COS 561: Advanced Computer Networks

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
BGP Policy Jennifer Rexford.
CSE390 – Advanced Computer Networks
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Internet Routing (COS 598A) Today: Interdomain Traffic Engineering Jennifer Rexford Tuesdays/Thursdays.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Internet Routing (COS 598A) Today: Routing Protocol Security Jennifer Rexford Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
Advanced Computer Networks cs538, Fall UIUC
1 Interdomain Routing Security COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford Teaching Assistants: Sunghwan Ihm and.
Computer Networks Layering and Routing Dina Katabi
A LIGHT-WEIGHT DISTRIBUTED SCHEME FOR DETECTING IP PREFIX HIJACKS IN REAL TIME Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang and Paul Francis. Cornell University,
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 4.2: Routing Issues Instructor: George Xylomenos Department: Informatics.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
Interdomain Routing Security Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Internet Routing Verification John “JI” Ioannidis AT&T Labs – Research Copyright © 2002 by John Ioannidis. All Rights Reserved.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
BGP security some slides borrowed from Jen Rexford (Princeton U)
Interdomain Routing Security COS 461: Computer Networks Jennifer Rexford.
CS 3700 Networks and Distributed Systems
Connecting an Enterprise Network to an ISP Network
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
CS 3700 Networks and Distributed Systems
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
COS 561: Advanced Computer Networks
The Issue We all depend on the Internet
CSCI-1680 Network Layer: Inter-domain Routing – Policy and Security
Are We There Yet? On RPKI Deployment and Security
Preventing Internet Denial-of-Service with Capabilities
CS 4700 / CS 5700 Network Fundamentals
COS 561: Advanced Computer Networks
CS 3700 Networks and Distributed Systems
Interdomain Routing Security
Interdomain Routing Security
CS 3700 Networks and Distributed Systems
COS 561: Advanced Computer Networks
BGP Policies Jennifer Rexford
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
COS 561: Advanced Computer Networks
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

COS 561: Advanced Computer Networks BGP Security Jennifer Rexford Fall 2017 (TTh 1:30-2:50 in CS 105) COS 561: Advanced Computer Networks http://www.cs.princeton.edu/courses/archive/fall17/cos561/

BGP Attacks

Prefix Hijacking Originating someone else’s prefix 12.34.0.0/16 What fraction of the Internet believes it? 1 2 3 4 5 6 7 12.34.0.0/16 12.34.0.0/16

Sub-Prefix Hijacking 12.34.0.0/16 12.34.158.0/24 7 12.34.0.0/16 12.34.158.0/24 Originating a more-specific prefix Every AS picks the bogus route for that prefix Traffic follows the longest matching prefix

Interception Attack http://queue.acm.org/detail.cfm?id=2668966

Bogus AS Paths to Hide Hijacking Adds AS hop(s) at the end of the path E.g., turns “701 88” into “701 88 3” Motivations Evade detection for a bogus route E.g., by adding the legitimate AS to the end Hard to tell that the AS path is bogus… Even if other ASes filter based on prefix ownership 701 3 18.0.0.0/8 88 18.0.0.0/8

Path-Shortening Attacks Remove ASes from the AS path E.g., turn “701 3715 88” into “701 88” Motivations Make the AS path look shorter than it is Attract sources that normally try to avoid AS 3715 Help AS 88 look like it is closer to the Internet’s core Who can tell that this AS path is a lie? Maybe AS 88 *does* connect to AS 701 directly 701 3715 88 ?

Attacks that Add a Bogus AS Hop Add ASes to the path E.g., turn “701 88” into “701 3715 88” Motivations Trigger loop detection in AS 3715 Denial-of-service attack on AS 3715 Or, blocking unwanted traffic coming from AS 3715! Make your AS look like is has richer connectivity Who can tell the AS path is a lie? AS 3715 could, if it could see the route AS 88 could, but would it really care as long as it received data traffic meant for it? 701 88

Violating “Consistent Export” to Peers Peers require consistent export Prefix advertised at all peering points Prefix advertised with same AS path length Reasons for violating the policy Trick neighbor into “cold potato” Configuration mistake Main defense Analyzing BGP updates … or data traffic … for signs of inconsistency dest Bad AS BGP data src

Other Attacks Attacks on BGP sessions Resource exhaustion attacks Confidentiality of BGP messages Denial-of-service on BGP session Inserting, deleting, modifying, or replaying messages Resource exhaustion attacks Too many IP prefixes (e.g., BGP “512K Day”) Too many BGP update messages Data-plane attacks Announce one BGP routes, but use another

Improving BGP Security

Solution Techniques Protective filtering Anomaly detection Know your neighbors Anomaly detection Suspect the unexpected Checking against registries Establish ground truth for prefix origination Signing and verifying Prevent bogus AS PATHs Data-plane verification Ensure the path is actually followed

Route Attestations in Secure BGP If AS a announced path abP then b announced bP to a Comcast: (IBM) Local: (Comcast, IBM) Princeton: (Local, Comcast, IBM) Public Key Infrastructure Princeton AT&T IBM Local ISP Comcast Comcast: (IBM) Comcast: (IBM) Local: (Comcast, IBM) Public Key Signature: Anyone who knows IBM’s public key can verify the message was sent by IBM. 13

Discussion of the Paper BGP Security in Partial Deployment