Risks and Mitigation Options of the Border Gateway Protocol (BGP)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Initiatives Actors
Governing the internet – actors and initiatives An illustration of the diversity of actors and initiatives influencing the rules, norms, principles and decision-making processes governing the use of the internet globally.* Initiatives Multi-stakeholder Internet and Global Forum EU Internet Global Network UN Open Ended Jurisdiction of Cyber Forum Initiative Working Group5 Policy Network Expertise Alliance for Internet Paris Call2 Affordable EURODIG3 Governance Internet Forum The Geneva WeProtect Christchurch ICANN1 Internet Society Dialogue Global Alliance Call4 Intergovernmental United G7 Digital & Transatlantic International Nations Technology High Level Watch and Group on the Ministerial Group Working Group…6 Warning Network Information UNODC Society Intergovern- Freedom Online mental Expert UNGGE7 Coalition Group on Cybercrime Actors Governments International Organisations (including regional) Technical communities Number World Wide Internet Resource Web Consortium Infrastructure Organization (W3C) Coalition Global Network Internet Operator Group Architecture (NOG) Alliance Board 13 9 12 Regional 11 Industrial 10 Internet ITU8 Internet ARIN Consortium Registries (RIRs) APNIC AFRINIC LACNIC RIPE NCC Multinational companies Online platforms Oversight Facebook Microsoft Apple Tencent Board** Snapchat Instagram Skype iMessage WeChat Telegram Alphabet Baidu Twitter Messenger Bing Facetime QQ SinaCorp Whatsapp LinkedIn YouTube Tieba Qzone ByteDance Mail.ru Verizon Weibo Google Sohu Kuaishou Naver GoDaddy Douyin Yahoo! Reddit Yandex TikTok -
Securing Interdomain Network Routing with Resource Public Key Infrastructure (RPKI)
Securing Interdomain Network Routing with Resource Public Key Infrastructure (RPKI) A Technical Paper prepared for SCTE•ISBE by Mark Goodwin IP Design Engineer Cox Communications, Inc 6305-B Peachtree Dunwoody Rd, Atlanta, GA 30328 404-269-8267 [email protected] © 2019 SCTE•ISBE and NCTA. All rights reserved. Table of Contents Title Page Number Table of Contents .................................................................................................................................... 2 1. Introduction .................................................................................................................................... 4 2. Motivations .................................................................................................................................... 4 2.1. BGP Security Analysis ....................................................................................................... 4 3. RPKI Components ......................................................................................................................... 6 3.1. Certificate Authority (CA) ................................................................................................... 7 3.2. Resource Certificate .......................................................................................................... 7 3.3. Route Origin Authorizations (ROAs)................................................................................... 8 3.4. RPKI Validating Cache ..................................................................................................... -
Bambauer-Macro-V2-Nov 28.Docx (Do Not Delete) 12/12/14 6:26 Pm
BAMBAUER-MACRO-V2-NOV 28.DOCX (DO NOT DELETE) 12/12/14 6:26 PM FOXES AND HEDGEHOGS IN TRANSITION DEREK E. BAMBAUER* INTRODUCTION .......................................................................................... 1 I. A FLATTER NETWORK ........................................................................... 2 II. UNIVERSAL SERVICE? .......................................................................... 7 III. THE CAST OF CHARACTERS .............................................................. 10 CONCLUSION ........................................................................................... 16 INTRODUCTION The migration from a congeries of communications protocols and technologies to an Internet Protocol-based system is an architectural shift of profound magnitude: it is as though people returned to the city of Babel, abandoning their native tongues for a single lingua franca. Perhaps, after this shift, nothing will be restrained from those who use the Internet.1 And yet, there will inevitably be problems that arise from the shift. Scholars and activists have already raised concerns about equal access to communications capabilities; about the security and resiliency of the new architecture; and about the tension between competing speech interests on the network. One way of thinking about these problems, and potential solutions, is to classify them as either hedgehogs or foxes. The British philosopher Isaiah Berlin suggested that intellectuals can be classified into these two camps, puckishly borrowing from the Greek -
The Regional Internet Registry System Leslie Nobile
“How It Works” The Regional Internet Registry System Leslie Nobile v Overview • The Regional Internet Registry System • Internet Number Resource Primer: IPv4, IPv6 and ASNs • Significant happenings at the RIR • IPv4 Depletion and IPv6 Transition • IPv4 transfer market • Increase in fraudulent activity • RIR Tools, technologies, etc. 2 The Regional Internet Registry System 3 Brief History Internet Number Resource Administration • 1980s to 1990s • Administration of names, numbers, and protocols contracted by US DoD to ISI/Jon Postel (eventually called IANA) • Registration/support of this function contracted to SRI International and then to Network Solutions • Regionalization begins - Regional Internet Registry system Jon Postel forms • IP number resource administration split off from domain name administration • US Govt separates administration of commercial Internet (InterNIC) from the military Internet (DDN NIC) 4 What is an RIR? A Regional Internet Registry (RIR) manages the allocation and registration of Internet number resources in a particular region of the world and maintains a unique registry of all IP numbers issued. *Number resources include IP addresses (IPv4 and IPv6) and autonomous system (AS) numbers 5 Who Are the RIRs? 6 Core Functions of an RIR Manage, distribute -Maintain directory -Support Internet and register Internet services including infrastructure through Number Resources Whois and routing technical coordination (IPv4 & IPv6 registries addresses and Autonomous System -Facilitate community numbers (ASNs) -Provide -
Overview of Routing Security Landscape for the Quilt Member Meeting, Winter 2019 Mark Beadles, CISO, Oarnet [email protected] BGP IDLE
Overview of Routing Security Landscape for the Quilt Member Meeting, Winter 2019 Mark Beadles, CISO, OARnet [email protected] BGP IDLE CONNECT ACTIVE OPEN OPEN SENT CONFIRM ESTAB- LISHED 2/13/2019 Routing Security Landscape - The Quilt 2 Overview of Routing Security Landscape • Background • Threat environment • Current best practices • Gaps 2/13/2019 Routing Security Landscape - The Quilt 3 Background - Definitions • BGP • Border Gateway Protocol, an exterior path-vector gateway routing protocol • Autonomous System & Autonomous System Numbers • Collection of IP routing prefixes under control of a network operator on behalf of a single administrative domain that presents a defined routing policy to the Internet • Assigned number for each AS e.g. AS600 2/13/2019 Routing Security Landscape - The Quilt 4 Background - The BGP Security Problem By design, routers running BGP accept advertised routes from other BGP routers by default. (BGP was written under the assumption that no one would lie about the routes, so there’s no process for verifying the published announcements.) This allows for automatic and decentralized routing of traffic across the Internet, but it also leaves the Internet potentially vulnerable to accidental or malicious disruption, known as BGP hijacking. Due to the extent to which BGP is embedded in the core systems of the Internet, and the number of different networks operated by many different organizations which collectively make up the Internet, correcting this vulnerabilityis a technically and economically challenging problem. 2/13/2019 Routing Security Landscape - The Quilt 5 Background – BGP Terminology • Bogons • Objects (addresses/prefixes/ASNs) that don't belong on the internet • Spoofing • Lying about your address. -
RIPE Database Terms and Conditions
RIPE Database Terms and Conditions The RIPE NCC shall make the RIPE Database publicly accessible under these RIPE Database Terms and Conditions (hereinafter: the ‘Terms and Conditions’). The Terms and Conditions shall apply to anyone who accesses and uses the RIPE Database. Introduction The RIPE NCC is authorised by the RIPE community to act as the registration authority for Internet number resources in its service region and to manage the operation of the RIPE Database. Article 1 – Definitions In the Terms and Conditions, the following terms shall be understood to have the meanings assigned to them below: RIPE NCC – Réseaux IP Européens Network Coordination Centre. A membership association under Dutch law operating its registered office in Amsterdam, the Netherlands. RIPE community – RIPE (Réseaux IP Européens) is a collaborative forum open to all parties interested in wide area IP networks in Europe and beyond. The objective of RIPE is to ensure the administrative and technical coordination necessary to enable the operation of a pan-European IP network. Update – submitting information for entry into or removal from the RIPE Database Query – requesting information from the RIPE Database Access – Update and Query the RIPE Database Internet number resources – globally unique address space (IPv4 and IPv6) and Autonomous System Numbers (ASNs) issued by any Internet Number Registry. Primary objects – Internet number resources and other data object types that are not directly related to any other primary object type and which are defined by Routing Policy Specification Language (RPSL) or which have been agreed by the RIPE Community as acceptable primary data. Secondary objects – objects that are defined by RPSL or which have been agreed by the RIPE Community as acceptable secondary data and which are related, either directly or indirectly, to primary objects. -
Internet Governance and the Move to Ipv6
Internet Governance and the move to IPv6 TU Delft April 2008 Alex Band & Arno Meulenkamp Internet Governance Community Policies Internet Resource Statistics IPv6 2 Internet Governance ISOC IETF ICANN / IANA RIRs 4 The 5 RIRs 5 What is RIPE NCC? RIPE NCC is –a Network Coordination Center –an independent organisation –a not-for-profit membership association –one of the 5 Regional Internet Registries 6 Registration 7 Goals of the IR System: Registration Why? Ensure uniqueness of IP address space usage Provide contact information for network operators How? RIPE Database Results: IP address space allocated uniquely Contact information available for Internet resources 8 Aggregation 9 Goals of the IR System: Aggregation Why? Routing table grows fast Provide scalable routing solution for the Internet How? Encourage announcement of whole allocations (min /21) Introduction of Classless Inter Domain Routing (CIDR) Results: Growth of routing table slowed down 10 Conservation 11 Goals of the IR System: Conservation Why? IP address space is limited resource Ensure efficient usage How? Introduction of CIDR Community based policies to ensure fair usage Results: IP address space consumption slowed Address space allocated on ‘need to use’ basis 12 IP address distribution IANA RIR LIR /23 /25 /25 End User Allocation PA Assignment PI Assignment 13 Community Policies Policy Development Cycle Need Evaluation Proposal Execution Discussion Consensus 15 How policy is made ICANN / IANA ASO AfriNIC RIPEReach NCC consensus ARIN across communitiesAPNIC LACNIC AfriNIC -
High Volume of European Network Traffic Re-Routed Through China
Memo 11/06/2019 - TLP:WHITE High volume of European network traffic re-routed through China Telecom Reference: Memo [190611-1] Date: 11/06/2019 - Version: 1.0 Keywords: BGP, digital infrastructure, China Sources: publicly available information Key Points A routing incident led to 70 000 routes used for European traffic being redirected through China Telecom for over 2 hours. Border Gateway Protocol (BGP) errors are a relatively common issue but usually last just a few minutes. China Telecom has still not implemented some basic routing safeguards to detect and remediate them in a timely manner. Summary On June 6, a routing incident led to over 70 000 routes used for European mobile networks being redirected through China Telecom for over two hours. The incident began at 09:43 UTC when Swiss data centre colocation company Safe Host (AS21217) unintentionally leaked over 70 000 routes to China Telecom (AS4134) in Frankfurt, Germany. China Telecom then announced these routes on to the global internet redirecting large amounts of traffic destined for some of the largest European mobile networks through China Telecom’s network. Some of the most impacted European networks included Swisscom (AS3303) of Switzerland, KPN (AS1136) of Holland, Bouygues Telecom (AS5410) and Numericable-SFR (AS21502) of France. Often routing incidents only last for a few minutes, but in this case, many of the leaked routes were in circulation for over two hours. Comments China Telecom, a major international carrier, has still not implemented neither the basic routing safeguards necessary to prevent propagation of routing leaks nor the processes and procedures necessary to detect and remediate them in a timely manner when they inevitably occur. -
RIPE NCC Membership RIPE NCC Activities and Services Training Services
Quick Overview RIPE NCC Membership RIPE NCC Activities and Services Training Services The RIPE NCC is an independent, not-for- Anyone can become a member of the RIPE Membership Services RIPE NCC General Meeting The RIPE NCC provides the following training In 2010, the RIPE NCC gave 89 training profit membership organisation based in NCC. Most members are Internet Service courses to its members: courses in 35 countries in the RIPE NCC Amsterdam, the Netherlands. It was formed in Providers (ISPs), telecommunication Allocation of IP addresses – IPv6 and General Meetings (GM) are held twice a year service region. Over 1,700 Local Internet 1992 and now supports over 7,150 members organisations, corporations, academic IPv4, Autonomous System Numbers and all members are strongly encouraged Local Internet Registry (LIR) Training Registry (LIR) staff participated. The RIPE in 78 countries in its service region (see map). institutions and government bodies. (ASNs) – and the management of reverse to attend. During the GM, members vote to Course – a one-day introduction to NCC also gives customised presentations DNS delegations accept the RIPE NCC Charging Scheme and can administrative procedures and policies and seminars for industry events and As the Regional Internet Registry (RIR) for Members manage and distribute the Internet Provision of RIPE NCC Training Courses elect a candidate to a vacant seat on the RIPE related to obtaining and distributing conferences. For more information, or to Europe, the Middle East and parts of Central number resources they receive from the RIPE Support for new Local Internet NCC Executive Board. More information about Internet resources and operating an host a training course, please contact: Asia, the RIPE NCC provides Internet number NCC at a local level. -
Information on Membership, Services and Activities Quick Overview RIPE NCC Services and Activities
RIPE NETWORK COORDINATION CENTRE About the RIPE NCC Information on membership, services and activities Quick Overview RIPE NCC Services and Activities The RIPE NCC is an independent, not-for-profit membership In addition to providing services related to the assignment and allocation of organisation based in Amsterdam, the Netherlands. Internet number resources, the RIPE NCC also supports the operation and RIPE NETWOR COORDINATION CENTRE development of the Internet for the benefit of the Internet community as a whole: As the Regional Internet Registry (RIR) for Europe, the The RIPE NCC is an open and transparent, neutral and DATABASE SERVICES community at regional GM, members vote to accept the RIPE Middle East and parts of Central Asia, the RIPE NCC impartial organisation. It has no commercial interests • Development, operation and and global industry-related events NCC Charging Scheme and can elect provides Internet number resources, such as IPv4 and or influences and operates as a bottom-up and self- maintenance of the RIPE Database and when liaising with governments candidates to vacant seats on the IPv6 address space and Autonomous System Numbers governing organisation. This means that the policies and operation of an Internet and regulators RIPE NCC Executive Board. (ASNs), to its members. It also offers other services and procedures that govern the way the RIPE NCC Routing Registry (IRR) • Administrative support for the ripe.net/gm related to the technical coordination of the Internet. operates are proposed, discussed and accepted -
Characterizing User-To-User Connectivity with RIPE Atlas
Characterizing User-to-User Connectivity with RIPE Atlas Petros Gigis Vasileios Kotronis Emile Aben RIPE NCC, Netherlands FORTH-ICS, Greece RIPE NCC, Netherlands FORTH-ICS, Greece [email protected] [email protected] [email protected] Stephen D. Strowes Xenofontas Dimitropoulos RIPE NCC, Netherlands FORTH-ICS, Greece [email protected] [email protected] ABSTRACT what RIPE Atlas probes can tell us about the interconnectivity of Characterizing the interconnectivity of networks at a country level networks which serve the majority of users in a given country. e is an interesting but non-trivial task. e IXP Country Jedi [8] following interesting questions arise in this context: is an existing prototype that uses RIPE Atlas probes in order to (Q1) How many of the eyeball networks within a country contain explore interconnectivity at a country level, taking into account all RIPE Atlas probes, and are thus measurable? Autonomous Systems (AS) where RIPE Atlas probes are deployed. (Q2) Do the “trac locality” and “direct connectivity” properties In this work, we build upon this basis and specically focus on actually hold for the majority of users at a country level? “eyeball” networks, i.e. the user-facing networks with the largest Answering these questions presents a number of challenges: user populations in any given country, and explore to what extent (C1) What is the most suitable approach to visualize the associ- we can provide insights on their interconnectivity. In particular, ated statistics and measurements? with a focused user-to-user (and/or user-to-content) version of (C2) What is a suitable probe selection strategy in order to infer the IXP Country Jedi we work towards meaningful statistics and common connectivity between eyeball networks within a country, comparisons between countries/economies. -
Daniel Karrenberg
Developments in the Internet A Consumer View with Global Routing Interludes [email protected] 1 Daniel Karrenberg . January 2006 . http://www.ripe.net Internet @ Karrenberg’s • 1990, 1995, 2000, 2005, 2010 • A somewhat personal story. • Take your own conclusions for economy/region. • Much is from memory, • … but some from my mail archives. • All is generalised, not an effort to be 100% exact. 2 Daniel Karrenberg . January 2006 . http://www.ripe.net 1990 Date: Fri, 05 Jan 90 05:41:43 GMT From: Greg Satz <[email protected]> To: Daniel Karrenberg <[email protected]> Cc: [email protected] Daniel, You found a bug in our reporting of the IP Accounting information via SNMP. It will miss certain sequences of entries when asked to do the Get-Next operation. To answer your other questions, we only return the current IP Accounting table and not the check-pointed version. It wasn't clear at the time what information would be necessary to obtain via SNMP. What other IP Accounting information would be useful to you via SNMP? Greg 3 Daniel Karrenberg . January 2006 . http://www.ripe.net 1990 Date: Thu, 11 Jan 90 12:47:58 PST From: [email protected] (Tony Li) To: [email protected] Subject: Time to start a newsgroup... It looks like traffic on this list is increasing, and it seems like it's a good time to start a parallel USEnet newsgroup. Attached is the posting that I've already made to news.announce.newgroups. ..... Tony 4 Daniel Karrenberg . January 2006 . http://www.ripe.net Service 1990 • 9600 bit/s dial-up • 200+ $ / month • No IP • IP to the home/office is hard to obtain.