Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
Security Issues In Mobile IP
SCION: Scalability, Control and Isolation On Next-Generation Networks
IP Fast Reroute Using Tunnel-AT draft-xu-ipfrr-tunnelat-00 Mingwei Xu, Lingtao Pan, Qing Li Tsinghua University, China 75 th IETF Meeting, Stockholm July.
How Secure are Secure Interdomain Routing Protocols? B 大氣四 鍾岳霖 B 財金三 婁瀚升 1.
A Survey of BGP Security: Issues and Solutions Butler, Farley, McDaniel, Rexford Kyle Super CIS 800/003 October 3, 2011.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
BGP Multiple Origin AS (MOAS) Conflict Analysis Xiaoliang Zhao, NCSU S. Felix Wu, UC Davis Allison Mankin, Dan Massey, USC/ISI Dan Pei, Lan Wang, Lixia.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
A. Haeberlen Having your Cake and Eating it too: Routing Security with Privacy Protections 1 HotNets-X (November 15, 2011) Alexander Gurney * Andreas Haeberlen.
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
NSDI (April 24, 2009) © 2009 Andreas Haeberlen, MPI-SWS 1 NetReview: Detecting when interdomain routing goes wrong Andreas Haeberlen MPI-SWS / Rice Ioannis.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Decoupling Policy from Mechanism in Internet Routing Alex C. Snoeren and Barath Raghavan University of California, San Diego.
Inter-domain Routing security Problems Solutions.
Advanced Computer Networks cs538, Fall UIUC
Computer Networks Layering and Routing Dina Katabi
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
A LIGHT-WEIGHT DISTRIBUTED SCHEME FOR DETECTING IP PREFIX HIJACKS IN REAL TIME Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang and Paul Francis. Cornell University,
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
DNS security. How DNS works Ask local resolver first about name->IP mapping – It returns info from cache if any If info not in cache, resolver asks servers.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
NSDI (April 24, 2009) © 2009 Andreas Haeberlen, MPI-SWS 1 NetReview: Detecting when interdomain routing goes wrong Andreas Haeberlen MPI-SWS / Rice Ioannis.
1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
SIGCOMM 2012 (August 16, 2012) Private and Verifiable Interdomain Routing Decisions Mingchen Zhao * Wenchao Zhou * Alexander Gurney * Andreas Haeberlen.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Efficient Secure BGP AS Path using FS-BGP Xia Yin, Yang Xiang, Zhiliang Wang, Jianping Wu Tsinghua University, Beijing 81th Quebec.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
Detecting Prefix Hijackings in the Internet with Argus Xingang Shi Yang Xiang Zhiliang Wang Xia Yin Jianping Wu Tsinghua University.
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin, Stephanie Forrest, Jennifer Rexford IEEE International Conference on Network.
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Meet the Falcons Ciprian Marginean Aris Lambrianidis
Interdomain Routing Security Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Internet Routing Verification John “JI” Ioannidis AT&T Labs – Research Copyright © 2002 by John Ioannidis. All Rights Reserved.
BGP L3VPN origin validation (draft-ymbk-l3vpn-origination-02) November 2012.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
BGP security some slides borrowed from Jen Rexford (Princeton U)
BGP Validation Russ White Rule11.us.
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
One Hop for RPKI, One Giant Leap for BGP Security Yossi Gilad (Hebrew University) Joint work with Avichai Cohen (Hebrew University), Amir Herzberg (Bar.
Goals of soBGP Verify the origin of advertisements
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Interdomain Routing Security
BGP Multiple Origin AS (MOAS) Conflict Analysis
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Presentation transcript:

Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing

22 May, 2012FS-BGP, THU, Networking 2012 Outline Introduction –Backgrounds –Related works: S-BGP, … –Our proposal: FS-BGP FS-BGP: Fast Secure BGP Evaluation 2

IP Prefix Hijacking Routing info. in BGP can not be verified Manipulator can drop / intercept / tamper the traffic –Mis-configurations 2008, Pakistan Telecom hijacked YouTube 2010, China Telecom hijacked ~10% Internet –Malicious attacks: spammers,... AS4 hijacks prefix f 22 May, 2012FS-BGP, THU, Networking 20123

Solutions Short-term: detection & mitigation –Analyze anomalies in BGP routing UPDATEs Listen & Whisper, PGBGP, … –Cons: can not grantee correctness and realtime Long-term: prevention (our paper) –Adopted by IETF –Cryptographic authentication of routing info. S-BGP, IRV, soBGP, SPV, S-A, … –Cons: high security v.s. low cost, can’t have both 22 May, 2012FS-BGP, THU, Networking 20124

S-BGP The most secure scheme Route Attestations (RAs) secure AS paths –Every RA signs prefix and the whole AS path Includes the recipient AS – : an AS path –{msg}a i : a signature on msg signed by AS a i 22 May, 2012FS-BGP, THU, Networking 20125

22 May, 2012FS-BGP, THU, Networking 2012 Problems faced by S-BGP S-BGP signs the whole AS path –There are so many AS paths in the Internet –Unbearable computational cost... S-BGP uses expiration-date to defend against replay attack –Long: unable to defend against replay attack –Short: destroy the whole BGP system –Dilemma of expiration-date... 6

Substitutes for S-BGP soBGP –Unavailable paths IRV –Query latency –Hard to maintain authority server SPV –Complex state info. –Probabilistically guarantee S-A –Only for signing –Need to pre-establish neighbor list 22 May, 2012FS-BGP, THU, Networking SecurityEfficiency

22 May, 2012FS-BGP, THU, Networking 2012 Our Proposal FS-BGP: Fast Secure BGP How to secure the AS path –CSA (Critical Segment Attestation) to secure the AS path –SPP (Suppressed Path Padding) to defend against replay attack Security level –All the authenticated AS paths are available paths –Achieves same level of security as S-BGP Computational cost (on busy backbone router) –Singing cost: ~0.6% of S-BGP –Verification cost: ~3.9% of S-BGP 8

22 May, 2012FS-BGP, THU, Networking 2012 Outline Introduction FS-BGP: Fast Secure BGP –CSA: Critical Segment Attestation –SPP: Suppressed Path Padding Evaluation 9

22 May, 2012FS-BGP, THU, Networking 2012 Announcement Restrictions in BGP Only announce best routes –According to the Local Preference, etc … –Temporary restriction Selectively import & export routes (policy) –Available path: exists in the AS graph & obey the policies –Persistent restriction –Neighbor based import & export Contracts $$ are between neighbor ASes 10

22 May, 2012FS-BGP, THU, Networking 2012 Critical Path Segment - network operators really care In an announced AS path: p n = –Critical path segments: c n, …, c 1, c 0 –Critical path segment c i is owned by AS a i Those adjacent AS triples actually describe the import & export policies – c i = means a i will announce routes to a i+1 which are import from a i-1 11

If every AS signs its critical segment in a path, The whole path will become verifiable We call the signature: CSA -- Critical Segment Attestation Sign What You Really Care About

22 May, 2012FS-BGP, THU, Networking 2012 a0a0 〈a0〉〈a0〉 {a 1 a 0 f}a 0 a1a1 a2a2 a3a3 a4a4 〈a1 a0〉〈a1 a0〉〈a2 a1 a0〉〈a2 a1 a0〉〈a3 a2 a1 a0〉〈a3 a2 a1 a0〉 {a 2 a 1 a 0 f}a 1 {a 3 a 2 a 1 a 0 f}a 2 {a 4 a 3 a 2 a 1 a 0 f}a 3 {a 1 a 0 f}a 0 {a2 a1 a0}a1{a2 a1 a0}a1 {a3 a2 a1}a2{a3 a2 a1}a2 {a4 a3 a2}a3{a4 a3 a2}a3 √√√√√ √ √√ √ √ √ √√ √ √√ √ √ √√ {msg}a i : signature of msg signed by a i FS-BGP : CSA S-BGP : RA 13

22 May, 2012FS-BGP, THU, Networking 2012 Efficient ! (# total critical segment) << (# total AS path) –Even using a small cache, the cost can be sharply decreased – S-BGP: a n receives k paths, signs k signatures –FS-BGP: a n receives k paths, signs 1 signature 14

22 May, 2012FS-BGP, THU, Networking 2012 Outline Introduction FS-BGP: Fast Secure BGP –CSA: Critical Segment Attestation –SPP: Suppressed Path Padding Evaluation 15

22 May, 2012FS-BGP, THU, Networking 2012 Forge a path in FS-BGP is possible Using authenticated path segments, manipulator can construct forged path Forged path in FS-BGP: available, but currently not announced [theorem 1]. a 4 constructs path p f, and hijacks prefix f 16

22 May, 2012FS-BGP, THU, Networking 2012 Fortunately, life is hard to the attacker Forge a path in FS-BGP is very difficult –Must be constructed using received & authenticated critical path segments –Must not be announced by the intermediate ASes Forged path is still available, and only temporarily not announced Only short enough forge-path can be used for an effective hijacking [Theorem 2] –Forged path can not be shorter than 4 AS hops 17

22 May, 2012FS-BGP, THU, Networking 2012 SPP: Suppressed Path Padding Based on AS Path Pre-pending SPP guarantees –Paths with lower preference (suppressed path) are not shorter than the corresponding optimal path {a 4, a 3, a 2 }a 3 {a 4, a 3, 3, a 2 }a 3 p f = 18

22 May, 2012 SPP: Suppressed Path Padding General Easy to Implement Light-weight Optional Defend against replay attack –Optimal path always has the shortest length –Optimal path always has the longest live-time –Replay attack becomes very hard FS-BGP, THU, Networking

22 May, 2012FS-BGP, THU, Networking 2012 Outline Introduction FS-BGP: Fast Secure BGP Evaluation –Security Level –Computational Cost 20

22 May, 2012FS-BGP, THU, Networking 2012 Paths can be verified in FS-BGP are all available paths CSA achieves Available Path Authentication Signed paths in S-BGP Signed paths in FS-BGP All available paths 1. Outdated path 2. Current path 1. Outdated path 2. Current path 3. Revealed path 1. Outdated path 2. Current path 3. Revealed path 4. Potential path 21

Security Level 22 May, 2012FS-BGP, THU, Networking

Computational Cost 30 days’ real BGP UPDATEs (backbone) –Cost reduced by two orders of magnitude –Achieves real-time signing & verification 22 May, 2012FS-BGP, THU, Networking 2012 FS-BGP S-BGP FS-BGP S-BGP # verifications in every second# signings in every second 23

22 May, 2012FS-BGP, THU, Networking 2012 Conclusion FS-BGP: Fast Secure BGP –CSA: Critical Segment Attestation –SPP: Suppressed Path Padding Evaluation –Similar security level as S-BGP –Reduced the cost by orders of magnitude Future work –More efficient caching –Implementation, standardization … 24 Thanks!

backup 22 May, 2012FS-BGP, THU, Networking

22 May, 2012FS-BGP, THU, Networking 2012 Outline Discussion –Support complex routing policies –Protect privacy 26

22 May, 2012FS-BGP, THU, Networking 2012 Handle complex routing policies AS may use complicate route filters to describe their routing policies –Prefix filter : –Path filter : –Origin filter : FS-BGP can be flexibly extended and support route filters  Included feasible prefixes into CSA  Sign whole path  Included feasible origins into CSA 27

Revisit the route filters Quantity of route filter –According our statistical result in IRR database, only a very small portion of policies use route filters Purpose of route filter –Some (i.e., origin/path filter) are set for security considerations, rather than policy requirements. –Others (i.e., prefix filter) are set for traffic engineering, to identifying the preference of a route, rather than the availability of a path 22 May, 2012FS-BGP, THU, Networking

22 May, 2012FS-BGP, THU, Networking 2012 Privacy Protection Privacy: customer list … FS-BGP does not make things worse! –NO additional information –Information spreading manner is same as BGP –Info. is only passively received by valid BGP UPDATE receivers –NO public policy database 29