SlideShare a Scribd company logo
1 of 69
Download to read offline
Threats to Internet Routing and Global
Connectivity
20th Annual FIRST Conference
Vancouver, British Columbia Canada
June 2008
Earl Zmijewski, Renesys Corp
June 2008 2Internet Threats
The Internet – For Better or For Worse
Has the following characteristics ...
• voluntarily association
• no governing body
• cooperative trust-based system
• commodity service
which have given the Internet …
• its explosive growth and
• many of its major problems.
June 2008 3Internet Threats
An ungoverned, trust-based Internet has given us …
• Spam
• Viruses
• Malware
• Phishing
• Spyware
• Worms
• Trojans
• DDoS attacks
• Wide-spread identity theft and fraud
• …
We will not talk about any of these.
June 2008 4Internet Threats
Instead, we’ll talk about threats to the Internet
infrastructure …
• Physical problems
(Physical Infrastructure: Natural, accidental or intentional
destruction)
• Earthquakes, Anchors/Backhoes, Hurricanes
• Routing Vulnerabilities
(Logical Infrastructure: if routers cannot direct traffic
appropriately, the Internet is broken.)
• Misconfigurations, hijacks, attacks
• Business Conflicts
(Competitors might not want to exchange traffic.)
• De-peerings
June 2008 5Internet Threats
These threats can …
• Break global connectivity
• Disrupting Internet-dependent businesses
• Impacting the global economy
• Be difficult to diagnose and troubleshoot
• People don’t often think about routing
• Or don’t have good visibility into global routing
• Be extremely difficult to fix
• Physical destruction: weeks to months
• Routing vulnerabilities: hours to days
• Business conflicts: weeks to forever
• Lack sufficient business drivers to fix
• In a commodity market, it’s difficult to justify added expense for
redundancy, monitoring, security
• Interconnections are voluntary!
June 2008 6Internet Threats
• Physical problems
(Physical Infrastructure: Natural, accidental or intentional
destruction)
• Earthquakes, Anchors/Backhoes, Hurricanes
• Routing Vulnerabilities
(Logical Infrastructure: if routers cannot direct traffic
appropriately, the Internet is broken.)
• Misconfigurations, hijacks, attacks
• Business Conflicts
(Competitors might not want to exchange traffic.)
• De-peerings
Threats to the Internet infrastructure
June 2008 7Internet Threats
Physical Problems – Recent History
• Earthquakes
• Taiwan quakes (2006 – 2007)
• Anchors – The Backhoes of the Sea
• Mediterranean & Gulf cable breaks (2008)
• Hurricanes
• Katrina (2005)
Physical failures can also be the result of malicious
activity, e.g., 9/11
June 2008 8Internet Threats
Physical Problems
• Earthquakes
• Taiwan quakes
• Anchors – The Backhoes of the Sea
• Mediterranean & Gulf cable breaks
• Hurricanes
• Katrina
June 2008 Internet Threats
But first, a bit of terminology
• Network prefix is a range of contiguous IP addresses:
• 11.1.18.0/24 contains addresses 11.1.18.0, …, 11.1.18.255
• Prefix length equals the number of network address bits:
• 11.1.18.0/24 = 00001011.00000001.00010010.00000000
24 network address bits 8 host IP address bits
• 11.1.16.0/20 = 00001011.00000001.00010000.00000000
20 network address bits 12 host IP address bits
• More-specific prefix means …
• more network address bits
• fewer host IP addresses
• 11.1.18.0/24 is more specific than 11.1.16.0/20.
June 2008 10Internet Threats
Taiwan Earthquakes – December 2006
• Large earthquakes hit Luzon Strait, south
of Taiwan on 26 December 2006
• 7 of 9 cables in the strait were severed
• 7901 prefix outages (28% of region)
• 15,780 unstable prefixes (36% of region)
• All cables reported repaired 51 days later!
(source: 14 February 2007, Office of the Telecommunications Authority of Hong Kong)
June 2008 Internet Threats
Submarine cables in East Asia
Page 11
• Damaged cables
• China-US Cable Network
• SEA-ME-WE 3
• Asia-Pacific Cable Network 2
• FLAG Europe Asia
• FLAG North Asia, and others
• Only two not impacted
• Asia Netcom’s EAC
• Guam-Philippines Cable
11
June 2008 Internet Threats
Different ways to impact
Page 12
• Prefix Outages
• By Country / Population
• Total outages
• Percentage of outaged prefixes
• Unstable Prefixes
• By Country / Population
• Total unstable prefixes
• Percentage of unstable prefixes
12
June 2008 Internet Threats
Outages by Country: Total and Percentage
13
Outages by Country (#)
0 500 1000 1500 2000 2500
Laos
Myanmar
Macao
Mongolia
Nepal
Taiw an
Pakistan
Japan
S. Korea
Vietnam
Thailand
Malaysia
Bangladesh
Philippines
Singapore
Hong Kong
China
Indonesia
India
Number of Prefixes
Outages by Country (%)
0 10 20 30 40 50 60
Laos
Myanmar
Macao
Mongolia
Nepal
Taiw an
Pakistan
Japan
S. Korea
Vietnam
Thailand
Malaysia
Bangladesh
Philippines
Singapore
Hong Kong
China
Indonesia
India
Percentage of Prefixes
June 2008 Internet Threats
Unstables by Country: Total and Percentage
14
Unstables by Country (#)
0 1000 2000 3000 4000 5000
Myanmar
Laos
Macao
Mongolia
Nepal
Japan
Pakistan
Vietnam
S. Korea
Malaysia
Taiw an
Bangladesh
Thailand
Singapore
Philippines
Hong Kong
Indonesia
India
China
Number of Prefixes
Unstables by Country (%)
0 10 20 30 40 50 60 70 80
Myanmar
Laos
Macao
Mongolia
Nepal
Japan
Pakistan
Vietnam
S. Korea
Malaysia
Taiw an
Bangladesh
Thailand
Singapore
Philippines
Hong Kong
Indonesia
India
China
Percentage of Prefixes
June 2008 Internet Threats
Taiwan Earthquakes – Overall Impact
• Worst Impacted ( > 60% Outages + Unstables)
(with large populations)
• India, China/Hong Kong, Indonesia, Philippines
• Least Impacted ( < 5% Outages + Unstables)
• Korea, Japan
• Modest Impact on Taiwan
• ~ 3% Outages + ~14% Unstables
• Significant Impact on India
• Numerous outsourced operations were hurt
15
June 2008 16Internet Threats
Why India?
Major subcontinent bandwidth heads East
Image credit: Asia Netcom
June 2008 17Internet Threats
Physical Problems
• Earthquakes
• Taiwan quakes
• Anchors – The Backhoes of the Sea
• Mediterranean & Gulf cable breaks
• Hurricanes
• Katrina
June 2008 18Internet Threats
Middle East Cable Breaks – Jan/Feb 2008
• Several cables in the Mediterranean and the
Persian Gulf were damaged from around
January 30 to February 2
• All repairs completed within 14 days.
• Impacted regions include …
• Middle East / North Africa (65% outaged prefixes)
(not including Israel since they weren’t impacted)
• Persian Gulf (45% outaged prefixes)
• Indian Subcontinent (32% outaged prefixes)
• 6856 prefixes from 23 countries suffered outages
June 2008 19Internet Threats
Impacted Countries
Darker colors in each region represent countries with prefix outages of at least 50%.
June 2008 20Internet Threats
SYRIA
PALESTINIAN TER.
BAHRAIN
ETHIOPIA
DJIBOUTI
SUDAN
QATAR
MOROCCO
SRI LANKA
MALDIVES
IRAQ
SAUDI ARABIA
UAE
ALGERIA
BANGLADESH
LEBANON
IRAN
ISRAEL
KUWAIT
PAKISTAN
EGYPT
INDIA
0 500 1000 1500 2000
Outages per country (# pfxs)
# prefixes
SYRIA
PALESTINIAN TER.
BAHRAIN
ETHIOPIA
DJIBOUTI
SUDAN
QATAR
MOROCCO
SRI LANKA
MALDIVES
IRAQ
SAUDI ARABIA
UAE
ALGERIA
BANGLADESH
LEBANON
IRAN
ISRAEL
KUWAIT
PAKISTAN
EGYPT
INDIA
0 20 40 60 80 100
Outages per Country (%)
% of total prefixes
Outages by Country: Total and Percentage
June 2008 Internet Threats
Middle Cable Breaks – Overall Impact
• Most Impacted (≥ 80% Outages)
• Djibouti, Egypt, Ethiopia, Maldives, Pakistan
• Least Impacted (≤ 10% Outages)
• Israel, Bahrain
• Significant Impact on India (again!)
21
June 2008 22Internet Threats
Physical Problems
• Earthquakes
• Taiwan quakes
• Anchors – The Backhoes of the Sea
• Mediterranean & Gulf cable breaks
• Hurricanes
• Katrina
June 2008 23Internet Threats
These threats aren’t faraway problems
June 2008 24Internet Threats
Submarine Cable Systems by Capacity
Image credit: Telegeography
Bandwidth-limited areas and choke points are obvious
June 2008 25Internet Threats
Lessons learned from physical failures
• You get what you pay for
• Natural trade-off: cost, performance/latency vs. reliability
• Entropy happens
• Cables break in the Atlantic all the time, nobody notices
• Geography plays an important role
• Cables break in the Taiwan Straits or Suez Canal,
entire geographic regions lose connectivity
• Intelligence is essential for disaster planning and recovery
• For organizations to select providers
• For local ISPs to select new upstream providers
• For a global ISP to acquire new customers
June 2008 26Internet Threats
Physical Problems: Prognosis is Good!
• Recent failures have gotten the attention of
businesses and governments
• Businesses want providers with redundant capacity
• Governments want control of their critical infrastructure
• Saudi Arabia and Egypt have announced new cable deals
• Mini cable-building boom in progress
• At least 25 new cables, costing approximately USD 6.4
billion, will be constructed between 2008 and 2010
Source: Telegeography
June 2008 27Internet Threats
What can I do?
• Operations
• Understand capacity, location and vulnerabilities
• Diversify existing capacity
• Get more capacity on diverse physical paths
• Policy
• Influence national communications policy to
encourage investment
June 2008 28Internet Threats
• Physical problems
(Physical Infrastructure: Natural, accidental or intentional
destruction)
• Earthquakes, Anchors/Backhoes, Hurricanes
• Routing Vulnerabilities
(Logical Infrastructure: if routers cannot direct traffic
appropriately, the Internet is broken.)
• Misconfigurations, hijacks, attacks
• Business Conflicts
(Competitors might not want to exchange traffic.)
• De-peerings
Threats to the Internet infrastructure
June 2008 29Internet Threats
Routing Vulnerabilities
• Hijacks
• YouTube (2008)
• Review of other notable incidents (1997 – present)
• DOD (2008)
• DNS misappropriation
• Root name server identity theft (2007 – 2008)
June 2008 30Internet Threats
Autonomous System Numbers (ASNs)
Each organization announcing a routing
policy on the Internet is assigned:
• A unique ASN (integer)
• One or more prefixes (range of IP addresses)
Example ASNs:
• Sprint: 1239
• AT&T: 7018
• IRS: 30313
• YouTube: 36561
June 2008 31Internet Threats
Routers talk to neighboring routers via BGP
(Border Gateway Protocol) that’s how global routing is established
Routing msgRouting msgRouting msgRouting msg
Routing msgRouting msgRouting msgRouting msg
route to 192.0.2.0/24
pick me!
route to 192.0.2.0/24
pick me!
route to 192.0.2.0/24
pick me!
Typical messages
• “I have a route to prefix A”
• “I no longer have a route to prefix B”
Each router makes local decisions
about the best route to each prefix
June 2008 32Internet Threats
Routing Vulnerabilities
• Hijacks
• YouTube (2008)
• Review of other notable incidents (1997 – present)
• DOD (2008)
• DNS misappropriation
• Root name server identity theft (2007 – 2008)
June 2008 33Internet Threats
YouTube – February 2008
Like most content providers, YouTube has no
need for massive amounts of IP space.
• They are assigned only 5 small prefixes
• One prefix is 208.65.152.0/22
• This contains the more-specific 208.65.153.0/24
• This /24 used to contain all of YouTube’s
• DNS Servers (have since moved)
• Web Servers
• YouTube announced only the /22
June 2008 34Internet Threats
Overview of 24 February 2008 Hijack
• Pakistan’s government decides to block YouTube
(Posted video is deemed “offensive”.)
• Pakistan Telecom apparently black holes
208.65.153.0/24 on their internal network
• So far, this is only impacting Pakistan and their
ability to reach YouTube
• This is not uncommon for some governments
June 2008 35Internet Threats
Overview
June 2008 36Internet Threats
Overview of Hijack (Continued)
• Pakistan Telecom then mistakenly announces this
critical YouTube prefix to their upstream Asian
carrier PCCW as if it was their own.
• PCCW propagates this route globally.
• On the Internet, most specific route wins!
• Most of the Internet goes to Pakistan for YouTube
for 2 hours and gets nothing!
• Eventually, PCCW turns off Pakistan Telecom
June 2008 37Internet Threats
We’ve been here before, but on a larger scale …
Con Edison (AS 27506)
(dozens of bogus routes)
Jan 2006
TTNet (AS 9121)
(100K bogus routes)
Dec 2004
MAI Network Services (AS 7007)
(70K bogus routes)
Apr 1997
Each of these providers announced parts of the Internet not under
their control, resulting in various degrees of bedlam.
June 2008 38Internet Threats
But do hijacks really occur with any regularity?
Examine two US DoD networks and their more specifics
DoD owns but does not announce 7.0.0.0/8, 11.0.0.0/8, 30.0.0.0/8
and others. These networks are “free for the taking” without any
impact on DoD.
11.11.11.0/24
11.1.1.0/24
7.7.7.0/24
11.0.0.0/24
30.30.30.0/24
11.11.11.0/24
11.11.11.0/24
Prefix
24140 minArgentinaTelefonica (AS 10834)April 30
24416 hoursUSITC Deltacom (AS 6983)April 25 – 26
A Sampling of Hijacks in 2008
2071.1 hoursHong KongHutchinson (AS 9304)January 5
2483.5 weeksRussiaHelios Net (AS 21240)March 5 – 29
22716 minS. KoreaPosdata (AS 18305)March 7
1552.1 minIndonesiaINDO Internet (AS 9340)May 10
2326.5 minTurkeyTeknoas (AS 42075)May 17
Max
Peers
Avg Time
per Peer
CountryOrigination (AS)Date(s)
Every announcement in this assigned, but unused, space is a hijack.
June 2008 39Internet Threats
Threat is Poorly Understood: Memorable Quotes
- Full technical details published 24 February at www.renesys.com/blog
• "We are not hackers. Why would we do that?" Shahzada
Alam Malik, head of the Pakistan Telecommunication
Authority, told Associated Press Television News. YouTube's
wider problems were likely caused by a "malfunction"
elsewhere, he said.
— International Herald Tribune, 27 February 2008
• Attempts to log on to the Google-owned site typically timed
out. Keynote* is unable to uncover the causes of an outage,
said Shawn White, Keynote's director of operations, but he
added that he would be shocked if one country had the ability
to bring down YouTube globally.
— CNET, 24 February 2008
* Keynote Systems, Inc. is “The Mobile and Internet Performance Authority”
June 2008 40Internet Threats
Solutions?
• Replace BGP (go ahead, I’ll wait)
• Limited value unless everyone does it
• Filter announcements
• Difficult to implement and maintain
• No single authoritative source of who owns what
• Security may not be compatible with resiliency
• Monitor networks you care about
• Increases costs
• Reactive, not Proactive
• Do you know anyone at Pakistan Telecom?
• You are hijacked, then what?
June 2008 41Internet Threats
Routing Vulnerabilities
• Hijacks
• YouTube (2008)
• Review of other notable incidents (1997 – present)
• DOD (2008)
• DNS misappropriation
• Root name server identity theft (2007 – 2008)
June 2008 42Internet Threats
DNS – Root Name Servers
• 13 root name server IP addresses
• Named by single letters: A, B, C, … M.
• L root is run by ICANN
• Old IP: 198.32.64.12
• From 1997 until 2007
• Registered to Bill Manning, ep.net
• New IP: 199.7.83.42
• Effective 1 November 2007
• Registered to ICANN
June 2008 43Internet Threats
Old L Root Name Servers: 2007 – 2008
• ICANN runs the old L root for additional 6 months
• New unauthorized root servers start appearing
• Dec 15th – Community DNS (England)
• Mar 18th – EP.NET (US – Bill Manning)
• Apr 1st – Diyixian (Hong Kong)
• May 2nd – ICANN turns off its own old L root
• May 16th – All bogus old L root servers turned off
under pressure from ICANN
June 2008 44Internet Threats
Timeline for old L root servers
June 2008 45Internet Threats
Lots of unanswered questions
• Why was ICANN not using their own space?
• Was it difficult to get IP space in 1997?
• Why the change after 10 years?
• 11.7 million DNS servers worldwide (source: Infoblox)
• How many of those do you think were updated?
• Why wasn’t the space given to ICANN?
• ARIN shows Manning has five /16s and a /22
• This is equivalent to 1284 /24s (only 44% routed)
• ICANN only needs a single /24 for the L root
• Why all the bogus L root servers?
June 2008 46Internet Threats
Is this much ado about nothing?
• What could you do with a root name server?
• Provide updated list of all the root name servers
• Provide updated NS records for all TLDs
• Set TTL = 0 for your answers
• Perform recursion by default
• Log everything
• Censor, misdirect
• No evidence of any of this in this case
• But the duration of the event, the potential for
mayhem, the complete absence of any
safeguards are the cause for concern
June 2008 47Internet Threats
Lessons learned from routing vulnerabilities
• No one is minding the store. No one.
• No mechanism in place to handle root
operators or ISPs who go rogue
• No single authoritative source of who
should be doing what
June 2008 48Internet Threats
Routing Vulnerabilities: Prognosis is Dismal
• Hijacking has been going on for over 10 years!
• No incremental, comprehensive solutions
• Lacking economic drivers
• Doesn’t happen daily and universally
• Avoiding negative publicity is not necessarily compelling
• Miscreants are actively hijacking now
• To send spam from “clean” IP blocks
• To cover their tracks
• What good are your firewall/IDS logs now?
• Need historical global routing data
June 2008 49Internet Threats
What can I do?
• Operations
• Monitor prefixes you care about
• Maintain alerts
• Establish procedures for handling hijacks quickly
• Develop procedures for dealing with hijacks in
concert with your providers
• Policy
• Build awareness of routing-based attacks
• Influence positive policy (tricky, evidence not good)
June 2008 50Internet Threats
• Physical problems
(Physical Infrastructure: Natural, accidental or intentional
destruction)
• Earthquakes, Anchors/Backhoes, Hurricanes
• Routing Vulnerabilities
(Logical Infrastructure: if routers cannot direct traffic
appropriately, the Internet is broken.)
• Misconfigurations, hijacks, attacks
• Business Conflicts
(Competitors might not want to exchange traffic.)
• De-peerings
Threats to the Internet infrastructure
June 2008 51Internet Threats
Interconnections on the Internet
• Two forms of interconnection exist
• Transit
- “ … transit service is typically priced per megabit per
second per month …”
Source: Wikipedia
o single homed: one provider
o multihomed: more than one provider
• Peering
- “Peering is voluntary interconnection of
administratively separate Internet networks” … where
“neither party pays the other for the exchanged traffic.”
Source: Wikipedia
June 2008 52Internet Threats
• We observe over 8.7 million distinct AS paths.
• These paths are comprised of over 93,000 unique AS-AS
adjacencies.
• Each adjacency represents a business relationship, e.g.,
• Customer → Provider
• Provider → Customer
• Peer → Peer
• Transit swap
• AS cluster (multiple ASes now part of the same organization)
• These relationships can be compute algorithmically with a
high degree of confidence.
Business relationships:
Easy to observe, difficult to classify
June 2008 53Internet Threats
Peering Goal – Maximize $ In, Minimize $ Out
C1
P1
Cn
$ $
C2
P2
$
Cm
$
P4
$$ $$
P3 P5
$$ $$
... ...
June 2008 54Internet Threats
Reduce Transit Costs by Peering with Competitors
C1
P1
Cn
$ $
C2
P2
$
Cm
$
P4
$$ $$
P3 P5
$$ $$
... ...
$
Peering Link
June 2008 55Internet Threats
Customers of P1 and P2 exchange traffic without
either provider incurring transit costs
C1
P1
Cn
$ $
C2
P2
$
Cm
$
P4
$$ $$
P3 P5
$$ $$
... ...
$
Peering Link
June 2008 56Internet Threats
• Reduce transit costs (happier providers)
• Reduce latencies (happier customers)
• Increased billable traffic to customers
• Enhance operational stability
• Localize connectivity
• Roughly equal mutual benefit
Reasons to Peer
June 2008 57Internet Threats
A Tier-1 network has no transit providers – only peers and
customers. (“Tier-1” term is inconsistently used.)
To maintain global connectivity, the Tier-1 providers must all
peer with one another.
Top of the Internet Food Chain: Tier-1
June 2008 58Internet Threats
Follow the Money –
if P5 & P6 de-peer, their single-homed customers can’t communicate
P4 will not
carry traffic
between C1
and C2 for free
June 2008 59Internet Threats
• Sprint, AT&T, Level 3, NTT, Savvis, etc.
• Tier-1 providers act like a cartel and have
no incentive to add members
• “Near” Tier-1 providers can try to buy their
way into the club (via “paid peering”).
Who are the Tier-1 providers?
June 2008 60Internet Threats
• Cogent and Telia peer
• Cogent gets transit only from NTT to reach AOL
• Telia appeared to get transit from Verizon to reach
certain networks
• On February 27th, we stopped seeing evidence of transit
• Renesys promotes Telia to “Tier-1” – no known providers
• Telia could still be paying for some of these
interconnections
Cogent and Telia want to be Tier-1
June 2008 61Internet Threats
• March 13th: Cogent de-peers Telia, claiming
breach of contract
• The Internet is partitioned
• Single homed customers behind Cogent and Telia
could not reach one another.
• March 28th: Peering link is restored.
• After two weeks, the Internet is once again whole.
Overview of Cogent-Telia Peering Dispute
June 2008 62Internet Threats
Which regions were impacted?
86Others
27UK
31Germany
41Spain
98France
232Canada
1868US
# PrefixesCountry
249Others
30Norway
35Denmark
40Spain
52Bulgaria
62Latvia
73US
113Poland
153Russia
322Finland
444Sweden
# PrefixesCountry
Telia cannot reach Cogent Cogent cannot reach Telia
June 2008 63Internet Threats
• Peering disputes with Cogent tend to be about
traffic ratios
• Imbalanced ratios tend to imply that one party is carrying
the other’s traffic longer distances (distance = money)
• Did Cogent and Telia get into a dispute over ratios?
• Did Cogent view Telia as in a weaker position?
• How many European customers want to reach Cogent
hosted content?
Why did this happen? Who knows?
June 2008 64Internet Threats
• After the re-peering
• Telia reaches 2934 more prefixes via Cogent
• Cogent reaches 635 fewer prefixes via Telia
• Result of re-engineering by both parties
• Sure seems like this was about traffic ratios
What changed?
June 2008 65Internet Threats
• Being a (near) Tier-1 is not easy
• You depend on everyone else in the cartel
• You will be punished if you are perceived to be in a
position of weakness.
• Peering relationships are tricky
• Depend on both objective measures and perceptions
• Disputes can take a long time to resolve. The only driver
is market pressure.
• Being single-homed is dangerous
Lessons Learned from De-peerings
June 2008 66Internet Threats
De-peerings: Prognosis is Improving
• An increasing number of businesses and
organizations are now multi-homed.
• Many more peering relationships, lessening the
impact of any one loss
• True global Tier-1s would probably never consider
de-peering
• Impact would be wide ranging
• Would invite government involvement
• Tier-1s are becoming less relevant, as smaller
players peer around them
June 2008 67Internet Threats
What can I do?
• Operations
• Select multiple diverse providers
• Investigate providers carefully with respect to
connectivity & peering
• Policy
• Build awareness of the issue
• When peering disputes occur, make a stink
• No stink → No action
• Influence positive policy (tricky, evidence not good)
June 2008 68Internet Threats
• Physical problems
• Prognosis is good.
• But US will become less relevant.
• Routing Vulnerabilities
• Prognosis is dismal.
• No clear path forward. Band-Aids only.
• Business Conflicts
• Prognosis is improving.
• Awareness and public pressure is key.
Conclusions
Thank You
Page 69
Martin Brown mabrown@renesys.com
James Cowie cowie@renesys.com
Andy Ogielski ato@renesys.com
Alin Popescu alin@renesys.com
BJ Premore bj@renesys.com
Todd Underwood todd@renesys.com
Earl Zmijewski earl@renesys.com

