[149477] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Hijacked Network Ranges

daemon@ATHENA.MIT.EDU (Mark Tinka)
Mon Feb 6 01:36:37 2012

From: Mark Tinka <mtinka@globaltransit.net>
To: Christopher Morrow <morrowc.lists@gmail.com>
Date: Mon, 6 Feb 2012 14:35:35 +0800
In-Reply-To: <CAL9jLabUzVFZ=nk6OZAfQgx6xAgkvA1yCEyB+7Be-DvWXQyMuw@mail.gmail.com>
Cc: nanog@nanog.org
Reply-To: mtinka@globaltransit.net
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

--nextPart2992513.26VmUxtsLi
Content-Type: Text/Plain;
  charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

On Monday, February 06, 2012 01:14:20 PM Christopher Morrow=20
wrote:

>   o not having filters at all (pccw/pktel)

Well, we know what this leads to (part of the reasons you=20
find some eBGP sessions carrying /25's or longer + RFC 1918=20
space is because of this).

>   o filtering using old/stale data (ntt/l3)

Well, we think that this problem resolves itself rather=20
well:

	o If a customer is not getting traffic hitting a
 	  prefix, they'll check with their upstream on if
	  their prefix is being received and propagated.

	o If a customer is not seeing their prefix on the
	  Internet, they'll check with their upstream on if
	  their prefix is being received and propagated.

	o If a customer starts announcing a new prefix
	  without updating their upstream, one e-mail or
	  phone call to the upstream will get this fixed.


In all cases above, it's better not to have an unauthorized=20
prefix in the yonder than have open filters, because one is=20
more likely to quickly get resolved without any colleteral=20
than the other.

> why aren't filters applied at all? ("its hard, people
> keep asking me to update them, bah! work!")

Well, so was running the Internet without BGP communities or=20
prefix lists or AS_PATH filters, until they appeared. And=20
while some folk still use so-called "distribute lists"=20
today, it's fine with me as long as they maintain secure=20
operations with whatever solution they choose, hard or easy.

Some ISP's have automated this process either by using=20
internal IRR software, or scripting web GUI's that their NOC=20
can use to simply stick in the prefix, select which router=20
to update, and bam!

Compared to the alternative, this is a small price to pay.

> why aren't filter data bases kept up to date? ("its hard,
> i have to email something to radb/altdb/etc... bah,
> work!")...

That's why we use the RIPE RR. They have a cool web GUI that=20
you can use to edit on object, including IRR data (and=20
they're respected by all other major RR's and operators):

	https://apps.db.ripe.net/webupdates/


It certainly beats the old "MAIL FROM" system, although I=20
believe that is still operational.

> why aren't checks of the filter data simple and
> mechanical? (and accurate?) ("Bah! work! plus, have you
> looked at the ouptput? bah! work!")

See above.

We manually check the RIR WHOIS database. I'm sure some=20
networks might automate this with an internal system that=20
checks the RIR WHOIS database, and probably integrates with=20
their provisioning system that can automatically create and=20
update filters on routers. I don't know...

But it's certainly better than the alternative.

> resource certification would at least get us to the point
> where checking the data in the IRR is 'easy', it's not
> going to get people to PUT FILTERS ON CUSTOMER SESSIONS,
> and it's not going to get people to update their IRR
> objects (add AND DELETE!!!)

I support RPKI, but also realize that operator support will=20
take a very long time for various reasons, e.g., education,=20
delayed software upgrades, persistence with older methods,=20
fear of centralization, e.t.c.

In such a case, operators will need to support "Invalid" and=20
"NotFound" states of origin information for a long time. As=20
adoption and deployment increases, operators can begin=20
dropping "Invalid" results, "NotFound" results, or both. Or=20
even mark them down with poor LOCAL_PREF values so as not to=20
use those routes for forwarding unless it is really=20
necessary.

At some point, when diffusion of RPKI is sufficiently=20
prolific, anything that does not return a "Valid" result=20
will be dropped. This should force every operator around the=20
world to support it, much like the large carriers forced us=20
all to use IRR's just so they won't ignore our routes,=20
wherever we are in the world.

But before all this happens, we have to prevent more=20
hijacks. And we have to use the tools we have today.

Mark.

--nextPart2992513.26VmUxtsLi
Content-Type: application/pgp-signature; name=signature.asc 
Content-Description: This is a digitally signed message part.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.16 (GNU/Linux)
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=0dCm
-----END PGP SIGNATURE-----

--nextPart2992513.26VmUxtsLi--


home help back first fref pref prev next nref lref last post