SlideShare une entreprise Scribd logo
1  sur  36
RPKI Deployment
– It is time to start doing it
Che-Hoo Cheng
APNIC
@HKNOG 7.0
2019-03-01
Security matters as your network is
connecting to Internet
• You do NOT want your own routes to be hijacked by anyone, maliciously or
accidentally
• You also do NOT want to receive bad routing information from any of your
BGP neighbors or propagate bad routing information to any of them
• Basic measures include:
– Bogons and martians filtering
– Max prefix count
– IRR (Internet Routing Registry) database checking
– So on and so forth
• Additional measure should include:
– RPKI (Resource Public Key Infrastructure) / ROV (Route Origin Validation)
Routing Security is becoming more
important than ever
• Route-hijacking cases (malicious and accidental) are more and more
common
– Big incentive for hackers
• Hijack DNS, hijack websites, steal passwords and so on
– Misconfiguration does happen from time to time
• And, it is extremely easy to do route-hijacking, if protection measure is
not implemented
• A lot of route objects on IRR-DB are not authenticated properly and so
cannot be fully trusted
• Need better authenticity for routing info, i.e. need to make sure that the
route originators are the true “owners” of the relevant IP resources
Fat-Finger/Hijacks
• Amazon (AS16509) Route53 hijack – Apr 2018
– AS10279 (eNET) announced/originated more specifics (/24s) of
Amazon Route53’s prefix (205.251.192.0/21)
• 205.251.192.0/24 ……. 205.251.199.0/24
• https://ip-ranges.amazonaws.com/ip-ranges.json
– The motive?
• During the period, DNS servers in the hijacked range only responded to queries for
myetherwallet.com
• Responded with addresses associated with AS41995/AS48693
Fat-Finger/Hijacks
• Bharti (AS9498) originates 103.0.0.0/10
– Dec 2017 (~ 2 days)
– No noticeable damage done – more than 8K specific routes!
• YouTube (AS36561) Incident
– Feb 2008 (down for ~ 2 hours)
– PT (AS17557) announced 208.65.153.0/24 (208.65.152.0/22)
• Propagated by AS3491 (PCCW)
RPKI
• RPKI is a Public Key Infrastructure (PKI) framework,
designed to secure BGP routing
– Based on X.509 PKI standards
• RPKI adds Internet Number Resources (INR) information to
X.509 certificates issued to resource holders
– Representing “ownership” and other status
– Certification hierarchy follows INR delegation hierarchy
IANA ➔ RIR (➔ NIR) ➔ ISP ➔ …
RPKI Hierarchy
Source : http://isoc.org/wp/ietfjournal/?p=2438
IANA
RIPE-NCCLACNICARIN APNICAFRINIC
NIR
ISP ISP ISP ISP
Allocation
Hierarchy
Trust Anchor
Certificate
Certificate
chain
mirrors
allocation
hierarchy
Cert
(CA)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(CA)
Cert
(CA)
Cert
(CA)
Cert
(CA)
Cert
(CA)
Cert
(CA)
RPKI Service Models
• Hosted model
– APNIC performs CA functions on behalf of members
– Manage keys, repository etc
– Generate certificates for resource delegations
– This “Member CA” is separate from the “APNIC CA”
• Provisioning model
– Member operates full RPKI system including CA
– Communication with APNIC via “up-down” provisioning protocol
• Either rsync (to be deprecated) or RRDP (preferred)
– This is live at JPNIC, CNNIC and TWNIC (IDNIC in progress)
RPKI Objects
• Resource certificates
– Extension of standard X.509 certificates
– Providing authority to use given IPv4/6 and ASN resources
– Signed by issuing registry (serving as CA)
• Route Origin Authorisation (ROA)
– Giving an ASN authority to route specific IP blocks
– Signed by IP resource holder
RPKI – ROA
• Route Origin Authorization
– Digitally signed object – list of prefixes and nominated ASN
– Multiple ROAs can exist for the same prefix
Prefix 203.176.32.0/19
Max-length /24
Origin ASN AS17821
RPKI application: ROV
• Route Origin Validation
AS17821
Announce:
203.176.32.0/19
Peer/Upstream
?
RPKI Validator
• Gathers ROAs from the distributed RPKI database
• Validates each entry’s (ROA) signature
– Creates a validated cache
rpki.apnic.net
IANA Repo
APNIC
Repo
RIPE Repo
LIR Repo LIR Repo
RPKI
Validator
Validated
Cache
rsync/RRDP
rsync/RRDP
rsync/RRDP
rsync/RRDP
RPKI Validator Options
• Available validators
– Dragon Research toolkit
• https://github.com/dragonresearch/rpki.net
– RIPE validator :
• https://www.ripe.net/manage-ips-and-asns/resource-management/certification/tools-
and-resources
– Routinator
• https://github.com/NLnetLabs/routinator
– RTRlib (bird, FRR, Quagga…)
• https://rtrlib.realmv6.org/
RPKI Validation States
• Valid
– Prefix, Origin ASN and prefix-length match those found on database
• Not Found (Unknown)
– No valid ROA found
• Neither valid nor invalid (perhaps ROA not created)
• Invalid
– Prefix is found on database, but Origin ASN is wrong, OR
– Prefix-length is longer than the Max-length
ROV@Border Routers
BR-A
BR-C BR-D
BR-B
Global (RPKI)
Repo
RPKI-to-Router (RtR) Validator
Validated
cache
Options when seeing invalid routes
• For End/Stub Networks:
– Drop them, OR
– Give them lower LOCAL_PREF, OR
– Do nothing (not recommended)
• For Transit Networks:
– For inbound routes from upstreams / peers:
• Give them lower LOCAL_PREF, OR
• Drop them, OR
• Do nothing (not recommended)
– For outbound routes to customers:
• Tag them before re-distributing them to customers and allow customers to make their
own choices
ROV@IXPs
– Route Server Scenario
AS-A
AS-C AS-D
AS-B
RS
Global (RPKI)
Repo
RPKI-to-Router (RtR) Validator
Routes
Tagged/filtered
routes
Validated
cache
ROV@IXPs – RS Usage Options
• Similar to the case of Transit Networks
• Lower LOCAL_PREF, OR
• Filtering
– Do not advertise Invalid routes
– Need to publish on RS policy
• Tagging
– Apply community tags based on the validation state
• let individual member ASNs act on the validation states
– Example:
• Valid (ASN:65XX1)
• Not Found (ASN:65XX2)
• Invalid (ASN:65XX3)
ROV@IXPs – Shared
Validator/Cache Scenario
AS-A
AS-C AS-D
AS-B
RS
Global (RPKI)
Repo
RPKI-to-Router (RtR) Validator
Validated
cache
ROV@IXPs – Examples in Asia Pacific
• Shared Validator/Cache
– JPNAP & BKNIX
• Other IXPs?
– IXPs are good locations to place shared Validator/Cache as
they are just one hop away from their participants and they are
mostly trustable
– You may push your IXPs to support it to ease your burden of
setting up your own Validator/Cache
– IXP Manager SW (https://www.ixpmanager.org) now supports
RPKI for easy deployment at IXPs
RPKI/ROV – Why do we do it?
• Contribute to Global Routing Security
– Help reduce the effect of route hijacking or
misconfiguration
– Protect your own networks and your customers better
• Collaborative effort among network operators is
key
RPKI is NOT a bullet-proof solution
• But it helps improve the situation, especially if everybody
does it
• Coupled with more and more direct peering, the protection
for routing security should be more effective
RPKI Status Globally – Snapshot
• Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
RPKI Status Globally – Trend
• Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
RPKI Status of APNIC Region – Snapshot
• Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
RPKI Status of APNIC Region – Trend
• Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
ROA Creation Statistics of APNIC Region
• Source: https://lirportal.ripe.net/certification/content/static/statistics/world-roas.html
Deployment Steps
• Create your own ROAs at relevant registries to better
protect your own routes
– And encourage your peers/customers to do the same
– For APNIC members, it is easy to do it on MyAPNIC
• You can contact APNIC Helpdesk at any time (https://www.apnic.net/get-
ip/helpdesk/)
• Next step is to do route origin validation (ROV) at your
border routers
– With or without your own validators
Industry Development on RPKI/ROV
• NTT – IRR improvement favoring Route Objects with valid ROAs
• Cloudflare – Public validator service & invalid routes filtering
• AT&T – Invalid routes filtering on peering connections
• Netnod – Invalid routes filtering and favouring of valid routes on IXP Route Servers
• AWS – BYOIP requires customers to set up ROAs
• RPKI Operational Roundtable 2019 just held in San Francisco on Feb 17 (Sun) right before
NANOG75
– https://www.eventbrite.com/e/rpki-operational-roundtable-2019-tickets-
8415556155?ref=enivtefor001&invite=MTU3ODY2NTgvcHdpbHNvbkBhcG5pYy5uZXQvMA%3D%3D%0A&utm_so
urce=eb_email&utm_medium=email&utm_campaign=inviteformalv2&utm_term=eventpage
• Routing Security was one of the main themes at APRICOT 2019 held in Daejeon last week
– https://2019.apricot.net/program/schedule/#/day/10
• Big players are getting more and more serious with RPKI/ROV…
Possible Implications to networks which
are announcing invalid routes
• Will get to fewer and fewer networks on Internet
– Similar to being disconnected from bigger and bigger part of
Internet
• If it is just a mistake, updating the relevant ROA records
(supposedly with proper authority) will solve the problem
– Should always keep your ROA records updated
• All can be managed at one place so should be easy
– Can have ROA records for the same prefix under multiple Origin
ASes at one time to help the cases of network migration and so on
Incentives for Creating ROAs
• To have basic protection of your own routes from being
hijacked at those networks which do ROV
• Industry push:
– NTT – IRR improvement favouring Route Objects with valid ROAs
– Netnod – Invalid routes filtering and favouring of valid routes on
IXP Route Servers
– AWS – BYOIP requires customers to set up ROAs
• More will be coming…
– As a requirement for peering???
More About RPKI/ROV Benefits
• Improved in-band verification of resource custodianship
– Much safer than manually checking whois or IRR database
– Ease of automation
• Secure Origin is the first step to preventing many attacks on BGP
integrity
– BGP Path remains a problem which is under development
– Related information such as IRR Policy can now leverage strong proofs
of validity (end the maintainer-authority problem in RADB/IRR)
• Instruction/information from the resource custodian can be
cryptographically verified (e.g. LOA signing)
Some Useful References
• https://blog.cloudflare.com/rpki-details/
• https://nlnetlabs.nl/projects/rpki/faq/
• https://2019.apricot.net/assets/files/APKS756/apricot2019_snijders_routing_securit
y_roadmap_1551228895%20(2).pdf
• https://datatracker.ietf.org/meeting/100/materials/slides-100-sidrops-rpki-
deployment-with-ixps-01
• https://datatracker.ietf.org/meeting/90/materials/slides-90-opsec-0
• https://www.ripe.net/support/training/ripe-ncc-educa/presentations/use-cases-
stavros-konstantaras.pdf
• https://www.franceix.net/en/technical/france-ix-route-servers/
RPKI Specifications
• RFC3779 X. 509 Extensions for IP Addresses
and AS Identifiers
• RFC6480 Infrastructure to support secure routing
• RFC6481 Profile for repository structure
• RFC6482 Profile for Route Origin Authorisation
(ROA)
• RFC6483 Validation model
• RFC6484 Certificate Policy (CP) for RPKI
• RFC6485 Algorithms & Key sizes for RPKI
• RFC6486 Manifests for repositories in RPKI
• RFC6487 Profile for RPKI Certificates
• RFC6488 Signed object CMS template
• RFC6489 Key Rollover
• RFC6490 Trust Anchor Locator (TAL)
• RFC6492 RPKI Provisioning Protocol
• RFC7318 Policy Qualifiers in RPKI certificates
• RFC7382 Certificate Practice Statement (CPS)
• RFC8181 RPKI publication protocol
• RFC8182 RPKI Delta protocol (RRDP)
• RFC8183 Out-of-band RPKI setup protocol
• RFC8360 RPKI Validation Reconsidered
Some of over 42 RFCs on implementation of RPKI and BGPsec
2019 should be a big year
for RPKI deployment…
Questions?

Contenu connexe

Tendances

NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityAPNIC
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security RoadmapAPNIC
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesMyNOG
 
Route Hijaking and the role of RPKI
Route Hijaking and the role of RPKIRoute Hijaking and the role of RPKI
Route Hijaking and the role of RPKIAPNIC
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
 
Route Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsRoute Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsBangladesh Network Operators Group
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs APNIC
 
APRICOT 2015 - NetConf for Peering Automation
APRICOT 2015 - NetConf for Peering AutomationAPRICOT 2015 - NetConf for Peering Automation
APRICOT 2015 - NetConf for Peering AutomationTom Paseka
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practiceJimmy Lim
 
Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27APNIC
 
APNIC Update
APNIC Update APNIC Update
APNIC Update APNIC
 
mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing APNIC
 
Rolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyRolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyAPNIC
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSAPNIC
 
VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateAPNIC
 
PacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKIPacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKIAPNIC
 

Tendances (20)

NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)Security
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security Roadmap
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry Services
 
Route Hijaking and the role of RPKI
Route Hijaking and the role of RPKIRoute Hijaking and the role of RPKI
Route Hijaking and the role of RPKI
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
 
Route Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsRoute Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for Operators
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
APRICOT 2015 - NetConf for Peering Automation
APRICOT 2015 - NetConf for Peering AutomationAPRICOT 2015 - NetConf for Peering Automation
APRICOT 2015 - NetConf for Peering Automation
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practice
 
Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27
 
APNIC Update
APNIC Update APNIC Update
APNIC Update
 
mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing
 
Rolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyRolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing Key
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoS
 
VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment Update
 
PacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKIPacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKI
 
Route Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS ApproachRoute Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS Approach
 
Having Honeypot for Better Network Security Analysis
Having Honeypot for Better Network Security AnalysisHaving Honeypot for Better Network Security Analysis
Having Honeypot for Better Network Security Analysis
 
32 - IDNOG03 - Lia Hestina (RIPE) - ATLAS Measurement
32 - IDNOG03  - Lia Hestina (RIPE) - ATLAS Measurement32 - IDNOG03  - Lia Hestina (RIPE) - ATLAS Measurement
32 - IDNOG03 - Lia Hestina (RIPE) - ATLAS Measurement
 

Similaire à HKNOG 7.0: RPKI - it's time to start deploying it

Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoMyNOG
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKIAPNIC
 
RPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsAPNIC
 
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI MattersAPNIC
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...APNIC
 
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessPacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessAPNIC
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsAPNIC
 
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaAPNIC
 
LKNOG3-Keynote
LKNOG3-KeynoteLKNOG3-Keynote
LKNOG3-KeynoteLKNOG
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)NaveenLakshman
 
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfRIPE NCC
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKIAPNIC
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingAPNIC
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityAPNIC
 
IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4APNIC
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationAPNIC
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaMyNOG
 
Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?APNIC
 

Similaire à HKNOG 7.0: RPKI - it's time to start deploying it (20)

Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
 
RPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and Operations
 
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
 
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessPacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure Connections
 
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
 
LKNOG3-Keynote
LKNOG3-KeynoteLKNOG3-Keynote
LKNOG3-Keynote
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)
 
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet Routing
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing Security
 
IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
 
Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?
 

Plus de APNIC

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 

Plus de APNIC (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 

Dernier

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 

Dernier (20)

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 

HKNOG 7.0: RPKI - it's time to start deploying it

  • 1. RPKI Deployment – It is time to start doing it Che-Hoo Cheng APNIC @HKNOG 7.0 2019-03-01
  • 2. Security matters as your network is connecting to Internet • You do NOT want your own routes to be hijacked by anyone, maliciously or accidentally • You also do NOT want to receive bad routing information from any of your BGP neighbors or propagate bad routing information to any of them • Basic measures include: – Bogons and martians filtering – Max prefix count – IRR (Internet Routing Registry) database checking – So on and so forth • Additional measure should include: – RPKI (Resource Public Key Infrastructure) / ROV (Route Origin Validation)
  • 3. Routing Security is becoming more important than ever • Route-hijacking cases (malicious and accidental) are more and more common – Big incentive for hackers • Hijack DNS, hijack websites, steal passwords and so on – Misconfiguration does happen from time to time • And, it is extremely easy to do route-hijacking, if protection measure is not implemented • A lot of route objects on IRR-DB are not authenticated properly and so cannot be fully trusted • Need better authenticity for routing info, i.e. need to make sure that the route originators are the true “owners” of the relevant IP resources
  • 4. Fat-Finger/Hijacks • Amazon (AS16509) Route53 hijack – Apr 2018 – AS10279 (eNET) announced/originated more specifics (/24s) of Amazon Route53’s prefix (205.251.192.0/21) • 205.251.192.0/24 ……. 205.251.199.0/24 • https://ip-ranges.amazonaws.com/ip-ranges.json – The motive? • During the period, DNS servers in the hijacked range only responded to queries for myetherwallet.com • Responded with addresses associated with AS41995/AS48693
  • 5. Fat-Finger/Hijacks • Bharti (AS9498) originates 103.0.0.0/10 – Dec 2017 (~ 2 days) – No noticeable damage done – more than 8K specific routes! • YouTube (AS36561) Incident – Feb 2008 (down for ~ 2 hours) – PT (AS17557) announced 208.65.153.0/24 (208.65.152.0/22) • Propagated by AS3491 (PCCW)
  • 6. RPKI • RPKI is a Public Key Infrastructure (PKI) framework, designed to secure BGP routing – Based on X.509 PKI standards • RPKI adds Internet Number Resources (INR) information to X.509 certificates issued to resource holders – Representing “ownership” and other status – Certification hierarchy follows INR delegation hierarchy IANA ➔ RIR (➔ NIR) ➔ ISP ➔ …
  • 7. RPKI Hierarchy Source : http://isoc.org/wp/ietfjournal/?p=2438 IANA RIPE-NCCLACNICARIN APNICAFRINIC NIR ISP ISP ISP ISP Allocation Hierarchy Trust Anchor Certificate Certificate chain mirrors allocation hierarchy Cert (CA) Cert (EE) Cert (EE) Cert (EE) Cert (EE) Cert (CA) Cert (CA) Cert (CA) Cert (CA) Cert (CA) Cert (CA)
  • 8. RPKI Service Models • Hosted model – APNIC performs CA functions on behalf of members – Manage keys, repository etc – Generate certificates for resource delegations – This “Member CA” is separate from the “APNIC CA” • Provisioning model – Member operates full RPKI system including CA – Communication with APNIC via “up-down” provisioning protocol • Either rsync (to be deprecated) or RRDP (preferred) – This is live at JPNIC, CNNIC and TWNIC (IDNIC in progress)
  • 9. RPKI Objects • Resource certificates – Extension of standard X.509 certificates – Providing authority to use given IPv4/6 and ASN resources – Signed by issuing registry (serving as CA) • Route Origin Authorisation (ROA) – Giving an ASN authority to route specific IP blocks – Signed by IP resource holder
  • 10. RPKI – ROA • Route Origin Authorization – Digitally signed object – list of prefixes and nominated ASN – Multiple ROAs can exist for the same prefix Prefix 203.176.32.0/19 Max-length /24 Origin ASN AS17821
  • 11. RPKI application: ROV • Route Origin Validation AS17821 Announce: 203.176.32.0/19 Peer/Upstream ?
  • 12. RPKI Validator • Gathers ROAs from the distributed RPKI database • Validates each entry’s (ROA) signature – Creates a validated cache rpki.apnic.net IANA Repo APNIC Repo RIPE Repo LIR Repo LIR Repo RPKI Validator Validated Cache rsync/RRDP rsync/RRDP rsync/RRDP rsync/RRDP
  • 13. RPKI Validator Options • Available validators – Dragon Research toolkit • https://github.com/dragonresearch/rpki.net – RIPE validator : • https://www.ripe.net/manage-ips-and-asns/resource-management/certification/tools- and-resources – Routinator • https://github.com/NLnetLabs/routinator – RTRlib (bird, FRR, Quagga…) • https://rtrlib.realmv6.org/
  • 14. RPKI Validation States • Valid – Prefix, Origin ASN and prefix-length match those found on database • Not Found (Unknown) – No valid ROA found • Neither valid nor invalid (perhaps ROA not created) • Invalid – Prefix is found on database, but Origin ASN is wrong, OR – Prefix-length is longer than the Max-length
  • 15. ROV@Border Routers BR-A BR-C BR-D BR-B Global (RPKI) Repo RPKI-to-Router (RtR) Validator Validated cache
  • 16. Options when seeing invalid routes • For End/Stub Networks: – Drop them, OR – Give them lower LOCAL_PREF, OR – Do nothing (not recommended) • For Transit Networks: – For inbound routes from upstreams / peers: • Give them lower LOCAL_PREF, OR • Drop them, OR • Do nothing (not recommended) – For outbound routes to customers: • Tag them before re-distributing them to customers and allow customers to make their own choices
  • 17. ROV@IXPs – Route Server Scenario AS-A AS-C AS-D AS-B RS Global (RPKI) Repo RPKI-to-Router (RtR) Validator Routes Tagged/filtered routes Validated cache
  • 18. ROV@IXPs – RS Usage Options • Similar to the case of Transit Networks • Lower LOCAL_PREF, OR • Filtering – Do not advertise Invalid routes – Need to publish on RS policy • Tagging – Apply community tags based on the validation state • let individual member ASNs act on the validation states – Example: • Valid (ASN:65XX1) • Not Found (ASN:65XX2) • Invalid (ASN:65XX3)
  • 19. ROV@IXPs – Shared Validator/Cache Scenario AS-A AS-C AS-D AS-B RS Global (RPKI) Repo RPKI-to-Router (RtR) Validator Validated cache
  • 20. ROV@IXPs – Examples in Asia Pacific • Shared Validator/Cache – JPNAP & BKNIX • Other IXPs? – IXPs are good locations to place shared Validator/Cache as they are just one hop away from their participants and they are mostly trustable – You may push your IXPs to support it to ease your burden of setting up your own Validator/Cache – IXP Manager SW (https://www.ixpmanager.org) now supports RPKI for easy deployment at IXPs
  • 21. RPKI/ROV – Why do we do it? • Contribute to Global Routing Security – Help reduce the effect of route hijacking or misconfiguration – Protect your own networks and your customers better • Collaborative effort among network operators is key
  • 22. RPKI is NOT a bullet-proof solution • But it helps improve the situation, especially if everybody does it • Coupled with more and more direct peering, the protection for routing security should be more effective
  • 23. RPKI Status Globally – Snapshot • Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
  • 24. RPKI Status Globally – Trend • Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
  • 25. RPKI Status of APNIC Region – Snapshot • Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
  • 26. RPKI Status of APNIC Region – Trend • Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
  • 27. ROA Creation Statistics of APNIC Region • Source: https://lirportal.ripe.net/certification/content/static/statistics/world-roas.html
  • 28. Deployment Steps • Create your own ROAs at relevant registries to better protect your own routes – And encourage your peers/customers to do the same – For APNIC members, it is easy to do it on MyAPNIC • You can contact APNIC Helpdesk at any time (https://www.apnic.net/get- ip/helpdesk/) • Next step is to do route origin validation (ROV) at your border routers – With or without your own validators
