Practical BGP Security: Architecture, Techniques and Tools
|
|
|
- Samson Wilkinson
- 10 years ago
- Views:
Transcription
1 renesys WHITE PAPER Practical BGP Security: Architecture, Techniques and Tools Laris Benkis A practical approach to identify weaknesses and highlight strategies for the detection of internetwork failures and defense of internetwork routing. Written for network engineers responsible for provisioning and protecting BGP, and for the IT manager who needs a technical overview of routing threats to the enterprise network.
2
3 At 12:48AM EST on the 14th of May 2003, the IP netblock /24 was announced to the via BGP through the service provider Verio s network from a small Florida ISP located in Boca Raton (1). This was peculiar because the block in question was registered to Northrop Grumman, a large US military contractor. Northrop Grumman has a very large IP network and its own autonomous system connected to the Sprint network. Therefore, anyone paying attention at the time might have concluded that something was amiss. Unfortunately for Northrop Grumman, no one was paying attention at least not until the spammers who had hijacked their IP block began using it to send . As a consequence the IP block was listed in the SpamHaus (2) and SPEWS (3) spam blacklists. The hijacking and spam continued until complaints to Northrop Grumman alerted them to the hijack; they then took steps to reclaim ownership of their block and some two months after the start of the incident, the announcements were blocked. Sadly, the Northrop Grumman hijack was not an exceptional occurrence. The technique utilized by the hijackers was one of several standard methods used by spammers. They first identified an IP block which had been allocated by ARIN but was either not in use or not being announced on the. They then took ownership of the block by re-registering the DNS domain identified in Whois as the contact point for the block owner. Being able to send and receive mail from this domain allowed them to prove ownership of the block and request their upstream service provider to carry their announcements. This incident highlights numerous security weaknesses existing in the processes and technologies used to operate the. This paper will not review these weaknesses, but rather focus on the aftermath something bad has happened to your network on the from a BGP routing perspective; how do you recognize and respond to it? Better yet, what can you do to prevent incidents like this from happening, or at least minimize their impact? This paper discusses some BGP routing operational and security best practices that help to minimize network problems that can occur and a tool to help recognize and respond to some of the issues. We will start with a discussion of internal network configuration, presenting a sample network to illustrate some best practices and the issues they are designed to mitigate, next talk about network failures and problems that are visible externally to a network, and then discuss a detection method for these problems, and finally we will touch on some aspects of how to respond to incidents. We will not provide specific router configurations, but rather discuss at a higher level what the routers should be configured to do. A familiarity with BGP routing concepts is assumed on the part of the reader. The paper is written from the perspective of a mid-to large-sized autonomous system (AS) that peers with one or more transit providers and one or more private peers essentially an edge AS which may also have some smaller customers that it provides transit to. The routing security issues of a large transit provider are different enough that are not discussed in detail here. A simplified diagram of the target network environment is shown in the following diagram. Private Peers Transit Peers Customers 1
4 BGP Routing Principles An edge autonomous system, in this case, is a routing security domain with a perimeter defined by its interfaces to its EBGP peers. The peers are classified as transit, private, or customer. A large part of the operational and security challenge posed by BGP is controlling the flow of information across this boundary transmitting only that which you want to send, and accepting only what you want to receive. The information sent and received, of course, is BGP routes, and what you will accept and what you will send is very much dependent on the class of peer. An essential step in building a BGP network is to have a clearly defined routing policy. The following two tables indicate what classes of routes are typically sent and received from each class of peer; this defines a very simple routing policy for note that this is an example only and the recommendations that follow may not apply in every situation and therefore should be adjusted as required. Table 1 Sent to EBGP Peers Your AS Transit Private Peer Customer Transit Peers Private Peers Customers 1 1 sent to a customer AS can vary significantly depending on requirements and the agreement with the customer Table 2 Received from EBGP Peers Martian Address Space Unallocated Address Space Your AS Transit Private Peer Customer Transit Peers Private Peers Customers Martian address space consists of blocks that have special meaning which precludes their use in the public. The generally accepted list of Martian blocks is given in Table 3 on the next page. This table does not, as a general rule, change; therefore a Martian filter can be configured on routers and then left alone. Unallocated address space consists of address blocks which IANA has not yet allocated to a Regional Registry. Maintenance of the unallocated list by is complicated by the fact that changes are not under the control of. The list is updated as IANA allocates new blocks and they are routed publicly. As IANA allocates blocks, announcements are made on various network operator forums to let the operator community know that a new allocation has been made and that the appropriate filters should be modified. An organization that tracks the unallocated address blocks very closely is Team Cymru (4). They provide a current copy of the list in a number of useful formats. As an aside, for those readers interested in learning about BGP security best practices, a thorough review of the material on the Team Cymru website would be time well spent, in particular the secure IOS and JUNOS router templates. 2
5 Table 3 Martian Address Space Netblock Note /8 Default route and special-use /8 Loopback block /24 Net-Test allocated to network testbeds /8 RFC 1918 Private address space /12 RFC 1918 Private address space /16 RFC 1918 Private address space /15 RFC 2544 Network Testing /16 DHCP autoconfiguration /4 Class D (Multicast) and Class E (not used) for address space allocated to should never be accepted from EBGP peers any announcement of routes from an external peer indicates a network hijack. External BGP routes have a very high priority in route selection on a router. If a route for hijacked netblock were accepted in, it could seriously disrupt communication within in addition to the disruption already caused externally. Keeping this list up-to-date is relatively easy since BGP changes have to be made if the netblocks announced by change, so the filter list can easily be updated at the same time. Implementing a routing policy has two fundamental components. that are received into the AS have to be classified appropriately (routes received by an AS come from EBGP peers or are locally generated), routes that are sent have to be selected. The best tool available in BGP to denote a classification and to make a selection is the community tag. A community tag is a large integer number with no intrinsic meaning (except for few well-known tags with pre-defined values) which is attached to a BGP route. The network designer configures the BGP speakers in the network to announce or not announce routes based on the meaning assigned to their attached tags. Once routes have been tagged appropriately controlling their announcement becomes much easier, and inadvertent leaks of routes becomes less likely. So, for the example, let s define four tags: YA, TR, PP, and CU for generated, transit, private peer, and customer routes respectively. Now assume that has two transit peers, one private peer and one customer. Received routes would be tagged as follows: Table 4 Accepted Route Tagging YA TR PP CU Generated Transit Peer 1 Transit Peer 2 Private Peer 1 Customer 1 3
6 3. Provision Route Practical BGP Security: Architecture, Techniques and Tools Given a policy definition (Table 1) and an appropriate tagging of routes (Table 4), determining which routes to send to each external peer is straightforward. However, advanced routing strategies, such as load balancing and failover precautions, can complicate this process. In the interest of focusing on overall policy, we will disregard these advanced strategies. The interesting questions arise when trying to implement the policy in Table 2; on receipt of routes, how do you decide what you will accept and what will be rejected? More specifically, what prefixes should I accept from the peer, and what AS paths? The answer to this question involves tradeoffs which essentially balance security and maintainability. The problem boils down to the fact that the more specific the filters applied to a peering session, the more quickly they become outdated and require reconfiguring which can become an issue for large numbers of peering sessions and for smaller operations teams with limited manpower. This quandary leads very naturally to a discussion about automating this process. Updating route filters has several distinct steps, each of which must be addressed by the automation process. The filter information must be retrieved from a repository of some sort. Based on the filter information, a filter-list must be generated using syntax appropriate for your particular brand of router. Finally, the generated filter must be installed on the routers. The repository that contains route information is called a route registry. There are a number of registries operating on the, the best known being RADb (5) and RIPE (6). ASes which register in the registry list the netblocks which they originate as well as their customer ASes; their customer ASes, in turn, should also register and provide their relevant information. An AS which peers with a registered AS can retrieve this data and construct prefix and AS path filters that can be applied to the peering session. The filters will only allow the prefixes and AS paths of the peer AS and its customers. A useful tool that can query a route registry for the necessary data and construct the appropriate filter expressions for a number of different router platforms is RtConfig, and is a part of the IRRToolSet maintained by Systems Consortium (7). RtConfig can be used to periodically generate the necessary filters. The filters can then be applied manually or via some automated process. Another tool for producing and maintaining configurations based on routing registry data is irrpt (8). Note that Team Cymru maintains filter objects fltr-martian, fltr-unallocated, and fltr-bogons (the combination of fltr-martian and fltrunallocated) in the RADb and RIPE registries. This allows the martian and unallocated space to automatically be updated if a registry is used as a source to generate the filter. The following diagram illustrates the sequence that is followed for a private peer of to announce the prefix v.w.x.y/zz. 2. Retrieve Prefix Information Route Registry 1. Register Prefix Filter 4. Announce prefix 5. Validate announcement with filter Prefix v.w.x.y/zz Private Peer The above scenario, where automated processes generate and update router configurations to ensure optimal security, is a highly recommended operating method. However, it suffers from two problems. The first is that many networks do not keep up-to-date routing policy information in any registry. It is therefore impossible to keep updated filter configurations for those networks in any automated fashion. The second problem is that it requires considerable initial work to set up, and someone with scripting skills to implement. Many smaller 4
7 operations with few peering sessions to manage, or operations that lack the necessary skills, will often forgo the security benefits because of the complexity and work involved. To encourage networks to implement some measure of security in their peering configurations, the following simplified solution is recommended which, while not quite as thorough as automatic generation, still provides protection from a variety of significant threats. Filter Martian address space. The Martian list doesn t change and thus requires no maintenance. Filter space Consider filtering unallocated space Filter peer AS and peer customer AS paths. For example, given a private peer with AS# who has a customer AS# 65002, the following AS path filter template is a nice way of implementing this. The template allows the peer and the peer s customer to prepend their AS as many times as they like in their announcements. Since the actual prefixes themselves are not filtered, this filter does not require any subsequent maintenance. permit ^(_65001)+$ permit ^(_65001)+(_65002)+$ Implement prefix limiting. Called maximum-prefix on Cisco IOS and prefix-limit on Juniper JUNOS, this sets a ceiling on the number of route announcements that will be accepted from a peer. If the limit is exceeded, the session is disabled. Since accepted prefixes are not being filtered explicitly, this provides a mechanism to abort a session if a peer decides to re-advertise the full routing table as originated by itself. (Unlikely as it may seem, this has happened; see the recent Renesys presentation regarding the massive leak by Turkish Telecom [9]. Also, perusing the results of a Google search on AS7007 makes for an interesting read). The setting of the prefix limit should be based on how many prefixes the peer needs to announce. A generous margin of 50% above the current total allows room for growth while still providing protection from catastrophe. The above recommendation provides a low-maintenance configuration with reasonably robust security. Purists will not be impressed, but if all operators implemented at least this level of filtering, the autonomous system operational standards bar would be raised significantly. Failure Modes Let s now turn our attention to what can happen to from the perspective of the. The question of perspective is very important here what you see depends on where you are looking from. will announce a number of routes and the expectation is that all ASes on the will have visibility of these routes. While the reasons why this expectation may not be met are endless, the failure modes in terms of how route visibility does not meet this expectation can be summarized by a few distinct cases: 1. is not announcing all the routes that it should. This can result in parts of being unreachable from the or, if a covering aggregate exists for the missing prefix, traffic may be entering by a different path than was planned. Recall that morespecific prefixes are preferred by the BGP route selection process. This may overload circuits and impact costs by shifting traffic unexpectedly between transit providers. An example on the next page illustrates this. has a large server farm addressed in the /24 address block. This block is announced on an OC48 peering link. The rest of encompasses the entire /8 block, which is served by an OC3 peering link. If for some reason the /24 announcement is blocked, all the traffic to the server farm will follow the /8 announcement and potentially saturate the OC3 connection. Although the example is simplistic and contrived, it illustrates the point that announcement failures that may not be visible internally can cause unexpected and potentially serious traffic shifts. 5
