Slide 1 Vitaly Shmatikov CS 378 Routing Security.

Slides:



Advertisements
Similar presentations
Karlston D'Emanuele Distance Vector Routing Protocols Notes courtesy of Mr. Joe Cordina Password Removed
Advertisements

Mechanism Design and Computer Security John Mitchell Vanessa Teague Stanford University.
Lecture 9 Overview. Hierarchical Routing scale – with 200 million destinations – can’t store all dests in routing tables! – routing table exchange would.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Computer Networks with Internet Technology William Stallings
Courtesy: Nick McKeown, Stanford
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Routing So how does the network layer do its business?
Computer Networking Lecture 10: Inter-Domain Routing
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Routing.
14 – Inter/Intra-AS Routing
04/05/20011 ecs298k: Routing in General... lecture #2 Dr. S. Felix Wu Computer Science Department University of California, Davis
Announcement r Project 2 Extension ? m Previous grade allocation: Projects 40% –Web client/server7% –TCP stack21% –IP routing12% Midterm 20% Final 20%
1 Autonomous Systems An autonomous system is a region of the Internet that is administered by a single entity. Examples of autonomous regions are: UVA’s.
CS 4700 / CS 5700 Network Fundamentals Lecture 9: Intra Domain Routing Revised 7/30/13.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Inter-domain Routing Outline Border Gateway Protocol.
TCP/IP Protocol Suite1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Introduction to Routing and Routing Protocols By Ashar Anwar.
Routing Information Protocol (RIP). Intra-and Interdomain Routing An internet is divided into autonomous systems. An autonomous system (AS) is a group.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Introduction to BGP.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
Page 110/27/2015 A router ‘knows’ only of networks attached to it directly – unless you configure a static route or use routing protocols Routing protocols.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Routing and Routing Protocols
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many.
Dynamic Routing Protocols II OSPF
1 7-Jan-16 S Ward Abingdon and Witney College Dynamic Routing CCNA Exploration Semester 2 Chapter 3.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Routing Protocols Brandon Wagner.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
Inter-domain Routing Outline Border Gateway Protocol.
Cisco 2 - Routers Perrine modified by Brierley Page 13/21/2016 Chapter 4 Module 6 Routing & Routing Protocols.
Distance Vector and Link State Routing Pragyaditya Das.
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
COMP 3270 Computer Networks
Net 323 D: Networks Protocols
Net 323 D: Networks Protocols
CS 4700 / CS 5700 Network Fundamentals
CS 3700 Networks and Distributed Systems
Inter-domain Routing Outline Homework #3 solutions
CS 3700 Networks and Distributed Systems
Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Computer Networks Protocols
Presentation transcript:

slide 1 Vitaly Shmatikov CS 378 Routing Security

slide 2 Network of Networks uInternet is a network of networks Autonomous system (AS) is a collection of IP networks under control of a single administrator (e.g., ISP) ASes connect through Internet Exchange (IX), Network Access Points (NAP), Metropolitan Area Exchange (MAE) local network Internet service provider (ISP) backbone ISP local network

slide 3 Routing Through the Network uIP address is a 32-bit host identifier (IPv4) 128-bit identifier in IPv6 uRouting protocols propagate information about routes to hosts and networks Host is identified by IP address, network by IP prefix uMany types of routing protocols Distance vector, link-state, path vector uBGP (Border Gateway Protocol) is one of the core routing protocols on the Internet Inter-domain routing between different ASes

slide 4 Distance-Vector Routing uEach node keeps vector with distances to all nodes uPeriodically sends distance vector to all neighbors uNeighbors send their distance vectors, too; node updates its vector based on received information Bellman-Ford algorithm: for each destination, router picks the neighbor advertising the cheapest route, adds his entry into its own routing table and re-advertises Used in RIP (routing information protocol) uSplit-horizon update Do not advertise a route on an interface from which you learned the route in the first place!

slide 5 A: 0A: 1A: 2A: 3A: 4A: G1G2G3G4G5 Good News Travels Fast uG1 advertises route to network A with distance 1 uG2-G5 quickly learn the good news and install the routes to A via G1 in their local routing tables uG1 advertises route to network A with distance 1 uG2-G5 quickly learn the good news and install the routes to A via G1 in their local routing tables

slide 6 A: 0A: 1A: 2A: 3A: 4A: G1G2G3G4G5 Bad News Travels Slowly uG1’s link to A goes down uG2 is advertising a pretty good route to G1 (cost=2) uG1’s packets to A are forever looping between G2 and G1 uG1 is now advertising a route to A with cost=3, so G2 updates its own route to A via G1 to have cost=4, and so on G1 and G2 are slowly counting to infinity Split-horizon updates only prevent two-node loops Exchange routing tables

slide 7 Overview of BGP uBGP is a path-vector protocol between ASes uJust like distance-vector, but routing updates contain an actual path to destination node List of traversed ASes and a set of network prefixes belonging to the first AS on the list uEach BGP router receives UPDATE messages from neighbors, selects one “best” path for each prefix, and advertises it to the neighbors Can be shortest path, but doesn’t have to be –“Hot-potato” vs. “cold-potato” routing AS doesn’t have to use the path it advertises!

slide 8 BGP Example [D. Wetherall] uAS 2 provides transit for AS 7 Traffic to and from AS 7 travels through AS

slide 9 Some BGP Statistics uBGP routing tables contain about 125,000 address prefixes mapping to about 17-18,000 paths uApprox. 10,000 BGP routers uApprox. 2,000 organizations own AS uApprox. 6,000 organizations own prefixes uAverage route length is about 3.7 u50% of routes have length less than 4 ASes u95% of routes have length less than 5 ASes

slide 10 BGP Issues uBGP convergence problems Protocol allows policy flexibility Some legal policies prevent convergence Even shortest-path policy converges slowly uIncentive for dishonesty ISP pays for some routes, others free uSecurity problems Potential for disruptive attacks

slide 11 Evidence: Asymmetric Routes AliceBob uAlice, Bob use cheapest routes to each other uThese are not always shortest paths uAsymmetic routes are prevalent AS asymmetry in 30% of measured routes Finer-grained asymmetry far more prevalent

slide 12 Side Note: TCP Congestion Control uIf packets are lost, assume congestion Reduce transmission rate by half, repeat If loss stops, increase rate very slowly Design assumes routers blindly obey this policy Source Destination

slide 13 Protocol Rewards Dishonesty uAmiable Alice yields to boisterous Bob Alice and Bob both experience packet loss Alice backs off Bob disobeys protocol, gets better results Source A Source B Destination

slide 14 BGP Threats: Misconfiguration uMisconfiguration: AS advertises good routes to addresses it does not known how to reach Result: packets go into a network “black hole” uApril 25, 1997: “The day the Internet died” AS7007 (Florida Internet Exchange) de-aggregated the full BGP table and re-advertised all prefixes as if it originated paths to them In effect, AS7007 was advertising that it has the best route to every host on the Internet Huge network instability as incorrect routing data propagated and routers crashed under traffic

slide 15 BGP Threats: Security uBGP update messages contain no authentication or integrity protection uAttacker may falsify the advertised routes Modify the IP prefixes associated with the route –Can blackhole traffic to certain IP prefixes Change the AS path –Either attract traffic to attacker’s AS, or divert traffic away –Interesting economic incentive: an ISP wants to dump its traffic on other ISPs without routing their traffic in exchange Re-advertise/propagate AS path without permission –For example, multi-homed customer may end up advertising transit capability between two large ISPs

slide 16 Protecting BGP uSimple authentication of packet sources and packet integrity is not enough uBefore AS advertises a set of IP addresses, the owner of these addresses must authorize it Goal: verify path origin uEach AS along the path must be authorized by the preceding AS to advertise the prefixes contained in the UPDATE message Goal: verify propagation of the path vector

slide 17 S-BGP Protocol [Kent, Lynn, Seo] uAddress attestation Owner of one or more prefixes certifies that the origin AS is authorized to advertise the prefixes Need a public-key infrastructure (PKI) –X.509 certificates prove prefix ownership; owner can then delegate his “prefix advertising rights” to his ISP uRoute attestation Router belonging to an AS certifies (using digital signatures) that the next AS is authorized to propagate this route advertisement to its neighbors Need a separate public-key infrastructure –Certificates prove that AS owns a particular router

slide 18 S-BGP Update Message R6R6 R7R7 R8R8 S4S4 S5S5 S1S1 S2S2 S3S3 R9R9 R 10 R 12 AS 1 AS 2 uAn update message from R 9 advertising this route must contain: Ownership certificate certifying that some X owns IP address S 1 Signed statement from X that AS 1 is authorized to advertise S 1 Ownership certificate certifying that AS 1 owns router R 6 –If AS is represented by a router Signed statement from R 6 that AS 2 is authorized to propagate AS 1 ’s routes Ownership certificate certifying that AS 2 owns router R 9 Lots of public-key operations!

slide 19 Wormhole Attack on BGP uMultiple colluding malicious BGP routers exchange BGP update messages over a tunneled connection uRouters can claim better paths than actually exist Path vector is not increased by intermediate ASes when update message is tunneled through a “wormhole” uRoute attestation does not help! Malicious routers sign attestations for each other Host H AS4AS3AS2AS1 update I have a great route to H: AS4 - AS1 - H I attest that AS4 is authorized