{"id":837,"date":"2023-04-19T16:34:00","date_gmt":"2023-04-19T20:34:00","guid":{"rendered":"https:\/\/zayo1.burbledev.com\/?post_type=resources&#038;p=837"},"modified":"2024-07-15T23:27:31","modified_gmt":"2024-07-16T05:27:31","slug":"a-secure-public-internet-is-it-possible","status":"publish","type":"resources","link":"https:\/\/zayoeutrans.burbledev.com\/de\/resources\/a-secure-public-internet-is-it-possible\/","title":{"rendered":"A Secure Public Internet? Is it Possible?"},"content":{"rendered":"\n<p>The public Internet is a lot of things. It\u2019s a low-cost connection for remote offices. It\u2019s student access to countless public learning tools. It\u2019s the delivery mechanism for the world\u2019s knowledge to our devices. It\u2019s every company\u2019s lifeline to their customers.<\/p>\n\n\n\n<p>For all the good the Internet delivers, we can agree that&nbsp;the Internet is not secure. Internet Service Providers (ISPs) worldwide are now starting to change that. To understand how, let\u2019s quickly review what makes the Internet hum.<\/p>\n\n\n\n<p>The Internet is an interconnected network of networks. The core foundation of the Internet is the interlinked networks of the largest Internet service providers (ISPs) \u2013 the \u201cTier-1s.\u201d A Tier-1 ISP has access to the entire Internet without having to pay for IP Transit.<\/p>\n\n\n\n<p>They do this through \u201cpeering\u201d, which establishes inter-ISP settlement-free interconnections used to pass traffic from one network to another needed for the delivery of the packet. These agreements are voluntary, unpaid, mutually beneficial, bilateral, direct to other Tier-1s or strategic networks, and serve the needs of their mutual customers and the Internet at large.<\/p>\n\n\n\n<p>Through these \u201cpeering\u201d arrangements, the Tier-1s exchange and transmit data between their networks, and smaller ISPs purchase Internet access from the Tier-1s. Peered Tier-1 ISPs maintain their networks by always ensuring adequate bandwidth to support the content and \u201ceyeball\u201d traffic exchanged between them.<\/p>\n\n\n\n<p>The Internet wouldn\u2019t work as cohesively without such inter-company cooperation.&nbsp;<\/p>\n\n\n\n<p>Interconnection through peering is just the first step. The next step provides the rules of how packets are exchanged \u2013 how routing occurs. All interconnected networks exchange packets according to the rules defined by a protocol called BGP \u2013 Border Gateway Protocol \u2013 the global Internet traffic routing system.&nbsp;<\/p>\n\n\n\n<p>BGP is one of the core protocols of the Internet. But it was not built with security in mind.<\/p>\n\n\n\n<p>Resource Public Key Infrastructure (RPKI) is a \u201ccompanion\u201d technology created to make BGP routing more secure. It does this by validating traffic origins. RPKI allows network operators to validate the authenticity of BGP route advertisements, ensuring their validity, and rejecting the route advertisement when it originates from an unauthorized source.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"477\" height=\"493\" src=\"https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/rpki-bouncer.png\" alt=\"\" class=\"wp-image-838\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">RPKI \u2013 The Internet\u2019s \u201cBouncer\u201d<\/h2>\n\n\n\n<p>RPKI puts a keener eye on the announcements heading into an ISP\u2019s network, ensuring they\u2019re authorized.&nbsp;<\/p>\n\n\n\n<p>Imagine that you\u2019re a bouncer at a nightclub, and a guest comes to the door claiming VIP status. You first ask for their name, obtain it, and check it against the information you have on your VIP guest list. If their name is found on the VIP guest list \u2013 you may let them in.<\/p>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<p>Or\u2026 as with RPKI, you may also require proof that they are who they said they are and ask for a form of ID which will match the details on their VIP pass. Only after they produce these items, and these items are validated, is the guest admitted.&nbsp;<\/p>\n\n\n\n<p>RPKI is the Internet\u2019s club bouncer. When networks claim authority to announce routes (enter the club), the bouncer validates authority and identity against a virtual VIP pass.&nbsp;<\/p>\n\n\n\n<p>These VIP passes are the digital certificates published by the five global Regional Internet Registries (RIRs), and assigned to each club guest. The five RIRs are AfriNIC (Africa), APNIC (Asia-Pacific), ARIN (North America), LACNIC (Latin America), and RIPE NCC (Europe, MIddle East, and Central Asia). The certificates are published in the RPKI (our bouncer\u2019s list).<\/p>\n\n\n\n<p>RPKI checks this digital certificate against the information in its system. If this digital VIP pass is recognized\u00a0<em>and\u00a0<\/em>signed by a trusted authority, it\u2019s allowed access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Like the Whole Internet, RPKI takes Cooperation to Work<\/h2>\n\n\n\n<p>RPKI validation occurs in two directions: by both the originating network and the receiving network. Similar to the voluntary good behaviour of peering, RPKI also requires voluntary good behaviour from peered ISPs in order to protect all Internet users. The protection of verifying origin identity becomes most meaningful when networks \u201csign\u201d or identify their own route origins,&nbsp;<em>and&nbsp;<\/em>when they validate the origins of the traffic destined for their networks.<\/p>\n\n\n\n<p>As a Tier-1 ISP, Zayo understands the responsibility of maintaining sound, balanced, and well distributed peering. We also take to heart the responsibility of adopting technologies like RPKI to make the entire Internet safer. Zayo is proud to be among the Tier-1 ISPs to embrace this technology, first by validating the route origins of traffic entering our network, and later this year by \u201csigning\u201d \u2013 creating and attaching digital signatures to our own routes to ensure their authenticity.&nbsp;<\/p>\n\n\n\n<p>Beyond RPKI\u2019s initial foundation described here is its ultimate promise \u2013 still ahead. Its foundation is built and is currently being adopted by ISPs worldwide. This foundation will yield future improvements, such as Autonomous System Provider Authorization (ASPA) Objects, adding autonomous system (AS) paths, and ultimately BGPSec, in which BGP will include signed advertisements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Specifically, what does RPKI currently do?<\/h2>\n\n\n\n<p>RPKI technology guards against route hijacking. BGP route hijacking is a common attack where the attacker (club guest claiming VIP status) announces a false route (presents a forged ID or VIP pass, pretending to be who they are not) in order to divert traffic to the attacker\u2019s own network. Why would they do this? Because the diverted traffic contains the sorts of desired information that can be used for malicious intent, information such as account numbers, passwords, or other personal details.<\/p>\n\n\n\n<p>These attacks have real consequences.\u00a0<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">A Successful Hijack:<\/h3>\n\n\n\n<p>In 2018, a\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/04\/24\/a-160000-ether-theft-just-exploited-a-massive-blind-spot-in-internet-security\/?sh=3acf96605e26\" target=\"_blank\" rel=\"noreferrer noopener\">large-scale attack<\/a>\u00a0was launched against MyEtherWallet, a cryptocurrency wallet service. The attackers gained control of the BGP routers and were able to redirect traffic destined for MyEtherWallet to a phishing site hosted by the attackers\u2019 own servers. The site looked identical to the MyEtherWallet site, so users had no idea they had been redirected. They entered their usernames and passwords, and with that, the attackers had access to their login credentials (and stole their funds). If the routes were properly validated using RPKI, the redirect would have been rejected and traffic would have continued to its real, intended destination.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1180\" src=\"https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things.jpg\" alt=\"\" class=\"wp-image-839\" srcset=\"https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things.jpg 1920w, https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things-960x590.jpg 960w, https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things-768x472.jpg 768w, https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things-480x295.jpg 480w, https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things-640x393.jpg 640w, https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things-720x443.jpg 720w, https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things-1168x718.jpg 1168w, https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things-1440x885.jpg 1440w, https:\/\/zayoeutrans.burbledev.com\/wp-content\/uploads\/woman-working-on-laptop-internet-of-things-1536x944.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">More Successful Hijacks:<\/h3>\n\n\n\n<p>Very similar&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/ninabambysheva\/2022\/12\/28\/over-3-billion-stolen-in-crypto-heists-here-are-the-eight-biggest\/?sh=71dc9959699f\" target=\"_blank\" rel=\"noreferrer noopener\">BGP hijack attacks<\/a>&nbsp;occurred to cryptocurrency \u201cbridging services\u201d in 2022: Ronin Network ($600M stolen), Wormhole Network ($325M stolen), and Harmony Horizon Bridge ($100M stolen).<\/p>\n\n\n\n<p>Outside of the obvious lucrative crypto attacks, BGP hijackers also target ISPs and DNS provider traffic in order to redirect users to their own servers. Why? To control access to certain sites, to intercept, monitor, and decode sensitive information within the traffic stream, or simply to disrupt Internet service. Since 2020, there have been over 1,400 BGP hijacking incidents \u2013 about 14 every day \u2013 and no matter the reason for the attack, the\u00a0<a href=\"https:\/\/www.manrs.org\/2020\/09\/what-is-bgp-prefix-hijacking-part-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">attackers seem to be succeeding<\/a>\u00a0in meeting their goals.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Accidental \u201cHijacks\u201d \u2013 the Devastation of a Typo<\/h3>\n\n\n\n<p>BGP redirects aren\u2019t always intentional or malicious. Accidental BGP redirects are called \u201croute leaks\u201d and can occur due to human programming errors, bugs in software, configuration issues, or other unintentional errors.