
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 11 Apr 2026 17:33:17 GMT</lastBuildDate>
        <item>
            <title><![CDATA[The Internet is Getting Safer: Fall 2020 RPKI Update]]></title>
            <link>https://blog.cloudflare.com/rpki-2020-fall-update/</link>
            <pubDate>Fri, 06 Nov 2020 12:36:07 GMT</pubDate>
            <description><![CDATA[ The cap of two hundred thousand routing cryptographic records was recently passed. We thought it was time for an update on a major year for RPKI. ]]></description>
            <content:encoded><![CDATA[ <p>The Internet is a network of networks. In order to find the path between two points and exchange data, the network devices rely on the information from their peers. This information consists of IP addresses and Autonomous Systems (AS) which announce the addresses using Border Gateway Protocol (BGP).</p><p>One problem arises from this design: what protects against a malevolent peer who decides to announce incorrect information? The damage caused by <a href="/bgp-leaks-and-crypto-currencies/">route hijacks can be major</a>.</p><p>Routing Public Key Infrastructure (RPKI) is a framework created in 2008. Its goal is to provide a source of truth for Internet Resources (IP addresses) and ASes in signed cryptographically signed records called Route Origin Objects (ROA).</p><p>Recently, we’ve seen the significant threshold of two hundred thousand ROAs being passed. This represents a big step in making the Internet more secure against accidental and deliberate BGP tampering.</p><p>We have talked about RPKI <a href="/tag/rpki/">in the past</a>, but we thought it would be a good time for an update.</p><p>In a more technical context, the RPKI framework consists of two parts:</p><ul><li><p>IP addresses need to be cryptographically signed by their owners in a database managed by a Trust Anchor: Afrinic, APNIC, ARIN, LACNIC and RIPE NCC. Those five organizations are in charge of allocating Internet resources. The ROA indicates which Network Operator is allowed to announce the addresses using BGP.</p></li><li><p>Network operators download the list of ROAs, perform the cryptographic checks and then apply filters on the prefixes they receive: this is called BGP Origin Validation.</p></li></ul>
    <div>
      <h3>The “Is BGP Safe Yet” website</h3>
      <a href="#the-is-bgp-safe-yet-website">
        
      </a>
    </div>
    <p>The launch of the website <a href="https://isbgpsafeyet.com/">isbgpsafeyet.com</a> to test if your ISP correctly performs BGP Origin Validation was a success. Since launch, it has been visited more than five million times from over 223 countries and 13,000 unique networks (20% of the entire Internet), generating half a million BGP Origin Validation tests.</p><p>Many providers subsequently indicated on social media (for example, <a href="https://twitter.com/Aussie_BB/status/1252046032214450176">here</a> or <a href="https://twitter.com/swisscom_csirt/status/1300666695959244800">here</a>) that they had an RPKI deployment in the works. This increase in Origin Validation by networks is increasing the security of the Internet globally.</p><p>The site’s test for Origin Validation consists of queries toward two addresses, one of which is behind an RPKI invalid prefix and the other behind an RPKI valid prefix. If the query towards the invalid succeeds, the test fails as the ISP does not implement Origin Validation. We counted the number of queries that failed to reach invalid.cloudflare.com. This also included a few thousand <a href="https://atlas.ripe.net/measurements/?page=1&amp;search=target:invalid.rpki.cloudflare.com#tab-http">RIPE Atlas tests</a> that were started by Cloudflare and various contributors, providing coverage for smaller networks.</p><p>Every month since launch we’ve seen that around 10 to 20 networks are deploying RPKI Origin Validation. Among the major providers we can build the following table:</p><table><tr><td><p><b>Month</b></p></td><td><p><b>Networks</b></p></td></tr><tr><td><p>August</p></td><td><p>Swisscom (Switzerland), Salt (Switzerland)</p></td></tr><tr><td><p>July</p></td><td><p>Telstra (Australia), Quadranet (USA), Videotron (Canada)</p></td></tr><tr><td><p>June</p></td><td><p>Colocrossing (USA), Get Norway (Norway), Vocus (Australia), Hurricane Electric (Worldwide), Cogent (Worldwide)</p></td></tr><tr><td><p>May</p></td><td><p>Sengked Fiber (Indonesia), Online.net (France), WebAfrica Networks (South Africa), CableNet (Cyprus), IDnet (Indonesia), Worldstream (Netherlands), GTT (Worldwide)</p></td></tr></table><p>With the help of many <a href="https://github.com/cloudflare/isbgpsafeyet.com/blob/master/CONTRIBUTING.md">contributors</a>, we have compiled a list of network operators and public statements at the top of the isbgpsafeyet.com page.</p><p>We excluded providers that manually blocked the traffic towards the prefix instead of using RPKI. Among the techniques we see are firewall filtering and manual prefix rejection. The filtering is often propagated to other customer ISPs. In a unique case, an ISP generated a “more-specific” blackhole route that leaked to multiple peers over the Internet.</p><p>The deployment of RPKI by major transit providers, also known as Tier 1, such as Cogent, GTT, Hurricane Electric, NTT and Telia made many downstream networks more secure without them having them deploying validation software.</p><p>Overall, we looked at the evolution of the successful tests per ASN, and we noticed a steady increase over the recent months of 8%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F5LrsstbIKXWNt4drF5Vt/7515a8aad81c55ee921785a2f71ff3a8/success-ratio-3-1.png" />
            
            </figure><p>Furthermore, when we probed the entire IPv4 space this month, using a similar technique to the isbgpsafeyet.com test, many more networks were not able to reach an RPKI invalid prefix than compared to the same period last year. This confirms an increase of RPKI Origin Validation deployment across all network operators. The picture below shows the IPv4 space behind a network with RPKI Origin Validation enabled in yellow and the active space in blue. It uses a <a href="https://en.wikipedia.org/wiki/Hilbert_curve">Hilbert Curve</a> to efficiently plot IP addresses: for example one /20 prefix (4096 IPs) is a pixel, a /16 prefix (65536 IPs) will form a 4x4 pixels square.</p><p>The more the yellow spreads, the safer the Internet becomes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/kX7jAx67NEyl7ujWucW2h/72625c4415f1f619b73e2fc3f0654373/hilbert-comp.png" />
            
            </figure><p>What does it mean exactly? <i>If you were hijacking a prefix, the users behind the yellow space would likely not be affected.</i> This also applies if you miss-sign your prefixes: you would not be able to reach the services or users behind the yellow space. Once RPKI is enabled everywhere, there will only be yellow squares.</p>
    <div>
      <h3>Progression of signed prefixes</h3>
      <a href="#progression-of-signed-prefixes">
        
      </a>
    </div>
    <p>Owners of IP addresses indicate the networks allowed to announce them. They do this by signing prefixes: they create Route Origin Objects (ROA). As of today, there are more than 200,000 ROAs. The distribution shows that the RIPE region is still leading in ROA count, then followed by the APNIC region.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Dskm8cAFbT7A51uLr1pRF/d3238ae962da9a9ddf442e833af6864f/image2-2.png" />
            
            </figure><p>2020 started with 172,000 records and the count is getting close to 200,000 at the beginning of November, approximately a quarter of all the Internet routes. Since last year, the database of ROAs grew by more than 70 percent, from 100,000 records, an average pace of 5% every month.</p><p>On the following graph of unique ROAs count per day, we can see two points that were followed by a change in ROA creation rate: 140/day, then 231/day, and since August, 351 new ROAs per day.</p><p>It is not yet clear what caused the increase in August.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/mzXuBiiXzCAl7qIUwsMA4/2b2a51ec5f4443b2951ad59cd38223b5/count-growth-3.png" />
            
            </figure>
    <div>
      <h3>Free services and software</h3>
      <a href="#free-services-and-software">
        
      </a>
    </div>
    <p>In <a href="/bgp-leaks-and-crypto-currencies/">2018</a> and <a href="/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">2019</a>, Cloudflare was impacted by BGP route hijacks. Both could have been avoided with RPKI. Not long after the first incident, we started signing prefixes and developing RPKI software. It was necessary to make BGP safer, and we wanted to do more than talk about it. But we also needed enough networks to be deploying RPKI as well. By making deployment easier for everyone, we hoped to increase adoption.</p><p>The following is a reminder of what we built over the years around RPKI and how it grew.</p><p><a href="https://github.com/cloudflare/cfrpki">OctoRPKI</a> is Cloudflare’s open source RPKI Validation software. It periodically generates a JSON document of validated prefixes that we pass onto our routers using <a href="https://github.com/cloudflare/gortr">GoRTR</a>. It generates most of the data behind the graphs here.</p><p>The latest version, <a href="https://github.com/cloudflare/cfrpki/releases/tag/v1.2.0">1.2.0</a>, of OctoRPKI was released at the end of October. It implements important security fixes, better memory management and extended <a href="https://github.com/cloudflare/cfrpki/blob/master/Monitoring.md">logging</a>. This is the first validator to provide detailed information around cryptographically invalid records into <a href="https://sentry.io/welcome/">Sentry</a> and performance data in <a href="https://opentracing.io/">distributed tracing tools</a>.GoRTR remains heavily used in production, including by <a href="https://github.com/cloudflare/gortr#in-the-field">transit providers</a>. It can natively connect to other validators like <a href="https://www.rpki-client.org/">rpki-client</a>.</p><p>When we released our public rpki.json endpoint in early 2019, the idea was to enable anyone to see what Cloudflare was filtering.</p><p>The file is also used as a bootstrap by GoRTR, so that users can test a deployment. The file is cached on more than 200 data centers, ensuring quick and secure delivery of a list of valid prefixes, making RPKI more accessible for smaller networks and developers.</p><p>Between March 2019 and November 2020, the number of queries more than doubled and there are five times more networks querying this file.</p><p>The growth of queries follows approximately the rate of ROA creation (~5% per month).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5kDHjZZCWlsKLvUHVCrNiZ/d58ee3429910b250612355c8e74d0a50/rpki-json-evolution-4.png" />
            
            </figure><p>A public RTR server is also available on rtr.rpki.cloudflare.com. It includes a plaintext endpoint on port 8282 and an SSH endpoint on port 8283. This allows us to test new versions of <a href="https://github.com/cloudflare/gortr">GoRTR</a> before release.</p><p>Later in 2019, we also built a <a href="https://rpki.cloudflare.com">public dashboard</a> where you can see in-depth RPKI validation. With a GraphQL API, you can now explore the validation data, test a list of prefixes, or see the status of the current routing table.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3cJHLgbi7dDeAPV7ZV2izH/9a895b790137c972c8623f7248539cdc/rpki.cloudflare.com__view-validator-validateRoute-13335_1.1.1.0-2F24.png" />
            
            </figure><p>Currently, the API is used by <a href="https://github.com/nttgin/BGPalerter">BGPalerter</a>, an open-source tool that detects routing issues (including hijacks!) from a stream of BGP updates.</p><p>Additionally, starting in November, you can access the historical data from May 2019. Data is computed daily and contains the unique records. The team behind the dashboard worked hard to provide a fast and accurate visualization of the daily ROA changes and the volumes of files changed over the day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3uoRqILkpkM58M0iKbqZm6/fcbcaf5f1dbd7695504e7cd8b0df3d4f/rpki_dashboard_candlestick.png" />
            
            </figure>
    <div>
      <h3>The future</h3>
      <a href="#the-future">
        
      </a>
    </div>
    <p>We believe RPKI is going to continue growing, and we would like to thank the hundreds of network engineers around the world who are making the Internet routing more secure by deploying RPKI.</p><p>25% of routes are signed and 20% of the Internet is doing origin validation and those numbers grow every day. We believe BGP will be safer <a href="https://youtu.be/3BAwBClazWc?t=1333">before reaching 100%</a> of deployment; for instance, once the remaining transit providers enable Origin Validation, it is unlikely a BGP hijack will make it to the front page of world news outlets.</p><p>While difficult to quantify, we believe that critical mass of protected resources will be reached in late 2021.</p><p>We will keep improving the tooling; OctoRPKI and GoRTR are open-source, and we welcome contributions. In the near future, we plan on releasing a packaged version of GoRTR that can be directly installed on certain routers. Stay tuned!</p> ]]></content:encoded>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[RPKI]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cryptography]]></category>
            <guid isPermaLink="false">1EyhrRgU58WhG0wa9Bo8Qh</guid>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
        <item>
            <title><![CDATA[Is BGP Safe Yet? No. But we are tracking it carefully]]></title>
            <link>https://blog.cloudflare.com/is-bgp-safe-yet-rpki-routing-security-initiative/</link>
            <pubDate>Fri, 17 Apr 2020 15:00:00 GMT</pubDate>
            <description><![CDATA[ BGP leaks and leaks and hijacks have been accepted as an unavoidable part of the Internet for far too long. Today, we are releasing isBGPSafeYet.com, a website to track deployments and filtering of invalid routes by the major networks. ]]></description>
            <content:encoded><![CDATA[ <p>BGP leaks and hijacks have been accepted as an unavoidable part of the Internet for far too long. We relied on protection at the upper layers like TLS and DNSSEC to ensure an untampered delivery of packets, but a hijacked route often results in an unreachable IP address. Which results in an Internet outage.</p><p>The Internet is too vital to allow this known problem to continue any longer. It's time networks prevented leaks and hijacks from having any impact. It's time to make BGP safe. No more excuses.</p><p>Border Gateway Protocol (BGP), a protocol to exchange routes has existed and evolved since the 1980s. Over the years it has had security features. The most notable security addition is Resource Public Key Infrastructure (RPKI), a security framework for routing. It has been the subject of <a href="/tag/rpki/">a few blog posts</a> following our deployment in mid-2018.</p><p>Today, the industry considers RPKI mature enough for widespread use, with a sufficient ecosystem of <a href="https://github.com/cloudflare/gortr">software</a> and <a href="https://rpki.cloudflare.com">tools</a>, including tools we've written and open sourced. We have fully deployed Origin Validation on all our BGP sessions with our peers and signed our prefixes.</p><p>However, the Internet can only be safe if the major network operators <a href="https://www.ndss-symposium.org/wp-content/uploads/2017/09/ndss2017_06A-3_Gilad_paper.pdf">deploy RPKI</a>. Those networks have the ability to spread a leak or hijack far and wide and it's vital that they take a part in stamping out the scourge of BGP problems whether inadvertent or deliberate.</p><p>Many like AT&amp;T and Telia pioneered global deployments of RPKI in 2019. They were successfully followed by Cogent and NTT in 2020. Hundreds networks of all sizes have done a tremendous job over the last few years but there is still work to be done.</p><p>If we observe the customer-cones of the networks that have deployed RPKI, we see around 50% of the Internet is more protected against route leaks. That's great, but it's nothing like enough.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Uh9D7PVerLfXQ68eqAnlh/ae920ca803b130eae81550f7c36a3c7c/isbgpsafeyet.png" />
            
            </figure><p>Today, we are releasing <a href="https://isbgpsafeyet.com/">isBGPSafeYet.com</a>, a website to track deployments and filtering of invalid routes by the major networks.</p><p>We are hoping this will help the community and we will crowdsource the information on the website. The source code is available on <a href="https://github.com/cloudflare/isbgpsafeyet.com">GitHub</a>, we welcome suggestions and contributions.</p><p>We expect this initiative will make RPKI more accessible to everyone and ultimately will reduce the impact of route leaks. Share the message with your Internet Service Providers (ISP), hosting providers, transit networks to build a safer Internet.</p><p>Additionally, to monitor and test deployments, we decided to announce two bad prefixes from our 200+ data centers and via the 233+ Internet Exchange Points (IXPs) we are connected to:</p><ul><li><p>103.21.244.0/24</p></li><li><p>2606:4700:7000::/48</p></li></ul><p>Both these prefixes should be considered <i>invalid</i> and should not be routed by your provider if RPKI is implemented within their network. This makes it easy to demonstrate how far a bad route can go, and test whether RPKI is working in the real world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/76jlyQka8osAb5vX9EuzKf/6709edfcecc29419cca07da0748ed3de/Screen-Shot-2020-04-16-at-6.36.48-PM.png" />
            
            </figure><p><a href="https://rpki.cloudflare.com/?validateRoute=13335_103.21.244.0%2F24">A Route Origin Authorization for 103.21.244.0/24 on rpki.cloudflare.com</a></p><p>In the test you can run on <a href="https://isBGPSafeYet.com">isBGPSafeYet.com</a>, your browser will attempt to fetch two pages: the first one valid.rpki.cloudflare.com, is behind an RPKI-valid prefix and the second one, invalid.rpki.cloudflare.com, is behind the RPKI-invalid prefix.</p><p>The test has two outcomes:</p><ul><li><p>If both pages were correctly fetched, your ISP accepted the invalid route. It does not implement RPKI.</p></li><li><p>If only valid.rpki.cloudflare.com was fetched, your ISP implements RPKI. You will be less sensitive to route-leaks.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ihoJvfZjpxRs6GGJ2cZL6/90dcb2481e75ce40c4800c3e99ae9fc4/blogpost2-01.png" />
            
            </figure><p>a simple test of RPKI invalid reachability</p><p>We will be performing tests using those prefixes to check for propagation. <a href="https://en.wikipedia.org/wiki/Traceroute">Traceroutes</a> and probing helped us in the past by creating visualizations of deployment.</p><p>A simple indicator is the number of networks sending the accepted route to their peers and collectors:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wdk01mSlPLv5TVHzuyDHp/4b56692fa0b12154d860023723290c9d/invalid-prefixes-reachability.png" />
            
            </figure><p>Routing status from online route collection tool <a href="https://stat.ripe.net/widget/routing-status#w.resource=103.21.244.0/24&amp;w.min_peers_seeing=0">RIPE Stat</a></p><p>In December 2019, we released a <a href="https://xkcd.com/195/">Hilbert curve</a> map of the IPv4 address space. Every pixel represents a /20 prefix. If a dot is yellow, the prefix responded only to the probe from a RPKI-valid IP space. If it is blue, the prefix responded to probes from both RPKI valid and invalid IP space.</p><p>To summarize, the yellow areas are IP space behind networks that drop RPKI invalid prefixes. The Internet isn't safe until the blue becomes yellow.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2tiSr4Gzbk0qrtdGfMgIw/9be9478693140ad1132542148afe02ce/blogpost-hilbert-01.png" />
            
            </figure><p>Hilbert Curve Map of IP address space behind networks filtering RPKI invalid prefixes</p><p>Last but not least, we would like to thank every network that has already deployed RPKI and every developer that contributed to validator-software code bases. The last two years have shown that the Internet can become safer and we are looking forward to the day where we can call route leaks and hijacks an incident of the past.</p> ]]></content:encoded>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[RPKI]]></category>
            <category><![CDATA[DNSSEC]]></category>
            <guid isPermaLink="false">1gQz546mYPaLOpkdVu7O1K</guid>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
        <item>
            <title><![CDATA[On the shoulders of giants: recent changes in Internet traffic]]></title>
            <link>https://blog.cloudflare.com/on-the-shoulders-of-giants-recent-changes-in-internet-traffic/</link>
            <pubDate>Tue, 17 Mar 2020 12:00:00 GMT</pubDate>
            <description><![CDATA[ As the COVID-19 emergency continues and an increasing number of cities and countries are establishing quarantines or cordons sanitaire, the Internet has become, for many, the primary method to keep in touch with their friends and families.  ]]></description>
            <content:encoded><![CDATA[ <p>As the COVID-19 emergency continues and an increasing number of cities and countries are establishing quarantines or cordons sanitaire, the Internet has become, for many, the primary method to keep in touch with their friends and families. And it's a vital motor of the global economy as many companies have employees who are now working from home.</p><p>Traffic towards video conferencing, streaming services and news, <a href="https://www.cloudflare.com/ecommerce/">e-commerce</a> websites has surged. We've seen growth in traffic from residential broadband networks, and a slowing of traffic from businesses and universities.</p><p>The Cloudflare team is fully operational and the Network Operating Center (NOC) is watching the changing traffic patterns in the more than 200 cities in which we operate hardware.</p><p>Big changes in Internet traffic aren't unusual. They often occur around large sporting events like the Olympics or World Cup, cultural events like the Eurovision Song Contest and even during Ramadan at the breaking of the fast each day.</p><p>The Internet was built to cope with an ever changing environment. In fact, it was literally created, tested, debugged and designed to deal with changing load patterns.</p><p>Over the last few weeks, the Cloudflare Network team has noticed some new patterns and we wanted to share a few of them with you.</p>
    <div>
      <h3>Entire countries are watching their leaders</h3>
      <a href="#entire-countries-are-watching-their-leaders">
        
      </a>
    </div>
    <p>Last Friday evening, the US President announced a State of Emergency in the United States. Not so long after, our US data centers served 20% more traffic than usual. The red line shows Friday, the grey lines the preceding days for comparison.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3cgutP0x9kF0enY9jPw64F/780b1c10b856b77f516ba6e594cf854a/image1-5.png" />
            
            </figure><p>On the Sunday, March 15, the Dutch government announced on the radio at 1730 local time closures of the non-essential business (1630 UTC). A sharp dip in the regular Sunday traffic followed:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1mlVGpkTYIKqtjQkuhRGAV/ff910d999d562225d7adea5a927c1991/image7-1.png" />
            
            </figure><p>The French president made two national announcements, on March 12 (pink curve) and March 16 (red curve) at 2000 local time (1900 UTC). The lockdown announcement on March 16 caused French traffic to dip by half followed by a spike:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1wMGp2Wl969Ek1CemyQ0RH/c31be1dcd18381944593953c70168095/image5-3.png" />
            
            </figure>
    <div>
      <h3>Evolution of traffic in quarantine</h3>
      <a href="#evolution-of-traffic-in-quarantine">
        
      </a>
    </div>
    <p>Italy has seen a 20-40% increase in daily traffic since the lockdown:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6NAmXuIRyCKo3Yc2dCc6vd/8cd4f1b03e0e12bc16146f23be5b6479/image9-1.png" />
            
            </figure><p>With universities closing, some national research networks are remaining (almost) as quiet as a weekend (in purple). Current day in red and previous days in grey (overlaps with previous week):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4DebqRByRJsTzFv5zd9b3S/bc6aff29fdd652f119b50f4a802ba52e/image8.png" />
            
            </figure><p>The <a href="https://en.wikipedia.org/wiki/Internet_exchange_point"><b>Internet Exchange Points</b></a>, a key part of the Internet infrastructure, where Internet service providers and content providers can exchange data directly (rather than via a third party) have also seen spikes in traffic. Many provide public traffic graphs.</p><p>In Amsterdam (<a href="https://www.ams-ix.net/ams/documentation/total-stats">AMS-IX</a>), London (<a href="https://portal.linx.net/stats/lans">LINX</a>) and Frankfurt (<a href="https://www.de-cix.net/en/locations/germany/frankfurt/statistics">DE-CIX</a>), around 10-20% increase is seen around March 9th:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7MkJVBKFZ8bfuwDONUyvvP/a4938b1a5b7d815f8b9f7a258919c017/image2-3.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6mfzZoAApV2YCsc6sSiuc7/9f8bd6c37df6378914f021ed25d22042/image6-1.png" />
            
            </figure><p>In Milan (<a href="https://www.mix-it.net/statistiche/">MXP-IX</a>), the Exchange point shows a 40% increase on Wednesday, 9th of March 2020, the day of the quarantine:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4yJaXB8BYVIQNK8zfRxyiP/b041486940597caba4bcf3545d1a0f26/image4-2.png" />
            
            </figure><p>In Asia, in Hong Kong (<a href="https://www.hkix.net/hkix/stat/aggt/hkix-aggregate.html">HKIX</a>), we can observe a faster increase since the end of January which likely corresponds to the Hubei lockdown on the January 23:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2einyNzLMBNCo0VgBBlh3C/fe61b319c1b6b5f69443eeeae398367d/image3-1.png" />
            
            </figure><p>The emergency has a non-negligible impact on Internet services and our lives. Although it is difficult to quantify exactly the increase, we observe numbers from 10% to 40% depending on the region and the state of government action in those regions.</p><p>Even though from time to time individual services, such as a web site or an app, have outages the core of the Internet is robust. Traffic is shifting from corporate and university networks to residential broadband, but the Internet was designed for change.</p><p>Check back on the Cloudflare blog for further updates and insights.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[Network]]></category>
            <guid isPermaLink="false">7EUj89CaFE8HJwox8f8RIT</guid>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s RPKI Toolkit]]></title>
            <link>https://blog.cloudflare.com/cloudflares-rpki-toolkit/</link>
            <pubDate>Sun, 24 Feb 2019 17:00:00 GMT</pubDate>
            <description><![CDATA[ A few months ago, we made a first then a second announcement about Cloudflare’s involvement in Resource Public Key Infrastructure (RPKI), and our desire to make BGP Internet routing more secure. ]]></description>
            <content:encoded><![CDATA[ <p>A few months ago, we made a <a href="/rpki/">first</a> then a <a href="/rpki-details/">second</a> announcement about Cloudflare’s involvement in Resource Public Key Infrastructure (RPKI), and our desire to make BGP Internet routing more secure. Our mission is to build a safer Internet. We want to make it easier for network operators to deploy RPKI.</p><p>Today’s article is going to cover our experience and the tools we are using. As a brief reminder, RPKI is a framework that allows networks to deploy route filtering using cryptography-validated information. Picture <a href="https://www.cloudflare.com/application-services/products/ssl/">TLS certificates </a>for IP addresses and Autonomous System Numbers (ASNs)</p>
    <div>
      <h3>What it means for you:</h3>
      <a href="#what-it-means-for-you">
        
      </a>
    </div>
    <p>We validate our IP routes. This means, as a 1.1.1.1 DNS resolver user, you are less likely to be victim of cache poisoning. We signed our IP routes. This means a user browsing the websites on Cloudflare’s network are unlikely to experience route hijacks.</p><p>All our Points of Presence which have a router compatible with <a href="https://tools.ietf.org/html/rfc8210">The Resource Public Key Infrastructure (RPKI) to Router Protocol</a> (RTR protocol) are connected to our custom software called <a href="https://github.com/cloudflare/gortr">GoRTR</a> and are now filtering invalid routes. The deployment amounts to around 70% of our network.</p><p>We received many questions regarding the amount of invalid traffic. Our estimates go from 100Mbps to 2Gbps. The spread remains high due to the difficulty of accounting the traffic that would go towards an invalid route. At our scale, it is a drop in the ocean of packets.</p><p>It is worth mentioning that one provider experienced a substantial traffic shift due to many regional IPs announced as smaller subnets and not included in the Route Origin Attestation (ROA), a key resource of the RPKI environment. We noticed many important networks announcing invalids on Internet Exchange Points. We emailed Network Operating Centers and were happy to see the records got corrected in a matter of days.</p>
    <div>
      <h3>Let’s talk about tooling!</h3>
      <a href="#lets-talk-about-tooling">
        
      </a>
    </div>
    <p>There are two components: <b>GoRTR</b> and <b>OctoRPKI.</b> The big picture of our setup.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6i9O0FfELG2fiwgCeuD20F/fd2dba2364ad7676c2b409ab5b253ffe/octorpki.png" />
            
            </figure><p>OctoRPKI and GoRTR ecosystem diagram</p>
    <div>
      <h3><a href="https://github.com/cloudflare/gortr">GoRTR</a></h3>
      <a href="#">
        
      </a>
    </div>
    <p>As our network keeps growing, we needed a scalable solution to send the list of validated ROAs to our edge. Ideally using our CDN for caching the resources. We created <a href="https://github.com/cloudflare/gortr">GoRTR</a>, a small Go application which will fetch a JSON file using a format used by RPKI Validators. We made sure that it could be used with various servers and implemented cryptographic checks to ensure an untampered distribution. By default, it will fetch the list of prefixes available at <a href="https://rpki.cloudflare.com/rpki.json">rpki.cloudflare.com/rpki.json</a>.</p><p>You do not need to run your own validation software, just plug your RPKI-enabled router to GoRTR and start filtering. GoRTR will also expose a web server and Prometheus-type metrics. Nonetheless, if you want to run your own validation software, keep reading because OctoRPKI might be the solution for you. You can start GoRTR with Docker and plug your router to the port 8282 to receive a RTR feed:</p>
            <pre><code>$ docker run -ti -p 8282:8282 cloudflare/gortr</code></pre>
            
    <div>
      <h3><a href="https://github.com/cloudflare/cfrpki">OctoRPKI</a></h3>
      <a href="#">
        
      </a>
    </div>
    <p>If you want to control the validation of routes, we got you covered!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7rPI0KpOD6igaH2lO59NdS/e963487c84134dbb37f4c0d3de04bfdb/Asset-1_0.25x.png" />
            
            </figure><p>After a few months work, we released OctoRPKI. Behind an octopus logo, there is a RPKI Relying Party written in Go.</p>
    <div>
      <h3>Why did we build a validator?</h3>
      <a href="#why-did-we-build-a-validator">
        
      </a>
    </div>
    <p>The current ecosystem did not bring us joy, we needed RPKI Repository Delta Protocol (RRDP), a fully-fledged monitored validator subsystem and the ability to push only the final computed data to our storage cluster. We decided to build it in Go for multiple reasons. In exchange of a slightly increased overhead, we gained flexibility. There is a great amount of cryptographic resources and libraries for the Go language. And we are hoping this would benefit an already important community.</p><p>The <a href="https://github.com/cloudflare/cfrpki">repository</a> contains OctoRPKI plus a library to decode certificates, ROAs, manifests, etc. The code can start a synchronization with rsync and/or RRDP.</p><p>Similarly to GoRTR, it embeds an API to get the latest results of the synchronization and a Prometheus metrics endpoint to deploy alerting. Internally, we monitor the state of the validation using Prometheus. It is also providing data for a GraphQL API that will be released soon.</p>
    <div>
      <h3>You can start it with Docker.</h3>
      <a href="#you-can-start-it-with-docker">
        
      </a>
    </div>
    <p>The docker image provides a way to instantly run OctoRPKI and comes complete with four of the five Trust Anchor Locator (TAL) files needed to operate (AFRINIC, APNIC, LACNIC, and RIPE). The fifth is the ARIN TAL, so don’t forget to add the TAL from ARIN. You can start the process of downloading it at the following address: <a href="https://www.arin.net/resources/rpki/tal.html">www.arin.net/resources/rpki/tal.html</a>.</p>
            <pre><code>$ docker run -ti \
     -p 8080:8080 \
     -v $PWD/cache:/cache \
     -v path_to_arin_tal:/tals/arin.tal 
   cloudflare/octorpki</code></pre>
            <p>The results will be available on <a href="http://localhost:8080/output.json">http://localhost:8080/output.json</a>. To plug GoRTR to this file, use the <code>-cache URL</code> argument (you will need to load the public key which signs some fields in JSON).</p>
            <pre><code>$ gortr -cache http://localhost:8080/output.json -verify.key path-to-key</code></pre>
            <p>In conclusion, we hope these tools will help you deploy RPKI easily. Routing security is an important subject that should not be avoided. Looking forward to more networks joining this initiative and making the Internet more secure.We learned a lot about RPKI, from signing the routes on the five registries to validating cryptographically more than 60000 resources in a few seconds. We will keep working on making OctoRPKI and GoRTR always more stable and reliable. We look forward to your feedback!</p> ]]></content:encoded>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[RPKI]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cryptography]]></category>
            <guid isPermaLink="false">15Fah6FOjkWEgv8JgHcGOv</guid>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
        <item>
            <title><![CDATA[Concise Christmas Cryptography Challenges 2019]]></title>
            <link>https://blog.cloudflare.com/christmas-cryptography-challenges-2019/</link>
            <pubDate>Tue, 25 Dec 2018 17:42:02 GMT</pubDate>
            <description><![CDATA[ We've put together some Christmas Cryptography questions. Do you think you can solve them? ]]></description>
            <content:encoded><![CDATA[ <p>Last year <a href="/concise-post-christmas-cryptographic-challenges/">we published some crypto challenges</a> to keep you momentarily occupied from the festivities. This year, we're doing the same. Whether you're bored or just want to learn a bit more about the technologies that encrypt the internet, feel free to give these short cryptography quizzes a go.</p><p>We're withholding answers until the start of the new year, to give you a chance to solve them without spoilers. Before we reveal the answers; if you manage to solve them, we'll be giving the first 5 people to get the answers right some Cloudflare swag. Fill out your <a href="https://goo.gl/forms/KexYSIfTgVaiPPKK2">answers and details using this form</a> so we know where to send it.</p><p>Have fun!</p><p><b>UPDATE: This quiz is now closed.</b> Thank you to everyone who's played. We have received many responses, 15 of which got all the answers right; we will shortly be sending out some swag to those who got the answers right.</p><p><b>NOTE:</b> Hints, <i>now followed with solutions</i>, are below the questions, avoid scrolling too far if you want to avoid any spoilers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3nhuBXAXCdwxp6tYl5HUqt/eec550fa185800edd1bcec9183a5b47f/Family_Double_Dare_spaghetti_challenge-1.jpg" />
            
            </figure>
    <div>
      <h2>Challenges</h2>
      <a href="#challenges">
        
      </a>
    </div>
    
    <div>
      <h3>Client says Hello</h3>
      <a href="#client-says-hello">
        
      </a>
    </div>
    <p>Client says hello, as follows:</p><blockquote><p>00000c07ac01784f437dbfc70800450000f2560140004006db58ac1020c843c7f80cd1f701bbc8b2af3449b598758018102a72a700000101080a675bce16787abd8716030100b9010000b503035c1ea569d5f64df3d8630de8bdddd1152e75f528ae577d2436949ce8deb7108600004400ffc02cc02bc024c023c00ac009c008c030c02fc028c027c014c013c012009f009e006b0067003900330016009d009c003d003c0035002f000a00af00ae008d008c008b010000480000000b000900000663666c2e7265000a00080006001700180019000b00020100000d0012001004010201050106010403020305030603000500050100000000001200000017000052305655494338795157524c656d6443436c5246574651675430346754456c4f52564d674e434242546b51674e513d3d</p></blockquote><p>[<a href="https://gist.github.com/IcyApril/bb95c93a333aef24368242fe2af4c5ad">Raw puzzle without text wrap</a>]</p>
    <div>
      <h3>Time-Based One-Time Password</h3>
      <a href="#time-based-one-time-password">
        
      </a>
    </div>
    <p>A user has an authenticator device to generate one time passwords for logins to their banking website. The implementation contains a fatal flaw.</p><p>At the following times, the following codes are generated (all in GMT/UTC):</p><ul><li><p>Friday, 21 December 2018 16:29:28 - <b>084342</b></p></li><li><p>Saturday, 22 December 2018 13:11:53 - <b>411907</b></p></li><li><p>Tuesday, 25 December 2018 12:15:03 - <b>617041</b></p></li></ul><p>What code will be generated at precisely midnight of the 1st of January 2019?</p>
    <div>
      <h3>RPKI</h3>
      <a href="#rpki">
        
      </a>
    </div>
    <p>At Cloudflare, we just setup <a href="/rpki-details/">RPKI</a>: we signed a few hundred prefixes in order to reduce route leaks. But some of the prefixes hide a secret message. Find the ROAs that look different, decode the word!</p>
    <div>
      <h2>Hints</h2>
      <a href="#hints">
        
      </a>
    </div>
    
    <div>
      <h3>Client says Hello</h3>
      <a href="#client-says-hello">
        
      </a>
    </div>
    <p>This challenge has 3 hints, as follows:</p><ul><li><p>Challenge is based on a network capture</p></li><li><p><a href="/encrypted-sni/">https://blog.cloudflare.com/encrypted-sni/</a></p></li><li><p>What's weird about the Frame?</p></li></ul>
    <div>
      <h3>TOTP</h3>
      <a href="#totp">
        
      </a>
    </div>
    <p>The Time-Based One-Time Password Algorithm is described in <a href="https://tools.ietf.org/html/rfc6238">RFC 6238</a>, which was based of <a href="https://tools.ietf.org/html/rfc4226">RFC4226</a> (providing an algorithm for HOTP). The TOTP algorithm requires input of two important parameters, the time and a shared secret - could one be missing?</p><p>The implementation used to generate the TOTP codes for the challenge uses SHA-1 as a digest algorithm.</p>
    <div>
      <h3>RPKI</h3>
      <a href="#rpki">
        
      </a>
    </div>
    <p><b>Note:</b> This challenge will no longer be valid after mid-January 2019.</p><p>This challenge has 4 hints, as follows:</p><ul><li><p>Hint #0: Four or six? Probably six.</p></li><li><p>Hint #1: If only there was a way of listing only our IPs!</p></li><li><p>Hint #2: What is the only part of the ROA where we can hide information into</p></li><li><p>Hint #3: Subtract the reserve, the char will show itself</p></li></ul>
    <div>
      <h2>Solutions</h2>
      <a href="#solutions">
        
      </a>
    </div>
    <p>If you prefer video form, someone has created a YouTube video of the how to solve the problems, else the written solutions are below:</p>
    <div>
      <h3>Client says Hello</h3>
      <a href="#client-says-hello">
        
      </a>
    </div>
    <p>The string was (mostly) a capture from Wireshark of a Client Hello frame in TLS 1.2 handshake; as such, it reveals the Server Name where the connection is intended to go; in this case cfl.re.</p><p>There is a string suffixed to this hex stream which shouldn't be there; it's a base64 encoded string <code>R0VUIC8yQWRLemdCClRFWFQgT04gTElORVMgNCBBTkQgNQ==</code>. Decoding this string reveals:</p><blockquote><p>GET /2AdKzgBTEXT ON LINES 4 AND 5</p></blockquote><p>Accordingly; <a href="https://cfl.re/2AdKzgB">https://cfl.re/2AdKzgB</a> redirects to <a href="https://www.cloudflare.com/robots.txt">https://www.cloudflare.com/robots.txt</a>; on lines 4 and 5 is the phrase: "Dear robot be nice".</p><p>The GET request would obviously ordinarily not be appended to the Client Hello like this; however SNI information would be. You can find more about the work Cloudflare is doing to encrypt such information, so attackers cannot see which site you're visiting, in the following post: <a href="/esni/">Encrypting SNI: Fixing One of the Core Internet Bugs</a></p>
    <div>
      <h3>TOTP</h3>
      <a href="#totp">
        
      </a>
    </div>
    <p>For this part, I'm going to use the <a href="https://github.com/pyauth/pyotp">pyotp</a> library to demonstrate how the challenge is set-up:</p><blockquote><p>&gt;&gt;&gt; import pyotp&gt;&gt;&gt; totp = pyotp.TOTP('')&gt;&gt;&gt; print totp.at(1545409768)084342&gt;&gt;&gt; print totp.at(1545484313)411907&gt;&gt;&gt; print totp.at(1545740103)617041</p></blockquote><p>Note that the argument to the TOTP function is set to an empty string, this means that there is no secret in place; and the one time passwords are generated solely from a hash of the time. Accordingly, a TOTP with the timestamp generated at midnight on New Year is 301554.</p><p>Whilst this may seem like a somewhat incredulous position for a developer to end up in - searching GitHub, I was even able to find implementations that used the default secret (<i>base32secret3232</i>) for all users wanting to authenticate to a website. This means that any other user's One Time Password is valid for any other account, and the secret could likely be breached fairly easily (as it isn't randomly generated).</p>
    <div>
      <h3>RPKI</h3>
      <a href="#rpki">
        
      </a>
    </div>
    <p>Cloudflare can only generate ROAs based on their prefixes. The IPv6 prefixes are listed here: <a href="https://cloudflare.com/ips-v6">https://cloudflare.com/ips-v6</a>.</p><p>Using any RPKI validated prefix list (<a href="https://rpki.cloudflare.com/rpki.json">https://rpki.cloudflare.com/rpki.json</a>, or using the GUI of the RIPE’s RPKI Validator), test out our IPv6 prefixes. Some of them will appear coming from Reserved ASNs for Private Use:</p><ul><li><p>2803:f800:cfcf:cfcf:cfcf:cfcf:cfcf:1 - <b>B</b></p></li><li><p>2803:f800:cfcf:cfcf:cfcf:cfcf:cfcf:2 - <b>R</b></p></li><li><p>2803:f800:cfcf:cfcf:cfcf:cfcf:cfcf:3 - <b>A</b></p></li><li><p>2803:f800:cfcf:cfcf:cfcf:cfcf:cfcf:4 - <b>V</b></p></li><li><p>2803:f800:cfcf:cfcf:cfcf:cfcf:cfcf:5 - <b>O</b></p></li></ul><p>Subtract 4200000000, it will give you one byte for each character of the secret word.</p><p>Repeat until the word is decoded.</p><p><i>Interested in helping build a better internet and drive security online? </i><a href="https://www.cloudflare.com/careers/"><i>Cloudflare is hiring</i></a><i>.</i></p> ]]></content:encoded>
            <category><![CDATA[Cryptography]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Holidays]]></category>
            <category><![CDATA[Fun]]></category>
            <guid isPermaLink="false">68O8V73wAfSlxmCs2J88C7</guid>
            <dc:creator>Junade Ali</dc:creator>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
        <item>
            <title><![CDATA[RPKI and BGP: our path to securing Internet Routing]]></title>
            <link>https://blog.cloudflare.com/rpki-details/</link>
            <pubDate>Wed, 19 Sep 2018 12:01:00 GMT</pubDate>
            <description><![CDATA[ This article will talk about our approach to network security using technologies like RPKI to sign Internet routes and protect our users and customers from route hijacks and misconfigurations. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>This article will talk about our approach to <a href="https://www.cloudflare.com/network-security/">network security</a> using technologies like RPKI to sign Internet routes and protect our users and customers from route hijacks and misconfigurations. We are proud to announce we have started deploying active filtering by using RPKI for routing decisions and signing our routes.</p><p>Back in April, articles including our blog post on <a href="/bgp-leaks-and-crypto-currencies/">BGP and route-leaks</a> were reported in the news, highlighting how IP addresses can be redirected maliciously or by mistake. While enormous, the underlying routing infrastructure, the bedrock of the Internet, has remained mostly unsecured.</p><p>At Cloudflare, we decided to secure our part of the Internet by protecting our customers and everyone using our services including our recursive resolver <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">1.1.1.1</a>.</p>
    <div>
      <h3>From BGP to RPKI, how do we Internet ?</h3>
      <a href="#from-bgp-to-rpki-how-do-we-internet">
        
      </a>
    </div>
    <p>A prefix is a range of IP addresses, for instance, <code>10.0.0.0/24</code>, whose first address is <code>10.0.0.0</code> and the last one is <code>10.0.0.255</code>. A computer or a server usually have one. A router creates a list of reachable prefixes called a routing table and uses this routing table to transport packets from a source to a destination.  </p><p>On the Internet, network devices exchange routes via a protocol called <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">BGP</a> (Border Gateway Protocol). BGP enables a map of the interconnections on the Internet so that packets can be sent across different networks to reach their final destination. BGP binds the separate networks together into the Internet.</p><p>This dynamic protocol is also what makes Internet so resilient by providing multiple paths in case a router on the way fails. A BGP announcement is usually composed of a <i>prefix</i> which can be reached at a <i>destination</i> and was originated by an <i>Autonomous System Number</i> (ASN).</p><p>IP addresses and Autonomous Systems Numbers are allocated by five Regional Internet Registries (RIR): <a href="https://afrinic.net/">Afrinic</a> for Africa, <a href="https://www.apnic.net/">APNIC</a> for Asia-Pacific, <a href="https://www.arin.net">ARIN</a> for North America, <a href="https://www.lacnic.net">LACNIC</a> for Central and South America and <a href="https://www.ripe.net">RIPE</a> for Europe, Middle-East and Russia. Each one operates independently.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3fnGjueGh1e3tInixUT2zc/49f63762c184aacac85079da9e50b744/rirs-01.png" />
            
            </figure><p>With more than 700,000 IPv4 routes and 40,000 IPv6 routes announced by all Internet actors, it is difficult to know who owns which resource.</p><p>There is no simple relationship between the entity that has a prefix assigned, the one that announces it with an ASN and the ones that receive or send packets with these IP addresses. An entity owning <code>10.0.0.0/8</code> may be delegating a subset <code>10.1.0.0/24</code> of that space to another operator while being announced through the AS of another entity.</p><p>Thereby, a route leak or a route hijack is defined as the illegitimate advertisement of an IP space. The term <i>route hijack</i> implies a malicious purpose while a route leak usually happens because of a misconfiguration.</p><p>A change in route will cause the traffic to be redirected via other networks. Unencrypted traffic can be read and modified. HTTP webpages and DNS without DNSSEC are sensitive to these exploits.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wdvXA5fV7m7z6e5Xdtqx2/adce2d2dc0b79010b7c4a3e353fec50a/bgp-hijacking-technical-flow-1.png" />
            
            </figure><p>You can learn more about BGP Hijacking in our <a href="https://www.cloudflare.com/learning/security/glossary/bgp-hijacking/">Learning Center</a>.</p><p>When an illegitimate announcement is detected by a peer, they usually notify the origin and reconfigure their network to reject the invalid route.Unfortunately, the time to detect and act upon may take from a few minutes up to a few days, more than enough to steal cryptocurrencies, <a href="https://en.wikipedia.org/wiki/DNS_spoofing">poison a DNS</a> cache or make a website unavailable.</p><p>A few systems exist to document and prevent illegitimate BGP announcements.</p><p><b>The Internet Routing Registries (IRR)</b> are semi-public databases used by network operators to register their assigned Internet resources. Some database maintainers do not check whether the entry was actually made by the owner, nor check if the prefix has been transferred to somebody else. This makes them prone to error and not completely reliable.</p><p><b>Resource Public Key Infrastructure (RPKI)</b> is similar to the IRR “route” objects, but adding the authentication with cryptography.</p><p>Here’s how it works: each RIR has a root certificate. They can generate a signed certificate for a Local Internet Registry (LIR, a.k.a. a network operator) with all the resources they are assigned (IPs and ASNs). The LIR then signs the prefix containing the origin AS that they intend to use: a ROA (Route Object Authorization) is created. ROAs are just simple X.509 certificates.</p><p>If you are used to <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL/TLS certificates</a> used by browsers to authenticate the holder of a website, then ROAs are the equivalent in the Internet routing world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/790gd4F1LviExZpxP0HAFk/f1430645a7c769788129fb47c3b9dca6/roas_3x-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tQYkBINEbYbCSl7cM5Jvw/568c706d6256d0f44740aecb28297cd6/routing-rpki-2-01.png" />
            
            </figure>
    <div>
      <h3>Signing prefixes</h3>
      <a href="#signing-prefixes">
        
      </a>
    </div>
    <p>Each network operator owning and managing Internet resources (IP addresses, Autonomous System Numbers) has access to their Regional Internet Registry portal. Signing their prefixes through the portal or the API of their RIR is the easiest way to start with RPKI.</p><p>Because of our global presence, Cloudflare has resources in each of the 5 RIR regions. With more than 800 prefix announcements over different ASNs, the first step was to ensure the prefixes we were going to sign were correctly announced.</p><p>We started by signing our less used prefixes, checked if the traffic levels remained the same and then signed more prefixes. Today about 25% of Cloudflare prefixes are signed. This includes our critical DNS servers and our <a href="https://one.one.one.one">public 1.1.1.1 resolver</a>.</p>
    <div>
      <h3>Enforcing validated prefixes</h3>
      <a href="#enforcing-validated-prefixes">
        
      </a>
    </div>
    <p>Signing the prefixes is one thing. But ensuring that the prefixes we receive from our peers match their certificates is another.</p><p>The first part is validating the certificate chain. It is done by synchronizing the RIR databases of ROAs through rsync (although there are some new proposals regarding <a href="https://tools.ietf.org/html/rfc8182">distribution over HTTPS</a>), then check the signature of every ROA against the RIR’s certificate public key. Once the valid records are known, this information is sent to the routers.</p><p>Major vendors support a protocol called <a href="https://tools.ietf.org/html/rfc6810">RPKI to Router Protocol</a> (abbreviated as RTR). This is a simple protocol for passing a list of valid prefixes with their origin ASN and expected mask length. However, while the RFC defines 4 different secure transport methods, vendors have only implemented the insecure one. Routes sent in clear text over TCP can be tampered with.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ahyNsczbXfzaYtuvvbJ6g/2bf47a4a24b03da433a29a456725cce3/RPKI-diagram-_3x-2.png" />
            
            </figure><p>With more than 150 routers over the globe, it would be unsafe to rely on these cleartext TCP sessions over the insecure and lossy Internet to our validator. We needed local distribution on a link we know secure and reliable.</p><p>One option we considered was to install an RPKI RTR server and a validator in each of our 150+ datacenters, but doing so would cause a significant increase in operational cost and reduce debugging capabilities.</p>
    <div>
      <h4>Introducing GoRTR</h4>
      <a href="#introducing-gortr">
        
      </a>
    </div>
    <p>We needed an easier way of passing an RPKI cache securely. After some system design sessions, we settled on distributing the list of valid routes from a central validator securely, distribute it via our own <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">Content Delivery Network</a> and use a lightweight local RTR server. This server fetches the cache file over HTTPS and passes the routes over RTR.</p><p>Rolling out this system on all our PoPs using automation was straightforward and we are progressively moving towards enforcing strict validation of RPKI signed routes everywhere.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ztRweRuwqRgBnTauHI0P9/215d2f4b6ee60a54a26956d55e3f3839/gortr-2-01.png" />
            
            </figure><p>To encourage adoption of Route Origin Validation on the Internet, we also want to provide this service to everyone, for free. You can already download our <a href="https://github.com/cloudflare/gortr">RTR server</a> with the cache behind Cloudflare. Just configure your <a href="https://www.juniper.net/documentation/en_US/junos/topics/topic-map/bgp-origin-as-validation.html">Juniper</a> or <a href="https://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r6-1/routing/configuration/guide/b-routing-cg-asr9k-61x/b-routing-cg-asr9k-61x_chapter_010.html#concept_A84818AD41744DFFBD094DA7FCD7FE8B">Cisco</a> router. And if you do not want to use our file of prefixes, it is compatible with the RIPE RPKI Validator Export format.</p><p>We are also working on providing a public RTR server using our own <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum service</a> so that you will not have to install anything, just make sure you peer with us! Cloudflare is present on many Internet Exchange Points so we are one hop away from most routers.</p>
    <div>
      <h3>Certificate transparency</h3>
      <a href="#certificate-transparency">
        
      </a>
    </div>
    <p>A few months ago, <a href="/author/nick-sullivan/">Nick Sullivan</a> introduced our new <a href="/introducing-certificate-transparency-and-nimbus/">Nimbus Certificate Transparency Log</a>.</p><p>In order to track the emitted certificates in the RPKI, our Crypto team created a new Certificate Transparency Log called <a href="https://ct.cloudflare.com/logs/cirrus">Cirrus</a> which includes the five RIRs root certificates as trust anchors. Certificate transparency is a great tool for detecting bad behavior in the RPKI because it keeps a permanent record of all valid certificates that are submitted to it in an append-only database that can’t be modified without detection. It also enables users to download the entire set of certificates via an HTTP API.</p>
    <div>
      <h3>Being aware of route leaks</h3>
      <a href="#being-aware-of-route-leaks">
        
      </a>
    </div>
    <p>We use services like <a href="https://www.bgpmon.net">BGPmon</a> and other public observation services extensively to ensure quick action if some of our prefixes are leaked. We also have internal BGP and BMP collectors, aggregating more than 60 millions routes and processing live updates.</p><p>Our filters make use of this live feed to ensure we are alerted when a suspicious route appears.</p>
    <div>
      <h3>The future</h3>
      <a href="#the-future">
        
      </a>
    </div>
    <p>The <a href="https://blog.benjojo.co.uk/post/are-bgps-security-features-working-yet-rpki">latest statistics</a> suggest that around 8.7% of the IPv4 Internet routes are signed with RPKI, but only 0.5% of all the networks apply strict RPKI validation.Even with RPKI validation enforced, a BGP actor could still impersonate your origin AS and advertise your BGP route through a malicious router configuration.</p><p>However that can be partially solved by denser interconnections, that Cloudflare already has through an extensive network of private and public interconnections.To be fully effective, RPKI must be deployed by multiple major network operators.</p><p>As said by <a href="http://instituut.net/~job/">Job Snijders</a> from NTT Communications, who’s been at the forefront of the efforts of securing Internet routing:</p><blockquote><p>If the Internet's major content providers use RPKI and validate routes, the impact of BGP attacks is greatly reduced because protected paths are formed back and forth. It'll only take a small specific group of densely connected organizations to positively impact the Internet experience for billions of end users.</p></blockquote><p>RPKI is not a bullet-proof solution to securing all routing on the Internet, however it represents the first milestone in moving from trust based to authentication based routing. Our intention is to demonstrate that it can be done simply and cost efficiently. We are inviting operators of critical Internet infrastructure to follow us in a large scale deployment.</p><p><a href="/subscribe/"><i>Subscribe to the blog</i></a><i> for daily updates on our announcements.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1H1JDnSWx28sdAjdF3sd0Z/b5425cf515b60c2c3a9be6b2420d8a3b/CRYPTO-WEEK-banner_2x.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Crypto Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[RPKI]]></category>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[Cryptography]]></category>
            <guid isPermaLink="false">2D6tCrWBtiucUXYsoEFWJZ</guid>
            <dc:creator>Jérôme Fleury</dc:creator>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
        <item>
            <title><![CDATA[African traffic growth and predictions for the future]]></title>
            <link>https://blog.cloudflare.com/african-traffic-growth-and-predictions-for-the-future/</link>
            <pubDate>Sun, 19 Aug 2018 17:00:00 GMT</pubDate>
            <description><![CDATA[ Looking back at our historical data, we realized how much the Internet and Cloudflare grew. With more than 150 data centers, 10 percent of web-based applications, customers everywhere around the world, from the tiny islands in the Pacific to the big metropolises. ]]></description>
            <content:encoded><![CDATA[ <p>Looking back at our historical data, we realized how much the Internet and Cloudflare grew. With more than 150 datacenters, 10 percent of web-based applications, customers everywhere around the world, from the tiny islands in the Pacific to the big metropolises, we have an Internet landscape of almost every country and continent.</p><p>Cloudflare’s mission is to help build a better Internet. To do that we operate datacenters across the globe. By having datacenters close to end user we provide a fast, secure experience for everyone. Today I’d like to talk about our datacenters in Africa and our plans to serve a population of 1.2 billion people over 58 countries.</p><p>Internet penetration in developed countries skyrocketed since the 2000s, Internet usage is growing rapidly across Africa. We are seeing a 4% to 7% increase in traffic month on month. As of July 2018, we have 8 datacenters on the African Continent:</p><ul><li><p><a href="/amsterdam-to-zhuzhou-cloudflare-global-network/">Angola</a></p></li><li><p><a href="/curacao-and-djibouti/">Djibouti</a></p></li><li><p><a href="/cairo/">Egypt</a></p></li><li><p><a href="/mombasa-kenya-cloudflares-43rd-data-center/">Kenya</a></p></li><li><p><a href="/durban-and-port-louis/">Mauritius</a></p></li><li><p>Three in <a href="/cape-town-south-africa/">South Africa</a></p></li></ul><p>While we see changes on the horizon, the majority of Internet content providers are located in North America and Western Europe. This means that only the billion people living in those areas close to the content they are trying to reach. When it comes to Africa, submarine cables will usually bring back the packets to Europe to hubs like Marseille, Paris, London, Lisbon and sometimes Frankfurt or Amsterdam, adding precious milliseconds, slowing down communications.</p><p>By setting up datacenters on the African continent, Cloudflare is able to serve content locally, increasing download speed in the region, improving the end-user experience, and ultimately increasing Internet usage.</p>
    <div>
      <h3>Growth of a continent</h3>
      <a href="#growth-of-a-continent">
        
      </a>
    </div>
    <p>We wondered if the Internet usage increased when we set-up a datacenter in a region which was previously not well served.</p><p>It was surprising to see a fast growth in the following months in each of the countries we turn on our equipment. We took into account bandwidth and also quantity of information exchanged. The increase in bandwidth usually leads to an increase in usage.</p>
    <div>
      <h4>Why is bandwidth increasing with lower latency?</h4>
      <a href="#why-is-bandwidth-increasing-with-lower-latency">
        
      </a>
    </div>
    <p>Bandwidth is the maximum rate information can be transferred over a link. The interpretation of maximum depends on the type of transmission.</p><p>The explanation why the rate is dependent on latency comes from the TCP protocol specification on which run most of the web applications. Every transmission ends with an acknowledgement, to determine if the data was correctly received. The next transmission will begin after the sender receives the acknowledgement. This means while the acknowledgement is transmitting, nothing is actually being received. The difference of data received over time is the transfer rate.</p><p>This is summarized in the following diagram:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ciNQ7m8gZojOdxqjY06qQ/ed567ec2fe56af7147defcbd446cebff/rtt-explained-01.png" />
            
            </figure><p>With the most common algorithms, the amount of data sent before an acknowledgment increases until an error appears. Any link will drop packets: whether there is a transmission issue (wireless and perturbations) or a processing issue (router dropping packets to reduce load). This contributes never reaching the maximum bandwidth of a link. This is why above 80 milliseconds latency, performances start to worsen drastically. Coast to coast in the USA is around 70 milliseconds. Paris to London is 10 milliseconds. <a href="https://en.wikipedia.org/wiki/Performance-enhancing_proxy#Split_TCP">Satellites connections implement proxies</a> to allow sustainable throughput despite 600 milliseconds round-time-trip.</p>
    <div>
      <h4>Why is the amount of requests increasing with higher bandwidth?</h4>
      <a href="#why-is-the-amount-of-requests-increasing-with-higher-bandwidth">
        
      </a>
    </div>
    <p>The explanation is behavioral. If an Internet connection is slow and frustrating, chances are we will use it only if we are forced to. While getting access to the content immediately, people are likely to fetch more content and click on links.</p><p>The following chart shows the growth of requests from a country after every datacenter turn up. Traffic is normalized on the latest value (July 2018).</p><p>Djibouti shows the biggest increase in traffic after the launch.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4VIwrGIHlRyRbaCXrbgRY4/d846c2b08f39785675c83b173be10dd9/download--34-.png" />
            
            </figure><p>For the rest of the continent, we are seeing a steady increase in delivered traffic over the last four years.</p><p>Overall, Sierra Leone is the country which grew the most at around 8% per month. At the opposite scale, Algeria only increased its traffic by 2% per month. The mean of all those countries is 6.2% per month, which is also the Internet traffic growth of South Africa.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6tFISugklVl4XNn6Saog16/8909fb565dbb7f6863e5d064d07a8488/download.png" />
            
            </figure><p>In comparison to Europe, North America, it will take, at the current rate, 4 years and 3 months for Africa to reach today’s traffic levels of those two continents. However, if Europe, North America keeps its current 4% growth rate, then the African continent will take approximately eight to twelve years to catch up.</p><p>Please note these estimations are not perfectly representative as Cloudflare only see a part of the Internet and the numbers also includes our growing base of customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2u37hoQ0UYOzqaGypdLXiI/4a713967a0ea8503559006ee923bb5d7/download--1--copy.png" />
            
            </figure><p>The units on the vertical axis represent the growth based on the initial ratio between Europe/USA/Canada and Africa.</p>
    <div>
      <h3>Latencies and inter-African routing</h3>
      <a href="#latencies-and-inter-african-routing">
        
      </a>
    </div>
    <p>We analyzed the latencies between Europe and African IP addresses that hit our edge. On the following Demer map from <a href="https://twitter.com/vastur">Vasco Asturiano</a>, the area of the country is exponentially proportional to the response time in milliseconds.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/rp3vLWEat239h6Mr9h9E1/77fb6f190611655933d05b53e08dd10e/quadratic-3-01.png" />
            
            </figure><p>All the coastal Africa is well connected with submarines cables. The only exception is Eritrea, where the main provider (EriTel) which uses <a href="https://bgp.he.net/AS30987#_peers">two satellite providers</a> for its outbound links.</p><p>The island of <a href="https://en.wikipedia.org/wiki/Saint_Helena">Saint Helena</a> is on the path of the future <a href="https://en.wikipedia.org/wiki/SAex">SAex cable</a>, but the only connection at the moment for its 5000 inhabitants is through satellite, causing a latency of 600ms.Central African Republic also uses satellite or connections through Cameroon.</p><p>On average a packet round trip from Northern Africa to Europe will take around 50-100ms while a round trip from the South will take 250ms.</p><p>Regarding inter-African routing, Africa has only a limited number of cities where interconnection happens successfully: Johannesburg in South Africa, Nairobi in Kenya, and Djibouti with datacenters and internet exchange points. The rest of the continent is mostly split between providers which will interconnect in Europe or Asia. Chances are, a user in Cameroon talking to a user in Ghana will likely go through Paris.</p><p>Using RIPE Atlas, we are able to show inter-provider routing usually happens in Europe. Only one traceroute showed packets being exchanged in South Africa.</p><p>Traceroute to two Ghana Atlas probes from other Atlas Probes</p><p>To Ghana only via Europe</p><p>To Ghana with one through South Africa</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YaiQ67eE243NRqGLV00nU/6a7bf5e7965daef78e5f4375e1b15713/Screen-Shot-2018-07-27-at-2.56.37-PM.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bxQ2OFyFziSF6Jl4q8iVY/591cef69dd65c7e6ee33ebf54157fc35/Screen-Shot-2018-07-27-at-2.58.50-PM.png" />
            
            </figure><p>Cloudflare and many network operators are using extensively RIPE Atlas to determine performance and troubleshoot issues. If you want to help us improve Internet quality in Africa, become a <a href="https://atlas.ripe.net/get-involved/become-a-host/">probe host here</a>.</p><p>What you may be wondering is: what are the countries in Europe that route the African traffic? We are using an anycast network ; when a user fetch a website on Cloudflare, the packets will take the shortest path seen by the router to reach its destination. In telecommunications, the shortest path does necessarily mean geographical proximity. The selection metric of a path usually involve cost and performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wwTGcYdBEqmvmFeYow5dt/f3622ad794411413071b1ad34b5390bc/closest-routing-3-01.png" />
            
            </figure><p>An anycast address will have the same metric everywhere on our side. This mean a service provider having links to London and Paris will see our IP addresses originating from London datacenter and Paris datacenter. The choice between the two will only be depending on metrics set by the provider: will it cost more to reach London?</p><p>Cloudflare has a significant number of points of presence to be able to show small metric differences. Due to the density of its network in Europe, it is common to have datacenters one hop away from each others (London and Paris, Paris and Amsterdam). Our analysis of the next-hop will show a provider’s preference.</p><p>In the case of Africa, a provider can rent capacity on submarine cable to a city, for instance Lisbon, Paris, London. Ideally, the provider wants to maximize the resources it can obtain without adding more hops (costlier).</p><p>Paris, London, Amsterdam and Frankfurt have a lot of content providers and interconnections options, the differences are going to be on the content. One major bias will be the language: France will have more francophone content hosted in Parisian datacenters, it also helps running operations to if both parties speak French.</p><p>As an example case: if Paris is chosen, for the content that can only be found in London, another provider will carry the packets to London from Paris, adding one hop to the path, reducing preference. We will see the landing point in Paris.</p><p>Why isn’t the provider getting a link to London? On thing to know is any Internet link has a flat rate price plus a variable rate based on consumption.</p><p>Bandwidth within major European cities is among the cheapest in the world. The flat rate for submarine capacity is high, as a result, the quantity of content that is available from London for cheaper than Paris has to make up the difference.</p><p>If you are interested to know more about the costs of bandwidth around the world, check out this <a href="/bandwidth-costs-around-the-world/">article</a> by Nitin Rao.</p><p>The following map represents the most common Cloudflare datacenter reached for each country. The countries filled with color are where Cloudflare datacenters are. The border color indicates the destination country.</p><p>As aforementioned, we can notice most of the French-speaking countries will tend to go towards our datacenter in Paris. South Africa remains well connected with its neighbors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4SfdVHYvFBqpNVqYZ3F6QW/035de0673a98e5dd4e35a17969d7c60f/netmap-future-01-02.png" />
            
            </figure>
    <div>
      <h3>Where is the content hosted?</h3>
      <a href="#where-is-the-content-hosted">
        
      </a>
    </div>
    <p>Previously, we mentioned there are some content providers in South Africa and Djibouti. We took a look at the popular news and banking websites.</p><p>Over the top 200 origins of the websites (Alexa ranking) for African countries in 2017, only 42 were attached to an African country and only 10 among those were serving non-education/government content (news websites, banks).They were located mostly in South Africa and Zimbabwe.</p><p>We also took a look at our 10 millions zones behind Cloudflare. The ones that are using Afrinic IPs are hosted in the following countries:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3gh1DPSs6B9fTN7JfklFtP/f6f0bba7751fe345015e6e7be32dacf4/Where-are-Afrinic-IPs-used-for-content-hosted-_.png" />
            
            </figure>
    <div>
      <h3>What about IPv6?</h3>
      <a href="#what-about-ipv6">
        
      </a>
    </div>
    <p>Only four countries out of sixty four are using IPv6 in a measurable way. Egypt (1%), Kenya (2%), Gabon (2%) and Zimbabwe (9%). In each of these countries we found that only one provider that deployed IPv6 at any significant scale. Since the beginning of the year, IPv6 usage in Egypt has doubled. In Gabon, a major provider rolled IPv6 at the end of December 2017.</p><p>As Mathieu Paonessa from <a href="https://www.gva.africa">Group Vivendi Afrique</a> told us, “Gabon went from 0% to 2% IPv6 in only 9 months, following the opening of our CanalBox Gabon FTTH service.”</p><p>The timeline is similar with a small ISP in Kenya and has been increasing steadily. We can maybe hope they double their IPv6 usage by the end of 2018.</p><p>Compared to the rest of the world, Belgium is still ahead with 37%, followed by India at 35%. Most European countries are above 10%. USA is 22% and Canada is 15%.</p><p>One explanation for the small number of deployments is the size of the remaining IPv4 pool of addresses.</p><p>As of July 2018, there were 36,245 /24 available (approximately 9.2 millions IPs). The total Afrinic size is 6 /8 (approximately 100 millions IPs). 9% are left.</p><p>The following graphs shows the allocations and usage of each /24 in the Afrinic allocations.</p><p>This is the Hilbert graph of <a href="https://www.afrinic.net/en/services/statistics/ipv4-exhaustion">Afrinic IPv4 exhaustion</a>. It was inspired by <a href="https://blog.benjojo.co.uk/post/scan-ping-the-internet-hilbert-curve">Ben Cartwright-Cox’s blog post</a> and used <a href="https://github.com/robertdavidgraham/masscan">masscan</a> and <a href="https://github.com/measurement-factory/ipv4-heatmap">ipv4-heatmap</a>.</p><p>Prefix</p><p>Announced (yellow) vs Available (green) vs Reserved (red)</p><p>Response to ICMP (blue = low reply, red = all reply)</p><p>41.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1RmAbftnAhUS7Mkc2LdJc5/2867ce9df1d1f6858ad384f658e1b593/map41-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lTX5rXx3Lzthnk8MN0vv5/a4253031f10ce0e955208574ff728afa/map41.png" />
            
            </figure><p>102.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5qn1py5OClbadrNJ9zuEHF/2dd4153354b7593f90177848fa267a86/map102-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/zw4wHCAQVSufm1HZ0VSJl/0ef86e9ffd79ab50249a13a045efc1dc/map102.png" />
            
            </figure><p>105.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tDy8t1ylwXWbIzfFyKbhT/20632f4194c652f9aab5fcfee0f7b650/map105-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2N3f0eGuSJxzhStBg7vcoI/5b45cf0cd1362b747518361ebe5c405a/map105.png" />
            
            </figure><p>154.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3eOQcOyGR64yPlkzdvv4uW/072a870d72befee3b8c0f65f23f805ad/map154-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7wnzCiX7ZaIVTaPcRVnCvB/cdd9480357bc2570af9486ef327ff1e4/map154.png" />
            
            </figure><p>196.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1YJf8gZQ6GztPd1gOoJf42/b4e28952b1a126a89490db832b091156/map196-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HZaKdYdPaUcApijNKYIML/7966e4adbc26e47dcddb568d5edfbcdd/map196.png" />
            
            </figure><p>197.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5r15KVHHw01taG7bS1jJhV/9877114d17894a412f0034dbee05fff3/map197-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5hojDXIusm5n3P93CdSnUN/6714b46930f34c2144c6ecedeaf4087b/map197.png" />
            
            </figure><p>We notice that even if allocated, some blocks remain dark. 102.0.0.0/8 remains the range with the most IP space left in the world.</p>
    <div>
      <h3>More deployments coming soon</h3>
      <a href="#more-deployments-coming-soon">
        
      </a>
    </div>
    <p>Africa is the largest continent on earth, yet it is very lagging behind on Internet connectivity and traffic levels. Historically it's been entirely relying on its European interconnections. However we predict that its traffic will outgrow EU and US by 2027. This will be enabled by the fast deployment of local content, IPv6, and alternative submarine cables.</p><p>We are working on deploying even more points of presence in Africa and increasing our current capacity in the existing ones. Fifteen new locations in the African continent are part of our global expansion plans. These include: Algeria (Algiers), Cameroon (Yaoundé), Congo (Kinshasa), Côte d’Ivoire (Abidjan), Egypt (Alexandria), Ghana (Accra), Kenya (Nairobi), La Réunion (Sainte-Marie), Madagascar (Antananarivo), Morocco (Casablanca), Nigeria (Lagos), Tanzania (Dar es Salaam), Tunisia (Tunis), Uganda (Kampala), and Zimbabwe (Harare)</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OFs5KlBhxHz98W558L6nv/07bf1d99b7457379ccaeb37f3dca8480/netmap-future-01-03.png" />
            
            </figure><p><i>Header image </i><a href="https://www.flickr.com/photos/south-african-tourism/2418525776/in/photostream/"><i>source</i></a></p> ]]></content:encoded>
            <category><![CDATA[Africa]]></category>
            <category><![CDATA[South Africa]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Data Center]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Fun]]></category>
            <guid isPermaLink="false">4Ii5SgXYvasO1QOA7m31Vz</guid>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
        <item>
            <title><![CDATA[BGP leaks and cryptocurrencies]]></title>
            <link>https://blog.cloudflare.com/bgp-leaks-and-crypto-currencies/</link>
            <pubDate>Tue, 24 Apr 2018 22:31:13 GMT</pubDate>
            <description><![CDATA[ Over the few last hours, a dozen news stories have broken about how an attacker attempted (and perhaps managed) to steal cryptocurrencies using a BGP leak. ]]></description>
            <content:encoded><![CDATA[ <p>Over the few last hours, a <a href="https://www.forbes.com/sites/thomasbrewster/2018/04/24/a-160000-ether-theft-just-exploited-a-massive-blind-spot-in-internet-security/">dozen news stories have broken</a> about how an attacker attempted (and <a href="https://twitter.com/killeswagon/status/988795209361252357">perhaps managed</a>) to steal cryptocurrencies using a BGP leak.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4C9febUAV4dp0191tLDXmU/a8d8614a63ad59c6b83ee26c5ba23ae1/6818192898_c132e81824_z.jpg" />
            
            </figure><p><a href="https://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a> <a href="https://www.flickr.com/photos/77519207@N02/6818192898/in/photolist-EGDA1W-Ga795-6yLrTS-22PPou3-gi3qi-8S6vb4-bov2cY-dgBNxk-ba28ar-ebQUDY-acXCjq-zZppue-j8nDM9-78GCT9-zFTmT1-zFT1ME-a8iKNR-6Hbzuk-bmMV3X-6Hbt1t-HkBYhJ-h7mEUc-8kza6J-inYagg-PUtWHj-cMHLr-g1zfvy-emgRCp-262Z5jD-CLumQP-M13Veh-ur2aSQ-68UJQ1">image</a> by <a href="https://www.flickr.com/photos/77519207@N02/">elhombredenegro</a></p>
    <div>
      <h3>What is BGP?</h3>
      <a href="#what-is-bgp">
        
      </a>
    </div>
    <p>The Internet is composed of routes. For our DNS resolver <a href="https://cloudflare-dns.com/"><b>1.1.1.1</b></a> , we tell the world that all the IPs in the range <code>1.1.1.0</code> to <code>1.1.1.255</code> can be accessed at any Cloudflare PoP.</p><p>For the people who do not have a <a href="/think-global-peer-local-peer-with-cloudflare-at-100-internet-exchange-points/">direct link to our routers</a>, they receive the route via transit providers, who will deliver packets to those addresses as they are connected to Cloudflare and the rest of the Internet.</p><p>This is the normal way the Internet operates.</p><p>There are authorities (Regional Internet Registries, or RIRs) in charge of distributing IP addresses in order to avoid people using the same address space. Those are <a href="https://www.iana.org/">IANA</a>, <a href="https://www.ripe.net">RIPE</a>, <a href="https://www.arin.net">ARIN</a>, <a href="https://www.lacnic.net">LACNIC</a>, <a href="https://www.apnic.net">APNIC</a> and <a href="https://www.afrinic.net">AFRINIC</a>.</p>
    <div>
      <h3>What is a BGP leak?</h3>
      <a href="#what-is-a-bgp-leak">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2CRfX9GucawxrG5pGUXig7/2a352c32b739c1ed9c8006e63548f3fb/6385512087_802c680220_z.jpg" />
            
            </figure><p><a href="https://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a> <a href="https://www.flickr.com/photos/magnus_d/6385512087/">image</a> by <a href="https://www.flickr.com/photos/magnus_d/">Magnus D</a></p><p>The broad definition of a BGP leak would be IP space that is announced by somebody not allowed by the owner of the space. When a transit provider picks up Cloudflare's announcement of <code>1.1.1.0/24</code> and announces it to the Internet, we allow them to do so. They are also verifying using the RIR information that only Cloudflare can announce it to them.</p><p>Although it can get tricky checking all the announcements. Especially when there are <b>700,000+</b> routes on the Internet and chains of providers exchanging traffic between each other.</p><p>By their nature, route leaks are localized. The more locally connected you are, the smaller the risk of accepting a leaked route is.In order to be accepted over a legitimate route, the route has to be either:</p><ul><li><p>A smaller prefix (<code>10.0.0.1/32</code> = 1 IP vs <code>10.0.0.0/24</code> = 256 IPs)</p></li><li><p>Have better metrics than a prefix with the same length (shorter path)</p></li></ul><p>The cause of a BGP leak is usually a <b>configuration mistake</b>: a router suddenly announces the IPs it learned. Or smaller prefixes used internally for traffic engineering suddenly becoming public.</p><p>But sometimes it is done with a <b>malicious intent</b>. The prefix can be re-routed through in order to passively analyze the data. Or somebody can also set-up a service to reply illegitimately instead. This has <a href="/why-google-went-offline-today-and-a-bit-about/">happened before</a>.</p>
    <div>
      <h3>What happened today?</h3>
      <a href="#what-happened-today">
        
      </a>
    </div>
    <p>Cloudflare maintains a range of BGP collectors gathering BGP information from hundreds of routers around the planet.</p><p>Between approximately <b>11:05:00 UTC and 12:55:00 UTC today</b> we saw the following announcements:</p>
            <pre><code>BGP4MP|04/24/18 11:05:42|A|205.251.199.0/24|10297
BGP4MP|04/24/18 11:05:42|A|205.251.197.0/24|10297
BGP4MP|04/24/18 11:05:42|A|205.251.195.0/24|10297
BGP4MP|04/24/18 11:05:42|A|205.251.193.0/24|10297
BGP4MP|04/24/18 11:05:42|A|205.251.192.0/24|10297
...
BGP4MP|04/24/18 11:05:54|A|205.251.197.0/24|4826,6939,10297</code></pre>
            <p>Those are more specifics announcements of the ranges:</p><ul><li><p><code>205.251.192.0/23</code></p></li><li><p><code>205.251.194.0/23</code></p></li><li><p><code>205.251.196.0/23</code></p></li><li><p><code>205.251.198.0/23</code></p></li></ul><p>This IP space is allocated to <b>Amazon</b> (AS16509). But the ASN that announced it was <b>eNet Inc</b> (AS10297) to their peers and forwarded to <b>Hurricane Electric</b> (AS6939).</p><p>Those IPs are for <a href="https://ip-ranges.amazonaws.com/ip-ranges.json">Route53 Amazon DNS servers</a>. When you query for one of their client zones, those servers will reply.</p><p>During the two hours leak the servers on the IP range only responded to queries for <b>myetherwallet.com</b>. As some people noticed <a href="https://puck.nether.net/pipermail/outages/2018-April/011257.html">SERVFAIL</a>.</p><p>Any DNS resolver that was asked for names handled by Route53 would ask the authoritative servers that had been taken over via the BGP leak. This poisoned DNS resolvers whose routers had accepted the route.</p><p>This included <a href="https://cloudflare-dns.com/">Cloudflare DNS resolver 1.1.1.1</a>. We were affected in Chicago, Sydney, Melbourne, Perth, Brisbane, Cebu, Bangkok, Auckland, Muscat, Djibouti and Manilla. In the rest of the world, 1.1.1.1 worked normally.</p><blockquote><p>BGP hijack this morning affected Amazon DNS. eNet (AS10297) of Columbus, OH announced the following more-specifics of Amazon routes from 11:05 to 13:03 UTC today:205.251.192.0/24205.251.193.0/24205.251.195.0/24205.251.197.0/24205.251.199.0/24</p><p>— InternetIntelligence (@InternetIntel) <a href="https://twitter.com/InternetIntel/status/988792927068610561?ref_src=twsrc%5Etfw">April 24, 2018</a></p></blockquote><blockquote><p>Correction: the BGP hijack this morning was against AWS DNS not Google DNS. <a href="https://t.co/gp3VLbImpX">https://t.co/gp3VLbImpX</a></p><p>— InternetIntelligence (@InternetIntel) <a href="https://twitter.com/InternetIntel/status/988841601400270848?ref_src=twsrc%5Etfw">April 24, 2018</a></p></blockquote><p>For instance, the following query will return you legitimate Amazon IPs:</p>
            <pre><code>$ dig +short myetherwallet.com @205.251.195.239
54.192.146.xx</code></pre>
            <p>But during the hijack, it returned IPs associated with a <b>Russian provider</b> (AS48693 and AS41995). You did not need to accept the hijacked route to be victim of the attack, just use a DNS resolver that had been poisoned.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bG1XFBxbEJg1akpE14ZqA/7f7f971aa49bf367eab386b15b86a1cb/Screen-Shot-2018-04-24-at-1.55.12-PM.png" />
            
            </figure><p>If you were using HTTPS, the fake website would display a TLS certificate signed by an unknown authority (the domain listed in the certificate was correct but it was self-signed). The only way for this attack to work would be to continue and accept the wrong certificate. From that point on, everything you send would be encrypted but the attacker had the keys.</p><p>If you were already logged-in, your browser will send the login information in the cookie. Otherwise, your username and password would be sent if you typed them in on a login page.</p><p>Once the attacker got the login information, it used them on the legitimate website to transfer and steal Ethereum.</p>
    <div>
      <h3>Summary in pictures</h3>
      <a href="#summary-in-pictures">
        
      </a>
    </div>
    <p>Normal case</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7iaSnn0dekTUVCYRDPzZfe/61a16e2ffd729258c166b87375a06e3f/Slide1.png" />
            
            </figure><p>After a BGP route leak</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6llrWMviALPMBhNwM4M1pY/8be9b2d2dd921583999c27edc3e8f093/Slide2.png" />
            
            </figure>
    <div>
      <h3>Affected regions</h3>
      <a href="#affected-regions">
        
      </a>
    </div>
    <p>As previously mentioned, <b>AS10279</b> announced this route. But only some regions got affected. Hurricane Electric has a strong presence <b>Australia</b>, mostly due to Internet costs. <b>Chicago</b> was affected because AS10279 has a physical presence resulting in direct peering.</p><p>The following graph displays the number of packets received in the affected regions and unaffected regions (Y axis normalized). The drop is due to the authoritative server not responding to our requests anymore (it only responded for the one website and all other Amazon domains were ignored).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XMCIDZDvIhrjAknLNsI1L/2b4cbc6934e6a54418304570080cc16f/Screen-Shot-2018-04-24-at-1.38.03-PM.png" />
            
            </figure><p>The others transits used by eNet (CenturyLink, Cogent and NTT) did not seem to have accepted this route: a reason could be that they have filters and/or Amazon as a customer.eNet provides IP services, so one of their clients could have been announcing it.</p>
    <div>
      <h3>Is there somebody to blame?</h3>
      <a href="#is-there-somebody-to-blame">
        
      </a>
    </div>
    <p>As there are many actors involved, it is hard to determine fault. Actors involved:</p><ul><li><p>The ISP that announced a subnet it did not own.</p></li><li><p>The transit providers that did not check the announcement before relaying it.</p></li><li><p>The ISPs that accepted the route.</p></li><li><p>The lack of protection on the DNS resolvers and authority.</p></li><li><p>The phishing website hosted on providers in Russia.</p></li><li><p>The website that did not enforce legitimate TLS certificates.</p></li><li><p>The user that clicked continue even though the TLS certificate was invalid.</p></li></ul><p>Just like a <b>blockchain</b>, a network change is usually visible and archived. RIPE maintains a <a href="https://ripe.net/ris/">database for this use</a>.</p>
    <div>
      <h3>Could we fix this?</h3>
      <a href="#could-we-fix-this">
        
      </a>
    </div>
    <p>This is a difficult question to answer. There are proposals for securing BGP:Some terms can be added to the RIR databases, so a list of allowed sources can be generated:</p>
            <pre><code>$ whois -h whois.radb.net ' -M 205.251.192.0/21' | egrep '^route:|^origin:|source:' | paste - - - | sort
route:      205.251.192.0/23	origin:     AS16509	source:     RADB
route:      205.251.192.0/23	origin:     AS16509	source:     REACH</code></pre>
            <p>Setting up RPKI/ROA records with the RIR as a source of truth regarding to the path of a route, although not everyone create those records or validate them. IP and BGP were created a few decades ago, with different requirements in mind regarding integrity and authenticity (less routes).</p><p>A few things can be done on the upper levels of the network stack.</p><p>On <b>DNS</b>, you can use <a href="https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions">DNSSEC</a> to sign your records. The IPs returned by the fake DNS would not have been signed as they do not have the private keys.If you use Cloudflare as a DNS, you can enable DNSSEC within <a href="https://cloudflare.com/a/dns">a few clicks in the panel</a>.</p><p>On <b>HTTPS</b>, your browser will check the TLS certificate provided by the website. If <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security">HSTS</a> is enabled, the browser will require a valid certificate all the time. The only way to generate a legitimate TLS certificate for a domain would be to poison the cache of a non-DNSSEC DNS resolver of the Certificate Authority.</p><p><a href="https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities">DANE</a> provides a way of pinning certificates to a domain name using DNS.</p><p><a href="https://developers.cloudflare.com/1.1.1.1/dns-over-https/">DNS over HTTPS</a> would also allow to validate you are talking to the correct resolver in case the leak would be on the DNS resolvers instead of the DNS authority.</p><p>There is no perfect and unique solution. The more of these protections are in place, the harder it will be for a malicious actor to perform this kind of attack.</p> ]]></content:encoded>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[TLS]]></category>
            <category><![CDATA[HTTPS]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Cryptography]]></category>
            <guid isPermaLink="false">5SKcQGZX6y2OJMjWbFOiCN</guid>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Story of Two Outages]]></title>
            <link>https://blog.cloudflare.com/the-story-of-two-outages/</link>
            <pubDate>Thu, 07 Sep 2017 20:58:00 GMT</pubDate>
            <description><![CDATA[ Over the last two days, Cloudflare observed two events that had effects on global Internet traffic levels. Cloudflare handles approximately 10% of all Internet requests, so we have significant visibility into traffic from countries and networks across the world. ]]></description>
            <content:encoded><![CDATA[ <p>Over the last two days, Cloudflare observed two events that had effects on global Internet traffic levels. Cloudflare handles approximately 10% of all Internet requests, so we have significant visibility into traffic from countries and networks across the world.</p><p>On <b>Tuesday, September 5th</b>, the <a href="http://www.bbc.co.uk/news/world-africa-41174005">government of Togo decided to restrict Internet access</a> in the country following political protests. The government blocked social networks and rate-limited traffic, which had an impact on Cloudflare.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2OmU2w8ebfstlzzKL5WPhN/e5def60f2b97b5e185a6c4986716b432/download--11-.png" />
            
            </figure><p>This adds Togo to the list of countries like <a href="/how-syria-turned-off-the-internet/">Syria</a> (<a href="/how-syria-turned-off-the-internet-again/">twice</a>), <a href="https://www.theguardian.com/technology/2016/may/18/iraq-shuts-down-internet-to-stop-pupils-cheating-in-exams">Iraq</a>, <a href="https://labs.ripe.net/Members/emileaben/internet-access-disruption-in-turkey">Turkey</a>, <a href="https://en.wikipedia.org/wiki/Internet_censorship_in_the_Arab_Spring">Libya, Tunisia, etc</a> that have restricted or revoked Internet access.</p><p>The second event happened on <b>Wednesday, September 6th</b>, when a category 5 hurricane ravaged the Caribbean Islands.</p><p>The affected countries at the moment are:</p><ul><li><p>Anguilla</p></li><li><p>Antigua and Barbuda</p></li><li><p>British Virgin Islands</p></li><li><p>Puerto Rico</p></li><li><p>Saint Barthelemy</p></li><li><p>Saint Kitts and Nevis</p></li><li><p>Saint Martin</p></li><li><p>Sint Maarten</p></li><li><p>U.S. Virgin Islands</p></li></ul>
    <div>
      <h3>Losing the routes</h3>
      <a href="#losing-the-routes">
        
      </a>
    </div>
    <p>Most of the network cables are buried underground or laying at the bottom of the oceans but the hardware which relies on electricity is the first one to go down.</p><p>Cell towers sometime have their own power source thus allowing local phone calls but without a backbone no outside access is possible.</p><p>The Réseaux IP Européens (RIPE) is an Internet registry that collects routes announced over the Internet and can display the reachability of a country.A few networks went black in Saint Martin island. <a href="http://caraibe.orange.fr/cache/communiques_de_presse/cppassageirmailesnordsoir.pdf">Orange Caraïbes announced in a press release</a> that they repaired their network at 14:00 local time (18:00 UTC). On the graph we can see that it recovered at 19:00 UTC.</p>
            <figure>
            <a href="https://stat.ripe.net/widget/country-routing-stats#w.resource=mf&amp;w.zoom_start=1504548000000&amp;w.zoom_end=1504803900000&amp;w.comparison=no">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3yGTrhDaDYkHmjgXhOzENA/82ce323fa0be289106c36d5d05b6e7f6/Screen-Shot-2017-09-07-at-6.15.52-PM.png" />
            </a>
            </figure>
    <div>
      <h3>Losing the traffic</h3>
      <a href="#losing-the-traffic">
        
      </a>
    </div>
    <p>While the routers were going back online, the end-user traffic was severely reduced on the edge of Cloudflare.</p><p><b>Saint Kitts</b> did not go offline, but traffic was reduced at 08:00 am local time on Wednesday.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4GNoTirCxJJpldA5PuHHvF/50f78591aa6f3e3bf8a0203850102a9a/download--14-.png" />
            
            </figure><p>Both <b>Saint Martin</b> and <b>Sint Maarten</b> share the same island, which was one of the most affected by the hurricane. According to the <a href="https://www.nytimes.com/2017/09/06/world/americas/hurricane-irma-update.html">New York Times</a>, the island was badly hit at around 10:00 am local time on September 6th.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5z9WFjk2pIsNpP6H7ZG2NM/13f2682f46a935f715ce724eee856d90/download--16-.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tpj1nTuvIKb7AXd0K282T/6222d356e13894c5270327800c94e9d0/download--17-.png" />
            
            </figure><p><b>Antigua and Barbuda</b> started losing connectivity when the storm approached at 10:00 pm local time on Tuesday 5th September.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/QJty1NM1bkjiE7tYat2pD/38380f2d4d8991901534fa7041af71a2/download--12-.png" />
            
            </figure><p>The <b>U.S. Virgin Islands</b> and <b>Puerto Rico</b> were also strongly affected.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6GW5x4MhE6pwjl0phurkUo/de7b9910b74d391f49c55791cc8a2aa1/download--13-.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1kZe8gQM6ddxvjc6OIfs43/46087da00792942b9edbda30ce6a3cd8/download--15--1.png" />
            
            </figure><p>This final image shows the different times when the hurricane reaches every island:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TSLmsVk4kneTFO55BBnnq/84e9b819cd39f2ed55cd68d736750ead/download--18-.png" />
            
            </figure>
    <div>
      <h3>Conclusions</h3>
      <a href="#conclusions">
        
      </a>
    </div>
    <p>While the Internet was designed to sustain a nuclear attack and can re-route within seconds, islands are often isolated with fewer routing options for provider than on the mainland (3 or 4 instead of 10 or 15).During natural events like this one, the Internet is crucial as a resource for communication, since people use it to tell their family abroad they are safe and to find shelter, food and clean water.</p><p>If you live in these islands and have Internet access, <a href="http://google.org/crisismap/2017-irma">Google lists</a> the shelters and has <a href="https://www.google.org/publicalerts/alert?aid=883ff9045515341c&amp;hl=en">public alerts</a>.</p> ]]></content:encoded>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Hurricane]]></category>
            <guid isPermaLink="false">726jm3U65ScuWeNKbTdURy</guid>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
    </channel>
</rss>