Inter-domain Routing security Problems Solutions.

Slides:



Advertisements
Similar presentations
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
Advertisements

Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Securing the Border Gateway Protocol Using S-BGP Dr. Stephen Kent Chief Scientist - Information Security APNIC Open Policy Meeting Routing.
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Advanced Computer Networks cs538, Fall UIUC
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
1 Securing BGP Large scale trust to build an Internet again Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Computer Networks Layering and Routing Dina Katabi
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Information-Centric Networks07c-1 Week 7 / Paper 3 Accountable Internet Protocol (AIP) –Michael Walfish, Hari Balakrishnan and Scott Shenker David G. Andersen,
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Secure Border Gateway Protocol (S-BGP): Real World Performance & Deployment Issues Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo BBN Technologies.
Lecture 4: BGP Presentations Lab information H/W update.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Routing Security and the Border Gateway Protocol Dr. Stephen Kent Chief Scientist - Information Security.
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
Interdomain Routing Security Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Internet Routing Verification John “JI” Ioannidis AT&T Labs – Research Copyright © 2002 by John Ioannidis. All Rights Reserved.
Inter-domain Routing Outline Border Gateway Protocol.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
BGP security some slides borrowed from Jen Rexford (Princeton U)
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
Key management issues in PGP
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
Goals of soBGP Verify the origin of advertisements
COS 561: Advanced Computer Networks
The Issue We all depend on the Internet
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
COS 461: Computer Networks
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Presentation transcript:

Inter-domain Routing security Problems Solutions

BGP Routers that belong to AS originate path UPDATEs for routes they can reach These propagate throughout the system Policy can constrain this propagation –Selective export –Selective import It is sensitive to the usual problems –Bugs, mis-configurations –DoS attacks, TCP hijack attacks –Break ins in the routers –Stolen passwords

Many other things can go wrong A router can pretend to speak on behalf of some other AS An AS can advertise paths for routes it can not reach An AS can send paths to neighbor AS that it should not An AS can modify path information –Shorten a path to attract more traffic An AS can silently drop path information An AS can withdraw routes it did not advertise It may hard to see if something is wrong –Policies in the AS may change its behavior –E.g. an AS does not advertise certain routes This is not because it is malicious, it is because this is its local policy

Common problems An AS announces an address that is not allocated or belongs to another AS –Prefix hijacking Many flavors –Multiple Origin AS (MOAS) Two ASes originating the same prefixes Sometimes can be cause by multi-homing though –De-aggregation Advertise longer prefixes Routers will prefer these stealing address space from the rightful owner –Contradicting advertisements All these could be caused by misconfiguration too –Important to avoid false positives

And things do go wrong Prefix hijacking has been observed many times –Google incident in 2005 One of its prefixes was hijacked for few hours –“Spectrum agility” and spamming Prefixes appear, spam is sent from them and then they disappear Impossible to trace the real location of the spammer –It shows up all over the network Spammers use large prefixes (e.g. /8) –Use an address in the prefix only once –Hard to filter, need to filter on a prefix base One study found that 10% of the spam observed was generating using this method

BGP routers do get compromised In the inter-domain case provider’s routers where well protected –Perimeter defenses In BGP it is harder –Providers and customers talk BGP –Customers have BGP routers That may be unsecured and can be easily broken into There is evidence that this is happening –Or simply a malicious customer Sign up with an ISP and inject bogus information into the system Still, provider can aggressively filter what it receives from the customers

Approaches Proactive –Attempt to secure the protocol Cryptography Other techniques (route filtering, TTL hack) Reactive –Detect a problem Practical aspects –Message, CPU and storage scaling –Ease of deployment

S-BGP Attempt to a full blown solution. Ensure that: –A router is authorized to speak for an AS –An AS is authorized to originate a route –An AS is authorized (by the owner of the router) to propagate an UPDATE –An AS can only withdraw routes it originated

Components IPSec between the BGP routers –Avoid TCP problems Attestations: –Cryptographic construct that declares that prove that A authorizes B to perform operation O. Address attestation (AA): owner of route A authorizes as B to originate path for route O –Quite static Route attestation (RA): AS A authorizes neighbor AS B to advertise prefix O –Very dynamic PKI for disseminating keys

PKI Manages the public keys for entities Certification –Need to ensure that a given key is indeed the one bound to the entity –Need a trusted third party Certification authority (CA) Signs the public key records User of the certificate can verify the signature Hierarchy –One level can certify keys for the lower level(s) Chain of trust –Matches well the internet address allocation model Revocation –Key or certificate may not be valid after a while Hard to “take back” the certificate –Certificate revocation list (CRL) All members of the system must know it, not easy –Unless each certificate is time-stamped and they are refreshed every day

Validating an UPDATE Check the AA of the originator of the route (first AS in the AS_PATH) Check the RA of all the intermediate hops in the AS_PATH –Each RA covers the path until the router that creates it To check the attestations we need (certified) keys of the entities involved (all the AS in the AS_PATH) and maybe routers –How to get all these?

Security information distribution The RA data vary very fast and have to be sent in-band –Part of the UPDATE messages AA, keys and certificates vary infrequently –AA changes when ISP are allocated new address ranges They are exchanged outside BGP through repositories

Repositories Large ISPs maintain repositories with all this information –Keys, AA records –And certificate revocation lists (CRLs) Client ISPs subscribe to these repositories and add their information Repositories are loosely synchronized ISPs get all this information for all other ISPs Process it so that is more compact And download this to each sBGP router All above transfers are over SSL connections

Overheads RA information in the UPDATES –800% increase in amount of information sent! But overall UPDATE traffic is not that much –It has to be stored in the BGP routers For each peer About 35 Mbytes/peer This is a problem! Repository information could be around 75 Mbytes –Has to be transferred between ISPs once a day or so –Not a big deal CPU costs for verifying the attestations –About 18 ops/second, many more in unstable periods –This is a problem too, too much for software processing –Could cache information to reduce this cost But then I would need more storage –Or verify only routes that will result in routing changes New best routes

Other problems Administrative overheads –It is quite an effort to add a new prefix in an AS Sensitive to a replay attack –Router can re-advertise a recently withdrawn route

Is it practical? Not with the currently deployed routers –Not enough memory –Not enough non-volatile storage There are implementations and small demonstration testbeds Right now (2006) there is a initial implementation/trial of the repository infrastructure –Resource certificates bind resources with an AS –Hierarchical allocations Follows the address allocation with the 5 RRs –“Chain of trust”

Secure origin BGP Proposed by Cisco - More limited scope –Verify that originator of the path has the rights to advertise it –Verify that a router that advertises a destination has a route to the prefix Resources are tied to ASes through authorization certificates Routers also originate AS policy certificates that describe their connectivity –All routers use these to build a topology map (!) –That can be used to verify existence of path These certificates are exchanged through a new SECURITY BGP message –Use routing for securing routing?

Overall There is a fundamental trade-off –Security vs. overhead –Solutions fall at some point in the design space Moore’s law will make feasible what is not possible today But there are other issues –Deployment We can not change all routers at once We can not change BGP in all routers at once Would be nice to have a solution that is incrementally deployable –We can not come up with “another” BGP Current BGP took about 10 years to understand and stabilize –And we are not there yet

Other approaches Router filtering –Bogons: list of well known bad addresses –List of the dark space – unallocated addresses –Routers know these lists and use them to drop malicious routes –But it is difficult to keep these lists up to date –Also, only accept routes from customers that correspond to the address space that it assigned to it But what about multi-homing? Non-BGP solution: IRV –Each AS has an IRV server –When an AS receives a route from another AS it contacts the IRV server of the source AS to verify the information it received –This will happen recursively for the whole path And the “TTL hack” –Securing the TCP sessions only –Accept packets only from a router that is 1 hop away –All the packets sent have TTL=1

Detection MOAS detection –Monitor the BGP traffic for detection –The trick is to tell when the conflicts are legitimate E.g. Multi-homing Prefix hijack detection system –ASes register with route monitors –And are notified when their prefixes appear to change –How do I contact an AS that its prefix is hijacked? Routes to it may be down! Reputation systems –Compare information learned from multiple places and assign it a score