jumpstarting bgp security
play

Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai - PowerPoint PPT Presentation

Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira BGP is insecure! Prefix hijack 1.2.0.0/16 is Mine The Internet AS 1 AS 666 1.2.0.0/16 is Mine BGP is insecure! Prefix hijacks


  1. Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira

  2. BGP is insecure! • Prefix hijack 1.2.0.0/16 is Mine The Internet AS 1 AS 666 1.2.0.0/16 is Mine

  3. BGP is insecure! Prefix hijacks Victim 1.2/16 1.2/16 Path: 1,2,3 AS 3 Path: 666 AS 666 1.2/16 Path: 1,2 AS 2 1.2/16 BGP Ad. Data flow AS 1 Path: 1 1.2/16

  4. Resource PKI (RPKI) • Origin Authentication • Protects against prefix/subprefix hijacks • Slowly gaining traction (protects 6% of prefixes) Verify signature RPKI cache 1.2/16 à AS 1 repository 1.2/16: AS 1 1.2/16: AS 1 BGP Routers

  5. BGP is insecure! • Prefix/Subprefix Hijack 1.2.0.0/16 is Mine The Internet AS 1 AS 666 1.2.0.0/16 is Mine

  6. RPKI prevents prefix hijacks 1.2/16 1.2/16 Victim Path: 1,2,3 Path: 666 1.2/16 à AS 1 AS 3 AS 666 AS 2 BGP Ad. Data flow AS 1 1.2/16

  7. Next-AS attack circumvents RPKI 1.2/16 1.2/16 Victim Path: 1,2,3 Path: 1,666 1.2/16 à AS 1 AS 3 AS 666 AS 2 AS 1 1.2/16 BGP Ad. False `link’ Data flow

  8. BGP is insecure! • Next-AS Attack 1.2.0.0/16 is Mine The Internet AS 1 AS 666 AS1 is my neighbor

  9. Current paradigm: a two step solution • First, RPKI against prefix-hijacking • Then, add BGPsec • Protects against false paths (e.g., next-AS attacks) • Deployment challenge: •Real-time signature and validation •Different message format Prefix: 1.2/16 Prefix: 1.2/16 Secure-Path: 1,2,3 Secure-Path: 1,2 Matches RPKI policy? 1.2/16: AS 1 AS 1 AS 2 AS 3 Matches RPKI policy? Path signature OK? Add signature, 1.2/16 Path signatures valid? then relay

  10. BGPsec in partial adoption? Meager benefits [Lychev et al., SIGCOMM’13] • AS 666 launches a next-AS attack against AS 1 • Not prevented by BGPsec Legacy Adopter “Breaks” BGPsec 1.2/16 1.2/16 Path: 1,666 Path: 1,2 AS 1 AS 2 AS 3 1.2/16 AS 666

  11. BGPsec: deployment challenges • Changes to BGP routers: • Online crypto requires new hardware [BGPsec design choices, IETF] • Different message format • legacy messages coexist with new format • BGPsec is not “a minor extension” of BGP BGPSEC Design Choices and Summary of Supporting Discussions draft-sriram-bgpsec-design-choices-08

  12. Goals • Easy deployment, minimal overhead • Signatures and verifications: only offline, off-router • Significant security benefits in partial deployment • No changes to routing protocol

  13. Path-end validation 1.2/16 1.2/16 Victim Path: 1,2,3 Path: 1,666 1.2/16 à AS 1 AS 3 AS 666 AS 1 à AS 2 AS 2 AS 1 1.2/16 Fake `link’ BGP Ad. Data flow

  14. Path-end validation • Key insight: “last hop” is critical • Extend RPKI to authenticate the “last hop” 4.5 4 3.5

  15. Path-end validation • Path-end validation extends RPKI to authenticate the “last hop” 4.5 • Key insight: Securing path-suffixes provides significant benefits 4 RPKI d Prefix 3.5 v path-end validation a Did d approve reaching it via v?

  16. Intuition • AS 666 wants to attract AS 3’s traffic to IP prefix 1.2.3.0/24, but… • It can’t announce that it owns the prefix or is 4.5 AS 1’s neighbor • It has to launch 2-hop attack : (prefix: 1,2,666) 4 AS 1 connected to AS 2? 3.5 AS 1 connected to AS 3? AS 1 AS 2 AS 3 1.2/16 AS 666

  17. Deployment Verify signature 1.2/16 -> AS 1 AS 1 -> AS 2 RPKI cache repository 1.2/16: AS 1 1.2/16: AS 1 AS 1 à AS 2 AS 1 à AS 2 BGP Routers

  18. Deployment: today! ip as-path access-list as1 deny _[^2]_1_ • Use existing Access List interface • Validated suffix extends automatically with adoption

  19. Evaluating impact • How significant is path-end validation? • Empirically-derived AS-level network from CAIDA • Including inferred peering links [Giotsas et al., SIGCOMM’13] • Evaluate fraction of ASes an attacker can attract • For different adoption scenarios • For different types of attack • Using the simulation framework in [Gill et al., CCR’12]

  20. Simulation results

  21. Simulation results

  22. Simulation results

  23. Impact of authenticating hops BGP (no authentication) Origin authentication (RPKI) Path-end validation

  24. Local deployment

  25. Additional results • Local deployment protects local traffic • Large content providers are better protected • Path-end validation mitigates high profile incidents • Security monotone

  26. Conclusion • Path-end validation • Is a modest extension to RPKI • Can significantly impact BGP security while avoiding BGPsec’s deployment hurdles • We advocate • Incorporating path-end validation into the RPKI • Regulatory/financial efforts on gathering critical mass of adopters

  27. Thank You

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend