SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
What if
Public Administration
demanded educated MANRS
from ISPs?
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
What is the problem
we would like to solve?
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
3
The Problem
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
In 2017 alone, 14,000 routing outages or attacks – such as
hijacking, leaks, and spoofing – led to a range of problems
including stolen data, lost revenue, reputational damage, and
more. About 40% of all network incidents are attacks, with the
mean duration per incident lasting 19 hours.
Imagine the outrage if a route leak
impacted the ability of Italians to watch
the Serie A Final next year!
A Routing Security Overview
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
The Honor System:
Routing Issues
Border Gateway Protocol (BGP) is based
entirely on trust between networks
• Created before security was a concern
• Assumes all networks are trustworthy
• No built-in validation that updates are
legitimate
• The chain of trust spans continents
• Lack of reliable resource data
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Event Explanation Repercussions Solution
Prefix/Route
Hijacking
A network operator or attacker
impersonates another network operator,
pretending that a server or network is
their client.
Packets are forwarded
to the wrong place, and
can cause Denial of
Service (DoS) attacks
or traffic interception.
Stronger filtering
policies
Route Leak A network operator with multiple
upstream providers (often due to
accidental misconfiguration) announces
to one upstream provider that it has a
route to a destination through the other
upstream provider.
Can be used for traffic
inspection and
reconnaissance.
Stronger filtering
policies
IP Address
Spoofing
Someone creates IP packets with a false
source IP address to hide the identity of
the sender or to impersonate another
computing system.
The root cause of
reflection DDoS attacks
Source address
validation
The Threats: What’s Happening?
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Collaboration and Consensus
Your security is in someone else’s hands. The actions
of others directly impact you and your network security
(and vice versa).
Why should they help you? You can start by helping them.
Where is the line between good and bad routing
security?
We need globally recognized security expectations for all
network operators to raise the bar on routing security.
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
We Are In This
Together
Network operators have a responsibility
to ensure a globally robust and secure
routing infrastructure.
Your network’s safety depends on a
routing infrastructure that weeds out bad
actors and accidental misconfigurations
that wreak havoc on the Internet.
The more network operators work together,
the fewer incidents there will be, and the
less damage they can do.
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Solutions?
11
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
The Solution: Mutually Agreed Norms
for Routing Security (MANRS)
Provides crucial fixes to reduce the most common routing threats
MANRS improves the security and reliability
of the global Internet routing system based
on collaboration among participants and
shared responsibility for the Internet
infrastructure.
MANRS sets a new norm for routing security.
13
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
MANRS is an
Important Step
Security is a process, not a state. MANRS
provides a structure and a consistent approach
to solving security issues facing the Internet.
MANRS is the minimum an operator should
consider, with low risk and cost-effective
actions.
MANRS is not a one-stop solution to all of the
Internet’s routing woes, but it is an important
step toward a globally robust and secure
routing infrastructure.
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Mutually Agreed Norms for Routing Security
MANRS defines four simple but concrete actions that network operators must
implement to dramatically improve Internet security and reliability.
• The first two operational improvements eliminate the root causes of common routing issues
and attacks, while the second two procedural steps improve mitigation and decrease the
likelihood of future incidents.
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Global
Validation
Facilitate validation of
routing information on
a global scale
Publish your data, so
others can validate
Coordination
Facilitate global
operational
communication and
coordination between
network operators
Maintain globally
accessible up-to-date
contact information in
common routing
databases
Anti-spoofing
Prevent traffic with
spoofed source IP
addresses
Enable source address
validation for at least
single-homed stub
customer networks, their
own end-users, and
infrastructure
MANRS Actions for Operators
Filtering
Prevent propagation of
incorrect routing
information
Ensure the correctness of
your own announcements
and announcements from
your customers to adjacent
networks with prefix and
AS-path granularity
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Why Italian SERVICE PROVIDERS
Should Join MANRS
To help solve global network problems
• Lead by example to improve routing security and ensure a globally robust and secure
routing infrastructure
• Being part of the MANRS community can strengthen enterprise security credentials
To add competitive value and differentiate in a flat, price-driven market
• Growing demand from enterprise customers for managed security services (info feeds)
• To signal security proficiency and commitment to your customers
To "lock-in" - from a connectivity provider to a security partner
• Information feeds and other add-on services may increase revenue and reduce customer
complaints
• Enterprises indicate willingness to pay more for secure services
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Leading by example
• Improve infrastructure reliability and security by adopting
best practices in their own networks.
Driving the development or adoption of best practices across the country
• Encourage industry associations to develop or strengthen and promote existing voluntary
codes of conduct for network operators. MANRS can serve as both a baseline set of best
practices and as a foundation to complimentary voluntary codes of conduct.
Encouraging the use of routing security as a competitive best practice
• Encourage local industry to better convey security to consumers, and specify security
during procurement practices.
How the Italian Government can
strengthen routing security
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
SPC(1)
Public System for Connectivity first edition 2005
Won by
Fastweb (AS12874), BT Italia (AS8968)
Wind Telecomunicazioni (AS1267) e Telecom Italia (AS3269)
SPC1 contents:
Connectivity (transport, support, voip, interoperability, maintenance)
Security (firewall, antivirus, network intrusion detection, log, vpn...)
SPC1 ended in May, 2017
Italian PA - Some Background
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
SPC2
Public System for Connectivity second edition 2015
Won by
Fastweb (formerly Tiscali) (AS12874)
BT Italia (AS8968), Vodafone Italia (AS30722)
SPC2 contents:IP data transport, network security services and VOIP services
IP, SECURITY, VOIP
Duration 7 years
Value not to exceed 2.4 billion euros
Italian PA - Some Background
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
ACI
Agenzia Italiana del Farmaco ‐ AIFA
Consiglio di Stato
Consiglio per la ricerca in agricoltura e l’analisi
dell’economia agraria
Guardia di Finanza
INAIL
Istituto Nazionale di Statistica‐ISTAT
Istituto Poligrafico e Zecca dello Stato
Ministero dei beni e delle attività culturali e del
turismo
Ministero del Lavoro e delle Politiche Sociali
Ministero della Salute
Ministero delle Infrastrutture e dei Trasporti‐MIT
Ministero dell’Interno
Agenzia italiana per la cooperazione allo
sviluppo
Consiglio Nazionale delle Ricerche ‐CNR
Corte dei Conti
Ministero Affari Esteri‐MAE
Ministero della Difesa
Ministero della Giustizia
Ministero dell’Ambiente e della Tutela del
Territorio e del Mare
Ministero delle Politiche Agricole e Forestali
‐MIPAF
Ministero dell’Istruzione, dell’Università e della
Ricerca
Ministero dello Sviluppo Economico‐MISE
Presidenza del Consiglio dei Ministri
Presidenza del Consiglio dei Ministri ‐
Dipartimento Protezione Civile
Agenzia Spaziale Italiana
Agenzia delle Dogane e dei Monopoli
Agenzia ICE
Agenzia Nazionale per il Turismo ‐ ENIT
Agenzia Nazionale Sicurezza Ferrovie ‐ ANSF
Agenzia per le erogazioni in Agricoltura ‐ AGEA
Arma Carabinieri
Avvocatura Generale dello Stato
Ente Nazionale Aviazione Civile ‐ENAC
INPS
Istituto Nazionale di Geofisica e Vulcanologia‐INGV
Istituto Superiore di Sanità ‐ ISS
Istituto Superiore per la Protezione e la Ricerca
Ambientale ‐ISPRA
Ministero Economia e Finanze‐MEF ed Agenzie fiscali
Scuola Nazionale dell’Amministrazione
Istituto per lo sviluppo della formazione professionale
dei lavoratori
Istituto Nazionale di Ricerca per gli Alimenti e la
Nutrizione
Central State administrations distribution to winning ISPs
Italian PA - Some Background
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
20 Regions 14 Big Cities
93 Provinces 7984 Municipalities
Territorial administrations
Italian PA - Some Background
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
A suggestion for CONSIP or other public
procurement entities in Italy:
To strengthen routing security in Italy,
MANRS participation should be a
requirement (or at least a strong
consideration) for an ISP to win the next
main Internet transit agreement valid for the
MANRS as a requirement
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Currently only 5 Italian
ASes out of 1,000 declare
to be MANRS compliant
{None of the former or present winning Internet providers of the Italian PA has
qualified for MANRS so far.}
MANRS: who is there?
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Join Us
Visit https://www.manrs.org
• Fill out the sign up form with as much detail
as possible.
• In response we may ask questions and test
your network.
Get Involved in the Community
• Members support the initiative and implement
the actions in their networks
• Members maintain and improve the MANRS
document and promote its objectives
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Help Is Available
If you’re not ready to join yet,
implementation guidance is available to
help you:
• an Implementation Guide based on
Best Current Operational Practices
deployed by network operators around
the world
• six training modules based on
information in the Implementation
Guide.
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
What’s Next:
MANRS Observatory
Provide a factual state of security and
resilience of the Internet routing system and
track it over time.
Measurements will be:
• Transparent – using publicly accessible data
• Passive – no cooperation from networks
required
• Evolving – the MANRS community will
decide what gets measured and how
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
What’s Next:
Hands-on Lab
We are designing a lab that will allow
engineers to practically implement
MANRS in a simulated network
environment. The lab will be available:
- Via MANRS training partners
- Online
Get in touch with us if you would like to
host the MANRS training lab
environment!
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
Antonio Prado @ ITNOG4 - Bologna, November 9th 2018

Contenu connexe

Tendances

CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
 
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
Taiye Lambo
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
segughana
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
at MicroFocus Italy ❖✔
 

Tendances (20)

Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 

Similaire à What if public administration demanded educated MANRS from ISPs?

Backgrounder wtpf-13-ixps-en
Backgrounder wtpf-13-ixps-enBackgrounder wtpf-13-ixps-en
Backgrounder wtpf-13-ixps-en
Meshingo Jack
 

Similaire à What if public administration demanded educated MANRS from ISPs? (20)

The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
 
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
WCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming HoWCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming Ho
 
Iot overview
Iot overviewIot overview
Iot overview
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
Secure Networks Key to A2P Monetisation
Secure Networks Key to A2P MonetisationSecure Networks Key to A2P Monetisation
Secure Networks Key to A2P Monetisation
 
Secure Networks Key to A2P Monetisation
Secure Networks Key to A2P MonetisationSecure Networks Key to A2P Monetisation
Secure Networks Key to A2P Monetisation
 
ICARUS @EBDVF 2018 - BDVA Policy Session (November 2018, Vienna)
ICARUS @EBDVF 2018 - BDVA Policy Session (November 2018, Vienna)ICARUS @EBDVF 2018 - BDVA Policy Session (November 2018, Vienna)
ICARUS @EBDVF 2018 - BDVA Policy Session (November 2018, Vienna)
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
The Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanThe Present and the Future ISAC in Taiwan
The Present and the Future ISAC in Taiwan
 
IoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteIoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance Infobite
 
Grid Analytics Europe 2016: "Defend the Grid", April 2016
Grid Analytics Europe 2016: "Defend the Grid", April 2016Grid Analytics Europe 2016: "Defend the Grid", April 2016
Grid Analytics Europe 2016: "Defend the Grid", April 2016
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transport
 
Singapore's IoT Technical Standard Update at IoT Asia 2018
Singapore's IoT Technical Standard Update at IoT Asia 2018Singapore's IoT Technical Standard Update at IoT Asia 2018
Singapore's IoT Technical Standard Update at IoT Asia 2018
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
Backgrounder wtpf-13-ixps-en
Backgrounder wtpf-13-ixps-enBackgrounder wtpf-13-ixps-en
Backgrounder wtpf-13-ixps-en
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 

Plus de Antonio Prado (7)

Block chain (per principianti) al cenacolo
Block chain (per principianti) al cenacoloBlock chain (per principianti) al cenacolo
Block chain (per principianti) al cenacolo
 
SPC2 - Internet per la Pubblica Amministrazione
SPC2  - Internet per la Pubblica AmministrazioneSPC2  - Internet per la Pubblica Amministrazione
SPC2 - Internet per la Pubblica Amministrazione
 
Internet e architetture di rete la ragazza della porta ottanta: HTTP
Internet e architetture di rete la ragazza della porta ottanta: HTTPInternet e architetture di rete la ragazza della porta ottanta: HTTP
Internet e architetture di rete la ragazza della porta ottanta: HTTP
 
34 anni di e-mail: SMTP
34 anni di e-mail: SMTP34 anni di e-mail: SMTP
34 anni di e-mail: SMTP
 
Numeri e nomi: il DNS
Numeri e nomi: il DNSNumeri e nomi: il DNS
Numeri e nomi: il DNS
 
Architetture di instradamento a internet: il BGP
Architetture di instradamento a internet: il BGPArchitetture di instradamento a internet: il BGP
Architetture di instradamento a internet: il BGP
 
Internet: sistemi autonomi e governance
Internet: sistemi autonomi e governanceInternet: sistemi autonomi e governance
Internet: sistemi autonomi e governance
 

Dernier

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Dernier (20)

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 

What if public administration demanded educated MANRS from ISPs?

  • 1. What if Public Administration demanded educated MANRS from ISPs? Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 2. What is the problem we would like to solve? Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 3. 3
  • 4. The Problem Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 5. In 2017 alone, 14,000 routing outages or attacks – such as hijacking, leaks, and spoofing – led to a range of problems including stolen data, lost revenue, reputational damage, and more. About 40% of all network incidents are attacks, with the mean duration per incident lasting 19 hours. Imagine the outrage if a route leak impacted the ability of Italians to watch the Serie A Final next year! A Routing Security Overview Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 6. The Honor System: Routing Issues Border Gateway Protocol (BGP) is based entirely on trust between networks • Created before security was a concern • Assumes all networks are trustworthy • No built-in validation that updates are legitimate • The chain of trust spans continents • Lack of reliable resource data Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 7. Event Explanation Repercussions Solution Prefix/Route Hijacking A network operator or attacker impersonates another network operator, pretending that a server or network is their client. Packets are forwarded to the wrong place, and can cause Denial of Service (DoS) attacks or traffic interception. Stronger filtering policies Route Leak A network operator with multiple upstream providers (often due to accidental misconfiguration) announces to one upstream provider that it has a route to a destination through the other upstream provider. Can be used for traffic inspection and reconnaissance. Stronger filtering policies IP Address Spoofing Someone creates IP packets with a false source IP address to hide the identity of the sender or to impersonate another computing system. The root cause of reflection DDoS attacks Source address validation The Threats: What’s Happening? Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 8. Collaboration and Consensus Your security is in someone else’s hands. The actions of others directly impact you and your network security (and vice versa). Why should they help you? You can start by helping them. Where is the line between good and bad routing security? We need globally recognized security expectations for all network operators to raise the bar on routing security. Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 9. We Are In This Together Network operators have a responsibility to ensure a globally robust and secure routing infrastructure. Your network’s safety depends on a routing infrastructure that weeds out bad actors and accidental misconfigurations that wreak havoc on the Internet. The more network operators work together, the fewer incidents there will be, and the less damage they can do. Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 10. Antonio Prado @ ITNOG4 - Bologna, November 9th 2018 Solutions?
  • 11. 11
  • 12. Antonio Prado @ ITNOG4 - Bologna, November 9th 2018 The Solution: Mutually Agreed Norms for Routing Security (MANRS) Provides crucial fixes to reduce the most common routing threats
  • 13. MANRS improves the security and reliability of the global Internet routing system based on collaboration among participants and shared responsibility for the Internet infrastructure. MANRS sets a new norm for routing security. 13 Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 14. MANRS is an Important Step Security is a process, not a state. MANRS provides a structure and a consistent approach to solving security issues facing the Internet. MANRS is the minimum an operator should consider, with low risk and cost-effective actions. MANRS is not a one-stop solution to all of the Internet’s routing woes, but it is an important step toward a globally robust and secure routing infrastructure. Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 15. Mutually Agreed Norms for Routing Security MANRS defines four simple but concrete actions that network operators must implement to dramatically improve Internet security and reliability. • The first two operational improvements eliminate the root causes of common routing issues and attacks, while the second two procedural steps improve mitigation and decrease the likelihood of future incidents. Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 16. Global Validation Facilitate validation of routing information on a global scale Publish your data, so others can validate Coordination Facilitate global operational communication and coordination between network operators Maintain globally accessible up-to-date contact information in common routing databases Anti-spoofing Prevent traffic with spoofed source IP addresses Enable source address validation for at least single-homed stub customer networks, their own end-users, and infrastructure MANRS Actions for Operators Filtering Prevent propagation of incorrect routing information Ensure the correctness of your own announcements and announcements from your customers to adjacent networks with prefix and AS-path granularity Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 17. Why Italian SERVICE PROVIDERS Should Join MANRS To help solve global network problems • Lead by example to improve routing security and ensure a globally robust and secure routing infrastructure • Being part of the MANRS community can strengthen enterprise security credentials To add competitive value and differentiate in a flat, price-driven market • Growing demand from enterprise customers for managed security services (info feeds) • To signal security proficiency and commitment to your customers To "lock-in" - from a connectivity provider to a security partner • Information feeds and other add-on services may increase revenue and reduce customer complaints • Enterprises indicate willingness to pay more for secure services Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 18. Leading by example • Improve infrastructure reliability and security by adopting best practices in their own networks. Driving the development or adoption of best practices across the country • Encourage industry associations to develop or strengthen and promote existing voluntary codes of conduct for network operators. MANRS can serve as both a baseline set of best practices and as a foundation to complimentary voluntary codes of conduct. Encouraging the use of routing security as a competitive best practice • Encourage local industry to better convey security to consumers, and specify security during procurement practices. How the Italian Government can strengthen routing security Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 19. SPC(1) Public System for Connectivity first edition 2005 Won by Fastweb (AS12874), BT Italia (AS8968) Wind Telecomunicazioni (AS1267) e Telecom Italia (AS3269) SPC1 contents: Connectivity (transport, support, voip, interoperability, maintenance) Security (firewall, antivirus, network intrusion detection, log, vpn...) SPC1 ended in May, 2017 Italian PA - Some Background Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 20. SPC2 Public System for Connectivity second edition 2015 Won by Fastweb (formerly Tiscali) (AS12874) BT Italia (AS8968), Vodafone Italia (AS30722) SPC2 contents:IP data transport, network security services and VOIP services IP, SECURITY, VOIP Duration 7 years Value not to exceed 2.4 billion euros Italian PA - Some Background Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 21. ACI Agenzia Italiana del Farmaco ‐ AIFA Consiglio di Stato Consiglio per la ricerca in agricoltura e l’analisi dell’economia agraria Guardia di Finanza INAIL Istituto Nazionale di Statistica‐ISTAT Istituto Poligrafico e Zecca dello Stato Ministero dei beni e delle attività culturali e del turismo Ministero del Lavoro e delle Politiche Sociali Ministero della Salute Ministero delle Infrastrutture e dei Trasporti‐MIT Ministero dell’Interno Agenzia italiana per la cooperazione allo sviluppo Consiglio Nazionale delle Ricerche ‐CNR Corte dei Conti Ministero Affari Esteri‐MAE Ministero della Difesa Ministero della Giustizia Ministero dell’Ambiente e della Tutela del Territorio e del Mare Ministero delle Politiche Agricole e Forestali ‐MIPAF Ministero dell’Istruzione, dell’Università e della Ricerca Ministero dello Sviluppo Economico‐MISE Presidenza del Consiglio dei Ministri Presidenza del Consiglio dei Ministri ‐ Dipartimento Protezione Civile Agenzia Spaziale Italiana Agenzia delle Dogane e dei Monopoli Agenzia ICE Agenzia Nazionale per il Turismo ‐ ENIT Agenzia Nazionale Sicurezza Ferrovie ‐ ANSF Agenzia per le erogazioni in Agricoltura ‐ AGEA Arma Carabinieri Avvocatura Generale dello Stato Ente Nazionale Aviazione Civile ‐ENAC INPS Istituto Nazionale di Geofisica e Vulcanologia‐INGV Istituto Superiore di Sanità ‐ ISS Istituto Superiore per la Protezione e la Ricerca Ambientale ‐ISPRA Ministero Economia e Finanze‐MEF ed Agenzie fiscali Scuola Nazionale dell’Amministrazione Istituto per lo sviluppo della formazione professionale dei lavoratori Istituto Nazionale di Ricerca per gli Alimenti e la Nutrizione Central State administrations distribution to winning ISPs Italian PA - Some Background Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 22. 20 Regions 14 Big Cities 93 Provinces 7984 Municipalities Territorial administrations Italian PA - Some Background Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 23. A suggestion for CONSIP or other public procurement entities in Italy: To strengthen routing security in Italy, MANRS participation should be a requirement (or at least a strong consideration) for an ISP to win the next main Internet transit agreement valid for the MANRS as a requirement Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 24. Currently only 5 Italian ASes out of 1,000 declare to be MANRS compliant {None of the former or present winning Internet providers of the Italian PA has qualified for MANRS so far.} MANRS: who is there? Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 25. Join Us Visit https://www.manrs.org • Fill out the sign up form with as much detail as possible. • In response we may ask questions and test your network. Get Involved in the Community • Members support the initiative and implement the actions in their networks • Members maintain and improve the MANRS document and promote its objectives Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 26. Help Is Available If you’re not ready to join yet, implementation guidance is available to help you: • an Implementation Guide based on Best Current Operational Practices deployed by network operators around the world • six training modules based on information in the Implementation Guide. Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 27. What’s Next: MANRS Observatory Provide a factual state of security and resilience of the Internet routing system and track it over time. Measurements will be: • Transparent – using publicly accessible data • Passive – no cooperation from networks required • Evolving – the MANRS community will decide what gets measured and how Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 28. What’s Next: Hands-on Lab We are designing a lab that will allow engineers to practically implement MANRS in a simulated network environment. The lab will be available: - Via MANRS training partners - Online Get in touch with us if you would like to host the MANRS training lab environment! Antonio Prado @ ITNOG4 - Bologna, November 9th 2018
  • 29. Antonio Prado @ ITNOG4 - Bologna, November 9th 2018