Child pages
  • RPKI Validation

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Attacks against the routing system are increasing, and it's not uncommon in today's Internet world to experience prefix hijacking.  The IETF has for a while, been woking on an Internet Resource Public Key Infrastructure, to help validate routing (BGP) announcements.  

Details on RPKI and how this works is best followed up through the your RIR.  The RIPE-NCC in particular have excellent resources for you to peruse, and you are much better off trying to find specific router configuration at the RIPE website.another excellent guideline is available at https://rpki.readthedocs.io


At INX-ZA, we operate a few RPKI validators that are made available to the general public for use.  These are spread across the country, and are (or will be) available at: available for you to use to validate your prefixes.  We stongly  recommend that each network implements their own set of validators, and provide these for use as backup and/or failover validators.  INX-ZA uses them in production, so you can be certain that they're managed.

  • vc1-jnb.inx.net.za  (Routinator 3000)
  • vc2-jnb.inx.net.za  (Cloudflare GoRTR)
  • vc1-cpt.inx.net.za  (coming soonRoutinator 3000)
  • vc2-cpt.inx.net.za   (coming soonCloudflare GoRTR)
  • vc1-dur.inx.net.za  (coming soon)
  • vc2-dur.inx.net.za  (coming soon)
for you to use to validate your prefixes.  We stongly  recommend that each network implements their own set of validators, and provide these for use as backup and/or failover validators.  INX-ZA uses them in production, so you can be certain that they're managed.


Of course the point of RPKI validation is for your network equipment to do this automatically, so we suggest the following configuration: 


Code Block
titleRPKI Config
router bgp 65001
 bgp rpki server tcp <<host>> port 3323 refresh 900600


Please All of the hosts are dual-stacked;  please remember to use the v6 addresses, if your router supports IPv6.Our recommendations

RPKI at INX

From June 2019, INX drops RPKI invalids on our BGP Route server service.  Details for these, and other filtered routes, can be seen via the looking glass facilities that are provided into the INX BGP-RS service.  

Recommendations

We recommend that you

  • assign a higher local-pref to prefixes that have a Valid ROA
  • leave prefixes with Not-Found ROAs untouched
  • drop prefix with Invalid ROA


Note
titleDealing with Invalids

Most operators may be tempted to choose an approach where they set the local-pref of Invalids to something really low (ie. least preferred).  The simple problem you're still likely to see is that a more-specific (ie. longer match) route for this, will still win in the BGP route selection process, and therefore still leave you to attack.  


Should you need assistance with this, please feel free to send a mail to ops [at]  inx.net.za


Table of Contents