+ All Categories
Home > Documents > Persistent OSPF Attacks Gabi Nakibly , Alex Kirshon and Dima Gonikman , Dan Boneh

Persistent OSPF Attacks Gabi Nakibly , Alex Kirshon and Dima Gonikman , Dan Boneh

Date post: 23-Feb-2016
Category:
Upload: gabe
View: 93 times
Download: 0 times
Share this document with a friend
Description:
Persistent OSPF Attacks Gabi Nakibly , Alex Kirshon and Dima Gonikman , Dan Boneh 19th Annual Network & Distributed System Security Conference ( NDSS  2012). Outline. Introduction (OSPF v2) OSPF Security Strengths Attack Impact and Analysis Mitigation Measures. - PowerPoint PPT Presentation
Popular Tags:
14
Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference ( NDSS 2012)
Transcript
Page 1: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Persistent OSPF Attacks

Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh

19th Annual Network & Distributed System Security Conference (NDSS 2012)

Page 2: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Outline

• Introduction (OSPF v2)

•OSPF Security Strengths

•Attack

• Impact and Analysis

•Mitigation Measures

Page 3: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Introduction (OSPF v2)•Most used protocol in Autonomous System

• Link State Routing Protocol

• LSA is flooded throughout the AS

•Designated Router

•Database Description (DBD) Messages

Page 4: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Routing table

Page 5: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Adjacency set up

Page 6: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Security Strengths•Per Link Authentication

•Flooding

•Fight Back

•LSA Content

Page 7: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Remote False Adjacency Attack• To fool a remote router

•Persistent control over routing table

•Denial of Service -Link overload-Routing loops -Delivery Failure

• Eavesdropping

Page 8: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Mechanism

Page 9: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh
Page 10: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Consequences•Attack can be exploited to black hole traffic

•Black-holing most AS traffic with single phantom router

Page 11: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Real World Impact

List of AS topologies usedAS number ISP name Number of

Routers

1221 Telstra 115

3967 Exodus 80

6461 Abovenet 145

Page 12: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Percentage of black-holed routers pairs when multiple phantom routers are used

1 2 3 40%

10%

20%

30%

40%

50%

60%

70%

80%

Telstra Exodus Abovenet

Page 13: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

Mitigation Measures•Protocol Weakness•Same secret key•Master cannot see message content

•Anti source-IP spoofing

•Master must prove to slave that it has seen at least one message from slave

Page 14: Persistent OSPF Attacks Gabi  Nakibly , Alex  Kirshon  and  Dima Gonikman , Dan  Boneh

THANKYOU

ANDANY

Questions?


Recommended