BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
1 Measurement of Highly Active Prefixes in BGP Ricardo V. Oliveira, Rafit Izhak-Ratzin, Beichuan Zhang, Lixia Zhang GLOBECOM’05.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
Analysis of BGP Routing Tables
Feb 12, 2008CS573: Network Protocols and Standards1 Border Gateway Protocol (BGP) Network Protocols and Standards Winter
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
Computer Networks Layering and Routing Dina Katabi
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
Real-Time BGP Data Access 1 Mikhail Strizhov Colorado State University.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Border Gateway Protocol Presented BY Jay Purohit & Rupal Jaiswal GROUP 9.
Lecture 4: BGP Presentations Lab information H/W update.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
BGP Man in the Middle Attack Jason Froehlich December 10, 2008.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
CS 447 Networks and Data Communication Department of Computer Science Southern Illinois University Edwardsville Fall, 2015 Dr. Hiroshi Fujinoki
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
By, Matt Guidry Yashas Shankar.  Analyze BGP beacons which are announced and withdrawn, usually within two hour intervals.  The withdraws have an effect.
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
CSCI-1680 Network Layer: Inter-domain Routing Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, Rodrigo Fonseca John Jannotti.
An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Internet Routing Verification John “JI” Ioannidis AT&T Labs – Research Copyright © 2002 by John Ioannidis. All Rights Reserved.
Text BGP Basics. Document Name CONFIDENTIAL Border Gateway Protocol (BGP) Introduction to BGP BGP Neighbor Establishment Process BGP Message Types BGP.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
Inter-domain Routing Outline Border Gateway Protocol.
1 Investigating occurrence of duplicate updates in BGP announcements Jong Han Park 1, Dan Jen 1, Mohit Lad 2, Shane Amante 3, Danny McPherson 4, Lixia.
BGP security some slides borrowed from Jen Rexford (Princeton U)
One Hop for RPKI, One Giant Leap for BGP Security Yossi Gilad (Hebrew University) Joint work with Avichai Cohen (Hebrew University), Amir Herzberg (Bar.
AS Numbers - Again Geoff Huston APNIC October 2009
CS 3700 Networks and Distributed Systems
Securing BGP Bruce Maggs.
Border Gateway Protocol
COS 561: Advanced Computer Networks
Department of Computer and IT Engineering University of Kurdistan
COS 561: Advanced Computer Networks
The real-time Internet routing observatory
COS 561: Advanced Computer Networks
An Analysis of BGP Multiple Origin AS (MOAS) Conflicts
COS 561: Advanced Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Securing BGP Bruce Maggs.
Fixing the Internet: Think Locally, Impact Globally
Computer Networks Protocols
FIRST How can MANRS actions prevent incidents .
Presentation transcript:

BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk

BCNET Conference April 29, 2009 Andree Toonk Where will we go today 1.The Internet & BGP Example hijacks 3.Methods to detect hijacks 4.Demo 5.Questions This session contains technical content

BCNET Conference April 29, 2009 Andree Toonk Why Should You Care? Because others can intercept your traffic without you noticing it. Because your traffic can be altered, dropped, stored, etc Because if your Internet connection is essential for your business It will cost you money!

BCNET Conference April 29, 2009 Andree Toonk The Internet & BGP 101 AS1 AS4 AS2 AS6 AS7 AS5 AS3 AS8 Collection of Networks called Autonomous Systems AS identified by a number Together make up the Internet

BCNET Conference April 29, 2009 Andree Toonk The Internet & BGP 101 AS2 AS5 AS /24 AS3 is a collection of prefixes AS3 has 1 upstream ISP: (AS5) AS3 and AS2 are direct peers Hi, AS3, Just sent all your traffic to me and I make sure it will get to its destination

BCNET Conference April 29, 2009 Andree Toonk The Internet & BGP 101 AS1 AS4 AS2 AS6 AS7 AS5 AS3 AS8 How to get from AS6 to AS3? Shortage path: AS path: Several longer alternative paths

BCNET Conference April 29, 2009 Andree Toonk The Internet & BGP I’m AS3 and my prefixes are: / /16 I’m AS2 and my prefixes are: / /16 Remember more specific always wins. If you want to reach /24 is chosen over /8 I’m AS6, my BGP table: My BGP table: *> /8: 4 3 *> /24: 4 2 *> /16: 4 3 *> /16: 4 2

BCNET Conference April 29, 2009 Andree Toonk The Internet & BGP 101 Each AS talks BGP to its neighbors (peers) Each AS announces its prefixes to his peers Upstream ISP’s re-announce that to its peers AS path is used for loop prevention and to see how it’s routed Today in global routing table: ~ prefixes ~ ASns

BCNET Conference April 29, 2009 Andree Toonk What’s the problem? Inter domain routing is based on trust Anyone can start announcing someone else prefix and start attracting traffic for that network Well known example is the YouTube.com Hijack, Feb. 2008

BCNET Conference April 29, 2009 Andree Toonk What’s the problem? AS100AS200 AS300 I can reach /16 Very secure Online banking server Bob

BCNET Conference April 29, 2009 Andree Toonk What’s the problem? AS100AS200 AS300 I can reach /16 I can reach /24 Very secure Online banking server FAKE Very secure Online banking server Bob

BCNET Conference April 29, 2009 Andree Toonk YouTube.com Hijack Stable situation: Hijack by Pakistan Telecom: February > Pakistan’s government orders Pakistan Telecom to block YouTube.com. They accidentally ‘leak’ this to the rest of the Internet. Result: YouTube traffic is now routed to Pakistan. YouTube.com unreachable, millions of unhappy users and lost revenue YouTubeAS /22 Pakistan Telecom AS /24 ~$ host is an alias for youtube.l.google.com. youtube.l.google.com has address

BCNET Conference April 29, 2009 Andree Toonk What’s the problem? Hijacks really happen –Mostly accidental Would you know what to do if this happens to you? Or would you even be able to tell this is happening?

BCNET Conference April 29, 2009 Andree Toonk Detecting Hijacks Number of tools to help you detect hijacks Commercial products Free community services BGPmon.net Free Service for the community Allows you to monitor your prefixes for ‘interesting’ events and hijacks.

BCNET Conference April 29, 2009 Andree Toonk Feature overview Feature rich: Alarm classifier IPv4 & IPv6 support 2 & 4 byte ASN support Fast notification time (~10min) Overview of historical alarms in web portal Regular expressions support Peer Threshold support IRR support Bogon detection And more… Monitor for hijacks, Accidental leaks & instability

BCNET Conference April 29, 2009 Andree Toonk Architecture BGP updates repository Parser / analyzer Presentation & Notification Classifier RIPE RIS project

BCNET Conference April 29, 2009 Andree Toonk Event Classifier Classifying event by type helps to determine the cause & impact Three main event types: 1.Monitor your own network for configuration errors. 2.Monitor stability of your prefixes. 3.Monitor for hijacks by others.

BCNET Conference April 29, 2009 Andree Toonk Your own announcements Detect configuration errors ASAP Stable situation: /16 Originated by AS271 Configuration change, causing you to leak: /17 Originated by AS271

BCNET Conference April 29, 2009 Andree Toonk Monitor Prefix stability Large number of withdraws for your prefix means reachability issues Possible cause could be problem with: your border router your upstream large IX somewhere …..

BCNET Conference April 29, 2009 Andree Toonk ASpath monitoring Flexible monitoring using regular expressions Useful for if you have many peers Useful when monitoring some specific traffic engineering situations. Example: $prefix may show behind ANY of my peers except $AS_Expensive Regular expression generator available

BCNET Conference April 29, 2009 Andree Toonk Detecting Hijacks Obvious hijacks Your prefix, but origin AS is not yours. YouTube hijack last year ==================================================================== Possible Prefix Hijack (Code: 10) ==================================================================== Your prefix: /22: Update time: :48 (UTC) Detected by #peers: 44 Detected prefix: /24 Announced by: AS17557 (PKTELECOM-AS-AP Pakistan Telecom) Upstream AS: 3491 (PCCWGlobal-ASN) ASpath: Mark as false alert:

BCNET Conference April 29, 2009 Andree Toonk BGP MITM attacks Not so obvious hijacks As demonstrated at Defcon last summer (“Stealing the Internet”) Looks like: A more specific of your prefix. Looks like it’s originated by your AS Result: looks like a ‘regular’ leak by my AS

BCNET Conference April 29, 2009 Andree Toonk BGP MITM attacks AS500 AS900 attacker AS100 Victim /22 AS400 AS300 AS200 AS700 bob Before AS700 sees: *> /22:

BCNET Conference April 29, 2009 Andree Toonk BGP MITM attacks AS500 AS900 attacker AS100 Victim /22 AS400 AS300 AS200 AS700 bob Attack scenario AS700 sees: *> /22: *> /24: AS900 is now able to intercept traffic towards AS100 I have a route to /24 via I will sent data for /24 to attacker

BCNET Conference April 29, 2009 Andree Toonk BGP MITM attacks How can we detect an attack like this? New More Specific Route New AS path ASpath not “valley free” BGPmon.net will detect this

BCNET Conference April 29, 2009 Andree Toonk BGP MITM attacks ==================================================================== Possible BGP MITM attack (Code: 21) ==================================================================== Your prefix: /22: Update time: :33 (UTC) Detected by #peers: 16 Detected prefix: /24 Announced by: AS20195 (SPARKLV-1 - Sparkplug Las Vegas, Inc.) Upstream AS: (SWITCH-COMMUNICATIONS) ASpath: Mark as false alert:

BCNET Conference April 29, 2009 Andree Toonk My Prefixes

BCNET Conference April 29, 2009 Andree Toonk My Updates

BCNET Conference April 29, 2009 Andree Toonk Customize

BCNET Conference April 29, 2009 Andree Toonk What if…. What if this happened to your network… –First step is detection ! –Start announcing more specifics –Contact origin AS and his upstream(s)

BCNET Conference April 29, 2009 Andree Toonk Wrap up The inter-domain routing system (BGP) is insecure No way to verify of someone is speaking the truth ‘Hijacks’ and prefix leaks happen frequently Free tools available for monitoring and detection BGPmon.net free feature rich service Great tool for network administrators

BCNET Conference April 29, 2009 Andree Toonk Questions? Try the Thanks BCNET & University of British Columbia for your support!