Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.

Slides:



Advertisements
Similar presentations
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Advertisements

Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 22 Omar Meqdadi Department of Computer Science and Software Engineering University.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
SPV: Secure Path Vector Routing for Securing BGP Leonel Ocsa Sáchez School of Computer Science.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Routing Information Protocol (RIP). Intra-and Interdomain Routing An internet is divided into autonomous systems. An autonomous system (AS) is a group.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
Lecture 12 Page 1 CS 236 Online Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite coasts.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Fall 2006CS 395: Computer Security1 Key Management.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Inter-domain Routing Outline Border Gateway Protocol.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
BGP security some slides borrowed from Jen Rexford (Princeton U)
BGP Validation Russ White Rule11.us.
Outline Routing security DNS security. Securing Key Internet Technologies Computer Security Peter Reiher March 14, 2017.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
DNS Security Advanced Network Security Peter Reiher August, 2014
Some Important Network Characteristics for Security
Routing Information Protocol (RIP)
Outline Basics of network security Definitions Sample attacks
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
The Issue We all depend on the Internet
Net 323 D: Networks Protocols
Net 323 D: Networks Protocols
COS 561: Advanced Computer Networks
Outline Basics of network security Definitions Sample attacks
Dynamic Routing and OSPF
Inter-domain Routing Outline Homework #3 solutions
Why don’t we have a Secure and Trusted Inter-Domain Routing System?
COS 561: Advanced Computer Networks
Outline Network characteristics that affect security
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Outline The spoofing problem Approaches to handle spoofing
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher

Lecture 18 Page 2 CS 236 Online Outline Routing security DNS security

Lecture 18 Page 3 CS 236 Online Routing Security Routing protocols control how packets flow through the Internet If they aren’t protected, attackers can alter packet flows at their whim Most routing protocols were not built with security in mind

Lecture 18 Page 4 CS 236 Online Routing Protocol Security Threats Threats to routing data secrecy –Usually not critical Threats to routing protocol integrity –Very important, since tampering with routing integrity can be bad Threats to routing protocol availability –Potential to disrupt Internet service

Lecture 18 Page 5 CS 236 Online What Could Really Go Wrong? Packets could be routed through an attacker Packets could be dropped –Routing loops, blackhole routing, etc. Some users’ service could be degraded The Internet’s overall effectiveness could be degraded –Slow response to failures –Total overload of some links Many types of defenses against other attacks presume correct routing

Lecture 18 Page 6 CS 236 Online Where Does the Threat Occur? At routers, mostly Most routers are well-protected –But... –Several vulnerabilities have been found in routers Also, should we always trust those running routers?

Lecture 18 Page 7 CS 236 Online Different Types of Routing Protocols Link state –Tell everyone the state of your links Distance vector –Tell nodes how far away things are Path vector –Tell nodes the complete path between various points On demand protocols –Figure out routing once you know you two nodes need to communicate

Lecture 18 Page 8 CS 236 Online Popular Routing Protocols BGP –Path vector protocol used in core Internet routing –Arguably most important protocol to secure RIP –Distance vector protocol for small networks OSPF ISIS Ad hoc routing protocols

Lecture 18 Page 9 CS 236 Online Fundamental Operations To Be Protected One router tells another router something about routing –A path, a distance, contents of local routing table, etc. A router updates its routing information A router gathers information to decide on routing

Lecture 18 Page 10 CS 236 Online Protecting BGP BGP is probably the most important protocol to protect Handles basic Internet routing Works at autonomous system (AS) level –Rather than router level

Lecture 18 Page 11 CS 236 Online BGP Issues BGP is spoken (mostly) between routers in autonomous systems On direct network links to their partner Over TCP sessions that are established with known partners –Easily encrypted, if desired Isn’t that enough to give reasonable security?

Lecture 18 Page 12 CS 236 Online A Counterexample Pakistan became upset with YouTube over posting of “blasphemous” video (2008) Responded by injecting a BGP update that sent all traffic to YouTube to a site in Pakistan –Which probably dropped it all Rendered YouTube unavailable worldwide (well, 2/3s of world) –Probably due to error, not malice

Lecture 18 Page 13 CS 236 Online How Did This Happen? Pakistan injected a BGP update advertising a path to YouTube –Which they had no right to do It got automatically propagated by BGP Everyone knows YouTube isn’t in Pakistan But the routing protocol didn’t Security required to prevent other future incidents

Lecture 18 Page 14 CS 236 Online Another Example In 2010, China rerouted a lot of US traffic through its servers –Traffic purely internal to the US –Lots of military, government, commercial traffic Based on bogus BGP route advertisements Possibly errors, not attacks, but...

Lecture 18 Page 15 CS 236 Online A Side Issues on This Story Much Internet design assumes major parties play by the rules Pakistan didn’t Not desirable to base Internet’s security on this assumption Though sometimes not many other choices

Lecture 18 Page 16 CS 236 Online Basic BGP Security Issue ABCDE FG * A wants to tell everyone how to get to * * A A B,A * C,B,A * D,C,B,A What do we need to protect?

Lecture 18 Page 17 CS 236 Online Well, What Could Go Wrong? ABCDE FG * A What if A doesn’t own *? What if router A isn’t authorized to advertise *? What if router D alters the path? * D,F

Lecture 18 Page 18 CS 236 Online Two Sub-Problems Security of Origin (SOA) –Who is allowed to advertise a path to an IP prefix? Path Validation (PV) –Is the path someone gives to me indeed a correct path?

Lecture 18 Page 19 CS 236 Online How Do We Solve These Problems? SOA - Advertising routers must prove prefix ownership –And right to advertise paths to that prefix PV - Paths must be signed by routers on them –Must avoid cut-and-paste and replay attacks

Lecture 18 Page 20 CS 236 Online S-BGP One example solution A protocol designed to solve most of the routing security issues for BGP Intended to be workable with existing BGP protocol Key idea is to tie updates to those who are allowed to make them –And to those who build them

Lecture 18 Page 21 CS 236 Online Some S-BGP Constraints Can’t change BGP protocol –Or packet format Can’t have messages larger than max BGP size Must be deployable in reasonable way

Lecture 18 Page 22 CS 236 Online An S-BGP Example ABCDE FG * A How can B know that A should advertise *? A can provide a certificate proving ownership

Lecture 18 Page 23 CS 236 Online Securing BGP Updates ABCDE FG * A wants to tell everyone how to get to * What are these signatures actually attesting to? * A B,A * C,B,A * D,C,B,A

Lecture 18 Page 24 CS 236 Online Who Needs To Prove What? A needs to prove (to B-E) that he owns the prefix B needs to prove (to C-E) that A wants the prefix path to go through B C needs to prove (to D-E) the same D needs to prove (to E) the same

Lecture 18 Page 25 CS 236 Online So What Does A Sign? A clearly must provide proof he owns the prefix He also must prove he originated the update And only A can prove that he intended the path to go through B So he has to sign for all of that

Lecture 18 Page 26 CS 236 Online Address Attestations in S-BGP These are used to prove ownership of IP prefix spaces IP prefix owner provides attestation that a particular AS can originate its BGP updates That AS includes attestation in updates

Lecture 18 Page 27 CS 236 Online Route Attestations To prove that path for a prefix should go through an AS The previous AS on the path makes this attestation –E.g., B attests that C is the next AS hop

Lecture 18 Page 28 CS 236 Online How Are These Signatures Done? Via public key cryptography Certificates issued by proper authorities –ICANN at the top –Hierarchical below ICANN Certificates not carried with updates –Otherwise, messages would be too big –Off-line delivery method proposed

Lecture 18 Page 29 CS 236 Online S-BGP and IPSec S-BGP generates the attestations itself But it uses IPSec to deliver the BGP messages Doing so prevents injections of replayed messages Also helps with some TCP-based attacks –E.g., SYN floods

Lecture 18 Page 30 CS 236 Online S-BGP Status Not getting traction in networking community Probably not going to be the ultimate solution IETF working group is looking at various protocols with similar approaches

Lecture 18 Page 31 CS 236 Online Other BGP Security Approaches Filter BGP updates from your neighbors –Don’t accept advertisements for prefixes they don’t own –Requires authoritative knowledge of who owns prefixes Use Resource PKI to distribute certificates on who owns what prefixes Sanity check routes Continuous monitoring of routing system