Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston Chief Scientist APNIC.

Slides:



Advertisements
Similar presentations
RPKI Standards Activity Geoff Huston APNIC February 2010.
Advertisements

Update on Resource Certification Geoff Huston, APNIC Mark Kosters, ARIN SSAC Meeting, March 2008.
1 APNIC Resource Certification Service Project Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam George Michaelson.
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
RPKI Certificate Policy Status Update Stephen Kent.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Nigel Titley. RIPE 54, 9 May 2007, Tallinn, Estonia. 1 RIPE NCC Certification Task Force Update Presented by Nigel Titley RIPE NCC.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC Open Policy Meeting SIG: Whois Database October 2000 APNIC Certificate Authority.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
RPKI and Routing Security ICANN 44 June Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.
Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
RPKI Validation - Revisited draft-huston-rpki-validation-01.txt Geoff Huston George Michaelson APNIC Slide 1/19.
RPKI Validation - Revisited draft-huston-rpki-validation-00.txt Geoff Huston George Michaelson APNIC.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
What’s Next: DNSSEC & RPKI Mark Kosters. Why are DNSSEC and RPKI Important Two critical resources – DNS – Routing Hard to tell when it is compromised.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Securing the Border Gateway Protocol Using S-BGP Dr. Stephen Kent Chief Scientist - Information Security APNIC Open Policy Meeting Routing.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007.
Summary Report on Resource Certification February 2007 Geoff Huston Chief Scientist APNIC.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC.
Progress Report on resource certification February 2007 Geoff Huston Chief Scientist APNIC.
Resource Certification What it means for LIRs Alain P. AINA Special Project Manager.
Progress Report on APNIC Trial of Certification of IP Addresses and ASes APNIC 22 September 2006 Geoff Huston.
The Resource Public Key Infrastructure Geoff Huston APNIC.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Regional Internet Registries Statistics & Activities IETF 55 Atlanta Prepared By APNIC, ARIN, LACNIC, RIPE NCC.
Attribute Certificate By Ganesh Godavari. Talk About An Internet Attribute Certificate for Authorization -- RFC 3281.
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Using Resource Certificates Progress Report on the Trial of Resource Certification November 2006 Geoff Huston APNIC.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Overview of draft-ietf-sidr-roa-00.txt Steve Kent BBN Technologies.
Securing the Internet Backbone: Current activities in the IETF’s Secure InterDomain Routing Working Group Geoff Huston Chief Scientist, APNIC.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Comments on draft-ietf-pkix-rfc3280bis-01.txt IETF PKIX Meeting Paris - August 2005 Denis Pinkas
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC.
Authentication Presenter Meteor Advisory Team Member Version 1.1.
November 2006 Geoff Huston APNIC
Cryptography and Network Security
Authentication Applications
RPKI Trust Anchor Geoff Huston APNIC.
APNIC Trial of Certification of IP Addresses and ASes
APNIC Trial of Certification of IP Addresses and ASes
Resource Certificate Profile
Progress Report on Resource Certification
October 2006 Geoff Huston APNIC
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Presentation transcript:

Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston Chief Scientist APNIC

From the PPML Mailing List … ("Capturing Originations in Templates") Sandy Murphy: If the discipline and scrutiny could be transferred somehow to the routing registry, that's great. Mark Kosters: The PKI effort […] allows for strong security. However, there much work to be done here and the end result may be complex Ed Lewis: ARIN can only offer up the attestations from the what it knows (securely)

Address and Routing Security The (very) basic routing security questions that need to be answered are: –Is this a valid address prefix? Valid: That the prefix has been allocated through the address distribution framework, and that this allocation sequence can be demonstrated and validated

Motivation: Address and Routing Security The (very) basic routing security questions that need to be answered are: –Is this a valid address prefix? –Who advertised this address prefix into the network? Who: The route originator, identified by the origin AS of the corresponding route object. The originating AS also should be valid.

Motivation: Address and Routing Security The (very) basic routing security questions that need to be answered are: –Is this a valid address prefix? –Who advertised this address prefix into the network? –Did they have the necessary credentials to advertise this address prefix? Credentials: Can a link be established between the address holder and the route originator such that the address holder has explicitly authorized the originating AS?

Motivation: Address and Routing Security The (very) basic routing security questions that need to be answered are: –Is this a valid address prefix? –Who advertised this address prefix into the network? –Did they have the necessary credentials to advertise this address prefix? –Is the advertised path authentic? An authentic path: A sequence of valid ASs that represents a transit path from the current location to the prefix and/or A sequence of valid ASs that represents the path of the routing update message

What would be good … To be able to use a reliable infrastructure to validate assertions about addresses and their use: –Publish routing authorities authored by a resource holder that cannot be altered or forged –Allow third parties to authenticate that an address or routing assertion was made by the current right-of- use holder of the number resource

What would be even gooder … Is to have a reliable, efficient, and effective way to underpin the integrity of the Internet’s address resource distribution structure and our use of these resources in the operational Internet Is to replace various forms of risk-prone assertions, rumours, implicit trust and fuzzy traditions about addresses and their use with demonstrated validated authority

Resource Certificate Trial Approach: –Use X.509 v3 Public Key Certificates (RFC3280) with IP address and ASN extensions (RFC3779) Parameters: –Use existing technologies where possible –Leverage on existing open source software tools and deployed systems –Contribute to open source solutions and open standards OpenSSL as the foundational platform –Add RFC3779 (resource extension) support Design of a Certification framework –anchored on the IP resource distribution function

The certificate’s Issuer certifies that: the certificate’s Subject whose public key is contained in the certificate is the current controller of a collection of IP address and AS resources that are listed in the certificate’s resource extension Resource Public Key Certificates This is not an attestation relating to identity or role – it is an attestation that in effect binds a private key to a right-of-use of a number resource collection This is not an attestation about any form of related routing policies

Resource Certificates IANA AFRINICAPNICARINRIPE NCCLACNIC LIR1LIR2 ISP Resource Allocation Hierarchy

Resource Certificates IANA AFRINICRIPE NCCARINAPNICLACNIC NIR1NIR2 ISP Resource Allocation Hierarchy Issued Certificates match allocation actions

Resource Certificates IANA AFRINICRIPE NCCARINAPNICLACNIC NIR1NIR2 ISP ISP4ISP Issuer: APNIC Subject: NIR2 Resources: /16 Key Info: Signed: Issued Certificates Resource Allocation Hierarchy

Resource Certificates IANA AFRINICRIPE NCCARINAPNICLACNIC NIR1NIR2 ISP ISP4ISP Issuer: APNIC Subject: NIR2 Resources: /16 Key Info: Signed: Issued Certificates Resource Allocation Hierarchy Issuer: NIR2 Subject: ISP4 Resources: /24 Key Info: Signed:

Resource Certificates IANA AFRINICRIPE NCCARINAPNICLACNIC NIR1NIR2 ISP ISP4ISP Issuer: APNIC Subject: NIR2 Resources: /16 Key Info: Signed: Issued Certificates Resource Allocation Hierarchy Issuer: NIR2 Subject: ISP4 Resources: /22 Key Info: Signed: Issuer: ISP4 Subject: ISP4-EE Resources: /24 Key Info: Signed:

Base Object in a Routing Authority Context IANA AFRINICRIPE NCCARINAPNICLACNIC NIR1NIR2 ISP ISP4ISP Issued Certificates Resource Allocation Hierarchy Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24”

Signed Objects IANA AFRINICRIPE NCCARINAPNICLACNIC LIR1NIR2 ISP ISP4ISP Issued Certificates Resource Allocation Hierarchy Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4

Signed Object Validation IANA AFRINICRIPE NCCARINAPNICLACNIC LIR1NIR2 ISP ISP4ISP Issued Certificates Resource Allocation Hierarchy Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 1. Did the matching private key sign this text?

Signed Object Validation IANA AFRINICRIPE NCCARINAPNICLACNIC LIR1NIR2 ISP ISP4ISP Issued Certificates Resource Allocation Hierarchy Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 2. Is this certificate valid?

Signed Object Validation IANA AFRINICRIPE NCCARINAPNICLACNIC LIR1NIR2 ISP ISP4ISP Issued Certificates Resource Allocation Hierarchy Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 3. Is there a valid certificate path from a Trust Anchor to this certificate? APNIC Trust Anchor

Signed Object Validation IANA AFRINICRIPE NCCARINRIPE NCCLACNIC LIR1LIR2 ISP ISP4ISP Issued Certificates Resource Allocation Hierarchy Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 RIPE NCC Trust Anchor Validation Outcomes 1.ISP4 authorized this Authority document /24 is a valid address, derived from an APNIC allocation 3.ISP4 holds a current right-of-use of /24 4.A route object, where AS65000 originates an advertisement for the address prefix /24, has the explicit authority of ISP4, who is the current holder of this address prefix Validation Outcomes 1.ISP4 authorized this Authority document /24 is a valid address, derived from an APNIC allocation 3.ISP4 holds a current right-of-use of /24 4.A route object, where AS65000 originates an advertisement for the address prefix /24, has the explicit authority of ISP4, who is the current holder of this address prefix

What could you do with Resource Certificates? Issue signed subordinate resource certificates for any sub-allocations of resources, such as may be seen in a LIR context Maintain a certificate collection that matches the current resource allocation state LIR ISP

What could you do with Resource Certificates? Sign routing authorities, routing requests, WHOIS objects or IRR objects with your private key Use the private key to sign attestations with a signature that is associated with a right-of-use of a resource LIR1 ISP ISP4 Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4 Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix /24” Attachment: Signed, ISP4

What could you do with Resource Certificates? Validate signed objects Authentication: Did the resource holder really produce this document or object? Authenticity: Is the document or object in exactly the same state as it was when originally signed? Validity: Is the document valid today? –A relying party can use Resource Certificate tools to: authenticate that the signature matches the signed object, validate the signature against the matching certificate’s public key, validate the certificate in the context of the Resource PKI

netnum-set: RS-TELSTRA-AU-EX1 descr: Example routes for customer with space under apnic members: , /24 tech-c: GM85-AP admin-c: GM85-AP notify: mnt-by: MAINT-AU-TELSTRA-AP sigcert: rsync://repository.apnic.net/TELSTRA-AU-IANA/cbh3Sk-iwj8Yd8uqaB5 Ck010p5Q/Hc4yxwhTamNXW-cDWtQcmvOVGjU.cer sigblk: -----BEGIN PKCS MIIBdQYJKoZIhvcNAQcCoIIBZjCCAWICAQExCzAJBgUrDgMCGgUAMAsGCSqGSIb3 DQEHATGCAUEwggE9AgEBMBowFTETMBEGA1UEAxMKdGVsc3RyYS1hdQIBATAJBgUr DgMCGgUAMA0GCSqGSIb3DQEBAQUABIIBAEZGI2dAG3lAAGi+mAK/S5bsNrgEHOmN 1leJF9aqM+jVO+tiCvRHyPMeBMiP6yoCm2h5RCR/avP40U4CC3QMhU98tw2Bq0TY HZvqXfAOVhjD4Apx4KjiAyr8tfeC7ZDhO+fpvsydV2XXtHIvjwjcL4GvM/gES6dJ KJYFWWlrPqQnfTFMm5oLWBUhNjuX2E89qyQf2YZVizITTNg3ly1nwqBoAqmmDhDy +nsRVAxax7II2iQDTr/pjI2VWfe4R36gbT8oxyvJ9xz7I9IKpB8RTvPV02I2HbMI 1SvRXMx5nQOXyYG3Pcxo/PAhbBkVkgfudLki/IzB3j+4M8KemrnVMRo= -----END PKCS changed: source: APNIC Example of a Signed Object

netnum-set: RS-TELSTRA-AU-EX1 descr: Example routes for customer with space under apnic members: , /24 tech-c: GM85-AP admin-c: GM85-AP notify: mnt-by: MAINT-AU-TELSTRA-AP sigcert: rsync://repository.apnic.net/TELSTRA-AU-IANA/cbh3Sk-iwj8Yd8uqaB5 Ck010p5Q/Hc4yxwhTamNXW-cDWtQcmvOVGjU.cer sigblk: -----BEGIN PKCS MIIBdQYJKoZIhvcNAQcCoIIBZjCCAWICAQExCzAJBgUrDgMCGgUAMAsGCSqGSIb3 DQEHATGCAUEwggE9AgEBMBowFTETMBEGA1UEAxMKdGVsc3RyYS1hdQIBATAJBgUr DgMCGgUAMA0GCSqGSIb3DQEBAQUABIIBAEZGI2dAG3lAAGi+mAK/S5bsNrgEHOmN 1leJF9aqM+jVO+tiCvRHyPMeBMiP6yoCm2h5RCR/avP40U4CC3QMhU98tw2Bq0TY HZvqXfAOVhjD4Apx4KjiAyr8tfeC7ZDhO+fpvsydV2XXtHIvjwjcL4GvM/gES6dJ KJYFWWlrPqQnfTFMm5oLWBUhNjuX2E89qyQf2YZVizITTNg3ly1nwqBoAqmmDhDy +nsRVAxax7II2iQDTr/pjI2VWfe4R36gbT8oxyvJ9xz7I9IKpB8RTvPV02I2HbMI 1SvRXMx5nQOXyYG3Pcxo/PAhbBkVkgfudLki/IzB3j+4M8KemrnVMRo= -----END PKCS changed: source: APNIC Example of a Signed Object

Signer’s certificate Version: 3 Serial: 1 Issuer: CN=telstra-au Validity: Not Before: Fri Aug 18 04:46: GMT Validity: Not After: Sat Aug 18 04:46: GMT Subject: CN=An example sub-space from Telstra IANA, Subject Key Identifier g(SKI): Hc4yxwhTamNXW-cDWtQcmvOVGjU Subject Info Access: caRepository – rsync://repository.apnic.net/TELSTRA-AU-IANA/cbh3Sk-iwj8Yd8uqaB5 Ck010p5Q/Hc4yxwhTamNXW-cDWtQcmvOVGjU Key Usage: DigitalSignature, nonRepudiation CRL Distribution Points: rsync://repository.apnic.net/TELSTRA-AU-IANA/cbh3Sk-iwj8Yd8uqaB5 Ck010p5Q.crl Authority Info Access: caIssuers – rsync://repository.apnic.net/TELSTRA-AU-IANA/cbh3Sk-iwj8Yd8uqaB5 Ck010p5Q.cer Authority Key Identifier: Key Identifier g(AKI): cbh3Sk-iwj8Yd8uqaB5Ck010p5Q Certificate Policies: IPv4: , /24

Signer’s certificate Version: 3 Serial: 1 Issuer: CN=telstra-au Validity: Not Before: Fri Aug 18 04:46: GMT Validity: Not After: Sat Aug 18 04:46: GMT Subject: CN=An example sub-space from Telstra IANA, Subject Key Identifier g(SKI): Hc4yxwhTamNXW-cDWtQcmvOVGjU Subject Info Access: caRepository – rsync://repository.apnic.net/TELSTRA-AU-IANA/cbh3Sk-iwj8Yd8uqaB5 Ck010p5Q/Hc4yxwhTamNXW-cDWtQcmvOVGjU Key Usage: DigitalSignature, nonRepudiation CRL Distribution Points: rsync://repository.apnic.net/TELSTRA-AU-IANA/cbh3Sk-iwj8Yd8uqaB5 Ck010p5Q.crl Authority Info Access: caIssuers – rsync://repository.apnic.net/TELSTRA-AU-IANA/cbh3Sk-iwj8Yd8uqaB5 Ck010p5Q.cer Authority Key Identifier: Key Identifier g(AKI): cbh3Sk-iwj8Yd8uqaB5Ck010p5Q Certificate Policies: IPv4: , /24

Potential Use Scenarios Service interface via a Web Portal: Generate and Sign “objects” Validate signed objects against the Resource PKI Manage subordinate certificate issuance (Automated certificate management processes) Local Tools – LIR Use Local repository management Resource object signing Generate and lodge certificate objects Local certificate cache management Validate signed objects against the PKI

Demonstration - Signing The Setup: –Web Portal interface using REST framework –Local instance of an ISP Issued Certificate set matching allocated resources Local CA and key manager End-Entity Certificate Manager Resource Collection Manager Signed Object Manager An ISP can sign objects using resource collections

Resource Collection Tool Resources can be subdivided into “collections” and each collection can be named. This section of the portal provides tools to manage resource collections A resource collection is used to sign a document (or any other digital object)

Resource Signing Tool Documents can be signed with a resource collection, and associated validity dates. Signed objects can also be reissued and deleted The underlying resource certificate generation and management tasks are not directly exposed in this form of the signing tool

A Plea to the Demonstration Gods… I received the following note about this code:…. “In all of the combinations I've tested, it seems to work. Geoff, you will want to double check the particular examples you want to demonstrate, but it should work.” So, with some trepidation………

Demonstration - Validation The Setup: –Local instance of a signed object validator Local Trust Anchors Local (partial) copy of a synchronized certificate collection Takes a signed object and checks the integrity of the object, that the listed public keys match the signatures of the object, and that the certificates in the object are all valid (using Local Trust Anchors) Reports the resources used to sign the object.

Resource Certificate Trial Program üSpecification of X.509 Resource Certificates üGeneration of resource certificate repositories aligned with existing resource allocations and assignments üTools for Registration Authority / Certificate Authority interaction (undertaken by RIPE NCC) üTools to perform validation of resource certificates Current Activities ­Extensions to OpenSSL for Resource Certificates (open source development activity, supported by ARIN) ­Tools for resource collection management, object signing and signed object validation (APNIC, and also open source development activity, supported by ARIN) ­LIR / ISP Tools for certificate management ­Testing, Testing, Testing ­Operational service profile specification

Next Steps … 1.Complete current trial activities by EOY 06 2.APNIC Evaluation of Trial activities –Status of work items –Does this approach meet the objectives? –What are the implications of this form of certification of resources? –Impact assessment Service infrastructure, operational procedures Utility of the authentication model Policy considerations –Recommendations for production deployment

Credit where credit is due….. The design and implementation team involved in this trial: –George Michaelson –Rob Loomans –Geoff Huston –Randy Bush –Rob Austein –Rob Kisteleki –Steve Kent –Russ Housley Working notes and related material we’ve been working on in this trial activity are at

Thank You