Routing Security Workshop Internet Routing Registries
|
|
- Rodger Austin
- 5 years ago
- Views:
Transcription
1 Routing Security Workshop Internet Routing Registries Jeff Bartig Senior Interconnection Architect, Internet2
2 IRR Presentation Overview NANOG 74 Updates IRR Overview IRR Tools Internet2 Participant IRR Stats [ 2 ]
3 NANOG 74 UPDATES [ 3 ]
4 NANOG 74 BGP Route Security Track Recent BGP Incidents, Andree Toonk/BGPmon State of BGP Security, Alexander Azimov/QRator Legal Barriers to Securing the Routing Architecture, Christopher Yoo, David Wishnick/UPenn Routing Security Roadmap, Job Snijders/NTT also given at NLNOG: So I need to Start Route Filtering Peers, Chris Morrow/Google Google tentatively plans to have reject data available for peers by January 1, 2019 Tentative plans to drop routes not matching IRR data by March 1, 2019 Track wasn t recorded, but slides available [ 4 ]
5 IRR OVERVIEW [ 5 ]
6 IRR Overview What Is An Internet Routing Registry Why Register IRR Objects Important IRR Record Types Querying RADB Whois IRRExplorer Checking Your Work [ 6 ]
7 What Is An Internet Routing Registry (IRR) An IRR is a Public registry (database) of network routing information Many registry options (RADB, ARIN, RIPE, AltDB, LEVEL3,.) Often an IRR will mirror the other IRRs to create a more complete database Registry objects are specified using the Routing Policy Specification Language (RPSL, RFC2622) Registries can be used to document a network s prefixes, ASNs, groups of prefixes, groups of ASN, routing policy, and peers [ 7 ]
8 Why Register IRR Objects Automation! Standard method for communicating the list of prefixes your network plans to advertise Standard method for documenting the origin ASN for prefixes Statement of ownership more difficult to hijack Some services require IRR objects Transit providers Peering exchange route servers DDoS services (Zenedge) Peers [ 8 ]
9 Why Register IRR Objects But what if I don t peer, use peering exchanges, use a DDoS mitigation provider, or buy transit from someone that requires proper IRR objects? Your upstream providers may interact with other networks and services that do require IRR objects. [ 9 ]
10 Why Register IRR Objects If you don t document in an IRR, your routes may be blocked by peers of your transit providers or by your direct peers Routes with missing or incorrect IRR objects may be blocked temporarily or permanently when they are announced Routes may be preferenced lower if there are missing IRR objects Difficult to troubleshoot the path packets take to reach you. You may not realize you have issues. Better to maintain your own data, rather than have an upstream provider proxy register objects for your network [ 10 ]
11 Why Register IRR Objects - PeeringDB.com
12 Important IRR Object Types A minimal deployment of IRR objects doesn t require a lot of effort or object detail It is not necessary to document peers and route policy in your objects Important object types mntner: Maintainer - owner of the objects that you maintain route / route6: prefixes you plan to announce and their origin ASN aut-num: ASNs that originate your prefixes as-set: a grouping of aut-num objects and possibly other as-set objects [ 12 ]
13 Important IRR Object Types - mntner
14 Important IRR Object Types - mntner
15 Important IRR Object Types - route/route6
16 Important IRR Object Types - aut-num
17 Important IRR Object Types - as-set
18 Important IRR Object Types - as-set
19 RADB Whois - all routes with specific origin -!g A### : start of response and number of characters in response C : end of response
20 !i : expand as-set!ias-set,1 : recursively expand as-set, expanding any as-sets contained in RADB Whois - expand as-set -!i Not expanded
