Three Years in the Life of the Spoofer Project Matthew Luckie, Ken - - PowerPoint PPT Presentation

three years in the life of the spoofer project
SMART_READER_LITE
LIVE PREVIEW

Three Years in the Life of the Spoofer Project Matthew Luckie, Ken - - PowerPoint PPT Presentation

Three Years in the Life of the Spoofer Project Matthew Luckie, Ken Keys, Ryan Koga, Robert Beverly, kc claffy https://spoofer.caida.org/ WTMC, August 20th 2018 w w w . cai da. or Pitch Measurement enables solutions to fundamentally


slide-1
SLIDE 1 w w w . cai da.
  • r

Three Years in the Life of the Spoofer Project

Matthew Luckie, Ken Keys, Ryan Koga,
 Robert Beverly, kc claffy https://spoofer.caida.org/ WTMC, August 20th 2018

slide-2
SLIDE 2

Pitch

  • Measurement enables solutions to fundamentally non-

technical security problems

  • Peer pressure
  • Industry standards (common practices)
  • Regulation
  • Whatever the solution is, it cannot be effective without

rigorous, publicly observable measurement

2

slide-3
SLIDE 3

Flashback: WTMC 2016 keynote

3

There has never been a greater need for comprehensive Internet metrics than now.
 Even basic security-critical facts about the
 Internet, such as “How many systems are botted?”


  • r “What networks still don’t do Source

Address Validation?” remain murky and
 poorly quantified.

“ ”

slide-4
SLIDE 4

Why does SAV matter?

  • Attacker sends packet with spoofed source IP address
  • Receiver cannot always know if packet’s source is authentic

4

Attacker A Receiver R Victim V Volumetric Reflection-Amplification Attack

V R R V V R R V

small
 request
 packets large
 response
 packets src dst src dst

payload payload

slide-5
SLIDE 5

Why does SAV matter?

  • Lack of filtering allows anonymous denial of service attacks.
  • Example: CloudFlare reports 400Gbps attacks on their

systems through 2016; GitHub a 1.7Tbps attack in 2018

5

https://blog.cloudflare.com/a-winter-of-400gbps-weekend-ddos-attacks/

400Gbps 80Gbps 240Gbps Feb 7 Feb 13 Feb 19 Feb 25

slide-6
SLIDE 6

Why does SAV matter?

  • Lack of filtering allows anonymous denial of service attacks.
  • Example: CloudFlare reports >1K DoS attack events on

their systems, per day, starting Feb 2016

6

https://blog.cloudflare.com/a-winter-of-400gbps-weekend-ddos-attacks/

1.4K 200 Oct Dec Nov 1K 600 Jan Feb Mar

slide-7
SLIDE 7

Why does SAV matter?

  • Impossible to prevent people from accidentally opening up

new amplification vectors, or attackers using them

  • We must instead make the infrastructure resilient to these

natural human tendencies

  • 2013 DNS: 300 Gbps against Spamhaus
  • 2014 NTP: 400 Gbps against Cloudflare
  • 2018 memcached: 1.7 Tbps attack against GitHub
  • Not enough to just measure SAV deployment;


need to encourage remediation and change in behavior

7

slide-8
SLIDE 8

Defenses

  • BCP38: Network ingress filtering: defeating denial of service

attacks which employ IP Source Address Spoofing

  • https://tools.ietf.org/html/bcp38
  • May 2000
  • BCP84: Ingress filtering for multi-homed networks
  • https://tools.ietf.org/html/bcp84
  • March 2004
  • Not always straightforward to deploy “source address

validation” (SAV): BCP84 provides advice how to deploy

8

slide-9
SLIDE 9

The Spoofer Project

  • A DHS-funded crowd-sourced effort (2015-present) to

measure SAV deployment in the Internet

  • Project started by Robert Beverly while MIT student (2005)
  • Measures ISP filtering practices for packets with spoofed

source IP addresses

  • Important security issue in the Internet to measure, but a

project that faces incentive issues everywhere

9

https://spoofer.caida.org/

slide-10
SLIDE 10

Incentive Issues everywhere

  • Incentive incompatible problem for
  • Research Community
  • Crowd-sourcing Volunteers
  • Network Operators
  • Funding Agencies

10

slide-11
SLIDE 11

Incentive Issues: Research Community

  • SAV measurement has a high cost of entry compared

measuring DNSSEC deployment, or TLS properties

  • SAV requires a Vantage Point in a network of interest
  • Hard to get an Internet-wide sample to publish on SAV
  • Inevitable questions about sample bias

11

slide-12
SLIDE 12

Incentive Issues: Volunteers

  • To obtain an Internet-wide view, we rely on volunteers

installing measurement software on their computer

  • Few volunteers are likely to have been the victim of an

attack relying on ability to spoof, or could individually contribute in a significant way

12

If we want the public to embrace Internet
 measurement activities, they will need to be
 made aware of its importance, and the potential
 role that the public can play in collecting and reporting data using standardized tools.

“ ”

— Paul Vixie, WTMC 2016

slide-13
SLIDE 13

Incentive Issues: Network Operators

13

  • Deploying source address validation is primarily for the

benefit of other networks

  • Incentive not clear for some networks
  • majority of networks do seem to deploy filtering
  • filtering gives an operator moral high-ground to pressure
  • ther networks to deploy, which does benefit the operator
  • “Cyber Insurance” takes into account security


practice of the network

  • ISOC RoutingManifesto.org: Mutually Agreed


Norms for Routing Security (MANRS)

slide-14
SLIDE 14

Incentive Issues: Funding Agencies

  • SAV is a global problem; typically individual governments

provide funding obtained from their nation’s taxpayers

  • Need to have impact for a project to continue to

receive funding

  • Limited commercialization opportunities for SAV

measurement

  • Class of public health task, but computer security doesn’t

have that

14

slide-15
SLIDE 15

Three Years in the Life of Spoofer

  • Data Collection: we built a new software system for

collecting crowd-sourced SAV measurements

  • Data Reporting: we built a public-facing website for

reporting test outcomes

  • Remediation: we privately contact network operators, and

send geographically-scoped emails to network operator mailing lists

15

slide-16
SLIDE 16

Spoofer: Client/Server Overview

16

Client Spoofer
 Server Database TCP control connection CAIDA Ark Vantage Points Spoofed
 packets

slide-17
SLIDE 17

Spoofer Client Overview

  • Client tests ability to spoof packets of different types
  • Routed and Private addresses
  • IPv4 and IPv6
  • Leaving and Entering the network hosting the client
  • traceroute to infer forward path to destinations
  • tracefilter to infer first location of filtering in a path
  • traceroute but with spoofed packets
  • Filtering prefix granularity: how many addresses in the same

network prefix can be spoofed?

17

slide-18
SLIDE 18

Spoofer Client Overview

  • opt-in to publicly share anonymized results, and

  • pt-in to share unanonymized results for remediation
  • Automatically tests networks the host is attached to,
  • nce per week, by running in the background
  • GUI to browse test results from your host, and schedule tests
  • Speed improvements through parallelized probing

18

https://spoofer.caida.org/

slide-19
SLIDE 19

Spoofer Client GUI

19

Signed
 Installers MacOS
 Windows
 Linux Open
 Source C++

slide-20
SLIDE 20

Client/Server Deployment

  • Since releasing new client in May 2016, increasing trend of

more tests (yellow line)

  • Benefit of system running in background

20

slide-21
SLIDE 21

Client/Server Deployment

  • Peak coincided with experiments by Qasim Lone et al. when

they solicited work through Amazon Turk and similar platforms

  • TMA 2018 paper

21

slide-22
SLIDE 22

Spoofer Reporting Engine

  • Publicly shows outcomes of sharable tests
  • Allows users to select outcomes
  • per country: which networks in a country need attention?
  • per ASN: which subnets need attention?
  • per provider: which of my BGP customers can spoof?
  • What address space does an AS announce, or could act as

transit for? Is that address space stable?

  • Useful for deploying ACLs

22

https://spoofer.caida.org/

slide-23
SLIDE 23

Reporting Engine: Recent Tests

23

slide-24
SLIDE 24

Reporting Engine: Recent Tests

24

Able to break down by country, perhaps
 useful for regional CERTs.
 In this case US-CERT

slide-25
SLIDE 25

Reporting Engine: Recent Tests

25

Addresses anonymized: IPv4: /24 IPv6: /40

slide-26
SLIDE 26

Reporting Engine: Recent Tests

26

NATs behave differently: Some may block spoofed traffic Some uselessly rewrite Some do not rewrite and pass spoofed packets

slide-27
SLIDE 27

Reporting Engine: Recent Tests

27

Some spoofing from behind a NAT
 prevented by egress filtering

slide-28
SLIDE 28

Reporting Engine: Recent Tests

28

Some networks may have deployed IPv4 filtering,
 but forgotten to deploy IPv6 filtering

slide-29
SLIDE 29

IPv4 Spoofing: All Tests

  • 5K IPs tested per 30 days starting 2017
  • 19% of tested ASes did not block spoofed packets
  • 5% of tested IPv4 blocks did not block spoofed packets

29

slide-30
SLIDE 30

IPv4 Spoofing: No NAT Tests

  • 600 to 700 IPs tested per 30 days starting 2017
  • ~35% of tested ASes did not block spoofed packets
  • 15% of tested IPv4 blocks did not block spoofed packets

30

slide-31
SLIDE 31

IPv6 Spoofing

  • 1.5K to 2K IPs tested per 30 days starting 2017
  • ~35% of tested ASes did not block spoofed packets
  • 15% of tested IPv6 blocks did not block spoofed packets

31

slide-32
SLIDE 32

Fraction of prefixes not filtering by country

32

slide-33
SLIDE 33

Notifications and Remediation

  • Currently, we send notifications to abuse contacts of prefixes

from which we received spoofed packet

  • We have also started to send geo-scoped emails to NOG lists

33

https://spoofer.caida.org/remedy.php

slide-34
SLIDE 34

Notifications and Remediation

34

Inferred
 Remediation

Problems Inferred Monthly
 email to
 NANOG

} }

slide-35
SLIDE 35

Notifications and Remediation

35

Inferred
 Remediation

Problems Inferred Monthly
 email to
 GTER (br)

} }

slide-36
SLIDE 36

Notifications and Remediation

36

Sent 1543 private notifications, 328 remediation inferences Pause in
 notifications

’18 Jul ’18 Oct ’18 50 100 150 200 250 300 Cumulative Notification Emails Cumulative Remediation Inferences Remediation Date 200 400 600 800 1000 1200 1400 Jan ’16 Apr ’16 Jul ’16 Oct ’16 Jan ’17 Apr ’17 Jul ’17 Oct ’17 Jan ’18 Apr Notifications

Start monthly
 NOG emails

slide-37
SLIDE 37

Is SAV hard to deploy?

37

  • Two distinct approaches:
  • Unicast Reverse Path Forwarding (uRPF)
  • Strict and Feasible: consider if source address is reachable

using the interface the router received the packet

  • Loose Mode: consider if source address is reachable at all
  • Statically Configured Access Control Lists (ACLs)
  • Both only apply at the edge of Internet
slide-38
SLIDE 38

Feasibility of Strict uRPF over time

38

Fraction single homed 0.3 0.35 0.4 0.45 0.5 0.55 0.6 Jan ’98 Jan ’00 Jan ’02 Jan ’04 Jan ’06 Jan ’08 Jan ’10 Jan ’12 Jan ’14 Jan ’16 Jan ’18 0.25

45% of stub ASes are single homed. Their transit providers should deploy strict uRPF.

slide-39
SLIDE 39

Feasibility of ACLs

39

ACLs are “the most bulletproof solution when done properly”, and the “best fit ... when the configuration is not too dynamic, .. if the number of used prefixes is low”. - BCP84 During 2015, ~5% and ~3% of ASes announced different IPv4 and IPv6 address space month-to-month, respectively.

Source Routeviews and RIPE RIS data

BCP−84 BCP−38 Fraction of Stub ASes 5 10 15 20 25 Jan ’98 Jan ’00 Jan ’02 Jan ’04 Jan ’06 Jan ’08 Jan ’10 Jan ’12 Jan ’14 Jan ’16 IPv6 IPv4

slide-40
SLIDE 40

Feasibility of ACLs

ACLs are the “best fit ... when the configuration is not too dynamic, .. if the number of used prefixes is low”. - BCP84 In August 2016, 86.9% of stub ASes would require an IPv4 ACL of no more than 4 prefixes. More than half of IPv4 ACLs defined in January 2012 would be unchanged 4.5 years later.

40

Source Routeviews and RIPE RIS data

August 2016: 0.4 0.6 0.8 1 2 4 6 8 10 # Prefixes in Ingress ACL Fraction of Stub ASes IPv6, 7265 ASes IPv4, 46693 ASes 0.2 IPv4 ASes IPv6 ASes 0.6 0.8 1 Jan ’12 Jan ’13 Jan ’14 Jan ’15 Jan ’16 Fraction unchanged 0.2 0.4

slide-41
SLIDE 41

Feasibility of ACLs

41

https://spoofer.caida.org/provider.php

slide-42
SLIDE 42

Summary

  • Measurement can enable solutions to fundamentally non-

technical security problems

  • Peer pressure
  • Industry standards
  • Regulation
  • Whatever the solution is, cannot be effective without rigorous,

publicly observable measurement

42

slide-43
SLIDE 43

Acknowledgements

  • Project funded by U.S. Department of Homeland Security

(DHS) Science and Technology (S&T) directorate

  • Contacts:
  • spoofer-info@caida.org

43