Practical BGP Security: Architecture, Techniques and Tools

Size: px
Start display at page:

Download "Practical BGP Security: Architecture, Techniques and Tools"

Transcription

1 renesys WHITE PAPER Practical BGP Security: Architecture, Techniques and Tools Laris Benkis A practical approach to identify weaknesses and highlight strategies for the detection of internetwork failures and defense of internetwork routing. Written for network engineers responsible for provisioning and protecting BGP, and for the IT manager who needs a technical overview of routing threats to the enterprise network.

2

3 At 12:48AM EST on the 14th of May 2003, the IP netblock /24 was announced to the via BGP through the service provider Verio s network from a small Florida ISP located in Boca Raton (1). This was peculiar because the block in question was registered to Northrop Grumman, a large US military contractor. Northrop Grumman has a very large IP network and its own autonomous system connected to the Sprint network. Therefore, anyone paying attention at the time might have concluded that something was amiss. Unfortunately for Northrop Grumman, no one was paying attention at least not until the spammers who had hijacked their IP block began using it to send . As a consequence the IP block was listed in the SpamHaus (2) and SPEWS (3) spam blacklists. The hijacking and spam continued until complaints to Northrop Grumman alerted them to the hijack; they then took steps to reclaim ownership of their block and some two months after the start of the incident, the announcements were blocked. Sadly, the Northrop Grumman hijack was not an exceptional occurrence. The technique utilized by the hijackers was one of several standard methods used by spammers. They first identified an IP block which had been allocated by ARIN but was either not in use or not being announced on the. They then took ownership of the block by re-registering the DNS domain identified in Whois as the contact point for the block owner. Being able to send and receive mail from this domain allowed them to prove ownership of the block and request their upstream service provider to carry their announcements. This incident highlights numerous security weaknesses existing in the processes and technologies used to operate the. This paper will not review these weaknesses, but rather focus on the aftermath something bad has happened to your network on the from a BGP routing perspective; how do you recognize and respond to it? Better yet, what can you do to prevent incidents like this from happening, or at least minimize their impact? This paper discusses some BGP routing operational and security best practices that help to minimize network problems that can occur and a tool to help recognize and respond to some of the issues. We will start with a discussion of internal network configuration, presenting a sample network to illustrate some best practices and the issues they are designed to mitigate, next talk about network failures and problems that are visible externally to a network, and then discuss a detection method for these problems, and finally we will touch on some aspects of how to respond to incidents. We will not provide specific router configurations, but rather discuss at a higher level what the routers should be configured to do. A familiarity with BGP routing concepts is assumed on the part of the reader. The paper is written from the perspective of a mid-to large-sized autonomous system (AS) that peers with one or more transit providers and one or more private peers essentially an edge AS which may also have some smaller customers that it provides transit to. The routing security issues of a large transit provider are different enough that are not discussed in detail here. A simplified diagram of the target network environment is shown in the following diagram. Private Peers Transit Peers Customers 1

4 BGP Routing Principles An edge autonomous system, in this case, is a routing security domain with a perimeter defined by its interfaces to its EBGP peers. The peers are classified as transit, private, or customer. A large part of the operational and security challenge posed by BGP is controlling the flow of information across this boundary transmitting only that which you want to send, and accepting only what you want to receive. The information sent and received, of course, is BGP routes, and what you will accept and what you will send is very much dependent on the class of peer. An essential step in building a BGP network is to have a clearly defined routing policy. The following two tables indicate what classes of routes are typically sent and received from each class of peer; this defines a very simple routing policy for note that this is an example only and the recommendations that follow may not apply in every situation and therefore should be adjusted as required. Table 1 Sent to EBGP Peers Your AS Transit Private Peer Customer Transit Peers Private Peers Customers 1 1 sent to a customer AS can vary significantly depending on requirements and the agreement with the customer Table 2 Received from EBGP Peers Martian Address Space Unallocated Address Space Your AS Transit Private Peer Customer Transit Peers Private Peers Customers Martian address space consists of blocks that have special meaning which precludes their use in the public. The generally accepted list of Martian blocks is given in Table 3 on the next page. This table does not, as a general rule, change; therefore a Martian filter can be configured on routers and then left alone. Unallocated address space consists of address blocks which IANA has not yet allocated to a Regional Registry. Maintenance of the unallocated list by is complicated by the fact that changes are not under the control of. The list is updated as IANA allocates new blocks and they are routed publicly. As IANA allocates blocks, announcements are made on various network operator forums to let the operator community know that a new allocation has been made and that the appropriate filters should be modified. An organization that tracks the unallocated address blocks very closely is Team Cymru (4). They provide a current copy of the list in a number of useful formats. As an aside, for those readers interested in learning about BGP security best practices, a thorough review of the material on the Team Cymru website would be time well spent, in particular the secure IOS and JUNOS router templates. 2

5 Table 3 Martian Address Space Netblock Note /8 Default route and special-use /8 Loopback block /24 Net-Test allocated to network testbeds /8 RFC 1918 Private address space /12 RFC 1918 Private address space /16 RFC 1918 Private address space /15 RFC 2544 Network Testing /16 DHCP autoconfiguration /4 Class D (Multicast) and Class E (not used) for address space allocated to should never be accepted from EBGP peers any announcement of routes from an external peer indicates a network hijack. External BGP routes have a very high priority in route selection on a router. If a route for hijacked netblock were accepted in, it could seriously disrupt communication within in addition to the disruption already caused externally. Keeping this list up-to-date is relatively easy since BGP changes have to be made if the netblocks announced by change, so the filter list can easily be updated at the same time. Implementing a routing policy has two fundamental components. that are received into the AS have to be classified appropriately (routes received by an AS come from EBGP peers or are locally generated), routes that are sent have to be selected. The best tool available in BGP to denote a classification and to make a selection is the community tag. A community tag is a large integer number with no intrinsic meaning (except for few well-known tags with pre-defined values) which is attached to a BGP route. The network designer configures the BGP speakers in the network to announce or not announce routes based on the meaning assigned to their attached tags. Once routes have been tagged appropriately controlling their announcement becomes much easier, and inadvertent leaks of routes becomes less likely. So, for the example, let s define four tags: YA, TR, PP, and CU for generated, transit, private peer, and customer routes respectively. Now assume that has two transit peers, one private peer and one customer. Received routes would be tagged as follows: Table 4 Accepted Route Tagging YA TR PP CU Generated Transit Peer 1 Transit Peer 2 Private Peer 1 Customer 1 3

6 3. Provision Route Practical BGP Security: Architecture, Techniques and Tools Given a policy definition (Table 1) and an appropriate tagging of routes (Table 4), determining which routes to send to each external peer is straightforward. However, advanced routing strategies, such as load balancing and failover precautions, can complicate this process. In the interest of focusing on overall policy, we will disregard these advanced strategies. The interesting questions arise when trying to implement the policy in Table 2; on receipt of routes, how do you decide what you will accept and what will be rejected? More specifically, what prefixes should I accept from the peer, and what AS paths? The answer to this question involves tradeoffs which essentially balance security and maintainability. The problem boils down to the fact that the more specific the filters applied to a peering session, the more quickly they become outdated and require reconfiguring which can become an issue for large numbers of peering sessions and for smaller operations teams with limited manpower. This quandary leads very naturally to a discussion about automating this process. Updating route filters has several distinct steps, each of which must be addressed by the automation process. The filter information must be retrieved from a repository of some sort. Based on the filter information, a filter-list must be generated using syntax appropriate for your particular brand of router. Finally, the generated filter must be installed on the routers. The repository that contains route information is called a route registry. There are a number of registries operating on the, the best known being RADb (5) and RIPE (6). ASes which register in the registry list the netblocks which they originate as well as their customer ASes; their customer ASes, in turn, should also register and provide their relevant information. An AS which peers with a registered AS can retrieve this data and construct prefix and AS path filters that can be applied to the peering session. The filters will only allow the prefixes and AS paths of the peer AS and its customers. A useful tool that can query a route registry for the necessary data and construct the appropriate filter expressions for a number of different router platforms is RtConfig, and is a part of the IRRToolSet maintained by Systems Consortium (7). RtConfig can be used to periodically generate the necessary filters. The filters can then be applied manually or via some automated process. Another tool for producing and maintaining configurations based on routing registry data is irrpt (8). Note that Team Cymru maintains filter objects fltr-martian, fltr-unallocated, and fltr-bogons (the combination of fltr-martian and fltrunallocated) in the RADb and RIPE registries. This allows the martian and unallocated space to automatically be updated if a registry is used as a source to generate the filter. The following diagram illustrates the sequence that is followed for a private peer of to announce the prefix v.w.x.y/zz. 2. Retrieve Prefix Information Route Registry 1. Register Prefix Filter 4. Announce prefix 5. Validate announcement with filter Prefix v.w.x.y/zz Private Peer The above scenario, where automated processes generate and update router configurations to ensure optimal security, is a highly recommended operating method. However, it suffers from two problems. The first is that many networks do not keep up-to-date routing policy information in any registry. It is therefore impossible to keep updated filter configurations for those networks in any automated fashion. The second problem is that it requires considerable initial work to set up, and someone with scripting skills to implement. Many smaller 4

7 operations with few peering sessions to manage, or operations that lack the necessary skills, will often forgo the security benefits because of the complexity and work involved. To encourage networks to implement some measure of security in their peering configurations, the following simplified solution is recommended which, while not quite as thorough as automatic generation, still provides protection from a variety of significant threats. Filter Martian address space. The Martian list doesn t change and thus requires no maintenance. Filter space Consider filtering unallocated space Filter peer AS and peer customer AS paths. For example, given a private peer with AS# who has a customer AS# 65002, the following AS path filter template is a nice way of implementing this. The template allows the peer and the peer s customer to prepend their AS as many times as they like in their announcements. Since the actual prefixes themselves are not filtered, this filter does not require any subsequent maintenance. permit ^(_65001)+$ permit ^(_65001)+(_65002)+$ Implement prefix limiting. Called maximum-prefix on Cisco IOS and prefix-limit on Juniper JUNOS, this sets a ceiling on the number of route announcements that will be accepted from a peer. If the limit is exceeded, the session is disabled. Since accepted prefixes are not being filtered explicitly, this provides a mechanism to abort a session if a peer decides to re-advertise the full routing table as originated by itself. (Unlikely as it may seem, this has happened; see the recent Renesys presentation regarding the massive leak by Turkish Telecom [9]. Also, perusing the results of a Google search on AS7007 makes for an interesting read). The setting of the prefix limit should be based on how many prefixes the peer needs to announce. A generous margin of 50% above the current total allows room for growth while still providing protection from catastrophe. The above recommendation provides a low-maintenance configuration with reasonably robust security. Purists will not be impressed, but if all operators implemented at least this level of filtering, the autonomous system operational standards bar would be raised significantly. Failure Modes Let s now turn our attention to what can happen to from the perspective of the. The question of perspective is very important here what you see depends on where you are looking from. will announce a number of routes and the expectation is that all ASes on the will have visibility of these routes. While the reasons why this expectation may not be met are endless, the failure modes in terms of how route visibility does not meet this expectation can be summarized by a few distinct cases: 1. is not announcing all the routes that it should. This can result in parts of being unreachable from the or, if a covering aggregate exists for the missing prefix, traffic may be entering by a different path than was planned. Recall that morespecific prefixes are preferred by the BGP route selection process. This may overload circuits and impact costs by shifting traffic unexpectedly between transit providers. An example on the next page illustrates this. has a large server farm addressed in the /24 address block. This block is announced on an OC48 peering link. The rest of encompasses the entire /8 block, which is served by an OC3 peering link. If for some reason the /24 announcement is blocked, all the traffic to the server farm will follow the /8 announcement and potentially saturate the OC3 connection. Although the example is simplistic and contrived, it illustrates the point that announcement failures that may not be visible internally can cause unexpected and potentially serious traffic shifts. 5

8 Lots of Traffic OC /8 OC48 Server Farm In / /24 2. is announcing more routes than it should. This can indicate a configuration error in, or it may be leaking private peer routes unintentionally. In this example private peers with some other AS and accidentally leaks the peer s prefix. In this example the private peer transit link is an OC48 while only has an OC3. peers via a DS3. The extra traffic drawn by the leaked prefix will potentially saturate the private peering link and the transit link. OC /8 Private Peer AS OC3 Lots of Traffic 3. routes are resulting in traffic on unintended paths. This can indicate a configuration problem in which you are announcing certain routes to transit providers which you did not intend to. It could also indicate that a private peer or a customer is leaking routes to their transit provider. This example is the reverse of the previous. In this case your private peer is leaking your prefixes and drawing unintended traffic. Resulting link saturation will impact both the private peer s customers, the customers in the leaked prefix, and the customers accessing the Private Peer network. Lots of Traffic OC3 Private Peer AS OC /8 6

9 4. Some portion of the cannot see some or all of routes. This can be indicative of a failure at some point on a remote AS, where such a failure could be a malfunction or a configuration issue. This example is very common. Somewhere on the, a failure occurs. The failure is in some AS on which other ASes depend to reach, therefore is unreachable for some portion of the. The rest of the Very Important AS /8 5. routes are visible originating from some AS other than. This indicates a network hijack. Intentionally or unintentionally, another network is announcing routes. This failure mode describes what happened to Northrop Grumman. The effects can vary depending on the network block that is hijacked. In the Northrop Grumman case, an inactive block was used and consequently Northrop Grumman was blacklisted. If the hijacker were to announce a block that is actively in use in, communications from to the originating within that block could be partially or totally disrupted. If does not filter its own address space on announcements received from its transit provider, communication within could also be disrupted / /8 HijackingAS The final case is not, strictly speaking, an issue of visibility of routes: 6. autonomous system number is announced by some other network. Since it is not possible to know that the false announcement is actually a separate network, to the this would appear that has some other transit peering other than the legitimate ones, and may be announcing prefixes which are not part of the assigned address space. From a detection perspective, this then becomes a special case of failure mode #3 and possibly #2. 7

10 Depending on the routes announced by the hijacker, the impact on will vary. If address space is announced, then the impact is similar to that of case 5. If routes outside of address space are announced then there would be no disruption to operation. However, any actions taken by the hijacker would then be attributed to and reputation will suffer accordingly. AS #XXX AS #XXX HijackingAS The total number of distinct failure modes is not that large. The difficulty is that detecting these kinds of failures from the perspective of can be very difficult. Many networks have no external visibility of their status and simply rely on customer complaints to alert them to problems. While it doesn t require any financial outlay, this approach has the disadvantage of not providing complete coverage of all the failure modes; moreover, customer dissatisfaction can prove costly to the network operator in the long run. An alternate approach, a service called GRADUS offered by Renesys Corporation, provides a cost-effective means of detecting occurrences of these error conditions in real-time, allowing an operator to react quickly to correct them before customers are impacted. In many cases the failures causing traffic shifts are caused by network maintenance or changes performed during change windows when the network is operating at a low utilization; these traffic shifts may not be sufficient to saturate circuits at the time, and therefore if they can be detected immediately they can be corrected with no customer impact. GRADUS GRADUS is a real-time BGP monitoring system, connected (at the time of writing) to 100 BGP peers in autonomous systems scattered around the globe. The peers provide Renesys a comprehensive real-time view of the global routing tables. A GRADUS customer installs a Java client on a workstation in their network which connects to Renesys via a secure HTTPS connection. If GRADUS detects any of the alarm cases described previously for prefixes that the customer specifies, the client will generate a visible alarm and optionally send an SNMP trap to a network management station (NMS) and an notification to a list of target addresses. Renesys Peer GRADUS Client Renesys Peer Renesys/GRADUS Renesys Peer Renesys Peer NMS Route Announcement Renesys Peer Gradus Notification SNMP Trap Notification 8

11 The diversity of the GRADUS peers provides a comprehensive view of how the sees, and the alarms alert a network operator the instant a significant event happens. This provides continuous real-time verification of the correctness of the BGP routing design and external surveillance for problems not visible to. In the case of Northrop Grumman, with GRADUS they would have known within seconds of the event that their netblock had been hijacked. Fast action then could have prevented any significant amount of spam from being released into the, and their being blacklisted. In addition to its monitoring capability, GRADUS has an archive of all BGP announcements it has received since January of The Java client allows this database to be queried, making it a powerful tool to debug network problems, analyze failures, evaluate potential transit providers, conduct forensic network investigations, and a host of other network analysis tasks. The data is displayed graphically, and as a raw listing of BGP announcements. The preceding image shows a depiction in GRADUS of the Northrop Grumman hijack. Each horizontal line represents a different GRADUS peer, a green mark indicates a route change with no loss on connectivity, and a red mark indicates a loss of connectivity. The raw announcement and withdrawal data provide much more detailed information. We can see that all peers first received an announcement for the route at 12:48AM on the 14th of May, the AS path from each peer to the origin AS of the netblock, and all the AS path perturbations that occurred at each peer until the route was finally withdrawn. If we were investigating the incident, the data from peer TS would certainly be interesting, as this peer kept seeing routes to the netblock until the 18th of July, while it was withdrawn from all other peers on the 26th of June. This is an example of the benefit provided by the diversity of perspective that GRADUS offers; a cursory look from an looking glass or route server would probably not have revealed that after the 26th of June the route was still active. 9

12 normal route to Yahoo SCD via Yahoo US backbone AS / Yahoo! / AS for DataOne (Malaysia) 4788 TMnet, Telekom Malaysia 4436 Santa Cruz Community (scruz-net) WV FIBER LLC 3491 CAIS 5511 France Telecom 1239 Sprint Ex3 gradus://3fa1b5afe5e43bf0 hijacked routes originate in DataOne Malaysia (AS 10111) In the Northrop Grumman case, an unused prefix was hijacked. Hijackings of announced, in-use prefixes (and more specifics of those same prefixes) has also occurred many times on the. This is ocassionally a mistake caused by someone misconfiguring a prefix in a router. It may also be malicious, where someone tries to redirect or block legitimate traffic to another s networks. The following image shows the GRADUS graphical depiction of the hijacking, in May, 2004, of Yahoo! s Santa Clara datacenter prefix. The same two prefixes, /20 and /24, are shown being originated by both Yahoo! (AS26101) and DataOne from Malasia (AS10111). The diversity of peers of the GRADUS system allows accurate detection of such an event anywhere in the world. The graphical interfaces makes it easy to diagnose such an event. Incident Response Thus far we have discussed some best practices that can be applied to the building of a BGP network, some things that can go wrong, and how you can recognize that they have gone wrong. To round out the discussion, we will review briefly what you can do if you discover a problem similar to those described here. The first question that you need to answer is, From where is the problem originating? If the source of the problem is, then correcting it is a matter within your control and standard troubleshooting methods apply. If, however, the problem is external to, then there are no local corrective measures that you can apply to solve the problem. In this case, after using a tool such as GRADUS to identify the source AS of the problem, the best course of action is to contact the NOC of the AS to alert them to the situation. It may seem self-evident, but it is worth mentioning nonetheless, that most network operators provide a contact and phone number. However, getting through to a knowledgeable operator may not always be easy. One way to get directly to the operations centers of many network operators is the INOC-DBA Hotline Phone system (10). INOC-DBA (Inter-NOC Dial-By-ASN) is a closed VoIP network running on the using SIP phones. Dialing an ASN with an optional 3-digit extension will ring a phone in the NOC at the AS if the network in question is part of the system. Accounts on INOC-DBA are free. 10

13 Conclusion This paper has suggested some of the guidelines that a network operator should follow in the design of a BGP network to simplify the implementation of routing policies. We then discussed the types of failures a network is subject to which are visible on the but not readily apparent within the AS. We then reviewed how the GRADUS tool can help to detect and respond to these kinds of problems. Laris Benkis is an internetworking consultant based in Montreal, Canada. He can be reached at [email protected]. References (1) (2) Spamhaus SBL (3) (4) (5) (6) (7) (8) (9) (10) 11

14 renesys CORPORATE HEADQUARTERS 1750 Elm Street Suite 101 Manchester, NH T F [email protected] 2005 Renesys Corporation. All rights reserved. Renesys and GRADUS are trademarks of Renesys Corporation.

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith [email protected] RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543) BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE

More information

Simple Multihoming. ISP/IXP Workshops

Simple Multihoming. ISP/IXP Workshops Simple Multihoming ISP/IXP Workshops 1 Why Multihome? Redundancy One connection to internet means the network is dependent on: Local router (configuration, software, hardware) WAN media (physical failure,

More information

BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA

BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA. Gaurab Raj Upadhaya [email protected] Packet Clearing House What are Best Practices Established or

More information

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected]

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected] ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS

More information

JUNOS Secure BGP Template

JUNOS Secure BGP Template JUNOS Secure BGP Template Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 04/25/2001 Contents Credits... 2 Introduction... 2 Template... 4 References... 10 Credits Rob Thomas

More information

Detecting BGP hijacks in 2014

Detecting BGP hijacks in 2014 Detecting BGP hijacks in 2014 Guillaume Valadon & Nicolas Vivet Agence nationale de la sécurité des systèmes d information http://www.ssi.gouv.fr/en NSC - November 21th, 2014 ANSSI - Detecting BGP hijacks

More information

ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.

ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc. ISP Case Study UUNET UK (1997) ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Acknowledgements Thanks are due to UUNET UK for allowing the use of their configuration information and network

More information

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach

More information

Intelligent Routing Platform White Paper

Intelligent Routing Platform White Paper White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5

More information

ETHEL THE AARDVARK GOES BGP ROUTING

ETHEL THE AARDVARK GOES BGP ROUTING Fable Of Contents ISP TECH TALK by Avi Freedman ETHEL THE AARDVARK GOES BGP ROUTING In this exciting column we'll actually walk through configuring a Cisco router for BGP. It's very important, however,

More information

Simple Multihoming. ISP Workshops. Last updated 30 th March 2015

Simple Multihoming. ISP Workshops. Last updated 30 th March 2015 Simple Multihoming ISP Workshops Last updated 30 th March 2015 1 Why Multihome? p Redundancy n One connection to internet means the network is dependent on: p Local router (configuration, software, hardware)

More information

Application Note: Securing BGP on Juniper Routers

Application Note: Securing BGP on Juniper Routers Application Note: Securing BGP on Juniper Routers Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 06/16/2002 Contents Introduction Introduction... 2 Assumptions... 3 Topology...

More information

BGP Routing. Course Description. Students Will Learn. Target Audience. Hands-On

BGP Routing. Course Description. Students Will Learn. Target Audience. Hands-On Hands-On Course Description This Hands-On course on (Border Gateway Protocol), from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and

More information

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers

More information

Module 12 Multihoming to the Same ISP

Module 12 Multihoming to the Same ISP Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will

More information

BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <[email protected]>, <[email protected]>

BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <maz@telecom-isac.jp>, <maz@iij.ad.jp> BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

Troubleshooting Network Performance with Alpine

Troubleshooting Network Performance with Alpine Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.

More information

Outline. Outline. Outline

Outline. Outline. Outline Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather

More information

APNIC elearning: BGP Attributes

APNIC elearning: BGP Attributes APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0 erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes

More information

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013 Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing

More information

Cost Savings Analysis of IP Address Management (IPAM) Software for Service Providers

Cost Savings Analysis of IP Address Management (IPAM) Software for Service Providers Cost Savings Analysis of IP Address Management (IPAM) Software for Service Providers A white paper by Incognito Software March, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 8 Cost Savings

More information

BGP Multihoming Techniques

BGP Multihoming Techniques BGP Multihoming Techniques Philip Smith 26th July - 4th August 2006 Karachi 1 Presentation Slides Available on ftp://ftp-eng.cisco.com /pfs/seminars/sanog8-multihoming.pdf And on the SANOG8

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not

More information

BGP Multihoming Techniques

BGP Multihoming Techniques BGP Multihoming Techniques Philip Smith SANOG 12 6th-14th August 2008 Kathmandu 1 Presentation Slides Available on ftp://ftp-eng.cisco.com /pfs/seminars/sanog12-multihoming.pdf And on the

More information

Advanced BGP Policy. Advanced Topics

Advanced BGP Policy. Advanced Topics Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility

More information

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING 20 APRIL 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to

More information

Address Scheme Planning for an ISP backbone Network

Address Scheme Planning for an ISP backbone Network Address Scheme Planning for an ISP backbone Network Philip Smith Consulting Engineering, Office of the CTO Version 0.1 (draft) LIST OF FIGURES 2 INTRODUCTION 3 BACKGROUND 3 BUSINESS MODEL 3 ADDRESS PLAN

More information

Email Reputation Metrics Troubleshooter. Share it!

Email Reputation Metrics Troubleshooter. Share it! Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,

More information

INOC-DBA. Hotline Phone System. aka. The AS Number Phone SANOG 7. Gaurab Raj Upadhaya INOC-DBA Operator, Packet Clearing House operator@pch.

INOC-DBA. Hotline Phone System. aka. The AS Number Phone SANOG 7. Gaurab Raj Upadhaya INOC-DBA Operator, Packet Clearing House operator@pch. INOC-DBA Hotline Phone System aka. The AS Number Phone SANOG 7 Gaurab Raj Upadhaya INOC-DBA Operator, Packet Clearing House [email protected] What s it About? INOC-DBA: Inter-NOC Dial-by-ASN Global Voice-over-IP

More information

Service Description DDoS Mitigation Service

Service Description DDoS Mitigation Service Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3

More information

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

CA Spectrum MPLS-VPN Manager

CA Spectrum MPLS-VPN Manager CA Spectrum MPLS-VPN Manager User Guide Release 9.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001

Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual routing is a software design method used to provide multiple independent routers that share

More information

BGP Multihoming Techniques. Philip Smith <[email protected]> APRICOT 2013 Singapore 19 th February 1 st March 2013

BGP Multihoming Techniques. Philip Smith <philip@apnic.net> APRICOT 2013 Singapore 19 th February 1 st March 2013 BGP Multihoming Techniques Philip Smith APRICOT 2013 Singapore 19 th February 1 st March 2013 Presentation Slides p Will be available on n http://thyme.apnic.net/ftp/seminars/ APRICOT2013-Multihoming.pdf

More information

THE VALUE OF NETWORK MONITORING

THE VALUE OF NETWORK MONITORING THE VALUE OF NETWORK MONITORING Why It s Essential to Know Your Network Sponsored by Ipswitch I. Introduction All companies are different, but the value of their network to their business varies little.

More information

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery

More information

Demystifying BGP: By Jeffrey Papen Thursday, May 15th, 2003

Demystifying BGP: By Jeffrey Papen Thursday, May 15th, 2003 Demystifying BGP: All across the Internet, the Border Gateway Protocol, or BGP, is used to direct network traffic from one site to another. Here's a look at how BGP works. By Jeffrey Papen Thursday, May

More information

Understanding Route Redistribution & Filtering

Understanding Route Redistribution & Filtering Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......

More information

Cisco Security Intelligence Operations

Cisco Security Intelligence Operations Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,

More information

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,

More information

BT Internet Connect Global - Annex to the General Service Schedule

BT Internet Connect Global - Annex to the General Service Schedule 1. Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the General Services Schedule. ARP means Address Resolution Protocol. Border Gateway Protocol

More information

INOC-DBA Hotline Phone System

INOC-DBA Hotline Phone System INOC-DBA Hotline Phone System RIPE 49 BoF Presentation edited after the BoF to reflect key discussions September 2004 Gaurab Raj Upadhaya [email protected] INOC-DBA Operator, Packet Clearing House What

More information

DDoS attacks in CESNET2

DDoS attacks in CESNET2 DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

White Paper. Managing Risk to Sensitive Data with SecureSphere

White Paper. Managing Risk to Sensitive Data with SecureSphere Managing Risk to Sensitive Data with SecureSphere White Paper Sensitive information is typically scattered across heterogeneous systems throughout various physical locations around the globe. The rate

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory. : Real-time Inter-network Defense Against Denial of Service Attacks Kathleen M. Moriarty 22 October 2002 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations,

More information

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad

More information

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

Extending Network Visibility by Leveraging NetFlow and sflow Technologies Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks

More information

How To Create An Intelligent Infrastructure Solution

How To Create An Intelligent Infrastructure Solution SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

Know Your Foe. Threat Infrastructure Analysis Pitfalls

Know Your Foe. Threat Infrastructure Analysis Pitfalls Know Your Foe Threat Infrastructure Analysis Pitfalls Who Are We? Founders of PassiveTotal Analysts/researchers with 10+ years of collective experience Interested in Better UX/UI for security systems Improving/re-thinking

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

REMOTE MONITORING MATRIX

REMOTE MONITORING MATRIX 802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best

More information

Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka

Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka Tim Evens ([email protected]) NANOG-65 Traditional Method: VTY (cli/netconf/xml) Data is polled instead of pushed (not real-time) Large queries

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

Best Practices for Eliminating Risk from Routing Changes

Best Practices for Eliminating Risk from Routing Changes Best Practices for Eliminating Risk from Routing Changes TECHNICAL BRIEF Table of Contents Introduction 3 Route Analytics Intelligence to Meet the Routing Management Challenge 3 Routing Management Best

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

Hunting down a DDOS attack

Hunting down a DDOS attack 2006-10-23 1 Hunting down a DDOS attack By Lars Axeland +46 70 5291530 [email protected] 2006-10-23 What we have seen so far What can an operator do to achieve core security What solution can

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Approaches for DDoS an ISP Perspective. [email protected] [email protected]

Approaches for DDoS an ISP Perspective. barry@null0.net ognian.mitev@viawest.com Approaches for DDoS an ISP Perspective [email protected] [email protected] Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not

More information

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone 3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement

More information

Basic Email Funneling MX Verify and Redundancy. Why E-Mail Sorting Solutions? Why Vircom?

Basic Email Funneling MX Verify and Redundancy. Why E-Mail Sorting Solutions? Why Vircom? Basic Email Funneling MX Verify and Redundancy Why E-Mail Sorting Solutions? Why Vircom? Why? Focused on Managed Messaging SaaS Security Systems Own Superior-Architected Infrastructure DATACENTERS: Carrier-class

More information

Data Loss Prevention Program

Data Loss Prevention Program Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional

More information

LHCONE Site Connections

LHCONE Site Connections LHCONE Site Connections Michael O Connor [email protected] ESnet Network Engineering Asia Tier Center Forum on Networking Daejeon, South Korea September 23, 2015 Outline Introduction ESnet LHCONE Traffic Volumes

More information

Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP) Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,

More information

How Cisco IT Protects Against Distributed Denial of Service Attacks

How Cisco IT Protects Against Distributed Denial of Service Attacks How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN

More information

The Case for Source Address Routing in Multihoming Sites

The Case for Source Address Routing in Multihoming Sites The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.

More information

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI WHITEPAPER Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI About PCI DSS Compliance The widespread use of debit and credit cards in retail transactions demands

More information

Southwest Arkansas Telephone Cooperative Network Management Practices

Southwest Arkansas Telephone Cooperative Network Management Practices Southwest Arkansas Telephone Cooperative Network Management Practices Page 1 of 11 Release Date 05/18/15 INTRODUCTION... 3 CORE NETWORK OVERVIEW... 3 DISTRIBUTION NETWORK OVERVIEW... 3 ACCESS NETWORK OVERVIEW...

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides

More information

White Paper. Complementing or Migrating MPLS Networks

White Paper. Complementing or Migrating MPLS Networks White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating

More information