21 IRRExplorer Checking Your Work
22 IRRExplorer Checking Your Work
23 IRRExplorer Checking Your Work
24 IRRExplorer Checking Your Work
25 IRRExplorer Checking Your Work Old cruft to clean up
26 IRRExplorer Checking Your Work
27 Useful IRR Links IRR Explorer: PeeringDB: List of IRR: List of IRR/RPSL RFCs: RADB Whois Help/Examples: ARIN IRR: Mutually Agreed Norms for Routing Security
28 IRR TOOLS [ 28 ]
29 Tools bgpq3 - IRRExplorer - IRRToolSet - IRR Power Tools - [ 29 ]
30 bgpq3 $ bgpq3 -J -l AS-ONENET-MEMBERS AS-ONENET-MEMBERS policy-options { replace: prefix-list AS-ONENET-MEMBERS { /20; /20; /16; /17;... } [ 30 ]
31 INTERNET2 PARTICIPANT IRR STATS [ 31 ]
32 TR-CPS Participant routes vs IRR Total Customer routes in Internet2 trcps VRF: 5,594 Routes with matching IRR record: 3,376 (60%) Route with no matching IRR record: 2,218 (40%) [ 32 ]
33 TR-CPS Participants With 100% Accurately Registered IPv4 Prefixes (19 Out of 64 Participant ASNs) [ 33 ]
An introduction to BGP security
An introduction to BGP security Marco d Itri @rfc1036 Seeweb s.r.l. Albanian Network Operators Group meeting - 14 November 2018 Internet: independent networks exchanging traffic The Internet
More informationPEERING. A very brief introduction
PEERING A very brief introduction Types of Peering Private Peering Bi-lateral Peering Multi-lateral Peering Private Peering Dedicated circuit between two peers Can use a cross connect within a data centre;
More informationAPNIC Internet Routing Registry
APNIC Internet Routing Registry An introduction to the IRR TWNIC Meeting, 3 December 2003 Nurani Nimpuno, APNIC The Internet Routing Registry Global Internet Routing Registry database http://www.irr.net/
More informationInternet Routing Registry
APNIC elearning: Internet Routing Registry Issue Date: 02 July 2016 Revision: 1.0 Overview What is Routing Policy IRR Database & Objects Routing Policy Documentation in IRR Database RPSL (Routing Policy
More informationBGP Configuration Automation on Edge Routers
BGP Configuration Automation on Edge Routers System and Network Engineering Msc. Research Project Stella Vouteva & Tarcan Turgut Supervisor: Stavros Konstantaras, NLNetLabs Introduction Big Internet Depletion
More informationRPKI and Internet Routing Security ~ The regional ISP operator view ~
RPKI and Internet Routing Security ~ The regional ISP operator view ~ APNIC 29/APRICOT 2010 NEC BIGLOBE, Ltd. (AS2518) Seiichi Kawamura 1 Agenda Routing practices of the regional ISP today How this may
More informationRouting Security Roadmap
Routing Security Roadmap Job Snijders NTT Communications job@ntt.net This presentation contains projections and other forward-looking statements regarding future events or our future routing performance.
More informationMANRS: Mutually Agreed Norms for Routing Security Routing is at Risk Let s secure it together!
15 October 2018 Internet2 Technology Exchange MANRS: Mutually Agreed Norms for Routing Security Routing is at Risk Let s secure it together! Kevin Meynell Manager, Technical & Operational Engagement meynell@isoc.org
More informationImplementation of RPKI and IRR filtering on the AMS-IX platform. Stavros Konstantaras NOC Engineer
Implementation of RPKI and IRR filtering on the AMS-IX platform Stavros Konstantaras NOC Engineer RIPE EDUCA 2018 Agenda AMS-IX Route Servers Architecture Features Filtering IRRdb RPKI BGP Communities
More informationCollective responsibility for security and resilience of the global routing system
Collective responsibility for security and resilience of the global routing system Phil Roberts roberts@isoc.org Andrei Robachevsky www.internetsociety.org Let us look at the problem
More informationJust give me a button!
Just give me a button! The challenges of routing security RIPE NCC Members organisation founded in 1992 Manages IP and ASN allocations in Europe, Middle East and former Soviet Union - Ensure unique holdership
More informationAPNIC Training. Internet Routing Registry (IRR)
APNIC Training Internet Routing Registry (IRR) Objectives To provide an introduction to the APNIC Routing Registry Explain concepts of the global RR Outline the benefits of the APNIC Routing Registry Discuss
More informationMANRS Mutually Agreed Norms for Routing Security
27 March 2018 MANRS Mutually Agreed Norms for Routing Security Kevin Meynell meynell@isoc.org Presentation title Client name Internet Society 1992 2016 1 The Problem A Routing Security Overview 2 The Basics:
More informationInternet Routing Registry Tutorial
Internet Routing Registry Tutorial July 15, 2012, Karachi, Pakistan In conjunction with Presenters Champika Wijayatunga Training Unit Manager, APNIC champika@apnic.net Vivek Nigam Internet Resource Analyst,
More informationSecure Routing with RPKI. APNIC44 Security Workshop
Secure Routing with RPKI APNIC44 Security Workshop Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services
More informationMANRS How to behave on the internet
MANRS How to behave on the internet Massimiliano Stucchi TOP-IX Meeting January 2017 BGP BGP is based on trust - No built-in validation - Chain of trust is hard to establish - Data scattered over different
More informationAPNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013
APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database
More informationResource Public Key Infrastructure
Resource Public Key Infrastructure A pilot for the Internet2 Community to secure the global route table Andrew Gallo The Basics The Internet is a self organizing network of networks. How do you find your
More informationCollective responsibility for security and resilience of the global routing system
Collective responsibility for security and resilience of the global routing system Andrei Robachevsky www.internetsociety.org Let us look at the problem first BGP is based on trust
More informationTTM AS-level Traceroutes
TTM AS-level Traceroutes Matching IPs to ASes René Wilhelm New Projects Group RIPE NCC 1 Motivation TTM performs frequent traceroutes to find closest IP route for delay measurements
More informationBGP Edge Security for Dummies. Layer , 2603, and others
BGP Edge Security for Dummies hugge@sunet.se Layer 0-3 + 8 Architect @ 1653, 2603, 42649 and others Step 1 of 9 Question: Am I part of the problem (or the solution)? Answer: Are you currently operating
More informationLife After IPv4 Depletion
1 Life After IPv4 Depletion Jon Worley Analyst Securing Core Internet Functions Resource Certification, RPKI Mark Kosters Chief Technology Officer 2 Core Internet Functions: Routing & DNS The Internet
More informationAPNIC Internet Routing Registry. Tutorial Seoul 19 August 2003
APNIC Internet Routing Registry Tutorial Seoul 19 August 2003 Overview What is an IRR Why use an IRR? RPSL IRR objects Recap attributes of some objects Routing Policy What is routing policy? Why define
More informationWelcome! APNIC Internet Routing Registry Tutorial. In conjunction with SANOG IV
Welcome! APNIC Internet Routing Registry Tutorial 29 July 2004, Kathmandu, Nepal In conjunction with SANOG IV Introduction Presenters PART I Champika Wijayatunga champika@apnic.net PART II Gaurab Raj Upadhaya
More informationInter-domain routing security and the role of Internet Routing Registries. August 1, 2004 Larry Blunk, Merit Network, Inc.
Inter-domain routing security and the role of Internet Routing Registries IEPG meeting, IETF 60 August 1, 2004 Larry Blunk, ljb@merit.edu, Merit Network, Inc. Overview State of IDR security State of the
More informationMisdirection / Hijacking Incidents
Security Tutorial @ TWNOG SECURE ROUTING WITH RPKI 1 Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services
More informationIRR 101. Job Snijders, DKNOG 8 1 / 35
IRR 101 Job Snijders, DKNOG 8 job@ntt.net 1 / 35 What is this about Just a refresher on how things work today Using RPKI in context of provisioning 2 / 35 Filtering recap 1) Reject RFC 1918 (private) IP
More informationGolden Prefixes IRR Lockdown Job Snijders
Golden Prefixes IRR Lockdown Job Snijders Agenda What s the problem? IRR not ideal A possible solution: Golden prefixes Making the best of IRR: IRR Lockdown Actual Frustrations The Youtube
More informationMANRS. Mutually Agreed Norms for Routing Security. Jan Žorž
MANRS Mutually Agreed Norms for Routing Security Jan Žorž The Problem A Routing Security Overview 2 No Day Without an Incident http://bgpstream.com/ 3 Routing Incidents Cause Real World
More informationHow Complete and Accurate is the Internet Routing Registry (IRR)?
