Security and Routing Source routing and tunnels Routing security –Protocol –Content IGP routing BGP routing Nothing new here: –Going on for years on the.

Slides:



Advertisements
Similar presentations
Karlston D'Emanuele Distance Vector Routing Protocols Notes courtesy of Mr. Joe Cordina Password Removed
Advertisements

Security Issues In Mobile IP
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Inter-domain Routing security Problems Solutions.
Announcements List Lab is still under construction Next session we will have paper discussion, assign papers,
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Cryptography 101 Frank Hecker
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
– Chapter 4 – Secure Routing
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
IIT Indore © Neminath Hubballi
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Final Exam Review Knowledge questions True or false statement (explain why) Protocol Calculation Cover the second half contents.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Protection and Restoration Definitions A major application for MPLS.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Network Security – Special Topic on Skype Security.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
TCP Security Vulnerabilities Phil Cayton CSE
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
Inter-domain Routing Outline Border Gateway Protocol.
K. Salah1 Security Protocols in the Internet IPSec.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
BGP Validation Russ White Rule11.us.
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Presentation on ip spoofing BY
Introduction to Information Security
IT443 – Network Security Administration Instructor: Bo Sheng
Computer Communication & Networks
Network Security: IP Spoofing and Firewall
Protocol ap1.0: Alice says “I am Alice”
Outline Using cryptography in networks IPSec SSL and TLS.
Lecture 10: Network Security.
Outline Network characteristics that affect security
Outline The spoofing problem Approaches to handle spoofing
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Security and Routing Source routing and tunnels Routing security –Protocol –Content IGP routing BGP routing Nothing new here: –Going on for years on the telephone network

Security concepts Authentication –I am who I say I am Integrity –A message was not changed after it was sent No Replay –Do not let me do the same thing twice Confidentiality –Do not let other read my communication Non-repudiation –Do not let me say something different later

More concepts Secure hash function –A hash that can not be reversed Digital signatures –Protect documents –Authentication, non-repudiation, integrity –Digital certificates Encryption Symmetric cryptography –Both parties share a key Public key cryptography –Each party has a public key All can send to it Public key infrastructure (PKI) –Public key cryptography is useless if I get a fake public key for talking to my bank –Need certificates for them

Difficulties with security Cryptographic operations may have larger CPU costs Cryptographic information requires more storage Key distribution and management is difficult –Especially on a global scale Certificates need Trusted Authorities –Who are they? Can they be trusted?

Threat model I am an attacker outside the backbone network –Can not observe traffic inside the network – May be able to attack the routers Limited: usually providers filter at the edge I am inside the backbone network –Can observe traffic at one or multiple points Switched Ethernet connections etc Or tap into a point-to-point line, not too easy –Can attack all routers –Can not arbitrarily drop traffic Simply drop HELLOs to bring peerings down I have compromised one router already –The we are in trouble… Can drop packets Can attack the routing system directly

What is the attacker’s goal Bring the network down –Will be detected Disrupt the network but do not bring it down –Stealthy, may be undetected –Make it appear as if it is caused by external causes E.g. fake BGP information Bring some destinations down –Maybe hard to detect –Make it appear as it is externally caused – BGP Hijack the traffic –Send it through some monitoring point –Black hole it –Make it loop

There are a lot of holes ARP: –Attacker can send its own ARP reply message and disconnect a node from the lan –Then it can hijack its session easily –ARP replies are sometimes unsolicited Other systems will accept them even if there was not request sent No need to even wait for an ARP request ICMP –Has the very nasty “redirect” message –Can cause a system to use a different router Which of course could be the attacker –This can and is usually disabled these days IP source routing –I can add an arbitrary source route to any packet I can intercept –So I send it through the attacker’s premises for recording And of course DNS …

