6. Conclusion
On the Internet, BGP protocol security must imperatively be reinforced by good security practices on interconnections between two distinct networks. These best practices are the subject of numerous guides and recommendations, and are essential to guarantee a minimum foundation: ensuring the identity of a BGP peer, guarding against peer configuration errors or network-related bugs. In French, we recommend reading the "Guide des bonnes pratiques de configuration de BGP" (Guide to good BGP configuration practices) written by the Agence nationale de la sécurité des systèmes d'information (French national agency for information systems security).
Resilience and the fight against prefix spoofing are enhanced on the one hand by systems such as RPKI, which automate tedious tasks such as updating complex filters. And secondly, and above all, they are the result of good cooperation...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Networks and Telecommunications
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
Bibliography
Websites
ANSSI (Agence nationale de la sécurité des systèmes d'information). – "Recommendations and guides" portal: BGP configuration best practice guide. http://www.ssi.gouv.fr/fr/guides-et-bonnes-pratiques/recommandations-et-guides/securite-des-reseaux/le-guide-des-bonnes-pratiques-de-configuration-de-bgp.html
...Standards and norms
- A border gateway protocol 4 (BGP-4), IETF request for comments - RFC 4271 - 2006
- Transmission control protocol, IETF request for comments. - RFC 793 - 1981
- BGP support for four-octet AS number space, IETF request for comments - RFC 4893 - 2007
- Stealing the internet, an internet-scale man in the middle attack, Defcon 16 http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-pilosov-kapela.pdf...
Directory
Organizations – Federations – Associations (non-exhaustive list)
Center for Applied Internet Data Analysis (CAIDA) is a collaborative initiative between commercial, governmental and research entities to promote cooperation in the design of network infrastructures and the maintenance of a robust global Internet. http://www.caida.org/home/
...Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference