SlideShare a Scribd company logo
Nathalie Trenaman| 13 April 2021 |
Lebanese University, Faculty
of Sciences
Routing Security
Introduction to


BGP routing
3
Internet building blocks
ASN (Autonomous System Number)
4
ASN (Autonomous System Number)
Internet building blocks
ASN Addresses Interconnect
Autonomous System
5
Routing on the Internet
“BGP protocol”
Can I trust
AS2?
Routing table


194.x.x.x = AS2
Routing table


193.x.x.x = AS1
Is AS1
correct?
AS1


193.x.x.x
AS2


194.x.x.x
AS2: “I have 194.x.x.x”
AS1: “I have 193.x.x.x”
6
Route Propagation
AS15 AS756
R1
AS33
AS164
66.2.9.0/24
M
ED=700
MED=500
LP=100
LP=50
AS25 AS5
R2
LP=40
tra
ffi
c
route
7
Accidents Happen
• Fat Fingers


- 2 and 3 are really close on our keyboards….


• Policy Violations (leaks)


- Oops, we did not want this to go on the public Internet


- Infamous incident with Pakistan Telecom and YouTube
8
Incidents Are Common
• 2019 Routing Security Review


- 12,600 incidents


- 4,4% of all ASNs affected


- 3,000 ASNs are victims of at least one incident


- 1,300 ASNs caused at least one incident
Source: https://bgpstream.com
9
How Bad Is It?
10
Routing on the Internet
Can I
trust B?
Routing table


194.x.x.x = B
Routing table


193.x.x.x = A
Is A
correct?
A


193.x.x.x
B


194.x.x.x
B: “I have 194.x.x.x”
A: “I have 193.x.x.x”
RIPE
Database
“Internet Routing Registry”
11
Problem Statement
• Some IRR data can not be fully trusted


- Accuracy


- Incomplete data


- Lack of maintenance


• Not every RIR has an IRR


- Third party databases need to be used


- No verification of who holds IPs/ASNs
•
Problem Statement
13
Internet Routing Registry
• Many exist, most widely used


- RIPE Database


- RADB


• Verification of holdership over resources


- RIPE Database for RIPE Region resources only


- RADB allows paying customers to create any object


- Lots of the other IRRs do not formally verify holdership
Introduction to RPKI
15
Resource Public Key Infrastructure
• Ties IP addresses and ASNs to public keys


• Follows the hierarchy of the registries


• Authorised statements from resource holders


- “ASN X is authorised to announce my Prefix Y”


- Signed, holder of Y
16
RPKI Certificate Structure
Member Member Member
ROA ROA ROA
Certificate hierarchy follows allocation hierarchy
ARIN APNIC RIPE LACNIC AFRINIC
17
RPKI Chain of Trust
ROA
signature
LIR’s Resources
signature
public key
ALL Resources
signature
public key
18
RPKI Chain of Trust
RIPE NCC Root Certificate


Self-signed
ALL Resources
Root’s private key
signature
public key
19
RPKI Chain of Trust
LIR Certificate


Signed by the Root private key
LIR’s Resources
Root’s private key
signature
public key
20
RPKI Adoption
21
Two elements of RPKI
Signing
Create your ROAs
Validating
Verifying others
ROAs
23
ROA (Route Origin Authorisation)
• A ROA is…


• LIRs can create a ROA for each one of their
resources (IP address ranges)


• Multiple ROAs can be created for an IP range


• ROAs can overlap
24
What is in a ROA ?
Prefix The network for which you are
creating the ROA
The ASN that’s supposed to be
originating the BGP Announcement
Origin
ASN
Max
Length
The Maximum prefix length accepted
for this ROA
25
RPKI Chain of Trust
ALL Resources
LIR’s Resources
Root’s private key signature
signature
public key
public key
26
Route Origin Authorisation
Prefix


is authorised to be announced by


AS Number
LIR’s private key
ROA
signature
27
RPKI Chain of Trust
ROA
signature
LIR’s Resources
signature
public key
ALL Resources
signature
public key
28
Hosted or Delegated RPKI
RIPE
ROA ROA
ROA ROA
ROA
Member Member Member
ROA
Member-X CA Member-Y CA
RIPE NCC Hosted System
29
Hosted RPKI
• Automatic signing and key roll overs


- One click setup of resource certificate


- User has a valid and published certificate for as long as
they are the holder of the resources


- All the complexity is handled by the hosted system


• Lets you focus on creating and publishing
ROAs


- Match your intended BGP configuration
30
Delegated RPKI
• Run your own Certification Authority software


- Dragon research Labs, RPKI toolkit


- NLNetLabs, Krill


• Setup connection with RIPE NCC CA


• Generate a certificate and get it signed by the
parent CA


• Run your own repository
31
First login to the dashboard
32
Creating ROAs
33
Reviewing changes
34
Checking the effects
/23
35
193.0.24.0/21


AS2121


Max Length: /21
ROA
193.0.24.0/21
193.0.24.0/22 193.0.28.0/22
193.0.24.0/23


AS2121


Max Length: /24
ROA
193.0.30.0/23


AS2121


Max Length: /23
ROA
✖
✖
✔︎
/23 /23 /23 /23
/23
/24 /24 /24 /24 /24 /24 /24 /24
/24 /24
✖
✔︎✔︎✔︎✔︎
✖
✖ ✖
✖
✖
✖
✖
36
RPKI Adoption
37
ROA Adoption
38
ROA Accuracy
Validation Tools
40
Two elements of RPKI
Signing
Create your ROAs
Validating
Verifying others
41
Routing on the Internet
Is A
correct?
A


192.0.2.0/24
B


193.0.24.0/21
A: “I have 192.0.2.0/24”
1. Create route
authorisation record
(ROA)
2. Validate route
RPKI Repository
A is authorised
to announce
192.0.2.0/24
BGP
42
Trust Anchor Locator (TAL)
RIPE NCC ARIN APNIC AFRINIC
LACNIC
Validator
Repository Repository Repository Repository Repository
• Location of RIR repositories


• Root’s public key
TAL TAL TAL TAL
List of ROAs
Cerfificates
43
RPKI Validators
• Software that creates a local “validated cache”
with all the valid ROAs


- Downloads the RPKI repository from the RIRs


- Validates the chain of trust of all the ROAs and associated
CAs


- Talks to your routers using the RPKI-RTR Protocol
44
Relying Party
RIPE NCC ARIN APNIC AFRINIC
LACNIC
Validator
Repository Repository Repository Repository Repository
List of ROAs
Cerfificates
45
RPKI-RTR
ROAs
ROAs
VALIDATOR SOFTWARE
Verification
Validated
Cache
RPKI-RTR
ROUTERS
RIR REPOSITORIES
46
Relying Party
ROA
AS111 10.0.7.30/22
AS222 10.0.6.10/24
AS333 10.4.17.5/20
AS111 10.0.7.30/22
AS111 10.0.7.30/22
AS111 10.0.7.30/22
BGP Announcements
BETTER ROUTING DECISIONS
47
RIPE NCC Validator
• https://github.com/RIPE-NCC/rpki-validator


• Version 3.1


• Java-based, web interface, white-list
functionality


• Can speak RPKI-RTR
48
Alternatives
• All are open source:


- Routinator - https://github.com/NLnetLabs/
routinator/


- FORT - https://github.com/NICMx/FORT-validator/


- OctoRPKI - https://github.com/cloudflare/cfrpki


- RPKI-client - https://rpki-client.org/


- Prover - https://github.com/lolepezy/rpki-prover


- Rpstir2 - https://github.com/bgpsecurity/rpstir2
ROA Validation
50
Two elements of RPKI
Signing
Create your ROAs
Validating
Verifying others
51
ROA Validation
• Routers receive data from the validated cache
via RPKI-RTR


• Based on this and on BGP announcements,
you have to make decisions


- Accept or discard the BGP Announcement


- As temporary measure, you could influence other
attributes, such as Local Preference
52
ROAs
ROAs
ROA Validation
BGP Validation
VALID INVALID
VALID INVALID UNKNOWN
NOT FOUND
53
Invalid ROA
• Invalid ROA


- The ROA in the repository cannot be validated by the client
(ISP) so it is not included in the validated cache


• Invalid BGP announcement


- There is a ROA in validated cache for that prefix but for a
different AS.


- Or the max length doesn’t match.


• If no ROA in the cache then announcement is
“unknown”
54
Whitelisting
• If there is an invalid ROA for a network that’s
important for you or your customers, you can
whitelist it


• This is done on your local validator software


- It creates a “fake” ROA for the resources you want


• It allows you to contact the operator to fix their
ROA


- Think of e-mail, contact forms, etc…
55
Take the Poll!
Status of RPKI ROV
Name Type Details Status
Telia Transit Signed & Filtering Safe
Cogent Transit Signed & Filtering Safe
GTT Transit Signed & Filtering Safe
NTT Transit Signed & Filtering Safe
Hurricane Electric Transit Signed & Filtering Safe
Tata Transit Signed & Filtering Safe
PCCW Transit Signed & Filtering Safe
RETN Transit Partially Signed &
Filtering
Safe
Cloud
fl
are Cloud Signed & Filtering Safe
Amazon Cloud Signed & Filtering Safe
Net
fl
ix Cloud Signed & Filtering Safe
Wikimedia
Foundation
Cloud Signed & Filtering Safe
Scaleway Cloud Signed & Filtering Safe
• Source: isbgpsafeyet.com
57
Where do we go from here ?
• RPKI is only one of the steps towards full BGP
Validation


- Paths are not validated


• We need more building blocks


- BGPSec (RFC)


- ASPA (draft)


- AS-Cones (draft)
Questions
nathalie@ripe.net


rpki@ripe.net

More Related Content

PDF
RPKI Deployment Status in Bangladesh
PDF
RPKI with rpki.net Tools
PDF
RPKI invalids aren't gone yet
PPTX
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
PDF
BGP Flexibility and Its Consequences
PDF
A week with analysing RPKI status
PDF
Resource Certification
RPKI Deployment Status in Bangladesh
RPKI with rpki.net Tools
RPKI invalids aren't gone yet
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
BGP Flexibility and Its Consequences
A week with analysing RPKI status
Resource Certification

What's hot (16)

PDF
Certification
PPTX
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
PDF
Route Hijaking and the role of RPKI
PDF
How You Will Get Hacked Ten Years from Now
PDF
RPKI
PDF
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
PDF
Service Function Chaining with SRv6
PDF
PCTA e-Tech Show 2021: Securing Internet Routing
PDF
RPKI Certification Tutorial
PDF
RPKI Trust Anchor
PDF
I Pv6 Enabling Menog 0.4
PDF
Is IPv6 Really Faster?
ODP
C Cpres
PPTX
APRICOT 2015 - NetConf for Peering Automation
PDF
Traffic Engineering Using Segment Routing
Certification
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
Route Hijaking and the role of RPKI
How You Will Get Hacked Ten Years from Now
RPKI
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Service Function Chaining with SRv6
PCTA e-Tech Show 2021: Securing Internet Routing
RPKI Certification Tutorial
RPKI Trust Anchor
I Pv6 Enabling Menog 0.4
Is IPv6 Really Faster?
C Cpres
APRICOT 2015 - NetConf for Peering Automation
Traffic Engineering Using Segment Routing
Ad

Similar to Routing Security (20)

PDF
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
PDF
Resource Public Key Infrastructure (RPKI)
PDF
Introduction to RPKI by Sheryl (Shane) Hermoso
PDF
Introduction to RPKI - MyNOG
PDF
RPKI (Resource Public Key Infrastructure)
PDF
Securing BGP
PPTX
Rpki -manrs_(7_september)
PDF
Rpki with rpki.net tools
PDF
npNOG 5: Securing Internet Routing
PDF
Introduction to RPKI
PDF
Securing BGP with RPKI - Ondřej Caletka, RIPE NCC
PDF
PacNOG 23: Secure routing with RPKI
PDF
btNOG 6: Securing Internet Routing
PPTX
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
PDF
LkNOG 3: Securing Internet Routing
PDF
SANOG 34: Securing Internet Routing
PDF
mnNOG 1: Securing internet Routing
PDF
Routing Security, Another Elephant in the Room
PDF
MMIX Peering Forum: Securing Internet Routing
PDF
BKNIX Peering Forum 2019: Securing Internet Routing
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
Resource Public Key Infrastructure (RPKI)
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI - MyNOG
RPKI (Resource Public Key Infrastructure)
Securing BGP
Rpki -manrs_(7_september)
Rpki with rpki.net tools
npNOG 5: Securing Internet Routing
Introduction to RPKI
Securing BGP with RPKI - Ondřej Caletka, RIPE NCC
PacNOG 23: Secure routing with RPKI
btNOG 6: Securing Internet Routing
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
LkNOG 3: Securing Internet Routing
SANOG 34: Securing Internet Routing
mnNOG 1: Securing internet Routing
Routing Security, Another Elephant in the Room
MMIX Peering Forum: Securing Internet Routing
BKNIX Peering Forum 2019: Securing Internet Routing
Ad

More from RIPE NCC (20)

PDF
A Look at a Root Cause for DNS Latency - APRICOT 2025
PDF
Internet Landscape and Network Resiliency in South East Europe
PDF
ondrej-caletka-INEX-Deploying_IPv6_mostly.pdf
PDF
jelena-cosic-internet-landscape-and-network-resiliency-in-south-east-europe.pdf
PDF
RIPE Atlas & other RIPE NCC Internet Measurement Tools
PDF
Minimising Impact before incidents occur with RIPE Atlas
PDF
Know Your Network: Utilising RIS and RIPE Atlas to your advantage
PDF
Know Your Network: Why every network operator should host a RIPE Atlas probe
PDF
Know Your Network; why every network operator should host a RIPE Atlas probe
PDF
Taiwan's Digital Landscape with RIPE NCC Tools
PDF
Navigating IP Addresses: Insights from your Regional Internet Registry
PDF
Traces of Power: Internet Governance and Climate Action
PDF
Governing Environmental Sustainability in Tech
PDF
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
PDF
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
PDF
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
PDF
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
PDF
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
PDF
RIPE NCC Internet Measurement Tools
PDF
IPv6 in Central Europe and the Baltics
A Look at a Root Cause for DNS Latency - APRICOT 2025
Internet Landscape and Network Resiliency in South East Europe
ondrej-caletka-INEX-Deploying_IPv6_mostly.pdf
jelena-cosic-internet-landscape-and-network-resiliency-in-south-east-europe.pdf
RIPE Atlas & other RIPE NCC Internet Measurement Tools
Minimising Impact before incidents occur with RIPE Atlas
Know Your Network: Utilising RIS and RIPE Atlas to your advantage
Know Your Network: Why every network operator should host a RIPE Atlas probe
Know Your Network; why every network operator should host a RIPE Atlas probe
Taiwan's Digital Landscape with RIPE NCC Tools
Navigating IP Addresses: Insights from your Regional Internet Registry
Traces of Power: Internet Governance and Climate Action
Governing Environmental Sustainability in Tech
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
RIPE NCC Internet Measurement Tools
IPv6 in Central Europe and the Baltics

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
KodekX | Application Modernization Development
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
Programs and apps: productivity, graphics, security and other tools
KodekX | Application Modernization Development
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
sap open course for s4hana steps from ECC to s4
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...

Routing Security

  • 1. Nathalie Trenaman| 13 April 2021 | Lebanese University, Faculty of Sciences Routing Security
  • 3. 3 Internet building blocks ASN (Autonomous System Number)
  • 4. 4 ASN (Autonomous System Number) Internet building blocks ASN Addresses Interconnect Autonomous System
  • 5. 5 Routing on the Internet “BGP protocol” Can I trust AS2? Routing table 
 194.x.x.x = AS2 Routing table 
 193.x.x.x = AS1 Is AS1 correct? AS1 
 193.x.x.x AS2 
 194.x.x.x AS2: “I have 194.x.x.x” AS1: “I have 193.x.x.x”
  • 7. 7 Accidents Happen • Fat Fingers - 2 and 3 are really close on our keyboards…. • Policy Violations (leaks) - Oops, we did not want this to go on the public Internet - Infamous incident with Pakistan Telecom and YouTube
  • 8. 8 Incidents Are Common • 2019 Routing Security Review - 12,600 incidents - 4,4% of all ASNs affected - 3,000 ASNs are victims of at least one incident - 1,300 ASNs caused at least one incident Source: https://bgpstream.com
  • 10. 10 Routing on the Internet Can I trust B? Routing table 
 194.x.x.x = B Routing table 
 193.x.x.x = A Is A correct? A 
 193.x.x.x B 
 194.x.x.x B: “I have 194.x.x.x” A: “I have 193.x.x.x” RIPE Database “Internet Routing Registry”
  • 11. 11 Problem Statement • Some IRR data can not be fully trusted - Accuracy - Incomplete data - Lack of maintenance • Not every RIR has an IRR - Third party databases need to be used - No verification of who holds IPs/ASNs
  • 13. 13 Internet Routing Registry • Many exist, most widely used - RIPE Database - RADB • Verification of holdership over resources - RIPE Database for RIPE Region resources only - RADB allows paying customers to create any object - Lots of the other IRRs do not formally verify holdership
  • 15. 15 Resource Public Key Infrastructure • Ties IP addresses and ASNs to public keys • Follows the hierarchy of the registries • Authorised statements from resource holders - “ASN X is authorised to announce my Prefix Y” - Signed, holder of Y
  • 16. 16 RPKI Certificate Structure Member Member Member ROA ROA ROA Certificate hierarchy follows allocation hierarchy ARIN APNIC RIPE LACNIC AFRINIC
  • 17. 17 RPKI Chain of Trust ROA signature LIR’s Resources signature public key ALL Resources signature public key
  • 18. 18 RPKI Chain of Trust RIPE NCC Root Certificate Self-signed ALL Resources Root’s private key signature public key
  • 19. 19 RPKI Chain of Trust LIR Certificate Signed by the Root private key LIR’s Resources Root’s private key signature public key
  • 21. 21 Two elements of RPKI Signing Create your ROAs Validating Verifying others
  • 22. ROAs
  • 23. 23 ROA (Route Origin Authorisation) • A ROA is… • LIRs can create a ROA for each one of their resources (IP address ranges) • Multiple ROAs can be created for an IP range • ROAs can overlap
  • 24. 24 What is in a ROA ? Prefix The network for which you are creating the ROA The ASN that’s supposed to be originating the BGP Announcement Origin ASN Max Length The Maximum prefix length accepted for this ROA
  • 25. 25 RPKI Chain of Trust ALL Resources LIR’s Resources Root’s private key signature signature public key public key
  • 26. 26 Route Origin Authorisation Prefix is authorised to be announced by AS Number LIR’s private key ROA signature
  • 27. 27 RPKI Chain of Trust ROA signature LIR’s Resources signature public key ALL Resources signature public key
  • 28. 28 Hosted or Delegated RPKI RIPE ROA ROA ROA ROA ROA Member Member Member ROA Member-X CA Member-Y CA RIPE NCC Hosted System
  • 29. 29 Hosted RPKI • Automatic signing and key roll overs - One click setup of resource certificate - User has a valid and published certificate for as long as they are the holder of the resources - All the complexity is handled by the hosted system • Lets you focus on creating and publishing ROAs - Match your intended BGP configuration
  • 30. 30 Delegated RPKI • Run your own Certification Authority software - Dragon research Labs, RPKI toolkit - NLNetLabs, Krill • Setup connection with RIPE NCC CA • Generate a certificate and get it signed by the parent CA • Run your own repository
