A Study in TCP/BGP Session Security

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
REVEALING MIDDLEBOXES INTERFERENCE WITH TRACEBOX Gregory Detal*, Benjamin Hesmans*, Olivier Bonaventure*, Yves Vanaubel° and Benoit Donnet°. *Université.
IPv4 - The Internet Protocol Version 4
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
Configuring a Router with RIP Basic Configuration and Show Commands.
Network Attacks Mark Shtern.
Firewalls and Intrusion Detection Systems
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
IP Basics. Physical Link Network IP ARP ICMP RoutingTables.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Stream Control Transmission Protocol 網路前瞻技術實驗室 陳旻槿.
Chapter 3 Review of Protocols And Packet Formats
1 Internet Control Message Protocol (ICMP) RIZWAN REHMAN CCS, DU.
Gursharan Singh Tatla Transport Layer 16-May
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
FIREWALL Mạng máy tính nâng cao-V1.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
TCP/IP Illustracted Vol1. 제목 : IP Routing ( 수 ) 한 민 규
Othman Othman M.M., Koji Okamura Kyushu University 1.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Transmission Control Protocol TCP. Transport layer function.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Transport Layer: UDP, TCP
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
BGP Man in the Middle Attack Jason Froehlich December 10, 2008.
Chapter 19 Network Layer Protocols Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
ICMP
Network Address Translation Current problems with IP addresses:  Address depletion  Scaling in routing Solutions:  IPv6  CIDR  NAT.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
ICMPv6 Error Message Types Informational Message Types.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
Internet Protocol Version 4 VersionHeader Length Type of Service Total Length IdentificationFragment Offset Time to LiveProtocolHeader Checksum Source.
Covert Channels in IPv6 Norka B. Lucena, Grzegorz Lewandowski, and Steve J. Chapin Syracuse University PET 2005, Cavtat, Croatia May 31 st, 2005.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
UDP : User Datagram Protocol 백 일 우
Mike Switlick. Overview What is a covert channel? Storage / Timing Requirements Bunratty attack Covert_tcp Questions.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
BGP security some slides borrowed from Jen Rexford (Princeton U)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Multiplexing.
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Chapter 19 Network Layer Protocols
Internet Control Message Protocol (ICMP)
Error and Control Messages in the Internet Protocol
Long-haul Transport Protocols
Process-to-Process Delivery
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
COS 561: Advanced Computer Networks
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
IP Spoofing Sometimes on the internet, a girl named Alice is really a man named Yves.
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Transport Layer 9/22/2019.
Presentation transcript:

A Study in TCP/BGP Session Security By Ilias Pallikarakis

Motivation Inadequate security in BGP Defcon 16 Presentation by Pilosov and Kapela Is it possible to replicate the attacks using a MitM approach ?

BGP Security Mechanisms currently used : TCP-MD5 Generalized TTL Security Mechanism (GTSM) Mechanisms to be implemented : TCP-AO RPKI

Defcon 16 Presentation Overview They successfully advertised fake prefixes. Made the attack hard to detect by making the router advertising the fake prefixes ‘undetectable’ by the traceroute tool.

Main Goals Set a MitM attack between two routers and attempt to hijack the BGP session Implement a script similar to the one of Defcon 16 to hide part of the network

Tools Used Ettercap : Scapy : MitM (ARP Poison) Network Hiding BGP Session Hijacking

Tools Used Ettercap : Scapy : Easy to use Good for simple script but not for complex NO user intercation Scapy : Python library Automatically calculates length/checksum fields Much slower

Testing Network

General Methodology Hide Network : BGP Session Hijacking: Exploit Traceroute’s function Increase TTL to hide network from traceroute BGP Session Hijacking: Intercept the BGP update messages Find a specific prefix and alter it

BGP Hijacking Issues Manipulate IP/TCP checksums Manipulate variable length field : IP Length BGP Header Length BGP Update Length fields TCP session manipulation

TCP Session Manipulation What if the altered BGP Prefix has different length than the original ? Need to adjust Sequence/Acknowledgement numbers : Keep the offset and Add/Remove it (Best) Copy previous sequence to next Acknowledgement and vice versa (Easiest)

Sequence Adjusting Mechanism Next Acknowledgement number is always the previous Sequence + original message’s length For Sequence number there are 2 cases : The previous message was sent by the receiver (previous ack) Previous message sent by the sender (previous forged seq)

Example

Ettercap TTL Script In one word Simple… : if (ip.dst == '1.1.1.1'){ ip.ttl += 3; msg("Increase TTL\n"); }

Ettercap Script BGP Not possible : Human processing in Binary. Cannot manipulate variable length fields. Can replace only 2-byte length strings.

Scapy Methodology Scripts are composed by : Main : Create the nfqueue and calls Process Process : mainly filters packets and calls altering function Altering Function : Varied content, does the packet altering

Scapy BGP issues Originally Scapy could not understand multiple BGP update messages in the same TCP packet Would read only first update. Incorrect length calculation. Unexpected session establishment : While a TCP/BGP session was working one of the routers attempted to setup a new one.

BGP Issue Solutions BGP Multiple Update Messages : Use the Header Marker to find how many messages appear. Modified original Scapy code for BGP Unexpected Sessions : Drop all packets where one port is 179 and the other one is NOT the working session.

Cisco Issue : Description Strange packets observed of the form : Circumstances of appearance : Change prefix length with Incorrect Seq/Ack Change prefix to lower length with working Script (occasionally)

Cisco Issue : Thoughts Definitely related with seq/ack numbers. Test showed that when ack is larger issue always appears. Why it appears in correct script ??

Cisco Issue : Thoughts Test correct script for potential mistake Thoroughly check the TCP flags before the strange packets. Check strange traffic message by message in contrast to the same traffic sent by router.

Conclusion Working script (implemented in two different ways !) to increase TTL. Successful traceroute veil. Renders GTSM obsolete. Working TCP Adjusting Mechanism Could be used in all TCP communication

Conclusion Successfully replaced a prefix with one of our choice with Scapy Contributed in Scapy BGP allowing multiple Updates to be sent/received Discovery of Cisco issue

Tests Live Demonstration !

Thank You ! A number of health use-cases that overlap with safety