Route Security for Inter-domain Routing

Size: px
Start display at page:

Download "Route Security for Inter-domain Routing"

Transcription

1

2 Route Security for Inter-domain Routing Alvaro Retana Distinguished Engineer, Cisco Services

3 3

4 This could happen to YOUR network 4

5 This could happen be happening to YOUR network 5

6 Agenda Review of problem to solve Resource Public Key Infrastructure as the base for a secure inter-domain routing solution BGP Origin AS Validation Call for action Summary and take-aways 6

7 Agenda Review of problem to solve Resource Public Key Infrastructure as the base for a secure inter-domain routing solution BGP Origin AS Validation Call for action Summary and take-aways 7

8 This presentation is NOT about traditional BGP Security and Stability problems Peering Authentication Goal: Verify that my peer is in fact my peer. The TCP Session can be Authenticated instead: MD-5 and TCP-AO in the future Error Correction Error detection results in resetting of the peering session! The IETF is working on related solutions Rich Policy BGP is a very policy rich protocol Each AS is in fact autonomous when making policy and forwarding decisions Result may be undesired flows from policy application This session IS about BGP Update Content Validation, particularly BGP AS-PATH attribute 8

9 AS-PATH is the attribute that records ASes transited by BGP UPDATE message AS 10 AS 20 AS 40 R2 R4 R1 R6 R3 R5 AS 30 9

10 The problem has been narrowed down to two statements Problem Statement 1: BGP Secure Origin AS Is the origin AS authorized to originate the BGP announcement? Problem Statement 2: Path Validation Can I trust the list of ASes in the AS-PATH attribute in that particular order? 10

11 AS-PATH is the attribute that records ASes transited by BGP UPDATE message AS 10 AS 20 AS 40 R2 R4 R1 From R2 Perspective: - Problem Statement 1 (BGP Secure Origin AS): Is AS40 authorized to originate an announcement for /16? R3 R5 - Problem Statement 2 (Path Validation): Does the route AS40 -> AS20 represent the exact path the BGP UPDATE message took*? AS 30 R6 11

12 Problem 1: BGP Secure Origin AS AS 10 AS 20 AS 40 R2 R4 R1 R6 R5 AS 30 AS30 ends up hijacking route /16 12

13 Problem is too common for comfort - FCC CSRIC 2013* - Main cause are normally attributed to typos, software glitches or bad operational practices - Some incidents are more suspicious than others Ref: * 13

14 Incidents can be geographically contained IXP Route Server: Open Peering Some provider incident in a big country: 1- AS1 generates BGP announcements to Route Server by redistributing IGP with especial tag X AS1 AS2 2- AS1 re-distributed Full Internet Table and mistakenly assigning tag X AS1 IGP 3- AS1 announces full BGP table to IXP Route Server with ASPATH AS1 (length=1) 4- Route Server distribute all routes to all participants 5- All Internet traffic through IXP to AS1 Full Internet Table 6- ebgp session from AS1 to Route-Server turned down due to traffic conditions 7- Repeat 14

15 Solving Inter-domain routing security dimensions are smaller compared to other global security challenges Inter-Domain Routing 2013(*): Number of Address Registries: 15 Total Number of Prefixes: Total ASes present in Table: Origin Only ASes: / Transit Ases: 5962 ASes announcing only one IPv4 prefix: Average prefixes per AS: Unregistered ASNs in the Routing Table: 274 DNS 2010 (**): Number of DNS Registries: 100s Total Number of domain names: Total Number of organizations running DNSSEC validation server.every home in the world? (*) Ref: Global Routing Table report: - Nov 2013 (**) Ref:ICANN Dashboard 2010 stats: 15

16 Problem 2: Incorrect Path Announcement AS 10 originates a prefix and only announces it to AS 15 AS 20 inserts itself in the ASPATH and incorrectly announces AS 10 s prefix to AS 40, AS 60, and AS 50 who ends up choosing path from AS 20 instead of AS / /16 AS 30, AS15, AS 10 AS 20, AS 10 AS 30 AS 15 AS 10 AS 40 AS /16 Fake Origin: AS /16 AS40, AS 30, AS 15, AS 10 AS 20, AS 10 AS 60 AS /16 AS 30, AS 15, AS 10 AS 20, AS 10 AS 20 ends up hijacking route announced by AS 10 16

17 Problem 2: Incorrect Path Announcement Man in the middle example: Stealing the Internet, Defcon 16. Alex Pilosov and Tony Kompela Targeting: AS50 & AS60 traffic toward AS /16 AS 30, AS15, AS 10 AS 20, AS 10 AS /16 AS 40, AS 30, AS 15, AS 10 AS 20, AS 10 no-export AS 60 Do not poison AS40 and use it for return path TTL Manipulation to enable stealth Packets forwarded to AS /16 AS 30 AS 15 AS 10 AS 20 AS 50 AS 20 ends up hijacking traffic from AS50 & AS60 towards AS 10 and traceroutes do not detect them 10.1/16 AS 30, AS 15, AS 10 AS 20, AS 10 no-export 17

18 Securing inter-domain routing has three components RPKI Infrastructure Offline repository of verifiable secure objects based on public key cryptography Follows resources (IPv4/v6 + ASN) allocation hierarchy to provide right of use You only validate the Origin AS of a BGP UPDATE BGP Secure Origin AS Solves most frequent incidents (*) No changes to BGP nor router s hardware impact Standardization almost finished and running code BGP PATH Validation BGPSEC proposal under development at IETF Requires forward signing ASPATH attribute Changes in BGP and possible routers (*) Ref: How Secure are Secure BGP Protocols, Sharon Goldberg, Microsoft Research & Boston University, NANOG 49 18

19 Agenda Review of problem to solve Resource Public Key Infrastructure as the base for a secure inter-domain routing solution BGP Origin AS Validation Call for action Summary and take-aways 19

20 Solution Space for Resource Authentication VS Hierarchical CA Chain: SMIME, TLS Web of Trust: PGP 20

21 How does Resource allocation work in the Internet? Central Registry: 0/0, ::/0 and all ASNs Allocations available here: Regional Registries receive large resource blocks from IANA: 21

22 Solution Space for Resource Authentication VS Hierarchical CA Chain: SMIME, TSL Web of Trust: PGP RPKI implements a resource certification chain of trust based on X.509 certificates 22

23 X509 as the base technology for RPKI ITU standard issued in 1988 Assumes a hierarchy system of Certificate Authorities (CAs) for issuing certificates. A certificate is a ASN.1 document, which profile is defined by RFC5280 Each CA issues certificates and which may be publically available in a repository Each CA will also issue a Certificate Revocation List (CRL) listening all certificates that have been revoked A Relaying party is an entity that performs the validation of X509 certificates Example applications for X509: Mail Authentication (SMIME), Web Server Authentication (TLS), User Authentication (TLS, SSO), etc. 23

24 X.509 most relevant certificate fields Version = 3 Serial Number Algorithm ID Issuer Validity: Not Before Not After Subject Unique ID in a CA for certificate. Used to identify certificate in CRL Creates Hierarchy: Parent CA to Child CA CA to End Entity (EE) Subject Information Access (SIA): URI for CA s publication point CRL Distribution Points: URI with CRL location Subject Public Key Extensions (optional) Certificate Signature 24

25 RPKI profile of X509 certificates RPKI is not an identity PKI. Names are meaningless. RFC 3779 creates an extensions to encode IP addresses and ASNs in an X509 certificate. Version Serial Number Signature Algorithm Issuer Subject Subject Public Key You can include either a prefix or an address range without CIDR boundary RFC 3779 extensions could be inherited from issuer to subject Extensions: Subject Information Authority (SIA) Access Authority Information (AIA) Addr: ASid:

26 Complete RPKI framework Issuer: IANA Subject: IANA Public Key IANA 0/0 Signed by IANA CA Trust Anchor IANA private key Issuer: IANA Subject: RIPE Public Key RIPE 193/8 Signed by IANA CA RIPE NCC private key Issuer: RIPE NCC CA Subject: ISP/LIR Public Key ISP/LIR /16 Signed by RIPE ISP/LIR private key 26

27 RPKI Signed Objects Cryptographic Message Syntax (RFC 5652) allows the signature/encryption of arbitrary data using ASN.1 format Examples of CMS use include: secure [RFC5751], key management [RFC5958], and firmware updates [RFC4108] Each Signed Object needs to be signed by an End-Entity Certificate and not by a CA certificate In RPKI an EE certificate is normally created for each signed object and it is included in the CMS wrapper. RPKI objects based on CMS: - Route Origin Authorizations (.roa) - Ghostbusters Record (.gbr) - Manifests for the Resource Public Key Infrastructure (.mft) 27

28 Route Origin Attestation (ROA) It is the End Goal for BGP Origin AS that ties IP address to Origin AS Validation only happens based on IP address hierarchy and NOT on Origin AS You can insert any AS number In a same ROA you can make several assertions. No need for one prefix=one ROA for the same origin AS. Important Fields: - ROAIPAddress: Prefixes/Prefix Legnth) - maxlength (optional): maximum length of the IP address prefix that the AS is authorized to advertise. If not available maxlength=prefix Length 28

29 Route Origin Attestation (ROA) Each AS publishes a cryptographically signed ROA that declares association of its prefixes with an Origin AS ROA /20-22 AS 3130 Signature The ROA says I m authorizing AS <3130> to be the origin for prefix < /20-22> and you can prove this by verifying the signature on this ROA With max-length=22, I do not need to enumerate every /20, /21 and /22 for these address block (similar as le statement in ip prefix lists ) 29

30 Complete RPKI framework Issuer: IANA CA Subject: IANA Public Key IANA 0/0 Signed by IANA OrgX_EE EE Issuer: IANA CA Subject: RIPE Public Key RIPE 193/8 Signed by IANA Issuer: RIPE NCC CA Subject: ISP/LIR Public Key ISP/LIR /20 Signed by ISP/LIR ROA /20-22 AS 3130 Signed by ISP/LIR /16 Signed by RIPE 30

31 RPKI Repository Infrastructure RIPE NCC s Repository Certificates RPKI Validator ROA Validation outcome: VALID: The ROA is conforming with validation process ROAs ROAs INVALID: The ROA is not conforming with validation process (*) Picture taken from RIPE RPKI training material 31

32 RPKI Infrastructure Management Hosted Model: Most entities (Hosted by RIR) RIR implements the certification application to create and maintain signed objects for the entities RIR publishes the entities s signed object in a public and highly available repositories RIR hosts the members private key Delegated model: National registries or entities that needs to keep business logic RIR only signs and publishes CA certificate for the entity The entity implements application for generation of additional signed objects The entity mantains repository for those additional signed objects Delegated entity can sub-delegate to other child-cas Communication between CAs is performed via the RPKI provisioning protocol (UP/DOWN) Open Source tool available at: 32

33 RPKI adoption growing particularly in LATAM and Europe since launch in 2012 There is not IANA root yet, each region has its own self-signed CA All regions have hosted services offering for IPv4/IPv6 since 2012 Currently 4% of global prefixes covered but growing extremely fast (300% yearly) Picture taken on Jan 6 th 2014 at: 33

34 Agenda Review of problem to solve Resource Public Key Infrastructure as the base for a secure inter-domain routing solution BGP Origin AS Validation Call for action Take-aways Summary and take-aways 34

35 Deeper Look at RPKI Infrastructure Parent CA RPKI Infrastructure Publication protocol repository rsync Verified ROA Payloads (VRPs) using rpki-router protocol Peering Router ebgp BGP Peer Provisioning Protocol (up/down) RPKI Validator & Cache ibgp Parent CA Publication protocol repository rsync VRPs via RTR Peering Router Configure your ROA: Authorize the use of your prefixes and publish to the rest of the word ISP Infrastructure (relaying party) ebgp Configure your trust anchors: Who to you trust to set your policies? BGP Peer 35

36 Cisco: adding BGP Origin AS validation to routers Parent CA RPKI Infrastructure Publication protocol repository rsync Verified ROA Payloads (VRPs) using rpki-router protocol Peering Router ebgp BGP Peer Provisioning Protocol (up/down) RPKI Validator & Cache ibgp Parent CA Publication protocol repository rsync VRPs via RTR Peering Router Configure your ROA: Authorize the use of your prefixes and publish to the rest of the word ISP Infrastructure (relaying party) ebgp Configure your trust anchors: Who to you trust to set your policies? BGP Peer 36

37 Cache Validator & Router Interaction ee - Receive prefixes from IBGP & EBGP peers - Inline origin validation by looking up validation database - Event-based validation on cache updates AF specific Validated ROA Payload (VRP) database Cache-to-router protocol (TCP, TCP with authentication, or SSH) RPKI Validator Server AF Specific BGP tables ebgp peering /9 origin BGP Speaker IPv4 Unicast VRP Database Prefix Max Length Origin AS ibgp peering (origin validation extended community) / IBGP Neighbor Router (ex. Route Reflector) BGP Table with Validation State (removing additional BGP attributes) Possible states: valid / invalid / not found No Crypto in the router. Only control plane software update required Prefix Origin AS RPKI State EBGP Neighbor Router / Valid 37 37

38 BGP Modifications Prefix Validation Logic 1. query key = <BGP prefix, masklen>, data = origin AS 2. result = BGP_PFXV_STATE_NOT_FOUND 3. walk prefix VRP table to look for the query key 4. for each matched entry node in VRP table, 5. prefix_exists = TRUE 6. walk all records with different maxlength values 7. for each record within range (query masklen <= maxlength) 8. if query origin AS == record origin AS 9. result = BGP_PFXV_STATE_VALID 10. return (result) 11. endif 12. endfor 13. endfor 14. if prefix_exists == TRUE, 15. result = BGP_PFXV_STATE_INVALID 16. endif 17. return (result) 38 Geek - o - meter

39 BGP Modifications Path Validation State Path Validation States (in order of preference) BGP_PFX_STATE_VALID (Lookup Successful) BGP_PFX_STATE_NOT_FOUND (None in the table) BGP_PFX_STATE_INVALID (Lookup invalid maybe a wrong origin AS or masklength not in the range) Path validation state computed for EBGP paths 39

40 Setting up the validation states in routers Validated ROA Payload (VRP)unique entry: Prefix= /20, max_length=22, origin AS=3130 Received Announcements in ebgp session: /19 Origin AS /20 Origin AS /20 Origin AS /22 Origin AS /24 Origin AS /22 Origin AS /24 Origin AS 3131 Green = valid Orange = not found Red = invalid 40

41 Setting up the validation states in routers Validated ROA Payload (VRP)unique entry: Prefix= /20, max_length=22, origin AS=3130 Received Announcements in ebgp session: /19 Origin AS /20 Origin AS /20 Origin AS /22 Origin AS /24 Origin AS /22 Origin AS /24 Origin AS Green = valid Orange = not found Red = invalid 41

42 Setting up the validation states in routers Validated ROA Payload (VRP)unique entry: Prefix= /20, max_length=22, origin AS=3130 Received Announcements in ebgp session: /19 Origin AS /20 Origin AS /20 Origin AS /22 Origin AS /24 Origin AS /22 Origin AS /24 Origin AS Green = valid Orange = not found Red = invalid 42

43 Setting up the validation states in routers Validated ROA Payload (VRP)unique entry: Prefix= /20, max_length=22, origin AS=3130 Received Announcements in ebgp session: /19 Origin AS 3130 Origin AS Violation /20 Origin AS /20 Origin AS 3130 Max-Length Violation /22 Origin AS /24 Origin AS /22 Origin AS /24 Origin AS Origin AS and Max-Length Violations Green = valid Orange = not found Red = invalid 43

44 Setting up the validation states in routers Validated ROA Payload (VRP)unique entry: Prefix= /20, max_length=22, origin AS=3130 Received Announcements in ebgp session: /19 Origin AS /20 Origin AS /20 Origin AS /22 Origin AS /24 Origin AS /22 Origin AS /24 Origin AS Green = valid Orange = not found Red = invalid 44

45 BGP Modifications for Origin AS Validation EBGP update Perform origin validation Apply inbound policy (policy _may_ match on validity state and set arbitrary attributes) Add to ADJ- RIB-IN Run BGP Bestpath Router Install Route in RIB & FIB IBGP update (advertised with the attributes modified by outbound policy and/or with an origin validation extended community) 45

46 Cisco Implementation of BGP Origin Validation Cisco has been testing engineering code since 2009 in public and private testbeds Implementation of the following features in IOS/XE and IOS-XR: RPKI/Router Protocol (RFC 6810) - Tested with publicly available RP software BGP Prefix Origin Validation (RFC 6811) - Load much less than ACLs: 10us per Update - Full policy control for valid/invalid/not found prefixes BGP Prefix Origin Validation State Extended Community (draft-ietf-sidr-originvalidation-signaling) - Only valid for Internal BGP peers 46

47 Some Configuration details (IOS) Setting up a connection to a cache server: router bgp bgp rpki server tcp port 2222 refresh 60 Do not deny invalid routes: router bgp address-family ipv4 bgp bestpath prefix-validate allow-invalid Enabling Extended Community for ibgp neighbor: router bgp address-family ipv4 neighbor announce rpki state 47 47

48 Some Configuration details (IOS) Policy management using Route-Maps and RPKI states: router bgp address-family ipv4 unicast neighbor route-map localpref out exit route-map localpref permit 10 match rpki valid set local-preference 200 Policies can be set for valid / invalid /not found 48 48

49 Some troubleshooting details (IOS) RPKI cache servers status: route#show ip bgp rpki servers BGP SOVC neighbor is /2222 connected to port 2222 Flags 448, Refresh time is 60, Serial number is 3, Nonce is InQ has 0 messages, OutQ has 0 messages, formatted msg 2 Session IO flags 3, Session flags 4000 Neighbor Statistics: Prefixes 1317 Connection attempts: 1 Connection failures: 0 Errors sent: 0 Errors received:

50 Some troubleshooting details (IOS) RPKI table status: route#show ip bgp rpki table 989 BGP sovc network entries using bytes of memory 1061 BGP sovc record entries using bytes of memory Network Maxlen Origin-AS Source Neighbor / / / /2222. router#show bgp ipv6 unicast rpki table 239 BGP sovc network entries using bytes of memory 256 BGP sovc record entries using 5120 bytes of memory Network Maxlen Origin-AS Source Neighbor 2001:608::/ / :610::/ /

51 Some troubleshooting details (IOS) BGP Origin validation summary information: router#show ip bgp summary BGP router identifier , local AS number BGP table version is , main routing table version Path RPKI states: 3214 valid, not found, 2504 invalid BGP Origin validation in BGP table: router#show ip bgp.. RPKI validation codes: V valid, I invalid, N Not found Network Next Hop Metric LocPrf Weight Path *> N / I.. *> N / i 51 51

52 Some troubleshooting details (IOS) Prefix validation state: router#show ip bgp /18 BGP routing table entry for /18, version Paths: (1 available, best #1, table default) Not advertised to any peer Refresh Epoch , (received & used) from ( ) Origin IGP, localpref 100, valid, external, best path 0D1AE740 RPKI State valid 52 52

53 IOS-XR Policy and Path Validation State RPL extended to modify policies based on path validation state IOS-XR RPL example: route-policy rpki if validation-state is invalid then set local-preference 50 else if validation-state is valid then set local-preference 200 else pass endif end policy 53 53

54 IOS-XR Config Commands router bgp bgp router-id rpki cache transport tcp refresh-time 120! neighbor remote-as

55 IOS-XR Show Commands IOX#sh bgp origin-as validity [snip] RPKI validation codes: V valid, I invalid, U unknown, d disabled, n not-applicable Network Next Hop Metric LocPrf Weight Path V*> / i I* / i U*> / ? Processed 3 prefixes, 3 paths 55 55

56 IOS-XR Records (RPKI) Table IOX#show bgp rpki table Network Maxlen Origin-AS Cache / / * / / / * * Source cache is down / ROAs are pending removal Processed 5 RPKI entries 56 56

