Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-23 Thread Yang Xiang
Hi chris, 2012/1/23 Christopher Morrow morrowc.li...@gmail.com On Fri, Jan 20, 2012 at 8:08 AM, Yang Xiang xiang...@csnet1.cs.tsinghua.edu.cn wrote: 2012/1/20 Arturo Servin aser...@lacnic.net while Argus can discover potential hijackings caused by anomalous AS path. reading the

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-23 Thread Christopher Morrow
On Mon, Jan 23, 2012 at 10:19 AM, Yang Xiang xiang...@csnet1.cs.tsinghua.edu.cn wrote: Hi chris, 2012/1/23 Christopher Morrow morrowc.li...@gmail.com On Fri, Jan 20, 2012 at 8:08 AM, Yang Xiang xiang...@csnet1.cs.tsinghua.edu.cn wrote: 2012/1/20 Arturo Servin aser...@lacnic.net while

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-23 Thread Yang Xiang
2012/1/23 Christopher Morrow morrowc.li...@gmail.com ok, that seems squirrelly still :( so, take routeviews for example, they peer almost exclusively ebgp-multi-hop, so any 'best path' you see there isn't actually usable by the route-server... all traffic has to take the local transport out

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-23 Thread John Kemp
On 1/23/2012 7:28 AM, Christopher Morrow wrote: On Mon, Jan 23, 2012 at 10:19 AM, Yang Xiang xiang...@csnet1.cs.tsinghua.edu.cn wrote: Hi chris, 2012/1/23 Christopher Morrow morrowc.li...@gmail.com On Fri, Jan 20, 2012 at 8:08 AM, Yang Xiang xiang...@csnet1.cs.tsinghua.edu.cn wrote:

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-23 Thread Yang Xiang
2012/1/24 John Kemp k...@network-services.uoregon.edu Minor correction there. If you are talking about our IX collectors (LINX, PAIX, EQIX Ashburn, SYDNEY, etc.) those are at exchanges and peering directly. The collectors at Univ of Oregon (rv,rv2,rv3,rv4, rv6), yeah, those are

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-22 Thread Christopher Morrow
On Fri, Jan 20, 2012 at 8:08 AM, Yang Xiang xiang...@csnet1.cs.tsinghua.edu.cn wrote: 2012/1/20 Arturo Servin aser...@lacnic.net while Argus can discover potential hijackings caused by anomalous AS path.         Can you explain how? Only a imprecisely detection. Section III.C in our

Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Arturo Servin
You could use RPKI and origin validation as well. We have an application that does that. http://www.labs.lacnic.net/rpkitools/looking_glass/ For example you can periodically check if your prefix is valid:

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Yang Xiang
RPKI is great. But, firstly, ROA doesn't cover all the prefixes now, we need an alternative service to alert hijackings. secondly, ROA can only secure the 'Origin AS' of a prefix, while Argus can discover potential hijackings caused by anomalous AS path. After ROA and BGPsec deployed in the

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Arturo Servin
On 20 Jan 2012, at 10:38, Yang Xiang wrote: RPKI is great. But, firstly, ROA doesn't cover all the prefixes now, we need an alternative service to alert hijackings. Or to sign your prefixes. secondly, ROA can only secure the 'Origin AS' of a prefix, That's true.

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Yang Xiang
2012/1/20 Arturo Servin aser...@lacnic.net On 20 Jan 2012, at 10:38, Yang Xiang wrote: RPKI is great. But, firstly, ROA doesn't cover all the prefixes now, we need an alternative service to alert hijackings. Or to sign your prefixes. Sign prefixes is the best way. Before

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Danny McPherson
On Jan 20, 2012, at 8:08 AM, Yang Xiang wrote: I think network operators are only careless, but not trust-less, so black-hole hijacking is the majority case. This is aligned with the discussion on route leaks at the proposed interim SIDR meeting just after NANOG. Even with RPKI and BGPSEC

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Alex Band
If you want to play around with RPKI Origin Validation, you can download the RIPE NCC RPKI Validator here: http://ripe.net/certification/tools-and-resources It's simple to set up and use: just unzip the package on a *NIX system, run ./bin/rpki-validator and browse to http://localhost:8080

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Richard Barnes
BBN has also released an initial version of their relying party software. Core features are basically the same as the other validators (namely, RPKI certificate validation), with -- more fine-grained error diagnostics and -- more robust support for the RTR protocol for distributing validated