A Taxonomy of Attacks Using BGP Blackholing Loc Miller and Cristel - - PowerPoint PPT Presentation

a taxonomy of attacks using bgp blackholing
SMART_READER_LITE
LIVE PREVIEW

A Taxonomy of Attacks Using BGP Blackholing Loc Miller and Cristel - - PowerPoint PPT Presentation

A Taxonomy of Attacks Using BGP Blackholing Loc Miller and Cristel Pelsser September 23, 2019 University of Strasbourg AS 20 AS 10 AS 30 P: 192.0.2.0/24 BGP Blackholing Blackholing is a DDoS mitigation technique signaled via BGP 1 . 1


slide-1
SLIDE 1

A Taxonomy of Attacks Using BGP Blackholing

Loïc Miller and Cristel Pelsser September 23, 2019

University of Strasbourg

slide-2
SLIDE 2

BGP Blackholing

Blackholing is a DDoS mitigation technique signaled via BGP1.

AS 10 AS 20 AS 30

P: 192.0.2.0/24

1Rekhter, Li, and Hares, A Border Gateway Protocol 4 (BGP-4).

1/17

slide-3
SLIDE 3

BGP Blackholing

Blackholing is a DDoS mitigation technique signaled via BGP1. Internet is composed of Autonomous Systems (AS): one or more networks under the control of a single entity.

AS 10 AS 20 AS 30

P: 192.0.2.0/24

Figure 1: BGP Blackholing

1Rekhter, Li, and Hares, A Border Gateway Protocol 4 (BGP-4).

1/17

slide-4
SLIDE 4

BGP Blackholing

Blackholing is a DDoS mitigation technique signaled via BGP1. Internet is composed of Autonomous Systems (AS): one or more networks under the control of a single entity.

AS 10 AS 20 AS 30

P: 192.0.2.0/24

Figure 1: BGP Blackholing

1Rekhter, Li, and Hares, A Border Gateway Protocol 4 (BGP-4).

1/17

slide-5
SLIDE 5

BGP Blackholing

Blackholing is a DDoS mitigation technique signaled via BGP1. Internet is composed of Autonomous Systems (AS): one or more networks under the control of a single entity.

AS 10 AS 20 AS 30

P: 192.0.2.0/24 BLACKHOLE

Figure 1: BGP Blackholing

1Rekhter, Li, and Hares, A Border Gateway Protocol 4 (BGP-4).

1/17

slide-6
SLIDE 6

BGP Blackholing

Blackholing is a DDoS mitigation technique signaled via BGP1. Internet is composed of Autonomous Systems (AS): one or more networks under the control of a single entity.

AS 10 AS 20 AS 30

P: 192.0.2.0/24 BLACKHOLE

Figure 1: BGP Blackholing

Blackholing has a double-edged sword effect: all traffic is dropped.

1Rekhter, Li, and Hares, A Border Gateway Protocol 4 (BGP-4).

1/17

slide-7
SLIDE 7

Objectives

1/17

slide-8
SLIDE 8

Objectives Can blackholing be used with malicious intent?

1/17

slide-9
SLIDE 9

Objectives Can blackholing be used with malicious intent? Are there different types of attacks?

1/17

slide-10
SLIDE 10

Objectives Can blackholing be used with malicious intent? Are there different types of attacks? Are there any existing and relevant security mechanisms?

1/17

slide-11
SLIDE 11

Objectives Can blackholing be used with malicious intent? Are there different types of attacks? Are there any existing and relevant security mechanisms? Are these mechanisms enough?

1/17

slide-12
SLIDE 12

Quick BGP Primer

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

Figure 2: BGP message propagation

2/17

slide-13
SLIDE 13

Quick BGP Primer

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

10.1/16 AS5

Figure 2: BGP message propagation

2/17

slide-14
SLIDE 14

Quick BGP Primer

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

10.1/16 AS3 AS5 10.1/16 AS3 AS5 10.1/16 AS3 AS5

Figure 2: BGP message propagation

2/17

slide-15
SLIDE 15

Quick BGP Primer

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

10.1/16 AS1 AS3 AS5 10.1/16 AS4 AS3 AS5

Figure 2: BGP message propagation

2/17

slide-16
SLIDE 16

Quick BGP Primer

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

Figure 2: BGP message propagation

2/17

slide-17
SLIDE 17

BGP Hijacks

As BGP is a distributed protocol, lacking authentication of route origins and verification

  • f paths, ASes can advertise

illegitimate routes for prefixes they do not own, attracting some or all of the traffic to these prefixes.

2/17

slide-18
SLIDE 18

BGP Hijacks

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

Figure 3: BGP hijack

3/17

slide-19
SLIDE 19

BGP Hijacks

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 10.1.0.0/16

Figure 3: BGP hijack

3/17

slide-20
SLIDE 20

BGP Hijacks

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 10.1.0.0/16

10.1/16 AS6 10.1/16 AS6

Figure 3: BGP hijack

3/17

slide-21
SLIDE 21

BGP Hijacks

AS 1 AS 2 AS 3 AS 5 AS 6 AS 4

10.1.0.0/16 10.1.0.0/16

10.1/16 AS4 AS6 10.1/16 AS4 AS6

Figure 3: BGP hijack

3/17

slide-22
SLIDE 22

BGP Hijacks

AS 1 AS 3 AS 5 AS 6 AS 4 AS 2

10.1.0.0/16 10.1.0.0/16

10.1/16 AS2 AS4 AS6

Figure 3: BGP hijack

3/17

slide-23
SLIDE 23

BGP Hijacks

AS 1 AS 3 AS 5 AS 6 AS 4 AS 2

10.1.0.0/16 10.1.0.0/16

Figure 3: BGP hijack (Type-02)

2Sermpezis et al., “ARTEMIS: Neutralizing BGP hijacking within a minute”.

3/17

slide-24
SLIDE 24

BGP Hijacks - 5304 routing attacks in 2017 alone2.

AS 1 AS 3 AS 5 AS 6 AS 4 AS 2

10.1.0.0/16 10.1.0.0/16

Figure 3: BGP hijack (Type-0)

2Robachevsky, 14,000 Incidents: A 2017 Routing Security Year in Review.

3/17

slide-25
SLIDE 25

BGP Blackjacks - Type-0 AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

Figure 4: Type-0 blackjack

4/17

slide-26
SLIDE 26

BGP Blackjacks - Type-0 AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 10.1.0.0/16

Figure 4: Type-0 blackjack

4/17

slide-27
SLIDE 27

BGP Blackjacks - Type-0 AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 10.1.0.0/16

10.1/16 AS6 AS3:666 10.1/16 AS6 AS4:666 Figure 4: Type-0 blackjack

4/17

slide-28
SLIDE 28

BGP Blackjacks - Type-0 AS 1 AS 2 AS 5 AS 6 AS 3 AS 4

10.1.0.0/16 10.1.0.0/16

Figure 4: Type-0 blackjack

4/17

slide-29
SLIDE 29

Best practices for legitimate blackholing empower blackjacks

Best Practices for blackholing3 Give a higher priority to blackholing. Do not propagate the advertisement across AS borders.

3Cisco, Remotely Triggered Black Hole Filtering - Destination Based and Source

Based. 5/17

slide-30
SLIDE 30

Best practices for legitimate blackholing empower blackjacks

Best Practices for blackholing3 Give a higher priority to blackholing. Do not propagate the advertisement across AS borders. Advantages of blackjacks Reach: Precedence over AS path length. Even ASes far away are vulnerable. No propagation: More disruption. Stealth: The attacker is not dropping traffic himself.

3Cisco, Remotely Triggered Black Hole Filtering - Destination Based and Source

Based. 5/17

slide-31
SLIDE 31

RPKI - Resource Public Key Infrastructure4

The RPKI is a distributed, hierarchic public key infrastructure. It allows prefix holders to emit digitally signed objects attesting that a given AS is authorized to originate routes for a set of prefixes.

4Lepinski and Kent, An Infrastructure to Support Secure Internet Routing.

6/17

slide-32
SLIDE 32

RPKI - Resource Public Key Infrastructure

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

RPKI pub. point

Figure 5: RPKI usage

7/17

slide-33
SLIDE 33

RPKI - Resource Public Key Infrastructure

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

RPKI pub. point

10.1/16 AS5

Figure 5: RPKI usage

7/17

slide-34
SLIDE 34

RPKI - Resource Public Key Infrastructure

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 10.1.0.0/16

RPKI pub. point

Figure 5: RPKI usage

7/17

slide-35
SLIDE 35

RPKI - Resource Public Key Infrastructure

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 10.1.0.0/16

RPKI pub. point

10.1/16 AS6 AS3:666 10.1/16 AS6 AS4:666

Figure 5: RPKI usage

7/17

slide-36
SLIDE 36

RPKI - Resource Public Key Infrastructure

AS 1 AS 2 AS 4 AS 5 AS 6 AS 3

10.1.0.0/16 10.1.0.0/16

RPKI pub. point

Figure 5: RPKI usage

7/17

slide-37
SLIDE 37

BGP Blackjacks - Type-N AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

RPKI pub. point

Figure 6: Type-N blackjack

8/17

slide-38
SLIDE 38

BGP Blackjacks - Type-N AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 10.1.0.0/16

RPKI pub. point

Figure 6: Type-N blackjack

8/17

slide-39
SLIDE 39

BGP Blackjacks - Type-N AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 10.1.0.0/16

RPKI pub. point

10.1/16 AS6 AS5 AS3:666 10.1/16 AS6 AS5 AS4:666 Figure 6: Type-N blackjack

8/17

slide-40
SLIDE 40

BGP Blackjacks - Type-N AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 10.1.0.0/16

RPKI pub. point

10.1/16 AS6 AS5 AS3:666 10.1/16 AS6 AS5 AS4:666 Figure 6: Type-N blackjack

8/17

slide-41
SLIDE 41

BGP Blackjacks - Type-N AS 1 AS 2 AS 5 AS 6 AS 3 AS 4

10.1.0.0/16 10.1.0.0/16

RPKI pub. point

Figure 6: Type-N blackjack

8/17

slide-42
SLIDE 42

BGPsec5

BGPsec modifies BGP to allow ASes to sign advertisements. This guarantees the AS path reflects the actual path the advertisement went through.

5Lepinski and Sriram, BGPsec Protocol Specification.

9/17

slide-43
SLIDE 43

BGPsec

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

Figure 7: BGPsec message propagation

10/17

slide-44
SLIDE 44

BGPsec

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5

Figure 7: BGPsec message propagation

10/17

slide-45
SLIDE 45

BGPsec

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5 3 10.1/16 - AS1 AS3 AS5 5 10.1/16 - AS3 AS5 3 10.1/16 - AS4 AS3 AS5 5 10.1/16 - AS3 AS5 3 10.1/16 - AS6 AS3 AS5

Figure 7: BGPsec message propagation

10/17

slide-46
SLIDE 46

BGPsec

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5 3 10.1/16 - AS1 AS3 AS5 1 10.1/16 - AS2 AS1 AS3 AS5 5 10.1/16 - AS3 AS5 3 10.1/16 - AS4 AS3 AS5 4 10.1/16 - AS6 AS4 AS3 AS5

Figure 7: BGPsec message propagation

10/17

slide-47
SLIDE 47

BGPsec

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

Figure 7: BGPsec message propagation

10/17

slide-48
SLIDE 48

BGP Blackjacks - Type-N AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

RPKI pub. point 1 2 3 4 5 6

Figure 8: Type-N blackjack

11/17

slide-49
SLIDE 49

BGP Blackjacks - Type-N AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

RPKI pub. point 1 2 3 4 5 6

Figure 8: Type-N blackjack

11/17

slide-50
SLIDE 50

BGP Blackjacks - Type-N AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

RPKI pub. point 1 2 3 4 5 6

10.1/16 AS6 AS5 AS3:666 10.1/16 AS6 AS5 AS4:666 Figure 8: Type-N blackjack

11/17

slide-51
SLIDE 51

BGP Blackjacks - Type-N AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16

RPKI pub. point 1 2 3 4 5 6

Figure 8: Type-N blackjack

11/17

slide-52
SLIDE 52

BGP Blackjacks - On Path

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

Figure 9: On Path blackjack

12/17

slide-53
SLIDE 53

BGP Blackjacks - On Path

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5

Figure 9: On Path blackjack

12/17

slide-54
SLIDE 54

BGP Blackjacks - On Path

AS 1 AS 2 AS 4 AS 5 AS 6 AS 3

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5

Figure 9: On Path blackjack

12/17

slide-55
SLIDE 55

BGP Blackjacks - On Path

AS 1 AS 2 AS 4 AS 5 AS 6 AS 3

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5 3 10.1/16 - AS1 AS3 AS5 5 10.1/16 - AS3 AS5 3 10.1/16 - AS4 AS3 AS5 5 10.1/16 - AS3 AS5 3 10.1/16 - AS6 AS3 AS5

Figure 9: On Path blackjack

12/17

slide-56
SLIDE 56

BGP Blackjacks - On Path

AS 1 AS 2 AS 4 AS 5 AS 6 AS 3

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5 3 10.1/16 - AS1 AS3 AS5 AS1:666 5 10.1/16 - AS3 AS5 3 10.1/16 - AS4 AS3 AS5 5 10.1/16 - AS3 AS5 3 10.1/16 - AS6 AS3 AS5

Figure 9: On Path blackjack

12/17

slide-57
SLIDE 57

BGP Blackjacks - On Path

AS 2 AS 4 AS 5 AS 6 AS 3 AS 1

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5 3 10.1/16 - AS4 AS3 AS5 4 10.1/16 - AS6 AS4 AS3 AS5

Figure 9: On Path blackjack

12/17

slide-58
SLIDE 58

BGP Blackjacks - On Path

AS 2 AS 4 AS 5 AS 6 AS 3 AS 1

10.1.0.0/16 1 2 3 4 5 6

Figure 9: On Path blackjack

12/17

slide-59
SLIDE 59

Attack Taxonomy

Security Deployment Type-0 Type-N NOP OP OP-GRV BGPsec (full) ■ ■ ■ □ □ BGPsec (partial) ◪ ◪ ◪ □ □ RPKI (full) ■ □ □ □ □ RPKI (partial) ◪ □ □ □ □ No security □ □ □ □ □ Table 1: Security deployments against exact prefix blackjacks

13/17

slide-60
SLIDE 60

Attack Taxonomy

Security Deployment Type-0 Type-N NOP OP OP-GRV BGPsec (full) ■ ■ ■ □ □ BGPsec (partial) ◪ ◪ ◪ □ □ RPKI (full) ■ □ □ □ □ RPKI (partial) ◪ □ □ □ □ No security □ □ □ □ □ Table 1: Security deployments against exact prefix blackjacks

BGPsec: not yet deployed.

13/17

slide-61
SLIDE 61

Attack Taxonomy

Security Deployment Type-0 Type-N NOP OP OP-GRV BGPsec (full) ■ ■ ■ □ □ BGPsec (partial) ◪ ◪ ◪ □ □ RPKI (full) ■ □ □ □ □ RPKI (partial) ◪ □ □ □ □ No security □ □ □ □ □ Table 1: Security deployments against exact prefix blackjacks

BGPsec: not yet deployed. RPKI: 16.44% of prefixes.

13/17

slide-62
SLIDE 62

Attack Taxonomy

Security Deployment Type-0 Type-N NOP OP OP-GRV BGPsec (full) ■ ■ ■ □ □ BGPsec (partial) ◪ ◪ ◪ □ □ RPKI (full) ■ □ □ □ □ RPKI (partial) ◪ □ □ □ □ No security □ □ □ □ □ Table 1: Security deployments against exact prefix blackjacks

BGPsec: not yet deployed. RPKI: 16.44% of prefixes. ROV: 84 ASes (0.005 < certainty < 1)6

6Reuter et al., “Towards a rigorous methodology for measuring adoption of RPKI

route validation and filtering”. 13/17

slide-63
SLIDE 63

Attack Taxonomy

Security Deployment Type-0 Type-N NOP OP OP-GRV BGPsec (full) ■ ■ ■ □ □ BGPsec (partial) ◪ ◪ ◪ □ □ RPKI (full) ■ □ □ □ □ RPKI (partial) ◪ □ □ □ □ No security □ □ □ □ □ Table 1: Security deployments against exact prefix blackjacks

BGPsec: not yet deployed. RPKI: 16.44% of prefixes. ROV: 84 ASes (0.005 < certainty < 1)6 - 0.13% of ASes7.

6Reuter et al., “Towards a rigorous methodology for measuring adoption of RPKI

route validation and filtering”.

7Bates, Smith, and Huston, CIDR REPORT for 22 Sep 19.

13/17

slide-64
SLIDE 64

Attack Taxonomy

Security Deployment Type-0 Type-N NOP OP OP-GRV BGPsec (full) ■ ■ ■ □ □ BGPsec (partial) ◪ ◪ ◪ □ □ RPKI (full) ■ □ □ □ □ RPKI (partial) ◪ □ □ □ □ No security □ □ □ □ □ Table 1: Security deployments against exact prefix blackjacks

BGPsec: not yet deployed. RPKI: 16.44% of prefixes. ROV: 84 ASes (0.005 < certainty < 1)6 - 0.13% of ASes7.

6Reuter et al., “Towards a rigorous methodology for measuring adoption of RPKI

route validation and filtering”.

7Bates, Smith, and Huston, CIDR REPORT for 22 Sep 19.

13/17

slide-65
SLIDE 65

Suggested Best Practices

Authorized origin: RPKI. Valid path: BGPsec. It is not enough!

14/17

slide-66
SLIDE 66

Suggested Best Practices

Authorized origin: RPKI. Valid path: BGPsec. Direct connection: The AS sending the blackhole advertisement is directly connected to the local AS: only one AS in the AS path.

14/17

slide-67
SLIDE 67

Suggested Best Practices

Direct connection: The AS sending the blackhole advertisement is directly connected to the local AS: only one AS in the AS path.

AS 1 AS 2 AS 3

10.1.0.0/16

Figure 10: Suggested Best Practices

14/17

slide-68
SLIDE 68

Suggested Best Practices

Direct connection: The AS sending the blackhole advertisement is directly connected to the local AS: only one AS in the AS path.

AS 1 AS 2 AS 3

10.1.0.0/16

10.1/16 AS1 AS2:666

Figure 10: Suggested Best Practices

14/17

slide-69
SLIDE 69

Suggested Best Practices

Direct connection: The AS sending the blackhole advertisement is directly connected to the local AS: only one AS in the AS path.

AS 1 AS 2 AS 3

10.1.0.0/16

10.1/16 AS2 AS1 AS3:666

Figure 10: Suggested Best Practices

14/17

slide-70
SLIDE 70

Suggested Best Practices

Direct connection: The AS sending the blackhole advertisement is directly connected to the local AS: only one AS in the AS path.

AS 1 AS 2 AS 3

10.1.0.0/16

10.1/16 AS2 AS1 AS3:666

Figure 10: Suggested Best Practices

14/17

slide-71
SLIDE 71

Suggested Best Practices

Direct connection: The AS sending the blackhole advertisement is directly connected to the local AS: only one AS in the AS path. Limits possible attacks to Type-0 and NOP blackjacks.

AS 1 AS 2 AS 3

10.1.0.0/16

Figure 10: Suggested Best Practices

14/17

slide-72
SLIDE 72

Suggested Best Practices

Direct connection: The AS sending the blackhole advertisement is directly connected to the local AS: only one AS in the AS path. Limits possible attacks to Type-0 and NOP blackjacks.

AS 1 AS 2 AS 3

10.1.0.0/16

10.1/16 AS1 AS3:666

Figure 10: Suggested Best Practices

14/17

slide-73
SLIDE 73

Suggested Best Practices

Legitimate peer: The peer sending the blackhole advertisement is legitimate if the leftmost AS in the AS path is the ASN specified in the BGP OPEN message that created the session.

AS 1 AS 2 AS 3

10.1.0.0/16

10.1/16 AS1 AS3:666

Figure 10: Suggested Best Practices

14/17

slide-74
SLIDE 74

A BGPsec solution - Associate communities to ASes.

pCount Flags ASN pCount Flags ASN ... SKI Length Signature SKI Length Signature ... SKI Length Signature SKI Length Signature ... Secure_Path Sig_Block 1 Sig_Block 2

Figure 11: BGPsec_PATH attribute

pCount Flags ASN pCount Flags ASN ... AS:value AS:value ... AS:value AS:value ... ... SKI Length Signature SKI Length Signature ... SKI Length Signature SKI Length Signature ... Secure_Path Secure_Communities Sig_Block 1 Sig_Block 2

15/17

slide-75
SLIDE 75

A BGPsec solution - Associate communities to ASes.

pCount Flags ASN pCount Flags ASN ... SKI Length Signature SKI Length Signature ... SKI Length Signature SKI Length Signature ... Secure_Path Sig_Block 1 Sig_Block 2

Figure 11: BGPsec_PATH attribute

pCount Flags ASN pCount Flags ASN ... AS:value AS:value ... AS:value AS:value ... ... SKI Length Signature SKI Length Signature ... SKI Length Signature SKI Length Signature ... Secure_Path Secure_Communities Sig_Block 1 Sig_Block 2

Figure 12: Modified attribute

15/17

slide-76
SLIDE 76

A BGPsec solution - Associate communities to ASes.

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

Figure 13: BGPsec message propagation (modified)

16/17

slide-77
SLIDE 77

A BGPsec solution - Associate communities to ASes.

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5 - C5

Figure 13: BGPsec message propagation (modified)

16/17

slide-78
SLIDE 78

A BGPsec solution - Associate communities to ASes.

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5 - C5 3 10.1/16 - AS1 AS3 AS5 - C3 C5 5 10.1/16 - AS3 AS5 - C5 3 10.1/16 - AS4 AS3 AS5 - C3 C5 5 10.1/16 - AS3 AS5 - C5 3 10.1/16 - AS6 AS3 AS5 - C3 C5

Figure 13: BGPsec message propagation (modified)

16/17

slide-79
SLIDE 79

A BGPsec solution - Associate communities to ASes.

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

5 10.1/16 - AS3 AS5 - C5 3 10.1/16 - AS1 AS3 AS5 1 10.1/16 - AS2 AS1 AS3 AS5 - C1 C3 C5 5 10.1/16 - AS3 AS5 - C5 3 10.1/16 - AS4 AS3 AS5 4 10.1/16 - AS6 AS4 AS3 AS5 - C4 C3 C5

Figure 13: BGPsec message propagation (modified)

16/17

slide-80
SLIDE 80

A BGPsec solution - Associate communities to ASes.

AS 1 AS 2 AS 3 AS 4 AS 5 AS 6

10.1.0.0/16 1 2 3 4 5 6

Figure 13: BGPsec message propagation (modified)

16/17

slide-81
SLIDE 81

Perspectives

Test remaining8 attacks in a real world setting.

8Streibelt et al., “BGP Communities: Even more Worms in the Routing Can”.

17/17

slide-82
SLIDE 82

Perspectives

Test remaining8 attacks in a real world setting. Investigate ASes proposing blackholing services.

8Streibelt et al., “BGP Communities: Even more Worms in the Routing Can”.

17/17

slide-83
SLIDE 83

Perspectives

Test remaining8 attacks in a real world setting. Investigate ASes proposing blackholing services. Extend the attack model.

8Streibelt et al., “BGP Communities: Even more Worms in the Routing Can”.

17/17

slide-84
SLIDE 84

Takeway message

New BGP attacks: BGP blackjacks.

