SlideShare a Scribd company logo
1 of 15
MANRS:
Intro to Internet Routing
Security
Presenter: Obika Gellineau
Twitter: @AntiPhishClub
Linkedin: https://tt.linkedin.com/in/obikag
Objectives
 To understand the issues associated with internet routing incidents
and the impact these incidents have on the security and reliability
of the internet.
 To highlight the importance and benefits of MANRS with respect to
the routing of internet traffic.
 To determine the actions required to implement MANRS and the
tools used for its implementation.
Agenda
 Routing Incidents
 Internet Routing Basics
 What is MANRS?
 Benefits of MANRS
 The Four Pillars
 Global Validation
 Filtering
 Anti-Spoofing
 Coordination
 Key Takeaways
Routing Incidents
 In 2017, over 14,000 routing outages or attacks were recorded.
 These routing incidents lead to:
 Data Theft
 Loss of Revenue
 Loss or Reputation
 Loss of Productivity
 Some of these incidents are global in scale. Impacting internet users far and wide.
 Attacks can last from hours and take months to recognize.
 These incidents affected large internet giants, such as YouTube, Amazon and
Netflix.
Routing Incidents
 The common threats that cause these incidents include:
 BGP Hijacking (Prefix/Route) – Impersonation of another network operator and
pretending that a server on their network is their client
 Route Leak – Announcement of misconfigured routing paths from a network
operator who has multiple upstream providers, altering the destination path
through one of the upstream providers.
 IP Address Spoofing – Impersonation of an IP address using a fake source IP
address to hide the identity of the sender or impersonate another computer system.
Internet Routing Basics
 Internet traffic is routed through
networks called Autonomous Systems.
 ~60,000 AS route traffic of which each
is identified by an Autonomous System
Number (ASN).
 Routers use Border Gateway Protocol
(BGP) to exchange network paths.
 Routers owned by AS build a routing
table and pick the best route (i.e.
shortest path) for sending packets.
 BGP is based on trust between
networks.
 Some issues with BGP exchanges
between AS networks are:
 The chain of trust spans continents
 Lack of reliable data
 Lack of validation of updates
 These can lead to routing incidents
such as, incorrectly routed traffic and
successful DDoS attacks.
 One prevention mechanism against
these types of incidents is MANRS
What is MANRS?
Mutually Agreed Norms for Routing Security
 It improves the security and reliability of the global Internet routing system, based on
collaboration among participants and shared responsibility for the Internet
infrastructure.
 Defines four concrete actions (or pillars) that network operators must implement to
dramatically improve Internet security and reliability
 Two (2) of these pillars minimize the root cause of common routing issues and
attacks
 The other two (2) of these pillars mitigate the likelihood of future incidents.
Benefits of MANRS
Internet Exchange Providers (IXP)
• Prevents propagation of accidentally or intentionally
misconfigured routing information.
• Protects the peering platform between networks
• Improves communication between local, regional
and global operators
• Provides network operators with easily accessible
monitoring tools
Internet Service Providers (ISP)
• Validation of routing information on a global scale
• Provides protection against cyber attacks through IP
address validation and network filtering.
• Expansive and real-time monitoring of global events
• Improves brand value through increased reliability
and security
Four Pillars
Global
Validation
Validation of routing
information on a global
scale
Network operators must
publish their data, so that
other participants can
validate.
Filtering
Prevention of propagation
of incorrect routing
information
Network operators must
ensure correctness of their
and customer’s
announcements with prefix
and AS-path granularity
Anti-
Spoofing
Prevention of traffic with
spoofed source IP
addresses
Network operators must
enable source address
validation for at least
single-homed networks,
end-users and
infrastructure
Collaboration
Improved global
communication and
coordination between
network operators
Network operators must
maintain globally
accessible up-to-date
contact information in
routing databases.
Four Pillars – Global Validation
“Validation of routing information on a global scale”
Actions:
 Communicate which announcements are correct to adjacent networks
 Publicly document routing policy, ASNs and prefixes that are intended to be advertised to external
parties
Implementation:
 Register policy documentation, Network Layer Reachability Information (i.e. route/route6) and ASNs
in publicly available databases
 Route Origin Authorization (ROA) should also be registered with a certificate authority.
Tools:
 Internet Routing Registry (IRR) for route/route6, policy documentation and ASN
 Resource Public Key Infrastructure (RPKI) for ROA’s (e.g. RIPE, ARIN, APNIC, etc.)
Four Pillars – Filtering
“Prevention of propagation of incorrect routing information”
Actions:
 Clearly define routing policy and implement a system for correctness of their and customer
announcements to adjacent networks with granular prefix and AS-path.
 Due diligence for the correctness of customer announcements.
Implementation:
 Use IRR and RPKI authorities to build filters by requiring customers (i.e. upstream network
operators) to register their route objects.
 Use an internal database of valid IP addresses and verified route objects to build filters.
Tools:
 BGPQ3 or IRRToolset to build prefix-lists from IRR which will be used by routers for filtering
 RIPE NCC RPKI Validator and Dragon Research Labs RPKI Toolkit to validate ROAs
Four Pillars – Anti-Spoofing
“Prevention of traffic with spoofed source IP addresses”
Actions:
 Implement a system that enables source address validation for at least single-homed
customer networks, their own end-user and infrastructure.
Implementation:
 Source-Address Validation on cable-modem networks
 Unicast Reverse-Path Forwarding (uRPF) on router networks
 Access Control Lists for networks where the other anti-spoofing technologies are not
available.
Tools:
 Vendor-specific tools for routers (e.g. Cisco, Juniper, MikroTik etc.)
Four Pillars – Collaboration
“Improved global communication and coordination between network operators”
Actions:
 Maintain up-to-date and globally accessible contact information
Implementation:
 Maintaining contact information in Regional Internet Registries (RIR)
Tools:
 Registering contact information and consistently updating it with RIRs:
 AFRINIC – African Network Information Centre
 APNIC – Asia-Pacific Network Information Centre
 LACNIC – Latin America Network Information Centre
 ARIN – American Registry for Internet Numbers
 RIPE – Reseaux IP Europeens Network Coordination Centre
Key Takeaways
 Internet routing incidents lead to a reduced quality of internet services, cyber
attacks and brand/reputational damage for internet service providers.
 MANRS assists with the mitigation of internet routing incidents and improves the
security and reliability of the internet.
 Through global validation, filtering, anti-spoofing and collaboration, IXPs and ISPs
can better secure their services.
 MANRS ensures a safe internet for all end-users.
Thank You
Twitter: @AntiPhishClub
Linkedin: https://tt.linkedin.com/in/obikag

More Related Content

What's hot

Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
Information Technology
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma
 

What's hot (19)

Avr presentation
Avr   presentationAvr   presentation
Avr presentation
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report
PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report
PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Sangfor ngfw 修订版
Sangfor ngfw 修订版Sangfor ngfw 修订版
Sangfor ngfw 修订版
 
Internet Traffic 2009-2019
Internet Traffic 2009-2019Internet Traffic 2009-2019
Internet Traffic 2009-2019
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
JAKU Botnet Analysis
JAKU Botnet AnalysisJAKU Botnet Analysis
JAKU Botnet Analysis
 
Base Metal Forensics
Base Metal ForensicsBase Metal Forensics
Base Metal Forensics
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
VPN
VPNVPN
VPN
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers
 

Similar to MANRS - Introduction to Internet Routing Security

Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDF
Ahmed Adel
 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networks
ijtsrd
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
Jeff Green
 

Similar to MANRS - Introduction to Internet Routing Security (20)

MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12
 
Routing is at Risk - Let’s secure it together
Routing is at Risk - Let’s secure it togetherRouting is at Risk - Let’s secure it together
Routing is at Risk - Let’s secure it together
 
Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDF
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRS
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
Network Bandwidth management - Mumbai Seminar
Network Bandwidth management - Mumbai SeminarNetwork Bandwidth management - Mumbai Seminar
Network Bandwidth management - Mumbai Seminar
 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networks
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Chapter04
Chapter04Chapter04
Chapter04
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
 
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
G03403041052
G03403041052G03403041052
G03403041052
 

More from Obika Gellineau

More from Obika Gellineau (6)

Securing Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 PresentationSecuring Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 Presentation
 
Introduction to Penetration testing - GDG DevFest Caribbean 2021 presentation
Introduction to Penetration testing - GDG DevFest Caribbean 2021 presentationIntroduction to Penetration testing - GDG DevFest Caribbean 2021 presentation
Introduction to Penetration testing - GDG DevFest Caribbean 2021 presentation
 
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
 
Robotic Process Automation Development
Robotic Process Automation DevelopmentRobotic Process Automation Development
Robotic Process Automation Development
 
Capital One Data Breach
Capital One Data BreachCapital One Data Breach
Capital One Data Breach
 
Static Code Analysis
Static Code AnalysisStatic Code Analysis
Static Code Analysis
 

Recently uploaded

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Recently uploaded (20)

Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 

MANRS - Introduction to Internet Routing Security

  • 1. MANRS: Intro to Internet Routing Security Presenter: Obika Gellineau Twitter: @AntiPhishClub Linkedin: https://tt.linkedin.com/in/obikag
  • 2. Objectives  To understand the issues associated with internet routing incidents and the impact these incidents have on the security and reliability of the internet.  To highlight the importance and benefits of MANRS with respect to the routing of internet traffic.  To determine the actions required to implement MANRS and the tools used for its implementation.
  • 3. Agenda  Routing Incidents  Internet Routing Basics  What is MANRS?  Benefits of MANRS  The Four Pillars  Global Validation  Filtering  Anti-Spoofing  Coordination  Key Takeaways
  • 4. Routing Incidents  In 2017, over 14,000 routing outages or attacks were recorded.  These routing incidents lead to:  Data Theft  Loss of Revenue  Loss or Reputation  Loss of Productivity  Some of these incidents are global in scale. Impacting internet users far and wide.  Attacks can last from hours and take months to recognize.  These incidents affected large internet giants, such as YouTube, Amazon and Netflix.
  • 5. Routing Incidents  The common threats that cause these incidents include:  BGP Hijacking (Prefix/Route) – Impersonation of another network operator and pretending that a server on their network is their client  Route Leak – Announcement of misconfigured routing paths from a network operator who has multiple upstream providers, altering the destination path through one of the upstream providers.  IP Address Spoofing – Impersonation of an IP address using a fake source IP address to hide the identity of the sender or impersonate another computer system.
  • 6. Internet Routing Basics  Internet traffic is routed through networks called Autonomous Systems.  ~60,000 AS route traffic of which each is identified by an Autonomous System Number (ASN).  Routers use Border Gateway Protocol (BGP) to exchange network paths.  Routers owned by AS build a routing table and pick the best route (i.e. shortest path) for sending packets.  BGP is based on trust between networks.  Some issues with BGP exchanges between AS networks are:  The chain of trust spans continents  Lack of reliable data  Lack of validation of updates  These can lead to routing incidents such as, incorrectly routed traffic and successful DDoS attacks.  One prevention mechanism against these types of incidents is MANRS
  • 7. What is MANRS? Mutually Agreed Norms for Routing Security  It improves the security and reliability of the global Internet routing system, based on collaboration among participants and shared responsibility for the Internet infrastructure.  Defines four concrete actions (or pillars) that network operators must implement to dramatically improve Internet security and reliability  Two (2) of these pillars minimize the root cause of common routing issues and attacks  The other two (2) of these pillars mitigate the likelihood of future incidents.
  • 8. Benefits of MANRS Internet Exchange Providers (IXP) • Prevents propagation of accidentally or intentionally misconfigured routing information. • Protects the peering platform between networks • Improves communication between local, regional and global operators • Provides network operators with easily accessible monitoring tools Internet Service Providers (ISP) • Validation of routing information on a global scale • Provides protection against cyber attacks through IP address validation and network filtering. • Expansive and real-time monitoring of global events • Improves brand value through increased reliability and security
  • 9. Four Pillars Global Validation Validation of routing information on a global scale Network operators must publish their data, so that other participants can validate. Filtering Prevention of propagation of incorrect routing information Network operators must ensure correctness of their and customer’s announcements with prefix and AS-path granularity Anti- Spoofing Prevention of traffic with spoofed source IP addresses Network operators must enable source address validation for at least single-homed networks, end-users and infrastructure Collaboration Improved global communication and coordination between network operators Network operators must maintain globally accessible up-to-date contact information in routing databases.
  • 10. Four Pillars – Global Validation “Validation of routing information on a global scale” Actions:  Communicate which announcements are correct to adjacent networks  Publicly document routing policy, ASNs and prefixes that are intended to be advertised to external parties Implementation:  Register policy documentation, Network Layer Reachability Information (i.e. route/route6) and ASNs in publicly available databases  Route Origin Authorization (ROA) should also be registered with a certificate authority. Tools:  Internet Routing Registry (IRR) for route/route6, policy documentation and ASN  Resource Public Key Infrastructure (RPKI) for ROA’s (e.g. RIPE, ARIN, APNIC, etc.)
  • 11. Four Pillars – Filtering “Prevention of propagation of incorrect routing information” Actions:  Clearly define routing policy and implement a system for correctness of their and customer announcements to adjacent networks with granular prefix and AS-path.  Due diligence for the correctness of customer announcements. Implementation:  Use IRR and RPKI authorities to build filters by requiring customers (i.e. upstream network operators) to register their route objects.  Use an internal database of valid IP addresses and verified route objects to build filters. Tools:  BGPQ3 or IRRToolset to build prefix-lists from IRR which will be used by routers for filtering  RIPE NCC RPKI Validator and Dragon Research Labs RPKI Toolkit to validate ROAs
  • 12. Four Pillars – Anti-Spoofing “Prevention of traffic with spoofed source IP addresses” Actions:  Implement a system that enables source address validation for at least single-homed customer networks, their own end-user and infrastructure. Implementation:  Source-Address Validation on cable-modem networks  Unicast Reverse-Path Forwarding (uRPF) on router networks  Access Control Lists for networks where the other anti-spoofing technologies are not available. Tools:  Vendor-specific tools for routers (e.g. Cisco, Juniper, MikroTik etc.)
  • 13. Four Pillars – Collaboration “Improved global communication and coordination between network operators” Actions:  Maintain up-to-date and globally accessible contact information Implementation:  Maintaining contact information in Regional Internet Registries (RIR) Tools:  Registering contact information and consistently updating it with RIRs:  AFRINIC – African Network Information Centre  APNIC – Asia-Pacific Network Information Centre  LACNIC – Latin America Network Information Centre  ARIN – American Registry for Internet Numbers  RIPE – Reseaux IP Europeens Network Coordination Centre
  • 14. Key Takeaways  Internet routing incidents lead to a reduced quality of internet services, cyber attacks and brand/reputational damage for internet service providers.  MANRS assists with the mitigation of internet routing incidents and improves the security and reliability of the internet.  Through global validation, filtering, anti-spoofing and collaboration, IXPs and ISPs can better secure their services.  MANRS ensures a safe internet for all end-users.
  • 15. Thank You Twitter: @AntiPhishClub Linkedin: https://tt.linkedin.com/in/obikag