Re: Verizon FIOS finally gets IPv6?

2018-10-01 Thread Ross Tajvar
It's in a limited rollout. My boss's home FiOS router just got a firmware
update that enables IPv6 but it's not getting an address yet.

On Tue, Oct 2, 2018, 1:11 AM Christopher Morrow 
wrote:

>
>
> On Tue, Oct 2, 2018 at 12:43 AM  wrote:
>
>> Chatter here is that at least some areas are seeing actual
>> functional IPv6, dhcpv6-pd and all...
>>
>> https://www.dslreports.com/forum/r32136440-Networking-IPv6-working
>
>
>
> wait, hell froze over?? wtf?
> (I don't see any ipv6 on my provider facing fios ethernet in washington-dc
> area)
>


Re: Verizon FIOS finally gets IPv6?

2018-10-01 Thread Christopher Morrow
On Tue, Oct 2, 2018 at 12:43 AM  wrote:

> Chatter here is that at least some areas are seeing actual
> functional IPv6, dhcpv6-pd and all...
>
> https://www.dslreports.com/forum/r32136440-Networking-IPv6-working



wait, hell froze over?? wtf?
(I don't see any ipv6 on my provider facing fios ethernet in washington-dc
area)


Verizon FIOS finally gets IPv6?

2018-10-01 Thread valdis . kletnieks
Chatter here is that at least some areas are seeing actual
functional IPv6, dhcpv6-pd and all...

https://www.dslreports.com/forum/r32136440-Networking-IPv6-working


Re: Buying IPv4 blocks

2018-10-01 Thread Tyler Conrad
I've used IPv4 Market Group before. Process was pretty painless, and they
were trusting enough to allow us to pay by PO (your mileage may vary).

http://ipv4marketgroup.com/

On Mon, Oct 1, 2018 at 6:57 PM, Ross Tajvar  wrote:

> Hi all,
>
> My US-based employer will be starting a new business unit soon that will
> require IPv4 addresses (aiming for a /22 to start with). I know ARIN has a
> waitlist (though I'm not sure where they're getting new IPs from), but the
> faster way is to buy blocks from people who already have them. I'm aware of
> Hilco Streambank - are there any other auctions? If I want to buy via
> private sale, does anyone know of ways to find sellers?
>
> Thanks,
> Ross
>


Buying IPv4 blocks

2018-10-01 Thread Ross Tajvar
Hi all,

My US-based employer will be starting a new business unit soon that will
require IPv4 addresses (aiming for a /22 to start with). I know ARIN has a
waitlist (though I'm not sure where they're getting new IPs from), but the
faster way is to buy blocks from people who already have them. I'm aware of
Hilco Streambank - are there any other auctions? If I want to buy via
private sale, does anyone know of ways to find sellers?

Thanks,
Ross


Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Job Snijders
Dear all,

I'm very happy to see the direction this conversation has taken, seems
we've moved on towards focussing on solutions and outcomes - this is
encouraging.

On Mon, Oct 01, 2018 at 05:44:17PM +0100, Nick Hilliard wrote:
> John Curran wrote on 01/10/2018 00:21:
> > There is likely some on the nanog mailing list who have a view on
> > this matter, so I pose the question of "who should be responsible"
> > for consequences of RPKI RIR CA failure to this list for further
> > discussion.
> 
> other replies in this thread have assumed that RPKI CA failure modes
> are restricted to loss of availability, but there are others failure
> modes, for example:
> 
> - fraud: rogue CA employee / external threat actor signs ROAs
> illegitimately
> 
> - negligence: CA accidentally signs illegitimate ROAs due to e.g.
> software bug
> 
> - force majeure: e.g. court orders CA to sign prefix with AS0,
> complicated by NIR RPKI delegation in jurisdictions which may have
> difficult relations with other parts of the world.
> 
> These types of situations are well-trodden territory for other types
> of PKI CA, where users
> 
> Otherwise, as other people have pointed out, catastrophic systems
> failure at the CA is designed to be fail-safe.  I.e. if the CA goes
> away, ROAs will be evaluated as "unknown" and life will continue on.
> If people misconfigure their networks and do silly things with this
> specific failure mode, that's their problem.  You can't stop people
> from aiming guns at their feet and pulling the trigger.

