Skip to Content.
Sympa Menu

netsec-sig - Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes

Subject: Internet2 Network Security SIG

List archive

Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes


Chronological Thread 
  • From: Brad Fleming <>
  • To:
  • Subject: Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
  • Date: Fri, 17 Aug 2018 17:10:34 -0500
  • Ironport-phdr: 9a23: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

Agreed. It seems odd that features like "prefix-length-range" or "prefix-list 1.1.1.1/16 ge 23 le 24" have been around for a long time but didn’t make it into the RPKI standards. Seems like it would this problems gracefully.

As far as maximum length I’m assuming “The Internet” will probably not allow prefixes more specific than /48; much like the social norm around announcing a /24 IPv4 prefix to the DFZ.

Either way, the tools not accepting the ROA means I doubt anyone ever thought the use case through (unfortunately).
--
Brad Fleming
Assistant Director for Technology
Kansas Research and Education Network
Office: 785-856-9805
Mobile: 785-865-7231
NOC: 785-856-9820

On Aug 17, 2018, at 3:38 PM, Garrett, Seth B <> wrote:

Wishful thinking...  It would be handy if the RPKI ROA allowed for a range and not just a limit of maxlength.  Similar to the Juniper route filter.

route-filter 129.79.0.0/16 prefix-length-range /24-/24
2001:18e8::/44 prefix-length-range /64-/64

Allows only /24's from within the /16 for IPv4 or /64's from the /44 for IPv6.  

Seth Garrett
Principal Network Engineer
Indiana University

From:  <> on behalf of Brad Fleming <>
Sent: Friday, August 17, 2018 4:13 PM
To: 
Subject: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
 
This message was sent from a non-IU address. Please exercise caution when clicking links or opening attachments from external sources.
Thanks very much for the script and examples.

So is prevailing notion to make a ROA including the 65K /48s within a typical /32 assignment? I suppose I’m OK with the approach, just seems like that ROA is gonna crazy huge.
--
Brad Fleming
Assistant Director for Technology
Kansas Research and Education Network

On Aug 15, 2018, at 12:55 PM, Andrew Gallo <> wrote:

Greetings, Security WG:

Seth Garrett and I have been trading some emails about creating a ROA request with a lot of prefixes.  I've written a script that can make this easier.
https://github.com/CAAREN-engineering/generateSignedROAreq

Here's the scenario and use-case:

If you have a large summary prefix, let's say an IPv4 /16, and you would like to cover this prefix AND all the /24s within it, you *could* use the Max Length feature to create a ROA request for 172.16.0.0/16-24. HOWEVER, use of Max Length field is no longer recommended (can lead to larger attack surface).

You might want ROAs covering all the constituent /24s so that they can be originated by a DDoS scrubbing service.

At this point, following best practices, you're left with entering 256 prefixes by hand in the Hosted RPKI portal.  There is another way!

You can pasted into the portal pre-formatted, pre-signed text.

ARIN's instructions are here:
https://www.arin.net/resources/rpki/roarequest.html

I wrote a script to help make this process easier.  What you'll need:
Python 3.3+
a file containing a list of prefixes you want included in the ROA (you can mix v4 and v6)
Your private key

The script will ask you some basic information needed to create the ROA request data:
Origin ASN
ROA name
Validity Start Date
Validity End Date


Let me know if you have any questions.



-- 
________________________________
Andrew Gallo
The George Washington University







Archive powered by MHonArc 2.6.19.

Top of Page