Availability Centric Routing (ACR) Robust Interdomain Routing Without BGP Security July 25 th, 2006.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

Secure Routing Panel FIND PI Meeting (June 27, 2007) Morley Mao, Jen Rexford, Xiaowei Yang.
A Threat Model for BGPSEC Steve Kent BBN Technologies.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Guide to Network Defense and Countermeasures Second Edition
How Secure are Secure Interdomain Routing Protocols? B 大氣四 鍾岳霖 B 財金三 婁瀚升 1.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
SPV: Secure Path Vector Routing for Securing BGP Leonel Ocsa Sáchez School of Computer Science.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Don’t Secure Routing, Secure Data Delivery Dan Wendlandt (CMU) With: Ioannis Avramopoulos (Princeton), David G. Andersen (CMU), and Jennifer Rexford (Princeton)
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
Verification in Routing Protocols Lakshminarayanan Subramanian Sahara Retreat, Jan 2004.
Advanced Computer Networks cs538, Fall UIUC
Stealth Probing: Efficient Data- Plane Security for IP Routing Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford.
Internet Protocol Security (IPSec)
Computer Networks Layering and Routing Dina Katabi
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Information-Centric Networks04a-1 Week 4 / Paper 1 Open issues in Interdomain Routing: a survey –Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
SECURING BGP Matthew Nickasch University of Wisconsin-Platteville Dept. of Computer Science & Software Engineering.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
BGP Man in the Middle Attack Jason Froehlich December 10, 2008.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Internet Security and Firewall Design Chapter 32.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Interdomain Routing Security Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Internet Routing Verification John “JI” Ioannidis AT&T Labs – Research Copyright © 2002 by John Ioannidis. All Rights Reserved.
Inter-domain Routing Outline Border Gateway Protocol.
Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Elliott Karpilovsky, Princeton University on behalf of Jennifer Rexford, Princeton.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
BGP security some slides borrowed from Jen Rexford (Princeton U)
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
COS 561: Advanced Computer Networks
Interdomain Routing Security
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Fixing the Internet: Think Locally, Impact Globally
Presentation transcript:

Availability Centric Routing (ACR) Robust Interdomain Routing Without BGP Security July 25 th, 2006

Current Routing Security Focus Current proposals like S-BGP, etc. use cryptography to provide control plane: 1) origin authentication 2) path validity

Too Much and Too Little? These proposals are: 1) Heavy-weight: requiring modifications to routers, continually updated address registries, increased BGP complexity. 2) Insufficient: providing no protection from malicious routers in the data-plane or links made unusable by congestion or bad route convergence.

A Different Approach Today end-hosts/edge routers often already provide end-to-end security using mechanisms such as SSL or IPSec. With end-to-end security, we claim that: The routing infrastructure only has to worry about providing availability, i.e. the ability to find and use a valid path if it exists.

High-level Approach 1) Clients learn multiple potential paths to a destination, instead of a single “best path”. 2) Clients use end-to-end security mechanisms and monitor path performance to detect good paths. 3) Clients can use adequate paths and change routes if necessary.

Taxonomy of Attacks Snooping & Traffic Modification Traffic Analysis Destination Impersonation Spam Sources (unused space hijack) Black-holing Traffic Traffic Degradation Let’s think about whether the routing system should handle them….

Attack: Data Confidentiality & Integrity Where: Data & Control Plane A secure control plane could make it harder for an attacker to get on path, but data-plane adversaries can access traffic. Verdict: Use end-to-end encryption & MACs, rather than rely on routing protocol.

Attack: Traffic Analysis Where: Data & Control Plane Again, secure control plane makes attack more difficult, but providing real guarantees at the network layer is extremely difficult or even impossible (data worm-hole attack). Verdict: Use mix-nets or other end-to-end mechanisms if needed, as Internet routing cannot provide an guarantees.

Attack: Destination Impersonation Where: Data & Control Plane Problems with data-plane attacker (local or router) or DNS compromise means that even with secure control plane identity is not certain. Difficulty in having ISPs create and update address registry. Verdict: End-to-End certificates or other authentication are still needed, and obviate requirement for identity in control plane (still useful as an optimization though).

Attack: Spam Sources (unused hijack) Where: Control Plane Spam is really caused by incentives and identity problems within higher-level systems (e.g. ), which would exist even with secure routing. The real “cost” of this vulnerability is minimal. Verdict: While authenticated address ownership may be desirable, it is not a requirement for reliable communication.

Attack: Black-holing Traffic Where: Data & Control Plane The ability to completely prevent communication, particularly when another valid path exists, is the key threat to a routing protocol. Verdict: Yes, this is central to routing.

Attack: Traffic Degradation / DoS Where: Data Plane, remote hosts Paths can be rendered unusable for an application even if they are not completely unavailable according to the control plane. Verdict: Yes, a routing protocol should allow destinations to avoid such links.

Defense Taxonomy: Control Plane Attack S-BGP*WhisperACR Snoop/Modify traffic -- Impersonate destination -- Black-hole traffic -- Traffic Analysis -- Traffic Degradation/DoS NA Spam (unused hijack) Note: Whisper only detects attacks, and only at a limited number of ASes.

Defense Taxonomy: Data Plane Attack S-BGP* + SSL ListenACR + SSL Snoop/Modify traffic Impersonate destination Black-hole traffic - Traffic Analysis Traffic Degradation/DoS Spam (unused hijack) NA

What should routing security achieve? It’s very hard to get guarantees about the identity of the path of data-flow. Furthermore, why would we care? If applications already use e2e security to handle these risks. As a result, they care about path quality, not path identity.

Availability Centric Routing Goals: 1)Communication in the face of control plane, data plane, and link-DoS attacks. 2)Incentivized deployment and low barriers to adoption. 3)No requirements for globally coordinated adoption.

What is done end-to-end? Assume: 1)Confidentiality, integrity and destination identity are handled end-to-end, e.g. SSL/IPSec. 2) Path quality monitoring, to decide when to change paths.

Packet “Deflections” ISPs offer users alternate paths (deflections) in addition to the normal path advertised via BGP. ABC E D F A,B,C,D,F is normal BGP path for A -> F. To avoid D, A could request that C deflects packets to E, yielding path A,B,C,E,F

Availability Providers Most path diversity comes from the densely connected tier-1 ISPs. To simplify, what if just these ASes acted as “availability providers” (APs) to offer deflections?

ACR Overview: 1) Source attempts to set-up a secure channel using default path. 2) If set-up fails, it can request alternate paths from its AP, “probing” until it finds a working path. 3) Sources monitor path performance, requesting alternate paths if the current path is inadequate.

Threats Against ACR with APs Deployment “gaps” between AP and source or destination create attack opportunities. Large number of invalid paths from AP makes probing time unrealistic. Path performance attacks

Attacks Exploiting Deployment “Gaps” If a provider ISP is duped, it is possible that a stub AS will not be reachable by any path seen by the AP. D A U M If U does not offer deflections, a malicious AS M could fool U by announce D’s prefix, making it completely unreachable by the availability provider A.

Handling Deployment Gaps Dests: Business preferences help destinations (only fellow customers can attack). Sources: Paths to a limited number of core APs are easy to manage. Local filtering can provide significant benefit. As can identifying “expected links” based on well-known core topology.

Attacking Probing Efficiency With BGP, each malicious AS can introduce one bad path to its neighbors. Total # of paths limited by an AS’s # of neighbors, (more likely peers + providers). Claim: It is non-trivial to introduce many attractive paths quickly, especially without getting noticed.

More Efficient Probing Base: Shortest AS-Path Anomaly Detection: Most paths are stable, keep with what has worked (e.g. PGBGP). Destination Hints: Let destination sign & distribute hints about its upstream connectivity. Forces attacker paths to be longer.

Monitoring for Path Performance Attacks Data serves as probes to avoid preferential treatments of probe packets. Tricky Attack: Malicious AS makes path appear valid, then black-holes or degrades performance.

Path Performance Monitoring Solutions: 1) Have traffic that is robust to “hiccups” (e.g. non-realtime) 2) Duplicate traffic over paths that are likely to be “trust disjoint” 3) Use smart probing techniques to help avoid bad control plane paths.

Deployability No requirement for address registries, cryptographic hardware, ICANN-based PKI, or new routing software. Deflections can be implemented using IP-in-IP encapsulation and MPLS over IP, which already exists in routers today. Deflections also improve performance.

Dirty Laundry CIDR and sub-prefix hijacks (Answer: Use /24’s, which approximates flat routing) Datagram communication (Answer: either run over long-term secure channel, or have data be the identifier, ala DNSSEC)

ACR Summary Secure interdomain routing proposals are heavy-weight, but still insufficient. If end-points set up secure channels, the routing infrastructure must only provide multiple paths to guarantee availability. This approach has highly attractive properties for incentivized deployment