Code Monkey home page Code Monkey logo

rpki-chronicle's Introduction

RPKI-Chronicle

Copyright (C) 2019-2020 CZ.NIC, z.s.p.o.

This is the RPKI-chronicle project -- web-based history keeper for RPKI.

Project aim and intended audience

There are many occasions when the Internet Service Providers, security experts or users need to know specifics about certain IP prefixes and Autonomous Systems. The major examples include but are not limited to:

  • an ISP that needs to verify that its own announcements comply with the current best practices with regard to RPKI,
  • a security expert that needs to asses quality of processes in any partnering or colaborating organization, based on adherence to the current best practices,
  • a security expert that investigates a specific incident and needs information about source of the attack at the specific time of its occurrence,
  • a user that needs to verify rightful user of a specific IP prefixes,
  • an IP address broker that needs to know BGP history of the prefixes to be transfered.

Apart from making the software and its running instance publicly available, there is a strong internal need to have trusted source of RPKI history for CSIRT.CZ, which falls into the case of the security experts investigating specific incidents and cybersecurity threats that need information about source of the attack at the specific time of its occurrence.

RPKI-chronicle makes it possible to investigate rapid and short-lived attacks even after they are finished and after their visible effects on Internet routing disapeared. This brings major advantage to the CSIRT.CZ and to the entire industry by helping to mitigate impact of long reaction time before the security threat is reported and can be investigated.

Existing public tools

There are publicly available tools that we acknowledge, build upon when possible and encourage their usage in complementary tasks or for verification of our dataset:

Deployment

The project consists of two major submodules that have different requirements and deployment procedures.

Please follow steps in appropriate parts of README files of each submodule.

General requirements/dependencies

  • RIPE RPKI Validator 3
  • Python 3

Python modules:

  • tabulate
  • flask
  • wtforms
  • psycopg2
  • flask-paginate
  • sqlalchemy
  • Flask-SQLAlchemy
  • flask_session
  • redis
  • flask-debugtoolbar
  • envelope
  • fasteners

Deployment tips

  • WSGI can be deployed and exposed by various methods, peferrably with NGINX 1.16.1
  • DB engine is needed, preferrably PostgreSQL 12.1
  • The local RIPE NCC RPKI Validator or remotely-accessed validator is needed. See readme file for RIPE NCC RPKI Validator connector.

rpki-chronicle's People

Contributors

tmshlvck avatar e3rd avatar

Watchers

James Cloos avatar  avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.