rpki and routing security
play

RPKI and Routing Security Presentation | September 2015 Yerevan - PowerPoint PPT Presentation

RPKI and Routing Security Presentation | September 2015 Yerevan Regional Meeting Routing Security 2 Routing Registry route objects RPKI (Resource Public Key Infrastructure) ROAs (Route Origin Authorisation) RPKI and Routing


  1. RPKI and Routing Security Presentation | September 2015 Yerevan Regional Meeting

  2. Routing Security 2 • Routing Registry • route objects • RPKI (Resource Public Key Infrastructure) • ROAs (Route Origin Authorisation) RPKI and Routing Security

  3. What is the Purpose of Routing Registry ? 3 To be able to answer the question: Is that ASN authorised to originate that address range? RPKI and Routing Security

  4. Internet Routing Registry 4 • Number of public databases that contain routing policy information which mirror each other: • RIPE, APNIC, RADB, JPIRR, Level3, … • http://www.irr.net • RIPE NCC operates the RIPE Routing Registry • Part of the RIPE Database • Part of the Internet Routing Registry RPKI and Routing Security

  5. RIPE Database Objects and Routing Registry 5 • inetnum = IPv4 address range • inet6num = IPv6 address range • aut-num = single AS number and routing policy • route, route6 = connects IP address range and an AS number announcing it RPKI and Routing Security

  6. Registering Routes 6 inet6num: 2001:db8::/32 aut-num: AS64512 tech-c: LA789-RIPE as-name: GREEN-AS admin-c: JD1-RIPE tech-c: LA789-RIPE mnt-by: RIPE-NCC-HM-MNT admin-c: JD1-RIPE mnt-routes: LIR-MNT mnt-by: LIR-MNT route6: 2001:db8::/32 tech-c: LA789-RIPE admin-c: JD1-RIPE origin: AS64512 mnt-by: RIPE-NCC-HM-MNT mnt-by: LIR-MNT 12lir RPKI and Routing Security

  7. Introduction the the RPKI

  8. What is the Purpose of RPKI? 8 To be able to answer the question: Is that ASN authorised to originate that address range? RPKI and Routing Security

  9. Why RPKI? 9 • Why yet another system? • Lots of Routing Registries • Not all mirroring each other • Di ff erent levels of trustworthiness and authentication • RPKI replaces IRR or lives side by side? • Side by side: di ff erent advantages • Security, almost real time, simple interface: RPKI • More info in: IRR RPKI and Routing Security

  10. The advantages of RPKI 10 • Easy to use tools • No installation required • Easy to configure manual overrides • Tight integration with routers • Supported routers have awareness of RPKI validity states • Stepping stone for AS-Path Validation • Prevent Attacks on BGP RPKI and Routing Security

  11. The RIPE NCC involvement in RPKI 11 • The authority on who is the registered holder of an Internet Number Resource in our region – IPv4 and IPv6 Address Blocks – Autonomous System Numbers • Information is kept in the Registry • Accuracy and completeness are key RPKI and Routing Security

  12. Digital Resource Certificates 12 • Based on open IETF standards (sidr) • RFC 5280: X.509 PKI Certificates • RFC 3779: Extensions for IP Addresses and ASNs • RFC 6481-6493: Resource Public Key Infrastructure • Issued by the RIRs since 1 January 2011 • State that an Internet number resource has been registered by the RIPE NCC RPKI and Routing Security

  13. Digital Resource Certificates 13 • Resource Certification is a free, opt-in service • Your choice to request a certificate • Linked to registration • Renewed every 12 months • Enhancement to our Registry • O ff ers validatable proof of holdership RPKI and Routing Security

  14. RPKI Setting it up: The announcers side

  15. Resource Certificates 15 • RIPE NCC issues digital certificates • To LIRs • To all resource holders • Upon request • Certificate lists all resources held by the member RPKI and Routing Security

  16. RPKI Chain of Trust 16 RIPE NCC’s Root Certificate All RIPE NCC’s resources Root’s (RIPE NCC) private key Root public key Signature sign LIR’s Certificate All member’s resources LIR’s private key LIR’s public key Signature sign RPKI and Routing Security

  17. ROA (Route Origin Authorisation) 17 • LIRs can use their certificate to create a ROA for each of their resources (IP address ranges) • Signed by the root’s private key • ROA states • Address range • Which AS this is announced from (freely chosen) • Maximum length (freely chosen) • You can have multiple ROAs for an IP range • ROAs can overlap RPKI and Routing Security

  18. That Should Be Easy, Right?! 18 • A ROA is nothing more than a statement that: - specifies which AS can originate your prefix, and - what the maximum length of that prefix is… Route Origin Authorisation AS Number Prefix Maximum Length Submit RPKI and Routing Security

  19. 19 RPKI and Routing Security

  20. Public Repository 20 • RIPE NCC maintains a Certificate Repository containing • All the certificates • All the public keys • All the ROAs RPKI and Routing Security

  21. Validation: The Relying Party’s Side

  22. Validator 22 • The validator of the client can access RIPE NCC’s Repository with all the certificates, public keys, ROAs • It downloads everything and then performs validation, checking whether the certificates and ROAs are valid. Then it constructs a list of valid ROAs, which is its “validated cache” RPKI and Routing Security

  23. Router Integration 23 • The Relying Party’s router can connect and download the cache from the validator • Router can then compare any BGP announcements to the list of valid ROAs in the validated cache RPKI and Routing Security

  24. BGP Verification 24 Client (ISP , Relying Party) Validator ROA 191.71.8.0/24 191.71.8.0/24 AS93 Validated cache compare origin : AS93 AS ROA Validated ROAs only AS14 RPKI and Routing Security

  25. Results of BGP Verification 25 • valid • There is a ROA in the validated cache that matches the BGP announcement of the peer, size matches too • unknown • There is no ROA for that prefix in the cache • invalid • There is a ROA for the prefix, but for a di ff erent AS • The size doesn’t match RPKI and Routing Security

  26. You are in control 26 • As an announcer/LIR • You choose if you want certification • You choose if you want to create ROAs • You choose AS, max length • As a Relying Party • You can choose if you use the validator • You can override the lists of valid ROAs in the cache, adding or removing valid ROAs locally • You can choose to make any routing decisions based on the results of the BGP Verification (valid/invalid/unknown) RPKI and Routing Security

  27. Less Functionality, More Usability 27 • One click setup of resource certificate - Automate key roll overs and signing - User has a valid certificate for as long as holder of the resources - Changes in holdership handled automatically • Hide all the crypto complexity from the UI - Hashes, SIA and AIA pointers, etc. • Focus on creating and publishing ROAs - Match your intended BGP configuration RPKI and Routing Security

  28. Our Future Plans 28 • Merge IRR ‘route’ object management in RPKI UI • Replace rsync as protocol for fetching data • something faster and more scalable (HTTP) • Support Inter-RIR transfers • Production support for the delegated model • Path Validation RPKI and Routing Security

  29. People Requesting a Certificate 29 RPKI and Routing Security

  30. People Actually Creating ROAs 30 RPKI and Routing Security

  31. The End! Y Diwedd K рай Fí Finis Соңы Li ð ugt Ende Finvezh Ki нець Konec Fund Ënn Kraj Son Kpaj Beigas Lõpp Vége An Críoch ףוסה Endir Fine Sfâr ş it Fin Τέλος Einde Кон e ц Slut Slutt Pabaiga Tmiem Koniec Amaia Loppu Fim

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend