An Operational Perspective on BGP Security Geoff Huston February 2005.

Slides:



Advertisements
Similar presentations
Introduction to IP Routing Geoff Huston. Routing How do packets get from A to B in the Internet? A B Internet.
Advertisements

An Operational Perspective on Routing Security Geoff Huston Chief Scientist, APNIC.
Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
The Role of a Registry Certificate Authority Some Steps towards Improving the Resiliency of the Internet Routing System: The Role of a Registry Certificate.
Technical Aspects of Peering Session 4. Overview Peering checklist/requirements Peering step by step Peering arrangements and options Exercises.
Routing Security Capabilities draft-zhao-opsec-routing-capabilities-02.txt OPSEC WG, IETF #66.
1 Copyright  1999, Cisco Systems, Inc. Module10.ppt10/7/1999 8:27 AM BGP — Border Gateway Protocol Routing Protocol used between AS’s Currently Version.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Best Practices for ISPs
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
Presented By: Hanping Feng Configuring BGP With Cisco IOS Software (Part 1)
An Operational Perspective on Routing Security Geoff Huston Chief Scientist, APNIC November 2006.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
© 2009 Cisco Systems, Inc. All rights reserved.ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Configuring and Verifying Basic BGP Operations.
Introduction to BGP 1. Border Gateway Protocol A Routing Protocol used to exchange routing information between different networks – Exterior gateway protocol.
BGP Best Current Practices
– Chapter 4 – Secure Routing
TCOM 515 Lecture 6.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network BGP Attributes and Path Selection Process.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 6 Routing and Routing Protocols.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Lecture 4: BGP Presentations Lab information H/W update.
Chapter 9. Implementing Scalability Features in Your Internetwork.
© Synergon Informatika Rt., 1999 Chapter 12 Connecting Enterprises to an Internet Service Provider.
BGP operations and security draft-jdurand-bgp-security-02.txt Jerome Durand Gert Doering Ivan Pepelnjak.
© 2001, Cisco Systems, Inc. A_BGP_Confed BGP Confederations.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Network Security1 Secure Routing Source: Ch. 4 of Malik. Network Security Principles and Practices (CCIE Professional Development). Pearson Education.
Security fundamentals Topic 10 Securing the network perimeter.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—2-1 BGP Transit Autonomous Systems Forwarding Packets in a Transit AS.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
BGP and ICMP. Exterior Gateway Protocol (EGP) Like RIP, but no metrics. Just if reachable. Rtr inside a domain collects reachability information and informs.
Text BGP Basics. Document Name CONFIDENTIAL Border Gateway Protocol (BGP) Introduction to BGP BGP Neighbor Establishment Process BGP Message Types BGP.
BGP Validation Russ White Rule11.us.
Connecting an Enterprise Network to an ISP Network
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
Working at a Small-to-Medium Business or ISP – Chapter 8
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
Border Gateway Protocol
BGP (cont) 1. BGP Peering 2. BGP Attributes
Goals of soBGP Verify the origin of advertisements
BGP Best Current Practices
BGP supplement Abhigyan Sharma.
Interdomain Traffic Engineering with BGP
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
An Operational Perspective on Routing Security
Chapter 4: Access Control Lists (ACLs)
BGP Overview BGP concepts and operation.
Cours BGP-MPLS-IPV6-QOS
APNIC Trial of Certification of IP Addresses and ASes
– Chapter 4 – Secure Routing
Computer Networks Protocols
Design Expectations vs. Deployment Reality in Protocol Development
Presentation transcript:

An Operational Perspective on BGP Security Geoff Huston February 2005

Disclaimer This is not a description of the approach taken by any particular service provider in securing their network. It is intended to illustrate the set of trade-offs that are typical in the ISP environment and the current status of securing inter-domain routing in the Internet.

Its about Management of Risk Operational security is not about being able to create and maintain absolute security. Its about a pragmatic approach to risk mitigation, using a trade-off between cost, complexity, flexibility and outcomes Making a reasoned judgement to spend a certain amount of resources in order to achieve an acceptable risk outcome

Risk Management Understand the threat model: –What might happen? –What are the likely consequences? –How can the consequences be mitigated? –What is the cost tradeoff? –Does the threat and its consequences justify the cost of implementing a specific security response?

Lets talk routing security… Protecting routing protocols and their operation –What you are attempting to protect against are efforts intended to: Compromise the topology discovery / reachability operation of the routing protocol Disrupt the operation of the routing protocol Protecting the protocol payload –What you are attempting to protect against are efforts intended to: Insert corrupted address information into your networks routing tables Insert corrupt reachability information into your networks forwarding tables

The threat Corrupting the routers forwarding tables can result in: –Misdirecting traffic (subversion, denial of service, third party inspection, passing off) –Dropping traffic (denial of service, compound attacks) –Adding false addresses into the routing system (support compound attacks) –Isolating or removing the router from the network

Components of the network model Edge Routers Interior Routers BGP Route Reflectors Upstreams Peers Customers IGP iBGP eBGP

The routing model IGP –used to manage interior topology –IGP payload is interior interface and loopback addresses BGP –Used to manage external routes –Implements local routing policies

Basic Network design Isolate your network at the edge: –Route all traffic at the edge –NO sharing LANs –NO shared IGPs –NO infrastructure tunnels Isolate your customers from each other: –NO shared access LANs Isolate routing roles within the network: –Exterior-facing interface routers –Internal core routers

Configuration Tasks - Access Protecting routing configuration access –ssh access to the routers –filter lists –user account management –access log maintenance –snmp read / write access control lists –protect configurations –monitor configuration changes Protecting configuration control of routers is an essential part of network security

Configuration Tasks – IGP Protecting the IGP –No shared IGP configurations Dont permit third party managed equipment to participate in IGP routing –No IGP across shared LANs! shared LANs represent a point of vulnerability

Configuration Tasks - BGP Protecting BGP –Protect the TCP session from intrusion –Minimize the impact of session disruption on BGP. –Reduce third party dependencies to a minimum (use local nexthop targets, for example) –Monitor and check

Configuration Tasks - BGP Basic BGP configuration tasks: –No redistribution from iBGP into the IGP –Use session passwords and MD5 checksums to protect all BGP sessions –For iBGP use the local loopback address as the nexthop (next-hop-self) –Use filter lists to protect TCP port 179 –Use maximum prefix limiting (hold mode rather than session kill mode preferred) –Use eBGP multi-hop with care (and consider using TTL hack) –Align route reflectors with topology to avoid iBGP traffic floods Operating BGP: –Use soft clear to prevent complete route withdrawals –Use BGP session state and BGP update monitors and generate alarms on session instability and update floods

Configuration Tasks – BGP Check your config with a current configuration template –Rob Thomas template at ure-bgp-template.html is a good starting point ure-bgp-template.html –Remember to regularly check the source for updates if you really want to using a static bogon list

BGP Configuration template Global settings –Record neighbor state changes bgp log-neighbor-changes –Set route dampening Dont damp DNS rootserver routes Damp flapping customer-advertised routes using prefix-length sensitive settings Dont damp upstream-advertised routes –No route redistribution from iBGP into IGP

BGP Configuration template Per-Neighbor settings –Reduce impact of session reset Always perform soft reset of BGP sessions –MD5 protection of the TCP session Per-neighbor password –Use per-neighbor prefix filter templates Inbound and outbound filters on prefixes –Use local address for nexthop Next-hop-self –Use maximum prefix threshold with hold option Maximum-prefix discard-over-limit –Dont negotiate the BGP version Version 4 –IP filters for TCP port 179 –If using multihop, then use TTL threshold

Protecting the payload How to increase your confidence in determining that what routes you learn from your eBGP peers is authentic and accurate How to ensure that what you advertise to your eBGP peers is authentic and accurate

Customer Routes Authenticate customer routing requests: –Check validity of the address Own space – validate request against local route object registry Other space – validate request against RIR route object database registered POC –This is often harder than it originally looks! –Adjust explicit neighbor eBGP route filters to accept route advertisements for the prefix –Apply damping filters

SKA Peer Routes Higher level of mutual trust Accept peer routes - apply local policy preferences Filter outbound route advertisements according to local policy settings Use max prefix with discard-over- limit action (if available)

Upstream Routes One-way trust relationship Apply basic route filters to incoming route advertisements –RFC 1918 routes –own routes (?)

Even so Its not all that good is it?

Routing Security The basic routing payload security questions that need to be answered are: –Who injected this address prefix into the network? –Did they have the necessary credentials to inject this address prefix? Is this a valid address prefix? –Is the forwarding path to reach this address prefix trustable? What we have today is a relatively insecure system that is vulnerable to various forms of disruption and subversion –While the protocols can be reasonably well protected, the management of the routing payload cannot reliably answer these questions

What I really want to see… The use of authenticatable attestations to allow automated validation of: –the authenticity of the route object being advertised –authenticity of the origin AS –the binding of the origin AS to the route object Such attestations to be carried in BGP as payload attributes Attestation validation to be a part of the BGP route acceptance / readvertisement process

What would also be good… A mechanism to check the validity of a received AS path

And what should be retained… Is BGP as a block box policy routing protocol –Many operators dont want to be forced to publish their route acceptance and redistribution policies. BGP as a near real time protocol –Any additional overheads of certificate validation should not impose significant delays in route acceptance and readvertisement

Status of Routing Security We are nowhere near where we need to be We need more than good routing housekeeping We are in need of the adoption of basic security functions into the Internets routing domain –Injection of reliable trustable data Address and AS certificate injection into BGP –Explicit verifiable trust mechanisms for data distribution Adoption of some form of certification mechanism to support validate routing protocol information distribution

Thank You!