-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Para quem não viu. Movimentos rápidos que podem nos pegar de surpresa.

[]s, Julião

- -------- Mensagem original --------
Assunto: [routing-wg] Workshop on using RPKI for BGP origin validation
on Thursday @RIPE
Data: Wed, 17 Nov 2010 14:10:25 +0100
De: Benno Overeinder <[email protected]>
Para: [email protected]

Thursday November 18 (at RIPE 61), there will be a RPKI testbed workshop
on using the RPKI for BGP origin validation.

Time: from 13:00 on
Place: Fori meeting room (on the right hand side of the stairs down to
the terminal room and side room).

The workshop starts from 13:00 on, or just after lunch, to the end of
the afternoon (around 18:00).  The goal of the workshop is to get the
RPKI code up and running for people, rather than doing any kind of
introductory presentation.

Everyone interested is invited to attend. The capacity of the room is
only 20 persons, but during the afternoon we expect participants to come
and go, and interested persons are likely to find a seat during the
afternoon.

At present, there are two paths for getting people up and running in the
testbed:

1) superheros can install all the software on one of their servers,
   configure it, coordinate with Rob Austein and Randy Bush to get
   resources delegated, and away we go.

2) slightly less heroic figures can get their feet wet with a new
   simplified interface we wrote just before the Beijing workshop,
   which lets them run a single relatively simple python script on a
   unix-ish (linux, *bsd, mac os x) laptop to get up and running with
   a hosted configuration using the gui interface on one of randy's
   servers.

In either case the goal is to get people to the point of producing
ROAs, which we can then see propagate all the way to a couple of test
routers running with origin validation enabled.

Participant equipment requirements:

- - Path (1): unix-ish machine with working C compiler, Python 2.5 or
  2.6 (2.6 preferred).  If the participant intends to run the RPKI
  publication service (pubd and rsyncd), the machine must be reachable
  from the outside world (no firewall, or participant has the ability
  to punch holes in the firewall); same applies to participants who
  intend to act as parents for external parties (child must be able to
  contact parent).

- - Path (2): unix-ish laptop running python 2.5 or 2.6 (2.6 -strongly-
  preferred, due to lack of real TLS support in 2.5); C compiler may
  or may not be necessary, depending on how recent the system copy of
  OpenSSL is.

Participants who want to get a head start (recommended for path (1) --
even for superheros it takes a little while to configure, build, and
run through the regression tests) should download the code in advance
and try following the installation instructions.  Subversion
repository is at:

   http://subvert-rpki.hactrn.net/

or just start at http://rpki.net/ and follow the links.  There's even
documentation, albeit imperfect.

For the rpki.net team,


- -- 
Benno J. Overeinder
NLnet Labs
http://www.nlnetlabs.nl/


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJM4/R/AAoJENraf1zCZ03nSaQH/ikzTm29Snkp1Q3hyI8mLXaC
0ZwbK00QQ7GFh8UzVODqXE+c4QnVwAjkAW0JtfZPSi1e6xCXMbQUo+DfOVUFq3aJ
nDmMBX9QC5aEuWwDxXcHVhp4rkNI9ltNxTjHWz8BIrCNZ+jHl19qCyCPfEQRdGAE
+pVhbkF9ysfWSvi+uy7JzNFLyRF7GSDVYj2Uw+ruks3dIX/4BA0HNIOitJU+b2fj
EfFiGqnfK5n3WerOZWUieKoONJ+CRXX41CXKUJ1Sx9aeDZXICaLhkN8gVLNbb52b
W0CdbWYczlIbJ3Hhim9BH9I9YREh1lenFotwoAKfMHxpvjtHI02+tW6UijWAtds=
=86K6
-----END PGP SIGNATURE-----
_______________________________________________
GT-AS mailing list
[email protected]
http://lists.abranet.org.br/mailman/listinfo/gt-as

Responder a