The Current State of DNS Resolvers and RPKI Protection By Erik - - PowerPoint PPT Presentation

the current state of dns resolvers and rpki protection
SMART_READER_LITE
LIVE PREVIEW

The Current State of DNS Resolvers and RPKI Protection By Erik - - PowerPoint PPT Presentation

The Current State of DNS Resolvers and RPKI Protection By Erik Dekker and Marius Brouwer 1 Motivation Why is this research important? 2 Motivation BGP is old First RFC was published in 1989 (RFC 1105) BGP was developed in times


slide-1
SLIDE 1

The Current State of DNS Resolvers and RPKI Protection

By Erik Dekker and Marius Brouwer 1

slide-2
SLIDE 2

2

Motivation

šWhy is this research important?

slide-3
SLIDE 3

3

Motivation

šBGP is old šFirst RFC was published in 1989 (RFC 1105) šBGP was developed in times when security problems were less prevalent šAnd is vulnerable for certain attacks šFor example, BGP is prone to IP Prefix Hijacks

slide-4
SLIDE 4

4

BGP IP Prefix Hijack

AS666 8.0.0.0/24 C 1.0.0.0/24 A AS1 AS5 AS3 AS4 8.0.0.0/24 B AS2

slide-5
SLIDE 5

5

Resource Public Key Infrastructure

š RPKI comes to the rescue! š Documented in RFC 6480 š But also in RFC 6481,6482, 6483, 6484, 6485, 6486, 6487, 6488, 6489, 6490, 6491, 6492, and 6493

slide-6
SLIDE 6

6

How does RPKI work?

š RIRs assign IP prefixes to network operators š For example RIPE assigns prefixes to SURFnet š RPKI allows network operators to sign their assigned IP prefixes š To prove that they have the right to originate this prefix š The RIRs host the Trust Anchors š This results in a Route Origin Authorization (ROA) record š Which contains the AS number, Prefix(es) and optionally prefix length š Routers can validate ROA records (Route Origin Validation) š ROV == RPKI filtering

slide-7
SLIDE 7

7

BGP IP Prefix Hijack with RPKI

AS1 AS2 AS3 AS666 8.0.0.0/24 B 8.0.0.0/24 C 1.0.0.0/24 A Invalid valid ROV ROA AS4 AS5

slide-8
SLIDE 8

8

DNS

š What does this have to do with DNS resolvers?

slide-9
SLIDE 9

9

BGP IP Prefix Hijack

AS1 AS2 AS3 AS666 8.0.0.0/24 B 8.0.0.0/24 C 1.0.0.0/24 A Invalid valid ROV ROA AS4 9.0.0.0/24 D DNS Server DNS Server 9.0.0.1 AS5 Resolver

slide-10
SLIDE 10

10

Example

š Amazon Route 53 BGP Hijack š All traffic directed to MyEtherWallet was hijacked

slide-11
SLIDE 11

11

Research question

š Main question: š “What is the state of RPKI filtering on DNS resolvers?” š Sub questions: š How does the length of the AS path between resolver and authoritative DNS server influence the level of RPKI protection? š How does anycast influence the protection of DNS resolvers?

slide-12
SLIDE 12

12

Scope

šNo DNSSEC šNo IPv6

slide-13
SLIDE 13

13

Method – test setup

šRIPE Atlas Probes šCan send DNS queries to their resolvers šWho query our authoritative DNS servers šBeacon šTCPdump of all the queries šMade a BGP dump

slide-14
SLIDE 14

14

Method – experiment

  • 1. $id.invalid.valid4.rootcanary.net
  • 6. $id.invalid4.rootcanary.net
  • 2. $id.invalid.valid4.rootcanary.net
  • 3. $id.invalid4.rootcanary.net
  • 4. $id.invalid4.rootcanary.net
  • 5. $id.invalid4.rootcanary.net
  • 1. A record
  • 2. A record
  • 3. Synthesized CNAME
  • 4. A record
  • 5. Answer
  • 6. Answer

Valid Invalid

slide-15
SLIDE 15

Results

15

slide-16
SLIDE 16

Results – Probe RPKI Coverage

16

2500 5000 7500 10000 2020−01−23 2020−01−24 2020−01−25 2020−01−26 2020−01−27 2020−01−28 2020−01−29 2020−01−30 2020−01−31 2020−02−01 2020−02−02 2020−02−03 Date Number of Probes Probe Protection Status

Total Probes Unprotected Partially Fully

slide-17
SLIDE 17

Results – Probe/ Resolver RPKI Coverage

17

5000 10000 15000 2020−01−23 2020−01−24 2020−01−25 2020−01−26 2020−01−27 2020−01−28 2020−01−29 2020−01−30 2020−01−31 2020−02−01 2020−02−02 2020−02−03 Date Probe/Resolver Pairs RPKI Status

Total Unprotected Protected

slide-18
SLIDE 18

18

Results – Top 10 AS

1000 2000 3000 4000 5000 15169 13335 36692 42 8881 7922 6830 3320 12322 3215 AS Queries RPKI Status

Protected Unprotected

slide-19
SLIDE 19

19

Results – Top 19 AS highest filtering ASes

1000 2000 3000 4000 13335 12322 3265 7018 7132 553 8473 13030 2119 2860 12392 4739 3301 6939 1741 1241 1759 4802 15943 AS Queries RPKI Status

Protected Unprotected

slide-20
SLIDE 20

20

Results – Influence of Cloudflare anycast

40 80 120 160 2020−01−23 2020−01−24 2020−01−25 2020−01−26 2020−01−27 2020−01−28 2020−01−29 2020−01−30 2020−01−31 2020−02−01 2020−02−02 2020−02−03 Date Cloudflare Prefixes RPKI Status

Total Unprotected Protected

slide-21
SLIDE 21

21

Results – Influence of AS path length

0.00 0.25 0.50 0.75 1.00 2 3 4 5 6 7 8 9 10 11 AS Path Length Query Ratio RPKI Status

Unprotected Protected

slide-22
SLIDE 22

22

Results – Influence of AS path length

100,000 200,000

2 3 4 5 6 7 8 9 10 11 AS Path Length Queries

slide-23
SLIDE 23

23

Results – Influence of AS path length

100,000 200,000

2 3 4 5 6 7 8 9 10 11 AS Path Length Queries 0.00 0.25 0.50 0.75 1.00 2 3 4 5 6 7 8 9 10 11 AS Path Length Query Ratio RPKI Status

Unprotected Protected

slide-24
SLIDE 24

24

Conclusions

Main Research Question: “ What is the state of RPKI filtering on DNS resolvers? ”

  • How does the length of the AS path between resolver and authoritative DNS server

influence the level of RPKI protection?

  • How does anycast influence the protection of DNS resolvers?
slide-25
SLIDE 25

25

Discussion

  • RPKI query coverage ≠ RPKI protected clients
  • Atlas probe AS could still be hijacked.
  • Small amount of ASes are fully protected
  • Expectation: Longer AS path more RPKI protection
  • Based on reverse path
  • Influence of anycast DNS relatively high and growing
  • Population of experiment is western oriented and geek biased
slide-26
SLIDE 26

26

Future Work

  • Take DNS forwarders into account in future research
  • Make use of another query generator other than RIPE Atlas for a different population
  • Place more beacons in different regions/AS
  • Focus on specific open DNS resolvers e.g. Cloudflare and Verisign Public DNS
  • Longitudinal study of ongoing data capture
  • Analyze which DNS resolvers are aided by filtering along the path.
slide-27
SLIDE 27

27

Acknowledgements

slide-28
SLIDE 28

Questions?

28