Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
Internet Protocol Security (IP Sec)
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
A Survey of BGP Security: Issues and Solutions Butler, Farley, McDaniel, Rexford Kyle Super CIS 800/003 October 3, 2011.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
A Survey of Secure Wireless Ad Hoc Routing
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
BGP.
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
Availability Centric Routing (ACR) Robust Interdomain Routing Without BGP Security July 25 th, 2006.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Internet Routing (COS 598A) Today: Routing Protocol Security Jennifer Rexford Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
Advanced Computer Networks cs538, Fall UIUC
1 Interdomain Routing Security COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford Teaching Assistants: Sunghwan Ihm and.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Information-Centric Networks04a-1 Week 4 / Paper 1 Open issues in Interdomain Routing: a survey –Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure.
Information-Centric Networks07c-1 Week 7 / Paper 3 Accountable Internet Protocol (AIP) –Michael Walfish, Hari Balakrishnan and Scott Shenker David G. Andersen,
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Staff AAA. Radius is not an ISP AAA Option RADIUS TACACS+ Kerberos.
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Information-Centric Networks Section # 7.3: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
Interdomain Routing Security Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Cryptography CSS 329 Lecture 13:SSL.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
BGP security some slides borrowed from Jen Rexford (Princeton U)
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
Interdomain Routing Security COS 461: Computer Networks Jennifer Rexford.
IPSecurity.
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
Goals of soBGP Verify the origin of advertisements
COS 561: Advanced Computer Networks
Interdomain Routing Security
Interdomain Routing Security
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Advanced Computer Networks
Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford –Proceedings of the IEEE, 98(1): , January 2010 Main point –BGP is the glue that holds the Internet together –It is however highly vulnerable –It does not adequately address security –Review of proposed improvements

Information-Centric Networks04c-2 Introduction Serious security incidents –A misconfigured router in Florida became a black hole It advertised incorrect routes (too good) But nobody validates these routes –Pakistan Telecom hid YouTube Attempt to close access to local customers –Spammers introduce fake prefixes Avoid spam registries by exploiting unused addresses –Snoopers introduce fake routes to snoop on traffic Operational and security concerns –Interrelated to a high degree Survey of current practice and research

Information-Centric Networks04c-3 IP prefixes and AS numbers Addresses are assigned hierarchically –IANA to regional authorities, then national authorities, then ISPs –Each gets and address block represented as IP/prefix Each block is the allocated further down Longer prefixes indicate smaller address blocks –Autonomous System Numbers from IANA Each network has one or more public ASNs Networks with a single upstream provider can have a private ASN –BGP paths are expressed in terms of ASNs to a prefix But there is no foolproof way to check the validity of either Announcing prefixes you do not have is prefix hijacking –Black holes: data ends up nowhere (maybe just a mistake) –Impersonation: the hijacker pretends to offer services –Interception: the hijacker inspects traffic

Information-Centric Networks04c-4 Using TCP as the transport protocol BGP routers communicate via TCP –No need to deal with error, flow and congestion control But TCP in itself is quite insecure –Attacks against confidentiality Eavesdropping on multi hop connections –Attacks against message integrity Various types of man in the middle attacks Message replays, forged messages, resets –Denial of service attacks More feasible from off path intruders Link cutting to force use of alternative paths

Information-Centric Networks04c-5 Routing policy & route attributes BGP employs route attributes to enforce policy routing –Local preference: select routes inside an AS –AS path length: prepending an AS number inflates route length –Origin type: routes learned from within the AS are preferred –Multi-exit discriminator: select one of many connections –Route filtering also allows complex policies to be enforced Which routes are propagated and which are not –The problem is that advertised routes may be fake! A route may be truncated to become more attractive A route may be extended to seem valid A route may be edited to hide undesirable ASes

Information-Centric Networks04c-6 Cryptographic techniques for BGP Basic security limitation: the system is decentralized –Localized solutions are far more practical Cryptographic techniques applicable to BGP –Pairwise keying: relies on shared secret keys –Cryptographic hash functions: to produce digests –Message authentication codes: to verify signed digests –Diffie-Hellman key negotiation: jointly select secret keys –Public key infrastructure: allows public key cryptography –Public key cryptography: simplifies authentication –Certificates and attestations: allows building chains of trust

Information-Centric Networks04c-7 Protecting BGP sessions Integrity protection: use of MACs for sensitive data –MD5 or arbitrary digests and digital signatures Session and message protection –Encryption and numbering of BGP messages Hop integrity protocols Generalized TTL security mechanism (GTSM) –Drops packets with TTL lower than expected –Limited protection for a limited surrounding area IPsec: lower level session encryption –Extensively used for VPNs, therefore widely available

Information-Centric Networks04c-8 Defensive filtering Filtering rules for suspicious routes –Using special address prefixes or private AS numbers These should never exit an AS –Using unallocated prefixes Requires a service that knows what is allocated –More aggressive filtering for customers You know what to expect from a customer –Rewriting rules for malformed routes –Good practice but inherently limited Can only catch obvious errors

Information-Centric Networks04c-9 Routing registries A global view of routing would prevent many attacks –An accurate routing registry would be invaluable Prefix ownership, AS-level connectivity, routing policies –But ASes do not want to expose their policies –And the registry is also a target for attacks Unfortunately even address registrars are inaccurate –Registries allocate addresses to networks –But address delegations change and are not updated Many approaches also require a PKI –Essentially a registry for public keys –Also for certificate revocation lists

Information-Centric Networks04c-10 Securing router management The BGP router interface has to resist attacks –Gaining access to the CLI allows lots of attacks –Physical and network security required –Management interfaces need to be secured –Only secure management connections should be allowed –Physical redundancy to guard against DoS attacks –General security hardening is even more important for BGP Bringing down router connections allows more attacks

Information-Centric Networks04c-11 BGP security solution issues Implementing security solutions is a scalability issue –40000 AS numbers have been allocated to regional registries –35000 have been allocated to institutions –32000 are being routed –Advertised routing prefixes increase continuously Many security solutions exist –Some have been implemented, some proposed –But they are not widely deployed and accepted Routing registries –Too much information to keep accurate Computational complexity –Overload of BGP servers due to cryptography