17/17

slide-85
SLIDE 85

Takeway message

New BGP attacks: BGP blackjacks. Blackjack attack taxonomy.

17/17

slide-86
SLIDE 86

Takeway message

New BGP attacks: BGP blackjacks. Blackjack attack taxonomy. Existing routing security mechanisms do not provide complete protection.

17/17

slide-87
SLIDE 87

Takeway message

New BGP attacks: BGP blackjacks. Blackjack attack taxonomy. Existing routing security mechanisms do not provide complete protection. Additional mechanisms to properly defend against or mitigate those attacks.

17/17

slide-88
SLIDE 88

Thank you!

17/17

slide-89
SLIDE 89

[1] Tony Bates, Philip Smith, and Geoff Huston. CIDR REPORT for 22 Sep 19. 2019. url: https://www.cidr-report.org/as2.0/ (visited on 09/22/2019). [2]

  • Cisco. Remotely Triggered Black Hole Filtering - Destination Based and Source Based. 2005. url:

https://www.cisco.com/c/dam/en/us/products/collateral/security/ios-network- foundation-protection-nfp/prod%5C_white%5C_paper0900aecd80313fac.pdf (visited on 09/22/2019). [3]

  • M. Lepinski and S. Kent. An Infrastructure to Support Secure Internet Routing. RFC 6480. RFC Editor,
  • Feb. 2012. url: http://www.rfc-editor.org/rfc/rfc6480.txt.

[4]

  • M. Lepinski and K. Sriram. BGPsec Protocol Specification. RFC 8205. RFC Editor, Sept. 2017.

[5]

  • Y. Rekhter, T. Li, and S. Hares. A Border Gateway Protocol 4 (BGP-4). RFC 4271.

http://www.rfc-editor.org/rfc/rfc4271.txt. RFC Editor, Jan. 2006. url: http://www.rfc-editor.org/rfc/rfc4271.txt. [6] Andreas Reuter et al. “Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering”. In: ACM SIGCOMM Computer Communication Review 48.1 (2018), pp. 19–27. [7] Andrei Robachevsky. 14,000 Incidents: A 2017 Routing Security Year in Review. 2018. url: https://www.internetsociety.org/blog/2018/01/14000-incidents-2017-routing- security-year-review/ (visited on 09/22/2019). [8] Pavlos Sermpezis et al. “ARTEMIS: Neutralizing BGP hijacking within a minute”. In: IEEE/ACM Transactions on Networking (TON) 26.6 (2018), pp. 2471–2486. [9] Florian Streibelt et al. “BGP Communities: Even more Worms in the Routing Can”. In: Proceedings of the Internet Measurement Conference 2018. ACM. 2018, pp. 279–292.

slide-90
SLIDE 90

Type-0: 10 - 20:666 - 192.0.2.0/24 Type-N: 10 30 - 20:666 - 192.0.2.0/24

AS 10 Attacker AS 20 Blackholer AS 30 Victim

P: 192.0.2.0/24 P P

Figure 14: Type-0 and Type-N blackjacks

slide-91
SLIDE 91

P: 192.0.2.0/24 OP: 10 30 - 20:666 - 192.0.2.0/24 P

AS 10 Attacker AS 20 Blackholer AS 30 Victim

P P

Figure 15: On Path blackjacks

slide-92
SLIDE 92

OP-GRV: 20 30 40 - 10:666 - 192.0.2.0/24 NOP: 40 - 30:666 - 192.0.2.0/24

AS 20 Attacker AS 40 Victim AS 30 Blackholer AS 10 Blackholer

P P P P: 192.0.2.0/24

Figure 16: OP-GRV and NOP blackjacks

slide-93
SLIDE 93

Security Deployment Type-0 Type-N NOP OP OP-GRV BGPsec (full) ■ ■ ■ ■ ■ BGPsec (partial) ◪ ◪ ◪ ■ ■ RPKI (full) ■ ■ ■ ■ ■ RPKI (partial) ◪ ◪ ◪ ■ ■ No security □ □ □ ■ ■ Table 2: Security deployments against sub-prefix blackjacks