A Threat Model for BGPSEC

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC Steve Kent BBN Technologies.
Advertisements

RPKI Standards Activity Geoff Huston APNIC February 2010.
Security Issues In Mobile IP
Multihoming and Multi-path Routing
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
RPKI Certificate Policy Status Update Stephen Kent.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
BGP Security APNIC Open Policy Meeting Routing SIG 23 February 2005 Kyoto, Japan Russ Housley
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
SPV: Secure Path Vector Routing for Securing BGP Leonel Ocsa Sáchez School of Computer Science.
Lecture 1: Overview modified from slides of Lawrie Brown.
Securing the Border Gateway Protocol Using S-BGP Dr. Stephen Kent Chief Scientist - Information Security APNIC Open Policy Meeting Routing.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Inter-domain Routing security Problems Solutions.
Efficient and Secure Source Authentication with Packet Passports Xin Liu (UC Irvine) Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas.
Introduction (Pendahuluan)  Information Security.
A Study in TCP/BGP Session Security
The Resource Public Key Infrastructure Geoff Huston APNIC.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
IETF81 Secure IDR Rollup – TREX Workshop 2011 David Freedman, Claranet.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Routing Security and the Border Gateway Protocol Dr. Stephen Kent Chief Scientist - Information Security.
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.
BGP Man in the Middle Attack Jason Froehlich December 10, 2008.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Efficient Secure BGP AS Path using FS-BGP Xia Yin, Yang Xiang, Zhiliang Wang, Jianping Wu Tsinghua University, Beijing 81th Quebec.
BGPSEC : A BGP Extension to Support AS-Path Validation Matt Lepinski BBN Technologies.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Overview of draft-ietf-sidr-roa-00.txt Steve Kent BBN Technologies.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 draft-sidr-bgpsec-protocol-05 Open Issues. 2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor.
RPKI implementation experiences in the LAC Region Carlos M. Martínez – Arturo Servín LACSEC 2012 – LACNIC XVIII.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
BGP security some slides borrowed from Jen Rexford (Princeton U)
BGP Validation Russ White Rule11.us.
Are We There Yet? On RPKI Deployment and Security
Are We There Yet? On RPKI Deployment and Security
Securing BGP: The current state of RPKI
BGPSEC Potential Optimizations for AS-PATH Prepending and Transparent Route Servers. sidr wg / Québec City Doug Montgomery
Are We There Yet? On RPKI Deployment and Security
COS 561: Advanced Computer Networks
APNIC Trial of Certification of IP Addresses and ASes
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Presentation transcript:

A Threat Model for BGPSEC Steve Kent BBN Technologies

Presentation Outline Background Terminology Threat characterization Attack characterization Active wiretapping of links between BGP speakers Attacks on a BGP router Attacks on ISP management computers Attacks on repositories Attacks on an RPKI CA Residual vulnerabilities

Terminology (1/2) Adversary Vulnerability Attack An adversary is an entity (e.g., a person or an organization) perceived as malicious, relative to a security policy of a system. Vulnerability A vulnerability is a flaw or weakness in a system’s design, implementation, or operation and management, that could be exploited to violate the security policy of a system. Attack An attack is an action that attempts to violate the security policy of a system, e.g., by exploiting a vulnerability.

Background The SIDR WG has almost finished work on a set of standards to erroneous origin AS announcements The next step in improving routing security in the public Internet is to counter malicious attacks on BGP UPDATEs The term BGPSEC refers to the mechanisms used to achieve this greater degree of security BGPSEC builds on the RPKI developed in SIDR, and calls for each AS to digitally sign the AS path info that it propagates, and to verify the path info it receives

Terminology (2/2) Countermeasure Threat A countermeasure is a procedure or technique that thwarts an attack, preventing it from being successful. Often countermeasures are specific to attacks or classes of attacks. Threat A threat is a motivated, capable adversary. An adversary who is not motivated, or who is not capable of effecting an attack, is not a threat.

Adversary Capabilities BGP speakers Manipulation of BGP Hackers Compromise of network management systems & routers Criminals Extortion of an ISP or telecom provider Registries Manipulation of the RPKI segments that they control Nations Influence over ISPs, telecom providers and local registries, MITM attacks,

Adversaries BGP speakers (ASes) Hackers Criminals Registries Nations ISPs or multi-homed subscriber Hackers For hire? Criminals Registries IANA, RIRs, NIRs, LIRs Nations Intelligence agencies

Attacking eBGP Links Passive wiretapping is not considered a problem Active wiretapping (MITM on the link attacks) Packet modification Packet deletion Replay Target can be IP, TCP, BGP (including BGPSEC data)

Attack Targets BGP routers ISP management systems Repositories Bogus AS paths, signature removal, bad signature insertion, router key compromise, update replay, … ISP management systems Router manipulation, deleting valid RPKI objects, uploading expired RPKI objects, … Repositories Removing valid RPKI objects or inserting invalid objects RPKI CAs Duplicate allocation of resources, unauthorized revocation or certificates, …

BGP Path Attack Examples (1/2) Valid Origin, bad path Although ROAs allow an ISP to detect and reject a route with an unauthorized origin AS, they do not prevent an AS from advertising a bogus path with a valid origin AS. Prefix “narrowing” An AS along a valid path can advertise a more specific prefix than what was advertised by the origin, making the route preferred over the original advertisement. ROAs do not fix this problem unless the max length option is exactly the same as the prefix length.

A Valid Origin, but a Bad Path Assume AS 120 has a ROA for 129.7/16, maxlen = 18 129.7/16: (120) 129.7/16: (123, 120) AS 120 AS 123 AS 125 129.7/16: (120) 129.7/16: (123, 120) 129.7/16 : (124, 120) AS 124 AS 121 AS 124 advertises a path with a valid origin for 129.7/16, but it drops later ASes … AS 122 129.7/16: (121, 120) 129.7/16: (122, 123, 120)

More Specific Bad Path Assume AS 120 has a ROA for 129.7/16, maxlen = 18 129.7/16: (120) 129.7/16: (123, 120) AS 120 AS 123 AS 125 129.7/16: (120) 129.7/17: (124, 122, 123, 120) 129.7/16: (123, 120) AS 124 AS 121 AS 122 advertises a more specific prefix for the correct origin AS, so it gets the traffic! AS 122 129.7/16: (121, 120) 129.7/17: (122, 123, 120)

BGP Path Attack Examples (2/2) Dropping an AS Removing one of more ASes (not the origin AS) in a route makes the path shorter, and thus potentially preferable. The path might be “feasible” (e.g., as a backup) but not actually advertised, and thus should be rejected. Replaying an Update An AS that was on a path (perhaps very briefly) can be replayed later, when the prior path is no longer authentic Kapela/Pilosov MITM Attack Emit a bad route to attract traffic, and “poison” the route to cause selected ASes to ignore it, so that traffic can still be forwarded to the targeted AS (enabling a MITM attack)

Dropping an AS Assume AS 120 has a ROA for 129.7/16, maxlen = 18 129.7/16: (120) 129.7/16: (123, 120) AS 120 AS 123 AS 125 129.7/16: (120) 129.7/16: (124, 122, 120) 129.7/16: (123, 120) AS 124 AS 121 AS 122 AS 122 drops an AS to make its path appear shorter, to attract 129.7/16 traffic from AS 124 129.7/16: (122, 120) 129.7/16: (121, 120)

Hijack via Update Replay (1/2) Assume AS 120 has a ROA for 129.7/16, maxlen = 18 129.7/16: (120) 129.7/16: (123, 120) AS 120 AS 123 AS 125 129.7/16: (120) 129.7/16: (124, 122, 123, 120) 129.7/16: (123, 120) AS 124 AS 121 AS 122 129.7/16: (121, 120) 129.7/16: (122, 123, 120)

Hijack via Update Replay (2/2) Assume AS 120 has a ROA for 129.7/16, maxlen = 18 129.7/16: (120) 129.7/16: (123, 120) AS 120 AS 123 AS 125 129.7/16: (120) 129.7/16: (122, 123, 120) AS 124 AS 121 AS 122 no longer has a path to 120, but it can replay an old update AS 122 129.7/16: (122, 123, 120)

Kapela/Pilosov Attack (1/2) AS 125 wants to be a MITM for traffic to 129.7/16 129.7/16: (120) 129.7/16: (123, 120) AS 120 AS 123 AS 125 129.7/16: (120) 129.7/16: (124, 122, 123, 120) AS 124 AS 121 AS 122 129.7/16: (121, 120) 129.7/16: (122, 123, 120)

Kapela/Pilosov Attack (2/2) AS 125 forwards hijacked traffic to AS 120 via this path 129.7/16: (120) 129.7/16: (123, 120) AS 120 AS 123 AS 125 129.7/16: (120) 129.7/16: (123, 120) 129.7/17: (125, 123, 120) AS 124 AS 121 AS 122 129.7/17: (122, 124, 125, 123, 120) 129.7/17: (124, 125, 123, 120)

Ques t i ons