Workshop on using RPKI for BGP origin validation on Thursday @RIPE
Thursday November 18 (at RIPE 61), there will be a RPKI testbed workshop on using the RPKI for BGP origin validation. Time: from 13:00 on Place: Fori meeting room (on the right hand side of the stairs down to the terminal room and side room). The workshop starts from 13:00 on, or just after lunch, to the end of the afternoon (around 18:00). The goal of the workshop is to get the RPKI code up and running for people, rather than doing any kind of introductory presentation. Everyone interested is invited to attend. The capacity of the room is only 20 persons, but during the afternoon we expect participants to come and go, and interested persons are likely to find a seat during the afternoon. At present, there are two paths for getting people up and running in the testbed: 1) superheros can install all the software on one of their servers, configure it, coordinate with Rob Austein and Randy Bush to get resources delegated, and away we go. 2) slightly less heroic figures can get their feet wet with a new simplified interface we wrote just before the Beijing workshop, which lets them run a single relatively simple python script on a unix-ish (linux, *bsd, mac os x) laptop to get up and running with a hosted configuration using the gui interface on one of randy's servers. In either case the goal is to get people to the point of producing ROAs, which we can then see propagate all the way to a couple of test routers running with origin validation enabled. Participant equipment requirements: - Path (1): unix-ish machine with working C compiler, Python 2.5 or 2.6 (2.6 preferred). If the participant intends to run the RPKI publication service (pubd and rsyncd), the machine must be reachable from the outside world (no firewall, or participant has the ability to punch holes in the firewall); same applies to participants who intend to act as parents for external parties (child must be able to contact parent). - Path (2): unix-ish laptop running python 2.5 or 2.6 (2.6 -strongly- preferred, due to lack of real TLS support in 2.5); C compiler may or may not be necessary, depending on how recent the system copy of OpenSSL is. Participants who want to get a head start (recommended for path (1) -- even for superheros it takes a little while to configure, build, and run through the regression tests) should download the code in advance and try following the installation instructions. Subversion repository is at: http://subvert-rpki.hactrn.net/ or just start at http://rpki.net/ and follow the links. There's even documentation, albeit imperfect. For the rpki.net team, -- Benno J. Overeinder NLnet Labs http://www.nlnetlabs.nl/
participants (1)
-
Benno Overeinder