SlideShare une entreprise Scribd logo
1  sur  63
Télécharger pour lire hors ligne
https://twitter.com/rapappuhttp://bd.linkedin.com/in/fakrulalamfakrul@bdhub.comFakrul Alam
RPKI
Resource Public Key Infrastructure
bdNOG3 | 18-23 May, 2015 | Dhaka
Target Audience
• Knowledge of Internet Routing(specially BGP)
• Familiar with any IRR Database
• No need to know Cryptography
• Basic knowledge of PKI(Public Key Infrastructure)
Agenda
• BGP / RPKI
• Configuration
• Hands-on Lab (Juniper)
BGP
BGP (AS)
Send a packet to
2001:DB8::1
I have
2001:DB8::/32
AS Path
AS 100 AS 300AS 200
Send a packet to
2001:DB8::1
I have
2001:DB8::/32
2001:DB8::/32 100 200 300 i
AS Path
AS 100 AS 300
Send a packet to
2001:DB8::1
I have
2001:DB8::/32
I have
2001:DB8::/48
AS 420
AS 200
2001:DB8::/32 100 200 300 i
2001:DB8::/48 100 200 420 i
Historical Incident
• April 1997: The "AS 7007 incident" UU/Sprint for 2 days
• February 24, 2008: Pakistan's attempt to block YouTube access within their
country takes down YouTube entirely.[6]
• November 11, 2008: The Brazilian ISP CTBC - Companhia de Telecomunicações
do Brasil Central leaked their internal table into the global BGP table.
• April 8, 2010: China Telecom originated 37,000 prefixes not belonging to them in
15 minutes, causing massive outage of services globally.
source : http://en.wikipedia.org/wiki/IP_hijacking
Historical Incident
• For theory of positivity lets call all these as Mis-Origination
• Traffic Hijacking or Prefix Hijacking assumes Negative intent
Current Trend
• Filtering limited to the edges facing the customer
• Filters on peering and transit sessions are often too complex or take too
many resources
• Check prefix before announcing it
Filter Where?
• Secure BGP Templates
• http://www.cymru.com/gillsr/
documents/junos-bgp-
template.htm
• https://www.team-cymru.org/
ReadingRoom/Templates/
secure-bgp-template.html
Internet Registry (IR)
• Maintains Internet Resources such as IP addresses and ASNs, and publish
the registration information
• Allocations for Local Internet Registries
• Assignments for end-users
• APNIC is the Regional Internet Registry(RIR) in the Asia Pacific region
• National Internet Registry(NIR) exists in several economies
The Eco-System
National IR (NIR)
Internet Service Provider
End User
Regional IR (RIR)
Internet Routing Registry
• Maintains routing policy database
• RADB is the most popular service, though some RIRs also provide similar
services
• Routing policy information is expressed in a series of objects
• On RADB, a registered user can register any object
• route and route6 objects are used to indicate route origination
• Prefix and origin AS
Still not enough
IRR is useful, but it’s not perfect
RPKI
Resource Pubic Key Infrastructure
IP Address & AS Numbers Digital Certificate
RPKI Deployment
AS 100 AS 300AS 200
Phase 2
Path Validation
Send a packet to
2001:DB8::1
I have
2001:DB8::/32
Phase 1
Origin Validation
Goals of RPKI
• Able to authoritatively prove who owns an IP Prefix and what AS(s) may
Announce It
• Reducing routing leaks
• Attaching digital certificates to network resources (AS Number & IP
Address)
• Prefix Ownership Follows the Allocation Hierarchy IANA, RIRs, ISPs, …
RPKI Implementation
• Two RPKI implementation type
• Delegated: Each participating node becomes a CA and runs their own RPKI
repository, delegated by the parent CA.
• Hosted: The RIR runs the CA functionality for interested participants.
RPKI Origin Validation
AS 100 AS 300
I have
2001:DB8::/48
AS 420
AS 200
Send a packet to
2001:DB8::1
I have
2001:DB8::/32
Only AS300
2001:DB8::/32 100 200 300 i
2001:DB8::/48 100 200 420 i
Valid
Invalid
RPKI Building Blocks
• Trust Anchors (RIR’s)
• Route Origination Authorizations (ROA)
• Validators
Let’s discuss these building blocks in
details
PKI & Trust Anchors
Public Key Concept
• Private key: This key must be known only by its owner.
• Public key: This key is known to everyone (it is public)
• Relation between both keys: What one key encrypts, the other one
decrypts, and vice versa. That means that if you encrypt something with my
public key (which you would know, because it's public :-), I would need my
private key to decrypt the message.
• Same alike http with SSL aka https
X.509 Certificates 3779 EXT
X.509 Cert
RFC 3779
Extension
Describes IP
Resources (Addr & ASN)
SIA – URI for where this Publishes
Owner’s Public Key
Signed by Parent’s Private Key
CA
Certificates are X.509 certificates that
conform to the PKIX profile [PKIX]. They
also contain an extension field that lists
a collection of IP resources (IPv4
addresses, IPv6 addresses and AS
Numbers) [RFC3779]
Trust Anchor
Cert / APNIC
2001:DB8::/32
Public Key
CA
Cert / bdHUB
2001:DB8::/48
Public Key
CA
Cert / dhakaCom
2001:DB8:1::/48
Public Key
CA
Cert / IBBL
2001:DB8:2::/48
Public Key
CA
Cert / USER
2001:DB8:1::/56
Public Key
CA
The hierarchy of the RPKI is based on the administrative resource
allocation hierarchy, where resources are distributed from the IANA to
the RIRs, to Local Internet Registries (LIRs) and end users.
Certificate Path Certificate Path
Certificate Path
Certificate Path
Trust Anchor Locator (TALs)
• In cryptographic systems with hierarchical structure, a Trust anchor is an
authoritative entity for which trust is assumed and not derived.
• In X.509 architecture, a root certificate would be the trust anchor from which
whole chain of trust is derived. The trust anchor must be in possession of the
trusting party beforehand to make any further certificate path validation
possible.
• RPKI uses Internet Assigned Numbers Authority(IANA) as the trust anchor,
and Regional Internet Registries(RIR) as immediately subordinate nodes to
that anchor.
PKI in IRR
• The RIRs hold a self-signed root certificate for all the resources that they
have in the registry
• They are the trust anchor for the system
• That root certificate is used to sign a certificate that lists your resources
• You can issue child certificates for those resources to your customers
• When making assignments or sub allocations
ROA
Route Origin Authorizations
Route Origination Authorizations (ROA)
• Next to the prefix and the ASN which is allowed to announce it, the ROA contains:
• A minimum prefix length
• A maximum prefix length
• An expiry date
• Origin ASN
• Multiple ROAs can exist for the same prefix
• ROAs can overlap
Validators
Origin Validation
• Router gets ROA information from the RPKI Cache
• RPKI verification is done by the RPKI Cache
• The BGP process will check each announcement with the ROA information
and label the prefix
Validated RPKI Cache
RPKI to RTR protocol
Result of Check
• Valid – Indicates that the prefix and AS pair are found in the database.
• Invalid – Indicates that the prefix is found, but either the corresponding
AS received from the EBGP peer is not the AS that appears in the
database, or the prefix length in the BGP update message is longer
than the maximum length permitted in the database.
• Not Found / Unknown– Indicates that the prefix is not among the
prefixes or prefix ranges in the database.
Valid > Unknown > Invalid
ROA Example
65420
Prefix: 10.0.0.0/16
ASN: 65420
ROA 10.0.0.0/16
Origin AS Prefix
/18
Max Length
VALID
VALID
INVALID
INVALID
UNKNOWN
10.0.0.0/16AS65420
10.0.128.0/17AS65420
10.0.0.0/16AS65421
10.0.10.0/24AS65420
10.0.0.0/8AS65430
Local Policy
• You can define your policy based on the outcomes
• Do nothing
• Just logging
• Label BGP communities
• Modify preference values
• Rejecting the announcement
RPKI Support in Routers
• The RPKI-RTR Protocol is an IETF Internet Draft
• Production Cisco Support:
• ASR1000, 7600, ASR903 and ASR901 in releases 15.2(1)S or XE 3.5
• Cisco Early Field Trial (EFT):
• ASR9000, CRS1, CRS3 and c12K (IOS-XR 4.3.2)
• Juniper has support since version 12.2
• Quagga has support through BGP-SRX
RPKI Caveats
• When RTR session goes down, the RPKI status will be not found for all the bgp route
after a while
• Invalid => not found
• we need several RTR sessions or care your filtering policy
• In case of the router reload, which one is faster, receiving ROAs or receiving BGP
routes?
• If receiving BGP is match faster than ROA, the router propagate the invalid route to others
• We need to put our Cache validator within our IGP scope
RPKI Further Reading
• RFC 5280: X.509 PKI Certificates
• RFC 3779: Extensions for IP Addresses and ASNs
• RFC 6481-6493: Resource Public Key Infrastructure
RPKI Configuration
Topology for Origin Validation
Cache Server
rpki.df-h.net
AS 132442 AS 58656
103.12.176.0/22
AS 23956
202.4.96.0/19
2404:D900::/32
Create ROA
Setup validator &
check the prefix
1
2
Phase I - Publishing ROA
• Login to your MyAPNIC portal
• Required valid certificate
• Go to Resources > Certification Tab
1
2
*
Phase I - Publishing ROA
1
2
3
Phase I - Publishing ROA
• Show available prefix for which you can create ROA
Phase I - Publishing ROA - IPv4
1. Write your ASN 2. Your IP Block 3. Subnet 4. Click Add
• Create ROA for smaller block.
Phase I - Publishing ROA - IPv6
• ROA for your IPv6 prefix
1. Write your ASN 2. Your IP Block 3. Subnet 4. Click Add
Phase I - Check your ROA
# whois -h whois.bgpmon.net 202.4.96.0/24
Prefix: 202.4.96.0/24
Prefix description: APT (Dhakacom)
Country code: BD
Origin AS: 23956
Origin AS Name: DHAKACOM-BD-AS dhakaCom Limited,BD
RPKI status: ROA validation successful
First seen: 2013-12-23
Last seen: 2014-07-20
Seen by #peers: 203
# whois -h whois.bgpmon.net " --roa 23956 202.4.96.0/24"
0 - Valid
------------------------
ROA Details
------------------------
Origin ASN: AS23956
Not valid Before: 2014-07-20 15:20:10
Not valid After: 2014-12-30 00:00:00 Expires in 161d12h52m42s
Trust Anchor: rpki.apnic.net
Prefixes: 202.4.96.0/19 (max length /24)
2405:7600::/32 (max length /32)
Phase I - Check your ROA
Phase II - RPKI Validator
• Download RPKI Validator
http://www.ripe.net/lir-services/resource-management/certification/tools-and-
resources
Phase II - RPKI Validator
# tar -zxvf rpki-validator-app-2.17-dist.tar.gz
# cd rpki-validator-app-2.17
# ./rpki-validator.sh start
Phase II - RPKI Validator
http://ip_address:8080
Phase III - Router Configuration (Juniper)
routing-options {
validation {
group RPKI {
session 103.21.75.10 {
refresh-time 120;
hold-time 180;
port 8282;
local-address 103.12.75.1;
}
}
}
}
1. Establish session with
RPKI Validator
Phase III - Router Configuration (Juniper)
policy-options {
policy-statement route-validation {
term valid {
from {
protocol bgp;
validation-database valid;
}
then {
validation-state valid;
accept;
}
}
}
}
2. Configure policy to tag
valid ROA
Phase III - Router Configuration (Juniper)
protocols {
bgp {
log-updown;
import route-validation;
group EBGP {
type external;
|
| other cofigurations
|
}
}
}
3. Push policy to the BGP
neighbor
Check your prefix
fakrul@rpki-test> show route protocol bgp 202.4.96.0/24
inet.0: 506658 destinations, 506659 routes (506656 active, 0 holddown, 2
hidden)
+ = Active Route, - = Last Active, * = Both
202.4.96.0/24 *[BGP/170] 01:42:11, localpref 100
AS path: 58656 23956 I, validation-state: valid
> to 103.12.177.221 via ge-1/0/9.0
Command
#show validation session
fakrul@rpki-test> show validation session
Session State Flaps Uptime #IPv4/IPv6 records
103.21.75.10 Up 0 1d 09:33:54 9728/1431
Command
#show validation statistics
fakrul@rpki-test> Total RV records: 13529
Total Replication RV records: 13529
Prefix entries: 13050
Origin-AS entries: 13529
Memory utilization: 2626782 bytes
Policy origin-validation requests: 0
Valid: 0
Invalid: 0
Unknown: 0
BGP import policy reevaluation notifications: 37818
inet.0, 37818
inet6.0, 0
Command
#show validation database
fakrul@rpki-test> show validation database
RV database for instance master
Prefix Origin-AS Session State Mismatch
2.0.0.0/12-16 3215 202.4.96.100 valid
2.0.0.0/16-16 3215 202.4.96.100 valid
2.1.0.0/16-16 3215 202.4.96.100 valid
2.2.0.0/16-16 3215 202.4.96.100 valid
2.3.0.0/16-16 3215 202.4.96.100 valid
2.4.0.0/16-16 3215 202.4.96.100 valid
2.5.0.0/16-16 3215 202.4.96.100 valid
2.6.0.0/16-16 3215 202.4.96.100 valid
Command
#show route protocol bgp validation-state valid
fakrul@rpki-test> show route protocol bgp validation-state valid
inet.0: 506561 destinations, 506562 routes (506559 active, 0 holddown, 2 hidden)
+ = Active Route, - = Last Active, * = Both
2.0.0.0/16 *[BGP/170] 1d 10:26:39, localpref 100
AS path: 58656 6453 5511 3215 I, validation-state: valid
> to 103.12.177.221 via ge-1/0/9.0
2.1.0.0/16 *[BGP/170] 1d 10:26:39, localpref 100
AS path: 58656 6453 5511 3215 I, validation-state: valid
!Caution!
• Make sure that your router IOS is bug free for RPKI; other wise….
Check your prefix
Cisco (hosted by the RIPE NCC)
Public Cisco router: rpki-rtr.ripe.net
Telnet username: ripe / No password
Juniper (hosted by Kaia Global Networks)
Public Juniper routers: 193.34.50.25, 193.34.50.26
Telnet username: rpki / Password: testbed
source : http://www.ripe.net/lir-services/resource-management/certification/tools-and-resources
Configuration - Reference Link
Cisco
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/command/irg-cr-
book/bgp-m1.html#wp3677719851
Juniper
http://www.juniper.net/techpubs/en_US/junos12.2/topics/topic-map/bgp-origin-
as-validation.html
http://www.apnic.net/roa
RPKI Demo

Contenu connexe

Tendances

Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorialkriz5
 
Segment Routing
Segment RoutingSegment Routing
Segment RoutingAPNIC
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architectureSagarR24
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)KHNOG
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routingWilfredzeng
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
 
Cisco Catalyst 6500 Technical Deep Dive.pdf
Cisco Catalyst 6500 Technical Deep Dive.pdfCisco Catalyst 6500 Technical Deep Dive.pdf
Cisco Catalyst 6500 Technical Deep Dive.pdfjuergenJaeckel
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology EssentialsHussien Mahmoud
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basicsMustafa Golam
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksAPNIC
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1Febrian ‎
 
a brief overview on link aggregation ieee 802.3ad
a brief overview on link aggregation ieee 802.3ada brief overview on link aggregation ieee 802.3ad
a brief overview on link aggregation ieee 802.3adtanay_7even
 
06 evpn use-case_reviewv1
06 evpn use-case_reviewv106 evpn use-case_reviewv1
06 evpn use-case_reviewv1ronsito
 

Tendances (20)

Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 
MPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) TechnologyMPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) Technology
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architecture
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
Cisco Catalyst 6500 Technical Deep Dive.pdf
Cisco Catalyst 6500 Technical Deep Dive.pdfCisco Catalyst 6500 Technical Deep Dive.pdf
Cisco Catalyst 6500 Technical Deep Dive.pdf
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building Blocks
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1
 
a brief overview on link aggregation ieee 802.3ad
a brief overview on link aggregation ieee 802.3ada brief overview on link aggregation ieee 802.3ad
a brief overview on link aggregation ieee 802.3ad
 
06 evpn use-case_reviewv1
06 evpn use-case_reviewv106 evpn use-case_reviewv1
06 evpn use-case_reviewv1
 
MPLS
MPLSMPLS
MPLS
 
01 introduction to mpls
01 introduction to mpls 01 introduction to mpls
01 introduction to mpls
 
Lte Tutorial
Lte TutorialLte Tutorial
Lte Tutorial
 
Sigtran Workshop
Sigtran WorkshopSigtran Workshop
Sigtran Workshop
 

En vedette

বাংলায় নেটওয়ার্কিং স্বাদ!
বাংলায় নেটওয়ার্কিং স্বাদ!বাংলায় নেটওয়ার্কিং স্বাদ!
বাংলায় নেটওয়ার্কিং স্বাদ!Bangladesh Network Operators Group
 
The art of copying
The art of copyingThe art of copying
The art of copyingRafael_fiori
 
Presentation on Learning Opportunities for the Persons with Disabilities
Presentation on Learning Opportunities for the Persons with Disabilities Presentation on Learning Opportunities for the Persons with Disabilities
Presentation on Learning Opportunities for the Persons with Disabilities Bangladesh Network Operators Group
 
Buena presentación
Buena presentaciónBuena presentación
Buena presentaciónluisciruko
 
sophie vermaes m1a
sophie vermaes m1asophie vermaes m1a
sophie vermaes m1a120007308
 
Larissa Franz-Koivisto: Maahanmuuttajataustaisen vammaisen lapsen ja hänen pe...
Larissa Franz-Koivisto: Maahanmuuttajataustaisen vammaisen lapsen ja hänen pe...Larissa Franz-Koivisto: Maahanmuuttajataustaisen vammaisen lapsen ja hänen pe...
Larissa Franz-Koivisto: Maahanmuuttajataustaisen vammaisen lapsen ja hänen pe...Lastensuojelun Keskusliitto
 
Speaker Installation is essential for success at Houston
Speaker Installation is essential for success at HoustonSpeaker Installation is essential for success at Houston
Speaker Installation is essential for success at HoustonDynamiq A/V Integration
 

En vedette (20)

Sync'ed Clients and Traffic Trends
Sync'ed Clients and Traffic Trends Sync'ed Clients and Traffic Trends
Sync'ed Clients and Traffic Trends
 
Securing Asterisk: A practical approach
Securing Asterisk: A practical approachSecuring Asterisk: A practical approach
Securing Asterisk: A practical approach
 
bdNOG Conference Report
bdNOG Conference Report bdNOG Conference Report
bdNOG Conference Report
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh RPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
OpenStack Cloud Administration Through Live Demonstration
OpenStack Cloud Administration Through Live DemonstrationOpenStack Cloud Administration Through Live Demonstration
OpenStack Cloud Administration Through Live Demonstration
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
বাংলায় নেটওয়ার্কিং স্বাদ!
বাংলায় নেটওয়ার্কিং স্বাদ!বাংলায় নেটওয়ার্কিং স্বাদ!
বাংলায় নেটওয়ার্কিং স্বাদ!
 
Onboard Automation with EEM
Onboard Automation with EEM Onboard Automation with EEM
Onboard Automation with EEM
 
Misused top ASNs
Misused top ASNsMisused top ASNs
Misused top ASNs
 
Community Tools to Fight Against DDoS
Community Tools to Fight Against DDoS Community Tools to Fight Against DDoS
Community Tools to Fight Against DDoS
 
IP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple CalculationIP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple Calculation
 
Ceska_zbroj_05
Ceska_zbroj_05Ceska_zbroj_05
Ceska_zbroj_05
 
The art of copying
The art of copyingThe art of copying
The art of copying
 
Presentation on Learning Opportunities for the Persons with Disabilities
Presentation on Learning Opportunities for the Persons with Disabilities Presentation on Learning Opportunities for the Persons with Disabilities
Presentation on Learning Opportunities for the Persons with Disabilities
 
Buena presentación
Buena presentaciónBuena presentación
Buena presentación
 
ccTLD Infrastructure & IDN Operation
ccTLD Infrastructure & IDN OperationccTLD Infrastructure & IDN Operation
ccTLD Infrastructure & IDN Operation
 
RESUME_Ashish Dhuliya
RESUME_Ashish DhuliyaRESUME_Ashish Dhuliya
RESUME_Ashish Dhuliya
 
sophie vermaes m1a
sophie vermaes m1asophie vermaes m1a
sophie vermaes m1a
 
Larissa Franz-Koivisto: Maahanmuuttajataustaisen vammaisen lapsen ja hänen pe...
Larissa Franz-Koivisto: Maahanmuuttajataustaisen vammaisen lapsen ja hänen pe...Larissa Franz-Koivisto: Maahanmuuttajataustaisen vammaisen lapsen ja hänen pe...
Larissa Franz-Koivisto: Maahanmuuttajataustaisen vammaisen lapsen ja hänen pe...
 
Speaker Installation is essential for success at Houston
Speaker Installation is essential for success at HoustonSpeaker Installation is essential for success at Houston
Speaker Installation is essential for success at Houston
 

Similaire à RPKI Tutorial

RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)Fakrul Alam
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoMyNOG
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshFakrul Alam
 
IDNOG 6: RQC and RPKI
IDNOG 6: RQC and RPKIIDNOG 6: RQC and RPKI
IDNOG 6: RQC and RPKIAPNIC
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...APNIC
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)NaveenLakshman
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itAPNIC
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKIAPNIC
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
 
RPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsAPNIC
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationAPNIC
 
Certification
CertificationCertification
CertificationRIPE NCC
 
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfRIPE NCC
 
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI MattersAPNIC
 
MyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry ServicesMyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry ServicesAPNIC
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesMyNOG
 
Resource Certification
Resource CertificationResource Certification
Resource CertificationRIPE NCC
 

Similaire à RPKI Tutorial (20)

RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
IDNOG 6: RQC and RPKI
IDNOG 6: RQC and RPKIIDNOG 6: RQC and RPKI
IDNOG 6: RQC and RPKI
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying it
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
 
RPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and Operations
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
 
Certification
CertificationCertification
Certification
 
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
 
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
 
MyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry ServicesMyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry Services
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry Services
 
RPKI
RPKIRPKI
RPKI
 
Resource Certification
Resource CertificationResource Certification
Resource Certification
 

Plus de Bangladesh Network Operators Group

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephBangladesh Network Operators Group
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceBangladesh Network Operators Group
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaBangladesh Network Operators Group
 

Plus de Bangladesh Network Operators Group (20)

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
 
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptxBdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
 
RPKI ROA updates
RPKI ROA updatesRPKI ROA updates
RPKI ROA updates
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 

Dernier

Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 

Dernier (20)

Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 

RPKI Tutorial

  • 2. Target Audience • Knowledge of Internet Routing(specially BGP) • Familiar with any IRR Database • No need to know Cryptography • Basic knowledge of PKI(Public Key Infrastructure)
  • 3. Agenda • BGP / RPKI • Configuration • Hands-on Lab (Juniper)
  • 4. BGP
  • 5. BGP (AS) Send a packet to 2001:DB8::1 I have 2001:DB8::/32
  • 6. AS Path AS 100 AS 300AS 200 Send a packet to 2001:DB8::1 I have 2001:DB8::/32 2001:DB8::/32 100 200 300 i
  • 7. AS Path AS 100 AS 300 Send a packet to 2001:DB8::1 I have 2001:DB8::/32 I have 2001:DB8::/48 AS 420 AS 200 2001:DB8::/32 100 200 300 i 2001:DB8::/48 100 200 420 i
  • 8. Historical Incident • April 1997: The "AS 7007 incident" UU/Sprint for 2 days • February 24, 2008: Pakistan's attempt to block YouTube access within their country takes down YouTube entirely.[6] • November 11, 2008: The Brazilian ISP CTBC - Companhia de Telecomunicações do Brasil Central leaked their internal table into the global BGP table. • April 8, 2010: China Telecom originated 37,000 prefixes not belonging to them in 15 minutes, causing massive outage of services globally. source : http://en.wikipedia.org/wiki/IP_hijacking
  • 9. Historical Incident • For theory of positivity lets call all these as Mis-Origination • Traffic Hijacking or Prefix Hijacking assumes Negative intent
  • 10. Current Trend • Filtering limited to the edges facing the customer • Filters on peering and transit sessions are often too complex or take too many resources • Check prefix before announcing it
  • 11. Filter Where? • Secure BGP Templates • http://www.cymru.com/gillsr/ documents/junos-bgp- template.htm • https://www.team-cymru.org/ ReadingRoom/Templates/ secure-bgp-template.html
  • 12. Internet Registry (IR) • Maintains Internet Resources such as IP addresses and ASNs, and publish the registration information • Allocations for Local Internet Registries • Assignments for end-users • APNIC is the Regional Internet Registry(RIR) in the Asia Pacific region • National Internet Registry(NIR) exists in several economies
  • 13. The Eco-System National IR (NIR) Internet Service Provider End User Regional IR (RIR)
  • 14. Internet Routing Registry • Maintains routing policy database • RADB is the most popular service, though some RIRs also provide similar services • Routing policy information is expressed in a series of objects • On RADB, a registered user can register any object • route and route6 objects are used to indicate route origination • Prefix and origin AS
  • 15. Still not enough IRR is useful, but it’s not perfect
  • 16. RPKI Resource Pubic Key Infrastructure IP Address & AS Numbers Digital Certificate
  • 17. RPKI Deployment AS 100 AS 300AS 200 Phase 2 Path Validation Send a packet to 2001:DB8::1 I have 2001:DB8::/32 Phase 1 Origin Validation
  • 18. Goals of RPKI • Able to authoritatively prove who owns an IP Prefix and what AS(s) may Announce It • Reducing routing leaks • Attaching digital certificates to network resources (AS Number & IP Address) • Prefix Ownership Follows the Allocation Hierarchy IANA, RIRs, ISPs, …
  • 19. RPKI Implementation • Two RPKI implementation type • Delegated: Each participating node becomes a CA and runs their own RPKI repository, delegated by the parent CA. • Hosted: The RIR runs the CA functionality for interested participants.
  • 20. RPKI Origin Validation AS 100 AS 300 I have 2001:DB8::/48 AS 420 AS 200 Send a packet to 2001:DB8::1 I have 2001:DB8::/32 Only AS300 2001:DB8::/32 100 200 300 i 2001:DB8::/48 100 200 420 i Valid Invalid
  • 21. RPKI Building Blocks • Trust Anchors (RIR’s) • Route Origination Authorizations (ROA) • Validators
  • 22. Let’s discuss these building blocks in details
  • 23. PKI & Trust Anchors
  • 24. Public Key Concept • Private key: This key must be known only by its owner. • Public key: This key is known to everyone (it is public) • Relation between both keys: What one key encrypts, the other one decrypts, and vice versa. That means that if you encrypt something with my public key (which you would know, because it's public :-), I would need my private key to decrypt the message. • Same alike http with SSL aka https
  • 25. X.509 Certificates 3779 EXT X.509 Cert RFC 3779 Extension Describes IP Resources (Addr & ASN) SIA – URI for where this Publishes Owner’s Public Key Signed by Parent’s Private Key CA Certificates are X.509 certificates that conform to the PKIX profile [PKIX]. They also contain an extension field that lists a collection of IP resources (IPv4 addresses, IPv6 addresses and AS Numbers) [RFC3779]
  • 26. Trust Anchor Cert / APNIC 2001:DB8::/32 Public Key CA Cert / bdHUB 2001:DB8::/48 Public Key CA Cert / dhakaCom 2001:DB8:1::/48 Public Key CA Cert / IBBL 2001:DB8:2::/48 Public Key CA Cert / USER 2001:DB8:1::/56 Public Key CA The hierarchy of the RPKI is based on the administrative resource allocation hierarchy, where resources are distributed from the IANA to the RIRs, to Local Internet Registries (LIRs) and end users. Certificate Path Certificate Path Certificate Path Certificate Path
  • 27. Trust Anchor Locator (TALs) • In cryptographic systems with hierarchical structure, a Trust anchor is an authoritative entity for which trust is assumed and not derived. • In X.509 architecture, a root certificate would be the trust anchor from which whole chain of trust is derived. The trust anchor must be in possession of the trusting party beforehand to make any further certificate path validation possible. • RPKI uses Internet Assigned Numbers Authority(IANA) as the trust anchor, and Regional Internet Registries(RIR) as immediately subordinate nodes to that anchor.
  • 28. PKI in IRR • The RIRs hold a self-signed root certificate for all the resources that they have in the registry • They are the trust anchor for the system • That root certificate is used to sign a certificate that lists your resources • You can issue child certificates for those resources to your customers • When making assignments or sub allocations
  • 30. Route Origination Authorizations (ROA) • Next to the prefix and the ASN which is allowed to announce it, the ROA contains: • A minimum prefix length • A maximum prefix length • An expiry date • Origin ASN • Multiple ROAs can exist for the same prefix • ROAs can overlap
  • 32. Origin Validation • Router gets ROA information from the RPKI Cache • RPKI verification is done by the RPKI Cache • The BGP process will check each announcement with the ROA information and label the prefix Validated RPKI Cache RPKI to RTR protocol
  • 33. Result of Check • Valid – Indicates that the prefix and AS pair are found in the database. • Invalid – Indicates that the prefix is found, but either the corresponding AS received from the EBGP peer is not the AS that appears in the database, or the prefix length in the BGP update message is longer than the maximum length permitted in the database. • Not Found / Unknown– Indicates that the prefix is not among the prefixes or prefix ranges in the database. Valid > Unknown > Invalid
  • 34. ROA Example 65420 Prefix: 10.0.0.0/16 ASN: 65420 ROA 10.0.0.0/16 Origin AS Prefix /18 Max Length VALID VALID INVALID INVALID UNKNOWN 10.0.0.0/16AS65420 10.0.128.0/17AS65420 10.0.0.0/16AS65421 10.0.10.0/24AS65420 10.0.0.0/8AS65430
  • 35. Local Policy • You can define your policy based on the outcomes • Do nothing • Just logging • Label BGP communities • Modify preference values • Rejecting the announcement
  • 36. RPKI Support in Routers • The RPKI-RTR Protocol is an IETF Internet Draft • Production Cisco Support: • ASR1000, 7600, ASR903 and ASR901 in releases 15.2(1)S or XE 3.5 • Cisco Early Field Trial (EFT): • ASR9000, CRS1, CRS3 and c12K (IOS-XR 4.3.2) • Juniper has support since version 12.2 • Quagga has support through BGP-SRX
  • 37. RPKI Caveats • When RTR session goes down, the RPKI status will be not found for all the bgp route after a while • Invalid => not found • we need several RTR sessions or care your filtering policy • In case of the router reload, which one is faster, receiving ROAs or receiving BGP routes? • If receiving BGP is match faster than ROA, the router propagate the invalid route to others • We need to put our Cache validator within our IGP scope
  • 38. RPKI Further Reading • RFC 5280: X.509 PKI Certificates • RFC 3779: Extensions for IP Addresses and ASNs • RFC 6481-6493: Resource Public Key Infrastructure
  • 40. Topology for Origin Validation Cache Server rpki.df-h.net AS 132442 AS 58656 103.12.176.0/22 AS 23956 202.4.96.0/19 2404:D900::/32 Create ROA Setup validator & check the prefix 1 2
  • 41. Phase I - Publishing ROA • Login to your MyAPNIC portal • Required valid certificate • Go to Resources > Certification Tab 1 2 *
  • 42. Phase I - Publishing ROA 1 2 3
  • 43. Phase I - Publishing ROA • Show available prefix for which you can create ROA
  • 44. Phase I - Publishing ROA - IPv4 1. Write your ASN 2. Your IP Block 3. Subnet 4. Click Add • Create ROA for smaller block.
  • 45. Phase I - Publishing ROA - IPv6 • ROA for your IPv6 prefix 1. Write your ASN 2. Your IP Block 3. Subnet 4. Click Add
  • 46. Phase I - Check your ROA # whois -h whois.bgpmon.net 202.4.96.0/24 Prefix: 202.4.96.0/24 Prefix description: APT (Dhakacom) Country code: BD Origin AS: 23956 Origin AS Name: DHAKACOM-BD-AS dhakaCom Limited,BD RPKI status: ROA validation successful First seen: 2013-12-23 Last seen: 2014-07-20 Seen by #peers: 203
  • 47. # whois -h whois.bgpmon.net " --roa 23956 202.4.96.0/24" 0 - Valid ------------------------ ROA Details ------------------------ Origin ASN: AS23956 Not valid Before: 2014-07-20 15:20:10 Not valid After: 2014-12-30 00:00:00 Expires in 161d12h52m42s Trust Anchor: rpki.apnic.net Prefixes: 202.4.96.0/19 (max length /24) 2405:7600::/32 (max length /32) Phase I - Check your ROA
  • 48. Phase II - RPKI Validator • Download RPKI Validator http://www.ripe.net/lir-services/resource-management/certification/tools-and- resources
  • 49. Phase II - RPKI Validator # tar -zxvf rpki-validator-app-2.17-dist.tar.gz # cd rpki-validator-app-2.17 # ./rpki-validator.sh start
  • 50. Phase II - RPKI Validator http://ip_address:8080
  • 51. Phase III - Router Configuration (Juniper) routing-options { validation { group RPKI { session 103.21.75.10 { refresh-time 120; hold-time 180; port 8282; local-address 103.12.75.1; } } } } 1. Establish session with RPKI Validator
  • 52. Phase III - Router Configuration (Juniper) policy-options { policy-statement route-validation { term valid { from { protocol bgp; validation-database valid; } then { validation-state valid; accept; } } } } 2. Configure policy to tag valid ROA
  • 53. Phase III - Router Configuration (Juniper) protocols { bgp { log-updown; import route-validation; group EBGP { type external; | | other cofigurations | } } } 3. Push policy to the BGP neighbor
  • 54. Check your prefix fakrul@rpki-test> show route protocol bgp 202.4.96.0/24 inet.0: 506658 destinations, 506659 routes (506656 active, 0 holddown, 2 hidden) + = Active Route, - = Last Active, * = Both 202.4.96.0/24 *[BGP/170] 01:42:11, localpref 100 AS path: 58656 23956 I, validation-state: valid > to 103.12.177.221 via ge-1/0/9.0
  • 55. Command #show validation session fakrul@rpki-test> show validation session Session State Flaps Uptime #IPv4/IPv6 records 103.21.75.10 Up 0 1d 09:33:54 9728/1431
  • 56. Command #show validation statistics fakrul@rpki-test> Total RV records: 13529 Total Replication RV records: 13529 Prefix entries: 13050 Origin-AS entries: 13529 Memory utilization: 2626782 bytes Policy origin-validation requests: 0 Valid: 0 Invalid: 0 Unknown: 0 BGP import policy reevaluation notifications: 37818 inet.0, 37818 inet6.0, 0
  • 57. Command #show validation database fakrul@rpki-test> show validation database RV database for instance master Prefix Origin-AS Session State Mismatch 2.0.0.0/12-16 3215 202.4.96.100 valid 2.0.0.0/16-16 3215 202.4.96.100 valid 2.1.0.0/16-16 3215 202.4.96.100 valid 2.2.0.0/16-16 3215 202.4.96.100 valid 2.3.0.0/16-16 3215 202.4.96.100 valid 2.4.0.0/16-16 3215 202.4.96.100 valid 2.5.0.0/16-16 3215 202.4.96.100 valid 2.6.0.0/16-16 3215 202.4.96.100 valid
  • 58. Command #show route protocol bgp validation-state valid fakrul@rpki-test> show route protocol bgp validation-state valid inet.0: 506561 destinations, 506562 routes (506559 active, 0 holddown, 2 hidden) + = Active Route, - = Last Active, * = Both 2.0.0.0/16 *[BGP/170] 1d 10:26:39, localpref 100 AS path: 58656 6453 5511 3215 I, validation-state: valid > to 103.12.177.221 via ge-1/0/9.0 2.1.0.0/16 *[BGP/170] 1d 10:26:39, localpref 100 AS path: 58656 6453 5511 3215 I, validation-state: valid
  • 59. !Caution! • Make sure that your router IOS is bug free for RPKI; other wise….
  • 60. Check your prefix Cisco (hosted by the RIPE NCC) Public Cisco router: rpki-rtr.ripe.net Telnet username: ripe / No password Juniper (hosted by Kaia Global Networks) Public Juniper routers: 193.34.50.25, 193.34.50.26 Telnet username: rpki / Password: testbed source : http://www.ripe.net/lir-services/resource-management/certification/tools-and-resources
  • 61. Configuration - Reference Link Cisco http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/command/irg-cr- book/bgp-m1.html#wp3677719851 Juniper http://www.juniper.net/techpubs/en_US/junos12.2/topics/topic-map/bgp-origin- as-validation.html