SlideShare a Scribd company logo
1 v1.01
Securing Internet
Routing
Tashi Phuntsho (tashi@apnic.net)
Senior Network Janitor/Technical Trainer
2 v1.02
Why should we bother?
• As a Manager
q I don’t want to be front page news of a IT paper, or an actual
newspaper for routing errors
3 v1.03
Headlines
https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/
4 v1.04
Headlines
https://blog.cloudflare.com/bgp-leaks-and-crypto-currencies
5 v1.05
Headlines
After leak (JP->JP)
After leak (EU->EU)
https://dyn.com/blog/large-bgp-leak-by-google-disrupts-internet-in-japan/
6 v1.06
Headlines
7 v1.07
Why do we keep seeing these?
• Because NO ONE is in charge?
q No single authority model for the Internet
q No reference point for what’s right in routing
8 v1.08
Why do we keep seeing these?
• Routing works by RUMOUR
q Tell what you know to your neighbors, and Learn what your
neighbors know
q Assume everyone is correct (and honest)
§ Is the originating network the rightful owner?
9 v1.09
Why do we keep seeing these?
• Routing is VARIABLE
q The view of the network depends on where you are
§ Different routing outcomes at different locations
q ~ no reference view to compare the local view L
10 v1.010
Why do we keep seeing these?
• Routing works in REVERSE
q Outbound advertisement affects inbound traffic
q Inbound (Accepted) advertisement influence outbound traffic
11 v1.011
Why do we keep seeing these?
• And as always, there is no E-bit
q A bad routing update does not identify itself as BAD
• So tools/techniques try to identify GOOD updates
12 v1.012
Why should we worry?
• Because it’s just so easy to do bad in routing!
By Source (WP:NFCC#4), Fair use,
https://en.wikipedia.org/w/index.php?curid=42515224
13 v1.013
Why should we bother?
• As a Engineer
q I don’t want to be told at 3AM my routing is broken
q Or while on a holiday
14 v1.014
Current practice
Peering/Transit
Request
LOA Check
Filters (in/out)
15 v1.015
Tools & Techniques
LOA Check
Whois
(manual)
Letter of
Authority
IRR (RPSL)
16 v1.016
Tools & Techniques
• Look up whois
q verify holder of
a resource
17 v1.017
Tools & Techniques
• Ask for a Letter of Authority
q Absolve from any liabilities
18 v1.018
Tools & Techniques
• Look up/ask to enter details
in internet routing registries
(IRR)
q describes route origination and
inter-AS routing policies
19 v1.019
Tools & Techniques
• IRR
q Helps auto generate network
(prefix/as-path) filters using RPSL
tools
§ Filter out route advertisements not
described in the registry
20 v1.020
Tools & Techniques
• Problem(s) with IRR
q No single authority model
§ How do I know if a RR entry is genuine and correct?
§ How do I differentiate between a current and a lapsed entry?
q Many RRs
§ If two RRs contain conflicting data, which one do I trust and use?
q Incomplete data - Not all resources are registered in an IRR
§ If a route is not in a RR, is the route invalid or is the RR just missing data?
q Scaling
§ How do I apply IRR filters to upstream(s)?
21 v1.021
Back to basics – identifying GOOD
• Using digital signatures to convey the “authority to use”?
q A private key to sign the authority, and
q the public key to validate that authority
22 v1.022
How about trust in this framework?
• Follows the resource allocation/delegation hierarchy
IANA à RIRs à NIRs/LIRs à End Holders
|
V
End Holders
23 v1.023
RPKI Chain of Trust
IANA
RIPE-NCCLACNICARIN APNICAFRINIC
NIR
ISP ISP ISP ISP
Allocation
Hierarchy
Trust Anchor
Certificate
Certificate
chain
mirrors the
allocation
hierarchy
Cert
(CA)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(CA)
Cert
(CA)
Image 4
24 v1.024
Resource Certificates
• When an address holder A (*IRs) allocates resources (IP
address/ASN) to B (end holders)
q A issues a resource certificate that binds the allocated address with
B’s public key, all signed by A’s (CA) private key
q proves the holder of the private key (B) is the legitimate holder of
the resource!
25 v1.025
Route Origin Authorization (ROA)
• B can now sign authorities using its private key, which can
be validated by any third party against the TA
• For routing, the address holder can authorize a network
(ASN) to originate a route, and sign this permission with its
private key (ROA)
Prefix 203.176.32.0/19
Max-length /24
Origin ASN AS17821
26 v1.026
Route Origin Validation (ROV)
RPKI-to-Router
(RtR)
rsync/RRDP
RPKI Validator/
RPKI Cache server
2406:6400::/32-48
17821
.1/:1
.2/:2
AS17821
ASXXXX
Global
(RPKI)
Repository
ROA
2406:6400::/32-48
17821
TA
TA
TA
2406:6400::/48
27 v1.027
Are ROAs enough?
• What if I forge the origin AS in the AS path?
q Would be accepted as “good” – pass origin validation!
• Which means, we need to secure the AS path as well
q Need AS path validation (per-prefix)
28 v1.028
AS path validation - BGPsec
AS1 AS2
AS3
AS4
AS1 -> AS2
(Signed AS1)
AS1 -> AS2
(Signed AS1)
AS2->AS3
(signed AS2)
AS1 -> AS2
(Signed AS1)
AS2->AS4
(signed AS2)
q A BGPsec speaker validates the received update by checking:
§ If there is a ROA that describes the prefix and origin AS
§ If the received AS path can be validated as a chain of signatures (for each AS
in the AS path) using the AS keys
29 v1.029
AS path validation issues…
• More resources
q CPU - high crypto overhead to validate signatures, and
q Memory
§ Updates in BGPsec would be per prefix
§ New attributes carrying signatures and certs/key-id for every AS in the AS
path
• How do we distribute the certificates required?
• Can we have partial adoption?
• Given so much overhead, can it do more - Route leaks?
30 v1.030
What can we do?
• Basic BGP OpSec hygiene – RFC7454/RFC8212
q RFC 8212 – BGP default reject or something similar
q Filters with your customers and peers
§ Prefix filters, Prefix limit
§ AS-PATH filters, AS-PATH limit
§ Use IRR objects (source option) or ROA-to-IRR
q Filter what you receive from your upstream(s)
q Create ROAs for your resources
q Filter inbound routes based on ROAs -> ROV
• Join industry initiatives like MANRS
§ https://www.manrs.org/
31 v1.031
ROV – Industry trends
dropping Invalids!
32 v1.032
Acknowledgement
5280
• Geoff Huston, APNIC
• Randy Bush, IIJ Labs/Arrcus
33 v1.033
Any questions?

More Related Content

PDF
MMIX Peering Forum: Securing Internet Routing
PDF
BKNIX Peering Forum 2019: Securing Internet Routing
PDF
BGP filtering best practice
PDF
mnNOG 2020: The Journey [100% ROA Coverage]
PDF
BSides: BGP Hijacking and Secure Internet Routing
PDF
SANOG 34: Securing Internet Routing
PDF
PDF
mnNOG 2: Measuring RPKI
MMIX Peering Forum: Securing Internet Routing
BKNIX Peering Forum 2019: Securing Internet Routing
BGP filtering best practice
mnNOG 2020: The Journey [100% ROA Coverage]
BSides: BGP Hijacking and Secure Internet Routing
SANOG 34: Securing Internet Routing
mnNOG 2: Measuring RPKI

What's hot (15)

PDF
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
PDF
RPKI Overview, Case Studies, Deployment and Operations
PDF
npNOG 5: Securing Internet Routing
PDF
A week with analysing RPKI status
PDF
mnNOG 1: Securing internet Routing
PDF
IDNOG 6: RQC and RPKI
PDF
Route Hijaking and the role of RPKI
PDF
VNIX-NOG 2021: IPv6 Deployment Update
PDF
RPKI (Resource Public Key Infrastructure)
PPTX
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
PDF
SANOG 34: Internet number registry services - the next generation
PDF
RPKI Deployment Status in Bangladesh
PDF
IPv6 Deployment Case on a Korean Governmental Website
PPTX
APNIC RPKI Service Update: MyIX/MyNOG 2017
PDF
Bgp security 2
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
RPKI Overview, Case Studies, Deployment and Operations
npNOG 5: Securing Internet Routing
A week with analysing RPKI status
mnNOG 1: Securing internet Routing
IDNOG 6: RQC and RPKI
Route Hijaking and the role of RPKI
VNIX-NOG 2021: IPv6 Deployment Update
RPKI (Resource Public Key Infrastructure)
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
SANOG 34: Internet number registry services - the next generation
RPKI Deployment Status in Bangladesh
IPv6 Deployment Case on a Korean Governmental Website
APNIC RPKI Service Update: MyIX/MyNOG 2017
Bgp security 2
Ad

Similar to btNOG 6: Securing Internet Routing (20)

PDF
VNIXNOG 2019: Securing Internet Routing
PDF
PacNOG 24: Securing Internet Routing
PDF
LkNOG 3: Securing Internet Routing
PDF
NZNOG 2019: The State of Routing (In)Security
PDF
IAA Life in Lockdown series: Securing Internet Routing
PDF
PCTA e-Tech Show 2021: Securing Internet Routing
PDF
36th TWNIC OPM: BGP security threats and challenges
PDF
Routing Security
PDF
PacNOG 29: Routing security is more than RPKI
PDF
RPKI
PDF
Routing Security in 2017 – We can do better!
PDF
Routing Security Roadmap
PDF
NZNOG 2022: Routing Security
PDF
Rpki with rpki.net tools
PDF
Routing Security, Another Elephant in the Room
PPTX
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
PDF
Secure Routing
PDF
Routing Security
PPTX
Rpki -manrs_(7_september)
PDF
Routing Security
VNIXNOG 2019: Securing Internet Routing
PacNOG 24: Securing Internet Routing
LkNOG 3: Securing Internet Routing
NZNOG 2019: The State of Routing (In)Security
IAA Life in Lockdown series: Securing Internet Routing
PCTA e-Tech Show 2021: Securing Internet Routing
36th TWNIC OPM: BGP security threats and challenges
Routing Security
PacNOG 29: Routing security is more than RPKI
RPKI
Routing Security in 2017 – We can do better!
Routing Security Roadmap
NZNOG 2022: Routing Security
Rpki with rpki.net tools
Routing Security, Another Elephant in the Room
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Secure Routing
Routing Security
Rpki -manrs_(7_september)
Routing Security
Ad

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
DNSSEC Made Easy, presented at PHNOG 2025
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
PDF
The Internet - By the numbers, presented at npNOG 11
PDF
Transmission Control Protocol (TCP) and Starlink
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
PDF
Make DDoS expensive for the threat actors
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
APNIC Report, presented at APAN 60 by Thy Boskovic
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
Triggering QUIC, presented by Geoff Huston at IETF 123
DNSSEC Made Easy, presented at PHNOG 2025
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
IPv6 Deployment and Best Practices, presented by Makito Lay
Cleaning up your RPKI invalids, presented at PacNOG 35
The Internet - By the numbers, presented at npNOG 11
Transmission Control Protocol (TCP) and Starlink
DDoS in India, presented at INNOG 8 by Dave Phelan
Global Networking Trends, presented at the India ISP Conclave 2025
Make DDoS expensive for the threat actors
Fast Reroute in SR-MPLS, presented at bdNOG 19
DDos Mitigation Strategie, presented at bdNOG 19
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Measuring Starlink Protocol Performance, presented at LACNIC 43

Recently uploaded (20)

PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPT
Ethics in Information System - Management Information System
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Introduction to Information and Communication Technology
PPTX
Funds Management Learning Material for Beg
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Job_Card_System_Styled_lorem_ipsum_.pptx
Unit-3 cyber security network security of internet system
artificialintelligenceai1-copy-210604123353.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Sims 4 Historia para lo sims 4 para jugar
international classification of diseases ICD-10 review PPT.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
Paper PDF World Game (s) Great Redesign.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
newyork.pptxirantrafgshenepalchinachinane
Cloud-Scale Log Monitoring _ Datadog.pdf
Introuction about ICD -10 and ICD-11 PPT.pptx
Ethics in Information System - Management Information System
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Introduction to Information and Communication Technology
Funds Management Learning Material for Beg
An introduction to the IFRS (ISSB) Stndards.pdf
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt

btNOG 6: Securing Internet Routing

  • 1. 1 v1.01 Securing Internet Routing Tashi Phuntsho (tashi@apnic.net) Senior Network Janitor/Technical Trainer
  • 2. 2 v1.02 Why should we bother? • As a Manager q I don’t want to be front page news of a IT paper, or an actual newspaper for routing errors
  • 5. 5 v1.05 Headlines After leak (JP->JP) After leak (EU->EU) https://dyn.com/blog/large-bgp-leak-by-google-disrupts-internet-in-japan/
  • 7. 7 v1.07 Why do we keep seeing these? • Because NO ONE is in charge? q No single authority model for the Internet q No reference point for what’s right in routing
  • 8. 8 v1.08 Why do we keep seeing these? • Routing works by RUMOUR q Tell what you know to your neighbors, and Learn what your neighbors know q Assume everyone is correct (and honest) § Is the originating network the rightful owner?
  • 9. 9 v1.09 Why do we keep seeing these? • Routing is VARIABLE q The view of the network depends on where you are § Different routing outcomes at different locations q ~ no reference view to compare the local view L
  • 10. 10 v1.010 Why do we keep seeing these? • Routing works in REVERSE q Outbound advertisement affects inbound traffic q Inbound (Accepted) advertisement influence outbound traffic
  • 11. 11 v1.011 Why do we keep seeing these? • And as always, there is no E-bit q A bad routing update does not identify itself as BAD • So tools/techniques try to identify GOOD updates
  • 12. 12 v1.012 Why should we worry? • Because it’s just so easy to do bad in routing! By Source (WP:NFCC#4), Fair use, https://en.wikipedia.org/w/index.php?curid=42515224
  • 13. 13 v1.013 Why should we bother? • As a Engineer q I don’t want to be told at 3AM my routing is broken q Or while on a holiday
  • 15. 15 v1.015 Tools & Techniques LOA Check Whois (manual) Letter of Authority IRR (RPSL)
  • 16. 16 v1.016 Tools & Techniques • Look up whois q verify holder of a resource
  • 17. 17 v1.017 Tools & Techniques • Ask for a Letter of Authority q Absolve from any liabilities
  • 18. 18 v1.018 Tools & Techniques • Look up/ask to enter details in internet routing registries (IRR) q describes route origination and inter-AS routing policies
  • 19. 19 v1.019 Tools & Techniques • IRR q Helps auto generate network (prefix/as-path) filters using RPSL tools § Filter out route advertisements not described in the registry
  • 20. 20 v1.020 Tools & Techniques • Problem(s) with IRR q No single authority model § How do I know if a RR entry is genuine and correct? § How do I differentiate between a current and a lapsed entry? q Many RRs § If two RRs contain conflicting data, which one do I trust and use? q Incomplete data - Not all resources are registered in an IRR § If a route is not in a RR, is the route invalid or is the RR just missing data? q Scaling § How do I apply IRR filters to upstream(s)?
  • 21. 21 v1.021 Back to basics – identifying GOOD • Using digital signatures to convey the “authority to use”? q A private key to sign the authority, and q the public key to validate that authority
  • 22. 22 v1.022 How about trust in this framework? • Follows the resource allocation/delegation hierarchy IANA à RIRs à NIRs/LIRs à End Holders | V End Holders
  • 23. 23 v1.023 RPKI Chain of Trust IANA RIPE-NCCLACNICARIN APNICAFRINIC NIR ISP ISP ISP ISP Allocation Hierarchy Trust Anchor Certificate Certificate chain mirrors the allocation hierarchy Cert (CA) Cert (EE) Cert (EE) Cert (EE) Cert (EE) Cert (CA) Cert (CA) Image 4
  • 24. 24 v1.024 Resource Certificates • When an address holder A (*IRs) allocates resources (IP address/ASN) to B (end holders) q A issues a resource certificate that binds the allocated address with B’s public key, all signed by A’s (CA) private key q proves the holder of the private key (B) is the legitimate holder of the resource!
  • 25. 25 v1.025 Route Origin Authorization (ROA) • B can now sign authorities using its private key, which can be validated by any third party against the TA • For routing, the address holder can authorize a network (ASN) to originate a route, and sign this permission with its private key (ROA) Prefix 203.176.32.0/19 Max-length /24 Origin ASN AS17821
  • 26. 26 v1.026 Route Origin Validation (ROV) RPKI-to-Router (RtR) rsync/RRDP RPKI Validator/ RPKI Cache server 2406:6400::/32-48 17821 .1/:1 .2/:2 AS17821 ASXXXX Global (RPKI) Repository ROA 2406:6400::/32-48 17821 TA TA TA 2406:6400::/48
  • 27. 27 v1.027 Are ROAs enough? • What if I forge the origin AS in the AS path? q Would be accepted as “good” – pass origin validation! • Which means, we need to secure the AS path as well q Need AS path validation (per-prefix)
  • 28. 28 v1.028 AS path validation - BGPsec AS1 AS2 AS3 AS4 AS1 -> AS2 (Signed AS1) AS1 -> AS2 (Signed AS1) AS2->AS3 (signed AS2) AS1 -> AS2 (Signed AS1) AS2->AS4 (signed AS2) q A BGPsec speaker validates the received update by checking: § If there is a ROA that describes the prefix and origin AS § If the received AS path can be validated as a chain of signatures (for each AS in the AS path) using the AS keys
  • 29. 29 v1.029 AS path validation issues… • More resources q CPU - high crypto overhead to validate signatures, and q Memory § Updates in BGPsec would be per prefix § New attributes carrying signatures and certs/key-id for every AS in the AS path • How do we distribute the certificates required? • Can we have partial adoption? • Given so much overhead, can it do more - Route leaks?
  • 30. 30 v1.030 What can we do? • Basic BGP OpSec hygiene – RFC7454/RFC8212 q RFC 8212 – BGP default reject or something similar q Filters with your customers and peers § Prefix filters, Prefix limit § AS-PATH filters, AS-PATH limit § Use IRR objects (source option) or ROA-to-IRR q Filter what you receive from your upstream(s) q Create ROAs for your resources q Filter inbound routes based on ROAs -> ROV • Join industry initiatives like MANRS § https://www.manrs.org/
  • 31. 31 v1.031 ROV – Industry trends dropping Invalids!
  • 32. 32 v1.032 Acknowledgement 5280 • Geoff Huston, APNIC • Randy Bush, IIJ Labs/Arrcus