SlideShare a Scribd company logo
1 of 114
Download to read offline
1
MANRS for Network Operators
Anirban Datta
MANRS Ambassador
Md. Zobair Khan
MANRS Fellow (Training)
Agenda
2
• Understand the problem first
• BGP Hijacks
• BGP Leak
• Spoofing
• Any Solution/s?
• MANRS
• Filtering
• Anti Spoofing
• Coordination
• Global Validation (IRR/RPKI)
The Problem
A Routing Security Overview
3
Routing Incidents are Increasing
4
In 2019, 1,810 BGP Hijacks were recorded by bgpstream.com
These hijacks led to a range of problems including stolen data, lost revenue,
reputational damage, and more.
Some of these hijacks lasted for many hours
Incidents are global in scale, with one operator’s routing problems cascading
to impact others.
Routing Incidents Cause Real World Problems
5
• Unsecure routing is one of the most common problem for malicious
threats.
• Attacks can take anywhere from hours to months to even being
identified.
• Inadvertent errors can take entire countries offline, while attackers can
steal an individual’s data or hold an organization’s network hostage.
The Basics: How Routing Works
6
There are ~69,000 networks (Autonomous Systems) across the Internet,
each using a unique Autonomous System Number (ASN) to identify itself
to other networks.
Routers use Border Gateway Protocol (BGP) to exchange “reachability
information” - networks they know how to reach.
Routers build a “routing table” and pick the best route when sending a
packet, typically based on the shortest path.
Internet Routing Table
7
Prefixes [28/04/2020]: 832782
https://www.cidr-report.org
Unique ASes
8
Number of ASes in routing system: 68110
Number of ASes announcing only one prefix: 24270
https://www.cidr-report.org
The Honor System:
Routing Issues
9
Border Gateway Protocol (BGP) is
based entirely on trust between
networks
• No built-in validation that updates are
legitimate
• The chain of trust spans continents
• Lack of reliable resource data
Recent Events
10
Routing Incidents Cause Real World Problems
1
Prefix/Route
Hijacking
Route Leaks
IP address
spoofing
The Threats: What’s Happening?
12
Event Explanation Repercussions Solution
Prefix/Route
Hijacking
A network operator or attacker
impersonates another network operator,
pretending that a server or network is
their client.
Packets are forwarded to the
wrong place, and can cause
Denial of Service (DoS) attacks
or traffic interception.
Stronger filtering
policies
Route Leak A network operator with multiple
upstream providers (often due to
accidental misconfiguration) announces
to one upstream provider that is has a
route to a destination through the other
upstream provider.
Can be used for traffic
inspection and reconnaissance.
Stronger filtering
policies
IP Address
Spoofing
Someone creates IP packets with a false
source IP address to hide the identity of
the sender or to impersonate another
computing system.
The root cause of reflection
DDoS attacks
Source address
validation
Prefix/Route Hijacking
13
Route hijacking, also known as “BGP hijacking” when a
network operator or attacker (accidentally or deliberately)
impersonates another network operator or pretending that
a server or network is their client. This routes traffic to a
network operator, when another real route is available.
Example: The 2008 YouTube hijack; an attempt to block
YouTube through route hijacking led to much of the traffic
to YouTube being dropped around the world.
Prefix/Route Hijacking
14
Source: bgpstream.com
Route Leak
15
A route leak is a problem where a network operator with
multiple upstream providers accidentally announces to one
of its upstream providers that has a route to a destination
through the other upstream provider. This makes the
network an intermediary network between the two upstream
providers. With one sending traffic now through it to get to
the other.
Example: 2015, Malaysia Telecom and Level 3, a major
backbone provider. Malaysia Telecom told one of Level 3’s
networks that it was capable of delivering traffic to
anywhere on the Internet. Once Level 3 decided the route
through Malaysia Telecom looked like the best option, it
diverted a huge amount of traffic to Malaysia Telecom.
Route Leak
16
Source: bgpstream.com
IP Address Spoofing
17
IP address spoofing is used to hide the true identity of
the server or to impersonate another server. This
technique can be used to amplify an attack.
Example: DNS amplification attack. By sending
multiple spoofed requests to different DNS resolvers,
an attacker can prompt many responses from the DNS
resolver to be sent to a target, while only using one
system to attack.
Fix: Source address validation: systems for source
address validation can help tell if the end users and
customer networks have correct source IP addresses
(combined with filtering).
.
18
Impersonation
sender
victim
partner
Oh, my partner sent
me a packet. I’ll
process this.
????
.
19
Reflection
sender
ip spoofed
packet
victim
reflector
src: victim
dst: reflector
Oops, a lot of
replies without any
request…
IP Address Spoofing
20
https://spoofer.caida.org/country_stats.php
IP Address Spoofing
21
IP Address Spoofing – Australia
22
IP Address Spoofing – Australia
23
Tools to Help
24
• Prefix and AS-PATH filtering
• RPKI, IRR toolset, IRRPT, BGPQ3/Q4
• BGPSEC is standardized
But…
• Not enough deployment
• Lack of reliable data
We need a standard approach to
improving routing security.
We Are In This Together
25
Network operators have a
responsibility to ensure a globally
robust and secure routing
infrastructure.
Your network’s safety depends on a routing
infrastructure that weeds out bad actors and
accidental misconfigurations that wreak
havoc on the Internet.
The more network operators work together,
the fewer incidents there will be, and the less
damage they can do.
26
The Solution: Mutually Agreed Norms
for Routing Security (MANRS)
Provides crucial fixes to eliminate the most common routing threats
27
Mutually Agreed Norms for Routing Security
MANRS defines four simple but concrete actions that network operators must
implement to dramatically improve Internet security and reliability.
• The first two operational improvements eliminate the root causes of common routing issues
and attacks, while the second two procedural steps improve mitigation and decrease the
likelihood of future incidents.
MANRS Actions - Network operators
Filtering
Prevent propagation of
incorrect routing
information
Ensure the correctness of
your own announcements
and announcements from
your customers to adjacent
networks with prefix and
AS-path granularity
Anti-spoofing
Prevent traffic with
spoofed source IP
addresses
Enable source address
validation for at least
single-homed stub
customer networks, their
own end-users, and
infrastructure
Coordination
Facilitate global
operational
communication and
coordination between
network operators
Maintain globally
accessible up-to-date
contact information in
common routing databases
Global
Validation
Facilitate validation of
routing information on a
global scale
Publish your data, so
others can validate
28
IXPs
Action 1
Prevent
propagation of
incorrect routing
information
This mandatory
action requires
IXPs to implement
filtering of route
announcements at
the Route Server
based on routing
information data
(IRR and/or RPKI).
29
Action 2
Promote
MANRS to the
IXP membership
IXPs joining
MANRS are
expected to
provide
encouragement or
assistance for their
members to
implement
MANRS actions.
Action 3
Protect the
peering platform
This action
requires that the
IXP has a
published policy of
traffic not allowed
on the peering
fabric and
performs filtering
of such traffic.
Action 4
Facilitate global
operational
communication
and coordination
The IXP facilitates
communication
among members
by providing
necessary mailing
lists and member
directories.
Action 5
Provide
monitoring and
debugging tools
to the members.
The IXP provides
a looking glass for
its members.
MANRS for CDN & Cloud: a draft action set
Action 1
Prevent
propagation of
incorrect routing
information
Egress filtering
Ingress filtering –
non-transit peers,
explicit whitelists
3
0
Action 2
Prevent traffic
with spoofed
source IP
addresses
Anti-spoofing
controls to prevent
packets with
illegitimate source
IP address
Action 3
Facilitate global
operational
communication
and coordination
Contact information
in PeeringDB
and relevant RIR
databases
Action 4
Facilitate
validation of
routing
information on a
global scale
Publicly document
ASNs and prefixes
that are intended to
be advertised to
external parties.
Action 5
Encourage
MANRS adoption
Actively encourage
MANRS adoption
among the peers
Action 6
Provide
monitoring and
debugging tools
to peering
partners
Provide monitoring
tools to indicate
incorrect
announcements
from peers that
were filtered by the
CDN&Cloud
operator.
31
Internet Routing Registry (IRR)
What is a Routing Registry?
32
• A repository (database) of Internet routing policy information
• Autonomous System Numbers (ASN) exchanges routing information via BGP
• Routing decisions are based on policy based rules in BGP
• BGP does not provides a mechanism to publish/communicate the policies themselves
• Routing Registry provides this information which can be used by the BGP
• Routing policy information is expressed in a series of objects
Database Object
33
• An object is a set of attributes and values
• Each attribute of an object has a specific “Value”, specific “Syntax”, either it is
“mandatory” or “optional” etc.
Other Objects
34
Routing registry objects
inetnum, inet6num - The inetnum and inet6num store information about ranges
of IP addresses.
route, route6 – The route and route6 object contains routing information for IPv4
and IPv6 address space resources respectively
AS-Set - An as-set object forms a set of AS Numbers that can be referenced in
many of the places where an AS Number reference can be used.
Role - A role object is similar to a person object. However, instead of describing
a single person, it describes a role performed by one or more people.
Example of Person Object
35
person:
address:
address:
address:
country:
phone:
fax-no:
e-mail:
nic-hdl:
mnt-by:
changed:
source:
Test Person
Example Service Provider
2 Pandora St Boxville
Wallis and Futuna Islands
TC
+680-368-0844
+680-367-1797
tperson@example.com
TP17-AP
MAINT-ENET-TC
tperson@example.com 20090731
APNIC
Attributes Values
Example of inetnum/inet6num Object
36
inetnum:
netname:
descr:
country:
admin-c:
tech-c:
status:
mnt-by:
mnt-lower:
mnt-routes:
mnt-irt:
last-modified:
source:
192.88.99.0/24
EXAMPLENET-AP
Example net Pty Ltd
AP
DE345-AP
DE345-AP
ALLOCATED PORTABLE
MAINT-EXAMPLENET-AP
MAINT-EXAMPLENET-AP
MAINT-EXAMPLENET-AP
IRT-EXAMPLENET-AP
2020-06-10T13:04:08Z
RIR
Attributes Values
Example of Route/Route6 Object
37
route: 192.168.0.0/16
descr: ACME block
origin: AS1234
mnt-by: MAINT-AS1234
changed: jdoe@acme.net
source: RIR
Attributes Values
Route(6) Objects
route(6) objects register which IPv4/IPv6 prefix
will be announced by which AS number
Used for creating BGP filters
38
RIPE Database
Router configuration
BGP Filters
From AS Number accept:
•IPv4 prefix
•IPv6 prefix
route6: IPv6 prefix
origin: AS Number
route: IPv4 prefix
origin: AS Number
Registering IPv6 Routes
39
route: 2002:ff30::/32
origin: AS65530
mnt-by: SM30-MNT
inet6num: 2002:ff30::/32
mnt-by: TEST-NCC-HM-MNT
mnt-by: SM30-MNT
Registering IPv4 Routes
40
route: 10.30.0.0/22
origin: AS65530
mnt-by: SM30-MNT
inetnum: 10.30.0.0 - 10.30.3.255
mnt-by: TEST-NCC-HM-MNT
mnt-by: SM30-MNT
Example of AS-Set Object
41
as-set:
descr:
members:
remarks:
tech-c:
admin-c:
notify:
mnt-by:
changed:
source:
Attributes Values
AS-ACMENET
List of AS’s - AS sets BBONE should accept from Acme Net
AS123, AS376, AS542, AS838, AS800, AS839, AS807, AS-
DRENET, AS-GTIS
just a quick example
JD1-ACME
ZA1-ACME
jdoe@acme.net
MAINT-AS123
jdoe@acme.com 19941206
RIR
Route Objects and AS-Sets
42
as-set: AS15562:AS-SNIJDERS
members: AS65530
members: AS65535
members: AS
members: AS-STUCCHI
route6: 2001:db8:a::/48
origin:
AS65530
route6: 2001:db8:b::/48
origin:
AS65535
route6: 2001:db8:c::/48
origin:
AS12345
Limitations of AS-Sets
Can exist in multiple IRRs
AS-STEALTH exists in both the RIPE Database and RADB
The two are not managed by the same organisation
43
as-set: AS-STEALTH as-set: AS-STEALTH
RIPE Database RADB
BGP Operations and Security
BCP 194 – RFC7454
44
Action 1: Filtering
Why Filtering
Your first line of defence
You control what you are announcing
• You have no control over what other networks announce
To avoid issues, you have to decide what to accept from other networks
45
Data sources
IRRs
Bogons lists (IPv6 & IPv4)
PeeringDB
• For AS-Sets
46
Generating a Prefix Filter
47
members: AS65530
members: AS65535
members: AS65550
as-set: AS3333:AS-CUSTOMERS
route6: 2001:db8:a::/48
origin: AS65530
route6: 2001:db8:b::/48
origin: AS65535
route6: 2001:db8:c::/48
origin: AS65550
Routers
reverse lookup reverse lookup
ToolsTools
Generating a prefix list
Check the AS-Set
• Walk the AS-Set and prepare a list of all the ASNs contained
• If another AS-Set is contained, recursively walk it
With the list of ASNs, run an inverse query for each one
• Get the route objects where they are listed as Origin:
48
Bogons
Routes you shouldn't see in the routing table
• Private addresses
• Unallocated space
• Reserved space (Documentation, Multicast, etc.)
Team Cymru provides lists for both IPv6 and IPv4, updated daily
• http://www.team-cymru.com/bogon-reference.html
49
ASN Bogons
0
• Reserved - RFC7607
23456
• AS_TRANS - RFC6793
64496-64511 and 65536-65551
• Reserved for use in docs and code - RFC5398
64512-65534 and 4200000000-4294967294
• Reserved for Private Use - RFC6996
65535 and 4294967295
• Last 16 and 32 bit ASNs - RFC 7300
65552-131071
• Reserved - IANA
50
Prefix-lists
Lists of routes you want to accept or announce
You can create them manually or automatically
• With data from IRRs
Or using a tool
• bgpq3/bgpq4
• Level3 Filtergen
51
BCP 194 – RFC7454
• The Border Gateway Protocol (BGP) is the protocol almost exclusively used in
the Internet to exchange routing information between networks. Due to this
central nature, it is important to understand the security measures that can
and should be deployed to prevent accidental or intentional routing
disturbances.
• This RFC describes measures to protect the BGP sessions itself such as Time
to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane
filtering. It also describes measures to better control the flow of routing
information, using prefix filtering and automation of prefix filters, max-prefix
filtering, Autonomous System (AS) path filtering, route flap dampening, and
BGP community scrubbing.
52
BCP 194 – Prefix Filtering
• IPv4 and IPv6 Special-Purpose Prefixes
The IANA IPv4 and IPv6 Special-Purpose Address Registry maintains the list of
special-purpose prefixes and their routing scope, and it SHOULD be used for
prefix-filter configuration.
• Unallocated Prefixes
IANA allocates prefixes to RIRs that in turn allocate prefixes to LIRs (Local
Internet Registries). It is wise not to accept routing table prefixes that are not
allocated by IANA and/or RIRs. This section details the options for building a list
of allocated prefixes at every level. It is important to understand that filtering
unallocated prefixes requires constant updates, as prefixes are continually
allocated. Therefore, automation of such prefix filters is key for the success of
this approach. 53
BCP 194 – Prefix Filtering
• IANA-Allocated Prefix Filters
• RIR-Allocated Prefix Filters
• Prefix Filters Created from Internet Routing Registries (IRRs)
• SIDR - Secure Inter-Domain Routing
• Prefixes That Are Too Specific
• Filtering Prefixes Belonging to the Local AS and Downstreams
• IXP LAN Prefixes
54
BCP 194 – Prefix Filtering
Inbound Filtering (Loose – Strict)
Loose - where no check will be done against RIR allocations
Strict - where it will be verified that announcements strictly conform to what is
declared in routing registries.
55
BCP 194 – Prefix Filtering
Inbound Filtering Loose Option
In this case, the following prefixes received from a BGP peer will be filtered:
• prefixes that are not globally routable
• prefixes not allocated by IANA (IPv6 only)
• routes that are too specific
• prefixes belonging to the local AS
• IXP LAN prefixes
• the default route
56
BCP 194 – Prefix Filtering
Inbound Filtering Strict Option
In this case, filters are applied to make sure advertisements strictly conform to
what is declared in routing registries. This varies across the registries and
regions of the Internet.
In addition to this, apply the following filters beforehand in case the routing
registry that’s used as the source of information by the script is not fully trusted:
• prefixes that are not globally routable
• routes that are too specific
• prefixes belonging to the local AS
• IXP LAN prefixes and the default route
57
BCP 194 – Prefix Filtering
Outbound Filtering
The configuration should ensure that only appropriate prefixes are sent. These
can be, for example, prefixes belonging to both the network in question and its
downstream. This can be achieved by using BGP communities, AS paths, or
both. Also, it may be desirable to add the following filters before any policy to
avoid unwanted route announcements due to bad configuration:
• Prefixes that are not globally routable
• Routes that are too specific
• IXP LAN prefixes
• The default route
58
BCP 194 – Max Prefix Filtering
It is RECOMMENDED to configure a limit on the number of routes to be
accepted from a peer. The following rules are generally RECOMMENDED:
• From peers, it is RECOMMENDED to have a limit lower than the number of
routes in the Internet. This will shut down the BGP peering if the peer
suddenly advertises the full table.
• From upstreams that provide full routing, it is RECOMMENDED to have a limit
higher than the number of routes in the Internet. A limit is still useful in order to
protect the network (and in particular, the routers’ memory) if too many routes
are sent by the upstream.
59
BCP 194 – AS Path Filtering
Following are the RECOMMENDED practices when processing BGP AS paths.
• Network administrators SHOULD accept from customers only 2-byte or 4-byte
AS paths containing ASNs belonging to (or authorized to transit through) the
customer.
• Network administrators SHOULD NOT accept prefixes with private AS
numbers in the AS path unless the prefixes are from customers.
• Network administrators SHOULD NOT accept prefixes when the first AS
number in the AS path is not the one of the peer’s unless the peering is done
toward a BGP route server
• Network administrators SHOULD NOT advertise prefixes with upstream AS
numbers in the AS path to their peering AS unless they intend to provide
transit for these prefixes. 60
Network Ingress Filtering
BCP 38 – RFC2827 and more
61
Action 2: Anti-Spoofing
Source Address Validation
Check the source IP address of IP packets
• filter invalid source address
• filter close to the packets origin as possible
• filter precisely as possible
If no networks allow IP spoofing, we can eliminate these kinds of attacks
62
Source Address Validation
ACL
• packet filter
• permit valid-source, then drop any
uRPF check
• check incoming packets using ‘routing table’
• look-up the return path for the source ip address
• loose mode can’t stop ip reflected attacks
• use strict mode or feasible mode
63
Source Address Validation
Called uRPF (Unicast Reverse Path Forwarding)
Checks if an entry exists in the routing table before accepting the packet and
forwarding it
Four modes
• Loose
• Strict
• Feasible Path
• VRF
64
Source Address Validation
65
Source Address Validation
66
Cisco
Juniper
ACL - Source Address Validation
ACLs can also be used
• Towards a provider’s servers
• Towards Infrastructure networks
• When uRPF cannot be used because of platform limitations
67
Cisco ACL example
68
ip access-list extended fromCUSTOMER
permit ip 192.168.0.0 0.0.255.255 any
permit ip 10.0.0.0 0.0.0.3 any
deny ip any any
!
interface Gigabitethernet0/0
ip access-group fromCUSTOMER in
!
Juniper ACL example
69
firewall family inet {
filter fromCUSTOMER {
term CUSTOMER {
from source-address {
192.168.0.0/16;
10.0.0.0/30;
}
then accept;
}
term Default {
then discard;
}
}
}
[edit interface ge-0/0/0 unit 0 family inet]
filter {
input fromCUSTOMER;
}
Facilitating global operational communication and coordination
between network operators
70
Action 3: Coordination
Coordination
Maintaining Contact Information in Regional Internet Registries (RIRs): AFRINIC, APNIC,
RIPE NCC, LACNIC, ARIN
For Example: whois –h whois.apnic.net AS9541
aut-num: AS9541
as-name: CYBERNET-AP
descr: Cyber Internet Services (Pvt) Ltd.
country: PK
org: ORG-CISP3-AP
mnt-routes: MAINT-PK-CYBERNET
admin-c: AQ84-AP
tech-c: AQ84-AP
mnt-by: APNIC-HM
mnt-irt: IRT-CYBERNET-PK
mnt-lower: MAINT-PK-CYBERNET
last-modified: 2019-06-09T22:39:23Z
source: APNIC
71
Coordination
irt: IRT-CYBERNET-PK
address: A904, 9th Floor,Lakson Bldg 3,Sarwar Shaheed Rd,Karachi-74200
e-mail: noc-abuse@cyber.net.pk
abuse-mailbox: noc-abuse@cyber.net.pk
admin-c: AQ84-AP
tech-c: AQ84-AP
auth: # Filtered
mnt-by: MAINT-PK-AQ
last-modified: 2016-01-05T10:59:53Z
source: APNIC
organisation: ORG-CISP3-AP
org-name: Cyber Internet Services Pakistan
country: PK
address: A - 904 9th Floor Lakson Square Building No. 3
address: No. 3, Sarwar Shaheed Road Karachi-74200 Pakistan
phone: +92-21-38400654
fax-no: +92-213-5680842
e-mail: noc-abuse@cyber.net.pk
last-modified: 2019-04-25T12:55:55Z
source: APNIC 72
Facilitating validation of routing information on a global scale
73
Action 4: Global Validation
Global Validation
Routing information should be made available on a global scale to facilitate
validation, which includes routing policy, ASNs and prefixes that are intended to
be advertised to third parties. Since the extent of the internet is global,
information should be made public and published in a well known place using a
common format.
74
Object Source Description
aut-num IRR Policy documentation
route/route6 IRR NLRI/origin
as-set IRR Customer cone
ROA RPKI NLRI/origin
Global Validation
There are 2 ways to provide the validation information (IRR and/or RPKI)
Providing information through the IRR system
Internet Routing Registries (IRRs) contain information—submitted and
maintained by ISPs or other entities—about Autonomous System Numbers
(ASNs) and routing prefixes. IRRs can be used by ISPs to develop routing plans.
The global IRR is comprised of a network of distributed databases maintained by
Regional Internet Registries (RIRs) such as APNIC, service providers (such as
NTT), and third parties (such as RADB).
75
Global Validation
$ whois -h whois.apnic.net 1.1.1.0/24
route: 1.1.1.0/24
origin: AS13335
descr: APNIC Research and Development, 6 Cordelia St
mnt-by: MAINT-AU-APNIC-GM85-AP
last-modified: 2018-03-16T16:58:06Z
source: APNIC
76
Global Validation
$ whois -h whois.radb.net 1.1.1.0/24
route: 1.1.1.0/24
origin: AS13335
descr: APNIC Research and Development, 6 Cordelia St
mnt-by: MAINT-AU-APNIC-GM85-AP
last-modified: 2018-03-16T16:58:06Z
source: APNIC
route: 1.1.1.0/24
descr: Cloudflare, Inc.
descr: 101 Townsend Street, San Francisco, California 94107, US
origin: AS13335
mnt-by: MNT-CLOUD14
notify: rir@cloudflare.com 77
78
RPKI
Global Validation
Some IRR data cannot be fully trusted
• Accuracy
• Incomplete data
• Lack of maintenance
Not every RIR has an IRR
• Third party databases need to be used (RADB, Operators)
• No verification of who holds IPs/ASNs
79
Global Validation
Providing information through the RPKI system
The RPKI repository can store information about prefixes originated by your
network in the form of Route Origin Authorization (ROA) objects. Note, that these
do not include your customer announcements, but only prefixes that belong to
your ASN. Only the origin ASN is verified, not the full path.
All Regional Internet Registries offer a so-called hosted Resource Certification
service where keys are kept and managed by the RIR and all operations are
performed on the RIR’s servers.
80
Resource Public Key Infrastructure
Ties IP addresses and ASNs to public keys
Follows the hierarchy of the registries
Authorised statements from resource holders
• “ASN X is authorised to announce my Prefix Y”
• Signed, holder of Y
81
RPKI
A security framework for verifying the association between resource holders and
their Internet resources
Attaches digital certificates to network resources upon request that lists all
resources held by the member
• AS Numbers
• IP Addresses
Operators associate those two resources
• Route Origin Authorisations (ROAs)
82
RPKI Chain of Trust
RIR Root Certificate
Self-signed
83
ALL Resources
Root’s private key
signature
public key
RPKI Chain of Trust
LIR Certificate
Signed by the Root private key
84
LIR’s Resources
Root’s private key
signature
public key
RPKI Chain of Trust
85
ALL Resources
LIR’s Resources
Root’s private key signature
signature
public key
public key
Two elements of RPKI
86
Signing
Create your ROAs
Validating
Verifying others
ROA (Route Origin Authorisation)
LIRs can create a ROA for each one of their resources (IP address ranges)
Multiple ROAs can be created for an IP range
ROAs can overlap
87
What is in a ROA ?
88
Prefix The network for which you are creating
the ROA
The ASN supposed to be originating the
BGP Announcement
Origin
ASN
Max
Length
The Maximum prefix length accepted for
this ROA
Route Origin Authorisation
Prefix
is authorised to be announced by
AS Number
89
LIR’s private key
ROA
signature
RPKI Chain of Trust
90
ROA
signature
LIR’s Resources
signature
public key
ALL Resources
signature
public key
Global Validation
Providing information through the RPKI system
91
92
/24
193.0.24.0/21
AS2121ROA
Max Length: _
193.0.24.0/21
193.0.24.0/22 193.0.28.0/22
/23
/24 /24 /24 /24 /24 /24 /24
/23
193.0.24.0/23
AS2121
ROA
Max Length: /24
193.0.30.0/23
AS2121
ROA
Max Length: _
✖
/23
/24 /24
/23 /23/23
Relying Party
93
RIPE NCC ARIN APNIC AFRINICLACNIC
Validator
RPKI-RTR
94
ROAs
ROAs
VALIDATOR SOFTWARE
Verification
Validated
Cache
RPKI-RTR
ROUTERS
RIR REPOSITORIES
95
ROAs
ROAs
ROA Validation
BGP Validation
VALID INVALID
VALID INVALID UNKNOWN
NOT FOUND
Validator Software
• RIPE NCC Validator
• NLNetLabs Routinator
• Cloudflare OctoRPKI
• NIC.MX Fort
96
Cisco Origin Validation configuration
97
(config)# conf t
(config)# router bgp $ASN
(config-router)# bgp rpki server tcp 100.64.1.1 port 8323 refresh 300
(config-router)# bgp rpki server tcp 100.64.1.1 port 3323 refresh 300
Cisco Origin Validation configuration
98
(config-router)# route-map rpki-accept permit 10
(route-map)# match rpki valid
(route-map)# set local-preference 100
(route-map)# route-map rpki-accept permit 20
(route-map)# match rpki not-found
(route-map)# set local-preference 80
Cisco Origin Validation configuration
99
(config)# router bgp $ASN
(config)# address-family ipv4
(config)# neighbor 192.168.1.254 route-map rpki-accept in
(config)# address-family ipv6
(config)# neighbor 2002:eeee:ffff::a route-map rpki-accept in
Juniper Origin Validation configuration
100
routing-options {
autonomous-system 64511;
validation {
group rpki-validator {
session 100.64.1.1 {
refresh-time 120;
hold-time 180;
port 8282;
local-address 100.64.1.2;
}}}}
Juniper Origin Validation configuration
101
policy-statement send-direct {
from protocol direct;
then accept;}
policy-statement validation {
term valid {
from {
protocol bgp;
validation-database valid; }
then {
local-preference 110;
validation-state valid;
community add origin-validation-state-valid;
accept;
}}
Juniper Origin Validation configuration
102
term invalid {
from {
protocol bgp;
validation-database invalid;}
then {
local-preference 90;
validation-state invalid;
community add origin-validation-state-invalid;
accept;
}}
Juniper Origin Validation configuration
103
term unknown {
from protocol bgp;
then {
validation-state unknown;
community add origin-validation-state-unknown;
accept;
}}
Where do we go from here ?
RPKI is only one of the steps towards full BGP Validation
• Paths are not validated
We need more building blocks
• BGPSec (RFC)
• ASPA (draft)
• AS-Cones (draft)
104
BGPSec
RPKI does not protect against path redirection attacks
We need a way to verify the AS-Path of a given BGP Announcement
• And understand if anyone tampered with the data on the way to our routers
With BGPSec, the AS-Path attribute is cryptographically signed
• Using the operator’s certificate from RPKI
In order to validate an AS-Path, routers verify the chain of trust of all the signatures of
the AS-Path
105
Origin Validation Check
Go with your browser to
And check if your network applies Origin Validation
106
http://www.ripe.net/s/rpki-test
Global Validation
http://localcert.ripe.net:8088/api/v1/validity/AS13335/1.1.1.0/24
107
Why join MANRS?
108
Join Us
109
Visit https://www.manrs.org
• Fill out the sign up form with as much detail
as possible.
• We may ask questions and run tests
Get Involved in the Community
• Members support the initiative and
implement the actions in their own networks
• Members maintain and improve the
document and promote MANRS objectives
MANRS
Implementation Guide
110
If you’re not ready to join yet,
implementation guidance is available
to help you.
• Based on Best Current Operational
Practices deployed by network operators
around the world
• https://www.manrs.org/bcop/
MANRS Training Modules
111
6 training modules based on information
in the Implementation Guide.
Walks through the tutorial with a test at
the end of each module.
Working with and looking for partners
that are interested in integrating it in
their curricula.
https://academy.apnic.net/en/course/ma
nrs/
Thanks to APNIC for hosting MANRS Tutorial
“The good we secure for ourselves is
precarious and uncertain until it is
secured for all of us and incorporated into
our common life.”
― Jane Addams (Nobel Peace Prize Winner)
LEARN MORE:
https://www.manrs.org
113
Thank you.
manrs.org
Thank you.
manrs.org

More Related Content

What's hot

Traffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield SystemsTraffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield SystemsMyNOG
 
Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodAPNIC
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricBangladesh Network Operators Group
 
Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27APNIC
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSAPNIC
 
Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Juniper Networks
 
Community tools to fight against DDoS
Community tools to fight against DDoSCommunity tools to fight against DDoS
Community tools to fight against DDoSFakrul Alam
 
MyIX Updates
MyIX UpdatesMyIX Updates
MyIX UpdatesMyNOG
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec APNIC
 
How to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersSolarWinds
 
Broadband India Forum Session on IPv6: The Post-IPocalypse Internet
Broadband India Forum Session on IPv6: The Post-IPocalypse InternetBroadband India Forum Session on IPv6: The Post-IPocalypse Internet
Broadband India Forum Session on IPv6: The Post-IPocalypse InternetAPNIC
 
Eric Vyncke - Layer-2 security, ipv6 norway
Eric Vyncke - Layer-2 security, ipv6 norwayEric Vyncke - Layer-2 security, ipv6 norway
Eric Vyncke - Layer-2 security, ipv6 norwayIKT-Norge
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecShortestPathFirst
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen MaMyNOG
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6guestbeb9a5
 

What's hot (20)

Traffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield SystemsTraffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield Systems
 
Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long Period
 
Route Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS ApproachRoute Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS Approach
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
 
Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27
 
Netflow slides
Netflow slidesNetflow slides
Netflow slides
 
IPv6 Deployment Update
IPv6 Deployment UpdateIPv6 Deployment Update
IPv6 Deployment Update
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoS
 
Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)
 
RPKI with rpki.net Tools
RPKI with rpki.net ToolsRPKI with rpki.net Tools
RPKI with rpki.net Tools
 
Community tools to fight against DDoS
Community tools to fight against DDoSCommunity tools to fight against DDoS
Community tools to fight against DDoS
 
MyIX Updates
MyIX UpdatesMyIX Updates
MyIX Updates
 
BGP persistence
BGP persistenceBGP persistence
BGP persistence
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
 
How to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco Routers
 
Broadband India Forum Session on IPv6: The Post-IPocalypse Internet
Broadband India Forum Session on IPv6: The Post-IPocalypse InternetBroadband India Forum Session on IPv6: The Post-IPocalypse Internet
Broadband India Forum Session on IPv6: The Post-IPocalypse Internet
 
Eric Vyncke - Layer-2 security, ipv6 norway
Eric Vyncke - Layer-2 security, ipv6 norwayEric Vyncke - Layer-2 security, ipv6 norway
Eric Vyncke - Layer-2 security, ipv6 norway
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow Spec
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6
 

Similar to MANRS for Network Operators - bdNOG12

PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It TogetherPLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It TogetherPROIDEA
 
MANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityMANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityObika Gellineau
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Mumbai Academisc
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSDeploy360 Programme (Internet Society)
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 
Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Mumbai Academisc
 
Network security
Network securityNetwork security
Network securityVenkat Karanam
 
Monitoring for Network Security: BGP Hijacks, DDoS Attacks and DNS Poisoning
Monitoring for Network Security: BGP Hijacks, DDoS Attacks and DNS PoisoningMonitoring for Network Security: BGP Hijacks, DDoS Attacks and DNS Poisoning
Monitoring for Network Security: BGP Hijacks, DDoS Attacks and DNS PoisoningThousandEyes
 
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...Internet Society
 
Speedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSpeedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSadan Kumar
 
Onion Routing.ppt
Onion Routing.pptOnion Routing.ppt
Onion Routing.pptssuserb1ba95
 
CY.pptx
CY.pptxCY.pptx
CY.pptxCATalyst9
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...ThousandEyes
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
G0421040042
G0421040042G0421040042
G0421040042ijceronline
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 

Similar to MANRS for Network Operators - bdNOG12 (20)

Improving routing security through concerted action
Improving routing security through concerted actionImproving routing security through concerted action
Improving routing security through concerted action
 
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It TogetherPLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
 
MANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityMANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing Security
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
A017510102
A017510102A017510102
A017510102
 
Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)
 
Network security
Network securityNetwork security
Network security
 
Monitoring for Network Security: BGP Hijacks, DDoS Attacks and DNS Poisoning
Monitoring for Network Security: BGP Hijacks, DDoS Attacks and DNS PoisoningMonitoring for Network Security: BGP Hijacks, DDoS Attacks and DNS Poisoning
Monitoring for Network Security: BGP Hijacks, DDoS Attacks and DNS Poisoning
 
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
 
Speedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSpeedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhan
 
Onion Routing.ppt
Onion Routing.pptOnion Routing.ppt
Onion Routing.ppt
 
CY.pptx
CY.pptxCY.pptx
CY.pptx
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
G0421040042
G0421040042G0421040042
G0421040042
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 

More from Bangladesh Network Operators Group

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephBangladesh Network Operators Group
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductBangladesh Network Operators Group
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentBangladesh Network Operators Group
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceBangladesh Network Operators Group
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaBangladesh Network Operators Group
 
Measuring the Internet Economy: How Networks Create Value
Measuring the Internet Economy: How Networks Create ValueMeasuring the Internet Economy: How Networks Create Value
Measuring the Internet Economy: How Networks Create ValueBangladesh Network Operators Group
 

More from Bangladesh Network Operators Group (20)

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
 
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptxBdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
 
RPKI ROA updates
RPKI ROA updatesRPKI ROA updates
RPKI ROA updates
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 
Measuring the Internet Economy: How Networks Create Value
Measuring the Internet Economy: How Networks Create ValueMeasuring the Internet Economy: How Networks Create Value
Measuring the Internet Economy: How Networks Create Value
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 

Recently uploaded (20)

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 

MANRS for Network Operators - bdNOG12

  • 1. 1 MANRS for Network Operators Anirban Datta MANRS Ambassador Md. Zobair Khan MANRS Fellow (Training)
  • 2. Agenda 2 • Understand the problem first • BGP Hijacks • BGP Leak • Spoofing • Any Solution/s? • MANRS • Filtering • Anti Spoofing • Coordination • Global Validation (IRR/RPKI)
  • 3. The Problem A Routing Security Overview 3
  • 4. Routing Incidents are Increasing 4 In 2019, 1,810 BGP Hijacks were recorded by bgpstream.com These hijacks led to a range of problems including stolen data, lost revenue, reputational damage, and more. Some of these hijacks lasted for many hours Incidents are global in scale, with one operator’s routing problems cascading to impact others.
  • 5. Routing Incidents Cause Real World Problems 5 • Unsecure routing is one of the most common problem for malicious threats. • Attacks can take anywhere from hours to months to even being identified. • Inadvertent errors can take entire countries offline, while attackers can steal an individual’s data or hold an organization’s network hostage.
  • 6. The Basics: How Routing Works 6 There are ~69,000 networks (Autonomous Systems) across the Internet, each using a unique Autonomous System Number (ASN) to identify itself to other networks. Routers use Border Gateway Protocol (BGP) to exchange “reachability information” - networks they know how to reach. Routers build a “routing table” and pick the best route when sending a packet, typically based on the shortest path.
  • 7. Internet Routing Table 7 Prefixes [28/04/2020]: 832782 https://www.cidr-report.org
  • 8. Unique ASes 8 Number of ASes in routing system: 68110 Number of ASes announcing only one prefix: 24270 https://www.cidr-report.org
  • 9. The Honor System: Routing Issues 9 Border Gateway Protocol (BGP) is based entirely on trust between networks • No built-in validation that updates are legitimate • The chain of trust spans continents • Lack of reliable resource data
  • 11. Routing Incidents Cause Real World Problems 1 Prefix/Route Hijacking Route Leaks IP address spoofing
  • 12. The Threats: What’s Happening? 12 Event Explanation Repercussions Solution Prefix/Route Hijacking A network operator or attacker impersonates another network operator, pretending that a server or network is their client. Packets are forwarded to the wrong place, and can cause Denial of Service (DoS) attacks or traffic interception. Stronger filtering policies Route Leak A network operator with multiple upstream providers (often due to accidental misconfiguration) announces to one upstream provider that is has a route to a destination through the other upstream provider. Can be used for traffic inspection and reconnaissance. Stronger filtering policies IP Address Spoofing Someone creates IP packets with a false source IP address to hide the identity of the sender or to impersonate another computing system. The root cause of reflection DDoS attacks Source address validation
  • 13. Prefix/Route Hijacking 13 Route hijacking, also known as “BGP hijacking” when a network operator or attacker (accidentally or deliberately) impersonates another network operator or pretending that a server or network is their client. This routes traffic to a network operator, when another real route is available. Example: The 2008 YouTube hijack; an attempt to block YouTube through route hijacking led to much of the traffic to YouTube being dropped around the world.
  • 15. Route Leak 15 A route leak is a problem where a network operator with multiple upstream providers accidentally announces to one of its upstream providers that has a route to a destination through the other upstream provider. This makes the network an intermediary network between the two upstream providers. With one sending traffic now through it to get to the other. Example: 2015, Malaysia Telecom and Level 3, a major backbone provider. Malaysia Telecom told one of Level 3’s networks that it was capable of delivering traffic to anywhere on the Internet. Once Level 3 decided the route through Malaysia Telecom looked like the best option, it diverted a huge amount of traffic to Malaysia Telecom.
  • 17. IP Address Spoofing 17 IP address spoofing is used to hide the true identity of the server or to impersonate another server. This technique can be used to amplify an attack. Example: DNS amplification attack. By sending multiple spoofed requests to different DNS resolvers, an attacker can prompt many responses from the DNS resolver to be sent to a target, while only using one system to attack. Fix: Source address validation: systems for source address validation can help tell if the end users and customer networks have correct source IP addresses (combined with filtering).
  • 18. . 18 Impersonation sender victim partner Oh, my partner sent me a packet. I’ll process this. ????
  • 19. . 19 Reflection sender ip spoofed packet victim reflector src: victim dst: reflector Oops, a lot of replies without any request…
  • 22. IP Address Spoofing – Australia 22
  • 23. IP Address Spoofing – Australia 23
  • 24. Tools to Help 24 • Prefix and AS-PATH filtering • RPKI, IRR toolset, IRRPT, BGPQ3/Q4 • BGPSEC is standardized But… • Not enough deployment • Lack of reliable data We need a standard approach to improving routing security.
  • 25. We Are In This Together 25 Network operators have a responsibility to ensure a globally robust and secure routing infrastructure. Your network’s safety depends on a routing infrastructure that weeds out bad actors and accidental misconfigurations that wreak havoc on the Internet. The more network operators work together, the fewer incidents there will be, and the less damage they can do.
  • 26. 26 The Solution: Mutually Agreed Norms for Routing Security (MANRS) Provides crucial fixes to eliminate the most common routing threats
  • 27. 27 Mutually Agreed Norms for Routing Security MANRS defines four simple but concrete actions that network operators must implement to dramatically improve Internet security and reliability. • The first two operational improvements eliminate the root causes of common routing issues and attacks, while the second two procedural steps improve mitigation and decrease the likelihood of future incidents.
  • 28. MANRS Actions - Network operators Filtering Prevent propagation of incorrect routing information Ensure the correctness of your own announcements and announcements from your customers to adjacent networks with prefix and AS-path granularity Anti-spoofing Prevent traffic with spoofed source IP addresses Enable source address validation for at least single-homed stub customer networks, their own end-users, and infrastructure Coordination Facilitate global operational communication and coordination between network operators Maintain globally accessible up-to-date contact information in common routing databases Global Validation Facilitate validation of routing information on a global scale Publish your data, so others can validate 28
  • 29. IXPs Action 1 Prevent propagation of incorrect routing information This mandatory action requires IXPs to implement filtering of route announcements at the Route Server based on routing information data (IRR and/or RPKI). 29 Action 2 Promote MANRS to the IXP membership IXPs joining MANRS are expected to provide encouragement or assistance for their members to implement MANRS actions. Action 3 Protect the peering platform This action requires that the IXP has a published policy of traffic not allowed on the peering fabric and performs filtering of such traffic. Action 4 Facilitate global operational communication and coordination The IXP facilitates communication among members by providing necessary mailing lists and member directories. Action 5 Provide monitoring and debugging tools to the members. The IXP provides a looking glass for its members.
  • 30. MANRS for CDN & Cloud: a draft action set Action 1 Prevent propagation of incorrect routing information Egress filtering Ingress filtering – non-transit peers, explicit whitelists 3 0 Action 2 Prevent traffic with spoofed source IP addresses Anti-spoofing controls to prevent packets with illegitimate source IP address Action 3 Facilitate global operational communication and coordination Contact information in PeeringDB and relevant RIR databases Action 4 Facilitate validation of routing information on a global scale Publicly document ASNs and prefixes that are intended to be advertised to external parties. Action 5 Encourage MANRS adoption Actively encourage MANRS adoption among the peers Action 6 Provide monitoring and debugging tools to peering partners Provide monitoring tools to indicate incorrect announcements from peers that were filtered by the CDN&Cloud operator.
  • 32. What is a Routing Registry? 32 • A repository (database) of Internet routing policy information • Autonomous System Numbers (ASN) exchanges routing information via BGP • Routing decisions are based on policy based rules in BGP • BGP does not provides a mechanism to publish/communicate the policies themselves • Routing Registry provides this information which can be used by the BGP • Routing policy information is expressed in a series of objects
  • 33. Database Object 33 • An object is a set of attributes and values • Each attribute of an object has a specific “Value”, specific “Syntax”, either it is “mandatory” or “optional” etc.
  • 34. Other Objects 34 Routing registry objects inetnum, inet6num - The inetnum and inet6num store information about ranges of IP addresses. route, route6 – The route and route6 object contains routing information for IPv4 and IPv6 address space resources respectively AS-Set - An as-set object forms a set of AS Numbers that can be referenced in many of the places where an AS Number reference can be used. Role - A role object is similar to a person object. However, instead of describing a single person, it describes a role performed by one or more people.
  • 35. Example of Person Object 35 person: address: address: address: country: phone: fax-no: e-mail: nic-hdl: mnt-by: changed: source: Test Person Example Service Provider 2 Pandora St Boxville Wallis and Futuna Islands TC +680-368-0844 +680-367-1797 tperson@example.com TP17-AP MAINT-ENET-TC tperson@example.com 20090731 APNIC Attributes Values
  • 36. Example of inetnum/inet6num Object 36 inetnum: netname: descr: country: admin-c: tech-c: status: mnt-by: mnt-lower: mnt-routes: mnt-irt: last-modified: source: 192.88.99.0/24 EXAMPLENET-AP Example net Pty Ltd AP DE345-AP DE345-AP ALLOCATED PORTABLE MAINT-EXAMPLENET-AP MAINT-EXAMPLENET-AP MAINT-EXAMPLENET-AP IRT-EXAMPLENET-AP 2020-06-10T13:04:08Z RIR Attributes Values
  • 37. Example of Route/Route6 Object 37 route: 192.168.0.0/16 descr: ACME block origin: AS1234 mnt-by: MAINT-AS1234 changed: jdoe@acme.net source: RIR Attributes Values
  • 38. Route(6) Objects route(6) objects register which IPv4/IPv6 prefix will be announced by which AS number Used for creating BGP filters 38 RIPE Database Router configuration BGP Filters From AS Number accept: •IPv4 prefix •IPv6 prefix route6: IPv6 prefix origin: AS Number route: IPv4 prefix origin: AS Number
  • 39. Registering IPv6 Routes 39 route: 2002:ff30::/32 origin: AS65530 mnt-by: SM30-MNT inet6num: 2002:ff30::/32 mnt-by: TEST-NCC-HM-MNT mnt-by: SM30-MNT
  • 40. Registering IPv4 Routes 40 route: 10.30.0.0/22 origin: AS65530 mnt-by: SM30-MNT inetnum: 10.30.0.0 - 10.30.3.255 mnt-by: TEST-NCC-HM-MNT mnt-by: SM30-MNT
  • 41. Example of AS-Set Object 41 as-set: descr: members: remarks: tech-c: admin-c: notify: mnt-by: changed: source: Attributes Values AS-ACMENET List of AS’s - AS sets BBONE should accept from Acme Net AS123, AS376, AS542, AS838, AS800, AS839, AS807, AS- DRENET, AS-GTIS just a quick example JD1-ACME ZA1-ACME jdoe@acme.net MAINT-AS123 jdoe@acme.com 19941206 RIR
  • 42. Route Objects and AS-Sets 42 as-set: AS15562:AS-SNIJDERS members: AS65530 members: AS65535 members: AS members: AS-STUCCHI route6: 2001:db8:a::/48 origin: AS65530 route6: 2001:db8:b::/48 origin: AS65535 route6: 2001:db8:c::/48 origin: AS12345
  • 43. Limitations of AS-Sets Can exist in multiple IRRs AS-STEALTH exists in both the RIPE Database and RADB The two are not managed by the same organisation 43 as-set: AS-STEALTH as-set: AS-STEALTH RIPE Database RADB
  • 44. BGP Operations and Security BCP 194 – RFC7454 44 Action 1: Filtering
  • 45. Why Filtering Your first line of defence You control what you are announcing • You have no control over what other networks announce To avoid issues, you have to decide what to accept from other networks 45
  • 46. Data sources IRRs Bogons lists (IPv6 & IPv4) PeeringDB • For AS-Sets 46
  • 47. Generating a Prefix Filter 47 members: AS65530 members: AS65535 members: AS65550 as-set: AS3333:AS-CUSTOMERS route6: 2001:db8:a::/48 origin: AS65530 route6: 2001:db8:b::/48 origin: AS65535 route6: 2001:db8:c::/48 origin: AS65550 Routers reverse lookup reverse lookup ToolsTools
  • 48. Generating a prefix list Check the AS-Set • Walk the AS-Set and prepare a list of all the ASNs contained • If another AS-Set is contained, recursively walk it With the list of ASNs, run an inverse query for each one • Get the route objects where they are listed as Origin: 48
  • 49. Bogons Routes you shouldn't see in the routing table • Private addresses • Unallocated space • Reserved space (Documentation, Multicast, etc.) Team Cymru provides lists for both IPv6 and IPv4, updated daily • http://www.team-cymru.com/bogon-reference.html 49
  • 50. ASN Bogons 0 • Reserved - RFC7607 23456 • AS_TRANS - RFC6793 64496-64511 and 65536-65551 • Reserved for use in docs and code - RFC5398 64512-65534 and 4200000000-4294967294 • Reserved for Private Use - RFC6996 65535 and 4294967295 • Last 16 and 32 bit ASNs - RFC 7300 65552-131071 • Reserved - IANA 50
  • 51. Prefix-lists Lists of routes you want to accept or announce You can create them manually or automatically • With data from IRRs Or using a tool • bgpq3/bgpq4 • Level3 Filtergen 51
  • 52. BCP 194 – RFC7454 • The Border Gateway Protocol (BGP) is the protocol almost exclusively used in the Internet to exchange routing information between networks. Due to this central nature, it is important to understand the security measures that can and should be deployed to prevent accidental or intentional routing disturbances. • This RFC describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane filtering. It also describes measures to better control the flow of routing information, using prefix filtering and automation of prefix filters, max-prefix filtering, Autonomous System (AS) path filtering, route flap dampening, and BGP community scrubbing. 52
  • 53. BCP 194 – Prefix Filtering • IPv4 and IPv6 Special-Purpose Prefixes The IANA IPv4 and IPv6 Special-Purpose Address Registry maintains the list of special-purpose prefixes and their routing scope, and it SHOULD be used for prefix-filter configuration. • Unallocated Prefixes IANA allocates prefixes to RIRs that in turn allocate prefixes to LIRs (Local Internet Registries). It is wise not to accept routing table prefixes that are not allocated by IANA and/or RIRs. This section details the options for building a list of allocated prefixes at every level. It is important to understand that filtering unallocated prefixes requires constant updates, as prefixes are continually allocated. Therefore, automation of such prefix filters is key for the success of this approach. 53
  • 54. BCP 194 – Prefix Filtering • IANA-Allocated Prefix Filters • RIR-Allocated Prefix Filters • Prefix Filters Created from Internet Routing Registries (IRRs) • SIDR - Secure Inter-Domain Routing • Prefixes That Are Too Specific • Filtering Prefixes Belonging to the Local AS and Downstreams • IXP LAN Prefixes 54
  • 55. BCP 194 – Prefix Filtering Inbound Filtering (Loose – Strict) Loose - where no check will be done against RIR allocations Strict - where it will be verified that announcements strictly conform to what is declared in routing registries. 55
  • 56. BCP 194 – Prefix Filtering Inbound Filtering Loose Option In this case, the following prefixes received from a BGP peer will be filtered: • prefixes that are not globally routable • prefixes not allocated by IANA (IPv6 only) • routes that are too specific • prefixes belonging to the local AS • IXP LAN prefixes • the default route 56
  • 57. BCP 194 – Prefix Filtering Inbound Filtering Strict Option In this case, filters are applied to make sure advertisements strictly conform to what is declared in routing registries. This varies across the registries and regions of the Internet. In addition to this, apply the following filters beforehand in case the routing registry that’s used as the source of information by the script is not fully trusted: • prefixes that are not globally routable • routes that are too specific • prefixes belonging to the local AS • IXP LAN prefixes and the default route 57
  • 58. BCP 194 – Prefix Filtering Outbound Filtering The configuration should ensure that only appropriate prefixes are sent. These can be, for example, prefixes belonging to both the network in question and its downstream. This can be achieved by using BGP communities, AS paths, or both. Also, it may be desirable to add the following filters before any policy to avoid unwanted route announcements due to bad configuration: • Prefixes that are not globally routable • Routes that are too specific • IXP LAN prefixes • The default route 58
  • 59. BCP 194 – Max Prefix Filtering It is RECOMMENDED to configure a limit on the number of routes to be accepted from a peer. The following rules are generally RECOMMENDED: • From peers, it is RECOMMENDED to have a limit lower than the number of routes in the Internet. This will shut down the BGP peering if the peer suddenly advertises the full table. • From upstreams that provide full routing, it is RECOMMENDED to have a limit higher than the number of routes in the Internet. A limit is still useful in order to protect the network (and in particular, the routers’ memory) if too many routes are sent by the upstream. 59
  • 60. BCP 194 – AS Path Filtering Following are the RECOMMENDED practices when processing BGP AS paths. • Network administrators SHOULD accept from customers only 2-byte or 4-byte AS paths containing ASNs belonging to (or authorized to transit through) the customer. • Network administrators SHOULD NOT accept prefixes with private AS numbers in the AS path unless the prefixes are from customers. • Network administrators SHOULD NOT accept prefixes when the first AS number in the AS path is not the one of the peer’s unless the peering is done toward a BGP route server • Network administrators SHOULD NOT advertise prefixes with upstream AS numbers in the AS path to their peering AS unless they intend to provide transit for these prefixes. 60
  • 61. Network Ingress Filtering BCP 38 – RFC2827 and more 61 Action 2: Anti-Spoofing
  • 62. Source Address Validation Check the source IP address of IP packets • filter invalid source address • filter close to the packets origin as possible • filter precisely as possible If no networks allow IP spoofing, we can eliminate these kinds of attacks 62
  • 63. Source Address Validation ACL • packet filter • permit valid-source, then drop any uRPF check • check incoming packets using ‘routing table’ • look-up the return path for the source ip address • loose mode can’t stop ip reflected attacks • use strict mode or feasible mode 63
  • 64. Source Address Validation Called uRPF (Unicast Reverse Path Forwarding) Checks if an entry exists in the routing table before accepting the packet and forwarding it Four modes • Loose • Strict • Feasible Path • VRF 64
  • 67. ACL - Source Address Validation ACLs can also be used • Towards a provider’s servers • Towards Infrastructure networks • When uRPF cannot be used because of platform limitations 67
  • 68. Cisco ACL example 68 ip access-list extended fromCUSTOMER permit ip 192.168.0.0 0.0.255.255 any permit ip 10.0.0.0 0.0.0.3 any deny ip any any ! interface Gigabitethernet0/0 ip access-group fromCUSTOMER in !
  • 69. Juniper ACL example 69 firewall family inet { filter fromCUSTOMER { term CUSTOMER { from source-address { 192.168.0.0/16; 10.0.0.0/30; } then accept; } term Default { then discard; } } } [edit interface ge-0/0/0 unit 0 family inet] filter { input fromCUSTOMER; }
  • 70. Facilitating global operational communication and coordination between network operators 70 Action 3: Coordination
  • 71. Coordination Maintaining Contact Information in Regional Internet Registries (RIRs): AFRINIC, APNIC, RIPE NCC, LACNIC, ARIN For Example: whois –h whois.apnic.net AS9541 aut-num: AS9541 as-name: CYBERNET-AP descr: Cyber Internet Services (Pvt) Ltd. country: PK org: ORG-CISP3-AP mnt-routes: MAINT-PK-CYBERNET admin-c: AQ84-AP tech-c: AQ84-AP mnt-by: APNIC-HM mnt-irt: IRT-CYBERNET-PK mnt-lower: MAINT-PK-CYBERNET last-modified: 2019-06-09T22:39:23Z source: APNIC 71
  • 72. Coordination irt: IRT-CYBERNET-PK address: A904, 9th Floor,Lakson Bldg 3,Sarwar Shaheed Rd,Karachi-74200 e-mail: noc-abuse@cyber.net.pk abuse-mailbox: noc-abuse@cyber.net.pk admin-c: AQ84-AP tech-c: AQ84-AP auth: # Filtered mnt-by: MAINT-PK-AQ last-modified: 2016-01-05T10:59:53Z source: APNIC organisation: ORG-CISP3-AP org-name: Cyber Internet Services Pakistan country: PK address: A - 904 9th Floor Lakson Square Building No. 3 address: No. 3, Sarwar Shaheed Road Karachi-74200 Pakistan phone: +92-21-38400654 fax-no: +92-213-5680842 e-mail: noc-abuse@cyber.net.pk last-modified: 2019-04-25T12:55:55Z source: APNIC 72
  • 73. Facilitating validation of routing information on a global scale 73 Action 4: Global Validation
  • 74. Global Validation Routing information should be made available on a global scale to facilitate validation, which includes routing policy, ASNs and prefixes that are intended to be advertised to third parties. Since the extent of the internet is global, information should be made public and published in a well known place using a common format. 74 Object Source Description aut-num IRR Policy documentation route/route6 IRR NLRI/origin as-set IRR Customer cone ROA RPKI NLRI/origin
  • 75. Global Validation There are 2 ways to provide the validation information (IRR and/or RPKI) Providing information through the IRR system Internet Routing Registries (IRRs) contain information—submitted and maintained by ISPs or other entities—about Autonomous System Numbers (ASNs) and routing prefixes. IRRs can be used by ISPs to develop routing plans. The global IRR is comprised of a network of distributed databases maintained by Regional Internet Registries (RIRs) such as APNIC, service providers (such as NTT), and third parties (such as RADB). 75
  • 76. Global Validation $ whois -h whois.apnic.net 1.1.1.0/24 route: 1.1.1.0/24 origin: AS13335 descr: APNIC Research and Development, 6 Cordelia St mnt-by: MAINT-AU-APNIC-GM85-AP last-modified: 2018-03-16T16:58:06Z source: APNIC 76
  • 77. Global Validation $ whois -h whois.radb.net 1.1.1.0/24 route: 1.1.1.0/24 origin: AS13335 descr: APNIC Research and Development, 6 Cordelia St mnt-by: MAINT-AU-APNIC-GM85-AP last-modified: 2018-03-16T16:58:06Z source: APNIC route: 1.1.1.0/24 descr: Cloudflare, Inc. descr: 101 Townsend Street, San Francisco, California 94107, US origin: AS13335 mnt-by: MNT-CLOUD14 notify: rir@cloudflare.com 77
  • 79. Global Validation Some IRR data cannot be fully trusted • Accuracy • Incomplete data • Lack of maintenance Not every RIR has an IRR • Third party databases need to be used (RADB, Operators) • No verification of who holds IPs/ASNs 79
  • 80. Global Validation Providing information through the RPKI system The RPKI repository can store information about prefixes originated by your network in the form of Route Origin Authorization (ROA) objects. Note, that these do not include your customer announcements, but only prefixes that belong to your ASN. Only the origin ASN is verified, not the full path. All Regional Internet Registries offer a so-called hosted Resource Certification service where keys are kept and managed by the RIR and all operations are performed on the RIR’s servers. 80
  • 81. Resource Public Key Infrastructure Ties IP addresses and ASNs to public keys Follows the hierarchy of the registries Authorised statements from resource holders • “ASN X is authorised to announce my Prefix Y” • Signed, holder of Y 81
  • 82. RPKI A security framework for verifying the association between resource holders and their Internet resources Attaches digital certificates to network resources upon request that lists all resources held by the member • AS Numbers • IP Addresses Operators associate those two resources • Route Origin Authorisations (ROAs) 82
  • 83. RPKI Chain of Trust RIR Root Certificate Self-signed 83 ALL Resources Root’s private key signature public key
  • 84. RPKI Chain of Trust LIR Certificate Signed by the Root private key 84 LIR’s Resources Root’s private key signature public key
  • 85. RPKI Chain of Trust 85 ALL Resources LIR’s Resources Root’s private key signature signature public key public key
  • 86. Two elements of RPKI 86 Signing Create your ROAs Validating Verifying others
  • 87. ROA (Route Origin Authorisation) LIRs can create a ROA for each one of their resources (IP address ranges) Multiple ROAs can be created for an IP range ROAs can overlap 87
  • 88. What is in a ROA ? 88 Prefix The network for which you are creating the ROA The ASN supposed to be originating the BGP Announcement Origin ASN Max Length The Maximum prefix length accepted for this ROA
  • 89. Route Origin Authorisation Prefix is authorised to be announced by AS Number 89 LIR’s private key ROA signature
  • 90. RPKI Chain of Trust 90 ROA signature LIR’s Resources signature public key ALL Resources signature public key
  • 91. Global Validation Providing information through the RPKI system 91
  • 92. 92 /24 193.0.24.0/21 AS2121ROA Max Length: _ 193.0.24.0/21 193.0.24.0/22 193.0.28.0/22 /23 /24 /24 /24 /24 /24 /24 /24 /23 193.0.24.0/23 AS2121 ROA Max Length: /24 193.0.30.0/23 AS2121 ROA Max Length: _ ✖ /23 /24 /24 /23 /23/23
  • 93. Relying Party 93 RIPE NCC ARIN APNIC AFRINICLACNIC Validator
  • 95. 95 ROAs ROAs ROA Validation BGP Validation VALID INVALID VALID INVALID UNKNOWN NOT FOUND
  • 96. Validator Software • RIPE NCC Validator • NLNetLabs Routinator • Cloudflare OctoRPKI • NIC.MX Fort 96
  • 97. Cisco Origin Validation configuration 97 (config)# conf t (config)# router bgp $ASN (config-router)# bgp rpki server tcp 100.64.1.1 port 8323 refresh 300 (config-router)# bgp rpki server tcp 100.64.1.1 port 3323 refresh 300
  • 98. Cisco Origin Validation configuration 98 (config-router)# route-map rpki-accept permit 10 (route-map)# match rpki valid (route-map)# set local-preference 100 (route-map)# route-map rpki-accept permit 20 (route-map)# match rpki not-found (route-map)# set local-preference 80
  • 99. Cisco Origin Validation configuration 99 (config)# router bgp $ASN (config)# address-family ipv4 (config)# neighbor 192.168.1.254 route-map rpki-accept in (config)# address-family ipv6 (config)# neighbor 2002:eeee:ffff::a route-map rpki-accept in
  • 100. Juniper Origin Validation configuration 100 routing-options { autonomous-system 64511; validation { group rpki-validator { session 100.64.1.1 { refresh-time 120; hold-time 180; port 8282; local-address 100.64.1.2; }}}}
  • 101. Juniper Origin Validation configuration 101 policy-statement send-direct { from protocol direct; then accept;} policy-statement validation { term valid { from { protocol bgp; validation-database valid; } then { local-preference 110; validation-state valid; community add origin-validation-state-valid; accept; }}
  • 102. Juniper Origin Validation configuration 102 term invalid { from { protocol bgp; validation-database invalid;} then { local-preference 90; validation-state invalid; community add origin-validation-state-invalid; accept; }}
  • 103. Juniper Origin Validation configuration 103 term unknown { from protocol bgp; then { validation-state unknown; community add origin-validation-state-unknown; accept; }}
  • 104. Where do we go from here ? RPKI is only one of the steps towards full BGP Validation • Paths are not validated We need more building blocks • BGPSec (RFC) • ASPA (draft) • AS-Cones (draft) 104
  • 105. BGPSec RPKI does not protect against path redirection attacks We need a way to verify the AS-Path of a given BGP Announcement • And understand if anyone tampered with the data on the way to our routers With BGPSec, the AS-Path attribute is cryptographically signed • Using the operator’s certificate from RPKI In order to validate an AS-Path, routers verify the chain of trust of all the signatures of the AS-Path 105
  • 106. Origin Validation Check Go with your browser to And check if your network applies Origin Validation 106 http://www.ripe.net/s/rpki-test
  • 109. Join Us 109 Visit https://www.manrs.org • Fill out the sign up form with as much detail as possible. • We may ask questions and run tests Get Involved in the Community • Members support the initiative and implement the actions in their own networks • Members maintain and improve the document and promote MANRS objectives
  • 110. MANRS Implementation Guide 110 If you’re not ready to join yet, implementation guidance is available to help you. • Based on Best Current Operational Practices deployed by network operators around the world • https://www.manrs.org/bcop/
  • 111. MANRS Training Modules 111 6 training modules based on information in the Implementation Guide. Walks through the tutorial with a test at the end of each module. Working with and looking for partners that are interested in integrating it in their curricula. https://academy.apnic.net/en/course/ma nrs/ Thanks to APNIC for hosting MANRS Tutorial
  • 112. “The good we secure for ourselves is precarious and uncertain until it is secured for all of us and incorporated into our common life.” ― Jane Addams (Nobel Peace Prize Winner)