Securing BGP: A Case Study (5)
BGP provides reachability for the global ‘net, as well as being used in many private networks. As a system, BGP (ultimately) isn’t very secure. But how do we go about securing BGP? This series investigates the questions, constraints, and solutions any proposal to secure BGP must deal with as a case study of asking the right questions, and working at the intersection of business and technology.
As a short review, we started off with three questions, described in the first post, each of which we’ve been considering in some detail:
- Should we focus on a centralized solution to this problem, or a distributed one?
- Assuming we’re using some sort of encryption to secure the information used in path validation, where do the keys come from? The fourth post considers this question.
- Should the information used to validate paths be distributed or stored in a somewhat centralized database?
- Should we consider solutions that are carried within the control plane, within BGP itself, or outside?
- What is it we can actually prove in a packet switched network? This is considered in post 2 and post 3.
Here I’m going to discuss the problem of a centralized versus distributed database to carry the Continue reading