RPKI and Routing Security ICANN 44 June 2012. Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.

Slides:



Advertisements
Similar presentations
Whos who in the IETF Zoo? Geoff Huston Executive Director, Internet Architecture Board.
Advertisements

RPKI Standards Activity Geoff Huston APNIC February 2010.
Update on Resource Certification Geoff Huston, APNIC Mark Kosters, ARIN SSAC Meeting, March 2008.
1 APNIC Resource Certification Service Project Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam George Michaelson.
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Nigel Titley. RIPE 54, 9 May 2007, Tallinn, Estonia. 1 RIPE NCC Certification Task Force Update Presented by Nigel Titley RIPE NCC.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC Open Policy Meeting SIG: Whois Database October 2000 APNIC Certificate Authority.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
RPKI Validation - Revisited draft-huston-rpki-validation-01.txt Geoff Huston George Michaelson APNIC Slide 1/19.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
What’s Next: DNSSEC & RPKI Mark Kosters. Why are DNSSEC and RPKI Important Two critical resources – DNS – Routing Hard to tell when it is compromised.
Public Policy Issues in the Communications and Infrastructure Services Policy area Geoff Huston APNIC June 2011.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007.
Summary Report on Resource Certification February 2007 Geoff Huston Chief Scientist APNIC.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC.
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
Progress Report on resource certification February 2007 Geoff Huston Chief Scientist APNIC.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Progress Report on APNIC Trial of Certification of IP Addresses and ASes APNIC 22 September 2006 Geoff Huston.
The Resource Public Key Infrastructure Geoff Huston APNIC.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
STIR Charter (discussion) STIR BoF Berlin, DE 7/30/2013.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston Chief Scientist APNIC.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Using Resource Certificates Progress Report on the Trial of Resource Certification November 2006 Geoff Huston APNIC.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Securing the Internet Backbone: Current activities in the IETF’s Secure InterDomain Routing Working Group Geoff Huston Chief Scientist, APNIC.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC.
BGP Validation Russ White Rule11.us.
TAG Presentation 18th May 2004 Paul Butler
Securing BGP: The current state of RPKI
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
November 2006 Geoff Huston APNIC
TAG Presentation 18th May 2004 Paul Butler
RPKI Trust Anchor Geoff Huston APNIC.
APNIC Trial of Certification of IP Addresses and ASes
A commentary on the ITU-T proposal for national address registries for IPv6 Geoff Huston April 2005.
Some Thoughts on Integrity in Routing
NAAS 2.0 Features and Enhancements
APNIC Trial of Certification of IP Addresses and ASes
Resource Certificate Profile
Why don’t we have a Secure and Trusted Inter-Domain Routing System?
Progress Report on Resource Certification
A commentary on the ITU-T proposal for national address registries for IPv6 Geoff Huston April 2005.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
APNIC’s Engagement on Security
Presentation transcript:

RPKI and Routing Security ICANN 44 June 2012

Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires assembling a large volume of authoritative data about addresses and routing policies – And this data does not readily exist We have grown used to a routing system that has some “vagueness” at the edges

Telling “Good” from “Bad” Can we set up a mechanism to allow an automated system to validate that the use of an address in routing has been duly authorized by the holder of that address? This looks a lot like an application of public/private key cryptography, with “authority to use” conveyed by a digital signature – Using a private key to sign the authority, and the public key to validate the authority – We could use a conventional certificate infrastructure to support public key validation at the scale of the Internet – But how can we inject trustable authority into this framework?

Trustable Credentials How can we inject trustable authority into this framework? Use the existing address allocation hierarchy – IANA, RIRs, NIRs & LIRs, End holders Describe this address allocation structure using digital certificates The certificates do not introduce additional data – they are a representation of registry information in a particular digital format

Resource Certificates A resource certificate is a digital document that binds together an IP address block with the IP address holder’s public key, signed by the certification authority’s private key The certificate set can be used to validate that the holder of a particular private key is held by the current legitimate holder of a particular number resource – or not! Community driven approach – Collaboration between the RIRs since 2006 – Based on open IETF standards Based on work undertaken in the Public Key Infrastructure (PKIX) and Secure Inter- Domain Routing (SIDR) Working Groups of the IETF

6 The RPKI Certificate Service Enhancement to the RIR Registry – Offers validatable proof of number holdership Resource Certification is an opt-in service – Number Holders choose to request a certificate Derived from registration data

7 A Number Resource PKI The RPKI is a service that offers a means to validate attestations about addresses and their current holder The ability to validate assertions about an entity being the holder of a particular address or autonomous system number – “I am the holder of /24” The ability to make more reliable routing decisions based on signed credentials associated with route objects – “I authorise AS to originate a route to /24”

8 Community Concerns 1. External Intervention – Certificate Issuer could be forced to tamper with the certificate contents (court order) This is no different from the existing external intervention factors with the registry contents itself – the certificates do not add or detract from the issues here 2. Security – The certificate system could get compromised (hack, error, etc.) Much effort has been invested in industry best practices of key management and certificate issuance system integrity by the RIRs 3. Resilience – The system could suffer from a failure Signed data allows for widespread replication of the data itself. The signature can be used to validate the currency and legitimacy of the data.

Current Activities Certificate Infrastructure – Integration of Certificate Issuance Systems into production services – Signing and validation service modules as plugin modules for other apps – Tools for the distribution and synchronization of the certificate store Secure Routing Systems – Specification of AS Path signing extensions to BGP

Questions?