Design and Analysis of the Secure Border Gateway Protocol (S-BGP) - PowerPoint PPT Presentation

1 / 24
About This Presentation
Title:

Design and Analysis of the Secure Border Gateway Protocol (S-BGP)

Description:

BBN Technologies. A Part of. The BGP Security Problem ... BBN Technologies. A Part of. Attack Model. BGP can be attacked in various ways ... – PowerPoint PPT presentation

Number of Views:45
Avg rating:3.0/5.0
Slides: 25
Provided by: nette6
Category:

less

Transcript and Presenter's Notes

Title: Design and Analysis of the Secure Border Gateway Protocol (S-BGP)


1
Design and Analysis of the Secure Border Gateway
Protocol (S-BGP)
  • Dr. Stephen Kent
  • Chief Scientist - Information Security

2
Outline
  • BGP Model
  • BGP security concerns requirements
  • S-BGP design
  • S-BGP performance scaling
  • Related work
  • Whats next

3
Basic BGP Model
ISP-2
Org-X
ISP-1
NAP
Org-Z
ISP-4
ISP-3
Org-Y
- path vector inter-domain routing protocol -
UPDATEs generated in response to loss of
connectivity or receipt of an UPDATE from a peer
router, that results in a LOCRIB change
4
The BGP Security Problem
  • BGP is the critical infrastructure for Internet,
    inter-domain routing
  • Benign configuration errors have wreaked havoc
    for portions of the Internet address space
  • The current system is highly vulnerable to human
    errors, as well as a wide range of attacks
  • At best, BGP uses point-to-point keyed MAC (a
    poor algorithm) no automated key management
  • Solutions must take into account the realities of
    Internet topology, size, update rates, ...

5
Attack Model
  • BGP can be attacked in various ways
  • active or passive wiretapping of communications
    links between routers
  • tampering with BGP speaker software
  • tampering with router management data en route
  • tampering with router management
    workstations/servers
  • (the last three can result in Byzantine
    failures)
  • Addition of the proposed countermeasures
    introduces a new concern
  • compromise of secret/private keying material in
    the routers or in the management infrastructure

6
BGP Security Requirements
  • Address space ownership verification
  • Autonomous System (AS) authentication
  • Router authentication and authorization (relative
    to an AS)
  • Route and address advertisement authorization
  • Route withdrawal authorization
  • Integrity and authenticity of all BGP traffic on
    the wire
  • Timeliness of BGP traffic

7
S-BGP Design Overview
  • IPsec authenticity and integrity of peer-to-peer
    communication, automated key management
  • Public Key Infrastructures (PKIs) secure
    identification of BGP speakers and of owners of
    ASs and of address blocks
  • Attestations --gt authorization of the subject (by
    the issuer) to advertise specified address blocks
  • Validation of UPDATEs based on a new path
    attribute, using certificates and attestations
  • Distribution of countermeasure data
    certificates, CRLs, attestations

8
S-BGP Residual Vulnerabilities
  • Failure to advertise route withdrawal
  • Premature re-advertisement of withdrawn routes
  • Erroneous application of local policy
  • Erroneous traffic forwarding, bogus traffic
    generation, etc. (not really a BGP issue, since
    BGP deals with routing, but not traffic
    forwarding)

9
Internet Address Space Ownership
ICANN/IANA
ARIN/RIPE/APNIC
DSP-A
ORG-X
ORG-Z
ISP-2
DSP-B
ORG-Y
DSP-D
ORG-XX
ORG-ZZ
10
Certificates and Address Space Attestations
  • ICANN issues certificates for address space
    ownership to regional authorities and to entities
    that have direct address allocations (from IANA)
  • Each of these certificates contains an extension
    specifying the address space being delegated, so
    that certificate validation is address-constrained
  • Holders of address space certificates can create
    an address attestation, authorizing an AS (or a
    router) to advertise the specified address space
  • Only networks that execute BGP need certificates
  • All ISPs are BGP users, but only about 10 of
    DSPs, maybe 5 of subscribers, are BGP users

11
Simplified PKI for Address Blocks
12
Certificates and Route Attestations
  • ICANN issues certificates for AS ownership to
    ISPs, DSPs, and organizations that run BGP
  • AS operators issue certificates to routers, as AS
    representatives
  • Holders of AS (or router) certificates generate
    route attestations, authorizing advertisement of
    a route by a specified next hop AS
  • Route attestations are used to express a secure
    route as a sequence of AS hops

13
PKI for Speaker ID AS Assignment
R
I
P
E
A
S

N
u
m
b
e
r
s












A
T

T
D
S
P

1
I
S
P

2
M
C
I
r
s
A
S

N
u
m
b
e
r
s
A
S


W
A
S

N
u
m
b
e
r
s
A
S

N
u
m
b
e
r
s






















A
S


X
D
S
P

3
R
o
u
t
e
r
s

i
n

A
S


X
I
S
P

4
A
S


Y
A
S


X
,

R
o
u
t
e
r

B
G
P

I
A
S


Z
A
S


Y
R
o
u
t
e
r
s

i
n

A
S


Y
A
S


Z
R
o
u
t
e
r
s

i
n

A
S


Z
A
S


Y
,

R
o
u
t
e
r

B
G
P

A
S


Z
,

R
o
u
t
e
r

B
G
P

I
I
14
Securing UPDATE messages
  • A secure UPDATE consists of an UPDATE message
    with a new, optional, transitive path attribute
    for route authorization
  • This attribute consists of a signed sequence of
    route attestations, nominally terminating in an
    address space attestation
  • This attribute is structured to support both
    route aggregation and AS sets
  • Validation of the attribute verifies that the
    route was authorized by each AS along the path
    and by the ultimate address space owner

15
An UPDATE with Attestations
16
Simplified Attribute Format
BGP Hdr Withdrawn NLRI, Path Attributes, Dest.
NLRI
RA Issuer, Cert ID, Validity, Subject, Path,
NLRI, SIG
RA Issuer, Cert ID, Validity, Subject, Path,
NLRI, SIG
RA Issuer, Cert ID, Validity, Subject, Path,
NLRI, SIG
AA Owning Org, NLRI, first Hop AS, SIG
(usually omitted)
17
Distributing Certificates, CRLs, AAs
  • Putting certificates CRLs in UPDATEs would be
    redundant and make UPDATEs too big
  • Same is true for address attestations
  • Solution use servers for these data items
  • replicate for redundancy scalability
  • locate at NAPs for direct (non-routed) access
  • download options
  • whole certificate/AA/CRL databases
  • queries for specific certificates/AAs/CRLs
  • To minimize processing storage overhead, NOCs
    should validate certificates AAs, and send
    processed extracts to routers

18
Distributing Route Attestations
  • Distributed with BGP UPDATEs as path attributes
  • RAs have implicit encoding option to reduce size,
    avoid exceeding UPDATE size limit (4096b)
  • Cache with associated routes in ADJ-RIBs to
    reduce validation overhead
  • Expiration date present, but no revocation
    mechanism chosen yet

19
BGP Statistics (from Merit)
  • 1,800 organizations own AS numbers
  • 44,000 own address prefixes (NLRI)
  • 7,500 BGP speakers
  • 75,000 routes in an ISP BGP database
  • Few AS sets (100), little address aggregation
  • Average path length (NAP perspective) is 2.6
    hops 50 of routes 2 hops, 96 4 hops
  • 43,000 UPDATEs received each day at a BGP
    speaker at a NAP (30 peers)

20
S-BGP Storage Statistics
  • 58,000 certificates in database (550b each)
  • Certificate CRL database 35Mb
  • Address attestation database 4 Mbytes
  • Extracted certificate AA database (with data
    structure overhead in GateD) 42Mb
  • Route attestations occupy 16 Mb per ADJ-RIB
    about 64 Mb (4 peers) to 480 Mb (at NAP)
  • ADJ-RIB caching for received UPDATEs increases
    storage requirements by about 50, and yields
    about 53 validation savings

21
Route Attestation Overhead
  • Transmission
  • RAs add 450 bytes to a typical (3.6 ASes in
    path) UPDATE of 63 bytes, 700 overhead!
  • But UPDATEs represent a very small portion of all
    traffic, so steady state bandwidth for RA
    transmission is only 1.4Kb/s
  • Processing
  • Average of 3.6 signature validations per received
    UPDATE and 1 generation per emitted UPDATE
  • Peak rates 18/s validation and 5/s generation
    w/o caching (peak estimated as ten times average)
  • UPDATE caching should reduce validation value by
    50
  • Start up transient would overwhelm a speaker,
    thus NV storage or heuristics are required

22
Auxiliary S-BGP Device Option
  • No changes required to router hardware or
    software, just re-configuration
  • Use PC to provide CPU, memory, and NV storage
    needed to handle BGP routing and S-BGP
  • Collocated with current border routers
  • auxiliary boxes peer with each other (boxes in
    same AS and boxes collocated with neighbor
    routers) and the border router
  • border router peers only with auxiliary box and
    internal BGP routers (in the same AS)
  • Downside requires extra rack space, uses a
    router port, increases the managed device count

23
Related Work
  • Link state (e.g., OSPF) security mechanisms
  • Distance vector routing security proposals
  • Some clever schemes developed, but not applicable
    to BGP, a path vector protocol (e.g., due to
    local policy processing)
  • Many designs assume signature processing, not
    memory, is the biggest performance problem to be
    solved
  • Routing Policy Specification Language (RPSL)
  • Product of IETF RPSL WG
  • Requires ISPs/DSPs to publish (local) policy info
  • Secures distribution of policy info, but relies
    on ISP/DSP staff to retrieve, interpret, and
    employ policy info for enforcement

24
Whats Next?
  • Tech transfer
  • Distribute S-BGP software to all interested
    parties
  • Work with ISPs and router vendors to develop
    implementations and operational experience
  • Work with ICANN, ARIN, etc. to establish PKIs and
    to deploy certificate/CRL/AA servers (other uses
    for parts of this PKI)
  • Testing and deployment issues
  • CAIRN test bed is small and tests were too short
  • ISP feed was not a good test for NAP router
    scenario, though probably representative of a
    feed to a DSP
  • Intra-domain distribution of S-BGP attribute
    options
Write a Comment
User Comments (0)
About PowerShow.com