Routing Security and the Border Gateway Protocol - PowerPoint PPT Presentation

1 / 27
About This Presentation
Title:

Routing Security and the Border Gateway Protocol

Description:

Routing Security and the. Border Gateway Protocol. Dr. Stephen Kent ... of BGP are susceptible to various DoS attacks that can crash the router or ... – PowerPoint PPT presentation

Number of Views:57
Avg rating:3.0/5.0
Slides: 28
Provided by: com49
Category:

less

Transcript and Presenter's Notes

Title: Routing Security and the Border Gateway Protocol


1
Routing Security and the Border Gateway Protocol
  • Dr. Stephen Kent
  • Chief Scientist - Information Security

2
Routing Security
  • Routing is key to network operation and thus an
    essential element of network management
  • Most routing protocols do not include significant
    much less comprehensive security provisions
  • Attacks against routing protocols are growing
  • BGP provides the basis for all inter-ISP routing
  • The protocol is highly vulnerable to human
    errors, and a wide range of malicious attacks
  • BGP a good example of an insecure routing
    protocol, despite inclusion of s few security
    features and ad hoc efforts by ISPs vendors

3
BGP Overview
4
BGP Example
5
The Scale of BGP
  • About 125K address prefixes in BGP routing tables
  • These prefixes map to about 17-18K paths
  • About 10K BGP routers in service
  • About 2K organizations own AS s
  • About 60K organizations own prefixes
  • About 6K Autonomous System numbers appear in
    paths
  • The average AS path length for a route is about
    3.7, about 50 of routes are 3 ASes or fewer, 95
    are fewer than 5 ASes in length

6
Understanding BGP
  • BGP is the routing protocol that connects ISP and
    subscriber networks together to form the Internet
  • BGP does not forward subscriber traffic, but it
    determines the paths subscriber traffic follows
  • Routers representing ISPs (and multi-homed
    subscribers) execute BGP to exchange routes via
    UPDATE messages
  • Each BGP router receives UPDATEs from its
    neighbors and selects one path for each prefix as
    the best and reports that path to its neighbors
  • No one has a comprehensive view of BGP operation!

7
Processing an UPDATE
Adjacency RIB IN-i
Adjacency RIB IN-j
Local Policy Database
BGP Routing Algorithm
Local RIB
Change LOC-RIB Only if Needed
Send UPDATE To other ASes
If LOC-RIB Changed, Generate UPDATEs for
Neighbor ASes
8
Underlying Assumption re UPDATEs
  • Each AS along the path is assumed to have been
    authorized by the preceding AS to advertise the
    prefixes contained in the UPDATE message
  • The first AS in the path is assumed to have been
    authorized to advertise the prefixes by the
    owner of the prefixes
  • A route may be withdrawn only by the neighbor AS
    that advertised it
  • If any of these assumptions are violated, BGP
    becomes vulnerable to many forms of attack, with
    a variety of adverse consequences

9
BGP Security
10
BGP Security Problems
  • The BGP architecture makes it highly vulnerable
    to human errors and malicious attacks against
  • Links between routers
  • The routers themselves
  • Management stations that control routers
  • Most router implementations of BGP are
    susceptible to various DoS attacks that can crash
    the router or severely degrade performance
  • Many ISPs rely on local policy filters to protect
    them against configuration errors some forms of
    attacks, but creating and maintaining these
    filters is difficult, time consuming, and error
    prone

11
BGP Security Solution Requirements
  • Security architectures for BGP should not rely on
    trust among ISPs or subscribes
  • On a global scale, some ISPs will never be
    trusted
  • People, even trusted people, make mistakes, and
    trusted people do go bad
  • Transitive trust in people or organizations
    causes mistakes to propagate (domino effect)
  • Security solutions must exhibit the same dynamics
    as the aspects of BGP they protect
  • Both implementation and architectural security
    concerns must be addressed

12
The Basic BGP Security Requirement
  • For every UPDATE it receives, a BGP router should
    be able to verify that the owner of each prefix
    authorized the first (origin) AS to advertise the
    prefix and that each subsequent AS in the path
    has been authorized by the preceding AS to
    advertise a route to the prefix
  • This requirement, if achieved, allows a BGP
    router to detect and reject unauthorized routes,
    irrespective of what sort of attack resulted in
    the bad routes
  • Conversely, if a security approach fails to
    achieve this requirement, a BGP router will be
    vulnerable to attacks that result in misrouting
    of traffic in some fashion

13
S-BGP Architecture
14
Secure BGP (S-BGP)
  • S-BGP is an architectural solution to the BGP
    security problems described earlier
  • S-BGP represents an extension of BGP
  • It uses a standard BGP facility to carry
    additional data about paths in UPDATE messages
  • It adds an additional set of checks to the BGP
    route selection algorithm
  • S-BGP avoids the pitfalls of transitive trust
    that are common in todays routing infrastructure
  • S-BGP security mechanisms exhibit the same
    dynamics as BGP, and scale commensurate with BGP

