- r
Three Years in the Life of the Spoofer Project
Matthew Luckie, Ken Keys, Ryan Koga, Robert Beverly, kc claffy https://spoofer.caida.org/ WTMC, August 20th 2018
Three Years in the Life of the Spoofer Project Matthew Luckie, Ken - - PowerPoint PPT Presentation
Three Years in the Life of the Spoofer Project Matthew Luckie, Ken Keys, Ryan Koga, Robert Beverly, kc claffy https://spoofer.caida.org/ WTMC, August 20th 2018 w w w . cai da. or Pitch Measurement enables solutions to fundamentally
Matthew Luckie, Ken Keys, Ryan Koga, Robert Beverly, kc claffy https://spoofer.caida.org/ WTMC, August 20th 2018
technical security problems
rigorous, publicly observable measurement
2
3
There has never been a greater need for comprehensive Internet metrics than now. Even basic security-critical facts about the Internet, such as “How many systems are botted?”
Address Validation?” remain murky and poorly quantified.
4
Attacker A Receiver R Victim V Volumetric Reflection-Amplification Attack
V R R V V R R V
small request packets large response packets src dst src dst
payload payload
systems through 2016; GitHub a 1.7Tbps attack in 2018
5
https://blog.cloudflare.com/a-winter-of-400gbps-weekend-ddos-attacks/
400Gbps 80Gbps 240Gbps Feb 7 Feb 13 Feb 19 Feb 25
their systems, per day, starting Feb 2016
6
https://blog.cloudflare.com/a-winter-of-400gbps-weekend-ddos-attacks/
1.4K 200 Oct Dec Nov 1K 600 Jan Feb Mar
new amplification vectors, or attackers using them
natural human tendencies
need to encourage remediation and change in behavior
7
attacks which employ IP Source Address Spoofing
validation” (SAV): BCP84 provides advice how to deploy
8
measure SAV deployment in the Internet
source IP addresses
project that faces incentive issues everywhere
9
https://spoofer.caida.org/
10
measuring DNSSEC deployment, or TLS properties
11
installing measurement software on their computer
attack relying on ability to spoof, or could individually contribute in a significant way
12
If we want the public to embrace Internet measurement activities, they will need to be made aware of its importance, and the potential role that the public can play in collecting and reporting data using standardized tools.
— Paul Vixie, WTMC 2016
13
benefit of other networks
practice of the network
Norms for Routing Security (MANRS)
provide funding obtained from their nation’s taxpayers
receive funding
measurement
have that
14
collecting crowd-sourced SAV measurements
reporting test outcomes
send geographically-scoped emails to network operator mailing lists
15
16
Client Spoofer Server Database TCP control connection CAIDA Ark Vantage Points Spoofed packets
network prefix can be spoofed?
17
18
https://spoofer.caida.org/
19
Signed Installers MacOS Windows Linux Open Source C++
more tests (yellow line)
20
they solicited work through Amazon Turk and similar platforms
21
transit for? Is that address space stable?
22
https://spoofer.caida.org/
23
24
Able to break down by country, perhaps useful for regional CERTs. In this case US-CERT
25
Addresses anonymized: IPv4: /24 IPv6: /40
26
NATs behave differently: Some may block spoofed traffic Some uselessly rewrite Some do not rewrite and pass spoofed packets
27
Some spoofing from behind a NAT prevented by egress filtering
28
Some networks may have deployed IPv4 filtering, but forgotten to deploy IPv6 filtering
29
30
31
32
from which we received spoofed packet
33
https://spoofer.caida.org/remedy.php
34
Inferred Remediation
Problems Inferred Monthly email to NANOG
35
Inferred Remediation
Problems Inferred Monthly email to GTER (br)
36
Sent 1543 private notifications, 328 remediation inferences Pause in notifications
’18 Jul ’18 Oct ’18 50 100 150 200 250 300 Cumulative Notification Emails Cumulative Remediation Inferences Remediation Date 200 400 600 800 1000 1200 1400 Jan ’16 Apr ’16 Jul ’16 Oct ’16 Jan ’17 Apr ’17 Jul ’17 Oct ’17 Jan ’18 Apr Notifications
Start monthly NOG emails
37
using the interface the router received the packet
38
Fraction single homed 0.3 0.35 0.4 0.45 0.5 0.55 0.6 Jan ’98 Jan ’00 Jan ’02 Jan ’04 Jan ’06 Jan ’08 Jan ’10 Jan ’12 Jan ’14 Jan ’16 Jan ’18 0.25
45% of stub ASes are single homed. Their transit providers should deploy strict uRPF.
39
ACLs are “the most bulletproof solution when done properly”, and the “best fit ... when the configuration is not too dynamic, .. if the number of used prefixes is low”. - BCP84 During 2015, ~5% and ~3% of ASes announced different IPv4 and IPv6 address space month-to-month, respectively.
Source Routeviews and RIPE RIS data
BCP−84 BCP−38 Fraction of Stub ASes 5 10 15 20 25 Jan ’98 Jan ’00 Jan ’02 Jan ’04 Jan ’06 Jan ’08 Jan ’10 Jan ’12 Jan ’14 Jan ’16 IPv6 IPv4
ACLs are the “best fit ... when the configuration is not too dynamic, .. if the number of used prefixes is low”. - BCP84 In August 2016, 86.9% of stub ASes would require an IPv4 ACL of no more than 4 prefixes. More than half of IPv4 ACLs defined in January 2012 would be unchanged 4.5 years later.
40
Source Routeviews and RIPE RIS data
August 2016: 0.4 0.6 0.8 1 2 4 6 8 10 # Prefixes in Ingress ACL Fraction of Stub ASes IPv6, 7265 ASes IPv4, 46693 ASes 0.2 IPv4 ASes IPv6 ASes 0.6 0.8 1 Jan ’12 Jan ’13 Jan ’14 Jan ’15 Jan ’16 Fraction unchanged 0.2 0.4
41
https://spoofer.caida.org/provider.php
technical security problems
publicly observable measurement
42
(DHS) Science and Technology (S&T) directorate
43