Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. Routinator, our RPKI validation software, now sees more than 1000 Autonomous System Provider Authorization (ASPA) objects in the wild.

Routinator, our RPKI validation software, now sees more than 1000 Autonomous System Provider Authorization (ASPA) objects in the wild.

Geplant Angeheftet Gesperrt Verschoben Uncategorized
opensourceopenstandardsietfrpkibgproutingsecurity
18 Beiträge 8 Kommentatoren 0 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • alexband@hachyderm.ioA alexband@hachyderm.io

    Routinator, our RPKI validation software, now sees more than 1000 Autonomous System Provider Authorization (ASPA) objects in the wild. These are published by operators to detect and prevent BGP route leaks.

    ASPAs can be created in the hosted RPKI services of the RIPE NCC and ARIN, as well as our open-source RPKI Certification Authority software, Krill.

    Open-source routing projects such as BIRD, OpenBGPD and FRRouting already offer support for ASPA, while major commercial vendor support is expected later this year.

    #OpenSource #OpenStandards #IETF #RPKI #BGP #RoutingSecurity

    benjojo@benjojo.co.ukB This user is from outside of this forum
    benjojo@benjojo.co.ukB This user is from outside of this forum
    benjojo@benjojo.co.uk
    schrieb zuletzt editiert von
    #3

    @alexband you might enjoy @newaspa !

    1 Antwort Letzte Antwort
    0
    • alexband@hachyderm.ioA alexband@hachyderm.io

      Routinator, our RPKI validation software, now sees more than 1000 Autonomous System Provider Authorization (ASPA) objects in the wild. These are published by operators to detect and prevent BGP route leaks.

      ASPAs can be created in the hosted RPKI services of the RIPE NCC and ARIN, as well as our open-source RPKI Certification Authority software, Krill.

      Open-source routing projects such as BIRD, OpenBGPD and FRRouting already offer support for ASPA, while major commercial vendor support is expected later this year.

      #OpenSource #OpenStandards #IETF #RPKI #BGP #RoutingSecurity

      asl@mastodon.launay.orgA This user is from outside of this forum
      asl@mastodon.launay.orgA This user is from outside of this forum
      asl@mastodon.launay.org
      schrieb zuletzt editiert von
      #4

      @alexband I don't find the support for it in FRRouting, do you have a link ? I tried grepping through the source, I see support for RPKI, but nothing for ASPA...

      alexband@hachyderm.ioA 1 Antwort Letzte Antwort
      0
      • asl@mastodon.launay.orgA asl@mastodon.launay.org

        @alexband I don't find the support for it in FRRouting, do you have a link ? I tried grepping through the source, I see support for RPKI, but nothing for ASPA...

        alexband@hachyderm.ioA This user is from outside of this forum
        alexband@hachyderm.ioA This user is from outside of this forum
        alexband@hachyderm.io
        schrieb zuletzt editiert von
        #5

        @asl Hmm, indeed. I may have remembered incorrectly... 🧐

        1 Antwort Letzte Antwort
        0
        • alexband@hachyderm.ioA alexband@hachyderm.io

          Routinator, our RPKI validation software, now sees more than 1000 Autonomous System Provider Authorization (ASPA) objects in the wild. These are published by operators to detect and prevent BGP route leaks.

          ASPAs can be created in the hosted RPKI services of the RIPE NCC and ARIN, as well as our open-source RPKI Certification Authority software, Krill.

          Open-source routing projects such as BIRD, OpenBGPD and FRRouting already offer support for ASPA, while major commercial vendor support is expected later this year.

          #OpenSource #OpenStandards #IETF #RPKI #BGP #RoutingSecurity

          wtremmel@hessen.socialW This user is from outside of this forum
          wtremmel@hessen.socialW This user is from outside of this forum
          wtremmel@hessen.social
          schrieb zuletzt editiert von
          #6

          @alexband ....and updated my lab with the newest #Routinator version and added --enable-aspa to my containerlab config

          partim@social.tchncs.deP 1 Antwort Letzte Antwort
          0
          • wtremmel@hessen.socialW wtremmel@hessen.social

            @alexband ....and updated my lab with the newest #Routinator version and added --enable-aspa to my containerlab config

            partim@social.tchncs.deP This user is from outside of this forum
            partim@social.tchncs.deP This user is from outside of this forum
            partim@social.tchncs.de
            schrieb zuletzt editiert von
            #7

            @wtremmel @alexband @nlnetlabs I think we can flip that switch into a `—disable-aspa` in the next release.

            1 Antwort Letzte Antwort
            0
            • drscriptt@oldbytes.spaceD drscriptt@oldbytes.space

              @alexband I have yet to see how RPKI / ASPA / ROA can actually prevent route leaks.

              I absolutely agree that they can help detect and mitigate route leaks AS LONG AS peers are using information published via RPKI / ROA.

              Much like SPF can’t prevent spam. While SPF does make it easier to detect and filter spam.

