SlideShare a Scribd company logo
1 of 41
Download to read offline
RPKI –
Industry Trends & Initiatives
Che-Hoo Cheng
Infrastructure & Development Director, APNIC
@APAN50 on 2020-08-05
Security matters as your network is
connecting to Internet
• You do NOT want your own routes to be hijacked by anyone, maliciously or
accidentally
• You also do NOT want to receive bad routing information from any of your
BGP neighbors or propagate bad routing information to any of them
• Basic measures include:
– Bogons and martians filtering
– Max prefix count
– IRR (Internet Routing Registry) database checking
– Plus doing MANRS
– So on and so forth
• Additional measure should include:
– RPKI (Resource Public Key Infrastructure) / ROV (Route Origin Validation)
Routing security is becoming more
important than ever
• Route-hijacking cases (malicious and accidental) are more and more
common
– Big incentive for hackers
• Hijack DNS, hijack websites, steal passwords and so on
– Misconfiguration does happen from time to time
• And, it is extremely easy to do route-hijacking, if protection measure is
not implemented
• A lot of route objects on IRR-DB are not authenticated properly and so
cannot be fully trusted
• Need better authenticity for routing info, i.e. need to make sure that the
route originators are the true “owners” of the relevant IP resources
Routing security breaches
4
Facebook, Mar 2019 Google, Nov 2018
Google, Nov 2012
YouTube, Feb 2008
Amazon, Apr 2018
Google JP, Aug 2017
RPKI
• RPKI is a Public Key Infrastructure (PKI) framework for
Internet Number Resources (INR)
– Based on X.509 PKI standards
– Cryptographic public/private key security
• RPKI adds Internet Number Resources (INR) information to
X.509 certificates issued to resource holders
– Representing “ownership” and other status
– Certification hierarchy follows INR delegation hierarchy
IANA ➔ RIR (➔ NIR) ➔ ISP ➔ …
RPKI hierarchy
Source : http://isoc.org/wp/ietfjournal/?p=2438
IANA
RIPE-NCCLACNICARIN APNICAFRINIC
NIR
ISP ISP ISP ISP
Allocation
Hierarchy
Trust Anchor
Certificate
Certificate
chain
mirrors
allocation
hierarchy
Cert
(CA)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(EE)
Cert
(CA)
Cert
(CA)
Cert
(CA)
Cert
(CA)
Cert
(CA)
Cert
(CA)
RPKI
• Verifiable “ownership” of IPv4/IPv6 and ASN resources
– Resource information added to X.509 certificates
– RPKI Certificates issued with resource allocations
• Verifiable authorisation to route IPv4/IPv6 addresses
– Route Origin Authorisation (ROA) objects
– Signed by resource holder with RPKI cert
RPKI service models
• Hosted model
– APNIC performs CA functions on behalf of members
– Manage keys, repository etc
– Generate certificates for resource delegations
– This “Member CA” is separate from the “APNIC CA”
• Provisioning model
– Member operates full RPKI system including CA
– Communication with APNIC via “up-down” provisioning protocol
• Either rsync (to be deprecated) or RRDP (preferred)
– This is live at some NIRs such as JPNIC, CNNIC and TWNIC
RPKI objects
• Resource certificates
– Extended X.509 certificates listing IPv4/IPv6/ASN
– Representing authority for use of those resources
– Issued/Signed by IP address registry (RIR/NIR/LIR as CA)
• Route Origin Authorisation (ROA)
– Giving a specific ASN authority to route specific IP blocks
– Issued/Signed by resource certificate holder
RPKI – ROA
• Route Origin Authorization
– List of prefixes with ASN authorized to announce
– Signed by the resource holder with RPKI certificate
– Multiple ROAs can exist for the same prefix
• RPKI systems validates the integrity of the ROA
– Was it signed by the holder of the prefix, using valid RPKI cert?
– If so, can now be used to construct route filters in BGP
Prefix 203.176.32.0/19
Max-length /24
Origin ASN AS17821
Internet routing
The Internet
Global Routing Table
4.128/9
60.100/16
60.100.0/20
135.22/16
…
Global Routing Table
4.128/9
60.100/16
60.100.0/20
135.22/16
203.176.32.0/19
…
AS17821
203.176.32.0/19
?
??
Announcement
Traffic
Route Origin Validation (ROV)
• Using RPKI Route Origin Authorization (ROA)
AS17821
203.176.32.0/19
Peer/Upstream
or IXP
☺
LOAROA
RPKI Validator
• Gathers and validates ROAs from the distributed RPKI databases
– Using rsync or RRDP “delta protocol” (preferable)
– Maintains a validated cache representing complete global state
• Can then perform ROV for routers using RPKI-Router (RTR) protocol
rpki.apnic.net
IANA
APNIC RIPE
NIR ISP
RRDP
Cache
Validator
RPKI Validator options
• Dragon Research RPKI toolkit -
https://github.com/dragonresearch/rpki.net
• RIPE Validator - https://github.com/RIPE-NCC/rpki-validator-3
• Routinator - https://github.com/NLnetLabs/routinator/releases/tag/v0.7.1
• OctoRPKI/GoRTR (Cloudflare’s toolkit) -
https://github.com/cloudflare/cfrpki
• Fort (NIC Mexico’s Validator) - https://nicmx.github.io/FORT-validator/
• Reference: https://blog.apnic.net/2019/10/28/how-to-installing-an-rpki-
validator/
Route validation states
• Not Found (Unknown)
– No ROA found, probably not created yet
– This will be “default” for some time.
• Valid
– ROA exists
– Prefix, Origin ASN and prefix-length match those found in validated cache
• Invalid
– ROA exists
– Prefix found, but Origin ASN is wrong, Prefix-length longer than Max-length, or
certificates are expired or otherwise invalid.
– Some action needed…
Options when seeing invalid routes
• Drop them
• Give them lower LOCAL_PREF
• Do nothing (not recommended)
• Tag them before re-distributing them to customers
– Allow customers to make their own choices
– Apply community tags based on the validation state
• Not Found (ASN:65XX1)
• Valid (ASN:65XX2)
• Invalid (ASN:65XX3)
ROV at Border Routers
ISP
Validated
cache
Validator
RPKI-to-Router (RTR)
RPKI-to-Router (RTR)
ISP 3
ISP 1 ISP 2
ISP 3
ROV at IXPs
Validated
cache
Validator
RPKI-to-Router (RTR)
Routes
Tagged/filtered
routes
Route
Server
Possible deployment steps
• Create your own ROAs at relevant registries to better
protect your own networks
– And encourage your peers/customers to do the same
– For APNIC members, it is easy to do it on MyAPNIC
• You can contact APNIC Helpdesk at any time (https://www.apnic.net/get-
ip/helpdesk/)
• Next step is to do Route Origin Validation (ROV) at your
border routers
– Firstly to play around with LOCAL_PREF
– Later to implement route filtering when you feel comfortable
RPKI Status Globally – Snapshot
• Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
RPKI Status Globally – Trend
• Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
RPKI Status of APNIC Region – Snapshot
• Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
RPKI Status of APNIC Region – Trend
• Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
ROA Creation Statistics of APNIC Region
• Source: https://lirportal.ripe.net/certification/content/static/statistics/world-roas.html
Best Performing Economy in APNIC Region
Source: https://observatory.manrs.org/
ROV Deployment Status of Major Operators
Source: https://isbgpsafeyet.com
ROV Deployment Status of Cloud Providers
Source: https://isbgpsafeyet.com
More Incentives for Creating ROAs
• Industry push:
– AWS – BYOIP requires customers to set up ROAs
– More and more IXPs are implementing ROV on their
route servers
• But this does not help your direct bilateral peering over the IXPs
ROA vs IRR
• IRR-DB is full of garbage
– Many Routing Registries, which may mirror data from others
– Anybody can create any route objects without proper authorization
• But still a lot of transit providers and IXPs are using it to construct
their incoming route filters, especially for their customers
• Some providers are starting to prefer route objects with relevant
ROAs as they have proper authorization
– You can say ROAs are helping clean up IRR-DB
– Note that APNIC is offering RR service for members with proper
authorization so you can create/manage your ROAs and relevant route
objects on MyAPNIC at the same time
Measurement on ROV Route Filtering
• https://stats.labs.apnic.net/rpki/XA
• End-user’s viewpoint
• More about effective ROV
– Not really about ROV deployment by network
ROV route filtering at stub networks
• Transit networks (e.g. NRENs) should consider doing ROV route
filtering seriously to protect their downstream networks better
• Simple stub networks (e.g. normal universities) may not need to
implement ROV route filtering if they only have upstream/transit
connections because their transit networks should help protect
them
• But stub networks which do a lot of direct bilateral peering (e.g.
large universities) should consider doing ROV route filtering as
well for better protection of themselves because their
upstream/transit providers cannot protect them fully
Default Route
• If you want to do ROV route filtering, you would better not
have default route at your border routers (unless your
default route is surely pointing to a transit provider which
does ROV route filtering)
– In other words, you should need full routes from your transit providers
if you want to reach the whole Internet
Implications to networks which are
announcing invalid routes inadvertently
• Will get to fewer and fewer networks on Internet
– Similar to being disconnected from bigger and bigger part of
Internet
• If it is just a mistake, updating the relevant ROA records
(supposedly with proper authority) will solve the problem
– Should always keep your ROA records updated
• All can be managed at one place so should be easy
– Can have ROA records for the same prefix under multiple Origin
ASes at one time to help the cases of network migration and so on
How do you know you are announcing
invalid routes inadvertently?
• Some transit providers help notify their customers when
they see invalid routes from their customers
• There are tools on Internet which can help you check it by
yourself:
– E.g. https://bgp.he.net
• Note that only you as the “owner” of the IP address blocks
(or network prefixes) can change the relevant ROAs
Effect to blackholing service
• Some transit providers and IXPs are offering blackholing service to
mitigate DDoS attacks for their customers
• They rely on /32 announcements with proper BGP community tags to
trigger blackholing
• ROAs with standing max_length of /32 are defeating the purpose of
having max_length on ROAs
• Possible solutions:
– Ignore ROAs just for those /32 announcements with specific BGP community
tags but have to care about the possible security loopholes
– Add ad-hoc ROAs of /32 only when needed but the propagation time does not
have guarantee
– Any other ideas?
Validator considerations
• VRP output
ROA with AS0 origin (RFC6483/RFC7607)
• Negative attestation
– No valid ASN has been granted authority
– Not to be routed (e.g. IXP LAN prefixes)
• Overridden by another ROA
– with an origin AS other than AS0
• Prop-132: unallocated/unassigned APNIC space
– Similar to RFC6491 for special-use/reserved/unallocated
MyAPNIC access under ROV
• MyAPNIC behind AS4608 is used for creating ROAs for APNIC members
choosing the hosted model offered by APNIC
• If AS4608 does ROV Route Filtering, those APNIC members announcing
invalid routes cannot login to modify their ROAs from the networks filtered
– For cases of human errors, it may be an issue
• AS4608 will not do ROV Route Filtering for now but what if all of AS4608’s
transit providers are doing it?
– Direct peering with AS4608 should help but it will not be for everybody
– The last resort is to call APNIC for help
• In any case, make sure your ROAs are created according to your
actual route announcements
RPKI is NOT a bullet-proof solution
• But it helps improve the situation for route hijacking,
especially if everybody does it
• Coupled with more and more direct peering, the protection
for routing security should be more effective
More and more serious RPKI / ROA /
ROV deployments are being observed
in the industry –
You should at least create your own
valid ROAs to better protect your own
networks…
Questions?

More Related Content

What's hot

NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityAPNIC
 
Route Hijaking and the role of RPKI
Route Hijaking and the role of RPKIRoute Hijaking and the role of RPKI
Route Hijaking and the role of RPKIAPNIC
 
npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing APNIC
 
PacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKIPacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKIAPNIC
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesMyNOG
 
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...APNIC
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!APNIC
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
 
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej WolskiPLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej WolskiPROIDEA
 
btNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIbtNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIAPNIC
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practiceJimmy Lim
 
mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing APNIC
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSAPNIC
 
Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User APNIC
 
APNIC Update
APNIC Update APNIC Update
APNIC Update APNIC
 
APNIC Services by Anna Mulingbayan
APNIC Services by Anna MulingbayanAPNIC Services by Anna Mulingbayan
APNIC Services by Anna MulingbayanMyNOG
 

What's hot (20)

NZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)SecurityNZNOG 2019: The State of Routing (In)Security
NZNOG 2019: The State of Routing (In)Security
 
Route Hijaking and the role of RPKI
Route Hijaking and the role of RPKIRoute Hijaking and the role of RPKI
Route Hijaking and the role of RPKI
 
RPKI Tutorial
RPKI Tutorial RPKI Tutorial
RPKI Tutorial
 
npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing
 
PacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKIPacNOG 23: Secure routing with RPKI
PacNOG 23: Secure routing with RPKI
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry Services
 
Bgp security 2
Bgp security 2Bgp security 2
Bgp security 2
 
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
IPv6 RIPEness and RIPE Atlas IPv6 Measurements, by Vesna Manojlovic [APRICOT ...
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
 
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej WolskiPLNOG14: Quo Vadis RPKI - Andrzej Wolski
PLNOG14: Quo Vadis RPKI - Andrzej Wolski
 
btNOG 7: Measuring RPKI
btNOG 7: Measuring RPKIbtNOG 7: Measuring RPKI
btNOG 7: Measuring RPKI
 
BGP filtering best practice
BGP filtering best practiceBGP filtering best practice
BGP filtering best practice
 
mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing mnNOG 1: Securing internet Routing
mnNOG 1: Securing internet Routing
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoS
 
32 - IDNOG03 - Lia Hestina (RIPE) - ATLAS Measurement
32 - IDNOG03  - Lia Hestina (RIPE) - ATLAS Measurement32 - IDNOG03  - Lia Hestina (RIPE) - ATLAS Measurement
32 - IDNOG03 - Lia Hestina (RIPE) - ATLAS Measurement
 
Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
APNIC Update
APNIC Update APNIC Update
APNIC Update
 
APNIC Services by Anna Mulingbayan
APNIC Services by Anna MulingbayanAPNIC Services by Anna Mulingbayan
APNIC Services by Anna Mulingbayan
 

Similar to APAN 50: RPKI industry trends and initiatives

RPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsAPNIC
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoMyNOG
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...APNIC
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKIAPNIC
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)NaveenLakshman
 
IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4APNIC
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingAPNIC
 
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfRIPE NCC
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaMyNOG
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationAPNIC
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security RoadmapAPNIC
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTAPNIC
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKIAPNIC
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsAPNIC
 
APNIC Updates
APNIC UpdatesAPNIC Updates
APNIC UpdatesMyNOG
 
BKNIX Peering Forum 2023: APNIC Measurement Update
BKNIX Peering Forum 2023: APNIC Measurement UpdateBKNIX Peering Forum 2023: APNIC Measurement Update
BKNIX Peering Forum 2023: APNIC Measurement UpdateAPNIC
 
btNOG 6: Securing Internet Routing
btNOG 6: Securing Internet RoutingbtNOG 6: Securing Internet Routing
btNOG 6: Securing Internet RoutingAPNIC
 

Similar to APAN 50: RPKI industry trends and initiatives (20)

RPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and OperationsRPKI Overview, Case Studies, Deployment and Operations
RPKI Overview, Case Studies, Deployment and Operations
 
Introduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) HermosoIntroduction to RPKI by Sheryl (Shane) Hermoso
Introduction to RPKI by Sheryl (Shane) Hermoso
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
Route Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS ApproachRoute Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS Approach
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
Rpki -manrs_(7_september)
Rpki  -manrs_(7_september)Rpki  -manrs_(7_september)
Rpki -manrs_(7_september)
 
IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4IPv4 transfer presentation, SGNOG4
IPv4 transfer presentation, SGNOG4
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet Routing
 
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdfESNOG 29-Alvaro_Vives-Routing_Security.pdf
ESNOG 29-Alvaro_Vives-Routing_Security.pdf
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
 
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next GenerationThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
ThaiNOG Day 2019: Internet Number Registry Services, the Next Generation
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security Roadmap
 
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure Connections
 
APNIC Updates
APNIC UpdatesAPNIC Updates
APNIC Updates
 
BKNIX Peering Forum 2023: APNIC Measurement Update
BKNIX Peering Forum 2023: APNIC Measurement UpdateBKNIX Peering Forum 2023: APNIC Measurement Update
BKNIX Peering Forum 2023: APNIC Measurement Update
 
btNOG 6: Securing Internet Routing
btNOG 6: Securing Internet RoutingbtNOG 6: Securing Internet Routing
btNOG 6: Securing Internet Routing
 

More from APNIC

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 

More from APNIC (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 

Recently uploaded

Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

APAN 50: RPKI industry trends and initiatives

  • 1. RPKI – Industry Trends & Initiatives Che-Hoo Cheng Infrastructure & Development Director, APNIC @APAN50 on 2020-08-05
  • 2. Security matters as your network is connecting to Internet • You do NOT want your own routes to be hijacked by anyone, maliciously or accidentally • You also do NOT want to receive bad routing information from any of your BGP neighbors or propagate bad routing information to any of them • Basic measures include: – Bogons and martians filtering – Max prefix count – IRR (Internet Routing Registry) database checking – Plus doing MANRS – So on and so forth • Additional measure should include: – RPKI (Resource Public Key Infrastructure) / ROV (Route Origin Validation)
  • 3. Routing security is becoming more important than ever • Route-hijacking cases (malicious and accidental) are more and more common – Big incentive for hackers • Hijack DNS, hijack websites, steal passwords and so on – Misconfiguration does happen from time to time • And, it is extremely easy to do route-hijacking, if protection measure is not implemented • A lot of route objects on IRR-DB are not authenticated properly and so cannot be fully trusted • Need better authenticity for routing info, i.e. need to make sure that the route originators are the true “owners” of the relevant IP resources
  • 4. Routing security breaches 4 Facebook, Mar 2019 Google, Nov 2018 Google, Nov 2012 YouTube, Feb 2008 Amazon, Apr 2018 Google JP, Aug 2017
  • 5. RPKI • RPKI is a Public Key Infrastructure (PKI) framework for Internet Number Resources (INR) – Based on X.509 PKI standards – Cryptographic public/private key security • RPKI adds Internet Number Resources (INR) information to X.509 certificates issued to resource holders – Representing “ownership” and other status – Certification hierarchy follows INR delegation hierarchy IANA ➔ RIR (➔ NIR) ➔ ISP ➔ …
  • 6. RPKI hierarchy Source : http://isoc.org/wp/ietfjournal/?p=2438 IANA RIPE-NCCLACNICARIN APNICAFRINIC NIR ISP ISP ISP ISP Allocation Hierarchy Trust Anchor Certificate Certificate chain mirrors allocation hierarchy Cert (CA) Cert (EE) Cert (EE) Cert (EE) Cert (EE) Cert (CA) Cert (CA) Cert (CA) Cert (CA) Cert (CA) Cert (CA)
  • 7. RPKI • Verifiable “ownership” of IPv4/IPv6 and ASN resources – Resource information added to X.509 certificates – RPKI Certificates issued with resource allocations • Verifiable authorisation to route IPv4/IPv6 addresses – Route Origin Authorisation (ROA) objects – Signed by resource holder with RPKI cert
  • 8. RPKI service models • Hosted model – APNIC performs CA functions on behalf of members – Manage keys, repository etc – Generate certificates for resource delegations – This “Member CA” is separate from the “APNIC CA” • Provisioning model – Member operates full RPKI system including CA – Communication with APNIC via “up-down” provisioning protocol • Either rsync (to be deprecated) or RRDP (preferred) – This is live at some NIRs such as JPNIC, CNNIC and TWNIC
  • 9. RPKI objects • Resource certificates – Extended X.509 certificates listing IPv4/IPv6/ASN – Representing authority for use of those resources – Issued/Signed by IP address registry (RIR/NIR/LIR as CA) • Route Origin Authorisation (ROA) – Giving a specific ASN authority to route specific IP blocks – Issued/Signed by resource certificate holder
  • 10. RPKI – ROA • Route Origin Authorization – List of prefixes with ASN authorized to announce – Signed by the resource holder with RPKI certificate – Multiple ROAs can exist for the same prefix • RPKI systems validates the integrity of the ROA – Was it signed by the holder of the prefix, using valid RPKI cert? – If so, can now be used to construct route filters in BGP Prefix 203.176.32.0/19 Max-length /24 Origin ASN AS17821
  • 11. Internet routing The Internet Global Routing Table 4.128/9 60.100/16 60.100.0/20 135.22/16 … Global Routing Table 4.128/9 60.100/16 60.100.0/20 135.22/16 203.176.32.0/19 … AS17821 203.176.32.0/19 ? ?? Announcement Traffic
  • 12. Route Origin Validation (ROV) • Using RPKI Route Origin Authorization (ROA) AS17821 203.176.32.0/19 Peer/Upstream or IXP ☺ LOAROA
  • 13. RPKI Validator • Gathers and validates ROAs from the distributed RPKI databases – Using rsync or RRDP “delta protocol” (preferable) – Maintains a validated cache representing complete global state • Can then perform ROV for routers using RPKI-Router (RTR) protocol rpki.apnic.net IANA APNIC RIPE NIR ISP RRDP Cache Validator
  • 14. RPKI Validator options • Dragon Research RPKI toolkit - https://github.com/dragonresearch/rpki.net • RIPE Validator - https://github.com/RIPE-NCC/rpki-validator-3 • Routinator - https://github.com/NLnetLabs/routinator/releases/tag/v0.7.1 • OctoRPKI/GoRTR (Cloudflare’s toolkit) - https://github.com/cloudflare/cfrpki • Fort (NIC Mexico’s Validator) - https://nicmx.github.io/FORT-validator/ • Reference: https://blog.apnic.net/2019/10/28/how-to-installing-an-rpki- validator/
  • 15. Route validation states • Not Found (Unknown) – No ROA found, probably not created yet – This will be “default” for some time. • Valid – ROA exists – Prefix, Origin ASN and prefix-length match those found in validated cache • Invalid – ROA exists – Prefix found, but Origin ASN is wrong, Prefix-length longer than Max-length, or certificates are expired or otherwise invalid. – Some action needed…
  • 16. Options when seeing invalid routes • Drop them • Give them lower LOCAL_PREF • Do nothing (not recommended) • Tag them before re-distributing them to customers – Allow customers to make their own choices – Apply community tags based on the validation state • Not Found (ASN:65XX1) • Valid (ASN:65XX2) • Invalid (ASN:65XX3)
  • 17. ROV at Border Routers ISP Validated cache Validator RPKI-to-Router (RTR) RPKI-to-Router (RTR)
  • 18. ISP 3 ISP 1 ISP 2 ISP 3 ROV at IXPs Validated cache Validator RPKI-to-Router (RTR) Routes Tagged/filtered routes Route Server
  • 19. Possible deployment steps • Create your own ROAs at relevant registries to better protect your own networks – And encourage your peers/customers to do the same – For APNIC members, it is easy to do it on MyAPNIC • You can contact APNIC Helpdesk at any time (https://www.apnic.net/get- ip/helpdesk/) • Next step is to do Route Origin Validation (ROV) at your border routers – Firstly to play around with LOCAL_PREF – Later to implement route filtering when you feel comfortable
  • 20. RPKI Status Globally – Snapshot • Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
  • 21. RPKI Status Globally – Trend • Source: https://rpki-monitor.antd.nist.gov/?p=0&s=0
  • 22. RPKI Status of APNIC Region – Snapshot • Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
  • 23. RPKI Status of APNIC Region – Trend • Source: https://rpki-monitor.antd.nist.gov/?p=3&s=0
  • 24. ROA Creation Statistics of APNIC Region • Source: https://lirportal.ripe.net/certification/content/static/statistics/world-roas.html
  • 25. Best Performing Economy in APNIC Region Source: https://observatory.manrs.org/
  • 26. ROV Deployment Status of Major Operators Source: https://isbgpsafeyet.com
  • 27. ROV Deployment Status of Cloud Providers Source: https://isbgpsafeyet.com
  • 28. More Incentives for Creating ROAs • Industry push: – AWS – BYOIP requires customers to set up ROAs – More and more IXPs are implementing ROV on their route servers • But this does not help your direct bilateral peering over the IXPs
  • 29. ROA vs IRR • IRR-DB is full of garbage – Many Routing Registries, which may mirror data from others – Anybody can create any route objects without proper authorization • But still a lot of transit providers and IXPs are using it to construct their incoming route filters, especially for their customers • Some providers are starting to prefer route objects with relevant ROAs as they have proper authorization – You can say ROAs are helping clean up IRR-DB – Note that APNIC is offering RR service for members with proper authorization so you can create/manage your ROAs and relevant route objects on MyAPNIC at the same time
