SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
RPKI with rpki.net ToolS
bdNOG 1
22nd May 20143, Dhaka, Bangladesh
Muhammad Moinur Rahman, bdNOG
SANOG 23 : Thiphu, BhutanbdNOG Page 2
RPKI: Introduction
Tutorial
Target audience
- Knowledge of Internet Routing(specially BGP)
- Familiar with any IRR Database
- No need to know Cryptography
- Basic knowledge of PKI(Public Key Infrastructure)
Layout
- Theory
- Handson Lab using rpki.net tools on Cisco IOS, Cisco IOS-XR and
Juniper
SANOG 23 : Thiphu, BhutanbdNOG Page 3
Historical Incident
November, 2012 – Google traffic affected in AP region
due to hardware failure of Moratel
Pakistan Telecom and Youtube incident
7007 accident, UU/Sprint for 2 days
SANOG 23 : Thiphu, BhutanbdNOG Page 4
Historical Incident (Thinks to Consider)
For theory of positivity lets call all these as Mis-
Origination
Traffic Hijacking or Prefix Hijacking assumes Negative
intent
SANOG 23 : Thiphu, BhutanbdNOG Page 5
Historical Context
1986 – Bellovin & Perlman identify the vulnerability in
DNS and Routing
1999 - National Academies study called it out
2000 – S-BGP – X.509 PKI to support Secure BGP -
Kent, Lynn, et al.
2003 – NANOG S-BGP Workshop
2006 – RPKI.NET(for ARIN) & APNIC start work on
RPKI. RIPE starts in 2008.
2009 – RPKI.NET Open Testbed and running code in
test routers
SANOG 23 : Thiphu, BhutanbdNOG Page 6
Current Trend
Filtering limited to the edges facing the customer
Filters on peering and transit sessions are often too
complex or take too many resources
- Do you filter?
A lot depends on trusting each other
- Daily examples show this is no longer enough
SANOG 23 : Thiphu, BhutanbdNOG Page 7
When filtering is not enough ..
A lot of different registries exist(Nearly 40), operated by
a number of different parties:
- Not all of them mirror the other registries
- How trust worthy is the information they provide?
The IRR system is far from complete (RPSL lives with
RPSLNG) but no further development.
Resulting filters are hard to maintain and can take a lot
of router memory
SANOG 23 : Thiphu, BhutanbdNOG Page 8
Goals of RPKI
Running a Secured Internet for the end users
Reducing routing leaks
Attaching digital certificates to network resources
- AS Numbers
- IP Addresses
Allowing ISPs to associate the two
- Route Origin Authorizations (ROAs)
- Can follow the address allocation chain to the top
SANOG 23 : Thiphu, BhutanbdNOG Page 9
RPKI Accomplishes
Allows routers or other processes to validate route
origins
Simplifies validation authority information
- Trust Anchor Locator
Distributes trusted information
- Through repositories
SANOG 23 : Thiphu, BhutanbdNOG Page 10
Public Key Concept
Private key: This key must be known only by its owner.
Public key: This key is known to everyone (it is public)
Relation between both keys: What one key encrypts,
the other one decrypts, and vice versa. That means that
if you encrypt something with my public key (which you
would know, because it's public :-), I would need my
private key to decrypt the message.
Same alike http with SSL aka https
SANOG 23 : Thiphu, BhutanbdNOG Page 11
PKI in IRR
The RIRs hold a self-signed root certificate for all the
resources that they have in the registry
- They are the trust anchor for the system
That root certificate is used to sign a certificate that lists
your resources
You can issue child certificates for those resources to
your customers
- When making assignments or sub allocations
SANOG 23 : Thiphu, BhutanbdNOG Page 12
Route Origination Authorisation (ROA)
Next to the prefix and the ASN which is allowed to
announce it, the ROA contains:
- A minimum prefix length
- A maximum prefix length
- An expiry date
Multiple ROAs can exist for the same prefix
ROAs can overlap
SANOG 23 : Thiphu, BhutanbdNOG Page 13
RPKI Protocols
Certificate Authority
Relying Party/Origin Validation
SANOG 23 : Thiphu, BhutanbdNOG Page 14
Result of Check
Valid – A matching/covering ROA was found with a
matching AS number
Invalid – A matching or covering ROA was found, but
AS number did not match, and there was no valid one
Not Found – No matching or covering ROA was found
SANOG 23 : Thiphu, BhutanbdNOG Page 15
Policy Override Knobs
Disable Validity Check Completely
Disable Validity Check for a Peer
Disable Validity Check for Prefixes
When check is disabled, the result is “Not Found,” i.e.
as if there was no ROA
SANOG 23 : Thiphu, BhutanbdNOG Page 16
How to run CA?
 Open Source Software to run a member CA
- Use the LIR as parent CA (trust anchor)
- Generate and publish Certificate yourself
 LIR Hosted Platform
- All processes are secured and automated
- One click set-up of Resource Certificate
- WebUI to manage Certificates in LIR Portal
- All the major LIR do have RPKI/Resouce Certification configuration options in
their portal
SANOG 23 : Thiphu, BhutanbdNOG Page 17
How to run RP?
 Rpki.net tools (Both CA and RP)
 RIPE/NCC (Both CA and RP)
 RTRLIB (RP Only)
 APNIC (CA Only)
SANOG 23 : Thiphu, BhutanbdNOG Page 18
Validation in Practice
All certificates and ROAs are published in a repository
and available for download
Software running on your own machine will periodically
retrieve and verify the information
- Cryptographic tools check all the signatures
The result is a list of all valid combinations of ASN and
prefix, the “validated cache”
SANOG 23 : Thiphu, BhutanbdNOG Page 19
RPKI Support in Routers
The RPKI-RTR Protocol is an IETF Internet Draft
Production Cisco Support:
- ASR1000, 7600, ASR903 and ASR901 in releases 15.2(1)S or XE 3.5
- Cisco Early Field Trial (EFT):
- ASR9000, CRS1, CRS3 and c12K (IOS-XR 4.3.2)
Juniper has support since version 12.2
Quagga has support through BGP-SRX
SANOG 23 : Thiphu, BhutanbdNOG Page 20
RPKI-Router Integration
Local Validator Tool (RP) feeds RPKI capable router
with processed data set
- Router does not do the crypto!
SANOG 23 : Thiphu, BhutanbdNOG Page 21
RPKI Workflow
Creates a repository
- RFC 3779 (RPKI) Certificates
- ROAs
- CRLs
- Manifest records
SANOG 23 : Thiphu, BhutanbdNOG Page 22
RTR Workflow
Storing ROA cache using RTR protocol which can
be downloaded from the validator and kept
available in memory
Validate with ROA cache data inside the router
where BGP process will check each announcement
and label the prefix
Propagate RPKI validation result with iBGP for
other router (Sending/Receiving BGP Extended
Community must be enabled) to make a decision
(Modify pref or filter) based on it
SANOG 23 : Thiphu, BhutanbdNOG Page 23
Who is deciding what to do?
The Validator is a tool which can help you making
decisions about routing
Using it properly can enhance the security and
stability of the Internet
It is your network and you make the final decision
SANOG 23 : Thiphu, BhutanbdNOG Page 24
Repository View
root@rpki# ls /ba/03a5be-ddf6-4340-a1f9-1ad3f2c39ee6/1:
ICcaIRKhGHJ-TgUZv8GRKqkidR4.roa
cKxLCU94umS-qD4DOOkAK0M2US0.cer
dSmerM6uJGLWMMQTl2esy4xyUAA.crl
dSmerM6uJGLWMMQTl2esy4xyUAA.mnf
nB0gDFtWffKk4VWgln-12pdFtE8.roa
 A Repository Directory containing an RFC3779
Certificate, two ROAs, a CRL, and a manifest
SANOG 23 : Thiphu, BhutanbdNOG Page 25
Using a Repository
Pull down these files using a manifest-validating
mechanism
Validate the ROAs contained in the repository
Communicate with the router marking routes “valid”,
“invalid”, “unknown”
Up to ISP to use local policy on how to route
SANOG 23 : Thiphu, BhutanbdNOG Page 26
RPKI Workflow
 RPKI Web interface -> Repository
 Repository aggregator -> Validator
 Validated entries -> Route Checking
 Route checking results -> local routing decisions (based on
local policy)
SANOG 23 : Thiphu, BhutanbdNOG Page 27
RPKI Caveats
 When RTR session goes down, the RPKI status will be not
found for all the bgp route after a while
- Invalid => not found
- we need several RTR sessions or care your filtering policy
 In case of the router reload, which one is faster, receiving
ROAs or receiving BGP routes?
- If receiving BGP is match faster than ROA, the router propagate the invalid
route to others
- We need to put our Cache validator within our IGP scope
SANOG 23 : Thiphu, BhutanbdNOG Page 28
Who do we trust?
Can we trust the *IR for hosting our Private Keys?
SANOG 23 : Thiphu, BhutanbdNOG Page 29
RPKI: Further Reading
 RFC 5280: X.509 PKI Certificates
 RFC 3779: Extensions for IP Addresses and ASNs
 RFC 6481-6493: Resource Public Key Infrastructure
SANOG 23 : Thiphu, BhutanbdNOG Page 30
Demo: Two Parts
 Creating ROAs in LIR Portal
 Validating and Configuring routers to make a decision for a
prefix
 BEFORE THAT LET’s GO FOR A TEA BREAK ..
SANOG 23 : Thiphu, BhutanbdNOG Page 31
IRR Toolset, RPSL: Questions
Contact
person: Muhammad Moinur Rahman
address: The Alliance Building. (6th Floor),
address: 63 Pragati Sharani, Baridhara,
country: BD
phone: +8801977881132
e-mail: moin@1asia-ahl.com
nic-hdl: MMR13-AP
notify: moin@1asia-ahl.com
mnt-by: MAINT-BD-1ASIAAHL
changed: moin@1asia-ahl.com 20121128
source: APNIC

Contenu connexe

Tendances

TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
EC-Council
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
Christian Silva Espinoza
 

Tendances (20)

Route Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsRoute Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for Operators
 
Community tools to fight against DDoS
Community tools to fight against DDoSCommunity tools to fight against DDoS
Community tools to fight against DDoS
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure Connections
 
AFRINIC Presentation - Resource certification by Amreesh Phokeer
AFRINIC Presentation - Resource certification by Amreesh PhokeerAFRINIC Presentation - Resource certification by Amreesh Phokeer
AFRINIC Presentation - Resource certification by Amreesh Phokeer
 
31, Get more from your IPv4 resources
31, Get more from your IPv4 resources31, Get more from your IPv4 resources
31, Get more from your IPv4 resources
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Resource Certification
Resource CertificationResource Certification
Resource Certification
 
Routing Security Considerations
Routing Security ConsiderationsRouting Security Considerations
Routing Security Considerations
 
RPKI Certification Tutorial
RPKI Certification TutorialRPKI Certification Tutorial
RPKI Certification Tutorial
 
Secure BGP and Operational Report of Bangladesh
Secure BGP and Operational Report of BangladeshSecure BGP and Operational Report of Bangladesh
Secure BGP and Operational Report of Bangladesh
 
How to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco Routers
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs
 
DDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and Techniques
 
MUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration AnalystMUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration Analyst
 
Proof of Transit: Securely Verifying a Path or Service Chain
Proof of Transit: Securely Verifying a Path or Service ChainProof of Transit: Securely Verifying a Path or Service Chain
Proof of Transit: Securely Verifying a Path or Service Chain
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
 
MUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case StudyMUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case Study
 
PhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the PhilippinesPhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the Philippines
 
I Pv6 Enabling Menog 0.4
I Pv6 Enabling Menog 0.4I Pv6 Enabling Menog 0.4
I Pv6 Enabling Menog 0.4
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
 

En vedette

En vedette (20)

Securing Asterisk: A practical approach
Securing Asterisk: A practical approachSecuring Asterisk: A practical approach
Securing Asterisk: A practical approach
 
APNIC Services Update
APNIC Services Update APNIC Services Update
APNIC Services Update
 
APNIC Policy Update
APNIC Policy Update APNIC Policy Update
APNIC Policy Update
 
Traffic Engineering for CDNs
Traffic Engineering for CDNs Traffic Engineering for CDNs
Traffic Engineering for CDNs
 
Participant Access Control in IP Multicasting
Participant Access Control in IP Multicasting Participant Access Control in IP Multicasting
Participant Access Control in IP Multicasting
 
Shikkhok.com, An ISIF awarded project
Shikkhok.com, An ISIF awarded project Shikkhok.com, An ISIF awarded project
Shikkhok.com, An ISIF awarded project
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
Practical Implementation of BGP Community with Geotags
Practical Implementation of BGP Community with GeotagsPractical Implementation of BGP Community with Geotags
Practical Implementation of BGP Community with Geotags
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh RPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
Monetizing 4G LTE : How we make money out of LTE
Monetizing 4G LTE : How we make money out of LTEMonetizing 4G LTE : How we make money out of LTE
Monetizing 4G LTE : How we make money out of LTE
 
Prefix Filtering BCP
Prefix Filtering BCP Prefix Filtering BCP
Prefix Filtering BCP
 
How Internet is Empowering Women in Bangladesh
How Internet is Empowering Women in Bangladesh How Internet is Empowering Women in Bangladesh
How Internet is Empowering Women in Bangladesh
 
IPv6 Greenfield
IPv6 Greenfield IPv6 Greenfield
IPv6 Greenfield
 
Discovering and Participating at ICANN
Discovering and Participating at ICANNDiscovering and Participating at ICANN
Discovering and Participating at ICANN
 
Good Peering Practices
Good Peering Practices Good Peering Practices
Good Peering Practices
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Launch a Successful LTE Footprints in Bangladesh
Launch a Successful LTE Footprints in BangladeshLaunch a Successful LTE Footprints in Bangladesh
Launch a Successful LTE Footprints in Bangladesh
 
Building REN in BD
Building REN in BD Building REN in BD
Building REN in BD
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
Cloud Computing Using OpenStack
Cloud Computing Using OpenStack Cloud Computing Using OpenStack
Cloud Computing Using OpenStack
 

Similaire à RPKI with rpki.net Tools

Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
MyNOG
 

Similaire à RPKI with rpki.net Tools (20)

Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)
 
Rpki with rpki.net tools
Rpki with rpki.net toolsRpki with rpki.net tools
Rpki with rpki.net tools
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying it
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
LKNOG3-Keynote
LKNOG3-KeynoteLKNOG3-Keynote
LKNOG3-Keynote
 
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
 
RPKI Introduction by Randy Bush
RPKI Introduction by Randy BushRPKI Introduction by Randy Bush
RPKI Introduction by Randy Bush
 
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
 
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. ServinInitial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
 
IDNOG 6: RQC and RPKI
IDNOG 6: RQC and RPKIIDNOG 6: RQC and RPKI
IDNOG 6: RQC and RPKI
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
 
Cloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKICloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKI
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practice
 
BGP
BGPBGP
BGP
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI
 
Securing Routing Protocol BGP
Securing Routing Protocol BGPSecuring Routing Protocol BGP
Securing Routing Protocol BGP
 
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessPacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
 

Plus de Bangladesh Network Operators Group

Plus de Bangladesh Network Operators Group (20)

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
 
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptxBdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
 
RPKI ROA updates
RPKI ROA updatesRPKI ROA updates
RPKI ROA updates
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 

Dernier

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
nilamkumrai
 

Dernier (20)

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 

RPKI with rpki.net Tools

  • 1. RPKI with rpki.net ToolS bdNOG 1 22nd May 20143, Dhaka, Bangladesh Muhammad Moinur Rahman, bdNOG
  • 2. SANOG 23 : Thiphu, BhutanbdNOG Page 2 RPKI: Introduction Tutorial Target audience - Knowledge of Internet Routing(specially BGP) - Familiar with any IRR Database - No need to know Cryptography - Basic knowledge of PKI(Public Key Infrastructure) Layout - Theory - Handson Lab using rpki.net tools on Cisco IOS, Cisco IOS-XR and Juniper
  • 3. SANOG 23 : Thiphu, BhutanbdNOG Page 3 Historical Incident November, 2012 – Google traffic affected in AP region due to hardware failure of Moratel Pakistan Telecom and Youtube incident 7007 accident, UU/Sprint for 2 days
  • 4. SANOG 23 : Thiphu, BhutanbdNOG Page 4 Historical Incident (Thinks to Consider) For theory of positivity lets call all these as Mis- Origination Traffic Hijacking or Prefix Hijacking assumes Negative intent
  • 5. SANOG 23 : Thiphu, BhutanbdNOG Page 5 Historical Context 1986 – Bellovin & Perlman identify the vulnerability in DNS and Routing 1999 - National Academies study called it out 2000 – S-BGP – X.509 PKI to support Secure BGP - Kent, Lynn, et al. 2003 – NANOG S-BGP Workshop 2006 – RPKI.NET(for ARIN) & APNIC start work on RPKI. RIPE starts in 2008. 2009 – RPKI.NET Open Testbed and running code in test routers
  • 6. SANOG 23 : Thiphu, BhutanbdNOG Page 6 Current Trend Filtering limited to the edges facing the customer Filters on peering and transit sessions are often too complex or take too many resources - Do you filter? A lot depends on trusting each other - Daily examples show this is no longer enough
  • 7. SANOG 23 : Thiphu, BhutanbdNOG Page 7 When filtering is not enough .. A lot of different registries exist(Nearly 40), operated by a number of different parties: - Not all of them mirror the other registries - How trust worthy is the information they provide? The IRR system is far from complete (RPSL lives with RPSLNG) but no further development. Resulting filters are hard to maintain and can take a lot of router memory
  • 8. SANOG 23 : Thiphu, BhutanbdNOG Page 8 Goals of RPKI Running a Secured Internet for the end users Reducing routing leaks Attaching digital certificates to network resources - AS Numbers - IP Addresses Allowing ISPs to associate the two - Route Origin Authorizations (ROAs) - Can follow the address allocation chain to the top
  • 9. SANOG 23 : Thiphu, BhutanbdNOG Page 9 RPKI Accomplishes Allows routers or other processes to validate route origins Simplifies validation authority information - Trust Anchor Locator Distributes trusted information - Through repositories
  • 10. SANOG 23 : Thiphu, BhutanbdNOG Page 10 Public Key Concept Private key: This key must be known only by its owner. Public key: This key is known to everyone (it is public) Relation between both keys: What one key encrypts, the other one decrypts, and vice versa. That means that if you encrypt something with my public key (which you would know, because it's public :-), I would need my private key to decrypt the message. Same alike http with SSL aka https
  • 11. SANOG 23 : Thiphu, BhutanbdNOG Page 11 PKI in IRR The RIRs hold a self-signed root certificate for all the resources that they have in the registry - They are the trust anchor for the system That root certificate is used to sign a certificate that lists your resources You can issue child certificates for those resources to your customers - When making assignments or sub allocations
  • 12. SANOG 23 : Thiphu, BhutanbdNOG Page 12 Route Origination Authorisation (ROA) Next to the prefix and the ASN which is allowed to announce it, the ROA contains: - A minimum prefix length - A maximum prefix length - An expiry date Multiple ROAs can exist for the same prefix ROAs can overlap
  • 13. SANOG 23 : Thiphu, BhutanbdNOG Page 13 RPKI Protocols Certificate Authority Relying Party/Origin Validation
  • 14. SANOG 23 : Thiphu, BhutanbdNOG Page 14 Result of Check Valid – A matching/covering ROA was found with a matching AS number Invalid – A matching or covering ROA was found, but AS number did not match, and there was no valid one Not Found – No matching or covering ROA was found
  • 15. SANOG 23 : Thiphu, BhutanbdNOG Page 15 Policy Override Knobs Disable Validity Check Completely Disable Validity Check for a Peer Disable Validity Check for Prefixes When check is disabled, the result is “Not Found,” i.e. as if there was no ROA
  • 16. SANOG 23 : Thiphu, BhutanbdNOG Page 16 How to run CA?  Open Source Software to run a member CA - Use the LIR as parent CA (trust anchor) - Generate and publish Certificate yourself  LIR Hosted Platform - All processes are secured and automated - One click set-up of Resource Certificate - WebUI to manage Certificates in LIR Portal - All the major LIR do have RPKI/Resouce Certification configuration options in their portal
  • 17. SANOG 23 : Thiphu, BhutanbdNOG Page 17 How to run RP?  Rpki.net tools (Both CA and RP)  RIPE/NCC (Both CA and RP)  RTRLIB (RP Only)  APNIC (CA Only)
  • 18. SANOG 23 : Thiphu, BhutanbdNOG Page 18 Validation in Practice All certificates and ROAs are published in a repository and available for download Software running on your own machine will periodically retrieve and verify the information - Cryptographic tools check all the signatures The result is a list of all valid combinations of ASN and prefix, the “validated cache”
  • 19. SANOG 23 : Thiphu, BhutanbdNOG Page 19 RPKI Support in Routers The RPKI-RTR Protocol is an IETF Internet Draft Production Cisco Support: - ASR1000, 7600, ASR903 and ASR901 in releases 15.2(1)S or XE 3.5 - Cisco Early Field Trial (EFT): - ASR9000, CRS1, CRS3 and c12K (IOS-XR 4.3.2) Juniper has support since version 12.2 Quagga has support through BGP-SRX
  • 20. SANOG 23 : Thiphu, BhutanbdNOG Page 20 RPKI-Router Integration Local Validator Tool (RP) feeds RPKI capable router with processed data set - Router does not do the crypto!
  • 21. SANOG 23 : Thiphu, BhutanbdNOG Page 21 RPKI Workflow Creates a repository - RFC 3779 (RPKI) Certificates - ROAs - CRLs - Manifest records
  • 22. SANOG 23 : Thiphu, BhutanbdNOG Page 22 RTR Workflow Storing ROA cache using RTR protocol which can be downloaded from the validator and kept available in memory Validate with ROA cache data inside the router where BGP process will check each announcement and label the prefix Propagate RPKI validation result with iBGP for other router (Sending/Receiving BGP Extended Community must be enabled) to make a decision (Modify pref or filter) based on it
  • 23. SANOG 23 : Thiphu, BhutanbdNOG Page 23 Who is deciding what to do? The Validator is a tool which can help you making decisions about routing Using it properly can enhance the security and stability of the Internet It is your network and you make the final decision
  • 24. SANOG 23 : Thiphu, BhutanbdNOG Page 24 Repository View root@rpki# ls /ba/03a5be-ddf6-4340-a1f9-1ad3f2c39ee6/1: ICcaIRKhGHJ-TgUZv8GRKqkidR4.roa cKxLCU94umS-qD4DOOkAK0M2US0.cer dSmerM6uJGLWMMQTl2esy4xyUAA.crl dSmerM6uJGLWMMQTl2esy4xyUAA.mnf nB0gDFtWffKk4VWgln-12pdFtE8.roa  A Repository Directory containing an RFC3779 Certificate, two ROAs, a CRL, and a manifest
  • 25. SANOG 23 : Thiphu, BhutanbdNOG Page 25 Using a Repository Pull down these files using a manifest-validating mechanism Validate the ROAs contained in the repository Communicate with the router marking routes “valid”, “invalid”, “unknown” Up to ISP to use local policy on how to route
  • 26. SANOG 23 : Thiphu, BhutanbdNOG Page 26 RPKI Workflow  RPKI Web interface -> Repository  Repository aggregator -> Validator  Validated entries -> Route Checking  Route checking results -> local routing decisions (based on local policy)
  • 27. SANOG 23 : Thiphu, BhutanbdNOG Page 27 RPKI Caveats  When RTR session goes down, the RPKI status will be not found for all the bgp route after a while - Invalid => not found - we need several RTR sessions or care your filtering policy  In case of the router reload, which one is faster, receiving ROAs or receiving BGP routes? - If receiving BGP is match faster than ROA, the router propagate the invalid route to others - We need to put our Cache validator within our IGP scope
  • 28. SANOG 23 : Thiphu, BhutanbdNOG Page 28 Who do we trust? Can we trust the *IR for hosting our Private Keys?
  • 29. SANOG 23 : Thiphu, BhutanbdNOG Page 29 RPKI: Further Reading  RFC 5280: X.509 PKI Certificates  RFC 3779: Extensions for IP Addresses and ASNs  RFC 6481-6493: Resource Public Key Infrastructure
  • 30. SANOG 23 : Thiphu, BhutanbdNOG Page 30 Demo: Two Parts  Creating ROAs in LIR Portal  Validating and Configuring routers to make a decision for a prefix  BEFORE THAT LET’s GO FOR A TEA BREAK ..
  • 31. SANOG 23 : Thiphu, BhutanbdNOG Page 31 IRR Toolset, RPSL: Questions Contact person: Muhammad Moinur Rahman address: The Alliance Building. (6th Floor), address: 63 Pragati Sharani, Baridhara, country: BD phone: +8801977881132 e-mail: moin@1asia-ahl.com nic-hdl: MMR13-AP notify: moin@1asia-ahl.com mnt-by: MAINT-BD-1ASIAAHL changed: moin@1asia-ahl.com 20121128 source: APNIC