Auto-Detecting Hijacked Prefixes?

Slides:



Advertisements
Similar presentations
RPKI Standards Activity Geoff Huston APNIC February 2010.
Advertisements

An Operational Perspective on Routing Security Geoff Huston Chief Scientist, APNIC.
Update on Resource Certification Geoff Huston, APNIC Mark Kosters, ARIN SSAC Meeting, March 2008.
An Operational Perspective on BGP Security Geoff Huston February 2005.
Experimental Internet Resource Allocations Philip Smith, Geoff Huston September 2002.
The Role of a Registry Certificate Authority Some Steps towards Improving the Resiliency of the Internet Routing System: The Role of a Registry Certificate.
RPKI and Routing Security ICANN 44 June Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.
ROAs and Detecting “Bad” Originations Geoff Huston SIDR WG IETF 74.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Securing BGP Geoff Huston November Agenda An Introduction to BGP BGP Security Questions Current Work Research Questions.
BGP update profiles and the implications for secure BGP update validation processing Geoff Huston Swinburne University of Technology PAM April 2007.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC.
Inter-domain Routing security Problems Solutions.
An Operational Perspective on Routing Security Geoff Huston Chief Scientist, APNIC November 2006.
Border Gateway Protocol(BGP) L.Subramanian 23 rd October, 2001.
Allocations vs Announcements A comparison of RIR IPv4 Allocation Records with Global Routing Announcements Geoff Huston May 2004 (Activity supported by.
Progress Report on APNIC Trial of Certification of IP Addresses and ASes APNIC 22 September 2006 Geoff Huston.
The Resource Public Key Infrastructure Geoff Huston APNIC.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
CAIA Seminar – 18 August 2007 – Taming BGP An incremental approach to improving the dynamic properties of BGP Geoff Huston.
Inter-Domain Routing Trends Geoff Huston APNIC March 2007.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Securing the Internet Backbone: Current activities in the IETF’s Secure InterDomain Routing Working Group Geoff Huston Chief Scientist, APNIC.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Inter-domain Routing Outline Border Gateway Protocol.
AS Numbers - Again Geoff Huston APNIC October 2009
Securing BGP: The current state of RPKI
Auto-Detecting Hijacked Prefixes?
More Specific Announcements in BGP
Goals of soBGP Verify the origin of advertisements
BGP Best Current Practices
An Operational Perspective on Routing Security
Are We There Yet? On RPKI Deployment and Security
APNIC Trial of Certification of IP Addresses and ASes
COS 561: Advanced Computer Networks
BGP update profiles and the implications for secure BGP update validation processing Geoff Huston PAM April 2007.
Some Thoughts on Integrity in Routing
Jessica Yu ANS Communication Inc. Feb. 9th, 1998
More Specific Announcements in BGP
Geoff Huston APNIC August 2009
Geoff Huston APNIC 7th caida/wide measurement workshop Nov
APNIC Trial of Certification of IP Addresses and ASes
Geoff Huston September 2002
BGP Multiple Origin AS (MOAS) Conflict Analysis
RIPE October 2005 Geoff Huston APNIC
Why don’t we have a Secure and Trusted Inter-Domain Routing System?
IPv4 Address Lifetime Expectancy
IPv4 Address Lifetime Expectancy Revisited
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
2005 – A BGP Year in Review February 2006 Geoff Huston
APNIC’s Engagement on Security
Experimental Internet Resource Allocations
Design Expectations vs. Deployment Reality in Protocol Development
Geoff Huston APNIC 7th caida/wide measurement workshop Nov
Presentation transcript:

Auto-Detecting Hijacked Prefixes? Geoff Huston APNIC @APNIC 20 September 2005

Address Hijacking Is the unauthorized use of an address prefix as an advertised route object on the Internet It’s not a bogon the address block has been assigned by an RIR for use It may include identity fraud this may involve misrepresentation of identity in order to undertake a database change It’s commonly associated with identity cloaking Spam generation, attack launching platforms, etc How prevalent is this? Very hard to isolate hijacking incidents

What is a hijack signature? What address blocks would not be noticed if they were used for a short period? Has been unadvertised for a ‘long time’ Is used only for a ‘short time’ Uses an entirely different origin AS and first hop AS Is not covered by an aggregate announcement Reannouncement interval idle interval

Data Collections Aggregated BGP route collection data Can provide information for any prefix: When was this prefix advertised and withdrawn? What was the announcing AS? What was the first hop AS? What other prefixes were also advertised at the same time?

Noise reduction in BGP data BGP update logs are possibly unhelpful here The high frequency noise of BGP convergence is different from the longer frequency signal of prefix use through network connectivity and prefix advertisement Use successive static BGP snapshots Highest frequency component of 2 hours reduces protocol-induced noise levels in the data

Initial results Readvertisement of prefixes with different Origin AS and First Hop AS

2nd Pass Very short window announce > 2 months down, < 3 days up, > 1 month down

3rd Pass Short window > 2 months down, 5 - 14 days up, > 1 month down

Some comments Address announcement patterns do not appear to be a reliable hijack indicator in isolation. There is no clear signature in the patterns of prefix appearance that forms a reliable indicator of misuse. Address use profiles can assist in the process of identifying address hijacking for suspect prefixes. Additional information is necessary to reliably identify candidate hijack prefixes. Careful checking of the provenance of an address before accepting it into the routing system make good sense But thorough checks of a prefix’s history of use as a precondition to accepting it into the local routing session as a valid advertisement consume time and increase an ISPs’ operating overhead costs

It’s not a very reassuring answer.

Address and Routing Security The basic routing payload security questions that need to be answered are: Is this a valid address prefix? Who injected this address prefix into the network? Did they have the necessary credentials to inject this address prefix? Is the forwarding path to reach this address prefix an acceptable representation of the network’s forwarding state?

Address and Routing Security What we have today is a relatively insecure system that is vulnerable to various forms of deliberate disruption and subversion Address hijacking is just one aspect of the insecurity of the Internet’s routing system

What I really would like to see… The use of a public key infrastructure to support attestations that allow automated validation of: the authenticity of the address object being advertised authenticity of the origin AS the explicit authority given from the address to AS that permits a routing announcement

What would also be good… If the attestation referred to the address allocation path use of an RIR issued certificate to validate the attestation signature chain If the attestation was associated with the route advertisement Such attestations to be carried in BGP as an Update attribute If validation these attestations was treated as a route object preference indicator Attestation validation to be a part of the BGP route acceptance process

But… We are nowhere near where we need to be: We need more than “good router housekeeping” – it’s trusting the protocol payload as well as trusting the protocol’s operation and the routing engines We need so much more than piecemeal distributed 2nd hand bogon and martian lists, filters and heuristics about use patterns for guessing at ‘bad’ addresses and ‘bad’ routes We need to adopt some basic security functions into the Internet’s routing domain: Injection of reliable trustable data Address and AS certificate PKI as the base of validation of network data Explicit verifiable mechanisms for integrity of data distribution Adoption of some form of certification mechanism to support validation of distributed address and routing information

Oh yes, and about address hijacking… This type of resource security framework would make address hijacking much harder to perform!

Questions? Thank You!