Issue Date:
Revision:
Resource Public Key
Infrastructure (RPKI)
As part of bdNOG 2 Conference
11 November 2014
2014/11
2
Overview
•  Routing “incidents”
•  RPKI Technical Details
•  RPKI and BGPsec
•  Components and Implementation
•  Deployment Status in the RIRs
•  APNIC Resource Certification
2
Misdirection / Hijacking Incidents
•  YouTube Incident
–  Occurred 24 Feb 2008 (for about 2 hours)
–  Pakistan Telecom announced YT block
•  Google (AS15169) services downed
–  Occurred 5 Nov 2012 (for 30 minutes)
–  Moratel Indonesia (AS23947)
3
How frequent do these hijacking incidents happen?
How we address this…
•  A network should only originate his own prefix
–  How do we verify?
–  How do we avoid false advertisement?
•  A provider should filter prefixes they propagate from
customers
–  Check the legitimacy of address (LoA)
–  Transitive trust; BGP is a trust-based system
4
WHOIS DB – Legitimacy of Address
5
What is RPKI?
•  Resource Public Key Infrastructure (RPKI)
•  A robust security framework for verifying the association
between resource holder and their Internet resources
•  Created to address the issues in RFC 4593 “Generic
Threats to Routing Protocols”
•  Helps to secure Internet routing by validating routes
–  Proof that prefix announcements are coming from the legitimate
holder of the resource
RFC 6480 – An Infrastructure to Support
Secure Internet Routing (Feb 2012)
6
Benefits of RPKI - Routing
•  Prevents route hijacking
–  A prefix originated by an AS without authorization
–  Reason: malicious intent
•  Prevents mis-origination
–  A prefix that is mistakenly originated by an AS which does not own it
–  Also route leakage
–  Reason: configuration mistake / fat finger
7
BGP Security (BGPsec)
•  Extension to BGP that provides improved security for BGP
routing
•  Currently an IETF Internet draft
•  Implemented via a new optional non-transitive BGP path
attribute that contains a digital signature
•  Two things:
–  BGP Prefix Origin Validation (using RPKI)
–  BGP Path Validation
•  Similar efforts in the early days – IDR working group, S-
BGP
8
“Right” to Resources
•  ISP gets their resources from the RIR
•  ISP notifies its upstream of the prefixes to be announced
•  Upstream must check the WHOIS database if resource has
been delegated to customer ISP
We need to be able to authoritatively prove who owns an IP Prefix and
what AS(s) may announce it.
9
RPKI Infrastructure
•  A system to manage the creation and storage of digital
certificates and the associated Route Origin Authorization
documents
•  Main Components:
–  Certificate Authority (CA)
–  Relying Party (RP)
–  Routers with RPKI support
10
Issuing Party
•  Internet Registries (RIR, NIR, Large LIRs)
•  Acts as a Certificate Authority and issues certificates for
customers
•  Provides a web interface to issue ROAs for customer prefixes
•  Publishes the ROA records
APNIC
RPKI
Engine
publication
MyAPNIC GUI
rpki.apnic.net
Repository
11
Route Origin Authorization (ROA)
•  A digital object that contains a list of address prefixes and
one AS number
•  It is an authority created by a prefix holder to authorize an
AS Number to originate one or more specific route
advertisements
•  Publish an ROA using MyAPNIC
12
X.509 Certificate with 3779 Extension
•  Resource certificates are based
on the X.509 v3 certificate format
(RFC 5280)
•  Extended by RFC 3779 – binds a
list of resources (IP, ASN) to the
subject of the certificate
•  SIA – Subject Information Access;
contains a URI that references
the directory
X.509 Certificate
RFC 3779
Extension
SIA
Owner's Public Key
13
Relying Party (RP)
IANA
Repo
APNIC
Repo
RIPE
Repo
LIR Repo LIR Repo
RP Cache
(gather) Validated
Cache
RPKI-Rtr Protocol
rpki.ripe.net
Software which gathers data from CAs
Also called RP cache or validator
14
RPKI Components
15
Trust
Anchor
RP
CACHE
Trust
Anchor
RPKI-Rtr Protocol
APNIC
RPKI
Engine
Trust
Anchor
publicationMyAPNIC GUI rpki.apnic.net
ca0.rpki.net
rpki.ripe.net
Router Origin Validation
•  Router must support RPKI
•  Checks an RP cache / validator
•  Validation returns 3 states:
–  Valid = when authorization is found for prefix X
–  Invalid = when authorization is found for prefix X but not from ASN Y
–  Unknown = when no authorization data is found
•  Vendor support:
–  Cisco IOS – solid in 15.2
–  Cisco IOS/XR – shipped in 4.3.2
–  Juniper – shipped in 12.2
–  Alcatel Lucent – in development
16
RIR Statistics
17
Ref: http://rpki.surfnet.nl/perrir.html
Based on RIS Database dumps from RIPE-NCC
RPKI Monitor
18
Ref: NIST RPKI Monitor
APNIC RPKI Service
•  Enhancement to the RIRs
–  Offers verifiable proof of resource holdings
•  Resource certification is an opt-in service
–  Resource holders choose to request a certificate and profice their
public key to be certified
•  APNIC has integrated the RPKI management service into
MyAPNIC for APNIC Member use
19
What you need to know
•  You are encouraged to experiment, test, play and develop
•  RPKI standards are still being developed, and the operating
environment for RPKI use is still fragile
•  It’s ready for testing and prototyping, but is probably not
ready for production use just yet
•  Please tell us what you find but don’t rely on it in your
network yet
20
What You Can Do Now?
•  Create ROA records in MyAPNIC
•  Build an RP cache
•  Configure your router to use the cache (or a public one)
•  Create BGP policies
Best to do it in a test environment for now! ☺
21
Build an RP Cache
•  Download and install from rpki.net
–  Instructions here: https://trac.rpki.net/wiki/doc/RPKI/Installation/
UbuntuPackages
22
The RP cache has a web interface
Configure Router to Use Cache
router bgp 651nn
…
bgp rpki server tcp 10.0.0.3 port 43779
refresh 60
bgp rpki server tcp 147.28.0.84 port 93920
refresh 60
…
23
RPKI Lab – Randy Bush
BGP Table
r0.sea#sh ip bgp
Network Next Hop Metric LocPrf Weight
Path
* i I198.180.150.0 144.232.9.61 100 0 1239 3927 i
*> I 199.238.113.9 0 2914 3927 i
* I 129.250.11.41 0 2914 3927 i
*> V198.180.152.0 199.238.113.9 0 2914 4128 i
* V 129.250.11.41 0 2914 4128 i
*> N198.180.155.0 199.238.113.9 0 2914 22773 i
* N 129.250.11.41 0 2914 22773 i
*> N198.180.160.0 199.238.113.9 0 2914 23308 13408
5752 i
* N 129.250.11.41 0 2914 23308 13408
5752 i
RPKI Lab – Randy Bush
24
More References
•  Securing BGP
–  The Internet Protocol Journal, Volume 14, No. 2
•  An Infrastructure to Support Secure Internet Routing
–  RFC6480
•  A Reappraisal of Validation in the RPKI
–  Labs.apnic.net/blabs
•  An Introduction to Routing Security (and RPKI Tools)
•  MyAPNIC Resource Certification Guide
25
Questions
26
THANK YOU
www.facebook.com/APNIC
www.twitter.com/apnic
www.youtube.com/apnicmultimedia
www.flickr.com/apnic
www.weibo.com/APNICrir
27

More Related Content

PDF
Cwin16 - Paris - mule soft
PPTX
Endpoint Agent Part 1: End User Experience
PDF
RPKI Introduction by Randy Bush
PPTX
Attacking ADFS Endpoints - DerbyCon
PDF
Software Craftsmanship @Code Camp Festival 2022.pdf
PPT
IP Address Management Best Practices
PPT
laudon-traver_ec10_ppt_ch04 (1).ppt
PDF
AWS Finance Symposium_SBI 저축은행 사례 공유
Cwin16 - Paris - mule soft
Endpoint Agent Part 1: End User Experience
RPKI Introduction by Randy Bush
Attacking ADFS Endpoints - DerbyCon
Software Craftsmanship @Code Camp Festival 2022.pdf
IP Address Management Best Practices
laudon-traver_ec10_ppt_ch04 (1).ppt
AWS Finance Symposium_SBI 저축은행 사례 공유

What's hot (20)

PPTX
Application Performance Monitoring (APM)
PPTX
Familiarization with UiPath Studio.pptx
PPTX
Zabbix 3.2 presentation June 2017
PDF
What are Passkeys.pdf
PDF
Cisco contact center
PPTX
AWS Well-Architected Framework
PPTX
Verifiable Credentials, Self Sovereign Identity and DLTs
PDF
API Management Solution Powerpoint Presentation Slides
PDF
Zabbix Monitoring Platform
PDF
인터넷전문은행 Fi-ntechkorea.com
PPTX
ENSA_Module_8.pptx
PDF
Introduction to business process management
PPTX
Continuous Data Ingestion pipeline for the Enterprise
PPTX
What is RabbitMQ ?
PDF
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
PPTX
Dynatrace
PDF
Service Virtualization
PPTX
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
PPTX
Introduction To IPaaS: Drivers, Requirements And Use Cases
PDF
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
Application Performance Monitoring (APM)
Familiarization with UiPath Studio.pptx
Zabbix 3.2 presentation June 2017
What are Passkeys.pdf
Cisco contact center
AWS Well-Architected Framework
Verifiable Credentials, Self Sovereign Identity and DLTs
API Management Solution Powerpoint Presentation Slides
Zabbix Monitoring Platform
인터넷전문은행 Fi-ntechkorea.com
ENSA_Module_8.pptx
Introduction to business process management
Continuous Data Ingestion pipeline for the Enterprise
What is RabbitMQ ?
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
Dynatrace
Service Virtualization
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
Introduction To IPaaS: Drivers, Requirements And Use Cases
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
Ad

Viewers also liked (20)

PDF
ISOC Engagement Activities
PDF
ICANN Engagement Update
PDF
Converged & Efficient Licensing Framework
PDF
Best Current Operational Practice (BCOP) - Updates from around the world
PDF
IPv6 Address & Deployment Planning
PDF
bdNOG Conference Report
PDF
bdCERT Activities Update
PDF
Securing Asterisk: A practical approach
PDF
Traffic Engineering for CDNs
PDF
EDNS0 Client-Subnet for DNS Based CDNs
PDF
PDF
Dot BD Domain and Shared Registry Model- A Policy Proposal
PDF
OpenStack Cloud Administration Through Live Demonstration
PDF
Inter-AS MPLS VPN Deployment
PDF
Community Tools to Fight Against DDoS
PDF
Broadband for Digital Bangladesh & recommendation from ISPAB
PDF
Awareness of Children Internet Addiction
PDF
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
PDF
Participant Access Control in IP Multicasting
PDF
Practical Implementation of BGP Community with Geotags
ISOC Engagement Activities
ICANN Engagement Update
Converged & Efficient Licensing Framework
Best Current Operational Practice (BCOP) - Updates from around the world
IPv6 Address & Deployment Planning
bdNOG Conference Report
bdCERT Activities Update
Securing Asterisk: A practical approach
Traffic Engineering for CDNs
EDNS0 Client-Subnet for DNS Based CDNs
Dot BD Domain and Shared Registry Model- A Policy Proposal
OpenStack Cloud Administration Through Live Demonstration
Inter-AS MPLS VPN Deployment
Community Tools to Fight Against DDoS
Broadband for Digital Bangladesh & recommendation from ISPAB
Awareness of Children Internet Addiction
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
Participant Access Control in IP Multicasting
Practical Implementation of BGP Community with Geotags
Ad

Similar to Resource Public Key Infrastructure (RPKI) (20)

PDF
Introduction to RPKI - MyNOG
PDF
Introduction to RPKI by Sheryl (Shane) Hermoso
PPTX
HKNOG 7.0: RPKI - it's time to start deploying it
PDF
RPKI Overview, Case Studies, Deployment and Operations
PDF
Certification
PDF
Resource Certification
PPTX
Rpki -manrs_(7_september)
PDF
RPKI Certification Tutorial
PDF
Introduction to RPKI
PDF
RPKI (Resource Public Key Infrastructure)
PDF
IDNOG 6: RQC and RPKI
PDF
Route Origin Authorization (ROA) using RPKI
PDF
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
PDF
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
PDF
PhNOG 2020: ROA and RPKI in the Philippines
PPTX
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
PDF
APAN 50: RPKI industry trends and initiatives
PDF
Peering Asia 2.0: RPKI for Peering
PDF
Route Origin Validation - A MANRS Approach
Introduction to RPKI - MyNOG
Introduction to RPKI by Sheryl (Shane) Hermoso
HKNOG 7.0: RPKI - it's time to start deploying it
RPKI Overview, Case Studies, Deployment and Operations
Certification
Resource Certification
Rpki -manrs_(7_september)
RPKI Certification Tutorial
Introduction to RPKI
RPKI (Resource Public Key Infrastructure)
IDNOG 6: RQC and RPKI
Route Origin Authorization (ROA) using RPKI
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
PhNOG 2020: ROA and RPKI in the Philippines
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
APAN 50: RPKI industry trends and initiatives
Peering Asia 2.0: RPKI for Peering
Route Origin Validation - A MANRS Approach

More from Bangladesh Network Operators Group (20)

PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
IPv6 Mostly Experience at APRICOT by Yoshinobu Matsuzaki (IIJ)
PDF
Fast Reroute in SR-MPLS by Md Abdullah Al Naser
PDF
DDoS Mitigation Strategies by Md. Abdul Awal
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
Optics101 for non-Optical (IP) folks by Tashi Phuntsho
PPTX
The Internet Service Providers and Connectivity Providers of ICANN
PPTX
Integration of AI and GenAI in Education and beyond
PPTX
Strengthening Cyber Security with Tools and Human Expertise
PDF
Mental Health and Workplace Culture in Tech:A Personal Perspective
PDF
Network Efficiency:The LLM Advantage on network infrastructures
PDF
Utilizing Free and open-source Technology and Achieve Next Generation Enterpr...
PPTX
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
PPTX
Maximizing Network Efficiency with Large Language Models (LLM)
PPTX
Geolocation and Geofeed Implementation bdNOG18
PDF
Data Centre Design Consideration for Bangladesh
PDF
DNS Troubleshooting - Assumptions and Problem Breakdown
PPTX
Team Cymru Community Services,Overview of all public services
PPTX
Open Source TCP or Netflow Log Server Using Graylog
PPTX
Enhancing seamless access using TIGERfed
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
IPv6 Mostly Experience at APRICOT by Yoshinobu Matsuzaki (IIJ)
Fast Reroute in SR-MPLS by Md Abdullah Al Naser
DDoS Mitigation Strategies by Md. Abdul Awal
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
Optics101 for non-Optical (IP) folks by Tashi Phuntsho
The Internet Service Providers and Connectivity Providers of ICANN
Integration of AI and GenAI in Education and beyond
Strengthening Cyber Security with Tools and Human Expertise
Mental Health and Workplace Culture in Tech:A Personal Perspective
Network Efficiency:The LLM Advantage on network infrastructures
Utilizing Free and open-source Technology and Achieve Next Generation Enterpr...
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
Maximizing Network Efficiency with Large Language Models (LLM)
Geolocation and Geofeed Implementation bdNOG18
Data Centre Design Consideration for Bangladesh
DNS Troubleshooting - Assumptions and Problem Breakdown
Team Cymru Community Services,Overview of all public services
Open Source TCP or Netflow Log Server Using Graylog
Enhancing seamless access using TIGERfed

Recently uploaded (20)

PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PPTX
Database Information System - Management Information System
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
simpleintnettestmetiaerl for the simple testint
PDF
Understand the Gitlab_presentation_task.pdf
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
The Evolution of Traditional to New Media .pdf
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
Reading as a good Form of Recreation
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PPT
12 Things That Make People Trust a Website Instantly
newyork.pptxirantrafgshenepalchinachinane
si manuel quezon at mga nagawa sa bansang pilipinas
Database Information System - Management Information System
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
simpleintnettestmetiaerl for the simple testint
Understand the Gitlab_presentation_task.pdf
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
The Evolution of Traditional to New Media .pdf
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Uptota Investor Deck - Where Africa Meets Blockchain
t_and_OpenAI_Combined_two_pressentations
Containerization lab dddddddddddddddmanual.pdf
Layers_of_the_Earth_Grade7.pptx class by
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Reading as a good Form of Recreation
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
12 Things That Make People Trust a Website Instantly

Resource Public Key Infrastructure (RPKI)

  • 1. Issue Date: Revision: Resource Public Key Infrastructure (RPKI) As part of bdNOG 2 Conference 11 November 2014 2014/11 2
  • 2. Overview •  Routing “incidents” •  RPKI Technical Details •  RPKI and BGPsec •  Components and Implementation •  Deployment Status in the RIRs •  APNIC Resource Certification 2
  • 3. Misdirection / Hijacking Incidents •  YouTube Incident –  Occurred 24 Feb 2008 (for about 2 hours) –  Pakistan Telecom announced YT block •  Google (AS15169) services downed –  Occurred 5 Nov 2012 (for 30 minutes) –  Moratel Indonesia (AS23947) 3 How frequent do these hijacking incidents happen?
  • 4. How we address this… •  A network should only originate his own prefix –  How do we verify? –  How do we avoid false advertisement? •  A provider should filter prefixes they propagate from customers –  Check the legitimacy of address (LoA) –  Transitive trust; BGP is a trust-based system 4
  • 5. WHOIS DB – Legitimacy of Address 5
  • 6. What is RPKI? •  Resource Public Key Infrastructure (RPKI) •  A robust security framework for verifying the association between resource holder and their Internet resources •  Created to address the issues in RFC 4593 “Generic Threats to Routing Protocols” •  Helps to secure Internet routing by validating routes –  Proof that prefix announcements are coming from the legitimate holder of the resource RFC 6480 – An Infrastructure to Support Secure Internet Routing (Feb 2012) 6
  • 7. Benefits of RPKI - Routing •  Prevents route hijacking –  A prefix originated by an AS without authorization –  Reason: malicious intent •  Prevents mis-origination –  A prefix that is mistakenly originated by an AS which does not own it –  Also route leakage –  Reason: configuration mistake / fat finger 7
  • 8. BGP Security (BGPsec) •  Extension to BGP that provides improved security for BGP routing •  Currently an IETF Internet draft •  Implemented via a new optional non-transitive BGP path attribute that contains a digital signature •  Two things: –  BGP Prefix Origin Validation (using RPKI) –  BGP Path Validation •  Similar efforts in the early days – IDR working group, S- BGP 8
  • 9. “Right” to Resources •  ISP gets their resources from the RIR •  ISP notifies its upstream of the prefixes to be announced •  Upstream must check the WHOIS database if resource has been delegated to customer ISP We need to be able to authoritatively prove who owns an IP Prefix and what AS(s) may announce it. 9
  • 10. RPKI Infrastructure •  A system to manage the creation and storage of digital certificates and the associated Route Origin Authorization documents •  Main Components: –  Certificate Authority (CA) –  Relying Party (RP) –  Routers with RPKI support 10
  • 11. Issuing Party •  Internet Registries (RIR, NIR, Large LIRs) •  Acts as a Certificate Authority and issues certificates for customers •  Provides a web interface to issue ROAs for customer prefixes •  Publishes the ROA records APNIC RPKI Engine publication MyAPNIC GUI rpki.apnic.net Repository 11
  • 12. Route Origin Authorization (ROA) •  A digital object that contains a list of address prefixes and one AS number •  It is an authority created by a prefix holder to authorize an AS Number to originate one or more specific route advertisements •  Publish an ROA using MyAPNIC 12
  • 13. X.509 Certificate with 3779 Extension •  Resource certificates are based on the X.509 v3 certificate format (RFC 5280) •  Extended by RFC 3779 – binds a list of resources (IP, ASN) to the subject of the certificate •  SIA – Subject Information Access; contains a URI that references the directory X.509 Certificate RFC 3779 Extension SIA Owner's Public Key 13
  • 14. Relying Party (RP) IANA Repo APNIC Repo RIPE Repo LIR Repo LIR Repo RP Cache (gather) Validated Cache RPKI-Rtr Protocol rpki.ripe.net Software which gathers data from CAs Also called RP cache or validator 14
  • 16. Router Origin Validation •  Router must support RPKI •  Checks an RP cache / validator •  Validation returns 3 states: –  Valid = when authorization is found for prefix X –  Invalid = when authorization is found for prefix X but not from ASN Y –  Unknown = when no authorization data is found •  Vendor support: –  Cisco IOS – solid in 15.2 –  Cisco IOS/XR – shipped in 4.3.2 –  Juniper – shipped in 12.2 –  Alcatel Lucent – in development 16
  • 19. APNIC RPKI Service •  Enhancement to the RIRs –  Offers verifiable proof of resource holdings •  Resource certification is an opt-in service –  Resource holders choose to request a certificate and profice their public key to be certified •  APNIC has integrated the RPKI management service into MyAPNIC for APNIC Member use 19
  • 20. What you need to know •  You are encouraged to experiment, test, play and develop •  RPKI standards are still being developed, and the operating environment for RPKI use is still fragile •  It’s ready for testing and prototyping, but is probably not ready for production use just yet •  Please tell us what you find but don’t rely on it in your network yet 20
  • 21. What You Can Do Now? •  Create ROA records in MyAPNIC •  Build an RP cache •  Configure your router to use the cache (or a public one) •  Create BGP policies Best to do it in a test environment for now! ☺ 21
  • 22. Build an RP Cache •  Download and install from rpki.net –  Instructions here: https://trac.rpki.net/wiki/doc/RPKI/Installation/ UbuntuPackages 22 The RP cache has a web interface
  • 23. Configure Router to Use Cache router bgp 651nn … bgp rpki server tcp 10.0.0.3 port 43779 refresh 60 bgp rpki server tcp 147.28.0.84 port 93920 refresh 60 … 23 RPKI Lab – Randy Bush
  • 24. BGP Table r0.sea#sh ip bgp Network Next Hop Metric LocPrf Weight Path * i I198.180.150.0 144.232.9.61 100 0 1239 3927 i *> I 199.238.113.9 0 2914 3927 i * I 129.250.11.41 0 2914 3927 i *> V198.180.152.0 199.238.113.9 0 2914 4128 i * V 129.250.11.41 0 2914 4128 i *> N198.180.155.0 199.238.113.9 0 2914 22773 i * N 129.250.11.41 0 2914 22773 i *> N198.180.160.0 199.238.113.9 0 2914 23308 13408 5752 i * N 129.250.11.41 0 2914 23308 13408 5752 i RPKI Lab – Randy Bush 24
  • 25. More References •  Securing BGP –  The Internet Protocol Journal, Volume 14, No. 2 •  An Infrastructure to Support Secure Internet Routing –  RFC6480 •  A Reappraisal of Validation in the RPKI –  Labs.apnic.net/blabs •  An Introduction to Routing Security (and RPKI Tools) •  MyAPNIC Resource Certification Guide 25