RPKI with rpki.net Tools

RPKI with rpki.net ToolS
bdNOG 1
22nd May 20143, Dhaka, Bangladesh
Muhammad Moinur Rahman, bdNOG
SANOG 23 : Thiphu, BhutanbdNOG Page 2
RPKI: Introduction
Tutorial
Target audience
- Knowledge of Internet Routing(specially BGP)
- Familiar with any IRR Database
- No need to know Cryptography
- Basic knowledge of PKI(Public Key Infrastructure)
Layout
- Theory
- Handson Lab using rpki.net tools on Cisco IOS, Cisco IOS-XR and
Juniper
SANOG 23 : Thiphu, BhutanbdNOG Page 3
Historical Incident
November, 2012 – Google traffic affected in AP region
due to hardware failure of Moratel
Pakistan Telecom and Youtube incident
7007 accident, UU/Sprint for 2 days
SANOG 23 : Thiphu, BhutanbdNOG Page 4
Historical Incident (Thinks to Consider)
For theory of positivity lets call all these as Mis-
Origination
Traffic Hijacking or Prefix Hijacking assumes Negative
intent
SANOG 23 : Thiphu, BhutanbdNOG Page 5
Historical Context
1986 – Bellovin & Perlman identify the vulnerability in
DNS and Routing
1999 - National Academies study called it out
2000 – S-BGP – X.509 PKI to support Secure BGP -
Kent, Lynn, et al.
2003 – NANOG S-BGP Workshop
2006 – RPKI.NET(for ARIN) & APNIC start work on
RPKI. RIPE starts in 2008.
2009 – RPKI.NET Open Testbed and running code in
test routers
SANOG 23 : Thiphu, BhutanbdNOG Page 6
Current Trend
Filtering limited to the edges facing the customer
Filters on peering and transit sessions are often too
complex or take too many resources
- Do you filter?
A lot depends on trusting each other
- Daily examples show this is no longer enough
SANOG 23 : Thiphu, BhutanbdNOG Page 7
When filtering is not enough ..
A lot of different registries exist(Nearly 40), operated by
a number of different parties:
- Not all of them mirror the other registries
- How trust worthy is the information they provide?
The IRR system is far from complete (RPSL lives with
RPSLNG) but no further development.
Resulting filters are hard to maintain and can take a lot
of router memory
SANOG 23 : Thiphu, BhutanbdNOG Page 8
Goals of RPKI
Running a Secured Internet for the end users
Reducing routing leaks
Attaching digital certificates to network resources
- AS Numbers
- IP Addresses
Allowing ISPs to associate the two
- Route Origin Authorizations (ROAs)
- Can follow the address allocation chain to the top
SANOG 23 : Thiphu, BhutanbdNOG Page 9
RPKI Accomplishes
Allows routers or other processes to validate route
origins
Simplifies validation authority information
- Trust Anchor Locator
Distributes trusted information
- Through repositories
SANOG 23 : Thiphu, BhutanbdNOG Page 10
Public Key Concept
Private key: This key must be known only by its owner.
Public key: This key is known to everyone (it is public)
Relation between both keys: What one key encrypts,
the other one decrypts, and vice versa. That means that
if you encrypt something with my public key (which you
would know, because it's public :-), I would need my
private key to decrypt the message.
Same alike http with SSL aka https
SANOG 23 : Thiphu, BhutanbdNOG Page 11
PKI in IRR
The RIRs hold a self-signed root certificate for all the
resources that they have in the registry
- They are the trust anchor for the system
That root certificate is used to sign a certificate that lists
your resources
You can issue child certificates for those resources to
your customers
- When making assignments or sub allocations
SANOG 23 : Thiphu, BhutanbdNOG Page 12
Route Origination Authorisation (ROA)
Next to the prefix and the ASN which is allowed to
announce it, the ROA contains:
- A minimum prefix length
- A maximum prefix length
- An expiry date
Multiple ROAs can exist for the same prefix
ROAs can overlap
SANOG 23 : Thiphu, BhutanbdNOG Page 13
RPKI Protocols
Certificate Authority
Relying Party/Origin Validation
SANOG 23 : Thiphu, BhutanbdNOG Page 14
Result of Check
Valid – A matching/covering ROA was found with a
matching AS number
Invalid – A matching or covering ROA was found, but
AS number did not match, and there was no valid one
Not Found – No matching or covering ROA was found
SANOG 23 : Thiphu, BhutanbdNOG Page 15
Policy Override Knobs
Disable Validity Check Completely
Disable Validity Check for a Peer
Disable Validity Check for Prefixes
When check is disabled, the result is “Not Found,” i.e.
as if there was no ROA
SANOG 23 : Thiphu, BhutanbdNOG Page 16
How to run CA?
 Open Source Software to run a member CA