How Complete and Accurate is the Internet Routing Registry (IRR)? Dec 5 th 2011 4th CAIDA-WIDE-CASFI Joint Measurement Workshop Akmal Khan, Hyun-chul Kim, Ted "Taekyoung" Kwon Seoul National University
More informationRouting Security We can do better!
Routing Security We can do better! And how MANRS can help Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 90 60 Hijack Leak 30 0 1/5/17 1/16/17 1/27/17
More informationRouting Is At Risk. Let's Secure It Together. Andrei Robachevsky 1
Routing Is At Risk. Let's Secure It Together Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 100 80 60 Hijack Leak 40 20 0 1/1/17 2/1/17 3/1/17 4/1/17
More informationBGP Route Security Cycling to the Future! Alexander Azimov Qrator Labs
BGP Route Security Cycling to the Future! Alexander Azimov Qrator Labs aa@qrator.net Malicious Hijacks/Leaks FISHING SITES HIJACK OF HTTPS CERTIFICATES SPAM/BOTNET ACTIVITY DOS ATTACKS BGP Hijack Factory
More informationSecuring Core Internet Functions Resource Certification, RPKI. Mark Kosters ARIN CTO
Securing Core Internet Functions Resource Certification, RPKI Mark Kosters ARIN CTO Core Internet Functions: Routing & DNS The Internet relies on two critical resources DNS: Translates domain names to
More informationRIPE Database Training Course
RIPE Database Training Course Exercise Booklet January 2018 Version: 04-04-2018 Table of Contents Preparation for the training course...3 Your database objects...4 Email 1...5 Email 2...6 Email 3...7 Email
More informationRouting Is At Risk. Let's Secure It Together. Andrei Robachevsky 1
Routing Is At Risk. Let's Secure It Together Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 100 80 60 Hijack Leak 40 20 0 1/1/17 2/1/17 3/1/17 4/1/17
More informationRouting Policy Specification Language next generation. 6DEPLOY. IPv6 Deployment and Support
RPSLng Routing Policy Specification Language next generation 6DEPLOY. IPv6 Deployment and Support Copy Rights This slide set is the ownership of the 6DEPLOY project via its partners The Powerpoint version
More informationBGP Routing Table Report
BGP Routing Table Report View of the routing table between 2006-2016 Objective Analyse changes in global routing table between 2006 to 2016 Analysis is along: 1.Top 5 well connected ASNs 2.Growth of ASNs
More informationSecuring Routing Information
Securing Routing Information Findings from an Internet Society Roundtable September 2009 Internet Society Galerie Jean-Malbuisson, 15 CH-1204 Geneva Switzerland Tel: +41 22 807 1444 Fax: +41 22 807 1445
More informationBGP Routing Table Report
BGP Routing Table Report View of the routing table between 2006-2016 Objective Analyse changes in global routing table between 2006 to 2016 Analysis is along: 1. Top 5 well connected ASNs 2. Growth of
More informationThe Internet Ecosystem
The Internet Ecosystem How does the Internet really work? Alvaro Retana (aretana@cisco.com) Distinguished Engineer, Cisco Services Original Slides with Russ White (russ@riw.us) The Net What are the protocols
More informationResource Certification. Alex Band, Product Manager DENIC Technical Meeting
Resource Certification Alex Band, Product Manager DENIC Technical Meeting Internet Routing Routing is non-hierarchical, open and free Freedom comes at a price: - You can announce any address block on your
More informationResource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC
Resource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC Target Audience Knowledge of Internet Routing(specially BGP) Fair idea on Routing Policy No need to know Cryptography Basic knowledge
More informationRPKI and Routing Security
Presentation September 2015 Yerevan Regional Meeting Routing Security 2 Routing Registry route objects RPKI (Resource Public Key Infrastructure) ROAs (Route Origin Authorisation) What is the Purpose of
More informationMulti-Lateral Peering Agreement
Version 1.1 July 10, 2002 Multi-Lateral Peering Agreement Parties Definitions Obligations Rules Rights Exclusions Best effort basis Establishment procedure Term and renewal Change procedure Termination
More informationDeploying RPKI An Intro to the RPKI Infrastructure
Deploying RPKI An Intro to the RPKI Infrastructure VNIX-NOG 24 November 2016 Hanoi, Vietnam Issue Date: Revision: Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours)
More informationRouting Security. Training Course
Routing Security Training Course Training Services RIPE NCC November 2015 Schedule 09:00-09:30 11:00-11:15 13:00-14:00 15:30-15:45 17:30 Coffee, Tea Break Lunch Break End Routing Security 2 Introductions
More informationRobust Routing Policy Architecture. Job Snijders NTT Communications
Robust Routing Policy Architecture Job Snijders NTT Communications job@ntt.net Robust Routing Policy Architecture Conceptual model of routing policy Routing policy terminology Routing policy design patterns
More informationA Measurement Study of BGP Misconfiguration
A Measurement Study of BGP Misconfiguration Ratul Mahajan, David Wetherall, and Tom Anderson University of Washington Motivation Routing protocols are robust against failures Meaning fail-stop link and
More informationRPSLng. Routing Policy Specification Language - Next Generation
RPSLng Routing Policy Specification Language - Next Generation Copy... Rights This slide set is the ownership of the 6DISS project via its partners The Powerpoint version of this material may be reused
More informationRouting and router security in an operator environment
DD2495 p4 2011 Routing and router security in an operator environment Olof Hagsand KTH CSC 1 Router lab objectives A network operator (eg ISP) needs to secure itself, its customers and its neighbors from
More information32-bit ASNs. Greg Hankins Chris Malayter APRICOT 2009 APRICOT /02/25
32-bit ASNs Greg Hankins ghankins@force10networks.com Chris Malayter cmalayter@switchanddata.com APRICOT 2009 APRICOT 2009 2009/02/25 ASN Terminology Soup What??? 2-octet, 2-byte, 16-bit, ASN16, and OLD
More informationThe ISP Column A column on various things Internet. Securing the Routing System at NANOG 74. A Legal Perspective. October 2018 Geoff Huston
The ISP Column A column on various things Internet October 2018 Geoff Huston Securing the Routing System at NANOG 74 The level of interest in the general topic of routing security seems to come in waves
More informationSecurity)Track) NANOG)65)
Security)Track) NANOG)65) BGPStream) Nanog65) Andree)Toonk) andree@bgpmon.net) ) BGPStream) ) ) Ques%ons(we d(like(to(answer( Someone&hijacked&my&Prefix!& ) & &Now&what?&Was&it&targeted?&Were&others&affected&as&
More informationMutually Agreed Norms for Routing Security NAME
Mutually Agreed Norms for Routing Security NAME EMAIL The Problem A Routing Security Overview 2 Routing Incidents are Increasing In 2017 alone, 14,000 routing outages or attacks such as hijacking, leaks,
More informationBGP Origin Validation
BGP Origin Validation ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated
More informationSecurity in inter-domain routing
DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks
More informationPeering Commercials and Contracts
Peering Commercials and Contracts Presentation to AfPIF Peering Coordinators Day, Dar Es Salaam 2011 Mike Blanche 1 Peering Commercials Its All About The Money! 2 Agenda Peering Commercials The Business
More informationIRR Analysis Service
UNIVERSITÀ DEGLI STUDI ROMA TRE Dipartimento di Informatica e Automazione IRR Analysis Service Massimo Rimondini Tiziana Refice RIPE 53 Meeting 2 October 2006 Amsterdam, The Netherlands UNIVERSITÀ DEGLI
More informationRPKI. Resource Pubic Key Infrastructure
RPKI Resource Pubic Key Infrastructure Purpose of RPKI RPKI replaces IRR or lives side by side? Side by side: different advantages Security, almost real time, simple interface: RPKI Purpose of RPKI Is
More informationAn Analysis of ARIN NetHandles with OriginAS i Data and Analysis of RIR/IRR Registry Data
Network king Progr ram Trus stworthy An Analysis of ARIN NetHandles with OriginAS i Data and Analysis of RIR/IRR Registry Data O. Kim, K. Sriram, O. Borchert, P. Gleichmann, and D. Montgomery Presentation
More informationRPKI Introduction. APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By:
RPKI Introduction APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By: 1 Content Why do we need RPKI What is RPKI How to deploy RPKI Configuration case Misdirection / Hijacking Incidents
More informationBGP Configuration for a Transit ISP
BGP Configuration for a Transit ISP ISP Workshops Last updated 24 April 2013 1 Definitions p Transit carrying traffic across a network, usually for a fee n traffic and prefixes originating from one AS
More informationInternet Resource Policy - Why should I care?
Internet Resource Policy - Why should I care? Nurani Nimpuno, APNIC 3 February 2005 NZNOG 2005 1 Quick survey How many of you are involved with Internet address policy? How many get excited when you hear
More informationDatabase Update. Paul Palse Database Manager, RIPE NCC
Database Update Paul Palse Database Manager, RIPE NCC Outline Introduction to the Database Group Status of APs and outstanding deliverables Projects completed between RIPE 60 and 61 RIPE Labs publication
More informationIPv6 routing table Introduction 1. Impressions. An overview of the global IPv6 routing table. January 27th, 2004 RIPE 47, Amsterdam
IPv6 routing table Introduction 1 Impressions An overview of the global IPv6 routing table Gert Döring, SpaceNet AG, Munich January 27th, 2004 RIPE 47, Amsterdam IPv6 routing table Overview 2 Overview
More informationLEA Workshop. Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013
LEA Workshop Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013 Agenda Introduction to APNIC Know about APNIC Internet Policy Development How the Internet Policies are developed
More informationRoute Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes
1 Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes 2 Internal prefixes originated in IP core network Loopback Transport Connect inter-regional
More informationNetworking 101 ISP/IXP Workshops
Networking 101 ISP/IXP Workshops 1 Network Topology and Definitions Definitions and icons Network topologies PoP topologies Interconnections and IXPs IP Addressing Gluing it all together 2 Topologies and
More informationIETF81 Secure IDR Rollup TREX Workshop David Freedman, Claranet
IETF81 Secure IDR Rollup TREX Workshop 2011 David Freedman, Claranet Introduction to Secure IDR (SIDR) You are in a darkened room at the IETF. You are surrounded by vendors. A lone operator stands quietly
More informationMANRS Mutually Agreed Norms for Routing Security
December 2017 MANRS Mutually Agreed Norms for Routing Security Andrei Robachevsky robachevsky@isoc.org Presentation title Client name 1 Internet Society 1992 2016 The Problem A Routing Security Primer
More informationRPSL - Practical Tool for ISPs?
RPSL - Practical Tool for ISPs? 14th APNIC Open Policy Meeting Kitakyushu, Japan Andy Linton Agenda Routing Policy What is Routing Policy? Why define one? RPSL What is RPSL? Benefits
More informationISP 1 AS 1 Prefix P peer ISP 2 AS 2 Route leak (P) propagates Prefix P update Route update P Route leak (P) to upstream 2 AS 3 Customer BGP Update messages Route update A ISP A Prefix A ISP B B leaks
More informationBGP Made Easy. John van Oppen NANOG PTC January 15th 2017
BGP Made Easy John van Oppen NANOG OTR @ PTC January 15th 2017 What is BGP Snarky answer: RFC-4271 BGP is an Exterior gateway protocol, the only one used on the public Internet and is used for inter-autonomous
More informationNetwork Security - ISA 656 Routing Security
Network Security - ISA 656 Angelos Stavrou December 4, 2007 What is? What is Routing Security? History of Routing Security Why So Little Work? How is it Different? The Enemy s Goal? Bad guys play games
More informationResource Certification
Resource Certification CISSP, science group manager RIPE NCC robert@ripe.net 1 Contents Motivation for Resource Certification (RPKI) Architecture overview Participating in RPKI Most importantly: use cases
More informationMANRS Mutually Agreed Norms for Routing Security
6 July 2018 MANRS Mutually Agreed Norms for Routing Security Kevin Meynell Manager, Technical & Operational Engagement meynell@isoc.org Presentation title Client name Internet Society 1992 2018 1 The Problem
More informationBGP and the Internet. Enterprise Multihoming. Enterprise Multihoming. Medium/Large ISP Multihoming. Enterprise Multihoming. Enterprise Multihoming
BGP and the Common scenario in today More and more non-sps multihoming for: service provider redundancy link redundancy Issues on today: Routing Table size accelerating more and more /24 prefixes appearing
More informationRegistry. NTT Communications. JPNIC IP Committee / JPNIC IRR-Plan Chair. Tomoya Yoshida Topics
Registry NTT Communications JPNIC IP Committee / JPNIC IRR-Plan Chair Tomoya Yoshida Topics Internet Registry (IR) What is the Internet Registry The Role of IR Internet Routing Registry
More informationIPv6 routing table Introduction 1. Impressions. An overview of the global IPv6 routing table. September 3, 2003 RIPE 46, Amsterdam
IPv6 routing table Introduction 1 Impressions An overview of the global IPv6 routing table Gert Döring, SpaceNet AG, Munich September 3, 2003 RIPE 46, Amsterdam IPv6 routing table Overview 2 Overview what
More informationBGP Route Hijacking - What Can Be Done Today?
BGP Route Hijacking - What Can Be Done Today? Version 1.2 Barry Raveendran Greene Principle Architect Carrier, Enterprise & Security bgreene@akamai.com @Akamai BGP - the Core Protocol that Glues all of
More informationBGP and the Internet
BGP and the Internet Transit and Internet Exchange Points 1 Definitions Transit carrying traffic across a network, usually for a fee traffic and prefixes originating from one AS are carried across an intermediate
More informationBGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith , Oakland 2001, Cisco Systems, Inc. All rights reserved. 1 Presentation Slides Available on NANOG Web site www.nanog.org/mtg-0110/smith.html Available
More informationRoute Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes
Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes Internal prefixes originated in IP core network Loopback Transport Connect inter-regional
More informationLab Guide 2 - BGP Configuration
IXP Workshop Lab Lab Guide 2 - BGP Configuration Objective: The focus of this lab is to connect 8 customers with IXP. Customers are connected with AS17821 as transit and received customer prefixes, also
More informationMPLS-based traffic shunt. Nicolas FISCHBACH Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003