8 Lots of Traffic OC /8 OC48 Server Farm In / /24 2. is announcing more routes than it should. This can indicate a configuration error in, or it may be leaking private peer routes unintentionally. In this example private peers with some other AS and accidentally leaks the peer s prefix. In this example the private peer transit link is an OC48 while only has an OC3. peers via a DS3. The extra traffic drawn by the leaked prefix will potentially saturate the private peering link and the transit link. OC /8 Private Peer AS OC3 Lots of Traffic 3. routes are resulting in traffic on unintended paths. This can indicate a configuration problem in which you are announcing certain routes to transit providers which you did not intend to. It could also indicate that a private peer or a customer is leaking routes to their transit provider. This example is the reverse of the previous. In this case your private peer is leaking your prefixes and drawing unintended traffic. Resulting link saturation will impact both the private peer s customers, the customers in the leaked prefix, and the customers accessing the Private Peer network. Lots of Traffic OC3 Private Peer AS OC /8 6
9 4. Some portion of the cannot see some or all of routes. This can be indicative of a failure at some point on a remote AS, where such a failure could be a malfunction or a configuration issue. This example is very common. Somewhere on the, a failure occurs. The failure is in some AS on which other ASes depend to reach, therefore is unreachable for some portion of the. The rest of the Very Important AS /8 5. routes are visible originating from some AS other than. This indicates a network hijack. Intentionally or unintentionally, another network is announcing routes. This failure mode describes what happened to Northrop Grumman. The effects can vary depending on the network block that is hijacked. In the Northrop Grumman case, an inactive block was used and consequently Northrop Grumman was blacklisted. If the hijacker were to announce a block that is actively in use in, communications from to the originating within that block could be partially or totally disrupted. If does not filter its own address space on announcements received from its transit provider, communication within could also be disrupted / /8 HijackingAS The final case is not, strictly speaking, an issue of visibility of routes: 6. autonomous system number is announced by some other network. Since it is not possible to know that the false announcement is actually a separate network, to the this would appear that has some other transit peering other than the legitimate ones, and may be announcing prefixes which are not part of the assigned address space. From a detection perspective, this then becomes a special case of failure mode #3 and possibly #2. 7
10 Depending on the routes announced by the hijacker, the impact on will vary. If address space is announced, then the impact is similar to that of case 5. If routes outside of address space are announced then there would be no disruption to operation. However, any actions taken by the hijacker would then be attributed to and reputation will suffer accordingly. AS #XXX AS #XXX HijackingAS The total number of distinct failure modes is not that large. The difficulty is that detecting these kinds of failures from the perspective of can be very difficult. Many networks have no external visibility of their status and simply rely on customer complaints to alert them to problems. While it doesn t require any financial outlay, this approach has the disadvantage of not providing complete coverage of all the failure modes; moreover, customer dissatisfaction can prove costly to the network operator in the long run. An alternate approach, a service called GRADUS offered by Renesys Corporation, provides a cost-effective means of detecting occurrences of these error conditions in real-time, allowing an operator to react quickly to correct them before customers are impacted. In many cases the failures causing traffic shifts are caused by network maintenance or changes performed during change windows when the network is operating at a low utilization; these traffic shifts may not be sufficient to saturate circuits at the time, and therefore if they can be detected immediately they can be corrected with no customer impact. GRADUS GRADUS is a real-time BGP monitoring system, connected (at the time of writing) to 100 BGP peers in autonomous systems scattered around the globe. The peers provide Renesys a comprehensive real-time view of the global routing tables. A GRADUS customer installs a Java client on a workstation in their network which connects to Renesys via a secure HTTPS connection. If GRADUS detects any of the alarm cases described previously for prefixes that the customer specifies, the client will generate a visible alarm and optionally send an SNMP trap to a network management station (NMS) and an notification to a list of target addresses. Renesys Peer GRADUS Client Renesys Peer Renesys/GRADUS Renesys Peer Renesys Peer NMS Route Announcement Renesys Peer Gradus Notification SNMP Trap Notification 8
11 The diversity of the GRADUS peers provides a comprehensive view of how the sees, and the alarms alert a network operator the instant a significant event happens. This provides continuous real-time verification of the correctness of the BGP routing design and external surveillance for problems not visible to. In the case of Northrop Grumman, with GRADUS they would have known within seconds of the event that their netblock had been hijacked. Fast action then could have prevented any significant amount of spam from being released into the, and their being blacklisted. In addition to its monitoring capability, GRADUS has an archive of all BGP announcements it has received since January of The Java client allows this database to be queried, making it a powerful tool to debug network problems, analyze failures, evaluate potential transit providers, conduct forensic network investigations, and a host of other network analysis tasks. The data is displayed graphically, and as a raw listing of BGP announcements. The preceding image shows a depiction in GRADUS of the Northrop Grumman hijack. Each horizontal line represents a different GRADUS peer, a green mark indicates a route change with no loss on connectivity, and a red mark indicates a loss of connectivity. The raw announcement and withdrawal data provide much more detailed information. We can see that all peers first received an announcement for the route at 12:48AM on the 14th of May, the AS path from each peer to the origin AS of the netblock, and all the AS path perturbations that occurred at each peer until the route was finally withdrawn. If we were investigating the incident, the data from peer TS would certainly be interesting, as this peer kept seeing routes to the netblock until the 18th of July, while it was withdrawn from all other peers on the 26th of June. This is an example of the benefit provided by the diversity of perspective that GRADUS offers; a cursory look from an looking glass or route server would probably not have revealed that after the 26th of June the route was still active. 9
12 normal route to Yahoo SCD via Yahoo US backbone AS / Yahoo! / AS for DataOne (Malaysia) 4788 TMnet, Telekom Malaysia 4436 Santa Cruz Community (scruz-net) WV FIBER LLC 3491 CAIS 5511 France Telecom 1239 Sprint Ex3 gradus://3fa1b5afe5e43bf0 hijacked routes originate in DataOne Malaysia (AS 10111) In the Northrop Grumman case, an unused prefix was hijacked. Hijackings of announced, in-use prefixes (and more specifics of those same prefixes) has also occurred many times on the. This is ocassionally a mistake caused by someone misconfiguring a prefix in a router. It may also be malicious, where someone tries to redirect or block legitimate traffic to another s networks. The following image shows the GRADUS graphical depiction of the hijacking, in May, 2004, of Yahoo! s Santa Clara datacenter prefix. The same two prefixes, /20 and /24, are shown being originated by both Yahoo! (AS26101) and DataOne from Malasia (AS10111). The diversity of peers of the GRADUS system allows accurate detection of such an event anywhere in the world. The graphical interfaces makes it easy to diagnose such an event. Incident Response Thus far we have discussed some best practices that can be applied to the building of a BGP network, some things that can go wrong, and how you can recognize that they have gone wrong. To round out the discussion, we will review briefly what you can do if you discover a problem similar to those described here. The first question that you need to answer is, From where is the problem originating? If the source of the problem is, then correcting it is a matter within your control and standard troubleshooting methods apply. If, however, the problem is external to, then there are no local corrective measures that you can apply to solve the problem. In this case, after using a tool such as GRADUS to identify the source AS of the problem, the best course of action is to contact the NOC of the AS to alert them to the situation. It may seem self-evident, but it is worth mentioning nonetheless, that most network operators provide a contact and phone number. However, getting through to a knowledgeable operator may not always be easy. One way to get directly to the operations centers of many network operators is the INOC-DBA Hotline Phone system (10). INOC-DBA (Inter-NOC Dial-By-ASN) is a closed VoIP network running on the using SIP phones. Dialing an ASN with an optional 3-digit extension will ring a phone in the NOC at the AS if the network in question is part of the system. Accounts on INOC-DBA are free. 10
13 Conclusion This paper has suggested some of the guidelines that a network operator should follow in the design of a BGP network to simplify the implementation of routing policies. We then discussed the types of failures a network is subject to which are visible on the but not readily apparent within the AS. We then reviewed how the GRADUS tool can help to detect and respond to these kinds of problems. Laris Benkis is an internetworking consultant based in Montreal, Canada. He can be reached at [email protected]. References (1) (2) Spamhaus SBL (3) (4) (5) (6) (7) (8) (9) (10) 11
14 renesys CORPORATE HEADQUARTERS 1750 Elm Street Suite 101 Manchester, NH T F [email protected] 2005 Renesys Corporation. All rights reserved. Renesys and GRADUS are trademarks of Renesys Corporation.
