IETF81 Secure IDR Rollup – TREX Workshop 2011 David Freedman, Claranet.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
RPKI Standards Activity Geoff Huston APNIC February 2010.
1 APNIC Resource Certification Service Project Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam George Michaelson.
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
RPKI Certificate Policy Status Update Stephen Kent.
RPKI and Routing Security ICANN 44 June Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.
Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Best Practices for ISPs
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
Resource Certification What it means for LIRs Alain P. AINA Special Project Manager.
1 Securing BGP Large scale trust to build an Internet again Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
The Resource Public Key Infrastructure Geoff Huston APNIC.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
RPKI Tutorial Andy Newton Chief Engineer, ARIN. Agenda Resource Public Key Infrastructure(RPKI) Route Origin Authorizations (ROAs) Certificate Authorities.
Lecture 4: BGP Presentations Lab information H/W update.
APNIC Internet Routing Registry An introduction to the IRR TWNIC Meeting, 3 December 2003 Nurani Nimpuno, APNIC.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
RIPE NCC IRR training 4 February 2011 Zurich, Switzerland IPv6 Golden Networks Jeroen Massar Things to watch.
BGP4 - Border Gateway Protocol. Autonomous Systems Routers under a single administrative control are grouped into autonomous systems Identified by a 16.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Secure Origin BGP: What is (and isn't) in a name? Dan Wendlandt Princeton Routing Security Reading Group.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
Prop-065-v001 Format for delegation and recording of 4-byte AS numbers APNIC26 - Christchurch NZ.
BGPSEC : A BGP Extension to Support AS-Path Validation Matt Lepinski BBN Technologies.
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
Manifests (and Destiny?) Stephen Kent BBN Technologies.
CSCI-1680 Network Layer: Inter-domain Routing Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, Rodrigo Fonseca John Jannotti.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Draft-ietf-sidr-bgpsec-reqs-01 diffs from -00 (Jul) sidr / IETF Taipei Randy Bush sidr bgpsec reqs 1.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Meet the Falcons Ciprian Marginean Aris Lambrianidis
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 draft-sidr-bgpsec-protocol-05 Open Issues. 2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor.
RPKI implementation experiences in the LAC Region Carlos M. Martínez – Arturo Servín LACSEC 2012 – LACNIC XVIII.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
BGP Validation Russ White Rule11.us.
AS Numbers - Again Geoff Huston APNIC October 2009
BGPSEC Protocol (From -01 to -02 and on to -03) Matt Lepinski.
Securing BGP: The current state of RPKI
Border Gateway Protocol
Goals of soBGP Verify the origin of advertisements
BGPSEC Potential Optimizations for AS-PATH Prepending and Transparent Route Servers. sidr wg / Québec City Doug Montgomery
APNIC Trial of Certification of IP Addresses and ASes
Some Thoughts on Integrity in Routing
Geoff Huston APNIC August 2009
APNIC Trial of Certification of IP Addresses and ASes
Consideration on IPv6 Address Management
Resource Certificate Profile
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Improving global routing security and resilience
FIRST How can MANRS actions prevent incidents .
Validating MANRS of a network
Presentation transcript:

IETF81 Secure IDR Rollup – TREX Workshop 2011 David Freedman, Claranet

Introduction to Secure IDR (SIDR) You are in a darkened room at the IETF. You are surrounded by vendors. A lone operator stands quietly in the corner…..

A reminder of concepts.. RPKI IANA are the numbering authority, coordinating allocation of numbering resources to Regional Internet Registries The current situation RIPE NCC are the Regional Internet Registry, providing numbering allocations and database services to Local Internet Registries. Local Internet Registries are usually network operators, they consume allocated resources and use the database to build customer (and sometimes peer) filters.

Simple filtering from the database Q. Which routes should I accept from my customer AS8272? A. Only /24 $ whois -r -Troute -i origin AS8272 % This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to ' /24AS8272' route: /24 descr: CONVERGENCE origin: AS8272 mnt-by: CONVERGENCE-MNT org: ORG-CNV1-RIPE source: RIPE # Filtered

I have it too easy…. My customer has no downstreams This means no macro evaluation I’m only filtering my customer Somebody I’m able to (somewhat) control the quality of the data held in the database before I build my filters (try doing this to peers, not much fun). I’m an LIR of the RIPE NCC I actually have a great database from which to build such filters, other service regions are not as stringent with regards to this and as such, independent databases (such as Merit’s RADB and ALTDB) exist to bridge this gap (but being decoupled from the RIR, they can suffer from authority problems) – Nobody else has this great IP ASN binding.

Why filter anyway? Route Hijacking, two modern examples cited: Pakistan Telecom v Youtube [2008] – Lack of filters by Upstreams (PCCW) allowed a leaked /24 for YouTube from Pakistan Telecom to propagate for over two hours, leading to a battle of Longest Prefix Match until the rogue announcement could be pulled. Kapela / Pilosov attack [2008] – Hijack a route and use a crafted AS_PATH to blind selective transit networks on the return to the hijacked path (creating a MITM vector). Need to verify the peer against the route and the AS_PATH somehow. This means having good, authoritative data. The system has to be easy to use and widely adopted The system has to scale. We should just trust each other, right?

Extended X.509 Certification Hierarchy RFC3779 extensions in Cert carry IP/ASN information. RFC5280 “Subject Information Access” extension defines publishing URI. CA certificates issued downstream from the IANA through RIR and LIR participants. Last CA in the chain issues an EE Certificate. EE Certificate used to produce a RoA (just a signed blob). draft-ietf-sidr-arch-13

And we validate this how? draft-ietf-sidr-rpki-rtr-16 explains: Periodically download entire copy of the RPKI with rsync (RFC5781) Offline validation into a trusted cache Router peers with cache using rpki-rtr protocol and receives trusted origin data. Sounds futuristic? Cisco IOS and IOS-XR have PoC code running now Compute load demonstrated to be ~10µsec per update * How much of this do I have to run myself? Options for RIR Hosted CA, RoA generator and publisher Perhaps your upstream can provide a cache if you are small? * Source:

What do we do with this? Local operator decision Prefer valid over unvalidated over invalid for instance * RP/0/1/CPU0:r0.dfw#show bgp /24 BGP routing table entry for /24 Versions: Process bRIB/RIB SendTblVer Speaker Last Modified: Oct 2 01:06: for 13:33:12 Paths: (6 available, best #3) Advertised to peers (in unique update groups): Path #1: Received by speaker from ( ) Origin IGP, metric 0, localpref 100, valid, external, \ origin validity state: valid Community: 2914: : : :380 Path #2: Received by speaker 0... * Example courtesy of : draft-ietf-sidr-origin-ops-10

BGPSec Without AS_PATH filtering everywhere, prefixes and their origin ASNs can be hijacked. RoA still valid as Origin ASN hasn’t changed. Need path validation in the BGP as well BGPSec being developed by SIDR, draft-ietf-sidr-bgpsec-overview-00 BGPSec introduces new type of certificate New “Router” certificate, public key published for an AS, private key held by routers within the AS, draft-ietf-sidr-bgpsec-overview-00. Routers use private keys to sign AS_PATH elements New attribute BGPSEC_Path_Signatures * ^A0.RtrCert Sig0 Exp Time Algo ID^A1.RtrCert Sig1 ASN 0ASN 1AS_Seq * Example courtesy of :

But what about? AS_PATH prepending? Suggested to add pCNT counter of prepends, decouple policy from path * Transparent Route Servers (i.e MLP)? This makes people uneasy as it proposes a bypass mechanism Current thinking to use pCNT=0 as “Special Case” for xref with AS_PATH, meaning “ignore this AS in AS_PATH when bestpathing”, non-BGPSec speakers simply strip the pCNT=0 AS from the AS_PATH completely. AS1 Path Signature Hash(…) Signed by Router Key AS1.rtr-yy  Sig1 AS0 (origin) Path Signature Hash(…) Signed by Router Key AS0.rtr-xx  Sig0 AS1 AS2 Algo ID NLRIAS0AS1Sig0 Sig1 Exp Time pCNT * Example courtesy of : Some as-yet undrafted ideas

And what about replay attacks? Replay attacks are of concern Provider annoyed at customer who switches Prefix “Stuck in Router” being replayed over and over again. All at Human timescales. Freshness is critical We could do smaller signing lifetimes Origin could re-announce before this expires (i.e Beaconing) Suggested to be days, but can be hours for critical infrastructure) Timing is of course jittered. Beaconing is required to prevent replay attacks But only origin beaconing is tolerable to internet infrastructure Multi-Beaconing neither useful, nor affordable. draft-ietf-sidr-bgpsec-ops-00

More SIDR discussed topics draft-ietf-sidr-algorithm-agility-03 How we transition to newer and more secure algorithms without disruption. We already have normal Key Rollovers (i.e old key expires or needs to be revoked) This draft specifies a rollover for reason of a new algorithm. Five Phases (0-4) with six steps: – Phase 0: Old algorithm only used. – Phase 1: Parent CAs can issue using new algorithm. – Phase 2: RPs MAY be able to validate new algorithm. – Phase 3: RPs MUST be able to validate new and old algorithms. – Phase 4: RPs MAY be able to validate using old algorithm. – Phase 0: Return to Phase 0, only now old algorithm is invalid.

More SIDR discussed topics draft-ietf-sidr-publication-01 An XMLoHTTP based publication protocol, designed for children publishing back to parents (think outsourced SIA model). draft-ietf-sidr-usecases-02 A brilliant reference document showing various RPKI use cases and their outcomes. I would recommend a read of this, here is an except of the index: 3. Origination Use Cases Single Announcement Aggregate with a More Specific Aggregate with a More Specific from a Different ASN Sub-allocation to a Multi-homed Customer Restriction of a New Allocation Restriction of New ASN Restriction of a Part of an Allocation Restriction of Prefix Length Restriction of Sub-allocation Prefix Length Aggregation and Origination by an Upstream

And finally some fun draft-ietf-sidr-ghostbusters-09 With all these certificates floating around, when there’s a problem, who you gonna call? This stuff may not be engineered by neteng/netops folk, perhaps systems/security people, not traditionally ops contacts from external networks! We sign RoAs with our EE certificates, why limit this to just routing data? Use the EE to sign a vCard, for somebody to contact regarding a RoA or certification chain. Not meant to replace WHOIS BEGIN:vCard VERSION:4.0 FN:Human's Name N:Name;Human's;Ms.;Dr.;OCD;ADD ORG:Organizational Entity ADR;TYPE=WORK:;;42 Twisty Passage;Deep Cavern; WA; 98666;U.S.A. TEL;TYPE=VOICE,MSG,WORK: TEL;TYPE=FAX,WORK: END:vCard

Any questions?