Spoofing Source IP, port can be spoofed –This allows me to try to insert a packet into a existing TCP connection Destination will admit the packet if it comes from the right source address/port –RPF check Do not accept a packet from an interface that is different for the one I would use to reach its source Not deployed everywhere Routes can be asymmetric sometimes Can spoof MPLS labels too –Can put a packet inside an existing LSP Do not accept labeled packets in certain interfaces Do not accept labels from interfaces that you did not advertise them

Perimeter security –Providers guard the perimeter of the networks –Install packet filters that block access to the IP interfaces of the backbone routers This prevents any kind of attack to backbone routers from outside the network But difficult to keep the filter rules up to date on incoming links –Do not accept MPLS labeled packets from outside links There may be cases that this is necessary Accept only labels that were advertised to the peer –RPF check to drop spoofed packets –Point-to-point peering connections with other providers Switched connections open the door to monitoring Especially if we have to receive MPLS packet over it

Attacks against routing Make a peering session fail –TCP based vs. packet based TCP is harder –May not be easy to detect Could appear as a temp link failure Insert false information into the peering session –Without having compromised the routers Harder to detect –Can result in traffic hijacking Attack the stability of the system –May have to achieve one of the above first –Cause flapping, resets of peering sessions, general routing overloading Or just attack the routers directly –Crack the passwords to get administrator access –DoS

Attacking routers Like attacking a PC –Port scanning –Password cracking –DoS ICMP is a good choice –Routers limit these very carefully Send too much traffic with IP options set DoS the links to cause peerings to reset TCP SYN floods, bad packets etc… Usually it is not possible to reach the interfaces of the routers directly from outside Of course I can attack the routers if I am already inside the network

Attacking TCP sessions Can bring it down very easily –Just insert a TCP RST in the stream –But I need to guess the sequence numbers correctly –“TCP session hijacking” Various levels –Must be able to physically insert packets in the link Switched Ethernet or similar –Just insert a packet here and there May be quite simple –“Man in the middle” Put my machine in the middle and monitor/change all traffic What will happen with ARP? Need to get the victim to reply to the malicious node –ARP poisoning

TCP session hijacking TCP establishes sequence numbers at the beginning of the session –3-way hand-sake –Other authentication (kerberos, passwords) happens at that time If I can sniff the traffic I can figure out the current sequence numbers If I can spoof the source information of the packet I can inject a packet into the stream –I have to do this before the legit part sends the packet with the same sequence number Plenty of tools for TCP hijacking Defences –Prevent spoofing –Prevent sniffing –Encrypt the exchanged information This will not protect from RSTs that will shutdown the connection

Attacking IP/UDP sessions Simpler than TCP –Send packets directly to the router no need to guess sequence numbers –I can also spoof the source address of the packet to avoid filtering at the victim router –May have to be one-hop away from the router It is always a good idea to rate limit all kinds of traffic –And not only ICMP and TCP SYNs E.g rate limit RSVP traffic –Rate limiting will have to happen at the interface If I receive the packets in the RSVP process I already burned a lot of resources, it is DoS Rate limiting at interfaces is a bit expensive to do at high speeds

Cryptography Packets carry cryptographic information that proves they are “ok” –It does not really solve the DoS problem A protocol will have to receive the packet and verify the crypto –Security processing is more expensive –Even worse potential for DoS now –Just send a lot of packets with bogus crypto Protocol will choke trying to verify the crypto

Protocol Security machinery Use Message Authentication Codes (MACs) –Two peers agree on a password –Sender computes a MAC of each packet it sends MAC is few bytes (64 usually) Using the common password MAC is sent along with the packet –Receiver re-computes the MAC If it does not match what is in the packet it drops it Else a match proves that sender knows the password As safe as the passwords/keys used –And there are a lot of problems with passwords –No existing standard key management system

What do MACs give us? Authentication –I know the sender knows a secret so he must be a good guy Integrity –The message has not been modified after it was sent Replay prevention: –To avoid include a sequence number in each packet OSPF has them, IS-IS does not! –An attacker can fake high sequence numbers No Confidentiality –I can see the TCP headers I can try session hijacking –I can see the contents of the message Do not cover all the packet –IP/TCP headers are not part of the MAC I can still spoof them

MD5 and HMAC A good MAC must be –Collision resistant: Very hard to find two messages that have the same hash –Pre-image attack resistant: Given a MAC very hard to find a message with this MAC –Second pre-image attack resistant: Given a message very hard to find another message with the same MAC RFC2385 proposes to use the MD5 hash as the MAC –MD5 has started to show problems –It is possible to compute collisions effectively, in about 1hr in some cases –Other hashes may have problems too RFC2104 proposes a Hashed MAC (HMAC) that is slowly starting to be used –The HMAC can be using MD5 internally but its security is better –MD5 is still used in BGP though There has been a lot of noise about the security of MD5 recently –There are other issues that are much more important

If MD5 is broken then… How dangerous is this for routing protocols that use it as MAC? –Attacker wants to inject fake packets First, he must have enough physical access and spoofing capability to send it –Need to find a modified message that has the same MAC as a good message This is a pre-image attack Not a collision attack, since I do not control both messages MD5 has problems with collisions not pre-image attacks –Even if I could do a pre-image attack most probably I could not control completely the contents of the fake packet I could change few bits here and there May not be sufficient to do real damage at the protocol level Just send a malformed IGP packet –If the receiving router is buggy it could cause a crash maybe …

The real hard problems are: How to manage passwords and keys –Errors, social engineering –stupid passwords and password policies How to make sure that routers tell the truth –All the possible security in the protocol exchanges and the links can not protect me from a compromised router –it is difficult for IGP –Imagine how bad it gets for BGP/inter-domain routing No central coordination Minimal trust on the 10,000s of ISPs that participate in the system

Intra- vs. Inter-domain Routing Security Very different –Intra-domain routers are under a single administrative control Same policies and best practices Trust in the components of the system Can enforce some security in the perimeter of the network –Inter-domain Forget all that…

How to verify IGP routing information –A bad router can trivialy bring its links down and in general disrupt the network Will be detected easily –But can it lie so that is hijacks traffic undetected? –Some lies can be caught A router lies about its links The router at the other end of the link will not lie –The inconsistency may be detected Unless more than one routers are lying

More checks Other lies can not be caught –A router lies that it has a stub network (without other router at the end) If this stub network does not exist elsewhere in the network this lie can not be caught Can hijack traffic this way - hijack a BGP route for example –Or a bad router claims to have high priority to become DR so it gets elected as DR –Need to know if a router can originate certain information Requires some centralized configuration management tool A bad router can send bad LSUs with spoofed router ids –Others can not trace the wrong information to the bad router –Need to provide origin authentication A bad router can modify LSUs that it sees during flooding –Need to ensure integrity of LSUs

Cryptography to help Use public key cryptography –Proposed since 1997 When a router R originates an LSU it signs it –Using its private key –Receivers can use R’s public key to ensure that it was indeed originated by R –This ensures origin authentication and integrity –To save time compute a hash of the LSU and sign the hash –Needs key infrastructure Or flood the public key of each router through OSPF itself But then public keys are not trusted Need a certification entity that signs these public key records

There are still holes Router can silently drop packets –No protection against that A router can advertise a non-existent stub network ABRs can advertise wrong information for other areas –Given that there will be usually more than one ABRs can compare the information between the two to see if all is ok ASBRs can advertise what they want –And there is not much that can be done In all cases, if we observe something funny at least can find reliably who originated the wrong information –Since all LSUs are signed

Is it deployed? No. The risk-reward balance is not right (yet) –Security solutions are heavy More CPU, decreased protocol performance, convergence and maybe stability –Threat does not seem to large Filtering at the edge and best practices seem to control the problem In intra-domain at least In inter-domain things are bad but it is hard to solve anything –Huge scale –Minimal coordination between participants

NEXT Bgp security stuff The SIDR IETF group (secure interdomain routing)