Availability Centric Routing ACR - PowerPoint PPT Presentation

1 / 30
About This Presentation
Title:

Availability Centric Routing ACR

Description:

... modifications to routers, continually updated address registries, increased BGP complexity. Insufficient: providing no protection from malicious routers in the ... – PowerPoint PPT presentation

Number of Views:38
Avg rating:3.0/5.0
Slides: 31
Provided by: Dan1
Category:

less

Transcript and Presenter's Notes

Title: Availability Centric Routing ACR


1
Availability Centric Routing (ACR)
  • Robust Interdomain Routing Without BGP Security
  • July 25th, 2006

2
Current Routing Security Focus
  • Current proposals like S-BGP, etc. use
    cryptography to provide control plane
  • origin authentication
  • path validity

3
Too Much and Too Little?
  • These proposals are
  • Heavy-weight requiring modifications to routers,
    continually updated address registries, increased
    BGP complexity.
  • Insufficient providing no protection from
    malicious routers in the data-plane or links made
    unusable by congestion or bad route convergence.

4
A Different Approach
  • Today end-hosts/edge routers often already
    provide end-to-end security using mechanisms such
    as SSL or IPSec.
  • With end-to-end security, we claim that
  • The routing infrastructure only has to worry
    about providing availability, i.e. the ability to
    find and use a valid path if it exists.

5
High-level Approach
  • Clients learn multiple potential paths to a
    destination, instead of a single best path.
  • Clients use end-to-end security mechanisms and
    monitor path performance to detect good paths.
  • Clients can use adequate paths and change routes
    if necessary.

6
Taxonomy of Attacks
  • Snooping Traffic Modification
  • Traffic Analysis
  • Destination Impersonation
  • Spam Sources (unused space hijack)
  • Black-holing Traffic
  • Traffic Degradation

Lets think about whether the routing system
should handle them.
7
Attack Data Confidentiality Integrity
  • Where Data Control Plane
  • A secure control plane could make it harder for
    an attacker to get on path, but data-plane
    adversaries can access traffic.
  • Verdict Use end-to-end encryption MACs, rather
    than rely on routing protocol.

8
Attack Traffic Analysis
  • Where Data Control Plane
  • Again, secure control plane makes attack more
    difficult, but providing real guarantees at the
    network layer is extremely difficult or even
    impossible (data worm-hole attack).
  • Verdict Use mix-nets or other end-to-end
    mechanisms if needed, as Internet routing cannot
    provide an guarantees.

9
Attack Destination Impersonation
  • Where Data Control Plane
  • Problems with data-plane attacker (local or
    router) or DNS compromise means that even with
    secure control plane identity is not certain.
  • Difficulty in having ISPs create and update
    address registry.
  • Verdict End-to-End certificates or other
    authentication are still needed, and obviate
    requirement for identity in control plane (still
    useful as an optimization though).

10
Attack Spam Sources (unused hijack)
  • Where Control Plane
  • Spam is really caused by incentives and identity
    problems within higher-level systems (e.g.
    email), which would exist even with secure
    routing. The real cost of this vulnerability
    is minimal.
  • Verdict While authenticated address ownership
    may be desirable, it is not a requirement for
    reliable communication.

11
Attack Black-holing Traffic
  • Where Data Control Plane
  • The ability to completely prevent communication,
    particularly when another valid path exists, is
    the key threat to a routing protocol.
  • Verdict Yes, this is central to routing.

12
Attack Traffic Degradation / DoS
  • Where Data Plane, remote hosts
  • Paths can be rendered unusable for an
    application even if they are not completely
    unavailable according to the control plane.
  • Verdict Yes, a routing protocol should allow
    destinations to avoid such links.

13
Defense Taxonomy Control Plane
Note Whisper only detects attacks, and only at a
limited number of ASes.
14
Defense Taxonomy Data Plane
15
What should routing security achieve?
  • Its very hard to get guarantees about the
    identity of the path of data-flow.
  • Furthermore, why would we care?
  • If applications already use e2e security to
    handle these risks. As a result, they care about
    path quality, not path identity.

