SlideShare a Scribd company logo
Routing Security Considerations
Job Snijders
NTT Communications / AS 2914
job@ntt.net
What is it we are doing here?
● Making money?
● Sharing a hallucination?
● Facilitation of communication?
● Whatever it is – disruptions cause harm
Agenda
peering considerations, let’s take a DNS server as example
Attack scenario walkthrough
Recommendations
Tools
Resources
Q & A
The internet keeps growing
2019, Source:
https://bgp.potaroo.net/as6447/
Also, the internet keeps connecting directly
4
2012 Source:
https://labs.ripe.net/Members/mirjam/update-on-as-path-lengths-over-time
Traditional benefits of peering / BGP anycasting
ccTLD
operato
r
Interme
diate
Provide
r
AS XXX
Google
AS
15169
Scenario through transit, AS_PATH is 2 hops: XXX_15169
ccTLD
operato
r
Google
AS
15169
Scenario with direct peering: AS_PATH is 1 hop: _15169$
● No dependency on the intermediate
provider (simpler operations)
● Simplified capacity management
● Good latency
● Spreading out DDoS absorption
● Etc etc
Hijack / misconfiguration scenario
ccTLD
Operato
r
Interme
diate
provide
rs
Google
AS
15169
Attacker
AS
15562
Interme
diate
provide
rs
Interme
diate
provide
rs
185.25.28.0/24
185.25.28.0/23
Paths from AS ccTLDASN perspective:
185.25.28.0/23 ccTLDASN_XXX_15169
185.25.28.0/23 ccTLDASN_YYY_15169
185.25.28.0/24 ccTLDASN_ZZZ_15562
(wins)
Hijack / misconfiguration scenario – direct peering
Google
AS
15169
Attacker
AS
15562
185.25.28.0/24
185.25.28.0/23
Paths from AS ccTLDASN perspective:
185.25.28.0/23 ccTLDASN_15169
185.25.28.0/24 ccTLDASN_15562 (wins)
ccTLD
Operato
r
Enter RPKI ROAs
Prefix: 185.25.28.0/23
Prefix description: Google
Country code: CH
Origin AS: 15169
Origin AS Name: GOOGLE - Google LLC, US
RPKI status: ROA validation successful
MaxLength: 23
First seen: 2016-01-08
Last seen: 2019-02-26
Seen by #peers: 40
Hijack / misconfiguration scenario – RPKI ROA
Google
AS
15169
Attacker
AS
15562
185.25.28.0/24
185.25.28.0/23
Paths from AS ccTLDASN perspective:
185.25.28.0/23 ccTLDASN_15169 (wins)
185.25.28.0/24 ccTLDASN_15562 (rejected, wrong prefix
length)
CcTLD operator applying “invalid == reject”
ccTLD
Operato
r
Change of tactics: announce same prefix
Google
AS
15169
Attacker
AS
15562
185.25.28.0/23
185.25.28.0/23
Paths from AS ccTLDASN perspective:
185.25.28.0/23 ccTLDASN_15169 (wins)
185.25.28.0/23 ccTLDASN_15562 (rejected, wrong Origin
ASN)
Cloudflare applying “invalid == reject”
ccTLD
Operato
r
Change of tactics: spoof origin: NOT EFFECTIVE!
Google
AS
15169
Attacker
AS
15562 185.25.28.0/23
185.25.28.0/23
Paths from AS ccTLDASN perspective:
185.25.28.0/23 ccTLDASN_15169 (wins)
185.25.28.0/23 ccTLDASN_15562_15169 (not shortest
AS_PATH)
Cloudflare applying “invalid == reject”
Spoofe
d
Google
AS
15169
ccTLD
Operato
r
Summary for ccTLD Operators
● RPKI based BGP Origin Validation protects you against other
people’s misconfigurations, Origin Validation blocks out
more-specifics (whether malicious or not).
● Shortest AS_PATH is now a security feature: keep peering
● Create ROAs for your own DNS prefixes to help others help
you
● Apply “Invalid = Reject” policies on your multi-homed nodes
● Ask your vendors (ISPs and IXPs) to perform Origin Validation
● Direct peering, combined with RPKI, is extremely strong!
RPKI based traffic analysis with pmacct
pmacct’s RPKI capabilities
● RFC 6811 Origin Validation procedure is applied
● Mark traffic based on Validation Status, without deploying
RPKI in your network
● This helps you understand the effects of rejecting “RPKI
invalid” announcements
● Pmacct version 1.7.3
Most importantly, pmacct recognises the 2 types
There are false positives which are:
● Unrecoverable, there is no alternative path
● Implicitly repaired, because there is a covering less-specific
valid or unknown route.
There are from NTT’s perspective no “Unrecoverable”
important destinations, and honestly if we deploy OV, we are
doing as they are asking us to do.
A view from AS 2914 / NTT’s global backbone
The path towards Origin Validation deployment
It is quite simple.
DEPLOY. NOW.
RPKI based BGP Origin Validation,
With “Invalid == reject” routing polices
Validator situation: very good
● NLNetlabs Routinator (rust, fast,)
● Cloudflare OctoRPKI / GoRTR (go, fast)
● OpenBSD rpki-client(1) (C, in private beta, most basic option)
● Dragon Research Labs RPKI Toolkit (Python + SQL)
● ZDNS’ RPSTIR (C language)
● RIPE NCC RPKI Validator version 3 (java, slowish, lots of
features)
Friends wrote a book, have a look
NLNetlabs made a website: rpki.readthedocs.io
RIPE Labs RPKI checker tool
https://www.ripe.net/s/rpki-test
RIPE Labs RPKI checker tool
https://www.ripe.net/s/rpki-test
Deployment update
•Cloudflare
•YYCIX
RPKI Deployment
•AT&T rejects invalids on peering sessions
•KPN / AS 286 rejects invalids on customer sessions
•Nordunet rejects invalids on all EBGP sessions
•Seacomm & Workonline drop invalids per April 2019
•INEX, AMS-IX, DE-CIX, France-IX, Netnod, MSK-IX
•XS4ALL, Redhosting, BIT, Atom86, Fusix, True, Amsio...
•You…. ?
Question everything!
Feel free to ask questions, ask for clarifications
If you don’t want to use the microphone, please email me
job@ntt.net
Network Engineers Without Borders!

More Related Content

PDF
mnNOG 2020: The Journey [100% ROA Coverage]
PDF
mnNOG 2: Measuring RPKI
PDF
BGP filtering best practice
PDF
NetMonitor - Network Monitoring Solution
PPTX
F5 Monitoring System (On Premise & Cloud Solution)
PDF
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
PDF
HKNOG 9.0: Measuring RPKI
PPTX
FastNetMon Advanced DDoS detection tool
mnNOG 2020: The Journey [100% ROA Coverage]
mnNOG 2: Measuring RPKI
BGP filtering best practice
NetMonitor - Network Monitoring Solution
F5 Monitoring System (On Premise & Cloud Solution)
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
HKNOG 9.0: Measuring RPKI
FastNetMon Advanced DDoS detection tool

What's hot (6)

ODP
C Cpres
PDF
The Considerations for Internet of Things @ 2017
PDF
Rpki with rpki.net tools
PDF
Introduction to gRPC
PDF
Thick Client Testing Basics
PDF
pfSense 2.4.4 Short Topic Miscellany - pfSense Hangout August 2018
C Cpres
The Considerations for Internet of Things @ 2017
Rpki with rpki.net tools
Introduction to gRPC
Thick Client Testing Basics
pfSense 2.4.4 Short Topic Miscellany - pfSense Hangout August 2018
Ad

Similar to Routing Security Considerations (20)

PDF
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
PDF
RPKI with rpki.net Tools
PDF
Improving the peering business case with RPKI
PDF
Route It Like It’s Hot: Scaling Payments Routing at American Express by Benja...
PDF
GÉANT TURN pilot
PDF
Better Than Best Effort at Bloomberg from ThousandEyes Connect
PDF
Building a Small DC
PDF
NANOG 80: Measuring RPKI Effectiveness
PDF
Building a Small Datacenter
PDF
Uber mobility - High Performance Networking
PDF
Computer network (7)
PPTX
HKNOG 7.0: RPKI - it's time to start deploying it
PDF
Disaster porn and the value of a generalist
PDF
presentation_5725_1534743837.pdf
PDF
Should I run my own RPKI Certificate Authority?
PDF
btNOG 6: Securing Internet Routing
PDF
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
PDF
Akka gRPC quick-guide
PDF
Akka gRPC quick-guide
PDF
Routing Security Roadmap
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
RPKI with rpki.net Tools
Improving the peering business case with RPKI
Route It Like It’s Hot: Scaling Payments Routing at American Express by Benja...
GÉANT TURN pilot
Better Than Best Effort at Bloomberg from ThousandEyes Connect
Building a Small DC
NANOG 80: Measuring RPKI Effectiveness
Building a Small Datacenter
Uber mobility - High Performance Networking
Computer network (7)
HKNOG 7.0: RPKI - it's time to start deploying it
Disaster porn and the value of a generalist
presentation_5725_1534743837.pdf
Should I run my own RPKI Certificate Authority?
btNOG 6: Securing Internet Routing
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
Akka gRPC quick-guide
Akka gRPC quick-guide
Routing Security Roadmap
Ad

More from CSUC - Consorci de Serveis Universitaris de Catalunya (20)

PDF
Novetats a l'Anella Científica, per Maria Isabel Gandia
PDF
IPCEI Cloud - Using European Open-Source Technologies to Build a Sovereign, M...
PDF
L'impacte geopolític a les TIC, per Genís Roca
PDF
Pirineus OnDemand: l'accés fàcil al càlcul científic del CSUC
PDF
Funcionament del servei de càlcul científic del CSUC
PDF
El servei de càlcul científic del CSUC: presentació
PPTX
RDM Training: Publish research data with the Research Data Repository
PPTX
Facilitar a gestão, a visibilidade e a reutilização dos dados de investigação...
PDF
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
PDF
Construint comunitat i governança: ​ el rol del CSUC en el cicle de vida de l...
PDF
Formació RDM: Publicar dades de recerca amb el Repositori de Dades de Recerca
PDF
Publica les teves dades de recerca al Repositori de Dades de Recerca
PDF
Com fer un pla de gestió de dades amb l'eiNa DMP (en català)
PDF
Los datos abiertos: movimiento en expansión
PDF
Dataverse as a FAIR Data Repository (Mercè Crosas)
PDF
From Automation to Autonomous Networks with AI
PDF
Jornada de presentació de les noves infraestructures de càlcul i emmagatzematge
PDF
Les subvencions del Departament de Cultura per a projectes relatius al patrim...
PDF
Presentació dels serveis d'eScire (patrocinador)
PDF
L'Arxiu Històric de la Biblioteca del Centre de Lectura de Reus
Novetats a l'Anella Científica, per Maria Isabel Gandia
IPCEI Cloud - Using European Open-Source Technologies to Build a Sovereign, M...
L'impacte geopolític a les TIC, per Genís Roca
Pirineus OnDemand: l'accés fàcil al càlcul científic del CSUC
Funcionament del servei de càlcul científic del CSUC
El servei de càlcul científic del CSUC: presentació
RDM Training: Publish research data with the Research Data Repository
Facilitar a gestão, a visibilidade e a reutilização dos dados de investigação...
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Construint comunitat i governança: ​ el rol del CSUC en el cicle de vida de l...
Formació RDM: Publicar dades de recerca amb el Repositori de Dades de Recerca
Publica les teves dades de recerca al Repositori de Dades de Recerca
Com fer un pla de gestió de dades amb l'eiNa DMP (en català)
Los datos abiertos: movimiento en expansión
Dataverse as a FAIR Data Repository (Mercè Crosas)
From Automation to Autonomous Networks with AI
Jornada de presentació de les noves infraestructures de càlcul i emmagatzematge
Les subvencions del Departament de Cultura per a projectes relatius al patrim...
Presentació dels serveis d'eScire (patrocinador)
L'Arxiu Històric de la Biblioteca del Centre de Lectura de Reus

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf

Routing Security Considerations

  • 1. Routing Security Considerations Job Snijders NTT Communications / AS 2914 job@ntt.net
  • 2. What is it we are doing here? ● Making money? ● Sharing a hallucination? ● Facilitation of communication? ● Whatever it is – disruptions cause harm
  • 3. Agenda peering considerations, let’s take a DNS server as example Attack scenario walkthrough Recommendations Tools Resources Q & A
  • 4. The internet keeps growing 2019, Source: https://bgp.potaroo.net/as6447/
  • 5. Also, the internet keeps connecting directly 4 2012 Source: https://labs.ripe.net/Members/mirjam/update-on-as-path-lengths-over-time
  • 6. Traditional benefits of peering / BGP anycasting ccTLD operato r Interme diate Provide r AS XXX Google AS 15169 Scenario through transit, AS_PATH is 2 hops: XXX_15169 ccTLD operato r Google AS 15169 Scenario with direct peering: AS_PATH is 1 hop: _15169$ ● No dependency on the intermediate provider (simpler operations) ● Simplified capacity management ● Good latency ● Spreading out DDoS absorption ● Etc etc
  • 7. Hijack / misconfiguration scenario ccTLD Operato r Interme diate provide rs Google AS 15169 Attacker AS 15562 Interme diate provide rs Interme diate provide rs 185.25.28.0/24 185.25.28.0/23 Paths from AS ccTLDASN perspective: 185.25.28.0/23 ccTLDASN_XXX_15169 185.25.28.0/23 ccTLDASN_YYY_15169 185.25.28.0/24 ccTLDASN_ZZZ_15562 (wins)
  • 8. Hijack / misconfiguration scenario – direct peering Google AS 15169 Attacker AS 15562 185.25.28.0/24 185.25.28.0/23 Paths from AS ccTLDASN perspective: 185.25.28.0/23 ccTLDASN_15169 185.25.28.0/24 ccTLDASN_15562 (wins) ccTLD Operato r
  • 9. Enter RPKI ROAs Prefix: 185.25.28.0/23 Prefix description: Google Country code: CH Origin AS: 15169 Origin AS Name: GOOGLE - Google LLC, US RPKI status: ROA validation successful MaxLength: 23 First seen: 2016-01-08 Last seen: 2019-02-26 Seen by #peers: 40
  • 10. Hijack / misconfiguration scenario – RPKI ROA Google AS 15169 Attacker AS 15562 185.25.28.0/24 185.25.28.0/23 Paths from AS ccTLDASN perspective: 185.25.28.0/23 ccTLDASN_15169 (wins) 185.25.28.0/24 ccTLDASN_15562 (rejected, wrong prefix length) CcTLD operator applying “invalid == reject” ccTLD Operato r
  • 11. Change of tactics: announce same prefix Google AS 15169 Attacker AS 15562 185.25.28.0/23 185.25.28.0/23 Paths from AS ccTLDASN perspective: 185.25.28.0/23 ccTLDASN_15169 (wins) 185.25.28.0/23 ccTLDASN_15562 (rejected, wrong Origin ASN) Cloudflare applying “invalid == reject” ccTLD Operato r
  • 12. Change of tactics: spoof origin: NOT EFFECTIVE! Google AS 15169 Attacker AS 15562 185.25.28.0/23 185.25.28.0/23 Paths from AS ccTLDASN perspective: 185.25.28.0/23 ccTLDASN_15169 (wins) 185.25.28.0/23 ccTLDASN_15562_15169 (not shortest AS_PATH) Cloudflare applying “invalid == reject” Spoofe d Google AS 15169 ccTLD Operato r
  • 13. Summary for ccTLD Operators ● RPKI based BGP Origin Validation protects you against other people’s misconfigurations, Origin Validation blocks out more-specifics (whether malicious or not). ● Shortest AS_PATH is now a security feature: keep peering ● Create ROAs for your own DNS prefixes to help others help you ● Apply “Invalid = Reject” policies on your multi-homed nodes ● Ask your vendors (ISPs and IXPs) to perform Origin Validation ● Direct peering, combined with RPKI, is extremely strong!
  • 14. RPKI based traffic analysis with pmacct
  • 15. pmacct’s RPKI capabilities ● RFC 6811 Origin Validation procedure is applied ● Mark traffic based on Validation Status, without deploying RPKI in your network ● This helps you understand the effects of rejecting “RPKI invalid” announcements ● Pmacct version 1.7.3
  • 16. Most importantly, pmacct recognises the 2 types There are false positives which are: ● Unrecoverable, there is no alternative path ● Implicitly repaired, because there is a covering less-specific valid or unknown route. There are from NTT’s perspective no “Unrecoverable” important destinations, and honestly if we deploy OV, we are doing as they are asking us to do.
  • 17. A view from AS 2914 / NTT’s global backbone
  • 18. The path towards Origin Validation deployment It is quite simple. DEPLOY. NOW. RPKI based BGP Origin Validation, With “Invalid == reject” routing polices
  • 19. Validator situation: very good ● NLNetlabs Routinator (rust, fast,) ● Cloudflare OctoRPKI / GoRTR (go, fast) ● OpenBSD rpki-client(1) (C, in private beta, most basic option) ● Dragon Research Labs RPKI Toolkit (Python + SQL) ● ZDNS’ RPSTIR (C language) ● RIPE NCC RPKI Validator version 3 (java, slowish, lots of features)
  • 20. Friends wrote a book, have a look
  • 21. NLNetlabs made a website: rpki.readthedocs.io
  • 22. RIPE Labs RPKI checker tool https://www.ripe.net/s/rpki-test
  • 23. RIPE Labs RPKI checker tool https://www.ripe.net/s/rpki-test
  • 25. RPKI Deployment •AT&T rejects invalids on peering sessions •KPN / AS 286 rejects invalids on customer sessions •Nordunet rejects invalids on all EBGP sessions •Seacomm & Workonline drop invalids per April 2019 •INEX, AMS-IX, DE-CIX, France-IX, Netnod, MSK-IX •XS4ALL, Redhosting, BIT, Atom86, Fusix, True, Amsio... •You…. ?
  • 26. Question everything! Feel free to ask questions, ask for clarifications If you don’t want to use the microphone, please email me job@ntt.net Network Engineers Without Borders!