Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.

Similar presentations


Presentation on theme: "1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday."— Presentation transcript:

1 1 BGP Security -- Zhen Wu

2 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday –“Secure Border Gateway Protocol (S-BGP)” –“Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues”

3 3 Outline Background “Detection of Invalid Routing Announcement in the Internet” Paper Related Open Problems

4 4 BGP Components –Autonomous System (AS) –BGP speaker –BGP Routing table: Prefix + AS Path AS4 AS3 AS1 AS 2 BGP

5 5 BGP Routing Table Maintain the reachability information (AS path) for each prefix Default-free Incremental updates Prefix Next-Hop AS-Path Type Best Route

6 6 BGP Update AS 566 PrefixAS Path …… Routing Table 12.0.0.0/8 : 1221, 34 Prefix : AS Path Incoming update 12.0.0.0/8 : 1221, 34, 566 Outgoing update 12.0.0.0/81221, 34

7 7 General Operations Pick the best path and install it in forwarding table –BGP routing table V.S forwarding table –The definition of “best” depends on local policy Policies could influence import, the best path selection, export. Each AS only sends its best route for a prefix to its neighbors, append its AS# in the path

8 8 BGP Table Growth AS1221 ASN-TELSTRA Telstra Pty Ltd Source: http://bgp.potaroo.net/

9 9 Average Prefix Length

10 10 Average length of AS path Denser mesh

11 11 Other Trends More multi-homed small networks A denser interconnectivity mesh Reduction in hierarchical nature

12 12 Outline Background “Detection of Invalid Routing Announcement in the Internet” Paper Related Open Problems

13 13 Multiple Origin AS (MOAS) 128.9.0.0/16 Path: 226 128.9.0.0/16 Path: 4 128.9.0.0/16 Path: X, 4 AS X AS Y 128.9.0.0/16 Path: Z, 226 AS Z MOAS case ! Is it a valid policy or a fault/attack? AS 226 AS 4

14 14 Previous work How many MOAS cases have happened? How long did they last? What’s the distribution of prefix length having MOAS conflicts? Possible explanations

15 15 Possible Explanations Multi-homing Faulty or Malicious Configurations

16 16 Problem How to prevent BGP routers from accepting invalid MOAS

17 17 Idea: MOAS list –A list of legitimate ASes who are authorized to announce the prefix –Attached to route announcement AS4 AS3 AS1 AS2 12.0.0.0/8, MOAS list {1,2} 12.0.0.0/8, MOAS list {4} Detect MOAS lists conflict 12.0.0.0/8, MOAS list {1,2}

18 18 Assumption Rich interconnectivity It is very difficult, if not impossible, for the attacker to totally block the propagation of valid route announcement with MOAS list AS1AS2 AS3AS4 Prefix: 12.0.0.0/8 MOAS list: {1, 2} Controlled by attack AS6 AS5

19 19 Limitations in Design Only detects invalid MOAS conflicts –Correct origin AS with a false path ??? Valid path: 4, 231, 55, 1024 False path: 4, XXX, YYY, 1024 Rely on other mechanisms to identify the correct origin AS –DNS lookup verification

20 20 Discussion & Critiques Topology Generation –Route Views only has a partial view of Internet topology –The view is also filtered by best path selection –Is node number reducing process reasonable? Selection of the two origin ASes –Is random selection reasonable? Adjacent –Is selection only from stub (NO transit) ASes reasonable?

21 21 Outline Background “Detection of Invalid Routing Announcement in the Internet” Paper Related Open Problems

22 22 Challenge - Abnormal BGP behaviors Reasons –Implementation / protocol bugs –Misconfigurations –Attack Problems –How to define? –How to detect? –How to distinguish them? –How to trace back? What information do we need to collect?

23 23 Challenge - Opaque Policy Some strength and complexity of BGP come from the usage of local policy IRR project aims to collect global routing policy knowledge - obsolete and incomplete But: –peer policy agreement are often confidential –There is no way to verify whether received updates abided the intermediate AS’s policies –Are these policies reasonable –Local sound policies may have global conflicts

24 24 Challenge - Topology How to generate realistic Internet topology? –So huge, complicated, dynamic –What are the essential characteristics of Internet topology? How to model them?

25 25 BGP Security Problems Outsider attacks –TCP session spoofing –BGP session spoofing –DoS attack Misbehaved, misconfigured, and compromised legitimate BGP routers are the main threat currently –E.g 1997 AS7007 incident

26 26 Securing Announcement Announcement is not authenticated We don’t know who is allowed to advertise a prefix Anyone could (almost) announce any prefix –Malicious attacks –Accidentally mistakes

27 27 Securing Path Attribute Each router chooses among multiple routes for a destination Need to select the best path Path attribute is also not authenticated Path modification could disrupt routing –Cause suboptimal path to be adopted Direct to longer path Bring to path with adversary eavesdrop –Interfere with policy decisions – Make some destinations unreachable


Download ppt "1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday."

Similar presentations


Ads by Google