Re: BGP hijack?

2023-10-22 Thread Christopher Morrow
Hank, all exact match for prefix length? Or longer subnets covering the whole? (Is this leakage of a optimizer or possibly censorship leakage?) On Sun, Oct 22, 2023, 1:03 PM Olivier Benghozi wrote: > Same stuff (with our ASN and our prefixes) detected here, coming > from AS2027 (Milkywan), for

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Job Snijders via NANOG
On Sun, 22 Oct 2023 at 20:33, Tom Beecher wrote: > Basically, I guess, it means that the AS 0 solution shouldn't be used, at >> least not usually. >> > > It's like everything else. Understand what the tools do and what they > don't do, and use them appropriately. > A primary risk for an IXP is

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
> > Basically, I guess, it means that the AS 0 solution shouldn't be used, at > least not usually. > It's like everything else. Understand what the tools do and what they don't do, and use them appropriately. On Sun, Oct 22, 2023 at 2:21 PM Amir Herzberg wrote: > I agree that a good, sensible

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Amir Herzberg
I agree that a good, sensible defense would be to simply announce your entire address block, e.g., in the example, your entire /22 (with a ROA to your ASN), and filter the traffic to the unused prefixes. Basically, I guess, it means that the AS 0 solution shouldn't be used, at least not usually. I

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
> > Look again, Tom. This is an attack vector using a LESS specific route. The > /22 gets discarded, but a covering /0-/21 would not. > Yes. And reliant on the operator doing something exceptionally not smart to begin with. Relying on an AS0 ROA alone and not actually announcing the covering

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Job Snijders via NANOG
On Sun, 22 Oct 2023 at 19:35, Owen DeLong wrote: > Actually, Job, the 1.2.0/20 would be the longest prefix announced for > 1.2.4/24 and 1.2.7/24 in this case. It’s a rather clever end-run. The /20 > won’t match the more specific as0 ROAs, so it gets accepted. The /24s > either aren’t advertised

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
Can an operator discard no RPKI / RPKI INVALID *from the DFZ* today, or at any time in the foreseeable future? No. Probably not ever. That does not mean there are other perfectly reasonable RPKI use cases where an AS 0 ROA does accomplish exactly that with which it was designed. On Sun, Oct 22,

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Owen DeLong via NANOG
Look again, Tom. This is an attack vector using a LESS specific route. The /22 gets discarded, but a covering /0-/21 would not. OwenOn Oct 22, 2023, at 10:06, Tom Beecher wrote:And is it your belief that this addresses the described attack vector?AFAICT, it does not.Quoting myself : WITH the

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Owen DeLong via NANOG
Actually, Job, the 1.2.0/20 would be the longest prefix announced for 1.2.4/24 and 1.2.7/24 in this case. It’s a rather clever end-run. The /20 won’t match the more specific as0 ROAs, so it gets accepted. The /24s either aren’t advertised or they get discarded as invalid. Of course, if RIRs were

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread William Herrin
On Sun, Oct 22, 2023 at 10:06 AM Tom Beecher wrote: >> And is it your belief that this addresses the described attack vector? >> AFAICT, it does not. > > In the mixed RPKI / non-RPKI environment of today's internet, no it doesn't. I don't see a path to an Internet where a serious network

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
> > And is it your belief that this addresses the described attack vector? > AFAICT, it does not. > Quoting myself : WITH the assertion that all routers in the routing domain are RPKI enabled, > and discarding RPKI INVALIDs. > In the mixed RPKI / non-RPKI environment of today's internet, no it

Re: BGP hijack?

2023-10-22 Thread Olivier Benghozi
Same stuff (with our ASN and our prefixes) detected here, coming from AS2027 (Milkywan), for a short time... Le dim. 22 oct. 2023 à 17:18, Hank Nussbacher a écrit : > We just had every single prefix in AS378 start being announced by AS2027. > > Every announcement by AS2027 is failing RPKI yet

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread William Herrin
On Sun, Oct 22, 2023 at 9:38 AM Tom Beecher wrote: >> He's saying that someone could come along and advertise 0.0.0.0/1 and >> 128.0.0.0/1 and by doing so they'd hijack every unrouted address block >> regardless of the block's ROA. >> >> RPKI is unable to address this attack vector. > > >

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Job Snijders via NANOG
On Sun, 22 Oct 2023 at 18:10, William Herrin wrote: > Then someone comes along and advertises a portion of the RIR space > larger than any allocation. Since your subnet is intentionally absent > from the Internet, that larger route draws the packets allowing a > hijack of your address space. > >

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
> > Let me ground it a bit: > > He's saying that someone could come along and advertise 0.0.0.0/1 and > 128.0.0.0/1 and by doing so they'd hijack every unrouted address block > regardless of the block's ROA. > > RPKI is unable to address this attack vector. >

Re: remembering abha

2023-10-22 Thread Ed Kern
Lightweight…..If I didn’t get both middle fingers at the same time it meant I wasn’t trying. EdSent from my iPhoneOn Oct 20, 2023, at 10:18 PM, Heasley wrote:How i (choose to) remember Abha. https:/shrubbery.net/~heas/colleagues/abha.jpghttps:/shrubbery.net/~heas/colleagues/abha2.jpg

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread William Herrin
On Sun, Oct 22, 2023 at 9:10 AM William Herrin wrote: > In essence, this means that a ROA to AS0 doesn't work as intended. Let me ground it a bit: He's saying that someone could come along and advertise 0.0.0.0/1 and 128.0.0.0/1 and by doing so they'd hijack every unrouted address block

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Rubens Kuhl
On Sun, Oct 22, 2023 at 5:47 PM Job Snijders via NANOG wrote: > > On Sun, 22 Oct 2023 at 17:42, Amir Herzberg wrote: >> >> Bill, thanks! You explained the issue much better than me. Yes, the problem >> is that, in my example, the operator was allocated 1.2.4/22 but the >> attacker is

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread William Herrin
On Sun, Oct 22, 2023 at 8:47 AM Job Snijders wrote: > The attacker won’t be drawing traffic towards itself destined for addresses > in the /22, because of LPM Hi Job, The idea is that you have some infrastructure on IP addresses that you don't route on the Internet. Maybe it's the /24 you use

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Job Snijders via NANOG
On Sun, 22 Oct 2023 at 17:42, Amir Herzberg wrote: > Bill, thanks! You explained the issue much better than me. Yes, the > problem is that, in my example, the operator was allocated 1.2.4/22 but > the attacker is announcing 1.2.0/20, which is larger than the allocation, > so the operator

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Amir Herzberg
Bill, thanks! You explained the issue much better than me. Yes, the problem is that, in my example, the operator was allocated 1.2.4/22 but the attacker is announcing 1.2.0/20, which is larger than the allocation, so the operator cannot issue ROA for it (or covering it). Of course, the RIR

BGP hijack?

2023-10-22 Thread Hank Nussbacher
We just had every single prefix in AS378 start being announced by AS2027. Every announcement by AS2027 is failing RPKI yet being propagated a bit. Is this yet another misbehaving device or an actual attack? Thanks, Hank