There are a number of failure modes and I believe the operational
community has yet to fully explore how to mitigate most risks. Over time
I expect we'll develop BCPs how to improve the robustness of the system;
these BCPs can only come into existence driven by actual operational
experierence.

A positive development that addresses some aspects of the concerns
raised is Certificate Transparency. Cloudflare set up a CT log
(https://groups.google.com/forum/#!topic/certificate-transparency/_deL5iGB5sY)
and I hope others like Google will also consider doing this. CT is a
great tool to help keep the roots perform in line with community
expectations.

I consider it the operator community's responsibility to figure out how
to deal with outages. I don't intend to hold the RIRs liable - we'll
need to learn to protect ourselves.

Kind regards,

Job


Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread John Curran
On 1 Oct 2018, at 9:44 AM, Nick Hilliard  wrote:
> 
> John Curran wrote on 01/10/2018 00:21:
>> There is likely some on the nanog mailing list who have a view on this 
>> matter, so I pose the question of "who should be responsible" for 
>> consequences of RPKI RIR CA failure to this list for further discussion.
> 
> other replies in this thread have assumed that RPKI CA failure modes are 
> restricted to loss of availability, but there are others failure modes, for 
> example:
> 
> - fraud: rogue CA employee / external threat actor signs ROAs illegitimately
> 
> - negligence: CA accidentally signs illegitimate ROAs due to e.g. software bug
> 
> - force majeure: e.g. court orders CA to sign prefix with AS0, complicated by 
> NIR RPKI delegation in jurisdictions which may have difficult relations with 
> other parts of the world.

Nick - 

Agreed…  My question was specific to liability consequential to an operational 
outage of an RIR CA, since the community’s view of the proper allocation of 
liability from loss of availability will significantly shape the necessary 
legalities.  (Liability from fraud or gross negligence is unlikely to respect 
such terms in any case)

> Otherwise, as other people have pointed out, catastrophic systems failure at 
> the CA is designed to be fail-safe.  I.e. if the CA goes away, ROAs will be 
> evaluated as "unknown" and life will continue on.  If people misconfigure 
> their networks and do silly things with this specific failure mode, that's 
> their problem.  

One would expect as much (i.e. it’s their problem for networks doing silly 
things), but we’ve heard some folks suggest it should be the RIR's problem 
(given the RIR CA's role in triggering events by going unavailable.)

Thanks!
/John

John Curran
President and CEO
ARIN





Re: NANOG Security Track: Route Security

2018-10-01 Thread Job Snijders
Perhaps the moderator and the presenters for this track can figure out (off
list!) if there is unanimous support to record the session and reconsider.

Kind regards,

Job


RE: NANOG Security Track: Route Security

2018-10-01 Thread Ryan Hamel
Ryan, what does the track moderator have to do with the presenter? All I here 
is an excuse to do a disservice to fellow members of this community.

Do you really want to have future meetings with everyone holding out their 
phones, cameras, or other recording devices, to spread the wealth of knowledge? 
That's crazy.

Ryan Hamel

-Original Message-
From: NANOG  On Behalf Of Ryan Woolley
Sent: Monday, October 01, 2018 11:48 AM
To: NANOG 
Subject: Re: NANOG Security Track: Route Security

On Mon, Oct 1, 2018 at 8:16 AM Netravnen  wrote:
>
> On Mon, 1 Oct 2018 at 14:01, John Kristoff  wrote:
> >
> > On Mon, 1 Oct 2018 03:27:49 +
> > Ryan Hamel  wrote:
> >
> > > Just like how all the email threads on NANOG are archived, all 
> > > talks should be archived as well.
> >
> > Whether to record a session or not is up to the presenter and track 
> > coordinator.
>
> I would prefer if NANOG would record sessions by default! (And allow 
> presenters to opt-out if they really feel like it.)
>
> Other conferences I have had participated to in the past. Had the 
> option of allowing opt-out of being recorded on stage.

This is in fact how it works now at NANOG.  As John points out, the decision is 
left up to the submitter, but almost all talks are webcast and recorded.  
(Historically, the security track has not been
recorded.)