More Related Content

Viewers also liked

Viewers also liked (12)

La Cura, Erbe Indisciplinate, presentazione di benvenuto, frame
La Cura, Erbe Indisciplinate, presentazione di benvenuto, frameLa Cura, Erbe Indisciplinate, presentazione di benvenuto, frame
La Cura, Erbe Indisciplinate, presentazione di benvenuto, frame
 
Babar Resume Latest Jan'15
Babar Resume Latest Jan'15Babar Resume Latest Jan'15
Babar Resume Latest Jan'15
 
EL ROL DEL PROFESOR COMO CURADOR DE CONTENIDOS DIGITALES
EL ROL DEL PROFESOR COMO CURADOR DE CONTENIDOS DIGITALESEL ROL DEL PROFESOR COMO CURADOR DE CONTENIDOS DIGITALES
EL ROL DEL PROFESOR COMO CURADOR DE CONTENIDOS DIGITALES
 
Propaganda In China
Propaganda In ChinaPropaganda In China
Propaganda In China
 
Analisa sekolah standart nasional
Analisa sekolah standart nasionalAnalisa sekolah standart nasional
Analisa sekolah standart nasional
 
20161206 orid.2
20161206 orid.220161206 orid.2
20161206 orid.2
 
Managing Risks in Large Solar Energy Projects
Managing Risks in Large Solar Energy ProjectsManaging Risks in Large Solar Energy Projects
Managing Risks in Large Solar Energy Projects
 
Pink Solar Energy Storage - Best Practice - Horst Striessnig 2013-06-11
Pink   Solar Energy Storage - Best Practice - Horst Striessnig 2013-06-11Pink   Solar Energy Storage - Best Practice - Horst Striessnig 2013-06-11
Pink Solar Energy Storage - Best Practice - Horst Striessnig 2013-06-11
 
my c.v 2
my c.v 2my c.v 2
my c.v 2
 
社會住宅手冊(Part A) 社會住宅ABC
社會住宅手冊(Part A) 社會住宅ABC社會住宅手冊(Part A) 社會住宅ABC
社會住宅手冊(Part A) 社會住宅ABC
 
Javier Guallar. El bibliotecari com a content curator (I)
Javier Guallar. El bibliotecari com a content curator (I) Javier Guallar. El bibliotecari com a content curator (I)
Javier Guallar. El bibliotecari com a content curator (I)
 
P&WC_BW
P&WC_BWP&WC_BW
P&WC_BW
 

Similar to 20thAnnualFIRST

Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008
JOSÉ RAMON CARIAS
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trends
Live Tecnologies
 
071010 internet in developing countries mbala pascal ppt
071010 internet in developing countries   mbala pascal ppt071010 internet in developing countries   mbala pascal ppt
071010 internet in developing countries mbala pascal ppt
guest0f94fe
 
Ecrea2b Mbala Pascal Ppt
Ecrea2b Mbala Pascal PptEcrea2b Mbala Pascal Ppt
Ecrea2b Mbala Pascal Ppt
imec.archive
 

Similar to 20thAnnualFIRST (20)

Mac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net NeutralityMac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net Neutrality
 
"The Future of Connectivity" by Siamak Ebadi
"The Future of Connectivity" by Siamak Ebadi"The Future of Connectivity" by Siamak Ebadi
"The Future of Connectivity" by Siamak Ebadi
 
Mac309 Net Neutrality 2008 9
Mac309 Net Neutrality 2008 9Mac309 Net Neutrality 2008 9
Mac309 Net Neutrality 2008 9
 
The Top Outages of 2023: Analyses and Takeaways
The Top Outages of 2023: Analyses and TakeawaysThe Top Outages of 2023: Analyses and Takeaways
The Top Outages of 2023: Analyses and Takeaways
 
Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008
 
Southern Utah Tech Council Presentation 4/8/11
Southern Utah Tech Council Presentation 4/8/11Southern Utah Tech Council Presentation 4/8/11
Southern Utah Tech Council Presentation 4/8/11
 
Asia-Pacific and the Next Billion: Challenges in Digital Inclusion
Asia-Pacific and the Next Billion: Challenges in Digital InclusionAsia-Pacific and the Next Billion: Challenges in Digital Inclusion
Asia-Pacific and the Next Billion: Challenges in Digital Inclusion
 
20150525 wsis
20150525 wsis20150525 wsis
20150525 wsis
 
Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")
 
Ch # 5, CISM
Ch # 5, CISMCh # 5, CISM
Ch # 5, CISM
 
Network Neutrality and Quality of Experience
Network Neutrality and Quality of ExperienceNetwork Neutrality and Quality of Experience
Network Neutrality and Quality of Experience
 
LTE Network Automation Under Threat
LTE Network Automation Under ThreatLTE Network Automation Under Threat
LTE Network Automation Under Threat
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trends
 
FirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local GovernmentsFirstNet: Recent Developments and Current Uncertainties for Local Governments
FirstNet: Recent Developments and Current Uncertainties for Local Governments
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only bigger
 
071010 internet in developing countries mbala pascal ppt
071010 internet in developing countries   mbala pascal ppt071010 internet in developing countries   mbala pascal ppt
071010 internet in developing countries mbala pascal ppt
 
Ecrea2b Mbala Pascal Ppt
Ecrea2b Mbala Pascal PptEcrea2b Mbala Pascal Ppt
Ecrea2b Mbala Pascal Ppt
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 

20thAnnualFIRST

  • 1. Threats to Internet Routing and Global Connectivity 20th Annual FIRST Conference Vancouver, British Columbia Canada June 2008 Earl Zmijewski, Renesys Corp
  • 2. June 2008 2Internet Threats The Internet – For Better or For Worse Has the following characteristics ... • voluntarily association • no governing body • cooperative trust-based system • commodity service which have given the Internet … • its explosive growth and • many of its major problems.
  • 3. June 2008 3Internet Threats An ungoverned, trust-based Internet has given us … • Spam • Viruses • Malware • Phishing • Spyware • Worms • Trojans • DDoS attacks • Wide-spread identity theft and fraud • … We will not talk about any of these.
  • 4. June 2008 4Internet Threats Instead, we’ll talk about threats to the Internet infrastructure … • Physical problems (Physical Infrastructure: Natural, accidental or intentional destruction) • Earthquakes, Anchors/Backhoes, Hurricanes • Routing Vulnerabilities (Logical Infrastructure: if routers cannot direct traffic appropriately, the Internet is broken.) • Misconfigurations, hijacks, attacks • Business Conflicts (Competitors might not want to exchange traffic.) • De-peerings
  • 5. June 2008 5Internet Threats These threats can … • Break global connectivity • Disrupting Internet-dependent businesses • Impacting the global economy • Be difficult to diagnose and troubleshoot • People don’t often think about routing • Or don’t have good visibility into global routing • Be extremely difficult to fix • Physical destruction: weeks to months • Routing vulnerabilities: hours to days • Business conflicts: weeks to forever • Lack sufficient business drivers to fix • In a commodity market, it’s difficult to justify added expense for redundancy, monitoring, security • Interconnections are voluntary!
  • 6. June 2008 6Internet Threats • Physical problems (Physical Infrastructure: Natural, accidental or intentional destruction) • Earthquakes, Anchors/Backhoes, Hurricanes • Routing Vulnerabilities (Logical Infrastructure: if routers cannot direct traffic appropriately, the Internet is broken.) • Misconfigurations, hijacks, attacks • Business Conflicts (Competitors might not want to exchange traffic.) • De-peerings Threats to the Internet infrastructure
  • 7. June 2008 7Internet Threats Physical Problems – Recent History • Earthquakes • Taiwan quakes (2006 – 2007) • Anchors – The Backhoes of the Sea • Mediterranean & Gulf cable breaks (2008) • Hurricanes • Katrina (2005) Physical failures can also be the result of malicious activity, e.g., 9/11
  • 8. June 2008 8Internet Threats Physical Problems • Earthquakes • Taiwan quakes • Anchors – The Backhoes of the Sea • Mediterranean & Gulf cable breaks • Hurricanes • Katrina
  • 9. June 2008 Internet Threats But first, a bit of terminology • Network prefix is a range of contiguous IP addresses: • 11.1.18.0/24 contains addresses 11.1.18.0, …, 11.1.18.255 • Prefix length equals the number of network address bits: • 11.1.18.0/24 = 00001011.00000001.00010010.00000000 24 network address bits 8 host IP address bits • 11.1.16.0/20 = 00001011.00000001.00010000.00000000 20 network address bits 12 host IP address bits • More-specific prefix means … • more network address bits • fewer host IP addresses • 11.1.18.0/24 is more specific than 11.1.16.0/20.
  • 10. June 2008 10Internet Threats Taiwan Earthquakes – December 2006 • Large earthquakes hit Luzon Strait, south of Taiwan on 26 December 2006 • 7 of 9 cables in the strait were severed • 7901 prefix outages (28% of region) • 15,780 unstable prefixes (36% of region) • All cables reported repaired 51 days later! (source: 14 February 2007, Office of the Telecommunications Authority of Hong Kong)
  • 11. June 2008 Internet Threats Submarine cables in East Asia Page 11 • Damaged cables • China-US Cable Network • SEA-ME-WE 3 • Asia-Pacific Cable Network 2 • FLAG Europe Asia • FLAG North Asia, and others • Only two not impacted • Asia Netcom’s EAC • Guam-Philippines Cable 11
  • 12. June 2008 Internet Threats Different ways to impact Page 12 • Prefix Outages • By Country / Population • Total outages • Percentage of outaged prefixes • Unstable Prefixes • By Country / Population • Total unstable prefixes • Percentage of unstable prefixes 12
  • 13. June 2008 Internet Threats Outages by Country: Total and Percentage 13 Outages by Country (#) 0 500 1000 1500 2000 2500 Laos Myanmar Macao Mongolia Nepal Taiw an Pakistan Japan S. Korea Vietnam Thailand Malaysia Bangladesh Philippines Singapore Hong Kong China Indonesia India Number of Prefixes Outages by Country (%) 0 10 20 30 40 50 60 Laos Myanmar Macao Mongolia Nepal Taiw an Pakistan Japan S. Korea Vietnam Thailand Malaysia Bangladesh Philippines Singapore Hong Kong China Indonesia India Percentage of Prefixes
  • 14. June 2008 Internet Threats Unstables by Country: Total and Percentage 14 Unstables by Country (#) 0 1000 2000 3000 4000 5000 Myanmar Laos Macao Mongolia Nepal Japan Pakistan Vietnam S. Korea Malaysia Taiw an Bangladesh Thailand Singapore Philippines Hong Kong Indonesia India China Number of Prefixes Unstables by Country (%) 0 10 20 30 40 50 60 70 80 Myanmar Laos Macao Mongolia Nepal Japan Pakistan Vietnam S. Korea Malaysia Taiw an Bangladesh Thailand Singapore Philippines Hong Kong Indonesia India China Percentage of Prefixes
  • 15. June 2008 Internet Threats Taiwan Earthquakes – Overall Impact • Worst Impacted ( > 60% Outages + Unstables) (with large populations) • India, China/Hong Kong, Indonesia, Philippines • Least Impacted ( < 5% Outages + Unstables) • Korea, Japan • Modest Impact on Taiwan • ~ 3% Outages + ~14% Unstables • Significant Impact on India • Numerous outsourced operations were hurt 15
  • 16. June 2008 16Internet Threats Why India? Major subcontinent bandwidth heads East Image credit: Asia Netcom
  • 17. June 2008 17Internet Threats Physical Problems • Earthquakes • Taiwan quakes • Anchors – The Backhoes of the Sea • Mediterranean & Gulf cable breaks • Hurricanes • Katrina
  • 18. June 2008 18Internet Threats Middle East Cable Breaks – Jan/Feb 2008 • Several cables in the Mediterranean and the Persian Gulf were damaged from around January 30 to February 2 • All repairs completed within 14 days. • Impacted regions include … • Middle East / North Africa (65% outaged prefixes) (not including Israel since they weren’t impacted) • Persian Gulf (45% outaged prefixes) • Indian Subcontinent (32% outaged prefixes) • 6856 prefixes from 23 countries suffered outages
  • 19. June 2008 19Internet Threats Impacted Countries Darker colors in each region represent countries with prefix outages of at least 50%.
  • 20. June 2008 20Internet Threats SYRIA PALESTINIAN TER. BAHRAIN ETHIOPIA DJIBOUTI SUDAN QATAR MOROCCO SRI LANKA MALDIVES IRAQ SAUDI ARABIA UAE ALGERIA BANGLADESH LEBANON IRAN ISRAEL KUWAIT PAKISTAN EGYPT INDIA 0 500 1000 1500 2000 Outages per country (# pfxs) # prefixes SYRIA PALESTINIAN TER. BAHRAIN ETHIOPIA DJIBOUTI SUDAN QATAR MOROCCO SRI LANKA MALDIVES IRAQ SAUDI ARABIA UAE ALGERIA BANGLADESH LEBANON IRAN ISRAEL KUWAIT PAKISTAN EGYPT INDIA 0 20 40 60 80 100 Outages per Country (%) % of total prefixes Outages by Country: Total and Percentage
  • 21. June 2008 Internet Threats Middle Cable Breaks – Overall Impact • Most Impacted (≥ 80% Outages) • Djibouti, Egypt, Ethiopia, Maldives, Pakistan • Least Impacted (≤ 10% Outages) • Israel, Bahrain • Significant Impact on India (again!) 21
  • 22. June 2008 22Internet Threats Physical Problems • Earthquakes • Taiwan quakes • Anchors – The Backhoes of the Sea • Mediterranean & Gulf cable breaks • Hurricanes • Katrina
  • 23. June 2008 23Internet Threats These threats aren’t faraway problems
  • 24. June 2008 24Internet Threats Submarine Cable Systems by Capacity Image credit: Telegeography Bandwidth-limited areas and choke points are obvious
  • 25. June 2008 25Internet Threats Lessons learned from physical failures • You get what you pay for • Natural trade-off: cost, performance/latency vs. reliability • Entropy happens • Cables break in the Atlantic all the time, nobody notices • Geography plays an important role • Cables break in the Taiwan Straits or Suez Canal, entire geographic regions lose connectivity • Intelligence is essential for disaster planning and recovery • For organizations to select providers • For local ISPs to select new upstream providers • For a global ISP to acquire new customers
  • 26. June 2008 26Internet Threats Physical Problems: Prognosis is Good! • Recent failures have gotten the attention of businesses and governments • Businesses want providers with redundant capacity • Governments want control of their critical infrastructure • Saudi Arabia and Egypt have announced new cable deals • Mini cable-building boom in progress • At least 25 new cables, costing approximately USD 6.4 billion, will be constructed between 2008 and 2010 Source: Telegeography
  • 27. June 2008 27Internet Threats What can I do? • Operations • Understand capacity, location and vulnerabilities • Diversify existing capacity • Get more capacity on diverse physical paths • Policy • Influence national communications policy to encourage investment
  • 28. June 2008 28Internet Threats • Physical problems (Physical Infrastructure: Natural, accidental or intentional destruction) • Earthquakes, Anchors/Backhoes, Hurricanes • Routing Vulnerabilities (Logical Infrastructure: if routers cannot direct traffic appropriately, the Internet is broken.) • Misconfigurations, hijacks, attacks • Business Conflicts (Competitors might not want to exchange traffic.) • De-peerings Threats to the Internet infrastructure
  • 29. June 2008 29Internet Threats Routing Vulnerabilities • Hijacks • YouTube (2008) • Review of other notable incidents (1997 – present) • DOD (2008) • DNS misappropriation • Root name server identity theft (2007 – 2008)
  • 30. June 2008 30Internet Threats Autonomous System Numbers (ASNs) Each organization announcing a routing policy on the Internet is assigned: • A unique ASN (integer) • One or more prefixes (range of IP addresses) Example ASNs: • Sprint: 1239 • AT&T: 7018 • IRS: 30313 • YouTube: 36561
  • 31. June 2008 31Internet Threats Routers talk to neighboring routers via BGP (Border Gateway Protocol) that’s how global routing is established Routing msgRouting msgRouting msgRouting msg Routing msgRouting msgRouting msgRouting msg route to 192.0.2.0/24 pick me! route to 192.0.2.0/24 pick me! route to 192.0.2.0/24 pick me! Typical messages • “I have a route to prefix A” • “I no longer have a route to prefix B” Each router makes local decisions about the best route to each prefix
  • 32. June 2008 32Internet Threats Routing Vulnerabilities • Hijacks • YouTube (2008) • Review of other notable incidents (1997 – present) • DOD (2008) • DNS misappropriation • Root name server identity theft (2007 – 2008)
  • 33. June 2008 33Internet Threats YouTube – February 2008 Like most content providers, YouTube has no need for massive amounts of IP space. • They are assigned only 5 small prefixes • One prefix is 208.65.152.0/22 • This contains the more-specific 208.65.153.0/24 • This /24 used to contain all of YouTube’s • DNS Servers (have since moved) • Web Servers • YouTube announced only the /22
  • 34. June 2008 34Internet Threats Overview of 24 February 2008 Hijack • Pakistan’s government decides to block YouTube (Posted video is deemed “offensive”.) • Pakistan Telecom apparently black holes 208.65.153.0/24 on their internal network • So far, this is only impacting Pakistan and their ability to reach YouTube • This is not uncommon for some governments
  • 35. June 2008 35Internet Threats Overview
  • 36. June 2008 36Internet Threats Overview of Hijack (Continued) • Pakistan Telecom then mistakenly announces this critical YouTube prefix to their upstream Asian carrier PCCW as if it was their own. • PCCW propagates this route globally. • On the Internet, most specific route wins! • Most of the Internet goes to Pakistan for YouTube for 2 hours and gets nothing! • Eventually, PCCW turns off Pakistan Telecom
  • 37. June 2008 37Internet Threats We’ve been here before, but on a larger scale … Con Edison (AS 27506) (dozens of bogus routes) Jan 2006 TTNet (AS 9121) (100K bogus routes) Dec 2004 MAI Network Services (AS 7007) (70K bogus routes) Apr 1997 Each of these providers announced parts of the Internet not under their control, resulting in various degrees of bedlam.
  • 38. June 2008 38Internet Threats But do hijacks really occur with any regularity? Examine two US DoD networks and their more specifics DoD owns but does not announce 7.0.0.0/8, 11.0.0.0/8, 30.0.0.0/8 and others. These networks are “free for the taking” without any impact on DoD. 11.11.11.0/24 11.1.1.0/24 7.7.7.0/24 11.0.0.0/24 30.30.30.0/24 11.11.11.0/24 11.11.11.0/24 Prefix 24140 minArgentinaTelefonica (AS 10834)April 30 24416 hoursUSITC Deltacom (AS 6983)April 25 – 26 A Sampling of Hijacks in 2008 2071.1 hoursHong KongHutchinson (AS 9304)January 5 2483.5 weeksRussiaHelios Net (AS 21240)March 5 – 29 22716 minS. KoreaPosdata (AS 18305)March 7 1552.1 minIndonesiaINDO Internet (AS 9340)May 10 2326.5 minTurkeyTeknoas (AS 42075)May 17 Max Peers Avg Time per Peer CountryOrigination (AS)Date(s) Every announcement in this assigned, but unused, space is a hijack.
  • 39. June 2008 39Internet Threats Threat is Poorly Understood: Memorable Quotes - Full technical details published 24 February at www.renesys.com/blog • "We are not hackers. Why would we do that?" Shahzada Alam Malik, head of the Pakistan Telecommunication Authority, told Associated Press Television News. YouTube's wider problems were likely caused by a "malfunction" elsewhere, he said. — International Herald Tribune, 27 February 2008 • Attempts to log on to the Google-owned site typically timed out. Keynote* is unable to uncover the causes of an outage, said Shawn White, Keynote's director of operations, but he added that he would be shocked if one country had the ability to bring down YouTube globally. — CNET, 24 February 2008 * Keynote Systems, Inc. is “The Mobile and Internet Performance Authority”
  • 40. June 2008 40Internet Threats Solutions? • Replace BGP (go ahead, I’ll wait) • Limited value unless everyone does it • Filter announcements • Difficult to implement and maintain • No single authoritative source of who owns what • Security may not be compatible with resiliency • Monitor networks you care about • Increases costs • Reactive, not Proactive • Do you know anyone at Pakistan Telecom? • You are hijacked, then what?
  • 41. June 2008 41Internet Threats Routing Vulnerabilities • Hijacks • YouTube (2008) • Review of other notable incidents (1997 – present) • DOD (2008) • DNS misappropriation • Root name server identity theft (2007 – 2008)
  • 42. June 2008 42Internet Threats DNS – Root Name Servers • 13 root name server IP addresses • Named by single letters: A, B, C, … M. • L root is run by ICANN • Old IP: 198.32.64.12 • From 1997 until 2007 • Registered to Bill Manning, ep.net • New IP: 199.7.83.42 • Effective 1 November 2007 • Registered to ICANN
  • 43. June 2008 43Internet Threats Old L Root Name Servers: 2007 – 2008 • ICANN runs the old L root for additional 6 months • New unauthorized root servers start appearing • Dec 15th – Community DNS (England) • Mar 18th – EP.NET (US – Bill Manning) • Apr 1st – Diyixian (Hong Kong) • May 2nd – ICANN turns off its own old L root • May 16th – All bogus old L root servers turned off under pressure from ICANN
  • 44. June 2008 44Internet Threats Timeline for old L root servers
  • 45. June 2008 45Internet Threats Lots of unanswered questions • Why was ICANN not using their own space? • Was it difficult to get IP space in 1997? • Why the change after 10 years? • 11.7 million DNS servers worldwide (source: Infoblox) • How many of those do you think were updated? • Why wasn’t the space given to ICANN? • ARIN shows Manning has five /16s and a /22 • This is equivalent to 1284 /24s (only 44% routed) • ICANN only needs a single /24 for the L root • Why all the bogus L root servers?
  • 46. June 2008 46Internet Threats Is this much ado about nothing? • What could you do with a root name server? • Provide updated list of all the root name servers • Provide updated NS records for all TLDs • Set TTL = 0 for your answers • Perform recursion by default • Log everything • Censor, misdirect • No evidence of any of this in this case • But the duration of the event, the potential for mayhem, the complete absence of any safeguards are the cause for concern
  • 47. June 2008 47Internet Threats Lessons learned from routing vulnerabilities • No one is minding the store. No one. • No mechanism in place to handle root operators or ISPs who go rogue • No single authoritative source of who should be doing what
  • 48. June 2008 48Internet Threats Routing Vulnerabilities: Prognosis is Dismal • Hijacking has been going on for over 10 years! • No incremental, comprehensive solutions • Lacking economic drivers • Doesn’t happen daily and universally • Avoiding negative publicity is not necessarily compelling • Miscreants are actively hijacking now • To send spam from “clean” IP blocks • To cover their tracks • What good are your firewall/IDS logs now? • Need historical global routing data
  • 49. June 2008 49Internet Threats What can I do? • Operations • Monitor prefixes you care about • Maintain alerts • Establish procedures for handling hijacks quickly • Develop procedures for dealing with hijacks in concert with your providers • Policy • Build awareness of routing-based attacks • Influence positive policy (tricky, evidence not good)
  • 50. June 2008 50Internet Threats • Physical problems (Physical Infrastructure: Natural, accidental or intentional destruction) • Earthquakes, Anchors/Backhoes, Hurricanes • Routing Vulnerabilities (Logical Infrastructure: if routers cannot direct traffic appropriately, the Internet is broken.) • Misconfigurations, hijacks, attacks • Business Conflicts (Competitors might not want to exchange traffic.) • De-peerings Threats to the Internet infrastructure
  • 51. June 2008 51Internet Threats Interconnections on the Internet • Two forms of interconnection exist • Transit - “ … transit service is typically priced per megabit per second per month …” Source: Wikipedia o single homed: one provider o multihomed: more than one provider • Peering - “Peering is voluntary interconnection of administratively separate Internet networks” … where “neither party pays the other for the exchanged traffic.” Source: Wikipedia
  • 52. June 2008 52Internet Threats • We observe over 8.7 million distinct AS paths. • These paths are comprised of over 93,000 unique AS-AS adjacencies. • Each adjacency represents a business relationship, e.g., • Customer → Provider • Provider → Customer • Peer → Peer • Transit swap • AS cluster (multiple ASes now part of the same organization) • These relationships can be compute algorithmically with a high degree of confidence. Business relationships: Easy to observe, difficult to classify
  • 53. June 2008 53Internet Threats Peering Goal – Maximize $ In, Minimize $ Out C1 P1 Cn $ $ C2 P2 $ Cm $ P4 $$ $$ P3 P5 $$ $$ ... ...
  • 54. June 2008 54Internet Threats Reduce Transit Costs by Peering with Competitors C1 P1 Cn $ $ C2 P2 $ Cm $ P4 $$ $$ P3 P5 $$ $$ ... ... $ Peering Link
  • 55. June 2008 55Internet Threats Customers of P1 and P2 exchange traffic without either provider incurring transit costs C1 P1 Cn $ $ C2 P2 $ Cm $ P4 $$ $$ P3 P5 $$ $$ ... ... $ Peering Link
  • 56. June 2008 56Internet Threats • Reduce transit costs (happier providers) • Reduce latencies (happier customers) • Increased billable traffic to customers • Enhance operational stability • Localize connectivity • Roughly equal mutual benefit Reasons to Peer
  • 57. June 2008 57Internet Threats A Tier-1 network has no transit providers – only peers and customers. (“Tier-1” term is inconsistently used.) To maintain global connectivity, the Tier-1 providers must all peer with one another. Top of the Internet Food Chain: Tier-1
  • 58. June 2008 58Internet Threats Follow the Money – if P5 & P6 de-peer, their single-homed customers can’t communicate P4 will not carry traffic between C1 and C2 for free
  • 59. June 2008 59Internet Threats • Sprint, AT&T, Level 3, NTT, Savvis, etc. • Tier-1 providers act like a cartel and have no incentive to add members • “Near” Tier-1 providers can try to buy their way into the club (via “paid peering”). Who are the Tier-1 providers?
  • 60. June 2008 60Internet Threats • Cogent and Telia peer • Cogent gets transit only from NTT to reach AOL • Telia appeared to get transit from Verizon to reach certain networks • On February 27th, we stopped seeing evidence of transit • Renesys promotes Telia to “Tier-1” – no known providers • Telia could still be paying for some of these interconnections Cogent and Telia want to be Tier-1
  • 61. June 2008 61Internet Threats • March 13th: Cogent de-peers Telia, claiming breach of contract • The Internet is partitioned • Single homed customers behind Cogent and Telia could not reach one another. • March 28th: Peering link is restored. • After two weeks, the Internet is once again whole. Overview of Cogent-Telia Peering Dispute
  • 62. June 2008 62Internet Threats Which regions were impacted? 86Others 27UK 31Germany 41Spain 98France 232Canada 1868US # PrefixesCountry 249Others 30Norway 35Denmark 40Spain 52Bulgaria 62Latvia 73US 113Poland 153Russia 322Finland 444Sweden # PrefixesCountry Telia cannot reach Cogent Cogent cannot reach Telia
  • 63. June 2008 63Internet Threats • Peering disputes with Cogent tend to be about traffic ratios • Imbalanced ratios tend to imply that one party is carrying the other’s traffic longer distances (distance = money) • Did Cogent and Telia get into a dispute over ratios? • Did Cogent view Telia as in a weaker position? • How many European customers want to reach Cogent hosted content? Why did this happen? Who knows?
  • 64. June 2008 64Internet Threats • After the re-peering • Telia reaches 2934 more prefixes via Cogent • Cogent reaches 635 fewer prefixes via Telia • Result of re-engineering by both parties • Sure seems like this was about traffic ratios What changed?
  • 65. June 2008 65Internet Threats • Being a (near) Tier-1 is not easy • You depend on everyone else in the cartel • You will be punished if you are perceived to be in a position of weakness. • Peering relationships are tricky • Depend on both objective measures and perceptions • Disputes can take a long time to resolve. The only driver is market pressure. • Being single-homed is dangerous Lessons Learned from De-peerings
  • 66. June 2008 66Internet Threats De-peerings: Prognosis is Improving • An increasing number of businesses and organizations are now multi-homed. • Many more peering relationships, lessening the impact of any one loss • True global Tier-1s would probably never consider de-peering • Impact would be wide ranging • Would invite government involvement • Tier-1s are becoming less relevant, as smaller players peer around them
  • 67. June 2008 67Internet Threats What can I do? • Operations • Select multiple diverse providers • Investigate providers carefully with respect to connectivity & peering • Policy • Build awareness of the issue • When peering disputes occur, make a stink • No stink → No action • Influence positive policy (tricky, evidence not good)
  • 68. June 2008 68Internet Threats • Physical problems • Prognosis is good. • But US will become less relevant. • Routing Vulnerabilities • Prognosis is dismal. • No clear path forward. Band-Aids only. • Business Conflicts • Prognosis is improving. • Awareness and public pressure is key. Conclusions
  • 69. Thank You Page 69 Martin Brown mabrown@renesys.com James Cowie cowie@renesys.com Andy Ogielski ato@renesys.com Alin Popescu alin@renesys.com BJ Premore bj@renesys.com Todd Underwood todd@renesys.com Earl Zmijewski earl@renesys.com