Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs
Marcin Nawrocki, Jeremias Blendin, Christoph Dietzel, Thomas C. Schmidt, Matthias Wählisch
Down the Black Hole: Dismantling Operational Practices of BGP - - PowerPoint PPT Presentation
Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs Marcin Nawrocki, Jeremias Blendin, Christoph Dietzel, Thomas C. Schmidt, Matthias Whlisch Christmas is near!
Marcin Nawrocki, Jeremias Blendin, Christoph Dietzel, Thomas C. Schmidt, Matthias Wählisch
2 https://www.shutterstock.com/video/clip-1584091-small-red-christmas-present-looping-on-white
3
4
I hate Christmas ...
https://indac.org/blog/the-grinch-official-trailer-3/
5
I hate Christmas ...
https://indac.org/blog/the-grinch-official-trailer-3/ https://blogvaronis2.wpengine.com/wp-content/uploads/2019/09/ddos-attack-hero-1200x401.png
6
The problem!
The solution?
7
Blackholing is an effective measure to mitigate DDoS
8
Blackholing is an effective measure to mitigate DDoS
9
? ?
Blackholing drops only 50% of unwanted traffic. Fine-grained blacklisting of attack signatures is an effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. Other use cases exist for Blackholing but are very rare.
10
Efficiency Use Cases
How does BGP Blackholing work at IXPs?
How well deployed is Blackholing in the real world?
How should we configure fine-grained filtering?
11
12 https://www.hasepost.de/freiwillige-feuerwehr-sammelt-tannenbaeume-ein-2114/
13
IXP Routeserver Peer AS1 Peer AS3 Peer AS2 Peering platform Webserver Victim AS
14
IXP Routeserver Peer AS1 Peer AS3 Peer AS2 Peering platform Webserver Victim AS DDoS Traffic Legitimate Traffic
15
IXP Routeserver Peer AS1 Peer AS3 Peer AS2 Peering platform Webserver Victim AS Blackhole BGP Signal: RTBH for 1.2.3.4/32 IP: 1.2.3.4
16
IXP Routeserver Peer AS1 Peer AS3 Peer AS2 Peering platform Webserver Victim AS Blackhole BGP Signal: RTBH for /32
That's the simple case. BGP policies apply in the real world.
17
IXP Routeserver Peer AS1 Peer AS3 Peer AS2 Peering platform Webserver BGP Signal: RTBH for 1.2.3.4/32 Victim AS BGP Rejection Policy
18
IXP Routeserver Peer AS1 Peer AS3 Peer AS2 Peering platform Webserver Victim AS BGP Rejection Policy Blackhole
19 https://unternehmensberatungralfmueller .wordpress.com/ 2011/12/15/weihnachten-einfach-weihnachten/
One of the worlds-largest IXPs as a central vantage point Wholistic view: >100 days, all related data - no exceptions!
20
One of the worlds-largest IXPs as a central vantage point Wholistic view: >100 days, all related data - no exceptions!
BGP data
servers
by BGP community and next-hop-IP
21
BGP Signal: RTBH for 1.2.3.4/32
One of the worlds-largest IXPs as a central vantage point Wholistic view: >100 days, all related data - no exceptions!
Flow data
have been blackholedat least once
switch-fabric (Sampling: 1/10000)
special MAC-address
22
DDoS Traffic Legitimate Traffic
One of the worlds-largest IXPs as a central vantage point Wholistic view: >100 days, all related data - no exceptions!
Flow data
have been blackholedat least once
switch-fabric (Sampling: 1/10000)
special MAC-address BGP data
servers
by BGP community and next-hop-IP
23
We verified: Time is in sync!
24
25
26
27
/32-RTBHs have a mean drop rate of 50%. But they cover 99% of the to-be-blackholed traffic.
28
29
30
31
Multiple RTBHs!
32
Time-based clustering
33
What happens before RTBH Events?
Use a sliding window algorithm (EWMA) to infer whether one of the monitored features exhibits an anomalous peak:
i. number of packets ii. number of unique destination ports
v. number of non-TCP flows
34
35
TCP SYN Attacks GRE Floods Amplification Attacks
Use a sliding window algorithm (EWMA) to infer whether one of the monitored features exhibits an anomalous peak:
i. number of packets ii. number of unique destination ports
v. number of non-TCP flows
36
37
This short reaction time indicates automatic DDoS mitigation.
38
Traffic ≤ 72 hours Anomaly ≤ 10 min % RTBH Events ✓ ✓ 27% ✓ ✗ 27% ✗
39
40
Prefix Squatting Protection
Prevent hijacking of address space that is assigned but not announced. Prefix squatting is easy to deploy because there is no competitive announcement. Deploy censorship by blackholing traffic to content servers. Block malicious clients, e.g., port & vulnerability scanners.
Content Blocking
41
Prefix Length [bits]
RTBH Events (log10)
42
Prefix Squatting Protection
Prevent hijacking of address space that is assigned but not announced. Prefix squatting is easy to deploy because there is no competitive announcement. Deploy censorship by blackholing traffic to content servers. Block malicious clients, e.g., port & vulnerability scanners.
Content Blocking
New use-cases are infrequent. 70% of RTBH Events still inexplicable.
interconnectionshide traffic.
43
https://de.wikipedia.org/wiki/Datei:Iceberg.jpg
interconnectionshide traffic.
presence despite local attacks.
44
https://de.wikipedia.org/wiki/Datei:Iceberg.jpg
interconnectionshide traffic.
presence despite local attacks. But: Related work [IMC'18] using distributed measurements reached similar results!
45
https://de.wikipedia.org/wiki/Datei:Iceberg.jpg Jonker et al, A First Joint Look at DoS Attacks and BGP Blackholing, IMC 2018
46 https://community.today.com/parentingteam/post/what-are-the-best-christmas-gifts-for-kids-this-year https://www.youtube.com/watch?v=-pH9VX324rI
RTBHs drop DDoS traffic early in the network. RTBHs complete the attack, the victim is unreachable.
47
THE GOOD THE UGLY
RTBHs drop DDoS traffic early in the network. RTBHs complete the attack, the victim is unreachable.
48
THE GOOD THE UGLY Fine-grained filtering would keep a service reachable.
Blackhole
49
IXP Routeserver Peer AS1 Peer AS3 Peer AS2 Peering platform Webserver Victim AS IP: 1.2.3.4 Legitimate Traffic: Port 80 and 443
50
51
Visualizing multidimensional port information allows a classification into clients and servers
https://de.wikipedia.org/wiki/Datei:Jahn-Bergturnfest_2006_tug_of_war .jpg
52
Visualizing multidimensional port information allows a classification into clients and servers
https://de.wikipedia.org/wiki/Datei:Jahn-Bergturnfest_2006_tug_of_war .jpg
FEATURE 2: number of different source ports FEATURE 1: number of different destination ports
53
54
Most of the protected IP addresses are clients.
55
56
Most clients located in DSL networks. PeeringDB supports our classification.
57 https://www.nytimes.com/2018/11/07/movies/the-grinch-review.html
58 https://www.nytimes.com/2018/11/07/movies/the-grinch-review.html https://knowyourmeme.com/memes/first-day-on-the-internet-kid
59 https://www.nytimes.com/2018/11/07/movies/the-grinch-review.html https://knowyourmeme.com/memes/first-day-on-the-internet-kid https://blogvaronis2.wpengine.com/wp-content/uploads/2019/09/ddos-attack-hero-1200x401.png
Clients are often affected by BGP Blackholing. Whitelisting of regular, expected traffic patterns is not an option.
60
61
almost exclusively UDP amplification traffic
than three amplification vectors:
62
Fine-grained filtering based on source- ports is very effective and potentially saves legitimate traffic! Filter example: CharGEN/19, DNS/53, NTP/123
63
64
Have you been a good network operator?
http://phdcomics.com/comics/archive.php?comicid=395
But how?
Accept more specific prefixes, in particular /32, in case of RTBH announcements.
Routing tables may contain many unnecessary/inexplicable RTBH
Majority of DDoS attacks are still not complex. Simple port-based blacklisting (ACLs, BGP Flowspec) can be very effective.
65
66
68
69
70
71
1287 Mbps
corresponds up to 100k packets per second
sampling!
72
73
74
75
76
77
by scans and spoofed traffic
Events
during an attack
78
80