Jessica Yu ANS Communication Inc. Feb. 9th, 1998

Slides:



Advertisements
Similar presentations
NOPEER Route Attribute Propose a well-known transitive advisory scope attribute Applied by originating AS to route prefixes Interpretable as advice to.
Advertisements

An Operational Perspective on BGP Security Geoff Huston February 2005.
The Role of a Registry Certificate Authority Some Steps towards Improving the Resiliency of the Internet Routing System: The Role of a Registry Certificate.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
17/10/031 Summary Peer to peer applications and IPv6 Microsoft Three-Degrees IPv6 transition mechanisms used by Three- Degrees: 6to4 Teredo.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
BGP Security APNIC Open Policy Meeting Routing SIG 23 February 2005 Kyoto, Japan Russ Housley
Dongkee LEE 1 Understanding BGP Misconfiguration Ratul Mahajan, David Wetherall, Tom Anderson.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—7-1 Optimizing BGP Scalability Limiting the Number of Prefixes Received from a BGP Neighbor.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Protecting the BGP Routes to Top Level DNS Servers NANOG-25, June 11, 2002 UCLA Lan Wang Dan Pei Lixia Zhang USC/ISI Xiaoliang Zhao Dan Massey Allison.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—7-1 Integrating Internet Access with MPLS VPNs Implementing Internet Access as a Separate VPN.
Allocations vs Announcements A comparison of RIR IPv4 Allocation Records with Global Routing Announcements Geoff Huston May 2004 (Activity supported by.
Securing your IP based Phone System By Kevin Moroz VP Technology Snom Inc.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Working Group #4: Network Security – Best Practices March 6, 2013 Presenters: Rod Rasmussen, Internet Identity Tony Tauber, Comcast WG #4.
Desired IRR Operational Model ~IRR/Whois Interaction~ Kuniaki Kondo (JPNIC IRR Workshop/IIJ) Ikuo Nakagawa (Intec) Takashi Arano (Asia Global Crossing)
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Staff AAA. Radius is not an ISP AAA Option RADIUS TACACS+ Kerberos.
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
BGP Man in the Middle Attack Jason Froehlich December 10, 2008.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
Information-Centric Networks Section # 4.2: Routing Issues Instructor: George Xylomenos Department: Informatics.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Outbound Route Filtering.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Internet Routing Verification John “JI” Ioannidis AT&T Labs – Research Copyright © 2002 by John Ioannidis. All Rights Reserved.
17/10/031 Euronetlab – Implementation of Teredo
BGP security some slides borrowed from Jen Rexford (Princeton U)
BGP Validation Russ White Rule11.us.
Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations (RFC 6324) Po-Kang Chen Oct 19,
One Hop for RPKI, One Giant Leap for BGP Security Yossi Gilad (Hebrew University) Joint work with Avichai Cohen (Hebrew University), Amir Herzberg (Bar.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Connecting an Enterprise Network to an ISP Network
Securing BGP: The current state of RPKI
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
Multicast Outline Multicast Introduction and Motivation DVRMP.
Network Security Marshall Leitem 11/30/04
Evaluating Existing Systems
Goals of soBGP Verify the origin of advertisements
Evaluating Existing Systems
COS 561: Advanced Computer Networks
Stateless Source Address Mapping for ICMPv6 Packets
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Are We There Yet? On RPKI Deployment and Security
APNIC Trial of Certification of IP Addresses and ASes
COS 561: Advanced Computer Networks
Working together to improve routing security for all
APNIC Trial of Certification of IP Addresses and ASes
MANRS IXP Partnership Programme
BGP Multiple Origin AS (MOAS) Conflict Analysis
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Improving global routing security and resilience
FIRST How can MANRS actions prevent incidents .
Amreesh Phokeer Research Manager AfPIF-10, Mauritius
Validating MANRS of a network
Presentation transcript:

Jessica Yu ANS Communication Inc. Feb. 9th, 1998 A Routing Filtering Model for Improving Global Routing Robustness - an IOPS proposal Jessica Yu ANS Communication Inc. Feb. 9th, 1998

Background Internet suffered a series of outages as a result of leakage of ‘bad’ routing information IOPS identifies a mechanism to improve routing system robustness IOPS encourages its member and other ISPs to implement it

What’s the Problem? Current global routing system is open thus vulnerable ‘Bad’ routing information injecting from anywhere of the Internet will be propagated allover resulting outages (one dead mouse spoils the whole pot of soup) Proven by several incidents occurred - unfortunately

What’s the Problem? (con’t) Could happen due to misconfiguration, software bugs or malicious attempt The ‘openness’ can be potentially used by attackers to inject routes for denial of service attacks such as smurf attack

Current Picture: Vulnerable

Bad routing information can cause big outage

IOPS Goals To identify or define mechanism to improve global routing robustness Using existing technology as much as possible so it can be implemented fast since the problem is an urgent one

The Routing Filtering Model Sparse filtering on ‘trusted’ and Dense filtering on ‘less-trusted’ routing boundaries Trusted routing boundary - the peer does dense filtering at all of its customers boundaries and all of it’s downstream providers implement such routing filtering model Otherwise, it’s less-trusted boundary This is mainly verify against the border AS which advertising the route

Scenario 1: All ISPs Dense Filter customers

Scenario 2: Some ISPs do not dense filter customers, immediate upstreams have to

Scenario 3: ISP does not dense filter less-trusted downstream ISPs, peer have to

Benefits bad routes will be stopped from propagating near or at its source thus reduce impact to a small scope of the Internet Attackers has less chance to introduce routes on the fly to the whole Internet and launch attacks To localize the impact of the ‘bad’ routes To Reducing the weakness which potentially will be explored by attackers The more ISPs or AS implement this model the better protection we have The more ISP does this, the less work everyone need to do ( less boundaries needs dense filtering, and shorter prefix each has to manage

Tools The key to this is to maintain an prefix list to generate filtering list on the border routers Private database which install customer to be announced prefix IRR Other means

Issues how to validate if someone is entitled to advertise a route Provider check its customers route match with address assignment information Add features in IRR to validate such information in combination with assignment information (working under way)

Future work This work was done 6 months ago which at the time was the best viable option This is model of checking against neighbor AS, another model is to check against the Origin AS If there is other viable proposal which will address the problem better, will consider that.