1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

Slides:



Advertisements
Similar presentations
RPKI Standards Activity Geoff Huston APNIC February 2010.
Advertisements

An Operational Perspective on Routing Security Geoff Huston Chief Scientist, APNIC.
Update on Resource Certification Geoff Huston, APNIC Mark Kosters, ARIN SSAC Meeting, March 2008.
An Operational Perspective on BGP Security Geoff Huston February 2005.
Update Damping in BGP Geoff Huston Chief Scientist, APNIC.
Experimental Internet Resource Allocations Philip Smith, Geoff Huston September 2002.
The Role of a Registry Certificate Authority Some Steps towards Improving the Resiliency of the Internet Routing System: The Role of a Registry Certificate.
SCION: Scalability, Control and Isolation On Next-Generation Networks
RPKI and Routing Security ICANN 44 June Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.
ROAs and Detecting “Bad” Originations Geoff Huston SIDR WG IETF 74.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Securing BGP Geoff Huston November Agenda An Introduction to BGP BGP Security Questions Current Work Research Questions.
Securing the Border Gateway Protocol Using S-BGP Dr. Stephen Kent Chief Scientist - Information Security APNIC Open Policy Meeting Routing.
BGP update profiles and the implications for secure BGP update validation processing Geoff Huston Swinburne University of Technology PAM April 2007.
BGP in 2009 Geoff Huston APNIC May Conventional BGP Wisdom IAB Workshop on Inter-Domain routing in October 2006 – RFC 4984: “routing scalability.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007.
Summary Report on Resource Certification February 2007 Geoff Huston Chief Scientist APNIC.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
An Operational Perspective on Routing Security Geoff Huston Chief Scientist, APNIC November 2006.
Border Gateway Protocol(BGP) L.Subramanian 23 rd October, 2001.
Allocations vs Announcements A comparison of RIR IPv4 Allocation Records with Global Routing Announcements Geoff Huston May 2004 (Activity supported by.
Progress Report on APNIC Trial of Certification of IP Addresses and ASes APNIC 22 September 2006 Geoff Huston.
The Resource Public Key Infrastructure Geoff Huston APNIC.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Secure Border Gateway Protocol (S-BGP): Real World Performance & Deployment Issues Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo BBN Technologies.
Routing Security and the Border Gateway Protocol Dr. Stephen Kent Chief Scientist - Information Security.
CAIA Seminar – 18 August 2007 – Taming BGP An incremental approach to improving the dynamic properties of BGP Geoff Huston.
Inter-Domain Routing Trends Geoff Huston APNIC March 2007.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Information-Centric Networks Section # 4.2: Routing Issues Instructor: George Xylomenos Department: Informatics.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Securing the Internet Backbone: Current activities in the IETF’s Secure InterDomain Routing Working Group Geoff Huston Chief Scientist, APNIC.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Inter-domain Routing Outline Border Gateway Protocol.
BGP Validation Russ White Rule11.us.
AS Numbers - Again Geoff Huston APNIC October 2009
Securing BGP: The current state of RPKI
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
More Specific Announcements in BGP
Goals of soBGP Verify the origin of advertisements
An Operational Perspective on Routing Security
Are We There Yet? On RPKI Deployment and Security
APNIC Trial of Certification of IP Addresses and ASes
COS 561: Advanced Computer Networks
Some Thoughts on Integrity in Routing
More Specific Announcements in BGP
Geoff Huston APNIC August 2009
Geoff Huston APNIC 7th caida/wide measurement workshop Nov
APNIC Trial of Certification of IP Addresses and ASes
Why don’t we have a Secure and Trusted Inter-Domain Routing System?
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
2005 – A BGP Year in Review February 2006 Geoff Huston
Design Expectations vs. Deployment Reality in Protocol Development
Geoff Huston APNIC 7th caida/wide measurement workshop Nov
Presentation transcript:

1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston

2 Address hijacking unauthorized use of an address prefix as an advertised route object on the Internet −Not a bogon address block has been assigned by an RIR for use −May include identity fraud may involve misrepresentation of identity in order to undertake a database change −Commonly associated with identity cloaking Spam generation, attack launching platforms, etc How prevalent is this? −Very hard to isolate hijacking incidents

3 What is a hijack signature? What address blocks would not be noticed if they were used for a short period? −Has been unadvertised for a ‘long time’ −Is used only for a ‘short time’ −Uses an entirely different origin AS and first hop AS −Is not covered by an aggregate announcement idle interval Reannouncement interval

4 Data collections Aggregated BGP route collection data Can provide information for any prefix: −When was this prefix advertised and withdrawn? −What was the announcing AS? −What was the first hop AS? −What other prefixes were also advertised at the same time?

5 Noise reduction in BGP data BGP update logs are possibly unhelpful here −High frequency noise of BGP convergence is different from the longer frequency signal of prefix use through network connectivity and prefix advertisement Use successive static BGP snapshots −Highest frequency component of 2 hours reduces protocol-induced noise levels in the data

6 Initial results Readvertisement of prefixes with different Origin AS and First Hop AS

7 2 nd Pass Very short window announce > 2 months down, 1 month down

8 3 rd Pass Short window > 2 months down, days up, > 1 month down

9 Some comments Address announcement patterns do not appear to be a reliable hijack indicator in isolation. −There is no clear signature in the patterns of prefix appearance that forms a reliable indicator of misuse. Address use profiles can assist in the process of identifying address hijacking for suspect prefixes. −Additional information is necessary to reliably identify candidate hijack prefixes. Careful checking of the provenance of an address before accepting it into the routing system make good sense −But thorough checks of a prefix’s history of use as a precondition to accepting it into the local routing session as a valid advertisement consume time and increase an ISPs’ operating overhead costs

10 It’s not a very reassuring answer.

11 Address and Routing Security The basic routing payload security questions that need to be answered are: −Is this a valid address prefix? −Who injected this address prefix into the network? −Did they have the necessary credentials to inject this address prefix? −Is the forwarding path to reach this address prefix an acceptable representation of the network’s forwarding state?

12 Address and Routing Security What we have today is a relatively insecure system that is vulnerable to various forms of deliberate disruption and subversion Address hijacking is just one aspect of the insecurity of the Internet’s routing system

13 What I really would like to see… The use of a public key infrastructure to support attestations that allow automated validation of: −the authenticity of the address object being advertised −authenticity of the origin AS −the explicit authority given from the address to AS that permits a routing announcement

14 What would also be good… If the attestation referred to the address allocation path −use of an RIR issued certificate to validate the attestation signature chain If the attestation was associated with the route advertisement −Such attestations to be carried in BGP as an Update attribute If validation these attestations was treated as a route object preference indicator −Attestation validation to be a part of the BGP route acceptance process

15 But… We are nowhere near where we need to be: −We need more than “good router housekeeping” – it’s trusting the protocol payload as well as trusting the protocol’s operation and the routing engines −We need so much more than piecemeal distributed 2 nd hand bogon and martian lists, filters and heuristics about use patterns for guessing at ‘bad’ addresses and ‘bad’ routes

16 We adopt some basic security functions into the Internet’s routing domain: Injection of reliable trustable data –Address and AS certificate PKI as the base of validation of network data Explicit verifiable mechanisms for integrity of data distribution –Adoption of some form of certification mechanism to support validation of distributed address and routing information What I’d like to see...

17 Oh yes, and about address hijacking… This type of resource security framework would make address hijacking much harder to perform!

18 Thank You