AusNOG 2023: RPKI and whois updates

APNIC
APNICAPNIC
1
AusNOG 2023
RPKI and Whois Updates:
RSCs, ASPAs, NRTMv4, RDAP
2
2
What is an RSC?
• RPKI Signed Checklist
• Defined in RFC 9323
• The specification provides for:
• signing one or more arbitrary files using an RPKI certificate
• packaging the signature, filenames, and hashes into an object
(the RSC itself)
• verifying the signature (i.e. “these files were signed by somebody
with authority to route 192.0.2.0/24”)
3
3
Why is it useful?
• Arbitrary files can be signed
• More flexible than existing RPKI functions
• Supports ad hoc/people-driven processes
• No need to publish in a public repository
• Associated business operations can remain
private
4
4
Use cases
• BYOIP services
• Third-party databases
• Custom RPKI applications
5
5
BYOIP services
• Support use of RIR-delegated IP addresses for BGP
announcements in cloud infrastructure
• RSCs can help to streamline the registration process
6
6
⋯
1. Get token from portal
2. Make RSC with token
3. Upload RSC to portal
4. Make ROA
7
7
Third-party databases
• Acting as cross-RIR interfaces for specific use cases (e.g.
peering)
• RSCs can be used to prove resource holdership
8
8
Custom RPKI applications
• Define new object type and use RSCs for
signing/packaging
• Useful for testing/prototyping, or for use within a closed
group of participants
• No need to go through IETF process
9
9
Current status
• Specification published in November 2022
• https://www.rfc-editor.org/rfc/rfc9323.txt
• Production code
• https://www.rpki-client.org
• Proof-of-concept code
• https://github.com/APNIC-net/rpki-rsc-demo
• https://github.com/job/draft-rpki-checklists
• https://github.com/benmaddison/rpkimancer
• APNIC implementing in early 2024
• Deferred from Q2 of this year
• In-principle support from other RIRs
10
10
What is an ASPA?
• Autonomous System Provider Authorization
• Defined in two documents:
 draft-ietf-sidrops-aspa-profile
 draft-ietf-sidrops-aspa-verification
• The specifications provide for:
• an ASN holder signing an object that defines its upstream ASes
• a network operator using that data to verify the AS_PATH of a
received route
11
11
Why is it useful?
• Detect and mitigate route leaks
• Compare ROV, which is about the origin only
• Protect against certain types of
forged-origin/forged-path attacks
• Attacker must resort to longer AS paths for
route to be accepted
12
12
Upstream validation
• 1. If AS path has single entry
• 2. If AS path contains hop
from provider to customer
• 3. If AS path contains hop
without ASPA
• 4. Otherwise, all hops are
from customer to provider
13
13
Upstream validation examples (1)
• Single-element AS
path
• ASPA state not
relevant
• Not possible for it to
be a route leak
AS1
AS
This AS is the
upstream, receiving
the route
•
Arrows indicate AS path, from origin through peers
•
Blue box contains route: only the AS path is relevant to
ASPA validation, so the prefix is omitted
•
Black arrow: ASPA state between the two ASNs is
irrelevant
14
14
Upstream validation examples (2)
• Two-element AS
path
• No ASPAs
• Unable to
determine validity
AS1
AS
AS2
•
Blue line: no ASPA for
customer-provider pair
15
15
Upstream validation examples (3)
• Two-element AS
path
• ASPA exists for AS1
(origin)
• Able to determine
validity
AS1
AS
AS2
AS Providers
AS1 AS2
•
Within route, higher
ASes are providers for
lower ASes
•
Green line: ASPA
exists for customer-
provider pair
ASPAs
16
16
Upstream validation examples (4)
AS
• Two-element AS path
• ASPA exists for AS1
(origin), but disclaims
AS2 as provider
• Able to determine
validity
AS1
AS2
AS Providers
AS1 AS3
•
Red line: ASPA exists
for customer, but does
not contain provider
ASN
ASPAs
17
17
Downstream validation
• 1. If AS path has:
 Up-ramp, customer(s) through provider(s)
 Down-ramp, provider(s) through customer(s)
 No hops in the middle, or single lateral hop
• 2. If AS path contains ‘valley’ (hop from provider to
customer, then from customer to provider)
• 3. Otherwise, unable to determine validity
18
18
Downstream validation examples (1)
• Single-element AS
path
• ASPA state not
relevant
• Not possible for it to
be a route leak
AS1
AS
This AS is the
downstream,
receiving the
route
19
19
Downstream validation examples (2)
• Two-element AS
path
• No ASPAs
• Not possible for it
to be a route leak
AS1
AS
AS2
20
20
Downstream validation examples (3)
• Three-element AS
path
• No ASPAs
• Unable to
determine validity
AS1
AS
AS2
AS3
21
21
Downstream validation examples (4)
• Three-element
AS path
• ASPA exists for
AS1 (origin)
• Route leak not
possible
AS1
AS
AS2
AS3
AS Providers
AS1 AS2
ASPAs
22
22
Downstream validation examples (5)
• Three-element
AS path
• ASPA exists for
AS3 (neighbour)
• Route leak not
possible
AS1
AS
AS2
AS3
AS Providers
AS3 AS2
Within route, lower ASes
are customers of higher
ASes
ASPAs
23
23
Downstream validation examples (6)
• Three-element
AS path
• ASPAs exist for
AS1 and AS3
• Route leak not
possible
AS1
AS
AS2
AS3
AS Providers
AS1 AS2
AS3 AS2
ASPAs
24
24
Downstream validation examples (7)
• Three-element AS
path
• AS0 ASPA now
exists for AS2, to
indicate absence of
providers
• Route leak not
possible
AS1
AS
AS2
AS3
AS Providers
AS1 AS2
AS2 AS0
AS3 AS2
ASPAs
25
25
Downstream validation examples (8)
• Three-element AS
path
• AS1 ASPA exists,
but does not
include AS2
• Route leak still
not possible
AS1
AS
AS2
AS3
AS Providers
AS1 AS4
AS3 AS2
ASPAs
26
26
Downstream validation examples (9)
• Three-element AS
path
• AS1 ASPA exists, but
does not include AS2
• No AS3 ASPA
• Unable to determine
validity status
AS Providers
AS1 AS4
ASPAs AS1
AS
AS2
AS3
27
27
Downstream validation examples (10)
• Three-element AS
path
• AS1 and AS3
ASPAs both
present, but neither
lists AS2
• Route leak
AS1
AS
AS2
AS3
AS Providers
AS1 AS4
AS3 AS5
ASPAs
28
28
Downstream validation examples (11)
• Four-element AS
path
• Valley from AS2 to
AS3 (customer) to
AS4 indicates route
leak
AS1
AS
AS2
AS3
AS4
AS Providers
AS1 AS2
AS2 AS0
AS3 AS2, AS4
AS4 AS0
ASPAs
29
29
Forged-origin/path attacks
• Attacker uses correct origin (AS1), but inserts own ASN into the AS path
immediately after the origin
• If AS1 has registered an ASPA, and AS2 (target recipient) receives route
over lateral peer, AS2 will classify the route as invalid
• Attacker can evade this by adding a valid upstream ASN after the origin and
before its own ASN
• But if the ASN that is added also has an ASPA, then the attacker needs to
add more ASNs until it reaches an ASN without an ASPA
• Plus, this all makes the path longer, and the route less likely to be
used/preferred
30
30
Risks
• “If I turn this on, do I get more helpdesk calls?”
• A single mistaken ASPA change can invalidate all routes
that pass through the affected AS
• But the damage here is akin to the relevant AS
disappearing: if it’s a SPOF today, it will be a SPOF with
ASPA enabled
• Also, ASPAs for apex ASes have no effect in practice: it’s
not possible to invalidate routes by way of changes to such
ASPAs
31
31
Current status
• Specifications currently in IETF Working
Group Last Call
• Production code
• Krill (CA)
• Routinator (RP)
• rpki-client (RP)
• OpenBGPD (router)
• NIST BGP-SRx (router)
• (No Cisco/Juniper/similar yet)
• RIPE provide API for creating ASPA objects in
the localcert.ripe.net environment (test)
• APNIC planning to implement hosted CA
functionality in 2024
32
32
What is NRTMv4?
• Near Real Time Mirroring (v4)
• Defined in draft-ietf-grow-nrtm-v4
• Provides for maintaining a local, up-to-date (< 10 minutes)
copy of a remote Whois/IRR database:
• RADb, RIPE, APNIC, etc.
• Successor to earlier, less formal versions of NRTM
33
33
Why is it useful?
$ whois -hnrtm.apnic.net -p43003 -- -g APNIC:3:11088811-11088812
% How to use this server http://www.apnic.net/db/
%START Version: 3 APNIC 11088811-11088812 FILTERED
ADD
inetnum: 123.243.122.216 - 123.243.122.219
netname: TPGInternetPtyLtd
descr: TPG Internet Pty Ltd.
...
last-modified: 2023-06-30T03:44:27Z
source: APNIC
DEL
inetnum: 14.201.196.140 - 14.201.196.143
netname: TPGInternetPtyLtd
descr: TPG Internet Pty Ltd.
...
last-modified: 2023-06-28T01:16:39Z
source: APNIC
%END APNIC
$
• NRTM v3 and earlier have various
shortcomings
• Ad hoc response structuring
• Underspecified:
• No formal documentation
• Error states not clear
• End of stream not clear
• Initial state not handled in-band
• Sync failure requires manual
intervention
34
34
Why is it useful?
$ curl -s https://nrtm-rc.db.ripe.net/nrtmv4/RIPE/update-
notification-file.json | jq .
{
"nrtm_version": 4,
"timestamp": "2023-06-30T00:06:00Z",
"type": "notification",
"source": "RIPE",
"session_id": "912dbc2b-3d9a-4731-81a3-fd03f10afa67",
"version": 5,
"snapshot": {
"version": 5,
"url": "https://nrtm-rc.db.ripe.net/nrtmv4/RIPE/nrtm-
snapshot.5.RIPE.912dbc2b-3d9a-4731-81a3-
fd03f10afa67.4720f594658f35d29f3106da47096242.json.gz",
"hash":
"36ba8e20b36f03514d314e660b390cfc2f0a248e9516d7de869a4577c7e
5d072"
},
"deltas": []
}
$
• NRTMv4 addresses these
problems
• HTTP/JSON
• Standardised via IETF
• All data is signed
• Based on RRDP: snapshots
available in-band
35
35
Current status
• Specification currently being worked on in
IETF Global Routing Operations (grow) WG
• Proof-of-concept code
• https://github.com/RIPE-NCC/whois
• https://github.com/petchells/nrtm4client
• RIPE provide public test service
• Developed by IRRd v4 maintainer, so will be
implemented there as well
• IRRd used by e.g. RADb
• Depending on interest, APNIC will deploy
based on RIPE’s implementation
36
36
RDAP updates: RIR RDAP profile
• Available at
https://www.iana.org/assignments/rdap-extensions/rdap-extensions.
xhtml
• Implemented by all RIRs except LACNIC, who plan to implement
later this year
• Ensures cross-RIR consistency
• Redirects
• Resource status
• Contact data formatting/elements
37
37
RDAP updates: reverse search
draft-ietf-regext-rdap-reverse-search
• Supports operations like finding resources
associated with a given contact
• Most RIRs provide this functionality today via their
Whois services
38
38
RDAP updates: RIR search
draft-ietf-regext-rdap-rir-search
• Basic IP/ASN search
• Reverse search extensions for IP/ASN records
• Searches for more-specific and less-specific
resources
39
Questions?
1 de 39

Recomendados

4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: RPKI Updates - RSCs... por
4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: RPKI Updates - RSCs...4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: RPKI Updates - RSCs...
4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: RPKI Updates - RSCs...APNIC
211 vistas28 diapositivas
Internet Routing Registry and RPKI Tutorial, by Nurul Islam Roman [APNIC 38] por
Internet Routing Registry and RPKI Tutorial, by Nurul Islam Roman [APNIC 38]Internet Routing Registry and RPKI Tutorial, by Nurul Islam Roman [APNIC 38]
Internet Routing Registry and RPKI Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
1.7K vistas81 diapositivas
32nd TWNIC IP OPM: ROA+ROV deployment & industry development por
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry developmentAPNIC
398 vistas37 diapositivas
Internet Routing Registry Tutorial, by Nurul Islam Roman [APRICOT 2015] por
Internet Routing Registry Tutorial, by Nurul Islam Roman [APRICOT 2015]Internet Routing Registry Tutorial, by Nurul Islam Roman [APRICOT 2015]
Internet Routing Registry Tutorial, by Nurul Islam Roman [APRICOT 2015]APNIC
2.5K vistas79 diapositivas
IRR Tutorial and RPKI Demo por
IRR Tutorial and RPKI DemoIRR Tutorial and RPKI Demo
IRR Tutorial and RPKI DemoAPNIC
2.4K vistas105 diapositivas
E rou01 routing_basics por
E rou01 routing_basicsE rou01 routing_basics
E rou01 routing_basicstanawan44
489 vistas37 diapositivas

