CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.

Slides:



Advertisements
Similar presentations
BGP Policy Jennifer Rexford.
Advertisements

CSCI-1680 Network Layer: Inter-domain Routing – Policy and Security Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil.
CSE390 – Advanced Computer Networks
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
TDTS21 Advanced Networking Lecture 6: BGP and Inter-domain Routing (It’s all about the Money) Based on slides from P. Gill, D. Choffnes, J. Rexford, and.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
Analysis of BGP Routing Tables
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael.
Internet Routing (COS 598A) Today: Routing Protocol Security Jennifer Rexford Tuesdays/Thursdays.
Ion Stoica October 2, 2002 (* this presentation is based on Lakshmi Subramanian’s slides) EE 122: Inter-domain routing – Border Gateway Protocol (BGP)
Jennifer Rexford Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks Stub.
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
TDTS21: Advanced Networking Lecture 7: Internet topology Based on slides from P. Gill and D. Choffnes Revised 2015 by N. Carlsson.
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
CSE534- Fundamentals of Computer Networking Lecture 12-13: Internet Connectivity + IXPs (The Underbelly of the Internet) Based on slides by D. Choffnes.
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Measuring and Mitigating AS-level Adversaries Against Tor
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
Interdomain Routing Security Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
BGP security some slides borrowed from Jen Rexford (Princeton U)
One Hop for RPKI, One Giant Leap for BGP Security Yossi Gilad (Hebrew University) Joint work with Avichai Cohen (Hebrew University), Amir Herzberg (Bar.
CS 590B/690B DETECTING NETWORK INTERFERENCE (FALL 2016) PROF. PHILLIPA GILL UNIVERSITY OF MASSACHUSETTS -- AMHERST LECTURE 02 ACKS: SLIDES BASED ON MATERIAL.
CS590B/690B Detecting Network Interference
CS 3700 Networks and Distributed Systems
CS590B/690B Detecting Network Interference (Fall 2016)
CS 3700 Networks and Distributed Systems
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (FALL 2016)
(Inter)Network Protocols: Theory and Practice Lecture 3 Dr
Securing BGP Bruce Maggs.
Border Gateway Protocol
COS 561: Advanced Computer Networks
BGP supplement Abhigyan Sharma.
CSCI-1680 Network Layer: Inter-domain Routing – Policy and Security
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
CS590B/690B Detecting network interference (Spring 2018)
BGP Policies Jennifer Rexford
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Securing BGP Bruce Maggs.
COS 561: Advanced Computer Networks
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Presentation transcript:

CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.

WHERE WE ARE Last time: Tor relay-based attacks/Web site fingerprinting Today: Timing attacks + Internet routing review RAPTor

Anonymity on the Internet Challenge: By observing Internet traffic one can infer who is talking to whom – Meta data is the message! – Track communications over time… …behaviors, interests, activities Tor aims to solve this: Tor Does not know source Does not know destination

Tor 101 Tor Entry Exit Middle Tor circuit is constructed out of three Tor routers/relays Client iteratively tunnels and exchanges keys with the relays

Threat model Tor Entry Exit Middle Relay-based attacks Finger print Web sites based on packet timing Exit relay can observe users’ traffic (Lots of work on this) Network-based attacks Timing attacks can deanonymize users Actually being tried by gov’t agencies! (Today’s lecture) Which user is visiting the site? Internet routing dynamics make timing attacks easier than you’d think!

AS Numbers  Each AS identified by an ASN number  16-bit values (latest protocol supports 32-bit ones)  – are reserved  Currently, there are ~ ASNs  AT&T: 5074, 6341, 7018, …  Sprint: 1239, 1240, 6211, 6242, …  Stony Brook U: 5719  Google 15169, (formerly YT), + others  Facebook  North America ASs  ftp://ftp.arin.net/info/asn.txtftp://ftp.arin.net/info/asn.txt 6

BGP BGP: The Internet’s Routing Protocol (1)$ $ $ $ $ Stub (customer) Stub (customer) ISP 2 (provider) ISP 2 (provider) ISP 1 (peer) ISP 1 (peer) Level 3 (peer) Level 3 (peer) A simple model of AS-level business relationships.

Standard model of Internet routing Proposed by Gao & Rexford 12 years ago Based on practices employed by a large ISP Provide an intuitive model of path selection and export policy 8 Path Selection: 1.LocalPref: Prefer customer paths over peer paths over provider paths 2.Prefer shorter paths 3.Arbitrary tiebreak Path Selection: 1.LocalPref: Prefer customer paths over peer paths over provider paths 2.Prefer shorter paths 3.Arbitrary tiebreak ISP Customer Peer Provider $ $ $

Standard model of Internet routing Proposed by Gao & Rexford 12 years ago Based on practices employed by a large ISP Provide an intuitive model of path selection and export policy 9 Path Selection: 1.LocalPref: Prefer customer paths over peer paths over provider paths 2.Prefer shorter paths 3.Arbitrary tiebreak Path Selection: 1.LocalPref: Prefer customer paths over peer paths over provider paths 2.Prefer shorter paths 3.Arbitrary tiebreak Export Policy: 1.Export customer path to all neighbors. 2.Export peer/provider path to all customers. Export Policy: 1.Export customer path to all neighbors. 2.Export peer/provider path to all customers. Customer $ $ Provider ISP Provider $ Announcements

Timing attacks & routing 10 Source AS AS1 AS2 AS3 AS4 Entry relay Exit relay Destination AS $ Customer Provider $ Peer Internet routing is based on business relationships!

Timing attacks & routing 11 Source AS AS1 AS2 AS3 AS4 Entry relay Exit relay Destination AS ASes prefer cheaper paths! AS2 Asymmetric routing makes things worse! ACK #s leak information! AS3 Insecurity of BGP makes things even worse! things even worse! Insecurity of BGP makes things even worse! things even worse!

12 IP Address Ownership and Hijacking IP address block assignment – Regional Internet Registries (ARIN, RIPE, APNIC) – Internet Service Providers Proper origination of a prefix into BGP – By the AS who owns the prefix – … or, by its upstream provider(s) in its behalf However, what’s to stop someone else? – Prefix hijacking: another AS originates the prefix – BGP does not verify that the AS is authorized – Registries of prefix ownership are inaccurate

13 How to Hijack a Prefix The hijacking AS has – Router with eBGP session(s) – Configured to originate the prefix Getting access to the router – Network operator makes configuration mistake – Disgruntled operator launches an attack – Outsider breaks in to the router and reconfigures Getting other ASes to believe bogus route – Neighbor ASes not filtering the routes – … e.g., by allowing only expected prefixes – But, specifying filters on peering links is hard

Pakistan Telecom: Sub-prefix hijack YouTube Pakistan Telecom Pakistan Telecom “The Internet” Telnor Pakistan Telnor Pakistan Aga Khan University Aga Khan University Multinet Pakistan Multinet Pakistan I’m YouTube: IP / 22 I’m YouTube: IP / 22 February 2008 : Pakistan Telecom hijacks YouTube

Pakistan Telecom: Sub-prefix hijack Here’s what should have happened…. YouTube Pakistan Telecom Pakistan Telecom “The Internet” Telnor Pakistan Telnor Pakistan Aga Khan University Aga Khan University Multinet Pakistan Multinet Pakistan I’m YouTube: IP / 22 I’m YouTube: IP / 22 X Hijack + drop packets going to YouTube Block your own customers.

Pakistan Telecom: Sub-prefix hijack But here’s what Pakistan ended up doing… YouTube Pakistan Telecom Pakistan Telecom “The Internet” Telnor Pakistan Telnor Pakistan Aga Khan University Aga Khan University Multinet Pakistan Multinet Pakistan I’m YouTube: IP / 22 I’m YouTube: IP / 22 Pakistan Telecom Pakistan Telecom No, I’m YouTube! IP / 24 No, I’m YouTube! IP / 24

China Telecom China Telecom China Telecom: Interception ISP 1 Verizon Wireless Verizon Wireless Level 3 Level3, VZW, / /24 VZW, / /24 Paths chosen based on cost and length.

ChinaTel path is shorter ? China Telecom China Telecom China Telecom: Interception ISP 1 Verizon Wireless Verizon Wireless Level 3 ChinaTel /24 Level3, VZW, / This prefix and 50K others were announced by China Telecom Traffic for some prefixes was possibly intercepted April 2010 : China Telecom intercepts traffic /24

How can hijacks/interception be used to compromise Tor? Reading presentation: RAPTor 19

Exercise How might we harden Tor against RAPTor attacks? What sources of data might we leverage? – Active measurements? (traceroute from client to relays?) – BGP monitor data? How to detect suspicious/hijacking activity? Which parts of this make sense to implement on the client? What makes outsourcing functionality (e.g., to a central point) challenging? 20