21 Sep 2005Internet21 Securing the Routing Infrastructure Sandra Murphy Sparta, Inc

Slides:



Advertisements
Similar presentations
The Role of a Registry Certificate Authority Some Steps towards Improving the Resiliency of the Internet Routing System: The Role of a Registry Certificate.
Advertisements

Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Securing the Border Gateway Protocol Using S-BGP Dr. Stephen Kent Chief Scientist - Information Security APNIC Open Policy Meeting Routing.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
1 Securing BGP Large scale trust to build an Internet again Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Computer Networks Layering and Routing Dina Katabi
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Routing Security and the Border Gateway Protocol Dr. Stephen Kent Chief Scientist - Information Security.
Staff AAA. Radius is not an ISP AAA Option RADIUS TACACS+ Kerberos.
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Information-Centric Networks Section # 4.2: Routing Issues Instructor: George Xylomenos Department: Informatics.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Internet Protocol Addresses What are they like and how are the managed? Paul Wilson APNIC.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Internet Routing Verification John “JI” Ioannidis AT&T Labs – Research Copyright © 2002 by John Ioannidis. All Rights Reserved.
Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.
Inter-domain Routing Outline Border Gateway Protocol.
IS3220 Information Technology Infrastructure Security
K. Salah1 Security Protocols in the Internet IPSec.
19 March 2003Page 1 BGP Vulnerabilities Draft March 19, 2003 Sandra Murphy
BGP Validation Russ White Rule11.us.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
One Hop for RPKI, One Giant Leap for BGP Security Yossi Gilad (Hebrew University) Joint work with Avichai Cohen (Hebrew University), Amir Herzberg (Bar.
Routing Threats and Key Management Sandra Murphy
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
Goals of soBGP Verify the origin of advertisements
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Jessica Yu ANS Communication Inc. Feb. 9th, 1998
Working together to improve routing security for all
COS 561: Advanced Computer Networks
BGP Multiple Origin AS (MOAS) Conflict Analysis
COS 561: Advanced Computer Networks
An Analysis of BGP Multiple Origin AS (MOAS) Conflicts
COS 561: Advanced Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Improving global routing security and resilience
BGP Instability Jennifer Rexford
FIRST How can MANRS actions prevent incidents .
Presentation transcript:

21 Sep 2005Internet21 Securing the Routing Infrastructure Sandra Murphy Sparta, Inc

21 Sep 2005Internet22 BGP Operation AS 10 ASPATH=10, NLRI=12/8 ASPATH=20,10, NLRI=12/8 ASPATH=30,20,10, NLRI=12/8 AS 20 AS 30 AS 22 ASPATH=22,20,10, NLRI=12/8 Net 12/8 ASPATH=20,10, NLRI=12/8

21 Sep 2005Internet23 BGP Operation – More specific prefixes AS 10 ASPATH=10, NLRI=12/8 ASPATH=20,10, NLRI=12/8 ASPATH=30,20,10, NLRI=12/8 ASPATH=22, NLRI=12.12/16 AS 20 AS 30 AS 22 ASPATH=22,20,10, NLRI=12/8 ASPATH=22, NLRI=12.12/16 Net 12/8 ASPATH=20,10, NLRI=12/8 Net 12.12/16

21 Sep 2005Internet24 Misconfiguration (we hope) Attacks Apr 1997 AS7007 announces classful addresses for the whole world Feb/Apr/Aug 2001 Abovenet/Quest/Digex announces routes with private AS numbers in them Typical consequences: –Dec 1999 a mis-origination by a downstream takes out ATT’s dial-up net – WSJ notices –Apr/May 2003 Trafalgar House/LA County space hijacked by registry spoof –Side effect on operation Covad does not aggregate their prefix announcements because they tried it and someone announced more specific prefixes

21 Sep 2005Internet25 Think we’re past all that? Dec 24, 2004 – AS9121 (TTNet) announced 100K+ routes for 1hr20min (shorter event later) –According to May 2005 NANOG presentation, 1/3 of Rensys’s 100 peers saw the bad routes within 3 min –The bad routes spread far and wide –Affected networks included (from NANOG slide): Blue Cross Blue Shield of Iowa - Thomson Financial Services - Citicorp Global Information Network -MetLife Capital Corp - Pitney Bowes Credit Corporation - Brown Brothers Harriman & Company - LaSalle Partners - Kuwait Fund for Arab Economic Development

21 Sep 2005Internet26 And recently… Sep 9, 9:29-10:47, 26210, a Bolivian ISP, announced 12/8, 64/8 and 65/8. –12/8, –GX-Sprint-Telefonica-AES Comm (Bolivia) On Sep 10, another anomaly –12/8, (GX-TeliaNet-NCORE) –“FYI, happened again this morning for (at least) 12/8 duration approx 30 minutes starting at 5:45 AM PDT. Notice that AT&T is no longer taking chances, and is announcing 2 /9s.

21 Sep 2005Internet27 Consequences Note to NANOG Sep 9: “And wouldn't you know it, we have an application that needs to reach servers in 12/8 and 65/8, and someone just came over to me asking for help in figuring out why that application isn't working. I guess I should have checked my NANOG mail before I told them I had no idea what was going on. :)”

21 Sep 2005Internet28 Moral of the Story Your network operation may be an inspiration to us all, but: The other parts of the Internet hold your fate: –Your users may not be able to reach the sites they want to reach –Your users’s remote users may not be able to reach your users Need more than effective local operation

21 Sep 2005Internet29 A Sequence of Solutions Increasingly stringent – increasing cost: 1.Peer-peer Connection Protection 2.Filters – prefix filters and AS-path filters 3.Origination Protection 4.Origination and AS_PATH Adjacency Protection 5.Origination and AS_PATH Route Protection 6.Origination, Transit and Policy Protection 7.“Freshness”

21 Sep 2005Internet210 In Common Use Peer-Peer protection methods –TCP MD5, IPSEC, TLS, GTSM, (BTNS?) For crypto techniques, management the biggest problem –Managing keys for many, many peers, key rollover, hash algorithm rollover Performance scale comes up frequently as well

21 Sep 2005Internet211 In Common Use (2) Filters – prefix filters and AS-PATH filters Requires transitive trust –“Transitively trusting all peers’ on-net customers: fundamentally unsafe” (NANOG Renesys presentation) Management hard (particularly at large AS’s) – keeping filter lists current –Manual configuration –Authority based Team Cymru Bogon Route Server Project for VIP, bogon and martians; IRR based filter generators OTOH: Mar /8 allocated; Jan 2004 – 83/8 and 84/8 allocated – installed filters did not keep up For large ISP’s – filter lists stress hardware

21 Sep 2005Internet212 Requirements for Authorities Must scale to Internet size and routing dynamics Design issues: –Non-hierarchical, singly rooted, multiply rooted? –Centralized, replicated, or distributed? –Client/server vs peer-peer? –Query/response vs wholesale download? –Event based vs periodic download? ISP distaste for relying on external info for configuration of their routing; chicken and egg

21 Sep 2005Internet213 Origination Protection Authorization only (AS is authorized address) Authorization and Authentication (AS is also currently announcing address) protects that “17%” unannounced but allocated Need authority (not necessarily central) that: –Stores info completely, accurately and securely –Accepts changes securely – model for authorization Need architecture and mechanisms for communication with “authority” Need procedures and tools for putting info into use

21 Sep 2005Internet214 Origination and AS_PATH Adjacency Protection Checks that adjacent AS’s in AS_PATH have peering –SoBGP, Garcia-Lunes-Aceves/Smith Need way to securely transmit adjacency – inline or query/download from database Processing demands (crypto stuff) Residual vulnerabilities –existence of peering adjacency gives no assurance AS’s will transit traffic –does not assure loop freedom

21 Sep 2005Internet215 Origination and AS_PATH Route Protection Protection to show update propagating through AS’s AS_PATH –indicates each AS in path has willingness and capability to forward traffic toward the stated route –SBGP; SPV Protection may or may not be passed inline Processing demands – crypto and storage Residual vulnerabilities –Freshness; policy compliance

21 Sep 2005Internet216 Origination, Route and Policy Protection Policy protection – e.g., AS A has a peering relationship with B, not transit – B should not announce A’s addresses Need to express and communicate policy –That means expose policy – anathema to many Policy is specific to one AS –But may target remote AS No current mechanisms to express, communicate or ensure policies (caveat: SoBGP)

21 Sep 2005Internet217 Freshness Receive replacement route, send replacement route – then send original route again BGP has no features that would facilitate discerning maintenance of update ordering

21 Sep 2005Internet218 Current Activity Concerned community working on this –ISP’s, Registry, Security, Router Vendor folk Consensus is that the most pressing need is: –Registration database integrity improved –Authenticated list of AS-prefix origination authorizations Useful in many ways: –Operational debugging –Customer care –Security protection Fundamental basis for ANY security solution

21 Sep 2005Internet219 Query Anyone interested in participating in discussion? In putting this to a trial? –Start with AS->prefix mapping for Internet2 –See how difficult it is to include in operational procedures Sponsor - DHS S&T, SPRI program (Secure Protocols for the Routing Infrastructure)