SlideShare a Scribd company logo
1 of 23
Download to read offline
RPKI	at CNNIC
Zhiwei Yan
Why	do	we	need	RPKI?
Feb,	2014
Hacker	Redirects	
Traffic	From	19	
Internet	Providers	
to	Steal	Bitcoins
Feb	2008
Pakistan	
Telecom brought	
down YouTube
worldwide	
Jan	,	2015
An	ISP	in	USA	
hijack		an	IP	prefix	
of	IIJ	from	Japan
Nov,	2015,	An	ISP	
in	India	as	Bharti
Airtel hijack	a	lot	
of	IP	prefix
Prefix	hijacking	is	one	of	the	large-scale	BGP	specific	routing	anomalies	that	are	able	to	paralyze	the	Internet.
RPKI	(Resource	Public	Key	Infrastructure) is	designed	to	prevent	route	hijacking	and	other	attacks	on	BGP.
Prefix	hijacking:	Attackers	can	use	bogus	BGP	UPDATE	(NLRI	and	Path	Attributes)	messages	to	disrupt	
routing	without	breaking	the	peer-peer	connection.
BGP UPDATE Message Format :
NLRI:Network	Layer	Reachability	Information
Why	do	we	need	RPKI?
Bogus BGP UPDATE Message
According	to	“prefer	the path with	the shortest AS_PATH”	rule,		AS4	prefers message	from	AS5	to message	
from	AS1.
AS3
AS2 AS4
AS1 AS5
218.241.0.0/16
AS_PATH:	2	1
NLRI:	218.241.0.0/16
AS_PATH:	3	2	1
AS1	was	authorized	to	originate	prefix	218.241.0.0/16
NLRI:	218.241.0.0/16
AS_PATH:	1
AS3
AS2 AS4
AS1 AS5
218.241.0.0/16
AS_PATH:	2	1
NLRI:	218.241.0.0/16
AS_PATH:	3	2	1
NLRI:	218.241.0.0/20
AS_PATH:	5
NLRI:	218.241.0.0/16
AS_PATH:	1
AS5	forges	BGP	UPDATE	Message
Why	do	we	need	RPKI?
Actually,	BGP	protocol	accepts	any	routes	they	learn	from	their	neighbors.
Obviously,	this	may	result	in	Route	Hijacking	on	the	Internet.
Authorization
Ownership
Unable to verify
who is the
legitimate holder
of the INRs
(Internet Number
Resources).
Unable to verify who
has the authorization
to originate specific
IP prefixes
Why	do	we	need	RPKI?
BGP	is	vulnerable	to	a	variety	of	routing	attacks	because	of	the	lack	of	a	verification	mechanism	to	ensure	the	
legitimacy	of	BGP	messages	(especially	the	origin	information).
RPKI is	proposed	 in	IETF	to	offers a	verification	mechanism	to	protect		the	ownership	and	authorization	of	
the	INRs	(Internet	Number	Resources).
Why	do	we	need	RPKI?
Certificate	Authority,	CA
Any	resource	holder	who	is	authorized	to	sub-allocate	these	resources	must	be	able	to	issue	resource	certificates	
to	correspond	 to	these	sub-allocations.	Thus,	for	example,	CA	certificates	will	be	associated	with	IANA	and	each	
of	the	RIRs,	NIRs,	and	LIRs/ISPs.	Also,	a	CA	certificate	is	required	to	enable	a	resource	holder	to	issue	ROAs,	
because	it	must	issue	the	corresponding	 end-entity	certificate	used	to	validate	each	ROA.
End-entity,	EE
The	private	key	corresponding	 to	a	public	key	contained	in	an	EE	certificate	is	not	used	to	sign	other	certificates	
in	a	PKI.	The	primary	function	of	end-entity	certificates	in	this	PKI	is	the	verification	of	signed	objects	that	relate	
to	the	usage	of	the	resources	described	in	the	certificate,	e.g.,	ROAs	and	manifests.
Trust	Anchor,	TA
A	trust	anchor	in	the	RPKI	is	represented	by	a	self-signed	X.509	Certification	Authority
(CA)	certificate,	a	format	commonly	used	in	PKIs	and	widely	supported	by	RP	software
The	Architecture	of RPKI
The	Architecture	of RPKI-the relation	of	roles	and	data
Resource Holders
CA
LIR/ISP
Subscribers
IANA
RIR
NIR
CRL
CA
certificate
EE
certificate
ROA
manifest
Repository
INR
(Internet Number Resources)
Entity PKI
Resources
Signed Objects
ROA	Profile	–RFC6482
Challenges NOW:
BGPSEC
RPKI-Safegurad
RFC	6480
An	Infrastructure	to	Support	
Secure	Internet	Routing
RFC	6487
A	Profile	for	X.509	PKIX	
Resource	Certificates
RFC	6481
Resource	Certificate	Repository	
Structure
RFC	6489 Key Rollover
RFC	6490 RPKI	Trust	Anchor	Locator
RFC	6484 Certificate	Policy	for	the	RPKI
RFC	6485
The	Profile	for	Algorithms	and	
Key	Sizes	for	Use	in	RPKI
RFC	6482 A	Profile	for	ROAs
RFC	6486 Manifests	for	the	RPKI
RFC	6488 Signed	Object	Template	for	RPKI
RFC	6483
Validation	of	Route	Origination	
Using	RPKI	and	ROAs
The	standardization	process	of	RPKI
Industrial	products	of	RPKI
Cisco	BGP	routers
Supporting BGP	Command	(match	RPKI)
Juniper	routers	
Configuring	Origin	Validation	for	BGP
Alcatel-Lucent	Service	Router(Release	12.0	R4)
Trying	to	support	RPKI
Deployment	situation
5	RIRs	have	finished	the	deployment	of	RPKI.	
A	number	of	countries	have	also	started	to	deploy	RPKI	interiorly,	Ecuador,	Japan,	Bangladesh,	China,	etc.
RPKI	at	CNNIC
• Standardization	work	in	IETF
• X.	Lee,	X.	Liu,	Z.	Yan	and	Y.	Fu,	RPKI	Deployment	Considerations:	Problem	Analysis	
and	Alternative	Solutions,		draft-lee-sidr-rpki-deployment-01,	Jan,	2016.
• RPKI	Deployment	Problems:Existing and	Potential	Problems	,	such	as	Technical,	Economic	
and	Political
• Alternative	Solutions
• Y.	Fu,	Z.	Yan,	X.	Liu	and	C.	Wang,	Scenarios	of	unexpected	resource	assignment	in	
RPKI,	draft-fu-sidr-unexpected-scenarios-01,	March	2016.
• Problem:	Unbelonged resource	allocation,	Duplicated	allocation,	Resource	transfer	
• Solution:	Safeguard	of	CA	function	
• Z.Yan,		Y.Fu,		X.Liu,	G.Geng,	Problem	Statement	and	Considerations	for	ROA	
Mergence,	draft-yan-sidr-roa-mergence-00,	May	2016
• analyzes	and	presents	some	operational
• Problems		caused	by	the	misconfigurations	of	ROAs	containing	multiple	IP	prefixes.
• Suggestions	and	considerations
RPKI	at	CNNIC
• Standardization	work	in	CCSA
• In	charge	of	the	standardization	of	RPKI	in	China
RPKI	at	CNNIC
• Published	two	white-papers	to	guide	the	test	of	RPKI	and	BGPSEC
RPKI	at	CNNIC
• Published	the	first	RPKI-Pilot	system	in	China
RPKI	at	CNNIC
• Published	several	academic	papers
• Cuicui Wang,	Zhiwei Yan	and	Anlei Hu.	An	Efficient	Data	Management	Architecture	
for	the	Large-scale	Deployment	of	Resource	Public	Key	Infrastructure	
• Xiaowei Liu,	Zhiwei Yan,	Guanggang Geng,	Xiaodong Lee,	Shian-ShyongTseng	and	
Ching-Heng Ku.	RPKI	Deployment:	Risks	and	Alternative	Solutions
• Xiaowei Liu,	Zhiwei Yan,	Guanggang Geng and	XiaodongLee.	
Research of ResourceAllocation Risks by CAs in RPKI and Feasible Solutions
• Zhiwei Yan,	Xiaowei Liu,	Guanggang Geng and	SheraliZeadally.	Secure	and	Scalable	
Deployment	of	Resource	Public	Key	Infrastructure	(RPKI)
What	is	the	future	of	RPKI?
• Will	RPKI	be	SECURE	enough?
• We	should	avoid	additional	risks	caused	by	a	security	enhancement
• More	than	One	TA
• Operational	Errors
• Unilateral	Resource	Revocation
• Mirror	World	Attacks
• ……
• Data	Synchronization
• Problems	of	Staged	and	Incomplete	Deployment
• Combining	with	BGP
Production
Synchronization
Usage
What	is	the	future	of	RPKI?
• Will	RPKI	be	deployed	widely?
• Let’s	have	a	glimpse	of	DNSSEC
• 2010-12~
2013-03
Experimental
• 2013-04
Announced
• 2013-08
Partial
• 2013-11
DS	in	Root
• Keep		
going…
Operational
Experimental:
ü Risk	analysis
ü Software	development
Announced:
ü Hardware	&	software	deployment
ü Training	and	drills
Partial:
ü Signing	 &	roller
ü Observations	&	verification
DS	in	Root:
ü Generation	&	submission
ü Observations	&	verification
Operational:
ü Upgrades	and	improvements
ü Debugging
Over
800 days
120 days
What	is	the	future	of	RPKI?
• Will	RPKI	be	deployed	widely?
• Let’s	have	a	glimpse	of	DNSSEC
DNSSEC	COVERAGE	RATE	OF	
ALEXA	TOP	1	MILLION	WEBSITES:	
1.6%
What	is	the	future	of	RPKI?
• Analyze	the	challenges	for	deployment:
• Up-bottom	model	has	difficulty	in	the	Internet	world
• PKI	has	too	high	requirements	for	the	managers
• Security	is	a	huge	investment	for	the	enterprises
•I	am	not	NEGATIVE	or	UNCONFIDENT	to	RPKI
• But	I	am	sure	it	has	a	long	way	to	go	for:
• Protocol	improvement
• Deployment		enlargement
Thank	you	for	your	attention~
Zhiwei Yan@CNNIC

More Related Content

Similar to ION Hangzhou - RPKI At CNNIC

BGP
BGPBGP
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
Kashif Latif
 

Similar to ION Hangzhou - RPKI At CNNIC (20)

Routing Security - its importance and status in South Asia
Routing Security - its importance and status in South AsiaRouting Security - its importance and status in South Asia
Routing Security - its importance and status in South Asia
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
 
D017351725
D017351725D017351725
D017351725
 
Solution against BGP vulnerabilities
Solution against BGP vulnerabilitiesSolution against BGP vulnerabilities
Solution against BGP vulnerabilities
 
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
 
CCCNP ROUTE v6_ch06
CCCNP ROUTE v6_ch06CCCNP ROUTE v6_ch06
CCCNP ROUTE v6_ch06
 
Securing Routing Protocol BGP
Securing Routing Protocol BGPSecuring Routing Protocol BGP
Securing Routing Protocol BGP
 
BMP: the pa amb tomàquet your BGP monitoring was missing
BMP: the pa amb tomàquet your BGP monitoring was missingBMP: the pa amb tomàquet your BGP monitoring was missing
BMP: the pa amb tomàquet your BGP monitoring was missing
 
A Survey of Border Gateway Protocol
A Survey of Border Gateway ProtocolA Survey of Border Gateway Protocol
A Survey of Border Gateway Protocol
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6
 
CCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukarCCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukar
 
ION Bangladesh - Secure BGP and Operational Report of Bangladesh
ION Bangladesh - Secure BGP and Operational Report of BangladeshION Bangladesh - Secure BGP and Operational Report of Bangladesh
ION Bangladesh - Secure BGP and Operational Report of Bangladesh
 
BGP
BGPBGP
BGP
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
 
Vpn1
Vpn1Vpn1
Vpn1
 
Basic isp network design
Basic isp network designBasic isp network design
Basic isp network design
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
Myanmar Member Gathering
Myanmar Member GatheringMyanmar Member Gathering
Myanmar Member Gathering
 

More from Deploy360 Programme (Internet Society)

More from Deploy360 Programme (Internet Society) (20)

ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success StoriesION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
 
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter PresentationION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
 
ION Belgrade - Closing Slides
ION Belgrade - Closing SlidesION Belgrade - Closing Slides
ION Belgrade - Closing Slides
 
AusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRSAusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRS
 
ION Malta - IETF Update
ION Malta - IETF UpdateION Malta - IETF Update
ION Malta - IETF Update
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
ION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & AccountabilityION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & Accountability
 
ION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: FinlandION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: Finland
 
ION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 TransitionION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 Transition
 
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for youION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for you
 
ION Malta - Opening Slides
ION Malta - Opening SlidesION Malta - Opening Slides
ION Malta - Opening Slides
 
ION Malta - Closing Slides
ION Malta - Closing SlidesION Malta - Closing Slides
ION Malta - Closing Slides
 
ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
 
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng ChapterION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng Chapter
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

ION Hangzhou - RPKI At CNNIC