RPKI Tutorial
MENOG 10, Dubai UAE Marco Hogewoning Trainer
RPKI Tutorial MENOG 10, Dubai UAE Marco Hogewoning Trainer Goals - - PowerPoint PPT Presentation
RPKI Tutorial MENOG 10, Dubai UAE Marco Hogewoning Trainer Goals Explain where it started Learn what resources certificates are Learn how to request a certificate Learn how to create a Route Origin Authorization Learn how to
MENOG 10, Dubai UAE Marco Hogewoning Trainer
2
– Do you filter?
– Daily examples show this is no longer enough
4
– Not all of them mirror the other registries – How trust worthy is the information they provide?
5
– Is a specific AS authorised to originate an IP prefix?
– RFC 5280: X.509 Public Key Infrastructure – RFC 3779: Extensions for IP addresses and ASNs
6
– IPv4 and IPv6 address ranges – Autonomous System Numbers
7
– Make the registry more robust – Making Internet Routing more secure
8
– Your choice to request a certificate – Linked to your membership – Renewed every 12 months
– That information is in the RIPE Database
9
– They are the trust anchor for the system
– When making assignments or sub allocations
10
11
– RIPE NCC operates one of them
12
– Provider Aggregatable (PA) IP addresses – Provider Independent (PI) addresses marked as
– PI addresses for which we have a contract – ERX resources
13
– Holders are verified to be legit – Information published in the RIPE Database – Resources can be certified
– Contact legacy@ripe.net for more information
14
Setting up certification in the LIR Portal
16
17
18
Route Origination Authorisation
– They can originate from your own ASN – Or by a third party on your behalf – Maybe a part will be announced by somebody else
20
– A minimum prefix length – A maximum prefix length – An expiry date
21
– Was this really the owner of the prefix?
– And you can be sure the information comes from the
22
Creating a ROA
24
S A N D B O X
25
S A N D B O X
26
S A N D B O X
27
S A N D B O X
28
S A N D B O X
– Cryptographic tools can check all the signatures
30
31
Cert's ROAs Keys
Afrinic Lacnic ARIN APNIC Sandbox RIPE NCC
view and modify processing repositories RPKI-RTR protocol
validated cache
network equipment Validator http
32
– Actually this is flagged as an error
– It is expired and the ROA will be ignored
33
– The end result is the validation state will be “unknown”
– The end result is the validation state becomes “valid”
34
– Unknown: there is no covering ROA for this prefix – Valid: a ROA matching the prefix and ASN is found – Invalid: There is a ROA but it does not match the
35
– Modify preference values – Filter the announcement – ...
36
37
Using the RIPE NCC Validator
– Unzip the package – Run the program
39
40
41
42
43
44
45
– Allows you to get a hint of what would happen – RIS view might be different from your routing table
46
47
– Validator listens on 8282 for RPKI-RTR Protocol – Routers can connect and download the cache
– Allows you to download a CSV with the cache – Can be integrated with your internal workflow – Use for statistics or spotting anomalies
48
– Cisco has beta images available – Juniper expects it to be in 12.2 (Q312) – Quagga has support for it
– And tell them you like this
50
– Telnet to rpki-rtr.ripe.net – User: ripe, no password
– Telnet to 193.34.50.25 or 193.34.50.26 – Username: rpki, password: testbed
51
Doing it all yourself
– Easy to setup a certificate authority and ROAs – Key and certificate rollovers are taken care of – RIPE NCC system is certified and audited
– Needed to create ROAs and certificates – Some people say this is less secure
53
– Setup and run your own Certificate Authority – Create the ROAs on your system – Optionally have your own publication point
– This is known as the “up down protocol”
54
– http://www.hactrn.net/rpki-dox/ – Includes rcynic validation tool
– http://rpstir.sourceforge.net/
– http://rpki.realmv6.org/
55
– Expected release will be third quarter 2012
– Mail certification@ripe.net if you are interested
– http://www.ripe.net/certification
56
58