bgp
play

BGP Joeri de Ruiter Agenda BGP recap BGP security RPKI / ROA - PowerPoint PPT Presentation

Advanced Network Security BGP Joeri de Ruiter Agenda BGP recap BGP security RPKI / ROA BGPsec Startng (almost) from scratch 2 Autonomous systems (AS) Internet is divided into Autonomous Systems (AS) Controlled by


  1. Advanced Network Security BGP Joeri de Ruiter

  2. Agenda ● BGP recap ● BGP security RPKI / ROA ● BGPsec ● ● Startng (almost) from scratch 2

  3. Autonomous systems (AS) Internet is divided into Autonomous Systems (AS) ● Controlled by a single entty ● Difgerent types of AS ● Stub ● – Can be mult-homed Transit ● ASes can connect using peering or transit relatonships ● Internet exchanges (IX) ● Basically a big switch ● 3

  4. Border Gateway Protocol (BGP) BGP-4, RFC 4271 ● Used to route trafc between ASes ● Glues together the Internet ● Exchange routng informaton between autonomous systems ● Once connected to a peer, the full BGP routng tables are exchanged ● Afuerwards updates are sent when table changes ● 4

  5. BGP BGP route consists of ● Prefx ● Origin ● – How the prefx was introduced into BGP AS Path ● – Used for loop detecton and selecton of route Next hop ● – Where to send packets for the advertsed prefx next Optonal parameters ● 5

  6. BGP example AS1 AS2 AS3 A C B D Prefx x m n k l ● Router D announces prefx x to router C using eBGP: AS-PATH: AS3, NEXT-HOP: n ● ● Router B learns about new path through iBGP ● Router B announces prefx x to router A using eBGP: AS-PATH: AS2 AS3, NEXT-HOP: l ● 6

  7. BGP example C D AS1 AS2 AS3 A m n B E Prefx x F k l o p ● Two peering links between AS2 and AS3 ● Router D announces prefx x to router C using NEXT-HOP n ● Router F announces prefx x to router E using NEXT-HOP p ● Router B learns about new paths through iBGP Using intra-AS routng determines cost of the path to both n and p ● Store cheapest path in local routng table ● 7

  8. BGP 8

  9. BGP 9

  10. BGP security BGP plaintext and unauthentcated ● Hijacking or intercepton of prefxes ● Announce longer prefx or shorter path ● Incidents occur on a daily basis ● 10

  11. 11

  12. Atacking Tor BGP hijacking or intercepton can be used to de-anonymise users using trafc ● analysis RAPTOR: Routng atacks on privacy in Tor by Sun et al. ● Atacker only needs to observe any directon of trafc at both ends ● 12 Source: RAPTOR: Routng Atacks on Privacy in Tor, Sun et al., 2015

  13. Atacking Tor Feasability shown in experiment ● Source: RAPTOR: Routng Atacks on Privacy in Tor, Sun et al., 2015 13

  14. BGP security What security propertes do we want? ● Origin authentcaton ● You can only announce prefxes that are assigned to you ● Path authentcaton ● The complete path to the origin is verifable ● 14

  15. Resource PKI (RPKI) Deployment started in 2011 ● Described in RFC 6480 ● Makes use of existng standards ● E.g. X.509 certfcates, extended with atributes to include IP prefxes ● Certfcates used to assign prefxes ● Root CAs called Trust Anchor ● Leaf certfcates called End-Entty Certfcates ● Route Origin Authorizaton (ROA) ● Bind prefx to AS ● Signed owner of the prefx ● One-to-one mapping between End-Entty Certfcate and ROA ● 15

  16. RPKI hierarchy IANA AFRINIC APNIC RIPE NCC LACNIC ARIN LIR LIR LIR ISP ISP ISP 16

  17. Origin authentcaton Described in RFC 6493 ● Cryptographic verifcaton performed by RPKI Cache (local or at service provider) ● Download records from repository (e.g. RIRs such as RIPE) ● Verify chain, including assigned resources ● Assigned resources should be a subset of the parent’s resources ● Verifcaton against BGP announcement performed by routers ● Router retrieves stripped ROAs from RPKI Cache ● Match BGP announcements against published ROAs ● – Valid / Invalid / NotFound Verifcaton results used in policy ● Atacks stll possible ● Depends on how routes are chosen ● 17

  18. Path authentcaton BGPsec ● RFCs published last September ● RFC 8205 ● Uses RPKI ● AS-Path authentcated using signature in BGPsec-Path ● Every AS adds signature over previous signature and newly added path ● informaton Including next AS ● 18

  19. Path authentcaton - example Prefx: 131.155.0.0/16 AS2 AS-Path: AS1 BGPsec: (key1, signature1) key2 BGPsec: (key2, signature2) signature1 AS1 Prefx: 131.155.0.0/16 AS2, AS3 AS-Path: AS1 key1 BGPsec: (key1, signature1) 131.155.0.0/16 AS1, AS2 AS3 19

  20. Startng from scratch Main problem is legacy ● Adopton of new standards is very slow ● Can we do beter if we start (almost) from scratch? ● Scalability, Control, and Isolaton On Next-generaton Networks (SCION) ● Started in 2009 at CMU ● 20

  21. SCION - Architecture Autonomous systems grouped into Isolaton domains (ISDs) ● ISD core ● Trust Root Confguraton (TRC) ● – Version number – List of trusted root public keys Within AS ● Path server ● Beaconing server ● Certfcate server ● 21

  22. SCION - Architecture 22 Source: The SCION Internet Architecture: An Internet Architecture for the 21st Century, Barrera et al., 2017

  23. SCION – Intra-ISD path discovery Path Constructon Beacons (PCBs) sent using mult-path fooding ● Initalised by core nodes ● Extended and forwarded by receiving ASes ● Add incoming and outgoing interface and optonal peerings ● Eventually all nodes know how ISD core can be reached ● AS registers preferred down-segments (path from core to AS) with path ● server in the core 23

  24. SCION – Path discovery 24 Source: The SCION Internet Architecture: An Internet Architecture for the 21st Century, Barrera et al., 2017

  25. SCION – Path discovery 25 Source: The SCION Internet Architecture: An Internet Architecture for the 21st Century, Barrera et al., 2017

  26. SCION – Path Constructon Beacons Path Constructon Beacons are signed by every AS along the path ● Can be verifed within ISD ● Hop-felds (HF) can be used to later select paths ● Contain MAC computed using hop-feld key ● Only processed locally ● 26

  27. SCION – Path Constructon Beacons 27 Source: SCION: A Secure Internet Architecture, Perrig et al., 2017

  28. SCION - Routng Path constructon performed by end nodes ● Path informaton included in packet headers ● No forwarding informaton necessary at routers ● Packet-carried forwarding state (PCFS) ● Sender decides on the path ● Typically use multple paths ● Recipient address no longer used to route between autonomous systems ● Only used by the destnaton AS ● 28

  29. SCION - Routng Path can consist of three parts ● Up-segment ● Core-segment ● Down-segment ● Segments retrieved from local path server ● Local path server queries core path server for unknown segments ● Hop-felds are for selected path are combined and included in the SCION ● packet header 29

  30. SCION - Routng 30 Source: SCION: A Secure Internet Architecture, Perrig et al., 2017

  31. SCION - Routng 31 Source: SCION: A Secure Internet Architecture, Perrig et al., 2017

  32. SCION - Security Trust within ISD ● Compromise is kept locally → root key can only be used to compute ● certfcates for local ISD ISD signs Trust Root Confguraton of connected ISDs ● Provides global verifability through chain of trust ● Update to the TRC propagates within minutes ● Three PKIs ● Control-plane ● Name-resoluton ● End-entty ● 32

  33. SCION - Security Control-plane ● Comparable to RPKI ● Short-lived certfcates for ASes ● Name-resoluton ● Comparable to DNSSEC ● Typically ISD will delegate name resoluton to TLDs ● End-entty ● Comparable to TLS ● Certfcates need to be signed by multple CAs and registered at publicly ● verifable log server 33

  34. SCION – Name-resoluton security 34 Source: SCION: A Secure Internet Architecture, Perrig et al., 2017

  35. SCION – Data plane authentcaton So far, authentcaton was provided in the control place ● Authentcaton can also be provided in the data plane. ● For example using: ● OriginValidaton, packet originates from source ● PathTrace, packet followed indicated trace ● Origin and Path Trace (OPT) ● 35

  36. SCION - OriginValidaton Source shares a symmetric key with every AS on the path ● Additonal informaton in header ● DataHash: hash over payload ● SessionID: session identfer picked by source ● List of OV values: MAC over DataHash with key shared between source ● and AS or destnaton Every intermediate AS and the destnaton verify its corresponding OV value ● Overhead linear in number of ASes on the path ● 36

  37. SCION - PathTrace Source and destnaton share a symmetric key with every AS on the path ● Additonal informaton in header ● DataHash: hash over payload ● SessionID: session identfer picked by source ● PVF: MAC over DataHash and previous value of PVF ● Every intermediate AS updates the PVF value ● Overhead constant ● Destnaton can compute MAC over data hash and fnal PVF for source to ● verify path Verifcaton can be performed later: retroactve-PathTrace ● 37

  38. Summary BGP provides no secure by default ● Hijacking and intercepton possible ● Origin authentcaton provided by RPKI and RAOs ● BGPsec introduces path authentcaton ● SCION introduces a new architecture that provides more security by design ● 38

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend