<div dir="ltr"><br><div>And to add to this - you'll find it implemented across all IX Australia exchanges now so if you peer (and you should :-) ) we will be in touch if there are any routes being dropped. RPKI is in everyone's interest.</div><div><br></div><div>all the best</div><div><br></div><div>Narelle</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, 1 Oct 2020 at 20:03, Andy Davidson <<a href="mailto:andy@nosignal.org">andy@nosignal.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi, Alex<br>
<br>
Alex Samad wrote:<br>
> Wondering how prevalent is RPKI in transit providers in Oz. Just got an email from exetel to say they are starting a rollout of it.<br>
> Seems like my ROS routers don't have it, seems like they have been talking about back in 2014, still waiting on that feature to be added.<br>
> Curious if all of my transit providers are going to come knocking and asking for me to turn this on ?<br>
<br>
It depends what you mean by rolling it out and supporting it. It could mean publishing ROAs for your/their prefixes, or it could mean verifying announcements against the database of published ROAs. <br>
<br>
A ROA (Route Origin Authorisation) is a signed digital attestation that an ASN has explicit permission to originate a prefix. You can publish these in MyAPNIC. It is a good idea to do this and to express your intent correctly because once you have published your ROAs it means networks who do ROA verification (what I think you mean by rolling out RPKI) are less likely to accept and propagate hijack attempts for your prefixes. You can also indicate whether a prefix deaggregates should appear in the default free routing table so it's a really good way to limit your exposure to spoof origin attempts. <br>
<br>
You don't need your equipment to support the verification of ROAs in order to publish ROAs for your prefixes, nor do you need your equipment to support it if your upstream does. Note, the majority of large networks are today filtering RPKI invalid prefixes. Doing RPKI filtering on your network is a good idea to prevent your customers from sending traffic to prefix hijackers instead of rightful originators.<br>
<br>
In other words, their notification means many networks can do nothing, but you should check that your RPKI data (if published) in MyAPNIC is not wrong (or you're going to fall offline), and publish valid RPKI data anyway to protect your customers!<br>
<br>
> Plus some quick googling seems to suggest its currently flawed..<br>
<br>
Beware quick googling; today's RPKI not full BGPSEC but it's a great step towards preventing accidental and many deliberate hijack attempts.<br>
<br>
Andy<br>
<br>
_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" rel="noreferrer" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
</blockquote></div><br clear="all"><div><br></div>-- <br><div dir="ltr" class="gmail_signature"><br><br>Narelle<br><a href="mailto:narellec@gmail.com" target="_blank">narellec@gmail.com</a></div>