netsec-sig - [Security-WG] Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Subject: Internet2 Network Security SIG
List archive
[Security-WG] Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Chronological Thread
- From: "Montgomery, Douglas (Fed)" <>
- To: "" <>
- Subject: [Security-WG] Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
- Date: Tue, 27 Sep 2016 18:12:32 +0000
- Accept-language: en-US
- Authentication-results: spf=none (sender IP is ) ;
- Ironport-phdr: 9a23:H9K/MxO7A2WZCLi8xFkl6mtUPXoX/o7sNwtQ0KIMzox0KP76rarrMEGX3/hxlliBBdydsK0UzbeN+Pm9EUU7or+/81k6OKRWUBEEjchE1ycBO+WiTXPBEfjxciYhF95DXlI2t1uyMExSBdqsLwaK+i760CQWUinbGUI1Y72tW92as8Pinfu/8IDJYhlZwSWySbJ0MBisqwjN7I8bjZYoYvIqxxDUuHpUaqFJyktpI06ehRDx+p328ZJ+pXd+ofUkooRlVqPmcKM9QKZJSHwKNH064MTw/VntQAfOrDNIXmILnR9gBQne8Ff1WYmn4XiyjfZ0xCTPZZ6+drszQzn3qv4zRQ==
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:99
The slides and video from the operator’s oriented track we hosted at NANOG in June 2016. URL to slides and video of the session is below, as is a copy-n-paste of the abstract.
Also if you would like to see a view of current RPKI deployment we run a monitor (as do many others) below. You can explore the BGP Prefix/Origin Validation analysis to see how RPKI data compares to the current routing table, who the successful early
adopters are and who’s use needs more work. You can also look at the RPKI Repository Analysis views to see more about the raw RPKI data.
If you have questions or comments about either, just ask.
Abstract:
Malicious BGP route hi-jacks and and accidental mis-originations
continue to threaten the security and robustness of the global Internet. Over the last several years the IETF, RIRs, router vendors, and researchers have developed and implemented an approach to BGP origin validation based upon a global resource public key
infrastructure (RPKI) that permits operators anywhere in the Internet to detect unauthorized route announcements and implement local polices to mitigate (e.g., filter) these events.
This track will examine the current state of RPKI Origin Validation (ROV) technologies: products, services, implementations, configurations, and tool sets that could be useful to operators in planning, deploying, and monitoring ROV use in their networks. Actual operational experiences with ROV deployment will be described as well as issues that need to be addressed to further operational deployment. 1. RPKI Introduction Doug Montgomery / Sandy Murphy 2, RPKI hosted services Mark Kosters, CTO ARIN 3. RPKI Implementations Doug Montgomery / Sandy Murphy 4. Router Vendor Implementations Cisco / Juniper / Alcatel Greg Hankins 5. RPKI Test, Training, Monitoring, Management tools. Matthias Waelisch, Doug Montgomery, Sandy Murphy 6. Deployment Experiences Panel JR Mayberry/Microsoft, Tony Tauber/Comcast, Thomas King/DE-CIX —
Doug Montgomery, Mgr Internet & Scalable Systems Research at NIST/ITL/ANTD
|
- [Security-WG] Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience, Montgomery, Douglas (Fed), 09/27/2016
Archive powered by MHonArc 2.6.19.