MPLS-based traffic shunt Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Contributors COLT Telecom Andreas Friedrich Marc Binderberger Riverhead Networks
More informationISP Border Definition. Alexander Azimov
ISP Border Definition Alexander Azimov ISP goal (one ASN) BGP Decision Process Step Attribute Transit 1 Highest Local Preference value Non-transit 2 Lowest AS Path length Transit 3 Lowest
More informationIXP Partnership: Improving Global Routing Security and Resilience
IXP Partnership: Improving Global Routing Security and Resilience Michuki Mwangi mwangi@isoc.org Af-IX Meeting 29 th August 2016 Dar-es-Salaam, Tanzania www.internetsociety.org Routing Resilience Manifesto,
More informationMethods for Detection and Mitigation of BGP Route Leaks
Methods for Detection and Mitigation of BGP Route Leaks ietf-idr-route-leak-detection-mitigation-00 (Route leak definition: draft-ietf-grow-route-leak-problem-definition) K. Sriram, D. Montgomery, and
More informationBGP BGP. Fredrik Söderquist Michael Silvin
BGP Fredrik Söderquist Michael Silvin 1 Table of Contents Background...3 A quick look at the mechanics...3 Message Types...3 BGP Message Header...3 OPEN Message (Type 1 RFC 1771)...4 UPDATE Message (Type
More informationNetwork Security - ISA 656 Routing Security
What is? Network Security - ISA 656 Angelos Stavrou What is Routing Security? History of Routing Security Why So Little Work? How is it Different? Bad guys play games with routing protocols. Traffic is
More informationHAWAII INTERNET EXCHANGE
HAWAII INTERNET EXCHANGE Technical Specification, Version 3.6, April 21, 2009 (This specification may be superseded either in whole or in part, at a later time.) ABSTRACT The Hawaii Internet Exchange,
More informationIPv4 Run-Out, Trading, and the RPKI
IPv4 Run-Out, Trading, and the RPKI MENOG 3 / Salmiya 2008.04.15 Randy Bush http://rip.psg.com/~randy/080415.menog-v4-trad-rpki.pdf 2008.04.15 MENOG v4 Trade RPKI 2 Internet Initiative
More informationAPNIC. Database Tutorial. 3 September, Kitakyushu, Japan. 14 th APNIC Open Policy Meeting
APNIC Database Tutorial 3 September, Kitakyushu, Japan 14 th APNIC Open Policy Meeting Introduction Presenters Nurani Nimpuno Training Development Officer nurani@apnic.net Champika Wijayatunga Training
More informationResource PKI. NetSec Tutorial. NZNOG Queenstown. 24 Jan 2018
Resource PKI NetSec Tutorial NZNOG2018 - Queenstown 24 Jan 2018 1 Fat-finger/Hijacks/Leaks Bharti (AS9498) originates 103.0.0.0/10 Dec 2017 (~ 2 days) No damage more than 8K specific routes! Google brings
More informationBGP101. Howard C. Berkowitz. (703)
BGP101 Howard C. Berkowitz hcb@clark.net (703)998-5819 What is the Problem to be Solved? Just configuring the protocol? Participating in the Internet and/or running Virtual Private Networks A Life Cycle
More informationIntroducción al RPKI (Resource Public Key Infrastructure)
Introducción al RPKI (Resource Public Key Infrastructure) Roque Gagliano rogaglia@cisco.com 4 Septiembre 2013 Quito, Equator 2011 Cisco and/or its affiliates. All rights reserved. 1 Review of problem to
More informationTechnical update part 2. Arnaud Fenioux France-IX GM-2016
Technical update part 2 Arnaud Fenioux France-IX GM-2016 Oxidized It's a RANCID replacement! Written in ruby to backup equipment s configuration into a git repository Lots of Vendor OS supported Web interface
More informationARIN Policies How to Qualify for Number Resources. Leslie Nobile
ARIN Policies How to Qualify for Number Resources Leslie Nobile Director, Registration Services ARIN Policies IPv4 IPv6 ASN Terms Allocate to issue number resources to ISPs (LIRs) for internal networks
More informationPeeringDB and why everyone should use it
PeeringDB and why everyone should use it Hurricane Electric IPv6 Native Backbone Massive Peering! AfPIF-2 (2 nd African Peering and Interconnection Forum) Accra Ghana 8 th August 2011 Martin J. Levy, Director
More information