Anyone is welcome to submit talks, including tracks, for consideration, and to 
make this choice as submitter.  In this case, the track moderator believes that 
it's better that the the talk to not be recorded and so we are honoring that 
request.

Aside from the security track and one other submission, the remainder of the 
3-day program will be available for viewing and recorded.

Regards,

Ryan Woolley
NANOG PC Chair



Re: NANOG Security Track: Route Security

2018-10-01 Thread Ryan Woolley
On Mon, Oct 1, 2018 at 8:16 AM Netravnen  wrote:
>
> On Mon, 1 Oct 2018 at 14:01, John Kristoff  wrote:
> >
> > On Mon, 1 Oct 2018 03:27:49 +
> > Ryan Hamel  wrote:
> >
> > > Just like how all the email threads on NANOG are archived, all talks
> > > should be archived as well.
> >
> > Whether to record a session or not is up to the presenter and track
> > coordinator.
>
> I would prefer if NANOG would record sessions by default! (And allow
> presenters to opt-out if they really feel like it.)
>
> Other conferences I have had participated to in the past. Had the
> option of allowing opt-out of being recorded on stage.

This is in fact how it works now at NANOG.  As John points out, the
decision is left up to the submitter, but almost all talks are webcast
and recorded.  (Historically, the security track has not been
recorded.)

Anyone is welcome to submit talks, including tracks, for
consideration, and to make this choice as submitter.  In this case,
the track moderator believes that it's better that the the talk to not
be recorded and so we are honoring that request.

Aside from the security track and one other submission, the remainder
of the 3-day program will be available for viewing and recorded.

Regards,

Ryan Woolley
NANOG PC Chair


Re: NANOG Security Track: Route Security

2018-10-01 Thread Scott Weeks



--- karl_g...@gmx.at wrote:
From: Karl Gerhard 

Most of the readers here will never attend a NANOG meeting 
and a big part of those won't attend because they live on 
other parts of the planet.



Yep, 21 years on the list and I still have not had the
chance to attend. It's a looong way from Hawaii.  :-)

scott


Re: question to the current NANOG keynote speaker (Paul Barford) re: availability of data in PREDICT

2018-10-01 Thread Sandra Murphy
Thank you thank you thank you for the person who saw my question and relayed at 
the mike!

—Sandy


> On Oct 1, 2018, at 2:04 PM, Sandra Murphy  wrote:
> 
> DHS had a program called PREDICT that made information important for security 
> research available.
> 
> The follow on is called IMPACT.  https://www.impactcybertrust.org
> 
> The key note speaker said his data was available under PREDICT, perhaps he 
> meant IMPACT.  Internet Atlas does show up on the IMPACT site.
> 
> The IMPACT program has announced (see their home page) that due to a lack of 
> funding support, the IMPACT program would cease operation in Dec 2018.  That 
> “continued use of existing data will expire and your ability to request data 
> through IMPACT will no longer exist”.
> 
> Can someone ask the speaker (can’t find support for remote attendees) if he 
> knows if any impact from IMPACT’s ceasing to operation on the ability to look 
> at the data that he said was available through PREDICT?
> 
> —Sandy Murphy, Parsons



question to the current NANOG keynote speaker (Paul Barford) re: availability of data in PREDICT

2018-10-01 Thread Sandra Murphy
DHS had a program called PREDICT that made information important for security 
research available.

The follow on is called IMPACT.  https://www.impactcybertrust.org

The key note speaker said his data was available under PREDICT, perhaps he 
meant IMPACT.  Internet Atlas does show up on the IMPACT site.

The IMPACT program has announced (see their home page) that due to a lack of 
funding support, the IMPACT program would cease operation in Dec 2018.  That 
“continued use of existing data will expire and your ability to request data 
through IMPACT will no longer exist”.

Can someone ask the speaker (can’t find support for remote attendees) if he 
knows if any impact from IMPACT’s ceasing to operation on the ability to look 
at the data that he said was available through PREDICT?

—Sandy Murphy, Parsons

Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Nick Hilliard

John Curran wrote on 01/10/2018 00:21:
There is likely some on the nanog mailing list who have a view on this 
matter, so I pose the question of "who should be responsible" for 
consequences of RPKI RIR CA failure to this list for further discussion.


other replies in this thread have assumed that RPKI CA failure modes are 
restricted to loss of availability, but there are others failure modes, 
for example:


- fraud: rogue CA employee / external threat actor signs ROAs illegitimately

- negligence: CA accidentally signs illegitimate ROAs due to e.g. 
software bug


- force majeure: e.g. court orders CA to sign prefix with AS0, 
complicated by NIR RPKI delegation in jurisdictions which may have 
difficult relations with other parts of the world.


These types of situations are well-trodden territory for other types of 
PKI CA, where users


Otherwise, as other people have pointed out, catastrophic systems 
failure at the CA is designed to be fail-safe.  I.e. if the CA goes 
away, ROAs will be evaluated as "unknown" and life will continue on.  If 
people misconfigure their networks and do silly things with this 
specific failure mode, that's their problem.  You can't stop people from 
aiming guns at their feet and pulling the trigger.


Nick


Re: NANOG Security Track: Route Security

2018-10-01 Thread Noah
+1

On Mon, 1 Oct 2018 7:53 am Job Snijders,  wrote:

> Hi all,
>
> Speaking as presenter in this track, I’d be fine with video recording and
> online distribution. In fact, I’d encourage it, I don’t assume any secrecy
> or confidentiality in this meeting.
>
> Perhaps for the NANOG74 meeting it is too late to organize video
> recording, but going forward I’m a proponent of recording everything. It
> creates more value for both the presenters and the global community.
>
> Kind regards,
>
> Job
>


Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread John Curran
On 1 Oct 2018, at 1:20 AM, Mark Tinka 
mailto:mark.ti...@seacom.mu>> wrote:
On 1/Oct/18 01:21, John Curran wrote:

It is possible to architect the various legalities surrounding RPKI to support 
any of the above outcomes, but it first requires a shared understanding of what 
the network community believes is the correct outcome.   There is likely some 
on the nanog mailing list who have a view on this matter, so I pose the 
question of "who should be responsible" for consequences of RPKI RIR CA failure 
to this list for further discussion.

John, in the instance where all RIR's transition to a single "All Resource" TA, 
what would, in your mind, be the (potential) liability considerations?

Mark -

If there were to be an RIR CA outage, it would not appear that the RIRs use of 
“All Resources” TAs would materially affect the resulting operational impact to 
the Internet.  (As noted earlier, the impact would be predominantly 
proportional to the number of ISPs that fail to follow best practices in route 
processing and fall back properly when their received routes end up with status 
NotFound, i.e. no longer match against their cache of validate ROAs since the 
cache has expired)

The “All Resources” TA used by each RIR done to avoiding CA invalidation due to 
overclaiming (as detailed in https://datatracker.ietf.org/doc/rfc8360) – it 
reduces the probability of a different and hopefully rare RPKI failure scenario 
(involving the possible accidental invalidation of an RIR CA) until such time 
as a slightly different RPKI validation algorithm can be deployed that would 
limit any such invalidation solely to the resources in the overlap.

(That’s my high-level understanding of the situation; comments on this question 
from those closer to the actual network bits would be most welcome…)

Thanks!
/John

John Curran
President and CEO
ARIN




Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Mark Tinka


On 1/Oct/18 14:23, Jason Lixfeld wrote:

>
>
> I need to swap out the wheels on my car.  I think I know better than
> to read the manual to, say, understand how much torque I should apply
> to each bolt, or what pattern I should use when tightening the bolts.
>  Or, I read the manual but decide it’s too hard to understand, and I
> don’t ask for help in clearing up some of the grey areas.
>
> I change the wheels anyway.  In the end, it looks right.  They roll.
>  Meh.  All good.
>
> Then the wheels fall off.
>
> There is absolutely no one to blame for any of that but me.
>
> In my view, I see no difference here.

As with anything else operators need to be responsible for their
networks when running them.

If I want to participate in the BGP on the Internet, I need to learn how
to run BGP. If my part of the BGP breaks my network or those of others
because I did not school myself on BGP, it's no one else's fault but
mine. I can't blame the IETF for this.

There is plenty of text freely available on the Internet about RPKI. In
fact, I'd go as far as saying all RIR's have been running RPKI workshops
for years.

Mark.


Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Jason Lixfeld


> On Oct 1, 2018, at 4:36 AM, Mark Tinka  wrote:
> 
> On 1/Oct/18 10:26, John Curran wrote:
> 
>> Indeed… Hence the question of liability during a RIR CA outage, should the 
>> liability for misconfigured ISPs (those handful of ISPs who do not properly 
>> fall back to using state NotFound routes) be the responsibility of each ISP, 
>> or perhaps those who announce ROAs, or should be with the RIR?
> 
> Any equipment misconfigurations should be the responsibility of the operator.

^^

> Responsibility for ROA's should lie with the resource holder, in ensuring 
> that not only is the information true, but that also all announced prefixes 
> are covered by a ROA.

^^

I need to swap out the wheels on my car.  I think I know better than to read 
the manual to, say, understand how much torque I should apply to each bolt, or 
what pattern I should use when tightening the bolts.  Or, I read the manual but 
decide it’s too hard to understand, and I don’t ask for help in clearing up 
some of the grey areas.

I change the wheels anyway.  In the end, it looks right.  They roll.  Meh.  All 
good.

Then the wheels fall off.

There is absolutely no one to blame for any of that but me.

In my view, I see no difference here.



Re: NANOG Security Track: Route Security

2018-10-01 Thread Netravnen
On Mon, 1 Oct 2018 at 14:01, John Kristoff  wrote:
>
> On Mon, 1 Oct 2018 03:27:49 +
> Ryan Hamel  wrote:
>
> > Just like how all the email threads on NANOG are archived, all talks
> > should be archived as well.
>
> Whether to record a session or not is up to the presenter and track
> coordinator.

I would prefer if NANOG would record sessions by default! (And allow
presenters to opt-out if they really feel like it.)

Other conferences I have had participated to in the past. Had the
option of allowing opt-out of being recorded on stage.


Re: NANOG Security Track: Route Security

2018-10-01 Thread John Kristoff
On Mon, 1 Oct 2018 03:27:49 +
Ryan Hamel  wrote:

> Just like how all the email threads on NANOG are archived, all talks
> should be archived as well.

Whether to record a session or not is up to the presenter and track
coordinator.

The security track, originally called the ISP Security BoF started by
Barry Greene and Merike Kaeo was in part an outgrowth of the
nsp-security community. The nsp-security was a closed, vetted
community.  In those days, they were not recorded mainly so participants
could feel reasonably comfortable sharing amongst each other by having
the discussions limited to those there in person.

For many years later it was more or less a given that the security
track wasn't recorded.  However, that position has weakened slightly
and I take some of the blame for that.  The last two security tracks I
led (67/68) were recorded and I think there was at least one before that
I asked be recorded, but it ended up not being captured because the
meeting coordinators thought I made a mistake. :-)

I had taken an informal poll before the first time about this. There
were about three people as I recall who preferred them not to be
recorded, suggesting they would not go on mic and participate if they
were.

Maybe during the session another show of hands should be taken to see
who wants them recorded or not in the future.

John


Re: NANOG Security Track: Route Security

2018-10-01 Thread Karl Gerhard
Hello,

I just wanted to mention that NANOG is being read all over the world - as far 
as I know this is the biggest english speaking "NOG" mailing list... in the 
world. Most of the readers here will never attend a NANOG meeting and a big 
part of those won't attend because they live on other parts of the planet.

The topics seem very interesting and highly relevant for networks everywhere 
and I find it very unfortunate that there will be no recording.

Best Regards from Europe
Karl




--
*From:* Krassimir Tzvetanov [mailto:mailli...@krassi.biz]
*Sent:* Mon, Oct 1, 2018 12:30 AM CEST
*To:* Sam Oduor
*Cc:* NANOG mailing list
*Subject:* NANOG Security Track: Route Security

