SlideShare a Scribd company logo
BGP Flexibility and…
Its Consequences
Alexander Azimov
Qrator Labs aa@qrator.net
Rights
• Get address space from RIR;
• Establish BGP sessions;
• Advertise prefixes;
• Receive traffic.
Obligations
• MUST not hijack foreign address space;
• MUST not create route leaks;
• MUST Support anti-spoofing policies;
• MUST Configure Ingress/Egress filters;
• MUST Pay fee to RIR.
Obligations
• MUST not hijack foreign address space;
• MUST not create route leaks;
• MUST Support anti-spoofing policies;
• MUST Configure Ingress/Egress filters;
• MUST Pay fee to RIR – that’s all!
BGP Anomalies
BGP Hijacks
Illegitimate advertisement of foreign address space.
BGP Route Leaks
Illegitimate announce of a route received from peer
or upstream to another peer or upstream.
Google
It will never happen again!
BGP in the Headlines
12th December
AS39523 (DV-LINK-AS)
https://radar.qrator.net/blog/born-to-hijack
May I have your traffic?
30th December:
Idea Cellular Limited (AS55644)
https://radar.qrator.net/blog/indian-route-leak-or-there-and-back-again
17th January
AS8901 (Moscow City Government)
https://radar.qrator.net/blog/moscow-traffic-jam
BGP Exams?
BGP Ingress Filtering: AS-SETs
from AS197068 action accept AS-QRATOR
200449, 197068, …….
178.248.232.0/21, 185.65.148.0/22,
45.116.91.0/24, 89.218.31.0/24 …
AS-SET to ASNs
ASNs to route objects
IRR filters doesn’t perform origin validation!
AS-SETs & AS Cone
In ‘Ideal World’ AS-SETs = AS Cone
AS-SETs & AS Cone
In ‘Ideal World’ AS-SETs = AS Cone
Not in AS-SET?
Drop it!
AS-SETs & AS Cone
In an ‘Ideal World’ AS-SETs = AS Cone
But even then it has limitations.
What Do We Know?
• IRR filters doesn’t perform origin validation;
• AS-SET objects are not authorized (even in RIPE);
• Poorly maintained AS-SETs become less affective;
• There are ISPs does not use any IRR filters.
Investigation
How many filters have been already violated?
Methodology
• Route Object Aggregator (RIPE, APNIC, ARIN,
AFRINIC, RADB… 27 sources);
• Analyze only globally visible prefixes;
Route Objects
Valid Invalid No object Valid Invalid No object
IPv6IPv4
Invalid & Unknown Objects
Reasons:
1. Route-sets;
2. LOAs;
3. Upstream announcing customer routes;
4. AS_PATH poisoning (thank you, Akamai);
5. Broken/absent filters;
Methodology v.2
• Route Object Aggregator (RIPE, APNIC, ARIN,
AFRINIC, RADB… 27 sources);
• Analyze prefixes with unique asn in route objects;
• Detect c2p links through which route leaks were
propagated;
• Check that origin doesn’t belong to customer cone.
Results
IPv4
At least 7% of ISPs have
problems with filters
IPv6
At least 1% of ISPs have
problems with filters
Results: Explained
0%
20%
40%
60%
80%
100%
120%
Top10 Top100 Top200 Top300 Top400
Percent of Violated Filters by ISP size
IPv4 IPv6
Accepts Leaks originated by Tier1
4809 4837 6695 6939 7363
7552 7713 7843 8732 9583
12389 12586 13536 20485 20562
22356 22773 31025 35104 40805
48276 50384 53211
Russia
IPv4
6939 16735 23106 49697 199524
IPv6
Accepts Leaks originated by Tier1
4809 4837 6695 6939 7363
7552 7713 7843 8732 9583
12389 12586 13536 20485 20562
22356 22773 31025 35104 40805
48276 50384 53211
China
IPv4
6939 16735 23106 49697 199524
IPv6
Accepts Leaks originated by Tier1
4809 4837 6695 6939 7363
7552 7713 7843 8732 9583
12389 12586 13536 20485 20562
22356 22773 31025 35104 40805
48276 50384 53211
Opentransit and DE-CIX
IPv4
6939 16735 23106 49697 199524
IPv6
Accepts Leaks originated by Tier1
4809 4837 6695 6939 7363
7552 7713 7843 8732 9583
12389 12586 13536 20485 20562
22356 22773 31025 35104 40805
48276 50384 53211
Hurricane Electric!
IPv4
6939 16735 23106 49697 199524
IPv6
Key Findings: AS-SETs
AS-SET Can be Used to:
• Filter some hijacks;
• Filter some route leaks.
In reality:
• Many AS-SETs are poorly maintained;
• No filters at some huge Tier-2 networks;
• Even some Tier1 networks fail to configure filters.
Holes in Filters = Security Holes
DoS
Increased Latency
MiTM attacks
MiTM Attack
Connecting, port 80Connecting, port 80
MiTM Attack
Connecting, port 80
HTTP 302
Connecting, port 443
HTTP 200
Connecting, port 80
Encrypted
MiTM Attack
Connecting, port 80
HTTP 302
Connecting, port 443
HTTP 200
Connecting, port 80
HTTP 200
EncryptedNot encrypted
And suddenly credentials are gone…
What Can Transit Do?
• IRR filters at your customer links, no exceptions!
• Work with customers, that corrupt AS-SETs;
• Consider using IRR filters with your private peers;
• Ad-hoc filtering (NTT Peering Lock);
• Perform constant BGP monitoring.
What Can IX Do?
• IRR filters at all links, no exceptions!
• Work with customers, that corrupt AS-SETs.
• Remove legacy filters (LOA, route-sets);
• Consider using RPKI-cache inside at RS;
What Can Multihomed Do?
• Keep Route Objects up to date;
• Keep AS-SETs up to date;
• Create ROA records;
• Perform constant BGP monitoring.

More Related Content

Similar to BGP Flexibility and its Consequences.

BREAKING HTTPS WITH BGP HIJACKING
BREAKING HTTPS WITH BGP HIJACKINGBREAKING HTTPS WITH BGP HIJACKING
BREAKING HTTPS WITH BGP HIJACKING
Qrator Labs
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing Security
APNIC
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs
APNIC
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security Roadmap
APNIC
 
BGP Route Leaks at Ripe74
BGP Route Leaks at Ripe74BGP Route Leaks at Ripe74
BGP Route Leaks at Ripe74
Qrator Labs
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
Bangladesh Network Operators Group
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
Tim Martin
 
Protecting Your Internet Route Integrity
Protecting Your Internet Route IntegrityProtecting Your Internet Route Integrity
Protecting Your Internet Route Integrity
Jie Liau
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet Routing
APNIC
 
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian PasternackiPLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PROIDEA
 
Defcon 16-pilosov-kapela
Defcon 16-pilosov-kapelaDefcon 16-pilosov-kapela
Defcon 16-pilosov-kapelaHai Nguyen
 
SRv6 Network Programming: deployment use-cases
SRv6 Network Programming: deployment use-cases SRv6 Network Programming: deployment use-cases
SRv6 Network Programming: deployment use-cases
APNIC
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
APNIC
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & Troubleshooting
APNIC
 
Routing, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsRouting, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of Analytics
APNIC
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
APNIC
 
Where are we with Securing the Routing System?
Where are we with Securing the Routing System?Where are we with Securing the Routing System?
Where are we with Securing the Routing System?
APNIC
 
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
Rofiq Fauzi
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
APNIC
 
PacNOG 29: Routing security is more than RPKI
PacNOG 29: Routing security is more than RPKIPacNOG 29: Routing security is more than RPKI
PacNOG 29: Routing security is more than RPKI
APNIC
 

Similar to BGP Flexibility and its Consequences. (20)

BREAKING HTTPS WITH BGP HIJACKING
BREAKING HTTPS WITH BGP HIJACKINGBREAKING HTTPS WITH BGP HIJACKING
BREAKING HTTPS WITH BGP HIJACKING
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing Security
 
SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs SANOG 33: APNIC Routing Registry and ROAs
SANOG 33: APNIC Routing Registry and ROAs
 
Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security Roadmap
 
BGP Route Leaks at Ripe74
BGP Route Leaks at Ripe74BGP Route Leaks at Ripe74
BGP Route Leaks at Ripe74
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
Protecting Your Internet Route Integrity
Protecting Your Internet Route IntegrityProtecting Your Internet Route Integrity
Protecting Your Internet Route Integrity
 
IAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet RoutingIAA Life in Lockdown series: Securing Internet Routing
IAA Life in Lockdown series: Securing Internet Routing
 
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian PasternackiPLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
 
Defcon 16-pilosov-kapela
Defcon 16-pilosov-kapelaDefcon 16-pilosov-kapela
Defcon 16-pilosov-kapela
 
SRv6 Network Programming: deployment use-cases
SRv6 Network Programming: deployment use-cases SRv6 Network Programming: deployment use-cases
SRv6 Network Programming: deployment use-cases
 
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
ICANN APAC-TWNIC Engagement Forum: Internet Number Registry Services - The Ne...
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & Troubleshooting
 
Routing, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsRouting, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of Analytics
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
Where are we with Securing the Routing System?
Where are we with Securing the Routing System?Where are we with Securing the Routing System?
Where are we with Securing the Routing System?
 
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
 
PacNOG 29: Routing security is more than RPKI
PacNOG 29: Routing security is more than RPKIPacNOG 29: Routing security is more than RPKI
PacNOG 29: Routing security is more than RPKI
 

More from Qrator Labs

Годовой отчет Qrator Labs об угрозах интернета 2017
Годовой отчет Qrator Labs об угрозах интернета 2017Годовой отчет Qrator Labs об угрозах интернета 2017
Годовой отчет Qrator Labs об угрозах интернета 2017
Qrator Labs
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
Qrator Labs
 
Memcached amplification DDoS: a 2018 threat.
Memcached amplification DDoS: a 2018 threat. Memcached amplification DDoS: a 2018 threat.
Memcached amplification DDoS: a 2018 threat.
Qrator Labs
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.
Qrator Labs
 
IoT: реальная угроза или маркетинг?
IoT: реальная угроза или маркетинг?IoT: реальная угроза или маркетинг?
IoT: реальная угроза или маркетинг?
Qrator Labs
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
Qrator Labs
 
Состояние сетевой безопасности в 2016 году
Состояние сетевой безопасности в 2016 году Состояние сетевой безопасности в 2016 году
Состояние сетевой безопасности в 2016 году
Qrator Labs
 
Сколько стоит доступ в память, и что с этим делать
Сколько стоит доступ в память, и что с этим делатьСколько стоит доступ в память, и что с этим делать
Сколько стоит доступ в память, и что с этим делать
Qrator Labs
 
Анализ количества посетителей на сайте [Считаем уникальные элементы]
Анализ количества посетителей на сайте [Считаем уникальные элементы]Анализ количества посетителей на сайте [Считаем уникальные элементы]
Анализ количества посетителей на сайте [Считаем уникальные элементы]
Qrator Labs
 
Caution i pv6 is here
Caution i pv6 is hereCaution i pv6 is here
Caution i pv6 is here
Qrator Labs
 
Масштабируя TLS
Масштабируя TLSМасштабируя TLS
Масштабируя TLS
Qrator Labs
 
ISP Border Definition
ISP Border DefinitionISP Border Definition
ISP Border Definition
Qrator Labs
 
DDoS Attacks in 2017: Beyond Packet Filtering
DDoS Attacks in 2017: Beyond Packet FilteringDDoS Attacks in 2017: Beyond Packet Filtering
DDoS Attacks in 2017: Beyond Packet Filtering
Qrator Labs
 
Internet Roads of Caucasus
Internet Roads of CaucasusInternet Roads of Caucasus
Internet Roads of Caucasus
Qrator Labs
 
Latency i pv4 vs ipv6
Latency i pv4 vs ipv6Latency i pv4 vs ipv6
Latency i pv4 vs ipv6
Qrator Labs
 
Особенности использования машинного обучения при защите от DDoS-атак
Особенности использования машинного обучения при защите от DDoS-атакОсобенности использования машинного обучения при защите от DDoS-атак
Особенности использования машинного обучения при защите от DDoS-атак
Qrator Labs
 
Финансовый сектор. Аспекты информационной безопасности 2016
Финансовый сектор. Аспекты информационной безопасности 2016Финансовый сектор. Аспекты информационной безопасности 2016
Финансовый сектор. Аспекты информационной безопасности 2016
Qrator Labs
 
White Paper. Эволюция DDoS-атак и средств противодействия данной угрозе
White Paper. Эволюция DDoS-атак и средств противодействия данной угрозеWhite Paper. Эволюция DDoS-атак и средств противодействия данной угрозе
White Paper. Эволюция DDoS-атак и средств противодействия данной угрозе
Qrator Labs
 
Тренды 2015 года в области интернет-безопасности в россии и в мире
Тренды 2015 года в области интернет-безопасности в россии и в миреТренды 2015 года в области интернет-безопасности в россии и в мире
Тренды 2015 года в области интернет-безопасности в россии и в мире
Qrator Labs
 
Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015
Qrator Labs
 

More from Qrator Labs (20)

Годовой отчет Qrator Labs об угрозах интернета 2017
Годовой отчет Qrator Labs об угрозах интернета 2017Годовой отчет Qrator Labs об угрозах интернета 2017
Годовой отчет Qrator Labs об угрозах интернета 2017
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
Memcached amplification DDoS: a 2018 threat.
Memcached amplification DDoS: a 2018 threat. Memcached amplification DDoS: a 2018 threat.
Memcached amplification DDoS: a 2018 threat.
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.
 
IoT: реальная угроза или маркетинг?
IoT: реальная угроза или маркетинг?IoT: реальная угроза или маркетинг?
IoT: реальная угроза или маркетинг?
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
 
Состояние сетевой безопасности в 2016 году
Состояние сетевой безопасности в 2016 году Состояние сетевой безопасности в 2016 году
Состояние сетевой безопасности в 2016 году
 
Сколько стоит доступ в память, и что с этим делать
Сколько стоит доступ в память, и что с этим делатьСколько стоит доступ в память, и что с этим делать
Сколько стоит доступ в память, и что с этим делать
 
Анализ количества посетителей на сайте [Считаем уникальные элементы]
Анализ количества посетителей на сайте [Считаем уникальные элементы]Анализ количества посетителей на сайте [Считаем уникальные элементы]
Анализ количества посетителей на сайте [Считаем уникальные элементы]
 
Caution i pv6 is here
Caution i pv6 is hereCaution i pv6 is here
Caution i pv6 is here
 
Масштабируя TLS
Масштабируя TLSМасштабируя TLS
Масштабируя TLS
 
ISP Border Definition
ISP Border DefinitionISP Border Definition
ISP Border Definition
 
DDoS Attacks in 2017: Beyond Packet Filtering
DDoS Attacks in 2017: Beyond Packet FilteringDDoS Attacks in 2017: Beyond Packet Filtering
DDoS Attacks in 2017: Beyond Packet Filtering
 
Internet Roads of Caucasus
Internet Roads of CaucasusInternet Roads of Caucasus
Internet Roads of Caucasus
 
Latency i pv4 vs ipv6
Latency i pv4 vs ipv6Latency i pv4 vs ipv6
Latency i pv4 vs ipv6
 
Особенности использования машинного обучения при защите от DDoS-атак
Особенности использования машинного обучения при защите от DDoS-атакОсобенности использования машинного обучения при защите от DDoS-атак
Особенности использования машинного обучения при защите от DDoS-атак
 
Финансовый сектор. Аспекты информационной безопасности 2016
Финансовый сектор. Аспекты информационной безопасности 2016Финансовый сектор. Аспекты информационной безопасности 2016
Финансовый сектор. Аспекты информационной безопасности 2016
 
White Paper. Эволюция DDoS-атак и средств противодействия данной угрозе
White Paper. Эволюция DDoS-атак и средств противодействия данной угрозеWhite Paper. Эволюция DDoS-атак и средств противодействия данной угрозе
White Paper. Эволюция DDoS-атак и средств противодействия данной угрозе
 
Тренды 2015 года в области интернет-безопасности в россии и в мире
Тренды 2015 года в области интернет-безопасности в россии и в миреТренды 2015 года в области интернет-безопасности в россии и в мире
Тренды 2015 года в области интернет-безопасности в россии и в мире
 
Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015
 

Recently uploaded

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 

Recently uploaded (20)

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 

BGP Flexibility and its Consequences.

  • 1. BGP Flexibility and… Its Consequences Alexander Azimov Qrator Labs aa@qrator.net
  • 2. Rights • Get address space from RIR; • Establish BGP sessions; • Advertise prefixes; • Receive traffic.
  • 3. Obligations • MUST not hijack foreign address space; • MUST not create route leaks; • MUST Support anti-spoofing policies; • MUST Configure Ingress/Egress filters; • MUST Pay fee to RIR.
  • 4. Obligations • MUST not hijack foreign address space; • MUST not create route leaks; • MUST Support anti-spoofing policies; • MUST Configure Ingress/Egress filters; • MUST Pay fee to RIR – that’s all!
  • 5. BGP Anomalies BGP Hijacks Illegitimate advertisement of foreign address space. BGP Route Leaks Illegitimate announce of a route received from peer or upstream to another peer or upstream.
  • 6. Google It will never happen again!
  • 7. BGP in the Headlines
  • 9. 30th December: Idea Cellular Limited (AS55644) https://radar.qrator.net/blog/indian-route-leak-or-there-and-back-again
  • 10. 17th January AS8901 (Moscow City Government) https://radar.qrator.net/blog/moscow-traffic-jam
  • 12. BGP Ingress Filtering: AS-SETs from AS197068 action accept AS-QRATOR 200449, 197068, ……. 178.248.232.0/21, 185.65.148.0/22, 45.116.91.0/24, 89.218.31.0/24 … AS-SET to ASNs ASNs to route objects IRR filters doesn’t perform origin validation!
  • 13. AS-SETs & AS Cone In ‘Ideal World’ AS-SETs = AS Cone
  • 14. AS-SETs & AS Cone In ‘Ideal World’ AS-SETs = AS Cone Not in AS-SET? Drop it!
  • 15. AS-SETs & AS Cone In an ‘Ideal World’ AS-SETs = AS Cone But even then it has limitations.
  • 16. What Do We Know? • IRR filters doesn’t perform origin validation; • AS-SET objects are not authorized (even in RIPE); • Poorly maintained AS-SETs become less affective; • There are ISPs does not use any IRR filters.
  • 17. Investigation How many filters have been already violated?
  • 18. Methodology • Route Object Aggregator (RIPE, APNIC, ARIN, AFRINIC, RADB… 27 sources); • Analyze only globally visible prefixes;
  • 19. Route Objects Valid Invalid No object Valid Invalid No object IPv6IPv4
  • 20. Invalid & Unknown Objects Reasons: 1. Route-sets; 2. LOAs; 3. Upstream announcing customer routes; 4. AS_PATH poisoning (thank you, Akamai); 5. Broken/absent filters;
  • 21. Methodology v.2 • Route Object Aggregator (RIPE, APNIC, ARIN, AFRINIC, RADB… 27 sources); • Analyze prefixes with unique asn in route objects; • Detect c2p links through which route leaks were propagated; • Check that origin doesn’t belong to customer cone.
  • 22. Results IPv4 At least 7% of ISPs have problems with filters IPv6 At least 1% of ISPs have problems with filters
  • 23. Results: Explained 0% 20% 40% 60% 80% 100% 120% Top10 Top100 Top200 Top300 Top400 Percent of Violated Filters by ISP size IPv4 IPv6
  • 24. Accepts Leaks originated by Tier1 4809 4837 6695 6939 7363 7552 7713 7843 8732 9583 12389 12586 13536 20485 20562 22356 22773 31025 35104 40805 48276 50384 53211 Russia IPv4 6939 16735 23106 49697 199524 IPv6
  • 25. Accepts Leaks originated by Tier1 4809 4837 6695 6939 7363 7552 7713 7843 8732 9583 12389 12586 13536 20485 20562 22356 22773 31025 35104 40805 48276 50384 53211 China IPv4 6939 16735 23106 49697 199524 IPv6
  • 26. Accepts Leaks originated by Tier1 4809 4837 6695 6939 7363 7552 7713 7843 8732 9583 12389 12586 13536 20485 20562 22356 22773 31025 35104 40805 48276 50384 53211 Opentransit and DE-CIX IPv4 6939 16735 23106 49697 199524 IPv6
  • 27. Accepts Leaks originated by Tier1 4809 4837 6695 6939 7363 7552 7713 7843 8732 9583 12389 12586 13536 20485 20562 22356 22773 31025 35104 40805 48276 50384 53211 Hurricane Electric! IPv4 6939 16735 23106 49697 199524 IPv6
  • 28. Key Findings: AS-SETs AS-SET Can be Used to: • Filter some hijacks; • Filter some route leaks. In reality: • Many AS-SETs are poorly maintained; • No filters at some huge Tier-2 networks; • Even some Tier1 networks fail to configure filters.
  • 29. Holes in Filters = Security Holes DoS Increased Latency MiTM attacks
  • 30. MiTM Attack Connecting, port 80Connecting, port 80
  • 31. MiTM Attack Connecting, port 80 HTTP 302 Connecting, port 443 HTTP 200 Connecting, port 80 Encrypted
  • 32. MiTM Attack Connecting, port 80 HTTP 302 Connecting, port 443 HTTP 200 Connecting, port 80 HTTP 200 EncryptedNot encrypted And suddenly credentials are gone…
  • 33.
  • 34. What Can Transit Do? • IRR filters at your customer links, no exceptions! • Work with customers, that corrupt AS-SETs; • Consider using IRR filters with your private peers; • Ad-hoc filtering (NTT Peering Lock); • Perform constant BGP monitoring.
  • 35. What Can IX Do? • IRR filters at all links, no exceptions! • Work with customers, that corrupt AS-SETs. • Remove legacy filters (LOA, route-sets); • Consider using RPKI-cache inside at RS;
  • 36. What Can Multihomed Do? • Keep Route Objects up to date; • Keep AS-SETs up to date; • Create ROA records; • Perform constant BGP monitoring.