Passport: Secure and adoptable source authentication

Conference Paper

We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to place tokens on packets that allow each autonomous system (AS) along the network path to independently verify that a source address is valid. It leverages the routing system to efficiently distribute the symmetric keys used for verification, and is incrementally deployable without upgrading hosts. We have implemented Passport with Click and XORP and evaluated the design via micro-benchmarking, experiments on the Deterlab, security analysis, and adoptability modeling. We find that Passport is plausible for gigabit links, and can mitigate reflector attacks even without separate denial-of-service defenses. Our adoptability modeling shows that Passport provides stronger security and deployment incentives than alternatives such as ingress filtering. This is because the ISPs that adopt it protect their own addresses from being spoofed at each other's networks even when the overall deployment is small.

Duke Authors

Cited Authors

  • Liu, X; Li, A; Yang, X; Wetherall, D

Published Date

  • January 1, 2008

Published In

  • 5th Usenix Symposium on Networked Systems Design and Implementation, Nsdi 2008

Start / End Page

  • 365 - 378

International Standard Book Number 13 (ISBN-13)

  • 9781931971584

Citation Source

  • Scopus