Más contenido relacionado

Similar a AusNOG 2023: RPKI and whois updates

PacNOG 24: Securing Internet Routing por
PacNOG 24: Securing Internet RoutingPacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet RoutingAPNIC
260 vistas33 diapositivas
APAN 50: RPKI industry trends and initiatives por
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APNIC
796 vistas41 diapositivas
Wrou01 por
Wrou01Wrou01
Wrou01tanawan44
629 vistas292 diapositivas
Prefix Filtering BCP por
Prefix Filtering BCP Prefix Filtering BCP
Prefix Filtering BCP Bangladesh Network Operators Group
812 vistas32 diapositivas
btNOG 6: Securing Internet Routing por
btNOG 6: Securing Internet RoutingbtNOG 6: Securing Internet Routing
btNOG 6: Securing Internet RoutingAPNIC
215 vistas33 diapositivas
SANOG 34: Securing Internet Routing por
SANOG 34: Securing Internet RoutingSANOG 34: Securing Internet Routing
SANOG 34: Securing Internet RoutingAPNIC
418 vistas34 diapositivas

Similar a AusNOG 2023: RPKI and whois updates(20)

PacNOG 24: Securing Internet Routing por APNIC
PacNOG 24: Securing Internet RoutingPacNOG 24: Securing Internet Routing
PacNOG 24: Securing Internet Routing
APNIC260 vistas
APAN 50: RPKI industry trends and initiatives por APNIC
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives
APNIC796 vistas
btNOG 6: Securing Internet Routing por APNIC
btNOG 6: Securing Internet RoutingbtNOG 6: Securing Internet Routing
btNOG 6: Securing Internet Routing
APNIC215 vistas
SANOG 34: Securing Internet Routing por APNIC
SANOG 34: Securing Internet RoutingSANOG 34: Securing Internet Routing
SANOG 34: Securing Internet Routing
APNIC418 vistas
LkNOG 3: Securing Internet Routing por APNIC
LkNOG 3: Securing Internet RoutingLkNOG 3: Securing Internet Routing
LkNOG 3: Securing Internet Routing
APNIC337 vistas
Prefix Filtering Design Issues and Best Practise by Nurul Islam por MyNOG
Prefix Filtering Design Issues and Best Practise by Nurul IslamPrefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul Islam
MyNOG1.1K vistas
Routing Security Workshop por RIPE NCC
Routing Security WorkshopRouting Security Workshop
Routing Security Workshop
RIPE NCC958 vistas
mnNOG 1: Securing internet Routing por APNIC
mnNOG 1: Securing internet Routing mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing
APNIC588 vistas
RPKI Overview, Case Studies, Deployment and Operations por APNIC
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and Operations
APNIC183 vistas
Sips must die, die, die - about TLS usage in the SIP protocol por Olle E Johansson
Sips must die, die, die - about TLS usage in the SIP protocolSips must die, die, die - about TLS usage in the SIP protocol
Sips must die, die, die - about TLS usage in the SIP protocol
Olle E Johansson2.4K vistas
NANOG 80: Measuring RPKI Effectiveness por APNIC
NANOG 80: Measuring RPKI EffectivenessNANOG 80: Measuring RPKI Effectiveness
NANOG 80: Measuring RPKI Effectiveness
APNIC168 vistas
MMIX Peering Forum: Securing Internet Routing por APNIC
MMIX Peering Forum: Securing Internet RoutingMMIX Peering Forum: Securing Internet Routing
MMIX Peering Forum: Securing Internet Routing
APNIC264 vistas
Network protocols and vulnerabilities por G Prachi
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
G Prachi1.6K vistas
BGP Flexibility and Its Consequences por APNIC
BGP Flexibility and Its ConsequencesBGP Flexibility and Its Consequences
BGP Flexibility and Its Consequences
APNIC80 vistas
BGP Flexibility and its Consequences. por Qrator Labs
BGP Flexibility and its Consequences. BGP Flexibility and its Consequences.
BGP Flexibility and its Consequences.
Qrator Labs72 vistas
BKNIX Peering Forum 2019: Securing Internet Routing por APNIC
BKNIX Peering Forum 2019: Securing Internet RoutingBKNIX Peering Forum 2019: Securing Internet Routing
BKNIX Peering Forum 2019: Securing Internet Routing
APNIC277 vistas

Más de APNIC

IETF 118: Starlink Protocol Performance por
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
244 vistas22 diapositivas
HKNOG 12.0: RPKI Actions Required by HK Networks por
HKNOG 12.0: RPKI Actions Required by HK NetworksHKNOG 12.0: RPKI Actions Required by HK Networks
HKNOG 12.0: RPKI Actions Required by HK NetworksAPNIC
466 vistas26 diapositivas
KHNOG 5: RPKI Status Update por
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status UpdateAPNIC
401 vistas25 diapositivas
KHNOG 5: APNIC Services por
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC ServicesAPNIC
414 vistas15 diapositivas
PITA Strategy Forum 2023: Internet resilience por
PITA Strategy Forum 2023: Internet resiliencePITA Strategy Forum 2023: Internet resilience
PITA Strategy Forum 2023: Internet resilienceAPNIC
438 vistas7 diapositivas
SANOG 40: DDoS in South Asia por
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South AsiaAPNIC
350 vistas52 diapositivas

Más de APNIC(20)

IETF 118: Starlink Protocol Performance por APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC244 vistas
HKNOG 12.0: RPKI Actions Required by HK Networks por APNIC
HKNOG 12.0: RPKI Actions Required by HK NetworksHKNOG 12.0: RPKI Actions Required by HK Networks
HKNOG 12.0: RPKI Actions Required by HK Networks
APNIC466 vistas
KHNOG 5: RPKI Status Update por APNIC
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status Update
APNIC401 vistas
KHNOG 5: APNIC Services por APNIC
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC Services
APNIC414 vistas
PITA Strategy Forum 2023: Internet resilience por APNIC
PITA Strategy Forum 2023: Internet resiliencePITA Strategy Forum 2023: Internet resilience
PITA Strategy Forum 2023: Internet resilience
APNIC438 vistas
SANOG 40: DDoS in South Asia por APNIC
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South Asia
APNIC350 vistas
SANOG 40: RPKI in South Asia por APNIC
SANOG 40: RPKI in South AsiaSANOG 40: RPKI in South Asia
SANOG 40: RPKI in South Asia
APNIC351 vistas
RenasCON 2023: Learning from honeypots por APNIC
RenasCON 2023: Learning from honeypotsRenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypots
APNIC428 vistas
IGF 2023: DNS Privacy por APNIC
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
APNIC429 vistas
MNSEC Conference 2023: Mining Bots por APNIC
MNSEC Conference 2023: Mining BotsMNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining Bots
APNIC423 vistas
VNIX-NOG 2023: IPv6 Deployment in government networks por APNIC
VNIX-NOG 2023: IPv6 Deployment in government networksVNIX-NOG 2023: IPv6 Deployment in government networks
VNIX-NOG 2023: IPv6 Deployment in government networks
APNIC429 vistas
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids por APNIC
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalidsVNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids
APNIC424 vistas
SGNOG 10: IPv6 Insights in South East Asia por APNIC
SGNOG 10: IPv6 Insights in South East AsiaSGNOG 10: IPv6 Insights in South East Asia
SGNOG 10: IPv6 Insights in South East Asia
APNIC416 vistas
mnNOG 5: Open source SD-WAN por APNIC
mnNOG 5: Open source SD-WANmnNOG 5: Open source SD-WAN
mnNOG 5: Open source SD-WAN
APNIC482 vistas
mnNOG 2023: State of IPv6 in Mongolia por APNIC
mnNOG 2023: State of IPv6 in MongoliamnNOG 2023: State of IPv6 in Mongolia
mnNOG 2023: State of IPv6 in Mongolia
APNIC933 vistas
mnNOG 2023: On GEOs, LEOs and Starlink por APNIC
mnNOG 2023: On GEOs, LEOs and StarlinkmnNOG 2023: On GEOs, LEOs and Starlink
mnNOG 2023: On GEOs, LEOs and Starlink
APNIC496 vistas
AusNOG 2023: A quick look at QUIC por APNIC
AusNOG 2023: A quick look at QUICAusNOG 2023: A quick look at QUIC
AusNOG 2023: A quick look at QUIC
APNIC583 vistas
APrIGF 2023: Sustainability of Complementary Connectivity Initiatives por APNIC
APrIGF 2023: Sustainability of Complementary Connectivity InitiativesAPrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APNIC607 vistas
APAN 56: APNIC Report por APNIC
APAN 56: APNIC Report APAN 56: APNIC Report
APAN 56: APNIC Report
APNIC293 vistas
2023 NCIT: Introduction to Intrusion Detection por APNIC
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC172 vistas

Último

Is Entireweb better than Google por
Is Entireweb better than GoogleIs Entireweb better than Google
Is Entireweb better than Googlesebastianthomasbejan
12 vistas1 diapositiva
Building trust in our information ecosystem: who do we trust in an emergency por
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
98 vistas18 diapositivas
WEB 2.O TOOLS: Empowering education.pptx por
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 vistas16 diapositivas
How to think like a threat actor for Kubernetes.pptx por
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
5 vistas33 diapositivas
Marketing and Community Building in Web3 por
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
12 vistas64 diapositivas
DU Series - Day 4.pptx por
DU Series - Day 4.pptxDU Series - Day 4.pptx
DU Series - Day 4.pptxUiPathCommunity
100 vistas28 diapositivas

Último(11)

Building trust in our information ecosystem: who do we trust in an emergency por Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat98 vistas
How to think like a threat actor for Kubernetes.pptx por LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 vistas
Marketing and Community Building in Web3 por Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast12 vistas
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 por Infosec train
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
Infosec train9 vistas
UiPath Document Understanding_Day 3.pptx por UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity103 vistas
PORTFOLIO 1 (Bret Michael Pepito).pdf por brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04108 vistas
We see everywhere that many people are talking about technology.docx por ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 vistas

AusNOG 2023: RPKI and whois updates

  • 1. 1 AusNOG 2023 RPKI and Whois Updates: RSCs, ASPAs, NRTMv4, RDAP
  • 2. 2 2 What is an RSC? • RPKI Signed Checklist • Defined in RFC 9323 • The specification provides for: • signing one or more arbitrary files using an RPKI certificate • packaging the signature, filenames, and hashes into an object (the RSC itself) • verifying the signature (i.e. “these files were signed by somebody with authority to route 192.0.2.0/24”)
  • 3. 3 3 Why is it useful? • Arbitrary files can be signed • More flexible than existing RPKI functions • Supports ad hoc/people-driven processes • No need to publish in a public repository • Associated business operations can remain private
  • 4. 4 4 Use cases • BYOIP services • Third-party databases • Custom RPKI applications
  • 5. 5 5 BYOIP services • Support use of RIR-delegated IP addresses for BGP announcements in cloud infrastructure • RSCs can help to streamline the registration process
  • 6. 6 6 ⋯ 1. Get token from portal 2. Make RSC with token 3. Upload RSC to portal 4. Make ROA
  • 7. 7 7 Third-party databases • Acting as cross-RIR interfaces for specific use cases (e.g. peering) • RSCs can be used to prove resource holdership
  • 8. 8 8 Custom RPKI applications • Define new object type and use RSCs for signing/packaging • Useful for testing/prototyping, or for use within a closed group of participants • No need to go through IETF process
  • 9. 9 9 Current status • Specification published in November 2022 • https://www.rfc-editor.org/rfc/rfc9323.txt • Production code • https://www.rpki-client.org • Proof-of-concept code • https://github.com/APNIC-net/rpki-rsc-demo • https://github.com/job/draft-rpki-checklists • https://github.com/benmaddison/rpkimancer • APNIC implementing in early 2024 • Deferred from Q2 of this year • In-principle support from other RIRs
  • 10. 10 10 What is an ASPA? • Autonomous System Provider Authorization • Defined in two documents:  draft-ietf-sidrops-aspa-profile  draft-ietf-sidrops-aspa-verification • The specifications provide for: • an ASN holder signing an object that defines its upstream ASes • a network operator using that data to verify the AS_PATH of a received route
  • 11. 11 11 Why is it useful? • Detect and mitigate route leaks • Compare ROV, which is about the origin only • Protect against certain types of forged-origin/forged-path attacks • Attacker must resort to longer AS paths for route to be accepted
  • 12. 12 12 Upstream validation • 1. If AS path has single entry • 2. If AS path contains hop from provider to customer • 3. If AS path contains hop without ASPA • 4. Otherwise, all hops are from customer to provider
  • 13. 13 13 Upstream validation examples (1) • Single-element AS path • ASPA state not relevant • Not possible for it to be a route leak AS1 AS This AS is the upstream, receiving the route • Arrows indicate AS path, from origin through peers • Blue box contains route: only the AS path is relevant to ASPA validation, so the prefix is omitted • Black arrow: ASPA state between the two ASNs is irrelevant
  • 14. 14 14 Upstream validation examples (2) • Two-element AS path • No ASPAs • Unable to determine validity AS1 AS AS2 • Blue line: no ASPA for customer-provider pair
  • 15. 15 15 Upstream validation examples (3) • Two-element AS path • ASPA exists for AS1 (origin) • Able to determine validity AS1 AS AS2 AS Providers AS1 AS2 • Within route, higher ASes are providers for lower ASes • Green line: ASPA exists for customer- provider pair ASPAs
  • 16. 16 16 Upstream validation examples (4) AS • Two-element AS path • ASPA exists for AS1 (origin), but disclaims AS2 as provider • Able to determine validity AS1 AS2 AS Providers AS1 AS3 • Red line: ASPA exists for customer, but does not contain provider ASN ASPAs
  • 17. 17 17 Downstream validation • 1. If AS path has:  Up-ramp, customer(s) through provider(s)  Down-ramp, provider(s) through customer(s)  No hops in the middle, or single lateral hop • 2. If AS path contains ‘valley’ (hop from provider to customer, then from customer to provider) • 3. Otherwise, unable to determine validity
  • 18. 18 18 Downstream validation examples (1) • Single-element AS path • ASPA state not relevant • Not possible for it to be a route leak AS1 AS This AS is the downstream, receiving the route
  • 19. 19 19 Downstream validation examples (2) • Two-element AS path • No ASPAs • Not possible for it to be a route leak AS1 AS AS2
  • 20. 20 20 Downstream validation examples (3) • Three-element AS path • No ASPAs • Unable to determine validity AS1 AS AS2 AS3
  • 21. 21 21 Downstream validation examples (4) • Three-element AS path • ASPA exists for AS1 (origin) • Route leak not possible AS1 AS AS2 AS3 AS Providers AS1 AS2 ASPAs
  • 22. 22 22 Downstream validation examples (5) • Three-element AS path • ASPA exists for AS3 (neighbour) • Route leak not possible AS1 AS AS2 AS3 AS Providers AS3 AS2 Within route, lower ASes are customers of higher ASes ASPAs
  • 23. 23 23 Downstream validation examples (6) • Three-element AS path • ASPAs exist for AS1 and AS3 • Route leak not possible AS1 AS AS2 AS3 AS Providers AS1 AS2 AS3 AS2 ASPAs
  • 24. 24 24 Downstream validation examples (7) • Three-element AS path • AS0 ASPA now exists for AS2, to indicate absence of providers • Route leak not possible AS1 AS AS2 AS3 AS Providers AS1 AS2 AS2 AS0 AS3 AS2 ASPAs
  • 25. 25 25 Downstream validation examples (8) • Three-element AS path • AS1 ASPA exists, but does not include AS2 • Route leak still not possible AS1 AS AS2 AS3 AS Providers AS1 AS4 AS3 AS2 ASPAs
  • 26. 26 26 Downstream validation examples (9) • Three-element AS path • AS1 ASPA exists, but does not include AS2 • No AS3 ASPA • Unable to determine validity status AS Providers AS1 AS4 ASPAs AS1 AS AS2 AS3
  • 27. 27 27 Downstream validation examples (10) • Three-element AS path • AS1 and AS3 ASPAs both present, but neither lists AS2 • Route leak AS1 AS AS2 AS3 AS Providers AS1 AS4 AS3 AS5 ASPAs
  • 28. 28 28 Downstream validation examples (11) • Four-element AS path • Valley from AS2 to AS3 (customer) to AS4 indicates route leak AS1 AS AS2 AS3 AS4 AS Providers AS1 AS2 AS2 AS0 AS3 AS2, AS4 AS4 AS0 ASPAs
  • 29. 29 29 Forged-origin/path attacks • Attacker uses correct origin (AS1), but inserts own ASN into the AS path immediately after the origin • If AS1 has registered an ASPA, and AS2 (target recipient) receives route over lateral peer, AS2 will classify the route as invalid • Attacker can evade this by adding a valid upstream ASN after the origin and before its own ASN • But if the ASN that is added also has an ASPA, then the attacker needs to add more ASNs until it reaches an ASN without an ASPA • Plus, this all makes the path longer, and the route less likely to be used/preferred
  • 30. 30 30 Risks • “If I turn this on, do I get more helpdesk calls?” • A single mistaken ASPA change can invalidate all routes that pass through the affected AS • But the damage here is akin to the relevant AS disappearing: if it’s a SPOF today, it will be a SPOF with ASPA enabled • Also, ASPAs for apex ASes have no effect in practice: it’s not possible to invalidate routes by way of changes to such ASPAs
  • 31. 31 31 Current status • Specifications currently in IETF Working Group Last Call • Production code • Krill (CA) • Routinator (RP) • rpki-client (RP) • OpenBGPD (router) • NIST BGP-SRx (router) • (No Cisco/Juniper/similar yet) • RIPE provide API for creating ASPA objects in the localcert.ripe.net environment (test) • APNIC planning to implement hosted CA functionality in 2024
  • 32. 32 32 What is NRTMv4? • Near Real Time Mirroring (v4) • Defined in draft-ietf-grow-nrtm-v4 • Provides for maintaining a local, up-to-date (< 10 minutes) copy of a remote Whois/IRR database: • RADb, RIPE, APNIC, etc. • Successor to earlier, less formal versions of NRTM
  • 33. 33 33 Why is it useful? $ whois -hnrtm.apnic.net -p43003 -- -g APNIC:3:11088811-11088812 % How to use this server http://www.apnic.net/db/ %START Version: 3 APNIC 11088811-11088812 FILTERED ADD inetnum: 123.243.122.216 - 123.243.122.219 netname: TPGInternetPtyLtd descr: TPG Internet Pty Ltd. ... last-modified: 2023-06-30T03:44:27Z source: APNIC DEL inetnum: 14.201.196.140 - 14.201.196.143 netname: TPGInternetPtyLtd descr: TPG Internet Pty Ltd. ... last-modified: 2023-06-28T01:16:39Z source: APNIC %END APNIC $ • NRTM v3 and earlier have various shortcomings • Ad hoc response structuring • Underspecified: • No formal documentation • Error states not clear • End of stream not clear • Initial state not handled in-band • Sync failure requires manual intervention
  • 34. 34 34 Why is it useful? $ curl -s https://nrtm-rc.db.ripe.net/nrtmv4/RIPE/update- notification-file.json | jq . { "nrtm_version": 4, "timestamp": "2023-06-30T00:06:00Z", "type": "notification", "source": "RIPE", "session_id": "912dbc2b-3d9a-4731-81a3-fd03f10afa67", "version": 5, "snapshot": { "version": 5, "url": "https://nrtm-rc.db.ripe.net/nrtmv4/RIPE/nrtm- snapshot.5.RIPE.912dbc2b-3d9a-4731-81a3- fd03f10afa67.4720f594658f35d29f3106da47096242.json.gz", "hash": "36ba8e20b36f03514d314e660b390cfc2f0a248e9516d7de869a4577c7e 5d072" }, "deltas": [] } $ • NRTMv4 addresses these problems • HTTP/JSON • Standardised via IETF • All data is signed • Based on RRDP: snapshots available in-band
  • 35. 35 35 Current status • Specification currently being worked on in IETF Global Routing Operations (grow) WG • Proof-of-concept code • https://github.com/RIPE-NCC/whois • https://github.com/petchells/nrtm4client • RIPE provide public test service • Developed by IRRd v4 maintainer, so will be implemented there as well • IRRd used by e.g. RADb • Depending on interest, APNIC will deploy based on RIPE’s implementation
  • 36. 36 36 RDAP updates: RIR RDAP profile • Available at https://www.iana.org/assignments/rdap-extensions/rdap-extensions. xhtml • Implemented by all RIRs except LACNIC, who plan to implement later this year • Ensures cross-RIR consistency • Redirects • Resource status • Contact data formatting/elements
  • 37. 37 37 RDAP updates: reverse search draft-ietf-regext-rdap-reverse-search • Supports operations like finding resources associated with a given contact • Most RIRs provide this functionality today via their Whois services
  • 38. 38 38 RDAP updates: RIR search draft-ietf-regext-rdap-rir-search • Basic IP/ASN search • Reverse search extensions for IP/ASN records • Searches for more-specific and less-specific resources