Title: Dont Secure Routing, Secure Data Delivery
1Dont Secure Routing, Secure Data Delivery
Availability Centric Routing (ACR) A Multipath
Alternative to Secure BGP Protocols.
- Dan Wendlandt (CMU)
- With
- Ioannis Avramopoulos (Princeton),
- David G. Andersen (CMU), and Jennifer Rexford
(Princeton)
2Availability Centric Routing (ACR)
The point of this talk You dont need to secure
BGP! Instead 1) Multipath routing exposes
possible paths 2) Hosts find and securely use
working paths gt More bang for your security
buck!
3Requirements for Secure Communication?
- Secrecy of Data
- Authenticity of Data
- Availability of the Communication Channel
Needs end-to-end security (e.g., SSL IPsec).
Depends on routing and forwarding.
4Requirements for Routing Forwarding?
Claim The routing and forwarding infrastructure
need only ensure availability. Any additional
security should be end-to-end.
Control plane
Define Availability A source can learn about and
use a working network path to the destination if
such a path exists.
Data plane
5SBGP is too much AND too little!
Deployment Requirements Global agreement on a
protocol PKI, Heavy-weight, Internet-wide
router upgrades.
Too Much
Limited Protection Cannot avoid data plane
attacks or outages on valid BGP paths.
Too Little
6Achieving Availability
- Achieving availability is easier than securing
the routing protocol - Multi-path routing
- check that path works
- alternate path selection
- Availability
- Even if the routing protocol is insecure!
Traffic Sources provide end-to-end check (e.g.,
SSL or IPSec)
7Realizing ACR
Host or Edge Router
Availability Provider (AP) Expose path diversity
Traffic Source Select use routes.
Control Plane
Selecting from set of alternate paths
Collect offer multiple routes.
Data Plane
Deflect packets on alternate paths.
Monitor quality of current path.
8APs Offer Alternate Path Deflections
AS D
Host B
AS X
AS Y
Deflections use IP-in-IP to traverse alternate
BGP paths learned by the AP
Egress 1
AP
Egress 2
AS Z
AS A
Host A
9APs Offer Alternate Path Deflections
1. The AP stores all BGP path information learned
by border routers.
AS D
Host B
AS X
AS Y
Egress 1
AP
Egress 2
Route Monitor
AS Z
AS A
Host A
10APs Offer Alternate Path Deflections
AS D
Host B
2. Source requests alternate paths from the AP.
Recieves Y D via Egress 2
AS X
AS Y
Egress 1
AP
Egress 2
Route Monitor
AS Z
AS A
AS A
Host A
11APs Offer Alternate Path Deflections
AS D
3. Source chooses desired alternate path, which
is deflected by egress 2.
Host B
AS X
AS Y
Egress 1
AP
Egress 2
Route Monitor
AS Z
AS A
Host A
12APs Offer Alternate Path Deflections
4. Source encapsulates packet to the egress
point, includes deflection ID.
AS D
Host B
AS X
AS Y
Egress 1
AP
Egress 2
SRC Host A
Route Monitor
DST Egress 2
Deflection ID Y
AS Z
SRC Host A
DST Host B
AS A
Data
Host A
13APs Offer Alternate Path Deflections
5. Packet forwarded with IP to alternate egress.
AS D
Host B
AS X
AS Y
Egress 1
AP
Egress 2
SRC Host A
Route Monitor
DST Egress 2
Deflection ID Y
AS Z
SRC Host A
DST Host B
AS A
Data
Host A
14APs Offer Alternate Path Deflections
6. Egress point decapsulates packet, sends it to
alternate next-hop AS based on ID.
AS D
Host B
AS X
AS Y
Egress 1
AP
Egress 2
Deflection ID Y
Route Monitor
SRC Host A
AS Z
DST Host B
Data
AS A
Host A
15APs Offer Alternate Path Deflections
AS D
Host B
6. Packet is forwarded over IP to the destination.
AS X
AS Y
Egress 1
AP
Egress 2
Route Monitor
SRC 10.1.1.1
AS Z
DST 20.2.2.2
Data
AS A
Host A
16Properties of Routing Deflections
- ACR ! source routing.
- Source can select only valid BGP paths.
- APs can easily limit or deny access to any path.
- 2) Deflections already supported in hardware!
17Functionality Implemented at Source
Host or Edge Router
Traffic Source Select use routes.
Selecting from set of alternate paths
Monitor quality of current path.
18Sources Monitoring Path Quality
Two criteria for a working path
- Does current path preserve authenticity?
- (e.g., IPSec, SSL)
- Was initial destination authentication valid?
- Are packets being corrupted on the path?
- 2) Does current path perform well?
- (e.g., detect TCP-failures, NetFlow)
- Is loss rate, etc., sufficient to consider this
path usable?
19Selecting Alternate Paths
Key Insight Single-path BGP limits bogus paths
from attackers! Evaluation of Shortest AS-Path
Hueristic Hosts will explore several a few bad
paths per attacking AS before finding a legit
path.
gt Internet outages become brief delays in
connection setup.
20Optimizing Path Selection History
- 1) History of stable/working routes.
- Prefer AS-paths that worked in the past.
- Also prefer similar paths.
- Past work suggests that AS-paths change
infrequently in practice - Rexford, et al. (IMW 02)
- Chang, et al. (ICNP 03)
- Butler, et al. (CCS 06)
21Optimizing Path Selection Hints
2) Destination-specific connectivity hints
indicate what upstream ASes are most likely to be
legitimately announcing their prefix.
AS X
AS Z
If bank.com provides NO hints
AP
AS C
AS D
22Optimizing Path Selection Hints
2) Destination-specific connectivity hints
indicate what upstream ASes are most likely to be
legitimately announcing their prefix.
AS D
AS X
AS Z
If bank.com provides hint D
AP
AS C
AS D
23Optimizing Path Selection Hints
2) Destination-specific connectivity hints
indicate what upstream ASes are most likely to be
legitimately announcing their prefix.
AS D
AS C
AS X
AS Z
AP
If bank.com provides hint C D
AS C
AS D
24Hints are Simple and Effective
No additional PKI required Hints verified using
end-to-end authentication mechanism.
Evaluation of simple hints Only a few TOTAL
paths must be explored regardless of the number
of attackers!
25Evaluation Resistance to BGP Hijacks
- Realistic simulation on inferred AS topology
- A single tier-1 ISP acts as an availability
provider. - Vary number of attackers, placed in random ASes.
- Test each AS to see if it receives a valid
route.
What attack resistance can this offer, even with
only one AS participating?
26Resistance to BGP Hijacks
- Evaluate how often three source types have a
path to the valid destination, while varying the
number of attackers. - 1) Single-Path BGP
- ASes use single best BGP path, as today.
- 2) Intelligent Multi-homing
- Stub ASes with 5 upstreams succeed if any
provider offers a valid route. - 3) Tier-1 Availability Provider
- A single tier-1, offering deflections via peer
and customer- learned routes.
27ACR Resists BGP Hijacks
28ACR Resists BGP Hijacks
29Preventing BGP Availability Attacks
Single-Path BGP
ACR
Attacker must get victim to hear a path that is
better than its current path.
Attacker must prevent AP from hearing any valid
path
Requirements for a successful BGP availability
attack
30Adoptability Advantages
Low Barriers to Entry
Strong Deployment Incentives
Drives Incremental Control Plane Security
Performance Benefits of Multipath
31Adoptability Advantages
Low Barriers to Entry
- No routing PKI, registries, or SBGP
standardization. - End-to-end security is already widely deployed.
- Router hardware already supports deflections.
Strong Deployment Incentives
Drives Incremental Control Plane Security
Performance Benefits of Multipath
32Adoptability Advantages
Low Barriers to Entry
Strong Deployment Incentives
- Large ISPs can sell path diversity as a
service. - Edge networks receive immediate security
benefits.
Drives Incremental Control Plane Security
Performance Benefits of Multipath
33Adoptability Advantages
Low Barriers to Entry
Strong Deployment Incentives
Drives Incremental Control Plane Security
- Path selection optimizations (e.g., hints)
provide incentives for additional routing
security.
Performance Benefits of Multipath
34Adoptability Advantages
Low Barriers to Entry
Strong Deployment Incentives
Drives Incremental Control Plane Security
Performance Benefits of Multipath
- Multipath also supports selection of high
performance (e.g., low latency) paths.
35Contributions of ACR
- Secure communication without secure routing.
- ACRs benefits (e.g. avoiding data plane threats)
are valuable even with sBGP. - Low barriers to entry and clear benefits for
early adopters.
36Thanks!
Questions Comments Please!
Joint work with Ioannis Avramopoulos
(Princeton) David G. Andersen (CMU) Jennifer
Rexford (Princeton)
Contact Dan Wendlandt (CMU) dwendlan_at_cs.cmu.edu
37Handling Traffic Analysis Attacks?
SBGP
ACR
Path selection heuristics like route history and
hints avoid new and suspicious paths
Cryptographic path attestation makes it difficult
for attacker to get on path
Is it worth the added complexity of SBGP? SBGP
provides stronger protection against malicious
ASes getting on path, but both are vulnerable
to traffic analysis by well-connected ASes. Only
end-to-end techniques (e.g., mix-nets) offer
strong protection.
38Handling Hijacks of Unused Address Space?
SBGP
ACR
Routers accept all announcements.
Cryptographic database of prefix ownership has
routers reject invalid announcements.
Is it worth the added complexity of SBGP? Unused
hijacks are a lesser threat, as they do not
compromise availability. Those needing to block
traffic from such addresses can easily use
bogon-like filters.
39What about stupid users?
- Single-Path If an e2e authentication check
fails, the only alternative is no reachability.
Thus, they prompt the user as a last resort. - Multi-Path If one check fails, explore
alternates until authentication works. No need
to prompt the user unless all paths fail.
40But Youre Just Asking for More From Sources!
- Yes! But consider that
- End-to-end security is already widely deployed
for many types of traffic. - Deploying changes on the edge is easier (look at
speed of SSL/IPSec adoption!) - No need for global agreement on a single best
approach - Immediate benefits for any application that adds
end-to-end security.
41Sure, But Isnt This Just a Stop-gap?
- Not really It would likely solve the problem
more quickly than SBGP, but - It helps drive improvements to the security of
control plane data, helping SBGP. - Prevents data-plane availability attacks not
handled by SBGP - gt ACR offers evolving adoptability path.
42Compromised routers in AP network?
- Paths through other egress routers will still be
valid.
- Attacks on APs internal routes possible, but
prevention detection is significantly easier - Internal network probing can easily be done
securely. - Defenses can use knowledge of complete true
network topology - Link-state routing protocols are significantly
easier to secure.
- Highest robustness from having multiple
independent tier-1s as availability providers.
43Q1 Resistance to Attacks
Tier-1 AP protection degrades slightly with
local attackers.
44Q1 Adding Customer-Only Filters
45Q2 Path Exploration with Intelligent Attacker
46Handling Availability Attacks?
SBGP
ACR
Multi-Path, probing to find working paths
Control Plane Availability
Single-Path, PKI, registry signatures
None
Data Plane Availability
47Two Views
The Optimist It will be YEARS before SBGP is in
full use.
The Pessimist This is NEVER going to happen.
Members of both sides are asking - How will
everyone agree on one protocol, and one PKI? -
What incentives are there for ISPs to invest in
adoption? - What can we do in the mean time?
- What is the real problem here???
48Progress with Secure Routing Protocols
96 Smith, path and origin validation
97 S-BGP started
04 Listen Whisper
05 psBGP
03 IRV
93 Kumar, authenticated inter-domain route
updates
06 APNIC begins cert. generation software dev.
02 so-BGP
98 Bates, DNS to verify AS origin
04 SPV
Still, no agreement on a protocol or a PKI