arts is that it doesn't actually work the way its proponents idealize it. The evidence is all around you that the factory college model does not produce better citizens more capable of empathy or critical thinking, or a broader understanding of civics. Instead, it produces and promotes shallow thinkers with s...

Sequels

"Sequel." A word almost synonymous with "apprehension". In the case of beloved movies, a sequel is often highly-anticipated but also feared because the history of sequels is so mixed. Let's look at a few case studies. The Godfather (1972) → The Godfather Part II (1974) This is the most basic kind of good sequel: another great story, filmed solidly, to follow up a great original. It's actually a bookend to the original, with the scenes divided between Vito Corleone's back story and those chronicling Michael's downfall, but it qualifies as a sequel in the most basic sense that it continues the story begun in the original film. While the first movie satisfyingly ended with Michael symbolically becoming his father despite his protestations to Kate in the first act, from the perspective of the combined saga (let's just do the right thing at the beginning and pretend Part III had never been made) it merely foreshadows his irreversible destruction of ...