ARIN's Internet ROUTING REGISTRY (IRR)
- Interacting with ARIN's IRR
- Email Subject Line Keywords
- Email and Object Processing
- Supported Features
- Data Protection
- Authorization and Authentication
- Querying ARIN's IRR
- Mirroring Requests
ARIN's Internet Routing Registry (IRR) is a searchable database of routing policy information for networks in the ARIN region. The ARIN IRR act as part of the global IRR, standardizing and publishing routing information so that network operators and Internet Service Providers can easily connect and work together. This database is separate from ARIN's registration database, which contains IP address and Autonomous System Number registration data, and is searchable using the Whois directory service.
All objects in the IRR database contain attribute-value pairs, which state which attributes are allowed within each type of object.
If you need to insert routing objects into ARIN's IRR for the first time, follow these steps to get started:
- Complete a mntner object template. This is the first object you must create in ARIN's IRR, as you will reference it to authorize future IRR interactions.
- Select and use a form of authentication within your mntner object template. ARIN strongly recommends that you use MD5-PW authentication.
- Properly format your mntner template and submit it to firstname.lastname@example.org. An ARIN analyst will review your message and create your mntner object.
- Once your mntner object is created, you can create any other object types using your password.
IRR changes are made via email templates, which must be emailed to email@example.com. Before interacting with ARIN's IRR, you must have Point of Contact (POC) Record and an Organization Identifier (Org ID) established in ARIN Online. To create, edit, or delete an IRR object:
- Find the template(s) for the object type you would like to create, modify, or delete
- FIll out the appropriate template fields
- Copy the template(s) into an email, followed by at least one blank line each
- Send your email to firstname.lastname@example.org
If the database does not contain an object with the same class primary key as the object in your update message, the IRR will assume that you want to create it. The first object you need to create is the mntner object. Mntner requests require ARIN analyst review, and must be submitted to ARIN by themselves. Once your mntner object is created, you can begin submitting templates for other object types.
Please note that you cannot specify PGPKEY as the authentication method when you are creating a mntner object. You must first create the mntner with MD5 or MAIL-FROM authentication. Use that authentication method to then create your key-cert object. Then you will need to modify the mntner object, changing the authentication to PGPKEY.
If an object type with the same class primary key as the object in your update message already exists in the database, the IRR will assume that you want to modify it, and will return a "no operation" error if your version is identical to the existing version (white space does not count). Be sure to include either your MD5 password, PGP signature, or send your message from the correct mail-from, depending on your authentication method.
To delete an object from ARIN's IRR, add a line consisting of "delete: <comment>" to the object template. Do not make any other changes to the template, other than white space characters, or the delete will fail. The delete operation will also fail if the object to be deleted is referenced from any other object in the database. Syntactically correct objects can still be deleted from the database (i.e. objects predating a syntax change). You may wish to include who deleted the object and when, (i.e. "delete: email@example.com 20140101) to allow for tracking purposes in autoprocessor logs. Be sure to include either your MD5 password, PGP signature, or send your message from the correct mail-from, depending on your authentication method.
Object templates retreived via an IRR query are not identical enough to use when deleting an object. If you want an exact object copy, query using the "-B" query flag. You must then remove any extraneous text from the object template (such as remarks) before adding the delete field and submitting your messageto ARIN.
Subject lines may be used for your own reference, or they may contain specific keywords to configure how your objects are processed and how your response email will look. If you include both keywords and non-keywords in your subject line, place all of your keywords after "KEYWORDS:" or they will be ignored.
There are four keywords recognized by ARIN's IRR, and they are not case sensitive.
Use new if you want the IRR to treat all templates as new objects. If an object already exists, the IRR will include an error message in its acknowledgement of your email.
Help or howto will result in the IRR ignoring the body of your email and returning information about how to query and update the database within its acknowledgement of your email.
Diff will result in highlighted changes between old and new objects for any modification templates.
