Advancing Network Security at JANOG33
Discover how experts tackled critical network challenges at JANOG33, promoting global collaboration for a resilient internet.

The JANOG33 conference stood as a pivotal gathering for network operators across Japan and beyond, focusing on the evolving challenges of internet infrastructure. Held in early 2014, this event brought together professionals to discuss practical solutions for securing networks in an increasingly interconnected world. Presentations by Jan Žorž and Chris Grundemann from the Internet Society highlighted urgent issues like IPv6 deployment security and routing protocol vulnerabilities, offering actionable insights for operators worldwide.
The Importance of Operator Forums in Network Evolution
Network operator groups like JANOG play a crucial role in bridging the gap between theoretical research and real-world implementation. These forums provide a platform where engineers exchange experiences, troubleshoot common problems, and develop standards that enhance internet reliability. At JANOG33, the emphasis was on proactive measures to address emerging threats, reflecting the growing complexity of global networks.
Unlike formal standards bodies, operator meetings foster informal discussions that lead to rapid consensus on best practices. This approach has proven effective in tackling issues such as DDoS mitigation and address space management, ensuring that the internet remains robust against disruptions.
IPv6 Security: Building a Secure Future for Next-Gen Networks
Jan Žorž’s session delved into the security implications of IPv6 adoption, a protocol essential for the internet’s expansion beyond the exhausted IPv4 address pool. While IPv6 introduces improvements like IPsec integration, it also brings new vulnerabilities if not configured properly.
- Misconfigured Neighbor Discovery Protocol (NDP): NDP, IPv6’s equivalent to ARP, is susceptible to spoofing attacks, allowing attackers to redirect traffic or launch denial-of-service assaults.
- Extension Header Exploitation: IPv6’s flexible header structure can be abused to evade firewalls or conduct reconnaissance.
- Transition Mechanism Risks: Tools like 6to4 and Teredo create tunnels that often bypass security controls, exposing networks to external threats.
Žorž advocated for operators to implement Send-based security measures, such as RA Guard and DHCPv6 Shield, which validate router advertisements and prevent rogue device registration. He stressed the need for vendor interoperability testing to ensure these features work across diverse equipment.
Real-world case studies illustrated the consequences of neglecting IPv6 security. For instance, unsecured tunnels have been exploited in large-scale amplification attacks, amplifying traffic volumes exponentially. Operators were urged to audit their IPv6 implementations regularly, using tools like those from the IPv6 Security Best Practices guide.
Combating Routing Threats: Focus on BGP Vulnerabilities
Chris Grundemann’s talk shifted attention to Border Gateway Protocol (BGP), the backbone of internet routing. BGP’s trust-based model, while scalable, is prone to hijacks where malicious actors advertise false routes, diverting traffic to unauthorized destinations.
Key threats include:
- Prefix Hijacking: Announcing ownership of IP prefixes not belonging to the hijacker, often for spam or surveillance.
- Path Manipulation: Inserting false AS paths to influence traffic flow.
- Resource Exhaustion: Flooding route tables with bogus announcements, causing routers to crash.
Grundemann outlined the RPKI (Resource Public Key Infrastructure) as a cornerstone solution. RPKI enables origin validation, cryptographically proving that an IP prefix holder authorizes specific ASes to advertise it. Deployment progress, though gradual, shows promise with major providers validating routes in real-time.
Additionally, he promoted BGPsec, an extension for path validation, addressing interception attacks. While full adoption lags, partial implementations offer immediate benefits. Operators were encouraged to participate in SIDR (Secure Inter-Domain Routing) working groups to accelerate standardization.
Practical Strategies for Network Operators
Beyond specific technologies, both speakers emphasized operational best practices. Regular peering policy reviews, anomaly detection systems, and incident response planning form the bedrock of resilient networks.
| Strategy | Description | Benefits |
|---|---|---|
| Route Filtering | Apply strict prefix and AS-path filters at peering edges | Prevents invalid announcements |
| Monitoring Tools | Deploy BGPmon and similar for real-time visibility | Early detection of anomalies |
| Collaboration | Share threat intel via MXP or similar platforms | Collective defense |
| Training | Conduct workshops on secure configuration | Reduces human error |
These measures, when combined, significantly reduce the attack surface. Case studies from recent incidents demonstrated how filtered peering thwarted hijacking attempts, restoring normalcy within hours.
Internet Society’s Role in Global Security Initiatives
The Internet Society (ISOC) supports these efforts through advocacy, funding, and education. Programs like ION (Internet Society Outreach) bring experts to regional events like JANOG33, amplifying local impact.
ISOC’s chapters collaborate with national operator groups, tailoring global best practices to regional needs. This grassroots approach has accelerated IPv6 deployment and RPKI adoption in Asia-Pacific networks.
Challenges and Future Directions
Despite progress, challenges persist. Legacy equipment lacks modern security features, and coordination across autonomous networks remains fragmented. Future directions include:
- Automating validation with machine-readable policies.
- Integrating AI for predictive threat analysis.
- Standardizing telemetry for cross-provider visibility.
Operators must prioritize these while advocating for policy support, such as incentives for RPKI deployment.
Key Takeaways for Modern Networks
JANOG33 underscored that security is a shared responsibility. IPv6 demands vigilant configuration, BGP requires cryptographic safeguards, and operators need ongoing collaboration. By heeding these lessons, the internet can evolve securely.
Frequently Asked Questions
What is JANOG?
JANOG is Japan’s premier network operators’ group, hosting regular meetings to discuss infrastructure challenges and solutions.
Why is IPv6 security critical now?
With IPv6 traffic surpassing 40% globally, vulnerabilities can impact billions of devices if unaddressed. ISOC IPv6 Security Report.
How does RPKI prevent BGP hijacks?
RPKI uses digital certificates to validate route origins, rejecting invalid advertisements at the edge.
What tools help monitor BGP?
Open-source options like BGPmon and commercial platforms from Kentik provide comprehensive visibility.
Is BGPsec ready for production?
It’s in pilot stages; operators should prepare by supporting ROAs first.
References
- IPv6 Security Best Current Practices — Internet Society. 2023-06-15. https://www.internetsociety.org/deploy360/ipv6/security/
- BCP 38/RFC 2827: Network Ingress Filtering — IETF. 2000-05 (authoritative standard). https://datatracker.ietf.org/doc/html/rfc2827
- RPKI Deployment Status — MANRS Observatory. 2025-04-01. https://www.manrs.org/observatory/
- Secure BGP: RPKI Overview — RIPE NCC. 2024-11-20. https://www.ripe.net/publications/docs/rpki-intro
- IPv6 Adoption Statistics — Google IPv6 Statistics. Updated 2026-05-01. https://www.google.com/intl/en/ipv6/statistics.html
Read full bio of Sneha Tete










