RIPE NCC IRR training 4 February 2011 Zurich, Switzerland IPv6 Golden Networks Jeroen Massar Things to watch.

Slides:



Advertisements
Similar presentations
Source Validation 111. BCP 38 Ingress Packet Filtering Your customers should not be sending any IP packets out to the Internet with a source address other.
Advertisements

1 Securing BGP using DNSSEC Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
IPv4 Run Out and Transitioning to IPv6 Marco Hogewoning Trainer, RIPE NCC.
17/10/031 Summary Peer to peer applications and IPv6 Microsoft Three-Degrees IPv6 transition mechanisms used by Three- Degrees: 6to4 Teredo.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
SAVI IP Source Guard draft-baker-sava- implementation Fred Baker.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
ISOC-Chicago 2001John Kristoff - DePaul University1 Journey to the Center of the Internet John Kristoff DePaul University.
© 2010 IBM Corporation Jeroen Massar Security, DDoS and AntiSpam How to secure the Internet outside of the bunkers inside the Swiss Alps IBM Research –
Andrei Robachevsky, Shane Kerr. APNIC/APRICOT2001, February 2001, Kuala Lumpur, Malaysia. 1 Routing Registry Consistency Check Presented.
1 Securing BGP Large scale trust to build an Internet again Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
The Resource Public Key Infrastructure Geoff Huston APNIC.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
Edge Protection 111. The Old World: Network Edge Core routers individually secured Every router accessible from outside “outside” Core telnet snmp.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Copyright © 2011 Japan Network Information Center JPNIC ’ s RQA and Routing Related Activities JPNIC IP Department Izumi Okutani APNIC32 Aug 2011, Busan.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
Alberto Rivai Teknologi pemantauan jaringan internet untuk pendeteksian dini terhadap ancaman dan gangguan Alberto Rivai
Simple Multihoming Experiment draft-huitema-multi6-experiment-00.txt Christian Huitema, Microsoft David Kessens, Nokia.
Lecture 4: BGP Presentations Lab information H/W update.
Infrastructure Attack Vectors and Mitigation Benno Overeinder NLnet Labs.
BCOP on Anti-Spoofing Long known problem Deployment status Reason for this work Where more input needed.
APNIC Internet Routing Registry An introduction to the IRR TWNIC Meeting, 3 December 2003 Nurani Nimpuno, APNIC.
BGP operations and security draft-jdurand-bgp-security-02.txt Jerome Durand Gert Doering Ivan Pepelnjak.
Staff AAA. Radius is not an ISP AAA Option RADIUS TACACS+ Kerberos.
1 Requirements for IPv6 prefix delegation Shin Miyakawa, Ph.D NTT Communications / WIDE Project
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
1 pa-mhome-community IPv6 multihoming using provider independent (PI) space not possible (until now?) Other approaches not ready yet (shim6) So use more.
Internetdagarna October 2008 Folkets Hus, Stockholm IPv6 Golden Networks Jeroen Massar, SixXS /
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
Routing integrity in a world of Bandwidth on Demand Dave Wilson DW238-RIPE
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
1 Extreme Networking at Home Jari Arkko, Ericsson.
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
RPKI implementation experiences in the LAC Region Carlos M. Martínez – Arturo Servín LACSEC 2012 – LACNIC XVIII.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
NANOG February 2010 Austin, Texas, USA IPv6 Golden Networks Jeroen Massar, IBM Zurich Research Laboratory AURORA
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
BGP Validation Russ White Rule11.us.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Introduction to OSPF Campus Networking Workshop These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license.
Networking Objectives Recap and understand the following network addressing terms – IP address – MAC address – Packet – protocol.
IPv6 investigation within Informatics George Ross
Filtering Spoofed Packets
Stateless Source Address Mapping for ICMPv6 Packets
IPv6 investigation within Informatics George Ross
Are We There Yet? On RPKI Deployment and Security
COS 561: Advanced Computer Networks
MANRS for IXPs Why we did it? What did we do?
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Peering Security DKNOG, March 14-15, 2019 Susan Forney and Walt Wollny
FIRST How can MANRS actions prevent incidents .
Validating MANRS of a network
Presentation transcript:

RIPE NCC IRR training 4 February 2011 Zurich, Switzerland IPv6 Golden Networks Jeroen Massar Things to watch

Jeroen Massar ::2 Generate from DB You need to store the information already, thus why not automate it? Want to keep clicking on the site, making mistakes or just write a script once which mails the updates out every evening? Generate objects from your customer DB and generate your router config with rtconfig. Use SVN to store updates to router configs so that you can see when. Check out RANCID for this too. Create a PGP key for your robot so that it can automatically sign everything

Jeroen Massar ::3 Monitor your address space Watch BGP –BGPmon ( –RIPE RIS ( –RIPE Labs Tools ( –Colorado BGPmon ( These might notify you of a hijack Watch your local network: –Use NetFlow / sFlow

Jeroen Massar ::4 BCP 38 (RFC 2827) “Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing” In short: Do not send packets to the network that you should not be originating Do source-route filtering as close to the source as possible –Watch out for “multi-homed” customers Techniques: Simple firewall rule blocking out the prefix Unicast RPF When there is no route towards that prefix it should not originate it Various device specific techniques eg in DSLAMs / Cable concentrators which also look at MAC addresses

Jeroen Massar ::5 Protect your BGP Don’t let anything else but the IX/peers talk to your BGP daemons BGP with TCP/MD5 Generalized TTL Security Mechanism (GTSH) –Set TTL to 255 at sender and verify on receiver that the TTL is still 255 –Packets then have to be from the same link and cannot have been routed Only accept packets from known MAC addresses Use arpwatch alike tools to make sure no new MACs are introduced on a switch, next to monitoring the switch that the cable was not unplugged Use RPSL –Put your route/route6 objects in the IRR –Generate prefix filters from it There are various secure routing proposals, unfortunately none in wide deployment Monitor your own prefix on the Internet so that you at least know that it is being used somewhere else by somebody else, of course inform folks of the hijack Using multiple prefixes can be useful because of that as they need to steel all your prefixes to be able to bring you down at ISPs that accept their advertisement

Jeroen Massar ::6 Resource Public Key Infrastructure (RPKI) Public Key Infrastructure to be able to verify BGP signatures X.509 based, RFC3779 Signature Types –Route Origin Attestations (ROA) “I am the signed origin” –Adjacency Attestations (AAO) “We peer together” Offline verification Open Source:

Jeroen Massar ::7 IRT object /irt-h2.html (google: RIPE IRT object) /irt-h2.html Put an IRT object on all your parent objects, that way abuse reports will find your way much easier –and thus you can resolve those problems –customers will be happier –other ISPs will be happy that you are resolving issues and help you out with other issues

Jeroen Massar ::8 Communities Go to RIPE meetings Come to SwiNOG ( Be secure and active part of: –iNOC-DBA ( –CERT ( –FIRST ( –NSP-SEC ( They physically meet at RIPE meetings –OPS-Trust ( –PeeringDB (

Jeroen Massar ::9 No More IPv4 (almost ;) Last /8’s allocated to the RIRs When they are out, IPv4 is out. No more new customers unless you start doing NAT for your customers and other icky stuff…. (got a Playstation/xbox and want to play games, that won’t work with multiple layers of NAT….) Thus: Get IPv6 years AGO! and otherwise, really really hurry….

Jeroen Massar ::10 Questions? Jeroen Massar JRM1-RIPE