Skip to Content.
Sympa Menu

netsec-sig - Re: [Security-WG] [External] Re: ARIN, RPKI, and legal barriers....

Subject: Internet2 Network Security SIG

List archive

Re: [Security-WG] [External] Re: ARIN, RPKI, and legal barriers....


Chronological Thread 
  • From: David Farmer <>
  • To:
  • Subject: Re: [Security-WG] [External] Re: ARIN, RPKI, and legal barriers....
  • Date: Mon, 15 Apr 2019 22:47:38 -0500

On a different but related subject, ARIN is working on their Implementation plan for its IRR update, which includes an interface for the IRR in ARIN online.  The plan should be out for public review soonish (I expect no more than 6 to 8 weeks) and they plan to begin work in the second half of 2019. However, it is my understanding work is already occurring on the Routing and DNS POCs now. This could allow institutions to delegate the technical work of creating ROAs and IRR entries to their RON if they wish.    

The suggestions for Routing and DNS POCs;

Back to RPKI;

Within the ARIN region, if you are an RSA signatory you should be able to sign the RPA with similar modifications as your RSA. If you have signed an RSA, you are either already indemnifying ARIN or ARIN has agreed to the changes necessary for you.

The more fundamental issue is for networks operating completely outside our region, they need to sign or agree to the RPA to get the TAL this is probably a very big hurdle, as many of them do not currently indemnify ARIN or even have a relationship with ARIN.

I'm not sure how this is going to get resolved. 

Thanks

On Mon, Apr 15, 2019 at 3:46 PM Steven Wallace <> wrote:
I was thinking of asking the commodity providers to use ARIN’s RPKI info in the management of their networks...I realize this is a rough idea lacking specifics, and the error rate of misconfigured ROAs is something like 6% right now...

You bring up an interesting point. I believe I2 should require and use IRRs for their router configs. Given this could be aggregated by the RONs, it seems doable to me....and not an unreasonable requirement. ROAs are harder in the sense that you have to own the resource to sign it, meaning the RONs alone can’t do it.

I like the idea of requiring ROAs. IMO, it would take something like a 24 month implementation plan, that would include multiple workshops/webinars and other outreach to provide assistance to get it done. It would be a great opportunity to engage the community. It would be an opportunity for the community to demonstrate leadership in securing the internet infrastructure.

...now if we get pervasive IPv6 adoption....one can dream.

Steve
 

Sent from my iPad

On Apr 15, 2019, at 4:25 PM, Andrew Gallo <> wrote:

When you say "the community may wish to consider is asking their internet transit providers agree to use their ROA records."


Use them for what?  In place of IRR entries, LOAs?  Some of our upstreams have asked for nothing.  They may have checked that we have an IRR record.  On the other hand, one of our upstreams required an LOA from us allowing us to advertise our own space for an upgrade.

I'm wondering if we would have better success asking Internet2 to start requiring ROAs for all space that can be covered (that is to say, space covered by some type of agreement that allows for RPKI, which should be nearly all IPv6).



    
On 4/15/2019 1:52 PM, wrote:
I suggest we de-couple the issues, and here’s why:

Having more networks with ROAs makes using the RPKI database more valuable, hence more incentive to overcome its access barriers. It would only take a handful backbone providers using ARIN’s database to have a huge impact on hijacking risk.

Another incentive the community may wish to consider is asking their internet transit providers agree to use their ROA records. Perhaps The Quilt might consider adding such language to the purchasing program?

Steve


On Apr 15, 2019, at 1:32 PM, A N (via security-wg Mailing List)  wrote:

Thanks for your update. 

However, same chicken and egg situation with RPA and RPKI adoption and ARIN not budging. 


On Mon, Apr 15, 2019 at 12:21 PM < > wrote:
Thanks for the clarification. I should have said “current RSA”. Last time we requested a new resource, I think it was an additional AS, they required signing of the most current RSA. They were willing to accept changes required due to Indiana law.

Steve

Not quite.  It depends on the specific version of the RSA you have in
place.  For example, the RSA's we have signed both for v6 and the legacy
RSA are of a vintage that doesn't cover ROA use, so we have to go back 
and re-litigate the terms to get to a modern version.

As a first step, I asked ARIN to produce the specific language we had
already mutually agreed to.  After being referred to their council and 
about 8 weeks later, they are still unable to produce the specific 
language we have in place.  We had maintained copies, but appears they 
did not. 

Dale


      

    
-- 
________________________________
Andrew Gallo
The George Washington University


--
===============================================
David Farmer              
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota  
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================



Archive powered by MHonArc 2.6.19.

Top of Page