Academy

Module 7 Β· BGP, DNS, CAs β€” Internet-Scale Trust Failures πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
6 min read

The internet works because BGP (routing), DNS (naming), and CAs (identity via TLS certs) all extend trust from single actors to global scale. Each layer was designed with minimal cryptographic verification. Each layer has been abused at scale. This module covers the three internet-wide trust failures every defender and pentester should understand β€” because they’re not going away.

Why this happens

BGP (1989), DNS (1983), and the CA system (1994) were designed to work, not to be secure. The founding assumption was “participants behave honestly.” When participants have turned out to not be fully honest (or compromised, or coerced), the layers have been patched with various cryptographic mitigations (DNSSEC, RPKI, Certificate Transparency) β€” but deployment is uneven, enforcement is weak, and the fundamental trust model remains “we trust the registered authority.”

The result: a motivated actor (often nation-state, sometimes criminal) can hijack traffic at scale by subverting one of these layers.

BGP hijacking

Every network has an Autonomous System Number (ASN) and advertises which IP prefixes it owns. Other networks accept the advertisements and route accordingly. No built-in verification that the advertising network actually owns the prefix.

πŸ” Advanced Module Β· Pro Tier

Continue reading with Pro tier (β‚Ή4,999/year)

You've read 25% of this module. Unlock the remaining deep-dive, quiz, and every other Advanced/Expert module.

136+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
9 more sections locked below