Deployment on BGP Security Alexandru tefnescu alex.stefa@gmail.com - - PowerPoint PPT Presentation

deployment on bgp
SMART_READER_LITE
LIVE PREVIEW

Deployment on BGP Security Alexandru tefnescu alex.stefa@gmail.com - - PowerPoint PPT Presentation

Effects of RPKI Deployment on BGP Security Alexandru tefnescu alex.stefa@gmail.com Benno Overeinder Guillaume Pierre NLnetLabs VU Amsterdam benno@nlnetlabs.nl gpierre@cs.vu.nl VU Amsterdam 12 July 2011 Outline BGP Routing


slide-1
SLIDE 1

Effects of RPKI Deployment on BGP Security

Alexandru Ștefănescu

alex.stefa@gmail.com

VU Amsterdam – 12 July 2011

Benno Overeinder

NLnetLabs

benno@nlnetlabs.nl

Guillaume Pierre

VU Amsterdam

gpierre@cs.vu.nl

slide-2
SLIDE 2

Outline

Introduction 2

BGP Routing Securing BGP BGP Modeling & Simulation Simulation Results

slide-3
SLIDE 3

3

slide-4
SLIDE 4

AS Level Internet

BGP Routing 4

From http://en.wikipedia.org/wiki/File:Internet_Connectivity_Distribution_%26_Core.svg

slide-5
SLIDE 5

Border Gateway Protocol (BGP)

BGP Routing 5

Responsible for Internet connectivity Concepts

Autonomous System (AS) Prefix routing

Routing decisions based on

Path length Network policies Business relations (customer, provider, peer, sibling)

Scaling at massive rate

AS count: ~37k Prefix count: ~360k (IPv4) & ~7k (IPv6)

slide-6
SLIDE 6

Problems with BGP

BGP Routing 6

BGP pathological behaviors

Large number of types of attack have been described Very few mitigation actions taken

Increased impact of attacks on today’s Internet as an essential and ubiquitous service

Pakistan Telecom hijacking of YouTube in Feb 2008 15% of global Internet traffic redirected through China Telecom for 18min in April 2010 (acknowledged months later)

slide-7
SLIDE 7

Securing BGP

Securing BGP 7

Main cause of malfunction: misconfiguration Several security additions proposed: S-BGP, psBGP, soBGP, IRV, etc Most important based on RPKI deployment BGP cannot be secured overnight! ASes as commercial entities must also realize it’s in their own interest

slide-8
SLIDE 8

Project Goals

Goals 8

Study the effect of BGP deployment scenarios Find out order to start securing ASes for maximum benefit Better protocol understanding: relation between no. of secured ASs and validated routes

Impact of securing just biggest ASs (e.g. Tier 1) How important is securing CDNs?

slide-9
SLIDE 9

BGP Security Mechanisms

Securing BGP 9

Secure Origin Authentication (SOA)

Routes in BGP updates contain signature of origin AS Each AS validates signature by looking in a distributed cache Will there be downtimes?

Path Validation (PV)

When forwarding route advertisements to neighbors, ASes sign route with chain hash function

slide-10
SLIDE 10

BGP Modeling & Simulation (1)

BGP Simulation 10

You can’t simulate the Internet! Abstract protocol and network:

no physical network modeling, 1 AS = 1 node (ignore IBGP) standard BGP features: explicit prefix tables, announce and withdraw messages, route propagation according to policies, etc.

Security model:

tag BGP messages as being validated or not security policies assigned to ASes individually

slide-11
SLIDE 11

BGP Modeling & Simulation (2)

BGP Simulation 11

Allow for easy implementation of security solutions

We can emulate practically any proposed security additions

Do not perform crypto computations, but emulate Abstract what you can, but run everything in (scaled) real-time Gather as much real-world data/scenarios and run the simulation upon them

slide-12
SLIDE 12

Our Simulator

BGP Simulation 12

Enhanced version of simulator by

  • M. Wojciechowski (2009)

Java simulator running on DAS-4 homogeneous cluster; low latency network Each AS is a separate thread (>1000 threads per node) Allows easy tweaking of BGP behavior and security policies Uses network annotated adjacencies from CAIDA for 2010

slide-13
SLIDE 13

BGP Topology

BGP Simulation 13

slide-14
SLIDE 14

BGP Topology

BGP Simulation 14

slide-15
SLIDE 15

Simulation Process

BGP Simulation 15

Running scenarios:

1. Assign security policies in various percentages 2. Announce the same prefix from two ASes (one secured AS and one rogue AS) 3. Wait for prefix to propagate 4. Count routes to secured AS

Factors:

What if topology changes? What is the impact of different types of security policies? What is the impact of different security policy distributions? How does it differ when prefix announced by stubs vs. large ASs?

slide-16
SLIDE 16

Security Policies

BGP Simulation 16

Ignore

Standard BGP

Prefer

Choose validated route between routes of same length Most realistic

Secure

Always prefer validated routes over unknown

Strict

Accept only validated routes

Uncertain

Same as Secure, but introducing introducing route validation unavailability in 10% of cases

slide-17
SLIDE 17

SOA: Global Deployment – Random Strategy

SOA Simulation Results 17

AS3265 / XS4ALL / #2127 AS30890 / Evolva Intercom SRL / #168

VS.

slide-18
SLIDE 18

SOA: Global Deployment – Top-down Strategy

SOA Simulation Results 18

AS3265 / XS4ALL / #2127 AS30890 / Evolva Intercom SRL / #168

VS.

slide-19
SLIDE 19

SOA: Global Deployment – Medium Strategy

SOA Simulation Results 19

AS3265 / XS4ALL / #2127 AS30890 / Evolva Intercom SRL / #168

VS.

slide-20
SLIDE 20

Inducing un-connectivity

SOA Simulation Results 20

slide-21
SLIDE 21

Internet RIRs

SOA Simulation Results 21

slide-22
SLIDE 22

SOA: RIPE Deployment – Random Strategy

SOA Simulation Results 22

AS3265 / XS4ALL / #2127 AS30890 / Evolva Intercom SRL / #168

VS.

slide-23
SLIDE 23

Securing CDNs

SOA Simulation Results 23

The New Internet – “Hyper Giants” CDNs

Craig Labovitz (Arbor Networks)

slide-24
SLIDE 24

SOA: Global Deployment – Random Strategy

SOA Simulation Results 24

AS15169/ Google Inc. / #119 AS45773 / PERN AS Islamabad / #10436

VS.

slide-25
SLIDE 25

PV: Global Deployment – Top-down Strategy

PV Simulation Results 25

AS1357/ Vodafone Espana / #4156 AS35725 / Cosmote RO / #4118

VS.

slide-26
SLIDE 26

Conclusions

Any questions? 26

A bit better understanding of BGP More detailed simulations of security deployment Guide for favorable turnover for investments in BGP security Results show trends instead of specific AS behavior due to many levels of abstractions Future study: Include time dynamic experiments in study (convergence time of validated vs. rogue prefix announcements)