SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
RPKI –
Industry Trends & Initiatives
Che-Hoo Cheng
Infrastructure & Development Director, APNIC
@APAN50 on 2020-08-05
Security matters as your network is
connecting to Internet
• You do NOT want your own routes to be hijacked by anyone, maliciously or
accidentally
• You also do NOT want to receive bad routing information from any of your
BGP neighbors or propagate bad routing information to any of them
• Basic measures include:
– Bogons and martians filtering
– Max prefix count
– IRR (Internet Routing Registry) database checking
– Plus doing MANRS
– So on and so forth
• Additional measure should include:
– RPKI (Resource Public Key Infrastructure) / ROV (Route Origin Validation)
Routing security is becoming more
important than ever
• Route-hijacking cases (malicious and accidental) are more and more
common
– Big incentive for hackers
• Hijack DNS, hijack websites, steal passwords and so on
– Misconfiguration does happen from time to time
• And, it is extremely easy to do route-hijacking, if protection measure is
not implemented
• A lot of route objects on IRR-DB are not authenticated properly and so
cannot be fully trusted
• Need better authenticity for routing info, i.e. need to make sure that the
route originators are the true “owners” of the relevant IP resources
Routing security breaches
4
Facebook, Mar 2019 Google, Nov 2018
Google, Nov 2012
YouTube, Feb 2008
Amazon, Apr 2018
Google JP, Aug 2017
RPKI
• RPKI is a Public Key Infrastructure (PKI) framework for
Internet Number Resources (INR)
– Based on X.509 PKI standards
– Cryptographic public/private key security
• RPKI adds Internet Number Resources (INR) information to
X.509 certificates issued to resource holders
– Representing “ownership” and other status
– Certification hierarchy follows INR delegation hierarchy
IANA ➔ RIR (➔ NIR) ➔ ISP ➔ …
RPKI hierarchy
Source : http://isoc.org/wp/ietfjournal/?p=2438
IANA
RIPE-NCCLACNICARIN APNICAFRINIC
NIR
ISP ISP ISP ISP
Allocation
Hierarchy
Trust Anchor
Certificate
Certificate
chain
mirrors
allocation
hierarchy
Cert
(CA)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(CA)
Cert
(CA)
Cert
(CA)
Cert
(CA)
Cert
(CA)
Cert
(CA)
RPKI
• Verifiable “ownership” of IPv4/IPv6 and ASN resources
– Resource information added to X.509 certificates
– RPKI Certificates issued with resource allocations
• Verifiable authorisation to route IPv4/IPv6 addresses
– Route Origin Authorisation (ROA) objects
– Signed by resource holder with RPKI cert
RPKI service models
• Hosted model
– APNIC performs CA functions on behalf of members
– Manage keys, repository etc
– Generate certificates for resource delegations
– This “Member CA” is separate from the “APNIC CA”
• Provisioning model
– Member operates full RPKI system including CA
– Communication with APNIC via “up-down” provisioning protocol
• Either rsync (to be deprecated) or RRDP (preferred)
– This is live at some NIRs such as JPNIC, CNNIC and TWNIC
RPKI objects
• Resource certificates
– Extended X.509 certificates listing IPv4/IPv6/ASN
– Representing authority for use of those resources
– Issued/Signed by IP address registry (RIR/NIR/LIR as CA)
• Route Origin Authorisation (ROA)
– Giving a specific ASN authority to route specific IP blocks
– Issued/Signed by resource certificate holder
RPKI – ROA
• Route Origin Authorization
– List of prefixes with ASN authorized to announce
– Signed by the resource holder with RPKI certificate
– Multiple ROAs can exist for the same prefix
• RPKI systems validates the integrity of the ROA
– Was it signed by the holder of the prefix, using valid RPKI cert?
– If so, can now be used to construct route filters in BGP
Prefix 203.176.32.0/19
Max-length /24
Origin ASN AS17821
Internet routing
The Internet
Global Routing Table
4.128/9
60.100/16
60.100.0/20
135.22/16
…
Global Routing Table
4.128/9
60.100/16
60.100.0/20
135.22/16
203.176.32.0/19
…
AS17821
203.176.32.0/19
?
??
Announcement
Traffic
Route Origin Validation (ROV)
• Using RPKI Route Origin Authorization (ROA)
AS17821
203.176.32.0/19
Peer/Upstream
or IXP
☺
LOAROA
RPKI Validator
• Gathers and validates ROAs from the distributed RPKI databases
– Using rsync or RRDP “delta protocol” (preferable)
– Maintains a validated cache representing complete global state
• Can then perform ROV for routers using RPKI-Router (RTR) protocol
rpki.apnic.net
IANA
APNIC RIPE
NIR ISP
RRDP
Cache
Validator
RPKI Validator options
• Dragon Research RPKI toolkit -
https://github.com/dragonresearch/rpki.net
• RIPE Validator - https://github.com/RIPE-NCC/rpki-validator-3
• Routinator - https://github.com/NLnetLabs/routinator/releases/tag/v0.7.1
• OctoRPKI/GoRTR (Cloudflare’s toolkit) -
https://github.com/cloudflare/cfrpki
• Fort (NIC Mexico’s Validator) - https://nicmx.github.io/FORT-validator/
• Reference: https://blog.apnic.net/2019/10/28/how-to-installing-an-rpki-
validator/
Route validation states
• Not Found (Unknown)
– No ROA found, probably not created yet
– This will be “default” for some time.
• Valid
– ROA exists
– Prefix, Origin ASN and prefix-length match those found in validated cache
• Invalid
– ROA exists
– Prefix found, but Origin ASN is wrong, Prefix-length longer than Max-length, or
certificates are expired or otherwise invalid.
– Some action needed…
Options when seeing invalid routes
• Drop them
• Give them lower LOCAL_PREF
• Do nothing (not recommended)
• Tag them before re-distributing them to customers
– Allow customers to make their own choices
– Apply community tags based on the validation state
• Not Found (ASN:65XX1)
• Valid (ASN:65XX2)
• Invalid (ASN:65XX3)
ROV at Border Routers
ISP
Validated
cache
Validator
RPKI-to-Router (RTR)
RPKI-to-Router (RTR)
ISP 3
ISP 1 ISP 2
ISP 3
ROV at IXPs
Validated
cache
Validator
RPKI-to-Router (RTR)
Routes
Tagged/filtered
routes
Route
Server
Possible deployment steps
• Create your own ROAs at relevant registries to better
protect your own networks
– And encourage your peers/customers to do the same
– For APNIC members, it is easy to do it on MyAPNIC
• You can contact APNIC Helpdesk at any time (https://www.apnic.net/get-
ip/helpdesk/)
• Next step is to do Route Origin Validation (ROV) at your
border routers
– Firstly to play around with LOCAL_PREF
– Later to implement route filtering when you feel comfortable
RPKI Status Globally – Snapshot
• Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
RPKI Status Globally – Trend
• Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
RPKI Status of APNIC Region – Snapshot
• Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
RPKI Status of APNIC Region – Trend
• Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
ROA Creation Statistics of APNIC Region
• Source: https://lirportal.ripe.net/certification/content/static/statistics/world-roas.html
Best Performing Economy in APNIC Region
Source: https://observatory.manrs.org/
ROV Deployment Status of Major Operators
Source: https://isbgpsafeyet.com
ROV Deployment Status of Cloud Providers
Source: https://isbgpsafeyet.com
More Incentives for Creating ROAs
• Industry push:
– AWS – BYOIP requires customers to set up ROAs
– More and more IXPs are implementing ROV on their
route servers
• But this does not help your direct bilateral peering over the IXPs
ROA vs IRR
• IRR-DB is full of garbage
– Many Routing Registries, which may mirror data from others
– Anybody can create any route objects without proper authorization
• But still a lot of transit providers and IXPs are using it to construct
their incoming route filters, especially for their customers
• Some providers are starting to prefer route objects with relevant
ROAs as they have proper authorization
– You can say ROAs are helping clean up IRR-DB
– Note that APNIC is offering RR service for members with proper
authorization so you can create/manage your ROAs and relevant route
objects on MyAPNIC at the same time
Measurement on ROV Route Filtering
• https://stats.labs.apnic.net/rpki/XA
• End-user’s viewpoint
• More about effective ROV
– Not really about ROV deployment by network
ROV route filtering at stub networks
• Transit networks (e.g. NRENs) should consider doing ROV route
filtering seriously to protect their downstream networks better
• Simple stub networks (e.g. normal universities) may not need to
implement ROV route filtering if they only have upstream/transit
connections because their transit networks should help protect
them
• But stub networks which do a lot of direct bilateral peering (e.g.
large universities) should consider doing ROV route filtering as
well for better protection of themselves because their
upstream/transit providers cannot protect them fully
Default Route
• If you want to do ROV route filtering, you would better not
have default route at your border routers (unless your
default route is surely pointing to a transit provider which
does ROV route filtering)
– In other words, you should need full routes from your transit providers
if you want to reach the whole Internet
Implications to networks which are
announcing invalid routes inadvertently
• Will get to fewer and fewer networks on Internet
– Similar to being disconnected from bigger and bigger part of
Internet
• If it is just a mistake, updating the relevant ROA records
(supposedly with proper authority) will solve the problem
– Should always keep your ROA records updated
• All can be managed at one place so should be easy
– Can have ROA records for the same prefix under multiple Origin
ASes at one time to help the cases of network migration and so on
How do you know you are announcing
invalid routes inadvertently?
• Some transit providers help notify their customers when
they see invalid routes from their customers
• There are tools on Internet which can help you check it by
yourself:
– E.g. https://bgp.he.net
• Note that only you as the “owner” of the IP address blocks
(or network prefixes) can change the relevant ROAs
Effect to blackholing service
• Some transit providers and IXPs are offering blackholing service to
mitigate DDoS attacks for their customers
• They rely on /32 announcements with proper BGP community tags to
trigger blackholing
• ROAs with standing max_length of /32 are defeating the purpose of
having max_length on ROAs
• Possible solutions:
– Ignore ROAs just for those /32 announcements with specific BGP community
tags but have to care about the possible security loopholes
– Add ad-hoc ROAs of /32 only when needed but the propagation time does not
have guarantee
– Any other ideas?
Validator considerations
• VRP output
ROA with AS0 origin (RFC6483/RFC7607)
• Negative attestation
– No valid ASN has been granted authority
– Not to be routed (e.g. IXP LAN prefixes)
• Overridden by another ROA
– with an origin AS other than AS0
• Prop-132: unallocated/unassigned APNIC space
– Similar to RFC6491 for special-use/reserved/unallocated
MyAPNIC access under ROV
• MyAPNIC behind AS4608 is used for creating ROAs for APNIC members
choosing the hosted model offered by APNIC
• If AS4608 does ROV Route Filtering, those APNIC members announcing
invalid routes cannot login to modify their ROAs from the networks filtered
– For cases of human errors, it may be an issue
• AS4608 will not do ROV Route Filtering for now but what if all of AS4608’s
transit providers are doing it?
– Direct peering with AS4608 should help but it will not be for everybody
– The last resort is to call APNIC for help
• In any case, make sure your ROAs are created according to your
actual route announcements
RPKI is NOT a bullet-proof solution
• But it helps improve the situation for route hijacking,
especially if everybody does it
• Coupled with more and more direct peering, the protection
for routing security should be more effective
More and more serious RPKI / ROA /
ROV deployments are being observed
in the industry –
You should at least create your own
valid ROAs to better protect your own
networks…
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityAPNIC
 
Route Hijaking and the role of RPKI
Route Hijaking and the role of RPKIRoute Hijaking and the role of RPKI
Route Hijaking and the role of RPKIAPNIC
 
npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing APNIC
 
PacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKIPacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKIAPNIC
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesMyNOG
 
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...APNIC
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!APNIC
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
 
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej WolskiPLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej WolskiPROIDEA
 
btNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIbtNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIAPNIC
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practiceJimmy Lim
 
mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing APNIC
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSAPNIC
 
Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User APNIC
 
APNIC Update
APNIC Update APNIC Update
APNIC Update APNIC
 
APNIC Services by Anna Mulingbayan
APNIC Services by Anna MulingbayanAPNIC Services by Anna Mulingbayan
APNIC Services by Anna MulingbayanMyNOG
 

Was ist angesagt? (20)

NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)Security
 
Route Hijaking and the role of RPKI
Route Hijaking and the role of RPKIRoute Hijaking and the role of RPKI
Route Hijaking and the role of RPKI
 
RPKI Tutorial
RPKI Tutorial RPKI Tutorial
RPKI Tutorial
 
npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing
 
PacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKIPacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKI
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry Services
 
Bgp security 2
Bgp security 2Bgp security 2
Bgp security 2
 
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
 
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej WolskiPLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
 
btNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIbtNOG 7: Measuring RPKI
btNOG 7: Measuring RPKI
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practice
 
mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoS
 
32 - IDNOG03 - Lia Hestina (RIPE) - ATLAS Measurement
32 - IDNOG03  - Lia Hestina (RIPE) - ATLAS Measurement32 - IDNOG03  - Lia Hestina (RIPE) - ATLAS Measurement
32 - IDNOG03 - Lia Hestina (RIPE) - ATLAS Measurement
 
Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
APNIC Update
APNIC Update APNIC Update
APNIC Update
 
APNIC Services by Anna Mulingbayan
APNIC Services by Anna MulingbayanAPNIC Services by Anna Mulingbayan
APNIC Services by Anna Mulingbayan
 

Ähnlich wie APAN 50: RPKI industry trends and initiatives

RPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsAPNIC
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoMyNOG
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...APNIC
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKIAPNIC
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)NaveenLakshman
 
IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4APNIC
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingAPNIC
 
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfRIPE NCC
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaMyNOG
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationAPNIC
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security RoadmapAPNIC
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTAPNIC
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKIAPNIC
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsAPNIC
 
APNIC Updates
APNIC UpdatesAPNIC Updates
APNIC UpdatesMyNOG
 
BKNIX Peering Forum 2023: APNIC Measurement Update
BKNIX Peering Forum 2023: APNIC Measurement UpdateBKNIX Peering Forum 2023: APNIC Measurement Update
BKNIX Peering Forum 2023: APNIC Measurement UpdateAPNIC
 
btNOG 6: Securing Internet Routing
btNOG 6: Securing Internet RoutingbtNOG 6: Securing Internet Routing
btNOG 6: Securing Internet RoutingAPNIC
 

Ähnlich wie APAN 50: RPKI industry trends and initiatives (20)

RPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and Operations
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
Route Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS ApproachRoute Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS Approach
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)
 
IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet Routing
 
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security Roadmap
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure Connections
 
APNIC Updates
APNIC UpdatesAPNIC Updates
APNIC Updates
 
BKNIX Peering Forum 2023: APNIC Measurement Update
BKNIX Peering Forum 2023: APNIC Measurement UpdateBKNIX Peering Forum 2023: APNIC Measurement Update
BKNIX Peering Forum 2023: APNIC Measurement Update
 
btNOG 6: Securing Internet Routing
btNOG 6: Securing Internet RoutingbtNOG 6: Securing Internet Routing
btNOG 6: Securing Internet Routing
 

Mehr von APNIC

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 

Mehr von APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Kürzlich hochgeladen

2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 

Kürzlich hochgeladen (20)

2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 

APAN 50: RPKI industry trends and initiatives

  • 1. RPKI – Industry Trends & Initiatives Che-Hoo Cheng Infrastructure & Development Director, APNIC @APAN50 on 2020-08-05
  • 2. Security matters as your network is connecting to Internet • You do NOT want your own routes to be hijacked by anyone, maliciously or accidentally • You also do NOT want to receive bad routing information from any of your BGP neighbors or propagate bad routing information to any of them • Basic measures include: – Bogons and martians filtering – Max prefix count – IRR (Internet Routing Registry) database checking – Plus doing MANRS – So on and so forth • Additional measure should include: – RPKI (Resource Public Key Infrastructure) / ROV (Route Origin Validation)
  • 3. Routing security is becoming more important than ever • Route-hijacking cases (malicious and accidental) are more and more common – Big incentive for hackers • Hijack DNS, hijack websites, steal passwords and so on – Misconfiguration does happen from time to time • And, it is extremely easy to do route-hijacking, if protection measure is not implemented • A lot of route objects on IRR-DB are not authenticated properly and so cannot be fully trusted • Need better authenticity for routing info, i.e. need to make sure that the route originators are the true “owners” of the relevant IP resources
  • 4. Routing security breaches 4 Facebook, Mar 2019 Google, Nov 2018 Google, Nov 2012 YouTube, Feb 2008 Amazon, Apr 2018 Google JP, Aug 2017
  • 5. RPKI • RPKI is a Public Key Infrastructure (PKI) framework for Internet Number Resources (INR) – Based on X.509 PKI standards – Cryptographic public/private key security • RPKI adds Internet Number Resources (INR) information to X.509 certificates issued to resource holders – Representing “ownership” and other status – Certification hierarchy follows INR delegation hierarchy IANA ➔ RIR (➔ NIR) ➔ ISP ➔ …
  • 6. RPKI hierarchy Source : http://isoc.org/wp/ietfjournal/?p=2438 IANA RIPE-NCCLACNICARIN APNICAFRINIC NIR ISP ISP ISP ISP Allocation Hierarchy Trust Anchor Certificate Certificate chain mirrors allocation hierarchy Cert (CA) Cert (EE) Cert (EE) Cert (EE) Cert (EE) Cert (CA) Cert (CA) Cert (CA) Cert (CA) Cert (CA) Cert (CA)
  • 7. RPKI • Verifiable “ownership” of IPv4/IPv6 and ASN resources – Resource information added to X.509 certificates – RPKI Certificates issued with resource allocations • Verifiable authorisation to route IPv4/IPv6 addresses – Route Origin Authorisation (ROA) objects – Signed by resource holder with RPKI cert
  • 8. RPKI service models • Hosted model – APNIC performs CA functions on behalf of members – Manage keys, repository etc – Generate certificates for resource delegations – This “Member CA” is separate from the “APNIC CA” • Provisioning model – Member operates full RPKI system including CA – Communication with APNIC via “up-down” provisioning protocol • Either rsync (to be deprecated) or RRDP (preferred) – This is live at some NIRs such as JPNIC, CNNIC and TWNIC
  • 9. RPKI objects • Resource certificates – Extended X.509 certificates listing IPv4/IPv6/ASN – Representing authority for use of those resources – Issued/Signed by IP address registry (RIR/NIR/LIR as CA) • Route Origin Authorisation (ROA) – Giving a specific ASN authority to route specific IP blocks – Issued/Signed by resource certificate holder
  • 10. RPKI – ROA • Route Origin Authorization – List of prefixes with ASN authorized to announce – Signed by the resource holder with RPKI certificate – Multiple ROAs can exist for the same prefix • RPKI systems validates the integrity of the ROA – Was it signed by the holder of the prefix, using valid RPKI cert? – If so, can now be used to construct route filters in BGP Prefix 203.176.32.0/19 Max-length /24 Origin ASN AS17821
  • 11. Internet routing The Internet Global Routing Table 4.128/9 60.100/16 60.100.0/20 135.22/16 … Global Routing Table 4.128/9 60.100/16 60.100.0/20 135.22/16 203.176.32.0/19 … AS17821 203.176.32.0/19 ? ?? Announcement Traffic
  • 12. Route Origin Validation (ROV) • Using RPKI Route Origin Authorization (ROA) AS17821 203.176.32.0/19 Peer/Upstream or IXP ☺ LOAROA
  • 13. RPKI Validator • Gathers and validates ROAs from the distributed RPKI databases – Using rsync or RRDP “delta protocol” (preferable) – Maintains a validated cache representing complete global state • Can then perform ROV for routers using RPKI-Router (RTR) protocol rpki.apnic.net IANA APNIC RIPE NIR ISP RRDP Cache Validator
  • 14. RPKI Validator options • Dragon Research RPKI toolkit - https://github.com/dragonresearch/rpki.net • RIPE Validator - https://github.com/RIPE-NCC/rpki-validator-3 • Routinator - https://github.com/NLnetLabs/routinator/releases/tag/v0.7.1 • OctoRPKI/GoRTR (Cloudflare’s toolkit) - https://github.com/cloudflare/cfrpki • Fort (NIC Mexico’s Validator) - https://nicmx.github.io/FORT-validator/ • Reference: https://blog.apnic.net/2019/10/28/how-to-installing-an-rpki- validator/
  • 15. Route validation states • Not Found (Unknown) – No ROA found, probably not created yet – This will be “default” for some time. • Valid – ROA exists – Prefix, Origin ASN and prefix-length match those found in validated cache • Invalid – ROA exists – Prefix found, but Origin ASN is wrong, Prefix-length longer than Max-length, or certificates are expired or otherwise invalid. – Some action needed…
  • 16. Options when seeing invalid routes • Drop them • Give them lower LOCAL_PREF • Do nothing (not recommended) • Tag them before re-distributing them to customers – Allow customers to make their own choices – Apply community tags based on the validation state • Not Found (ASN:65XX1) • Valid (ASN:65XX2) • Invalid (ASN:65XX3)
  • 17. ROV at Border Routers ISP Validated cache Validator RPKI-to-Router (RTR) RPKI-to-Router (RTR)
  • 18. ISP 3 ISP 1 ISP 2 ISP 3 ROV at IXPs Validated cache Validator RPKI-to-Router (RTR) Routes Tagged/filtered routes Route Server
  • 19. Possible deployment steps • Create your own ROAs at relevant registries to better protect your own networks – And encourage your peers/customers to do the same – For APNIC members, it is easy to do it on MyAPNIC • You can contact APNIC Helpdesk at any time (https://www.apnic.net/get- ip/helpdesk/) • Next step is to do Route Origin Validation (ROV) at your border routers – Firstly to play around with LOCAL_PREF – Later to implement route filtering when you feel comfortable
  • 20. RPKI Status Globally – Snapshot • Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
  • 21. RPKI Status Globally – Trend • Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
  • 22. RPKI Status of APNIC Region – Snapshot • Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
  • 23. RPKI Status of APNIC Region – Trend • Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
  • 24. ROA Creation Statistics of APNIC Region • Source: https://lirportal.ripe.net/certification/content/static/statistics/world-roas.html
  • 25. Best Performing Economy in APNIC Region Source: https://observatory.manrs.org/
  • 26. ROV Deployment Status of Major Operators Source: https://isbgpsafeyet.com
  • 27. ROV Deployment Status of Cloud Providers Source: https://isbgpsafeyet.com
  • 28. More Incentives for Creating ROAs • Industry push: – AWS – BYOIP requires customers to set up ROAs – More and more IXPs are implementing ROV on their route servers • But this does not help your direct bilateral peering over the IXPs
  • 29. ROA vs IRR • IRR-DB is full of garbage – Many Routing Registries, which may mirror data from others – Anybody can create any route objects without proper authorization • But still a lot of transit providers and IXPs are using it to construct their incoming route filters, especially for their customers • Some providers are starting to prefer route objects with relevant ROAs as they have proper authorization – You can say ROAs are helping clean up IRR-DB – Note that APNIC is offering RR service for members with proper authorization so you can create/manage your ROAs and relevant route objects on MyAPNIC at the same time
  • 30. Measurement on ROV Route Filtering • https://stats.labs.apnic.net/rpki/XA • End-user’s viewpoint • More about effective ROV – Not really about ROV deployment by network
  • 31. ROV route filtering at stub networks • Transit networks (e.g. NRENs) should consider doing ROV route filtering seriously to protect their downstream networks better • Simple stub networks (e.g. normal universities) may not need to implement ROV route filtering if they only have upstream/transit connections because their transit networks should help protect them • But stub networks which do a lot of direct bilateral peering (e.g. large universities) should consider doing ROV route filtering as well for better protection of themselves because their upstream/transit providers cannot protect them fully
  • 32. Default Route • If you want to do ROV route filtering, you would better not have default route at your border routers (unless your default route is surely pointing to a transit provider which does ROV route filtering) – In other words, you should need full routes from your transit providers if you want to reach the whole Internet
  • 33. Implications to networks which are announcing invalid routes inadvertently • Will get to fewer and fewer networks on Internet – Similar to being disconnected from bigger and bigger part of Internet • If it is just a mistake, updating the relevant ROA records (supposedly with proper authority) will solve the problem – Should always keep your ROA records updated • All can be managed at one place so should be easy – Can have ROA records for the same prefix under multiple Origin ASes at one time to help the cases of network migration and so on
  • 34. How do you know you are announcing invalid routes inadvertently? • Some transit providers help notify their customers when they see invalid routes from their customers • There are tools on Internet which can help you check it by yourself: – E.g. https://bgp.he.net • Note that only you as the “owner” of the IP address blocks (or network prefixes) can change the relevant ROAs
  • 35. Effect to blackholing service • Some transit providers and IXPs are offering blackholing service to mitigate DDoS attacks for their customers • They rely on /32 announcements with proper BGP community tags to trigger blackholing • ROAs with standing max_length of /32 are defeating the purpose of having max_length on ROAs • Possible solutions: – Ignore ROAs just for those /32 announcements with specific BGP community tags but have to care about the possible security loopholes – Add ad-hoc ROAs of /32 only when needed but the propagation time does not have guarantee – Any other ideas?
  • 37. ROA with AS0 origin (RFC6483/RFC7607) • Negative attestation – No valid ASN has been granted authority – Not to be routed (e.g. IXP LAN prefixes) • Overridden by another ROA – with an origin AS other than AS0 • Prop-132: unallocated/unassigned APNIC space – Similar to RFC6491 for special-use/reserved/unallocated
  • 38. MyAPNIC access under ROV • MyAPNIC behind AS4608 is used for creating ROAs for APNIC members choosing the hosted model offered by APNIC • If AS4608 does ROV Route Filtering, those APNIC members announcing invalid routes cannot login to modify their ROAs from the networks filtered – For cases of human errors, it may be an issue • AS4608 will not do ROV Route Filtering for now but what if all of AS4608’s transit providers are doing it? – Direct peering with AS4608 should help but it will not be for everybody – The last resort is to call APNIC for help • In any case, make sure your ROAs are created according to your actual route announcements
  • 39. RPKI is NOT a bullet-proof solution • But it helps improve the situation for route hijacking, especially if everybody does it • Coupled with more and more direct peering, the protection for routing security should be more effective
  • 40. More and more serious RPKI / ROA / ROV deployments are being observed in the industry – You should at least create your own valid ROAs to better protect your own networks…