Skip to Content.
Sympa Menu

netsec-sig - Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes

Subject: Internet2 Network Security SIG

List archive

Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes


Chronological Thread 
  • From: Andrew Gallo <>
  • To:
  • Subject: Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
  • Date: Fri, 17 Aug 2018 16:35:19 -0400
  • Ironport-phdr: 9a23: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

So, it's interesting you ask....

The script started out more as an exercise to find out how many prefixes can fit in one ROA.  I've successfully submitted a request of 4k prefixes. Somewhere between 4k and 65k, the RPKI portal in the OT&E barfed, timed out and then took a break before I could submit a new request (the original one failed).  I think I was trying to cover all the /64s in a /48.

You raise a good point about the size of ROAs.  You're being generous at the /48 level.  What would happen if you need to cover /64s?

The idea of the Max length field is still valid, but what we need is not *all* more specifics, just all more specifics of a given (and exact) mask length.

I think this is something we need to be asking the DDoS vendors.  In a full RPKI deployment, where operators are making policy decisions based on ROA validation, how should I cover my prefixes?

ROA generation and distribution is *not* real time.  At best it's on the order of hours, if not potentially days before it reaches a validating cache and then router.

I'll ask about maximum number of prefixes on the ARIN technical list.  They
might be able to answer what the portal can handle.  But for operational best
practices on how to handle this situation, I'm not sure anyone has an answer.



On 8/17/2018 4:13 PM, Brad Fleming wrote:
Thanks very much for the script and examples.

So is prevailing notion to make a ROA including the 65K /48s within a typical
/32 assignment? I suppose I’m OK with the approach, just seems like that ROA
is gonna crazy huge.
--
Brad Fleming
Assistant Director for Technology
Kansas Research and Education Network

On Aug 15, 2018, at 12:55 PM, Andrew Gallo
<>
wrote:

Greetings, Security WG:

Seth Garrett and I have been trading some emails about creating a ROA request
with a lot of prefixes. I've written a script that can make this easier.
https://github.com/CAAREN-engineering/generateSignedROAreq

Here's the scenario and use-case:

If you have a large summary prefix, let's say an IPv4 /16, and you would like
to cover this prefix AND all the /24s within it, you *could* use the Max
Length feature to create a ROA request for 172.16.0.0/16-24. HOWEVER, use of
Max Length field is no longer recommended (can lead to larger attack surface).

You might want ROAs covering all the constituent /24s so that they can be
originated by a DDoS scrubbing service.

At this point, following best practices, you're left with entering 256
prefixes by hand in the Hosted RPKI portal. There is another way!

You can pasted into the portal pre-formatted, pre-signed text.

ARIN's instructions are here:
https://www.arin.net/resources/rpki/roarequest.html

I wrote a script to help make this process easier. What you'll need:
Python 3.3+
a file containing a list of prefixes you want included in the ROA (you can
mix v4 and v6)
Your private key

The script will ask you some basic information needed to create the ROA
request data:
Origin ASN
ROA name
Validity Start Date
Validity End Date


Let me know if you have any questions.



--
________________________________
Andrew Gallo
The George Washington University



--
________________________________
Andrew Gallo
The George Washington University


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature




Archive powered by MHonArc 2.6.19.

Top of Page