# Keith Kirkpatrick - Fixing the Internet (Highlights)

## Metadata
**Cover**:: https://readwise-assets.s3.amazonaws.com/static/images/article0.00998d930354.png
**Source**:: #from/readwise
**Zettel**:: #zettel/fleeting
**Status**:: #x
**Authors**:: [[Keith Kirkpatrick]]
**Full Title**:: Fixing the Internet
**Category**:: #articles #readwise/articles
**Category Icon**:: 📰
**URL**:: [cacm.acm.org](https://cacm.acm.org/magazines/2021/8/254299-fixing-the-internet/fulltext)
**Host**:: [[cacm.acm.org]]
**Highlighted**:: [[2021-08-15]]
**Created**:: [[2022-09-26]]
## Highlights
- The Border Gateway Protocol (BGP) is used to ensure data can be directed between networks along the most efficient path
- However, because the protocol was designed and still operates on a trust model that accepts that any information exchanged by networks is always valid, it remains susceptible to issues such as information exchange failures due to improperly formatted or incorrect data.
The protocol: BGP
- BGP is also vulnerable to BGP hijacks or inadvertent IP address leaks, in which route and IP address information can be deliberately intercepted, redirected, or dropped, simply by the advertisement of incorrect or corrupted routes via the BGP protocol.
- BGP hijacks such as that described here are frequent, with an average of 14 attacks per day between mid-January and June 2020, according to the Internet Society.
- RPKI is carried out by a process known as route origin validation (ROV), which uses route origin authorizations (ROAs)—digitally signed objects that fix an IP address to a specific network or autonomous system—to establish the list of prefixes a network is authorized to announce.
- What is Border Gateway Protocol? https://www.youtube.com/watch?v=A1KXPpqlNZ4
#further-reading