16
Availability Centric Routing
  • Goals
  • 1)Communication in the face of control plane,
    data plane, and link-DoS attacks.
  • 2)Incentivized deployment and low barriers to
    adoption.
  • 3)No requirements for globally coordinated
    adoption.

17
What is done end-to-end?
  • Assume
  • 1)Confidentiality, integrity and destination
    identity are handled end-to-end, e.g. SSL/IPSec.
  • 2) Path quality monitoring, to decide when to
    change paths.

18
Packet Deflections
  • ISPs offer users alternate paths (deflections)
    in addition to the normal path advertised via BGP.

D
A,B,C,D,F is normal BGP path for A -gt F. To
avoid D, A could request that C deflects packets
to E, yielding path A,B,C,E,F
A
B
C
F
E
19
Availability Providers
  • Most path diversity comes from the densely
    connected tier-1 ISPs.
  • To simplify, what if just these ASes acted as
    availability providers (APs) to offer
    deflections?

20
ACR Overview
  • Source attempts to set-up a secure channel using
    default path.
  • If set-up fails, it can request alternate paths
    from its AP, probing until it finds a working
    path.
  • Sources monitor path performance, requesting
    alternate paths if the current path is
    inadequate.

21
Threats Against ACR with APs
  • Deployment gaps between AP and source or
    destination create attack opportunities.
  • Large number of invalid paths from AP makes
    probing time unrealistic.
  • Path performance attacks

22
Attacks Exploiting Deployment Gaps
  • If a provider ISP is duped, it is possible that
    a stub AS will not be reachable by any path seen
    by the AP.

A
If U does not offer deflections, a malicious AS M
could fool U by announce Ds prefix, making it
completely unreachable by the availability
provider A.
U
D
M
23
Handling Deployment Gaps
  • Dests Business preferences help destinations
    (only fellow customers can attack).
  • Sources Paths to a limited number of core APs
    are easy to manage.
  • Local filtering can provide significant benefit.
    As can identifying expected links based on
    well-known core topology.

24
Attacking Probing Efficiency
  • With BGP, each malicious AS can introduce one bad
    path to its neighbors.
  • Total of paths limited by an ASs of
    neighbors, (more likely peers providers).
  • Claim
  • It is non-trivial to introduce many attractive
    paths quickly, especially without getting noticed.

25
More Efficient Probing
  • Base Shortest AS-Path
  • Anomaly Detection
  • Most paths are stable, keep with what has worked
    (e.g. PGBGP).
  • Destination Hints
  • Let destination sign distribute hints about
    its upstream connectivity. Forces attacker paths
    to be longer.

26
Monitoring for Path Performance Attacks
  • Data serves as probes to avoid preferential
    treatments of probe packets.
  • Tricky Attack
  • Malicious AS makes path appear valid, then
    black-holes or degrades performance.

27
Path Performance Monitoring
  • Solutions
  • Have traffic that is robust to hiccups (e.g.
    non-realtime)
  • Duplicate traffic over paths that are likely to
    be trust disjoint
  • Use smart probing techniques to help avoid bad
    control plane paths.

28
Deployability
  • No requirement for address registries,
    cryptographic hardware, ICANN-based PKI, or new
    routing software.
  • Deflections can be implemented using IP-in-IP
    encapsulation and MPLS over IP, which already
    exists in routers today.
  • Deflections also improve performance.

29
Dirty Laundry
  • CIDR and sub-prefix hijacks
  • (Answer Use /24s, which approximates flat
    routing)
  • Datagram communication
  • (Answer either run over long-term secure
    channel, or have data be the identifier, ala
    DNSSEC)

30
ACR Summary
  • Secure interdomain routing proposals are
    heavy-weight, but still insufficient.
  • If end-points set up secure channels, the
    routing infrastructure must only provide multiple
    paths to guarantee availability.
  • This approach has highly attractive properties
    for incentivized deployment
Write a Comment
User Comments (0)
About PowerShow.com