jumpstarting bgp security
play

Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai - PowerPoint PPT Presentation

Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira BGP is insecure! Prefix hijack 1.2.0.0/16 is Mine The Internet AS 1 AS 666 1.2.0.0/16 is Mine BGP is insecure! Prefix hijacks


  1. Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira

  2. BGP is insecure! • Prefix hijack 1.2.0.0/16 is Mine The Internet AS 1 AS 666 1.2.0.0/16 is Mine

  3. BGP is insecure! Prefix hijacks Victim 1.2/16 1.2/16 Path: 1,2,3 AS 3 Path: 666 AS 666 1.2/16 Path: 1,2 AS 2 1.2/16 BGP Ad. Data flow AS 1 Path: 1 1.2/16

  4. Resource PKI (RPKI) • Origin Authentication • Protects against prefix/subprefix hijacks • Slowly gaining traction (protects 6% of prefixes) Verify signature RPKI cache 1.2/16 à AS 1 repository 1.2/16: AS 1 1.2/16: AS 1 BGP Routers

  5. BGP is insecure! • Prefix/Subprefix Hijack 1.2.0.0/16 is Mine The Internet AS 1 AS 666 1.2.0.0/16 is Mine

  6. RPKI prevents prefix hijacks 1.2/16 1.2/16 Victim Path: 1,2,3 Path: 666 1.2/16 à AS 1 AS 3 AS 666 AS 2 BGP Ad. Data flow AS 1 1.2/16

  7. Next-AS attack circumvents RPKI 1.2/16 1.2/16 Victim Path: 1,2,3 Path: 1,666 1.2/16 à AS 1 AS 3 AS 666 AS 2 AS 1 1.2/16 BGP Ad. False `link’ Data flow

  8. BGP is insecure! • Next-AS Attack 1.2.0.0/16 is Mine The Internet AS 1 AS 666 AS1 is my neighbor

  9. Current paradigm: a two step solution • First, RPKI against prefix-hijacking • Then, add BGPsec • Protects against false paths (e.g., next-AS attacks) • Deployment challenge: •Real-time signature and validation •Different message format Prefix: 1.2/16 Prefix: 1.2/16 Secure-Path: 1,2,3 Secure-Path: 1,2 Matches RPKI policy? 1.2/16: AS 1 AS 1 AS 2 AS 3 Matches RPKI policy? Path signature OK? Add signature, 1.2/16 Path signatures valid? then relay

  10. BGPsec in partial adoption? Meager benefits [Lychev et al., SIGCOMM’13] • AS 666 launches a next-AS attack against AS 1 • Not prevented by BGPsec Legacy Adopter “Breaks” BGPsec 1.2/16 1.2/16 Path: 1,666 Path: 1,2 AS 1 AS 2 AS 3 1.2/16 AS 666

  11. BGPsec: deployment challenges • Changes to BGP routers: • Online crypto requires new hardware [BGPsec design choices, IETF] • Different message format • legacy messages coexist with new format • BGPsec is not “a minor extension” of BGP BGPSEC Design Choices and Summary of Supporting Discussions draft-sriram-bgpsec-design-choices-08

  12. Goals • Easy deployment, minimal overhead • Signatures and verifications: only offline, off-router • Significant security benefits in partial deployment • No changes to routing protocol

  13. Path-end validation 1.2/16 1.2/16 Victim Path: 1,2,3 Path: 1,666 1.2/16 à AS 1 AS 3 AS 666 AS 1 à AS 2 AS 2 AS 1 1.2/16 Fake `link’ BGP Ad. Data flow

  14. Path-end validation • Key insight: “last hop” is critical • Extend RPKI to authenticate the “last hop” 4.5 4 3.5

  15. Path-end validation • Path-end validation extends RPKI to authenticate the “last hop” 4.5 • Key insight: Securing path-suffixes provides significant benefits 4 RPKI d Prefix 3.5 v path-end validation a Did d approve reaching it via v?

  16. Intuition • AS 666 wants to attract AS 3’s traffic to IP prefix 1.2.3.0/24, but… • It can’t announce that it owns the prefix or is 4.5 AS 1’s neighbor • It has to launch 2-hop attack : (prefix: 1,2,666) 4 AS 1 connected to AS 2? 3.5 AS 1 connected to AS 3? AS 1 AS 2 AS 3 1.2/16 AS 666

  17. Deployment Verify signature 1.2/16 -> AS 1 AS 1 -> AS 2 RPKI cache repository 1.2/16: AS 1 1.2/16: AS 1 AS 1 à AS 2 AS 1 à AS 2 BGP Routers

  18. Deployment: today! ip as-path access-list as1 deny _[^2]_1_ • Use existing Access List interface • Validated suffix extends automatically with adoption

  19. Evaluating impact • How significant is path-end validation? • Empirically-derived AS-level network from CAIDA • Including inferred peering links [Giotsas et al., SIGCOMM’13] • Evaluate fraction of ASes an attacker can attract • For different adoption scenarios • For different types of attack • Using the simulation framework in [Gill et al., CCR’12]

  20. Simulation results

  21. Simulation results

  22. Simulation results

  23. Impact of authenticating hops BGP (no authentication) Origin authentication (RPKI) Path-end validation

  24. Local deployment

  25. Additional results • Local deployment protects local traffic • Large content providers are better protected • Path-end validation mitigates high profile incidents • Security monotone

  26. Conclusion • Path-end validation • Is a modest extension to RPKI • Can significantly impact BGP security while avoiding BGPsec’s deployment hurdles • We advocate • Incorporating path-end validation into the RPKI • Regulatory/financial efforts on gathering critical mass of adopters

  27. Thank You

Recommend


More recommend