SlideShare ist ein Scribd-Unternehmen logo
1 von 37
ROA+ROV Deployment
& Industry Development
Che-Hoo Cheng
APNIC
@TWNIC IP OPM 32
2019-06-20
Security matters as your network is
connecting to Internet
• You do NOT want your own routes to be hijacked by anyone, maliciously or
accidentally
• You also do NOT want to receive bad routing information from any of your
BGP neighbors or propagate bad routing information to any of them
• Basic measures include:
– Bogons and martians filtering
– Max prefix count
– IRR (Internet Routing Registry) database checking
– So on and so forth
• Additional measure should include:
– ROA (Route Origin Authorization) / ROV (Route Origin Validation)
Routing security is becoming more
important than ever
• Route-hijacking cases (malicious and accidental) are more and more
common
– Big incentive for hackers
• Hijack DNS, hijack websites, steal passwords and so on
– Misconfiguration does happen from time to time
• And, it is extremely easy to do route-hijacking, if protection measure is
not implemented
• A lot of route objects on IRR-DB are not authenticated properly and so
cannot be fully trusted
• Need better authenticity for routing info, i.e. need to make sure that the
route originators are the true “owners” of the relevant IP resources
Fat-finger / hijacks
• Quad101 related route (101.101.101/24) was hijacked by
AS268869 (FIBRA PLUS) for 3.5 mins on 8 May 2019
– https://blog.apnic.net/2019/05/30/public-dns-in-taiwan-the-latest-
victim-of-bgp-hijack/
– Origin AS should be AS131621 (TWNIC)
– Implication can be huge if anycast is not done well
Fat-finger / hijacks
• Amazon (AS16509) Route53 hijack – Apr 2018
– AS10279 (eNET) announced/originated more specifics (/24s) of
Amazon Route53’s prefix (205.251.192.0/21)
• 205.251.192.0/24 ……. 205.251.199.0/24
• https://ip-ranges.amazonaws.com/ip-ranges.json
– The motive?
• During the period, DNS servers in the hijacked range only responded to queries for
myetherwallet.com
• Responded with addresses associated with AS41995/AS48693
Fat-finger / hijacks
• Bharti (AS9498) originates 103.0.0.0/10
– Dec 2017 (~ 2 days)
– No noticeable damage done – more than 8K specific routes!
• YouTube (AS36561) Incident
– Feb 2008 (down for ~ 2 hours)
– PT (AS17557) announced 208.65.153.0/24 (208.65.152.0/22)
• Propagated by AS3491 (PCCW)
RPKI
• RPKI is a public key infrastructure (PKI) framework,
designed to secure BGP routing
– Based on X.509 PKI standards
• RPKI adds Internet number resources (INR) information to
X.509 certificates issued to resource holders
– Representing “ownership” and other status
– Certification hierarchy follows INR delegation hierarchy
IANA ➔ RIR (➔ NIR) ➔ ISP ➔ …
RPKI hierarchy
NIR CA
ISP EE ISP EE ISP EE ISP EE
IANA
CA
APNIC
CA
LACNIC
CA
RIPE- NCC
CA
ARIN
CA
AFRINIC
CA
RPKI service models
• Hosted model
– APNIC performs CA functions on behalf of members
– Manage keys, repository and so forth
– Generate certificates for resource delegations
– This “Member CA” is separate from the “APNIC CA”
• Provisioning model
– Member operates full RPKI system including CA
– Communication with APNIC via “up-down” provisioning protocol
• Either rsync (to be deprecated) or RRDP (preferred)
– This is live at JPNIC, CNNIC and TWNIC (IDNIC in progress)
RPKI objects
• Resource certificates
– Extension of standard X.509 certificates
– Providing authority to use given IPv4/6 and ASN resources
– Signed by issuing registry (serving as CA)
• Route Origin Authorization (ROA)
– Giving an ASN authority to route specific IP blocks
– Signed by IP resource holder
• “Anysign”, “ghostbuster” and more…
– Other useful objects proposed and coming later
RPKI & applications
11
registry
database
RPKI
RDAP x.509
ROA
whois
BGPsec
anysign
ROV
…
RPKI application: ROA
• Route Origin Authorization
– List of prefixes with ASN authorized to announce
– Signed by the prefix holder
• RPKI validates the integrity of the ROA
– It is provably created by the holder of the prefix
– Can now be used to construct route filters for prefix-OriginAS pair in BGP
• Multiple ROAs can exist for the same prefix
Prefix 203.176.32.0/19
Max-length /24
Origin ASN AS17821
Use of ROA: ROV
• Route Origin Validation
AS17821
Announce:
203.176.32.0/19
Peer/Upstream
?
RPKI validator
• Gathers and validates ROAs from the distributed RPKI databases
– Using rsync or RRDP (preferable)
– Maintains a validated cache representing complete global state
• Can then perform ROV for routers using RPKI-Router (RTR) protocol
rpki.apnic.net
IANA
APNIC RIPE
ISP ISP
rsync /
RRDP
Validated
cache
Validator
RPKI validator options
• Available validators
– Dragon Research toolkit
• https://github.com/dragonresearch/rpki.net
– RIPE validator :
• https://www.ripe.net/manage-ips-and-asns/resource-management/certification/tools-
and-resources
– Routinator
• https://github.com/NLnetLabs/routinator
– RTRlib (bird, FRR, Quagga…)
• https://rtrlib.realmv6.org/
Route validation states
• Not Found (Unknown)
– No ROA found, probably not created yet
– This will be “default” for some time.
• Valid
– ROA exists
– Prefix, Origin ASN and prefix-length match those found in validated cache
• Invalid
– ROA exists
– Prefix found, but Origin ASN is wrong, Prefix-length longer than Max-length, or
certificates are expired or otherwise invalid.
– Some action needed
ROV at border routers
ISP
Validated
cache
Validator
RPKI-to-Router (RTR)
Options when receiving invalid routes
• For End/Stub Networks:
– Drop them, OR
– Give them lower LOCAL_PREF, OR
– Do nothing (not recommended)
• For Transit Networks:
– For inbound routes from upstreams / peers:
• Give them lower LOCAL_PREF, OR
• Drop them, OR
• Do nothing (not recommended)
– For outbound routes to customers:
• Tag them before re-distributing them to customers and allow customers to make their
own choices
ROV at IXP – RS and/or shared validator
Validated
cache
Validator
RPKI-to-Router (RTR)
Routes
Tagged/filtered
routes
RS
ROV at IXP – RS usage options
• Similar to the case of Transit Networks
• Lower LOCAL_PREF, OR
• Filtering
– Do not advertise Invalid routes
– Need to publish on RS policy
• Tagging
– Apply community tags based on the validation state
• let individual member ASNs act on the validation states
– Example:
• Valid (ASN:65XX1)
• Not Found (ASN:65XX2)
• Invalid (ASN:65XX3)
ROV at IXP – Examples in Asia Pacific
• Shared validator provided by:
– JPNAP & BKNIX
• Other IXPs?
– IXPs are good locations to place shared validator as they are
just one hop away from their participants and they are mostly
trustable
– You may push your IXPs to support it to ease your burden of
setting up your own Validator/Cache
– IXP Manager SW (https://www.ixpmanager.org) now supports
easy ROV deployment on RS at IXPs
ROA+ROV – Why do we do it?
• Contribute to Global Routing Security
– Help reduce the effect of route hijacking or
misconfiguration
– Protect your own networks and your customers better
• Collaborative effort among network operators is
key
ROA+ROV is NOT a bullet-proof solution
• It is just one small step for improving routing security
• But it helps improve the situation for routing security,
especially if everybody does it
• Coupled with more and more direct peering, the protection
for routing security should be more effective
• Highly recommend doing full MANRS as well
ROA stats – global snapshot
• Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
ROA stats – global trend
• Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
ROA stats – APNIC region snapshot
• Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
ROA stats – APNIC region trend
• Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
ROAs in APNIC region
• Source (IPv4 prefixes covered): https://lirportal.ripe.net/certification/content/static/statistics/world-roas.html
ROA+ROV deployment steps
• Create your own ROAs at relevant registries to better
protect your own routes
– And encourage your peers/customers to do the same
– For APNIC members, it is easy to do it on MyAPNIC
• We can help!
• Please contact APNIC Helpdesk
• Next step is to set up route origin validation (ROV) at your border
routers
– Using public or IXP validator, or your own
• Do care about backup and resilience
– And ask your IXP/upstream providers to implement ROV
• Simple click to test your provider: https://ripe.net/s/rpki-test
Industry development on ROA+ROV
• NTT – IRR improvement favoring Route Objects with valid ROAs
• Cloudflare – Public validator service & invalid routes filtering
• AT&T – Invalid routes filtering on peering connections
• Netnod – Invalid routes filtering and favouring of valid routes on IXP Route
Servers
• AWS – BYOIP requires customers to set up ROAs
• Google – Will start to apply stricter filters to BGP announcements on all peering
sessions by Sep 2019, using RPKI data (ROAs) where available to validate IRR
data
• Big players are getting more and more serious with ROV…
Announcing invalid routes
• Will get to fewer and fewer networks on Internet
– Similar to being disconnected from bigger and bigger part of
Internet
• If it is just a mistake, updating the relevant ROA records
(supposedly with proper authority) will solve the problem
– Should always keep your ROA records updated
• All can be managed at one place so should be easy
– Can have ROA records for the same prefix under multiple Origin
ASes at one time to help the cases of network migration and so on
Incentives for creating ROAs
• To have basic protection of your own routes from being hijacked at
those networks which do ROV
• Industry push:
– NTT – IRR improvement favouring Route Objects with valid ROAs
– Netnod – Invalid routes filtering and favouring of valid routes on IXP Route
Servers
– AWS – BYOIP requires customers to set up ROAs
– Google – Will start to apply stricter filters to BGP announcements on all peering
sessions by Sep 2019, using RPKI data (ROAs) where available to validate
IRR data
• More will be coming…
– As a requirement for peering???
More about RPKI benefits
• Improved in-band verification of resource custodianship
– Much safer than manually checking whois or IRR database
– Ease of automation
• Secure Origin is the first step to preventing many attacks on BGP
integrity
– BGP Path remains a problem which is under development
– Related information such as IRR Policy can now leverage strong proofs
of validity (end the maintainer-authority problem in RADB/IRR)
• Instruction/information from the resource custodian can be
cryptographically verified (e.g. LOA signing)
Some useful references
• https://blog.cloudflare.com/rpki-details/
• https://nlnetlabs.nl/projects/rpki/faq/
• https://2019.apricot.net/assets/files/APKS756/apricot2019_snijders_routing_securit
y_roadmap_1551228895%20(2).pdf
• https://datatracker.ietf.org/meeting/100/materials/slides-100-sidrops-rpki-
deployment-with-ixps-01
• https://datatracker.ietf.org/meeting/90/materials/slides-90-opsec-0
• https://www.ripe.net/support/training/ripe-ncc-educa/presentations/use-cases-
stavros-konstantaras.pdf
• https://www.franceix.net/en/technical/france-ix-route-servers/
RPKI specifications
• RFC3779 X. 509 Extensions for IP Addresses
and AS Identifiers
• RFC6480 Infrastructure to support secure routing
• RFC6481 Profile for repository structure
• RFC6482 Profile for Route Origin Authorisation
(ROA)
• RFC6483 Validation model
• RFC6484 Certificate Policy (CP) for RPKI
• RFC6485 Algorithms & Key sizes for RPKI
• RFC6486 Manifests for repositories in RPKI
• RFC6487 Profile for RPKI Certificates
• RFC6488 Signed object CMS template
• RFC6489 Key Rollover
• RFC6490 Trust Anchor Locator (TAL)
• RFC6492 RPKI Provisioning Protocol
• RFC7318 Policy Qualifiers in RPKI certificates
• RFC7382 Certificate Practice Statement (CPS)
• RFC8181 RPKI publication protocol
• RFC8182 RPKI Delta protocol (RRDP)
• RFC8183 Out-of-band RPKI setup protocol
• RFC8360 RPKI Validation Reconsidered
Some of over 42 RFCs on implementation of RPKI and BGPsec
2019 should be a big year
for ROA+ROV deployment…
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

E rou01 routing_basics
E rou01 routing_basicsE rou01 routing_basics
E rou01 routing_basicstanawan44
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSAPNIC
 
Wrou01
Wrou01Wrou01
Wrou01tanawan44
 
A week with analysing RPKI status
A week with analysing RPKI statusA week with analysing RPKI status
A week with analysing RPKI statusAPNIC
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practiceJimmy Lim
 
SANOG 34: Internet number registry services - the next generation
SANOG 34: Internet number registry services - the next generationSANOG 34: Internet number registry services - the next generation
SANOG 34: Internet number registry services - the next generationAPNIC
 
PhNOG 2020: Securing your resources with RPKI and IRT
PhNOG 2020: Securing your resources with RPKI and IRTPhNOG 2020: Securing your resources with RPKI and IRT
PhNOG 2020: Securing your resources with RPKI and IRTAPNIC
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesMyNOG
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
 
Routing Security - its importance and status in South Asia
Routing Security - its importance and status in South AsiaRouting Security - its importance and status in South Asia
Routing Security - its importance and status in South AsiaBangladesh Network Operators Group
 
npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing APNIC
 
PhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the PhilippinesPhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the PhilippinesAPNIC
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs APNIC
 
NZNOG 2020: APNIC update
NZNOG 2020: APNIC updateNZNOG 2020: APNIC update
NZNOG 2020: APNIC updateAPNIC
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshFakrul Alam
 

Was ist angesagt? (20)

E rou01 routing_basics
E rou01 routing_basicsE rou01 routing_basics
E rou01 routing_basics
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoS
 
Wrou01
Wrou01Wrou01
Wrou01
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
A week with analysing RPKI status
A week with analysing RPKI statusA week with analysing RPKI status
A week with analysing RPKI status
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practice
 
Prefix Filtering BCP
Prefix Filtering BCP Prefix Filtering BCP
Prefix Filtering BCP
 
SANOG 34: Internet number registry services - the next generation
SANOG 34: Internet number registry services - the next generationSANOG 34: Internet number registry services - the next generation
SANOG 34: Internet number registry services - the next generation
 
RPKI Tutorial
RPKI Tutorial RPKI Tutorial
RPKI Tutorial
 
PhNOG 2020: Securing your resources with RPKI and IRT
PhNOG 2020: Securing your resources with RPKI and IRTPhNOG 2020: Securing your resources with RPKI and IRT
PhNOG 2020: Securing your resources with RPKI and IRT
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry Services
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
 
Routing Security - its importance and status in South Asia
Routing Security - its importance and status in South AsiaRouting Security - its importance and status in South Asia
Routing Security - its importance and status in South Asia
 
npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing
 
PhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the PhilippinesPhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the Philippines
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs
 
32 - IDNOG03 - Lia Hestina (RIPE) - ATLAS Measurement
32 - IDNOG03  - Lia Hestina (RIPE) - ATLAS Measurement32 - IDNOG03  - Lia Hestina (RIPE) - ATLAS Measurement
32 - IDNOG03 - Lia Hestina (RIPE) - ATLAS Measurement
 
NZNOG 2020: APNIC update
NZNOG 2020: APNIC updateNZNOG 2020: APNIC update
NZNOG 2020: APNIC update
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 

Ähnlich wie 32nd TWNIC IP OPM: ROA+ROV deployment & industry development

ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...APNIC
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKIAPNIC
 
Peering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for PeeringPeering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for PeeringAPNIC
 
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaAPNIC
 
LKNOG3-Keynote
LKNOG3-KeynoteLKNOG3-Keynote
LKNOG3-KeynoteLKNOG
 
IDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesiaIDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesiaAPNIC
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaMyNOG
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsAPNIC
 
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya 01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya Indonesia Network Operators Group
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoMyNOG
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityAPNIC
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)NaveenLakshman
 
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI MattersAPNIC
 
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...akg1330
 
PhNOG 2019: RPKI Deployment Update
PhNOG 2019: RPKI Deployment UpdatePhNOG 2019: RPKI Deployment Update
PhNOG 2019: RPKI Deployment UpdateAPNIC
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingAPNIC
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security RoadmapAPNIC
 
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessPacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessAPNIC
 

Ähnlich wie 32nd TWNIC IP OPM: ROA+ROV deployment & industry development (20)

ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
 
Peering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for PeeringPeering Asia 2.0: RPKI for Peering
Peering Asia 2.0: RPKI for Peering
 
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
 
LKNOG3-Keynote
LKNOG3-KeynoteLKNOG3-Keynote
LKNOG3-Keynote
 
IDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesiaIDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesia
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure Connections
 
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya 01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing Security
 
Route Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS ApproachRoute Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS Approach
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)
 
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
 
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
 
PhNOG 2019: RPKI Deployment Update
PhNOG 2019: RPKI Deployment UpdatePhNOG 2019: RPKI Deployment Update
PhNOG 2019: RPKI Deployment Update
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet Routing
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security Roadmap
 
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessPacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
 

Mehr von APNIC

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAPNIC
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsAPNIC
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemAPNIC
 

Mehr von APNIC (20)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & Development
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry System
 

KĂźrzlich hochgeladen

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 

KĂźrzlich hochgeladen (20)

