Protecting the BGP Routes to Top Level DNS Servers NANOG-25, June 11, 2002 UCLA Lan Wang Dan Pei Lixia Zhang USC/ISI Xiaoliang Zhao Dan Massey Allison.

Slides:



Advertisements
Similar presentations
An Operational Perspective on BGP Security Geoff Huston February 2005.
Advertisements

The Impact of Policy and Topology on Internet Routing Convergence NANOG 20 October 23, 2000 Abha Ahuja InterNap *In collaboration with.
Modeling Inter-Domain Routing Protocol Dynamics ISMA 2000 December 6, 2000 In collaboration with Abha, Ahuja, Roger Wattenhofer, Srinivasan Venkatachary,
1 Securing BGP using DNSSEC Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Comparing IPv4 and IPv6 from the perspective of BGP dynamic activity Geoff Huston APNIC February 2012.
Internet Routing (COS 598A) Today: Interdomain Routing Convergence Jennifer Rexford Tuesdays/Thursdays.
A Study of BGP Origin AS Changes and Partial Connectivity Ratul Mahajan David Wetherall Tom Anderson University of Washington Asta Networks † † ‡ † ‡ ‡
Advanced Networks 1. Delayed Internet Routing Convergence 2. The Impact of Internet Policy and Topology on Delayed Routing Convergence.
BGP Multiple Origin AS (MOAS) Conflict Analysis Xiaoliang Zhao, NCSU S. Felix Wu, UC Davis Allison Mankin, Dan Massey, USC/ISI Dan Pei, Lan Wang, Lixia.
1 Experimental Study of Internet Stability and Wide-Area Backbone Failure Craig Labovitz, Abha Ahuja Merit Network, Inc Presented by Changchun Zou.
DSN 2003 A Study of Packet Delivery Performance during Routing Convergence Dan Pei, Lan Wang, Lixia Zhang, UCLA Dan Massey, USC/ISI S. Felix Wu, UC Davis.
Beyond BGP Dan Massey Colorado State University. 24 October Internet Routing l Challenges Facing Internet Routing n Internet.
1 BGP Anomaly Detection in an ISP Jian Wu (U. Michigan) Z. Morley Mao (U. Michigan) Jennifer Rexford (Princeton) Jia Wang (AT&T Labs)
1 Measurement of Highly Active Prefixes in BGP Ricardo V. Oliveira, Rafit Izhak-Ratzin, Beichuan Zhang, Lixia Zhang GLOBECOM’05.
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Network Infrastructure Security Research at Colorado State University Dan Massey November 19, 2004.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Improving BGP Convergence Through Consistency Assertions Dan Pei, Lan Wang, Lixia Zhang UCLA Xiaoliang Zhao, Daniel Massey, Allison Mankin, USC/ISI S.
10/21/2003DSOM'2003, Heidelberg, Germany1 Visual-based Anomaly Detection for BGP Origin AS Change (OASC) Soon-Tee Teoh 1, Kwan-Liu Ma 1, S. Felix Wu 1,
Delayed Internet Routing Convergence Craig Labovitz, Abha Ahuja, Abhijit Bose, Farham Jahanian Presented By Harpal Singh Bassali.
Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Wresting Control from BGP: Scalable Fine-grained Route Control UCSD / AT&T Research Usenix —June 22, 2007 Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren,
Impact of Configuration Errors on DNS Robustness Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang SIGCOMM 2004 Presented.
10/17/2002RAID 2002, Zurich1 ELISHA: A Visual-Based Anomaly Detection System Soon-Tee Teoh, Kwan-Liu Ma S. Felix Wu University of California, Davis Dan.
02/06/2006ecs236 winter Intrusion Detection ecs236 Winter 2006: Intrusion Detection #4: Anomaly Detection for Internet Routing Dr. S. Felix Wu Computer.
A a secure peering. RIB table dump by attributes in order to save space. References 1. RouteViews, 2. RIPE,
March 22, 2002 Simple Protocols, Complex Behavior (Simple Components, Complex Systems) Lixia Zhang UCLA Computer Science Department.
2003/11/051 The Temporal and Topological Characteristics of BGP Path Changes Di-Fa Chang Ramesh Govindan John Heidemann USC/Information Sciences Institute.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
DARPA NMS PI Meeting November 14, 2002 Understanding BGP in Action Dan Massey USC/ISI.
Yaping Zhu with: Jennifer Rexford (Princeton University) Subhabrata Sen and Aman Shaikh (AT&T Labs-Research) Impact of Prefix-Match.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical.
RSVP Refresh Overhead Reduction by State Compression Lan Wang, Andreas Terzis, Lixia Zhang UCLA with input from Paxson, Braden, Berson, the interim meeting.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
BGP topics to be discussed in the next few weeks: –Excessive route update –Routing instability –BGP policy issues –BGP route slow convergence problem –Interaction.
Routing Convergence Dan Massey Colorado State University.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
1 Quantifying Path Exploration in the Internet Ricardo Oliveira, Rafit Izhak-Ratzin, Lixia Zhang, UCLA Beichuan Zhang, UArizona Dan Pei, AT&T Labs -- Research.
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
02/01/2006USC/ISI1 Updates on Routing Experiments Cyber DEfense Technology Experimental Research (DETER) Network Evaluation Methods for Internet Security.
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
Information-Centric Networks Section # 4.2: Routing Issues Instructor: George Xylomenos Department: Informatics.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs—Research Florham Park, NJ All flaps are not.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
1 Effective Diagnosis of Routing Disruptions from End Systems Ying Zhang Z. Morley Mao Ming Zhang.
1 Investigating occurrence of duplicate updates in BGP announcements Jong Han Park 1, Dan Jen 1, Mohit Lad 2, Shane Amante 3, Danny McPherson 4, Lixia.
BGP Validation Russ White Rule11.us.
1 On the Impact of Route Monitor Selection Ying Zhang* Zheng Zhang # Z. Morley Mao* Y. Charlie Hu # Bruce M. Maggs ^ University of Michigan* Purdue University.
Jian Wu (University of Michigan)
COS 561: Advanced Computer Networks
Power Prefixes Prioritization for Smarter BGP Reconvergence
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Multiple Origin AS (MOAS) Conflict Analysis
COS 561: Advanced Computer Networks
An Analysis of BGP Multiple Origin AS (MOAS) Conflicts
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
BGP Interactions Jennifer Rexford
2005 – A BGP Year in Review February 2006 Geoff Huston
Routing Experiments Chen-Nee Chuah, Sonia Fahmy, Denys Ma,
BGP Instability Jennifer Rexford
Presentation transcript:

Protecting the BGP Routes to Top Level DNS Servers NANOG-25, June 11, 2002 UCLA Lan Wang Dan Pei Lixia Zhang USC/ISI Xiaoliang Zhao Dan Massey Allison Mankin UC Davis Felix Wu AT&T Randy Bush

NANOG 25 - Toronto26/11/2002 Routing To Top Level Servers n Critical points of failure near root. –13 root and 13 gTLD servers –25 BGP routes (2 share a prefix) n Fault/attack near root could have disproportionately large impact. –13 bogus routes to deny service. –1 bogus route to provide bogus DNS. n Scale helps contain risk in lower tree. –Many millions of DNS servers. Root netorgcom nanogcairnbogusietf isi ops

NANOG 25 - Toronto36/11/2002 Example DNS Routing Problem Internet c.gtld-servers.net rrc00 monitor originates route to /24 n Invalid BGP routes exist in everyone’s table. –These can include routes to root/gTLD servers –One example observed on 4/16/01: ISPs announce new path 3 lasted 20 minutes 1 lasted 3 hours

NANOG 25 - Toronto46/11/2002 A Simple Filter n Current BGP provides dynamic routes –Explore the opposite extreme... n Select a single static route to each server. –Apply AS path filters to block all other announcements. Also filter against more specifics. n Route changes on a frequency of months, if at all. –Change in IP address, origin AS, or transit policy. –Adjust route only after off-line verification

NANOG 25 - Toronto56/11/2002 Why This Works: Theory n Scale is limited to a small number of routes. –No exponential growth in top level DNS servers. n Loss of a server is tolerable, invalid server is not. –Resolvers detect and time-out unreachable servers. Provided surviving servers handle load, cost is some delay. n Expect predictable properties and stable routes. –Servers don’t change without non-trivial effort. –Servers located in highly available locations.

NANOG 25 - Toronto66/11/2002 Why This Works: Data n Analysis based on BGP updates from RIPE. –Archive of BGP updates sent by each peer. –9 ISPs from US, Europe, and Japan. –February April 2002 n Some data collection notes –Used only peers that exchange full routing tables Otherwise some route changes are hidden by policies –Adjusted data to discount multi-hop effect. Multi-hop peering session resets don’t reflect ISP ops.

NANOG 25 - Toronto76/11/2002 Simple Filter - Impact on Reachability ISP1 (US/Tier 1)

NANOG 25 - Toronto86/11/2002 How Static Are The Routes? n 3 changes in route to “A” over 14 months. n 2 (valid) changes in the origin AS –5/19/01 origin AS changed from 6245 to –6/4/01 origin AS changed from to n 1 change in transit AS routing policy –11/8/01 (*,10913, 10913, 10913,*) -> (*,10913, *) –Could have built filter to allow this...

NANOG 25 - Toronto96/11/2002 What Routes Are Lost? n Results from 3/1/01 until 5/19/01 AS change. –Reduced reachability to “A” from % to % n 18 events when trusted route was withdrawn –2 resulted in no route available (28 secs, 103 secs) –8 instances of a back-up route lasting over 3 minutes –Longest lasting back-up advertised for 15 minutes n Similar results for other time periods and servers.

NANOG 25 - Toronto106/11/2002 Example of Filtered Routes n With filter no route at 16:06: * server No route at 16:08:30

NANOG 25 - Toronto116/11/2002 Simple Filter - Worst Case In Study ISP 3 (Europe) ISP 3 used one main route and a small number of consistent back-up routes.

NANOG 25 - Toronto126/11/2002 Toward a More Balanced Approach n Required infrequent updates to the filter. –Especially useful to automate infrequent tasks. Natural tendency to forget task or forget how to do task n More paths improves robustness –Simple filtered allowed only 1 path. –ISP3’s reachability can be improved if filter allows two routes… n Strike a balance between allowing dynamic changes and restricting to trusted paths.

NANOG 25 - Toronto136/11/2002 Our Adaptive Filter n Slow down the route dynamics and add validation. –Apply hysteresis before accepting new paths –Add options for validating new paths: Believe route based purely on hysteresis Probabilistic query/response testing against known data. Trigger off-line checking (did origin AS really change?) n Algorithm details in upcoming paper

NANOG 25 - Toronto146/11/2002 Impacts on Reachability (Adaptive Filter) ISP1 Root servers gTLD servers

NANOG 25 - Toronto156/11/2002 Impacts on Reachability (Adaptive Filter) ISP3 Root servers gTLD servers

NANOG 25 - Toronto166/11/2002 Conclusions n Routing faults can affect top level DNS servers. –Faults were observed in the current infrastructure. –Potential large scale denial of service. n Solution is to make these routes less dynamic –Relies on unique properties of top level servers. –Lose some robustness to failure –Gain protection against invalid routes.

NANOG 25 - Toronto176/11/2002 Discussion n Merit of the problem –Lots of concern over “securing” BGP and DNS –Routes to DNS servers are interesting special case n Do less dynamic routes make sense? –Only applies to this unique scenario –Our data shows trade-off is effective very interested in access to data for counter example….

NANOG 25 - Toronto186/11/2002 You had to ask…. algorithm detail n Path Usage Uk(p) = Tk(p)/T where T = time period, Tk(p) = time path advertised n Adjust filter at end of time period T –Smooth with exponentially moving weighted average U(p) = (1-a)*U(p) + a*Uk(p) –Allowable routes have Uk(p) > Umin or U(p) > Umin –Validate all new routes and check old routes with Pv n Allow interim addition during T if Tk(p) > Tr n Parameters used in this presentation: T=1 week, Tr=1 hour, Umin=10%, a=0.25, Pv=0.1