RIR outreach program about INVALIDs (was: deploying RPKI based Origin Validation)

2018-09-17 Thread nusenu
Job wrote (2018-07-16) [1]: > Perhaps the RIRs should start an outreach program to proactively inform > the owners of those 2,200 invalid route announcements to get them to > either fix or delete the RPKI ROA. Since I'm also interested [2] in reducing the amount of RPKI INVALIDs in an efficient wa

Re: deploying RPKI based Origin Validation

2018-08-02 Thread Mark Tinka
On 27/Jul/18 16:40, Job Snijders wrote: > This is awesome! I think it is important to have multiple high quality > implementations so operators have a choice, this way we can work > towards a healthy routing security software ecosystem and avoid > mono-culture. Yes, great to see more implement

Re: deploying RPKI based Origin Validation

2018-07-27 Thread Alex Band
> On 19 Jul 2018, at 23:04, Mark Tinka wrote: > > > > On 19/Jul/18 21:47, Michel Py wrote: > >> I understand that; if there is an easier way to do RPKI, people are going to >> use it instead of the right way. However, I think that the blacklist targets >> a different kind of customer : th

Re: deploying RPKI based Origin Validation

2018-07-27 Thread Job Snijders
Dear Alex, On Thu, 26 Jul 2018 at 19:11, Alex Band wrote: > NLnet Labs recently committed to building a full RPKI Toolset, including a > (Delegated) Certificate Authority, a Publication Server and Relying Party > software. As an RP implementation was the easiest way to get going, we now > have

Re: deploying RPKI based Origin Validation

2018-07-19 Thread Joshua Vijsma / True
: 2 > Date: Thu, 12 Jul 2018 17:50:29 + > From: Job Snijders > To: nanog@nanog.org > Subject: deploying RPKI based Origin Validation > Message-ID: <20180712175029.gc3...@vurt.meerval.net> > Content-Type: text/plain; charset=us-ascii > > Hi all, > > I wanted

Re: deploying RPKI based Origin Validation

2018-07-19 Thread Mark Tinka
On 19/Jul/18 21:47, Michel Py wrote: > I understand that; if there is an easier way to do RPKI, people are going to > use it instead of the right way. However, I think that the blacklist targets > a different kind of customer : the end user. We want the enterprise to > certify their prefixes

RE: deploying RPKI based Origin Validation

2018-07-19 Thread Michel Py
> Mark Tinka wrote : > but I want to be cautious about encouraging a parallel stream that slows down > the deployment of RPKI. I understand that; if there is an easier way to do RPKI, people are going to use it instead of the right way. However, I think that the blacklist targets a different ki

Re: deploying RPKI based Origin Validation

2018-07-19 Thread Mark Tinka
On 16/Jul/18 19:00, Paolo Lucente wrote: > Hi Job, All, > > It is definitely great to see progress on the deployment side! I realize > that there may be some gaps in the network operator toolchain, and this > may be something i'd like to contribute to. > > For network operators to better unders

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Mark Tinka
On 19/Jul/18 01:21, Job Snijders wrote: > @ all - It would be good if operators ask their vendors if they can get > behind this I-D https://tools.ietf.org/html/draft-ietf-sidrops-ov-clarify I'm actually glad to see this (Randy, you've abandoned me, hehe). We actually hit and troubleshot both

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Mark Tinka
On 18/Jul/18 21:30, Michel Py wrote: > Not much at all, I was actually trying you do do the RPKI part for me ;-) > This script you wrote, to produce the list of prefixes that are RPKI invalid > AND that do not have any alternative, make it run every x minutes on a fixed > url (no date/time in

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Job Snijders
On Wed, Jul 18, 2018 at 05:55:23PM -0400, Randy Bush wrote: > > Can you elaborate what routers with what software you are using? It > > surprises me a bit to find routers anno 2018 which can't do OV in > > some shape or form. > > depends on how picky you are about "some shape or form." I was thin

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Randy Bush
> Can you elaborate what routers with what software you are using? It > surprises me a bit to find routers anno 2018 which can't do OV in some > shape or form. depends on how picky you are about "some shape or form." draft-ietf-sidrops-ov-clarify was not written because it is usefully implemented

RE: deploying RPKI based Origin Validation

2018-07-18 Thread Michel Py
> Job Snijders wrote : > Can you elaborate what routers with what software you are using? It surprises > me a bit to find routers anno 2018 which can't do OV in some shape or form. They're not anno 2018 ! Cisco 3900 with 4 Gigs. Good enough for me, with the current growth of the DFZ I may have 10

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Job Snijders
On Wed, Jul 18, 2018 at 07:30:48PM +, Michel Py wrote: > Not in lieu, but when deploying RPKI is not (yet) possible. My > routers are not RPKI capable, upgrading will take years (I'm not going > to upgrade just because I want RPKI). Can you elaborate what routers with what software you are us

RE: deploying RPKI based Origin Validation

2018-07-18 Thread Michel Py
Mark, >> Michel Py wrote: >> If I understand this correctly, I have a suggestion : update these files at >> a regular interval (15/20 min) and make them available for download with a >> fixed name >> (not containing the date). Even better : have a route server that announces >> these prefixes w

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Mark Tinka
On 17/Jul/18 20:33, Michel Py wrote: > If I understand this correctly, I have a suggestion : update these files at a > regular interval (15/20 min) and make them available for download with a > fixed name (not containing the date). > Even better : have a route server that announces these pref

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Mark Tinka
On 17/Jul/18 19:55, Job Snijders wrote: > There are ~ 330 IPv6 invalids in the DFZ, and for 70 of those no > alternative covering prefix exists. Thanks, Job. Mark.

RE: deploying RPKI based Origin Validation

2018-07-17 Thread Michel Py
> Job Snijders wrote : >I calculated this here few days ago > http://instituut.net/~job/rpki-report-2018.07.12.txt > Markus Weber from KPN is generating a daily report here and drew similar > conclusions: https://as286.net/data/ana-invalids.txt Markus scrapes all > routes from the AS 286 PEs and ma

Re: deploying RPKI based Origin Validation

2018-07-17 Thread George Michaelson
I don't want to over-state it, but 'number of prefices' slways feels to me like a potential mis-measure. Not that you don't want to know it, but % of announced space for a given origin-as feels like it might be closer to the story, because there can be so many different ways to announce it as dis-

Re: deploying RPKI based Origin Validation

2018-07-17 Thread Job Snijders
On Tue, Jul 17, 2018 at 01:27:09PM +0200, Mark Tinka wrote: > > Markus Weber from KPN is generating a daily report here and drew > > similar conclusions: https://as286.net/data/ana-invalids.txt Markus > > scrapes all routes from the AS 286 PEs and marks the routes for > > which no valid or unknown

Re: deploying RPKI based Origin Validation

2018-07-17 Thread Paolo Lucente
Hi Job, All, It is definitely great to see progress on the deployment side! I realize that there may be some gaps in the network operator toolchain, and this may be something i'd like to contribute to. For network operators to better understand the impact of BGP hijacks in terms of revenue or v

Re: deploying RPKI based Origin Validation

2018-07-17 Thread Mark Tinka
On 16/Jul/18 17:26, Job Snijders wrote: > I calculated this here few days ago > http://instituut.net/~job/rpki-report-2018.07.12.txt > > Markus Weber from KPN is generating a daily report here and drew similar > conclusions: https://as286.net/data/ana-invalids.txt Markus scrapes all > routes fr

Re: deploying RPKI based Origin Validation

2018-07-16 Thread Job Snijders
On Sat, Jul 14, 2018 at 11:03:16AM +0200, Mark Tinka wrote: > On 14/Jul/18 09:11, Baldur Norddahl wrote: > > In the RIPE part of the world there is no excuse for not getting > > RPKI correct because RIPE made it so easy. Perhaps the industry > > could agree on enabling RPKI validation on all europe

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Mark Tinka
On 14/Jul/18 14:04, Job Snijders wrote: > I actually view it as a competitive advantage to carry a cleaner set of > routes compared to the providers with a more permissive (or lack of) > filtering strategy. Sometimes less is more. Typically, I wouldn't disagree. In practice, most customers on

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Saku Ytti
On Sat, 14 Jul 2018 at 15:07, Job Snijders wrote: > I actually view it as a competitive advantage to carry a cleaner set of > routes compared to the providers with a more permissive (or lack of) > filtering strategy. Sometimes less is more. * When you consider your addressable market 'clueful cu

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Job Snijders
On Fri, Jul 13, 2018 at 02:53:30PM +0200, Mark Tinka wrote: > That, though, still leaves the problem where you end up providing a > partial routing table to your customers, while your competitors in the > same market aren't. I actually view it as a competitive advantage to carry a cleaner set of r

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Mark Tinka
On 14/Jul/18 09:11, Baldur Norddahl wrote: > In the RIPE part of the world there is no excuse for not getting RPKI > correct because RIPE made it so easy. Perhaps the industry could agree on > enabling RPKI validation on all european circuits for a start? I think the first step (and what I'd c

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Baldur Norddahl
In the RIPE part of the world there is no excuse for not getting RPKI correct because RIPE made it so easy. Perhaps the industry could agree on enabling RPKI validation on all european circuits for a start? Regards Baldur

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 19:28, Christopher Morrow wrote: > I think getting to Job's world is a goal, I think living in Mark's is a > reality for a bit still. > (yes, you could ALSO do some game playing where the customer ports for TSW > were in a VRF with no 'bad' routes, but.. complexity) This summarize

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 18:37, Grant Taylor via NANOG wrote: >   > > Yep. > > You would almost need separate logical networks / VRF to be able to > prevent the longest prefix match winning issue that you reminded me of. Oooh, complexity - things we want to avoid :-). Then again, we don't run the Interne

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 18:37, Job Snijders wrote: > That is exactly what I mean. Because of the golden rule "most-specific > always wins" (and parts of the AS_PATH are pretty easy to spoof) it > only makes sense to me to completely reject invalid routes. Exactly my preference, and exactly what we did fo

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 18:25, Christopher Morrow wrote: > it sounded like Mark didn't want to deal with that complexity in his > network, until more deployment and more requests from customers like; > Customer: "Hey, why did my traffic get hijacked to paY(omlut)pal.com > yesterday?" > Mark: "because

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 17:18, Grant Taylor via NANOG wrote: >   > > Please forgive the n00b question:  But isn't that where carrying the > prefixes through your network and conditionally advertising them to > customers comes into play? > > Or does that run into complications where you must also have the

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Christopher Morrow
On Fri, Jul 13, 2018 at 12:41 PM Grant Taylor via NANOG wrote: > On 07/13/2018 10:25 AM, Christopher Morrow wrote: > > > but given: > > 192.168.0.0/16 - valid > > 192.168.0.0/17 - unknown > > 192.168.0.0/24 - invalid > > > > your routing system will still forward toward the 192.168.

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Grant Taylor via NANOG
On 07/13/2018 10:25 AM, Christopher Morrow wrote: you get the option at input (from transit/peering edge say) to evaluate the 'rpki status' of a particular route, then set normal bgp attributes based on that evaluation, so yes you can: valid == localopref 1000 && community-A unknown =

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Job Snijders
On Fri, Jul 13, 2018 at 4:25 PM, Christopher Morrow wrote: > On Fri, Jul 13, 2018 at 11:19 AM Grant Taylor via NANOG > wrote: >> The reading I did on RPKI / OV yesterday made me think that it is >> possible to have validated routes preferred over unknown routes which >> are preferred over invalid

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Christopher Morrow
On Fri, Jul 13, 2018 at 11:19 AM Grant Taylor via NANOG wrote: > > The reading I did on RPKI / OV yesterday made me think that it is > possible to have validated routes preferred over unknown routes which > are preferred over invalid routes. So I'd think that you could still > have the routes th

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Grant Taylor via NANOG
On 07/13/2018 06:53 AM, Mark Tinka wrote: But yes, the majority of the issue was with routes learned from peers and transit. That, though, still leaves the problem where you end up providing a partial routing table to your customers, while your competitors in the same market aren't. Ouch. Mos

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 13/Jul/18 14:43, Job Snijders wrote: > Have you considered applying "invalid == reject" on just transit/peering > sessions rather than customer sessions as an intermediate step? I bet > most misconfigurations or hijacks didn't come in via your customers. Yes, we did. The issue is some of ou

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Job Snijders
On Fri, Jul 13, 2018 at 02:37:32PM +0200, Mark Tinka wrote: > Anyway, the operational issue we ran into was due to our aggressive > policy to drop Invalids. The reason this became an issue was networks > that ROA'd just their aggregates, but either forgot to or decided not to > ROA the longer prefi

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Mark Tinka
On 12/Jul/18 19:50, Job Snijders wrote: > Anyone here working to deploy RPKI based Origin Validation in their > network and reject invalid announcements? Anything of note to share? It's great to hear that this is catching up. To be honest, I haven't kept up with the latest goings-on in this sp

deploying RPKI based Origin Validation

2018-07-12 Thread Job Snijders
Hi all, I wanted to share with you that a ton of activity is taking place in the Dutch networker community to deploy RPKI based BGP Origin Validation. The mantra is "invalid == reject" on all EBGP sessions. What's of note here is that we're now seeing the first commercial ISPs doing Origin Valida