&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/01\/11\/bgp-attacks-pose-a-substantial-operation-riskare-enterprises-paying-attention\/?sh=7eacb1cf45ba\">For example<\/a>, in 2019, a large portion of Verizon\u2019s Internet traffic was accidentally redirected to pass through one of their customer\u2019s IP networks. This customer, a small Pennsylvania metals manufacturer, found their system quickly overwhelmed, and Verizon\u2019s IP users never reached their intended destinations.&nbsp;<\/p>\n\n\n\n<p>Because BGP always looks for the most efficient routing through the Internet, accidental miscoding or other errors can redirect many users, causing widespread outages, degraded performance, and interrupted trips to the&nbsp;<a href=\"https:\/\/www.visualcapitalist.com\/the-50-most-visited-websites-in-the-world\/\">most popular destinations<\/a>&nbsp;such as Google, Facebook, YouTube, Amazon, Netflix, and other popular sites.<\/p>\n\n\n\n<p>Like our club bouncer, RPKI provides the safeguards that can plug BGP\u2019s security holes. Whether BGP redirects are intentional or accidental, RPKI will ensure that when ISPs route traffic, they\u2019re routing it to pre-approved, authorized, and valid destinations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zayo\u2019s is invested in our Customers\u2019 Success<\/h2>\n\n\n\n<p>In the past two years, Zayo has enhanced our network considerably, ensuring its performance for our customers. We are enhancing our network, expanding its reach, and modernizing our IP layer. Our priorities were simple: adding geographic coverage, keeping our customers \u2013 and ultimately their customers \u2013 safe, while delivering bandwidth flexibility in an automated fashion.<\/p>\n\n\n\n<p>Zayo\u2019s role in building RPKI into the foundation of the Internet is part of this overall network strategy. Another initiative is requiring&nbsp;<em>two-factor authentication<\/em>&nbsp;for any BGP routing changes customers request. Zayo is among the first Internet providers to tighten BGP security in this manner.<\/p>\n\n\n\n<p>Summarized, Zayo\u2019s most recent IP-related network updates include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.pcmag.com\/encyclopedia\/term\/tier-1-network\">Tier 1 IP status<\/a><\/li>\n\n\n\n<li>Diverse\u00a0<a href=\"\/resources\/our-latest-network-expansion\/\">Long haul and metro fibre paths<\/a><\/li>\n\n\n\n<li><a href=\"\/services\/packet\/ddos-protection\/\">DDoS Protection<\/a>\u00a0service<\/li>\n\n\n\n<li><a href=\"\/newsroom\/zayo-unveils-significant-network-expansion-and-industry-first-product-innovation-to-enable-customers-to-connect-whats-next\/\">Our embrace of RPKI<\/a>\u00a0technology<\/li>\n\n\n\n<li>Routers pre configured and ready for ASPA, RPKI\u2019s next layer of security<\/li>\n\n\n\n<li>A\u00a0<a href=\"\/newsroom\/zayo-unveils-significant-network-expansion-and-industry-first-product-innovation-to-enable-customers-to-connect-whats-next\/\">two-factor authentication process<\/a>\u00a0for BGP change requests<\/li>\n<\/ul>\n\n\n\n<p>As the Internet as a whole becomes more secure, Zayo is proud to bring the promise of great IP performance and a more secure experience to the global Internet community.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The public Internet is a lot of things. It\u2019s a low-cost connection for remote offices. It\u2019s student access to countless public learning tools. It\u2019s the delivery mechanism for the world\u2019s knowledge to our devices. It\u2019s every company\u2019s lifeline to their customers.<\/p>\n","protected":false},"featured_media":844,"template":"","meta":{"_acf_changed":false,"resource-post-excerpt":"The public Internet is a lot of things. It\u2019s a low-cost connection for remote offices. It\u2019s student access to countless public learning tools. It\u2019s the delivery mechanism for the world\u2019s knowledge to our devices. It\u2019s every company\u2019s lifeline to their customers.","footnotes":""},"resource-topics":[150],"displayed":[],"resources-categories":[44],"industry":[],"services-amp-solutions":[87,33,34],"class_list":["post-837","resources","type-resources","status-publish","has-post-thumbnail","hentry","resource-topics-cybersecurity","resources-categories-blog","services-amp-solutions-ddos-protection","services-amp-solutions-network-connectivity","services-amp-solutions-solutions"],"acf":[],"_links":{"self":[{"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/resources\/837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/types\/resources"}],"version-history":[{"count":1,"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/resources\/837\/revisions"}],"predecessor-version":[{"id":23227,"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/resources\/837\/revisions\/23227"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/media\/844"}],"wp:attachment":[{"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/media?parent=837"}],"wp:term":[{"taxonomy":"resource-topics","embeddable":true,"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/resource-topics?post=837"},{"taxonomy":"displayed","embeddable":true,"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/displayed?post=837"},{"taxonomy":"resources-categories","embeddable":true,"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/resources-categories?post=837"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/industry?post=837"},{"taxonomy":"services-amp-solutions","embeddable":true,"href":"https:\/\/zayoeutrans.burbledev.com\/de\/wp-json\/wp\/v2\/services-amp-solutions?post=837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}