Skip to Content.
Sympa Menu

netsec-sig - Re: [Security-WG] [routing-wg] Analysing traffic in context of rejecting RPKI invalids using pmacct

Subject: Internet2 Network Security SIG

List archive

Re: [Security-WG] [routing-wg] Analysing traffic in context of rejecting RPKI invalids using pmacct


Chronological Thread 
  • From: David Farmer <>
  • To:
  • Subject: Re: [Security-WG] [routing-wg] Analysing traffic in context of rejecting RPKI invalids using pmacct
  • Date: Fri, 22 Feb 2019 10:48:33 -0600

This was discussed on the NTAC routing and peering workgroup earlier this week;  In that discussion, I pointed out that netflow packages other than pmacct could probably do something similar. While I'm not aware of any other packages that have RPKI integration at this time. It just dawned on me that you could implement RPKI validation on your routers with a policy to set BGP communities for Valid, Unknown, and Invalid RPKI status without dropping traffic for Invalid. Then most netflow packages I'm aware of are capable of providing measurements based on those BGP communities. This is probably a good thing to add to your RPKI implementation, even when you drop Invalid traffic, in most cases, I believe you will still be able to measure the Invalid traffic that is dropped with this technique.

Thanks.

On Tue, Feb 12, 2019 at 5:51 PM David Farmer <> wrote:
I thought this would be of interest to  this group;

Also, this might be an interesting experiment to run on the Internet2 Backbone.

Thanks.

---------- Forwarded message ---------
From: Job Snijders <>
Date: Tue, Feb 12, 2019 at 5:39 PM
Subject: [routing-wg] Analysing traffic in context of rejecting RPKI invalids using pmacct
To: <>, <>


Dear all,

Whether to deploy RPKI Origin Validation with an "invalid == reject"
policy really is a business decision. One has to weigh the pros and
cons: what are the direct and indirect costs of accepting
misconfigurations or hijacks for my company? what is the cost of
deploying RPKI? What is the cost of honoring misconfigured RPKI ROAs?
There are a few thousand misconfigured ROAs, what does this mean for me?

To answer these questions, Paolo Lucente and myself worked to extend
pmacct traffic analysis engine (http://pmacct.net/) in such a way that
it can do perform the RFC 6811 Origin Validation procedure and present
the outcome as a property in the flow aggregation process.

Pmacct has the ability to ingest BGP feeds and correlate the BGP data to
the sflow/netflow/ipfix data. This allows for fantastic business
intelligence, you can see exactly how much traffic is flowing from what
customers to what endpoints for what reason!

Pmacct implemented Origin Validation in a cute way: it separates out
RPKI invalid BGP announcements into two categories:

    a) "invalid with no overlapping or alternative route"
        (aka will be blackholed if 'invalid == reject')

    b) "invalid but an overlapping unknown/valid announcement also exists"
        (end-to-end connectivity can still work).

Because pmacct separates out the various types kinds of (invalid) BGP
announcements, operators don't have to do deploy *anything* in their
network to get a good grasp on how their connectivity to the rest of the
Internet would look like after deploying a "invalid == reject" policy.
No changes to your network configurations are required to make use of
this feature, you don't need to tag routes with communities or do other
tricks. All the analysis happens inside pmacct.

Of course we tested this first in the NTT global backbone AS 2914! At
the moment of writing, we're seeing less than a handful of gigabits per
second being send towards BGP announcements that are RPKI Invalid and
for which no alternative route exists. In context of NTT's backbone
that amount of traffic is just statistical noise. This is a very
encouraging sign, it may help us move towards the goal of deploying RPKI
Origin Validation in AS 2914.

Nusenu wrote a great blog post on where these RPKI ROA misconfigurations
are located, i recommend reading their posts to develop a better
understanding of the problem space:
https://medium.com/@nusenu/where-are-rpki-unreachable-networks-located-65c7a0bae0f8

Even if you don't intend to deploy RPKI Origin Validation (or are
single-homed), pmacct's RPKI capabilities can be useful in forensic
investigations. It'll be easier to analyse how much and what kind of
traffic for what period of time was sent to a possible hijack. This
will help you when writing RFOs!

If you want to testdrive this feature, fetch pmacct version 1.7.3-rc1
from https://github.com/pmacct/pmacct/releases/tag/1.7.3-rc1

Documentation on how to configure the feature:
    https://github.com/pmacct/pmacct/blob/master/QUICKSTART#L1783-#L1833
    https://github.com/pmacct/pmacct/blob/master/CONFIG-KEYS#L2626-#L2647

Let us know what you think! Or if you'd like to chat telemetry with
Paolo or me about analysing the effects of BGP hijacks and RPKI, we'll
both be at the San Francisco NANOG meeting next week!

Kind regards,

Job



--
===============================================
David Farmer              
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota  
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================


--
===============================================
David Farmer              
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota  
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================



Archive powered by MHonArc 2.6.19.

Top of Page