57 IOS-XR Show Commands Valid Prefix IOX#show bgp /25 Mon May 16 02:07: PDT BGP routing table entry for /25 Versions: Process brib/rib SendTblVer Speaker Last Modified: May 15 14:22: for 11:44:38 Paths: (1 available, best #1) Advertised to peers (in unique update groups): Path #1: Received by speaker from ( ) Origin IGP, localpref 100, valid, external, best, group-best Received Path ID 0, Local Path ID 1, version 23 Origin-AS validity: valid 57 57

58 Agenda Review of problem to solve Resource Public Key Infrastructure as the base for a secure routing solution BGP Origin AS Validation Call for action Summary and take-aways 58

59 Call for action 1. Create your ROAs at the RIR Portal! 1. Check if your current software releases support RPKI 2. Test validator server, qualify traffic without modifying routing policies 3. Start applying routing policies in islands of trust 59 59

60 Call for action Evangelize a more secure inter-domain routing in your network operators community 60 60

61 An RPKI island of trust in Ecuador (Sept 2013) Near closed inter-domain routing community where full community decides to implement RPKI in an island of trust 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% RPKI Evolution for Ecuador % IPv4 space covered 0% 7/19 7/26 8/2 8/9 8/16 8/23 8/30 9/6 9/13 9/20 61

62 Take-Aways Problem too common for comfort Origin validation as first outcome from standardization bodies solves most frequent problems RPKI is the off-line trust infrastructure based on x.509 certificates that follows address allocation hierarchy Cisco supports BGP Origin AS Validation in IOS/XE and IOS-XR. Your current release may support it! Go and create your ROAs in 2 minutes today! 62

63 Complete Your Online Session Evaluation Give us your feedback and you could win fabulous prizes. Winners announced daily. Complete your session evaluation through the Cisco Live mobile app or visit one of the interactive kiosks located throughout the convention center. Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at CiscoLive.com/Online 63

64 Continue Your Education Demos in the Cisco Campus Walk-in Self-Paced Labs Table Topics Meet the Engineer 1:1 meetings 64

65

66

67 RPKI Router Protocol Protocol to distribute *digested* RPKI information in form of (prefix range, Origin AS) Routers avoid dealing with RPKI complexity Has a client and a Server side functionality Use SSHv2 as a transport layer Distributes *digested* RPKI information using fix length Protocol PDUs IOS has currently implemented the Client side functionality Initial IOS release plans to run TCP as a transport. Eventually will be replaced with SSHv2. IOS-XR supports SSHv2. 67

68 RPKI Router Protocol PDUs Serial Notify Local Cache informs router about new data Serial Query Router requests Cache for updates Uses End Of Data PDU to signal end of transfer Reset Query Router requests Cache to send its entire database Cache Response Cache replies to Reset Query by announcing its entire database End of Data PDU Cache signals end of database announcements 68

69 RPKI Router Protocol PDUs (cont d) IPv4 PDU Local Cache informs router of ipv4 prefix range and its associated origin AS IPv6 PDU Local Cache informs router of ipv6 prefix range and its associated origin AS Cache Reset Local Cache informs router about its inability to provide an incremental update for a particular Serial Query Error Report Use to signal errors detected while parsing PDUs Internal Errors: memory exhaustion, code assertion failures, etc No Data Available: Cache cannot provide an incremental update to a particular Serial Query. 69

70 RPKI Router Protocol Typical Exchange Cache Router ~ ~ <----- Reset Query R requests data Cache Response -----> C confirms request IPvX Prefix > C sends zero or more IPvX Prefix > IPv4 and IPv6 Prefix IPvX Prefix > Payload PDUs End of Data > C sends End of Data and sends new serial 70

71 RPKI Router Protocol Incremental Exchange (cont d) Cache ~ ~ Router Notify > (optional) <----- Serial Query R requests data Cache Response -----> C confirms request IPvX Prefix > C sends zero or more IPvX Prefix > IPv4 and IPv6 Prefix IPvX Prefix > Payload PDUs End of Data > C sends End of Data and sends new serial ~ ~ 71

72 References Current IETF Related Work: BGP Error Correction: - Operational Requirements for Enhanced Error Handling Behaviour in BGP-4 (draft-ietf-grow-ops-reqs-for-bgp-error-handling) - Revised Error Handling for BGP UPDATE (draft-ietf-idr-error-handling) - Graceful BGP session shutdown (draft-ietf-grow-bgp-gshut) BGP Rich Policy: - Making BGP filtering a habit: Impact on policies (draft-cardona-filtering-threats) 72

73 Code Availability RPKI Certificate Authority RPKI.NET: Cache Validator Software - RPKI.NET: - RIPE NCC Validation software: - Relying Party Security Technology for Internet Routing (BBN): 73

Introducción al RPKI (Resource Public Key Infrastructure)

Introducción al RPKI (Resource Public Key Infrastructure) Introducción al RPKI (Resource Public Key Infrastructure) Roque Gagliano rogaglia@cisco.com 4 Septiembre 2013 Quito, Equator 2011 Cisco and/or its affiliates. All rights reserved. 1 Review of problem to

More information

Resource PKI. NetSec Tutorial. NZNOG Queenstown. 24 Jan 2018

Resource PKI. NetSec Tutorial. NZNOG Queenstown. 24 Jan 2018 Resource PKI NetSec Tutorial NZNOG2018 - Queenstown 24 Jan 2018 1 Fat-finger/Hijacks/Leaks Bharti (AS9498) originates 103.0.0.0/10 Dec 2017 (~ 2 days) No damage more than 8K specific routes! Google brings

More information

BGP Origin Validation

BGP Origin Validation BGP Origin Validation ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

The RPKI & Origin Validation

The RPKI & Origin Validation The RPKI & Origin Validation RIPE / Praha 2010.05.03 Randy Bush Rob Austein Steve Bellovin And a cast of thousands! Well, dozens :) 2010.05.03 RIPE RPKI

More information

Securing BGP - RPKI. ThaiNOG Bangkok. 21 May Tashi Phuntsho

Securing BGP - RPKI. ThaiNOG Bangkok. 21 May Tashi Phuntsho Securing BGP - RPKI ThaiNOG2018 - Bangkok 21 May 2018 Tashi Phuntsho (tashi@apnic.net) 1 Fat-finger/Hijacks/Leaks Amazon (AS16509) Route53 hijack April2018 AS10279 (enet) announced/originated more specifics

More information

RPKI. Resource Pubic Key Infrastructure

RPKI. Resource Pubic Key Infrastructure RPKI Resource Pubic Key Infrastructure Purpose of RPKI RPKI replaces IRR or lives side by side? Side by side: different advantages Security, almost real time, simple interface: RPKI Purpose of RPKI Is

More information

ISP 1 AS 1 Prefix P peer ISP 2 AS 2 Route leak (P) propagates Prefix P update Route update P Route leak (P) to upstream 2 AS 3 Customer BGP Update messages Route update A ISP A Prefix A ISP B B leaks

More information

Resource Certification. Alex Band, Product Manager DENIC Technical Meeting

Resource Certification. Alex Band, Product Manager DENIC Technical Meeting Resource Certification Alex Band, Product Manager DENIC Technical Meeting Internet Routing Routing is non-hierarchical, open and free Freedom comes at a price: - You can announce any address block on your

More information

The RPKI & Origin Validation

The RPKI & Origin Validation The RPKI & Origin Validation NANOG / Denver 2011.06.12 Randy Bush Rob Austein Steve Bellovin Michael Elkins And a cast of thousands!

