NSDI (April 24, 2009) © 2009 Andreas Haeberlen, MPI-SWS 1 NetReview: Detecting when interdomain routing goes wrong Andreas Haeberlen MPI-SWS / Rice Ioannis.

Slides:



Advertisements
Similar presentations
Technical Aspects of Peering Session 4. Overview Peering checklist/requirements Peering step by step Peering arrangements and options Exercises.
Advertisements

1 The Case for Byzantine Fault Detection. 2 Challenge: Byzantine faults Distributed systems are subject to a variety of failures and attacks Hacker break-in.
LADIS workshop (Oct 11, 2009) A Case for the Accountable Cloud Andreas Haeberlen MPI-SWS.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
A Quick and Dirty Guide to BGP attacks Or “How to 0wn the Backbone in your Spare Time”
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
A. Haeberlen Having your Cake and Eating it too: Routing Security with Privacy Protections 1 HotNets-X (November 15, 2011) Alexander Gurney * Andreas Haeberlen.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
Distributed Route Aggregation on the Global Network (DRAGON) João Luís Sobrinho 1 Laurent Vanbever 2, Franck Le 3, Jennifer Rexford 2 1 Instituto Telecomunicações,
BGP Safety with Spurious Updates Martin Suchara in collaboration with: Alex Fabrikant and Jennifer Rexford IEEE INFOCOM April 14, 2011.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
SRG PeerReview: Practical Accountability for Distributed Systems Andreas Heaberlen, Petr Kouznetsov, and Peter Druschel SOSP’07.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
NSDI (April 24, 2009) © 2009 Andreas Haeberlen, MPI-SWS 1 NetReview: Detecting when interdomain routing goes wrong Andreas Haeberlen MPI-SWS / Rice Ioannis.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Jennifer Rexford, Princeton University Joan Feigenbaum, Yale University July.
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
© 2006 Andreas Haeberlen, MPI-SWS 1 The Case for Byzantine Fault Detection Andreas Haeberlen MPI-SWS / Rice University Petr Kouznetsov MPI-SWS Peter Druschel.
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Inter-domain Routing security Problems Solutions.
Building and Programming the Cloud, Mysore, Jan Accountable distributed systems and the accountable cloud Peter Druschel joint work with Andreas.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Computer Networks Layering and Routing Dina Katabi
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
SIGCOMM 2012 (August 16, 2012) Private and Verifiable Interdomain Routing Decisions Mingchen Zhao * Wenchao Zhou * Alexander Gurney * Andreas Haeberlen.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Detecting Attacks on Internet Infrastructure and Monitoring of Service Restoration in Real Time Andy Ogielski FCC Workshop on Cyber Security 30 September.
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
SOSP 2007 © 2007 Andreas Haeberlen, MPI-SWS 1 Practical accountability for distributed systems Andreas Haeberlen MPI-SWS / Rice University Petr Kuznetsov.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Inter-domain Routing Outline Border Gateway Protocol.
BGP security some slides borrowed from Jen Rexford (Princeton U)
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
Doing Don’ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre.
Problem: Internet diagnostics and forensics
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Presentation transcript:

NSDI (April 24, 2009) © 2009 Andreas Haeberlen, MPI-SWS 1 NetReview: Detecting when interdomain routing goes wrong Andreas Haeberlen MPI-SWS / Rice Ioannis Avramopoulos Deutsche Telekom Laboratories Peter Druschel MPI-SWS Jennifer Rexford Princeton

NSDI (April 24, 2009) 2 © 2009 Andreas Haeberlen, MPI-SWS Motivation This is just the tip of the iceberg A considerable fraction of Internet prefixes is affected by routing problems every day YouTube outage underscores big Internet problem BGP (Border Gateway Protocol) routing

NSDI (April 24, 2009) 3 © 2009 Andreas Haeberlen, MPI-SWS A A A A BGP and its problems ASes exchange routing information via BGP BGP routing suffers many problems: Misconfigurations L L M M I I J J N N E E K K G G C C B B D D F F H H I know how to get to AS A Autonomous systems (ASes) hijacks, oscillation, equipment failures, policy conflicts,..., bugs, attacks by spammers, instabilities,

NSDI (April 24, 2009) 4 © 2009 Andreas Haeberlen, MPI-SWS Related Work Fault prevention Secure routing protocols: S-BGP, soBGP, SPV,... Trusted monitors: N-BGP The drawbacks of “Fault prevention system”: is effective against many problems, but not enough. Need significant buy-in and require Internet-wide Public key infrastructure (PKI).

NSDI (April 24, 2009) Basic ideas of this paper If we cannot prevent every routing problem, why not at least ensure that each problem is detected and linked to the ISP that caused it? 5 © 2009 Andreas Haeberlen, MPI-SWS

NSDI (April 24, 2009) 6 © 2009 Andreas Haeberlen, MPI-SWS Approach: Fault detection Goals: 1. Reliably detect each routing problem, and 2. link it to the AS that caused it Benefits: ASes can respond to problems quickly No need to diagnose faults manually Works for a very broad class of problems Provides an incentive for reliable routing Easy to deploy incrementally

NSDI (April 24, 2009) 7 © 2009 Andreas Haeberlen, MPI-SWS Challenges in BGP fault detection Idea: Upload all router logs to a central entity, who inspects them for problems Sufficient to find almost any routing problem Why wouldn't this work in practice? Privacy: Logs contain sensitive information Reliability: Logs may be inaccurate (bugs, hackers) Automation: Can't manually inspect that much data Deployability: Can't assume global deployment Decentralization: ASes wouldn't accept a single detector entity

NSDI (April 24, 2009) 8 © 2009 Andreas Haeberlen, MPI-SWS NetReview from 10,000 feet Border routers maintain logs of all BGP messages Logs are tamper-evident  can reliably detect & obtain proof if faulty routers omit, forge, or modify log entries Neighbors periodically audit each other's logs and check them for routing problems If a problem is found, auditor can prove its existence to a third party A C D E F B Logs of BGP messages

NSDI (April 24, 2009) 9 © 2009 Andreas Haeberlen, MPI-SWS Outline Introduction Motivation: Internet routing problems Approach: Fault detection What is a BGP fault? The NetReview system Practical challenges Evaluation Summary

NSDI (April 24, 2009) 10 © 2009 Andreas Haeberlen, MPI-SWS BGP routing policies How do ASes decide what to announce via BGP? Each AS has a routing policy, which is based on: Peering agreements: Customer/provider,... Best practices: Limited path length,... Internal goals: Choose the shortest/cheapest path,... Address assignments: IP address prefixes,... A C D E F B G C's provider

NSDI (April 24, 2009) 11 © 2009 Andreas Haeberlen, MPI-SWS What is a BGP fault? Expected behavior of the AS := Combination of its peering agreements, best practices, internal goals,... BGP fault := The BGP messages sent by the AS do not conform to its expected behavior How do we know what BGP messages the AS sent? Need a complete+accurate message trace even if some routers are faulty in arbitrary, unknown ways Requires a robust+secure tracing mechanism How do we know what its expected behavior is? Different for every AS  need a specification

NSDI (April 24, 2009) 12 © 2009 Andreas Haeberlen, MPI-SWS BGP rules For example, D might specify the following: "I will filter out routes with excessive paths" (best practice) "I will act as C's provider" (peering agreement) "I will prefer routes through B, if available" (internal goals) Some rules may be confidential, but the AS need not reveal all of them to each auditor A C D E F B G "Rules"

NSDI (April 24, 2009) 13 © 2009 Andreas Haeberlen, MPI-SWS Outline Introduction What is a BGP fault? The NetReview system Practical challenges Evaluation Summary

NSDI (April 24, 2009) 14 © 2009 Andreas Haeberlen, MPI-SWS The tamper-evident log A B Hash chain Send(X) Recv(Y) Send(Z) Recv(M) H0H0 H1H1 H2H2 H3H3 H4H4 B's log Message ACK Based on the tamper-evident log in PeerReview [SOSP'07] If router omits, modifies, or forges entries, neighbors can detect this and obtain evidence Log entries form a hash chain Messages include signed hash Tampering breaks the hash chain and is thus detectable Messages are acknowledged Detects if message is ignored Neighbors gossip about the hash values they've seen Hash(log)

NSDI (April 24, 2009) 15 © 2009 Andreas Haeberlen, MPI-SWS Writing rules Rules are predicates on the AS's routing state Declarative; easy to get correct Even simple rules can be very powerful Describes everything that S-BGP can check, and more! D AS 1 AS 2 ownPrefixes D AS 1 AS 2 D D D D  D AS 3

NSDI (April 24, 2009) 16 © 2009 Andreas Haeberlen, MPI-SWS Auditing and rule evaluation To audit a neighboring AS: 1. Auditor requests the logs from each border router 2. Auditor checks logs for inconsistencies and tampering 3. Auditor locally replays the logs  series of routing states 4. Auditor evaluates the rules over each routing state 5. If a rule is violated during some time interval, auditor extracts verifiable evidence from the logs D E Auditor Time Routing state Rule violated in this interval

NSDI (April 24, 2009) 17 © 2009 Andreas Haeberlen, MPI-SWS Outline Introduction What is a BGP fault? The NetReview system Practical challenges Incentives for incremental deployment Partial deployment Working without a certificate authority Using existing routers Evaluation Summary

NSDI (April 24, 2009) 18 © 2009 Andreas Haeberlen, MPI-SWS Incremental deployment What is the smallest useful deployment? One AS can find bugs, misconfigurations,... Two adjacent ASes can check peering agreements,... What are the incentives for deployment? Reliable ASes can attract more customers Logs can be used for root-cause analysis ?

NSDI (April 24, 2009) 19 © 2009 Andreas Haeberlen, MPI-SWS Outline Introduction What is a BGP fault? The NetReview system Practical challenges Evaluation Summary

NSDI (April 24, 2009) 20 © 2009 Andreas Haeberlen, MPI-SWS Experimental setup Synthetic network of 35 Zebra BGP daemons Default routing policies (Gao-Rexford) Injected real BGP trace (Equinix) to get scale Results in this talk are from AS 5 (92% of Internet ASes have degree five or less) Tier 1 Tier 2 Stubs Internet AS 2 AS 1 AS 3 AS 4 AS 5 AS 6 AS 7 AS 8 AS 9 AS 10

NSDI (April 24, 2009) 21 © 2009 Andreas Haeberlen, MPI-SWS Evaluation: Functionality check Fault injection experiment with five rules based on common routing problems: No origin misconfiguration Export customer routes Honor NO_ADVERTISE community Consistent path length Backup link NetReview detected all the injected faults Also produced diagnostic information, such as time when the fault occurred, and prefixes that were affected

NSDI (April 24, 2009) 22 © 2009 Andreas Haeberlen, MPI-SWS Evaluation: Overhead Processing power: 15-minute log segment can be checked in 41.5s on a P4 A single commodity PC is sufficient for small networks Storage space: 710kB/minute, ≈356 GB/year Fits comfortably on a single hard disk Bandwidth: 420kbps, including BGP updates Insignificant compared to typical traffic volume

NSDI (April 24, 2009) 23 © 2009 Andreas Haeberlen, MPI-SWS Summary NetReview: A fault detection system for interdomain routing Automatically detects a wide variety of routing problems Links each problem to the responsible AS Not a heuristic - produces proof of each fault NetReview is practical Easy to deploy incrementally No PKI required Reasonable overhead Thank you!

NSDI (April 24, 2009) Discussions Some assumptions in the NetReview: Each AS has at least one diligent neighbor. Does it hold? Each AS can eventually send control messages to any other AS. If the services are in real-time such as video streams, does it work? No attacker can invert the hash function or break cryptographic keys. Is it always true? If the number of rules and neighbors is much greater than five rules and five neighbors, can the processing time be tolerated for us? Can we afford so huge the storage space ? 24 © 2009 Andreas Haeberlen, MPI-SWS