Why are BGP mishaps very common and frighteningly very easy – malicious route hijacking, mis-origination (fat fingers), and route leaks (bad filters). We need better mechanism(s) to ensure no one can inject false information into the global routing system that easily.
This live online tutorial will look at current tools/techniques, how RPKI is just a piece in the puzzle, and what we should all do to secure Internet routing.
Note: you must attend this theory session on 19 May to attend this lab session on 20 May.
This online tutorial is fee-free.
Anyone interested in understanding issues with BGP (Internet routing) security and practising good hygiene, including filtering based on ROAs.
The lab exercises use Cisco IOS configuration syntax.
Recent Routing Incidents
RPKI framework: resource certificates, origin authority, chain of trust
Deploying RPKI validators
RTR configuration on routers
Filtering with ROAs (Route Origin Validation)
Path Validation – why and how?
Hardware: It is highly recommended that participants laptop computers have Wifi(b/g/n) and administrative access to system to practice the lessons learned during the workshops.
Software requirements: SSH Client, Telnet Client (PuTTy)
This is a 2-part tutorial:
Tuesday 19 May – theory session
Wednesday 20 May – lab session (note: you must attend the theory session to attend this session / there will be a limit on the number of attendees for this lab session)
Day 2 / 20 May – Registration URL: Register for day 2/part 2
Please note: so we can deliver the hands-on exercises effectively there are a limited number of places available for day two of this tutorial (20 May).
Please check the time zone and only register if you are able to attend.
If you register and are unable to attend please let us know as early as possible.