Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.

Slides:



Advertisements
Similar presentations
Karlston D'Emanuele Distance Vector Routing Protocols Notes courtesy of Mr. Joe Cordina Password Removed
Advertisements

RIP V2 W.lilakiatsakun.  RFC 2453 (obsoletes –RFC 1723 /1388)  Extension of RIP v1 (Classful routing protocol)  Classless routing protocol –VLSM is.
A Survey of Secure Wireless Ad Hoc Routing
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 22 Omar Meqdadi Department of Computer Science and Software Engineering University.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol –Datagram format.
1 CCNA 3 v3.1 Module 1. 2 CCNA 3 Module 1 Introduction to Classless Routing.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
14 – Inter/Intra-AS Routing
Slide 1 Vitaly Shmatikov CS 378 Routing Security.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Routing Information Protocol (RIP). Intra-and Interdomain Routing An internet is divided into autonomous systems. An autonomous system (AS) is a group.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Routing Protocols RIP, OSPF, BGP.
Slide /2009COMM3380 Routing Algorithms Distance Vector Routing Each node knows the distance (=cost) to its directly connected neighbors A node sends.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
Link-state routing  each node knows network topology and cost of each link  quasi-centralized: each router periodically broadcasts costs of attached.
CCNA 1 Module 10 Routing Fundamentals and Subnets.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 13 Routing Protocols (RIP, OSPF, BGP)
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Inter-domain Routing Outline Border Gateway Protocol.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
Outline Routing security DNS security. Securing Key Internet Technologies Computer Security Peter Reiher March 14, 2017.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
DNS Security Advanced Network Security Peter Reiher August, 2014
Routing Information Protocol (RIP)
Outline Basics of network security Definitions Sample attacks
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
The Issue We all depend on the Internet
Routing: Distance Vector Algorithm
Net 323 D: Networks Protocols
Net 323 D: Networks Protocols
COS 561: Advanced Computer Networks
EEC-484/584 Computer Networks
Dynamic Routing and OSPF
Inter-domain Routing Outline Homework #3 solutions
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Outline The spoofing problem Approaches to handle spoofing
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014

Lecture 27 Page 2 Advanced Network Security Outline How to secure routing protocols BGP security Securing other styles of routing protocols

Lecture 27 Page 3 Advanced Network Security Routing Security Routing protocols control how packets flow through the Internet If they aren’t protected, attackers can alter packet flows at their whim Most routing protocols were not built with security in mind

Lecture 27 Page 4 Advanced Network Security Routing Protocol Security Threats Threats to routing data secrecy –Usually not critical Threats to routing protocol integrity –Very important, since tampering with routing integrity can be bad Threats to routing protocol availability –Potential to disrupt Internet service

Lecture 27 Page 5 Advanced Network Security What Could Really Go Wrong? Packets could be routed through an attacker Packets could be dropped –Routing loops, blackhole routing, etc. Some users’ service could be degraded The Internet’s overall effectiveness could be degraded –Slow response to failures –Total overload of some links Many types of defenses against other attacks presume correct routing

Lecture 27 Page 6 Advanced Network Security Where Does the Threat Occur? At routers, mostly Most routers are well-protected –But... –Several vulnerabilities have been found in routers Also, should we always trust those running routers?

Lecture 27 Page 7 Advanced Network Security Different Types of Routing Protocols Link state –Tell everyone the state of your links Distance vector –Tell nodes how far away things are Path vector –Tell nodes the complete path between various points On demand protocols –Figure out routing once you know you two nodes need to communicate

Lecture 27 Page 8 Advanced Network Security Popular Routing Protocols BGP –Path vector protocol used in core Internet routing –Arguably most important protocol to secure RIP –Distance vector protocol for small networks OSPF ISIS Ad hoc routing protocols

Lecture 27 Page 9 Advanced Network Security Fundamental Operations To Be Protected One router tells another router something about routing –A path, a distance, contents of local routing table, etc. A router updates its routing information A router gathers information to decide on routing

Lecture 27 Page 10 Advanced Network Security Protecting BGP BGP is probably the most important protocol to protect Handles basic Internet routing Works at autonomous system (AS) level –Rather than router level

Lecture 27 Page 11 Advanced Network Security BGP Issues BGP is spoken (mostly) between routers in autonomous systems On direct network links to their partner Over TCP sessions that are established with known partners Isn’t that enough to give reasonable security?

Lecture 27 Page 12 Advanced Network Security Basic BGP Security Issue ABCDE FG * A wants to tell everyone how to get to * * A A B,A * C,B,A * D,C,B,A What do we need to protect?

Lecture 27 Page 13 Advanced Network Security Well, What Could Go Wrong? ABCDE FG * A What if A doesn’t own *? What if router A isn’t authorized to advertise *? What if router D alters the path? * D,F

Lecture 27 Page 14 Advanced Network Security How Do We Solve These Problems? Advertising routers must prove ownership and right to advertise Paths must be signed by routers on them Must avoid cut-and-paste attacks And replay attacks

Lecture 27 Page 15 Advanced Network Security S-BGP A protocol designed to solve most of the routing security issues for BGP Intended to be workable with existing BGP protocol Key idea is to tie updates to those who are allowed to make them –And to those who build them

Lecture 27 Page 16 Advanced Network Security Some S-BGP Constraints Can’t change BGP protocol –Or packet format Can’t have messages larger than max BGP size Must be deployable in reasonable way

Lecture 27 Page 17 Advanced Network Security An S-BGP Example ABCDE FG * A How can B know that A should advertise *? A can provide a certificate proving ownership

Lecture 27 Page 18 Advanced Network Security Securing BGP Updates ABCDE FG * A wants to tell everyone how to get to * What are these signatures actually attesting to? * A B,A * C,B,A * D,C,B,A

Lecture 27 Page 19 Advanced Network Security Who Needs To Prove What? A needs to prove (to B-E) that he owns the prefix B needs to prove (to C-E) that A wants the prefix path to go through B C needs to prove (to D-E) the same D needs to prove (to E) the same

Lecture 27 Page 20 Advanced Network Security So What Does A Sign? A clearly must provide proof he owns the prefix He also must prove he originated the update And only A can prove that he intended the path to go through B So he has to sign for all of that

Lecture 27 Page 21 Advanced Network Security Address Attestations in S-BGP These are used to prove ownership of IP prefix spaces IP prefix owner provides attestation that a particular AS can originate its BGP updates That AS includes attestation in updates

Lecture 27 Page 22 Advanced Network Security Route Attestations To prove that path for a prefix should go through an AS The previous AS on the path makes this attestation –E.g., B attests that C is the next AS hop

Lecture 27 Page 23 Advanced Network Security How Are These Signatures Done? Via public key cryptography Certificates issued by proper authorities –ICANN at the top –Hierarchical below ICANN Certificates not carried with updates –Otherwise, messages would be too big –Off-line delivery method proposed

Lecture 27 Page 24 Advanced Network Security Protecting Other Styles of Protocols Generally, how do you know you should believe another router? About distance to some address space About reachability to some address space About other characteristics of a path About what other nodes have told you

Lecture 27 Page 25 Advanced Network Security How Routing Protocols Pass Information Some protocols pass full information –E.g., BGP –So they can pass signed information Others pass summary information –E.g., RIP –They use other updates to create new summaries –How can we be sure they did so properly?

Lecture 27 Page 26 Advanced Network Security Who Are You Worried About? Random attackers? –Generally solvable by encrypting/authenticating routing updates Misbehaving insiders? –A much harder problem –They’re supposed to make decisions –How do you know they’re lying?

Lecture 27 Page 27 Advanced Network Security A Sample Problem A BCDE FG H Assume a distance vector protocol * How can H tell someone lied? How can H tell that E lied?

Lecture 27 Page 28 Advanced Network Security Types of Attacks on Distance Vector Routing Protocols Blackhole attacks –Claim short route to target Claim longer distance –To avoid traffic going through you Inject routing loops –Which cause traffic to be dropped Inject lots of routing updates –Generally for denial of service

Lecture 27 Page 29 Advanced Network Security How To Secure a Distance Vector Protocol? Can’t just sign the hop count –Not tied to the path Instead, sign a length and a “second-to- last” router identity By iterating, you can verify path length

Lecture 27 Page 30 Advanced Network Security An Example A BCDE FG H * H needs to build a routing table entry for * Should show hop count of 3 via G, 5 via E

Lecture 27 Page 31 Advanced Network Security One Way to Do It A BCDE FG H H directly verifies that it’s one hop to E E1-D2EC3DB4CA5B H gets signed info that D is 2 hops through E Then we iterate Now we can trust it’s five hops to A

Lecture 27 Page 32 Advanced Network Security Who Does the Signing? The destination –A in the example It only signs the unchanging part –Not the hop count But an update eventually reaches H that was signed by A

Lecture 27 Page 33 Advanced Network Security What About That Hop Count? E could lie about the hop count But he can’t lie that A is next to B Nor that B next to C, nor C next to D, nor D next to E Unless other nodes collude, E can’t claim to be closer to A than he is

Lecture 27 Page 34 Advanced Network Security What If Someone Lies? A BCDE FG H There’s limited scope for effective lies E can’t claim to be closer to A Since E can’t produce a routing update signed by A that substantiates that E1-D2EC3DB4CA5B

Lecture 27 Page 35 Advanced Network Security A Difficulty This approach relies on a PKI H must be able to check the various signatures Breaks down if someone doesn’t sign –That’s a hole in the network, from the verification point of view –Consider, in example, what happens if C doesn’t sign

Lecture 27 Page 36 Advanced Network Security What If C Doesn’t Sign? A BCDE FG H E1-D2E C3D B4CA5B A message coming through D tells us that it’s three hops to C But H can’t verify that H knows C is next to B And that B is next to A But how can he be sure D is next to C? Other than trusting D...

Lecture 27 Page 37 Advanced Network Security What’s the Problem? A BCDE FG H E1-D2E C3D B4CA5B For this graph, no problem A BCDE FG H But how about for this one?

Lecture 27 Page 38 Advanced Network Security Conclusions The proper behavior of our networks depends on proper routing Many types of attacks enabled by improper routing All the important routing protocols lack good security New versions concentrate on ensuring integrity and authenticity of routing info