The RPKI & Origin Validation
|
|
- Duane Joseph
- 6 years ago
- Views:
Transcription
1 The RPKI & Origin Validation NANOG / Denver Randy Bush <randy@psg.com> Rob Austein <sra@isc.org> Steve Bellovin <smb@cs.columbia.edu> Michael Elkins <me@sigpipe.net> And a cast of thousands! Well, dozens :) RPKI Origin 1
2 Routing is Very Fragile How long can we survive on The Web as Random Acts of Kindness, TED Talk by Jonathan Zittrain? 99% of mis-announcements are accidental originations of someone else s prefix -- Google, UU, IIJ, RPKI Origin 2
3 Why Origin Validation? Prevent YouTube accident Prevent 7007 accident, UU/Sprint 2 days! Prevents most accidental announcements Does not prevent malicious path attacks such as the Kapela/Pilosov DefCon attack That requires Path Validation and locking the data plane to the control plane, the next steps, last talk today RPKI Origin 3
4 The Goal Keep the Internet working!!! Seriously reduce routing damage from mis-configuration, mis-origination Non-Goals Prevent Malicious Attacks Keep RIRs in business by selling X.509 Certificates RPKI Origin 4
5 Resource Public Key Infrastructure (RPKI) RPKI Origin 5
6 Public-Key Concept Private key: This key must be known only by its owner. Public key: This key is known to everyone (it is public) Relation between both keys: What one key encrypts, the other one decrypts, and vice versa. That means that if you encrypt something with my public key (which you would know, because it's public :-), I would need my private key to decrypt the message RPKI Origin 6
7 Key Generation Stolen from RPKI Origin 7
8 En/DeCryption RPKI Origin 8
9 Digital Signature RPKI Origin 9
10 Certificate RPKI Origin 10
11 X.509 RPKI Being Developed & Deployed by IANA, RIRs, and Operators RPKI Origin 11
12 X.509 Certificate w/ 3779 Ext X.509 Cert CA RFC 3779 Extension Describes IP Resources (Addr & ASN) SIA URI for where this Publishes Owner s Public Key RPKI Origin 12
13 Certificate Hierarchy follows Allocation Hierarchy Cert/ISC Cert/ARIN /16 Public Key SIA Cert/RGnet / / /19 CA CA CA CA Cert/PSGnet Public Key Public Key Public Key Cert/Randy CA Cert/Rob CA / /24 Public Key Public Key RPKI Origin 13
14 That s Who Owns It but Who May Route It? RPKI Origin 14
15 Route Origin Authorization (ROA) Owning Cert CA / /16 EE Cert /16 End Entity Cert can not sign certs. can sign other things e.g. ROAs Public Key Public Key ROA /16 This is not a Cert It is a signed blob AS RPKI Origin 15
16 IANA CA PSGnet /16 Experimental Allocation from ARIN 0/0 Public Key ARIN /8 AS Public Key PSGnet /16 AS 3130 Public Key CA CA Announces 256 /24s EE Cert EE Cert EE Cert EE Cert EE Cert / / / / /24 Public Key Public Key Public Key Public Key Public Key ROA ROA ROA ROA ROA / / / / /24 AS 3130 AS 3130 AS 3130 AS 3130 AS 3130 Too Many EE Certs and ROAs, Yucchhy! RPKI Origin 16
17 IANA CA 0/0 Public Key ARIN CA /8 Public Key PSGnet CA /16 Public Key EE Cert /16 ROA Aggregation Using Max Length Public Key ROA /16-24 AS RPKI Origin 17
18 Allocation in Reality My Infrastructure BGP Cust Static (non BGP) Cust Unused RPKI Origin 18
19 ROA Use My Aggregate ROA Customer ROAs I Generate for Lazy Customer My Infrastructure BGP Cust Static (non BGP) Cust Unused RPKI Origin 19
20 Running Code And the Three RPKI Protocols RPKI Origin 20
21 Up / Down to IANA Parent and Child ARIN RPKI Engine Up / Down Protocol Internal Protocol ARIN s Resources ARIN Back End ISPs Resources Registry Back Ends ISP RPKI Engine Internal Protocol ISP s Resources ISP IR Back End Children s Resources Up / Down to Smart Customer RPKI Origin 21
22 [Hardware] Signing Module RPKI Engine Prototype of Basic Back End LIR Back End IR RPKI Priv Keys Internal CA Data Keys for Talking to IR BackEnd Up / Down Protocol My Resources ID=Me Biz EE Signing Key Private RPKI Keys ID=Me Public RPKI Keys Up/Down EE Public Keys Certs Issued to DownStreams Internal CA Data My Misc Config Options Issued ROAs Publication Protocol Repo Mgt Resource PKI IP Resource Certs ASN Resource Certs Route Origin Attestations XML Object Transport & Handler Up / Down Protocol Internal Protocol My RightsToRoute Delegations to Custs Private IR Biz Trust Internal Anchor CA Data Business Key/Cert Management RPKI Origin 22
23 Big, Centralized, & Scary We Don t Do This RPKI DataBase IP Resource Certs ASN Resource Certs Route Origin Attestations RPKI Origin 23
24 Distributed RPKI DataBase IANA IANA SIA ARIN ARIN APNIC APNIC SIA SIA UUNET UUNET PSGnet PSGnet IIJ IIJ SIA UUcust UUcust A Player (CA) Publishes All Certificates Which They Generate in Their Own Unique Publication Point Running Code Repository RPKI Origin 24
25 RCynic Cache Gatherer (cynical rsync) IANA IANA Trust Anchor SIA ARIN ARIN APNIC APNIC SIA SIA UUNET UUNET PSGnet PSGnet IIJ IIJ SIA UUcust UUcust RCynic Gatherer Validated Cache RPKI Origin 25
26 Reliability Issue Expensive To Fetch & Unreliable IANA IANA Trust Anchor SIA ARIN ARIN APNIC APNIC SIA SIA UUNET UUNET PSGnet PSGnet IIJ IIJ SIA UUcust UUcust RCynic Gatherer Validated Cache RPKI Origin 26
27 Reliability Via Hosted Publication IANA IANA ARIN ARIN APNIC APNIC UUNET UUNET UUcust PSGnet IIJ PSGnet IIJ UUcust Repository with Multiple Publication Points Reducing the Number of Publication Points Makes RCynic More Efficient RPKI Origin 27
28 A Usage Scenario Resources [OrgID] IR s Database(s) My RightsToRoute Delegations to Custs User Web GUI Internal Protocol Keys for Talking to IR BackEnd ID=Me Public RPKI Keys Up/Down EE Public Keys 98% of an RIR s Users 10% of an RIR s IP Space Internal CA Data My Misc Config Options RPKI Engine Publication Protocol Publication Point Mac Certs Issued to DownStreams Issued ROAs Contract Out To Google Front End GUI & Management Up / Down Protocol 2% of an RIR s Users 90% of an RIR s IP Space RPKI Origin 28
29 Origin Validation Cisco IOS and IOS-XR test code have Origin Validation now Juniper has early test code now Work continues daily in test routers Compute load much less than ACLs from IRR data, 10µsec per update! RPKI Origin 29
30 RPKI -> Router` Global RPKI Object Security RCynic The Third Protocol (origin validation only) RCynic Gatherer Cache / Server RPKI to Rtr Protocol BGP Decision Process Near/In PoP RPKI Origin 30
31 Typical Exchange Cache Router <----- Reset Query R requests data Cache Response -----> C confirms request IPvX Prefix > C sends zero or more IPvX Prefix > IPv4 and IPv6 Prefix IPvX Prefix > Payload PDUs End of Data > C sends End of Data and sends new serial ~ ~ Notify > (optional) <----- Serial Query R requests data Cache Response -----> C confirms request IPvX Prefix > C sends zero or more IPvX Prefix > IPv4 and IPv6 Prefix IPvX Prefix > Payload PDUs End of Data > C sends End of Data and sends new serial ~ ~ RPKI Origin 31
32 Reset Query Protocol PDU Version Type reserved = zero Length=8 ` ' RPKI Origin 32
33 Cache Response Protocol PDU Version Type Cache Nonce Length=8 ` ' RPKI Origin 33
34 IPv4 Prefix Protocol PDU Version Type reserved = zero Length= Prefix Max Flags Length Length zero IPv4 prefix Autonomous System Number ` ' RPKI Origin 34
35 IPv6 Prefix Protocol PDU Version Type reserved = zero Length= Prefix Max Flags Length Length zero IPv6 prefix Autonomous System Number ` ' RPKI Origin 35
36 End of Data Protocol PDU Version Type Cache Nonce Length= Serial Number ` ' RPKI Origin 36
37 Notify (Think DNS) Protocol PDU Version Type Cache Nonce Length= Serial Number ` ' RPKI Origin 37
38 Serial Query Protocol PDU Version Type Cache Nonce Length= Serial Number ` ' RPKI Origin 38
39 Error Response Protocol PDU Version Type Error Number Length Length of Encapsulated PDU ~ Copy of Erroneous PDU ~ Length of Error Text Arbitrary Text of ~ Error Diagnostic Message ~ RPKI Origin ` ' 39
40 Extremely Large ISP Deployment Global RPKI Asia Cache NoAm Cache Euro Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache Cust Facing Cust Facing Cust Facing Cust Facing Cust Facing High Priority RPKI Origin Lower Priority 40
41 Configure router bgp 3130 bgp rpki server tcp port refresh 120 bgp bestpath prefix-validate allow-invalid RPKI Origin 41
42 Result of Check Valid A matching/covering ROA was found with a matching AS number Invalid A matching or covering ROA was found, but AS number did not match, and there was no valid one Not Found No matching or covering ROA was found RPKI Origin 42
43 Policy Override Knobs Disable Validity Check Completely Disable Validity Check for a Peer Disable Validity Check for Prefixes When check is disabled, the result is Not Found, i.e. as if there was no ROA RPKI Origin 43
44 Look at Table r0.sea#show ip bgp rpki table 76 BGP sovc network entries using 6688 bytes of memory 422 BGP sovc record entries using 8440 bytes of memory Network Maxlen Origin-AS Source Neighbor / / / / / / / / / / / / / / / / / / RPKI Origin 44
45 Defaults Origin Validation is Enabled if you have configured a cache server peering Default Poll Interval is 30 Minutes No Effect on Policy unless you have configured it RPKI Origin 45
46 Good Dog! r0.sea#show bgp /24 BGP routing table entry for /24, version Paths: (3 available, best #1, table default) (metric 1) from ( ) Origin IGP, metric 319, localpref 100, valid, internal, best Community: 3130:391 path 0F6D8B74 RPKI State valid from ( ) Origin IGP, metric 43, localpref 100, valid, external Community: 2914: : : :380 path 09AF35CC RPKI State valid RPKI Origin 46
47 Bad Dog! r0.sea#show bgp BGP routing table entry for /24, version Paths: (3 available, best #2, table default) Advertised to update-groups: Refresh Epoch (metric 11) from ( ) Origin IGP, metric 759, localpref 100, valid, internal Community: 3130:370 path 1312CA90 RPKI State invalid RPKI Origin 47
48 Strange Dog! r0.sea#show bgp BGP routing table entry for /20, version Paths: (3 available, best #2, table default) Advertised to update-groups: Refresh Epoch (metric 11) from ( ) Origin IGP, metric 4, localpref 100, valid, internal Community: 3130:370 path 11861AA4 RPKI State not found RPKI Origin 48
49 ibgp Hides Validity State p valid invalid p ibgp Full Mesh p unknown which do i choose? RPKI Origin why do i choose it? 49
50 The Solution is to Allow Operator to Test and then Set Local Policy RPKI Origin 50
51 Fairly Secure route-map validity-0 match rpki valid set local-preference 100 route-map validity-1 match rpki not-found set local-preference 50! invalid is dropped RPKI Origin 51
52 Paranoid route-map validity-0 match rpki valid set local-preference 110! everything else dropped RPKI Origin 52
53 After AS-Path route-map validity-0 match rpki not-found set metric 50 route-map validity-1 match rpki invalid set metric 25 route-map validity-2 set metric RPKI Origin 53
54 Running Code The Open TestBed Repository until we get IANA to act as the parent Trust Anchor Trust Anchor *ARIN ARIN *APNIC APNIC until we get IANA to act as the parent ISC ISC Google BWC RGnet RGnet JPNIC JPNIC Google runs own RPKI to keep private key private and control own fate, but publishes at ARIN BWC IIJ Cristel IIJ Mesh Mesh Level (3) Level(3) chocolate Cristel runs own RPKI to keep private key private and control own fate, but publishes at IIJ RPKI Origin * APNIC and ARIN are simulations constructed from public data 54
55 The Big Speedbump RPKI Origin 55
56 But Who Do We Trust? RPKI Origin 56
57 Up-Chain IANA 0/0 CA Expiration Public Key ARIN CA /8 These are not Identity Certs Public Key RGnet /16 Public Key PSGnet CA CA Sloppy Admin, Cert Soon to Expire! /17 Public Key EE Cert /17 Public Key ROA /1724 So My ROA will become RPKI Origin AS 3130 Invalid! 57
58 ROA Invalid but I Can Route The ROA will become Invalid My announcement will just become NotFound, not Invalid Unless my upstream has a ROA for the covering prefix, which is likely RPKI Origin 58
59 So Who Do You Call? RPKI Origin
60 Ghostbusters! IANA 0/0 CA Public Key ARIN CA /8 Public Key RGnet /16 CA Ghostbusters Record Public Key CA PSGnet /17 Public Key EE Cert /17 Public Key ROA BEGIN:vCard VERSION:3.0 FN:Human's Name N:Name;Human's;Ms.;Dr.;OCD;ADD ORG:Organizational Entity ADR;TYPE=WORK:;;42 Twisty Passage;Deep Cavern; WA; 98666;U.S.A. TEL;TYPE=VOICE,MSG,WORK: TEL;TYPE=FAX,WORK: com END:vCard draft-ietf-sidr-ghostbusters /17-24 AS RPKI Origin 60
61 But in the End, You Control Your Policy Announcements with Invalid origins MAY be used, but SHOULD be less preferred than those with Valid or NotFound. -- draft-ietf-sidr-origin-ops But if I do not reject Invalid, what is all this for? RPKI Origin 61
62 Open Source (BSD Lisc) Running Code Test Code in Routers Talk to C & J RPKI Origin 62
63 Work Supported By US Government THIS PROJECT IS SPONSORED BY THE DEPARTMENT OF HOMELAND SECURITY UNDER AN INTERAGENCY AGREEMENT WITH THE AIR FORCE RESEARCH LABORATORY (AFRL). [0] [0] they Take your Scissors Away and we turn them into plowshares ARIN Internet Initiative Japan & ISC Cisco, Juniper, Google, NTT, Equinix RPKI Origin 63
The RPKI & Origin Validation
The RPKI & Origin Validation RIPE / Praha 2010.05.03 Randy Bush Rob Austein Steve Bellovin And a cast of thousands! Well, dozens :) 2010.05.03 RIPE RPKI
More informationThe RPKI and BGP Origin Validation
The RPKI and BGP Origin Validation APRICOT / New Delhi 2012.02.27 Randy Bush Rob Austein Steve Bellovin And a cast of thousands! Well, dozens :) 2012.02.27
More informationRPKI-Based Origin Validation, Routers, & Caches
RPKI-Based Origin Validation, Routers, & Caches RPKIWS / Berlin 2013.07.26 Randy Bush Rob Austein Michael Elkins Matthias Waehlisch
More informationIPv4 Run-Out, Trading, and the RPKI
IPv4 Run-Out, Trading, and the RPKI MENOG 3 / Salmiya 2008.04.15 Randy Bush http://rip.psg.com/~randy/080415.menog-v4-trad-rpki.pdf 2008.04.15 MENOG v4 Trade RPKI 2 Internet Initiative
More informationRPKI. Resource Pubic Key Infrastructure
RPKI Resource Pubic Key Infrastructure Purpose of RPKI RPKI replaces IRR or lives side by side? Side by side: different advantages Security, almost real time, simple interface: RPKI Purpose of RPKI Is
More informationBGP Origin Validation
BGP Origin Validation ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated
More informationResource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC
Resource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC Target Audience Knowledge of Internet Routing(specially BGP) Fair idea on Routing Policy No need to know Cryptography Basic knowledge
More informationIPv4 Run-Out, Trading, and the RPKI
IPv4 Run-Out, Trading, and the RPKI RIPE 56 / Berlin 2008.05.07 Randy Bush http://rip.psg.com/~randy/080507.ripe-v4-trad-rpki.pdf 2008.05.07 RIPE v4 Trade RPKI 2 Internet Initiative Japan
More informationResource PKI. NetSec Tutorial. NZNOG Queenstown. 24 Jan 2018
Resource PKI NetSec Tutorial NZNOG2018 - Queenstown 24 Jan 2018 1 Fat-finger/Hijacks/Leaks Bharti (AS9498) originates 103.0.0.0/10 Dec 2017 (~ 2 days) No damage more than 8K specific routes! Google brings
More informationIETF81 Secure IDR Rollup TREX Workshop David Freedman, Claranet
IETF81 Secure IDR Rollup TREX Workshop 2011 David Freedman, Claranet Introduction to Secure IDR (SIDR) You are in a darkened room at the IETF. You are surrounded by vendors. A lone operator stands quietly
More informationISP 1 AS 1 Prefix P peer ISP 2 AS 2 Route leak (P) propagates Prefix P update Route update P Route leak (P) to upstream 2 AS 3 Customer BGP Update messages Route update A ISP A Prefix A ISP B B leaks
More informationSecuring BGP - RPKI. ThaiNOG Bangkok. 21 May Tashi Phuntsho
Securing BGP - RPKI ThaiNOG2018 - Bangkok 21 May 2018 Tashi Phuntsho (tashi@apnic.net) 1 Fat-finger/Hijacks/Leaks Amazon (AS16509) Route53 hijack April2018 AS10279 (enet) announced/originated more specifics
More informationIdealized BGPsec: Formally Verifiable BGP
Idealized BGPsec: Formally Verifiable BGP JaNOG 27.5 / Tokyo 2011.04.14 Randy Bush for the Informal BGPsec Design Group 2011.04.14 JaNOG BGPsec 1 Informal BGPsec Group chris morrow (google)
More informationRPKI Introduction. APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By:
RPKI Introduction APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By: 1 Content Why do we need RPKI What is RPKI How to deploy RPKI Configuration case Misdirection / Hijacking Incidents
More informationRoute Security for Inter-domain Routing
Route Security for Inter-domain Routing Alvaro Retana (aretana@cisco.com) Distinguished Engineer, Cisco Services 3 This could happen to YOUR network 4 This could happen be happening to YOUR network 5 Agenda
More informationIdealized BGPsec: Formally Verifiable BGP
Idealized BGPsec: Formally Verifiable BGP 2011.05.04 Randy Bush for the Informal BGPsec Design Group 2011.05.04 RIPE BGPsec 1 Informal BGPsec Group chris morrow (google) pradosh mohapatra
More informationIdealized BGPsec: Formally Verifiable BGP
Idealized BGPsec: Formally Verifiable BGP 2011.04.10 Randy Bush for the Informal BGPsec Design Group 2011.04.10 ARIN BGPsec 1 Informal BGPsec Group chris morrow (google) pradosh mohapatra
More informationAn Operational ISP & RIR PKI
An Operational ISP & RIR PKI EOF / Istanbul 2006.04.25 Randy Bush Quicksand Unknown quality of whois data Unknown quality of IRR data No formal
More informationRPKI and Internet Routing Security ~ The regional ISP operator view ~
RPKI and Internet Routing Security ~ The regional ISP operator view ~ APNIC 29/APRICOT 2010 NEC BIGLOBE, Ltd. (AS2518) Seiichi Kawamura 1 Agenda Routing practices of the regional ISP today How this may
More informationIntroducción al RPKI (Resource Public Key Infrastructure)
Introducción al RPKI (Resource Public Key Infrastructure) Roque Gagliano rogaglia@cisco.com 4 Septiembre 2013 Quito, Equator 2011 Cisco and/or its affiliates. All rights reserved. 1 Review of problem to
More informationRPKI-Based Origin Validation Lab RPKI Lab Creative Commons: Attribution & Share Alike
RPKI-Based Origin Validation Lab 1 Issuing Parties Relying Parties GUI altca Publication Protocol Trust Anchor Resource PKI RCynic Gatherer Pseudo IRR route: 147.28.0.0/16! descr: 147.28.0.0/16-16! origin:
More informationRPKI Workshop Routing Lab
RPKI Workshop Routing Lab NANOG / Denver 2011.06.12 Randy Bush Michael Elkins Rob Austein Serpil Bayraktar 2011.06.12 RPKI Router Lab
More informationAn Operational ISP & RIR PKI
An Operational ISP & RIR PKI ARIN / Montreal 2006.04.10 Randy Bush Quicksand Unknown quality of whois data Unknown quality of IRR data No formal
More informationResource Public Key Infrastructure
Resource Public Key Infrastructure A pilot for the Internet2 Community to secure the global route table Andrew Gallo The Basics The Internet is a self organizing network of networks. How do you find your
More informationUpdate on Resource Certification. Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008
Update on Resource Certification Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008 Address and Routing Security What we have had for many years is a relatively insecure interdomain routing system
More informationResource Certification. Alex Band, Product Manager DENIC Technical Meeting
Resource Certification Alex Band, Product Manager DENIC Technical Meeting Internet Routing Routing is non-hierarchical, open and free Freedom comes at a price: - You can announce any address block on your
More informationSecure Routing with RPKI. APNIC44 Security Workshop
Secure Routing with RPKI APNIC44 Security Workshop Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services
More informationOverview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies
Overview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies Presentation Outline The BGP security problem RPKI overiew Address & AS number allocation system Certificates
More informationSecuring Routing: RPKI Overview. Mark Kosters Chief Technology Officer
Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer Why are DNSSEC and RPKI important? Two of the most critical resources DNS Routing Hard to tell when resource is compromised Focus of
More informationDeploying RPKI An Intro to the RPKI Infrastructure
Deploying RPKI An Intro to the RPKI Infrastructure VNIX-NOG 24 November 2016 Hanoi, Vietnam Issue Date: Revision: Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours)
More informationMisdirection / Hijacking Incidents
Security Tutorial @ TWNOG SECURE ROUTING WITH RPKI 1 Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services
More informationRPKI deployment at AFRINIC Status Update. Alain P. AINA RPKI Project Manager
RPKI deployment at AFRINIC Status Update Alain P. AINA RPKI Project Manager What is Resource Certifcation? Resource Certifcation is a security framework for verifying the association between resource holders
More informationSecuring Internet Infrastructure: Route Origin Security using RPKI at ARIN. Mark Kosters CTO
Securing Internet Infrastructure: Route Origin Security using RPKI at ARIN Mark Kosters CTO What is RPKI? Resource Public Key Infrastructure Attaches digital certificates to network resources AS Numbers
More informationAPNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013
APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database
More informationRPKI and Routing Security
Presentation September 2015 Yerevan Regional Meeting Routing Security 2 Routing Registry route objects RPKI (Resource Public Key Infrastructure) ROAs (Route Origin Authorisation) What is the Purpose of
More informationProblem. BGP is a rumour mill.
Problem BGP is a rumour mill. We want to give it a bit more authorita We think we have a model AusNOG-03 2009 IP ADDRESS AND ASN CERTIFICATION TO IMPROVE ROUTING SECURITY George Michaelson APNIC R&D ggm@apnic.net
More informationARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN
ARIN Support for DNSSEC and ION San Diego 11 December 2012 Pete Toscano, ARIN 2 DNS and BGP They have been around for a long time. DNS: 1982 BGP: 1989 They are not very secure. Methods for securing them
More informationAdventures in RPKI (non) deployment. Wes George
Adventures in RPKI (non) deployment Wes George wesley.george@twcable.com @wesgeorge Background March 2013 FCC CSRIC III WG 6 report on Secure BGP Accurate Records, better measurements Cautious, staged
More informationRTRlib. An Open-Source Library in C for RPKI-based Prefix Origin Validation. Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H.
RTRlib An Open-Source Library in C for RPKI-based Prefix Origin Validation Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller m.waehlisch@fu-berlin.de schmidt@informatik.haw-hamburg.de
More informationInternet Engineering Task Force (IETF) BCP: 185 January 2014 Category: Best Current Practice ISSN:
Internet Engineering Task Force (IETF) R. Bush Request for Comments: 7115 Internet Initiative Japan BCP: 185 January 2014 Category: Best Current Practice ISSN: 2070-1721 Abstract Origin Validation Operation
More informationSecurity in inter-domain routing
DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks
More informationInternet Resource Certification and Inter- Domain Routing Security! Eric Osterweil!
Internet Resource Certification and Inter- Domain Routing Security! Eric Osterweil! Who is allowed to do what?! BGP (the Internet s inter-domain routing protocol) runs by rumor Participants assert reachability
More informationRPKI Deployment Considerations: Problem Analysis and Alternative Solutions. 95 SIDR meeting
RPKI Deployment Considerations: Problem Analysis and Alternative Solutions draft-lee-sidr-rpki-deployment-01 @IETF 95 SIDR meeting fuyu@cnnic.cn Background RPKI in China CNNIC deploy a platform to provide
More informationBGP Origin AS Validation
The feature helps prevent network administrators from inadvertently advertising routes to networks they do not control. This feature uses a Resource Public Key Infrastructure (RPKI) server to authenticate
More informationLife After IPv4 Depletion
1 Life After IPv4 Depletion Jon Worley Analyst Securing Core Internet Functions Resource Certification, RPKI Mark Kosters Chief Technology Officer 2 Core Internet Functions: Routing & DNS The Internet
More informationDecentralized Internet Resource Trust Infrastructure
Decentralized Internet Resource Trust Infrastructure Bingyang Liu, Fei Yang, Marcelo Bagnulo, Zhiwei Yan, and Qiong Sun Huawei UC3M CNNIC China Telecom 1 Critical Internet Trust Infrastructures are Centralized
More informationA PKI For IDR Public Key Infrastructure and Number Resource Certification
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect
More informationUsing Resource Certificates Progress Report on the Trial of Resource Certification
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC From the RIPE Address Policy Mail List 22 25 Sept 06, address-policy-wg@lists.ripe.net
More informationProblem Statement and Considerations for ROA Mergence. 96 SIDR meeting
Problem Statement and Considerations for ROA Mergence draft-yan-sidr-roa-mergence-00 @IETF 96 SIDR meeting fuyu@cnnic.cn Background RFC 6482 1/19 ROA mergence What is the ROA mergence? is a common case
More informationInternet Engineering Task Force (IETF) ISSN: September The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1
Internet Engineering Task Force (IETF) R. Bush Request for Comments: 8210 Internet Initiative Japan Updates: 6810 R. Austein Category: Standards Track Dragon Research Labs ISSN: 2070-1721 September 2017
More informationResource Certification
Resource Certification CISSP, science group manager RIPE NCC robert@ripe.net 1 Contents Motivation for Resource Certification (RPKI) Architecture overview Participating in RPKI Most importantly: use cases
More informationSecuring BGP: The current state of RPKI. Geoff Huston Chief Scientist, APNIC
Securing BGP: The current state of RPKI Geoff Huston Chief Scientist, APNIC Incidents What happens when I announce your addresses in BGP? All the traffic that used to go to you will now come to me I can
More informationBGP Origin Validation (RPKI)
University of Amsterdam System & Network Engineering BGP Origin Validation (RPKI) July 5, 2013 Authors: Remy de Boer Javy de Koning Supervisors: Jac Kloots
More informationSecurity Overlays on Core Internet Protocols DNSSEC and RPKI. Mark Kosters ARIN CTO
Security Overlays on Core Internet Protocols DNSSEC and RPKI Mark Kosters ARIN CTO Why are DNSSEC and RPKI Important Two critical resources DNS Routing Hard to tell if compromised From the user point of
More informationMadison, Wisconsin 9 September14
1 Madison, Wisconsin 9 September14 2 Security Overlays on Core Internet Protocols DNSSEC and RPKI Mark Kosters ARIN Engineering 3 Why are DNSSEC and RPKI Important Two critical resources DNS Routing Hard
More information32-bit ASNs. Philip Smith. AfNOG rd April 1st May Abuja, Nigeria
32-bit ASNs Philip Smith AfNOG 2007 23rd April 1st May Abuja, Nigeria Autonomous System (AS) AS 100 Collection of networks with same routing policy Single routing protocol Usually under single ownership,
More informationSome Lessons Learned from Designing the Resource PKI
Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007 Address and Routing Security The basic security questions that need to be answered are: Is this a valid
More informationSecuring Core Internet Functions Resource Certification, RPKI. Mark Kosters ARIN CTO
Securing Core Internet Functions Resource Certification, RPKI Mark Kosters ARIN CTO Core Internet Functions: Routing & DNS The Internet relies on two critical resources DNS: Translates domain names to
More informationSecurity Overlays on Core Internet Protocols DNSSEC and RPKI. Mark Kosters ARIN CTO
Security Overlays on Core Internet Protocols DNSSEC and RPKI Mark Kosters ARIN CTO Why are DNSSEC and RPKI Important Two critical resources DNS Routing Hard to tell if compromised From the user point of
More informationInternet Engineering Task Force (IETF) Category: Informational ISSN: February 2012
Internet Engineering Task Force (IETF) G. Huston Request for Comments: 6483 G. Michaelson Category: Informational APNIC ISSN: 2070-1721 February 2012 Abstract Validation of Route Origination Using the
More informationSecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI Srinivas (Sunny) Chendi VNIX-NOG 2018, Da Nang sunny@apnic.net Xin chào và chào buổi sáng 1 3 4 What is the fundamental Problem? An underlying problem in routing
More informationRoute Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes
1 Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes 2 Internal prefixes originated in IP core network Loopback Transport Connect inter-regional
More informationBORDER GATEWAY PROTOCOL (BGP) SECURITY. Nurudeen K. Abdulsalam. Supervisor: Dr. Olaf Maennel
ICNS A910002 BORDER GATEWAY PROTOCOL (BGP) SECURITY By Nurudeen K. Abdulsalam Supervisor: Dr. Olaf Maennel A Master's by Course Dissertation Submitted in partial fulfilment of the requirements for the
More informationRobust Inter-Domain Routing
Establishing the Technical Basis for Trustworthy Networking Robust Inter-Domain Routing Addressing Systemic Vulnerabilities in BGP Doug Montgomery (dougm@nist.gov) Manager, Internet and Scalable Systems
More informationRPKI Trust Anchor. Geoff Huston APNIC
RPKI Trust Anchor Geoff Huston APNIC Public Keys How can you trust a digital signature?? What if you have never met the signer and have no knowledge of them or their keys? One approach is transitive trust
More informationInternet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015
Network Working Group M. Lepinski, Ed. Internet-Draft BBN Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Abstract BGPSEC Protocol Specification draft-ietf-sidr-bgpsec-protocol-09
More informationUsing Resource Certificates Progress Report on the Trial of Resource Certification
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC Sound Familiar? 4:30 pm Mail: Geoff, mate, I ve been dealing with your phone people and
More informationRoute Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes
Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes Internal prefixes originated in IP core network Loopback Transport Connect inter-regional
More informationNetwork Working Group. Intended status: Informational Expires: January 9, 2014 July 8, 2013
Network Working Group G. Huston Internet-Draft G. Michaelson Intended status: Informational APNIC Expires: January 9, 2014 July 8, 2013 Abstract RPKI Validation Reconsidered draft-huston-rpki-validation-00.txt
More informationIntroduction to BGP. ISP/IXP Workshops
Introduction to BGP ISP/IXP Workshops 1 Border Gateway Protocol A Routing Protocol used to exchange routing information between different networks Exterior gateway protocol Described in RFC4271 RFC4276
More informationIntroduction to BGP. ISP Workshops. Last updated 30 October 2013
Introduction to BGP ISP Workshops Last updated 30 October 2013 1 Border Gateway Protocol p A Routing Protocol used to exchange routing information between different networks n Exterior gateway protocol
More information9/6/2015. COMP 535 Lecture 6: Routing Security. Agenda. In the News. September 3, 2015 Andrew Chi
COMP 535 Lecture 6: Routing Security September 3, 2015 Andrew Chi Includes content used with permission by Angelos Keromytis (Columbia), Philip Smith (APNIC), and Steve Kent (BBN) Agenda
More informationBGP Route Hijacking - What Can Be Done Today?
BGP Route Hijacking - What Can Be Done Today? Version 1.2 Barry Raveendran Greene Principle Architect Carrier, Enterprise & Security bgreene@akamai.com @Akamai BGP - the Core Protocol that Glues all of
More informationInternet Engineering Task Force (IETF) Category: Standards Track. January The Resource Public Key Infrastructure (RPKI) to Router Protocol
Internet Engineering Task Force (IETF) Request for Comments: 6810 Category: Standards Track ISSN: 2070-1721 R. Bush Internet Initiative Japan R. Austein Dragon Research Labs January 2013 The Resource Public
More informationService Provider Multihoming
Service Provider Multihoming ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last
More informationRobust Routing Policy Architecture. Job Snijders NTT Communications
Robust Routing Policy Architecture Job Snijders NTT Communications job@ntt.net Robust Routing Policy Architecture Conceptual model of routing policy Routing policy terminology Routing policy design patterns
More informationIETF Activities Update
IETF Activities Update Marla Azinger marla.azinger@frontiercorp.com ARIN XXIV OCT 22, 2009 Note This presentation is not an official IETF report There is no official IETF Liaison to ARIN or any RIR It
More informationPKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006
PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy
More informationA Day in the Life of an Address. Bill Fenner AT&T Labs - Research IETF Routing Area Director
A Day in the Life of an Address Bill Fenner AT&T Labs - Research fenner@research.att.com IETF Routing Area Director 1 Overview Addressing Routing Policy Data 2 Overview Addressing Routing Policy Data 3
More information32-bit ASNs. Philip Smith. MENOG 5, Beirut, 29th October 2009
32-bit ASNs Philip Smith MENOG 5, Beirut, 29th October 2009 Autonomous System (AS) AS 100 Collection of networks with same routing policy Single routing protocol Usually under single ownership, trust and
More informationAPNIC elearning: BGP Basics. 30 September :00 PM AEST Brisbane (UTC+10) Revision: 2.0
APNIC elearning: BGP Basics 30 September 2015 1:00 PM AEST Brisbane (UTC+10) Issue Date: 07 July 2015 Revision: 2.0 Presenter Nurul Islam (Roman) Senior Training Specialist, APNIC Nurul maintains the APNIC
More informationBGP for Internet Service Providers
BGP for Internet Service Providers Philip Smith Seoul KIOW 2002 1 BGP current status RFC1771 is quite old, and no longer reflects current operational practice nor vendor implementations
More informationService Provider Multihoming
Service Provider Multihoming ISP Workshops Last updated 18 September 2013 1 Service Provider Multihoming p Previous examples dealt with loadsharing inbound traffic n Of primary concern at Internet edge
More informationIntroduction. Keith Barker, CCIE #6783. YouTube - Keith6783.
Understanding, Implementing and troubleshooting BGP 01 Introduction http:// Instructor Introduction Keith Barker, CCIE #6783 CCIE Routing and Switching 2001 CCIE Security 2003 kbarker@ine.com YouTube -
More informationModule: Routing Security. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security
CMPSC443 - Introduction to Computer and Network Security Module: Routing Security Professor Patrick McDaniel Spring 2009 1 Routing 101 Network routing exists to provide hosts desirable paths from the source
More informationIETF Activities Update
IETF Activities Update Marla Azinger marla.azinger@frontiercorp.com ARIN XXV APR 20, 2010 Toronto Note This presentation is not an official IETF report There is no official IETF Liaison to ARIN or any
More informationSome Thoughts on Integrity in Routing
Some Thoughts on Integrity in Routing Geoff Huston Chief Scientist, APNIC What we want We want the routing system to advertise the correct reachability information for legitimately connected prefixes at
More informationRouting Security* CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring * Thanks to Steve Bellovin for slide source material.
Routing Security* CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 * Thanks to Steve Bellovin for slide source material. 1 Routing 101 Network routing exists to provide hosts desirable
More informationAPNIC Trial of Certification of IP Addresses and ASes
APNIC Trial of Certification of IP Addresses and ASes ARIN XVII Open Policy Meeting George Michaelson Geoff Huston Motivation: Address and Routing Security What we have today is a relatively insecure system
More information4-Byte AS Numbers. The view from the Old BGP world. Geoff Huston February 2007 APNIC
4-Byte AS Numbers The view from the Old BGP world Geoff Huston February 2007 APNIC AS Number Consumption AS Number Consumption IANA Pool You are here Projections Total AS Count Advertised AS Count Unadvertised
More informationAttacks on routing: IP hijacks
Attacks on routing: IP hijacks How Internet number resources are managed IANA ARIN LACNIC APNIC RIPE NCC AfriNIC ISP NIC.br NIC.MX ISP #1 LIRs/ISPs LIRs/ISPs End users ISP mx How Internet number resources
More informationIPv4/IPv6 BGP Routing Workshop. Organized by:
IPv4/IPv6 BGP Routing Workshop Organized by: Agenda Multihoming & BGP path control APNIC multihoming resource policy 2 ISP Hierarchy Default free zone Made of Tier-1 ISPs who have explicit routes to every
More informationAPNIC RPKI Report. George Michaelson
APNIC RPKI Report George Michaelson APNIC RPKI Current Activities The RPKI TA Framework APNIC s TA Changes Provisioning Protocol Services The RPKI TA Framework The RPKI TA Framework Managing TAs is an
More informationShifting Sands. PLNOG March Andrzej Wolski Training Department
Shifting Sands PLNOG March 2014 Andrzej Wolski Training Department RIPE NCC 2 Began operating in 1992 Not-for-profit membership organisation 10,000 members (Local Internet Registries) Neutral, Impartial,
More informationNetwork Security - ISA 656 Routing Security
Network Security - ISA 656 Angelos Stavrou December 4, 2007 What is? What is Routing Security? History of Routing Security Why So Little Work? How is it Different? The Enemy s Goal? Bad guys play games
More informationCSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca
CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, John Janno? Administrivia Midterm moved up from 3/17 to 3/15 IP
More information6.829 BGP Recitation. Rob Beverly September 29, Addressing and Assignment
6.829 BGP Recitation Rob Beverly September 29, 2006 Addressing and Assignment 1 Area-Routing Review Why does Internet Scale? Hierarchical Addressing How are addresses assigned? Classfull
More informationLessons learned running an RPKI service
Lessons learned running an RPKI service Alex Band Product Manager @alexander_band NANOG 63, San Antonio, Texas RPKI: Ultra Quick Intro 2 RIR becomes a Certificate Authority - Puts IPs and ASNs on a digital
More informationInternet Engineering Task Force (IETF) Category: Informational ISSN: September 2017
Internet Engineering Task Force (IETF) Request for Comments: 8211 Category: Informational ISSN: 2070-1721 S. Kent BBN Technologies D. Ma ZDNS September 2017 Adverse Actions by a Certification Authority
More information32-bit ASNs. Greg Hankins Chris Malayter APRICOT 2009 APRICOT /02/25
32-bit ASNs Greg Hankins ghankins@force10networks.com Chris Malayter cmalayter@switchanddata.com APRICOT 2009 APRICOT 2009 2009/02/25 ASN Terminology Soup What??? 2-octet, 2-byte, 16-bit, ASN16, and OLD
More information