A Survey of BGP Security: Issues and Solutions Butler, Farley, McDaniel, Rexford Kyle Super CIS 800/003 October 3, 2011.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
Availability Centric Routing (ACR) Robust Interdomain Routing Without BGP Security July 25 th, 2006.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Chapter 5 Network Security Protocols in Practice Part I
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Internet Routing (COS 598A) Today: Routing Protocol Security Jennifer Rexford Tuesdays/Thursdays.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Inter-domain Routing security Problems Solutions.
Advanced Computer Networks cs538, Fall UIUC
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Networks Layering and Routing Dina Katabi
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
SECURING BGP Matthew Nickasch University of Wisconsin-Platteville Dept. of Computer Science & Software Engineering.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
Inter-domain Routing Outline Border Gateway Protocol.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
BGP security some slides borrowed from Jen Rexford (Princeton U)
BGP Validation Russ White Rule11.us.
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
Goals of soBGP Verify the origin of advertisements
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
COS 461: Computer Networks
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Presentation transcript:

A Survey of BGP Security: Issues and Solutions Butler, Farley, McDaniel, Rexford Kyle Super CIS 800/003 October 3, 2011

Outline Introduction/Motivation Sources of BGP Insecurity BGP Security Today BGP Security Solutions: Architectures BGP Security Solutions: Experimental Future Directions/Conclusion

Motivation BGP: Dominant Interdomain Routing Protocol ▫Deployed Since Internet First Commercialized ▫Current Version 4 In Use for Over Ten Years ▫Popular Despite Providing No Performance/Security Guarantees Usually Routing Outages and Failures Limited ▫But Sometimes Not: Potential for Major Damage ▫Eg: Florida ISP 1997, Turkey TTNet 2004, Con- Edision 2006, Pakistan Telecom 2008

Motivation What’s the Big Deal? ▫Many Critical Applications Rely on the Internet ▫Eg: Online Banking, Stock Trading, Telemedicine Department of Homeland Security: ▫BGP Security Critical to National Strategy Internet Engineering Task Force: ▫Working Groups: Routing Protocol Security Requirements, Secure Interdomain Routing

Sources of BGP Insecurity IP Prefixes and Autonomous System Numbers Using TCP as the Underlying Transport Protocol Routing Policy and BGP Route Attributes

IP Prefixes and AS Numbers IP Addresses Assigned to Institutions in Blocks ▫Contiguous Address Blocks: /24 ▫Leads to Smaller Routing Tables/Fewer Announcements ▫Prefixes Can Be Contained Within Each Other  Eg: /12 Vs /22  Routers Select Most Specific Route Table Entry Autonomous System Numbers ▫Numbers Private: Stub Networks

IP Address Delegation

Normal Route Origination

Malicious Route Origination BGP Does Not Verify AS Number/IP Addresses ▫Prefix Hijack: Black Holes, Interception Attacks

IP Address Deaggregation Routers Select Most Specific Table Entry

TCP as the Transport Protocol Routers Exchange Announcements/Withdrawals ▫BGP Session over TCP Connection ▫Communication Susceptible to Attack Attacks Against Confidentiality ▫Third Party Can Eavesdrop BGP Session ▫Learns Policy and Routing Information ▫Business Relationships Can Be Inferred

TCP as the Transport Protocol Attacks Against Message Integrity ▫Man-In-The-Middle Attacks ▫Message Insertion:  Could Inject Incorrect Information  Could Overwhelm Routers with Too Many Messages ▫Message Deletion:  Could Delete Keep-Alive Messages ▫Message Modification ▫Message Replay:  Re-assert Withdrawn Route, Withdraw Valid Route

Denial of Service Attacks Exploit the TCP Connection Establishment ▫Three Way Handshake (SYN, SYN-ACK, ACK) ▫Connection Closure (FIN, RST) Send RST Packet to Force Connection Closed SYN Packet Flooding ▫Consumes Resources, Overwhelms Routers ▫Neighbors Assume Connection Dead  Upon Reconnection: Route Flapping Physical Attacks: Backhoe Attack ▫Or Swamp Link with Traffic

Routing Policy and BGP Attributes Local Preference, AS Path Length, Origin Type, Multi-exit Discriminator Adversary Could Manipulate These Values ▫Shorten AS Path Length ▫Lengthen AS Path: Make Route Look Legit  Or Use Too Many Resources to Store Path ▫Remove AS from Path: Thwart Filtering ▫Add AS to Path: Causes AS Path Loop ▫Modify Origin Type, MED to Influence Decision

BGP Security Today Routers Need Byzantine Robustness: ▫Termination, Agreement, Validity Typical Approaches: Implemented Locally ▫Protecting Underlying TCP Connection ▫Defensively Filter Routes

Cryptographic Techniques Pairwise Keying: Shared Secret Between Routers ▫O(n^2) Keys Needed: Too Complex ▫Keys Must Be Changed: Cryptanalysis Attacks Cryptographic Hash Functions (MD5, SHA-1) ▫Message Authentication Codes  Ensures Message Integrity and Authentication  Requires Shared Secret Diffie-Hellman Key Exchange ▫Uses Modular Arithmetic Complexity ▫Allows Hosts to Exchange Keys without Prior Secret

Cryptographic Techniques Public Key Infrastructure ▫One Public Key/Private Key Pair per AS ▫Allows Communication without Prior Secret ▫Requires Hierarchical Infrastructure  Public Keys Need to Be Distributed Public Key Cryptography ▫Encryption: E with Public, D with Private ▫Digital Signature: Hash with Private, Verify with Public

Cryptographic Techniques Attestations and Certificates ▫Attestation: Proof AS Can Advertise Resource ▫Digital Signature Chain to Root of Authority ▫Requires Public Key Infrastructure ▫Certificate: Verifies Public Keys in PKI  Also Digitally Signed in Chain

Pairwise BGP Session Protection MD5 Signature: Ensures Message Integrity ▫Sign BGP or Underlying TCP Message ▫Requires Shared Secret Key Smith/Garcia-Luna-Aceves Countermeasures ▫Pairwise Encryption with Sequence Numbers ▫UPDATE Timestamp, PREDECESSOR Attribute, UPDATE Digital Signatures ▫Requires Shared Secret, Modification to BGP Gouda Hop Integrity Protocol ▫Sequence Numbers and Message MACs with PKI

Pairwise BGP Session Protection Generalized TTL Security Mechanism ▫Provides Protection from Remote Attack ▫Assumes Routers are One-Hop Neighbors ▫Set TTL IP Packet Attribute to 255  Decremented at Each IP Layer Hop  Discard Packets with TTL < 254 ▫Cannot Protect Against Insider Threats ▫Less Useful In Multi-hop Settings ▫Cheap Protection Against Unsophisticated Attacks

Pairwise BGP Session Protection Ipsec: Network Layer Security Protocols ▫Provides Encryption/Authentication of IP Packets ▫Also Provides Needed Key Infrastructure ▫Ubiquitous, Well-Understood, Easy to Use ▫Two Protocols with Differing Security: AH/ESP ▫Only Provides Pairwise Protection  Does Not Protect Against Widespread Attacks

Pairwise BGP Session Protection

Defensive Filtering of BGP Announcements ASes Filter Ingress/Egress Routes by Policy Documented Special Use Addresses (Loopback) Bogons/Martians: Addresses with no Allocation Private AS Numbers Limit AS Path Length, Prefix Size, Number of Announcements Filter Routes from Customers, Stub-ASes Overwrite BGP Attributes (MED, Origin) Heuristic: Does Not Provide Strong Security ▫Large ASes Have Complex/Changing Rules

Routing Registries ASes Provide Policy/Topology Information Constructs Global View of Routing Info ▫ASes Query Information, Filter Invalid Routes Registry Information Needs to Be Correct ▫Authentication to Avoid Malicious Modification Corporations Consider Info Proprietary ASes Lack Incentive to Update Information

Protect Routing Infrastructure Protect Access to Physical Link ▫And Provide Redundant Links Protect the Management Interface (SNMP) ▫Use SSH/VPNs to Connect to Router Give BGP Messages High Priority ▫Messages Get Through During a Flooding DoS

BGP Security Architectures Secure BGP (S-BGP) ▫Implementation Exist, IETF Considering Standard ▫Uses Two PKIs  Authenticate Address Allocation Hierarchically  Certificate Proving AS Originated a Statement ▫Address Attestation: Prove AS Originates Address ▫Route Attestation: Routes Signed from AS to AS  Routes Cannot Be Modified ▫Resource Intensive: CPU, Memory, Storage  Could Double Convergence Times

Secure BGP

BGP Security Architectures Secure Origin BGP (soBGP) ▫PKI: Three Certificate Types  Bind Public Key to Router  Policy Details: Protocol Parameters and Topology  Routers Construct Global View of Network  Address Attestation ▫Info Transmitted via BGP SECURITY Messages  Requires Modification of BGP Implementations  Long-Term Info Verified Before Beginning BGP Sessions ▫Offers Tradeoffs (Computation vs. Security)  Verify Routes Before/After Accepting Them  Verify Entire Route/First Hop/Not At All

BGP Security Architectures Interdomain Route Validation (IRV) ▫Each AS Contains an IRV Server ▫Upon Receiving Update, Local IRV Server Queries IRV Server for Each AS Hop to Confirm Path ▫Flexible: Can Decide which ASes to Query  Partial Queries, Trusted ASes, Cached Routes ▫ASes Retain Control of their Information ▫Use Underlying Network/Transport Security  Ipsec for IP and TLS for TCP ▫Limitation: Requires Working Network

Interdomain Route Validation

Experimental BGP Security Systems Reducing Computational Overhead ▫Origin Authentication: Validate Address Ownership with Merkle Hash Trees ▫Secure Path Vector: One-Time Signatures generated from Root Value ▫Signature Amortization: One Signature for UPDATE Message Group ▫Reference Locality: Exploit Path Stability to Reduce Number of Signatures

Experimental BGP Security Systems Alternatives to PKI ▫Pretty Secure BGP: Each AS Maintains Address Info for Neighbors

Experimental BGP Security Systems Detecting and Mitigating Anomalies ▫Multi-Origin AS Conflicts: Community Attribute with ASes that can Originate Addresses ▫Intrusion Detection: Observe Address Ownership over Time, Flag Unexpected Changes ▫Prefix Hijacking Alert System: Server Alerts Valid Originator Upon Hijack ▫Pretty Good BGP: Monitor Historic Routing Data to Flag Unexpected Routes as Suspicious

Experimental BGP Security Systems Detecting and Mitigating Anomalies ▫Real-Time Monitoring: Maintain Info about Hosts on a Network, Check Info on Origin Conflict ▫Whisper Protocol: Originator Assigns Random Value, Value Hashed at Each AS Hop

Security Properties of Proposed Solutions

Conclusions Difficulties in Adopting Solutions ▫Number of ASes Increases Linearly with Time ▫Routing Registries Must Contain Up-to-Date Info ▫Computation Requirements Can Overload Routers ▫Simulation Impossible Due to Size of Internet Future Research Directions ▫Routing Frameworks and Policies (BCP)  Protect the Most Important Nodes ▫Attack Detection: Stop Attacks Before They Start ▫Data Plane Protection: Enforce Decisions ▫Partial Deployment: Gains from Limited Participation

Questions?