SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
Measuring RPKI
Effectiveness
Geoff Huston
APNIC
Routing Security
That’s the objective of routing security?
Pick One, and only One?
If you had to pick just one objective what would you choose?
qProtect the routing system from all/some operational mishaps?
qProtect the routing system from all/some hostile attacks?
qPrevent the routing of bogus address prefixes?
qPrevent the use of bogus AS’s in the routing system?
qPrevent all forms of synthetic routes from being injected into the
routing system?
qPrevent unauthorised route withdrawal?
qProtect users from being directed along bogus routing paths?
A Touch of Realism
Enforcing rules to ensure that the routes carried in BGP are
both protocol-wise accurate and policy-wise accurate is well
beyond the capabilities of BGP and viable BGP control
mechanisms *
Route Origin Validation is designed to prevent BGP speakers
from learning and preferring routes that are not authorised by
the prefix holder
The intent of not preferring unauthorised routes is to prevent
users’ traffic from being steered along these bogus routes
A Touch of Realism
BGP is not a deterministic protocol, but more of a negotiation
protocol that attempts to find meta-stable solutions to
matching importer/export policy preferences simultaneously.
Where the policies are not uniquely compatible the BGP
“solution” is not necessarily reached deterministically and
different outcomes will be seen at different times – see
RFC4264 “BGP Wedgies” for an illustration of this form of
indeterminism
*
My Choice…
If you had to pick just one objective what would you choose?
qProtect the routing system from all/some operational mishaps?
qProtect the routing system from all/some hostile attacks?
qPrevent the routing of bogus address prefixes?
qPrevent the use of bogus AS’s in the routing system?
qPrevent all forms of synthetic routes from being injected into the
routing system?
qPrevent unauthorised route withdrawal?
qProtect users from being directed along bogus routing paths?
My Objective
I want to measure the “impact” of invalid route filtering on users
The question I want to answer here is user-centric:
• What proportion of users can’t reach a destination when the only available
destination route is invalid according to ROV?
I’d like to position this as a long term whole-of-Internet measurement
to track the increasing deployment of RoV filtering* over the coming
months and years
RoV Filtering
“RoV filtering” is shorthand to “using RPKI validation of published
Route Origination Attestations to detect and drop route objects that
are invalid according to the conventional RoA interpretation”, which in
practice means either too specific or wrong origin AS
*
Methodology
If we are looking at the effectiveness of the secure routing
system in blocking the ability to direct users along bogus
routing paths, then this suggests a measurement approach:
• Set up a bogus (RPKI RoV-invalid) routing path as the only route to
a prefix
• Direct a very large set of users from across the Internet to try to
reach a web server located at this prefix
• Use a ‘control’ of a valid routing path to the same destination
• Measure and compare
Methodology
1. Set up a prefix and AS in a delegated RPKI repository
• We used the Krill package to achieve this
• It Just Worked!
Aside: Counting RPKI Clients
Number of Unique IP addresses per day
performing a fetch from our RPKI
repository
Methodology
2. Regularly revoke and re-issue ROAs that flip the validity
state between valid and invalid states, using time slicing to flip
between measurement case and control case
# Flip to "good" at 00:00 on Fri/Mon/Thu
0 0 * * 1,4,5 krillc roas update --delta ./delta-in.txt > /tmp/krillc-in.log 2>&1
# Flip to "bad" at 12:00 on sat/Tue/Thu
0 12 * * 2,4,6 krillc roas update --delta ./delta-out.txt > /tmp/krillc-out.log 2>&1
These two scripts flip the ROA valid state between ‘good’ and ’bad’ origin ASNs for the prifix
Methodology
3. Anycast the prefix and AS pair in a number of locations
across the Internet
• 3 locations: US (LA), DE (FRA), SG
• 3 transit providers
• The server at these locations only delivers 1x1 blots from the
anycast service address
• This is IPv4-only at this point
Methodology
4. Load a unique URL that maps to the destination into a
measurement script
• The DNS component uses HTTPS and a unique DNS label
component to try and ensure that the HTTP FETCH (which is the
actual RoV test) is not intercepted by caching middleware proxies
Feed a script into an advertising campaign to have this test
performed on a large scale
Flipping ROA states
• What’s a good frequency to flip states?
• How long does it take for the routing system as a whole to learn that a previously
valid route is now invalid? And how long for the inverse invalid to valid transition
• Validity / Invalidity is determined by what is published at the RPKI
publication point
• Each transition is marked by revocation of the previous ROA’s EE certificate and the
issuing of a new ROA and EE certificate
• What’s the re-query interval for clients of a RPKI publication point?
• There is no standard-defined re-query interval so implementors have exercised their
creativity!
Re-Query Intervals (first hour)
120 seconds is popular
600 seconds is also well used
as is one hour
What’s this?
Re-Query – Cumulative
Distribution
Within 2 hours we see
75% of clients perform
a requery
Why the tail lag?
https://grafana.wikimedia.org/d/UwUa77GZk/rpki?panelId=59&fullscreen&orgId=1&from=now-30d&to=now
Clients can take a significant
amount of time to complete a pass
through the entire RPKI distributed
repository set, which makes the
entire system sluggish to respond
to changes
We use 12 and 36 hour held
states
The route object validity state cycles over a 7 day period in a
set of 12 and 36 hour intervals
We use 12 and 36 hour held
states
view from stat.ripe.net
We use 12 and 36 hour held
states
BGP Play view of the
routing changes
We use 12 and 36 hour held states
This shows the per-second fetch rate
when the route is valid (green) and
invalid (red) over a 7 day window
The route validity switches are clearly
visible
”invalid” route state
”valid” route state
Weekly Measurement
Transition – Valid to Invalid
It takes some 30 minutes for the valid to
invalid transition to take effect in this
measurement
It appears that this is a combination of slow
re-query rates at the RPKI publication point
and some delays in making changes to the
filters being fed into the routers
This system is dependant on the last transit
ISP to withdraw
Time of ROA change at the RPKI repository
Transition – Invalid to Valid
It takes some 5 minutes for the invalid to
valid transition to take effect in this
measurement
This system is dependant on the first transit
ISP to announce, so it tracks the fastest
system to react
Time of ROA change at the RPKI repository
RPKI “sweep” software
• There is a mix of 2, 10 and 60 minute timers being used by RPKI
clients to perform a distributed repository sweep
• 2 minutes seems like a lot of thrashing with little in the way of
outcome – the system is held back by those clients using longer re-
query timers
• 60 minutes seems too slow
I’d suggest that we use a 10 minute query timer as a compromise here
Results: User Impact of RPKI
filtering
At 17% of users that’s a
surprisingly large impact for
a very recent technology
Results: User Impact of RPKI
filtering – Jul 2020
Results: User Impact of RPKI
filtering – Oct 2020
Why?
• This map is a mix of two factors
• Networks that perform invalid route filtering
Why?
• This map is a mix of two factors
• Networks that perform invalid route filtering
and
• Network that do not filter themselves but are customers of transit providers
who filter
• In either case the basic RoV objective is achieved, in that end users
and their networks are not exposed to invalid route objects
Next Steps for Measurement
This is a work in progress and would benefit from more refinement,
including:
• Adding more anycast servers with more transit diversity
Next Steps for Measurement (2)
• Attempting selective traceroute from the anycast servers to identify the
networks that are performing the RoV invalid filter drop?
• The measurement setup detects the user impact but not the individual networks
who are performing drop invalid. Selective traceroute may allow a better way to
identify the point of invalid drop
Next Steps for Measurement (3)
• Further analysis of BGP route updates in route collectors to determine
route withdrawal and announcement patterns when RPKI validity
changes?
• What is the difference between the primary point of route withdrawal /
announcement and the consequent propagation in eBGP to the surrounding
networks
Questions we might want to
think about
Stub vs Transit
• Is it necessary for every AS to operate RPKI ROV
infrastructure and filter invalid routes?
• If not, what’s the minimal set of filtering networks that could
provide similar levels of filtering for the Internet as a whole
• What’s the marginal benefit of stub AS performing RPKI ROV
filtering?
Questions we might want to
think about (2)
Ingress vs Egress
• Should a stub AS RPKI only RoV filter its own
announcements?
• Should every AS filter their own announcements?
• What’s more important: Protecting others who DON’T RoV
filter from your operational mishaps or protecting yourself
from the mishaps of others?
Questions we might want to
think about (3)
Prefix vs AS
• Should an AS be able to enumerate ALL of its originations in
a AS-signed attestation?
What are we trying to achieve
here?
• If this is a routing protection measure then what are you
trying to protect? From whom? From what threat?
• If this is a user protection measure then the issue of route
filtering is potentially a more important issue for transits not
stubs
• A stub should generate ROAs for its routes, but there is far less of
an incentive to perform RoV invalid filtering if all of the the stub’s
upstreams / IXs are already performing this filtering
Thanks!

Contenu connexe

Tendances

VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateAPNIC
 
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed RawiManaging Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed RawiMyNOG
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
Prefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul IslamPrefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul IslamMyNOG
 
NZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRNZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRAPNIC
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuMyNOG
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic CharacterizationIsmail Mukiibi
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services HayderThary
 
IPv6 Deployment Case on a Korean Governmental Website
IPv6 Deployment Case on a Korean Governmental WebsiteIPv6 Deployment Case on a Korean Governmental Website
IPv6 Deployment Case on a Korean Governmental WebsiteAPNIC
 
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...Emmanuel Msumali
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!APNIC
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...ieeeprojectschennai
 
NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityAPNIC
 
Quality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTIQuality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTIMuhammad Bilal Satti
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practiceJimmy Lim
 
Equal Cost Multipath Routing in FOKUS OpenSDNCore
Equal Cost Multipath Routing in FOKUS OpenSDNCoreEqual Cost Multipath Routing in FOKUS OpenSDNCore
Equal Cost Multipath Routing in FOKUS OpenSDNCoreHai Dinh Tuan
 

Tendances (20)

VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment Update
 
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed RawiManaging Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Prefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul IslamPrefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul Islam
 
NZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRNZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBR
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie Liu
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic Characterization
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
IPv6 Deployment Case on a Korean Governmental Website
IPv6 Deployment Case on a Korean Governmental WebsiteIPv6 Deployment Case on a Korean Governmental Website
IPv6 Deployment Case on a Korean Governmental Website
 
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...
 
Java One 2001
Java One 2001Java One 2001
Java One 2001
 
NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)Security
 
Quality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTIQuality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTI
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practice
 
Equal Cost Multipath Routing in FOKUS OpenSDNCore
Equal Cost Multipath Routing in FOKUS OpenSDNCoreEqual Cost Multipath Routing in FOKUS OpenSDNCore
Equal Cost Multipath Routing in FOKUS OpenSDNCore
 

Similaire à NANOG 80: Measuring RPKI Effectiveness

AusNOG 2022: Measuring RPKI use in BGP
AusNOG 2022: Measuring RPKI use in BGPAusNOG 2022: Measuring RPKI use in BGP
AusNOG 2022: Measuring RPKI use in BGPAPNIC
 
Routing, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsRouting, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsAPNIC
 
36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challengesAPNIC
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security RoadmapAPNIC
 
APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APNIC
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityAPNIC
 
PacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet RoutingPacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet RoutingAPNIC
 
LkNOG 3: Securing Internet Routing
LkNOG 3: Securing Internet RoutingLkNOG 3: Securing Internet Routing
LkNOG 3: Securing Internet RoutingAPNIC
 
SANOG 34: Securing Internet Routing
SANOG 34: Securing Internet RoutingSANOG 34: Securing Internet Routing
SANOG 34: Securing Internet RoutingAPNIC
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itAPNIC
 
2008118090324 hk
2008118090324 hk2008118090324 hk
2008118090324 hkVivek Singh
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxAayushMishra89
 
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry developmentAPNIC
 
3 ip routing bgp-updated
3 ip routing bgp-updated3 ip routing bgp-updated
3 ip routing bgp-updatedSagarR24
 
3 ip routing part b
3 ip routing part b3 ip routing part b
3 ip routing part bSagarR24
 

Similaire à NANOG 80: Measuring RPKI Effectiveness (20)

AusNOG 2022: Measuring RPKI use in BGP
AusNOG 2022: Measuring RPKI use in BGPAusNOG 2022: Measuring RPKI use in BGP
AusNOG 2022: Measuring RPKI use in BGP
 
Routing, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsRouting, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of Analytics
 
36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security Roadmap
 
APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing Security
 
PacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet RoutingPacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet Routing
 
CCCNP ROUTE v6_ch05
CCCNP ROUTE  v6_ch05CCCNP ROUTE  v6_ch05
CCCNP ROUTE v6_ch05
 
LkNOG 3: Securing Internet Routing
LkNOG 3: Securing Internet RoutingLkNOG 3: Securing Internet Routing
LkNOG 3: Securing Internet Routing
 
SANOG 34: Securing Internet Routing
SANOG 34: Securing Internet RoutingSANOG 34: Securing Internet Routing
SANOG 34: Securing Internet Routing
 
teste
testeteste
teste
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying it
 
2008118090324 hk
2008118090324 hk2008118090324 hk
2008118090324 hk
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
 
3 ip routing bgp-updated
3 ip routing bgp-updated3 ip routing bgp-updated
3 ip routing bgp-updated
 
3 ip routing part b
3 ip routing part b3 ip routing part b
3 ip routing part b
 

Plus de APNIC

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 

Plus de APNIC (20)

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 

Dernier

Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 

Dernier (20)

Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 

NANOG 80: Measuring RPKI Effectiveness

  • 2. Routing Security That’s the objective of routing security?
  • 3. Pick One, and only One? If you had to pick just one objective what would you choose? qProtect the routing system from all/some operational mishaps? qProtect the routing system from all/some hostile attacks? qPrevent the routing of bogus address prefixes? qPrevent the use of bogus AS’s in the routing system? qPrevent all forms of synthetic routes from being injected into the routing system? qPrevent unauthorised route withdrawal? qProtect users from being directed along bogus routing paths?
  • 4. A Touch of Realism Enforcing rules to ensure that the routes carried in BGP are both protocol-wise accurate and policy-wise accurate is well beyond the capabilities of BGP and viable BGP control mechanisms * Route Origin Validation is designed to prevent BGP speakers from learning and preferring routes that are not authorised by the prefix holder The intent of not preferring unauthorised routes is to prevent users’ traffic from being steered along these bogus routes
  • 5. A Touch of Realism BGP is not a deterministic protocol, but more of a negotiation protocol that attempts to find meta-stable solutions to matching importer/export policy preferences simultaneously. Where the policies are not uniquely compatible the BGP “solution” is not necessarily reached deterministically and different outcomes will be seen at different times – see RFC4264 “BGP Wedgies” for an illustration of this form of indeterminism *
  • 6. My Choice… If you had to pick just one objective what would you choose? qProtect the routing system from all/some operational mishaps? qProtect the routing system from all/some hostile attacks? qPrevent the routing of bogus address prefixes? qPrevent the use of bogus AS’s in the routing system? qPrevent all forms of synthetic routes from being injected into the routing system? qPrevent unauthorised route withdrawal? qProtect users from being directed along bogus routing paths?
  • 7. My Objective I want to measure the “impact” of invalid route filtering on users The question I want to answer here is user-centric: • What proportion of users can’t reach a destination when the only available destination route is invalid according to ROV? I’d like to position this as a long term whole-of-Internet measurement to track the increasing deployment of RoV filtering* over the coming months and years
  • 8. RoV Filtering “RoV filtering” is shorthand to “using RPKI validation of published Route Origination Attestations to detect and drop route objects that are invalid according to the conventional RoA interpretation”, which in practice means either too specific or wrong origin AS *
  • 9. Methodology If we are looking at the effectiveness of the secure routing system in blocking the ability to direct users along bogus routing paths, then this suggests a measurement approach: • Set up a bogus (RPKI RoV-invalid) routing path as the only route to a prefix • Direct a very large set of users from across the Internet to try to reach a web server located at this prefix • Use a ‘control’ of a valid routing path to the same destination • Measure and compare
  • 10. Methodology 1. Set up a prefix and AS in a delegated RPKI repository • We used the Krill package to achieve this • It Just Worked!
  • 11. Aside: Counting RPKI Clients Number of Unique IP addresses per day performing a fetch from our RPKI repository
  • 12. Methodology 2. Regularly revoke and re-issue ROAs that flip the validity state between valid and invalid states, using time slicing to flip between measurement case and control case # Flip to "good" at 00:00 on Fri/Mon/Thu 0 0 * * 1,4,5 krillc roas update --delta ./delta-in.txt > /tmp/krillc-in.log 2>&1 # Flip to "bad" at 12:00 on sat/Tue/Thu 0 12 * * 2,4,6 krillc roas update --delta ./delta-out.txt > /tmp/krillc-out.log 2>&1 These two scripts flip the ROA valid state between ‘good’ and ’bad’ origin ASNs for the prifix
  • 13. Methodology 3. Anycast the prefix and AS pair in a number of locations across the Internet • 3 locations: US (LA), DE (FRA), SG • 3 transit providers • The server at these locations only delivers 1x1 blots from the anycast service address • This is IPv4-only at this point
  • 14. Methodology 4. Load a unique URL that maps to the destination into a measurement script • The DNS component uses HTTPS and a unique DNS label component to try and ensure that the HTTP FETCH (which is the actual RoV test) is not intercepted by caching middleware proxies Feed a script into an advertising campaign to have this test performed on a large scale
  • 15. Flipping ROA states • What’s a good frequency to flip states? • How long does it take for the routing system as a whole to learn that a previously valid route is now invalid? And how long for the inverse invalid to valid transition • Validity / Invalidity is determined by what is published at the RPKI publication point • Each transition is marked by revocation of the previous ROA’s EE certificate and the issuing of a new ROA and EE certificate • What’s the re-query interval for clients of a RPKI publication point? • There is no standard-defined re-query interval so implementors have exercised their creativity!
  • 16. Re-Query Intervals (first hour) 120 seconds is popular 600 seconds is also well used as is one hour What’s this?
  • 17. Re-Query – Cumulative Distribution Within 2 hours we see 75% of clients perform a requery
  • 18. Why the tail lag? https://grafana.wikimedia.org/d/UwUa77GZk/rpki?panelId=59&fullscreen&orgId=1&from=now-30d&to=now Clients can take a significant amount of time to complete a pass through the entire RPKI distributed repository set, which makes the entire system sluggish to respond to changes
  • 19. We use 12 and 36 hour held states The route object validity state cycles over a 7 day period in a set of 12 and 36 hour intervals
  • 20. We use 12 and 36 hour held states view from stat.ripe.net
  • 21. We use 12 and 36 hour held states BGP Play view of the routing changes
  • 22. We use 12 and 36 hour held states This shows the per-second fetch rate when the route is valid (green) and invalid (red) over a 7 day window The route validity switches are clearly visible ”invalid” route state ”valid” route state Weekly Measurement
  • 23. Transition – Valid to Invalid It takes some 30 minutes for the valid to invalid transition to take effect in this measurement It appears that this is a combination of slow re-query rates at the RPKI publication point and some delays in making changes to the filters being fed into the routers This system is dependant on the last transit ISP to withdraw Time of ROA change at the RPKI repository
  • 24. Transition – Invalid to Valid It takes some 5 minutes for the invalid to valid transition to take effect in this measurement This system is dependant on the first transit ISP to announce, so it tracks the fastest system to react Time of ROA change at the RPKI repository
  • 25. RPKI “sweep” software • There is a mix of 2, 10 and 60 minute timers being used by RPKI clients to perform a distributed repository sweep • 2 minutes seems like a lot of thrashing with little in the way of outcome – the system is held back by those clients using longer re- query timers • 60 minutes seems too slow I’d suggest that we use a 10 minute query timer as a compromise here
  • 26. Results: User Impact of RPKI filtering At 17% of users that’s a surprisingly large impact for a very recent technology
  • 27. Results: User Impact of RPKI filtering – Jul 2020
  • 28. Results: User Impact of RPKI filtering – Oct 2020
  • 29. Why? • This map is a mix of two factors • Networks that perform invalid route filtering
  • 30. Why? • This map is a mix of two factors • Networks that perform invalid route filtering and • Network that do not filter themselves but are customers of transit providers who filter • In either case the basic RoV objective is achieved, in that end users and their networks are not exposed to invalid route objects
  • 31. Next Steps for Measurement This is a work in progress and would benefit from more refinement, including: • Adding more anycast servers with more transit diversity
  • 32. Next Steps for Measurement (2) • Attempting selective traceroute from the anycast servers to identify the networks that are performing the RoV invalid filter drop? • The measurement setup detects the user impact but not the individual networks who are performing drop invalid. Selective traceroute may allow a better way to identify the point of invalid drop
  • 33. Next Steps for Measurement (3) • Further analysis of BGP route updates in route collectors to determine route withdrawal and announcement patterns when RPKI validity changes? • What is the difference between the primary point of route withdrawal / announcement and the consequent propagation in eBGP to the surrounding networks
  • 34. Questions we might want to think about Stub vs Transit • Is it necessary for every AS to operate RPKI ROV infrastructure and filter invalid routes? • If not, what’s the minimal set of filtering networks that could provide similar levels of filtering for the Internet as a whole • What’s the marginal benefit of stub AS performing RPKI ROV filtering?
  • 35. Questions we might want to think about (2) Ingress vs Egress • Should a stub AS RPKI only RoV filter its own announcements? • Should every AS filter their own announcements? • What’s more important: Protecting others who DON’T RoV filter from your operational mishaps or protecting yourself from the mishaps of others?
  • 36. Questions we might want to think about (3) Prefix vs AS • Should an AS be able to enumerate ALL of its originations in a AS-signed attestation?
  • 37. What are we trying to achieve here? • If this is a routing protection measure then what are you trying to protect? From whom? From what threat? • If this is a user protection measure then the issue of route filtering is potentially a more important issue for transits not stubs • A stub should generate ROAs for its routes, but there is far less of an incentive to perform RoV invalid filtering if all of the the stub’s upstreams / IXs are already performing this filtering