|
Πύργος Βιβλίων
|
10:00 - 10:05
|
Welcome from our host
|
10:05 - 10:25
|
Welcome to GRNOG9
GRNOG (Greek Network Operators Group) is a community of professionals that are involved in the design, implementation, provisioning and operation of Greek Internet services, networks and infrastructure.
Within this scope, the purpose of the group is:
- to create a human network of professionals with common technical interests
- to facilitate the exchange of knowledge and information among its members
- to promote the cooperation between companies, bodies and parties related to the Greek Internet
- to disseminate Greek and global Internet developments, emerging technologies, best operating practices and standards
- to develop tools, policies, practices and means of communication that facilitate day-to-day operations and long-term design and planning
Members: If you are interested in our group, please consider becoming a member. GRNOG members may use GRNOG mailing lists and participate in all GRNOG meetings, events, activities, discussions and elections.
Non-Members: Although GRNOG is addressing a specific community of professionals, a broader audience may be interested in its activities. GRNOG encourages non-members to participate in our meetings and interact with the group through social media. Non-members, however, have no access to the discussion mailing list and cannot participate in GRNOG elections.
|
10:25 - 10:50
|
Latest changes and future work on LIR Portal, RIPE Database, and RPKI
This talk will focus on front-face changes and developments currently undertaken or in discussion phase within the RIPE community. Examples include: syncing the LIR Portal users with the "default maintainer" in the RIPE Database, an update on the Resource Public Key Infrastructure (RPKI) developments and upcoming changes in the Near Real-Time Mirroring (NRTM) service of the RIPE Database.
|
10:50 - 11:15
|
NIS compliance, challenges and problems
|
11:15 - 11:45
|
Towards a programmable automated Traffic Engineering engine
There are IP networks with many geographically dispersed points of presence (POPs) having multiple transit providers and peers. Could be that there is submarine capacity involved with varying costs. In these environments, optimizing traffic is critical, both from service and financial perspectives.
ISPs are mostly dominated by incoming traffic and this presentation focuses on manipulation of this type of traffic. Manual handling of BGP configuration is cumbersome and error-prone, so an automated solution can enhance quality and make policy enforcement in real-time a possibility.
In this presentation I describe the design and implementation of a prototype in lab, BGP based traffic engineering engine for ISPs. The lab simulates an IP/MPLS core with lots of peers and transits. I will mention the overall design and implementation in a Juniper based network and demonstrate a working demo in the lab enforcing policy with a few examples.
The main components of the solution are unification/standardization of BGP policies based on large communites and configuration management based on Salt/NAPALM.
|
11:45 - 12:15
|
Coffee Break
|
12:15 - 12:45
|
Build from the ground up the infrastructure for the 1st digital bank in Greece
Build from the ground up the infrastructure for the 1st digital bank in Greece.
|
12:45 - 13:15
|
Better WiFi: From your home to our country
|
13:15 - 13:45
|
What really happens when you type el.wikipedia.org?
At the Wikimedia Foundation, we are running the world’s favourite encyclopædia and one of the top 10 websites of the Internet. In this talk we will take a tour around Wikipedia’s infrastructure.
We will explain how requests flow through our systems, and how we manage to serve ~17 bn pageviews monthly with a little over ~1200 servers. Moreover, will go through our history, our transition to service oriented architecture and microservices, and briefly discuss our ongoing journey in migrating to Kubernetes.
|
13:45 - 14:30
|
Lunch Break
|
14:30 - 14:55
|
Auto-configuring BGP monitoring and hijack detection tools in real time
In this presentation, I would like to describe the challenges of configuring BGP monitoring and hijack detection tools (such as ARTEMIS, BGPalerter, BGPmon-like tools etc.) and provide two possible approaches on how to automate the generation of the needed configuration files to e.g., detect BGP hijacks in real time, focusing on the ARTEMIS use case.
Why is keeping this conf file up-to-date useful? The configuration file contains aggregated AS-level BGP information, useful for BGP monitoring and incident detection tools in general.
Why is it hard? The network operator has to manually fill in and update the
configuration file for every change in network topology and/or routing policy.
This is not practical for large networks, with complex policies (MOAS, rich peerings, etc.). Even if we "extract" this information from public sources (such as some tools do), it is not reliable, and still needs manual verification from operators every time something new is observed.
How could automation work? I will present one prototype approach based on Ansible (router-specific, polling-based approach), and one based on trusted local BGP feeds (passive, async approach).
|
14:55 - 15:25
|
Scaling to support thousands of BGP peerings in a SaaS environment
When analyzing peering traffic and identifying DDoS attacks, BGP provides valuable additional insight to supplement Flow information. In this talk we'll go over the different challenges, actions and learnings from the past four years to enable the support of thousands of peerings in a multi-tenant SaaS platform.
Kentik utilizes multiple auxiliary sources, such as SNMP, DNS, RADIUS or Streaming Telemetry, to enrich the ingested flow. The most prominent of these sources though, is BGP. With BGP data, Kentik is able to produce BGP-related analytics such as peering analytics and in addition, utilize the peering bidirectionally to enable DDoS mitigation capabilities such as RTBH and Flowspec.
In this presentation we'll start with a short introduction on how Kentik uses BGP, in order to define the technical requirements for the setup. We'll then overview the different generations of the setup through the years:
1. 1 active node (2 nodes in active-backup) - ucarp
2. 4 active nodes with mask-based hashing - RTBH functionality is introduced, exabgp is introduced
3. 10 active nodes with full-tuple hashing and support for balancing IPv6 (current setup - slowly getting deprecated) - Flowspec is introduced
4. 16+ nodes with IPVS+keepalived and easy pooling/depooling setup (now in testing)
With the requirement being that the external customer service needs to remain stable and not require any reconfiguration, for each phase we'll illustrate the challenges, examine the options available to Kentik engineers, explain the choice that was made and describe the outcome, leading Kentik to be able to support more than 4000 peerings across 16 nodes today.
|
15:25 - 15:55
|
Call to action for Routing Security
In this talk, I will deepdive into what problems we face with BGP, how vulnerable we are for hijacks and what to do against them.
Although I work for Juniper Networks the presentation is vendor agnostics and focusses on the state of routing security.
Currently, it is strongly focussed on RPKI but I can include more general filtering methods as well.
|
15:55 - 16:10
|
Flashtalk: Being a good netizen
|
16:10 - 16:40
|
Coffee Break
GRNOG (Greek Network Operators Group) is a community of professionals that are involved in the design, implementation, provisioning and operation of Greek Internet services, networks and infrastructure.
Within this scope, the purpose of the group is:
- to create a human network of professionals with common technical interests
- to facilitate the exchange of knowledge and information among its members
- to promote the cooperation between companies, bodies and parties related to the Greek Internet
- to disseminate Greek and global Internet developments, emerging technologies, best operating practices and standards
- to develop tools, policies, practices and means of communication that facilitate day-to-day operations and long-term design and planning
Members: If you are interested in our group, please consider becoming a member. GRNOG members may use GRNOG mailing lists and participate in all GRNOG meetings, events, activities, discussions and elections.
Non-Members: Although GRNOG is addressing a specific community of professionals, a broader audience may be interested in its activities. GRNOG encourages non-members to participate in our meetings and interact with the group through social media. Non-members, however, have no access to the discussion mailing list and cannot participate in GRNOG elections.
|
16:40 - 17:25
|
Encrypted Uncensored DNS
How I Learned to Stop Worrying and Love: DNS over HTTPS and DNS over TLS.
(presentation/demo)
|
17:25 - 17:45
|
DoH/DoT/Do* - Flashtalk & Open Mic
A flashtalk on DoH/DoT/Do*, followed by some intriguing questions towards the audience.
|
17:45 - 18:00
|
Closing GRNOG9
|