More information

The RPKI and BGP Origin Validation

The RPKI and BGP Origin Validation The RPKI and BGP Origin Validation APRICOT / New Delhi 2012.02.27 Randy Bush Rob Austein Steve Bellovin And a cast of thousands! Well, dozens :) 2012.02.27

More information

Resource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC

Resource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC Resource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC Target Audience Knowledge of Internet Routing(specially BGP) Fair idea on Routing Policy No need to know Cryptography Basic knowledge

More information

IETF81 Secure IDR Rollup TREX Workshop David Freedman, Claranet

IETF81 Secure IDR Rollup TREX Workshop David Freedman, Claranet IETF81 Secure IDR Rollup TREX Workshop 2011 David Freedman, Claranet Introduction to Secure IDR (SIDR) You are in a darkened room at the IETF. You are surrounded by vendors. A lone operator stands quietly

More information

BGP Origin AS Validation

BGP Origin AS Validation The feature helps prevent network administrators from inadvertently advertising routes to networks they do not control. This feature uses a Resource Public Key Infrastructure (RPKI) server to authenticate

More information

APNIC elearning: BGP Basics. 30 September :00 PM AEST Brisbane (UTC+10) Revision: 2.0

APNIC elearning: BGP Basics. 30 September :00 PM AEST Brisbane (UTC+10) Revision: 2.0 APNIC elearning: BGP Basics 30 September 2015 1:00 PM AEST Brisbane (UTC+10) Issue Date: 07 July 2015 Revision: 2.0 Presenter Nurul Islam (Roman) Senior Training Specialist, APNIC Nurul maintains the APNIC

More information

RPKI Introduction. APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By:

RPKI Introduction. APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By: RPKI Introduction APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By: 1 Content Why do we need RPKI What is RPKI How to deploy RPKI Configuration case Misdirection / Hijacking Incidents

More information

Overview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies

Overview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies Overview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies Presentation Outline The BGP security problem RPKI overiew Address & AS number allocation system Certificates

More information

Introduction to BGP. ISP Workshops. Last updated 30 October 2013

Introduction to BGP. ISP Workshops. Last updated 30 October 2013 Introduction to BGP ISP Workshops Last updated 30 October 2013 1 Border Gateway Protocol p A Routing Protocol used to exchange routing information between different networks n Exterior gateway protocol

More information

Update on Resource Certification. Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008

Update on Resource Certification. Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008 Update on Resource Certification Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008 Address and Routing Security What we have had for many years is a relatively insecure interdomain routing system

More information

A PKI For IDR Public Key Infrastructure and Number Resource Certification

A PKI For IDR Public Key Infrastructure and Number Resource Certification A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect

More information

Problem. BGP is a rumour mill.

Problem. BGP is a rumour mill. Problem BGP is a rumour mill. We want to give it a bit more authorita We think we have a model AusNOG-03 2009 IP ADDRESS AND ASN CERTIFICATION TO IMPROVE ROUTING SECURITY George Michaelson APNIC R&D ggm@apnic.net

More information

32-bit ASNs. Philip Smith. AfNOG rd April 1st May Abuja, Nigeria

32-bit ASNs. Philip Smith. AfNOG rd April 1st May Abuja, Nigeria 32-bit ASNs Philip Smith AfNOG 2007 23rd April 1st May Abuja, Nigeria Autonomous System (AS) AS 100 Collection of networks with same routing policy Single routing protocol Usually under single ownership,

More information

IETF Activities Update

IETF Activities Update IETF Activities Update Marla Azinger marla.azinger@frontiercorp.com ARIN XXV APR 20, 2010 Toronto Note This presentation is not an official IETF report There is no official IETF Liaison to ARIN or any

More information

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Network Working Group M. Lepinski, Ed. Internet-Draft BBN Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Abstract BGPSEC Protocol Specification draft-ietf-sidr-bgpsec-protocol-09

More information

Module 6 Implementing BGP

Module 6 Implementing BGP Module 6 Implementing BGP Lesson 1 Explaining BGP Concepts and Terminology BGP Border Gateway Protocol Using BGP to Connect to the Internet If only one ISP, do not need BGP. If multiple ISPs, use BGP,

More information

RPKI and Internet Routing Security ~ The regional ISP operator view ~

RPKI and Internet Routing Security ~ The regional ISP operator view ~ RPKI and Internet Routing Security ~ The regional ISP operator view ~ APNIC 29/APRICOT 2010 NEC BIGLOBE, Ltd. (AS2518) Seiichi Kawamura 1 Agenda Routing practices of the regional ISP today How this may

More information

RPKI-Based Origin Validation Lab RPKI Lab Creative Commons: Attribution & Share Alike

RPKI-Based Origin Validation Lab RPKI Lab Creative Commons: Attribution & Share Alike RPKI-Based Origin Validation Lab 1 Issuing Parties Relying Parties GUI altca Publication Protocol Trust Anchor Resource PKI RCynic Gatherer Pseudo IRR route: 147.28.0.0/16! descr: 147.28.0.0/16-16! origin:

More information

Introduction to BGP. ISP/IXP Workshops

Introduction to BGP. ISP/IXP Workshops Introduction to BGP ISP/IXP Workshops 1 Border Gateway Protocol A Routing Protocol used to exchange routing information between different networks Exterior gateway protocol Described in RFC4271 RFC4276

More information

R&E ROUTING SECURITY BEST PRACTICES. Grover Browning Karl Newell

R&E ROUTING SECURITY BEST PRACTICES. Grover Browning Karl Newell R&E ROUTING SECURITY BEST PRACTICES Grover Browning Karl Newell RFC 7454 BGP Operations & Security Feb, 2015 https://tools.ietf.org/html/rfc7454 [ 2 ] Agenda Background / Community Development Overview

More information

Security in inter-domain routing

Security in inter-domain routing DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks

More information

32-bit ASNs. Philip Smith. MENOG 5, Beirut, 29th October 2009

32-bit ASNs. Philip Smith. MENOG 5, Beirut, 29th October 2009 32-bit ASNs Philip Smith MENOG 5, Beirut, 29th October 2009 Autonomous System (AS) AS 100 Collection of networks with same routing policy Single routing protocol Usually under single ownership, trust and

More information

IETF Activities Update

IETF Activities Update IETF Activities Update Marla Azinger marla.azinger@frontiercorp.com ARIN XXVI OCT 2010 Atlanta, GA Note This presentation is not an official IETF report There is no official IETF Liaison to ARIN or any

More information

Connecting to a Service Provider Using External BGP

Connecting to a Service Provider Using External BGP Connecting to a Service Provider Using External BGP First Published: May 2, 2005 Last Updated: August 21, 2007 This module describes configuration tasks that will enable your Border Gateway Protocol (BGP)

More information

Internet Resource Certification and Inter- Domain Routing Security! Eric Osterweil!