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 

32nd TWNIC IP OPM: ROA+ROV deployment & industry development

  • 1. ROA+ROV Deployment & Industry Development Che-Hoo Cheng APNIC @TWNIC IP OPM 32 2019-06-20
  • 2. Security matters as your network is connecting to Internet • You do NOT want your own routes to be hijacked by anyone, maliciously or accidentally • You also do NOT want to receive bad routing information from any of your BGP neighbors or propagate bad routing information to any of them • Basic measures include: – Bogons and martians filtering – Max prefix count – IRR (Internet Routing Registry) database checking – So on and so forth • Additional measure should include: – ROA (Route Origin Authorization) / ROV (Route Origin Validation)
  • 3. Routing security is becoming more important than ever • Route-hijacking cases (malicious and accidental) are more and more common – Big incentive for hackers • Hijack DNS, hijack websites, steal passwords and so on – Misconfiguration does happen from time to time • And, it is extremely easy to do route-hijacking, if protection measure is not implemented • A lot of route objects on IRR-DB are not authenticated properly and so cannot be fully trusted • Need better authenticity for routing info, i.e. need to make sure that the route originators are the true “owners” of the relevant IP resources
  • 4. Fat-finger / hijacks • Quad101 related route (101.101.101/24) was hijacked by AS268869 (FIBRA PLUS) for 3.5 mins on 8 May 2019 – https://blog.apnic.net/2019/05/30/public-dns-in-taiwan-the-latest- victim-of-bgp-hijack/ – Origin AS should be AS131621 (TWNIC) – Implication can be huge if anycast is not done well
  • 5. Fat-finger / hijacks • Amazon (AS16509) Route53 hijack – Apr 2018 – AS10279 (eNET) announced/originated more specifics (/24s) of Amazon Route53’s prefix (205.251.192.0/21) • 205.251.192.0/24 ……. 205.251.199.0/24 • https://ip-ranges.amazonaws.com/ip-ranges.json – The motive? • During the period, DNS servers in the hijacked range only responded to queries for myetherwallet.com • Responded with addresses associated with AS41995/AS48693
  • 6. Fat-finger / hijacks • Bharti (AS9498) originates 103.0.0.0/10 – Dec 2017 (~ 2 days) – No noticeable damage done – more than 8K specific routes! • YouTube (AS36561) Incident – Feb 2008 (down for ~ 2 hours) – PT (AS17557) announced 208.65.153.0/24 (208.65.152.0/22) • Propagated by AS3491 (PCCW)
  • 7. RPKI • RPKI is a public key infrastructure (PKI) framework, designed to secure BGP routing – Based on X.509 PKI standards • RPKI adds Internet number resources (INR) information to X.509 certificates issued to resource holders – Representing “ownership” and other status – Certification hierarchy follows INR delegation hierarchy IANA ➔ RIR (➔ NIR) ➔ ISP ➔ …
  • 8. RPKI hierarchy NIR CA ISP EE ISP EE ISP EE ISP EE IANA CA APNIC CA LACNIC CA RIPE- NCC CA ARIN CA AFRINIC CA
  • 9. RPKI service models • Hosted model – APNIC performs CA functions on behalf of members – Manage keys, repository and so forth – Generate certificates for resource delegations – This “Member CA” is separate from the “APNIC CA” • Provisioning model – Member operates full RPKI system including CA – Communication with APNIC via “up-down” provisioning protocol • Either rsync (to be deprecated) or RRDP (preferred) – This is live at JPNIC, CNNIC and TWNIC (IDNIC in progress)
  • 10. RPKI objects • Resource certificates – Extension of standard X.509 certificates – Providing authority to use given IPv4/6 and ASN resources – Signed by issuing registry (serving as CA) • Route Origin Authorization (ROA) – Giving an ASN authority to route specific IP blocks – Signed by IP resource holder • “Anysign”, “ghostbuster” and more… – Other useful objects proposed and coming later
  • 11. RPKI & applications 11 registry database RPKI RDAP x.509 ROA whois BGPsec anysign ROV …
  • 12. RPKI application: ROA • Route Origin Authorization – List of prefixes with ASN authorized to announce – Signed by the prefix holder • RPKI validates the integrity of the ROA – It is provably created by the holder of the prefix – Can now be used to construct route filters for prefix-OriginAS pair in BGP • Multiple ROAs can exist for the same prefix Prefix 203.176.32.0/19 Max-length /24 Origin ASN AS17821
  • 13. Use of ROA: ROV • Route Origin Validation AS17821 Announce: 203.176.32.0/19 Peer/Upstream ?
  • 14. RPKI validator • Gathers and validates ROAs from the distributed RPKI databases – Using rsync or RRDP (preferable) – Maintains a validated cache representing complete global state • Can then perform ROV for routers using RPKI-Router (RTR) protocol rpki.apnic.net IANA APNIC RIPE ISP ISP rsync / RRDP Validated cache Validator
  • 15. RPKI validator options • Available validators – Dragon Research toolkit • https://github.com/dragonresearch/rpki.net – RIPE validator : • https://www.ripe.net/manage-ips-and-asns/resource-management/certification/tools- and-resources – Routinator • https://github.com/NLnetLabs/routinator – RTRlib (bird, FRR, Quagga…) • https://rtrlib.realmv6.org/
  • 16. Route validation states • Not Found (Unknown) – No ROA found, probably not created yet – This will be “default” for some time. • Valid – ROA exists – Prefix, Origin ASN and prefix-length match those found in validated cache • Invalid – ROA exists – Prefix found, but Origin ASN is wrong, Prefix-length longer than Max-length, or certificates are expired or otherwise invalid. – Some action needed
  • 17. ROV at border routers ISP Validated cache Validator RPKI-to-Router (RTR)
  • 18. Options when receiving invalid routes • For End/Stub Networks: – Drop them, OR – Give them lower LOCAL_PREF, OR – Do nothing (not recommended) • For Transit Networks: – For inbound routes from upstreams / peers: • Give them lower LOCAL_PREF, OR • Drop them, OR • Do nothing (not recommended) – For outbound routes to customers: • Tag them before re-distributing them to customers and allow customers to make their own choices
  • 19. ROV at IXP – RS and/or shared validator Validated cache Validator RPKI-to-Router (RTR) Routes Tagged/filtered routes RS
  • 20. ROV at IXP – RS usage options • Similar to the case of Transit Networks • Lower LOCAL_PREF, OR • Filtering – Do not advertise Invalid routes – Need to publish on RS policy • Tagging – Apply community tags based on the validation state • let individual member ASNs act on the validation states – Example: • Valid (ASN:65XX1) • Not Found (ASN:65XX2) • Invalid (ASN:65XX3)
  • 21. ROV at IXP – Examples in Asia Pacific • Shared validator provided by: – JPNAP & BKNIX • Other IXPs? – IXPs are good locations to place shared validator as they are just one hop away from their participants and they are mostly trustable – You may push your IXPs to support it to ease your burden of setting up your own Validator/Cache – IXP Manager SW (https://www.ixpmanager.org) now supports easy ROV deployment on RS at IXPs
  • 22. ROA+ROV – Why do we do it? • Contribute to Global Routing Security – Help reduce the effect of route hijacking or misconfiguration – Protect your own networks and your customers better • Collaborative effort among network operators is key
  • 23. ROA+ROV is NOT a bullet-proof solution • It is just one small step for improving routing security • But it helps improve the situation for routing security, especially if everybody does it • Coupled with more and more direct peering, the protection for routing security should be more effective • Highly recommend doing full MANRS as well
  • 24. ROA stats – global snapshot • Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
  • 25. ROA stats – global trend • Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
  • 26. ROA stats – APNIC region snapshot • Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
  • 27. ROA stats – APNIC region trend • Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
  • 28. ROAs in APNIC region • Source (IPv4 prefixes covered): https://lirportal.ripe.net/certification/content/static/statistics/world-roas.html
  • 29. ROA+ROV deployment steps • Create your own ROAs at relevant registries to better protect your own routes – And encourage your peers/customers to do the same – For APNIC members, it is easy to do it on MyAPNIC • We can help! • Please contact APNIC Helpdesk • Next step is to set up route origin validation (ROV) at your border routers – Using public or IXP validator, or your own • Do care about backup and resilience – And ask your IXP/upstream providers to implement ROV • Simple click to test your provider: https://ripe.net/s/rpki-test
  • 30. Industry development on ROA+ROV • NTT – IRR improvement favoring Route Objects with valid ROAs • Cloudflare – Public validator service & invalid routes filtering • AT&T – Invalid routes filtering on peering connections • Netnod – Invalid routes filtering and favouring of valid routes on IXP Route Servers • AWS – BYOIP requires customers to set up ROAs • Google – Will start to apply stricter filters to BGP announcements on all peering sessions by Sep 2019, using RPKI data (ROAs) where available to validate IRR data • Big players are getting more and more serious with ROV…
  • 31. Announcing invalid routes • Will get to fewer and fewer networks on Internet – Similar to being disconnected from bigger and bigger part of Internet • If it is just a mistake, updating the relevant ROA records (supposedly with proper authority) will solve the problem – Should always keep your ROA records updated • All can be managed at one place so should be easy – Can have ROA records for the same prefix under multiple Origin ASes at one time to help the cases of network migration and so on
  • 32. Incentives for creating ROAs • To have basic protection of your own routes from being hijacked at those networks which do ROV • Industry push: – NTT – IRR improvement favouring Route Objects with valid ROAs – Netnod – Invalid routes filtering and favouring of valid routes on IXP Route Servers – AWS – BYOIP requires customers to set up ROAs – Google – Will start to apply stricter filters to BGP announcements on all peering sessions by Sep 2019, using RPKI data (ROAs) where available to validate IRR data • More will be coming… – As a requirement for peering???
  • 33. More about RPKI benefits • Improved in-band verification of resource custodianship – Much safer than manually checking whois or IRR database – Ease of automation • Secure Origin is the first step to preventing many attacks on BGP integrity – BGP Path remains a problem which is under development – Related information such as IRR Policy can now leverage strong proofs of validity (end the maintainer-authority problem in RADB/IRR) • Instruction/information from the resource custodian can be cryptographically verified (e.g. LOA signing)
  • 34. Some useful references • https://blog.cloudflare.com/rpki-details/ • https://nlnetlabs.nl/projects/rpki/faq/ • https://2019.apricot.net/assets/files/APKS756/apricot2019_snijders_routing_securit y_roadmap_1551228895%20(2).pdf • https://datatracker.ietf.org/meeting/100/materials/slides-100-sidrops-rpki- deployment-with-ixps-01 • https://datatracker.ietf.org/meeting/90/materials/slides-90-opsec-0 • https://www.ripe.net/support/training/ripe-ncc-educa/presentations/use-cases- stavros-konstantaras.pdf • https://www.franceix.net/en/technical/france-ix-route-servers/
  • 35. RPKI specifications • RFC3779 X. 509 Extensions for IP Addresses and AS Identifiers • RFC6480 Infrastructure to support secure routing • RFC6481 Profile for repository structure • RFC6482 Profile for Route Origin Authorisation (ROA) • RFC6483 Validation model • RFC6484 Certificate Policy (CP) for RPKI • RFC6485 Algorithms & Key sizes for RPKI • RFC6486 Manifests for repositories in RPKI • RFC6487 Profile for RPKI Certificates • RFC6488 Signed object CMS template • RFC6489 Key Rollover • RFC6490 Trust Anchor Locator (TAL) • RFC6492 RPKI Provisioning Protocol • RFC7318 Policy Qualifiers in RPKI certificates • RFC7382 Certificate Practice Statement (CPS) • RFC8181 RPKI publication protocol • RFC8182 RPKI Delta protocol (RRDP) • RFC8183 Out-of-band RPKI setup protocol • RFC8360 RPKI Validation Reconsidered Some of over 42 RFCs on implementation of RPKI and BGPsec
  • 36. 2019 should be a big year for ROA+ROV deployment…

Hinweis der Redaktion

  1. Now, there's another one. Again, we’re going to move on now to something called RPKI, the Resource Public Key Infrastructure. That is a standard PKI framework. You might be aware of the X509 PKI standards ,which provide you with public and private key certificates. They're used actually in HTTPS in web authentication, they're used in S9 for signing and encrypting emails. X509 is fairly well recognized as a PKI framework. Our PKI is an adaptation of that, that adds Internet number resource information to those standard X509 certificates. Under RPKI, if you receive an allocation of address space from a registry then under RPKI you will also receive a certificate, a digital certificate that actually gives you the keys to the use of that set of Internet resources. Then you can use that certificate to show you are, to show cryptographically you are the valid and authorized holder of those resources.
  2. So, the certificates sort of represent your ownership, if you like of the resources, and the certification hierarchy, which is a standard part of PKI, also represents, also follows the delegation hierarchy. So from the IANA to the RIR to the NIR to the route NIC space, the the ISP. You've got an allocation hierarchy and you've got a certification hierarchy. So you can see it here. IANA is allocating to each of the RIR and in this space IANA is a certification authority as well as an allocation authority. So the [inaudible 00:18:56]. In the case of APNIC in the middle, we are also a CA certification authority, for allocation to TWNIC and for distribution of certificates or certification of TWNICs address space. TWNIC is also a CA, providing the same service to ISPs. In this case it's showing all these ISPs at the bottom not at CAs, but as end entities in the terminology of RPKI. Any of those ISPs can also perform a CA function if it's providing allocations to downstream ISPs and it can also provide a CA function to it's certified downstream allocations, that's part of the [inaudible 00:19:37] framework as well. EE – End-Entity
  3. What are we doing on RPKI at APNIC? Well it's a complex system and as I've said before and you might have wondered, as an ISP you're expected not only to do your work, but also tomorrow to start running a certification authority to make your downstream delegations, that's probably not something that you’re going to earn any or much revenue from. It's just an extra administrative tasks that you would need to do. So APNIC is actually, we've got what we call a hosted model of RPKI and that means that centrally at APNIC we can perform the CA functions on behalf of members. We can manage the keys in the repository and the certificate generation on behalf of a member ISP so that when a member of ISP is simply making a sub-delegation, a sub-assignment for instance, to one of their customers, all of the CIE and RPKI stuff can happen more or less automatically. That requires some trust in APNIC because of course we're managing your keys for you. We do that in a separate, we've got two CAs set up so we've got a member CA separate from the APNIC CA as a mechanism to ensure or help ensure the security of that model. So that's the first model is the hosted model providing that service on behalf of members. The other model is the provisioning model where a downstream recipient of the address space such as an NIR, and this is where the provision model is being used at the moment, that party will operate a full RPKI system including certificate authority function. They communicate automatically with APNIC via another one of those standardized protocols. The up down provisioning protocol, which has got a couple of options, either rSync or RRDP and rSync is the old way and RRDP is the third new way of interacting with AB net. What that allows you to do is run your own full CA RPKI infrastructure and do your own certification, validation and so forth. This is something actually live already at JPNIC, at CNNIC, at TWNIC. We may have some large APNIC members in future who are using the same system because they probably want to do it themselves according to their own systems. It's definitely a more complex solution, but it's the right one for it's intended IR. 90+% of the networks will adopt Hosted model
  4. So, RPKI has got, as a system it's got some digital objects which are involved. They are these things called resource certificates and they standard X 509 certificates. The data structures that represent the holder's authority or your authority to use IPv4 [inaudible 00:20:00] resources and that's what you get, as I said, with your address block from the registry. There's something else which is used in operation called the route origin authorization. That's another data structure, assigned data structure within the RPKI that actually represents an authority for an autonomous system to actually originate route for particular address blocks. So as an IP address holder, you can sign the authority, digitally sign the authority for a particular ASN to originate your address blocks. As you may know, a lot of route high-jacking happens from people who are not authorized taking someone else's addresses and announcing them into the routing system. The point of this, of the RPKI is to actually prevent that from happening, to say that we can only announce address blocks into the routing system if you have the authorization to do so. There's quite a few extensions to RPKI as well. A bit like RDAP, it's something that can be standardized and can actually be used in multiple useful ways in the future. We don't know quite how it's going to be used in the future. There's plenty of potential for that.
  5. Back to this familiar diagram. Now we've got the registry database being used as a source for whois data, whois services, for RDAP services and for RPKI services. From RPKI, what you receive is an X509 certificate or an RPKI certificate and you can also receive and generate your ROAs, your route origin authorizations. So, the RAO is actually a document which is signed by your certificate, and once you have those data structures available to you, then you can do all sorts of things with them. You can use them for verification, you can use them potentially for other functions in [inaudible 00:21:58]. For instance, validation of powers when that becomes [inaudible 00:22:03]. We've got a service at APNIC under development called ‘anysign’, which means that you can take your certificate representing your Internet number resource and sign anything you like with it. I'll explain that as well. Naturally, there's other things that will come along.
  6. In general they do some checking to make sure that they announcement they're receiving actually is a valid one from that Autonomous System. If it's not a valid one, then of course that autonomous System Number could be high-jacking that address space, could be attracting that traffic and doing something bad with it like generating false responses and so on. The point of the Route Origin Authorization is this signed data structure, as I said, which gives a prefix, it gives the ASN, it gives the maximum length of sub-prefix which that ASN is authorized to advertise. For instance, in this case you've got a /19 being authorized under this ROA, but it also says that the ASN 17821 can announce the /19 or announce any longer prefix up to a /24 and that's to accommodate traffic engineering in the [inaudible 00:23:41], so address management that might happen at an autonomous system. The point of the ROA is it's a signed document or a signed data structure, so the RPKI as a system is able to validate that and allow a router to know that that's a valid, the given announcement from a given AS is provably valid. That's what can then be used automatically in route filtering, configuration and so on.
  7. Route Origin Validation, it's this thing I mentioned before where an Autonomous System can announce a particular address block to a peer. But what does the peer do with that? Does the peer just accept that that autonomous System actually is the holder or is a valid destination for routes to that address block? That peer should not just accept that. That peer really should be doing some checking.
  8. RPKI is a pretty complex thing actually. It's got a lot of moving parts, but one of those that's relevant here is the validator. So an RPKI validator is a machine that gathers ROAs, route origin authentications from numerous sources. It validates those ROAs to make sure they actually are correctly signed. That the PKI is all valid within it. It gathers a cache then of all of the valid ROAs that it's aware of and it can then perform validation for routers as clients are using something called the RPKI intra-router protocol. RP – Relying Party
  9. There's a few validation states which are defined under those circumstances. So the route server, having consulted the validator will then determine, the validation status may be unknown or not found. That will be very common these days because that actually means that for a given prefix there is not ROA existing and so for the vast majority of prefixes in that routing system at the moment, there is no RAO yet because this is still being rolled out. But where the ROA exists, it can be a valid ROA and that means that the prefix and origin AS and the length matching and again the validation has been correctly authorized through the RPKI system. If it's not valid, then it's invalid and that means that the ROA exists, but there's a problem. So it means that this, the address prefix that's being routed, if it does have a ROA then if it's to be routed it needs, that ROA needs to be valid. This is where either address high-jacking or errors can be detected and avoided.
  10. A router can inquire of the validator using the RTR protocol to find out whether a given announcement the router has received is valid.
  11. In the case that the ROA is invalid, then some action is needed. That action could be, that action is actually up to the operator. So the operator might decide to just [inaudible 00:27:21] it's invalid. That could be risky because the RPKI itself might have an error in it and it might be declaring something is invalid, particularly now in these early days it might erroneously declare a route to be valid where it in fact is not. Probably rather than dropping, what's recommended is to give that route a lower local preference. That means that it will not, for instance, as we're more specific, it won't replace or redirect traffic from another route that exists within the system. For outcome routes to your customers, or as I said, for tagging across an IXP, then the other thing that might happen with an invalid route is a tag added to it by the route server or the router that allows the recipient to then determine what to do. The sort of tagging you might have would be a community tag with an AS of 65XX1, but not found, or 65XX2 is valid, or whatever. So these are sort of conventions that need to be set up. The point is, what this mechanism provides is an automatic and reliable means for you to actually understand much better what is the status of routing announcements that are going across the Internet exchange or in fact into your network from the rest of the Internet. So that's route origin validation.
  12. It can also work at IXPs. Because an IXP is a more closed community of members than Internet routing at large globally, this is actually being used actively in quite a few exchanges now. In this case, the route server is the one that enters into the RTR protocol with the validator. Any time an exchange partner wants to advertise a route, that will as usual go to the route server for redistribution. The route server in this case will actually first validate that route to make sure that the source is authorized. Then, once validated it will propagate that route to the rest of the partners. It will do that with some extra tagging or filtering on those routes that actually show the rest of the partners what the status of that route is.
  13. Now what's the status of RPKI? Well, this is a little bit like looking at the early days of IPv6. So this is kind of transition that needs to take place across the entire Internet and actually we're not doing too badly. The global routing system according to this view, in this view it's got 783000 unique IPv4 prefix origins hits and of those, 78000, that is just over 10% actually have valid ROAs associated with them. So if you want to run and RPKI validation system, you can actually see the validation data coming through to you for 10% of the routes that you use, that you might be seeing on the Internet. That's pretty good I'd say, we're in the early days. Of course the green slice needs to grow to encompass 100%, but what this shows again is that 78000 routes, this is in real operational, real time deployment these days and it's very good to see. The other component there is that we are seeing invalid routes so there are 6222 routes in the global Internet, as of this shot that are potentially valid. They could be mistaken configurations, they could be address high-jacking attempts, whatever. They could be either of those things. The fact that they're invalid allows an ISP to actually see that and take some action. As I said, the action you take may be just to de-preference those routes so the traffic will still go through those routes, but only as a lower preference to what would probably be the existing legitimate route.
  14. At the APNIC region we're not doing quite as well as the global region, but we've got 5% of all space, 5% of all announcements that originate from APNIC resources as valid and we've got about the same, just under 1% invalid. So that I hope will increase. That can be another race that we all try and track through statistics and data as time goes on, just like we do with IPv6 where we can get ourselves a pat on the back as our numbers increase.
  15. So how do we all start? There is the ability for most of us here, if we are members of APNIC or TWNIC to be able to create ROAs, to be able to create route origin authorizations. Then to encourage our peers and our colleagues to do the same, and to encourage the IXPs to actually implement ROV and route servers. Down the track you can set up route validation on your onboard or routers, you can also use, in doing that you can use validators which are public. If you don't want to run your own, you can use a public validator or a validator that your IXP might offer. For APNIC members at least, you can use MyAPNIC and APNIC will provide whatever help you might need from the help desk to get that up and running.
  16. The benefits of RPKI is this improved and automatic, automatable validation of resource holdings which is something that we don't have at the moment. We might have it better under RDAP because RDAP does actually give you a much easier way to consult and to find out address holder information that doesn't provide the cryptographic security, for instance, that you get out of the ROA which cryptographically links the autonomous system with the prefix being announced. The whole point of this secure origin validation and path validation are the steps that are required to prevent a lot of attacks are happening on the [inaudible 00:38:45] system at the moment. Origin validation right now is, path validation is still something that's coming up. As I mentioned already, origin validation can still be very effective and it can be implemented today and quite readily across the Internet storage ports.
  17. So RPKI is, it actually as I said, has a lot of moving parts. It's a much more complex set of specifications than you saw with RDAP and that's a list of about 20 or so out for 42 RFCs that exist in the IETF specifying RDAP and related BGPSec standards. The [inaudible 00:31:11], that registry is an APNIC in particular have been involved in a lot of these ITF specification documents, a lot of these RFCs. So over the years, we've really done a lot behind the scenes in setting this up and making it all happen. It is actually very good to see that it's starting to be coming to real time operation use these days.