Kyoto, Japan APRICOT 2005 1
BGP Security Techniques
Danny McPherson danny@arbor.net
BGP Security Techniques Danny McPherson danny@arbor.net Kyoto, - - PowerPoint PPT Presentation
BGP Security Techniques Danny McPherson danny@arbor.net Kyoto, Japan APRICOT 2005 1 Agenda Overview & Discussion Context BGP Blackhole Routing BGP Diversion BGP Route Tagging BGP Flow Specification Analyzing
Kyoto, Japan APRICOT 2005 1
Danny McPherson danny@arbor.net
Kyoto, Japan APRICOT 2005 2
Kyoto, Japan APRICOT 2005 3
Kyoto, Japan APRICOT 2005 4
Kyoto, Japan APRICOT 2005 5
capacity!
03, only 4 employed address spoofing - "spoofing is out of vogue”?
probable.
space and explicitly targeting "easy pickens” prefixes such as 24/8.
a system in order to "keep it” -- they probably install more patches than users!
Kyoto, Japan APRICOT 2005 6
Kyoto, Japan APRICOT 2005 7
(RTBH), or Blackhole Filtering; results in packets being forwarded to a routers bit bucket, also known as:
– Null Interface – Discard Interface
– Destination-based BGP Blackhole Routing – Source-based BGP Blackhole Routing (coupling uRPF) – Customer-triggered
packets being dropped with minimal or no performance impact
Kyoto, Japan APRICOT 2005 8
FIB
Filter
Packets Arrive
processing
Egress Interface
Kyoto, Japan APRICOT 2005 9
NOC A B C D E F G
Target
Peer B Peer A
IXP-W IXP- E
Upstream A Upstream B Upstream B
POP
Upstream A Customers
Attack causes Collateral Damage
Kyoto, Japan APRICOT 2005 10
NOC A B C D E F G
BGP Advertises Black Holed Prefixes Target
Peer B Peer A IXP-W IXP-E
Upstream A Upstream B Upstream B
POP
Upstream A
Kyoto, Japan APRICOT 2005 11
Kyoto, Japan APRICOT 2005 12
Kyoto, Japan APRICOT 2005 13
Kyoto, Japan APRICOT 2005 14
AS 100 AS 65530
10.1/16
AS 65531
10.1.0/19 10.1.32/19 10.1.64/19
H G F E D C B A
Kyoto, Japan APRICOT 2005 15
AS 100 AS 65530
10.1/16
10.1/19, 10.1.96/19 & 10.1.128/17 addresses
AS 65531
10.1.0/19 10.1.32/19 10.1.64/19
Scans, Backscatter, Other Garbage
A C B E D F G H
Kyoto, Japan APRICOT 2005 16
AS 100 AS 65530
10.1/16
AS 65531
10.1.0/19 10.1.32/19 10.1.64/19
Scans, Backscatter, Worms, Other Garbage
10.1.0/19 & 10.128/17
C A D G E B H F
data processing from routers
routers
Kyoto, Japan APRICOT 2005 17
those advertisements) to Sinkholes
anywhere in the iBGP mesh (careful about MEDs and aggregates)
To ISP Backbone To ISP Backbone To ISP Backbone
Sinkhole Gateway Target Router Sniffers and Analyzers
Target router receives the garbage Advertise CIDR blocks with Static Lock-ups pointing to the target router
Kyoto, Japan APRICOT 2005 18
Kyoto, Japan APRICOT 2005 19
– http://www.ietf.org/internet-drafts/draft-marques-idr-flow-spec-02.txt
Kyoto, Japan APRICOT 2005 20
criteria that can be applied to IP packet data
NEXT_HOP)
encode/trigger a pre-defined set of actions (e.g., blackhole, PBR, rate-limit, divert, etc..)
corresponds to a distinct set of RIBs
database
Kyoto, Japan APRICOT 2005 21
Kyoto, Japan APRICOT 2005 22
– flow-spec@tcb.net
Kyoto, Japan APRICOT 2005 23
Kyoto, Japan APRICOT 2005 24
Kyoto, Japan APRICOT 2005 25
Kyoto, Japan APRICOT 2005 26
Kyoto, Japan APRICOT 2005 27
02.txt
Presentation at NANOG 32, October 2004.
WORM’04: Proceedings of the 2004 ACM workshop on Rapid Malcode, 2004.
Kyoto, Japan APRICOT 2005 28