SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Routing Is At Risk.
Let's Secure It Together
1
Andrei Robachevsky
robachevsky@isoc.org
No Day Without an Incident
2http://bgpstream.com/
Statistics of routing incidents generated from BGPStream data
Caveats:
• Sometimes it is impossible to distinguish an attack from a
legitimate (or consented) routing change
• CC attribution is based on geolocation MaxMind's GeoLite
City data set
3
A year in review: 14000 incidents
The routing system is constantly under attack (2017)
4
• 13,935 total incidents (either outages or
attacks, like route leaks and hijacks)
• Over 10% of all Autonomous Systems on
the Internet were affected
• 3,106 Autonomous Systems were a victim of
at least one routing incident
• 1,546 networks were responsible for 5304
routing incidents
8631, 62%
5304, 38%
Twelve months of routing incidents
Outage Routing incidentSource: https://www.bgpstream.com/
The routing system is constantly under attack (2017 → 2018)
5
• 13,935 total incidents (either outages or
attacks like route leaks and hijacks)
• Over 10% of all Autonomous Systems on
the Internet were affected
• 3,106 Autonomous Systems were a victim of
at least one routing incident
• 1,546 networks were responsible for 5304
routing incidents
• 547 networks were responsible for 1576
routing incidents
Source: https://www.bgpstream.com/
3668, 70%
1576, 30%
Five months of routing incidents (2018)
Outage Routing incident
Potential victims
6
Source: https://www.bgpstream.com/
1193
450
299
242
233
138
132
125
118
106
Incidents with a victim in a country, Top 10, 2017
US
BR
IN
RU
KN
BD
IR
GB
DE
HK
0
5
10
15
20
25
US BR IN RU BD IR GB DE HK CN
Changes in % of victimized network in country
2017 2018
Potential culprits 2017
7
Source: https://www.bgpstream.com/
324
197
105
55
50
44
41
39
35 32
Number of AS's in a country responsible for a routing
incident (a route leak or hijack)
BR
US
RU
GB
IN
HK
DE
ID
IR
NL
6.55
1.18
2.10
3.02
3.50
9.40
2.33
4.27
7.73
3.76
Percent of AS's in a country responsible for a routing
incident (a route leak or hijack)
BR
US
RU
GB
IN
HK
DE
ID
IR
NL
Positive dynamics
8
0
1
2
3
4
5
6
7
8
9
10
US BR RU IN BD ID DE IR GB HK
% of AS's in a country responsible for a routing incident
2017 2018
Routing Incidents Cause Real World Problems
9
Event Explanation Repercussions Example
Prefix/Route
Hijacking
A network operator or attacker
impersonates another network
operator, pretending that a server
or network is their client.
Packets are forwarded to
the wrong place, and can
cause Denial of Service
(DoS) attacks or traffic
interception.
The 2008 YouTube hijack
April 2018 Amazon Route 53
hijack
Route Leak A network operator with multiple
upstream providers (often due to
accidental misconfiguration)
announces to one upstream
provider that is has a route to a
destination through the other
upstream provider.
Can be used for a MITM,
including traffic
inspection, modification
and reconnaissance.
September 2014. VolumeDrive
began announcing to Atrato
nearly all the BGP routes it
learned from Cogent causing
disruptions to traffic in places
as far-flung from the USA as
Pakistan and Bulgaria.
IP Address
Spoofing
Someone creates IP packets with a
false source IP address to hide the
identity of the sender or to
impersonate another computing
system.
The root cause of
reflection DDoS attacks
March 1, 2018. Memcached
1.3Tb/s reflection-
amplificationattack reported by
Akamai
Tools to Help
10
• Prefix and AS-PATH filtering
• RPKI validator, IRR toolset, IRRPT,
BGPQ3
• BGPSEC is standardized
But…
• Not enough deployment
• Lack of reliable data
We need a systemic approach to
improving routing security
We Are In This Together
11
Network operators have a
responsibility to ensure a globally
robust and secure routing
infrastructure.
Your network’s safety depends on a routing
infrastructure that weeds out bad actors and
accidental misconfigurations that wreak
havoc on the Internet.
The more network operators work together,
the fewer incidents there will be, and the less
damage they can do.
12
Mutually Agreed Norms for Routing
Security (MANRS)
Provides crucial fixes to reduce the most common routing threats
13
Mutually Agreed Norms for Routing Security
MANRS defines four simple but concrete actions that network operators must
implement to improve Internet security and reliability.
• The first two operational improvements eliminate the root causes of common routing issues
and attacks, while the second two procedural steps improve mitigation and decrease the
likelihood of future incidents.
MANRS builds a visible community of security minded network operators and
IXPs
Coordination
Facilitate global
operational
communication and
coordination between
network operators
Maintain globally
accessible up-to-date
contact information in
common routing databases
Anti-spoofing
Prevent traffic with
spoofed source IP
addresses
Enable source address
validation for at least
single-homed stub
customer networks, their
own end-users, and
infrastructure
MANRS Actions
Filtering
Prevent propagation of
incorrect routing
information
Ensure the correctness of
your own announcements
and announcements from
your customers to adjacent
networks with prefix and
AS-path granularity
Global
Validation
Facilitate validation of
routing information on a
global scale
Publish your data, so
others can validate
14
MANRS is an
Important Step
15
Security is a process, not a state. MANRS
provides a structure and a consistent
approach to solving security issues facing
the Internet.
MANRS is the minimum an operator should
consider, with low risk and cost-effective
actions.
MANRS is not a one-stop solution to all of
the Internet’s routing woes, but it is an
important step toward a globally robust and
secure routing infrastructure.
Implementing MANRS Actions:
16
Signals an organization’s security-forward posture and can eliminate SLA
violations that reduce profitability or cost customer relationships.
Heads off routing incidents, helping networks readily identify and address
problems with customers or peers.
Improves a network’s operational efficiency by establishing better and cleaner
peering communication pathways, while also providing granular insight for
troubleshooting.
Addresses many concerns of security-focused enterprises and other customers.
MANRS – increasing adoption
17
MANRS IXP Programme
18
There is synergy between MANRS and IXPs
• IXPs form a community with a common operational objective
• MANRS is a reference point with a global presence – useful for building a “safe
neighborhood”
How can IXPs contribute?
• Implement a set of Actions that demonstrate the IXP commitment and also bring significant
improvement to the resilience and security of the routing system
MANRS IXP Program – launched on April 23!
19
MANRS IXP Actions
Action 1
Prevent
propagation of
incorrect routing
information
This mandatory
action requires
IXPs to implement
filtering of route
announcements at
the Route Server
based on routing
information data
(IRR and/or RPKI).
20
Action 2
Promote
MANRS to the
IXP membership
IXPs joining
MANRS are
expected to
provide
encouragement or
assistance for their
members to
implement
MANRS actions.
Action 3
Protect the
peering platform
This action
requires that the
IXP has a
published policy of
traffic not allowed
on the peering
fabric and
performs filtering
of such traffic.
Action 4
Facilitate global
operational
communication
and coordination
The IXP facilitates
communication
among members
by providing
necessary mailing
lists and member
directories.
Action 5
Provide
monitoring and
debugging tools
to the members.
The IXP provides
a looking glass for
its members.
MANRS
Implementation Guide
21
A resource to help Operators implement
MANRS Actions.
• Based on Best Current Operational Practices
deployed by network operators around the world
• https://www.manrs.org/bcop/
• Has received recognition from the RIPE
community by being published as RIPE-706
MANRS Training Tutorials and a Hands-on Lab
22
6 training tutorials based on information
in the Implementation Guide. A test at
the end of each tutorial.
https://www.manrs.org/tutorials
About to begin training moderators for
online classes (43 applications
received!)
The prototype lab is ready, finalizing the
production version.
MANRS Member Report and MANRS Observatory
23
Why join MANRS?
• Improve your security posture and reduce the
number and impact of routing incidents
• Join a community of security-minded operators
working together to make the Internet better
• Use MANRS as a competitive differentiator
24
25
Vote link:
• http://etc.ch/mcUa
Vote link:
http://etc.ch/mcUa
Routing security & MANRS: a poll
manrs.org
#ProtectTheCore
MANRS Video:
https://www.youtube.com/embed/nJINk5p-HEE
26

Weitere ähnliche Inhalte

Ähnlich wie PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together

Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDF
Ahmed Adel
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
Editor IJARCET
 
1 Manic Menagerie Malicious activity target.docx
   1  Manic Menagerie Malicious activity target.docx   1  Manic Menagerie Malicious activity target.docx
1 Manic Menagerie Malicious activity target.docx
ShiraPrater50
 

Ähnlich wie PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together (20)

MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
 
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
 
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
 
VANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsVANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation Tools
 
Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDF
 
Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRS
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
Network Bandwidth management - Mumbai Seminar
Network Bandwidth management - Mumbai SeminarNetwork Bandwidth management - Mumbai Seminar
Network Bandwidth management - Mumbai Seminar
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
 
1 Manic Menagerie Malicious activity target.docx
   1  Manic Menagerie Malicious activity target.docx   1  Manic Menagerie Malicious activity target.docx
1 Manic Menagerie Malicious activity target.docx
 
G03403041052
G03403041052G03403041052
G03403041052
 
How can we work together to improve security and resilience of the global rou...
How can we work together to improve security and resilience of the global rou...How can we work together to improve security and resilience of the global rou...
How can we work together to improve security and resilience of the global rou...
 
CATNIX: Desafíos y experiencia
CATNIX: Desafíos y experienciaCATNIX: Desafíos y experiencia
CATNIX: Desafíos y experiencia
 
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
 
L017548287
L017548287L017548287
L017548287
 

Kürzlich hochgeladen

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 

Kürzlich hochgeladen (18)

Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 

PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together

  • 1. Routing Is At Risk. Let's Secure It Together 1 Andrei Robachevsky robachevsky@isoc.org
  • 2. No Day Without an Incident 2http://bgpstream.com/
  • 3. Statistics of routing incidents generated from BGPStream data Caveats: • Sometimes it is impossible to distinguish an attack from a legitimate (or consented) routing change • CC attribution is based on geolocation MaxMind's GeoLite City data set 3 A year in review: 14000 incidents
  • 4. The routing system is constantly under attack (2017) 4 • 13,935 total incidents (either outages or attacks, like route leaks and hijacks) • Over 10% of all Autonomous Systems on the Internet were affected • 3,106 Autonomous Systems were a victim of at least one routing incident • 1,546 networks were responsible for 5304 routing incidents 8631, 62% 5304, 38% Twelve months of routing incidents Outage Routing incidentSource: https://www.bgpstream.com/
  • 5. The routing system is constantly under attack (2017 → 2018) 5 • 13,935 total incidents (either outages or attacks like route leaks and hijacks) • Over 10% of all Autonomous Systems on the Internet were affected • 3,106 Autonomous Systems were a victim of at least one routing incident • 1,546 networks were responsible for 5304 routing incidents • 547 networks were responsible for 1576 routing incidents Source: https://www.bgpstream.com/ 3668, 70% 1576, 30% Five months of routing incidents (2018) Outage Routing incident
  • 6. Potential victims 6 Source: https://www.bgpstream.com/ 1193 450 299 242 233 138 132 125 118 106 Incidents with a victim in a country, Top 10, 2017 US BR IN RU KN BD IR GB DE HK 0 5 10 15 20 25 US BR IN RU BD IR GB DE HK CN Changes in % of victimized network in country 2017 2018
  • 7. Potential culprits 2017 7 Source: https://www.bgpstream.com/ 324 197 105 55 50 44 41 39 35 32 Number of AS's in a country responsible for a routing incident (a route leak or hijack) BR US RU GB IN HK DE ID IR NL 6.55 1.18 2.10 3.02 3.50 9.40 2.33 4.27 7.73 3.76 Percent of AS's in a country responsible for a routing incident (a route leak or hijack) BR US RU GB IN HK DE ID IR NL
  • 8. Positive dynamics 8 0 1 2 3 4 5 6 7 8 9 10 US BR RU IN BD ID DE IR GB HK % of AS's in a country responsible for a routing incident 2017 2018
  • 9. Routing Incidents Cause Real World Problems 9 Event Explanation Repercussions Example Prefix/Route Hijacking A network operator or attacker impersonates another network operator, pretending that a server or network is their client. Packets are forwarded to the wrong place, and can cause Denial of Service (DoS) attacks or traffic interception. The 2008 YouTube hijack April 2018 Amazon Route 53 hijack Route Leak A network operator with multiple upstream providers (often due to accidental misconfiguration) announces to one upstream provider that is has a route to a destination through the other upstream provider. Can be used for a MITM, including traffic inspection, modification and reconnaissance. September 2014. VolumeDrive began announcing to Atrato nearly all the BGP routes it learned from Cogent causing disruptions to traffic in places as far-flung from the USA as Pakistan and Bulgaria. IP Address Spoofing Someone creates IP packets with a false source IP address to hide the identity of the sender or to impersonate another computing system. The root cause of reflection DDoS attacks March 1, 2018. Memcached 1.3Tb/s reflection- amplificationattack reported by Akamai
  • 10. Tools to Help 10 • Prefix and AS-PATH filtering • RPKI validator, IRR toolset, IRRPT, BGPQ3 • BGPSEC is standardized But… • Not enough deployment • Lack of reliable data We need a systemic approach to improving routing security
  • 11. We Are In This Together 11 Network operators have a responsibility to ensure a globally robust and secure routing infrastructure. Your network’s safety depends on a routing infrastructure that weeds out bad actors and accidental misconfigurations that wreak havoc on the Internet. The more network operators work together, the fewer incidents there will be, and the less damage they can do.
  • 12. 12 Mutually Agreed Norms for Routing Security (MANRS) Provides crucial fixes to reduce the most common routing threats
  • 13. 13 Mutually Agreed Norms for Routing Security MANRS defines four simple but concrete actions that network operators must implement to improve Internet security and reliability. • The first two operational improvements eliminate the root causes of common routing issues and attacks, while the second two procedural steps improve mitigation and decrease the likelihood of future incidents. MANRS builds a visible community of security minded network operators and IXPs
  • 14. Coordination Facilitate global operational communication and coordination between network operators Maintain globally accessible up-to-date contact information in common routing databases Anti-spoofing Prevent traffic with spoofed source IP addresses Enable source address validation for at least single-homed stub customer networks, their own end-users, and infrastructure MANRS Actions Filtering Prevent propagation of incorrect routing information Ensure the correctness of your own announcements and announcements from your customers to adjacent networks with prefix and AS-path granularity Global Validation Facilitate validation of routing information on a global scale Publish your data, so others can validate 14
  • 15. MANRS is an Important Step 15 Security is a process, not a state. MANRS provides a structure and a consistent approach to solving security issues facing the Internet. MANRS is the minimum an operator should consider, with low risk and cost-effective actions. MANRS is not a one-stop solution to all of the Internet’s routing woes, but it is an important step toward a globally robust and secure routing infrastructure.
  • 16. Implementing MANRS Actions: 16 Signals an organization’s security-forward posture and can eliminate SLA violations that reduce profitability or cost customer relationships. Heads off routing incidents, helping networks readily identify and address problems with customers or peers. Improves a network’s operational efficiency by establishing better and cleaner peering communication pathways, while also providing granular insight for troubleshooting. Addresses many concerns of security-focused enterprises and other customers.
  • 17. MANRS – increasing adoption 17
  • 18. MANRS IXP Programme 18 There is synergy between MANRS and IXPs • IXPs form a community with a common operational objective • MANRS is a reference point with a global presence – useful for building a “safe neighborhood” How can IXPs contribute? • Implement a set of Actions that demonstrate the IXP commitment and also bring significant improvement to the resilience and security of the routing system
  • 19. MANRS IXP Program – launched on April 23! 19
  • 20. MANRS IXP Actions Action 1 Prevent propagation of incorrect routing information This mandatory action requires IXPs to implement filtering of route announcements at the Route Server based on routing information data (IRR and/or RPKI). 20 Action 2 Promote MANRS to the IXP membership IXPs joining MANRS are expected to provide encouragement or assistance for their members to implement MANRS actions. Action 3 Protect the peering platform This action requires that the IXP has a published policy of traffic not allowed on the peering fabric and performs filtering of such traffic. Action 4 Facilitate global operational communication and coordination The IXP facilitates communication among members by providing necessary mailing lists and member directories. Action 5 Provide monitoring and debugging tools to the members. The IXP provides a looking glass for its members.
  • 21. MANRS Implementation Guide 21 A resource to help Operators implement MANRS Actions. • Based on Best Current Operational Practices deployed by network operators around the world • https://www.manrs.org/bcop/ • Has received recognition from the RIPE community by being published as RIPE-706
  • 22. MANRS Training Tutorials and a Hands-on Lab 22 6 training tutorials based on information in the Implementation Guide. A test at the end of each tutorial. https://www.manrs.org/tutorials About to begin training moderators for online classes (43 applications received!) The prototype lab is ready, finalizing the production version.
  • 23. MANRS Member Report and MANRS Observatory 23
  • 24. Why join MANRS? • Improve your security posture and reduce the number and impact of routing incidents • Join a community of security-minded operators working together to make the Internet better • Use MANRS as a competitive differentiator 24
  • 25. 25 Vote link: • http://etc.ch/mcUa Vote link: http://etc.ch/mcUa Routing security & MANRS: a poll

Hinweis der Redaktion

  1. This is a summary of the following three slides. (Depending on the audience, you can use this one slide, OR the other three, and don’t need all four slides.)
  2. There are various tools to help but they are not deployed often enough and therefore the data is not reliable. Security requires systemic approach – in a corporate environment that means processes and frameworks. How to do that in a distributed ecosystem of independent players. MANRS offers a common reference point.
  3. Give folks time to either scan the QR, or write down the URL. Click on the QR-code to get to the cockpit and begin the poll. After you’ve done the poll, save the results (manual, can be done after your presentation), go to the cockpit and reset the poll. Your Cockpit link https://directpoll.com/c?XDVhEtycgg6iuRWXsR1anBWxc4XpRiH Vote link for your audience http://etc.ch/mcUa Forward this link to your audience and ask them to load it on their (mobile) devices. We're offering a QR code too to assure an easy access for your voters. The QR code will be shown on the result page before the poll is started. Please note that the poll expires 30 days after you last saved your poll. You'll receive a notification before this happens. Just save your poll again to get another 30 days. https://directpoll.com/v?XDVhEthudMb7EXycLuU3GezQ5XLoXk This is the actual full link to your voting-page. Use this if you setup your own redirect for your audience. Result link https://directpoll.com/r?XDbzPBd3ixYqg89RI1AaOu8hIrXCitRxkCq3S8S9 This link will always show the real-time results of the current question. You can use it to display the results on a big screen to let your audience enjoy the live-experience of answers coming in. The result-screen shows the QR code before the poll is started. This guarantees easy access for your voters.