Why are BGP mishaps very common and frighteningly very easy – malicious route hijacking, mis-origination (fat fingers), and route leaks (bad filters). We need better mechanism(s) to ensure no one can inject false information into the global routing system that easily.
This live online tutorial will look at current tools/techniques, how RPKI is just a piece in the puzzle, and what we should all do to secure Internet routing.
Note: you must attend the theory session on 19 May to attend this lab session on 20 May.
This online tutorial is fee-free.
Anyone interested in understanding issues with BGP (Internet routing) security and practising good hygiene, including filtering based on ROAs.
The lab exercises use Cisco IOS configuration syntax.
Recent Routing Incidents
RPKI framework: resource certificates, origin authority, chain of trust
Deploying RPKI validators
RTR configuration on routers
Filtering with ROAs (Route Origin Validation)
Path Validation – why and how?
Hardware: It is highly recommended that participants laptop computers have Wifi(b/g/n) and administrative access to system to practice the lessons learned during the workshops.
Software requirements: SSH Client, Telnet Client (PuTTy)
Maximum number of attendees
There are a limited number of places available for this tutorial.
This is a 2-part tutorial:
Tuesday 19 May – theory session (note: you must attend this theory session to attend the lab session on 20 May)
Day 1 – Registration URL: Register for day 1/part 1
Wednesday 20 May – lab session
Please note: so we can deliver the hands-on exercises effectively there are a limited number of places available for day two (20 May) of this tutorial.
Please check the time zone and only register if you are able to attend.
If you register and are unable to attend please let us know as early as possible.