Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
An Operational Perspective on BGP Security Geoff Huston February 2005.
BGP Policy Jennifer Rexford.
CSE390 – Advanced Computer Networks
A Survey of BGP Security: Issues and Solutions Butler, Farley, McDaniel, Rexford Kyle Super CIS 800/003 October 3, 2011.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
Availability Centric Routing (ACR) Robust Interdomain Routing Without BGP Security July 25 th, 2006.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Don’t Secure Routing, Secure Data Delivery Dan Wendlandt (CMU) With: Ioannis Avramopoulos (Princeton), David G. Andersen (CMU), and Jennifer Rexford (Princeton)
MIRED: Managing IP Routing is Extremely Difficult Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Accurate Real-Time Identification of IP Prefix Hijacking Z. Morley Mao Xin Hu 2007 IEEE Symposium on and Privacy Oakland, California 2007 IEEE Symposium.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Internet Routing (COS 598A) Today: Routing Protocol Security Jennifer Rexford Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
Verification in Routing Protocols Lakshminarayanan Subramanian Sahara Retreat, Jan 2004.
Advanced Computer Networks cs538, Fall UIUC
1 Interdomain Routing Security COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford Teaching Assistants: Sunghwan Ihm and.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
A LIGHT-WEIGHT DISTRIBUTED SCHEME FOR DETECTING IP PREFIX HIJACKS IN REAL TIME Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang and Paul Francis. Cornell University,
Information-Centric Networks07c-1 Week 7 / Paper 3 Accountable Internet Protocol (AIP) –Michael Walfish, Hari Balakrishnan and Scott Shenker David G. Andersen,
DNS security. How DNS works Ask local resolver first about name->IP mapping – It returns info from cache if any If info not in cache, resolver asks servers.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
SECURING BGP Matthew Nickasch University of Wisconsin-Platteville Dept. of Computer Science & Software Engineering.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.
BGP Man in the Middle Attack Jason Froehlich December 10, 2008.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin, Stephanie Forrest, Jennifer Rexford IEEE International Conference on Network.
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Interdomain Routing Security Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Internet Routing Verification John “JI” Ioannidis AT&T Labs – Research Copyright © 2002 by John Ioannidis. All Rights Reserved.
Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Elliott Karpilovsky, Princeton University on behalf of Jennifer Rexford, Princeton.
BGP security some slides borrowed from Jen Rexford (Princeton U)
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
Interdomain Routing Security COS 461: Computer Networks Jennifer Rexford.
Auto-Detecting Hijacked Prefixes?
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Interdomain Routing Security
Interdomain Routing Security
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Interdomain Routing Security

How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible – Subprefix attacks not considered – Can prefix lists be generated easily? (the evil of multi-homing)

Outline Security goals for interdomain routing – Secure message exchange – Prefix ownership and attributes – Agreement with the forwarding path – Preventing resource exhaustion BGP (in)security today – Best common practices Proposed security enhancements – Secure BGP (S-BGP) – Anomaly-detection schemes Discussion

Security Goals

Secure Message Exchange Between Neighbors Confidential BGP message exchange – Can two ASes exchange messages without someone watching? No denial of service – Prevent CPU overload, session reset, and tampered BGP messages? BGP session physical link

Validity of Route Announcements Origin authentication – Is the prefix owned by the AS announcing it? /16

Validity of Route Announcements AS path authentication – Is AS path the sequence of ASes the BGP update traversed? “7 5 6” “4 6”

Adherence to Business Contracts AS path policy – Does the AS path adhere to the routing policies of each AS? – Is a path announced when it should be? customer peers

Correspondence to the Data Path Agreement between control and data plane – Does the traffic follow the advertised AS path? “7 5 6” “4 5 6”

Preventing Resource Exhaustion Limiting the size of the BGP table – Can the router run out of memory? – Storing routes for many prefixes, with long paths? Limiting the number of BGP messages – Can the router run out of CPU and bandwidth? – Due to flapping prefixes, duplicate messages, etc. BGP sessions

BGP (In)Security Today

BGP Security: Applying Best Common Practices Securing the BGP session – Authentication, encryption, TTL tricks Filtering routes by prefix and AS path – Preventing your customers from hijacking others Resetting attributes to default values – Preventing your peers from tricking you Packet filters to block unexpected BGP traffic – Blocking port 179 from unexpected places Preventing resource exhaustion – Limiting #prefixes/session, and prefix lengths

Best Practice is Not Good Enough Depends on vigilant application of BCPs – By your neighbors, and your neighbors’ neighbors, and your neighbors’ neighbors’ neighbors – And nobody making configuration mistakes! Doesn’t address fundamental problems – Can’t tell who owns the IP address block – Can’t tell if the AS path is bogus or invalid – Can’t be sure data packets follow the chosen route – Can’t easily bound the memory requirements

Security Enhancements to BGP

Secure BGP (S-BGP) Address attestations – Claim the right to originate a prefix – Signed and distributed out-of-band – Checked through delegation chain from ICANN Route attestations – Distributed as an attribute in BGP update message – Signed by each AS as route traverses the network – Signature signs previously attached signatures S-BGP can validate – AS path indicates the order ASes were traversed – No intermediate ASes were added or removed

S-BGP Deployment Challenges Complete, accurate registries – E.g., of prefix ownership Public Key Infrastructure – To know the public key for any given AS Cryptographic operations – E.g., digital signatures on BGP messages Need to perform operations quickly – To avoid delaying response to routing changes Difficulty of incremental deployment – Hard to have a “flag day” to deploy S-BGP

S-BGP Prevents many threats – Prefix hijacking – Route modification But not others – Collusion: two ASes claiming to have an edge – Policy violation: distributing a route from one provider to another – Data-plane attacks: announcing one path but using another – Resource exhaustion: announcing too many routes

Anomaly-Detection Schemes Monitoring BGP update messages – Use past history as an implicit registry – E.g., AS that announces each address block – E.g., AS-level edges and paths Out-of-band detection mechanism – Generate reports and alerts – Internet Alert Registry: – Prefix Hijack Alert System: Soft response to suspicious routes – Prefer routes that agree with the past – Delay adoption of unfamiliar routes when possible – Some (e.g., misconfiguration) will disappear on their own

Anomaly-Detection Schemes Risk of false positives – Temporarily (?) avoiding legitimate routes Risk of false negatives – Possibly vulnerable to a smart adversary Can detect some paths S-BGP cannot – E.g., announcing from one provider to another Does not prevent all attacks – Does not prevent collusion or data-plane attacks More amenable to incremental deployment

Discussion

Security Goals What kind of attacks should we withstand? – Misconfiguration? – Control-plane adversary? – Colluding adversaries? – Data-plane adversaries? What solution would we want, from scratch? – S-BGP? – Data-plane path verification? – Multipath routing? What kind of solution can be deployed? – S-BGP? Anomaly detection? Multipath routing?

Conclusions BGP is highly vulnerable – Based on trust, even of ASes many hops away BGP security is a serious problem – Blackholing, snooping, impersonating, spamming Defining the threat is challenging, too – Control-plane validation or much, much more? Incremental deployment is a real challenge – Bootstrapping a PKI (though this has improved) Still a very active area of research