Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
1 Securing BGP using DNSSEC Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Guide to Network Defense and Countermeasures Second Edition
RPKI and Routing Security ICANN 44 June Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.
Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
BGP Security APNIC Open Policy Meeting Routing SIG 23 February 2005 Kyoto, Japan Russ Housley
BGP Countermeasures (Secure-BGP) BBN Technologies Stephen Kent, Charles Lynn, Luis Sanchez, Martha Steenstrup, Michelle Casagni, Karen Seo.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
What’s Next: DNSSEC & RPKI Mark Kosters. Why are DNSSEC and RPKI Important Two critical resources – DNS – Routing Hard to tell when it is compromised.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
Securing the Border Gateway Protocol Using S-BGP Dr. Stephen Kent Chief Scientist - Information Security APNIC Open Policy Meeting Routing.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Lightwave Communications Research Laboratory Princeton University SoBGP vs SBGP Sharon Goldberg Princeton Routing Security Seminar June 27, 2006 and July.
Inter-domain Routing security Problems Solutions.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 04/05/2007.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
Border Gateway Protocol Vasant Reddy. Contents Introduction Operation BGP Types BGP Header Message & Attributes BGP Route Processing Security Issues Vulnerabilities.
1 Securing BGP Large scale trust to build an Internet again Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
The Resource Public Key Infrastructure Geoff Huston APNIC.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Inter-domain Routing Outline Border Gateway Protocol.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
A PKI for IP Address Space and AS Numbers Stephen Kent.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
I-4 routing scalability Taekyoung Kwon Some slides are from Geoff Huston, Michalis Faloutsos, Paul Barford, Jim Kurose, Paul Francis, and Jennifer Rexford.
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
SECURING BGP Matthew Nickasch University of Wisconsin-Platteville Dept. of Computer Science & Software Engineering.
An overview of IP addressing history and policy issues Leo Vegoda Number Resources Manager, IANA.
Secure Border Gateway Protocol (S-BGP): Real World Performance & Deployment Issues Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo BBN Technologies.
Efficient BGP Security Meiyuan Zhao, Sean Smith Dartmouth College David Nicol University of Illinois, Urbana-Champaign.
Routing Security and the Border Gateway Protocol Dr. Stephen Kent Chief Scientist - Information Security.
Addressing Issues David Conrad Internet Software Consortium.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
Design and Analysis of the Secure Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security BBN Technologies A Part of.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
4: Network Layer4b-1 OSPF (Open Shortest Path First) r “open”: publicly available r Uses Link State algorithm m LS packet dissemination m Topology map.
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Inter-domain Routing Outline Border Gateway Protocol.
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
APNIC Trial of Certification of IP Addresses and ASes
Department of Computer and IT Engineering University of Kurdistan
BGP Instability Jennifer Rexford
Presentation transcript:

Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security

Outline  BGP security problems & requirements  Making S-BGP a reality  Securing BGP UPDATE messages  PKI design  Repository design  Program history  Program status

BGP Security Problems  BGP is the critical infrastructure for Internet, the basis for all inter-ISP routing  Configuration errors affect about 1% of all routing table entries at any time  The current system is highly vulnerable to human errors, and a wide range of malicious attacks  At best, BGP routers use a point-to-point keyed MAC (with no automated key management) for point-to-point communication security  Solutions must account for the operational realities of Internet topology, size, update rates,...

BGP Security Requirements  Address space “ownership” verification  Autonomous System (AS) authentication  Router authentication and authorization (relative to an AS)  Route and address advertisement authorization  Route withdrawal authorization  Integrity and authenticity of all BGP traffic on the wire  Timeliness of BGP traffic*

S-BGP Design Overview  IPsec: secure point-to-point (router) comms  Public Key Infrastructure: an authorization framework for all S-BGP entities  Attestations: digitally-signed authorizations to advertise specified address blocks  Validation of UPDATEs based on a new path attribute, using PKI certificates and attestations  Repositories for distribution of certificates, CRLs, and address attestations  Tools for ISPs to manage address attestations, process certificates & CRLs, etc.

Who Needs to Do What for S-BGP to Become a Reality?  S-BGP PKI l Regional Registries and ISPs need to act as Certification Authorities, issuing certificates to the organizations to whom they have delegated portions of IP address space l Repositories must be deployed for S-BGP PKI data  S-BGP protocol implementation l Router vendors need to offer S-BGP software in router products (with enough memory and non-volatile storage) l OR an ancillary device that implements S-BGP and connects to existing BGP routers needs to be offered  ISPs need to acquire, deploy, and manage S-BGP products

Securing UPDATE messages  A secure UPDATE consists of an UPDATE message with a new, optional, transitive path attribute for route authorization  This attribute contains a signed sequence of route attestations  This attribute is structured to support both route aggregation and AS sets (BGP function details)  Validation of the attribute verifies that the route was authorized by each AS along the path and by the address space owner

An UPDATE with Attestations BGP Header Addr Blks of Rtes Being Withdrawn BGP Path Attributes Dest Addr Blks(NLRI) Attribute Header Route Attestations Attestation Header Issuer Certificate ID Algorithm ID & Signature Signed Info Route Attestation Path Attribute for Attestations UPDATE Message

A PKI for S-BGP  Certificates identify owners of AS numbers and address blocks  Address block data is used as an input to UPDATE message processing  Other certificates are used for management of repository access control, IPsec (IKE), etc.  PKI design uses a multi-rooted tree, rooted at regional registries, with delegation to national registries, ISPs, DSPs, subscribers

Subscriber Organizations Delegate Allocate Subscriber Organizations Regional Registries DSPs ISPs ICANN Subscriber Organizations Address Delegation and Allocation Subscriber Organizations ISPs/DSPs IANA (historical)

Delegate Subscriber Organizations Regional Registries DSPsISPs ICANN AS Number Delegation Hierarchy

Registry Root CA (ARIN) [1] Registry Root CA (APNIC) [1] Registry Root CA (RIPE) [1] Repository CA [2] Repository CA [2] Repository CA [2] Registry CA (APNIC) [5] Registry CA (ARIN) [5] Registry CA (RIPE) [5] certification cross-certification S-BGP PKI: Top Tiers

S-BGP PKI: Registry “Branch” Repository CA (1 per Repository) [2] Repository Admin EE (1 per Repository Admin) [3] Repository EE (1 per Repository) [4] Router EE (1/Router) [8] CA (Certification Authority) EE (End Entity) Used for initialization phase only Registry CA (1 per Registry) [5] ISP/Org CA (1 per ISP or Org) [5] DSP/Org CA (1 per DSP or Org) [5] Grandfather CA (1 per Registry) [5] Generic CA (1 per ISP or Org) [5] AS # EE (1/AS#) [9] Generic EE (1 per ISP or Org) [6] Network EE (1/ISP or Org) [6] Org that owns IP addresses Org that is running S-BGP Operator EE (1/Operator) [7] IPsec EE (1/router) [10]

S-BGP PKI Repositories  Putting certificates, CRLs, or address attestations in UPDATEs would be redundant and make UPDATEs too big  Solution: use servers l replicate for reliability & scaling, loose synch l locate at high availability, non-routed access points l ISPs and dual-homed subscribers upload certificates, CRLs, and AAs that they generate l every ISP and multi-homed subscriber downloads the whole certificate/AA/CRL database l Access controlled based on PKI structure, to mitigate denial of service attacks against the repositories

S-BGP NOC Software  Software to help ISPs manage data required by S- BGP l Mini-RA facility for managing organization, router, and operator certificates, generating address attestations l Software for uploading & downloading certificates, CRLs, and address attestations to/from repositories l Software for validating certificates and address attestations and producing extract for download to routers  Policy management l Software to configure S-BGP routers to know which AS’s implement S-BGP

Program Status  Good news l NOC tools & repository almost complete l Reference S-BGP software available in Spring 02 l Registrar CA technology available in June 02  Not so good news l Not much router vendor interest recently l Minimal recent ISP interest (except Genuity & DISA)  Registry Interactions l Initial interactions with ARIN, awaiting updated database l APNIC expressing interest in the PKI

Any More Questions?