weaponizing bgp using communities
play

Weaponizing BGP Using Communities Florian Streibelt, Franziska - PowerPoint PPT Presentation

Weaponizing BGP Using Communities Florian Streibelt, Franziska Lichtblau, Robert Beverly, Cristel Pelsser, Georgios Smaragdakis, Randy Bush, Anja Feldmann 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 1


  1. Weaponizing BGP Using Communities Florian Streibelt, Franziska Lichtblau, Robert Beverly, Cristel Pelsser, Georgios Smaragdakis, Randy Bush, Anja Feldmann 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 1

  2. 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 2

  3. Ill-Defined Semantics We have a syntax, � *���/�0�� But there are no formal semantics, just convention and BCPs We’re putting semantics in comments � ���������� ������� 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 3

  4. Flavors, We Think • Active Path prepending • And then Modify local preference anything a • Remote triggered blackholing thousand • kiddies Selective announcements • have • Passive invented Location Tagging • RTT Tagging • 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 4

  5. Propagation • RFC 1997: Communities are a transitive optional attribute • RFC 7454: Scrub own, forward foreign communities • So many people do not expect them to propagate that widely • I, for one, did not 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 5

  6. Only 14% of Transit ASs propagate communities (2.2k of 15.5k) 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 6

  7. Surprise! • 14% seems small, but AS graph is highly connected • More than 50% of communities traverse more than four ASes • 10% of communities have a hop count of more than six ASes • Longest community propagation observed: through 11 ASes 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 7

  8. Fraction of communities (ECDF) 1.0 ● ● ● ● ● ● 0.8 ● 0.6 ● 0.4 ● 0.2 ● ● 0.0 ● 0 2 4 6 8 10 AS hop count 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 8

  9. On/Off Path 3 p p 3:666 1 2 3:666 p 3:666 4 2 and 3 are On Path 4 is Off Path 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 9

  10. Observed Communities 1.2 % communities observed 1.0 0.8 0.6 0.4 1 65000 666 100 0 3000 2 1000 9498 200 1000 100 1 200 2000 10 2 3000 0 500 0.2 0.0 on-path o ff -path 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 10

  11. So Let’s Break Things! 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 11

  12. Method to our Madness • All experiments first tested in Lab • Impacts were estimated • Validated on the Internet, with operators' consent, e.g. for hijacks 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 12

  13. Remote Triggered Black Hole Traffic flow AS4 AS3 BGP announcements AS2 AS5 p 2:666 X AS1 sends p, tagged 2:666 AS1 AS2 continues announcing p Traffic to p is dropped at AS2 Safeguards: Provider should check customer prefix before accepting RTBH • Customer may only blackhole own prefixes • Different policies for Customers/Peers • On receiving RTBH, add ��������� • 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 13

  14. What Can Happen Traffic flow Attacker AS2 BGP announcements Community Target p p AS3 AS4 AS3:666 X p AS1 announces p AS1 AS2 hijacks p, with AS3:666 p Attackee Traffic to p is dropped at AS3 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 14

  15. It Works Well • Works multi-hop and is hard to spot • Triggering RTBH is possible for attackers because, e.g.,: BH prefix is more specific, thus accepted via • exception Providers check BH community before prefix • filters (bug in NANOG recipe) No validation for origin of community is possible • 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 15

  16. Traffic Steering p 4 3 2 1 p 5 4 3 2 1 p 3 2 1 5 4 3 p 1 7 2 6:3 p 1 p 2 1 p 3 2 1 6 p 6 3 2 1 p 6 6 6 3 2 1 6:3 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 16

  17. That’s Not Realistic 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 17

  18. Oh Yeah? ����������/���.��-��������/���������� ����������.�/�������.�� “BGP hijacks made use of BGP communities to shape route propagation. Although they also changed origins, which was the giveaway.” 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 18

  19. It’s the Cloud, Man ASN value ambiguous: who is ”sender”, ”recipient” • No defined semantics, values can mean anything • Used both for signaling and triggering of actions • No cryptographic protection • Attribution is impossible • It is hard to apply filters or understand what is • going on 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 19

  20. I Read it on the Internet • Communities can be modified, added, removed by every AS • No attribution is possible • No cryptographic protection • Yet operators bet on their ’correctness’ • Large communities partially improve the situation 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 20

  21. Don’t Propagate Without Thinking Very Deeply • On Input – Drop anything not addressed to you, unless special agreement • On Output – Drop everything except signals from you to the direct peer • And Beware Cisco ‘mis-feature’ re well known communities ����-���-���������������������� 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 21

  22. 2018.11.04 Weaponizing BGP Creative Commons: Attribution & Share Alike 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend