SlideShare a Scribd company logo
1 of 65
Download to read offline
Where are we with Securing
Addressing and Routing?
Geoff Huston
Chief Scientist, APNIC
On the Internet…
…there are many ways to be bad!
An Ascending Scale of Badness
•  Port	
  Scan	
  for	
  known	
  exploits	
  
General annoyance
•  Spew	
  spam	
  
Yes, there are still gullible folk out there!
•  Mount	
  a	
  fake	
  web	
  site	
  a7ack	
  
And lure victims
•  Enlist	
  a	
  bot	
  army	
  and	
  mount	
  mul;-­‐gigabit	
  DOS	
  a7acks	
  
Extortion leverage and general mayhem
•  Mount	
  a	
  rou;ng	
  a7ack	
  
And bring down an entire region / country / global network!
If I were really bad (and
evil)…
I’d attack routing.
If I were really bad (and
evil)…
•  Through	
  rou;ng	
  I’d	
  a7ack:	
  	
  
–  the	
  DNS	
  root	
  system	
  
–  isolate	
  cri;cal	
  public	
  servers	
  and	
  resources	
  
–  overwhelm	
  the	
  rou;ng	
  system	
  with	
  spurious	
  informa;on	
  
And bring selected parts of the network to a
complete chaotic halt!
How many advertisements in
today’s BGP are “lies”?
	
  We’ve	
  all	
  heard	
  of	
  the	
  “YouTube”	
  route	
  hijack,	
  and	
  
similar	
  incidents	
  of	
  injec;ng	
  false	
  informa;on	
  into	
  
the	
  rou;ng	
  system.	
  
	
  
	
  But	
  the	
  situa;on	
  is	
  a	
  li7le	
  more	
  mundane	
  than	
  a	
  few	
  
isolated	
  high	
  profile	
  incidents	
  -­‐	
  who	
  uses	
  addresses	
  
and	
  AS	
  numbers	
  that	
  are	
  not	
  registered	
  as	
  “in	
  use”	
  in	
  
our	
  Internet	
  number	
  registry	
  system?	
  
www.cidr-report.org
and…
plus…
yes, there’s more
getting the point yet?
still more!
wake me up when we’re done
zzzzzzz
zzzzzzz
zzzzzzz
zzzzzzz
let’s speed this up…
don’t forget: ALL of these advertised
addresses and ASes are bogus!
almost done…
and lets not forget IPv6!
What’s the base problem
here?
We	
  are	
  not	
  doing	
  a	
  very	
  good	
  job	
  
•  Rou;ng	
  is	
  built	
  on	
  vague	
  mutual	
  trust	
  models	
  
•  Rou;ng	
  audi;ng	
  is	
  a	
  low	
  value	
  ac;vity	
  that	
  noone	
  really	
  
performs	
  with	
  any	
  level	
  of	
  thoroughness	
  
•  We	
  have	
  grown	
  used	
  to	
  lousy	
  solu;ons	
  and	
  
ins;tu;onalized	
  lying	
  in	
  the	
  rou;ng	
  system	
  
•  And	
  because	
  instances	
  of	
  abuse	
  are	
  supposedly	
  rela;vely	
  
infrequent	
  we	
  are	
  prepared	
  to	
  tolerate	
  the	
  risk	
  of	
  having	
  
a	
  completely	
  insecure	
  rou;ng	
  system	
  
What’s the base problem
here?
Noone seems to want to care enough
about the integrity of the network to
address routing integrity!
Routing Security is a
shared problem
It’s a tragedy of the commons situation
	
  
–  Nobody	
  can	
  single-­‐handedly	
  apply	
  rigorous	
  tests	
  on	
  the	
  rou;ng	
  
system	
  
–  And	
  the	
  lowest	
  common	
  denominator	
  approach	
  is	
  to	
  apply	
  no	
  
integrity	
  tests	
  at	
  all	
  
–  It’s	
  all	
  misplaced	
  trust	
  and	
  absolutely	
  no	
  effec;ve	
  defence!	
  
What SHOULD we be doing?
Routing Security A01
1.	
  Protec;ng	
  the	
  routers	
  
–  Threat	
  model:	
  
•  Compromised	
  router	
  used	
  to	
  insert	
  corrupted	
  address	
  informa;on	
  into	
  
your	
  network’s	
  rou;ng	
  tables	
  
•  Insert	
  corrupt	
  reachability	
  informa;on	
  into	
  your	
  network’s	
  forwarding	
  
tables	
  
•  Allow	
  the	
  rou;ng	
  protocol	
  to	
  disseminate	
  the	
  corrupted	
  informa;on	
  
across	
  the	
  en;re	
  internet	
  
–  Response:	
  
•  Secure	
  your	
  routers!	
  
Routing Security A01
1.	
  Protec;ng	
  the	
  routers	
  
–  Threat	
  model:	
  
•  Compromised	
  router	
  used	
  to	
  insert	
  corrupted	
  address	
  informa;on	
  into	
  
your	
  network’s	
  rou;ng	
  tables	
  
•  Insert	
  corrupt	
  reachability	
  informa;on	
  into	
  your	
  network’s	
  forwarding	
  
tables	
  
•  Allow	
  the	
  rou;ng	
  protocol	
  to	
  disseminate	
  the	
  corrupted	
  informa;on	
  
across	
  the	
  en;re	
  internet	
  
–  Response:	
  
•  Secure	
  your	
  routers!	
  
This is up to you, and the tools
and operational practices are
widely disseminated to achieve
this – it’s not rocket science!
Routing Security A02
2.	
  Protec;ng	
  rou(ng	
  protocols	
  and	
  their	
  opera;on	
  
–  Threat	
  model:	
  
•  Disrupt	
  the	
  opera;on	
  of	
  the	
  rou;ng	
  protocol	
  by	
  a	
  “man-­‐in-­‐the-­‐middle”	
  
a7ack	
  
•  Compromise	
  the	
  topology	
  discovery	
  /	
  reachability	
  opera;on	
  of	
  the	
  
rou;ng	
  protocol	
  by	
  injec;on	
  of	
  false	
  rou;ng	
  informa;on	
  
–  Response:	
  
•  Current	
  opera;onal	
  best	
  prac;ce	
  uses	
  TCP-­‐MD5	
  and	
  avoids	
  mul;hop	
  for	
  
all	
  eBGP	
  sessions	
  
MITM Inject: 10.0.1.0/24
eBGP	
  mul;hop	
  session	
  in	
  the	
  clear	
  
Routing Security A02
2.	
  Protec;ng	
  rou(ng	
  protocols	
  and	
  their	
  opera;on	
  
–  Threat	
  model:	
  
•  Disrupt	
  the	
  opera;on	
  of	
  the	
  rou;ng	
  protocol	
  by	
  a	
  “man-­‐in-­‐the-­‐middle”	
  
a7ack	
  
•  Compromise	
  the	
  topology	
  discovery	
  /	
  reachability	
  opera;on	
  of	
  the	
  
rou;ng	
  protocol	
  by	
  injec;on	
  of	
  false	
  rou;ng	
  informa;on	
  
–  Response:	
  
•  Current	
  opera;onal	
  best	
  prac;ce	
  uses	
  TCP-­‐MD5	
  and	
  avoids	
  mul;hop	
  for	
  
all	
  eBGP	
  sessions	
  
MITM Inject: 10.0.1.0/24
eBGP	
  mul;hop	
  session	
  in	
  the	
  clear	
  
This is up to you and your
eBGP peers, and the tools and
operational practices are widely
disseminated to achieve this –
again, it’s not rocket science!
Routing Security A03
3.	
  Protec;ng	
  the	
  rou(ng	
  protocol	
  payload	
  
