SlideShare a Scribd company logo
Routing Security Roadmap
Job Snijders
NTT Communications
job@ntt.net
This presentation contains projections and other forward-looking statements regarding future events or our future
routing performance. All statements other than present and historical facts and conditions contained in this release,
including any statements regarding our future results of operations and routing positions, business strategy, plans
and our objectives for future operations, are forward-looking statements (within the meaning of the Private
Securities Litigation Reform Act of 1995, Section 27A of the Securities Act of 1933, as amended, and Section 21E of
the Securities Exchange Act of 1934, as amended). These statements are only predictions and reflect our current
Why are we doing any of this?
• Creating filters based on public data, forces malicious
actors to leave a trail in IRR, WHOIS or other data
sources: auditability
• Bugs happen! – your router may suddenly ignore parts
of your configuration, you’ll then rely on your EBGP
peer’s filters
• Everyone makes mistakes – a typo is easily made
Average view on routing security
Perception: it is hopeless, too many holes…
But really, there is a only a finite amount of
hurdles…
Exhaustive list of issues in the current
ecosystem
• IRRdb / database inaccuracy (stale, autopiloted, non-validated)
• IXPs not filtering
• Lack of Path Validation
• Lack of sufficient and good enough software
IRR – what is broken what can be fixed?
• Some IRRdbs do not perform validation
• Meaning that virtually anyone can create virtually any route/route6 object
and sneak those into the prefix-filters
• Eleven relevant IRRs not validating: RIPE, NTTCOM, RADB, ALTDB,
ARIN IRR, BBOI, BELL, LEVEL3, RGNET, TC, CANARIE
• Two solutions:
• Lock the database down (RIPE / RIPE-NONAUTH)
• Filter on the mirror level
RIPE NWI-5 proposal & implementation
• RIPE NCC’s IRR previously allowed anyone to register any non-RIPE-
managed space if it had not yet been registered. *DANGER*
• The “RPSL” password & maintainer was used for this
Three steps were taken:
• Cannot register non-RIPE-managed space any more
• All non-RIPE space moved to separate “RIPE-NONAUTH” database
• Route/route6 ASN authorization rules have been improved
More info: https://www.ripe.net/manage-ips-and-asns/db/impact-analysis-for-nwi-5-implementation
SOLVED
OK – so current status
• Ten relevant IRRs not validating: NTTCOM, RADB, ALTDB, ARIN IRR,
BBOI, BELL, LEVEL3, RGNET, TC, CANARIE
• Done: RIPE
ARIN IRR allows anyone to register anything
hanna:~ job$ whois -h rr.arin.net 2001:67c:208c::
% This is the ARIN Routing Registry.
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '2001:67c:208c::/48AS15562'
route6: 2001:67c:208c::/48
descr: 2001:67c:208c::/48 - Job's net
remarks: Job asked me to steal his net. Honest!
origin: AS15562
mnt-by: MNT-ATTW-Z
source: ARIN # Filtered
ARIN community also recognized this is an
issue
• Consultation at NANOG and through ARIN-Consult mailing list
• https://www.arin.net/vault/resources/routing/2018_roadmap.html
• https://teamarin.net/2018/07/12/the-path-forward/
ALMOST SOLVED“Improve, or kill it”
OK – so current status
• Nine relevant IRRs not validating: NTTCOM, RADB, ALTDB, BBOI, BELL,
LEVEL3, RGNET, TC, CANARIE
• Done: RIPE, ARIN IRR
• How to deal with the remaining nine …. ?
• Not all of these are so easily communicated with, not all are really
actively managed
The “IRR” system access
• The IRR is access through predominantly two “gateways”
• whois.radb.net (the bgpq3 and peval default)
• rr.ntt.net
• All mirroring is essentially done with one software: IRRd
Solution: Let’s use the hegemonic duopoly for good!
Improving security at the ”aggregator”?
RIPE IRR
NTTCOM
RADB
APNIC
…
whois.radb.net
rr.ntt.net
bgpq3
Data sources
Aggregators
Clients
Proposal: Let RPKI “drown out” conflicting IRR
• RPKI can be used for BGP Origin Validation – but also for other things!
• A RPKI ROA is sort of a route-object
• It has a “prefix”, “origin” and “source” (the root)
• We can use RPKI ROAs for provisioning BGP prefix-filters
• Extend IRRd so that when IRR information is in direct conflict with a
RPKI ROA – the conflicting information is suppressed (Github)
RPKI filter at the aggregators
RIPE IRR
NTTCOM
RADB
APNIC
…
whois.radb.net
rr.ntt.net
bgpq3
Data sources
Aggregators
Clients
How are IRR and RPKI different?
• IRR route/route6 objects are statements:
• About what Prefix/Origin ASN combinations can exist
• Not necessarily made by the owner of the resource
• Doesn’t tell us anything about the validity of other route objects, or other
non-matching BGP announcements
• Unsuitable for filtering your upstream, OK-ish for peers and downstreams
• Not exclusive
• RPKI on the other hand:
• Objects are only created by resource holders
• RFC 6811 is game changer – RPKI based BGP Origin Validation allows for non-
authorized BGP announcements to be rejected
• Exclusive
RPKI suppressing conflicting IRR advantages
•Industry-wide common method to get rid of
stale proxy route objects – by creating a ROA you
hide old garbage in IRRs
•By creating a ROA – you will significantly
decrease the chances of people being able to
use IRR to hijack your resource
OK – so current status
• IRRs not validating: no longer relevant
• Done: RIPE, ARIN IRR, NTTCOM, RADB, ALTDB, BBOI, BELL, LEVEL3,
RGNET, TC, CANARIE
SOLVED
NTT & Dashcare have started a full rewrite of IRRd to make this possible:
https://github.com/irrdnet/irrd4
Reference: list of useful IRR database sources
• APNIC ß important
• AfriNIC
• ALTDB
• ARIN IRR
• ARIN WHOIS
• BELL
• CANARIE
• JPIRR
• NTTCOM
• LEVEL3
• RADB
• REGISTROBR
• RIPE
• RIPE-NONAUTH
• RPKI
• TC
”Filtering at IXPs is hard”
• Many IXPs have come to realize their responsibilities to the Internet
ecosystem and the commercial benefits of a more secure product.
• http://peering.exposed/
• 9 out of top 10 IXPs are filtering, tenth will later this year. IX.br making good
progress
• IXP filtering has become much easier, there are multiple fully featured
configuration generators:
• https://www.ixpmanager.org/ version 5 has RPKI support!
• http://arouteserver.readthedocs.io/
SOLVED
Route servers must begin dropping RPKI Invalids
• Route servers by definition provide partial Internet tables
• No guarantees whatsoever that a given route will be available via RS
• When a route server drops a prefix, worst case scenario is rerouting –
not an outage.
Network
A
Network
B
ISP
Internet
Exchange
Filtering at IXPs
• Keep in mind that the Layer-2 switching fabric can’t filter BGP
UPDATES.
• Either apply filters yourself on the EBGP sessions with your partners
• Or have the IXP Operator apply filters on the Route Server
Not everyone needs to do RPKI
• Because of the centralization of the web, if a select few companies
deploy RPKI Origin Validation – millions of people benefit
• (google, cloudflare, amazon, pch/quad9, facebook, akamai, fastly,
liberty global, comcast, etc…)
• I think only 20 companies or so need to do Origin Validation for there
to be big benefits…
• https://dyn.com/blog/bgp-dns-hijacks-target-payment-systems/
“RPKI Origin Validation is useless without Path
Validation aka BGPSEC”
• The lack of path validation can be resolved through two
methods:
• Densely peer with each other (Example: Google &
Akamai have 126+ facilities in common with each
other)
• An AS_PATH blocking mechanisms like “peerlock”
• Both effectively are “path validation for 1 hop”
• Perhaps “1 hop” already is good enough J
“There is no healthy software ecosystem”
• RIPE NCC Validator v3 is works and actively maintained
• NLNetlabs is released a RPKI Cache Validator (Routinator 3000)
• OpenBSD is looking to fund a third validator implementation
• Almost all serious routing vendors have RPKI support (Cisco, Juniper,
BIRD, Nokia, FRR – and more are on the way)
• Solution: more users results in better software, start using!
SOLVED
Timeline
• All ISPs, create RPKI ROAs it’s easy!
• IXPs – start doing RPKI Origin Validation on your route
servers now
• Quite some companies are deploying RPKI OV before
the end of the year!
•In 2019 RPKI data will be used to clean up IRR
•Hopefully the ARIN RPKI TAL situation will improve
Conclusion

More Related Content

What's hot

The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry Services
MyNOG
 
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
APNIC
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & Troubleshooting
APNIC
 
Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73
APNIC
 
mnNOG 3: IP technology adoption in Mongolia
mnNOG 3: IP technology adoption in MongoliamnNOG 3: IP technology adoption in Mongolia
mnNOG 3: IP technology adoption in Mongolia
APNIC
 
ARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities Report
ARIN
 
btNOG 8: IP technology adoption in Bhutan
btNOG 8: IP technology adoption in Bhutan btNOG 8: IP technology adoption in Bhutan
btNOG 8: IP technology adoption in Bhutan
APNIC
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
APNIC
 
10 fn s47
10 fn s4710 fn s47
10 fn s47
Scott Foster
 
Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27
APNIC
 
RPKI Trust Anchor
RPKI Trust AnchorRPKI Trust Anchor
RPKI Trust Anchor
APNIC
 
Peering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for PeeringPeering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for Peering
APNIC
 
Engineering The New IP Transport
Engineering The New IP TransportEngineering The New IP Transport
Engineering The New IP Transport
MyNOG
 
ION Ljubljana - Nathalie Trenaman: World IPv6 Launch and RIPE Atlas Visualisa...
ION Ljubljana - Nathalie Trenaman: World IPv6 Launch and RIPE Atlas Visualisa...ION Ljubljana - Nathalie Trenaman: World IPv6 Launch and RIPE Atlas Visualisa...
ION Ljubljana - Nathalie Trenaman: World IPv6 Launch and RIPE Atlas Visualisa...
Deploy360 Programme (Internet Society)
 
RPKI Tutorial and Hands-On
RPKI Tutorial and Hands-OnRPKI Tutorial and Hands-On
RPKI Tutorial and Hands-On
APNIC
 
Row #9: An architecture overview of APNIC's RDAP deployment to the cloud
Row #9: An architecture overview of APNIC's RDAP deployment to the cloudRow #9: An architecture overview of APNIC's RDAP deployment to the cloud
Row #9: An architecture overview of APNIC's RDAP deployment to the cloud
APNIC
 
Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?
APNIC
 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Open Networking Summit
 
The trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route serversThe trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route servers
APNIC
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI
APNIC
 

What's hot (20)

The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry Services
 
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & Troubleshooting
 
Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73
 
mnNOG 3: IP technology adoption in Mongolia
mnNOG 3: IP technology adoption in MongoliamnNOG 3: IP technology adoption in Mongolia
mnNOG 3: IP technology adoption in Mongolia
 
ARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities Report
 
btNOG 8: IP technology adoption in Bhutan
btNOG 8: IP technology adoption in Bhutan btNOG 8: IP technology adoption in Bhutan
btNOG 8: IP technology adoption in Bhutan
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
 
10 fn s47
10 fn s4710 fn s47
10 fn s47
 
Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27
 
RPKI Trust Anchor
RPKI Trust AnchorRPKI Trust Anchor
RPKI Trust Anchor
 
Peering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for PeeringPeering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for Peering
 
Engineering The New IP Transport
Engineering The New IP TransportEngineering The New IP Transport
Engineering The New IP Transport
 
ION Ljubljana - Nathalie Trenaman: World IPv6 Launch and RIPE Atlas Visualisa...
ION Ljubljana - Nathalie Trenaman: World IPv6 Launch and RIPE Atlas Visualisa...ION Ljubljana - Nathalie Trenaman: World IPv6 Launch and RIPE Atlas Visualisa...
ION Ljubljana - Nathalie Trenaman: World IPv6 Launch and RIPE Atlas Visualisa...
 
RPKI Tutorial and Hands-On
RPKI Tutorial and Hands-OnRPKI Tutorial and Hands-On
RPKI Tutorial and Hands-On
 
Row #9: An architecture overview of APNIC's RDAP deployment to the cloud
Row #9: An architecture overview of APNIC's RDAP deployment to the cloudRow #9: An architecture overview of APNIC's RDAP deployment to the cloud
Row #9: An architecture overview of APNIC's RDAP deployment to the cloud
 
Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?
 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAM
 
The trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route serversThe trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route servers
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI
 

Similar to Routing Security Roadmap

Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
MyNOG
 
APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives
APNIC
 
Route Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS ApproachRoute Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS Approach
Bangladesh Network Operators Group
 
NANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI EffectivenessNANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI Effectiveness
APNIC
 
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. ServinInitial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
MyNOG
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs
APNIC
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
MyNOG
 
PLNOG15 - IRR Lockdown - Job Snijders
PLNOG15 - IRR Lockdown - Job SnijdersPLNOG15 - IRR Lockdown - Job Snijders
PLNOG15 - IRR Lockdown - Job Snijders
PROIDEA
 
Global IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementGlobal IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem Statement
APNIC
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
Bangladesh Network Operators Group
 
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
akg1330
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing Security
APNIC
 
2. RINA overview - TF workshop
2. RINA overview - TF workshop2. RINA overview - TF workshop
2. RINA overview - TF workshop
ARCFIRE ICT
 
PLNOG 22 - Manfred Lang - Automatyzacja widoczności – dynamiczne podejście w ...
PLNOG 22 - Manfred Lang - Automatyzacja widoczności – dynamiczne podejście w ...PLNOG 22 - Manfred Lang - Automatyzacja widoczności – dynamiczne podejście w ...
PLNOG 22 - Manfred Lang - Automatyzacja widoczności – dynamiczne podejście w ...
PROIDEA
 
Defcon 16-pilosov-kapela
Defcon 16-pilosov-kapelaDefcon 16-pilosov-kapela
Defcon 16-pilosov-kapela
Hai Nguyen
 
36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges
APNIC
 
DEVNET-1191 BGP Enabled Application Development
DEVNET-1191	BGP Enabled Application DevelopmentDEVNET-1191	BGP Enabled Application Development
DEVNET-1191 BGP Enabled Application Development
Cisco DevNet
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet Routing
APNIC
 
Scripting on Routers - NANOG 47
Scripting on Routers - NANOG 47Scripting on Routers - NANOG 47
Scripting on Routers - NANOG 47
Richard Steenbergen
 
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessPacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
APNIC
 

Similar to Routing Security Roadmap (20)

Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
 
APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives
 
Route Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS ApproachRoute Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS Approach
 
NANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI EffectivenessNANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI Effectiveness
 
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. ServinInitial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
 
PLNOG15 - IRR Lockdown - Job Snijders
PLNOG15 - IRR Lockdown - Job SnijdersPLNOG15 - IRR Lockdown - Job Snijders
PLNOG15 - IRR Lockdown - Job Snijders
 
Global IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementGlobal IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem Statement
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing Security
 
2. RINA overview - TF workshop
2. RINA overview - TF workshop2. RINA overview - TF workshop
2. RINA overview - TF workshop
 
PLNOG 22 - Manfred Lang - Automatyzacja widoczności – dynamiczne podejście w ...
PLNOG 22 - Manfred Lang - Automatyzacja widoczności – dynamiczne podejście w ...PLNOG 22 - Manfred Lang - Automatyzacja widoczności – dynamiczne podejście w ...
PLNOG 22 - Manfred Lang - Automatyzacja widoczności – dynamiczne podejście w ...
 
Defcon 16-pilosov-kapela
Defcon 16-pilosov-kapelaDefcon 16-pilosov-kapela
Defcon 16-pilosov-kapela
 
36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges
 
DEVNET-1191 BGP Enabled Application Development
DEVNET-1191	BGP Enabled Application DevelopmentDEVNET-1191	BGP Enabled Application Development
DEVNET-1191 BGP Enabled Application Development
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet Routing
 
Scripting on Routers - NANOG 47
Scripting on Routers - NANOG 47Scripting on Routers - NANOG 47
Scripting on Routers - NANOG 47
 
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessPacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
 

More from APNIC

IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
APNIC
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC
 

More from APNIC (20)

IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 

Recently uploaded

How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 

Recently uploaded (9)

How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 

Routing Security Roadmap

  • 1. Routing Security Roadmap Job Snijders NTT Communications job@ntt.net This presentation contains projections and other forward-looking statements regarding future events or our future routing performance. All statements other than present and historical facts and conditions contained in this release, including any statements regarding our future results of operations and routing positions, business strategy, plans and our objectives for future operations, are forward-looking statements (within the meaning of the Private Securities Litigation Reform Act of 1995, Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended). These statements are only predictions and reflect our current
  • 2. Why are we doing any of this? • Creating filters based on public data, forces malicious actors to leave a trail in IRR, WHOIS or other data sources: auditability • Bugs happen! – your router may suddenly ignore parts of your configuration, you’ll then rely on your EBGP peer’s filters • Everyone makes mistakes – a typo is easily made
  • 3. Average view on routing security
  • 4. Perception: it is hopeless, too many holes…
  • 5. But really, there is a only a finite amount of hurdles…
  • 6. Exhaustive list of issues in the current ecosystem • IRRdb / database inaccuracy (stale, autopiloted, non-validated) • IXPs not filtering • Lack of Path Validation • Lack of sufficient and good enough software
  • 7. IRR – what is broken what can be fixed? • Some IRRdbs do not perform validation • Meaning that virtually anyone can create virtually any route/route6 object and sneak those into the prefix-filters • Eleven relevant IRRs not validating: RIPE, NTTCOM, RADB, ALTDB, ARIN IRR, BBOI, BELL, LEVEL3, RGNET, TC, CANARIE • Two solutions: • Lock the database down (RIPE / RIPE-NONAUTH) • Filter on the mirror level
  • 8. RIPE NWI-5 proposal & implementation • RIPE NCC’s IRR previously allowed anyone to register any non-RIPE- managed space if it had not yet been registered. *DANGER* • The “RPSL” password & maintainer was used for this Three steps were taken: • Cannot register non-RIPE-managed space any more • All non-RIPE space moved to separate “RIPE-NONAUTH” database • Route/route6 ASN authorization rules have been improved More info: https://www.ripe.net/manage-ips-and-asns/db/impact-analysis-for-nwi-5-implementation SOLVED
  • 9. OK – so current status • Ten relevant IRRs not validating: NTTCOM, RADB, ALTDB, ARIN IRR, BBOI, BELL, LEVEL3, RGNET, TC, CANARIE • Done: RIPE
  • 10. ARIN IRR allows anyone to register anything hanna:~ job$ whois -h rr.arin.net 2001:67c:208c:: % This is the ARIN Routing Registry. % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to '2001:67c:208c::/48AS15562' route6: 2001:67c:208c::/48 descr: 2001:67c:208c::/48 - Job's net remarks: Job asked me to steal his net. Honest! origin: AS15562 mnt-by: MNT-ATTW-Z source: ARIN # Filtered
  • 11. ARIN community also recognized this is an issue • Consultation at NANOG and through ARIN-Consult mailing list • https://www.arin.net/vault/resources/routing/2018_roadmap.html • https://teamarin.net/2018/07/12/the-path-forward/ ALMOST SOLVED“Improve, or kill it”
  • 12. OK – so current status • Nine relevant IRRs not validating: NTTCOM, RADB, ALTDB, BBOI, BELL, LEVEL3, RGNET, TC, CANARIE • Done: RIPE, ARIN IRR • How to deal with the remaining nine …. ? • Not all of these are so easily communicated with, not all are really actively managed
  • 13. The “IRR” system access • The IRR is access through predominantly two “gateways” • whois.radb.net (the bgpq3 and peval default) • rr.ntt.net • All mirroring is essentially done with one software: IRRd Solution: Let’s use the hegemonic duopoly for good!
  • 14. Improving security at the ”aggregator”? RIPE IRR NTTCOM RADB APNIC … whois.radb.net rr.ntt.net bgpq3 Data sources Aggregators Clients
  • 15. Proposal: Let RPKI “drown out” conflicting IRR • RPKI can be used for BGP Origin Validation – but also for other things! • A RPKI ROA is sort of a route-object • It has a “prefix”, “origin” and “source” (the root) • We can use RPKI ROAs for provisioning BGP prefix-filters • Extend IRRd so that when IRR information is in direct conflict with a RPKI ROA – the conflicting information is suppressed (Github)
  • 16. RPKI filter at the aggregators RIPE IRR NTTCOM RADB APNIC … whois.radb.net rr.ntt.net bgpq3 Data sources Aggregators Clients
  • 17. How are IRR and RPKI different? • IRR route/route6 objects are statements: • About what Prefix/Origin ASN combinations can exist • Not necessarily made by the owner of the resource • Doesn’t tell us anything about the validity of other route objects, or other non-matching BGP announcements • Unsuitable for filtering your upstream, OK-ish for peers and downstreams • Not exclusive • RPKI on the other hand: • Objects are only created by resource holders • RFC 6811 is game changer – RPKI based BGP Origin Validation allows for non- authorized BGP announcements to be rejected • Exclusive
  • 18. RPKI suppressing conflicting IRR advantages •Industry-wide common method to get rid of stale proxy route objects – by creating a ROA you hide old garbage in IRRs •By creating a ROA – you will significantly decrease the chances of people being able to use IRR to hijack your resource
  • 19. OK – so current status • IRRs not validating: no longer relevant • Done: RIPE, ARIN IRR, NTTCOM, RADB, ALTDB, BBOI, BELL, LEVEL3, RGNET, TC, CANARIE SOLVED NTT & Dashcare have started a full rewrite of IRRd to make this possible: https://github.com/irrdnet/irrd4
  • 20. Reference: list of useful IRR database sources • APNIC ß important • AfriNIC • ALTDB • ARIN IRR • ARIN WHOIS • BELL • CANARIE • JPIRR • NTTCOM • LEVEL3 • RADB • REGISTROBR • RIPE • RIPE-NONAUTH • RPKI • TC
  • 21. ”Filtering at IXPs is hard” • Many IXPs have come to realize their responsibilities to the Internet ecosystem and the commercial benefits of a more secure product. • http://peering.exposed/ • 9 out of top 10 IXPs are filtering, tenth will later this year. IX.br making good progress • IXP filtering has become much easier, there are multiple fully featured configuration generators: • https://www.ixpmanager.org/ version 5 has RPKI support! • http://arouteserver.readthedocs.io/ SOLVED
  • 22. Route servers must begin dropping RPKI Invalids • Route servers by definition provide partial Internet tables • No guarantees whatsoever that a given route will be available via RS • When a route server drops a prefix, worst case scenario is rerouting – not an outage. Network A Network B ISP Internet Exchange
  • 23. Filtering at IXPs • Keep in mind that the Layer-2 switching fabric can’t filter BGP UPDATES. • Either apply filters yourself on the EBGP sessions with your partners • Or have the IXP Operator apply filters on the Route Server
  • 24. Not everyone needs to do RPKI • Because of the centralization of the web, if a select few companies deploy RPKI Origin Validation – millions of people benefit • (google, cloudflare, amazon, pch/quad9, facebook, akamai, fastly, liberty global, comcast, etc…) • I think only 20 companies or so need to do Origin Validation for there to be big benefits… • https://dyn.com/blog/bgp-dns-hijacks-target-payment-systems/
  • 25. “RPKI Origin Validation is useless without Path Validation aka BGPSEC” • The lack of path validation can be resolved through two methods: • Densely peer with each other (Example: Google & Akamai have 126+ facilities in common with each other) • An AS_PATH blocking mechanisms like “peerlock” • Both effectively are “path validation for 1 hop” • Perhaps “1 hop” already is good enough J
  • 26. “There is no healthy software ecosystem” • RIPE NCC Validator v3 is works and actively maintained • NLNetlabs is released a RPKI Cache Validator (Routinator 3000) • OpenBSD is looking to fund a third validator implementation • Almost all serious routing vendors have RPKI support (Cisco, Juniper, BIRD, Nokia, FRR – and more are on the way) • Solution: more users results in better software, start using! SOLVED
  • 27. Timeline • All ISPs, create RPKI ROAs it’s easy! • IXPs – start doing RPKI Origin Validation on your route servers now • Quite some companies are deploying RPKI OV before the end of the year! •In 2019 RPKI data will be used to clean up IRR •Hopefully the ARIN RPKI TAL situation will improve