  • 31. 31 First login to the dashboard
  • 35. /23 35 193.0.24.0/21 AS2121 Max Length: /21 ROA 193.0.24.0/21 193.0.24.0/22 193.0.28.0/22 193.0.24.0/23 AS2121 Max Length: /24 ROA 193.0.30.0/23 AS2121 Max Length: /23 ROA ✖ ✖ ✔︎ /23 /23 /23 /23 /23 /24 /24 /24 /24 /24 /24 /24 /24 /24 /24 ✖ ✔︎✔︎✔︎✔︎ ✖ ✖ ✖ ✖ ✖ ✖ ✖
  • 40. 40 Two elements of RPKI Signing Create your ROAs Validating Verifying others
  • 41. 41 Routing on the Internet Is A correct? A 
 192.0.2.0/24 B 
 193.0.24.0/21 A: “I have 192.0.2.0/24” 1. Create route authorisation record (ROA) 2. Validate route RPKI Repository A is authorised to announce 192.0.2.0/24 BGP
  • 42. 42 Trust Anchor Locator (TAL) RIPE NCC ARIN APNIC AFRINIC LACNIC Validator Repository Repository Repository Repository Repository • Location of RIR repositories • Root’s public key TAL TAL TAL TAL List of ROAs Cerfificates
  • 43. 43 RPKI Validators • Software that creates a local “validated cache” with all the valid ROAs - Downloads the RPKI repository from the RIRs - Validates the chain of trust of all the ROAs and associated CAs - Talks to your routers using the RPKI-RTR Protocol
  • 44. 44 Relying Party RIPE NCC ARIN APNIC AFRINIC LACNIC Validator Repository Repository Repository Repository Repository List of ROAs Cerfificates
  • 46. 46 Relying Party ROA AS111 10.0.7.30/22 AS222 10.0.6.10/24 AS333 10.4.17.5/20 AS111 10.0.7.30/22 AS111 10.0.7.30/22 AS111 10.0.7.30/22 BGP Announcements BETTER ROUTING DECISIONS
  • 47. 47 RIPE NCC Validator • https://github.com/RIPE-NCC/rpki-validator • Version 3.1 • Java-based, web interface, white-list functionality • Can speak RPKI-RTR
  • 48. 48 Alternatives • All are open source: - Routinator - https://github.com/NLnetLabs/ routinator/ - FORT - https://github.com/NICMx/FORT-validator/ - OctoRPKI - https://github.com/cloudflare/cfrpki - RPKI-client - https://rpki-client.org/ - Prover - https://github.com/lolepezy/rpki-prover - Rpstir2 - https://github.com/bgpsecurity/rpstir2
  • 50. 50 Two elements of RPKI Signing Create your ROAs Validating Verifying others
  • 51. 51 ROA Validation • Routers receive data from the validated cache via RPKI-RTR • Based on this and on BGP announcements, you have to make decisions - Accept or discard the BGP Announcement - As temporary measure, you could influence other attributes, such as Local Preference
  • 52. 52 ROAs ROAs ROA Validation BGP Validation VALID INVALID VALID INVALID UNKNOWN NOT FOUND
  • 53. 53 Invalid ROA • Invalid ROA - The ROA in the repository cannot be validated by the client (ISP) so it is not included in the validated cache • Invalid BGP announcement - There is a ROA in validated cache for that prefix but for a different AS. - Or the max length doesn’t match. • If no ROA in the cache then announcement is “unknown”
  • 54. 54 Whitelisting • If there is an invalid ROA for a network that’s important for you or your customers, you can whitelist it • This is done on your local validator software - It creates a “fake” ROA for the resources you want • It allows you to contact the operator to fix their ROA - Think of e-mail, contact forms, etc…
  • 56. Status of RPKI ROV Name Type Details Status Telia Transit Signed & Filtering Safe Cogent Transit Signed & Filtering Safe GTT Transit Signed & Filtering Safe NTT Transit Signed & Filtering Safe Hurricane Electric Transit Signed & Filtering Safe Tata Transit Signed & Filtering Safe PCCW Transit Signed & Filtering Safe RETN Transit Partially Signed & Filtering Safe Cloud fl are Cloud Signed & Filtering Safe Amazon Cloud Signed & Filtering Safe Net fl ix Cloud Signed & Filtering Safe Wikimedia Foundation Cloud Signed & Filtering Safe Scaleway Cloud Signed & Filtering Safe • Source: isbgpsafeyet.com
  • 57. 57 Where do we go from here ? • RPKI is only one of the steps towards full BGP Validation - Paths are not validated • We need more building blocks - BGPSec (RFC) - ASPA (draft) - AS-Cones (draft)