Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
RPKI Standards Activity Geoff Huston APNIC February 2010.
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
RPKI Certificate Policy Status Update Stephen Kent.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLSM and CIDR Routing Protocols and Concepts – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLSM and CIDR Routing Protocols and Concepts – Chapter 6.
APNIC Member Services George Kuo. MyAPNIC 2 What is MyAPNIC A secure Member services website Internet resources management, for example: –Whois updates.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
Digital Signatures and Hash Functions. Digital Signatures.
BGP.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
Prepared By: Eng.Ola M. Abd El-Latif
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
Presented By: Hanping Feng Configuring BGP With Cisco IOS Software (Part 1)
Resource Certification What it means for LIRs Alain P. AINA Special Project Manager.
Draft-ni-l3vpn-pm-bgp-ext-00IETF 87 L3VPN1 BGP Extension For L3VPN PM draft-ni-l3vpn-pm-bgp-ext-00 Hui Ni, Shunwan Zhuan, Zhenbin Li Huawei Technologies.
The Resource Public Key Infrastructure Geoff Huston APNIC.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
A PKI for IP Address Space and AS Numbers Stephen Kent.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
João Damas. APRICOT 2002, March 2002, Bangkok. 1 Extending RPSL: IPv6, multicast, … Presented by João Damas RIPE NCC.
IS-IS WG - IETF 71 Summary Route with Detailed Reachability George Swallow, Clarence Filsfils, Stefano Previdi
1 ADVANCED MICROSOFT WORD Lesson 14 – Editing in Workgroups Microsoft Office 2003: Advanced.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLSM and CIDR Routing Protocols and Concepts – Chapter 6.
BGPSEC : A BGP Extension to Support AS-Path Validation Matt Lepinski BBN Technologies.
Draft-ietf-fecframe-config-signaling-02 1 FEC framework Configuration Signaling draft-ietf-fecframe-config-signaling-02.txt IETF 76 Rajiv Asati.
Manifests (and Destiny?) Stephen Kent BBN Technologies.
03/26/2009draft-cheng-grow-bgp-xml-00.txt 1 An XML Format for BGP Data Collection draft-cheng-grow-bgp-xml-00.txt Dan Massey Kevin BurnettPayne Cheng He.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Overview of draft-ietf-sidr-roa-00.txt Steve Kent BBN Technologies.
News from APNIC German Valdez Communications Area Manager RIPE October 2008.
XPath --XML Path Language Motivation of XPath Data Model and Data Types Node Types Location Steps Functions XPath 2.0 Additional Functionality and its.
1 draft-sidr-bgpsec-protocol-05 Open Issues. 2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor.
Wed 24 Mar 2010SIDR IETF 77 Anaheim, CA1 SIDR Working Group IETF 77 Anaheim, CA Wednesday, Mar 24, 2010.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Outbound Route Filtering.
Draft-ietf-sidr-roa-format draft-ietf-sidr-arch Matt Lepinski BBN Technologies.
RFC 4068bis draft-ietf-mipshop-fmipv6-rfc4068bis-01.txt Rajeev Koodli.
Resource Certification in MyAPNIC Robert Loomans Senior Software Engineer, APNIC.
SCVP-28 Tim Polk November 8, Current Status Draft -27 was submitted in June ‘06 –AD requested a revised ID 8/11 –No related discussion on list –Editors.
BGP Validation Russ White Rule11.us.
Using BGP to Bind MPLS Labels to Address Prefixes draft-rosen-idr-rfc3107bis-00 Eric Rosen (presented by Ross Callon) IETF 95 MPLS WGdraft-rosen-idr-rfc3107bis-001.
BGP extensions for Path Computation Element (PCE) Discovery in a BGP/MPLS IP-VPN draft-kumaki-pce-bgp-disco-attribute-03.txt Kenji Kumaki KDDI R&D Labs,
BGPSEC Protocol (From -01 to -02 and on to -03) Matt Lepinski.
Secure Proxy ND Support for SEND draft-krishnan-csi-proxy-send-00
November 2006 Geoff Huston APNIC
APNIC Trial of Certification of IP Addresses and ASes
Network Layer: Logical Addressing
APNIC Trial of Certification of IP Addresses and ASes
Resource Certificate Profile
STIR WG IETF-100 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-01) November, 2017 Ray P. Singh, Martin Dolly, Subir Das,
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
Progress Report on Resource Certification
Routing Protocols and Concepts – Chapter 6
ROA Content Proposal November 2006 Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Routing Protocols and Concepts – Chapter 6
Routing Protocols and Concepts – Chapter 6
Presentation transcript:

Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies

2 Presentation Outline  Review of route origination security  Review of high level ROA design  Changes from -00  Open Issues Matching of ROAs to EE certs Matching of ROAs to route advertisements  Questions

3 Route Origination Security  One goal of this PKI is to enable ISPs to verify route origination assertions in BGP UPDATE messages  To support this goal, each address space holder needs to digitally sign one or more objects that identify each AS authorized to advertise routes on behalf of the address space holder  We call the object a route origination authorization (ROA)  An address space holder issues a distinct ROA to each ISP he wants to advertise all or a portion of his address space  Since each ISP is an address space holder, it would sign one or more ROAs (one per AS number) authorizing itself to advertise the addresses it holds

4 Validity of a Route Origination A route origination is valid if: 1.The route advertisement “matches” a ROA AS number “matches” IP address prefix “matches” the NLRI 2.The ROA “matches” an EE certificate Signature is valid IP addresses “match” 3.The EE certificate is valid as described in: draft-ietf-sidr-res-certs

5 Route Origination Validation RIR (CA) Subscriber (CA) Subscriber (shadow) ROA Route Advertisement

6 ROA Design  A ROA has four major data elements, encapsulated in a CMS signed data object A version number One of more address prefixes, corresponding to the NLRI that the ROA signer authorizes for origination by one or more ISPs A flag indicating the semantics for matching the NLRI to the prefixes in the ROA An AS number of an ISP authorized to originate routes to the above list of prefixes  We use the CMS format to represent a signed ROA, as this format is well supported in open source software

7 Changes Since -00  OID bug fix in the CMS profile  ROAs now include only IP address prefixes and not IP address ranges (as in RFC 3779)  Added a Boolean ExactMatch flag to the ROA to indicate semantics for NLRI to ROA “matching” TRUE means the AS may only advertise the prefixes that appear in the ROA FALSE means the AS may advertise the prefixes in the ROA or any more specific prefixes  Added a section describing how a ROA is validated

8 ROA Format RouteOriginAttestation ::= SEQUENCE { version [0] INTEGER DEFAULT 0, -- this is the ROA version # asID ASID, exactMatch BOOLEAN, ipAddrBlocks ROAIPAddrBlocks } ASID ::= INTEGER ROAIPAddrBlocks ::= SEQUENCE of ROAIPAddressFamily ROAIPAddressFamily ::= SEQUENCE { addressFamily OCTET STRING (SIZE (2..3)), addresses SEQUENCE OF IPAddress } -- Only two address families: IPv4 and IPv6 IPAddress ::= BIT STRING

9 Issue: Matching ROA to EE Cert  EE Certificates use IP address ranges for compact representation of multiple prefixes  ROAs include only prefixes and not ranges  For example: ROA includes: /8 and /8 EE Certificate:  Proposed Solution: Add text that clarifies this point and provides more detailed instructions for performing the comparison

10 Issue: Matching ROA to NLRI (1/2)  The -00 version of the draft specified that the NLRI in an advertisement must exactly match a prefix in the ROA  Feedback on the list was that this is too restrictive  The suggestion was made to introduce the following four options (taken from RPSL): Exact Match Any more specific prefix Any more specific prefix of length exactly X Any more specific prefix of length between X and Y

11 Issue: Matching ROA to NLRI (2/2)  Not possible to use the RPSL syntax given the current usage of RFC 3779 ASN.1  Analysis of the RIPE IRR indicates that only two of the RPSL semantics are widely used: Exact Match and Any More Specific Prefix Any Prefix of Length X was used by fewer than 5 ASes Prefixes between Length X and Y was used in situations where Any More Specific Prefix would also work  Proposed Solution: Keep the current flag to express the Exact Match and Any More Specific Prefix semantics

12 Thank You