BGP Security The Human Threat



Similar documents
RPKI Tutorial. Certification. Goals. Current Practices in Filtering

Improving Rou-ng Security with RPKI

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January Using BGP topology information for DNS RR sorting

Policy-Based AS Path Verification with Enhanced Comparison Algorithm to Prevent 1-Hop AS Path Hijacking in Real Time

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

F root anycast: What, why and how. João Damas ISC

A Strategy for Transitioning to BGP Security

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

APNIC elearning: BGP Attributes

Understanding Route Aggregation in BGP

Simple Multihoming. ISP/IXP Workshops

Internet inter-as routing: BGP

A PKI For IDR Public Key Infrastructure and Number Resource Certification

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs

Load balancing and traffic control in BGP

BGP Terminology, Concepts, and Operation. Chapter , Cisco Systems, Inc. All rights reserved. Cisco Public

Simple Multihoming. ISP Workshops. Last updated 30 th March 2015

Doing Don ts: Modifying BGP Attributes within an Autonomous System

Introduction to The Internet. ISP/IXP Workshops

IPv6 over IPv4/MPLS Networks: The 6PE approach

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.

Exterior Gateway Protocols (BGP)

Introduction to The Internet

Address Scheme Planning for an ISP backbone Network

Network Level Multihoming and BGP Challenges

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

APNIC Trial of Certification of IP Addresses and ASes

Load balancing and traffic control in BGP

Application Note: Securing BGP on Juniper Routers

BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

BGP overview BGP operations BGP messages BGP decision algorithm BGP states

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

JUNOS Secure BGP Template

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Security in the Network Infrastructure - DNS, DDoS,, etc.

Network Infrastructure Under Siege

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Topic 1: Internet Architecture & Addressing

To Add Paths or not to Add Paths

How To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics

The Case for Source Address Routing in Multihoming Sites

Application Note: Securing BGP on Juniper Routers

IPv6 and 4-byte ASN Update

How To Get An Ipv6 Allocation On Ipv4 (Ipv4) From Ipv5) From The Ipvripe Ncc (Ip6) From A Ipvv6 Ipv2 (Ip4) To Ip

Anycast Rou,ng: Local Delivery. Tom Daly, CTO h<p://dyn.com Up,me is the Bo<om Line

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

BGP Router Startup Message Flow

Based on Computer Networking, 4 th Edition by Kurose and Ross

The OpenDNS Global Network Delivers a Secure Connection Every Time. Everywhere.

Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]

Internet inter-as routing: BGP

DD2491 p Inter-domain routing and BGP part I Olof Hagsand KTH/CSC

CS551 External v.s. Internal BGP

Internet Infrastructure Security Technology Details. Merike Kaeo

Border Gateway Protocol BGP4 (2)

BGP Multihoming Techniques

BGP. 1. Internet Routing

NDN Technical Memo: NDNS, NDN based Domain Name System

BGP Multihoming Techniques

BGP Attributes and Path Selection

Building Nameserver Clusters with Free Software

Lecture 18: Border Gateway Protocol"

Application Note. Failover through BGP route health injection

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

IPv6 Addressing. ISP Training Workshops

Masterkurs Rechnernetze IN2097

IPv6 Address Planning

Cisco IOS Flexible NetFlow Technology

Increasing Path Diversity using Route Reflector

The Complete IS-IS Routing Protocol

BGP Multihoming Techniques

How To Fix Bg Convergence On A Network With A Bg-Pic On A Bgi On A Pipo On A 2G Network

E : Internet Routing

DEFENSE NETWORK FAQS DATA SHEET

Administra0via. STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16

DDoS Mitigation Techniques

Introduction to Routing

Transcription:

BGP Security The Human Threat RIPE / Amsterdam 2011.05.02 Randy Bush <randy@psg.com> 2011.05.02 The Human Threat 1

Assume RPKI Cert/IANA CA 98.128.0.0/16 SIA Cert/RIPE CA CA CA Cert/ARIN Cert/APNIC 98.128.0.0/20 98.128.16.0/20 98.128.32.0/19 CA Cert/UUNET Cert/RGnet CA Cert/IIJ CA 98.128.16.0/24 98.128.17.0/24 98.128.32.0/24 2011.05.02 The Human Threat 2

Assume RPKI-RTR django RCynic Gatherer Cache RPKI to Rtr Protocol BGP Decision Process RPKI Engine Publication Protocol Repository Mgt RPKI Repo 2011.05.02 The Human Threat 3

Assume Origin Validation R3#sh ip bg 98.128.0.0/24 BGP routing table entry for 98.128.0.0/24, version 94 Paths: (2 available, best #2, table default) 65000 3130 10.0.0.1 from 10.0.0.1 (65.38.193.12) Origin IGP, localpref 100, valid, external path 6802D4DC RPKI State invalid 65001 4128 10.0.1.1 from 10.0.1.1 (65.38.193.13) Origin IGP, localpref 100, valid, external, best path 6802D7C8 RPKI State valid 2011.05.02 The Human Threat 4