Introduction to Routing
Introduction to Routing How traffic flows on the Internet Philip Smith [email protected] RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,
BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)
BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE
Simple Multihoming. ISP/IXP Workshops
Simple Multihoming ISP/IXP Workshops 1 Why Multihome? Redundancy One connection to internet means the network is dependent on: Local router (configuration, software, hardware) WAN media (physical failure,
BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA
BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA. Gaurab Raj Upadhaya [email protected] Packet Clearing House What are Best Practices Established or
BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected]
BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected] ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS
JUNOS Secure BGP Template
JUNOS Secure BGP Template Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 04/25/2001 Contents Credits... 2 Introduction... 2 Template... 4 References... 10 Credits Rob Thomas
Detecting BGP hijacks in 2014
Detecting BGP hijacks in 2014 Guillaume Valadon & Nicolas Vivet Agence nationale de la sécurité des systèmes d information http://www.ssi.gouv.fr/en NSC - November 21th, 2014 ANSSI - Detecting BGP hijacks
ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.
ISP Case Study UUNET UK (1997) ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Acknowledgements Thanks are due to UUNET UK for allowing the use of their configuration information and network
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
Intelligent Routing Platform White Paper
White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5
ETHEL THE AARDVARK GOES BGP ROUTING
Fable Of Contents ISP TECH TALK by Avi Freedman ETHEL THE AARDVARK GOES BGP ROUTING In this exciting column we'll actually walk through configuring a Cisco router for BGP. It's very important, however,
Simple Multihoming. ISP Workshops. Last updated 30 th March 2015
Simple Multihoming ISP Workshops Last updated 30 th March 2015 1 Why Multihome? p Redundancy n One connection to internet means the network is dependent on: p Local router (configuration, software, hardware)
Application Note: Securing BGP on Juniper Routers
Application Note: Securing BGP on Juniper Routers Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 06/16/2002 Contents Introduction Introduction... 2 Assumptions... 3 Topology...
BGP Routing. Course Description. Students Will Learn. Target Audience. Hands-On
Hands-On Course Description This Hands-On course on (Border Gateway Protocol), from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <[email protected]>, <[email protected]>
BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Troubleshooting Network Performance with Alpine
Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
APNIC elearning: BGP Attributes
APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
Transitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
Cost Savings Analysis of IP Address Management (IPAM) Software for Service Providers
Cost Savings Analysis of IP Address Management (IPAM) Software for Service Providers A white paper by Incognito Software March, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 8 Cost Savings
BGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith 26th July - 4th August 2006 Karachi 1 Presentation Slides Available on ftp://ftp-eng.cisco.com /pfs/seminars/sanog8-multihoming.pdf And on the SANOG8
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia
Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not
BGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith SANOG 12 6th-14th August 2008 Kathmandu 1 Presentation Slides Available on ftp://ftp-eng.cisco.com /pfs/seminars/sanog12-multihoming.pdf And on the
Advanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING 20 APRIL 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to
Address Scheme Planning for an ISP backbone Network
Address Scheme Planning for an ISP backbone Network Philip Smith Consulting Engineering, Office of the CTO Version 0.1 (draft) LIST OF FIGURES 2 INTRODUCTION 3 BACKGROUND 3 BUSINESS MODEL 3 ADDRESS PLAN
Email Reputation Metrics Troubleshooter. Share it!
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
INOC-DBA. Hotline Phone System. aka. The AS Number Phone SANOG 7. Gaurab Raj Upadhaya INOC-DBA Operator, Packet Clearing House operator@pch.
INOC-DBA Hotline Phone System aka. The AS Number Phone SANOG 7 Gaurab Raj Upadhaya INOC-DBA Operator, Packet Clearing House [email protected] What s it About? INOC-DBA: Inter-NOC Dial-by-ASN Global Voice-over-IP
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
CA Spectrum MPLS-VPN Manager
CA Spectrum MPLS-VPN Manager User Guide Release 9.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001
Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual routing is a software design method used to provide multiple independent routers that share
BGP Multihoming Techniques. Philip Smith <[email protected]> APRICOT 2013 Singapore 19 th February 1 st March 2013
BGP Multihoming Techniques Philip Smith APRICOT 2013 Singapore 19 th February 1 st March 2013 Presentation Slides p Will be available on n http://thyme.apnic.net/ftp/seminars/ APRICOT2013-Multihoming.pdf
THE VALUE OF NETWORK MONITORING
THE VALUE OF NETWORK MONITORING Why It s Essential to Know Your Network Sponsored by Ipswitch I. Introduction All companies are different, but the value of their network to their business varies little.
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery
Demystifying BGP: By Jeffrey Papen Thursday, May 15th, 2003
Demystifying BGP: All across the Internet, the Border Gateway Protocol, or BGP, is used to direct network traffic from one site to another. Here's a look at how BGP works. By Jeffrey Papen Thursday, May
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
BT Internet Connect Global - Annex to the General Service Schedule
1. Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the General Services Schedule. ARP means Address Resolution Protocol. Border Gateway Protocol
INOC-DBA Hotline Phone System
INOC-DBA Hotline Phone System RIPE 49 BoF Presentation edited after the BoF to reflect key discussions September 2004 Gaurab Raj Upadhaya [email protected] INOC-DBA Operator, Packet Clearing House What
DDoS attacks in CESNET2
DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud
Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
White Paper. Managing Risk to Sensitive Data with SecureSphere
Managing Risk to Sensitive Data with SecureSphere White Paper Sensitive information is typically scattered across heterogeneous systems throughout various physical locations around the globe. The rate
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.
: Real-time Inter-network Defense Against Denial of Service Attacks Kathleen M. Moriarty 22 October 2002 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations,
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Extending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
Know Your Foe. Threat Infrastructure Analysis Pitfalls
Know Your Foe Threat Infrastructure Analysis Pitfalls Who Are We? Founders of PassiveTotal Analysts/researchers with 10+ years of collective experience Interested in Better UX/UI for security systems Improving/re-thinking
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
REMOTE MONITORING MATRIX
802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best
Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka
Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka Tim Evens ([email protected]) NANOG-65 Traditional Method: VTY (cli/netconf/xml) Data is polled instead of pushed (not real-time) Large queries
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
Best Practices for Eliminating Risk from Routing Changes
Best Practices for Eliminating Risk from Routing Changes TECHNICAL BRIEF Table of Contents Introduction 3 Route Analytics Intelligence to Meet the Routing Management Challenge 3 Routing Management Best
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Hunting down a DDOS attack
2006-10-23 1 Hunting down a DDOS attack By Lars Axeland +46 70 5291530 [email protected] 2006-10-23 What we have seen so far What can an operator do to achieve core security What solution can
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Approaches for DDoS an ISP Perspective. [email protected] [email protected]
Approaches for DDoS an ISP Perspective [email protected] [email protected] Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not
Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone
3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement
Basic Email Funneling MX Verify and Redundancy. Why E-Mail Sorting Solutions? Why Vircom?
Basic Email Funneling MX Verify and Redundancy Why E-Mail Sorting Solutions? Why Vircom? Why? Focused on Managed Messaging SaaS Security Systems Own Superior-Architected Infrastructure DATACENTERS: Carrier-class
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
LHCONE Site Connections
LHCONE Site Connections Michael O Connor [email protected] ESnet Network Engineering Asia Tier Center Forum on Networking Daejeon, South Korea September 23, 2015 Outline Introduction ESnet LHCONE Traffic Volumes
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
The Case for Source Address Routing in Multihoming Sites
The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.
WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI
WHITEPAPER Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI About PCI DSS Compliance The widespread use of debit and credit cards in retail transactions demands
Southwest Arkansas Telephone Cooperative Network Management Practices
Southwest Arkansas Telephone Cooperative Network Management Practices Page 1 of 11 Release Date 05/18/15 INTRODUCTION... 3 CORE NETWORK OVERVIEW... 3 DISTRIBUTION NETWORK OVERVIEW... 3 ACCESS NETWORK OVERVIEW...
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
White Paper. Complementing or Migrating MPLS Networks
White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating
