RPKI Introduction. APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By:
|
|
- Randall Wilkins
- 5 years ago
- Views:
Transcription
1 RPKI Introduction APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By: 1
2 Content Why do we need RPKI What is RPKI How to deploy RPKI Configuration case
3 Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services downed Occurred 5 Nov 2012 (for 30 minutes) Moratel Indonesia (AS23947) 3
4 Indonesia Hijacks On 3rd April 2014, Indosat (AS4761) leaked over 320,000* routes within a 2-hour period Disrupted Akamai Self-inflicted DDoS attack 4
5 Telekom Malaysia On June 12, 2015, Telekom Malaysia (AS4788) tweets this then breaks the Internet It announced 179,000 prefixes to Level 3 (AS3549) 5
6 Cyber Criminals exploiting the vulnerability BGP Hijacking for Cryptocurrency Profit (2014) Spamhaus DDoS Attack (2013) Detecting BGP Attacks in
7 How we address this A network should only originate his own prefix How do we verify & avoid false advertisement? A provider should filter prefixes they propagate from customers Transitive trust; BGP is a trust-based system Check the legitimacy of address (LoA) Passive Countermeasure Strict filter on Interconnection BGP router can filter in UPDATE Messages Useful filtering can be done by upstream provider Automate Filter Maintenance Use the Route Object 7
8 What is RPKI? RPKI Resource Pubic Key Infrastructure 8
9 What does it solve? Prevents route hijacking A prefix originated by an AS without authorization due to malicious intent Prevents mis-origination A prefix that is mistakenly originated by an AS which does not own it Also route leakage due to configuration mistake or fat finger 9
10 How does it work? Is this AS number (ASN) authorized to announce this IP address range? 10
11 RPKI Origin Validation Network Next Hop AS_PATH Age Attrs V*> 2001:db8::/ :df2:ee00:: :30:49 [{Origin: i}] I > 2001:db8::/ :df2:ee11:: :30:49 [{Origin: i}] :db8::/ :db8:ab:: :db8::/32 11
12 RPKI Implementation Two RPKI implementation type Delegated: Each participating node becomes a CA and runs their own RPKI repository, delegated by the parent CA. Hosted: The RIR runs the CA functionality for interested participants.
13 Two Components Certificate Authority (CA) Internet Registries (RIR, NIR, Large LIR) Issue certificates for customers Allow customers to use the CA s GUI to issue ROAs for their prefixes Relying Party (RP) Software which gathers data from CAs
14 Issuing Party Internet Registries (RIR, NIR, Large LIRs) Acts as a Certificate Authority and issues certificates for customers Provides a web interface to issue ROAs for customer prefixes Publishes the ROA records APNIC RPKI Engine publication rpki.apnic.net Repository MyAPNIC GUI
15 Relying Party (RP) IANA Repo APNIC Repo rpki.apnic.net LIR Repo LIR Repo RIPE Repo rpki.ripe.net RP Cache (gather) Validated Cache RPKI-Rtr Protocol Software which gathers data from CAs Also called RP cache or validator
16 RPKI Building Blocks 1. Trust Anchors (RIR s) 2. Route Origination Authorizations (ROA) 3. Validators
17 1. PKI & Trust Anchors
18 Public Key Concept Private key: This key must be known only by its owner. Public key: This key is known to everyone (it is public) Relation between both keys: What one key encrypts, the other one decrypts, and vice versa. That means that if you encrypt something with my public key (which you would know, because it's public :-), I would need my private key to decrypt the message. Same alike http with SSL aka https
19 RPKI Profile X.509 Certificates 3779 EXT Certificates are X.509 certificates that conform to the PKIX profile [PKIX]. They also contain an extension field that lists a collection of IP resources (IPv4 addresses, IPv6 addresses and AS Numbers) [RFC3779] Signed by Parent s Private Key X.509 Cert RFC 3779 Extension Describes IP Resources (Addr & ASN) SIA URI for where this Publishes Owner s Public Key CA
20 Trust Anchor Resource Allocation Hierarchy IANA Trust Anchor Certificate AFRINIC RIPE NCC ARIN APNIC LACNIC Issued Certificates match allocation actions NIR NIR ISP ISP ISP ISP ISP Source :
21 RPKI Chain of Trust The RIRs hold a self-signed root certificate for all the resources that they have in the registry They are the trust anchor for the system That root certificate is used to sign a certificate that lists your resources You can issue child certificates for those resources to your customers When making assignments or sub allocations
22 2. ROA
23 Route Origination Authorizations (ROA) A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. With a ROA, the resource holder is attesting that the origin AS number is authorized to announce the prefix(es). The attestation can be verified cryptographically using RPKI.
24 Route Origination Authorizations (ROA) Next to the prefix and the ASN which is allowed to announce it, the ROA contains: A minimum prefix length A maximum prefix length An expiry date Origin ASN Multiple ROAs can exist for the same prefix ROAs can overlap
25 Create ROA 25
26 3. Validators
27 Origin Validation Router gets ROA information from the RPKI Cache RPKI verification is done by the RPKI Cache The BGP process will check each announcement with the ROA information and label the prefix Validated RPKI Cache RPKI to RTR protocol
28 Result of Check Valid Indicates that the prefix and AS pair are found in the database. Invalid Indicates that the prefix is found, but either the corresponding AS received from the EBGP peer is not the AS that appears in the database, or the prefix length in the BGP update message is longer than the maximum length permitted in the database. Not Found / Unknown Indicates that the prefix is not among the prefixes or prefix ranges in the database. Valid > Unknown > Invalid
29 ROA Example IPv4 Prefix: /16 ASN: ROA /16 /18 Origin AS Prefix Max Length VALID AS /16 VALID AS /17 INVALID AS /16 INVALID AS /24 UNKNOWN AS /8
30 Local Policy You can define your policy based on the outcomes Do nothing Just logging Label BGP communities Modify preference values Rejecting the announcement
31 ROV Deployment - CRIX First stage -> Only tagging valid, invalid and not found prefixes with BGP communities Currently (since 2015): Discarding invalids at route server. IX members only get valid and not found prefixes. Not found prefixes are marked with a BGP community. Periodic manual checks of invalid prefixes, letting members know when they are announcing an invalid route so that they fix it. Quarantine for new members (before traffic is enabled in the production environment) involves announced prefixes revision to make sure the corresponding ROAs have been created. 31
32 RPKI Caveats When RTR session goes down, the RPKI status will be not found for all the bgp route after a while Invalid => not found we need several RTR sessions or care your filtering policy In case of the router reload, which one is faster, receiving ROAs or receiving BGP routes? If receiving BGP is much faster than ROA, the router propagate the invalid route to others We need to put our Cache validator within our IGP scope
33 In summary As an announcer/lir You choose if you want certification You choose if you want to create ROAs You choose AS, max length As a Relying Party You can choose if you use the validator You can override the lists of valid ROAs in the cache, adding or removing valid ROAs locally You can choose to make any routing decisions based on the results of the BGP Verification (valid/invalid/unknown)
34 ROV Deployment NAP.Ec (the Ecuatorian IXP) Doing ROV and discarding invalid routes (Since 2 or 3 years ago) CRIX (The Costarican IXP) Doing ROV since 2015 RENATA (Colombian Academic Network) They have recently set up ROV Just tagging traffic and not making any routing decision yet as they are seeing too many invalid routes 34
35 RPKI Further Reading RFC 5280: X.509 PKI Certificates RFC 3779: Extensions for IP Addresses and ASNs RFC : Resource Public Key Infrastructure
36 RPKI Configuration
37 RPKI Configuration Resources: AS : [APNICTRAINING-DC] IPv4 : /24 IPv6: 2001:df2:ee00::/48 Process Create ROA Setup cache validation server Validate the ROA
38 Implementation Scenario upstream DNS Trust Anchors DNS Trust Anchors DNS Trust Anchors {bgp4} Routers validate updates from other BGP peers ASBR {bgp4} {rsync} repository {rtr} Caches feeds routers using RTR protocol with ROA information {rtr} {rsync} Caches retrieves and cryptographically DNS RPKI Cache Validator validates certificates & ROAs from repositories
39 Phase I: Create ROA APNIC member Create ROA in MyAPNIC CNNIC member Create ROA in your member portal 39
40 Phase I - Check your ROA # whois -h whois.bgpmon.net 2001:df2:ee00::/48 Prefix: 2001:df2:ee00::/48 Prefix description: APNICTRAINING-DC Country code: AU Origin AS: Origin AS Name: ASN for APNICTRAINING LAB DC RPKI status: ROA validation successful First seen: Last seen: Seen by #peers: 160
41 Phase I - Check your ROA # whois -h whois.bgpmon.net " --roa :df2:ee00::/48" 0 Valid ROA Details Origin ASN: AS Not valid Before: :10:04 Not valid After: :00:00 Expires in 3y208d1h39m s Trust Anchor: rpki.apnic.net Prefixes: 2001:df2:ee00::/48 (max length /48) /24 (max length /24)
42 Phase I Global ROA Stats
43 Phase II - RPKI Validator Two options: A. RIPE NCC RPKI Validator B. Dragon Research Labs RPKI Toolkit
44 Phase II - RPKI Validator A. RIPE NCC RPKI Validator Download RPKI Validator Installation # tar -zxvf rpki-validator-app-2.24-dist.tar.gz # cd rpki-validator-app-2.24 #./rpki-validator.sh start
45 Phase II - RPKI Validator A. RIPE NCC RPKI Validator
46 Phase II - RPKI Validator B. Dragon Research Labs RPKI Toolkit Installation process in Ubuntu Xenial /xenial-rp.md Installation # wget -q -O /etc/apt/sources.list.d/rpki.list # wget -q -O /etc/apt/trusted.gpg.d/rpki.asc # apt update # apt install rpki-rp
47 Phase II - RPKI Validator B. Dragon Research Labs RPKI Toolkit
48 Phase III - Router Configuration (JunOS)
49 Phase III - Router Configuration (IOS)
50 Phase III - Router Configuration (GoBGP)
51 Check your prefix Junos rpki-junos>show route protocol bgp / /24 *[BGP/170] 3w5d 16:57:33, MED 0, localpref 110 AS path: I, validation-state: verified > to via xe-1/3/0.0
52 Check your prefix IOS rpki-ios>show ip bgp /24 BGP routing table entry for /24, version Paths: (2 available, best #2, table default) Not advertised to any peer Refresh Epoch from ( ) Origin IGP, localpref 110, valid, external Community: path B8 RPKI State valid
53 Check your prefix GoBGP gobgp global rib /24 Network Next Hop AS_PATH Age Attrs V*> / :13:29 [{Origin: i} {Med: 0} {LocalPref: 110} {Communities: 4608:11101}]
54 Commands Check session status of cache validator server JunOS IOS GoBGP show validation session detail show bgp ipv4 unicast rpki servers gobgp rpki server Full validation database JunOS show validation database IOS GoBGP show bgp ipv4 unicast rpki table gobgp rpki table
55 Acknowledgements Fakrul Alam Tom Harrison (APNIC) Sofia Silva Berenguer (APNIC) 55
56 Thank you! 56
RPKI. Resource Pubic Key Infrastructure
RPKI Resource Pubic Key Infrastructure Purpose of RPKI RPKI replaces IRR or lives side by side? Side by side: different advantages Security, almost real time, simple interface: RPKI Purpose of RPKI Is
More informationSecure Routing with RPKI. APNIC44 Security Workshop
Secure Routing with RPKI APNIC44 Security Workshop Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services
More informationResource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC
Resource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC Target Audience Knowledge of Internet Routing(specially BGP) Fair idea on Routing Policy No need to know Cryptography Basic knowledge
More informationMisdirection / Hijacking Incidents
Security Tutorial @ TWNOG SECURE ROUTING WITH RPKI 1 Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services
More informationResource PKI. NetSec Tutorial. NZNOG Queenstown. 24 Jan 2018
Resource PKI NetSec Tutorial NZNOG2018 - Queenstown 24 Jan 2018 1 Fat-finger/Hijacks/Leaks Bharti (AS9498) originates 103.0.0.0/10 Dec 2017 (~ 2 days) No damage more than 8K specific routes! Google brings
More informationDeploying RPKI An Intro to the RPKI Infrastructure
Deploying RPKI An Intro to the RPKI Infrastructure VNIX-NOG 24 November 2016 Hanoi, Vietnam Issue Date: Revision: Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours)
More informationSecuring BGP - RPKI. ThaiNOG Bangkok. 21 May Tashi Phuntsho
Securing BGP - RPKI ThaiNOG2018 - Bangkok 21 May 2018 Tashi Phuntsho (tashi@apnic.net) 1 Fat-finger/Hijacks/Leaks Amazon (AS16509) Route53 hijack April2018 AS10279 (enet) announced/originated more specifics
More informationSecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI Srinivas (Sunny) Chendi VNIX-NOG 2018, Da Nang sunny@apnic.net Xin chào và chào buổi sáng 1 3 4 What is the fundamental Problem? An underlying problem in routing
More informationBGP Origin Validation
BGP Origin Validation ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated
More informationResource Public Key Infrastructure
Resource Public Key Infrastructure A pilot for the Internet2 Community to secure the global route table Andrew Gallo The Basics The Internet is a self organizing network of networks. How do you find your
More informationIntroducción al RPKI (Resource Public Key Infrastructure)
Introducción al RPKI (Resource Public Key Infrastructure) Roque Gagliano rogaglia@cisco.com 4 Septiembre 2013 Quito, Equator 2011 Cisco and/or its affiliates. All rights reserved. 1 Review of problem to
More informationProblem. BGP is a rumour mill.
Problem BGP is a rumour mill. We want to give it a bit more authorita We think we have a model AusNOG-03 2009 IP ADDRESS AND ASN CERTIFICATION TO IMPROVE ROUTING SECURITY George Michaelson APNIC R&D ggm@apnic.net
More informationARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN
ARIN Support for DNSSEC and ION San Diego 11 December 2012 Pete Toscano, ARIN 2 DNS and BGP They have been around for a long time. DNS: 1982 BGP: 1989 They are not very secure. Methods for securing them
More informationResource Certification. Alex Band, Product Manager DENIC Technical Meeting
Resource Certification Alex Band, Product Manager DENIC Technical Meeting Internet Routing Routing is non-hierarchical, open and free Freedom comes at a price: - You can announce any address block on your
More informationLife After IPv4 Depletion
1 Life After IPv4 Depletion Jon Worley Analyst Securing Core Internet Functions Resource Certification, RPKI Mark Kosters Chief Technology Officer 2 Core Internet Functions: Routing & DNS The Internet
More informationISP 1 AS 1 Prefix P peer ISP 2 AS 2 Route leak (P) propagates Prefix P update Route update P Route leak (P) to upstream 2 AS 3 Customer BGP Update messages Route update A ISP A Prefix A ISP B B leaks
More informationThe RPKI and BGP Origin Validation
The RPKI and BGP Origin Validation APRICOT / New Delhi 2012.02.27 Randy Bush Rob Austein Steve Bellovin And a cast of thousands! Well, dozens :) 2012.02.27
More informationUpdate on Resource Certification. Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008
Update on Resource Certification Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008 Address and Routing Security What we have had for many years is a relatively insecure interdomain routing system
More informationThe RPKI & Origin Validation
The RPKI & Origin Validation RIPE / Praha 2010.05.03 Randy Bush Rob Austein Steve Bellovin And a cast of thousands! Well, dozens :) 2010.05.03 RIPE RPKI
More informationAPNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013
APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database
More informationSecuring Core Internet Functions Resource Certification, RPKI. Mark Kosters ARIN CTO
Securing Core Internet Functions Resource Certification, RPKI Mark Kosters ARIN CTO Core Internet Functions: Routing & DNS The Internet relies on two critical resources DNS: Translates domain names to
More informationRPKI deployment at AFRINIC Status Update. Alain P. AINA RPKI Project Manager
RPKI deployment at AFRINIC Status Update Alain P. AINA RPKI Project Manager What is Resource Certifcation? Resource Certifcation is a security framework for verifying the association between resource holders
More informationInternet Resource Certification and Inter- Domain Routing Security! Eric Osterweil!
Internet Resource Certification and Inter- Domain Routing Security! Eric Osterweil! Who is allowed to do what?! BGP (the Internet s inter-domain routing protocol) runs by rumor Participants assert reachability
More informationRobust Inter-Domain Routing
Establishing the Technical Basis for Trustworthy Networking Robust Inter-Domain Routing Addressing Systemic Vulnerabilities in BGP Doug Montgomery (dougm@nist.gov) Manager, Internet and Scalable Systems
More informationRPKI and Routing Security
Presentation September 2015 Yerevan Regional Meeting Routing Security 2 Routing Registry route objects RPKI (Resource Public Key Infrastructure) ROAs (Route Origin Authorisation) What is the Purpose of
More informationThe RPKI & Origin Validation
The RPKI & Origin Validation NANOG / Denver 2011.06.12 Randy Bush Rob Austein Steve Bellovin Michael Elkins And a cast of thousands!
More informationA PKI For IDR Public Key Infrastructure and Number Resource Certification
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect
More informationDecentralized Internet Resource Trust Infrastructure
Decentralized Internet Resource Trust Infrastructure Bingyang Liu, Fei Yang, Marcelo Bagnulo, Zhiwei Yan, and Qiong Sun Huawei UC3M CNNIC China Telecom 1 Critical Internet Trust Infrastructures are Centralized
More informationSecuring Routing: RPKI Overview. Mark Kosters Chief Technology Officer
Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer Why are DNSSEC and RPKI important? Two of the most critical resources DNS Routing Hard to tell when resource is compromised Focus of
More informationSecuring Internet Infrastructure: Route Origin Security using RPKI at ARIN. Mark Kosters CTO
Securing Internet Infrastructure: Route Origin Security using RPKI at ARIN Mark Kosters CTO What is RPKI? Resource Public Key Infrastructure Attaches digital certificates to network resources AS Numbers
More informationSecuring BGP: The current state of RPKI. Geoff Huston Chief Scientist, APNIC
Securing BGP: The current state of RPKI Geoff Huston Chief Scientist, APNIC Incidents What happens when I announce your addresses in BGP? All the traffic that used to go to you will now come to me I can
More informationIETF81 Secure IDR Rollup TREX Workshop David Freedman, Claranet
IETF81 Secure IDR Rollup TREX Workshop 2011 David Freedman, Claranet Introduction to Secure IDR (SIDR) You are in a darkened room at the IETF. You are surrounded by vendors. A lone operator stands quietly
More informationSecurity in inter-domain routing
DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks
More informationRPKI and Internet Routing Security ~ The regional ISP operator view ~
RPKI and Internet Routing Security ~ The regional ISP operator view ~ APNIC 29/APRICOT 2010 NEC BIGLOBE, Ltd. (AS2518) Seiichi Kawamura 1 Agenda Routing practices of the regional ISP today How this may
More informationBGP Origin Validation (RPKI)
University of Amsterdam System & Network Engineering BGP Origin Validation (RPKI) July 5, 2013 Authors: Remy de Boer Javy de Koning Supervisors: Jac Kloots
More informationOverview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies
Overview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies Presentation Outline The BGP security problem RPKI overiew Address & AS number allocation system Certificates
More informationSome Lessons Learned from Designing the Resource PKI
Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007 Address and Routing Security The basic security questions that need to be answered are: Is this a valid
More informationJust give me a button!
Just give me a button! The challenges of routing security RIPE NCC Members organisation founded in 1992 Manages IP and ASN allocations in Europe, Middle East and former Soviet Union - Ensure unique holdership
More informationRPKI-Based Origin Validation Lab RPKI Lab Creative Commons: Attribution & Share Alike
RPKI-Based Origin Validation Lab 1 Issuing Parties Relying Parties GUI altca Publication Protocol Trust Anchor Resource PKI RCynic Gatherer Pseudo IRR route: 147.28.0.0/16! descr: 147.28.0.0/16-16! origin:
More informationFacilitating Secure Internet Infrastructure
Facilitating Secure Internet Infrastructure RIPE NCC http://www.ripe.net About the RIPE NCC RIPE Network Coordination Centre Bottom-up, self-regulated, membership association, notfor-profit Regional Internet
More informationRPKI Trust Anchor. Geoff Huston APNIC
RPKI Trust Anchor Geoff Huston APNIC Public Keys How can you trust a digital signature?? What if you have never met the signer and have no knowledge of them or their keys? One approach is transitive trust
More informationIPv6 Allocation and Policy Update. Global IPv6 Summit in China 2007 April 12, 2007 Guangliang Pan
IPv6 Allocation and Policy Update Global IPv6 Summit in China 2007 April 12, 2007 Guangliang Pan 1 Overview IPv6 allocation status update Global IPv6 allocations APNIC allocation and assignment details
More informationRoute Security for Inter-domain Routing
Route Security for Inter-domain Routing Alvaro Retana (aretana@cisco.com) Distinguished Engineer, Cisco Services 3 This could happen to YOUR network 4 This could happen be happening to YOUR network 5 Agenda
More informationIPv4 Run-Out, Trading, and the RPKI
IPv4 Run-Out, Trading, and the RPKI MENOG 3 / Salmiya 2008.04.15 Randy Bush http://rip.psg.com/~randy/080415.menog-v4-trad-rpki.pdf 2008.04.15 MENOG v4 Trade RPKI 2 Internet Initiative
More informationRPKI in practice. Sebastian Wiesinger DE-CIX Technical Meeting June 2017
RPKI in practice Sebastian Wiesinger sebastian.wiesinger@noris.net DE-CIX Technical Meeting June 2017 Generate ROAs Generate ROAs for your prefixes RIPE NCC makes this very easy Available at the LIR portal
More informationPKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006
PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy
More informationResource Certification
Resource Certification CISSP, science group manager RIPE NCC robert@ripe.net 1 Contents Motivation for Resource Certification (RPKI) Architecture overview Participating in RPKI Most importantly: use cases
More informationBGP Routing Security and Deployment Strategies
Bachelor Informatica Informatica Universiteit van Amsterdam BGP Routing Security and Deployment Strategies Bryan Eikema June 17, 2015 Supervisor(s): Benno Overeinder (NLnet Labs), Stavros Konstantaras
More information<36 th APNIC Meeting, XIAN CHINA> KISA(KRNIC) UPDATE. YOUNGSUN LA Korea Internet & Security Agency
KISA(KRNIC) UPDATE YOUNGSUN LA (rays@kisa.or.kr) Korea Internet & Security Agency 1 Contents IPv6 Verified NSDs R&D WHOIS User Analysis & Statistics RPKI Testbed 2 IPv6
More informationBGP Route Hijacking - What Can Be Done Today?
BGP Route Hijacking - What Can Be Done Today? Version 1.2 Barry Raveendran Greene Principle Architect Carrier, Enterprise & Security bgreene@akamai.com @Akamai BGP - the Core Protocol that Glues all of
More informationIPv4/IPv6 BGP Routing Workshop. Organized by:
IPv4/IPv6 BGP Routing Workshop Organized by: Agenda Multihoming & BGP path control APNIC multihoming resource policy 2 ISP Hierarchy Default free zone Made of Tier-1 ISPs who have explicit routes to every
More informationIPv4 Run-Out, Trading, and the RPKI
IPv4 Run-Out, Trading, and the RPKI RIPE 56 / Berlin 2008.05.07 Randy Bush http://rip.psg.com/~randy/080507.ripe-v4-trad-rpki.pdf 2008.05.07 RIPE v4 Trade RPKI 2 Internet Initiative Japan
More informationAttacks on routing: IP hijacks
Attacks on routing: IP hijacks How Internet number resources are managed IANA ARIN LACNIC APNIC RIPE NCC AfriNIC ISP NIC.br NIC.MX ISP #1 LIRs/ISPs LIRs/ISPs End users ISP mx How Internet number resources
More informationAPNIC RPKI Report. George Michaelson
APNIC RPKI Report George Michaelson APNIC RPKI Current Activities The RPKI TA Framework APNIC s TA Changes Provisioning Protocol Services The RPKI TA Framework The RPKI TA Framework Managing TAs is an
More informationRTRlib. An Open-Source Library in C for RPKI-based Prefix Origin Validation. Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H.
RTRlib An Open-Source Library in C for RPKI-based Prefix Origin Validation Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller m.waehlisch@fu-berlin.de schmidt@informatik.haw-hamburg.de
More informationImplementation of RPKI and IRR filtering on the AMS-IX platform. Stavros Konstantaras NOC Engineer
Implementation of RPKI and IRR filtering on the AMS-IX platform Stavros Konstantaras NOC Engineer RIPE EDUCA 2018 Agenda AMS-IX Route Servers Architecture Features Filtering IRRdb RPKI BGP Communities
More informationUsing Resource Certificates Progress Report on the Trial of Resource Certification
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC From the RIPE Address Policy Mail List 22 25 Sept 06, address-policy-wg@lists.ripe.net
More information32-bit ASNs. Philip Smith. AfNOG rd April 1st May Abuja, Nigeria
32-bit ASNs Philip Smith AfNOG 2007 23rd April 1st May Abuja, Nigeria Autonomous System (AS) AS 100 Collection of networks with same routing policy Single routing protocol Usually under single ownership,
More informationIPv4 depletion & IPv6 deployment in the RIPE NCC service region. Kjell Leknes - June 2010
IPv4 depletion & IPv6 deployment in the RIPE NCC service region Kjell Leknes - June 2010 Outline About RIPE and RIPE NCC IPv4 depletion IPv6 deployment Engaging the community - RIPE NCC and the RIPE community
More informationAn Operational ISP & RIR PKI
An Operational ISP & RIR PKI ARIN / Montreal 2006.04.10 Randy Bush Quicksand Unknown quality of whois data Unknown quality of IRR data No formal
More informationRPKI Deployment Considerations: Problem Analysis and Alternative Solutions. 95 SIDR meeting
RPKI Deployment Considerations: Problem Analysis and Alternative Solutions draft-lee-sidr-rpki-deployment-01 @IETF 95 SIDR meeting fuyu@cnnic.cn Background RPKI in China CNNIC deploy a platform to provide
More informationRouting Security. Training Course
Routing Security Training Course Training Services RIPE NCC November 2015 Schedule 09:00-09:30 11:00-11:15 13:00-14:00 15:30-15:45 17:30 Coffee, Tea Break Lunch Break End Routing Security 2 Introductions
More informationBGP security. 19 april 2018 Copenhagen
BGP security 19 april 2018 Copenhagen Agenda 14:30 Welcome and registration 15:00 Presentation 17:00 Questions 17:30 Beer & Burgers & 2 Who are we? Lucas Senior network engineer @ NL-ix in ISP business
More informationInternet Engineering Task Force (IETF) Category: Informational ISSN: February 2012
Internet Engineering Task Force (IETF) G. Huston Request for Comments: 6483 G. Michaelson Category: Informational APNIC ISSN: 2070-1721 February 2012 Abstract Validation of Route Origination Using the
More informationRoute Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes
1 Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes 2 Internal prefixes originated in IP core network Loopback Transport Connect inter-regional
More informationInternet Routing Registry
APNIC elearning: Internet Routing Registry Issue Date: 02 July 2016 Revision: 1.0 Overview What is Routing Policy IRR Database & Objects Routing Policy Documentation in IRR Database RPSL (Routing Policy
More informationNetwork Working Group. Intended status: Informational Expires: January 9, 2014 July 8, 2013
Network Working Group G. Huston Internet-Draft G. Michaelson Intended status: Informational APNIC Expires: January 9, 2014 July 8, 2013 Abstract RPKI Validation Reconsidered draft-huston-rpki-validation-00.txt
More information9/6/2015. COMP 535 Lecture 6: Routing Security. Agenda. In the News. September 3, 2015 Andrew Chi
COMP 535 Lecture 6: Routing Security September 3, 2015 Andrew Chi Includes content used with permission by Angelos Keromytis (Columbia), Philip Smith (APNIC), and Steve Kent (BBN) Agenda
More information32-bit ASNs. Greg Hankins Chris Malayter APRICOT 2009 APRICOT /02/25
32-bit ASNs Greg Hankins ghankins@force10networks.com Chris Malayter cmalayter@switchanddata.com APRICOT 2009 APRICOT 2009 2009/02/25 ASN Terminology Soup What??? 2-octet, 2-byte, 16-bit, ASN16, and OLD
More informationRPKI Workshop Routing Lab
RPKI Workshop Routing Lab NANOG / Denver 2011.06.12 Randy Bush Michael Elkins Rob Austein Serpil Bayraktar 2011.06.12 RPKI Router Lab
More informationBGP Route Security Cycling to the Future! Alexander Azimov Qrator Labs
BGP Route Security Cycling to the Future! Alexander Azimov Qrator Labs aa@qrator.net Malicious Hijacks/Leaks FISHING SITES HIJACK OF HTTPS CERTIFICATES SPAM/BOTNET ACTIVITY DOS ATTACKS BGP Hijack Factory
More informationNews from RIPE and RIPE NCC
News from RIPE and RIPE NCC FRNOG, Paris 11 December 2009 Vesna Manojlovic RIPE / RIPE NCC RIPE Operators community Develops addressing policies Working group mailing lists 2010 meetings: Prague 3-7 May
More informationFeedback from RIPE NCC Registration Services. Alex Le Heux - RIPE NCC RIPE62, May 2011, Amsterdam
Feedback from RIPE NCC Registration Services Alex Le Heux - RIPE NCC RIPE62, May 2011, Amsterdam Outline ASN32 success, a competitive disadvantage? Last /8 implementation detail Upgrade of /32 IPv6 allocations
More informationAn Operational ISP & RIR PKI
An Operational ISP & RIR PKI EOF / Istanbul 2006.04.25 Randy Bush Quicksand Unknown quality of whois data Unknown quality of IRR data No formal
More informationRoute Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes
Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes Internal prefixes originated in IP core network Loopback Transport Connect inter-regional
More informationSecurity Overlays on Core Internet Protocols DNSSEC and RPKI. Mark Kosters ARIN CTO
Security Overlays on Core Internet Protocols DNSSEC and RPKI Mark Kosters ARIN CTO Why are DNSSEC and RPKI Important Two critical resources DNS Routing Hard to tell if compromised From the user point of
More informationInternet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015
Network Working Group M. Lepinski, Ed. Internet-Draft BBN Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Abstract BGPSEC Protocol Specification draft-ietf-sidr-bgpsec-protocol-09
More information32-bit ASNs. Philip Smith. Last updated February 2010
32-bit ASNs Philip Smith Last updated February 2010 Autonomous System (AS) AS 100 Collection of networks with same routing policy Single routing protocol Usually under single ownership, trust and administrative
More informationAPNIC Activity Highlights
APNIC Activity Highlights PacNOG 7 June 2010 Elly Tawhai Senior Internet Resource Analyst/Liaison Officer, Pacific, APNIC Overview What is APNIC? Services Update APNIC 29 Policy Outcomes APNIC Activities
More informationMadison, Wisconsin 9 September14
1 Madison, Wisconsin 9 September14 2 Security Overlays on Core Internet Protocols DNSSEC and RPKI Mark Kosters ARIN Engineering 3 Why are DNSSEC and RPKI Important Two critical resources DNS Routing Hard
More informationAPNIC Trial of Certification of IP Addresses and ASes
APNIC Trial of Certification of IP Addresses and ASes ARIN XVII Open Policy Meeting George Michaelson Geoff Huston Motivation: Address and Routing Security What we have today is a relatively insecure system
More informationSecurity Overlays on Core Internet Protocols DNSSEC and RPKI. Mark Kosters ARIN CTO
Security Overlays on Core Internet Protocols DNSSEC and RPKI Mark Kosters ARIN CTO Why are DNSSEC and RPKI Important Two critical resources DNS Routing Hard to tell if compromised From the user point of
More informationIPv6 Allocation Policy and Procedure. Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan
IPv6 Allocation Policy and Procedure Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan 1 Overview Introduction to APNIC Policy development process IPv6 policy and procedures
More informationInternet Numbers Introduction to the RIR System
Internet Numbers Introduction to the RIR System Chafic Chaya MEAC-IG Summer School, AUB - Lebanon August 2016 1 Who Runs the Internet? The short answer is NO ONE!!! Chafic Chaya MEAC-IG Summer School August
More informationIOS Implementation of the ibgp PE CE Feature
IOS Implementation of the ibgp PE CE Feature Document ID: 117567 Contributed by Luc De Ghein, Cisco TAC Engineer. Apr 04, 2014 Contents Introduction Background Information Implement ibgp PE CE BGP Customer
More information32-bit ASNs. Philip Smith. MENOG 5, Beirut, 29th October 2009
32-bit ASNs Philip Smith MENOG 5, Beirut, 29th October 2009 Autonomous System (AS) AS 100 Collection of networks with same routing policy Single routing protocol Usually under single ownership, trust and
More informationIPv6 Allocation Policy and Procedure. Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan
IPv6 Allocation Policy and Procedure Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan 1 Overview Introduction to APNIC Policy development process IPv6 policy and procedures
More informationUsing Resource Certificates Progress Report on the Trial of Resource Certification
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC Sound Familiar? 4:30 pm Mail: Geoff, mate, I ve been dealing with your phone people and
More informationAdventures in RPKI (non) deployment. Wes George
Adventures in RPKI (non) deployment Wes George wesley.george@twcable.com @wesgeorge Background March 2013 FCC CSRIC III WG 6 report on Secure BGP Accurate Records, better measurements Cautious, staged
More informationProblem Statement and Considerations for ROA Mergence. 96 SIDR meeting
Problem Statement and Considerations for ROA Mergence draft-yan-sidr-roa-mergence-00 @IETF 96 SIDR meeting fuyu@cnnic.cn Background RFC 6482 1/19 ROA mergence What is the ROA mergence? is a common case
More informationAPNIC Trial of Certification of IP Addresses and ASes
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston Motivation: Address and Routing Security What we have today is a relatively insecure system that is
More informationSupporting Internet Growth and Evolution: The Transition to IPv6
2010/TEL41/DSG/WKSP2/004 Agenda Item: Panel Discussion 1 Supporting Internet Growth and Evolution: The Transition to IPv6 Submitted by: APNIC Workshop for IPv6: Transforming the Internet Chinese Taipei
More informationRIPE NCC Academic Day. November 2016 Saudi Arabia
RIPE NCC Academic Day November 2016 Saudi Arabia Who Runs the Internet? The Short Answer is No ONE!!! 2 What is the Internet? 3 What is the Internet? 4 What is the Internet? The Internet has roughly 55,000
More informationAPNIC & Internet Address Policy in the Asia Pacific
APNIC & Internet Address Policy in the Asia Pacific NZ Internet Industry Forum Auckland, 29 November 2001 Anne Lord, APNIC Overview Introduction to APNIC Policy Development Address Management APNIC Update
More informationResource Certification
Resource Certification Guide to Resource Certification in MyAPNIC Registration Guide for MyAPNIC Page 1 of 11 Table of Contents 1 Guide to Resource Certification in MyAPNIC... 3 1.1 Access to Resource
More informationSimple Multihoming. ISP Workshops. Last updated 9 th December 2015
Simple Multihoming ISP Workshops Last updated 9 th December 2015 1 Agenda p Why Multihome? p The Multihoming Toolset p How to Multihome Options p Multihoming to the same AS p Multihoming to different ASes
More informationShifting Sands. PLNOG March Andrzej Wolski Training Department
Shifting Sands PLNOG March 2014 Andrzej Wolski Training Department RIPE NCC 2 Began operating in 1992 Not-for-profit membership organisation 10,000 members (Local Internet Registries) Neutral, Impartial,
More informationBGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith , Oakland 2001, Cisco Systems, Inc. All rights reserved. 1 Presentation Slides Available on NANOG Web site www.nanog.org/mtg-0110/smith.html Available
More informationIPv6, Act Now! Daniel Karrenberg, RIPE NCC Chief Scientist
IPv6, Act Now! Daniel Karrenberg, RIPE NCC Chief Scientist Who is talking: Daniel Karrenberg 1980s: helped build Internet in Europe EUnet, Ebone, IXes,... RIPE 1990s: helped build RIPE NCC 1st CEO: 1992-2000
More informationAPNIC Update TWNIC OPM 1 JUL George Kuo Manager, Member Services, APNIC
APNIC Update TWNIC OPM 1 JUL 2010 George Kuo Manager, Member Services, APNIC Overview Services Update APNIC 29 Policy Outcomes APNIC Activities Technical Developments IPv6 Program Training Other News Upcoming
More information