diff options
author | Marek Isalski <git@maz.nu> | 2020-02-22 13:06:38 +0000 |
---|---|---|
committer | Marek Isalski <git@maz.nu> | 2020-02-22 13:06:38 +0000 |
commit | 127cd8d280833ca022d58e51ba9307a78165c3c6 (patch) | |
tree | c3042067744b938027ac72c87a9a3fcf850fda7d /docs/routing/rpki.rst | |
parent | 93405223c5fe17ef9ac57cd69bf51513f8d12156 (diff) | |
download | vyos-documentation-127cd8d280833ca022d58e51ba9307a78165c3c6.tar.gz vyos-documentation-127cd8d280833ca022d58e51ba9307a78165c3c6.zip |
add more flesh to the RPKI documentation
Diffstat (limited to 'docs/routing/rpki.rst')
-rw-r--r-- | docs/routing/rpki.rst | 78 |
1 files changed, 61 insertions, 17 deletions
diff --git a/docs/routing/rpki.rst b/docs/routing/rpki.rst index 825918d0..ab4c62a7 100644 --- a/docs/routing/rpki.rst +++ b/docs/routing/rpki.rst @@ -5,32 +5,70 @@ RPKI #### :abbr:`RPKI (Resource Public Key Infrastructure)` is a framework :abbr:`PKI -(Public Key Infastucrure)` designed to secure the Internet routing -infrastructure. It associate a BGP route announcement with the correct -originating :abbr:`ASN (Autonomus System Number)` and check its validity. +(Public Key Infrastructure)` designed to secure the Internet routing +infrastructure. It associates BGP route announcements with the correct +originating :abbr:`ASN (Autonomus System Number)` which BGP routers can then +use to check each route against the corresponding :abbr:`ROA (Route Origin +Authorisation)` for validity. RPKI is described in :rfc:`6480`. -RPKI is described in :rfc:`6480`. This is a separate server. You can find more -details at RIPE-NCC_. +A BGP-speaking router like VyOS can retrieve ROA information from RPKI +"Relying Party software" (often just called an "RPKI server" or "RPKI +validator") by using :abbr:`RTR (RPKI to Router)` protocol. There are several +open source implementations to choose from, such as NLNetLabs' Routinator_ +(written in Rust), Cloudflare's GoRTR_ and OctoRPKI_ (written in Go), and +RIPE NCC's RPKI Validator_ (written in Java). The RTR protocol is described +in :rfc:`8210`. -Imported prefixes during the validation may have values: valid, invalid and -not found. +First you will need to deploy an RPKI validator for your routers to use. The +RIPE NCC helpfully provide `some instructions`_ to get you started with +several different options. Once your server is running you can start +validating announcements. -* The valid state means that prefix and ASN that originated it match the - :abbr:`ROA (Route Origination Authorizations)` base. -* Invalid means that prefix/prefix length and ASN that originated it doesn't - match with ROA. -* Notfound means that prefix not found in ROA. +Imported prefixes during the validation may have values: -We can build route-maps for import, based on these states. Simple RPKI -configuration, where 'routinator' - RPKI cache server with ip '192.0.2.1'. + valid + The prefix and ASN that originated it match a signed ROA. These are + probably trustworthy route announcements. + + invalid + The prefix or prefix length and ASN that originated it doesn't + match any existing ROA. This could be the result of a prefix hijack, or + merely a misconfiguration, but should probably be treated as + untrustworthy route announcements. + + notfound + No ROA exists which covers that prefix. Unfortunately this is the case + for about 80% of the IPv4 prefixes which were announced to the :abbr:`DFZ + (default-free zone)` at the start of 2020 (see more detail in + NLnet Labs' `RPKI analytics`_). + +.. note:: + If you are responsible for the global addresses assigned to your + network, please make sure that your prefixes have ROAs associated with them + to avoid being `notfound` by RPKI. For most ASNs this will involve + publishing ROAs via your :abbr:`RIR (Regional Internet Registry)` (RIPE + NCC, APNIC, ARIN, LACNIC or AFRINIC), and is something you are encouraged + to do whenever you plan to announce addresses into the DFZ. + + Particularly large networks may wish to run their own RPKI certificate + authority and publication server instead of publishing ROAs via their RIR. + This is a subject far beyond the scope of VyOS' documentation. Consider + reading about Krill_ if this is a rabbit hole you need or especially want + to dive down. + +We can build route-maps for import based on these states. Here is a simple +RPKI configuration, where `routinator` is the RPKI-validating "cache" +server with ip `192.0.2.1`: .. code-block:: none set protocols rpki cache routinator address '192.0.2.1' set protocols rpki cache routinator port '3323' -Example route-map for import. We can set local-preference logic based on states. -Also we may not import prefixes with the state 'invalid'. +Here is an example route-map to apply to routes learned at import. In this +filter we reject prefixes with the state `invalid`, and set a higher +`local-preference` if the prefix is RPKI `valid` rather than merely +`notfound`. .. code-block:: none @@ -43,4 +81,10 @@ Also we may not import prefixes with the state 'invalid'. set policy route-map ROUTES-IN rule 30 action 'deny' set policy route-map ROUTES-IN rule 30 match rpki 'invalid' -.. _RIPE-NCC: https://github.com/RIPE-NCC/rpki-validator-3/wiki +.. _Routinator: https://www.nlnetlabs.nl/projects/rpki/routinator/ +.. _GoRTR: https://github.com/cloudflare/gortr +.. _OctoRPKI: https://github.com/cloudflare/cfrpki#octorpki +.. _Validator: https://www.ripe.net/manage-ips-and-asns/resource-management/certification/tools-and-resources +.. _some instructions: https://labs.ripe.net/Members/tashi_phuntsho_3/how-to-install-an-rpki-validator +.. _Krill: https://www.nlnetlabs.nl/projects/rpki/krill/ +.. _RPKI analytics: https://www.nlnetlabs.nl/projects/rpki/rpki-analytics/ |