Skip to Content.
Sympa Menu

netsec-sig - [Security-WG] Re: Internet2, MANRS and embedded security

Subject: Internet2 Network Security SIG

List archive

[Security-WG] Re: Internet2, MANRS and embedded security


Chronological Thread 
  • From: "Garrett, Seth B" <>
  • To: "''" <>
  • Subject: [Security-WG] Re: Internet2, MANRS and embedded security
  • Date: Tue, 14 Aug 2018 16:08:16 +0000
  • Accept-language: en-US
  • Ironport-phdr: 9a23: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


Indiana University is a MANRS participant.  Below is how we are aligned to the MANRS principles from a campus perspective.  I'd be happy to share our experience in these areas with others who are interested.  RPF is something we've been able to utilize to enhance our security responses (RTBH) as well.


 

Filtering:

  • BGP import & export policies clearly defined. 
  • Export policies are scoped to only subnets managed by IU Campus Networks (AS87 & AS27198).
  • New peering requests will involve a check to verify routes being announced to us are legitimately held by the ASN.  This is also a point we can help encourage others to update their information and join the MANRS initiative.

 

Anti-Spoofing:

  • RPF strict mode as a standard on all server and user interfaces.
  • RPF loose mode on external paths.  We're utilizing the full routing table and compliment our RTBH solution with RPF loose mode.
  • External eBGP interfaces have inbound/outbound filters on them that drop spoofed traffic in both directions.
  • MANRS representatives will check the CAIDA spoofer project statistics for data on your ASN.  

 

Coordination:

  • Updated contact information listed for AS87 & AS27198 (ARIN, PeeringDB, & RADb)
  • 24x7 NOC

 

Global Validation:

  • IU participates in RPKI route signing for AS87 & AS27198 for both IPv4 and IPv6.
  • We're using the RIPE RPKI validator cache service connected to our Juniper routers.
  • AS87 & AS27198 routes are kept updated in ARIN with the proper origin information.

 

Challenges:

  • Deploying RPF can be challenging in a large, dual-homed environment.
    • ​DHCP considerations need to be made (both request and server responses).
    • Be prepared to troubleshoot unexpected traffic patterns or legitimate spoofing.
    • Try to use RPF strict mode when possible.
  • You need to account for your DDoS scrubbing service when planning for RPKI.
    • ​Its strongly encouraged to not use the maxlength option for a prefix.  However, you need to account for smaller prefixes and/or different ASNs the routes could be coming from when using a scrubbing service.  This can lead to rather large ROAs.  Andrew Gallo I know has been doing some testing in this area.
    • RPKI is done at the org level within ARIN.  For reassigned space, you'll need the parent org to create the ROA.



Seth Garrett
Principal Network Engineer
Indiana University


From: <> on behalf of Brock, Anthony W <>
Sent: Tuesday, August 14, 2018 11:23 AM
To: ''
Subject: [Security-WG] Internet2, MANRS and embedded security
 

Colleagues,

As most of your are aware, Internet2 has been working with several of their partners (GÉANT, Jisc, etc) to identify how to best integrate security into their present and future efforts. One of the deliverables from this group (the REN Routing Security group) is the implementation of MANRS https://www.manrs.org/ in their respective environments. Internet2 plans to have MANRS implemented by the end of 2018 and several others (Geant, ESnet, KANREN, etc.) have either already implemented or are in the process of implementing it.

Has your organization implemented MANRS or are you planning to? If not, what are your obstacles to implementation (money, time, priorities, etc)? If yes, what helped to move this forward within your organization?

Also, Internet2 is including “embedded security” as part of the plan for the next generation of their network. It turns out that “embedded security” has not yet been defined within the context of their environment! So…

How would your define “embedded security” for Internet2? What would it look like? Would it be increased security intelligence, analysis, operational activities, etc? How could this be defined to help you and your organization in both your day-to-day activities as well as in your long-term security interests? Finally, would this be a topic of interest for calls with the Security WG, within the overall NTAC, or maybe even at the coming TechX conference?

Tony




Archive powered by MHonArc 2.6.19.

Top of Page