Source Address Validation (SAV) Deployment and Operational Practices

Friends: uRPF and similar SAV techniques have been around for long, with new variants recently/being standardized by the IETF (eFP-uRPF, BAR-SAV). We have done simulations to evaluate the impacts of these variants. To improve our research, we set up a short, quick survey for network managers and administrators of ASNs. In this study, we want to understand the deployment challenges, operational considerations, adoption trends and operator concerns in this area. It would be amazing if you could respond to the survey, available in: https://forms.gle/3rRtCTa2xk217tyd6 We really appreciate your help. The form also contains an option to leave your email for us to send you our research results (paper, simulations, survey). Thanks a lot!! -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied Introduction to Cryptography and Cybersecurity' textbook: https://sites.google.com/site/amirherzberg/crypto-cyber-book

Dear NANOGers, two birds in one email. 1. A reminder about our short, quick survey about uRPF/SAV; we received only 11 responses (many thanks!!), and only one from an edge AS... we would really appreciate more responses, so we'll be able to include this aspect in our research - simulations of all proposals mostly done, I'll probably post the draft paper here soon. So, please... fill it in: https://forms.gle/3rRtCTa2xk217tyd6 We really appreciate your help. 2. I've uploaded in my site a new, much extended version of my Internet inter-domain routing (BGP) security lecture, which I'll cover in my network security course in School of Computing University of Connecticut <https://www.linkedin.com/company/uconn-computer-science-and-engineering/>. It's a long presentation introducing inter-domain routing (BGP), its security concerns, different misrouting attacks and defenses (RPKI, ASPA, BGPsec, ...), as well as data-layer (IP) attacks, mainly IP spoofing, and defenses (uRPF and other Source Address Validation (SAV) techniques, including the BAR-SAV draft). See at https://sites.google.com/site/amirherzberg/presentations_1. It's under Creative Commons Attribution 4.0 international license, which basically allows use and modification, so hopefully will be of use to some of you. Comments, of course, are welcome. Thanks, Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied Introduction to Cryptography and Cybersecurity' textbook: https://sites.google.com/site/amirherzberg/crypto-cyber-book
participants (1)
-
Amir Herzberg