              Preventing is proactive and decidedly different than reactively detecting and mitigating (filtering).

              jhaas@a2mi.socialJ This user is from outside of this forum
              jhaas@a2mi.socialJ This user is from outside of this forum
              jhaas@a2mi.social
              schrieb zuletzt editiert von
              #8

              @drscriptt @alexband The short form is that some downstream AS can't necessarily detect that routes have passed through inappropriate ASes from a valley-free perspective without some hints about what that relationship is. BGP is quite happy to make sure the routes are loop free without caring what your business relationship is.

              If your point is "where's the incentive to register your relationship", that's a different problem.

              drscriptt@oldbytes.spaceD 1 Antwort Letzte Antwort
              0
              • jhaas@a2mi.socialJ jhaas@a2mi.social

                @drscriptt @alexband The short form is that some downstream AS can't necessarily detect that routes have passed through inappropriate ASes from a valley-free perspective without some hints about what that relationship is. BGP is quite happy to make sure the routes are loop free without caring what your business relationship is.

                If your point is "where's the incentive to register your relationship", that's a different problem.

                drscriptt@oldbytes.spaceD This user is from outside of this forum
                drscriptt@oldbytes.spaceD This user is from outside of this forum
                drscriptt@oldbytes.space
                schrieb zuletzt editiert von
                #9

                @jhaas @alexband I absolutely agree that the information needs to be published for recipients to be able to make a decision / filter received prefixes.

                My point was that simply publishing information doesn’t prevent anything. 😉

                alexband@hachyderm.ioA jhaas@a2mi.socialJ erincandescent@akko.erincandescent.netE 3 Antworten Letzte Antwort
                0
                • drscriptt@oldbytes.spaceD drscriptt@oldbytes.space

                  @jhaas @alexband I absolutely agree that the information needs to be published for recipients to be able to make a decision / filter received prefixes.

                  My point was that simply publishing information doesn’t prevent anything. 😉

                  alexband@hachyderm.ioA This user is from outside of this forum
                  alexband@hachyderm.ioA This user is from outside of this forum
                  alexband@hachyderm.io
                  schrieb zuletzt editiert von
                  #10

                  @drscriptt @jhaas I remember launching #RPKI in 2011. It took years of publishing ROAs, learning from mistakes and fixing bad quality ROAs before the operator community got to the point where they felt comfortable dropping invalid routes.

                  ASPA will be the same, although perhaps a bit quicker because of the huge installed base of (ASPA capable) validators: https://rov-measurements.nlnetlabs.net/stats/

                  jhaas@a2mi.socialJ drscriptt@oldbytes.spaceD 2 Antworten Letzte Antwort
                  0
                  • drscriptt@oldbytes.spaceD drscriptt@oldbytes.space

                    @jhaas @alexband I absolutely agree that the information needs to be published for recipients to be able to make a decision / filter received prefixes.

                    My point was that simply publishing information doesn’t prevent anything. 😉

                    jhaas@a2mi.socialJ This user is from outside of this forum
                    jhaas@a2mi.socialJ This user is from outside of this forum
                    jhaas@a2mi.social
                    schrieb zuletzt editiert von
                    #11

                    @drscriptt @alexband Publication has the benefit of proxy enforcement. A number of service providers gained the benefits of origin validation when they themselves weren't participating in dropping stuff locally.

                    If you want to gripe that any AS can raw-dog updates generated by bash scripts and filter nothing, weird flex I guess?

                    1 Antwort Letzte Antwort
                    0
                    • alexband@hachyderm.ioA alexband@hachyderm.io

                      @drscriptt @jhaas I remember launching #RPKI in 2011. It took years of publishing ROAs, learning from mistakes and fixing bad quality ROAs before the operator community got to the point where they felt comfortable dropping invalid routes.

                      ASPA will be the same, although perhaps a bit quicker because of the huge installed base of (ASPA capable) validators: https://rov-measurements.nlnetlabs.net/stats/

                      jhaas@a2mi.socialJ This user is from outside of this forum
                      jhaas@a2mi.socialJ This user is from outside of this forum
                      jhaas@a2mi.social
                      schrieb zuletzt editiert von
                      #12

                      @alexband @drscriptt I have fears of subtle bugs in the validation algorithm, but expect that like OV ASPA will be deployed in soft mode for a while. The industry showed how to handle the incremental deployment well.

                      Shorter term, CPU churn from ASPA updates in RPKI-RTR will be... fun.

                      alexband@hachyderm.ioA 1 Antwort Letzte Antwort
                      0
                      • jhaas@a2mi.socialJ jhaas@a2mi.social

                        @alexband @drscriptt I have fears of subtle bugs in the validation algorithm, but expect that like OV ASPA will be deployed in soft mode for a while. The industry showed how to handle the incremental deployment well.

                        Shorter term, CPU churn from ASPA updates in RPKI-RTR will be... fun.