Internet Resource Certification and Inter- Domain Routing Security! Eric Osterweil! Internet Resource Certification and Inter- Domain Routing Security! Eric Osterweil! Who is allowed to do what?! BGP (the Internet s inter-domain routing protocol) runs by rumor Participants assert reachability

More information

Securing BGP: The current state of RPKI. Geoff Huston Chief Scientist, APNIC

Securing BGP: The current state of RPKI. Geoff Huston Chief Scientist, APNIC Securing BGP: The current state of RPKI Geoff Huston Chief Scientist, APNIC Incidents What happens when I announce your addresses in BGP? All the traffic that used to go to you will now come to me I can

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology internet technologies and standards Piotr Gajowniczek BGP (Border Gateway Protocol) structure of the Internet Tier 1 ISP Tier 1 ISP Google

More information

Internet Engineering Task Force (IETF) Category: Informational ISSN: February 2012

Internet Engineering Task Force (IETF) Category: Informational ISSN: February 2012 Internet Engineering Task Force (IETF) G. Huston Request for Comments: 6483 G. Michaelson Category: Informational APNIC ISSN: 2070-1721 February 2012 Abstract Validation of Route Origination Using the

More information

Secure Routing with RPKI. APNIC44 Security Workshop

Secure Routing with RPKI. APNIC44 Security Workshop Secure Routing with RPKI APNIC44 Security Workshop Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services

More information

BGP Route Reflector Commands

BGP Route Reflector Commands This chapter provides details of the commands used for configuring Border Gateway Protocol (BGP) Route Reflector (RR). address-family (BGP), on page 2 keychain, on page 5 neighbor (BGP), on page 7 remote-as

More information

Resource Public Key Infrastructure

Resource Public Key Infrastructure Resource Public Key Infrastructure A pilot for the Internet2 Community to secure the global route table Andrew Gallo The Basics The Internet is a self organizing network of networks. How do you find your

More information

BGP Attributes and Policy Control

BGP Attributes and Policy Control BGP Attributes and Policy Control ISP/IXP `2005, Cisco Systems, Inc. All rights reserved. 1 Agenda BGP Attributes BGP Path Selection Applying Policy 2 BGP Attributes The tools available for the job `2005,

More information

Life After IPv4 Depletion

Life After IPv4 Depletion 1 Life After IPv4 Depletion Jon Worley Analyst Securing Core Internet Functions Resource Certification, RPKI Mark Kosters Chief Technology Officer 2 Core Internet Functions: Routing & DNS The Internet

More information

Robust Inter-Domain Routing

Robust Inter-Domain Routing Establishing the Technical Basis for Trustworthy Networking Robust Inter-Domain Routing Addressing Systemic Vulnerabilities in BGP Doug Montgomery (dougm@nist.gov) Manager, Internet and Scalable Systems

More information

32-bit ASNs. Philip Smith. Last updated February 2010

32-bit ASNs. Philip Smith. Last updated February 2010 32-bit ASNs Philip Smith Last updated February 2010 Autonomous System (AS) AS 100 Collection of networks with same routing policy Single routing protocol Usually under single ownership, trust and administrative

More information

RTRlib. An Open-Source Library in C for RPKI-based Prefix Origin Validation. Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H.

RTRlib. An Open-Source Library in C for RPKI-based Prefix Origin Validation. Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. RTRlib An Open-Source Library in C for RPKI-based Prefix Origin Validation Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller m.waehlisch@fu-berlin.de schmidt@informatik.haw-hamburg.de

More information

Deploying RPKI An Intro to the RPKI Infrastructure

Deploying RPKI An Intro to the RPKI Infrastructure Deploying RPKI An Intro to the RPKI Infrastructure VNIX-NOG 24 November 2016 Hanoi, Vietnam Issue Date: Revision: Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours)

More information

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783.

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783. Understanding, Implementing and troubleshooting BGP 01 Introduction http:// Instructor Introduction Keith Barker, CCIE #6783 CCIE Routing and Switching 2001 CCIE Security 2003 kbarker@ine.com YouTube -

More information

Connecting to a Service Provider Using External BGP

Connecting to a Service Provider Using External BGP Connecting to a Service Provider Using External BGP This module describes configuration tasks that will enable your Border Gateway Protocol (BGP) network to access peer devices in external networks such

More information

BGP Attributes and Path Selection

BGP Attributes and Path Selection BGP Attributes and Path Selection ISP Training Workshops 1 BGP Attributes The tools available for the job 2 What Is an Attribute?... Next Hop AS Path MED...... Part of a BGP Update Describes the characteristics

More information

Securing BGP. Geoff Huston November 2007

Securing BGP. Geoff Huston November 2007 Securing BGP Geoff Huston November 2007 Agenda An Introduction to BGP BGP Security Questions Current Work Research Questions An Introduction to BGP Background to Internet Routing The routing architecture

More information

Misdirection / Hijacking Incidents

Misdirection / Hijacking Incidents Security Tutorial @ TWNOG SECURE ROUTING WITH RPKI 1 Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services

More information

Resource Certification

Resource Certification Resource Certification CISSP, science group manager RIPE NCC robert@ripe.net 1 Contents Motivation for Resource Certification (RPKI) Architecture overview Participating in RPKI Most importantly: use cases

More information

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Shim6: Network Operator Concerns Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Not Currently Supporting IPv6? Many parties are going forward with IPv6 Japan

More information

Some Lessons Learned from Designing the Resource PKI

Some Lessons Learned from Designing the Resource PKI Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007 Address and Routing Security The basic security questions that need to be answered are: Is this a valid

More information

InterAS Option B. Information About InterAS. InterAS and ASBR

InterAS Option B. Information About InterAS. InterAS and ASBR This chapter explains the different InterAS option B configuration options. The available options are InterAS option B, InterAS option B (with RFC 3107), and InterAS option B lite. The InterAS option B

More information

IETF Activities Update

IETF Activities Update IETF Activities Update Marla Azinger marla.azinger@frontiercorp.com ARIN XXIV OCT 22, 2009 Note This presentation is not an official IETF report There is no official IETF Liaison to ARIN or any RIR It

More information

Internet Routing Basics

Internet Routing Basics Internet Routing Basics Back to basics J Application Presentation Application (HTTP, DNS, FTP) Data Application (HTTP, DNS, FTP) Session Transport Transport (TCP/UDP) E2E connectivity (app-to-app) Port

More information

ARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN

ARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN ARIN Support for DNSSEC and ION San Diego 11 December 2012 Pete Toscano, ARIN 2 DNS and BGP They have been around for a long time. DNS: 1982 BGP: 1989 They are not very secure. Methods for securing them

More information

Network Working Group. Intended status: Informational Expires: January 9, 2014 July 8, 2013

Network Working Group. Intended status: Informational Expires: January 9, 2014 July 8, 2013 Network Working Group G. Huston Internet-Draft G. Michaelson Intended status: Informational APNIC Expires: January 9, 2014 July 8, 2013 Abstract RPKI Validation Reconsidered draft-huston-rpki-validation-00.txt

More information

BGP FlowSpec Route-reflector Support

BGP FlowSpec Route-reflector Support The BGP (Border Gateway Protocol) Flowspec (Flow Specification) Route Reflector feature enables service providers to control traffic flows in their network. This helps in filtering traffic and helps in

More information

An Operational Perspective on BGP Security. Geoff Huston February 2005

An Operational Perspective on BGP Security. Geoff Huston February 2005 An Operational Perspective on BGP Security Geoff Huston February 2005 Disclaimer This is not a description of the approach taken by any particular service provider in securing their network. It is intended

More information

9/6/2015. COMP 535 Lecture 6: Routing Security. Agenda. In the News. September 3, 2015 Andrew Chi

9/6/2015. COMP 535 Lecture 6: Routing Security. Agenda. In the News. September 3, 2015 Andrew Chi COMP 535 Lecture 6: Routing Security September 3, 2015 Andrew Chi Includes content used with permission by Angelos Keromytis (Columbia), Philip Smith (APNIC), and Steve Kent (BBN) Agenda

More information

BGP Attributes and Policy Control

BGP Attributes and Policy Control BGP Attributes and Policy Control ISP/IXP Workshops 1 Agenda BGP Attributes BGP Path Selection Applying Policy 2 BGP Attributes The tools available for the job 3 What Is an Attribute?... Next Hop......

More information

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing BGP Routing and BGP Policy BGP Routing The BGP Routing Principles and Route Decisions based on AS-Path in a simple topology of AS s routing policy is reduced to a minimal function demonstrated in example

More information

Internet Routing Protocols Lecture 01 & 02

Internet Routing Protocols Lecture 01 & 02 Internet Routing Protocols Lecture 01 & 02 Advanced Systems Topics Lent Term, 2010 Timothy G. Griffin Computer Lab Cambridge UK Internet Routing Outline Lecture 1 : Inter-domain routing architecture, the

More information

BGP security. 19 april 2018 Copenhagen

BGP security. 19 april 2018 Copenhagen BGP security 19 april 2018 Copenhagen Agenda 14:30 Welcome and registration 15:00 Presentation 17:00 Questions 17:30 Beer & Burgers & 2 Who are we? Lucas Senior network engineer @ NL-ix in ISP business

More information

BGP Support for 4-byte ASN

BGP Support for 4-byte ASN The Cisco implementation of 4-byte autonomous system (AS) numbers uses asplain (65538, for example) as the default regular expression match and the output display format for AS numbers. However, you can

More information

Some Thoughts on Integrity in Routing

Some Thoughts on Integrity in Routing Some Thoughts on Integrity in Routing Geoff Huston Chief Scientist, APNIC What we want We want the routing system to advertise the correct reachability information for legitimately connected prefixes at

More information

RPKI in practice. Sebastian Wiesinger DE-CIX Technical Meeting June 2017

RPKI in practice. Sebastian Wiesinger DE-CIX Technical Meeting June 2017 RPKI in practice Sebastian Wiesinger sebastian.wiesinger@noris.net DE-CIX Technical Meeting June 2017 Generate ROAs Generate ROAs for your prefixes RIPE NCC makes this very easy Available at the LIR portal

More information

BGP Attributes and Policy Control

BGP Attributes and Policy Control BGP Attributes and Policy Control ISP/IXP Workshops 1 Agenda BGP Attributes BGP Path Selection Applying Policy 2 BGP Attributes The tools available for the job 3 What Is an Attribute?... Next Hop......

More information

BGP Nonstop Routing was made a default feature.

BGP Nonstop Routing was made a default feature. Border Gateway Protocol (BGP) is an Exterior Gateway Protocol (EGP) that allows you to create loop-free interdomain routing between autonomous systems. An autonomous system is a set of routers under a

More information

BGP. BGP Overview. BGP Operation. BGP Neighbors

BGP. BGP Overview. BGP Operation. BGP Neighbors BGP BGP Overview BGP Operation BGP Neighbors BGP Overview AS - Autonomous Systems Multihoming IGP vs. EGP When to use BGP? 2 BGP Overview AS - Autonomous Systems Multihoming IGP vs. EGP When to use BGP?

More information

MPLS VPN Multipath Support for Inter-AS VPNs

MPLS VPN Multipath Support for Inter-AS VPNs The feature supports Virtual Private Network (VPN)v4 multipath for Autonomous System Boundary Routers (ASBRs) in the interautonomous system (Inter-AS) Multiprotocol Label Switching (MPLS) VPN environment.

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 3 BORDER GATEWAY PROTOCOL 1 by Xantaro Interdomain Routing The Internet is a collection of autonomous systems An autonomous system (AS) is a collection

More information

IPv4/IPv6 BGP Routing Workshop. Organized by:

IPv4/IPv6 BGP Routing Workshop. Organized by: IPv4/IPv6 BGP Routing Workshop Organized by: Agenda Multihoming & BGP path control APNIC multihoming resource policy 2 ISP Hierarchy Default free zone Made of Tier-1 ISPs who have explicit routes to every

More information

Module 10 An IPv6 Internet Exchange Point

Module 10 An IPv6 Internet Exchange Point ISP/IXP Networking Workshop Lab Module 10 An IPv6 Internet Exchange Point Objective: To investigate methods for connecting to an Internet Exchange Point. Prerequisites: Modules 1 to 4, and the Exchange

More information

The Contemporary Internet p. 3 Evolution of the Internet p. 5 Origins and Recent History of the Internet p. 5 From ARPANET to NSFNET p.

The Contemporary Internet p. 3 Evolution of the Internet p. 5 Origins and Recent History of the Internet p. 5 From ARPANET to NSFNET p. The Contemporary Internet p. 3 Evolution of the Internet p. 5 Origins and Recent History of the Internet p. 5 From ARPANET to NSFNET p. 7 The Internet Today p. 8 NSFNET Solicitations p. 10 Network Access

More information

BGP Protocol & Configuration. Scalable Infrastructure Workshop AfNOG2008

BGP Protocol & Configuration. Scalable Infrastructure Workshop AfNOG2008 BGP Protocol & Configuration Scalable Infrastructure Workshop AfNOG2008 Border Gateway Protocol (BGP4) Case Study 1, Exercise 1: Single upstream Part 6: BGP Protocol Basics Part 7: BGP Protocol - more

More information

Border Gateway Protocol - BGP

Border Gateway Protocol - BGP BGP Fundamentals Border Gateway Protocol - BGP Runs over TCP (port 179) TCP connection required before BGP session Need to be reachable! Path vector routing protocol Best path selection based on path attributes

More information

Back to basics J. Addressing is the key! Application (HTTP, DNS, FTP) Application (HTTP, DNS, FTP) Transport. Transport (TCP/UDP) Internet (IPv4/IPv6)

Back to basics J. Addressing is the key! Application (HTTP, DNS, FTP) Application (HTTP, DNS, FTP) Transport. Transport (TCP/UDP) Internet (IPv4/IPv6) Routing Basics Back to basics J Application Presentation Application (HTTP, DNS, FTP) Data Application (HTTP, DNS, FTP) Session Transport Transport (TCP/UDP) E2E connectivity (app-to-app) Port numbers

More information

Peering observations on security and resiliency at IXPs Greg Hankins, AS NANOG 67

Peering observations on security and resiliency at IXPs Greg Hankins, AS NANOG 67 Peering observations on security and resiliency at IXPs Greg Hankins, AS 38016 NANOG 67 Image source: http://as2914.net/ 1 Nokia 2016 Public NANOG 67 2016/06/14 Agenda Introduction

More information

BGP route filtering and advanced features

BGP route filtering and advanced features 2015/07/23 23:33 1/13 BGP route filtering and advanced features BGP route filtering and advanced features Objective: Using the network configured in Module 6, use various configuration methods on BGP peerings

More information

Securing Routing: RPKI Overview. Mark Kosters Chief Technology Officer

Securing Routing: RPKI Overview. Mark Kosters Chief Technology Officer Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer Why are DNSSEC and RPKI important? Two of the most critical resources DNS Routing Hard to tell when resource is compromised Focus of

More information

RPKI deployment at AFRINIC Status Update. Alain P. AINA RPKI Project Manager

RPKI deployment at AFRINIC Status Update. Alain P. AINA RPKI Project Manager RPKI deployment at AFRINIC Status Update Alain P. AINA RPKI Project Manager What is Resource Certifcation? Resource Certifcation is a security framework for verifying the association between resource holders

More information

Configuring IPv6 Provider Edge over MPLS (6PE)

Configuring IPv6 Provider Edge over MPLS (6PE) Finding Feature Information, page 1 Configuring 6PE, page 1 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature

More information

BGP Routing Security and Deployment Strategies

BGP Routing Security and Deployment Strategies Bachelor Informatica Informatica Universiteit van Amsterdam BGP Routing Security and Deployment Strategies Bryan Eikema June 17, 2015 Supervisor(s): Benno Overeinder (NLnet Labs), Stavros Konstantaras

More information

TDC 375 Network Protocols TDC 563 P&T for Data Networks

TDC 375 Network Protocols TDC 563 P&T for Data Networks TDC 375 Network Protocols TDC 563 P&T for Data Networks Routing Threats TDC 375/563 Spring 2013/14 John Kristoff DePaul University 1 One of two critical systems Routing (BGP) and naming (DNS) are by far

More information

Implementing DCI VXLAN Layer 3 Gateway

Implementing DCI VXLAN Layer 3 Gateway This chapter module provides conceptual and configuration information for Data Center Interconnect (DCI) VXLAN Layer 3 Gateway on Cisco ASR 9000 Series Router. Release Modification Release 5.3.2 This feature

More information

Configuring Advanced BGP

Configuring Advanced BGP CHAPTER 6 This chapter describes how to configure advanced features of the Border Gateway Protocol (BGP) on the Cisco NX-OS switch. This chapter includes the following sections: Information About Advanced

More information

BGP Commands: M through N

BGP Commands: M through N match additional-paths advertise-set, on page 3 match as-path, on page 6 match community, on page 8 match extcommunity, on page 10 match local-preference, on page 12 match policy-list, on page 14 match

More information

Multihoming with BGP and NAT

Multihoming with BGP and NAT Eliminating ISP as a single point of failure www.noction.com Table of Contents Introduction 1. R-NAT Configuration 1.1 NAT Configuration 5. ISPs Routers Configuration 3 15 7 7 5.1 ISP-A Configuration 5.2

More information

Internet Interconnection Structure

Internet Interconnection Structure Internet Interconnection Structure Basic Concepts (1) Internet Service Provider (ISP) Provider who connects an end user customer with the Internet in one or few geographic regions. National & Regional

More information

Configuring a BGP Route Server

Configuring a BGP Route Server BGP route server is a feature designed for internet exchange (IX) operators that provides an alternative to full ebgp mesh peering among the service providers who have a presence at the IX. The route server

More information

Contents. BGP commands 1

Contents. BGP commands 1 Contents BGP commands 1 address-family ipv4 1 address-family ipv6 2 address-family link-state 3 advertise-rib-active 4 aggregate 5 balance 7 balance as-path-neglect 9 bestroute as-path-neglect 10 bestroute

More information

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database

More information

BGP Graceful Shutdown

BGP Graceful Shutdown The feature reduces or eliminates the loss of traffic along a link being shut down for maintenance. Routers always have a valid route available during the convergence process. This feature is used primarily

More information

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics:

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: Appendix C BGP Supplement This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: BGP Route Summarization Redistribution with IGPs Communities Route

More information

RPKI Deployment Considerations: Problem Analysis and Alternative Solutions. 95 SIDR meeting

RPKI Deployment Considerations: Problem Analysis and Alternative Solutions. 95 SIDR meeting RPKI Deployment Considerations: Problem Analysis and Alternative Solutions draft-lee-sidr-rpki-deployment-01 @IETF 95 SIDR meeting fuyu@cnnic.cn Background RPKI in China CNNIC deploy a platform to provide

More information

Routing Between Autonomous Systems (Example: BGP4) RFC 1771

Routing Between Autonomous Systems (Example: BGP4) RFC 1771 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-7B Routing Between Autonomous Systems (Example: BGP4) RFC 1771 52 53 BGP4 Overview Example of Operations BGP4 is a path

More information

BGP Cost Community. Prerequisites for the BGP Cost Community Feature

BGP Cost Community. Prerequisites for the BGP Cost Community Feature The feature introduces the cost extended community attribute. The cost community is a non-transitive extended community attribute that is passed to internal BGP (ibgp) and confederation peers but not to

More information

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System)

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System) BGP Border Gateway Protocol A short introduction Karst Koymans Informatics Institute University of Amsterdam (version 18.3, 2018/12/03 13:53:22) Tuesday, December 4, 2018 General ideas behind BGP Background

More information