Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
How Secure are Secure Interdomain Routing Protocols? B 大氣四 鍾岳霖 B 財金三 婁瀚升 1.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
What’s Next: DNSSEC & RPKI Mark Kosters. Why are DNSSEC and RPKI Important Two critical resources – DNS – Routing Hard to tell when it is compromised.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Lightwave Communications Research Laboratory Princeton University SoBGP vs SBGP Sharon Goldberg Princeton Routing Security Seminar June 27, 2006 and July.
Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael.
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Computer Networks Layering and Routing Dina Katabi
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Working Group 6: Secure BGP Deployment December 16, 2011 Andy Ogielski, Renesys Jennifer Rexford, Princeton U. WG 6 Co-Chairs.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
An overview of IP addressing history and policy issues Leo Vegoda Number Resources Manager, IANA.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Aditya Akella The Performance Benefits of Multihoming Aditya Akella CMU With Bruce Maggs, Srini Seshan, Anees Shaikh and Ramesh Sitaraman.
An Overview of Peering; Benefits of Peering Andrew Ogilvie Managing Director, Xtraordinary Networks Ltd
TDTS21: Advanced Networking Lecture 7: Internet topology Based on slides from P. Gill and D. Choffnes Revised 2015 by N. Carlsson.
Finding Vulnerable Network Gadgets in the Internet Topology Author: Nir Amar Supervisor: Dr. Gabi Nakibly Author: Nir Amar Supervisor: Dr. Gabi Nakibly.
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Detecting Attacks on Internet Infrastructure and Monitoring of Service Restoration in Real Time Andy Ogielski FCC Workshop on Cyber Security 30 September.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
CSE534- Fundamentals of Computer Networking Lecture 12-13: Internet Connectivity + IXPs (The Underbelly of the Internet) Based on slides by D. Choffnes.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Measuring and Mitigating AS-level Adversaries Against Tor
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
BGP Validation Russ White Rule11.us.
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
One Hop for RPKI, One Giant Leap for BGP Security Yossi Gilad (Hebrew University) Joint work with Avichai Cohen (Hebrew University), Amir Herzberg (Bar.
Doing Don’ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre.
Are We There Yet? On RPKI Deployment and Security
Are We There Yet? On RPKI Deployment and Security
CS590B/690B Detecting Network Interference
Beyond Technical Solutions
COS 561: Advanced Computer Networks
Are We There Yet? On RPKI Deployment and Security
COS 561: Advanced Computer Networks
Does Scale, Size, and Locality Matter
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Why don’t we have a Secure and Trusted Inter-Domain Routing System?
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Improving global routing security and resilience
Amreesh Phokeer Research Manager AfPIF-10, Mauritius
Presentation transcript:

Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael Schapira Princeton University SIGCOMM 2011 Toronto, ON Aug. 16, 2011

Incentives for BGP Security Insecurity of Internet routing is well known: S-BGP S-BGP proposed in 1997 to address many issues Challenges are being surmounted: – Political: Rollout of RPKI as a cryptographic root trust – Technical: Lots of activity in the IETF SIDR working group The pessimistic view: This is economically infeasible! S*BGP Why should ISPs bother deploying S*BGP? No security benefits until many other ASes deploy! Worse yet, they can’t make money from it! Our view: Calm down. Things aren’t so bad. ISPs can use S*BGP to make money …by attracting traffic to their network.

Outline Part 1: Background Part 2: Our strategy Part 3: Evaluating our strategy – Model – Simulations Part 4: Summary and recommendations

ChinaTel path is shorter ? China Telecom China Telecom Traffic Attraction & Interception Attacks ISP 1 Verizon Wireless Verizon Wireless Level 3 ChinaTel /24 Level3, VZW, / This prefix and 50K others were announced by China Telecom Traffic for some prefixes was possibly intercepted April 2010 : China Telecom intercepts traffic /24 VZW, / /24

Securing the Internet: RPKI Resource Public Key Infrastructure (RPKI): Certified mapping from ASes to public keys and IP prefixes. China Telecom China Telecom ISP 1 Verizon Wireless Verizon Wireless Level 3 ChinaTel /24 ? Level3, VZW, / X RPKI: Invalid! RPKI shows China Telecom is not a valid origin for this prefix.

But RPKI alone is not enough! Resource Public Key Infrastructure (RPKI): Certified mapping from ASes to public keys and IP prefixes. China Telecom China Telecom ISP 1 Verizon Wireless Verizon Wireless Level 3 ChinaTel, /24 ? Level3, VZW, / Malicious router can pretend to connect to the valid origin.

To stop this attack, we need S*BGP (e.g. S-BGP/soBGP) (1) China Telecom China Telecom ISP 1 Verizon Wireless Verizon Wireless Level VZW: (22394, Prefix) Level3: (VZW, 22394, Prefix) VZW: (22394, Prefix) Public Key Signature: Anyone with 22394’s public key can validate that the message was sent by S-BGP [1997]: RPKI + Cannot announce a path that was not announced to you. VZW: (22394, Prefix) Level3: (VZW, 22394, Prefix) ISP 1: (Level3, VZW, 22394, Prefix)

To stop this attack, we need S*BGP (e.g. S-BGP/soBGP) (2) China Telecom China Telecom ISP 1 Verizon Wireless Verizon Wireless Level VZW: (22394, Prefix) Level3: (VZW, 22394, Prefix) ISP 1: (Level3, VZW, 22394, Prefix) Malicious router can’t announce a direct path to 22394, since never said ChinaTel: (22394, Prefix) S-BGP [1997]: RPKI + Cannot announce a path that was not announced to you.

Overview S*BGP will necessarily go through a transition phase How should deployment occur? Our Goal: Come up with a strategy for S*BGP (S-BGP/soBGP) deployment. How governments & standards groups invest resources … to create market pressure for S*BGP deployment We evaluate guidelines via a model & simulations Model: ISPs care only about revenue, not security! And run simulations on [UCLA Cyclops+IXP] AS graph data Parallelize simulations on a 200-node DryadLINQ cluster

Outline Part 1: Background Part 2: Our strategy Part 3: Evaluating our strategy – Model – Simulations Part 4: Summary and recommendations

How to deploy S*BGP globally? Pessimistic view: economic No local economic incentives; only security incentives Like IPv6, but worse, because entire path must be secure Our view: it affects route selection S*BGP has an advantage: it affects route selection Route selection controls traffic flows And an ISP that attracts more customer traffic earns more revenue Why should I upgrade if (security) benefits don’t kick in unless everyone else does?

A stub is an AS with no customers. Stubs shouldn’t transit traffic. They only originate their own prefixes Sprint ISP Stubs vs ISPs Stubs vs ISPs: Stubs are 85% of the Internet’s ASes!$ $ Stub 85% of ASes are stubs! We call the rest (15%) ISPs. Loses $$! X

ISP Stub 8359 Sprint How can we create market pressure? / / , / , / / / , / , /24 ISPs can use S*BGP to attract customer traffic & thus money$ $ Assume that secure ASes break ties on secure paths! AS 8359 attracts customer traffic

How can we create market pressure? Assume that secure ASes break ties on secure paths! AS 8359 loses traffic, feels pressure to deploy Sprint / / , / , / $ $ 13789: (18608, /24) Sprint: (13789, 18608, /24)

Our Strategy: 3 Guidelines for Deploying S*BGP (1) 1.Secure ASes should break ties in favor of secure paths 2.ISPs “help” their stub customers deploy simplex S*BGP. ISP1 Boston U Bank of A A stub is an AS that does not transit traffic. 85% of ASes are stubs! Boston U Bank of A

A stub never transits traffic Only announces its own prefixes.. …and receives paths from provider Sign but don’t verify! (rely on provider to validate) 2 options for deploying S*BGP in stubs: 1.Have providers sign for stub customers. (Stubs do nothing) 2.Stubs run simplex S*BGP. (Stub only signs, provider validates) 1.No hardware upgrade required Sign for ~1 prefix, not ~300K prefixes Use ~1 private key, not ~36K public keys 2.Security impact is minor (we evaluated this): Stub vulnerable to attacks by its direct provider. Simplex S*BGP: `Cheap’ S*BGP for Stubs Stub / /24

Our Strategy: 3 Guidelines for Deploying S*BGP (2) 1.Secure ASes should break ties in favor of secure paths 2.ISPs “help” their stub customers deploy simplex S*BGP. (possibly with some government subsidies) 3. Initially, a few early adopters deploy S*BGP (gov’t incentives, regulations, altruism, etc). ISP1 Boston U Bank of A

Outline Part 1: Background Part 2: Our strategy Part 3: Evaluating our strategy – Model – Simulations Part 4: Summary and recommendations

A model of the S*BGP deployment process To start the process: – Early adopter ASes have deployed S*BGP – Their stub customers deploy simplex S*BGP Each round: – Compute utility for every insecure ISP – If its ’ ‘s utility can increase by more than θ% when it deploys S*BGP, – Then SP n decides to secure itself & all its stub customers Stop when no new ISPs decide to become secure. ISP n

How do we compute utility? Number of source ASes routing through ISP n to all customer destinations. ISP n $ $ $ BGP Routing Policy Model: 1.Prefer customer paths over peer paths over provider paths 2.Prefer shorter paths 3.If secure, prefer secure paths. 4.Arbitrary tiebreak To determine routing, we run simulations on the [UCLA Cyclops] AS graph with these routing policies: Important Note: ISP utility does not depend on security. traffic

Outline Part 1: Background Part 2: Our strategy Part 3: Evaluating our strategy – Model – Simulations Part 4: Summary and recommendations

Case Study of S*BGP deployment Ten early adopters: Five Tier 1s: – Sprint (AS 1239) – Verizon (AS 701) – AT&T (AS 7018) – Level 3 (AS 3356) – Cogent (AS 174) The five content providers source 10% of Internet traffic Stubs break ties in favor of secure paths Threshold θ = 5%. Five Popular Content Providers –Google (AS 15169) –Microsoft (AS 8075) –Facebook (AS 32934) –Akamai (AS 22822) –Limelight (AS 20940) This leads to 85% of ASes deploying S*BGP (65% of ISPs) This leads to 85% of ASes deploying S*BGP (65% of ISPs)

Round 0 Simulation Simulation: Market pressure drives deployment (1) Sprint Round 1 Round 4 Stub

Round 4 Sprint Round 5 Simulation Simulation: Market pressure drives deployment (2) Stub

Simulation Simulation: Market pressure drives deployment (3) Sprint Round Round 7 Stub

So who should be the early adopters? Theorem: Finding the optimal set of early adopters is NP-hard. Approximating this within a constant factor is also NP-hard.

So who should be the early adopters? Small target set suffices for small threshold Higher threshold requires a larger target set. Higher threshold requires a larger target set. Easy to deployHard to deploy

Outline Part 1: Background Part 2: Our strategy Part 3: Evaluating our strategy – Model – Simulations Part 4: Summary and recommendations

Summary and Recommendations How to create a market for S*BGP deployment? 1.Many secure destinations via simplex S*BGP. 2.Market pressure via S*BGP influence on route selection. Where should government incentives and regulation go? 1.Focus on early adopters; Tier 1s, maybe content providers 2.Subsidize ISPs to upgrade stubs to simplex S*BGP Other challenges and future work : ISPs can have incentives to turn off S*BGP BGP and S*BGP will coexist in the long run ISPs need tools to predict S*BGP impact on traffic

Contact: Thanks to Microsoft Research SVC and New England for supporting us with DryadLINQ.

Data Sources for ChinaTel Incident of April 2010 Example topology derived from Routeviews messages observed at the LINX Routeviews monitor on April – BGP announcements & topology was simplified to remove prepending – We anonymized the large ISP in the Figure. – Actual announcements at the large ISP were: – From faulty ChinaTel router: “ for /24” – From Level 3: “ for /24” Traffic interception was observed by Renesys blog – – We don’t have data on the exact prefixes for which this happened. AS relationships: inferred by UCLA Cyclops