Jumpstarting BGP Security
Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira
Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai - - PowerPoint PPT Presentation
Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira BGP is insecure! Prefix hijack 1.2.0.0/16 is Mine The Internet AS 1 AS 666 1.2.0.0/16 is Mine BGP is insecure! Prefix hijacks
Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira
AS 1 AS 666
1.2.0.0/16 is Mine 1.2.0.0/16 is Mine
Victim AS 3 AS 2 AS 1 1.2/16 AS 666 1.2/16 Path: 1,2 1.2/16 Path: 1 1.2/16 Path: 1,2,3 1.2/16 Path: 666
BGP Ad. Data flow
Verify signature BGP Routers repository RPKI cache 1.2/16 à AS 1 1.2/16: AS 1 1.2/16: AS 1
AS 1 AS 666
1.2.0.0/16 is Mine 1.2.0.0/16 is Mine
Victim AS 3 AS 2 AS 1 1.2/16 AS 666 1.2/16 Path: 1,2,3 1.2/16 Path: 666
1.2/16 à AS 1 BGP Ad. Data flow
Victim AS 3 AS 2 AS 1 1.2/16 AS 666 1.2/16 Path: 1,2,3 1.2/16 Path: 1,666
1.2/16 à AS 1 BGP Ad. Data flow False `link’
AS 1 AS 666
AS1 is my neighbor
1.2.0.0/16 is Mine
AS 1 1.2/16 AS 2 Prefix: 1.2/16 Secure-Path: 1,2 AS 3 Prefix: 1.2/16 Secure-Path: 1,2,3 Matches RPKI policy? 1.2/16: AS 1 Path signature OK? Add signature, then relay Matches RPKI policy? Path signatures valid?
1.2/16 Path: 1,2
“Breaks” BGPsec
AS 2 AS 1 1.2/16 AS 3 AS 666 Legacy Adopter 1.2/16 Path: 1,666
[BGPsec design choices, IETF]
BGPSEC Design Choices and Summary of Supporting Discussions draft-sriram-bgpsec-design-choices-08
Victim AS 3 AS 2 AS 1 1.2/16 AS 666 1.2/16 Path: 1,2,3 1.2/16 Path: 1,666
1.2/16 à AS 1 AS 1 à AS 2 BGP Ad. Data flow Fake `link’
4 4.5 3.5
path-end validation
the “last hop”
significant benefits
d v a
Prefix
RPKI Did d approve reaching it via v?
4 4.5 3.5
1.2.3.0/24, but…
AS 1’s neighbor
AS 2 AS 1 1.2/16 AS 3 AS 666
AS 1 connected to AS 2? AS 1 connected to AS 3?
4 4.5 3.5
Verify signature BGP Routers repository RPKI cache 1.2/16: AS 1 AS 1 à AS 2 1.2/16: AS 1 AS 1 à AS 2 1.2/16 -> AS 1 AS 1 -> AS 2
ip as-path access-list as1 deny _[^2]_1_
[Giotsas et al., SIGCOMM’13]
BGP (no authentication) Origin authentication (RPKI) Path-end validation
BGPsec’s deployment hurdles
adopters