RPKI and Routing Security Presentation | September 2015 Yerevan - - PowerPoint PPT Presentation

rpki and routing security
SMART_READER_LITE
LIVE PREVIEW

RPKI and Routing Security Presentation | September 2015 Yerevan - - PowerPoint PPT Presentation

RPKI and Routing Security Presentation | September 2015 Yerevan Regional Meeting Routing Security 2 Routing Registry route objects RPKI (Resource Public Key Infrastructure) ROAs (Route Origin Authorisation) RPKI and Routing


slide-1
SLIDE 1

Presentation | September 2015

RPKI and Routing Security

Yerevan Regional Meeting

slide-2
SLIDE 2

RPKI and Routing Security

Routing Security

2

  • Routing Registry
  • route objects
  • RPKI (Resource Public Key Infrastructure)
  • ROAs (Route Origin Authorisation)
slide-3
SLIDE 3

RPKI and Routing Security

What is the Purpose of Routing Registry ?

To be able to answer the question:

3

Is that ASN authorised to originate that address range?

slide-4
SLIDE 4

RPKI and Routing Security

Internet Routing Registry

  • Number of public databases that contain routing

policy information which mirror each other:

  • RIPE, APNIC, RADB, JPIRR, Level3, …
  • http://www.irr.net
  • RIPE NCC operates the RIPE Routing Registry
  • Part of the RIPE Database
  • Part of the Internet Routing Registry

4

slide-5
SLIDE 5

RPKI and Routing Security

RIPE Database Objects and Routing Registry

5

  • inetnum
  • inet6num
  • aut-num
  • route, route6

= IPv4 address range = IPv6 address range = single AS number and routing policy = connects IP address range and an AS number announcing it

slide-6
SLIDE 6

RPKI and Routing Security

Registering Routes

6

12lir

route6: 2001:db8::/32

tech-c: LA789-RIPE admin-c: JD1-RIPE

  • rigin: AS64512

mnt-by: RIPE-NCC-HM-MNT

mnt-by: LIR-MNT inet6num: 2001:db8::/32

tech-c: LA789-RIPE admin-c: JD1-RIPE mnt-by: RIPE-NCC-HM-MNT

mnt-routes: LIR-MNT aut-num: AS64512

as-name: GREEN-AS tech-c: LA789-RIPE admin-c: JD1-RIPE

mnt-by: LIR-MNT

slide-7
SLIDE 7

Introduction the the RPKI

slide-8
SLIDE 8

RPKI and Routing Security

What is the Purpose of RPKI?

To be able to answer the question:

8

Is that ASN authorised to originate that address range?

slide-9
SLIDE 9

RPKI and Routing Security

Why RPKI?

  • Why yet another system?
  • Lots of Routing Registries
  • Not all mirroring each other
  • Different levels of trustworthiness and authentication
  • RPKI replaces IRR or lives side by side?
  • Side by side: different advantages
  • Security, almost real time, simple interface: RPKI
  • More info in: IRR

9

slide-10
SLIDE 10

RPKI and Routing Security

The advantages of RPKI

  • Easy to use tools
  • No installation required
  • Easy to configure manual overrides
  • Tight integration with routers
  • Supported routers have awareness of RPKI validity

states

  • Stepping stone for AS-Path Validation
  • Prevent Attacks on BGP

10

slide-11
SLIDE 11

RPKI and Routing Security

The RIPE NCC involvement in RPKI

11

  • The authority on who is the registered holder of an

Internet Number Resource in our region

–IPv4 and IPv6 Address Blocks –Autonomous System Numbers

  • Information is kept in the Registry
  • Accuracy and completeness are key
slide-12
SLIDE 12

RPKI and Routing Security

Digital Resource Certificates

12

  • Based on open IETF standards (sidr)
  • RFC 5280: X.509 PKI Certificates
  • RFC 3779: Extensions for IP Addresses and ASNs
  • RFC 6481-6493: Resource Public Key Infrastructure
  • Issued by the RIRs since 1 January 2011
  • State that an Internet number resource has

been registered by the RIPE NCC

slide-13
SLIDE 13

RPKI and Routing Security

Digital Resource Certificates

13

  • Resource Certification is a free, opt-in service
  • Your choice to request a certificate
  • Linked to registration
  • Renewed every 12 months
  • Enhancement to our Registry
  • Offers validatable proof of holdership
slide-14
SLIDE 14

RPKI Setting it up: The announcers side

slide-15
SLIDE 15

RPKI and Routing Security

Resource Certificates

  • RIPE NCC issues digital certificates
  • To LIRs
  • To all resource holders
  • Upon request
  • Certificate lists all resources held by the member

15

slide-16
SLIDE 16

RPKI and Routing Security

RPKI Chain of Trust

16

RIPE NCC’s Root Certificate LIR’s Certificate

All member’s resources LIR’s public key Signature All RIPE NCC’s resources Root public key Signature Root’s (RIPE NCC) private key sign sign LIR’s private key

slide-17
SLIDE 17

RPKI and Routing Security

ROA (Route Origin Authorisation)

17

  • LIRs can use their certificate to create a ROA for

each of their resources (IP address ranges)

  • Signed by the root’s private key
  • ROA states
  • Address range
  • Which AS this is announced from (freely chosen)
  • Maximum length (freely chosen)
  • You can have multiple ROAs for an IP range
  • ROAs can overlap
slide-18
SLIDE 18

RPKI and Routing Security

That Should Be Easy, Right?!

18

  • A ROA is nothing more than a statement that:
  • specifies which AS can originate your prefix, and
  • what the maximum length of that prefix is…

AS Number Prefix Maximum Length Submit

Route Origin Authorisation

slide-19
SLIDE 19

RPKI and Routing Security 19

slide-20
SLIDE 20

RPKI and Routing Security

Public Repository

20

  • RIPE NCC maintains a Certificate Repository

containing

  • All the certificates
  • All the public keys
  • All the ROAs
slide-21
SLIDE 21

Validation: The Relying Party’s Side

slide-22
SLIDE 22

RPKI and Routing Security

Validator

22

  • The validator of the client can access RIPE NCC’s

Repository with all the certificates, public keys, ROAs

  • It downloads everything and then performs validation,

checking whether the certificates and ROAs are valid. Then it constructs a list of valid ROAs, which is its “validated cache”

slide-23
SLIDE 23

RPKI and Routing Security

Router Integration

23

  • The Relying Party’s router can connect and download

the cache from the validator

  • Router can then compare any BGP announcements to

the list of valid ROAs in the validated cache

slide-24
SLIDE 24

RPKI and Routing Security

BGP Verification

24

Validated cache

AS ROA

Validated ROAs only

Validator

Client (ISP , Relying Party)

AS14

ROA

191.71.8.0/24 AS93

compare

191.71.8.0/24

  • rigin: AS93
slide-25
SLIDE 25

RPKI and Routing Security

Results of BGP Verification

25

  • valid
  • There is a ROA in the validated cache that matches the

BGP announcement of the peer, size matches too

  • unknown
  • There is no ROA for that prefix in the cache
  • invalid
  • There is a ROA for the prefix, but for a different AS
  • The size doesn’t match
slide-26
SLIDE 26

RPKI and Routing Security

You are in control

26

  • As an announcer/LIR
  • You choose if you want certification
  • You choose if you want to create ROAs
  • You choose AS, max length
  • As a Relying Party
  • You can choose if you use the validator
  • You can override the lists of valid ROAs in the cache,

adding or removing valid ROAs locally

  • You can choose to make any routing decisions based on

the results of the BGP Verification (valid/invalid/unknown)

slide-27
SLIDE 27

RPKI and Routing Security

Less Functionality, More Usability

27

  • One click setup of resource certificate
  • Automate key roll overs and signing
  • User has a valid certificate for as long as holder of the

resources

  • Changes in holdership handled automatically
  • Hide all the crypto complexity from the UI
  • Hashes, SIA and AIA pointers, etc.
  • Focus on creating and publishing ROAs
  • Match your intended BGP configuration
slide-28
SLIDE 28

RPKI and Routing Security

Our Future Plans

28

  • Merge IRR ‘route’ object management in RPKI UI
  • Replace rsync as protocol for fetching data
  • something faster and more scalable (HTTP)
  • Support Inter-RIR transfers
  • Production support for the delegated model
  • Path Validation
slide-29
SLIDE 29

RPKI and Routing Security

People Requesting a Certificate

29

slide-30
SLIDE 30

RPKI and Routing Security

People Actually Creating ROAs

30

slide-31
SLIDE 31

Fin Ende Kpaj Konec Son Fine Pabaiga Einde Fim Finis Koniec Lõpp Kрай Sfârşit Конeц Kraj Vége Kiнець Slutt Loppu Τέλος Y Diwedd Amaia Tmiem Соңы Endir Slut Liðugt An Críoch Fund

ףוסה

Fí Ënn Finvezh

The End!

Beigas