When my kids were younger, we used to tell them we were going to send them to "manners camp" if they didn't behave properly at the dinner table. An Internet Society-supported initiative, the Mutually Agreed Norms for Routing Security (MANRS), has tried to coax Internet service providers into minding their manners as well—particularly when it comes to how they use the Border Gateway Protocol (BGP), the occasionally abused communications method that drives much of how Internet traffic is routed.
On August 13, the MANRS initiative launched the MANRS Observatory, a new Web tool that provides insight into just how well networks comply with routing security standards. The observatory provides a semblance of transparency into a part of the Internet invisible to most users.
Last year, there were more than 12,000 routing outages or attacks, according to the Internet Society, including the use of BGP to hijack or misdirect traffic and internal BGP "leaks" from poorly configured routers. Deliberate BGP attacks can be used to steal data or redirect requests to hostile "spoofed" websites, as some state actors have been known to do.
But even leaks can cause widespread service outages. For instance, a routing leak by a Nigerian ISP in 2018 rerouted some Google traffic through China, causing service outages in parts of the world. A similar event hit Amazon last April. And a BGP leak in June had a cascading effect across the Internet.
According to Andrei Robachevsky, senior technology program manager at the Internet Society:
Routing security is based almost entirely on trust between networks… One of the advantages of the MANRS Observatory is that it adds an element of accountability. MANRS is seeing steady adoption, but we need more networks to implement the actions and more customers to demand routing security best practices. The more network operators applying MANRS actions, the fewer incidents happening, the less damage done. Our hope is that the MANRS Observatory will help drive greater participation.