Bamboozling Certificate Authorities with BGP Henry Birge-Lee, Yixin - - PowerPoint PPT Presentation

bamboozling certificate authorities with bgp
SMART_READER_LITE
LIVE PREVIEW

Bamboozling Certificate Authorities with BGP Henry Birge-Lee, Yixin - - PowerPoint PPT Presentation

Bamboozling Certificate Authorities with BGP Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal Autonomous System (AS) NTT 2914 Internet at the highest level Routing within an AS is completely autonomous


slide-1
SLIDE 1

Bamboozling Certificate Authorities with BGP

Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal

slide-2
SLIDE 2

Autonomous System (AS)

  • Internet at the highest level
  • Routing within an AS is

completely autonomous

  • Inter-AS Routing uses BGP

Comcast 7922 Cloudflare 394536 UIUC 38 NTT 2914 Pavlov 46925

slide-3
SLIDE 3

Border Gateway Protocol (BGP)

  • ASes announce ownership of /

reachability to IP prefixes

  • Announcements propagate
  • Routing tables are compiled

based on announcements

Comcast 7922 Cloudflare 394536 UIUC 38 NTT 2914 Pavlov 46925

slide-4
SLIDE 4

BGP hijack

Using false announcements to corrupt routing tables of others

slide-5
SLIDE 5

Threat Model

  • Anyone with total control over

an AS!

  • 60K+ unique ASes as of Oct

2018

  • 3000 new ASes per year since

1997

slide-6
SLIDE 6

What can an Adversary do with BGP hijacks?

slide-7
SLIDE 7

Goal: Fool a CA into authorizing the fake server

MITM between a Certificate Authority and a victim domain

slide-8
SLIDE 8

Sub-Prefix Hijack Attack

  • Effective in intercepting

traffic

  • Easily detectable
slide-9
SLIDE 9

Case: YouTube hijacked by Pakistan! (2008)

DT: 2 hours

slide-10
SLIDE 10

Case: Iran tried to censor porn (2017)

Duration: 28 hours

slide-11
SLIDE 11

Same Prefix Hijack

  • Less effective in intercepting

traffic

  • Stealthier compared to

Sub-Prefix attacks

slide-12
SLIDE 12

Path poisoning attacks (Proposed by the Authors)

  • Effective!
  • Stealthy!
slide-13
SLIDE 13

Cause of BGP hijacks

  • Incompetent network admins?
  • Malicious adversaries?
slide-14
SLIDE 14

Experiment

  • Set up an Adversary server and a

victim server under ASes controlled by PEERING

  • Approached CAs after BGP hijack
slide-15
SLIDE 15

Results from the author’s experiments

slide-16
SLIDE 16

Quantifying vulnerability of domains

slide-17
SLIDE 17

Vulnerable Domains running TLS

72% susceptible to AS path poisoning

slide-18
SLIDE 18

Resilience of TLS domains

Probability of CA routing to the correct AS containing the real server

slide-19
SLIDE 19

Domain resilience averaged over CAs

slide-20
SLIDE 20

CA’s defense against BGP hijacks

slide-21
SLIDE 21

Multiple vantage points

  • Protects against same prefix hijacks
  • Vantage points need to be thoughtfully chosen
  • Improves the “resilience”
slide-22
SLIDE 22

Multiple vantage points

2

slide-23
SLIDE 23

Detect malicious/ malformed route announcements

  • More flexible against all kinds of attacks
  • Uses a timing based analysis
  • Needs low false-positive rate
  • Harder to deploy
slide-24
SLIDE 24

What else can BGP attacks do?

  • Deanonymize Tor users
  • Attack the Bitcoin protocol
  • Bypass US surveillance laws

○ (So the NSA can spy on you)

slide-25
SLIDE 25

Inherent Problems with Inter-AS routing / BGP

  • Web of trust
  • Correcting bad routes requires manual intervention

○ Attacks can potentially last hours

  • New, secure protocols are hard to deploy (See secure BGP)
slide-26
SLIDE 26

List of BGP hijack incidents on Wikipedia

slide-27
SLIDE 27

Inherent problems with certificate authorities

  • Bar for becoming a CA is low
  • Needs more reliable verifying protocols

○ Out of band verification ■ Reliable ■ Inefficient

slide-28
SLIDE 28

Takeaway

  • BGP hijacks are still happening. How do we make BGP better?
  • Certificate authorities make profit-driven decisions that could compromise
  • security. How do we make CAs better?
  • Successful BGP hijacks can lead to devastating results
slide-29
SLIDE 29