VirtIX. Virtual Internet Exchange. IPredator et al. virtix.st



Similar documents
Introduction to The Internet

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Introduction to The Internet. ISP/IXP Workshops

Exterior Gateway Protocols (BGP)

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Computer Networking Networks

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Border Gateway Protocol Best Practices

G-Lab: A Future Generation Internet Research Platform

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

DE-CIX Premium Internet Exchange Services

Making the Internet fast, reliable and secure. DE-CIX Customer Summit Steven Schecter <schecter@akamai.com>

The Role IXPs and Peering Play in the Evolution of the Internet

Examination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

Vytautas Valancius, Nick Feamster, Akihiro Nakao, and Jennifer Rexford

IXP Member connection Best Practice. Kittinan Sriprasert BKNIX

Peering in Hong Kong. Che-Hoo CHENG CUHK/HKIX

State of Texas. TEX-AN Next Generation. NNI Plan

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

BGP. 1. Internet Routing

Internetworking and Internet-1. Global Addresses

Datawire Secure Transport Value Proposition

our darknet and its bright spots building connections for spaces and people

The Value of Content Distribution Networks Mike Axelrod, Google Google Public

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

Internet Protocol: IP packet headers. vendredi 18 octobre 13

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

@Home Cable Deployment Experiences or

Design and Implementation Guide. Apple iphone Compatibility

F5 Silverline DDoS Protection Onboarding: Technical Note

Fireware How To Dynamic Routing

How To Connect To Telx Dia (Dia) For Free

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Introduction to Routing

A Network Design Primer

IT Networking and Security

Address Scheme Planning for an ISP backbone Network

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

Global Network Mobility NANOG 31

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

Copyright 2008 Link Technologies,Inc. A Proud Vendor Member of the

Router and Routing Basics

Introduction. Internet Address Depletion and CIDR. Introduction. Introduction

Redundancy & the Netnod Internet Exchange Points

A Complex Network Structure Design for Load Balancing and Redundant

How To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip

VLSM and CIDR Malin Bornhager Halmstad University

VPN. Date: 4/15/2004 By: Heena Patel

Facility Usage Scenarios

Simplify Your Route to the Internet:

Introduction Chapter 1. Uses of Computer Networks

SwiftStack Global Cluster Deployment Guide

Advanced BGP Policy. Advanced Topics

Enterprise Network Simulation Using MPLS- BGP

Know Your Foe. Threat Infrastructure Analysis Pitfalls

(Refer Slide Time: 02:17)

Multi Protocol Label Switching (MPLS) is a core networking technology that

Global IP Network Mobility

IT 3202 Internet Working (New)

Secured Voice over VPN Tunnel and QoS. Feature Paper

SEC , Cisco Systems, Inc. All rights reserved.

Microsoft Azure Configuration

Networking Technology Online Course Outline

Network Working Group Request for Comments: March 1999

IP Routing Configuring RIP, OSPF, BGP, and PBR

Virtual Privacy vs. Real Security

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Scaling 10Gb/s Clustering at Wire-Speed

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

Approaches for DDoS an ISP Perspective.

Configuring a VPN for Dynamic IP Address Connections

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

Demonstrating the high performance and feature richness of the compact MX Series

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

National Education Network. KAREN School Cluster High-level Design

Introduction. Technology background

November Defining the Value of MPLS VPNs

RFC 2547bis: BGP/MPLS VPN Fundamentals

BGP as an IGP for Carrier/Enterprise Networks

Introduction to LAN/WAN. Network Layer (part II)

2012 Best Practice Seminar. Presented by David Rawle

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Cloud Security Best Practices

Designing Cisco Network Service Architectures ARCH v2.1; 5 Days, Instructor-led

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

Teridion. Rethinking Network Performance. The Internet. Lightning Fast. Technical White Paper July,

Microsoft Azure ExpressRoute

BGP (Border Gateway Protocol)

Visualizing Traffic on Network Topology

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

Transcription:

Virtual Internet Exchange virtix.st

Introducing the Virtual Internet Exchange Managerial summary What is the? The idea of is to build an ISP-level VPN provider for Tier 3 and to allow peering at a Virtual Internet Exchange using common BGP

Introducing the Virtual Internet Exchange Managerial summary What does the ISP-level VPN provider solve? Tier 1 and Tier 2 providers are in bed with the government, and betray the general trust model the internet was built on The enables Tier 3 ISPs to encrypt traffic exchanged with other ISPs, to peer independently of geographical location, and to keep traffic private from Tier 1 and 2... and anyone else tapped in

Why Virtual? Why an encrypted Internet Exchange? Overcoming geographical restrictions Currently peerings are subject to geographical location limiting the direct peering between Tier 3 providers Most countries do not have regulation for ISP peerings, providing room for creativity in times of dire need Virtual encrypted circuits allow for peering with one another without the need of being in the same location it allows for more direct, closer exchange of traffic

Why Virtual? Why an encrypted Internet Exchange? Encryption on Layer 3 and 4 vs upper layers So far, cryptography is only considered in the upper layers of the OSI model which poses a few problems Scaling Privacy considerations regarding meta data Professionalism and ethics

Why Virtual? Why an encrypted Internet Exchange? Scaling problems Does not really scale right we are leaving encryption only up host to host communications In a world of servers, computers and laptops, smart phones, tablets, and networked fridges a gazillion hosts are supposed to securely encrypt traffic between each other, All, while the 47k networks providing for all that traffic have basically not implemented any encryption at all

Why Virtual? Why an encrypted Internet Exchange? Meta data and the flow of the internet As we have no concept of encrypting traffic on the backbone level we leave the very flow of the internet exposed The flow is what all this Meta data fuzz is about, our social graphs To understand the flow is to defeat anonymity, especially for the general public

Why Virtual? Why an encrypted Internet Exchange? Question of professionalism Taking care of the privacy of the flow should be considered due diligence for ISPs in a post-snowden world We should be as ambitious when it comes to defend from illegitimate spying, by someone preying on our networks, infrastructure and integrity, just as we are about optimizing our networks for speed and reliability We seem to be trapped and helpless in this world of NSA and GCHQ and wiretapping submarines but we must not be It is time we start using some unconventional strategies and push back

Why Virtual? Why an encrypted Internet Exchange? We 3 infrastructure As a Tier 3 provider feeling responsible for users as well as infrastructure, we want to break free from the upper tiers and see if we can create an oasis of free and protected exchange for other smaller ISPs

Why Virtual? Why an encrypted Internet Exchange? Our thesis It is possible to build a public BGP overlay network for Tier 3 providers for research purposes The negative effects of the overlay network can be managed It won t break the internet. We are past the BGP year2k ; 512k+ IPv4 routing table entries already happened The success of any such endeavor will depend on its tooling the ability to integrate a session to the into existing BGP peering infrastructure It needs to be compatible with the workflow at your average AS out there

Statistics What does the live internet look like? Some statistics To see if we could backup our feeling we ran some statistics on our BGP routing table trying to see how networks on the internet are distributed Are there enough small ISPs at all? Is there a use-case for interconnecting plenty of small ISPs? Our routine to find out: grab full table BGP feed merge redundantly announced prefixes sort network sizes into CIDR classes run some statistics

Statistics

Statistics

Terms and conditions What we want Ingredients You need to be your own Autonomous System (AS) You need to bring public IP space to the exchange You need to connect via OpenVPN to the exchange

Terms and conditions What we want OpenVPN setup OpenVPN topology subnet mode Scales well horizontally by adding more servers OpenVPN as it is the most trusted VPN protocol even with OpenSSL et al

Routing Terms and conditions What we want Requires multihop BGP sessions by default to allow extension with additional address space Redundant route reflector setup default deny reverse top-talker list, enable peering starting with lowest traffic peers for IPv4 IPv6 should not be an issue at all

Issues Terms and conditions What we want Scalability, higher latencies, reduced performance Route fragmentation, TCAM issues in widely used devices General net quality, shitty asymmetric routing Default setup susceptible to DDOS might be worth to blacklist IX networks for rest of the internet Traffic cost needs to be for free to get a sizable test crowd Needs more than one instance lets fragment BGP :P

Terms and conditions What we want Where to take it from here We have an AS to use, around 40Gbits of bandwidth, a trusted location and can provide power and VPN connectivity We need feedback, contact to parties interested in testing, etc pp