SlideShare ist ein Scribd-Unternehmen logo
1 von 52
1
Internet Number Registry Services
the Next Generation
RDAP and RPKI
Overview
• What are registry services
• Today’s registry services
• Registration Data Access Protocol (RDAP)
• Resource Public Key Infrastructure (RPKI)
But first…
https://stats.labs.apnic.net/ipv6
Congratulations TW!
https://stats.labs.apnic.net/ipv6
Overview
• What are registry services
• Today’s registry services
• Registration Data Access Protocol (RDAP)
• Resource Public Key Infrastructure (RPKI)
What are registries
• Organisations running registry services
 With authority for registration of some “Public Resource”
• Public databases describing status of resources
 Land titles, vehicle registrations, phone numbers
 Domain Names
 Internet Number Resources (INRs) – IPv4, IPv4, ASNs
• Internet address Registries
 RIRs, NIRs, LIRs
 Authoritative registry/database function
 Public registry service function
Registry services
• whois
 Query service on TCP port 43 (RFC 812, 1982)
 Public registry lookup service
 Very simple, limited service
 Query and response are not standardised
• Registration Data Access Protocol (RDAP) (NEW since 2015)
 API for access to “whois” registry data
 Automation, AAA, i18N, redirection, extensibility
• Resource Public Key Infrastructure (RPKI) (since 2010)
 PKI for INRs
 Cryptographically verifiable “ownership” of INRs
 Mechanism for authorisation to route IPv4/v6 blocks
8
whois
whois at APNIC
9
registry
database
CLI
web UI
whois port 43
RPSL
whois command line
10
$ whois -h whois.apnic.net 210.17.9.242
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '210.17.0.0 - 210.17.127.255'
% Abuse contact for '210.17.0.0 - 210.17.127.255' is 'ethanchen@taiwanmobile.com'
inetnum: 210.17.0.0 - 210.17.127.255
netname: TTN-TW
descr: Taiwan Telecommunication Network Services Co.,LTD.
descr: 110 , 8F , No 89 , Sung Jen RD , Taipei
country: TW
admin-c: IP11-AP
tech-c: IP11-AP
remarks: service provider
mnt-by: MAINT-TW-TWNIC
mnt-irt: IRT-TFN-TW
mnt-lower: MAINT-TTN-AP
status: ALLOCATED PORTABLE
last-modified: 2011-06-01T04:13:58Z
source: APNIC
Query to port 43
“Blob” format
undefined
whois www interface
11
HTML wrapper
Same RPSL
response
Whois – limitations
• “blob” query and result formats
 Registry-specific questions and answers
 Automation is difficult
• No AAA model
 Built for public service only
• Most servers serve US-ASCII only
 i18n is undefined
• No redirection
 User/client must find the right server
12
13
RDAP
Registration Data Access Protocol
RDAP
• RDAP is the successor to the ageing WHOIS protocol.
• Like WHOIS, RDAP provides…
 Access to registration data: domain names, AS numbers, and IP addrs.
• Unlike WHOIS, RDAP provides…
 Structured request and response semantics;
 Differentiated access;
 Internationalisation;
 Redirection;
 Extensibility.*
* Source: RDAP.org
RDAP: designed for automation
• Query: REST
 REpresentational State Transfer - via HTTP
 Query defined within URL issued to RESTful server
 Inherits many useful features from HTTP/HTTPS
• Response: JSON
 JavaScript Object Notation
 Standardised text representation of structured data
 Translates directly into data types in modern programming languages
like JavaScript/HTML5, Java, Perl, Python, Ruby
RDAP
16
registry
database
port 80 / 443RDAP
web client
whowas
VizAS
…
whois port 43
JSON
RDAP JSON raw
17
$ curl http://rdap.apnic.net/ip/210.17.9.242
{"rdapConformance":["history_version_0","rdap_level_0"],"notices":[{"title":"Source","description":["Objects returned came from
source","APNIC"]},{"title":"Terms and Conditions","description":["This is the APNIC WHOIS Database query service. The objects are in
RDAP format."],"links":[{"value":"http://rdap.apnic.net/ip/210.17.9.242","rel":"terms-of-
service","href":"http://www.apnic.net/db/dbcopyright.html","type":"text/html"}]}],"country":"TW","events":[{"eventAction":"last
changed","eventDate":"2011-06-01T04:13:58Z"}],"name":"TTN-TW","remarks":[{"description":["Taiwan Telecommunication Network Services
Co.,LTD.","110 , 8F , No 89 , Sung Jen RD , Taipei"],"title":"description"},{"description":["service
provider"],"title":"remarks"}],"type":"ALLOCATED
PORTABLE","endAddress":"210.17.127.255","ipVersion":"v4","startAddress":"210.17.0.0","handle":"210.17.0.0 -
210.17.127.255","objectClassName":"ip
network","links":[{"value":"http://rdap.apnic.net/ip/210.17.9.242","rel":"self","href":"http://rdap.apnic.net/ip/210.17.0.0/17","type
":"application/rdap+json"}],"entities":[{"roles":["abuse"],"events":[{"eventAction":"last changed","eventDate":"2017-01-
22T22:54:59Z"}],"vcardArray":["vcard",[["version",{},"text","4.0"],["fn",{},"text","IRT-TFN-
TW"],["kind",{},"text","group"],["adr",{"label":"7F., No. 172-1, Sec. 2, Ji-Lung Rd.nTaipei City 106, Taiwan
R.O.C."},"text",["","","","","","",""]],["email",{},"text","ethanchen@taiwanmobile.com"],["email",{"pref":"1"},"text","ethanchen@taiw
anmobile.com"]]],"handle":"IRT-TFN-
TW","objectClassName":"entity","links":[{"value":"http://rdap.apnic.net/ip/210.17.9.242","rel":"self","href":"http://rdap.apnic.net/e
ntity/IRT-TFN-TW","type":"application/rdap+json"}]},{"roles":["administrative","technical"],"events":[{"eventAction":"last
changed","eventDate":"2011-12-06T00:10:19Z"}],"remarks":[{"description":["### Crime, Abuse , Spam , Security ###","CSC TEL : 0809-
000-188","CSC TEL : +886-2-4066-0357","abuse@tfn.com.tw","abuse@tfn.com.tw","### Crime, Abuse , Spam , Security
###"],"title":"remarks"}],"vcardArray":["vcard",[["version",{},"text","4.0"],["fn",{},"text","TTN IP-
Team"],["kind",{},"text","group"],["adr",{"label":"Taiwan Mobile Co., Ltd.nNetwork Assurance & Technical Support Div.n# Ex TTN
mergedn8F.,No 172-1, Sec 2, Ji-Lung RDnTaipei 106 Taiwan"},"text",["","","","","","",""]],["tel",{"type":"voice"},"text","+886-2-
6638-6888"],["tel",{"type":"fax"},"text","+886-2-6639-0607"],["email",{},"text","whois@ttn.com.tw"]]],"handle":"IP11-
AP","objectClassName":"entity","links":[{"value":"http://rdap.apnic.net/ip/210.17.9.242","rel":"self","href":"http://rdap.apnic.net/e
ntity/IP11-AP","type":"application/rdap+json"}]}],"port43":"whois.apnic.net"}
HTTP “get”
“Blob” but in
JSON format
RDAP JSON formatted
18
Browser plugin
Structured result
RDAP client
Web-based client
Processed result
RDAP client
RDAP access control
• REST allows for service differentiation
 General public vs authorised access
 Public vs privileged information
 Rate limiting etc
• Implemented using standard web authentication
 HTTP 1.1 “basic” and “digest” forms
 TLS with server/client certification
 Oauth, OpenID under development in IETF draft process
RDAP internationalisation
• RDAP content is UTF-8 encoded UNICODE
• Roles and contact information
 Defined using vCard RFC6868 (updated from 1998 RFC2425)
 Widely understood for contact information, mail systems
 Allows alternates, order preferences, language and character set
• Normally RDAP fetches all encodings
 Client gets to pick preference
 But server could use client “language hint” via HTTP
RDAP query redirection
• RDAP uses HTTP mechanism to redirect
 “302 redirect temporary” points to temporary URL for this query
 In case query is for resource that server knows is held elsewhere
• Globally coordinated redirection
 IANA registry of all delegations in RDAP with base URL
• Result: RDAP can find “most specific” registry
 No more “this record has moved” responses!
RDAP extensibility
• Oauth/OpenID under development
 Federated identity model, well supported in public internet
• RDAP Bulk (APNIC)
 Like WHOIS bulk download, so that comparable offline fetch of complete
records can be done efficiently.
 Will respect existing WHOIS bulk AUP restrictions on usage
• RDAP History (APNIC)
 Time sequenced set of records, to denote changes across time in RDAP
information
 Basis of the APNIC “WHOWAS” service
 Currently being promoted in standards at IETF
RDAP application (whowas)
25
Complex result
https://www.apnic.net/whowas
RDAP application (vizAS)
26
https://www.apnic.net/vizas
RDAP application (vizAS)
27
https://www.apnic.net/vizas
RDAP benefits
• Automation – JSON input to common programming languages
 Integration with firewall, NMS, IPAM…
• “Differentiated Access”
 If needed
• Speaks your language (and character set)
 Can implement server-side or in-client language preference
• One stop query
 Will auto-redirect to the right authoritative server
• Web protocol is CDN friendly
 Serve local, via anycast or DNS redirection methods
 Cacheable, survives DDoS longer since distributed
RDAP specifications
• RFC 7480 – HTTP Usage in RDAP
• RFC 7481 – Security Services for RDAP
• RFC 7482 – RDAP Query Format
• RFC 7483 – JSON Responses for RDAP
• RFC 7484 – Finding the Authoritative RDAP Service
• RFC 7485 – Inventory and Analysis of WHOIS Objects
APNIC RDAP Status
• First implemented May 2015
 Adjunct service query to WHOIS radix tree (in memory)
 Rewrote RPSL on-the-fly
• Re-implemented into WHOWAS Late 2016
 Static in-memory data model. Fast response
• Working with NIRs
 Hope to serve <nir>.rdap.apnic.net more-specific service
• APNIC region-wide consistent service model goal for 2019
 Working with NIRs and other RIRs
31
RPKI
Resource Public Key Infrastructure
RPKI
• RPKI is a public key infrastructure (PKI) framework,
designed to secure BGP routing
 Based on X.509 PKI standards
• RPKI adds INR information to X.509 certificates issued to
resource holders
 Representing “ownership” and other status
 Certification hierarchy follows INR delegation hierarchy
IANA ➔ RIR ➔ NIR ➔ ISP ➔ …
RPKI hierarchy
TWNIC CA
ISP EE ISP EE ISP EE ISP EE
IANA
CA
APNIC
CA
LACNIC
CA
RIPE- NCC
CA
ARIN
CA
AFRINIC
CA
RPKI objects
• Resource certificates
 Extension of standard X.509 certificates
 Providing authority to use given IPv4/6 and ASN resources
 Signed by issuing registry (serving as CA)
• Route Origin Authorisation (ROA)
 Giving an ASN authority to route specific IP blocks
 Signed by IP resource holder
• “Anysign”, “ghostbuster” and more…
 Other useful objects proposed and coming later
RPKI
35
registry
database
RPKI
RDAP x.509
ROA
whois
BGPsec
anysign
ROV
…
RPKI applications: ROV
• Route Origin Validation
AS17821
Announce:
203.176.32.0/19
Peer
?
RPKI: ROA
• Route Origin Authorization
 List of prefixes with ASN authorized to announce
 Signed by the prefix holder
• RPKI validates the integrity of the ROA
 It is provably created by the holder of the prefix
 Can now be used to construct route filters for prefix-OriginAS pair in BGP
Prefix 203.176.32.0/19
Max-length /24
Origin ASN AS17821
RPKI Validator
• Gathers and validates ROAs from the distributed RPKI databases
 Using rsync or RRDP (preferable)
 Maintains a validated cache representing complete global state
• Can then perform ROV for routers using RPKI-Router (RTR) protocol
rpki.apnic.net
IANA
APNIC RIPE
ISP ISP
rsync
RRDP
Validated
cache
Validator
ROV at Border Routers
ISP
Validated
cache
Validator
RPKI-to-Router (RTR)
ROV at IXP
Validated
cache
Validator
RPKI-to-Router (RTR)
Routes
Tagged/filtered
routes
RS
Route validation states
• Not Found (Unknown)
 No ROA found, probably not created yet
 This will be “default” for some time.
• Valid
 ROA exists
 Prefix, Origin ASN and prefix-length match those found in validated cache
• Invalid
 ROA exists
 Prefix found, but Origin ASN is wrong, Prefix-length longer than Max-length, or
certificates are expired or otherwise invalid.
 Some action needed
Action for invalid routes
• For inbound routes from upstreams/peers
 Drop them
 Give them lower LOCAL_PREF
 Do nothing (not recommended)
• For outbound routes to customers
 Tag them before re-distributing them to customers
 Allow customers to make their own choices
• Tagging (eg at IXPs)
 Apply community tags based on the validation state
 Not Found (ASN:65XX1)
 Valid (ASN:65XX2)
 Invalid (ASN:65XX3)
“Anysign” use case: LOA signing
• Take existing “letter of authority” practice
 Typically a scanned/signed PDF under company letterhead
 Unverifiable without more information
• Generate “detached signature” using RPKI
 Signing certificate includes specific INR
 Now a trustable letter of authority
• Pilot implementation
 In development at APNIC (via MyAPNIC)
 IETF draft in progress
RPKI specifications
• RFC3779 X. 509 Extensions for IP Addresses
and AS Identifiers
• RFC6480 Infrastructure to support secure routing
• RFC6481 Profile for repository structure
• RFC6482 Profile for Route Origin Authorisation
(ROA)
• RFC6483 Validation model
• RFC6484 Certificate Policy (CP) for RPKI
• RFC6485 Algorithms & Key sizes for RPKI
• RFC6486 Manifests for repositories in RPKI
• RFC6487 Profile for RPKI Certificates
• RFC6488 Signed object CMS template
• RFC6489 Key Rollover
• RFC6490 Trust Anchor Locator (TAL)
• RFC6492 RPKI Provisioning Protocol
• RFC7318 Policy Qualifiers in RPKI certificates
• RFC7382 Certificate Practice Statement (CPS)
• RFC8181 RPKI publication protocol
• RFC8182 RPKI Delta protocol (RRDP)
• RFC8183 Out-of-band RPKI setup protocol
• RFC8360 RPKI Validation Reconsidered
Some of over 42 RFCs on implementation of RPKI and BGPsec
45
RPKI at APNIC
RPKI Service Models
• Hosted model
 APNIC performs CA functions on behalf of members
 Manage keys, repository etc
 Generate certificates for resource delegations
 This “Member CA” is separate from the “APNIC CA”
• Provisioning model
 Member operates full RPKI system including CA
 Communication with APNIC via “up-down” provisioning protocol
 Either rsync (to be deprecated) or RRDP (preferred)
 This is live at JPNIC, CNNIC and TWNIC (IDNIC in progress)
RPKI Status – Global
Valid 10.05%
Invalid 0.79%
https://rpki-monitor.antd.nist.gov
RPKI Status – APNIC Region
Valid 5.10%
Invalid 0.94%
https://rpki-monitor.antd.nist.gov
RPKI participation – APNIC
Registry Number of
RPKI
particiants
Number with
ROAs
registered
% address space of
participant covered
by ROA (v4/v6)
% total space
covered
by ROA (v4/v6)
APNIC 1166 675 13.77% / 78.67% 3.54% / 0.12%
JPNIC 56 44 13.10% / 85.05% 1.56% / 21.00%
TWNIC 233 7 12.37% / 41.35% 3.98% / 2.89%
Total 1455 726 13.61% / 80.89% 3.10% / 0.33%
RPKI benefits
• Improved in-band verification of resource custodianship
 Much safer than manually checking whois or IRR database
 Ease of automation
• Secure Origin is the first step to preventing many attacks on BGP
integrity
 BGP Path remains a problem which is under development
 Related information such as IRR Policy can now leverage strong proofs
of validity (end the maintainer-authority problem in RADB/IRR)
• Instruction/information from the resource custodian can be
cryptographically verified (e.g. LOA signing)
How do I start?
• Create ROAs to better protect your own routes
 Encourage your peers/customers to do the same
 Encourage your IXP to implement ROV in the RS
• Then
 Set up route validation at your own border routers
 Using public or IXP validator, or your own
• APNIC members, use MyAPNIC
 We can help!
 Please contact APNIC Helpdesk
52
Thanks!
pwilson@apnic.net

Weitere ähnliche Inhalte

Was ist angesagt?

IPv6 in Cellular Networks
IPv6 in Cellular NetworksIPv6 in Cellular Networks
IPv6 in Cellular NetworksAPNIC
 
SANOG 34: Securing Internet Routing
SANOG 34: Securing Internet RoutingSANOG 34: Securing Internet Routing
SANOG 34: Securing Internet RoutingAPNIC
 
New gTLDs are coming! - ResellerClub Webinar
New gTLDs are coming! - ResellerClub WebinarNew gTLDs are coming! - ResellerClub Webinar
New gTLDs are coming! - ResellerClub WebinarResellerClub
 
Routing Registry Function Automation using RPKI & RPSL
Routing Registry Function Automation using RPKI & RPSLRouting Registry Function Automation using RPKI & RPSL
Routing Registry Function Automation using RPKI & RPSLAPNIC
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs APNIC
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itAPNIC
 
ICANN 51: IANA Department – Who, What, Why?"
ICANN 51: IANA Department – Who, What, Why?"ICANN 51: IANA Department – Who, What, Why?"
ICANN 51: IANA Department – Who, What, Why?"ICANN
 
Peering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for PeeringPeering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for PeeringAPNIC
 
APNIC Registry Improvements Update
APNIC Registry Improvements UpdateAPNIC Registry Improvements Update
APNIC Registry Improvements UpdateAPNIC
 
KPN ETL Factory (KETL) - Automated Code generation using Metadata to build Da...
KPN ETL Factory (KETL) - Automated Code generation using Metadata to build Da...KPN ETL Factory (KETL) - Automated Code generation using Metadata to build Da...
KPN ETL Factory (KETL) - Automated Code generation using Metadata to build Da...DataWorks Summit
 
Apache NiFi: latest developments for flow management at scale
Apache NiFi: latest developments for flow management at scaleApache NiFi: latest developments for flow management at scale
Apache NiFi: latest developments for flow management at scaleAbdelkrim Hadjidj
 
ICANN 50: New gTLD Registry Operator Engagement
ICANN 50: New gTLD Registry Operator EngagementICANN 50: New gTLD Registry Operator Engagement
ICANN 50: New gTLD Registry Operator EngagementICANN
 
Integrating NiFi and Flink
Integrating NiFi and FlinkIntegrating NiFi and Flink
Integrating NiFi and FlinkBryan Bende
 
KohaCon11: Integrating Koha with RFID system
KohaCon11: Integrating Koha with RFID systemKohaCon11: Integrating Koha with RFID system
KohaCon11: Integrating Koha with RFID systemDobrica Pavlinušić
 
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?PROIDEA
 
Abuse of DNS wildcards in China - from passiveDNS perspective
Abuse of DNS wildcards in China - from passiveDNS perspectiveAbuse of DNS wildcards in China - from passiveDNS perspective
Abuse of DNS wildcards in China - from passiveDNS perspectiveAPNIC
 
MiNiFi 0.0.1 MeetUp talk
MiNiFi 0.0.1 MeetUp talkMiNiFi 0.0.1 MeetUp talk
MiNiFi 0.0.1 MeetUp talkJoe Percivall
 
1 bonica tutorial_segment_routing
1 bonica tutorial_segment_routing1 bonica tutorial_segment_routing
1 bonica tutorial_segment_routinghptoga
 
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...akg1330
 

Was ist angesagt? (20)

IPv6 in Cellular Networks
IPv6 in Cellular NetworksIPv6 in Cellular Networks
IPv6 in Cellular Networks
 
SANOG 34: Securing Internet Routing
SANOG 34: Securing Internet RoutingSANOG 34: Securing Internet Routing
SANOG 34: Securing Internet Routing
 
New gTLDs are coming! - ResellerClub Webinar
New gTLDs are coming! - ResellerClub WebinarNew gTLDs are coming! - ResellerClub Webinar
New gTLDs are coming! - ResellerClub Webinar
 
Routing Registry Function Automation using RPKI & RPSL
Routing Registry Function Automation using RPKI & RPSLRouting Registry Function Automation using RPKI & RPSL
Routing Registry Function Automation using RPKI & RPSL
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs
 
Design patternsforiot
Design patternsforiotDesign patternsforiot
Design patternsforiot
 
HKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying itHKNOG 7.0: RPKI - it's time to start deploying it
HKNOG 7.0: RPKI - it's time to start deploying it
 
ICANN 51: IANA Department – Who, What, Why?"
ICANN 51: IANA Department – Who, What, Why?"ICANN 51: IANA Department – Who, What, Why?"
ICANN 51: IANA Department – Who, What, Why?"
 
Peering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for PeeringPeering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for Peering
 
APNIC Registry Improvements Update
APNIC Registry Improvements UpdateAPNIC Registry Improvements Update
APNIC Registry Improvements Update
 
KPN ETL Factory (KETL) - Automated Code generation using Metadata to build Da...
KPN ETL Factory (KETL) - Automated Code generation using Metadata to build Da...KPN ETL Factory (KETL) - Automated Code generation using Metadata to build Da...
KPN ETL Factory (KETL) - Automated Code generation using Metadata to build Da...
 
Apache NiFi: latest developments for flow management at scale
Apache NiFi: latest developments for flow management at scaleApache NiFi: latest developments for flow management at scale
Apache NiFi: latest developments for flow management at scale
 
ICANN 50: New gTLD Registry Operator Engagement
ICANN 50: New gTLD Registry Operator EngagementICANN 50: New gTLD Registry Operator Engagement
ICANN 50: New gTLD Registry Operator Engagement
 
Integrating NiFi and Flink
Integrating NiFi and FlinkIntegrating NiFi and Flink
Integrating NiFi and Flink
 
KohaCon11: Integrating Koha with RFID system
KohaCon11: Integrating Koha with RFID systemKohaCon11: Integrating Koha with RFID system
KohaCon11: Integrating Koha with RFID system
 
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
 
Abuse of DNS wildcards in China - from passiveDNS perspective
Abuse of DNS wildcards in China - from passiveDNS perspectiveAbuse of DNS wildcards in China - from passiveDNS perspective
Abuse of DNS wildcards in China - from passiveDNS perspective
 
MiNiFi 0.0.1 MeetUp talk
MiNiFi 0.0.1 MeetUp talkMiNiFi 0.0.1 MeetUp talk
MiNiFi 0.0.1 MeetUp talk
 
1 bonica tutorial_segment_routing
1 bonica tutorial_segment_routing1 bonica tutorial_segment_routing
1 bonica tutorial_segment_routing
 
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
 

Ähnlich wie 31st TWNC IP OPM and TWNOG: RDAP and RPKI

ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationAPNIC
 
MyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry ServicesMyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry ServicesAPNIC
 
Building Software Backend (Web API)
Building Software Backend (Web API)Building Software Backend (Web API)
Building Software Backend (Web API)Alexander Goida
 
Building high performance microservices in finance with Apache Thrift
Building high performance microservices in finance with Apache ThriftBuilding high performance microservices in finance with Apache Thrift
Building high performance microservices in finance with Apache ThriftRX-M Enterprises LLC
 
Advanced Web Development in PHP - Understanding REST API
Advanced Web Development in PHP - Understanding REST APIAdvanced Web Development in PHP - Understanding REST API
Advanced Web Development in PHP - Understanding REST APIRasan Samarasinghe
 
RPKI RTAs and RDAP Mirroring
RPKI RTAs and RDAP MirroringRPKI RTAs and RDAP Mirroring
RPKI RTAs and RDAP MirroringAPNIC
 
Best Practice in Web Service Design
Best Practice in Web Service DesignBest Practice in Web Service Design
Best Practice in Web Service DesignLorna Mitchell
 
REST and REST-fulness
REST and REST-fulnessREST and REST-fulness
REST and REST-fulnessDavid Waite
 
RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)Fakrul Alam
 
Registration data access protocol what's next? icann53
Registration data access protocol what's next? icann53Registration data access protocol what's next? icann53
Registration data access protocol what's next? icann53ICANN
 
Global IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementGlobal IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementAPNIC
 
Lantea platform
Lantea platformLantea platform
Lantea platformNeuzilla
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide WebAbhishek Kharbanda
 
Introduction to Restful Web Services
Introduction to Restful Web ServicesIntroduction to Restful Web Services
Introduction to Restful Web Servicesweili_at_slideshare
 
REST API Recommendations
REST API RecommendationsREST API Recommendations
REST API RecommendationsJeelani Shaik
 
Using Familiar BI Tools and Hadoop to Analyze Enterprise Networks
Using Familiar BI Tools and Hadoop to Analyze Enterprise NetworksUsing Familiar BI Tools and Hadoop to Analyze Enterprise Networks
Using Familiar BI Tools and Hadoop to Analyze Enterprise NetworksDataWorks Summit
 
IP based standards for IoT
IP based standards for IoTIP based standards for IoT
IP based standards for IoTMichael Koster
 
Pimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion UsersPimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion UsersForgeRock
 

Ähnlich wie 31st TWNC IP OPM and TWNOG: RDAP and RPKI (20)

ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
 
MyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry ServicesMyNOG 8: Next Generation Internet Number Registry Services
MyNOG 8: Next Generation Internet Number Registry Services
 
Building Software Backend (Web API)
Building Software Backend (Web API)Building Software Backend (Web API)
Building Software Backend (Web API)
 
Building high performance microservices in finance with Apache Thrift
Building high performance microservices in finance with Apache ThriftBuilding high performance microservices in finance with Apache Thrift
Building high performance microservices in finance with Apache Thrift
 
Advanced Web Development in PHP - Understanding REST API
Advanced Web Development in PHP - Understanding REST APIAdvanced Web Development in PHP - Understanding REST API
Advanced Web Development in PHP - Understanding REST API
 
RPKI RTAs and RDAP Mirroring
RPKI RTAs and RDAP MirroringRPKI RTAs and RDAP Mirroring
RPKI RTAs and RDAP Mirroring
 
Best Practice in Web Service Design
Best Practice in Web Service DesignBest Practice in Web Service Design
Best Practice in Web Service Design
 
REST and REST-fulness
REST and REST-fulnessREST and REST-fulness
REST and REST-fulness
 
RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)
 
Registration data access protocol what's next? icann53
Registration data access protocol what's next? icann53Registration data access protocol what's next? icann53
Registration data access protocol what's next? icann53
 
APIs enabling IoT
APIs enabling IoT APIs enabling IoT
APIs enabling IoT
 
Global IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementGlobal IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem Statement
 
Lantea platform
Lantea platformLantea platform
Lantea platform
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide Web
 
Introduction to Restful Web Services
Introduction to Restful Web ServicesIntroduction to Restful Web Services
Introduction to Restful Web Services
 
REST API Recommendations
REST API RecommendationsREST API Recommendations
REST API Recommendations
 
Using Familiar BI Tools and Hadoop to Analyze Enterprise Networks
Using Familiar BI Tools and Hadoop to Analyze Enterprise NetworksUsing Familiar BI Tools and Hadoop to Analyze Enterprise Networks
Using Familiar BI Tools and Hadoop to Analyze Enterprise Networks
 
Introduction to W3C Linked Data Platform
Introduction to W3C Linked Data PlatformIntroduction to W3C Linked Data Platform
Introduction to W3C Linked Data Platform
 
IP based standards for IoT
IP based standards for IoTIP based standards for IoT
IP based standards for IoT
 
Pimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion UsersPimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion Users
 

Mehr von APNIC

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 

Mehr von APNIC (20)

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 

Kürzlich hochgeladen

Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 

Kürzlich hochgeladen (20)

Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 

31st TWNC IP OPM and TWNOG: RDAP and RPKI

  • 1. 1 Internet Number Registry Services the Next Generation RDAP and RPKI
  • 2. Overview • What are registry services • Today’s registry services • Registration Data Access Protocol (RDAP) • Resource Public Key Infrastructure (RPKI)
  • 5. Overview • What are registry services • Today’s registry services • Registration Data Access Protocol (RDAP) • Resource Public Key Infrastructure (RPKI)
  • 6. What are registries • Organisations running registry services  With authority for registration of some “Public Resource” • Public databases describing status of resources  Land titles, vehicle registrations, phone numbers  Domain Names  Internet Number Resources (INRs) – IPv4, IPv4, ASNs • Internet address Registries  RIRs, NIRs, LIRs  Authoritative registry/database function  Public registry service function
  • 7. Registry services • whois  Query service on TCP port 43 (RFC 812, 1982)  Public registry lookup service  Very simple, limited service  Query and response are not standardised • Registration Data Access Protocol (RDAP) (NEW since 2015)  API for access to “whois” registry data  Automation, AAA, i18N, redirection, extensibility • Resource Public Key Infrastructure (RPKI) (since 2010)  PKI for INRs  Cryptographically verifiable “ownership” of INRs  Mechanism for authorisation to route IPv4/v6 blocks
  • 10. whois command line 10 $ whois -h whois.apnic.net 210.17.9.242 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html % Information related to '210.17.0.0 - 210.17.127.255' % Abuse contact for '210.17.0.0 - 210.17.127.255' is 'ethanchen@taiwanmobile.com' inetnum: 210.17.0.0 - 210.17.127.255 netname: TTN-TW descr: Taiwan Telecommunication Network Services Co.,LTD. descr: 110 , 8F , No 89 , Sung Jen RD , Taipei country: TW admin-c: IP11-AP tech-c: IP11-AP remarks: service provider mnt-by: MAINT-TW-TWNIC mnt-irt: IRT-TFN-TW mnt-lower: MAINT-TTN-AP status: ALLOCATED PORTABLE last-modified: 2011-06-01T04:13:58Z source: APNIC Query to port 43 “Blob” format undefined
  • 11. whois www interface 11 HTML wrapper Same RPSL response
  • 12. Whois – limitations • “blob” query and result formats  Registry-specific questions and answers  Automation is difficult • No AAA model  Built for public service only • Most servers serve US-ASCII only  i18n is undefined • No redirection  User/client must find the right server 12
  • 14. RDAP • RDAP is the successor to the ageing WHOIS protocol. • Like WHOIS, RDAP provides…  Access to registration data: domain names, AS numbers, and IP addrs. • Unlike WHOIS, RDAP provides…  Structured request and response semantics;  Differentiated access;  Internationalisation;  Redirection;  Extensibility.* * Source: RDAP.org
  • 15. RDAP: designed for automation • Query: REST  REpresentational State Transfer - via HTTP  Query defined within URL issued to RESTful server  Inherits many useful features from HTTP/HTTPS • Response: JSON  JavaScript Object Notation  Standardised text representation of structured data  Translates directly into data types in modern programming languages like JavaScript/HTML5, Java, Perl, Python, Ruby
  • 16. RDAP 16 registry database port 80 / 443RDAP web client whowas VizAS … whois port 43 JSON
  • 17. RDAP JSON raw 17 $ curl http://rdap.apnic.net/ip/210.17.9.242 {"rdapConformance":["history_version_0","rdap_level_0"],"notices":[{"title":"Source","description":["Objects returned came from source","APNIC"]},{"title":"Terms and Conditions","description":["This is the APNIC WHOIS Database query service. The objects are in RDAP format."],"links":[{"value":"http://rdap.apnic.net/ip/210.17.9.242","rel":"terms-of- service","href":"http://www.apnic.net/db/dbcopyright.html","type":"text/html"}]}],"country":"TW","events":[{"eventAction":"last changed","eventDate":"2011-06-01T04:13:58Z"}],"name":"TTN-TW","remarks":[{"description":["Taiwan Telecommunication Network Services Co.,LTD.","110 , 8F , No 89 , Sung Jen RD , Taipei"],"title":"description"},{"description":["service provider"],"title":"remarks"}],"type":"ALLOCATED PORTABLE","endAddress":"210.17.127.255","ipVersion":"v4","startAddress":"210.17.0.0","handle":"210.17.0.0 - 210.17.127.255","objectClassName":"ip network","links":[{"value":"http://rdap.apnic.net/ip/210.17.9.242","rel":"self","href":"http://rdap.apnic.net/ip/210.17.0.0/17","type ":"application/rdap+json"}],"entities":[{"roles":["abuse"],"events":[{"eventAction":"last changed","eventDate":"2017-01- 22T22:54:59Z"}],"vcardArray":["vcard",[["version",{},"text","4.0"],["fn",{},"text","IRT-TFN- TW"],["kind",{},"text","group"],["adr",{"label":"7F., No. 172-1, Sec. 2, Ji-Lung Rd.nTaipei City 106, Taiwan R.O.C."},"text",["","","","","","",""]],["email",{},"text","ethanchen@taiwanmobile.com"],["email",{"pref":"1"},"text","ethanchen@taiw anmobile.com"]]],"handle":"IRT-TFN- TW","objectClassName":"entity","links":[{"value":"http://rdap.apnic.net/ip/210.17.9.242","rel":"self","href":"http://rdap.apnic.net/e ntity/IRT-TFN-TW","type":"application/rdap+json"}]},{"roles":["administrative","technical"],"events":[{"eventAction":"last changed","eventDate":"2011-12-06T00:10:19Z"}],"remarks":[{"description":["### Crime, Abuse , Spam , Security ###","CSC TEL : 0809- 000-188","CSC TEL : +886-2-4066-0357","abuse@tfn.com.tw","abuse@tfn.com.tw","### Crime, Abuse , Spam , Security ###"],"title":"remarks"}],"vcardArray":["vcard",[["version",{},"text","4.0"],["fn",{},"text","TTN IP- Team"],["kind",{},"text","group"],["adr",{"label":"Taiwan Mobile Co., Ltd.nNetwork Assurance & Technical Support Div.n# Ex TTN mergedn8F.,No 172-1, Sec 2, Ji-Lung RDnTaipei 106 Taiwan"},"text",["","","","","","",""]],["tel",{"type":"voice"},"text","+886-2- 6638-6888"],["tel",{"type":"fax"},"text","+886-2-6639-0607"],["email",{},"text","whois@ttn.com.tw"]]],"handle":"IP11- AP","objectClassName":"entity","links":[{"value":"http://rdap.apnic.net/ip/210.17.9.242","rel":"self","href":"http://rdap.apnic.net/e ntity/IP11-AP","type":"application/rdap+json"}]}],"port43":"whois.apnic.net"} HTTP “get” “Blob” but in JSON format
  • 18. RDAP JSON formatted 18 Browser plugin Structured result
  • 21. RDAP access control • REST allows for service differentiation  General public vs authorised access  Public vs privileged information  Rate limiting etc • Implemented using standard web authentication  HTTP 1.1 “basic” and “digest” forms  TLS with server/client certification  Oauth, OpenID under development in IETF draft process
  • 22. RDAP internationalisation • RDAP content is UTF-8 encoded UNICODE • Roles and contact information  Defined using vCard RFC6868 (updated from 1998 RFC2425)  Widely understood for contact information, mail systems  Allows alternates, order preferences, language and character set • Normally RDAP fetches all encodings  Client gets to pick preference  But server could use client “language hint” via HTTP
  • 23. RDAP query redirection • RDAP uses HTTP mechanism to redirect  “302 redirect temporary” points to temporary URL for this query  In case query is for resource that server knows is held elsewhere • Globally coordinated redirection  IANA registry of all delegations in RDAP with base URL • Result: RDAP can find “most specific” registry  No more “this record has moved” responses!
  • 24. RDAP extensibility • Oauth/OpenID under development  Federated identity model, well supported in public internet • RDAP Bulk (APNIC)  Like WHOIS bulk download, so that comparable offline fetch of complete records can be done efficiently.  Will respect existing WHOIS bulk AUP restrictions on usage • RDAP History (APNIC)  Time sequenced set of records, to denote changes across time in RDAP information  Basis of the APNIC “WHOWAS” service  Currently being promoted in standards at IETF
  • 25. RDAP application (whowas) 25 Complex result https://www.apnic.net/whowas
  • 28. RDAP benefits • Automation – JSON input to common programming languages  Integration with firewall, NMS, IPAM… • “Differentiated Access”  If needed • Speaks your language (and character set)  Can implement server-side or in-client language preference • One stop query  Will auto-redirect to the right authoritative server • Web protocol is CDN friendly  Serve local, via anycast or DNS redirection methods  Cacheable, survives DDoS longer since distributed
  • 29. RDAP specifications • RFC 7480 – HTTP Usage in RDAP • RFC 7481 – Security Services for RDAP • RFC 7482 – RDAP Query Format • RFC 7483 – JSON Responses for RDAP • RFC 7484 – Finding the Authoritative RDAP Service • RFC 7485 – Inventory and Analysis of WHOIS Objects
  • 30. APNIC RDAP Status • First implemented May 2015  Adjunct service query to WHOIS radix tree (in memory)  Rewrote RPSL on-the-fly • Re-implemented into WHOWAS Late 2016  Static in-memory data model. Fast response • Working with NIRs  Hope to serve <nir>.rdap.apnic.net more-specific service • APNIC region-wide consistent service model goal for 2019  Working with NIRs and other RIRs
  • 31. 31 RPKI Resource Public Key Infrastructure
  • 32. RPKI • RPKI is a public key infrastructure (PKI) framework, designed to secure BGP routing  Based on X.509 PKI standards • RPKI adds INR information to X.509 certificates issued to resource holders  Representing “ownership” and other status  Certification hierarchy follows INR delegation hierarchy IANA ➔ RIR ➔ NIR ➔ ISP ➔ …
  • 33. RPKI hierarchy TWNIC CA ISP EE ISP EE ISP EE ISP EE IANA CA APNIC CA LACNIC CA RIPE- NCC CA ARIN CA AFRINIC CA
  • 34. RPKI objects • Resource certificates  Extension of standard X.509 certificates  Providing authority to use given IPv4/6 and ASN resources  Signed by issuing registry (serving as CA) • Route Origin Authorisation (ROA)  Giving an ASN authority to route specific IP blocks  Signed by IP resource holder • “Anysign”, “ghostbuster” and more…  Other useful objects proposed and coming later
  • 36. RPKI applications: ROV • Route Origin Validation AS17821 Announce: 203.176.32.0/19 Peer ?
  • 37. RPKI: ROA • Route Origin Authorization  List of prefixes with ASN authorized to announce  Signed by the prefix holder • RPKI validates the integrity of the ROA  It is provably created by the holder of the prefix  Can now be used to construct route filters for prefix-OriginAS pair in BGP Prefix 203.176.32.0/19 Max-length /24 Origin ASN AS17821
  • 38. RPKI Validator • Gathers and validates ROAs from the distributed RPKI databases  Using rsync or RRDP (preferable)  Maintains a validated cache representing complete global state • Can then perform ROV for routers using RPKI-Router (RTR) protocol rpki.apnic.net IANA APNIC RIPE ISP ISP rsync RRDP Validated cache Validator
  • 39. ROV at Border Routers ISP Validated cache Validator RPKI-to-Router (RTR)
  • 40. ROV at IXP Validated cache Validator RPKI-to-Router (RTR) Routes Tagged/filtered routes RS
  • 41. Route validation states • Not Found (Unknown)  No ROA found, probably not created yet  This will be “default” for some time. • Valid  ROA exists  Prefix, Origin ASN and prefix-length match those found in validated cache • Invalid  ROA exists  Prefix found, but Origin ASN is wrong, Prefix-length longer than Max-length, or certificates are expired or otherwise invalid.  Some action needed
  • 42. Action for invalid routes • For inbound routes from upstreams/peers  Drop them  Give them lower LOCAL_PREF  Do nothing (not recommended) • For outbound routes to customers  Tag them before re-distributing them to customers  Allow customers to make their own choices • Tagging (eg at IXPs)  Apply community tags based on the validation state  Not Found (ASN:65XX1)  Valid (ASN:65XX2)  Invalid (ASN:65XX3)
  • 43. “Anysign” use case: LOA signing • Take existing “letter of authority” practice  Typically a scanned/signed PDF under company letterhead  Unverifiable without more information • Generate “detached signature” using RPKI  Signing certificate includes specific INR  Now a trustable letter of authority • Pilot implementation  In development at APNIC (via MyAPNIC)  IETF draft in progress
  • 44. RPKI specifications • RFC3779 X. 509 Extensions for IP Addresses and AS Identifiers • RFC6480 Infrastructure to support secure routing • RFC6481 Profile for repository structure • RFC6482 Profile for Route Origin Authorisation (ROA) • RFC6483 Validation model • RFC6484 Certificate Policy (CP) for RPKI • RFC6485 Algorithms & Key sizes for RPKI • RFC6486 Manifests for repositories in RPKI • RFC6487 Profile for RPKI Certificates • RFC6488 Signed object CMS template • RFC6489 Key Rollover • RFC6490 Trust Anchor Locator (TAL) • RFC6492 RPKI Provisioning Protocol • RFC7318 Policy Qualifiers in RPKI certificates • RFC7382 Certificate Practice Statement (CPS) • RFC8181 RPKI publication protocol • RFC8182 RPKI Delta protocol (RRDP) • RFC8183 Out-of-band RPKI setup protocol • RFC8360 RPKI Validation Reconsidered Some of over 42 RFCs on implementation of RPKI and BGPsec
  • 46. RPKI Service Models • Hosted model  APNIC performs CA functions on behalf of members  Manage keys, repository etc  Generate certificates for resource delegations  This “Member CA” is separate from the “APNIC CA” • Provisioning model  Member operates full RPKI system including CA  Communication with APNIC via “up-down” provisioning protocol  Either rsync (to be deprecated) or RRDP (preferred)  This is live at JPNIC, CNNIC and TWNIC (IDNIC in progress)
  • 47. RPKI Status – Global Valid 10.05% Invalid 0.79% https://rpki-monitor.antd.nist.gov
  • 48. RPKI Status – APNIC Region Valid 5.10% Invalid 0.94% https://rpki-monitor.antd.nist.gov
  • 49. RPKI participation – APNIC Registry Number of RPKI particiants Number with ROAs registered % address space of participant covered by ROA (v4/v6) % total space covered by ROA (v4/v6) APNIC 1166 675 13.77% / 78.67% 3.54% / 0.12% JPNIC 56 44 13.10% / 85.05% 1.56% / 21.00% TWNIC 233 7 12.37% / 41.35% 3.98% / 2.89% Total 1455 726 13.61% / 80.89% 3.10% / 0.33%
  • 50. RPKI benefits • Improved in-band verification of resource custodianship  Much safer than manually checking whois or IRR database  Ease of automation • Secure Origin is the first step to preventing many attacks on BGP integrity  BGP Path remains a problem which is under development  Related information such as IRR Policy can now leverage strong proofs of validity (end the maintainer-authority problem in RADB/IRR) • Instruction/information from the resource custodian can be cryptographically verified (e.g. LOA signing)
  • 51. How do I start? • Create ROAs to better protect your own routes  Encourage your peers/customers to do the same  Encourage your IXP to implement ROV in the RS • Then  Set up route validation at your own border routers  Using public or IXP validator, or your own • APNIC members, use MyAPNIC  We can help!  Please contact APNIC Helpdesk

Hinweis der Redaktion

  1. “Registry” can refer to the organisation and the dataase that it operates. A Registry (organisation) operates a Registry (database)