SlideShare a Scribd company logo
1
Securing Internet
Routing
Tashi Phuntsho (tashi@apnic.net)
Senior Network Analyst/Technical Trainer
22
Why should we bother?
• As a Manager
– I don’t want to be front page news of a IT paper, or an
actual newspaper for routing errors
33
Headlines
https://twitter.com/atoonk/status/1143143943531454464/photo/1 https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/amp/
44
Headlines
https://blog.thousandeyes.com/internet-vulnerability-takes-down-
google/
55
Headlines
https://blog.cloudflare.com/bgp-leaks-and-crypto-currencies
66
Headlines
After (JP->JP)
https://dyn.com/blog/large-bgp-leak-by-google-disrupts-internet-in-japan/
Before (JP->JP)
77
Headlines
88
Why do we keep seeing these?
• Because NO ONE is in charge?
– No single authority model for the Internet
• No reference point for what’s right in routing
99
Why do we keep seeing these?
• Routing works by RUMOUR
– Tell what you know to your neighbors, and Learn what your
neighbors know
– Assume everyone is correct (and honest)
• Is the originating network the rightful owner?
1010
Why do we keep seeing these?
• Routing is VARIABLE
– The view of the network depends on where you are
• Different routing outcomes at different locations
– ~ no reference view to compare the local view L
1111
Why do we keep seeing these?
• Routing works in REVERSE
– Outbound advertisement affects inbound traffic
– Inbound (Accepted) advertisement influence outbound traffic
1212
Why do we keep seeing these?
• And as always, there is no E-bit
– a bad routing update does not identify itself as BAD
• RFC 3514 😉
• So tools/techniques try to identify GOOD updates
1313
Why should we worry?
• Because it’s just so easy to do bad in routing!
By Source (WP:NFCC#4), Fair use,
https://en.wikipedia.org/w/index.php?curid=42515224
1414
Why should we bother?
• As a Engineer
– I don’t want to be told at 3AM my routing is broken
1515
Current Practice
Peering/Transit
Request
LOA Check
Filters (in/out)
1616
Tools & Techniques
LOA Check
Whois
(manual)
Letter of
Authority
IRR (RPSL)
1717
Tools & Techniques
• Look up whois
– verify holder of a
resource
1818
Tools & Techniques
• Ask for a Letter of Authority
– Absolve from any liabilities
1919
Tools & Techniques
• Look up/ask to enter
details in IRR
– describes route origination
and inter-AS routing policies
2020
Tools & Techniques
• IRR
– Helps generate network (prefix &
as-path) filters using RPSL tools
• Filter out route advertisements not
described in the registry
2121
Tools & Techniques
• Problem(s) with IRR
– No single authority model
• How do I know if a RR entry is genuine and correct?
• How do I differentiate between a current and a lapsed entry?
– Many RRs
• If two RRs contain conflicting data, which one do I trust and use?
– Incomplete data - Not all resources are registered in an IRR
• If a route is not in a RR, is the route invalid or is the RR just missing
data?
– Scaling
• How do I apply IRR filters to upstream(s)?
2222
Back to basics – identify GOOD
• Using digital signatures to convey the “authority to
use”?
– A private key to sign the authority, and
– the public key to validate that authority
2323
How about trust?
• Follows the resource allocation/delegation hierarchy
IANA à RIRs à NIRs/LIRs à End Holders
|
V
End Holders
2424
Chain of Trust - RPKI
IANA
RIPE-NCCLACNICARIN APNICAFRINIC
NIR
ISP ISP ISP ISP
Allocation
Hierarchy
Trust Anchor
Certificate
Certificate
chain
mirrors the
allocation
hierarchy
Cert
(CA)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(CA)
Cert
(CA)
2525
Resource Certificates
• When an address holder A (*IRs) allocates
resources (IP address/ASN) to B (end holders)
– A issues a resource certificate that binds the allocated
address with B’s public key, all signed by A’s (CA) private
key
– proves the holder of the private key (B) is the legitimate
holder of the resource!
2626
Route Origin Authority
• B can now sign authorities using its private key,
– which can be validated by any third party against the TA
• For routing, the address holder can authorize a
network (ASN) to originate a route, and sign this
permission with its private key (ROA)
Prefix 202.144.128.0/19
Max-length /24
Origin ASN AS17660
2727
Filtering with ROAs – Route Origin Validation
RPKI-to-Router
(RtR)
rsync/RRDP
RPKI Validator/
RPKI Cache server
2406:6400::/32-48
17821
.1/:1
.2/:2
AS17821
ASXXXX
Global
(RPKI)
Repo
ROA
2406:6400::/32-48
17821
TA
TA
TA
2406:6400::/48
2828
Are ROAs enough?
• What if I forge the origin AS in the AS path?
– Would be accepted as “good” – pass origin validation!
• Which means, we need to secure the AS path as
well
– need AS path validation (per-prefix)
2929
AS-PATH validation (BGPsec)
– A BGPsec speaker validates the received update by checking:
• If there is a ROA that describes the prefix and origin AS, and
• If the received AS path can be validated as a chain of signatures (for each AS
in the AS path) using the AS keys
AS1 AS2
AS3
AS4
AS1 -> AS2
(Signed AS1)
AS1 -> AS2
(Signed AS1)
AS2->AS3
(signed AS2)
AS1 -> AS2
(Signed AS1)
AS2->AS4
(signed AS2)
3030
AS-PATH validation issues…
• More resources
– CPU - high crypto overhead to validate signatures, and
– Memory
• Updates in BGPsec would be per prefix – update packing??
• New attributes carrying signatures and certs/key-id for every AS in the
AS path
• How do we distribute the certificates required?
• Can we have partial adoption?
• Given so much overhead, can it do more - Route
leaks?
3131
So, what can we do?
• Basic BGP OpSec hygiene – RFC7454/RFC8212
– RFC 8212 – BGP default reject or something similar
– Filters with your customers and peers
• Prefix filters, Prefix limit
• AS-PATH filters, AS-PATH limit
• Use IRR objects (source option) or ROA-to-IRR
– Filter what you receive from your upstream(s)
– Create ROAs for your resources
– Filter inbound routes based on ROAs ~ ROV
• Join industry initiatives like MANRS
• https://www.manrs.org/
3232
Industry Trends
Dropping Invalids!
3333
Acknowledgement
• Geoff Huston, APNIC
• Randy Bush, IIJ Labs/Arrcus
34
THANK YOU

More Related Content

PDF
IDNOG 6: RQC and RPKI
PDF
SANOG 34: Internet number registry services - the next generation
PPTX
HKNOG 7.0: RPKI - it's time to start deploying it
PDF
APAN 50: RPKI industry trends and initiatives
PDF
Peering Asia 2.0: RPKI for Peering
PDF
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
PDF
Resource Public Key Infrastructure (RPKI)
IDNOG 6: RQC and RPKI
SANOG 34: Internet number registry services - the next generation
HKNOG 7.0: RPKI - it's time to start deploying it
APAN 50: RPKI industry trends and initiatives
Peering Asia 2.0: RPKI for Peering
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
Resource Public Key Infrastructure (RPKI)

What's hot (20)

PPTX
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
PDF
RPKI Certification Tutorial
PDF
BGP filtering best practice
PDF
RPKI Trust Anchor
PDF
PacNOG 23: Secure routing with RPKI
PDF
Resource Certification
PDF
Certification
PDF
RPKI Overview, Case Studies, Deployment and Operations
PDF
SANOG 33: APNIC Routing Registry and ROAs
PDF
RPKI (Resource Public Key Infrastructure)
PDF
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
PDF
mnNOG 2020: The Journey [100% ROA Coverage]
PDF
The Next Generation Internet Number Registry Services
PDF
BSides: BGP Hijacking and Secure Internet Routing
PDF
4th SDN Interest Group Seminar-Session 2-3(130313)
PDF
Route Hijaking and the role of RPKI
PDF
npNOG 5: Securing Internet Routing
PPTX
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
PDF
A week with analysing RPKI status
PDF
NZNOG 2019: The State of Routing (In)Security
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
RPKI Certification Tutorial
BGP filtering best practice
RPKI Trust Anchor
PacNOG 23: Secure routing with RPKI
Resource Certification
Certification
RPKI Overview, Case Studies, Deployment and Operations
SANOG 33: APNIC Routing Registry and ROAs
RPKI (Resource Public Key Infrastructure)
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
mnNOG 2020: The Journey [100% ROA Coverage]
The Next Generation Internet Number Registry Services
BSides: BGP Hijacking and Secure Internet Routing
4th SDN Interest Group Seminar-Session 2-3(130313)
Route Hijaking and the role of RPKI
npNOG 5: Securing Internet Routing
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
A week with analysing RPKI status
NZNOG 2019: The State of Routing (In)Security
Ad

Similar to SANOG 34: Securing Internet Routing (20)

PDF
mnNOG 1: Securing internet Routing
PDF
PacNOG 24: Securing Internet Routing
PDF
VNIXNOG 2019: Securing Internet Routing
PDF
btNOG 6: Securing Internet Routing
PDF
MMIX Peering Forum: Securing Internet Routing
PDF
BKNIX Peering Forum 2019: Securing Internet Routing
PDF
IAA Life in Lockdown series: Securing Internet Routing
PDF
PacNOG 29: Routing security is more than RPKI
PDF
Routing Security
PDF
RPKI
PDF
36th TWNIC OPM: BGP security threats and challenges
PDF
NZNOG 2022: Routing Security
PPTX
Rpki -manrs_(7_september)
PDF
Routing Security Roadmap
PDF
Routing Security in 2017 – We can do better!
PDF
Rpki with rpki.net tools
PDF
PCTA e-Tech Show 2021: Securing Internet Routing
PDF
Securing BGP with RPKI - Ondřej Caletka, RIPE NCC
PPTX
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
PDF
Routing Security, Another Elephant in the Room
mnNOG 1: Securing internet Routing
PacNOG 24: Securing Internet Routing
VNIXNOG 2019: Securing Internet Routing
btNOG 6: Securing Internet Routing
MMIX Peering Forum: Securing Internet Routing
BKNIX Peering Forum 2019: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet Routing
PacNOG 29: Routing security is more than RPKI
Routing Security
RPKI
36th TWNIC OPM: BGP security threats and challenges
NZNOG 2022: Routing Security
Rpki -manrs_(7_september)
Routing Security Roadmap
Routing Security in 2017 – We can do better!
Rpki with rpki.net tools
PCTA e-Tech Show 2021: Securing Internet Routing
Securing BGP with RPKI - Ondřej Caletka, RIPE NCC
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Routing Security, Another Elephant in the Room
Ad

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
DNSSEC Made Easy, presented at PHNOG 2025
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
PDF
The Internet - By the numbers, presented at npNOG 11
PDF
Transmission Control Protocol (TCP) and Starlink
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
PDF
Make DDoS expensive for the threat actors
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
APNIC Report, presented at APAN 60 by Thy Boskovic
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
Triggering QUIC, presented by Geoff Huston at IETF 123
DNSSEC Made Easy, presented at PHNOG 2025
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
IPv6 Deployment and Best Practices, presented by Makito Lay
Cleaning up your RPKI invalids, presented at PacNOG 35
The Internet - By the numbers, presented at npNOG 11
Transmission Control Protocol (TCP) and Starlink
DDoS in India, presented at INNOG 8 by Dave Phelan
Global Networking Trends, presented at the India ISP Conclave 2025
Make DDoS expensive for the threat actors
Fast Reroute in SR-MPLS, presented at bdNOG 19
DDos Mitigation Strategie, presented at bdNOG 19
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Measuring Starlink Protocol Performance, presented at LACNIC 43

Recently uploaded (20)

PPTX
Internet___Basics___Styled_ presentation
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPT
Ethics in Information System - Management Information System
DOCX
Unit-3 cyber security network security of internet system
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
Funds Management Learning Material for Beg
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
artificial intelligence overview of it and more
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Digital Literacy And Online Safety on internet
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
Internet___Basics___Styled_ presentation
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Sims 4 Historia para lo sims 4 para jugar
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Power Point - Lesson 3_2.pptx grad school presentation
250152213-Excitation-SystemWERRT (1).ppt
t_and_OpenAI_Combined_two_pressentations
SASE Traffic Flow - ZTNA Connector-1.pdf
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Ethics in Information System - Management Information System
Unit-3 cyber security network security of internet system
E -tech empowerment technologies PowerPoint
Introduction to cybersecurity and digital nettiquette
Funds Management Learning Material for Beg
Design_with_Watersergyerge45hrbgre4top (1).ppt
Unit-1 introduction to cyber security discuss about how to secure a system
artificial intelligence overview of it and more
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Digital Literacy And Online Safety on internet
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt

SANOG 34: Securing Internet Routing