> Sam,
>
> To ensure unimpeded information sharing and discussion, the Security Track 
> will not be broadcast or recorded.
>
> I apologise for the inconvenience.
>
> Regards,
> Krassimir
>
>
> On Sun, Sep 30, 2018, 1:05 PM Sam Oduor  > wrote:
>
> Hi
>
> Any online link available for remote participation or viewing ?
>
> On Sun, Sep 30, 2018 at 7:46 PM Krassimir Tzvetanov  > wrote:
>
> Hello Everyone,
>
> I wanted to attract your attention to the Security Track this coming 
> NANOG. We'll be meeting on Tuesday morning and the line up looks like this:
> * Andre Toonk - examples of hijacks, other ideas
> * Alexander Azimov - State of BGP Security
> * David Wishnick - ARIN TAL
> * Job Snijders - Routing security roadmap
> * Chris Morrow - So I need to start filtering routes from peers...' 
> and 'hey guess who needs to update their IRR data?'
>
> Time permitting at the end of the time slot we'll have a panel and 
> time for duscussion as well.
>
> Regards,
> Krassi
>
>
>
> -- 
> Samson Oduor
>



Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Mark Tinka


On 1/Oct/18 10:26, John Curran wrote:

>
> Of course, this presumes correct routing configuration by the ISP when 
> setting up RPKI route validation; while one would hope that the vast majority 
> handle this situation correctly, there is no assurance that will be true 
> without exception. If RPKI routing validation is widely deployed, tens of 
> thousands of ISPs will be setting up such a configuration, with customer 
> impact during an RPKI CA outage occurring for those who somehow failure to 
> fall back to using NotFound routes.  If only a small percentage get this 
> wrong, it will still represent dozens of ISPs going dark as a result. 

It is equally important to understand how vendors have interpreted the
RFC for default treatment of RPKI data.

When we started testing IOS and IOS XE back in 2014/2015, we hit an
issue where Cisco were automatically applying policy to RPKI state
without configuration from the operator. This was fixed in later code,
but goes to show that one should not assume that vendors are always
doing the right thing, or at the very least, fully understand what their
view on RPKI might be on the wider Internet, in real production.

So before deploying network-wide, I encourage operators to test what
their equipment will do when RPKI is enabled but without any manual
policy applied.


> Indeed… Hence the question of liability during a RIR CA outage, should the 
> liability for misconfigured ISPs (those handful of ISPs who do not properly 
> fall back to using state NotFound routes) be the responsibility of each ISP, 
> or perhaps those who announce ROAs, or should be with the RIR?

Any equipment misconfigurations should be the responsibility of the
operator.

Responsibility for ROA's should lie with the resource holder, in
ensuring that not only is the information true, but that also all
announced prefixes are covered by a ROA.

An RIR CA outage would, in my mind, be the responsibility of the RIR.
But this comes back to my question of how this handled with an "all
resource" TA.

Mark.


Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Claudio Jeker
On Mon, Oct 01, 2018 at 09:47:43AM +0200, Alex Band wrote:
> Hello,
> 
> To avoid any misunderstanding in this discussion going forward, I would
> like to reiterate that an RPKI ROA is a positive attestation. An
> unavailable, expired or invalid ROA will result in a BGP announcement
> with the status NotFound. The announcement will *not* become INVALID,
> thereby being dropped.
> 
> Please read Section 5 of RFC 7115 that John linked carefully:
> 
> Bush  Best Current Practice [Page 7]
> 
> RFC 7115 RPKI-Based Origin Validation OpJanuary 2014
> 
> 
>   Announcements with NotFound origins should be preferred over those
>   with Invalid origins.
> 
>   Announcements with Invalid origins SHOULD NOT be used, but may be
>   used to meet special operational needs.  In such circumstances, the
>   announcement should have a lower preference than that given to Valid
>   or NotFound.
> 
> Thus, a continued outage of an RPKI CA (or publication server) will
> result in announcements with status NotFound. This means that the
> prefixes held by this CA will no longer benefit from protection by the
> RPKI. However, since only *invalid* announcements should be dropped,
> this should not lead to large scale outages in routing.
> 
> It is important to be aware of the impact of such an outage when
> considering questions of liability.
 
This depends if the prefix in question is covered by another ROA. Because
in that case it is well possible that the prefix is marked INVALID.
This is especially an issue if a partial failure of a publication server
is taking out the more specifics but leaves a large covering ROA (maybe
even one with origin AS 0).

In the end from a security standpoint it is probably better to fail closed
because the alternative is no RPKI and then hijacks become possible and
MITM attacks or DNS spoofing can be done leaving every Internet user at risk.

Also consider that not using best common practice to protect a service is
also putting you at risk for liability charges. So ignoring RPKI because
of possible liability concerns may as fire back at you.

-- 
:wq Claudio


Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread John Curran
On 1 Oct 2018, at 12:47 AM, Alex Band  wrote:
> 
> Hello,
> 
> To avoid any misunderstanding in this discussion going forward, I would like 
> to reiterate that an RPKI ROA is a positive attestation. An unavailable, 
> expired or invalid ROA will result in a BGP announcement with the status 
> NotFound. The announcement will *not* become INVALID, thereby being dropped.
> 
> Please read Section 5 of RFC 7115 that John linked carefully:
> ...
> 
> Thus, a continued outage of an RPKI CA (or publication server) will result in 
> announcements with status NotFound. This means that the prefixes held by this 
> CA will no longer benefit from protection by the RPKI. However, since only 
> *invalid* announcements should be dropped, this should not lead to large 
> scale outages in routing.

Alex - 

Yes – ISPs who have configured RPKI route validation and are using it to 
preference routes should continue to utilize routes that are have NotFound 
status due to lack of RPKI repository data.   As RFC 7115 notes - 

 " Hence, an operator's policy should not be
   overly strict and should prefer Valid announcements; it should attach
   a lower preference to, but still use, NotFound announcements, and
   drop or give a very low preference to Invalid announcements. "

Of course, this presumes correct routing configuration by the ISP when setting 
up RPKI route validation; while one would hope that the vast majority handle 
this situation correctly, there is no assurance that will be true without 
exception. If RPKI routing validation is widely deployed, tens of thousands of 
ISPs will be setting up such a configuration, with customer impact during an 
RPKI CA outage occurring for those who somehow failure to fall back to using 
NotFound routes.  If only a small percentage get this wrong, it will still 
represent dozens of ISPs going dark as a result. 

> It is important to be aware of the impact of such an outage when considering 
> questions of liability.

Indeed… Hence the question of liability during a RIR CA outage, should the 
liability for misconfigured ISPs (those handful of ISPs who do not properly 
fall back to using state NotFound routes) be the responsibility of each ISP, or 
perhaps those who announce ROAs, or should be with the RIR?

Thanks!
/John

John Curran
President and CEO
ARIN



   




Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Mark Tinka


On 1/Oct/18 01:21, John Curran wrote:

>  
>  
>
> It is possible to architect the various legalities surrounding RPKI to
> support any of the above outcomes, but it first requires a shared
> understanding of what the network community believes is the correct
> outcome.   There is likely some on the nanog mailing list who have a
> view on this matter, so I pose the question of "who should be
> responsible" for consequences of RPKI RIR CA failure to this list for
> further discussion.

John, in the instance where all RIR's transition to a single "All
Resource" TA, what would, in your mind, be the (potential) liability
considerations?

Mark.


Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Mark Tinka


On 1/Oct/18 09:47, Alex Band wrote:

>
> Thus, a continued outage of an RPKI CA (or publication server) will result in 
> announcements with status NotFound. This means that the prefixes held by this 
> CA will no longer benefit from protection by the RPKI. However, since only 
> *invalid* announcements should be dropped, this should not lead to large 
> scale outages in routing.

Indeed, and this is on the basis that operators are not overzealous
about aggressively acting against a "NotFound" RPKI state.

Mark.


Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Alex Band
Hello,

To avoid any misunderstanding in this discussion going forward, I would like to 
reiterate that an RPKI ROA is a positive attestation. An unavailable, expired 
or invalid ROA will result in a BGP announcement with the status NotFound. The 
announcement will *not* become INVALID, thereby being dropped.

Please read Section 5 of RFC 7115 that John linked carefully:

Bush  Best Current Practice [Page 7]

RFC 7115 RPKI-Based Origin Validation OpJanuary 2014


  Announcements with NotFound origins should be preferred over those
  with Invalid origins.

  Announcements with Invalid origins SHOULD NOT be used, but may be
  used to meet special operational needs.  In such circumstances, the
  announcement should have a lower preference than that given to Valid
  or NotFound.

Thus, a continued outage of an RPKI CA (or publication server) will result in 
announcements with status NotFound. This means that the prefixes held by this 
CA will no longer benefit from protection by the RPKI. However, since only 
*invalid* announcements should be dropped, this should not lead to large scale 
outages in routing.

It is important to be aware of the impact of such an outage when considering 
questions of liability.

Kind regards,

Alex Band
NLnet Labs

> On 1 Oct 2018, at 01:21, John Curran  wrote:
> 
> Folks - 
> 
> Perhaps it would be helpful to confirm that we have common goals in the 
> network operator community regarding RPKI, and then work from those goals on 
> the necessary plans to achieve them. 
> 
> It appears that many network operators would like to improve the integrity of 
> their network routing via RPKI deployment.  The Regional Internet Registries 
> (RIRs) have all worked to support RPKI services, and while there are 
> different opinions among operators regarding the cost/benefit tradeoffs of 
> RPKI Route Origin Validation (ROV), it is clear that we have to collectively 
> work together now if we are ever to have overall RPKI deployment sufficient 
> to create the network effects that will ensure compelling long-term value for 
> its deployment. 
> 
> Let’s presume that we’ve achieved that very outcome at some point in future; 
> i.e. we’re have an Internet where nearly all network operators are publishing 
> Route Origin Authorizations (ROAs) via RIR RPKI services and are using RPKI 
> data for route validation.  It is reasonable to presume that over the next 
> decade the Internet will become even more pervasive in everyday life, 
> including being essential for many connected devices to function, and relied 
> upon for everything from daily personal communication and conducting business 
> to even more innovative uses such as payment & sale systems, delivery of 
> medical care, etc. 
> 
> Recognizing that purpose of RPKI is improve integrity of routing, and not add 
> undo fragility to the network, it is reasonable to expect that many network 
> operators will take due care with the introduction of route validation into 
> their network routing, including best practices such as falling back 
> successfully in the event of unavailability of an RIR RPKI Certificate 
> Authority (CA) and resulting cache timeouts.  It is also reasonable expect 
> that RIR RPKI CA services are provisioned with appropriate robustness of 
> systems and controls that befit the highly network-critical nature of these 
> services. 
> 
> Presuming we all share this common goal, the question that arises is whether 
> we have a common vision regarding what should happen when something goes 
> wrong in this wonderful RPKI-rich Internet of the future…   More than anyone, 
> network operators realize that even with excellent systems, procedures, and 
> redundancy, outages can (and do) still occur.  Hopefully, these are quite 
> rare, and limited to occasions where Murphy’s Law has somehow resulted in 
> nearly unimaginable patterns of coincident failures, but it would 
> irresponsible to not consider the “what if” scenarios for RPKI failure and 
> whether there is shared vision of the resulting consequences. 
> 
> In particular, it would be good to consider the case of an RIR RPKI CA system 
> failure, one sufficient to result in widespread cache expirations for relying 
> parties.  Ideally, we will never have to see this scenario when RPKI is 
> widely deployed, but it also not completely inconceivable that an RIR RPKI CA 
> experience such an outage [1]. For network operators following reasonable 
> deployment practices, an RIR RPKI CA outage should result in a fallback to 
> unvalidated network routing data and no significant network impacts.  
> However, it’s likely not a reasonable assumption that all network operators 
> will have properly designed and implemented best practices in this regard, so 
> there will very likely be some networks that experience significant impacts 
> consequential to any RIR RPKI CA outage.  Even if this is only 1 or 2 percent 
> of net

Re: NANOG Security Track: Route Security

2018-10-01 Thread Christopher Morrow
we could post our slides though, right? (I mean, per presenter, if that's
your choice?)

On Mon, Oct 1, 2018 at 12:52 AM Job Snijders  wrote:

> Hi all,
>
> Speaking as presenter in this track, I’d be fine with video recording and
> online distribution. In fact, I’d encourage it, I don’t assume any secrecy
> or confidentiality in this meeting.
>
> Perhaps for the NANOG74 meeting it is too late to organize video
> recording, but going forward I’m a proponent of recording everything. It
> creates more value for both the presenters and the global community.
>
> Kind regards,
>
> Job
>