SlideShare a Scribd company logo
1 of 15
MANRS:
Intro to Internet Routing
Security
Presenter: Obika Gellineau
Twitter: @AntiPhishClub
Linkedin: https://tt.linkedin.com/in/obikag
Objectives
 To understand the issues associated with internet routing incidents
and the impact these incidents have on the security and reliability
of the internet.
 To highlight the importance and benefits of MANRS with respect to
the routing of internet traffic.
 To determine the actions required to implement MANRS and the
tools used for its implementation.
Agenda
 Routing Incidents
 Internet Routing Basics
 What is MANRS?
 Benefits of MANRS
 The Four Pillars
 Global Validation
 Filtering
 Anti-Spoofing
 Coordination
 Key Takeaways
Routing Incidents
 In 2017, over 14,000 routing outages or attacks were recorded.
 These routing incidents lead to:
 Data Theft
 Loss of Revenue
 Loss or Reputation
 Loss of Productivity
 Some of these incidents are global in scale. Impacting internet users far and wide.
 Attacks can last from hours and take months to recognize.
 These incidents affected large internet giants, such as YouTube, Amazon and
Netflix.
Routing Incidents
 The common threats that cause these incidents include:
 BGP Hijacking (Prefix/Route) – Impersonation of another network operator and
pretending that a server on their network is their client
 Route Leak – Announcement of misconfigured routing paths from a network
operator who has multiple upstream providers, altering the destination path
through one of the upstream providers.
 IP Address Spoofing – Impersonation of an IP address using a fake source IP
address to hide the identity of the sender or impersonate another computer system.
Internet Routing Basics
 Internet traffic is routed through
networks called Autonomous Systems.
 ~60,000 AS route traffic of which each
is identified by an Autonomous System
Number (ASN).
 Routers use Border Gateway Protocol
(BGP) to exchange network paths.
 Routers owned by AS build a routing
table and pick the best route (i.e.
shortest path) for sending packets.
 BGP is based on trust between
networks.
 Some issues with BGP exchanges
between AS networks are:
 The chain of trust spans continents
 Lack of reliable data
 Lack of validation of updates
 These can lead to routing incidents
such as, incorrectly routed traffic and
successful DDoS attacks.
 One prevention mechanism against
these types of incidents is MANRS
What is MANRS?
Mutually Agreed Norms for Routing Security
 It improves the security and reliability of the global Internet routing system, based on
collaboration among participants and shared responsibility for the Internet
infrastructure.
 Defines four concrete actions (or pillars) that network operators must implement to
dramatically improve Internet security and reliability
 Two (2) of these pillars minimize the root cause of common routing issues and
attacks
 The other two (2) of these pillars mitigate the likelihood of future incidents.
Benefits of MANRS
Internet Exchange Providers (IXP)
• Prevents propagation of accidentally or intentionally
misconfigured routing information.
• Protects the peering platform between networks
• Improves communication between local, regional
and global operators
• Provides network operators with easily accessible
monitoring tools
Internet Service Providers (ISP)
• Validation of routing information on a global scale
• Provides protection against cyber attacks through IP
address validation and network filtering.
• Expansive and real-time monitoring of global events
• Improves brand value through increased reliability
and security
Four Pillars
Global
Validation
Validation of routing
information on a global
scale
Network operators must
publish their data, so that
other participants can
validate.
Filtering
Prevention of propagation
of incorrect routing
information
Network operators must
ensure correctness of their
and customer’s
announcements with prefix
and AS-path granularity
Anti-
Spoofing
Prevention of traffic with
spoofed source IP
addresses
Network operators must
enable source address
validation for at least
single-homed networks,
end-users and
infrastructure
Collaboration
Improved global
communication and
coordination between
network operators
Network operators must
maintain globally
accessible up-to-date
contact information in
routing databases.
Four Pillars – Global Validation
“Validation of routing information on a global scale”
Actions:
 Communicate which announcements are correct to adjacent networks
 Publicly document routing policy, ASNs and prefixes that are intended to be advertised to external
parties
Implementation:
 Register policy documentation, Network Layer Reachability Information (i.e. route/route6) and ASNs
in publicly available databases
 Route Origin Authorization (ROA) should also be registered with a certificate authority.
Tools:
 Internet Routing Registry (IRR) for route/route6, policy documentation and ASN
 Resource Public Key Infrastructure (RPKI) for ROA’s (e.g. RIPE, ARIN, APNIC, etc.)
Four Pillars – Filtering
“Prevention of propagation of incorrect routing information”
Actions:
 Clearly define routing policy and implement a system for correctness of their and customer
announcements to adjacent networks with granular prefix and AS-path.
 Due diligence for the correctness of customer announcements.
Implementation:
 Use IRR and RPKI authorities to build filters by requiring customers (i.e. upstream network
operators) to register their route objects.
 Use an internal database of valid IP addresses and verified route objects to build filters.
Tools:
 BGPQ3 or IRRToolset to build prefix-lists from IRR which will be used by routers for filtering
 RIPE NCC RPKI Validator and Dragon Research Labs RPKI Toolkit to validate ROAs
Four Pillars – Anti-Spoofing
“Prevention of traffic with spoofed source IP addresses”
Actions:
 Implement a system that enables source address validation for at least single-homed
customer networks, their own end-user and infrastructure.
Implementation:
 Source-Address Validation on cable-modem networks
 Unicast Reverse-Path Forwarding (uRPF) on router networks
 Access Control Lists for networks where the other anti-spoofing technologies are not
available.
Tools:
 Vendor-specific tools for routers (e.g. Cisco, Juniper, MikroTik etc.)
Four Pillars – Collaboration
“Improved global communication and coordination between network operators”
Actions:
 Maintain up-to-date and globally accessible contact information
Implementation:
 Maintaining contact information in Regional Internet Registries (RIR)
Tools:
 Registering contact information and consistently updating it with RIRs:
 AFRINIC – African Network Information Centre
 APNIC – Asia-Pacific Network Information Centre
 LACNIC – Latin America Network Information Centre
 ARIN – American Registry for Internet Numbers
 RIPE – Reseaux IP Europeens Network Coordination Centre
Key Takeaways
 Internet routing incidents lead to a reduced quality of internet services, cyber
attacks and brand/reputational damage for internet service providers.
 MANRS assists with the mitigation of internet routing incidents and improves the
security and reliability of the internet.
 Through global validation, filtering, anti-spoofing and collaboration, IXPs and ISPs
can better secure their services.
 MANRS ensures a safe internet for all end-users.
Thank You
Twitter: @AntiPhishClub
Linkedin: https://tt.linkedin.com/in/obikag

More Related Content

What's hot

Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Case study about voip
Case study about voipCase study about voip
Case study about voipelmudthir
 
PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report
PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report
PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report PROIDEA
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInformation Technology
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's TypesHem Pokhrel
 
Internet Traffic 2009-2019
Internet Traffic 2009-2019Internet Traffic 2009-2019
Internet Traffic 2009-2019APNIC
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPSData#3 Limited
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service ProvidersNETSCOUT
 

What's hot (19)

Avr presentation
Avr   presentationAvr   presentation
Avr presentation
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report
PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report
PLNOG 8: Darren Anstee - ARBOR - Infrastructure Security Report
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Sangfor ngfw 修订版
Sangfor ngfw 修订版Sangfor ngfw 修订版
Sangfor ngfw 修订版
 
Internet Traffic 2009-2019
Internet Traffic 2009-2019Internet Traffic 2009-2019
Internet Traffic 2009-2019
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
JAKU Botnet Analysis
JAKU Botnet AnalysisJAKU Botnet Analysis
JAKU Botnet Analysis
 
Base Metal Forensics
Base Metal ForensicsBase Metal Forensics
Base Metal Forensics
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
VPN
VPNVPN
VPN
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers
 

Similar to MANRS - Introduction to Internet Routing Security

Routing is at Risk - Let’s secure it together
Routing is at Risk - Let’s secure it togetherRouting is at Risk - Let’s secure it together
Routing is at Risk - Let’s secure it togetherAPNIC
 
Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDFAhmed Adel
 
Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRSAPNIC
 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networksijtsrd
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSDeploy360 Programme (Internet Society)
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...Deploy360 Programme (Internet Society)
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfJessica Thompson
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013 Mark Skilton
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...AM Publications,India
 
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...IRJET Journal
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)Jeff Green
 
G03403041052
G03403041052G03403041052
G03403041052theijes
 

Similar to MANRS - Introduction to Internet Routing Security (20)

MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12
 
Routing is at Risk - Let’s secure it together
Routing is at Risk - Let’s secure it togetherRouting is at Risk - Let’s secure it together
Routing is at Risk - Let’s secure it together
 
Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDF
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRS
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
Network Bandwidth management - Mumbai Seminar
Network Bandwidth management - Mumbai SeminarNetwork Bandwidth management - Mumbai Seminar
Network Bandwidth management - Mumbai Seminar
 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networks
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Chapter04
Chapter04Chapter04
Chapter04
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
 
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
G03403041052
G03403041052G03403041052
G03403041052
 

More from Obika Gellineau

Securing Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 PresentationSecuring Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 PresentationObika Gellineau
 
Introduction to Penetration testing - GDG DevFest Caribbean 2021 presentation
Introduction to Penetration testing - GDG DevFest Caribbean 2021 presentationIntroduction to Penetration testing - GDG DevFest Caribbean 2021 presentation
Introduction to Penetration testing - GDG DevFest Caribbean 2021 presentationObika Gellineau
 
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...Obika Gellineau
 
Robotic Process Automation Development
Robotic Process Automation DevelopmentRobotic Process Automation Development
Robotic Process Automation DevelopmentObika Gellineau
 

More from Obika Gellineau (6)

Securing Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 PresentationSecuring Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 Presentation
 
Introduction to Penetration testing - GDG DevFest Caribbean 2021 presentation
Introduction to Penetration testing - GDG DevFest Caribbean 2021 presentationIntroduction to Penetration testing - GDG DevFest Caribbean 2021 presentation
Introduction to Penetration testing - GDG DevFest Caribbean 2021 presentation
 
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
 
Robotic Process Automation Development
Robotic Process Automation DevelopmentRobotic Process Automation Development
Robotic Process Automation Development
 
Capital One Data Breach
Capital One Data BreachCapital One Data Breach
Capital One Data Breach
 
Static Code Analysis
Static Code AnalysisStatic Code Analysis
Static Code Analysis
 

Recently uploaded

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 

Recently uploaded (20)

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 

MANRS - Introduction to Internet Routing Security

  • 1. MANRS: Intro to Internet Routing Security Presenter: Obika Gellineau Twitter: @AntiPhishClub Linkedin: https://tt.linkedin.com/in/obikag
  • 2. Objectives  To understand the issues associated with internet routing incidents and the impact these incidents have on the security and reliability of the internet.  To highlight the importance and benefits of MANRS with respect to the routing of internet traffic.  To determine the actions required to implement MANRS and the tools used for its implementation.
  • 3. Agenda  Routing Incidents  Internet Routing Basics  What is MANRS?  Benefits of MANRS  The Four Pillars  Global Validation  Filtering  Anti-Spoofing  Coordination  Key Takeaways
  • 4. Routing Incidents  In 2017, over 14,000 routing outages or attacks were recorded.  These routing incidents lead to:  Data Theft  Loss of Revenue  Loss or Reputation  Loss of Productivity  Some of these incidents are global in scale. Impacting internet users far and wide.  Attacks can last from hours and take months to recognize.  These incidents affected large internet giants, such as YouTube, Amazon and Netflix.
  • 5. Routing Incidents  The common threats that cause these incidents include:  BGP Hijacking (Prefix/Route) – Impersonation of another network operator and pretending that a server on their network is their client  Route Leak – Announcement of misconfigured routing paths from a network operator who has multiple upstream providers, altering the destination path through one of the upstream providers.  IP Address Spoofing – Impersonation of an IP address using a fake source IP address to hide the identity of the sender or impersonate another computer system.
  • 6. Internet Routing Basics  Internet traffic is routed through networks called Autonomous Systems.  ~60,000 AS route traffic of which each is identified by an Autonomous System Number (ASN).  Routers use Border Gateway Protocol (BGP) to exchange network paths.  Routers owned by AS build a routing table and pick the best route (i.e. shortest path) for sending packets.  BGP is based on trust between networks.  Some issues with BGP exchanges between AS networks are:  The chain of trust spans continents  Lack of reliable data  Lack of validation of updates  These can lead to routing incidents such as, incorrectly routed traffic and successful DDoS attacks.  One prevention mechanism against these types of incidents is MANRS
  • 7. What is MANRS? Mutually Agreed Norms for Routing Security  It improves the security and reliability of the global Internet routing system, based on collaboration among participants and shared responsibility for the Internet infrastructure.  Defines four concrete actions (or pillars) that network operators must implement to dramatically improve Internet security and reliability  Two (2) of these pillars minimize the root cause of common routing issues and attacks  The other two (2) of these pillars mitigate the likelihood of future incidents.
  • 8. Benefits of MANRS Internet Exchange Providers (IXP) • Prevents propagation of accidentally or intentionally misconfigured routing information. • Protects the peering platform between networks • Improves communication between local, regional and global operators • Provides network operators with easily accessible monitoring tools Internet Service Providers (ISP) • Validation of routing information on a global scale • Provides protection against cyber attacks through IP address validation and network filtering. • Expansive and real-time monitoring of global events • Improves brand value through increased reliability and security
  • 9. Four Pillars Global Validation Validation of routing information on a global scale Network operators must publish their data, so that other participants can validate. Filtering Prevention of propagation of incorrect routing information Network operators must ensure correctness of their and customer’s announcements with prefix and AS-path granularity Anti- Spoofing Prevention of traffic with spoofed source IP addresses Network operators must enable source address validation for at least single-homed networks, end-users and infrastructure Collaboration Improved global communication and coordination between network operators Network operators must maintain globally accessible up-to-date contact information in routing databases.
  • 10. Four Pillars – Global Validation “Validation of routing information on a global scale” Actions:  Communicate which announcements are correct to adjacent networks  Publicly document routing policy, ASNs and prefixes that are intended to be advertised to external parties Implementation:  Register policy documentation, Network Layer Reachability Information (i.e. route/route6) and ASNs in publicly available databases  Route Origin Authorization (ROA) should also be registered with a certificate authority. Tools:  Internet Routing Registry (IRR) for route/route6, policy documentation and ASN  Resource Public Key Infrastructure (RPKI) for ROA’s (e.g. RIPE, ARIN, APNIC, etc.)
  • 11. Four Pillars – Filtering “Prevention of propagation of incorrect routing information” Actions:  Clearly define routing policy and implement a system for correctness of their and customer announcements to adjacent networks with granular prefix and AS-path.  Due diligence for the correctness of customer announcements. Implementation:  Use IRR and RPKI authorities to build filters by requiring customers (i.e. upstream network operators) to register their route objects.  Use an internal database of valid IP addresses and verified route objects to build filters. Tools:  BGPQ3 or IRRToolset to build prefix-lists from IRR which will be used by routers for filtering  RIPE NCC RPKI Validator and Dragon Research Labs RPKI Toolkit to validate ROAs
  • 12. Four Pillars – Anti-Spoofing “Prevention of traffic with spoofed source IP addresses” Actions:  Implement a system that enables source address validation for at least single-homed customer networks, their own end-user and infrastructure. Implementation:  Source-Address Validation on cable-modem networks  Unicast Reverse-Path Forwarding (uRPF) on router networks  Access Control Lists for networks where the other anti-spoofing technologies are not available. Tools:  Vendor-specific tools for routers (e.g. Cisco, Juniper, MikroTik etc.)
  • 13. Four Pillars – Collaboration “Improved global communication and coordination between network operators” Actions:  Maintain up-to-date and globally accessible contact information Implementation:  Maintaining contact information in Regional Internet Registries (RIR) Tools:  Registering contact information and consistently updating it with RIRs:  AFRINIC – African Network Information Centre  APNIC – Asia-Pacific Network Information Centre  LACNIC – Latin America Network Information Centre  ARIN – American Registry for Internet Numbers  RIPE – Reseaux IP Europeens Network Coordination Centre
  • 14. Key Takeaways  Internet routing incidents lead to a reduced quality of internet services, cyber attacks and brand/reputational damage for internet service providers.  MANRS assists with the mitigation of internet routing incidents and improves the security and reliability of the internet.  Through global validation, filtering, anti-spoofing and collaboration, IXPs and ISPs can better secure their services.  MANRS ensures a safe internet for all end-users.
  • 15. Thank You Twitter: @AntiPhishClub Linkedin: https://tt.linkedin.com/in/obikag