15
S-BGP Design Overview
  • S-BGP makes use of
  • IPsec to secure point-to-point communication of
    BGP control traffic
  • Public Key Infrastructure to provide an
    authorization framework representing address
    space and AS ownership
  • Attestations (digitally-signed data) to bind
    authorization information to UPDATE messages
  • S-BGP requires routers to
  • Generate an attestation when generating an UPDATE
    for another S-BGP router
  • Validate attestations associated with each UPDATE
    received from another S-BGP router

16
A PKI for S-BGP
  • Public Key (X.509) certificates are issued to
    ISPs and subscribers to identify owners of AS
    s and prefixes
  • Prefix data in certificates is used to verify
    authorization with regard to address attestations
  • Address attestations, AS s and public keys from
    certificates are used as inputs to verification
    of UPDATE messages
  • The PKI does NOT rely on any new organizations
    that require trust it just makes explicit and
    codifies the relationships among regional
    Internet registries, ISPs, and subscribers

17
Address Allocation Hierarchy
IANA
Regional Registries
Subscriber Organizations
ISPs
Subscriber Organizations
ISPs
Subscriber Organizations
Subscriber Organizations
18
AS Allocation Hierarchy
IANA
Regional Registries
Subscriber Organizations
ISPs
19
Two Types of Attestations
  • An Address Attestation (AA) is issued by the
    owner of one or more prefixes (a subscriber or
    an ISP), to identify the first (origin) AS
    authorized to advertise the prefixes
  • A Route Attestation (RA) is issued by a router on
    behalf of an AS (ISP), to authorize neighbor ASes
    to use the route in the UPDATE containing the RA
  • These data structures share the same basic format

20
Simplified Attestation Formats
(Prefix1, Prefixn) ASn, ASn-1, As2, Origin AS
Route Attestation
(Prefix1, Prefixn) Origin AS
Address Attestation
21
Housekeeping for S-BGP
  • Every S-BGP router needs access to all the
    certificates, CRLs, and address attestations so
    that it can verify any RA
  • These data items dont belong in UPDATE messages
  • S-BGP uses replicated, loosely synchronized
    repositories to make this data available to ISPs
    and organizations
  • The repository data is downloaded by
    ISP/organization Network Operation Centers (NOCs)
    for processing
  • Each NOC validates retrieved certificates, CRLs,
    AAs, then downloads an extracted file with the
    necessary data to routers
  • Avoids need for routers to perform this
    computationally intensive processing
  • Permits a NOC to override problems that might
    arise in distributing certificates and AAs, but
    without affecting other ISPs

22
S-BGP System Interaction Example
exchange uploads
Repository
Repository
upload self
download everything
upload self
download everything
Regional Registry
ISP NOC
ISP NOC
Get ISP certificate
Get ISP certificate
push extract
push extract
S-BGP router
S-BGP router
UPDATEs
S-BGP router
S-BGP router
UPDATEs
S-BGP router
UPDATEs
23
Deployment Issues for S-BGP
24
Deploying S-BGP
  • S-BGP requires
  • Router software that implements S-BGP
  • Router hardware with appropriate storage
    signature processing capabilities
  • Regional registries must assume CA
    responsibilities for address prefixes and AS
    assignment/allocation
  • ISPs and subscribers that execute BGP must
    upgrade routers, must act as CAs, and must
    interact with repositories to exchange PKI AA
    data
  • S-BGP can be deployed incrementally, with the
    constraint that only adjacent S-BGP ASes will
    receive and make use of S-BGP UPDATEs

25
S-BGP Deployment Impediments
  • Technical
  • Insufficient memory in most routers for RAs, AAs,
    public keys, etc.
  • Insufficient non-volatile memory for S-BGP data
    (e.g., to speed up recovery after reboot)
  • Slow CPUs for management protocol processing
  • Procedural
  • NOC registry staff have to be trained
  • Operations staff have to believe its a good idea
  • Economic
  • ISPs cannot afford to replace/upgrade BGP routers
  • Registries cannot afford to offer CA services w/o
    imposing fees
  • Router vendors cannot afford to implement S-BGP
    software and hardware unless ISPs will buy it

26
Summary
  • Routing security is an essential aspect of net
    management security
  • Existing routing protocols have not been designed
    with security in mind, and are highly vulnerable
    as a result
  • BGP is representative of the security problems
    exhibited by routing protocols
  • It is the critical infrastructure element for
    Internet routing, called out with DNS security in
    the Administration Cyber Security plan
  • S-BGP is an example of the sort of comprehensive
    security solution required to address issues of
    this complexity and scale

27
Questions?
Write a Comment
User Comments (0)
About PowerShow.com