Efficient Secure BGP AS Path using FS-BGP Xia Yin, Yang Xiang, Zhiliang Wang, Jianping Wu Tsinghua University, Beijing 81th Quebec.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
How Secure are Secure Interdomain Routing Protocols? B 大氣四 鍾岳霖 B 財金三 婁瀚升 1.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
A. Haeberlen Having your Cake and Eating it too: Routing Security with Privacy Protections 1 HotNets-X (November 15, 2011) Alexander Gurney * Andreas Haeberlen.
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
CS Summer 2003 Lecture 3. CS Summer 2003 What is a BGP Path Attribute? BGP uses a set of parameters known as path attributes to characterize.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Computer Networks Layering and Routing Dina Katabi
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Selective and Authentic Third-Party distribution of XML Documents - Yashaswini Harsha Kumar - Netaji Mandava (Oct 16 th 2006)
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Routing Security and the Border Gateway Protocol Dr. Stephen Kent Chief Scientist - Information Security.
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
SIGCOMM 2012 (August 16, 2012) Private and Verifiable Interdomain Routing Decisions Mingchen Zhao * Wenchao Zhou * Alexander Gurney * Andreas Haeberlen.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
Detecting Prefix Hijackings in the Internet with Argus Xingang Shi Yang Xiang Zhiliang Wang Xia Yin Jianping Wu Tsinghua University.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Meet the Falcons Ciprian Marginean Aris Lambrianidis
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
BGP L3VPN origin validation (draft-ymbk-l3vpn-origination-02) November 2012.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
BGP security some slides borrowed from Jen Rexford (Princeton U)
BGP Validation Russ White Rule11.us.
Doing Don’ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre.
Optimizing Routing 1. Using Multiple Routing Protocols
CS 3700 Networks and Distributed Systems
Auto-Detecting Hijacked Prefixes?
RPSEC WG Issues with Routing Protocols security mechanisms
Border Gateway Protocol
COS 561: Advanced Computer Networks
BGP supplement Abhigyan Sharma.
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
BGP Instability Jennifer Rexford
Presentation transcript:

Efficient Secure BGP AS Path using FS-BGP Xia Yin, Yang Xiang, Zhiliang Wang, Jianping Wu Tsinghua University, Beijing 81th Quebec

Jul 28, 2011FS-BGP, THU, 81th IETF2 Outline Introduction –FS-BGP: Fast Secure BGP –Terminology –Quick review of S-BGP FS-BGP Evaluation Discussion

Jul 28, 2011FS-BGP, THU, 81th IETF3 FS-BGP: Fast Secure BGP How to secure the path –CSA (Critical path Segment Attestation) to secure the AS path –SPP (Suppressed Path Padding) to protect the optimal path and prevent effective hijacking Security –All the authenticated paths are feasible path –Achieves similar level of security as S-BGP Computational cost (on backbone router) –Singing cost: ~0.6% of S-BGP –Verification cost: ~3.9% of S-BGP

Terminology (1) Feasible Path –Exist in the AS-level graph, and satisfies import and export policies of all ASes along the path Unfeasible Path –(1) Paths do NOT exist in the DAG –(2) Paths violate import and export routing policies Jul 28, 2011FS-BGP, THU, 81th IETF4

Terminology (2) Three categories of Feasible Path –Outdated Path: path announced but temporarily not available –Current Path: currently using and announcing path –Not announced Path: feasible but not announced, because BGP only announce the current optimal path each time Jul 28, 2011FS-BGP, THU, 81th IETF5

Signatures in S-BGP Route Attestations (RA) to secure the path Jul 28, 2011FS-BGP, THU, 81th IETF6

Jul 28, 2011FS-BGP, THU, 81th IETF7 Pros and Cons of S-BGP Actually singed the whole path, including the recipient AS Pros: the most secure schema Cons –Unbearable computational cost, so many paths. –Long Exp-date: unable to defend replay attack –Short Exp-date: destroy the whole system

Jul 28, 2011FS-BGP, THU, 81th IETF8 Outline Introduction FS-BGP: Fast Secure BGP –CSA: Critical Segment Attestation –SPP: Suppressed Path Padding Evaluation Discussion

Jul 28, 2011FS-BGP, THU, 81th IETF9 Announcement Restrictions in BGP Best route announcing –Temporary restriction –Local preference and other metrics Selective import & export policy –Persistent restriction –Neighbor based import and export $$ –Neighbor based import and export: contracts ($$) are between neighbor Ases –Feasible path: exist in AS-level graph & obey the policy

Jul 28, 2011FS-BGP, THU, 81th IETF10 Critical Path Segment In path: p n =, the Critical Path Segment c i owned by a i is Those adjacent AS triples actually describes part of routing policy of the corresponding owner – c i = means a i can (and already) announce routes to a i+1 which are import from a i-1 –If every owner sings the critical segment in a current announcing path, the consequence ASes will be able to verify the whole path

Jul 28, 2011FS-BGP, THU, 81th IETF11 a0a0 〈a0〉〈a0〉 {a1 a0}a0{a1 a0}a0 a1a1 a2a2 a3a3 a4a4 〈a1 a0〉〈a1 a0〉〈a2 a1 a0〉〈a2 a1 a0〉〈a3 a2 a1 a0〉〈a3 a2 a1 a0〉 {a2 a1 a0}a1{a2 a1 a0}a1 {a3 a2 a1 a0}a2{a3 a2 a1 a0}a2 {a4 a3 a2 a1 a0}a3{a4 a3 a2 a1 a0}a3 {a1 a0}a0{a1 a0}a0 {a2 a1 a0}a1{a2 a1 a0}a1 {a3 a2 a1}a2{a3 a2 a1}a2 {a4 a3 a2}a3{a4 a3 a2}a3 √√√√√ √ √√ √ √ √ √√ √ √√ √ √ √√ {msg}a i : signature of msg signed by a i FS-BGP : CSA S-BGP : RA

Jul 28, 2011FS-BGP, THU, 81th IETF12 Signatures in FS-BGP and S-BGP Signatures for the path: p n = FS-BGP S-BGP

Jul 28, 2011FS-BGP, THU, 81th IETF13 Cost Reduction (# total critical segment) << (# total AS path) If we use a small cache, the cost will be sharply decreased k – S-BGP: a n receives k paths, signs k signatures 1 –FS-BGP: a n receives k paths, signs 1 signature

Jul 28, 2011FS-BGP, THU, 81th IETF14 Outline Introduction FS-BGP: Fast Secure BGP –CSA: Critical Segment Attestation Optional –SPP: Suppressed Path Padding (Optional) Evaluation Discussion

Jul 28, 2011FS-BGP, THU, 81th IETF15 Paths can be verified in FS-BGP are all feasible paths [Theorem 1] CSA achieves Feasible Path Authentication Signed paths in S-BGP Signed paths in FS-BGP All feasible paths 1. Outdated path 2. Current path 1. Outdated path 2. Current path 3. Revealed path 1. Outdated path 2. Current path 3. All not announced path

Jul 28, 2011FS-BGP, THU, 81th IETF16 Forge a path in FS-BGP is possible Forged path (Revealed path) in FS-BGP –Using authenticated path segments, manipulator can construct forged path, which is feasible but currently not announced.  a m forge path p d a 4 construct path p f, then hijack prefix f

Jul 28, 2011FS-BGP, THU, 81th IETF17 Conditions of Effective Hijacking Effective hijacking: the traffic is not forwarded by the attacker under normal status. (1) Forged path is still feasible, and only temporarily not received by the attacker! (2) Forge a path in FS-BGP is very difficult –Must be constructed using received authenticated path segments –Must not be announced by the intermediate AS –Can NOT be shorter than 5 hops [Theorem 2] (3) Only short enough forge-path can be used for a effective hijacking [Theorem 3]

Jul 28, 2011FS-BGP, THU, 81th IETF18 Prevent Effective Hijacking Using ASPP, can grantee that attacker can not concatenate short enough forge path Short enough: shorter than the optimal path (longest live-time) {a 4, a 3, a 2 }a 3 {a 4, a 3, 3, a 2 }a 3 p f =

Jul 28, SPP: Suppressed Path Padding Suppressed Path: paths with lower local preference in the decision process Suppressed path may shorter than optimal path SPP: –General –Optional –Easy to Implement k i Compute k i : Basic decision process: 1.Highest Local Preference (LP) 2.Shortest Path Length (PL) 3.Tie Breaks (TB) Path categories: 1.Suppressed Path 2.Sub-optimal Path 3.Optimal Path

Jul 28, 2011FS-BGP, THU, 81th IETF20 Outline Introduction FS-BGP: Fast Secure BGP Evaluation –Security Level –Computational Cost Discussion

Security Level Jul 28, 2011FS-BGP, THU, 81th IETF21 Security Infeasible Path Feasible Path Cost Current Path soBGP LowHigh FSBGP (no SPP) S-BGP FSBGP

Computational Cost 30 days’ real BGP updates from backbone routers Jul 28, 2011FS-BGP, THU, 81th IETF22 FS-BGP S-BGP FS-BGP S-BGP # verifications in every second # signings in every second

Jul 28, 2011FS-BGP, THU, 81th IETF23 Outline Introduction FS-BGP: Fast Secure BGP Evaluation Discussion –Support complicated routing policies –Protect privacy

Jul 28, 2011FS-BGP, THU, 81th IETF24 Complicated Routing Policies AS may use complicate route filters to describe their routing policies –Prefix filter : –Path filter : –Origin filter : FS-BGP can flexibly support route filters  Included feasible prefixes into CSA  Sign whole path  Included feasible origins into CSA

Revisit the route filters Quantity of route filter –According our statistical result in IRR database, only a very small portion of policies use route filters Purpose of route filter –Some (i.e., origin/path filter) are set for security considerations, rather than policy requirements. –Others (i.e., prefix filter) are set for traffic engineering, to identifying the preference of a route, rather than the feasibility of a path Jul 28, 2011FS-BGP, THU, 81th IETF25

Jul 28, 2011FS-BGP, THU, 81th IETF26 Privacy Protection Privacy: customer list … FS-BGP can protect privacy data –Message spreading manner is same to BGP –Path segments not reveal additional info. –Path segments can only be passively received by valid BGP UPDATE receivers –Do NOT offer any kinds of public accessible policy database

Jul 28, 2011FS-BGP, THU, 81th IETF27 Next step: call for WG adoption Acknowledgement –Greatly appreciate comments of Russ White Review –FS-BGP: Fast Secure BGP CSA: Critical Segment Attestation SPP: Suppressed Path Padding (Optional) –Evaluation Security level: similar security level as S-BGP Computational cost: reduced the cost by orders of magnitude Support complicated routing policies Protect privacy Thanks!