  • 30. Measurement on ROV Route Filtering • https://stats.labs.apnic.net/rpki/XA • End-user’s viewpoint • More about effective ROV – Not really about ROV deployment by network
  • 31. ROV route filtering at stub networks • Transit networks (e.g. NRENs) should consider doing ROV route filtering seriously to protect their downstream networks better • Simple stub networks (e.g. normal universities) may not need to implement ROV route filtering if they only have upstream/transit connections because their transit networks should help protect them • But stub networks which do a lot of direct bilateral peering (e.g. large universities) should consider doing ROV route filtering as well for better protection of themselves because their upstream/transit providers cannot protect them fully
  • 32. Default Route • If you want to do ROV route filtering, you would better not have default route at your border routers (unless your default route is surely pointing to a transit provider which does ROV route filtering) – In other words, you should need full routes from your transit providers if you want to reach the whole Internet
  • 33. Implications to networks which are announcing invalid routes inadvertently • Will get to fewer and fewer networks on Internet – Similar to being disconnected from bigger and bigger part of Internet • If it is just a mistake, updating the relevant ROA records (supposedly with proper authority) will solve the problem – Should always keep your ROA records updated • All can be managed at one place so should be easy – Can have ROA records for the same prefix under multiple Origin ASes at one time to help the cases of network migration and so on
  • 34. How do you know you are announcing invalid routes inadvertently? • Some transit providers help notify their customers when they see invalid routes from their customers • There are tools on Internet which can help you check it by yourself: – E.g. https://bgp.he.net • Note that only you as the “owner” of the IP address blocks (or network prefixes) can change the relevant ROAs
  • 35. Effect to blackholing service • Some transit providers and IXPs are offering blackholing service to mitigate DDoS attacks for their customers • They rely on /32 announcements with proper BGP community tags to trigger blackholing • ROAs with standing max_length of /32 are defeating the purpose of having max_length on ROAs • Possible solutions: – Ignore ROAs just for those /32 announcements with specific BGP community tags but have to care about the possible security loopholes – Add ad-hoc ROAs of /32 only when needed but the propagation time does not have guarantee – Any other ideas?
  • 37. ROA with AS0 origin (RFC6483/RFC7607) • Negative attestation – No valid ASN has been granted authority – Not to be routed (e.g. IXP LAN prefixes) • Overridden by another ROA – with an origin AS other than AS0 • Prop-132: unallocated/unassigned APNIC space – Similar to RFC6491 for special-use/reserved/unallocated
  • 38. MyAPNIC access under ROV • MyAPNIC behind AS4608 is used for creating ROAs for APNIC members choosing the hosted model offered by APNIC • If AS4608 does ROV Route Filtering, those APNIC members announcing invalid routes cannot login to modify their ROAs from the networks filtered – For cases of human errors, it may be an issue • AS4608 will not do ROV Route Filtering for now but what if all of AS4608’s transit providers are doing it? – Direct peering with AS4608 should help but it will not be for everybody – The last resort is to call APNIC for help • In any case, make sure your ROAs are created according to your actual route announcements
  • 39. RPKI is NOT a bullet-proof solution • But it helps improve the situation for route hijacking, especially if everybody does it • Coupled with more and more direct peering, the protection for routing security should be more effective
  • 40. More and more serious RPKI / ROA / ROV deployments are being observed in the industry – You should at least create your own valid ROAs to better protect your own networks…