#RoutingSecurity

2025-05-13

Today we are very proud to announce the new Internet Pollution Index, a new tracker that visualizes global cyber threat activity in real time, helping network operators, policymakers identify and mitigate malicious Internet behavior.

"After seeing what #MANRS has done for improving #RoutingSecurity, I am optimistic that we can find some common agreed norms for how you find and stop this nonsense in your network before it attacks somebody else, before it trashes the reputation of your IP addresses, and before we have a mess in the Internet."

That was Leslie Daigle's final message to the RIPE NCC community at #RIPE90, after presenting the #InternetPollutionIndex and GCA's work around the #AIDE project.

Interested? Read below:

globalcyberalliance.org/intern

RIPE NCCripencc
2025-05-12

is here โ€“ live from Lisbon! Join us online ๐ŸŒ

Some of the sessions from today we are excited about:

๐ŸŽค Maria Farrell โ€“ Rewild the Internet
๐ŸŒ Timo Hilbrink โ€“ Start an ISP with nothing
๐Ÿ” Aleeza Inamdar โ€“ Bridging BGP theory & practice
๐Ÿ“ก Valerie Aurora โ€“ Build your own Resiliency Club

๐Ÿ‘‰ Watch live: youtube.com/watch?v=lan0Bs_VvMI

A promotional graphic for RIPE 90 featuring three speakers. The top text reads, "Meet the speakers." Below are circular headshots of three women, each with their name in a yellow rounded box beneath their photo. From left to right: Maria Farrell (smiling, light brown hair), Aleeza Suhel Inamdar (wearing a lanyard, long dark hair), and Valerie Aurora (short grey-blonde hair, smiling). The background has a geometric hexagonal design in dark blue and yellow. The bottom right corner displays the hashtag "#RIPEMeeting". In the top right corner, there's a logo for RIPE 90 with the event location and date: "Lisbon, Portugal, 12โ€“16 May 2025".
2025-03-25

Aus unserer Forschung: Fรผr alle an #RoutingSecurity #RPKIfuzzing Interessierten -- der Vortrag "Crashing the Party: Vulnerabilities in RPKI Validation" von der #BlackHatUSA ist jetzt auf YouTube zu sehen
youtube.com/watch?v=mHbCFefRbU

2025-03-25

Aus unserer Forschung: Fรผr alle an #RoutingSecurity #RPKIfuzzing Interessierten -- der Vortrag "Crashing the Party: Vulnerabilities in RPKI Validation" von der #BlackHatUSA ist jetzt auf YouTube zu sehen
youtube.com/watch?v=mHbCFefRbU

RIPE NCCripencc
2025-03-07

For nearly three decades, weโ€™ve been providing expert training to help our members navigate the digital world.

Our webinars and in-person courses cover topics like IPv6, BGP, the RIPE Database, and more!

๐Ÿ‘‰๐Ÿผ Join our new mailing list for tailored training updates: ripe.net/training/in-person-tr

๐Ÿ’ก All RIPE NCC members can attend in-person sessions free of charge.

an visual graphic with a text on the left side that says "Join our new mailing list", and images of envelopes on the right side
Dan Yorkdanyork
2025-02-01

This is great news! I have long been a huge of Internet.nl as a test site for compliance with the latest standards- and now they have added into their scoring. (The RPKI test was there for the last 2 years, but didnโ€™t count toward the score - now it does!)

This is a way to hopefully get people paying more attention to and

From: @internet_nl
mastodon.nl/@internet_nl/11390

2024-01-24

Routinator 0.13.1 โ€˜Aziz, Light!โ€™ is now available. This release of our #RPKI relying party software contains several bug fixes as we prepare for a bigger release that includes a new lightweight user interface. #RoutingSecurity #OpenSource github.com/NLnetLabs/routinato

2024-01-17

The first Release Candidate of Routinator 0.13.1 is now available. It contains several smaller changes and fixes as we gear up to a bigger release with new functionality and a shiny, revamped user interface. #RPKI #Routing #RoutingSecurity github.com/NLnetLabs/routinato

2023-11-10

With Krill 0.14 released the number of #ASPA objects is on the rise again, now at 34. #IETF118 #RPKI #RoutingSecurity github.com/NLnetLabs/krill/rel

Dan Yorkdanyork
2023-10-27

For anyone who attended my "Demystifying Routing Security" talk at the ISC2 Security Congress yesterday and is looking for the slides, I've now posted them at:

danyork.com/2023/10/slides-for

(Unfortunately the mobile app for the event had slides for someone else's session with a similar title. This has now been *fixed* in the event app, so you can also get the slides there.)

Anyone else is of course welcome to look at them! ๐Ÿ˜€

Dan Yorkdanyork
2023-10-26

Met someone at breakfast at this morning who said he was planning to come to my session this morning, so at least there will be 1 person there. ๐Ÿคฃ

There are 10 other sessions going on simultaneously - and one includes ChatGPT ๐Ÿ˜ƒ

So we shall see how many security people want to learn about , , and .

Next question will be to see if I can get 5 volunteers to help with a little onstage demonstration.. ๐Ÿ˜ƒ

Looking forward to it!

Dan Yorkdanyork
2023-10-25

If any of you will be at this week in Nashville, TN, I'll be there speaking about and why enterprises should get involved with the initiative to make the Internet more secure. My talk is on Thursday. I'll be around the other sessions during the conference on Wednesday and Friday.

A photo of a name badge on a white lanyard with metal clips. The top of the badge has a green background and the letters in white: "ISC2". Then there is a black bar with white letters: "Security Congress 2023" and then a white area with letters in black: "Dan York, Internet Society"
Dan Yorkdanyork
2023-10-24

This is what I will be doing on Thursday.. talking about and why enterprise security teams should care about .

Of course, in looking at the schedule, I see my session is one of *11* simultaneous sessions! ๐Ÿคฏ๐Ÿ˜ฑ

And at least two of the other sessions are about , ChatGPT, and other emerging tech. Weโ€™ll see how many people are interested diving into the Internetโ€™s infrastructure vs the new hot topics! ๐Ÿ˜ƒ

From: @danyork
mastodon.social/@danyork/11120

2023-10-20

We're putting the finishing touches on #ASPA v1 support in Krill, removing the afiLimit that was in v0. Routinator already supports the latest ASPA draft, so we'll be right on the bleeding edge again. #RPKI #RoutingSecurity #OpenStandards github.com/NLnetLabs/krill/pul

Dan Yorkdanyork
2023-10-09

If any of you will be at the ISC2 Security Congress on October 25-27 in Nashville, Tennessee, please let me know!

I'll be there speaking about "Demystifying the World of Routing Security" aiming to help security people understand why security is important, what is all about, and why they should be involved. More info at isc2.org/Congress

Promotional image for ISC2 Security Congress. White text on a green background that says "I'm Speaking!" and the session title "Demystifying the World of Routing Security". Photo of Dan York on the right side. At the bottom the URL isc2.org/Congress and hashtag #ISC2Congress
2023-07-14

The first Release Candidate of Routinator 0.13.0 is now available. The most notable change support for Autonomous System Provider Authorisations (#ASPA), allowing verification of the AS_PATH attribute of routes advertised in the #BGP. As this functionality is still subject to change in the #IETF, the feature has to be explicitly enabled when compiling to avoid unintended side effects. #RPKI #OpenStandards #RoutingSecurity github.com/NLnetLabs/routinato

WEBCAST 17-20 July โ€“ Routing Security Summit 2023

On 17-20 July 2023 MANRS convenes the Routing Security Summit 2023. This online event will highlight the importance of routing security and encourage decision-makers and network operators to take real steps toward improving the security and resilience of the global routing infrastructure, bringing together partners from across the Internet routing ecosystem to answe

isoc.live/16715/

#post #manrs #RoutingSecurity #ROV #RPKI

2023-06-07

In case you were holding your breath for the Routinator release with #ASPA support, please exhale now. ๐Ÿ˜ฎโ€๐Ÿ’จ The people discussing this #RPKI #RoutingSecurity topic in the #IETF have reached consensus to make ASPA AFI-agnostic instead. We'll change our implementation accordingly.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst