SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
Resource Certification
Alex Band, Product Manager
DENIC Technical Meeting
Internet Routing
•   Routing is non-hierarchical, open and free
•   Freedom comes at a price:
     - You can announce any address block on your router
     - Route leaking happens frequently, impact is high

         Entire networks become unavailable
         -

     - Route hijacking is easy, as long as peers don’t filter




•   IPv4 address depletion may intensify issue


                                                               2
Digital Resource Certificates
•   Based on open IETF standards (sidr)
     - RFC 5280: X.509 PKI Certificates
     - RFC 3779: Extensions for IP Addresses and ASNs

•   Issued by the RIRs
•   States that an Internet number resource has
    been registered by the RIPE NCC
•   Do not list any identity information
     -   All resource information can be found in the registry


                                                                 3
What Certification offers
                        Certification
•   Proof of holdership
•   Secure Inter-Domain Routing
     -   Route Origin Authorisation
          -   Prefer certified routing
•   Resource transfers


•   Validation is the added value!


                                    Discuss Resource Certification At RIPE 61:

                                                                                4
The system

             certificate authority




                                    5
The system (2)
•   Accessible through the LIR Portal
•   Administrator grants access to users




                                           6
Proof of holdership




         •

         •

         •




                      7
Certificate validity
•   Certificate is linked to the registration status
•   Valid for 18 months after generating
•   Automatically renewed after 12 months




                                                      8
Route Origin Authorisation (ROA)




         •      fi
         •

         •




                                   9
ROA considerations
•   ROAs have a ‘maximum length’ option
     - Authorises AS to deaggregate to the point you specify
     - When not set, AS may only announce the whole prefix

         -   A more specific announcement will be ‘Invalid’
•   Before issuing a ROA for an address block
     - Ensure that any sub-allocations announced by others
         (e.g. customers) have ROAs in play
     - Otherwise, the announcements of sub-allocations

         with no ROAs will be ‘Invalid’


                                                               10
ROA Creation Demo




                    11
Publication of cryptographic objects
•   Each RIR has a public repository
     - Holds certificates, ROAs, CRLs and manifests
     - Refreshed at least every 24 hrs

•   Accessed using a Validation tool
     - Finds repository using a
         Trust Anchor Locator (TAL)
     - Communication via rsync

     - Builds up a local validated cache




                                                     15
Software Validation of Certificates and ROAs
•   Validators access publicly accessible repository
•   Three software tools available
     1. RIPE NCC Validator
        - Easy to set-up and use, limited feature set
     2. rcynic
     3. BBN Relying Party Software
        -   Complex set-up, but more options and flexibility


             http://ripe.net/certification/validation

                                                              16
BGPmon ROA validation service
•   Relies heavily on RIPE NCC Validator
     $ whois -h whois.bgpmon.net 200.7.86.0

     Prefix:               195.157.0.0/16
     Prefix description:   Netscalibur UK Ltd
     Country code:         GB
     Origin AS:            8426
     Origin AS Name:       CLARANET-AS ClaraNET
     RPKI status:          ROA validation successful

     $ whois -h whois.bgpmon.net " --roa 8426 195.157.0.0/16"

     0 - Valid
     ------------------------
     ROA Details
     ------------------------
     Origin ASN:       AS8426
     Not valid Before: 2011-01-01 13:56:21
     Not valid After: 2012-07-01 00:00:00
     Trust Anchor:     rpki.ripe.net
     Prefixes:         213.165.128.0/19
                       195.157.0.0/16
                       194.112.32.0/19                          17
Hardware Validation: RPKI-RTR Protocol
•   Routers won’t do actual validation
     - takes to many resources
     - talks to remote validator instead

     - asks if certain announcement is authorised

•   Validator answers authorisation question with:
     - Code 0: ROA found, validation succeeded
     - Code 1: No ROA found (resource not yet signed)

     - Code 2: ROA found, but validation failed




                                                        18
Hardware Validation: RPKI-RTR Protocol

                                            BGP
   validated             RPKI RTR
                                          Decision
    cache               PROTOCOL
                                          Process




               route-map validity-0
                 match rpki-invalid
                 drop
               route-map validity-1
                 match rpki-not-found
                 set localpref 50


               // valid defaults to 100


                                                     19
Hardware Validation: RPKI-RTR Protocol

                                              BGP
       validated         RPKI RTR
                                            Decision
        cache           PROTOCOL
                                            Process




•   Cisco roadmap has router validation for
    RLS12 / IOS-XR in 2011
•   Juniper is actively working on validation as well


                                                        20
Where are we now?

           After 1 Month

       234 LIRs are using the service
          and created 173 ROAs
           covering 469 prefixes

          40159 /24 IPv4 prefixes
        7340035 /48 IPv6 prefixes
                                        21
The road ahead
•   Enhance RIPE NCC Validator
•   Up / Down protocol
     - Run your own Certificate Authority
     - Allow PI holders to manage ROAs

     - Transfers between RIRs

         -   ERX space
•   ROA tools
     - Import using combination of IRR + BGP + Human
     - Receive alert if ROA does not match BGP



                                                       22
For information and announcements:
      http://ripe.net/certification




                                     23
Questions?

Más contenido relacionado

La actualidad más candente

TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
Robb Boyd
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
Cisco Service Provider
 
BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & James
Febrian ‎
 

La actualidad más candente (20)

Route Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsRoute Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for Operators
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing
 
RPKI: An Operator’s Implementation
RPKI: An Operator’s ImplementationRPKI: An Operator’s Implementation
RPKI: An Operator’s Implementation
 
TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
 
Segment routing in ISO-XR 5.2.2
Segment routing in ISO-XR 5.2.2Segment routing in ISO-XR 5.2.2
Segment routing in ISO-XR 5.2.2
 
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
 
BGP persistence
BGP persistenceBGP persistence
BGP persistence
 
Service Function Chaining with SRv6
Service Function Chaining with SRv6Service Function Chaining with SRv6
Service Function Chaining with SRv6
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
 
Routing Security - its importance and status in South Asia
Routing Security - its importance and status in South AsiaRouting Security - its importance and status in South Asia
Routing Security - its importance and status in South Asia
 
RPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and Operations
 
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
 
btNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIbtNOG 7: Measuring RPKI
btNOG 7: Measuring RPKI
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
PLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGate
PLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGatePLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGate
PLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGate
 
BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & James
 
APNIC Update
APNIC Update APNIC Update
APNIC Update
 
The Segment Routing Architecture (IEEE Globecom 2015)
The Segment Routing Architecture (IEEE Globecom 2015)The Segment Routing Architecture (IEEE Globecom 2015)
The Segment Routing Architecture (IEEE Globecom 2015)
 

Similar a Certification

Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
MyNOG
 

Similar a Certification (20)

Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)
 
Route Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS ApproachRoute Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS Approach
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying it
 
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
 
Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?
 
Peering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for PeeringPeering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for Peering
 
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
 
MyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry ServicesMyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry Services
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
 
Rpki with rpki.net tools
Rpki with rpki.net toolsRpki with rpki.net tools
Rpki with rpki.net tools
 
APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives APAN 50: RPKI industry trends and initiatives
APAN 50: RPKI industry trends and initiatives
 
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
 
Routing Security
Routing SecurityRouting Security
Routing Security
 
PhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the PhilippinesPhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the Philippines
 
RPKI RTAs and RDAP Mirroring
RPKI RTAs and RDAP MirroringRPKI RTAs and RDAP Mirroring
RPKI RTAs and RDAP Mirroring
 
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej WolskiPLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
 

Más de RIPE NCC

Más de RIPE NCC (20)

Navigating IP Addresses: Insights from your Regional Internet Registry
Navigating IP Addresses: Insights from your Regional Internet RegistryNavigating IP Addresses: Insights from your Regional Internet Registry
Navigating IP Addresses: Insights from your Regional Internet Registry
 
Traces of Power: Internet Governance and Climate Action
Traces of Power: Internet Governance and Climate ActionTraces of Power: Internet Governance and Climate Action
Traces of Power: Internet Governance and Climate Action
 
Governing Environmental Sustainability in Tech
Governing Environmental Sustainability in TechGoverning Environmental Sustainability in Tech
Governing Environmental Sustainability in Tech
 
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdfGerardo-Viviers-RPKI-presentation-DKNOG14.pdf
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
 
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RISLIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
 
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
Intro to RIPE and RIPE NCC: RIPE Atlas workshopIntro to RIPE and RIPE NCC: RIPE Atlas workshop
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
 
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
 
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
 
RIPE NCC Internet Measurement Tools
RIPE NCC Internet Measurement ToolsRIPE NCC Internet Measurement Tools
RIPE NCC Internet Measurement Tools
 
IPv6 in Central Europe and the Baltics
IPv6 in Central Europe and the BalticsIPv6 in Central Europe and the Baltics
IPv6 in Central Europe and the Baltics
 
RPKI For Routing Security
RPKI For Routing SecurityRPKI For Routing Security
RPKI For Routing Security
 
SEEDIG 8 - Alena Muravska RIPE NCC.pdf
SEEDIG 8 - Alena Muravska RIPE NCC.pdfSEEDIG 8 - Alena Muravska RIPE NCC.pdf
SEEDIG 8 - Alena Muravska RIPE NCC.pdf
 
Know Your Network: Why Every Network Operator Should Host RIPE Atlas
Know Your Network: Why Every Network Operator Should Host RIPE AtlasKnow Your Network: Why Every Network Operator Should Host RIPE Atlas
Know Your Network: Why Every Network Operator Should Host RIPE Atlas
 
Minimising Impact When Incidents Occur With RIPE Atlas
Minimising Impact When Incidents Occur With RIPE AtlasMinimising Impact When Incidents Occur With RIPE Atlas
Minimising Impact When Incidents Occur With RIPE Atlas
 
RIPE NCC Internet Measurement Services
RIPE NCC Internet Measurement ServicesRIPE NCC Internet Measurement Services
RIPE NCC Internet Measurement Services
 
Spotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasSpotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE Atlas
 
Spotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasSpotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE Atlas
 
Spotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasSpotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE Atlas
 
111 views of Swiss Internet Infrastructure
111 views of Swiss Internet Infrastructure111 views of Swiss Internet Infrastructure
111 views of Swiss Internet Infrastructure
 
The RIPE NCC’s View of IPv6 in Sweden
The RIPE NCC’s View of IPv6 in SwedenThe RIPE NCC’s View of IPv6 in Sweden
The RIPE NCC’s View of IPv6 in Sweden
 

Certification

  • 1. Resource Certification Alex Band, Product Manager DENIC Technical Meeting
  • 2. Internet Routing • Routing is non-hierarchical, open and free • Freedom comes at a price: - You can announce any address block on your router - Route leaking happens frequently, impact is high Entire networks become unavailable - - Route hijacking is easy, as long as peers don’t filter • IPv4 address depletion may intensify issue 2
  • 3. Digital Resource Certificates • Based on open IETF standards (sidr) - RFC 5280: X.509 PKI Certificates - RFC 3779: Extensions for IP Addresses and ASNs • Issued by the RIRs • States that an Internet number resource has been registered by the RIPE NCC • Do not list any identity information - All resource information can be found in the registry 3
  • 4. What Certification offers Certification • Proof of holdership • Secure Inter-Domain Routing - Route Origin Authorisation - Prefer certified routing • Resource transfers • Validation is the added value! Discuss Resource Certification At RIPE 61: 4
  • 5. The system certificate authority 5
  • 6. The system (2) • Accessible through the LIR Portal • Administrator grants access to users 6
  • 7. Proof of holdership • • • 7
  • 8. Certificate validity • Certificate is linked to the registration status • Valid for 18 months after generating • Automatically renewed after 12 months 8
  • 9. Route Origin Authorisation (ROA) • fi • • 9
  • 10. ROA considerations • ROAs have a ‘maximum length’ option - Authorises AS to deaggregate to the point you specify - When not set, AS may only announce the whole prefix - A more specific announcement will be ‘Invalid’ • Before issuing a ROA for an address block - Ensure that any sub-allocations announced by others (e.g. customers) have ROAs in play - Otherwise, the announcements of sub-allocations with no ROAs will be ‘Invalid’ 10
  • 12.
  • 13.
  • 14.
  • 15. Publication of cryptographic objects • Each RIR has a public repository - Holds certificates, ROAs, CRLs and manifests - Refreshed at least every 24 hrs • Accessed using a Validation tool - Finds repository using a Trust Anchor Locator (TAL) - Communication via rsync - Builds up a local validated cache 15
  • 16. Software Validation of Certificates and ROAs • Validators access publicly accessible repository • Three software tools available 1. RIPE NCC Validator - Easy to set-up and use, limited feature set 2. rcynic 3. BBN Relying Party Software - Complex set-up, but more options and flexibility http://ripe.net/certification/validation 16
  • 17. BGPmon ROA validation service • Relies heavily on RIPE NCC Validator $ whois -h whois.bgpmon.net 200.7.86.0 Prefix: 195.157.0.0/16 Prefix description: Netscalibur UK Ltd Country code: GB Origin AS: 8426 Origin AS Name: CLARANET-AS ClaraNET RPKI status: ROA validation successful $ whois -h whois.bgpmon.net " --roa 8426 195.157.0.0/16" 0 - Valid ------------------------ ROA Details ------------------------ Origin ASN: AS8426 Not valid Before: 2011-01-01 13:56:21 Not valid After: 2012-07-01 00:00:00 Trust Anchor: rpki.ripe.net Prefixes: 213.165.128.0/19 195.157.0.0/16 194.112.32.0/19 17
  • 18. Hardware Validation: RPKI-RTR Protocol • Routers won’t do actual validation - takes to many resources - talks to remote validator instead - asks if certain announcement is authorised • Validator answers authorisation question with: - Code 0: ROA found, validation succeeded - Code 1: No ROA found (resource not yet signed) - Code 2: ROA found, but validation failed 18
  • 19. Hardware Validation: RPKI-RTR Protocol BGP validated RPKI RTR Decision cache PROTOCOL Process route-map validity-0 match rpki-invalid drop route-map validity-1 match rpki-not-found set localpref 50 // valid defaults to 100 19
  • 20. Hardware Validation: RPKI-RTR Protocol BGP validated RPKI RTR Decision cache PROTOCOL Process • Cisco roadmap has router validation for RLS12 / IOS-XR in 2011 • Juniper is actively working on validation as well 20
  • 21. Where are we now? After 1 Month 234 LIRs are using the service and created 173 ROAs covering 469 prefixes 40159 /24 IPv4 prefixes 7340035 /48 IPv6 prefixes 21
  • 22. The road ahead • Enhance RIPE NCC Validator • Up / Down protocol - Run your own Certificate Authority - Allow PI holders to manage ROAs - Transfers between RIRs - ERX space • ROA tools - Import using combination of IRR + BGP + Human - Receive alert if ROA does not match BGP 22
  • 23. For information and announcements: http://ripe.net/certification 23