On-Prem

Networks

FCC takes some action against notorious BGP

How's your RPKI-based security plan coming along? Feds want to know


US broadband providers will soon have to provide proof to Uncle Sam that they are taking steps to prevent Border Gateway Protocol (BGP) hijacking and locking down internet routing in general.

The FCC has unanimously approved a notice of proposed rulemaking that will require internet service providers to prepare, and annually update, a confidential BGP security risk management plan. Presumably they have to stick to their plan.

BGP is a protocol used by the internet to establish the most efficient traffic routes between systems, by allowing those systems to advertise their presence to each other and then figuring out the best way forward. More simply put, the internet is a network of networks of yet more networks, and BGP is part of the glue that binds them together in a streamlined manner. Crucially, it wasn't designed with security in mind; these networks are trusted to do the right thing.

The problem is that rogue or bungling network administrators and providers can maliciously or accidentally use BGP to redirect traffic intended for one network to go to another, causing connections to go to the wrong machines – potentially enabling surveillance or data manipulation in the process – or nowhere. This is called BGP hijacking.

Some of the worst examples of BGP issues include a 2008 incident during which Pakistan knocked YouTube offline in an attempt to censor content. Russia also exploited BGP vulnerabilities to limit access to Twitter as it invaded Ukraine.  

Closer to home, the US Departments of Defense and Justice found China Telecom has used BGP to reroute American internet traffic at least six times, according to FCC boss Jessica Rosenworcel. 

"While BGP has allowed network operators to grow and evolve the modern internet, it was not designed with explicit security features to ensure trust in exchanged information," Rosenworcel said [PDF] on Thursday. 

In addition to filing confidential reports annually, for the FCC's eyes only, the nine biggest US broadband providers would also be required to file quarterly public statements. And the regulator wants to see movement being made on implementing RPKI-based security to lock down BGP issues.

Resource Public Key Infrastructure (RPKI) is a system intended to prevent route leaks and BGP hijacking. It provides cryptographically verifiable guarantees for networks to validate the IP prefixes of others — although even this system isn't foolproof and potentially can be circumvented.

"In proposing to measure RPKI deployment, we will help inform both the private and public sectors about what more needs to be done to secure our networks," Commissioner Geoffrey Starks said [PDF] on Thursday, noting that the FCC's actions are part of a "multi-pronged" government approach to securing the internet.

"It is also consistent with Initiative 4.1.5 of the National Cybersecurity Strategy Implementation Plan, which tasks the Office of the National Cyber Director, along with stakeholders and government agencies, to develop a roadmap to increase adoption of secure Internet routing techniques including BGP security," Starks added.

Smaller ISPs, however, would not have to file regular BGP security plans with the FCC, though they must submit those details to the commission if asked.

Now that the FCC has adopted the notice of proposed rulemaking, companies and individuals can submit public comments on the proposal before it is cemented. ®

Send us news
9 Comments

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Better late than never

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming

Security boom is over, with over a third of CISOs reporting flat or falling budgets

Good news? Security is still getting a growing part of IT budget

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

CrowdStrike's meltdown didn't dent its market dominance … yet

Total revenue for Q2 grew 32 percent

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects