Re: NANOG Security Track: Route Security

2018-09-30 Thread Job Snijders
Hi all,

Speaking as presenter in this track, I’d be fine with video recording and
online distribution. In fact, I’d encourage it, I don’t assume any secrecy
or confidentiality in this meeting.

Perhaps for the NANOG74 meeting it is too late to organize video recording,
but going forward I’m a proponent of recording everything. It creates more
value for both the presenters and the global community.

Kind regards,

Job


Re: NANOG Security Track: Route Security

2018-09-30 Thread JASON BOTHE via NANOG
Agreed, especially if they’re an active member of the organization and doesn’t 
seem to be synonymous with NANOGs Charter.  

Jason 

On Sep 30, 2018, at 22:41, Brian Kantor  wrote:

>> To ensure unimpeded information sharing and discussion, the
>> Security Track will not be broadcast or recorded.
> 
> I fail to understand how making the presentations secret from all
> except those attending in person promotes information sharing.
> Could whoever made this seemingly contradictory decision explain
> the reasoning behind it?
>- Brian
> 


Re: NANOG Security Track: Route Security

2018-09-30 Thread Brian Kantor
> To ensure unimpeded information sharing and discussion, the
> Security Track will not be broadcast or recorded.

I fail to understand how making the presentations secret from all
except those attending in person promotes information sharing.
Could whoever made this seemingly contradictory decision explain
the reasoning behind it?
- Brian



RE: NANOG Security Track: Route Security

2018-09-30 Thread Ryan Hamel
Just like how all the email threads on NANOG are archived, all talks should be 
archived as well.

Ryan Hamel

From: NANOG  On Behalf Of Krassimir Tzvetanov
Sent: Sunday, September 30, 2018 3:31 PM
To: Sam Oduor 
Cc: NANOG mailing list 
Subject: Re: NANOG Security Track: Route Security

Sam,

To ensure unimpeded information sharing and discussion, the Security Track will 
not be broadcast or recorded.

I apologise for the inconvenience.

Regards,
Krassimir


On Sun, Sep 30, 2018, 1:05 PM Sam Oduor 
mailto:sam.od...@gmail.com>> wrote:
Hi

Any online link available for remote participation or viewing ?

On Sun, Sep 30, 2018 at 7:46 PM Krassimir Tzvetanov 
mailto:mailli...@krassi.biz>> wrote:
Hello Everyone,

I wanted to attract your attention to the Security Track this coming NANOG. 
We'll be meeting on Tuesday morning and the line up looks like this:
* Andre Toonk - examples of hijacks, other ideas
* Alexander Azimov - State of BGP Security
* David Wishnick - ARIN TAL
* Job Snijders - Routing security roadmap
* Chris Morrow - So I need to start filtering routes from peers...' and 'hey 
guess who needs to update their IRR data?'

Time permitting at the end of the time slot we'll have a panel and time for 
duscussion as well.

Regards,
Krassi



--
Samson Oduor


Re: NANOG Security Track: Route Security

2018-09-30 Thread Krassimir Tzvetanov
Sam,

To ensure unimpeded information sharing and discussion, the Security Track
will not be broadcast or recorded.

I apologise for the inconvenience.

Regards,
Krassimir


On Sun, Sep 30, 2018, 1:05 PM Sam Oduor  wrote:

> Hi
>
> Any online link available for remote participation or viewing ?
>
> On Sun, Sep 30, 2018 at 7:46 PM Krassimir Tzvetanov 
> wrote:
>
>> Hello Everyone,
>>
>> I wanted to attract your attention to the Security Track this coming
>> NANOG. We'll be meeting on Tuesday morning and the line up looks like this:
>> * Andre Toonk - examples of hijacks, other ideas
>> * Alexander Azimov - State of BGP Security
>> * David Wishnick - ARIN TAL
>> * Job Snijders - Routing security roadmap
>> * Chris Morrow - So I need to start filtering routes from peers...' and
>> 'hey guess who needs to update their IRR data?'
>>
>> Time permitting at the end of the time slot we'll have a panel and time
>> for duscussion as well.
>>
>> Regards,
>> Krassi
>>
>>
>
> --
> Samson Oduor
>


Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-09-30 Thread John Curran
Folks -

Perhaps it would be helpful to confirm that we have common goals in the network 
operator community regarding RPKI, and then work from those goals on the 
necessary plans to achieve them.

It appears that many network operators would like to improve the integrity of 
their network routing via RPKI deployment.  The Regional Internet Registries 
(RIRs) have all worked to support RPKI services, and while there are different 
opinions among operators regarding the cost/benefit tradeoffs of RPKI Route 
Origin Validation (ROV), it is clear that we have to collectively work together 
now if we are ever to have overall RPKI deployment sufficient to create the 
network effects that will ensure compelling long-term value for its deployment.

Let’s presume that we’ve achieved that very outcome at some point in future; 
i.e. we’re have an Internet where nearly all network operators are publishing 
Route Origin Authorizations (ROAs) via RIR RPKI services and are using RPKI 
data for route validation.  It is reasonable to presume that over the next 
decade the Internet will become even more pervasive in everyday life, including 
being essential for many connected devices to function, and relied upon for 
everything from daily personal communication and conducting business to even 
more innovative uses such as payment & sale systems, delivery of medical care, 
etc.

Recognizing that purpose of RPKI is improve integrity of routing, and not add 
undo fragility to the network, it is reasonable to expect that many network 
operators will take due care with the introduction of route validation into 
their network routing, including best practices such as falling back 
successfully in the event of unavailability of an RIR RPKI Certificate 
Authority (CA) and resulting cache timeouts.  It is also reasonable expect that 
RIR RPKI CA services are provisioned with appropriate robustness of systems and 
controls that befit the highly network-critical nature of these services.

Presuming we all share this common goal, the question that arises is whether we 
have a common vision regarding what should happen when something goes wrong in 
this wonderful RPKI-rich Internet of the future…   More than anyone, network 
operators realize that even with excellent systems, procedures, and redundancy, 
outages can (and do) still occur.  Hopefully, these are quite rare, and limited 
to occasions where Murphy’s Law has somehow resulted in nearly unimaginable 
patterns of coincident failures, but it would irresponsible to not consider the 
“what if” scenarios for RPKI failure and whether there is shared vision of the 
resulting consequences.

In particular, it would be good to consider the case of an RIR RPKI CA system 
failure, one sufficient to result in widespread cache expirations for relying 
parties.  Ideally, we will never have to see this scenario when RPKI is widely 
deployed, but it also not completely inconceivable that an RIR RPKI CA 
experience such an outage [1]. For network operators following reasonable 
deployment practices, an RIR RPKI CA outage should result in a fallback to 
unvalidated network routing data and no significant network impacts.  However, 
it’s likely not a reasonable assumption that all network operators will have 
properly designed and implemented best practices in this regard, so there will 
very likely be some networks that experience significant impacts consequential 
to any RIR RPKI CA outage.  Even if this is only 1 or 2 percent of network 
operators with such configuration issues, it will mean hundreds of ISP outages 
occurring simultaneously throughout the Internet and millions of customers 
(individuals and businesses) effected globally.  While the Internet is the 
world’s largest cooperative endeavor, there inevitably will be many folks 
impacted of a RIR RPKI outage, including some asking (appropriately) the 
question of “who should bear responsibility” for the harm that they suffered.

It is worth understanding what the network community believes is the most 
appropriate answer to this question, since a common outlook on this question 
can be used to guide implementation details to match.   Additionally, a common 
understanding on this question will provide real insight into how the network 
community intends risk of the system to be distributed among the participants.

There are several possible options worth considering:

 A) The most obvious answer for the party that should be held liable for 
the impacts that result from an RPKI CA failure would be the respective RIR 
that experienced the outage.  This seems rather straightforward until one 
considers that the RIRs are providing these services specifically noting that 
they may not be (despite all precautions) available 100% percent of the time, 
and clearly documented expectations that those relying on RPKI CA information 
for routing origin validation should be fallback to routing with not validated 
state [2].   The impacted 

Re: NANOG Security Track: Route Security

2018-09-30 Thread Sam Oduor
Hi

Any online link available for remote participation or viewing ?

On Sun, Sep 30, 2018 at 7:46 PM Krassimir Tzvetanov 
wrote:

> Hello Everyone,
>
> I wanted to attract your attention to the Security Track this coming
> NANOG. We'll be meeting on Tuesday morning and the line up looks like this:
> * Andre Toonk - examples of hijacks, other ideas
> * Alexander Azimov - State of BGP Security
> * David Wishnick - ARIN TAL
> * Job Snijders - Routing security roadmap
> * Chris Morrow - So I need to start filtering routes from peers...' and
> 'hey guess who needs to update their IRR data?'
>
> Time permitting at the end of the time slot we'll have a panel and time
> for duscussion as well.
>
> Regards,
> Krassi
>
>

-- 
Samson Oduor


Re: NANOG Security Track: Route Security

2018-09-30 Thread Krassimir Tzvetanov
Hello Everyone,

I wanted to attract your attention to the Security Track this coming NANOG.
We'll be meeting on Tuesday morning and the line up looks like this:
* Andre Toonk - examples of hijacks, other ideas
* Alexander Azimov - State of BGP Security
* David Wishnick - ARIN TAL
* Job Snijders - Routing security roadmap
* Chris Morrow - So I need to start filtering routes from peers...' and
'hey guess who needs to update their IRR data?'

Time permitting at the end of the time slot we'll have a panel and time for
duscussion as well.

Regards,
Krassi