Improving Rou-ng Security with RPKI



Similar documents
RPKI Tutorial. Certification. Goals. Current Practices in Filtering

BGP Security The Human Threat

APNIC Trial of Certification of IP Addresses and ASes

A PKI For IDR Public Key Infrastructure and Number Resource Certification

A Strategy for Transitioning to BGP Security

More on SHA-1 deprecation:

Network Security. Mobin Javed. October 5, 2011

Electronic Signature. István Zsolt BERTA Public Key Cryptographic Primi4ves

IPv6 First Hop Security Protecting Your IPv6 Access Network

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs

Application Security: Threats and Architecture

Policy-Based AS Path Verification with Enhanced Comparison Algorithm to Prevent 1-Hop AS Path Hijacking in Real Time

Network Infrastructure Under Siege

SAFE Digital Signatures in PDF

SDX Project Updates GEC 20

Lecture VII : Public Key Infrastructure (PKI)

Public-Key Infrastructure

EMET 4.0 PKI MITIGATION. Neil Sikka DefCon 21

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Introduction to Security and PIX Firewall

OpenCA v (ten-ten 2 )

F5 Silverline DDoS Protection Onboarding: Technical Note

Best Practices for SIP Security

Internetworking II: MPLS, Security, and Traffic Engineering

The IVE also supports using the following additional features with CA certificates:

SDN Controller Requirement

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka

TechNote 0006: Digital Signatures in PDF/A-1

SSL BEST PRACTICES OVERVIEW

2014 IBM Corporation

CS 356 Lecture 28 Internet Authentication. Spring 2013

AllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect ALLSEEN ALLIANCE

Telephone Related Queries (TeRQ) IETF 85 (Atlanta)

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases

NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS

State of PKI for SSL/TLS

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Exterior Gateway Protocols (BGP)

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

PKI and OpenSSL part 1 X.509 from the user s and the client software s point of view

IPsec Details 1 / 43. IPsec Details

crypto key generate rsa

WIRELESS LAN SECURITY FUNDAMENTALS

Security Policy Revision Date: 23 April 2009

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Network Level Multihoming and BGP Challenges

Network provider filter lab

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application

[SMO-SFO-ICO-PE-046-GU-

Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / kweissne@cisco.com Systems and Technology Architecture, Cisco Systems

Introduction to The Internet. ISP/IXP Workshops

IXP Member connection Best Practice. Kittinan Sriprasert BKNIX

Cleaning Encrypted Traffic

Certification Authority. The X.509 standard, PKI and electronic documents. X.509 certificates. X.509 version 3. Critical extensions.

Security certificate management

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

GlobalSign Enterprise Solutions

Cryptography and network security CNET4523

Overview. Author: Seth Scardefield Updated 11/11/2013

Bugzilla ID: Bugzilla Summary:

SBClient SSL. Ehab AbuShmais

Implementing Secure Shell

Public Key Infrastructure (PKI)

Network Security Essentials Chapter 7

IPv6 Secure Neighbor Discovery

Cisco EXAM Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) Buy Full Product.

Digital Certificates Demystified

Application Note Startup Tool - Getting Started Guide

NIST Test Personal Identity Verification (PIV) Cards

Case Studies in Solving Testing Constraints using Service Virtualization

Digital Signature Verification using Historic Data

DEPARTMENT OF DEFENSE ONLINE CERTIFICATE STATUS PROTOCOL RESPONDER INTEROPERABILITY MASTER TEST PLAN VERSION 1.0

Transcription:

Improving Rou-ng Security with RPKI Russ Clark Russ.Clark@gatech.edu Samuel Norris Samuel.Norris@gatech.edu Cas D Angelo, Sco7 Friedrich Ron Hutchins, Aurore Nguenang Thank you to the Na-onal Science Founda-on for their support of this work.

Too Easy To Lie I just adver-sed a shorter path to Google! 2

This Is A Recrui-ng Talk For The RPKI Army! 3

Standing on Shoulders RPKI and BGPSEC standards efforts Sharon Goldberg Boston University George Wesley - Time Warner (NANOG Preso) ESNET Randy Bush et al ARIN - hups://www.arin.net/resources/rpki/ 4

BGP vulnerabili-es 1/2 Credit to Sharon Goldberg hup://www.iab.org/wp- content/iab- uploads/2014/01/whyrpki.pdf 5

BGP vulnerabili-es 2/2 Credit to Sharon Goldberg hup://www.iab.org/wp- content/iab- uploads/2014/01/whyrpki.pdf 6

And It s A Common Problem Credit to Sharon Goldberg hup://www.iab.org/wp- content/iab- uploads/2014/01/whyrpki.pdf 7

Resource cer-fica-on to the rescue S- BGP 1997-2003 RPKI 2012- today RPKI So- BGP 2000-2003 IETF Standard published 2012 Deployment started in 2011 Cer-fies IP prefix alloca-ons Crypto done out- of- band No change to BGP messages BGPSEC BGPSEC XXX- today Builds on the RPKI Now being standardized Cer-fies announced routes Crypto done online Major change to BGP messages 8

What is RPKI? - Components 3 main components A PKI Signed objects A distributed repository X.509 PKI CerNficates a7est to holdings of IP address space and AS numbers Digitally signed rounng objects to support rounng security that are non- cernficate signed objects used by the infrastructure Those objects are: Route OriginaNon AuthorizaNon or ROA Manifests Hold the PKI objects and the signed rounng objects Make those objects available for use by ISPs in making rounng decisions 9

What is RPKI? - ROA ROA is a digital object forma7ed according to the Cryptographic Message Syntax specificanon (CMS) [RFC3852] that contains: A list of IP address prefixes One AS number Digest and signature algorithms (currently SHA- 256 with RSA signature) A digital signature An RPKI end- ennty cernficate 10

What is RPKI? ROA Crea-on Procedure to issue a ROA CA cert EE cert ROA 1. Obtain the RPKI CA cernficate from a cer-ficate authority 2. Generate the end- ennty (EE) cernficate 3. Create the ROA containing the prefix, the ASN and the EE cert 4. Sign the ROA using the private key corresponding to the EE cert 5. Publish the ROA in the RPKI repository system 11

What is RPKI? ROA Valida-on Procedure for validanon How to do the validanon? 1. Walk the Trust Anchors to find the Cer-ficate Authority repository: Ø Ingest ROAs (rsync) Ø Establish the ROAs validity Ø Push valida-on informa-on to routers via RPKI to Router protocol 2. Configure rou-ng policy, usually increase local preference on valids, drop invalids How to establish the ROA s validity? 1. Check that the ROA is a syntac-cally valid CMS object indica-ng appropriate digest and signature algorithms 2. Examine the enclosed EE cer-ficate and check that the IP address extension in the cert matches the IP address prefix(es) in the ROA 3. Verify the signature on the ROA using the public key in the EE cer-ficate 4. Check that the EE cer-ficate is a valid cer-ficate within the RPKI Note: A ROA can be revoked by simply revoking its EE cernficate 12

What is RPKI? Router Ac-on Route validanon sate 3 route announcement states Valid Invalid NotFound if covered by at least one ROA if a ROA exists for the prefix but with another AS If the IP address prefix doesn t exist in ROAs 13

What is RPKI? Signing Models Signing prefixes models Hosted model Delegated model Based on a third party or Cer-ficate Authority (e.g. ARIN) Relying par-es generate key & upload them to CA, use CA portal to manage ROAs ROAs are generated & signed by the CA, published in the CA s RPKI repository Relying par-es downloaded and validated ROAs to create rou-ng decisions There is some issues with this mode: Ø Relying par-es have to trust a third party with their private key Ø Fully rely on the CA s infrastructure Credit to George Wesley: hups://www.nanog.org/sites/default/files/wednesday_george_adventuresinrpki_62.9.pdf Independency from a third party Install Cer-ficate Authority sojware Generate keys (public and private) Generate ROAs for all resources Publish URI for the CA s publica-on point through CA s TA Issues: Ø Careful where you store your keys (not publicly- reachable server) Ø TA can only publish one URI per publica-on point Ø S-ll reliant on CA s TA infrastructure 14

Back to Our Example Source: hup://www.iab.org/wp- content/iab- uploads/2014/01/whyrpki.pdf 15

Gelng it Deployed RPKI gives us some real benefit But you probably aren t using it yet Some technical hurdles, perhaps some legal We re trying to help move things forward by crea-ng an example for R&E networks 16

R&E Architecture Verifica-on level 3 levels of the network hierarchy: A nanonal- based RPKI verificanon A regional- based RPKI verificanon A university- based RPKI verificanon 17

3/10/2015 BGP Security - RPKI project 18

Project Strategy Get used to working with the sojware Architecture RPKI server ROA management Router configura-on Built a test deployment on GENI Test things out where it s okay to fail! 10/4/15 19

GENI Deployment Architecture 20

Sojware Details RPKI Server rpki.net/ Ubuntu 14.04.1 LTS Quagga Router BGP- SRx extensions www- x.antd.nist.gov/bgpsrx/ NIST- SRx- bundle- 22-0.4.1.3 Centos 6.7 10/4/15 21

Let s do a demo 10/4/15 22

Conclusion BGP vulnerabili-es are a real threat RPKI is a good first step to solving the problem R&E networks are a good star-ng point We put together a GENI test environment you can use Who wants to join us? 23

Thank You! Russ Clark Russ.Clark@gatech.edu Samuel Norris Samuel.Norris@gatech.edu Cas D Angelo, Sco7 Friedrich Ron Hutchins, Aurore Nguenang Thank you to the Na-onal Science Founda-on for their support of this work.