+ All Categories
Home > Documents > Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X....

Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X....

Date post: 13-Jan-2016
Category:
Upload: beatrice-holt
View: 213 times
Download: 0 times
Share this document with a friend
28
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011 @ Deajeon
Transcript
Page 1: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

Sign What You Really Care About-- Secure BGP AS Paths Efficiently

Yang Xiang, Z. Wang, J. Wu, X. Shi, X. YinTsinghua University, Beijing

AsiaFI 2011 @ Deajeon

Page 2: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 2Aug 12, 2011

Outline

• Introduction– Background– Our Proposal: FS-BGP

• FS-BGP: Fast Secure BGP• Evaluation• Discussion

Page 3: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

3

IP Prefix Hijacking

• Routing information in BGP can not be verified• Through prefix hijacking, attacker may drop,

intercept or tamper traffic towards specific prefix– Malicious attack: DoD prefix be hijacked,

spammer– Mis-configuration: Pakistan Telecom hijacked

Youtube, China Telecom hijacked 10% Internet

Prefix hijacking: AS4 hijacks prefix f

Aug 12, 2011 FS-BGP, THU, AsiaFI 2011

Page 4: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 4

How to …

• Short-term goal: detect– Analyze anomalies in routing information– Whisper [NSDI`04], PGBGP [ICNP`06], …– Cons: can not grantee correctness and real-time

• Long-term goal: prevent– Information authentication, secure routing info.– S-BGP, IRV, S-A, soBGP, psBGP, SPV, …– Cons: high security and low cost, can not have

both.Aug 12, 2011

Page 5: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 5

S-BGP

• The most secure schema• Route Attestations (RA) to secure the path

– {msg}ai : signature on msg signed by ai

Aug 12, 2011

Page 6: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 6Aug 12, 2011

Cons of S-BGP

• S-BGP actually singed the whole path, including the recipient AS

• So many paths– unbearable computational cost

• Dilemma of the Expiration-date– Long: unable to defend replay attack– Short: destroy the whole system

Page 7: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 7

Substitutes for S-BGP

• soBGP– Infeasible paths exist

• IRV– Query Latency; hard to maintain authority server

• SPV– Complex state info.; probabilistically guarantee

• S-A– Only for signing; need to pre-establish neighbor list

Aug 12, 2011

Page 8: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 8Aug 12, 2011

Our ProposalFS-BGP: Fast Secure BGP

• How to secure the path– CSA (Critical path Segment Attestation) to secure

the AS path– SPP (Suppressed Path Padding) to protect the

optimal path and prevent effective hijacking

• Security– All the authenticated paths are feasible path– Achieves similar level of security as S-BGP

• Computational cost (on backbone router)– Singing cost: ~0.6% of S-BGP– Verification cost: ~3.9% of S-BGP

Page 9: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 9Aug 12, 2011

Outline

• Introduction• FS-BGP: Fast Secure BGP

– CSA: Critical Segment Attestation– SPP: Suppressed Path Padding

• Evaluation• Discussion

Page 10: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 10Aug 12, 2011

Announcement Restrictions in BGP

• Best route announcing– Temporary restriction– Local preference and other metrics

• Selective import & export policy– Persistent restriction– Neighbor based import and export:

contracts ($$) are between neighbor Ases

– Feasible path: exist in AS-level graph & obey the policy

Page 11: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 11Aug 12, 2011

Critical Path Segment

• In path: pn = <an+1 , an , …, a0>, the Critical Path Segment ci owned by ai is

• Those adjacent AS triples actually describes part of routing policies of the corresponding owner– ci=<ai+1, ai, ai-1> means ai can (and already) announce

routes to ai+1 which are import from ai-1

– If every owner signs the critical segment in a current announcing path, the consequent ASes will be able to verify the received whole path

Page 12: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 12Aug 12, 2011

a0

〈 a0

〉{a1 a0}a0

a1 a2 a3 a4

〈 a1 a0〉

〈 a2 a1 a0〉

〈 a3 a2 a1 a0〉

{a2 a1 a0}a1

{a3 a2 a1 a0}a2

{a4 a3 a2 a1 a0}a3

{a1 a0}a0

{a2 a1 a0}a1

{a3 a2 a1}a2

{a4 a3 a2}a3

√ √√

√√

√ √√

√√

√√√

{msg}ai: signature of msg signed by ai

FS-BGP: CSA

S-BGP: RA

Page 13: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 13Aug 12, 2011

Signatures in FS-BGP and S-BGP

Signatures for the path: pn=<an+1, an, an-1, …, a0>

FS-BGP

S-BGP

Page 14: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 14Aug 12, 2011

Cost Reduction

• (# total critical segment) << (# total AS path)• If we use a small cache, the cost will be

sharply decreased

– S-BGP: an receives k paths, signs k signatures

– FS-BGP: an receives k paths, signs 1 signature

Page 15: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 15Aug 12, 2011

Outline

• Introduction• FS-BGP: Fast Secure BGP

– CSA: Critical Segment Attestation– SPP: Suppressed Path Padding

• Evaluation• Discussion

Page 16: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 16Aug 12, 2011

• Paths can be verified in FS-BGP are all feasible paths [Theorem 1]

CSA achieves Feasible Path Authentication

SP

Signed pathsin S-BGP

Signed pathsin FS-BGP

All feasiblepaths

FSP FP FPFSPSP

1. Outdated path2. Current path

1. Outdated path2. Current path3. Revealed path

1. Outdated path2. Current path3. All not announced path

Page 17: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 17Aug 12, 2011

Forge a path in FS-BGP is possible

• Forged path (Revealed path) in FS-BGP– Using authenticated path segments,

manipulator can construct forged path, which is feasible but currently not announced.

am forgepath pd

a4 construct path pf , then hijack prefix f

Page 18: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 18Aug 12, 2011

Conditions of Effective Hijacking

• (1) Forge a path in FS-BGP is very difficult– Must be constructed using received

authenticated path segments– Must not be announced by the intermediate ASes– Can not be shorter than 5 hops [Theorem 3]

• (2) Forged path is still feasible, and only temporarily not received by the attacker!– Consider effective hijacking: the traffic is not

forwarded by the attacker under normal status• (3) Only short enough forge-path can be

used for an effective hijacking [Theorem 2]

Page 19: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 19Aug 12, 2011

Prevent Effective Hijacking

• Using ASPP, can grantee that attacker can not concatenate short enough forge path

• Not short enough: other paths are not shorter than the optimal path (longest live-time)

{a4, a3, a2}a3

{a4, a3, 3, a2}a3

pf=<a5, a4, a3, a3, a3, a2, a1>

Page 20: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 20Aug 12, 2011

SPP: Suppressed Path Padding

• Suppressed Path: paths with lower local preference in the decision process

• Suppressed path may shorter than optimal path

• SPP:– General– Optional– Easy to Implement

Compute ki :

Basic decision process:1.Highest Local Preference (LP)2.Shortest Path Length (PL)3.Tie Breaks (TB)

Path categories:

1.Suppressed Path

2.Sub-optimal Path

3.Optimal Path

Page 21: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 21Aug 12, 2011

Outline

• Introduction• FS-BGP: Fast Secure BGP• Evaluation

– Security Level– Computational Cost

• Discussion

Page 22: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 22

Security Level

Aug 12, 2011

Sec

uri

tyInfeasible

Path

FeasiblePath

Cost

CurrentPath

soBGP

Low High

FSBGP (no SPP)

S-BGPFSBGP

Page 23: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 23

Computational Cost

• 30 days’ real BGP updates from backbone routers

Aug 12, 2011

FS-BGP

S-BGP

FS-BGP

S-BGP

# verifications in every second# signings in every second

Page 24: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 24Aug 12, 2011

Outline

• Introduction• FS-BGP: Fast Secure BGP• Evaluation• Discussion

– Support complicated routing policies– Protect privacy

Page 25: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 25Aug 12, 2011

Complicated Routing Policies

• AS may use complicate route filters to describe their routing policies

– Prefix filter:

– Path filter:– Origin filter:

• FS-BGP can flexibly extend and support route filters

Included feasible prefixes into CSA

Sign whole path

Included feasible origins into CSA

Page 26: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 26

Revisit the route filters

• Quantity of route filter– According our statistical result in IRR database,

only a very small portion of policies use route filters

• Purpose of route filter– Some (i.e., origin/path filter) are set for security

considerations, rather than policy requirements.– Others (i.e., prefix filter) are set for traffic

engineering, to identifying the preference of a route, rather than the feasibility of a path

Aug 12, 2011

Page 27: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 27Aug 12, 2011

Privacy Protection

• Privacy: customer list …• FS-BGP can protect privacy data

– Message spreading manner is same to BGP– Path segments not reveal additional info.– Path segments can only be passively

received by valid BGP UPDATE receivers– Do NOT offer any kinds of public accessible

policy database

Page 28: Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.

FS-BGP, THU, AsiaFI 2011 28Aug 12, 2011

Thanks!

• FS-BGP: Fast Secure BGP– CSA: Critical Segment Attestation– SPP: Suppressed Path Padding

• Evaluation– Similar security level as S-BGP– Reduced the cost by orders of magnitude– Support complicated routing policies– Protect privacy

Q&A


Recommended