Alex Band · @alexband
499 followers · 205 posts · Server hachyderm.io

As announced at , the RIPE NCC Publication Service is now in production and proving quite popular. 167 CAs are now active, publishing 2100 ROAs, resulting in 3671 VRPs. It’s easy to set this up, and will allow you to sub-delegate resources, do , as well as . blog.nlnetlabs.nl/running-kril

#ripe86 #rpki #aspa #bgpsec

Last updated 1 year ago

Alex Band · @alexband
499 followers · 204 posts · Server hachyderm.io

Let’s kick off the routing working group with some numbers. In the global RPKI there are 149,606 ROAs resulting in 433,197 VRPs. Also, 3 router keys and 64 objects out in the wild.

#ripe86 #bgp #rpki #bgpsec #aspa

Last updated 1 year ago

NLnet Labs · @nlnetlabs
1710 followers · 615 posts · Server fosstodon.org

Perfectly timed for all the discussions at , we’re proud to launch Krill 0.13. This release introduces production grade support in addition to . It also adds a full Trust Anchor support, enabling RIRs to run Krill as their root CA solution. github.com/NLnetLabs/krill/rel

#routingsecurity #ripe86 #aspa #bgpsec #rpki

Last updated 1 year ago

NLnet Labs · @nlnetlabs
1710 followers · 614 posts · Server fosstodon.org

Nearly 20,000 certificates have been issued, and the RPKI publication service is in production. This means you have all the advantages of running Krill - including and support - and publish at the RIPE NCC.

#rpki #aspa #bgpsec #ripe86

Last updated 1 year ago

NLnet Labs · @nlnetlabs
1709 followers · 609 posts · Server fosstodon.org

Our team will be available at as well:
🛰️ Excited by our modular toolkit Rotonda? It's written in too, making it insanely fast while providing . Talk to @jasper, Luuk or Ximon about our imminent launch.
🦐 Meanwhile, we’ve been cooking up support to compliment in Krill, our CA software. Tim can tell you all about it, along with our future plans.

#bgp #routing #ripe86 #opensource #rustlang #memorysafety #aspa #bgpsec #rpki

Last updated 1 year ago

Stéphane Bortzmeyer · @bortzmeyer
6729 followers · 75548 posts · Server mastodon.gougere.fr

Now, Ignas Bagdonas benchmarks performance. On his lab setup, it is awfully slow.

Interesting explanations about software optimisation. BGPsec uses SHA-2 (hard for memory, cool for the CPU) and ECDSA (the opposite): do them in parallel (but the BGPsec format of data does not make it easy).

#bgpsec #RIPE84 #bgp

Last updated 3 years ago

Stéphane Bortzmeyer · @bortzmeyer
6703 followers · 75534 posts · Server mastodon.gougere.fr

The conclusion is pessimistic: is too expensive for the routers (layout of the data is not optimized, too many shuffles necessary).

Interesting discussion about protocol design: should protocols take into account the specifics of today's machines (some machines, actually)? Protocols live longer than machines...

#bgpsec #ietf

Last updated 3 years ago

Stéphane Bortzmeyer · @bortzmeyer
6703 followers · 75534 posts · Server mastodon.gougere.fr

Next, scalability: what if everyone (and his cat) started to use BGPsec? Are we all going to die? Can routers do SHA-2 (fast but touches memory) and P-256 (slow but does not touch memory) quickly enough?

#bgpsec #ietf

Last updated 3 years ago