1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.

Slides:



Advertisements
Similar presentations
CCNP Network Route BGP Part -I BGP : Border Gateway Protocol. It is a distance vector protocol It is an External Gateway Protocol and basically used for.
Advertisements

1 Copyright  1999, Cisco Systems, Inc. Module10.ppt10/7/1999 8:27 AM BGP — Border Gateway Protocol Routing Protocol used between AS’s Currently Version.
BGP.
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
Lecture 9 Overview. Hierarchical Routing scale – with 200 million destinations – can’t store all dests in routing tables! – routing table exchange would.
Path Vector Routing NETE0514 Presented by Dr.Apichan Kanjanavapastit.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
BGP. 2 Copyright © 2009 Juniper Networks, Inc. BGP Overview Is an inter-domain routing protocol that communicates prefix reachablility.
Border Gateway Protocol Autonomous Systems and Interdomain Routing (Exterior Gateway Protocol EGP)
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol –Datagram format.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
1 Network Architecture and Design Routing: Exterior Gateway Protocols and Autonomous Systems Border Gateway Protocol (BGP) Reference D. E. Comer, Internetworking.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 ELEN 602 Lecture 20 More on Routing RIP, OSPF, BGP.
Computer Networking Lecture 10: Inter-Domain Routing
Unicast Routing Protocols: RIP, OSPF, and BGP
15-744: Computer Networking L-5 Inter-Domain Routing.
Ion Stoica October 2, 2002 (* this presentation is based on Lakshmi Subramanian’s slides) EE 122: Inter-domain routing – Border Gateway Protocol (BGP)
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
Border Gateway Protocol(BGP) L.Subramanian 23 rd October, 2001.
Border Gateway Protocol Vasant Reddy. Contents Introduction Operation BGP Types BGP Header Message & Attributes BGP Route Processing Security Issues Vulnerabilities.
Inter-domain Routing Outline Border Gateway Protocol.
14 – Inter/Intra-AS Routing Network Layer Hierarchical Routing scale: with > 200 million destinations: can’t store all dest’s in routing tables!
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
Introduction to BGP.
Routing and Routing Protocols Routing Protocols Overview.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Chapter 9. Implementing Scalability Features in Your Internetwork.
Border Gateway Protocol
BGP V1.1. When is BGP Applicable Basic BGP Peer Configuration Troubleshooting BGP Connections BGP Operation and Path Attributes Route Import/Export Selected.
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Xuan Zheng (modified by M. Veeraraghavan) 1 BGP overview BGP operations BGP messages BGP decision algorithm BGP states.
© 2001, Cisco Systems, Inc. A_BGP_Confed BGP Confederations.
BGP4 - Border Gateway Protocol. Autonomous Systems Routers under a single administrative control are grouped into autonomous systems Identified by a 16.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
CSCI-1680 Network Layer: Inter-domain Routing Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, Rodrigo Fonseca John Jannotti.
An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
BGP and ICMP. Exterior Gateway Protocol (EGP) Like RIP, but no metrics. Just if reachable. Rtr inside a domain collects reachability information and informs.
1 Chapter 14-16a Internet Routing Review. Chapter 14-16: Internet Routing Review 2 Introduction Motivation: Router performance is critical to overall.
BGP Basics BGP uses TCP (port 179) BGP Established unicast-based connection to each of its BGP- speaking peers. BGP allowing the TCP layer to handle such.
Text BGP Basics. Document Name CONFIDENTIAL Border Gateway Protocol (BGP) Introduction to BGP BGP Neighbor Establishment Process BGP Message Types BGP.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Establishing BGP Sessions.
Inter-domain Routing Outline Border Gateway Protocol.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
Border Gateway Protocol BGP-4 BGP environment How BGP works BGP information BGP administration.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
CS 3700 Networks and Distributed Systems
Boarder Gateway Protocol (BGP)
Border Gateway Protocol
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
CS 3700 Networks and Distributed Systems
Border Gateway Protocol
BGP (cont) 1. BGP Peering 2. BGP Attributes
Explaining BGP Concepts and Terminology
BGP supplement Abhigyan Sharma.
Lixin Gao ECE Dept. UMASS, Amherst
BGP Overview BGP concepts and operation.
Cours BGP-MPLS-IPV6-QOS
Inter-domain Routing Outline Homework #3 solutions
Computer Networks Protocols
Presentation transcript:

1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005

ECE Internetwork Security 2 Agenda BGP Overview Security Issues of BGP Proposed Security Solutions for BGP Introduction to the Lab

ECE Internetwork Security 3 BGP Overview Border Gateway Protocol (BGP)  Provides inter-domain routing between Autonomous Systems (ASes)  BGP Neighbors exchange Reachability information by using Route Advertisements  Uses Path Vector Routing to prevent loops – Route Advertisements include the AS-Path – BGP routers will not forward a received advertisement if their AS number is in the AS-Path  Application layer protocol that relies on TCP to provide reliable transport layer services  Supports Policy Based Routing

ECE Internetwork Security 4 BGP Overview Autonomous Systems  A set of routers that fall under a single management authority  Can use various interior routing systems  Develop relationships with other Autonomous Systems – Peering Connections and Transit Connections  Have at least one BGP router (or BGP Speaker) which serves as the gateway to the internet

ECE Internetwork Security 5 BGP Overview Autonomous Systems Tiers and Connections BIG ISP Transit Connection Peer Connection Transit Connection Tier 1 Tier 2

ECE Internetwork Security 6 BGP Overview Exterior Border Gateway Protocol (EBGP)  Used between BGP Speakers in separate ASes  EBGP Routers exchange reach-ability information only with neighbor ASes with whom they are willing to carry traffic Interior BGP (IBGP)  Used between BGP speakers in ASes which have multiple BGP routers (gateways to other ASes)  Purpose is to maintain a common view of current reach- ability information

ECE Internetwork Security 7 BGP Overview BGP Message Types  OPEN—sent immediately after a TCP session is initiated  UPDATE—used to exchange routing information – Route Advertisements – Route Withdrawals  KEEPALIVE—used to maintain the TCP Connection  NOTIFICATION—used to report errors (closes the connection)

ECE Internetwork Security 8 BGP Overview BGP Path Selection Process  Supports Policy Based Routing  Algorithm includes the following attributes (in relative order) 1.Weight 2.Local Preference 3.Use route originated by current router 4.Shortest AS_Path 5.Lowest Origin type (internal, external, incomplete) 6.Multi-Exit Discriminator  Many other BGP Attributes

ECE Internetwork Security 9

10

ECE Internetwork Security 11 BGP Overview

ECE Internetwork Security 12 BGP Overview BGP is the only protocol that provides inter-domain routing for the internet It is a critical piece of the Internet’s infrastructure

ECE Internetwork Security 13 Security Issues of BGP Communication between peers is not protected from eavesdropping  Modification can be prevented by using TCP MD5 “signatures” Subject to all lower layer vulnerabilities DOS/DDOS Attacks  Can be used to target TCP Port 179 used by BGP  Potential to close connections  Potential to result in dropped Update messages Attacks may come from trusted routers that have been compromised  Smaller ISPs with poor security provide good targets  Mesh connected design means gaining access to any BGP speaker can have a significant impact on the Internet

ECE Internetwork Security 14 Security Issues of BGP Easy to Inject False Advertisements  Bad Configuration (BGP is hard!)  Malicious Attacks – TCP Spoofing (Can be used to close TCP connection) – Hijack TCP Sesssion – Can result in a Denial of Service Attack based on flood of BGP Update messages to withdraw routes and then advertise new routes No authentication within BGP

ECE Internetwork Security 15 Proposed Security Solutions for BGP Secure-BGP and Secure Origin BGP  Both use PKI (public-key cryptography) to verify the source of advertisements – Verify that the originating AS has the authority to advertise certain IP networks – Limit the effects of a compromise to one AS

ECE Internetwork Security 16 Proposed Security Solutions for BGP Secure-BGP  Uses out of band certificates  Each AS on the path must go to a certificate site to verify the source of the route Secure Origin BGP  Uses in band certificates  Each AS along the path adds its signature to the update message

ECE Internetwork Security 17 Proposed Security Solutions for BGP Secure-BGP and Secure Origin BGP  Both have severe routing overheads – May increase routing overhead by 800%  For either protocol to be effective, every AS must adopt it  No consensus, so neither protocol has experienced widespread adoption

ECE Internetwork Security 18 Introduction to the Lab Introduction to BGP Provide opportunity to get hands on BGP  Observe BGP traffic  Observe BGP configurations  Configure a BGP router  Conduct 2 Practical Exercises

ECE Internetwork Security 19 Introduction to the Lab

ECE Internetwork Security 20 Introduction to the Lab

ECE Internetwork Security 21 Screenshot#1

ECE Internetwork Security 22 Introduction to the Lab Observe BGP Router Information using the show ip bgp command BGP table version is 80, local router ID is Status codes: s suppressed, d damped, h history, * valid, > best, i - internal Origin codes: i - IGP, e - EGP, ? - incomplete Network Next Hop Metric LocPrf Weight Path *> / i *> / i *> / i *> / i * / i *> i * i i

ECE Internetwork Security 23 Introduction to the Lab Observe BGP Neighbor information using the Show BGP Neighbors command BGP neighbor is , remote AS 64515, internal link BGP version 4, remote router ID BGP state = Established, up for 11w2d Last read 00:00:14, hold time is 180, keepalive interval is 60 seconds Neighbor capabilities: Route refresh: advertised and received(new) Address family IPv4 Unicast: advertised and received Received messages, 0 notifications, 0 in queue Sent messages, 0 notifications, 0 in queue Route refresh request: received 0, sent 0 Default minimum time between advertisement runs is 5 seconds

ECE Internetwork Security 24 Introduction to the Lab Section 1.5 Scenario

ECE Internetwork Security 25 Introduction to the Lab Section 3 Scenario

ECE Internetwork Security 26 Questions?