Download presentation
Presentation is loading. Please wait.
Published byPercival James Modified over 9 years ago
1
BGP Man in the Middle Attack Jason Froehlich December 10, 2008
2
What is BGP? Routing for whole Internet Autonomous Systems (AS) Classless Interdomain Routing (CIDR) 190.100.0.0/16190.100.0.0, 255.255.0.0
3
How BGP Works AS Border Router - “BGP Speaker” Advertise own routes, redistribute others Update Messages “AS_PATH” field Path Selection Most “Specific” Network 190.100.0.0/17 over 190.100.0.0/16
4
The Man in the Middle Attack Requirements: Redirect all traffic to Attacker Forward traffic onto Target Relies on trust built into BGP
5
Attack Threats Confidentiality Capture all packets Integrity Modify packets before delivery Availability Black Hole Filtering selected packets
6
Implementation 190.100.0.0/16 (AS100) is Target AS900 is Attacker
7
Implementation – Step 1 Advertise New Routes More specific 190.100.0.0/17, 190.100.128.0/17
8
Implementation – Step 1 router bgp 900 network 190.100.0.0 mask 255.255.128.0 network 190.100.128.0 mask 255.255.128.0... neighbor remote-as 600 neighbor remote-as 700 neighbor remote-as 800 no auto-summary
9
Implementation – Step 2 Create Route Back to Target Modify “AS_PATH” field of advertisement Add each AS in route to target
10
Implementation – Step 2 ip prefix-list victim permit 190.100.0.0/16 route-map mitm permit 10 match ip address prefix-list victim set as-path prepend 600 300 100 ip route 190.100.0.0 255.255.128.0 ip route 190.100.128.0 255.255.128.0
11
Attack Limitations Access to BGP Router No script kiddies, but pool still large Half of the Conversation Only sees Inbound traffic Resolve: 2 nd BGP MITM, Other MITM (DNS) Incomplete Route Distribution AS's in Return Path
12
Attack Limitations cont. Packet Route Visible Traceroute Resolve: TTL Modification BGP Updates Visible Alert a perceptive Administrator Encrypted Traffic Cannot decrypt payload
13
Mitigating the Attack - Prevention Filtering Must be done by every ISP Internet Routing Registry Overhead Poor Database Maintenance / Security
14
Mitigating the Attack - Detection Monitor for BGP Updates BGPmon.net
15
Mitigating the Attack - Response Counter-Attack Advertise even more specific networks ISP Disconnect Attacker May take hours to days Youtube.com – February 2008
16
Mitigating the Attack – Securing BGP S-BGP 2 Certificates – IP address, AS Secure Origin BGP Topologies Interdomain Route Validation Out of band verification
17
Conclusion BGP Man in the Middle Powerful Attack Easy to Implement Difficult to Mitigate
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.