Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature: Hardening BGP #6

Closed
5 tasks
bbros-dev opened this issue Feb 24, 2021 · 1 comment
Closed
5 tasks

Feature: Hardening BGP #6

bbros-dev opened this issue Feb 24, 2021 · 1 comment

Comments

@bbros-dev
Copy link

bbros-dev commented Feb 24, 2021

Place holder to track initial scope and references.

Issues:

  • Are there any standards guidance on the 'special'/private networks CIAB utilizes.
  • What additional security/functionality is added for CIAB use cases - or is the value educational alone - which is enough (IMO).
    • [/] Route-Origin-Validation (ROV): RPKI
      • Without RPKI ".. deliberately or accidentally, networks are able to advertise more specific prefix routing information for address space controlled by other networks to their peers over BGP, which causes that traffic to flow through their network instead of to the intended recipient"[1]. No definite source that says BGP hard-codes protection for private address spaces against this type of "deliberately or accidentally" occurring event.
        • Use-case: In addition to external "deliberately or accidentally" occurring events; segmenting development/test/staging/production networks.
        • RPKI to Route (RTR) implementations:
          • Routinater: Recommended.[2]
          • RIPE NCC Validator
          • Cloudflare OktoRPKI
          • FORT
    • BGPSec
  • MANRS: Mutually Agreed Norms for Routing Security

References:

@bbros-dev
Copy link
Author

Unfortunately, we no longer have time to devote to resolving this issue. Closing, but happy for anyone to reopen - we didn't want to be thought of just opening up to-do lists for others.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant