BGP Countermeasures (Secure-BGP) BBN Technologies Stephen Kent, Charles Lynn, Luis Sanchez, Martha Steenstrup, Michelle Casagni, Karen Seo.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
Network Monitoring and Security Nick Feamster CS 4251 Spring 2008.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Guide to Network Defense and Countermeasures Second Edition
BGP.
BGP Security APNIC Open Policy Meeting Routing SIG 23 February 2005 Kyoto, Japan Russ Housley
CS Summer 2003 CS672: MPLS Architecture, Applications and Fault-Tolerance.
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
Routing: Exterior Gateway Protocols and Autonomous Systems Chapter 15.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Chapter 5 Network Security Protocols in Practice Part I
NDSS’99 Network and Distributed Systems Security Symposium Securing the Internet’s Exterior Routing Infrastructure Secure Border Gateway Protocol (S-BGP)
Securing the Border Gateway Protocol Using S-BGP Dr. Stephen Kent Chief Scientist - Information Security APNIC Open Policy Meeting Routing.
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
More on BGP Check out the links on politics: ICANN and net neutrality To read for next time Path selection big example Scaling of BGP.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
SECURING BGP Matthew Nickasch University of Wisconsin-Platteville Dept. of Computer Science & Software Engineering.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Secure Border Gateway Protocol (S-BGP): Real World Performance & Deployment Issues Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo BBN Technologies.
Routing Security and the Border Gateway Protocol Dr. Stephen Kent Chief Scientist - Information Security.
Border Gateway Protocol
Karlstad University IP security Ge Zhang
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Design and Analysis of the Secure Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security BBN Technologies A Part of.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Overview of draft-ietf-sidr-roa-00.txt Steve Kent BBN Technologies.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
BGP Validation Russ White Rule11.us.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
Goals of soBGP Verify the origin of advertisements
APNIC Trial of Certification of IP Addresses and ASes
COMP/ELEC 429/556 Introduction to Computer Networks
BGP Instability Jennifer Rexford
Presentation transcript:

BGP Countermeasures (Secure-BGP) BBN Technologies Stephen Kent, Charles Lynn, Luis Sanchez, Martha Steenstrup, Michelle Casagni, Karen Seo

2 Outline l Overview – Problem – Goals – Attack Model l Design Overview l Performance Issues l Deployment Scenario l Residual Vulnerabilities l Comparison with other approaches l Next Steps

3 Overview l In early 1997, we began work on BGP security: – assessed BGP vulnerabilities and possible countermeasures – designed Secure-BGP architecture -- aiming for a system that is dynamic, and scalable – analyzed overhead and performance impact (memory, CPU, bandwidth) – proposed optimizations l Follow-on work in 1998 and 1999 will include: – development of a prototype of Secure-BGP – experiments in the CAIRN testbed – presentation of the results and distribution of the software

4 The Problem l The Border Gateway Protocol (BGP) is vulnerable to attacks due to the lack of a scalable means of ensuring the authenticity and legitimacy of BGP control traffic: – no means of establishing the authority of an Autonomous System (AS) or BGP speaker to advertise a portion of address space (NLRI origin verification) – no means of establishing the authority of an Autonomous System (AS) or BGP speaker to advertise routes to a destination or destinations (AS_PATH validation) – need for peer authentication and ensuring of UPDATE integrity in conjunction with automated key management and anti-replay protection

5 Correct Operation of BGP l Each UPDATE is intact, sent by the indicated sender, and is intended for indicated receiver l Neighbor that sent the UPDATE was authorized to act on behalf of its AS to advertise the routing information in the UPDATE to the BGP speakers in the recipient AS l Neighbor withdrawing a route is the advertiser for that route l AS that generated the initial UPDATE is authorized by the Organization that owns the address space in the NLRI to represent the address space

6 Correct Operation of BGP (nice, but...) l Neighbor that sent the UPDATE, correctly applied BGP rules, local policies, etc. l BGP speaker that received the UPDATE, correctly applied BGP rules, local policies, etc. l Subscriber traffic forwarded by a BGP speaker is valid (not spoofed, duplicated, etc.) We can’t enforce these aspects of correct operation because BGP affords speakers considerable latitude with regard to local policy, ASes do not tend to make public their local policies, and because validation and tracking of subscriber traffic is impractical

7 Goals of these Countermeasures l A scalable, deployable system that ensures – integrity, authenticity, and partial sequence integrity for each BGP routing UPDATE – valid AS_PATH in an UPDATE – authorization of the initial speaker to advertise the address space embodied in the UPDATE l Minimize the adverse effects of compromise of any BGP speaker, BGP management system, or portion of the proposed security infrastructure

8 Attack Model l BGP can be attacked in various ways – active or passive wiretapping of communications links between routers – tampering with BGP speaker software – tampering with router management data en route – tampering with router management server l Addition of the proposed countermeasures introduces a new concern – compromise of secret/private keying material in the routers or in the management infrastructure

9 Implications of Successful Attacks l Successful attacks on BGP or its management infrastructure can result in erroneous – UPDATE information – UPDATE distribution – route derivation and selection* – forwarding of user traffic* – destruction of user traffic* l Successful attacks on the security infrastructure could result in – BGP speaker spoofing – invalid address space representation by a speaker * not addressed by the proposed countermeasures

10 Design Overview l IPsec --> authenticity and integrity of peer-to-peer communication l Public Key Infrastructures (PKIs) --> secure identification of BGP speakers and of owners of ASes and of address blocks l Attestations --> authorization of the subject (by the issuer) to advertise the specified address blocks l Validation of UPDATEs using certificates and attestations l Distribution of countermeasures information --> certificates, CRLs, attestations

11 IPsec l IPsec use enables a BGP neighbor to verify – BGP message integrity – peer entity authentication (two way) – replayed BGP messages l BGP-4 has means for carrying authentication information, but no key management scheme or sequence numbering facility l IPSec supports automated key management, anti- replay service, etc. l Vendors are already putting IPSec into routers

12 PKI: Address Allocation Certificates l Used for verification of an organization's authorization to "advertise" a block of addresses l IANA is root of all addresses l Regional Registries below IANA (Internic, RIPE, and AP-NIC) perform allocation chores today l ISPs nominally receive address blocks from Registries l DSPs and subscribers nominally receive address blocks from ISPs l But, hierarchic allocation not always followed... l Address space subordination extension (and hardware) can mitigate errors by registries, ISPs and DSPs

13 Address Allocation PKI Example SUB-Z DSP-DSUB-XX SUB-Y SUB-ZZ DSP-A SUB-XISP-1 DSP-C SUB-YY INTERNIC ISP-2DSP-B IANA

14 Address Certificates addr blks IANA or Registry ISP/DSP IssuerSubjectExtensions IANA Root Certificate ISP/DSP Certificate Registry Certificate IANARegistryaddr blks Registry or ISP/DSP Subscriber Subscriber Certificate all addr

15 AS and Router Certificates IssuerSubjectExtensions ISP/DSP or Subscriber AS ISP/DSP or Subscriber Router*ASIANA ISP/DSP or Subscriber ASes AS Owner Certificate Router Certificate AS Certificate * the subject name could be DNS IANA Root Certificate All ASes

16 Attestations -- Overview l Each UPDATE includes one or more “address” attestations and a set of “route” attestations l These are carried in a new, optional, transitive path attribute l They are used by BGP speakers to validate the destination address blocks and the full end-to-end path (AS_PATH) information in the UPDATE

17 Address Attestation l Indicates that the final AS listed in the UPDATE is authorized by the owner of those address blocks to advertise the address blocks (NLRI) in the UPDATE l Includes identification of: – owner’s certificate – AS to be advertising the address blocks – address blocks – expiration date l Digitally signed by owner of the address blocks, traceable up to the IANA via certificate chain l Used to protect BGP from erroneous UPDATEs (authenticated but misbehaving or misconfigured BGP speakers)

18 Route Attestation l Indicates that the speaker or its AS authorizes the listener’s AS to use the route in the UPDATE l Includes identification of: – AS’s or BGP speaker’s certificate issued by the owner of the AS – the address blocks and the list of ASes in the UPDATE – the neighbor – expiration date l Digitally signed by owner of the AS (or BGP speaker) distributing the UPDATE, traceable to the IANA... l Used to protect BGP from erroneous UPDATEs (authenticated but misbehaving or misconfigured BGP speakers)

19 Encoding of Attestations BGP Header Addr Pref of Rtes Being Withdrawn Path Attributes Dest. Addr Pref. (NLRI) Attribute Header Route + Address Attestations Attestation Header Issuer Signed Info Algorithm ID & Signature Subject Exp Date AS Path Info * NLRI Info * Path Attribute for Attestations Attestation: Route or Address Signed Info UPDATE *explicit in the aggregation case Cert ID

20 Validating a Route l To validate a route from ASn, ASn+1 needs: – 1 address attestation from each organization owning an address block(s) in the NLRI – 1 address allocation certificate from each organization owning address blocks in the NLRI – 1 route attestation from every AS along the path (AS1 to ASn), where the route attestation for ASk specifies the NLRI and the path up to that point (AS1 through ASk+1) – 1 certificate for each AS or router along the path (AS1 to ASn) to use to check signatures on the route attestations – and, of course, all the relevant CRLs must have been checked

21 Distribution, Replacement, Revocation l Certificate & CRL servers: – replication for redundancy, scalability – location (NAPs?) offering direct access and requiring minimal routing – support download of whole certificate database – support queries for individual certificates – support download of all certificate revocation lists (CRLs), but push/pull model not yet defined l Attestations – distributed with BGP UPDATEs as path attributes – cached with associated routes – expiration date present, but no revocation mechanism chosen yet

22 Performance Issues -- Resources l Certificates (generation and signing done offline) – disk space for storing certificates – CPU resources for validating certificates l CRLs (generation and signing done offline) – disk space for storing CRLs – CPU resources for validating CRLs l Attestations – disk space for storing attestations – CPU resources for signing and validating attestations – resources for transmitting attestations (to make this a dynamic system)

23 Performance -- Certificates l Processing -- certificates and CRLs are signed infrequently; this should be done off-line (and not by routers) l Storage: – ~30 Mbytes for ~65K Certificates – ~2 Mbytes for ~3K CRLs – DNS or Certificate server -- 1 entry/address block, 1 entry/AS, 1 entry/BGP-speaker in an AS l Transmission bandwidth -- An UPDATE will not hold the certificates needed to validate an average route. Therefore, certificates will have to be cached. Certificates will be transmitted at a low frequency except at startup. * Estimates are based on observed MRT data from Jan 1998

24 Performance -- Attest.’s (worst case) l Processing (using DSA/SHA-1) – at initialization of a BGP router (with 25 peers), 7.5 hours to validate UPDATEs; 3.5 hours to generate/sign (LOC-RIB) for 25 peers – daily, 5-6 minutes to validate UPDATEs; 5-6 minutes to generate/sign attestations (assuming 10 UPDATEs/second) l Storage – address attestations -- ~7 Mbytes – route attestations -- ~20 Mbytes for ADJ-RIB per BGP peer; 80 Mbytes (4 peers) to 500 Mbytes (25 peers) l Transmission bandwidth – countermeasures information adds ~400 bytes to a typical (2.6 ASes in path) UPDATE of 63 bytes, but UPDATEs represent a very small portion of all traffic, so...

25 Optimizations l Cache previously validated routes to avoid re- validation, e.g., if router crashes or neighbor link is lost l Required BGP caching would cover ~89% of UPDATEs – retain peer cache over route flap – caching last two distinct paths from a single peer hits another 6% of UPDATEs l Mark routes “withdrawn” for use later, e.g., if link flapped, to speed up validation for reinstated routes l Keep only needed certificate fields in Secure-BGP databases

26 Optimizations (continued) l Offload generation/signing of route attestations, e.g., from routers to AS (also reduces vulnerability to compromise of keys) l Background verification of alternate routes l Deferral of verification until route is used l Heuristics to guide which prefixes are aggregated in an UPDATE -- this is aimed at reducing the amount of information that has to be made explicit (see page 19) in when an aggregate is later split into its components. l There are not many different ASes in most AS paths

27 Other Performance Savings l Most organizations will obtain their address blocks from their provider --> reduces number of address attestations needed. l Most DSPs and subscribers use default routing, not BGP l Most organizations/users are singly homed l Limit where UPDATE validation occurs, e.g., not needed for – singly homed “leaf” organizations – singly homed DSPs – multi-homed DSP -- check only if receive >1 route to same address blocks

28 Deployment Scenario l Near term we plan to use an auxiliary BGP box collocated with BGP border routers l Later, the countermeasures can be implemented as desired -- users can implement them, router vendors can offer them as a product separate from the router or as part of the router

29 Auxiliary BGP box l No changes required to router hardware or software except for re-configuration to work with this box l Provides CPU, memory, and disk needed to handle BGP routing and security countermeasures l Collocated with each BGP border router – auxiliary boxes peer with each other (with boxes in same AS and boxes collocated with neighbor routers) and the border router – border router peers only with auxiliary box and (optionally) internal BGP routers (same AS)

30 Auxiliary BGP box (continued) l Inexpensive hardware, simple interface to existing routers, easy use of PC crypto cards l Suitable base BGP code is readily available, e.g., gated l Compared to having countermeasures integrated into router, requires extra rack space and a router port, increases the number of items that can fail and that need to be managed

31 Deployment Assumptions l IANA and registration authorities will support PKIs l First tier ISPs will implement countermeasures l Lower level ISPs/DSPs/Subscribers may implement l ISPs/DSPs/Subscribers who are running e-BGP will cooperate in the generation and distribution of route attestations l Subscribers (or their providers) will cooperate in the generation/maintenance of address attestations l Auxiliary BGP devices can be deployed without changes to current router hardware or software (and may even improve performance of existing routers)

32 Secure-BGP Peering Example Secure-BGP device Border Router FDDI Ring NAP External Peer Internal Peer

33 Residual Vulnerabilities l Suppression of BGP messages by a misbehaving BGP speaker -- since AS1's BGP policies are not typically available to AS2, there is no simple way for AS2 to determine if AS1's speakers are misbehaving l A speaker can fail to withdraw a route that “should” be withdrawn, or it may inappropriately reassert a previously withdrawn route (mitigated by attestation expiration) l Misapplication of local policy-- not even detectable by other ASes, due to privacy of local policies l Passive wiretapping -- could use IPsec encryption

34 Comparison with Other Approaches l Routing Policy System Security -- C. Villamizar (ANS), C.Alaettinog (ISI), D. M. Meyer (University of Oregon), S. Murphy (TIS), C. Orange (RIPE) l NLRI Origin Verification -- T. Bates (Cisco Systems), R. Bush (RGnet), T. Li (Juniper Networks), Y. Rekhter (Cisco Systems) (Used with DNSSEC) l Protection of BGP Sessions via the TCP MD5 Signature Option -- A. Heffernan (Cisco Systems)

35 Comparison w/Other Approaches(cont.) l Analysis of overhead (storage, CPU, bandwidth) using real-world BGP data l Dynamic AS_PATH verification at each AS hop. l PKI for NLRI/Origin-AS verification (vs. IRR Database or DNS lookup) l Automated key management for authentication of peering sessions l AS has to provide attestations for each route even if it’s not going to do route validation. l Adds extra overhead to BGP UPDATEs l Changes the protocol

36 Next Steps l Additional performance analysis l Completion of design – Revocation mechanisms for certificates (maybe attestations) – Syntax details for attestations and certificates – Software design (APIs, file structures, etc.) – Assessment of how to best handle multicast l Development of prototype and experimentation in DARPA Cairn testbed – Selection of BGP implementation (gated, routed) – Develop, test and demonstrate software – Set up PKIs -- number of CAs, CRL issuance l Brief ISPs/DSPs, registries, IANA & router vendors