Re: deploying RPKI based Origin Validation

2018-08-03 Thread Mark Tinka
On 27/Jul/18 16:40, Job Snijders wrote: > This is awesome! I think it is important to have multiple high quality > implementations so operators have a choice, this way we can work > towards a healthy routing security software ecosystem and avoid > mono-culture. Yes, great to see more

Re: deploying RPKI based Origin Validation

2018-07-27 Thread Alex Band
> On 19 Jul 2018, at 23:04, Mark Tinka wrote: > > > > On 19/Jul/18 21:47, Michel Py wrote: > >> I understand that; if there is an easier way to do RPKI, people are going to >> use it instead of the right way. However, I think that the blacklist targets >> a different kind of customer :

Re: deploying RPKI based Origin Validation

2018-07-27 Thread Job Snijders
Dear Alex, On Thu, 26 Jul 2018 at 19:11, Alex Band wrote: > NLnet Labs recently committed to building a full RPKI Toolset, including a > (Delegated) Certificate Authority, a Publication Server and Relying Party > software. As an RP implementation was the easiest way to get going, we now >

Re: deploying RPKI based Origin Validation

2018-07-19 Thread Joshua Vijsma / True
Hi all, Just wanted to share our (AS15703, True B.V.) experience as a hosting provider with enabling RPKI invalid filtering (invalid == reject). We've secured (most of) our routes since 2014 with ROAs but last Tuesday we have deployed filters which reject RPKI invalid routes. We have had two

Re: deploying RPKI based Origin Validation

2018-07-19 Thread Mark Tinka
On 19/Jul/18 21:47, Michel Py wrote: > I understand that; if there is an easier way to do RPKI, people are going to > use it instead of the right way. However, I think that the blacklist targets > a different kind of customer : the end user. We want the enterprise to > certify their

RE: deploying RPKI based Origin Validation

2018-07-19 Thread Michel Py
> Mark Tinka wrote : > but I want to be cautious about encouraging a parallel stream that slows down > the deployment of RPKI. I understand that; if there is an easier way to do RPKI, people are going to use it instead of the right way. However, I think that the blacklist targets a different

Re: deploying RPKI based Origin Validation

2018-07-19 Thread Mark Tinka
On 16/Jul/18 19:00, Paolo Lucente wrote: > Hi Job, All, > > It is definitely great to see progress on the deployment side! I realize > that there may be some gaps in the network operator toolchain, and this > may be something i'd like to contribute to. > > For network operators to better

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Mark Tinka
On 19/Jul/18 01:21, Job Snijders wrote: > @ all - It would be good if operators ask their vendors if they can get > behind this I-D https://tools.ietf.org/html/draft-ietf-sidrops-ov-clarify I'm actually glad to see this (Randy, you've abandoned me, hehe). We actually hit and troubleshot both

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Mark Tinka
On 18/Jul/18 21:30, Michel Py wrote: > Not much at all, I was actually trying you do do the RPKI part for me ;-) > This script you wrote, to produce the list of prefixes that are RPKI invalid > AND that do not have any alternative, make it run every x minutes on a fixed > url (no date/time

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Job Snijders
On Wed, Jul 18, 2018 at 05:55:23PM -0400, Randy Bush wrote: > > Can you elaborate what routers with what software you are using? It > > surprises me a bit to find routers anno 2018 which can't do OV in > > some shape or form. > > depends on how picky you are about "some shape or form." I was

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Randy Bush
> Can you elaborate what routers with what software you are using? It > surprises me a bit to find routers anno 2018 which can't do OV in some > shape or form. depends on how picky you are about "some shape or form." draft-ietf-sidrops-ov-clarify was not written because it is usefully

RE: deploying RPKI based Origin Validation

2018-07-18 Thread Michel Py
> Job Snijders wrote : > Can you elaborate what routers with what software you are using? It surprises > me a bit to find routers anno 2018 which can't do OV in some shape or form. They're not anno 2018 ! Cisco 3900 with 4 Gigs. Good enough for me, with the current growth of the DFZ I may have

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Job Snijders
On Wed, Jul 18, 2018 at 07:30:48PM +, Michel Py wrote: > Not in lieu, but when deploying RPKI is not (yet) possible. My > routers are not RPKI capable, upgrading will take years (I'm not going > to upgrade just because I want RPKI). Can you elaborate what routers with what software you are

RE: deploying RPKI based Origin Validation

2018-07-18 Thread Michel Py
Mark, >> Michel Py wrote: >> If I understand this correctly, I have a suggestion : update these files at >> a regular interval (15/20 min) and make them available for download with a >> fixed name >> (not containing the date). Even better : have a route server that announces >> these prefixes

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Mark Tinka
On 17/Jul/18 20:33, Michel Py wrote: > If I understand this correctly, I have a suggestion : update these files at a > regular interval (15/20 min) and make them available for download with a > fixed name (not containing the date). > Even better : have a route server that announces these

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Mark Tinka
On 17/Jul/18 19:55, Job Snijders wrote: > There are ~ 330 IPv6 invalids in the DFZ, and for 70 of those no > alternative covering prefix exists. Thanks, Job. Mark.

RE: deploying RPKI based Origin Validation

2018-07-17 Thread Michel Py
> Job Snijders wrote : >I calculated this here few days ago > http://instituut.net/~job/rpki-report-2018.07.12.txt > Markus Weber from KPN is generating a daily report here and drew similar > conclusions: https://as286.net/data/ana-invalids.txt Markus scrapes all > routes from the AS 286 PEs and

Re: deploying RPKI based Origin Validation

2018-07-17 Thread George Michaelson
I don't want to over-state it, but 'number of prefices' slways feels to me like a potential mis-measure. Not that you don't want to know it, but % of announced space for a given origin-as feels like it might be closer to the story, because there can be so many different ways to announce it as dis-

Re: deploying RPKI based Origin Validation

2018-07-17 Thread Job Snijders
On Tue, Jul 17, 2018 at 01:27:09PM +0200, Mark Tinka wrote: > > Markus Weber from KPN is generating a daily report here and drew > > similar conclusions: https://as286.net/data/ana-invalids.txt Markus > > scrapes all routes from the AS 286 PEs and marks the routes for > > which no valid or unknown

Re: deploying RPKI based Origin Validation

2018-07-17 Thread Paolo Lucente
Hi Job, All, It is definitely great to see progress on the deployment side! I realize that there may be some gaps in the network operator toolchain, and this may be something i'd like to contribute to. For network operators to better understand the impact of BGP hijacks in terms of revenue or

Re: deploying RPKI based Origin Validation

2018-07-17 Thread Mark Tinka
On 16/Jul/18 17:26, Job Snijders wrote: > I calculated this here few days ago > http://instituut.net/~job/rpki-report-2018.07.12.txt > > Markus Weber from KPN is generating a daily report here and drew similar > conclusions: https://as286.net/data/ana-invalids.txt Markus scrapes all > routes

Re: deploying RPKI based Origin Validation

2018-07-16 Thread Job Snijders
On Sat, Jul 14, 2018 at 11:03:16AM +0200, Mark Tinka wrote: > On 14/Jul/18 09:11, Baldur Norddahl wrote: > > In the RIPE part of the world there is no excuse for not getting > > RPKI correct because RIPE made it so easy. Perhaps the industry > > could agree on enabling RPKI validation on all

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Mark Tinka
On 14/Jul/18 14:04, Job Snijders wrote: > I actually view it as a competitive advantage to carry a cleaner set of > routes compared to the providers with a more permissive (or lack of) > filtering strategy. Sometimes less is more. Typically, I wouldn't disagree. In practice, most customers

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Saku Ytti
On Sat, 14 Jul 2018 at 15:07, Job Snijders wrote: > I actually view it as a competitive advantage to carry a cleaner set of > routes compared to the providers with a more permissive (or lack of) > filtering strategy. Sometimes less is more. * When you consider your addressable market 'clueful

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Job Snijders
On Fri, Jul 13, 2018 at 02:53:30PM +0200, Mark Tinka wrote: > That, though, still leaves the problem where you end up providing a > partial routing table to your customers, while your competitors in the > same market aren't. I actually view it as a competitive advantage to carry a cleaner set of

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Mark Tinka
On 14/Jul/18 09:11, Baldur Norddahl wrote: > In the RIPE part of the world there is no excuse for not getting RPKI > correct because RIPE made it so easy. Perhaps the industry could agree on > enabling RPKI validation on all european circuits for a start? I think the first step (and what I'd

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Baldur Norddahl
In the RIPE part of the world there is no excuse for not getting RPKI correct because RIPE made it so easy. Perhaps the industry could agree on enabling RPKI validation on all european circuits for a start? Regards Baldur

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 19:28, Christopher Morrow wrote: > I think getting to Job's world is a goal, I think living in Mark's is a > reality for a bit still. > (yes, you could ALSO do some game playing where the customer ports for TSW > were in a VRF with no 'bad' routes, but.. complexity) This

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 18:37, Grant Taylor via NANOG wrote: >   > > Yep. > > You would almost need separate logical networks / VRF to be able to > prevent the longest prefix match winning issue that you reminded me of. Oooh, complexity - things we want to avoid :-). Then again, we don't run the

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 18:37, Job Snijders wrote: > That is exactly what I mean. Because of the golden rule "most-specific > always wins" (and parts of the AS_PATH are pretty easy to spoof) it > only makes sense to me to completely reject invalid routes. Exactly my preference, and exactly what we did

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 18:25, Christopher Morrow wrote: > it sounded like Mark didn't want to deal with that complexity in his > network, until more deployment and more requests from customers like; > Customer: "Hey, why did my traffic get hijacked to paY(omlut)pal.com > yesterday?" > Mark: "because

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 17:18, Grant Taylor via NANOG wrote: >   > > Please forgive the n00b question:  But isn't that where carrying the > prefixes through your network and conditionally advertising them to > customers comes into play? > > Or does that run into complications where you must also have the

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Christopher Morrow
On Fri, Jul 13, 2018 at 12:41 PM Grant Taylor via NANOG wrote: > On 07/13/2018 10:25 AM, Christopher Morrow wrote: > > > but given: > > 192.168.0.0/16 - valid > > 192.168.0.0/17 - unknown > > 192.168.0.0/24 - invalid > > > > your routing system will still forward toward the

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Grant Taylor via NANOG
On 07/13/2018 10:25 AM, Christopher Morrow wrote: you get the option at input (from transit/peering edge say) to evaluate the 'rpki status' of a particular route, then set normal bgp attributes based on that evaluation, so yes you can: valid == localopref 1000 && community-A unknown

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Job Snijders
On Fri, Jul 13, 2018 at 4:25 PM, Christopher Morrow wrote: > On Fri, Jul 13, 2018 at 11:19 AM Grant Taylor via NANOG > wrote: >> The reading I did on RPKI / OV yesterday made me think that it is >> possible to have validated routes preferred over unknown routes which >> are preferred over

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Christopher Morrow
On Fri, Jul 13, 2018 at 11:19 AM Grant Taylor via NANOG wrote: > > The reading I did on RPKI / OV yesterday made me think that it is > possible to have validated routes preferred over unknown routes which > are preferred over invalid routes. So I'd think that you could still > have the routes

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Grant Taylor via NANOG
On 07/13/2018 06:53 AM, Mark Tinka wrote: But yes, the majority of the issue was with routes learned from peers and transit. That, though, still leaves the problem where you end up providing a partial routing table to your customers, while your competitors in the same market aren't. Ouch.

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 14:43, Job Snijders wrote: > Have you considered applying "invalid == reject" on just transit/peering > sessions rather than customer sessions as an intermediate step? I bet > most misconfigurations or hijacks didn't come in via your customers. Yes, we did. The issue is some of

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Job Snijders
On Fri, Jul 13, 2018 at 02:37:32PM +0200, Mark Tinka wrote: > Anyway, the operational issue we ran into was due to our aggressive > policy to drop Invalids. The reason this became an issue was networks > that ROA'd just their aggregates, but either forgot to or decided not to > ROA the longer

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 12/Jul/18 19:50, Job Snijders wrote: > Anyone here working to deploy RPKI based Origin Validation in their > network and reject invalid announcements? Anything of note to share? It's great to hear that this is catching up. To be honest, I haven't kept up with the latest goings-on in this