Download presentation
Presentation is loading. Please wait.
Published byElaine Flowers Modified over 9 years ago
1
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group
2
History Created by Cisco engineers as a light-weight (computation and PKI) alternative to s-bgp. Originally only secured “origin” of routes, but topology information added later for additional security. Goal: A more real-world and usable system
3
Certificate Types Entity Cert: Organization -> ASN, Public Key Policy Cert: ASN -> Neighbors, Security Parameters Authorization Cert: ASN -> Network Prefixes, meta-data
4
Changes to BGP New “Security” Message (ie: updates are not used for security data). Ability to “ask” neighbor for security certificates. Authorization, Entity Certificate and Path Database
5
“Web of Trust” for Public Keys Root of Entity Cert trust hierarchy is not necessarily ICANN, but instead a group of “well- known entities”. It could also be private entity like Verisign, or a collection of tier-1 ISPs. Ambiguity with respect to Auth Certs (need ICANN hierarchy or not?)
6
Origin Auth + Path “Plausibility” Originating AS's are validated much like s-BGP AS-Path's are checked plausibility against topology database, not attested with cryptography Path Check bits in Policy Cert. Security Preference allows for “fuzzy” match.
7
Processing Updates Find Auth Cert for this prefix in local database. If route is originated by an ASN in the cert, continue, else discard If path-check bit is set, check that each hop in the AS-PATH exists in both directions in the path database (alternately, just check 1 st hop). Set “security preference” and install in RIB.
8
Other Benefits Policy Flexibility (let's you split an update, advertising some prefixes, but not others) Less verification load vs path attestation (still need crypto hardware though?). Robustness to gaps in deployment? Ability to “outsource” certificate validation to servers, provide routers with databases. Include policy information in certificates (AS X may not transit this route, etc)
9
Dirty “Little” Issues Peer links advertised (confidentiality)? Aggregation Determining extent of trust propagation within web-of-trust. Difference between path plausibility and path attestation? Where is database stored? Memory Issues in keeping AS-level topology? Incremental Deployment needs multi-hop BGP sessions to participants.
10
References ftp://ftp-eng.cisco.com/sobgp/index.html Extensions to BGP to Support Secure Origin BGP: draft-ng-sobpg-bgp-extensions-01.txt soBGP Architecture & Deployment: draft-white- sobgp-architecture-01.txt
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.