Origin Validation is Weak Today s Origin Validation provides neither cryptographic assurance (announcements are not signed), nor assurance of the AS Path of the announcement. A malicious router may announce as any AS, i.e. forge the ROAed origin AS. This would pass ROA Validation 2011.05.02 The Human Threat 5"

Protocol Not Policy Policy on the global Internet changes every 36ms We already have a protocol to distribute policy or its effects, it is called BGP We can not know intent, should Mary have announced the prefix to Bob But Joe can formally validate that Mary did announce the prefix to Bob BGPsec validates that the protocol has not been violated, and is not about intent or business policy 2011.05.02 The Human Threat 6"

Full Path Validation Rigorous per-prefix AS path validation is the goal Protect against origin forgery and AS- Path monkey in the middle attacks Not merely showing that a received AS path is not impossible Yes, this is S-BGP-like not SO-BGP-like 2011.05.02 The Human Threat 7"

Path Shortening Attack X ZB $ $ Z XZB WB $ $ $ W B A B Expected Path A->X->W->B Diverted Path - A->X->Z->W->B There Are Many Many Other Attacks 2011.05.02 The Human Threat 8

Forward Path Signing ZB X Z XWB WB $ $ $ X W B A B cryptographically signs the message to W Sb(B->W) W signs messages to X and Z encapsulating B s message Sw(W->X (Sb(B->W))) and Sw(W->Z (Sb(B->W))) X signs the message to A Sx(X->A (Sw(W->X (Sb(B->W)))) Z can only sign Sz(Z->X (Sw(W->Z (Sb(B->W)))) B 2011.05.02 The Human Threat 9

Capability Negotiation It is assumed that consenting routers will use BGP capability exchange to agree to run BGPsec between them The capability will, among other things remove the 4096 PDU limit for updates If BGPsec capability is not agreed, then only traditional BGP data are sent 2011.05.02 The Human Threat 10"

Replay Attack 3 1 0 1 0 R1 0 R4 R3 R0 R2 2011.05.02 The Human Threat 11"

Replay Attack 3 1 0 1 0 R1 X 0 R4 R3 2 0 0 R0 R2 2011.05.02 The Human Threat 12"

Replay Reduction Announcement replay is a vulnerability Therefore freshness is critical So originating announcer signs with a relatively short signature lifetime Origin re-announces prefix well within that lifetime, AKA beaconing Suggested to be days, but can be hours for truly critical infrastructure 2011.05.02 The Human Threat 13"

Origination by AS0 to AS1 New Optional Transitive Attribute NLRI AS0 ^RtrCert AS1 Sig0 Hash Signed (To & Te) by Router Key AS0-Rtr-xx Signed Forward Reference To and Te are times of signature origination and expiration Signature has a well-jittered validity end time, Te, of days Re-announcement by origin, AKA beaconing, every ~(Te-To)/3 ROA is not needed as prefix is sufficient to find it in RPKI as today 2011.05.02 The Human Threat 14"

Announcement AS1 to AS2 NLRI AS0 ^RtrCert AS1 Sig0 AS1 ^RtrCert AS2 Sig1 Hash Signed (To & Te) by Router Key AS0.rtr-xx Hash Signed by Router Key AS1-rtr-yy Signed Forward Reference R1 signing over R0 s signature is same as signing over entire R0 announcement Non-originating router signatures do not have validity periods But when they receive a beacon announcement, they must propagate it 2011.05.02 The Human Threat 15"

Only at Provider Edges This design protects only inter-domain routing, not IGPs, not even ibgp BGPsec will be used inter-provider, only at the providers' edges Of course, the provider s ibgp will have to carry the BGPsec information Providers and inter-provider peerings might be heterogeneous 2011.05.02 The Human Threat 16"

Simplex End Site Receives Unsigned & Trusts Up-streams to Validate Signs Own Prefix(es) Signs Own Prefix(es) Only Needs to Have Own Private Key, No Other Crypto or RPKI Data No Hardware Upgrade!! 2011.05.02 The Human Threat 17"

Informal BGPsec Group chris morrow (google) pradosh mohapatra (cisco) dave ward (juniper) randy bush (iij) doug maugham (dhs) rob austein (isc) doug montgomery (nist) ruediger volk (dt) ed kern (cisco) russ housley (vigilsec) heather schiller (uunet) russ mundy (sparta) jason schiller (uunet) sam weiler (sparta) john scudder (juniper) sandy murphy (sparta) kevin thompson (nsf) sharon goldberg (boston uni) keyur patel (cisco) steve bellovin (columbia uni) kotikalapudi sriram (nist) steve kent (bbn) luke berndt (dhs) warren kumari (google) matt lepinski (bbn) 2011.05.02 The Human Threat 18"

The Real Threats 2011.05.02 The Human Threat 19"

RPKI Reliability Do you want bet your reachability on all these being reliable? IANA IANA Trust Anchor SIA ARIN ARIN APNIC APNIC SIA SIA UUNET UUNET PSGnet PSGnet IIJ IIJ SIA UUcust UUcust RCynic Gatherer Validated Cache 2011.05.02 The Human Threat 20"

Reliability Via Hosted Publication IANA IANA ARIN ARIN APNIC APNIC UUNET UUNET UUcust PSGnet IIJ PSGnet IIJ UUcust 2011.05.02 The Human Threat Repository with Multiple Publication Points Publication Protocol draft-ietf-sidr-publication Reducing the Number of Publication Points Improves Things But 21"

Think DNS Root Anycast & cctld Anycast 2011.05.02 The Human Threat 22"

Do Not Overload Global RPKI Global RPKI Asia Cache NoAm Cache Euro Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache in-pop Cache Cust Facing Cust Facing Cust Facing Cust Facing Cust Facing 2011.05.02 The Human Threat Have Cache in POP High Priority Lower Priority 23"

Covering a Customer I Issue a ROA for the Covering Prefix I need to do this to protect Static Customers and my Infrastructure My Infrastructure BGP Cust Static (non BGP) Cust Unused 2011.05.02 The Human Threat 24"

Covering a Customer But if I Issue a ROA for the Covering Prefix Before My Customers issue ROAs for These My Infrastructure BGP Cust Static (non BGP) Cust Unused 2011.05.02 The Human Threat 25"

Covering a Customer If I Issue a ROA for the Covering Prefix Before My Customers issue ROAs for These Their Routing Becomes Invalid! My Infrastructure BGP Cust Static (non BGP) Cust Unused 2011.05.02 The Human Threat 26"

Up-Chain Expiration IANA 0/0 CA ARIN CA 98.0.0.0/8 These are not Identity Certs RGnet 98.128.0.0/16 PSGnet CA CA Sloppy Admin Cert Soon to Expire! 98.128.0.0/17 So Who Do You Call? 2011.05.02 The Human Threat EE Cert 98.128.0.0/17 ROA 98.128.0.0/1724 AS 3130 So My ROA will become Invalid! 27"

ROA Invalid but I Can Route The ROA will become Invalid My announcement will just become NotFound, not Invalid Unless my upstream has a ROA for the covering prefix, which is likely 2011.05.02 The Human Threat 28"

Ghostbusters! IANA 0/0 CA ARIN CA 98.0.0.0/8 RGnet 98.128.0.0/16 CA Ghostbusters Record PSGnet CA 98.128.0.0/17 EE Cert 98.128.0.0/17 ROA BEGIN:vCard VERSION:3.0 FN:Human's Name N:Name;Human's;Ms.;Dr.;OCD;ADD ORG:Organizational Entity ADR;TYPE=WORK:;;42 Twisty Passage;Deep Cavern; WA; 98666;U.S.A. TEL;TYPE=VOICE,MSG,WORK: +1-666-555-1212 TEL;TYPE=FAX,WORK:+1-666-555-1213 EMAIL;TYPE=INTERNET:human@example.com END:vCard draft-ietf-sidr-ghostbusters 98.128.0.0/17-24 AS 3130 2011.05.02 The Human Threat 29"

What if No Answer What if the threatening cert s maintainer does not answer or maintain their cert? Can I appeal up-stream of them? Will the grandparents take care of the children? 2011.05.02 The Human Threat 30"

Grandparent Rescue IANA 0/0 CA Sloppy Admin Cert Soon to Expire! ARIN 98.0.0.0/8 RGnet 98.128.0.0/16 CA CA PSGnet Deep Policy & Liability Issues CA 98.128.0.0/17 Saved by Grandparent EE Cert 98.128.0.0/17 ROA 98.128.0.0/17-24 2011.05.02 The Human Threat AS 3130 31"

Authoritarian Expiration ARIN 98.0.0.0/8 CA IANA 0/0 CA Authoritarian Issuer RGnet CA 98.128.0.0/16 PSGnet CA 98.128.0.0/16 EE Cert 98.128.0.0/16 ROA 98.128.0.0/16-24 So My Cert is Soon to Become Invalid! Who Do You Call? Cert Task Force Address Policy Rob s New Policies 2011.05.02 The Human Threat AS 3130 32"

And if You Believe Them is Us Read the ARIN PPML Mailing List 2011.05.02 The Human Threat 33"

But in the End, You Control Your Policy Announcements with Invalid origins MAY be used, but SHOULD be less preferred than those with Valid or NotFound. -- draft-ietf-sidr-origin-ops But if I do not reject Invalid, what is all this for? 2011.05.02 The Human Threat 34"

THIS WORK IS SPONSORED IN PART BY THE DEPARTMENT OF HOMELAND SECURITY UNDER AN INTERAGENCY AGREEMENT WITH THE AIR FORCE RESEARCH LABORATORY (AFRL). we Take your Scissors Away and turn them into plowshares 2011.05.02 The Human Threat 35"