In the IRR's response message, each object that has been modified will include a section specifying the changes made, followed by the old version of the full object, and finally the new version of the full object. The output will have the difference listing followed by the old and new objects. The diff keyword is particularly useful when "import:" and "export:" attributes are changed in large aut-num objects.
Note: This diff is identicle to the standard unix diff, except that in acknowledgement and notification messages, three dashes (---) followed by a new line (\n) signifies the start of a section in the message relating to one specific object. This is to make it easy to parse the output and find the start of each object in the message. The standard unix diff also uses --- to separate lines that have changed, so ARIN's IRR has replaced --- with === in the diff output presented in the notification messages.
The IRR server will process the objects in the order they are listed, so be sure to list any dependent objects after the objects they reference or depend upon. The server wil also check each object to ensure that it is syntactically correct and passes all required authorization checks, and that you are not deleting an object that is referenced by other objects in the database. If one of these steps fails, the object and its operation will fail as a whole.
There are no restrictions on the number of objects in an IRR update message, but there is a file size limit, so optimize the number of messages you send and the number of objects per message based on your business practices, with the following notes in mind:
- Every email update message will result in one acknowledgement email message returned
- Each object in an update message may generate several notification email messages
- If you update 1000 objects by sending 1000 emails, each containing one object, this will cause a large number of emails to be returned, so be sure your mail system can handle this volume, and that you do not trigger spam filters by originating many messages from one source.
- Acknowledgement and notification messages are not sent until all the objects in an update message have been processed.
Once all objects in an email are processed, an acknowledgement message is returned to the sender, using the contents of the "Reply-to:" or "From:" field. This is known as an acknowledgement. Acknowledgements are split into two sections.
The first section shows where the update was sent from. This may be a copy of the update email header. This section also includes a summary of the update results, explaining how many objects were recognized by the database software, how many operations were successful and how many failed. The subject line of the acknolwedgement states "SUCCESS" or "FAILED". If the update message contains no objects or any one of the operations fails, the acknowledgement reports "FAILED". Otherwise it reports "SUCCESS". Following this status is the original subject line.
The next section is the "DETAILED EXPLANATION". This is split into three parts:
- A list of all objects that failed to process, including error, info, and warning messages
- A list of operations that were successfu, which may include info and warning messages
- A list of paragraphs from your message that were not recognized as objects
- Note that email signatures or other extraneous text may generate a warning message, but will not affect other properly formatted objects in your message from being processed.
Each part is separated in the acknowledgement by a line containing several '~' characters. Within each part the objects and paragraphs are listed in the order they were processed. The line before each object contains three '-' characters. This allows for easy parsing by script.
The format of a notification message is similar to the acknowledgement message. The first section explains why you are being sent this notification. The next section has the email header details showing where the update came from. The final section shows the changes that were contained in the update message, if it was successful. If it failed for authorization reasons, it shows the object for which a change was attempted, but not the actual change details.
A notification message is only sent to a single email address. It will contain all the notification details of objects from an update message that relate to that email address. If the same details need to be sent to two different email addresses, then two separate emails will be generated by the database software. This ensures that when an update contains many objects covered by overlapping notification email addresses, only the appropriate details are sent to each email address.
Notifcations are caused by one of the following attributes:
- Notify: will contact the specified email address to report that the object has been successfully created, modified, deleted. You may include multiple notify: attributes. All email addresses specified by a Notify: attribute will be contacted, unless the object fails.
- Mnt-nfy: will contact the specifiedemail address to report that a maintained object has been successfully created, modified, or deleted. This attribute is optional, and may only be included in mntner objects.
- Upd-to: will contact the specified email address to report when a maintained object creation, modification, or deletion has failed.You may include multiple upd-to: attributes. All email addresses specified by a upd-to: attribute will be contacted if the object fails. This attribute is mandatory, and may only be included in mntner objects.
MIME support means you can cryptographically sign an update message using email agents that attach the signature in a separate MIME part, not in the body of the message. Text encryption, however, is not allowed, as all update messages must be sent in plain text.
MIME support also allows the definition of scopes of authorization within the message (for example, parts where different passwords apply) and nested signing of messages. This may be necessary under some conditions when updating objects whose authorization must be derived from more than one party.
It is strongly recommended to keep MIME encapsulation simple. Complex MIME structures are more likely to generate errors.
- The following rules apply when submitting updates using MIME encapsulation:
- The software will recognize the following headers and take the appropriate actions:
- All other content-types are treated as text/plain.
- Each MIME part is treated as a separate message with the following implications (except where a signature part is closely coupled with a text part in which case the two parts are treated together as a message):
- Authorization information is valid only within a single message part
The database supports PGP-signed messages, so long as MIME encapsulation users ensure that a signed portion of an update message is submitted using multipart/signed composite type. In this case, the first body part contains the update message (which may also be a MIME encapsulated message), and the second body contains a signature. For a PGP signature, it is encapsulated with application/pgp-signature MIME discrete type. If one of the signatures fails in a nested signed portion, the whole portion is rejected. Instructions for using PGP can be found at http://www.ripe.net/data-tools/support/security/pgp.
ARIN's IRR implements authentication and authorization checks to restrict who can create and modify cetain objects. Authentication determines who is attempting to make a change, and authorization decides whether or not a transaction is allowed to perform a specific operation. For more information, see the following RFCs:
- RFC 2725
- Note that ARIN's IRR contains two variations to this RFC:
- ARIN's IRR does not allow mail-from with regular expressions
- ARIN validates the mntnr, but does not automatically enforce that inetnum/inet6num from the organization that covers the route/route6 object
- ARIN does not automatically validate the usage of aut-num to a particular organization
- Note that ARIN's IRR contains two variations to this RFC:
- RFC 4012
Authentication tokens are held within mntner objects. Other objects may reference a mntner object within the "mnt-by:" and "mbrs-by-ref:" attributes to define the necessary authorization needed to modify those objects. When submitting an update that requires authorization, relevant authenticaton token information should be supplied. Several mntner objects can be referenced by a "mnt-by:" attribute to protect one object.
Only mntner objects referenced by "mnt-by:" attributes are authorized to modify or delete those object. Note that authentication checks are logically "or" based ( a OR b OR c). If the information required by at least one authentication token from one mntner object is supplied, the operation will be authorized. That means that object protection is as weak as the weakest authentication method used in the mntner objects referenced by an object.
When the "mnt-by:" attribute is added to an object for the first time, authentication checks for at least one of the mntner objects referenced by one of the "mnt-by:" attributes should be passed.
When modifying an object that already has one or more "mnt-by:" attributes, at least one of the mntner objects referenced in that object's "mnt-by:" attribute(s) must authenticate the change. If no "mnt-by:" attributes exist, at least one of the mntner objects referenced in one of the "mnt-by:" attributes being added must authenticate the change. All new objects must have at least one "mnt-by:" attribute.
Different types of objects in the database require different levels of protection. Authentication based on strong encryption is the preferred method, however, this may not always be legally available. For this reason, the server supports multiple authentication methods, including the following:
This scheme is based on the MD5 hash algorithm, and stores object authentication as a md5-crypt encrypted passphrase, which includes the "$1$" string, the salt, and the 128-bit hash output. Because it uses an eight-character salt and an almost unlimited pass phrase, this scheme is quite stable against dictionary attacks. However, since the encrypted form is exposed it cannot be considered as a strong form of authentication. Authentication information is supplied using a "password:" pseudo-attribute. The value of this attribute is a clear-text pass phrase. It can appear anywhere in the body of the message, but not within mail headers. Line continuation is not allowed for this attribute. The attribute and the pass phrase should fit on one line. If you split the pass phrase across multiple lines this will be treated as a Msyntax error.
When submitting a request to create, modify or delete an object protected by a mntner using MD5-PW as the authentication method, the message sent to the database server must include a line containing:
password: <cleartext password>
This pseudo attribute must be in the body of the email message, and must be BELOW the first line in an object template. Note that if there is more than one RPSL object in the email, the password is only required on the first one.
Here is an example:
descr: American Registry for Internet Numbers
3635 Concorde Parkway
Chantilly, VA 20151 US
changed: firstname.lastname@example.org 20080130
To transition an existing mntner object from MAIL-FROM to MD5-PW authentication:
- Visit ftp://ftp.arin.net/pub/rr/arin.db and search (Ctrl+F or CMD+F) for your mntner object.
- Copy this object into a text editor
- Remove all output line(s) with "auth: " in them.
- Go to https://apps.db.ripe.net/crypt/
- Enter in a password. Make sure you keep this cleartext password as you will need it when sending future requests to ARIN’s Routing Registry.
- Submit the password to get the md5 crypt password. Keep this password for your records, as you may need it when interacting with ARIN's IRR in the future.
- Add the following line to your mntner object template in the text editor.
auth: MD5-PW <MD5 crypt password>
As an example:
auth: MD5-PW $1$ucVwrzQH$zyamFnmJ3XsWEnrKn2eQS/
- Email the updated mntner template in plain text to email@example.com with "RSD mntner Help" as the subject. ARIN will then manually process your request to update your mntner object and respond via email.
If you lose or forget this password, it must be regenerated at https://apps.db.ripe.net/crypt/ and a newly updated mntner template must be resubmitted to firstname.lastname@example.org with "RSD mntner Help" as the subject. ARIN will then manually process your request to update your mntner object and respond via email.
This is a strong form of authentication. The authentication information is a signature identity pointing to a public key certificate, which is stored in a separate key-cert object. The user is authenticated if the transaction is signed by the corresponding private key. ARIN does not guarantee that a key belongs to any specific entity. Anyone can supply any public keys with any ownership information to the ARIN Routing Registry Database. These keys can be used to protect other objects by checking that the update comes from a user who knows the corresponding secret key. Please note that you cannot specify PGPKEY as the authentication method when you are creating a mntner object. You must:
- Create the mntner with MD5 or MAIL-FROM authentication
- Use that authentication method to then create your key-cert object
- Modify the mntner object, changing the authentication to PGPKEY
This is the weakest form of authentication. MAIL-FROM takes an argument that is a which covers a set of mail . Only users with any of these mail are authorized to work with objects secured by the corresponding maintainer. ARIN does not support the use of regular expressions in email addresses (e.g. ‘.*@example.com’). It MUST be an exact match to what your email client will put in the From field. Any differences in what your MTA places in the rfc822 From: header and what is registered in the irr will fail. An example is: "J Example <email@example.com>"
Because mail clients and servers can re-write the address, it is frequently not sufficient to simply put firstname.lastname@example.org in the auth field. ARIN recommends using MD5-PW or PGP for authentication.
- is actively maintained
- has been updated within the past 30 days
- is publicly available
- expresses routing policies of use or interest to ARIN's region
ARIN recommends querying ARIN's IRR using a command-line Whois client using the following command:
whois -h rr.arin.net <object>
When querying ARIN's IRR, you may see that the descr:, admin-c:, upd-to:, auth:, and remarks: attributes may contain placeholder data, which may be ignored. Any inforamation for which the IRR is not authoritative is replaced with dummified data.
Additionally, the remarks: attribute will include the following message: "To view the original object, please query the ARIN Database at: http://www.arin.net/whois."
Whois queries may be used to view registration information for a specific Organization Identifier (Org ID). However, IRR objects are only searchable using the commands listed above, and are not contained within the Whois registration database.
For a full list of querying instructions, use the following command:
whois -h rr.arin.net help
ARIN's IRR mirrors other Routing Policy Specification Language (RPSL) databases. To request ARIN mirror your site's database, please send an email to email@example.com with "MIRRORING REQUEST" in the subject line. You will need to agree to the terms and conditions of the "Routing Registry" section of the ARIN Number Resource Policy Manual (NPRM) and prove that your site's routing registry data: