Interdomain Routing Security COS 461: Computer Networks Michael Schapira.

Slides:



Advertisements
Similar presentations
CSE390 – Advanced Computer Networks
Advertisements

Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
The need for BGP AfNOG Workshops Philip Smith. “Keeping Local Traffic Local”
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Computer Science Department Princeton University
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Internet Routing (COS 598A) Today: Routing Protocol Security Jennifer Rexford Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
1 Interdomain Routing Security COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford Teaching Assistants: Sunghwan Ihm and.
Computer Networks Layering and Routing Dina Katabi
Inter-domain Routing Outline Border Gateway Protocol.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Routing Security and the Border Gateway Protocol Dr. Stephen Kent Chief Scientist - Information Security.
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
Interdomain Routing Security Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Internet Routing Verification John “JI” Ioannidis AT&T Labs – Research Copyright © 2002 by John Ioannidis. All Rights Reserved.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
Inter-domain Routing Outline Border Gateway Protocol.
BGP security some slides borrowed from Jen Rexford (Princeton U)
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
One Hop for RPKI, One Giant Leap for BGP Security Yossi Gilad (Hebrew University) Joint work with Avichai Cohen (Hebrew University), Amir Herzberg (Bar.
Interdomain Routing Security COS 461: Computer Networks Jennifer Rexford.
CS590B/690B Detecting Network Interference
(Inter)Network Protocols: Theory and Practice Lecture 3 Dr
Border Gateway Protocol
COS 561: Advanced Computer Networks
CSCI-1680 Network Layer: Inter-domain Routing – Policy and Security
Are We There Yet? On RPKI Deployment and Security
COS 561: Advanced Computer Networks
Department of Computer and IT Engineering University of Kurdistan
COS 561: Advanced Computer Networks
Interdomain Routing Security
Interdomain Routing Security
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Presentation transcript:

Interdomain Routing Security COS 461: Computer Networks Michael Schapira

Goals of Today’s Lecture BGP security vulnerabilities Improving BGP security Difficulty of upgrading BGP

How Secure is Today’s Internet Routing? February 2008: Pakistan Telecom hijacks YouTube! YouTube Pakistan Telecom Pakistan Telecom Telnor Pakistan Telnor Pakistan Aga Khan University Aga Khan University Multinet Pakistan Multinet Pakistan The Internet I’m YouTube: IP /22 I’m YouTube: IP /22

How Secure is Today’s Internet Routing? What should have happened… YouTube Pakistan Telecom Pakistan Telecom Telnor Pakistan Telnor Pakistan Aga Khan University Aga Khan University Multinet Pakistan Multinet Pakistan I’m YouTube: IP /22 I’m YouTube: IP /22 X drop packets

How Secure is Today’s Internet Routing? What did happen… YouTube Pakistan Telecom Pakistan Telecom Telnor Pakistan Telnor Pakistan Aga Khan University Aga Khan University Multinet Pakistan Multinet Pakistan I’m YouTube: IP /22 I’m YouTube: IP /22 Pakistan Telecom Pakistan Telecom No, I’m YouTube! IP /24 No, I’m YouTube! IP /24

How Secure is Routing on the Internet Today? (2) China Telecom UK ISP Verizon /24 Verizon /24 London Internet Exchange

How Secure is Routing on the Internet Today? (2) April 2010 : China Telecom intercepts traffic China Telecom UK ISP Verizon /24 (and 50k other networks) Verizon /24 (and 50k other networks) Verizon /24 Verizon /24 This packet is destined for Verizon. London Internet Exchange

BGP Security Today Applying best common practices (BCPs) – Filtering routes by prefix and AS path, etc. This is not good enough! – Depends on vigilant application of BCPs … and not making configuration mistakes! – Doesn’t address fundamental problems, e.g., prefix hijacking!

Securing Internet Routing How to secure Internet routing? – Long standing agenda in the standards and research communities. Over the past 15 years, several secure Internet routing protocols have been proposed.

Securing Internet Routing The U.S. federal government is accelerating its efforts to secure the Internet's routing system … The effort … will secure the Internet's core routing protocol known as the Border Gateway Protocol (BGP). “BGP is one of the largest threats on the Internet. It's incredible, the insecurity of the routing system.” (Danny McPherson, CSO at Arbor Networks, Jan 2009)

The Internet AT&T Qwest Comcast Sprint Over 35,000 Autonomous Systems (ASes) Routing between ASes handled by the Border Gateway Protocol (BGP)

The Commercial Internet ASes sign long-term contracts. Neighboring pairs of ASes have: – a customer-provider relationship. – a peering relationship. peer providers customers peer Stub (~85% of ASes) ISP

$ Verizon UPC Init 7 AG Zurich Init 7 AG Zurich $ $ $$ IP Prefix customer peer provider Illustration

Verizon UPC Init 7 AG Zurich Init 7 AG Zurich UPC, Prefix Init 7, UPC, Prefix 43284, Init 7, UPC, Prefix Verizon, UPC, Prefix IP Prefix $ $ Routing with BGP 1)Prefer revenue generating routes 2)Prefer shorter routes

Verizon UPC Init 7 AG Zurich Init 7 AG Zurich ,Verizon, UPC, Prefix IP Prefix $ $ X Losing $$ UPC, Prefix Init 7, UPC, Prefix 43284, Init 7, UPC, Prefix Verizon, UPC, Prefix Routing with BGP 1)Prefer revenue generating routes 2)Prefer shorter routes 3)Do not carry transit traffic for free

Origin Authentication Secure BGP BGP Secure Routing Protocols Secure Origin BGP Secure TraceRoute

Origin Authentication Secure BGP BGP In this lecture

Prefix Hijacking and Origin Authentication

IP Address Ownership and Hijacking IP address block assignment – Regional Internet Registries (ARIN, RIPE, APNIC) – Internet Service Providers Proper origination of a prefix into BGP – By the AS who owns the prefix – … or, by its upstream provider(s) in its behalf However, what’s to stop someone else? – Prefix hijacking: another AS originates the prefix – BGP does not verify that the AS is authorized – Registries of prefix ownership are inaccurate

a1a1 a1a1 a2a2 a2a2 v v a3a3 a3a3 m m IP v, Prefix a 2, m, Prefix m, Prefix m m $ $ ? IP Prefix victim Prefix Hijacking

Hijacking is Hard to Debug The victim AS doesn’t see the problem – Picks its own route – Might not even learn the bogus route May not cause loss of connectivity – E.g., if the bogus AS snoops and redirects – … may only cause performance degradation Or, loss of connectivity is isolated – E.g., only for sources in parts of the Internet Diagnosing prefix hijacking – Analyzing updates from many vantage points – Launching traceroute from many vantage points

How to Hijack a Prefix The hijacking AS has – Router with BGP session(s) – Configured to originate the prefix Getting access to the router – Network operator makes configuration mistake – Disgruntled operator launches an attack – Outsider breaks in to the router and reconfigures Getting other ASes to believe bogus route – Neighbor ASes do not discard the bogus route – E.g., not doing protective filtering

a1a1 a1a1 a2a2 a2a2 v v a3a3 a3a3 m m IP Prefix A secure database maps IP prefixes to owner ASes. Origin Authentication

Bogus Routes and Secure BGP

a1a1 a1a1 a2a2 a2a2 v v a3a3 a3a3 m m IP Prefix v, Prefix a 2, m, v, Prefix m, v, Prefix m m $ $ ? A secure database maps IP prefixes to owner ASes. Origin Authentication

Bogus AS Paths Remove ASes from the AS path – E.g., turn “ ” into “701 88” Possible motivations – Make the AS path look shorter than it is – Attract sources that normally try to avoid AS

Add ASes to the path – E.g., turn “701 88” into “ ” Possible motivations: – Trigger loop detection in AS 3715 – Make your AS look like is has richer connectivity Bogus AS Paths

Public Key Signature: Anyone who knows v’s public key can verify that the message was sent by v. a1a1 a1a1 a2a2 a2a2 v v a3a3 a3a3 m m IP Prefix a 1 : (v, Prefix) m: (a 1, v, Prefix) Secure BGP Origin Authentication + cryptographic signatures

Secure BGP S-BGP can validate the order in which ASes were traversed. S-BGP can validate that no intermediate ASes were added or removed. S-BGP can validate that the route is recent.

Are We There Yet?

S-BGP Deployment Challenges Complete, accurate registries – E.g., of prefix ownership Public Key Infrastructure – To know the public key for any given AS Cryptographic operations – E.g., digital signatures on BGP messages Need to perform operations quickly – To avoid delaying response to routing changes Difficulty of incremental deployment – Hard to have a “flag day” to deploy S-BGP

Incremental Deployment? There is a necessary transition period. S-BGP must be backwards compatible with BGP Who upgrades first? Why?

a1a1 a1a1 a2a2 a2a2 a4a4 a4a4 a3a3 a3a3 a0a0 a0a0 Why should I upgrade if (security) benefits don’t kick in unless everyone else does? Pessimistic View S-BGP = IPv6? ISPs would be the ones forced to upgrade all of their equipment to support this initiative, but how would it benefit them? As commercial companies, if there is little to no benefit (potential to increase profit), why would they implement a potentially costly solution? The answer is they won’t. [ net_Routers_BGP_and_Ignorance]

Conclusions Internet protocols designed based on trust – The insiders are good guys – All bad guys are outside the network Border Gateway Protocol is very vulnerable – Glue that holds the Internet together – Hard for an AS to locally identify bogus routes – Attacks can have very serious global consequences Proposed solutions/approaches – Secure variants of the Border Gateway Protocol

One last thing… Harming Internet Routing Without Attacking BGP

Attacks on TCP and Data-Plane Attacks Attack TCP! – A BGP session runs over TCP. Do not forward traffic as advertised! – Drop packets! – Route packets along unannounced routes!