- Use the LIR as parent CA (trust anchor)
- Generate and publish Certificate yourself
 LIR Hosted Platform
- All processes are secured and automated
- One click set-up of Resource Certificate
- WebUI to manage Certificates in LIR Portal
- All the major LIR do have RPKI/Resouce Certification configuration options in
their portal
SANOG 23 : Thiphu, BhutanbdNOG Page 17
How to run RP?
 Rpki.net tools (Both CA and RP)
 RIPE/NCC (Both CA and RP)
 RTRLIB (RP Only)
 APNIC (CA Only)
SANOG 23 : Thiphu, BhutanbdNOG Page 18
Validation in Practice
All certificates and ROAs are published in a repository
and available for download
Software running on your own machine will periodically
retrieve and verify the information
- Cryptographic tools check all the signatures
The result is a list of all valid combinations of ASN and
prefix, the “validated cache”
SANOG 23 : Thiphu, BhutanbdNOG Page 19
RPKI Support in Routers
The RPKI-RTR Protocol is an IETF Internet Draft
Production Cisco Support:
- ASR1000, 7600, ASR903 and ASR901 in releases 15.2(1)S or XE 3.5
- Cisco Early Field Trial (EFT):
- ASR9000, CRS1, CRS3 and c12K (IOS-XR 4.3.2)
Juniper has support since version 12.2
Quagga has support through BGP-SRX
SANOG 23 : Thiphu, BhutanbdNOG Page 20
RPKI-Router Integration
Local Validator Tool (RP) feeds RPKI capable router
with processed data set
- Router does not do the crypto!
SANOG 23 : Thiphu, BhutanbdNOG Page 21
RPKI Workflow
Creates a repository
- RFC 3779 (RPKI) Certificates
- ROAs
- CRLs
- Manifest records
SANOG 23 : Thiphu, BhutanbdNOG Page 22
RTR Workflow
Storing ROA cache using RTR protocol which can
be downloaded from the validator and kept
available in memory
Validate with ROA cache data inside the router
where BGP process will check each announcement
and label the prefix
Propagate RPKI validation result with iBGP for
other router (Sending/Receiving BGP Extended
Community must be enabled) to make a decision
(Modify pref or filter) based on it
SANOG 23 : Thiphu, BhutanbdNOG Page 23
Who is deciding what to do?
The Validator is a tool which can help you making
decisions about routing
Using it properly can enhance the security and
stability of the Internet
It is your network and you make the final decision
SANOG 23 : Thiphu, BhutanbdNOG Page 24
Repository View
root@rpki# ls /ba/03a5be-ddf6-4340-a1f9-1ad3f2c39ee6/1:
ICcaIRKhGHJ-TgUZv8GRKqkidR4.roa
cKxLCU94umS-qD4DOOkAK0M2US0.cer
dSmerM6uJGLWMMQTl2esy4xyUAA.crl
dSmerM6uJGLWMMQTl2esy4xyUAA.mnf
nB0gDFtWffKk4VWgln-12pdFtE8.roa
 A Repository Directory containing an RFC3779
Certificate, two ROAs, a CRL, and a manifest
SANOG 23 : Thiphu, BhutanbdNOG Page 25
Using a Repository
Pull down these files using a manifest-validating
mechanism
Validate the ROAs contained in the repository
Communicate with the router marking routes “valid”,
“invalid”, “unknown”
Up to ISP to use local policy on how to route
SANOG 23 : Thiphu, BhutanbdNOG Page 26
RPKI Workflow
 RPKI Web interface -> Repository
 Repository aggregator -> Validator
 Validated entries -> Route Checking
 Route checking results -> local routing decisions (based on
local policy)
SANOG 23 : Thiphu, BhutanbdNOG Page 27
RPKI Caveats
 When RTR session goes down, the RPKI status will be not
found for all the bgp route after a while
- Invalid => not found
- we need several RTR sessions or care your filtering policy
 In case of the router reload, which one is faster, receiving
ROAs or receiving BGP routes?
- If receiving BGP is match faster than ROA, the router propagate the invalid
route to others
- We need to put our Cache validator within our IGP scope
SANOG 23 : Thiphu, BhutanbdNOG Page 28
Who do we trust?
Can we trust the *IR for hosting our Private Keys?
SANOG 23 : Thiphu, BhutanbdNOG Page 29
RPKI: Further Reading
 RFC 5280: X.509 PKI Certificates
 RFC 3779: Extensions for IP Addresses and ASNs
 RFC 6481-6493: Resource Public Key Infrastructure
SANOG 23 : Thiphu, BhutanbdNOG Page 30
Demo: Two Parts
 Creating ROAs in LIR Portal
 Validating and Configuring routers to make a decision for a
prefix
 BEFORE THAT LET’s GO FOR A TEA BREAK ..
SANOG 23 : Thiphu, BhutanbdNOG Page 31
IRR Toolset, RPSL: Questions
Contact
person: Muhammad Moinur Rahman
address: The Alliance Building. (6th Floor),
address: 63 Pragati Sharani, Baridhara,
country: BD
phone: +8801977881132
e-mail: moin@1asia-ahl.com
nic-hdl: MMR13-AP
notify: moin@1asia-ahl.com
mnt-by: MAINT-BD-1ASIAAHL
changed: moin@1asia-ahl.com 20121128
source: APNIC
1 of 31

Recommended

MANRS for Network Operators - bdNOG12 by
MANRS for Network Operators - bdNOG12MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12Bangladesh Network Operators Group
281 views114 slides
BGPalerter: BGP prefix monitoring by
BGPalerter: BGP prefix monitoringBGPalerter: BGP prefix monitoring
BGPalerter: BGP prefix monitoringBangladesh Network Operators Group
438 views21 slides
Routing Security by
Routing SecurityRouting Security
Routing SecurityRIPE NCC
41 views58 slides
MyIX Updates by
MyIX UpdatesMyIX Updates
MyIX UpdatesMyNOG
1.1K views20 slides
ION Bangladesh - Secure BGP and Operational Report of Bangladesh by
ION Bangladesh - Secure BGP and Operational Report of BangladeshION Bangladesh - Secure BGP and Operational Report of Bangladesh
ION Bangladesh - Secure BGP and Operational Report of BangladeshDeploy360 Programme (Internet Society)
545 views16 slides
Routing Security - its importance and status in South Asia by
Routing Security - its importance and status in South AsiaRouting Security - its importance and status in South Asia
Routing Security - its importance and status in South AsiaBangladesh Network Operators Group
256 views25 slides

More Related Content

What's hot

Route Origin Validation With Routinator - A MANRS Approach for Operators by
Route Origin Validation With Routinator - A MANRS Approach for OperatorsRoute Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsBangladesh Network Operators Group
740 views40 slides
Community tools to fight against DDoS by
Community tools to fight against DDoSCommunity tools to fight against DDoS
Community tools to fight against DDoSFakrul Alam
616 views28 slides
LKNOG 2: Robust and Secure Connections by
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsAPNIC
301 views34 slides
AFRINIC Presentation - Resource certification by Amreesh Phokeer by
AFRINIC Presentation - Resource certification by Amreesh PhokeerAFRINIC Presentation - Resource certification by Amreesh Phokeer
AFRINIC Presentation - Resource certification by Amreesh PhokeerAFRINIC
144 views25 slides
31, Get more from your IPv4 resources by
31, Get more from your IPv4 resources31, Get more from your IPv4 resources
31, Get more from your IPv4 resourcesBangladesh Network Operators Group
3.3K views32 slides
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin by
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginEC-Council
971 views22 slides

What's hot(20)

Community tools to fight against DDoS by Fakrul Alam
Community tools to fight against DDoSCommunity tools to fight against DDoS
Community tools to fight against DDoS
Fakrul Alam616 views
LKNOG 2: Robust and Secure Connections by APNIC
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure Connections
APNIC301 views
AFRINIC Presentation - Resource certification by Amreesh Phokeer by AFRINIC
AFRINIC Presentation - Resource certification by Amreesh PhokeerAFRINIC Presentation - Resource certification by Amreesh Phokeer
AFRINIC Presentation - Resource certification by Amreesh Phokeer
AFRINIC144 views
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin by EC-Council
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
EC-Council971 views
Resource Certification by RIPE NCC
Resource CertificationResource Certification
Resource Certification
RIPE NCC602 views
RPKI Certification Tutorial by RIPE NCC
RPKI Certification TutorialRPKI Certification Tutorial
RPKI Certification Tutorial
RIPE NCC1.1K views
How to Configure NetFlow v5 & v9 on Cisco Routers by SolarWinds
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco Routers
SolarWinds19.5K views
SANOG 33: APNIC Routing Registry and ROAs by APNIC
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs
APNIC327 views
DDoS Mitigation Tools and Techniques by Babak Farrokhi
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and Techniques
Babak Farrokhi2.2K views
MUM Middle East 2016 - System Integration Analyst by Fajar Nugroho
MUM Middle East 2016 - System Integration AnalystMUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration Analyst
Fajar Nugroho414 views
Proof of Transit: Securely Verifying a Path or Service Chain by Frank Brockners
Proof of Transit: Securely Verifying a Path or Service ChainProof of Transit: Securely Verifying a Path or Service Chain
Proof of Transit: Securely Verifying a Path or Service Chain
Frank Brockners1.5K views
MUM Europe 2017 - Traffic Generator Case Study by Fajar Nugroho
MUM Europe 2017 - Traffic Generator Case StudyMUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case Study
Fajar Nugroho448 views
PhNOG 2020: ROA and RPKI in the Philippines by APNIC
PhNOG 2020: ROA and RPKI in the PhilippinesPhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the Philippines
APNIC663 views
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma by MyNOG
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
MyNOG870 views

Viewers also liked

Securing Asterisk: A practical approach by
Securing Asterisk: A practical approachSecuring Asterisk: A practical approach
Securing Asterisk: A practical approachBangladesh Network Operators Group
1.6K views29 slides
APNIC Services Update by
APNIC Services Update APNIC Services Update
APNIC Services Update Bangladesh Network Operators Group
606 views21 slides
APNIC Policy Update by
APNIC Policy Update APNIC Policy Update
APNIC Policy Update Bangladesh Network Operators Group
848 views11 slides
Traffic Engineering for CDNs by
Traffic Engineering for CDNs Traffic Engineering for CDNs
Traffic Engineering for CDNs Bangladesh Network Operators Group
2.6K views45 slides
Participant Access Control in IP Multicasting by
Participant Access Control in IP Multicasting Participant Access Control in IP Multicasting
Participant Access Control in IP Multicasting Bangladesh Network Operators Group
1.6K views26 slides
Shikkhok.com, An ISIF awarded project by
Shikkhok.com, An ISIF awarded project Shikkhok.com, An ISIF awarded project
Shikkhok.com, An ISIF awarded project Bangladesh Network Operators Group
979 views42 slides

Viewers also liked(20)

Similar to RPKI with rpki.net Tools

Rpki -manrs_(7_september) by
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)NaveenLakshman
47 views68 slides
Rpki with rpki.net tools by
Rpki with rpki.net toolsRpki with rpki.net tools
Rpki with rpki.net toolsMuhammad Moinur Rahman
137 views31 slides
HKNOG 7.0: RPKI - it's time to start deploying it by
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itAPNIC
1.3K views36 slides
Introduction to RPKI - MyNOG by
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
1.4K views28 slides
Introduction to RPKI by Sheryl (Shane) Hermoso by
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoMyNOG
1.6K views28 slides
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka by
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaAPNIC
426 views32 slides

Similar to RPKI with rpki.net Tools(20)

HKNOG 7.0: RPKI - it's time to start deploying it by APNIC
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying it
APNIC1.3K views
Introduction to RPKI - MyNOG by Siena Perry
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
Siena Perry1.4K views
Introduction to RPKI by Sheryl (Shane) Hermoso by MyNOG
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
MyNOG1.6K views
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka by APNIC
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
APNIC426 views
LKNOG3-Keynote by LKNOG
LKNOG3-KeynoteLKNOG3-Keynote
LKNOG3-Keynote
LKNOG81 views
Introduction to RPKI by APNIC
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
APNIC1.4K views
RPKI Introduction by Randy Bush by MyNOG
RPKI Introduction by Randy BushRPKI Introduction by Randy Bush
RPKI Introduction by Randy Bush
MyNOG2.5K views
32nd TWNIC IP OPM: ROA+ROV deployment & industry development by APNIC
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
APNIC398 views
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin by MyNOG
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. ServinInitial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
MyNOG328 views
IDNOG 6: RQC and RPKI by APNIC
IDNOG 6: RQC and RPKIIDNOG 6: RQC and RPKI
IDNOG 6: RQC and RPKI
APNIC559 views
BSides: BGP Hijacking and Secure Internet Routing by APNIC
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
APNIC574 views
Cloud SDN: BGP Peering and RPKI by MyNOG
Cloud SDN: BGP Peering and RPKICloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKI
MyNOG83 views
BGP filtering best practice by Jimmy Lim
BGP filtering best practiceBGP filtering best practice
BGP filtering best practice
Jimmy Lim82 views
BGP by KHNOG
BGPBGP
BGP
KHNOG337 views
Secure Inter-domain Routing with RPKI by APNIC
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI
APNIC293 views
Securing Routing Protocol BGP by IRJET Journal
Securing Routing Protocol BGPSecuring Routing Protocol BGP
Securing Routing Protocol BGP
IRJET Journal67 views

More from Bangladesh Network Operators Group

IPv6 Deployment in South Asia 2022 by
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022Bangladesh Network Operators Group
43 views20 slides
Introduction to Software Defined Networking (SDN) by
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Bangladesh Network Operators Group
136 views27 slides
RPKI Deployment Status in Bangladesh by
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshBangladesh Network Operators Group
45 views21 slides
An Overview about open UDP Services by
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP ServicesBangladesh Network Operators Group
217 views15 slides
12 Years in DNS Security As a Defender by
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a DefenderBangladesh Network Operators Group
111 views21 slides
Contents Localization Initiatives to get better User Experience by
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceBangladesh Network Operators Group
71 views31 slides

More from Bangladesh Network Operators Group(20)

Recently uploaded

IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf by
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfRIPE NCC
15 views11 slides
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 by
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲Infosec train
7 views6 slides
UiPath Document Understanding_Day 2.pptx by
UiPath Document Understanding_Day 2.pptxUiPath Document Understanding_Day 2.pptx
UiPath Document Understanding_Day 2.pptxRohitRadhakrishnan8
282 views21 slides
information by
informationinformation
informationkhelgishekhar
7 views4 slides
WEB 2.O TOOLS: Empowering education.pptx by
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
15 views16 slides
IETF 118: Starlink Protocol Performance by
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
124 views22 slides

Recently uploaded(20)

IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf by RIPE NCC
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
RIPE NCC15 views
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 by Infosec train
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
Infosec train7 views
IETF 118: Starlink Protocol Performance by APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC124 views
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf by RIPE NCC
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
RIPE NCC9 views
UiPath Document Understanding_Day 3.pptx by UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity95 views
We see everywhere that many people are talking about technology.docx by ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 views
Existing documentaries (1).docx by MollyBrown86
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 views
Building trust in our information ecosystem: who do we trust in an emergency by Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat85 views
PORTFOLIO 1 (Bret Michael Pepito).pdf by brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04107 views
google forms survey (1).pptx by MollyBrown86
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptx
MollyBrown8614 views

RPKI with rpki.net Tools

  • 1. RPKI with rpki.net ToolS bdNOG 1 22nd May 20143, Dhaka, Bangladesh Muhammad Moinur Rahman, bdNOG
  • 2. SANOG 23 : Thiphu, BhutanbdNOG Page 2 RPKI: Introduction Tutorial Target audience - Knowledge of Internet Routing(specially BGP) - Familiar with any IRR Database - No need to know Cryptography - Basic knowledge of PKI(Public Key Infrastructure) Layout - Theory - Handson Lab using rpki.net tools on Cisco IOS, Cisco IOS-XR and Juniper
  • 3. SANOG 23 : Thiphu, BhutanbdNOG Page 3 Historical Incident November, 2012 – Google traffic affected in AP region due to hardware failure of Moratel Pakistan Telecom and Youtube incident 7007 accident, UU/Sprint for 2 days
  • 4. SANOG 23 : Thiphu, BhutanbdNOG Page 4 Historical Incident (Thinks to Consider) For theory of positivity lets call all these as Mis- Origination Traffic Hijacking or Prefix Hijacking assumes Negative intent
  • 5. SANOG 23 : Thiphu, BhutanbdNOG Page 5 Historical Context 1986 – Bellovin & Perlman identify the vulnerability in DNS and Routing 1999 - National Academies study called it out 2000 – S-BGP – X.509 PKI to support Secure BGP - Kent, Lynn, et al. 2003 – NANOG S-BGP Workshop 2006 – RPKI.NET(for ARIN) & APNIC start work on RPKI. RIPE starts in 2008. 2009 – RPKI.NET Open Testbed and running code in test routers
  • 6. SANOG 23 : Thiphu, BhutanbdNOG Page 6 Current Trend Filtering limited to the edges facing the customer Filters on peering and transit sessions are often too complex or take too many resources - Do you filter? A lot depends on trusting each other - Daily examples show this is no longer enough
  • 7. SANOG 23 : Thiphu, BhutanbdNOG Page 7 When filtering is not enough .. A lot of different registries exist(Nearly 40), operated by a number of different parties: - Not all of them mirror the other registries - How trust worthy is the information they provide? The IRR system is far from complete (RPSL lives with RPSLNG) but no further development. Resulting filters are hard to maintain and can take a lot of router memory
  • 8. SANOG 23 : Thiphu, BhutanbdNOG Page 8 Goals of RPKI Running a Secured Internet for the end users Reducing routing leaks Attaching digital certificates to network resources - AS Numbers - IP Addresses Allowing ISPs to associate the two - Route Origin Authorizations (ROAs) - Can follow the address allocation chain to the top
  • 9. SANOG 23 : Thiphu, BhutanbdNOG Page 9 RPKI Accomplishes Allows routers or other processes to validate route origins Simplifies validation authority information - Trust Anchor Locator Distributes trusted information - Through repositories
  • 10. SANOG 23 : Thiphu, BhutanbdNOG Page 10 Public Key Concept Private key: This key must be known only by its owner. Public key: This key is known to everyone (it is public) Relation between both keys: What one key encrypts, the other one decrypts, and vice versa. That means that if you encrypt something with my public key (which you would know, because it's public :-), I would need my private key to decrypt the message. Same alike http with SSL aka https
  • 11. SANOG 23 : Thiphu, BhutanbdNOG Page 11 PKI in IRR The RIRs hold a self-signed root certificate for all the resources that they have in the registry - They are the trust anchor for the system That root certificate is used to sign a certificate that lists your resources You can issue child certificates for those resources to your customers - When making assignments or sub allocations
  • 12. SANOG 23 : Thiphu, BhutanbdNOG Page 12 Route Origination Authorisation (ROA) Next to the prefix and the ASN which is allowed to announce it, the ROA contains: - A minimum prefix length - A maximum prefix length - An expiry date Multiple ROAs can exist for the same prefix ROAs can overlap
  • 13. SANOG 23 : Thiphu, BhutanbdNOG Page 13 RPKI Protocols Certificate Authority Relying Party/Origin Validation
  • 14. SANOG 23 : Thiphu, BhutanbdNOG Page 14 Result of Check Valid – A matching/covering ROA was found with a matching AS number Invalid – A matching or covering ROA was found, but AS number did not match, and there was no valid one Not Found – No matching or covering ROA was found
  • 15. SANOG 23 : Thiphu, BhutanbdNOG Page 15 Policy Override Knobs Disable Validity Check Completely Disable Validity Check for a Peer Disable Validity Check for Prefixes When check is disabled, the result is “Not Found,” i.e. as if there was no ROA
  • 16. SANOG 23 : Thiphu, BhutanbdNOG Page 16 How to run CA?  Open Source Software to run a member CA - Use the LIR as parent CA (trust anchor) - Generate and publish Certificate yourself  LIR Hosted Platform - All processes are secured and automated - One click set-up of Resource Certificate - WebUI to manage Certificates in LIR Portal - All the major LIR do have RPKI/Resouce Certification configuration options in their portal
  • 17. SANOG 23 : Thiphu, BhutanbdNOG Page 17 How to run RP?  Rpki.net tools (Both CA and RP)  RIPE/NCC (Both CA and RP)  RTRLIB (RP Only)  APNIC (CA Only)
  • 18. SANOG 23 : Thiphu, BhutanbdNOG Page 18 Validation in Practice All certificates and ROAs are published in a repository and available for download Software running on your own machine will periodically retrieve and verify the information - Cryptographic tools check all the signatures The result is a list of all valid combinations of ASN and prefix, the “validated cache”
  • 19. SANOG 23 : Thiphu, BhutanbdNOG Page 19 RPKI Support in Routers The RPKI-RTR Protocol is an IETF Internet Draft Production Cisco Support: - ASR1000, 7600, ASR903 and ASR901 in releases 15.2(1)S or XE 3.5 - Cisco Early Field Trial (EFT): - ASR9000, CRS1, CRS3 and c12K (IOS-XR 4.3.2) Juniper has support since version 12.2 Quagga has support through BGP-SRX
  • 20. SANOG 23 : Thiphu, BhutanbdNOG Page 20 RPKI-Router Integration Local Validator Tool (RP) feeds RPKI capable router with processed data set - Router does not do the crypto!
  • 21. SANOG 23 : Thiphu, BhutanbdNOG Page 21 RPKI Workflow Creates a repository - RFC 3779 (RPKI) Certificates - ROAs - CRLs - Manifest records
  • 22. SANOG 23 : Thiphu, BhutanbdNOG Page 22 RTR Workflow Storing ROA cache using RTR protocol which can be downloaded from the validator and kept available in memory Validate with ROA cache data inside the router where BGP process will check each announcement and label the prefix Propagate RPKI validation result with iBGP for other router (Sending/Receiving BGP Extended Community must be enabled) to make a decision (Modify pref or filter) based on it
  • 23. SANOG 23 : Thiphu, BhutanbdNOG Page 23 Who is deciding what to do? The Validator is a tool which can help you making decisions about routing Using it properly can enhance the security and stability of the Internet It is your network and you make the final decision
  • 24. SANOG 23 : Thiphu, BhutanbdNOG Page 24 Repository View root@rpki# ls /ba/03a5be-ddf6-4340-a1f9-1ad3f2c39ee6/1: ICcaIRKhGHJ-TgUZv8GRKqkidR4.roa cKxLCU94umS-qD4DOOkAK0M2US0.cer dSmerM6uJGLWMMQTl2esy4xyUAA.crl dSmerM6uJGLWMMQTl2esy4xyUAA.mnf nB0gDFtWffKk4VWgln-12pdFtE8.roa  A Repository Directory containing an RFC3779 Certificate, two ROAs, a CRL, and a manifest
  • 25. SANOG 23 : Thiphu, BhutanbdNOG Page 25 Using a Repository Pull down these files using a manifest-validating mechanism Validate the ROAs contained in the repository Communicate with the router marking routes “valid”, “invalid”, “unknown” Up to ISP to use local policy on how to route
  • 26. SANOG 23 : Thiphu, BhutanbdNOG Page 26 RPKI Workflow  RPKI Web interface -> Repository  Repository aggregator -> Validator  Validated entries -> Route Checking  Route checking results -> local routing decisions (based on local policy)
  • 27. SANOG 23 : Thiphu, BhutanbdNOG Page 27 RPKI Caveats  When RTR session goes down, the RPKI status will be not found for all the bgp route after a while - Invalid => not found - we need several RTR sessions or care your filtering policy  In case of the router reload, which one is faster, receiving ROAs or receiving BGP routes? - If receiving BGP is match faster than ROA, the router propagate the invalid route to others - We need to put our Cache validator within our IGP scope
  • 28. SANOG 23 : Thiphu, BhutanbdNOG Page 28 Who do we trust? Can we trust the *IR for hosting our Private Keys?
  • 29. SANOG 23 : Thiphu, BhutanbdNOG Page 29 RPKI: Further Reading  RFC 5280: X.509 PKI Certificates  RFC 3779: Extensions for IP Addresses and ASNs  RFC 6481-6493: Resource Public Key Infrastructure
  • 30. SANOG 23 : Thiphu, BhutanbdNOG Page 30 Demo: Two Parts  Creating ROAs in LIR Portal  Validating and Configuring routers to make a decision for a prefix  BEFORE THAT LET’s GO FOR A TEA BREAK ..
  • 31. SANOG 23 : Thiphu, BhutanbdNOG Page 31 IRR Toolset, RPSL: Questions Contact person: Muhammad Moinur Rahman address: The Alliance Building. (6th Floor), address: 63 Pragati Sharani, Baridhara, country: BD phone: +8801977881132 e-mail: moin@1asia-ahl.com nic-hdl: MMR13-AP notify: moin@1asia-ahl.com mnt-by: MAINT-BD-1ASIAAHL changed: moin@1asia-ahl.com 20121128 source: APNIC