  • 29. Industry Development on RPKI/ROV • NTT – IRR improvement favoring Route Objects with valid ROAs • Cloudflare – Public validator service & invalid routes filtering • AT&T – Invalid routes filtering on peering connections • Netnod – Invalid routes filtering and favouring of valid routes on IXP Route Servers • AWS – BYOIP requires customers to set up ROAs • RPKI Operational Roundtable 2019 just held in San Francisco on Feb 17 (Sun) right before NANOG75 – https://www.eventbrite.com/e/rpki-operational-roundtable-2019-tickets- 8415556155?ref=enivtefor001&invite=MTU3ODY2NTgvcHdpbHNvbkBhcG5pYy5uZXQvMA%3D%3D%0A&utm_so urce=eb_email&utm_medium=email&utm_campaign=inviteformalv2&utm_term=eventpage • Routing Security was one of the main themes at APRICOT 2019 held in Daejeon last week – https://2019.apricot.net/program/schedule/#/day/10 • Big players are getting more and more serious with RPKI/ROV…
  • 30. Possible Implications to networks which are announcing invalid routes • Will get to fewer and fewer networks on Internet – Similar to being disconnected from bigger and bigger part of Internet • If it is just a mistake, updating the relevant ROA records (supposedly with proper authority) will solve the problem – Should always keep your ROA records updated • All can be managed at one place so should be easy – Can have ROA records for the same prefix under multiple Origin ASes at one time to help the cases of network migration and so on
  • 31. Incentives for Creating ROAs • To have basic protection of your own routes from being hijacked at those networks which do ROV • Industry push: – NTT – IRR improvement favouring Route Objects with valid ROAs – Netnod – Invalid routes filtering and favouring of valid routes on IXP Route Servers – AWS – BYOIP requires customers to set up ROAs • More will be coming… – As a requirement for peering???
  • 32. More About RPKI/ROV Benefits • Improved in-band verification of resource custodianship – Much safer than manually checking whois or IRR database – Ease of automation • Secure Origin is the first step to preventing many attacks on BGP integrity – BGP Path remains a problem which is under development – Related information such as IRR Policy can now leverage strong proofs of validity (end the maintainer-authority problem in RADB/IRR) • Instruction/information from the resource custodian can be cryptographically verified (e.g. LOA signing)
  • 33. Some Useful References • https://blog.cloudflare.com/rpki-details/ • https://nlnetlabs.nl/projects/rpki/faq/ • https://2019.apricot.net/assets/files/APKS756/apricot2019_snijders_routing_securit y_roadmap_1551228895%20(2).pdf • https://datatracker.ietf.org/meeting/100/materials/slides-100-sidrops-rpki- deployment-with-ixps-01 • https://datatracker.ietf.org/meeting/90/materials/slides-90-opsec-0 • https://www.ripe.net/support/training/ripe-ncc-educa/presentations/use-cases- stavros-konstantaras.pdf • https://www.franceix.net/en/technical/france-ix-route-servers/
  • 34. RPKI Specifications • RFC3779 X. 509 Extensions for IP Addresses and AS Identifiers • RFC6480 Infrastructure to support secure routing • RFC6481 Profile for repository structure • RFC6482 Profile for Route Origin Authorisation (ROA) • RFC6483 Validation model • RFC6484 Certificate Policy (CP) for RPKI • RFC6485 Algorithms & Key sizes for RPKI • RFC6486 Manifests for repositories in RPKI • RFC6487 Profile for RPKI Certificates • RFC6488 Signed object CMS template • RFC6489 Key Rollover • RFC6490 Trust Anchor Locator (TAL) • RFC6492 RPKI Provisioning Protocol • RFC7318 Policy Qualifiers in RPKI certificates • RFC7382 Certificate Practice Statement (CPS) • RFC8181 RPKI publication protocol • RFC8182 RPKI Delta protocol (RRDP) • RFC8183 Out-of-band RPKI setup protocol • RFC8360 RPKI Validation Reconsidered Some of over 42 RFCs on implementation of RPKI and BGPsec
  • 35. 2019 should be a big year for RPKI deployment…

Notes de l'éditeur

  1. EE – End-Entity
  2. 90+% of the networks will adopt Hosted model
  3. RP – Relying Party