RPKI at the UAE-IX route servers
In 2019, UAE-IX deployed RPKI at the UAE-IX route servers in order to increase the security of the Internet routing system and support the adoption of RPKI. The adoption was essential to Internet security, and the benefits were visible from day one for all peers and their customers.
As the combination of RPKI and Blackholing might increase the operational burden, three implementation options were discussed. Option 3 was selected: Strict RPKI origin validation filtering for non-Blackholes and loose RPKI origin validation filtering on Blackholes.
In the following, you will find some basic information about RPKI and its deployment at UAE-IX. If you have any questions, please do not hesitate to contact us.
General RPKI FAQ
RPKI is useful to prove that a given IP prefix is really yours. For that, you get a certificate which is signed by the entity handing out that prefix to you (RIPE, ARIN, or your regional Internet registry). With this signed certificate, you can prove to a third party like DE-CIX that a prefix is really yours and that you legitimately announce it to our route servers.
ROA means Route Origin Authorization. An ROA connects a prefix and an originating Autonomous System. It also states if the prefix must be announced as a whole or if sub-announcements are allowed.
For example:
Origin AS: 64496
Prefixes: 192.0.2.0/24 (max length /24)
198.51.100.0/24 (max length /24)
203.0.113.0/24 (max length /32)
RPKI validation means that a validator (a piece of software) checks existing ROAs. A router (e.g. the UAE-IX route servers) queries this validator, and as a result, three values are possible:
- Valid: There is an ROA and it covers the BGP announcement (originator AS, prefix, and prefix length are covered by an ROA). This is the best case.
- Invalid: There is an ROA for this prefix, but either for a different originator AS or the prefix length does not match. These prefixes will be filtered out by UAE-IX route servers.
- NotFound/Unknown: There is no ROA for this prefix. UAE-IX route servers will distribute them if they can be successfully verified against IRRDB data.
Please note: This example is based on the RIPE region. Other RIRs provide similar tools.
To create ROAs, please have a look at the RPKI Dashboard in the LIR Portal.
RIPE will show you prefixes that originate from your ASN(s) with the help of their route collectors. You just have to select the prefix you want to create a ROA for.
If your announcement is currently not found in BGP, use the Route Origin Authorisations (ROAs) tab and create the ROA manually.
More on RPKI at other RIRs:
RPKI deployment at DE-CIX FAQ
No. We want to provide a high level of basic routing security on the UAE-IX route servers.
No. However, if you have RPKI ROAs configured then your announcements of prefixes must be covered by these ROAs. If these announcements of prefixes are not covered by your ROAs, the UAE-IX route servers will filter out these prefixes; this means, the UAE-IX route servers will not re-distribute those prefixes to other UAE-IX peers.
No, your router does not need to support RPKI. The validation will take place at the UAE-IX route servers. But if you want to filter yourself based on RPKI on your direct peerings with other customers, your router will need to support it of course.
Then the RPKI validation status is NotFound/Unkown, and the UAE-IX route servers will accept your prefix only if the IRRDB fallback check succeeds.
With the addition of RPKI validation to our IRRDB filters, an incoming route is validated as follows*:
1) Origin ASN needs to be in customer cone (IRRDB filter 1/2)
2) Is the route a Blackhole?
- If no, the route undergoes strict RPKI validation filtering (both origin and maxLength):
- if the result is RPKI Valid, the route is accepted
- if the result is RPKI Invalid, the route is rejected
- if the result is RPKI NotFound/Unknown, the route is checked against IRRDB filter 2/2 and might get accepted or rejected depending on the result
- If yes, the route undergoes "loose" RPKI validation filtering (origin only):
- if the result is RPKI Valid, the route is accepted
- if the result is RPKI Invalid, the route is rejected
- if the result is RPKI NotFound/Unknown, the route is checked against IRRDB filter 2/2 and might get accepted or rejected depending on the result
*Please see the diagram for more information. Please note: The diagram does not contain basic route hygiene, e.g. rejecting bogons
We only perform loose RPKI validation on Blackholes. That means that we honor the origin ASN attribute of the ROA but ignore the maxLength attribute. We will allow a maxLength value of /32 for IPv4 and /128 for IPv6. For conventional routes, both ROA attributes are honored.
Yes, you can see both in the UAE-IX Looking Glass. Search for your prefixes in the global search, and you will get all routes (accepted and filtered).
There is also a little icon to the left of the route indicating the validation status:
- Green: RPKI Valid (route got accepted)
- Blue: RPKI NotFound/Unknown (route got accepted because IRRDB fallback succeeded)
- Red: RPKI Invalid (route got rejected)