                        alexband@hachyderm.ioA This user is from outside of this forum
                        alexband@hachyderm.ioA This user is from outside of this forum
                        alexband@hachyderm.io
                        schrieb zuletzt editiert von
                        #13

                        @jhaas @drscriptt Meanwhile, as more #RPKI invalid #BGP routes are dropped, we are working on making the invisible visible again with Rotonda. https://ripe91.ripe.net/programme/meeting-plan/sessions/15/CLRNRY/

                        jhaas@a2mi.socialJ 1 Antwort Letzte Antwort
                        0
                        • alexband@hachyderm.ioA alexband@hachyderm.io

                          @jhaas @drscriptt Meanwhile, as more #RPKI invalid #BGP routes are dropped, we are working on making the invisible visible again with Rotonda. https://ripe91.ripe.net/programme/meeting-plan/sessions/15/CLRNRY/

                          jhaas@a2mi.socialJ This user is from outside of this forum
                          jhaas@a2mi.socialJ This user is from outside of this forum
                          jhaas@a2mi.social
                          schrieb zuletzt editiert von
                          #14

                          @alexband This is now the second open tab for me to find time to watch from -91. I need to find the time to start attending the sessions.

                          1 Antwort Letzte Antwort
                          0
                          • alexband@hachyderm.ioA alexband@hachyderm.io

                            @drscriptt @jhaas I remember launching #RPKI in 2011. It took years of publishing ROAs, learning from mistakes and fixing bad quality ROAs before the operator community got to the point where they felt comfortable dropping invalid routes.

                            ASPA will be the same, although perhaps a bit quicker because of the huge installed base of (ASPA capable) validators: https://rov-measurements.nlnetlabs.net/stats/

                            drscriptt@oldbytes.spaceD This user is from outside of this forum
                            drscriptt@oldbytes.spaceD This user is from outside of this forum
                            drscriptt@oldbytes.space
                            schrieb zuletzt editiert von
                            #15

                            @alexband @jhaas that timing feels about like when I started paying attention to and hoping for RPKI. But not holding my breath.

                            1 Antwort Letzte Antwort
                            0
                            • drscriptt@oldbytes.spaceD drscriptt@oldbytes.space

                              @jhaas @alexband I absolutely agree that the information needs to be published for recipients to be able to make a decision / filter received prefixes.

                              My point was that simply publishing information doesn’t prevent anything. 😉

                              erincandescent@akko.erincandescent.netE This user is from outside of this forum
                              erincandescent@akko.erincandescent.netE This user is from outside of this forum
                              erincandescent@akko.erincandescent.net
                              schrieb zuletzt editiert von
                              #16

                              @drscriptt @jhaas @alexband what would stopping a leak look like to you?

                              We’ve already seen a number of route leaks stopped or majorly suppressed by ROA validation, and ROA validation is far less capable in this regard than ASPA.

                              drscriptt@oldbytes.spaceD 2 Antworten Letzte Antwort
                              0
                              • erincandescent@akko.erincandescent.netE erincandescent@akko.erincandescent.net

                                @drscriptt @jhaas @alexband what would stopping a leak look like to you?

                                We’ve already seen a number of route leaks stopped or majorly suppressed by ROA validation, and ROA validation is far less capable in this regard than ASPA.

                                drscriptt@oldbytes.spaceD This user is from outside of this forum
                                drscriptt@oldbytes.spaceD This user is from outside of this forum
                                drscriptt@oldbytes.space
                                schrieb zuletzt editiert von
                                #17

                                @erincandescent @jhaas @alexband my message is about preventing advertisement vs accepting said advertisement.

                                You can’t prevent someone from doing something. But you can not be part of their actions.

                                1 Antwort Letzte Antwort
                                0
                                • erincandescent@akko.erincandescent.netE erincandescent@akko.erincandescent.net

                                  @drscriptt @jhaas @alexband what would stopping a leak look like to you?

                                  We’ve already seen a number of route leaks stopped or majorly suppressed by ROA validation, and ROA validation is far less capable in this regard than ASPA.

                                  drscriptt@oldbytes.spaceD This user is from outside of this forum
                                  drscriptt@oldbytes.spaceD This user is from outside of this forum
                                  drscriptt@oldbytes.space
                                  schrieb zuletzt editiert von
                                  #18

                                  @erincandescent @jhaas @alexband I can’t prevent you from advertising prefixes to me.

                                  I can filter / not accept the unwelcomed prefix(es) from you.

                                  1 Antwort Letzte Antwort
                                  0
                                  • skorpy@chaos.socialS skorpy@chaos.social shared this topic
                                  Antworten
                                  • In einem neuen Thema antworten
                                  Anmelden zum Antworten
                                  • Älteste zuerst
                                  • Neuste zuerst
                                  • Meiste Stimmen



                                  Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                                  Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                                  Impressum | Datenschutzerklärung | Nutzungsbedingungen

                                  • Anmelden

                                  • Du hast noch kein Konto? Registrieren

                                  • Anmelden oder registrieren, um zu suchen
                                  • Erster Beitrag
                                    Letzter Beitrag
                                  0
                                  • Home
                                  • Aktuell
                                  • Tags
                                  • Über dieses Forum