–  Threat	
  model:	
  
•  Insert	
  corrupted	
  address	
  informa;on	
  into	
  your	
  network’s	
  rou;ng	
  tables	
  
•  Insert	
  corrupt	
  reachability	
  informa;on	
  into	
  your	
  network’s	
  forwarding	
  
tables	
  
•  Allow	
  the	
  rou;ng	
  protocol	
  to	
  disseminate	
  the	
  corrupted	
  informa;on	
  
across	
  the	
  en;re	
  internet	
  
–  Response:	
  
•  	
  	
  
10.0.0.0/8 (1,2,3)
AS 3
AS 666
10.0.1.0/24 (1,666) NO EXPORT
AS 4
10.0.0.0/16 (1,2,3,4)
Routing attack on
10.0.1.0/24
Routing Security A03
3.	
  Protec;ng	
  the	
  rou(ng	
  protocol	
  payload	
  
–  Threat	
  model:	
  
•  Insert	
  corrupted	
  address	
  informa;on	
  into	
  your	
  network’s	
  rou;ng	
  tables	
  
•  Insert	
  corrupt	
  reachability	
  informa;on	
  into	
  your	
  network’s	
  forwarding	
  
tables	
  
•  Allow	
  the	
  rou;ng	
  protocol	
  to	
  disseminate	
  the	
  corrupted	
  informa;on	
  
across	
  the	
  en;re	
  internet	
  
–  Response:	
  
•  	
  	
  
10.0.0.0/8 (1,2,3)
AS 3
AS 666
10.0.1.0/24 (1,666) NO EXPORT
AS 4
10.0.0.0/16 (1,2,3,4)
Routing attack on
10.0.1.0/24
Unfortunately, this could well be
rocket science!
Can we “tweak” BGP so that it can
detect the difference between good and
evil, and only advertise and propagate
the “good” routes?
Routing Security
•  The	
  basic	
  rou;ng	
  payload	
  security	
  ques;ons	
  that	
  need	
  to	
  
be	
  answered	
  are:	
  
–  Who	
  injected	
  this	
  address	
  prefix	
  into	
  the	
  network?	
  
–  Did	
  they	
  have	
  the	
  necessary	
  creden(als	
  to	
  inject	
  this	
  
address	
  prefix?	
  Is	
  this	
  a	
  valid	
  address	
  prefix?	
  
–  Is	
  the	
  forwarding	
  path	
  to	
  reach	
  this	
  address	
  prefix	
  
trustable?	
  
•  And	
  can	
  these	
  ques;ons	
  be	
  answered	
  by	
  any	
  BGP	
  
speaker	
  quickly	
  and	
  cheaply?	
  
A (random) BGP Update
2015/01/26	
  00:03:35	
  rcvd	
  UPDATE	
  w/	
  a7r:	
  	
  
	
  nexthop	
  203.119.76.3,	
  origin	
  i,	
  path	
  4608	
  1221	
  4637	
  3561	
  
3356	
  4657	
  4773	
  
	
  124.197.64.0/19	
  
	
  
	
  
BGP Update Validation
2015/01/26	
  00:03:35	
  rcvd	
  UPDATE	
  w/	
  a7r:	
  	
  
	
  nexthop	
  203.119.76.3,	
  origin	
  i,	
  path	
  4608	
  1221	
  4637	
  3561	
  
3356	
  4657	
  4773	
  
	
  124.197.64.0/19	
  
	
  
Is	
  124.197.64.0/19	
  a	
  “valid”	
  prefix?	
  
	
  
BGP Update Validation
2015/01/26	
  00:03:35	
  rcvd	
  UPDATE	
  w/	
  a7r:	
  	
  
	
  nexthop	
  203.119.76.3,	
  origin	
  i,	
  path	
  4608	
  1221	
  4637	
  3561	
  
3356	
  4657	
  4773	
  
	
  124.197.64.0/19	
  
	
  
Is	
  124.197.64.0/19	
  a	
  “valid”	
  prefix?	
  
Is	
  AS4773	
  a	
  “valid”	
  ASN?	
  
	
  
BGP Update Validation
2015/01/26	
  00:03:35	
  rcvd	
  UPDATE	
  w/	
  a7r:	
  	
  
	
  nexthop	
  203.119.76.3,	
  origin	
  i,	
  path	
  4608	
  1221	
  4637	
  3561	
  
3356	
  4657	
  4773	
  
	
  124.197.64.0/19	
  
	
  
Is	
  124.197.64.0/19	
  a	
  “valid”	
  prefix?	
  
Is	
  AS4773	
  a	
  “valid”	
  ASN?	
  
Is	
  4773	
  an	
  “authorized”	
  AS	
  that	
  is	
  permi7ed	
  to	
  adver;se	
  a	
  route	
  
to	
  this	
  prefix?	
  
	
  
BGP Update Validation
2015/01/26	
  00:03:35	
  rcvd	
  UPDATE	
  w/	
  a7r:	
  	
  
	
  nexthop	
  203.119.76.3,	
  origin	
  i,	
  path	
  4608	
  1221	
  4637	
  3561	
  3356	
  4657	
  4773	
  
	
  124.197.64.0/19	
  
	
  
•  Is	
  124.197.64.0/19	
  a	
  “valid”	
  prefix?	
  
•  Is	
  AS4773	
  a	
  “valid”	
  ASN?	
  
•  Is	
  4773	
  an	
  “authorized”	
  AS	
  that	
  is	
  permi7ed	
  to	
  adver;se	
  a	
  route	
  to	
  this	
  
prefix?	
  
•  Is	
  the	
  AS	
  Path	
  “valid”?	
  
-­‐  Is	
  AS	
  4657	
  a	
  valid	
  AS,	
  and	
  did	
  AS	
  4773	
  adver;se	
  this	
  route	
  to	
  AS	
  4657?	
  
-­‐  Is	
  AS	
  3356	
  a	
  valid	
  AS,	
  and	
  did	
  AS	
  4657	
  adver;se	
  this	
  route	
  to	
  AS	
  3356?	
  
-­‐  Etc	
  
•  Does	
  this	
  AS	
  Path	
  represent	
  a	
  viable	
  forwarding	
  path	
  to	
  reach	
  this	
  address	
  
prefix?	
  
	
  
The Basics of Update
Validation
•  The	
  VALIDITY	
  of	
  the	
  Address	
  and	
  AS	
  number	
  
•  The	
  AUTHORISATION	
  provided	
  by	
  the	
  address	
  
holder	
  to	
  permit	
  the	
  AS	
  to	
  originate	
  the	
  route	
  
•  The	
  CORRECTNESS	
  of	
  the	
  path	
  to	
  reach	
  the	
  
des;na;on	
  
Approaches to Validity
•  The	
  awesome	
  power	
  of	
  Whois!	
  
•  Entries	
  in	
  a	
  rou;ng	
  registry	
  
•  Delega;on	
  of	
  reverse	
  DNS	
  zone	
  
•  Cer;fica;on	
  of	
  an	
  alloca;on	
  registry	
  entry	
  
	
  
Approaches to Validity
•  The	
  awesome	
  power	
  of	
  Whois!	
  
•  Entries	
  in	
  a	
  rou;ng	
  registry	
  
•  Delega;on	
  of	
  reverse	
  DNS	
  zone	
  
•  Cer;fica;on	
  of	
  an	
  alloca;on	
  registry	
  entry	
  
All	
  of	
  these	
  approaches	
  rely	
  on	
  some	
  form	
  of	
  trusted	
  third	
  
party	
  a7esta;on	
  to	
  provide	
  informa;on	
  about	
  the	
  address	
  
The	
  creden;als	
  of	
  the	
  party	
  holding	
  the	
  address	
  are	
  not	
  well	
  
described	
  in	
  the	
  first	
  two	
  approaches	
  
For	
  reverse	
  DNS	
  it’s	
  the	
  delegated	
  zone	
  admin	
  	
  
For	
  cer;fica;on	
  it’s	
  the	
  holder	
  of	
  the	
  private	
  key	
  
None of these Approaches are
a Perfect Fit
Route	
  Registries:	
  
•  The	
  route	
  registry	
  model	
  relies	
  on	
  the	
  maintenance	
  of	
  a	
  trustable	
  registry	
  write	
  
access	
  model.	
  Too	
  oien	
  this	
  access	
  model	
  becomes	
  a	
  Mail	
  From	
  access	
  or	
  user	
  /	
  
password.	
  Efforts	
  to	
  move	
  to	
  keyed	
  access	
  and	
  user	
  certs	
  have	
  oien	
  foundered	
  
on	
  user	
  resistance	
  to	
  cert	
  management	
  tools	
  in	
  user	
  systems	
  
•  There	
  is	
  no	
  single	
  IRR,	
  but	
  many	
  IRRs	
  each	
  with	
  par;al	
  (and	
  some;mes	
  
conflic;ng	
  data)	
  or	
  dubious	
  quality	
  and	
  uncertain	
  validity	
  
•  The	
  Route	
  Registry	
  Object	
  access	
  model	
  is	
  variously	
  implemented	
  
•  All	
  this	
  can	
  be	
  improved,	
  but	
  to	
  do	
  so	
  probably	
  requires	
  keys	
  (and	
  certs)	
  and	
  
signed	
  objects	
  
•  In	
  theory,	
  and	
  prac;ce,	
  this	
  can	
  work	
  for	
  a	
  diligent,	
  mutually	
  trus;ng	
  
community	
  using	
  simple	
  origina;on	
  registry	
  objects	
  
•  If	
  you	
  operate	
  a	
  network	
  high	
  in	
  the	
  interconnec;on	
  hierarchy,	
  then	
  the	
  large	
  
ACL	
  filters	
  pose	
  a	
  scaling	
  issue	
  in	
  terms	
  of	
  router	
  config	
  /	
  state	
  bloat	
  
•  The	
  opera;ng	
  overhead	
  of	
  maintaining	
  current	
  accurate	
  data	
  is	
  high	
  and	
  the	
  
integrity	
  of	
  the	
  route	
  registry	
  contents	
  is	
  vulnerable	
  to	
  bad	
  actors	
  
None of these Approaches are
a Perfect Fit
Popula;ng	
  Reverse	
  DNS:	
  
•  The	
  reverse	
  DNS	
  model	
  does	
  not	
  cleanly	
  map	
  across	
  CIDR	
  delega;ons	
  
–  It	
  can	
  be	
  coerced	
  to	
  do	
  so,	
  but	
  its	
  not	
  a	
  smooth	
  fit	
  
•  The	
  approach	
  relies	
  on	
  integrity	
  of	
  zone	
  delega;on	
  and	
  management	
  
•  Mapping	
  AS	
  numbers?	
  
–  How	
  can	
  you	
  answer	
  “assemble	
  the	
  list	
  of	
  all	
  addresses	
  originated	
  by	
  an	
  AS”	
  if	
  all	
  you	
  
have	
  in	
  the	
  reverse	
  DNS	
  is	
  address	
  -­‐>	
  AS	
  mapping	
  
•  Integrity	
  of	
  cri;cal	
  informa;on	
  in	
  the	
  DNS	
  really	
  needs	
  DNSSEC	
  
–  Which	
  in	
  turn	
  implies	
  private	
  key	
  management	
  tools	
  and	
  prac;ces	
  on	
  the	
  part	
  of	
  
address	
  holders	
  
•  Would	
  this	
  approach	
  be	
  a	
  case	
  of	
  overloading	
  the	
  DNS?	
  
None of these Approaches are
a Perfect Fit
Number	
  PKI:	
  
•  A	
  PKI	
  for	
  Addresses	
  and	
  AS	
  numbers	
  has	
  issues	
  has	
  its	
  own	
  issues	
  
•  Key	
  /	
  Cert	
  management	
  for	
  a	
  new	
  PKI	
  requires	
  a	
  dedicated	
  tool	
  set	
  
•  Familiarity	
  with	
  managing	
  keys	
  is	
  an	
  issue	
  
•  Hardware	
  and	
  soiware	
  tools	
  for	
  use	
  in	
  this	
  PKI	
  tend	
  to	
  be	
  incomplete	
  
and	
  expose	
  much	
  of	
  the	
  underlying	
  mechanics	
  of	
  the	
  crypto	
  system	
  
•  Acceptance	
  by	
  operators	
  is	
  an	
  issue	
  
•  Distribu;on	
  of	
  Cer;ficates	
  and	
  CRLs	
  uses	
  “just	
  in	
  case”	
  flooding	
  and	
  
runs	
  into	
  a	
  novel	
  set	
  of	
  issues	
  of	
  distribu;on	
  and	
  synchroniza;on	
  of	
  
rou;ng	
  informa;on	
  and	
  the	
  associated	
  creden;als	
  that	
  need	
  to	
  be	
  used	
  
to	
  validate	
  the	
  rou;ng	
  informa;on	
  
	
  
A Foundation for Routing
Security
A	
  PKI	
  for	
  addresses	
  and	
  ASNs	
  makes	
  a	
  lot	
  of	
  sense:	
  (*)	
  
	
  
•  Use	
  digital	
  signatures	
  to	
  both	
  the	
  integrity,	
  the	
  
authen;city	
  and	
  the	
  currency	
  of	
  the	
  signed	
  data.	
  This	
  
allows	
  systems	
  to	
  automa;cally	
  validate	
  a7esta;ons	
  	
  
about	
  addresses	
  and	
  their	
  use	
  
•  Digital	
  signatures	
  that	
  can	
  be	
  validated	
  in	
  this	
  PKI	
  can	
  be	
  used	
  to	
  
sign:	
  
–  Route	
  Registry	
  Entries	
  
–  Route	
  Requests	
  
–  BGP	
  
* Yes, that’s a personal opinion!
What about BGP?
•  What	
  are	
  the	
  trade-­‐offs	
  in	
  adding	
  any	
  of	
  these	
  
approaches	
  into	
  the	
  context	
  of	
  BGP?	
  
–  How	
  a	
  BGP	
  speaker	
  can	
  be	
  assured	
  that	
  the	
  origina;on	
  of	
  
the	
  route	
  is	
  valid?	
  
–  And	
  that	
  the	
  AS	
  path	
  that	
  is	
  being	
  presented	
  is	
  an	
  
authen;c	
  representa;on	
  of	
  a	
  viable	
  forwarding	
  path	
  to	
  
the	
  address?	
  
BGP Elements
•  Origina;on	
  
– Is	
  the	
  address	
  valid?	
  
– Is	
  the	
  origina;on	
  of	
  this	
  route	
  a	
  duly	
  authorized	
  
use	
  of	
  this	
  address?	
  
•  Path	
  
– Is	
  the	
  forwarding	
  path	
  represented	
  in	
  the	
  route	
  an	
  
authen;c	
  path?	
  
– If	
  I	
  pass	
  a	
  packet	
  into	
  this	
  path	
  will	
  it	
  get	
  to	
  its	
  
intended	
  des;na;on?	
  
BGP Origination (1)
Managed	
  Filters	
  
–  Filter	
  lookup	
  is	
  fast	
  within	
  the	
  router,	
  and	
  filter	
  construc;on	
  can	
  be	
  
undertaken	
  by	
  a	
  trusted	
  off-­‐unit	
  subsystem,	
  using	
  an	
  incremental	
  
difference	
  sync	
  protocol	
  to	
  keep	
  the	
  router	
  state	
  in	
  sync	
  
–  Route	
  Registry	
  model	
  of	
  declaring	
  in	
  advance	
  what	
  addresses	
  you	
  may	
  
adver;se	
  to	
  your	
  BGP	
  peers	
  
•  The	
  peer	
  constructs	
  an	
  acceptance	
  filter	
  based	
  on	
  this	
  list	
  
–  RPKI	
  ROA	
  model	
  of	
  declaring	
  in	
  advance	
  what	
  addresses	
  you	
  may	
  
adver;se	
  to	
  your	
  BGP	
  peers	
  
•  The	
  peer	
  constructs	
  an	
  acceptance	
  filter	
  based	
  on	
  this	
  list	
  
A filter-based architecture
for securing BGP
origination
eBGP	
  
Router	
  BGP	
  Filter	
  
(Origin	
  AS	
  +	
  
prefix	
  mask)	
  
Local	
  Route	
  
Policy	
  Engine	
  
DistribuCon	
  /	
  
SynchronisaCon	
  
Route	
  OriginaCon	
  InformaCon	
  
(Route	
  Registries	
  or	
  	
  RPKI	
  certs	
  and	
  ROAS)	
  
BGP Origination (2)
Update	
  Filtering	
  
–  Update	
  filtering	
  allows	
  the	
  creden;al	
  informa;on	
  to	
  be	
  passed	
  with	
  
the	
  data,	
  allowing	
  for	
  “just	
  in	
  ;me”	
  delivery	
  of	
  creden;als	
  and	
  
informa;on	
  
–  Can	
  be	
  undertaken	
  on-­‐board,	
  or	
  outsourced	
  to	
  update	
  filtering	
  BGP	
  
route	
  server(s)	
  within	
  each	
  AS	
  
–  RKPI	
  ROA	
  a7ached	
  to	
  the	
  update	
  as	
  an	
  opaque	
  transi;ve	
  a7ribute?	
  
•  BGP	
  bloat?	
  
•  Digital	
  signatures	
  plus	
  PKI	
  Certs	
  can	
  add	
  significant	
  size	
  to	
  updates	
  and	
  
processing	
  load	
  to	
  routers	
  (as	
  in	
  a	
  BGP	
  peer	
  session	
  reset)	
  
–  Or	
  perform	
  a	
  Reverse	
  DNS	
  lookup	
  
•  Validate	
  origina;ng	
  AS	
  through	
  a	
  DNS	
  query	
  of	
  the	
  prefix	
  
A update-based architecture
for securing BGP
origination
eBGP	
  
Router	
  
BGP	
  
Update	
  
Origin	
  AS	
  
Address	
  
AS	
  Path	
  
Origina;on	
  
Creden;als	
  
Local	
  Trust	
  Material	
  
Origina;on	
  
Creden;als	
  
Origin	
  AS	
  
Address	
  
+
Local	
  ValidaCon	
  
FuncCon	
  
Y/N	
  
Path Validation
Origina;on	
  valida;on	
  reduces	
  the	
  a7ack	
  surface,	
  but	
  
an	
  a7acker	
  can	
  s;ll	
  inject	
  bogus	
  routes	
  as	
  long	
  as	
  it	
  
synthesizes	
  the	
  specified	
  origina;ng	
  AS	
  in	
  the	
  bogus	
  
route	
  entry	
  
So	
  while	
  origina;on	
  protec;on	
  is	
  a	
  good	
  ini;al	
  step,	
  it	
  
is	
  just	
  an	
  ini;al	
  step	
  and	
  by	
  itself	
  its	
  not	
  a	
  completely	
  
adequate	
  approach	
  to	
  rou;ng	
  security	
  
But	
  how	
  far	
  (and	
  at	
  what	
  cost)	
  should	
  we	
  go	
  to	
  secure	
  
AS	
  Paths?	
  
option a:
Route Registries and RPSL
•  Using	
  RPSL	
  and	
  various	
  forms	
  of	
  export	
  and	
  import	
  
a7esta;ons	
  in	
  a	
  route	
  registry	
  it	
  is	
  feasible	
  to	
  construct	
  AS	
  
Path	
  filters	
  that	
  allow	
  a	
  BGP	
  speaker	
  to	
  filter	
  out	
  implausible	
  
AS	
  Paths	
  from	
  incoming	
  updates	
  
•  In	
  prac;ce	
  RPSL	
  never	
  gained	
  widespread	
  acceptance.	
  Some	
  
communi;es	
  worked	
  hard	
  to	
  promulgate	
  its	
  use,	
  but	
  overall	
  it	
  
was	
  unable	
  to	
  achieve	
  widespread	
  adop;on	
  and	
  the	
  effort	
  /	
  
benefit	
  equa;on	
  was	
  unsustainable	
  
•  RPSL	
  path	
  filters	
  can	
  filter	
  out	
  what’s	
  implausible	
  
	
  
option b:
AS Adjacency and soBGP
•  A	
  similar	
  approach	
  was	
  described	
  in	
  soBGP,	
  where	
  a	
  pair	
  of	
  
adjacent	
  ASs	
  would	
  publish	
  and	
  propagate	
  a	
  signed	
  AS	
  
Adjacency	
  A7esta;on	
  	
  
•  If	
  a	
  BGP	
  speaker	
  receives	
  a	
  AS	
  Path	
  it	
  can	
  break	
  the	
  path	
  into	
  
a	
  sequence	
  of	
  AS	
  adjacency	
  pairs	
  and	
  determine	
  if	
  the	
  AS	
  
Path	
  represents	
  a	
  plausible	
  transit	
  path	
  through	
  the	
  network	
  
•  This	
  plausibility	
  test	
  can	
  be	
  performed	
  through	
  a	
  filter	
  
opera;on	
  performed	
  on	
  received	
  updates,	
  either	
  on-­‐board	
  or	
  
off-­‐loaded	
  
option c:
AS Path Validation and BGPsec
•  BGPsec	
  proposes	
  a	
  stricter	
  form	
  of	
  AS	
  Path	
  valida;on	
  where	
  
each	
  eBGP	
  speaker	
  uses	
  its	
  own	
  digital	
  key	
  to	
  sign	
  across	
  the	
  
path	
  and	
  the	
  AS	
  to	
  whom	
  the	
  update	
  is	
  being	
  sent	
  
•  It	
  is	
  not	
  possible	
  for	
  a	
  third	
  party	
  to	
  construct	
  a	
  bogus	
  route	
  in	
  
this	
  scenario	
  unless	
  it	
  gains	
  access	
  to	
  keys	
  
•  But	
  this	
  sequence	
  of	
  interlocking	
  signatures	
  implies:	
  
–  BGPsec	
  routers	
  are	
  required	
  to	
  unchain	
  the	
  signature	
  set	
  and	
  match	
  it	
  
to	
  the	
  AS	
  Path	
  in	
  the	
  update,	
  using	
  the	
  local	
  RPKI	
  cache	
  to	
  validate	
  the	
  
router	
  signatures	
  
–  BGP	
  bloat	
  in	
  carrying	
  interlocking	
  signatures	
  
–  a	
  high	
  crypto	
  processing	
  overhead	
  in	
  processing	
  updates	
  
–  no	
  useful	
  valida;on	
  in	
  cases	
  of	
  piecemeal	
  adop;on	
  of	
  BGPsec	
  
Concerns
A	
  major	
  issue	
  here	
  is	
  that	
  of	
  par1al	
  use	
  and	
  deployment	
  
–  This	
  security	
  mechanism	
  has	
  to	
  cope	
  with	
  par;al	
  deployment	
  in	
  
the	
  rou;ng	
  system	
  
•  The	
  basic	
  conven;onal	
  approach	
  of	
  “what	
  is	
  not	
  cer;fied	
  and	
  proved	
  as	
  good	
  
must	
  be	
  bad”	
  will	
  not	
  work	
  in	
  a	
  par;al	
  deployment	
  scenario	
  
–  In	
  BGP	
  we	
  need	
  to	
  think	
  about	
  both	
  origina;on	
  and	
  the	
  AS	
  Path	
  
of	
  a	
  route	
  object	
  in	
  a	
  par;al	
  deployed	
  environment	
  
•  AS	
  path	
  valida;on	
  is	
  challenging	
  indeed	
  in	
  an	
  environment	
  of	
  piecemeal	
  use	
  of	
  
secure	
  creden;als,	
  as	
  the	
  mechanism	
  cannot	
  tunnel	
  from	
  one	
  BGPsec	
  “island”	
  to	
  
the	
  next	
  “island”	
  
–  A	
  par;ally	
  secured	
  environment	
  may	
  incur	
  a	
  combina;on	
  of	
  
high	
  incremental	
  cost	
  with	
  only	
  marginal	
  net	
  benefit	
  to	
  those	
  
deploying	
  BGPsec	
  
Concerns
Is	
  a	
  trust	
  hierarchy	
  the	
  best	
  approach	
  to	
  use?	
  
–  The	
  concern	
  here	
  is	
  concentra(on	
  of	
  vulnerability	
  
If	
  valida;on	
  of	
  rou;ng	
  informa;on	
  is	
  dependent	
  on	
  the	
  availability	
  
and	
  validity	
  of	
  a	
  single	
  root	
  trust	
  anchor	
  then	
  what	
  happens	
  when	
  
this	
  single	
  digital	
  ar;fact	
  is	
  a7acked?	
  
–  But	
  is	
  there	
  a	
  viable	
  alterna;ve	
  approach?	
  
Can	
  you	
  successfully	
  incorporate	
  robust	
  diversity	
  of	
  authen;ca;on	
  
of	
  security	
  creden;als	
  into	
  a	
  supposedly	
  highly	
  resilient	
  secure	
  trust	
  
framework?	
  
This	
  is	
  a	
  very	
  challenging	
  ques;on	
  about	
  the	
  nature	
  of	
  
trust	
  in	
  a	
  diverse	
  networked	
  environment!	
  
Concerns
Is	
  cer;fica;on	
  the	
  only	
  way	
  to	
  achieve	
  useful	
  outcomes	
  in	
  
securing	
  rou;ng?	
  
–  Is	
  this	
  form	
  of	
  augmenta;on	
  to	
  BGP	
  to	
  enforce	
  “protocol	
  payload	
  
correctness”	
  over-­‐engineered,	
  and	
  does	
  it	
  rely	
  on	
  imprac;cal	
  models	
  
of	
  universal	
  adop;on?	
  
–  Can	
  various	
  forms	
  of	
  rouCng	
  anomaly	
  detectors	
  adequately	
  detect	
  the	
  
most	
  prevalent	
  forms	
  of	
  typos	
  and	
  deliberate	
  lies	
  in	
  rou;ng	
  with	
  a	
  far	
  
lower	
  overhead,	
  and	
  allow	
  for	
  unilateral	
  detec;on	
  of	
  rou;ng	
  
anomalies?	
  
–  Or	
  are	
  such	
  anomaly	
  detectors	
  yet	
  another	
  instance	
  of	
  “cheap	
  security	
  
pantomime”	
  that	
  offer	
  a	
  thinly	
  veiled	
  placebo	
  of	
  apparent	
  security	
  
that	
  is	
  easily	
  circumvented	
  or	
  fooled	
  by	
  determined	
  malicious	
  a7ack?	
  
What are we trying to do?
Is	
  securing	
  the	
  rou;ng	
  system	
  alone	
  actually	
  enough?	
  
–  Can	
  you	
  validate	
  the	
  “correctness”	
  of	
  the	
  forwarding	
  paths	
  being	
  proposed	
  by	
  
a	
  rou;ng	
  system?	
  
•  Is	
  secure	
  rou;ng	
  helpful	
  in	
  and	
  of	
  itself?	
  
•  Or	
  this	
  this	
  just	
  pushing	
  the	
  vulnerability	
  set	
  to	
  a	
  different	
  point	
  in	
  the	
  network	
  
integrity	
  space?	
  
•  Does	
  this	
  adequately	
  reduce	
  the	
  level	
  of	
  exposure	
  to	
  a7ack?	
  
•  Is	
  BGP	
  too	
  incomplete	
  in	
  terms	
  of	
  its	
  informa;on	
  distribu;on	
  proper;es	
  to	
  allow	
  
robust	
  valida;on	
  of	
  the	
  intended	
  forwarding	
  state?	
  
If	
  not,	
  then	
  is	
  this	
  a	
  case	
  of	
  too	
  high	
  a	
  cost	
  or	
  too	
  low	
  a	
  benefit?	
  
–  Is	
  this	
  a	
  case	
  of	
  reducing	
  the	
  security	
  creden;al	
  genera;on	
  and	
  valida;on	
  
workload	
  by	
  reducing	
  the	
  security	
  outcomes	
  through	
  reduced	
  trust	
  and/or	
  
reduced	
  amount	
  of	
  validated	
  informa;on	
  
–  Or	
  is	
  this	
  a	
  case	
  of	
  increasing	
  the	
  level	
  of	
  assurance	
  and	
  the	
  amount	
  of	
  rou;ng	
  
informa;on	
  secured	
  by	
  these	
  mechanisms	
  
What are we trying to do?
Is	
  Par;al	
  Deployment	
  of	
  any	
  value?	
  
–  Are	
  the	
  seman;cs	
  of	
  rou;ng	
  security	
  and	
  incomplete	
  creden;als	
  
compa;ble	
  concepts?	
  
•  Can	
  you	
  deploy	
  high	
  integrity	
  security	
  using	
  par;al	
  deployment	
  scenarios?	
  
•  The	
  issue	
  here	
  is	
  that	
  creden;als	
  can	
  assure	
  a	
  recipient	
  that	
  the	
  informa;on	
  that	
  
they	
  receive	
  are	
  authen;c.	
  They	
  can	
  mark	
  what’s	
  “good”.	
  But	
  the	
  aim	
  of	
  the	
  
exercise	
  is	
  to	
  iden;fy	
  what’s	
  “bad”.	
  	
  
•  In	
  a	
  scenario	
  of	
  comprehensive	
  deployment,	
  then	
  the	
  inability	
  to	
  determine	
  “good”	
  
implies	
  “bad”	
  
•  In	
  par;al	
  deployment	
  scenarios	
  the	
  inability	
  to	
  determine	
  “good”	
  means…?	
  
Good, Fast, or Cheap?
Pick one!
We	
  just	
  can’t	
  make	
  secure	
  rou;ng	
  mechanisms	
  
cheaper,	
  faster,	
  more	
  robust,	
  and	
  more	
  effec;ve	
  than	
  
exis;ng	
  rou;ng	
  tools	
  …	
  
–  We	
  can	
  make	
  it	
  robust,	
  but	
  it	
  won’t	
  be	
  cheap,	
  and	
  
probably	
  not	
  fast!	
  
–  We	
  can	
  make	
  it	
  fast,	
  but	
  it	
  won’t	
  be	
  robust	
  and	
  it	
  won’t	
  be	
  
cheap!	
  
–  We	
  can	
  make	
  it	
  cheap,	
  but	
  it	
  won’t	
  be	
  completely	
  robust!	
  
	
  
Good, Fast, or Cheap?
Pick one!
We	
  just	
  can’t	
  make	
  secure	
  rou;ng	
  mechanisms	
  
cheaper,	
  faster,	
  more	
  robust,	
  and	
  more	
  effec;ve	
  than	
  
exis;ng	
  rou;ng	
  tools	
  …	
  
–  We	
  can	
  make	
  it	
  robust,	
  but	
  it	
  won’t	
  be	
  cheap,	
  and	
  
probably	
  not	
  fast!	
  
–  We	
  can	
  make	
  it	
  fast,	
  but	
  it	
  won’t	
  be	
  robust	
  and	
  it	
  won’t	
  be	
  
cheap!	
  
–  We	
  can	
  make	
  it	
  cheap,	
  but	
  it	
  won’t	
  be	
  completely	
  robust!	
  
	
  
So where should we compromise in the
design of a secure routing infrastructure?
	
  	
  
	
  
Caution: Opinions!
My	
  personal	
  view	
  of	
  design	
  compromise:	
  
–  Improve	
  the	
  robustness	
  of	
  RPKI	
  certs	
  by	
  altering	
  the	
  cert	
  valida;on	
  algorithm	
  
–  Place	
  origina;on	
  signatures,	
  ROAs	
  and	
  certs	
  into	
  the	
  BGP	
  protocol	
  updates	
  as	
  opaque	
  
a7ributes	
  
–  Use	
  AS	
  Adjacency	
  a7esta;ons	
  in	
  preference	
  to	
  a	
  fully	
  signed	
  path	
  
–  Place	
  AS	
  Adjacency	
  a7esta;ons	
  into	
  BGP	
  protocol	
  updates	
  as	
  opaque	
  a7ributes	
  
–  Exploit	
  the	
  use	
  of	
  TCP	
  in	
  BGP	
  to	
  never	
  resend	
  already	
  sent	
  certs	
  
–  Fla7en	
  parts	
  of	
  the	
  CA	
  hierarchy	
  by	
  using	
  RAs	
  rather	
  than	
  CA	
  delega;ons	
  
–  Reduce	
  OOB	
  creden;al	
  distribu;on	
  to	
  TA	
  material	
  
•  For	
  which	
  you	
  can	
  use	
  the	
  DNS	
  and	
  DNSSEC	
  if	
  you	
  really	
  want!	
  
Like	
  all	
  the	
  other	
  approaches,	
  this	
  represents	
  a	
  parCcular	
  set	
  of	
  compromises	
  
about	
  speed,	
  complexity,	
  cost,	
  deployment	
  characterisCcs	
  and	
  robustness	
  –	
  it	
  has	
  
it’s	
  weaknesses	
  in	
  terms	
  of	
  comprehensive	
  robustness,	
  but	
  it	
  aQempts	
  to	
  reduce	
  
the	
  number	
  of	
  disCnct	
  moving	
  parts	
  
Thank You
Questions?

More Related Content

What's hot

Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Ceh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networksCeh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networksMehrdad Jingoism
 
WiFi practical hacking "Show me the passwords!"
WiFi practical hacking "Show me the passwords!"WiFi practical hacking "Show me the passwords!"
WiFi practical hacking "Show me the passwords!"DefCamp
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksPriyanka Aash
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?RIPE NCC
 
Practical mitm for_pentesters
Practical mitm for_pentestersPractical mitm for_pentesters
Practical mitm for_pentestersJonathan Cran
 
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиМобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиPositive Hack Days
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam testsSecurity PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests📡 Sebastien Dudek
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardwarevanhoefm
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSystem ID Warehouse
 
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014 [Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014 Aaron Zauner
 
nana.owusu resume 3
nana.owusu resume 3nana.owusu resume 3
nana.owusu resume 3Nana Owusu
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 

What's hot (20)

Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Ceh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networksCeh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networks
 
WiFi practical hacking "Show me the passwords!"
WiFi practical hacking "Show me the passwords!"WiFi practical hacking "Show me the passwords!"
WiFi practical hacking "Show me the passwords!"
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
Practical mitm for_pentesters
Practical mitm for_pentestersPractical mitm for_pentesters
Practical mitm for_pentesters
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиМобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam testsSecurity PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
Network traffic analysis course
Network traffic analysis courseNetwork traffic analysis course
Network traffic analysis course
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
LOGGING FOR FUN, AND PROFIT
LOGGING FOR FUN, AND PROFITLOGGING FOR FUN, AND PROFIT
LOGGING FOR FUN, AND PROFIT
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware
 
CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014 [Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
 
nana.owusu resume 3
nana.owusu resume 3nana.owusu resume 3
nana.owusu resume 3
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 

Viewers also liked

Galapagos Presentation
Galapagos PresentationGalapagos Presentation
Galapagos Presentationguest6a743b
 
C:\Fakepath\Rccl March Family Pricing Flyer
C:\Fakepath\Rccl March Family Pricing FlyerC:\Fakepath\Rccl March Family Pricing Flyer
C:\Fakepath\Rccl March Family Pricing FlyerTeri Hurley
 
Teori organisasi umum 2 (kelompok)
Teori organisasi umum 2 (kelompok)Teori organisasi umum 2 (kelompok)
Teori organisasi umum 2 (kelompok)ismiuntari24
 

Viewers also liked (6)

Galapagos Presentation
Galapagos PresentationGalapagos Presentation
Galapagos Presentation
 
persekutuan likuidasi
persekutuan likuidasipersekutuan likuidasi
persekutuan likuidasi
 
D hyogo
D hyogoD hyogo
D hyogo
 
Hannah j
Hannah jHannah j
Hannah j
 
C:\Fakepath\Rccl March Family Pricing Flyer
C:\Fakepath\Rccl March Family Pricing FlyerC:\Fakepath\Rccl March Family Pricing Flyer
C:\Fakepath\Rccl March Family Pricing Flyer
 
Teori organisasi umum 2 (kelompok)
Teori organisasi umum 2 (kelompok)Teori organisasi umum 2 (kelompok)
Teori organisasi umum 2 (kelompok)
 

Similar to Where are we with Securing Addressing and Routing

Advanced routing worm and its security challenges
Advanced routing worm and its security challengesAdvanced routing worm and its security challenges
Advanced routing worm and its security challengesUltraUploader
 
Defcon 16-pilosov-kapela
Defcon 16-pilosov-kapelaDefcon 16-pilosov-kapela
Defcon 16-pilosov-kapelaHai Nguyen
 
36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challengesAPNIC
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEPJoe McCray
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )Kashyap Mandaliya
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONIRJET Journal
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for networkeSAT Publishing House
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensicsAnpumathews
 
StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware Lancope, Inc.
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkIRJET Journal
 
BGP Flexibility and its Consequences.
BGP Flexibility and its Consequences. BGP Flexibility and its Consequences.
BGP Flexibility and its Consequences. Qrator Labs
 
BGP Flexibility and Its Consequences
BGP Flexibility and Its ConsequencesBGP Flexibility and Its Consequences
BGP Flexibility and Its ConsequencesAPNIC
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityAPNIC
 
Seqüestro de dados na Internet
Seqüestro de dados na InternetSeqüestro de dados na Internet
Seqüestro de dados na InternetJoão S Magalhães
 
Afcea 4 internet networks
Afcea 4 internet networksAfcea 4 internet networks
Afcea 4 internet networksPaul Strassmann
 

Similar to Where are we with Securing Addressing and Routing (20)

Advanced routing worm and its security challenges
Advanced routing worm and its security challengesAdvanced routing worm and its security challenges
Advanced routing worm and its security challenges
 
Defcon 16-pilosov-kapela
Defcon 16-pilosov-kapelaDefcon 16-pilosov-kapela
Defcon 16-pilosov-kapela
 
File000141
File000141File000141
File000141
 
36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATION
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for network
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc Network
 
BGP Flexibility and its Consequences.
BGP Flexibility and its Consequences. BGP Flexibility and its Consequences.
BGP Flexibility and its Consequences.
 
BGP Flexibility and Its Consequences
BGP Flexibility and Its ConsequencesBGP Flexibility and Its Consequences
BGP Flexibility and Its Consequences
 
NZNOG 2022: Routing Security
NZNOG 2022: Routing SecurityNZNOG 2022: Routing Security
NZNOG 2022: Routing Security
 
Seqüestro de dados na Internet
Seqüestro de dados na InternetSeqüestro de dados na Internet
Seqüestro de dados na Internet
 
Afcea 4 internet networks
Afcea 4 internet networksAfcea 4 internet networks
Afcea 4 internet networks
 

More from APNIC

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 

More from APNIC (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 

Where are we with Securing Addressing and Routing

  • 1. Where are we with Securing Addressing and Routing? Geoff Huston Chief Scientist, APNIC
  • 3. …there are many ways to be bad!
  • 4. An Ascending Scale of Badness •  Port  Scan  for  known  exploits   General annoyance •  Spew  spam   Yes, there are still gullible folk out there! •  Mount  a  fake  web  site  a7ack   And lure victims •  Enlist  a  bot  army  and  mount  mul;-­‐gigabit  DOS  a7acks   Extortion leverage and general mayhem •  Mount  a  rou;ng  a7ack   And bring down an entire region / country / global network!
  • 5. If I were really bad (and evil)… I’d attack routing.
  • 6. If I were really bad (and evil)… •  Through  rou;ng  I’d  a7ack:     –  the  DNS  root  system   –  isolate  cri;cal  public  servers  and  resources   –  overwhelm  the  rou;ng  system  with  spurious  informa;on   And bring selected parts of the network to a complete chaotic halt!
  • 7. How many advertisements in today’s BGP are “lies”?  We’ve  all  heard  of  the  “YouTube”  route  hijack,  and   similar  incidents  of  injec;ng  false  informa;on  into   the  rou;ng  system.      But  the  situa;on  is  a  li7le  more  mundane  than  a  few   isolated  high  profile  incidents  -­‐  who  uses  addresses   and  AS  numbers  that  are  not  registered  as  “in  use”  in   our  Internet  number  registry  system?  
  • 14. wake me up when we’re done
  • 20. don’t forget: ALL of these advertised addresses and ASes are bogus!
  • 22. and lets not forget IPv6!
  • 23. What’s the base problem here? We  are  not  doing  a  very  good  job   •  Rou;ng  is  built  on  vague  mutual  trust  models   •  Rou;ng  audi;ng  is  a  low  value  ac;vity  that  noone  really   performs  with  any  level  of  thoroughness   •  We  have  grown  used  to  lousy  solu;ons  and   ins;tu;onalized  lying  in  the  rou;ng  system   •  And  because  instances  of  abuse  are  supposedly  rela;vely   infrequent  we  are  prepared  to  tolerate  the  risk  of  having   a  completely  insecure  rou;ng  system  
  • 24. What’s the base problem here? Noone seems to want to care enough about the integrity of the network to address routing integrity!
  • 25. Routing Security is a shared problem It’s a tragedy of the commons situation   –  Nobody  can  single-­‐handedly  apply  rigorous  tests  on  the  rou;ng   system   –  And  the  lowest  common  denominator  approach  is  to  apply  no   integrity  tests  at  all   –  It’s  all  misplaced  trust  and  absolutely  no  effec;ve  defence!  
  • 26. What SHOULD we be doing?
  • 27. Routing Security A01 1.  Protec;ng  the  routers   –  Threat  model:   •  Compromised  router  used  to  insert  corrupted  address  informa;on  into   your  network’s  rou;ng  tables   •  Insert  corrupt  reachability  informa;on  into  your  network’s  forwarding   tables   •  Allow  the  rou;ng  protocol  to  disseminate  the  corrupted  informa;on   across  the  en;re  internet   –  Response:   •  Secure  your  routers!  
  • 28. Routing Security A01 1.  Protec;ng  the  routers   –  Threat  model:   •  Compromised  router  used  to  insert  corrupted  address  informa;on  into   your  network’s  rou;ng  tables   •  Insert  corrupt  reachability  informa;on  into  your  network’s  forwarding   tables   •  Allow  the  rou;ng  protocol  to  disseminate  the  corrupted  informa;on   across  the  en;re  internet   –  Response:   •  Secure  your  routers!   This is up to you, and the tools and operational practices are widely disseminated to achieve this – it’s not rocket science!
  • 29. Routing Security A02 2.  Protec;ng  rou(ng  protocols  and  their  opera;on   –  Threat  model:   •  Disrupt  the  opera;on  of  the  rou;ng  protocol  by  a  “man-­‐in-­‐the-­‐middle”   a7ack   •  Compromise  the  topology  discovery  /  reachability  opera;on  of  the   rou;ng  protocol  by  injec;on  of  false  rou;ng  informa;on   –  Response:   •  Current  opera;onal  best  prac;ce  uses  TCP-­‐MD5  and  avoids  mul;hop  for   all  eBGP  sessions   MITM Inject: 10.0.1.0/24 eBGP  mul;hop  session  in  the  clear  
  • 30. Routing Security A02 2.  Protec;ng  rou(ng  protocols  and  their  opera;on   –  Threat  model:   •  Disrupt  the  opera;on  of  the  rou;ng  protocol  by  a  “man-­‐in-­‐the-­‐middle”   a7ack   •  Compromise  the  topology  discovery  /  reachability  opera;on  of  the   rou;ng  protocol  by  injec;on  of  false  rou;ng  informa;on   –  Response:   •  Current  opera;onal  best  prac;ce  uses  TCP-­‐MD5  and  avoids  mul;hop  for   all  eBGP  sessions   MITM Inject: 10.0.1.0/24 eBGP  mul;hop  session  in  the  clear   This is up to you and your eBGP peers, and the tools and operational practices are widely disseminated to achieve this – again, it’s not rocket science!
  • 31. Routing Security A03 3.  Protec;ng  the  rou(ng  protocol  payload   –  Threat  model:   •  Insert  corrupted  address  informa;on  into  your  network’s  rou;ng  tables   •  Insert  corrupt  reachability  informa;on  into  your  network’s  forwarding   tables   •  Allow  the  rou;ng  protocol  to  disseminate  the  corrupted  informa;on   across  the  en;re  internet   –  Response:   •      10.0.0.0/8 (1,2,3) AS 3 AS 666 10.0.1.0/24 (1,666) NO EXPORT AS 4 10.0.0.0/16 (1,2,3,4) Routing attack on 10.0.1.0/24
  • 32. Routing Security A03 3.  Protec;ng  the  rou(ng  protocol  payload   –  Threat  model:   •  Insert  corrupted  address  informa;on  into  your  network’s  rou;ng  tables   •  Insert  corrupt  reachability  informa;on  into  your  network’s  forwarding   tables   •  Allow  the  rou;ng  protocol  to  disseminate  the  corrupted  informa;on   across  the  en;re  internet   –  Response:   •      10.0.0.0/8 (1,2,3) AS 3 AS 666 10.0.1.0/24 (1,666) NO EXPORT AS 4 10.0.0.0/16 (1,2,3,4) Routing attack on 10.0.1.0/24 Unfortunately, this could well be rocket science!
  • 33. Can we “tweak” BGP so that it can detect the difference between good and evil, and only advertise and propagate the “good” routes?
  • 34. Routing Security •  The  basic  rou;ng  payload  security  ques;ons  that  need  to   be  answered  are:   –  Who  injected  this  address  prefix  into  the  network?   –  Did  they  have  the  necessary  creden(als  to  inject  this   address  prefix?  Is  this  a  valid  address  prefix?   –  Is  the  forwarding  path  to  reach  this  address  prefix   trustable?   •  And  can  these  ques;ons  be  answered  by  any  BGP   speaker  quickly  and  cheaply?  
  • 35. A (random) BGP Update 2015/01/26  00:03:35  rcvd  UPDATE  w/  a7r:      nexthop  203.119.76.3,  origin  i,  path  4608  1221  4637  3561   3356  4657  4773    124.197.64.0/19      
  • 36. BGP Update Validation 2015/01/26  00:03:35  rcvd  UPDATE  w/  a7r:      nexthop  203.119.76.3,  origin  i,  path  4608  1221  4637  3561   3356  4657  4773    124.197.64.0/19     Is  124.197.64.0/19  a  “valid”  prefix?    
  • 37. BGP Update Validation 2015/01/26  00:03:35  rcvd  UPDATE  w/  a7r:      nexthop  203.119.76.3,  origin  i,  path  4608  1221  4637  3561   3356  4657  4773    124.197.64.0/19     Is  124.197.64.0/19  a  “valid”  prefix?   Is  AS4773  a  “valid”  ASN?    
  • 38. BGP Update Validation 2015/01/26  00:03:35  rcvd  UPDATE  w/  a7r:      nexthop  203.119.76.3,  origin  i,  path  4608  1221  4637  3561   3356  4657  4773    124.197.64.0/19     Is  124.197.64.0/19  a  “valid”  prefix?   Is  AS4773  a  “valid”  ASN?   Is  4773  an  “authorized”  AS  that  is  permi7ed  to  adver;se  a  route   to  this  prefix?    
  • 39. BGP Update Validation 2015/01/26  00:03:35  rcvd  UPDATE  w/  a7r:      nexthop  203.119.76.3,  origin  i,  path  4608  1221  4637  3561  3356  4657  4773    124.197.64.0/19     •  Is  124.197.64.0/19  a  “valid”  prefix?   •  Is  AS4773  a  “valid”  ASN?   •  Is  4773  an  “authorized”  AS  that  is  permi7ed  to  adver;se  a  route  to  this   prefix?   •  Is  the  AS  Path  “valid”?   -­‐  Is  AS  4657  a  valid  AS,  and  did  AS  4773  adver;se  this  route  to  AS  4657?   -­‐  Is  AS  3356  a  valid  AS,  and  did  AS  4657  adver;se  this  route  to  AS  3356?   -­‐  Etc   •  Does  this  AS  Path  represent  a  viable  forwarding  path  to  reach  this  address   prefix?    
  • 40. The Basics of Update Validation •  The  VALIDITY  of  the  Address  and  AS  number   •  The  AUTHORISATION  provided  by  the  address   holder  to  permit  the  AS  to  originate  the  route   •  The  CORRECTNESS  of  the  path  to  reach  the   des;na;on  
  • 41. Approaches to Validity •  The  awesome  power  of  Whois!   •  Entries  in  a  rou;ng  registry   •  Delega;on  of  reverse  DNS  zone   •  Cer;fica;on  of  an  alloca;on  registry  entry    
  • 42. Approaches to Validity •  The  awesome  power  of  Whois!   •  Entries  in  a  rou;ng  registry   •  Delega;on  of  reverse  DNS  zone   •  Cer;fica;on  of  an  alloca;on  registry  entry   All  of  these  approaches  rely  on  some  form  of  trusted  third   party  a7esta;on  to  provide  informa;on  about  the  address   The  creden;als  of  the  party  holding  the  address  are  not  well   described  in  the  first  two  approaches   For  reverse  DNS  it’s  the  delegated  zone  admin     For  cer;fica;on  it’s  the  holder  of  the  private  key  
  • 43. None of these Approaches are a Perfect Fit Route  Registries:   •  The  route  registry  model  relies  on  the  maintenance  of  a  trustable  registry  write   access  model.  Too  oien  this  access  model  becomes  a  Mail  From  access  or  user  /   password.  Efforts  to  move  to  keyed  access  and  user  certs  have  oien  foundered   on  user  resistance  to  cert  management  tools  in  user  systems   •  There  is  no  single  IRR,  but  many  IRRs  each  with  par;al  (and  some;mes   conflic;ng  data)  or  dubious  quality  and  uncertain  validity   •  The  Route  Registry  Object  access  model  is  variously  implemented   •  All  this  can  be  improved,  but  to  do  so  probably  requires  keys  (and  certs)  and   signed  objects   •  In  theory,  and  prac;ce,  this  can  work  for  a  diligent,  mutually  trus;ng   community  using  simple  origina;on  registry  objects   •  If  you  operate  a  network  high  in  the  interconnec;on  hierarchy,  then  the  large   ACL  filters  pose  a  scaling  issue  in  terms  of  router  config  /  state  bloat   •  The  opera;ng  overhead  of  maintaining  current  accurate  data  is  high  and  the   integrity  of  the  route  registry  contents  is  vulnerable  to  bad  actors  
  • 44. None of these Approaches are a Perfect Fit Popula;ng  Reverse  DNS:   •  The  reverse  DNS  model  does  not  cleanly  map  across  CIDR  delega;ons   –  It  can  be  coerced  to  do  so,  but  its  not  a  smooth  fit   •  The  approach  relies  on  integrity  of  zone  delega;on  and  management   •  Mapping  AS  numbers?   –  How  can  you  answer  “assemble  the  list  of  all  addresses  originated  by  an  AS”  if  all  you   have  in  the  reverse  DNS  is  address  -­‐>  AS  mapping   •  Integrity  of  cri;cal  informa;on  in  the  DNS  really  needs  DNSSEC   –  Which  in  turn  implies  private  key  management  tools  and  prac;ces  on  the  part  of   address  holders   •  Would  this  approach  be  a  case  of  overloading  the  DNS?  
  • 45. None of these Approaches are a Perfect Fit Number  PKI:   •  A  PKI  for  Addresses  and  AS  numbers  has  issues  has  its  own  issues   •  Key  /  Cert  management  for  a  new  PKI  requires  a  dedicated  tool  set   •  Familiarity  with  managing  keys  is  an  issue   •  Hardware  and  soiware  tools  for  use  in  this  PKI  tend  to  be  incomplete   and  expose  much  of  the  underlying  mechanics  of  the  crypto  system   •  Acceptance  by  operators  is  an  issue   •  Distribu;on  of  Cer;ficates  and  CRLs  uses  “just  in  case”  flooding  and   runs  into  a  novel  set  of  issues  of  distribu;on  and  synchroniza;on  of   rou;ng  informa;on  and  the  associated  creden;als  that  need  to  be  used   to  validate  the  rou;ng  informa;on    
  • 46. A Foundation for Routing Security A  PKI  for  addresses  and  ASNs  makes  a  lot  of  sense:  (*)     •  Use  digital  signatures  to  both  the  integrity,  the   authen;city  and  the  currency  of  the  signed  data.  This   allows  systems  to  automa;cally  validate  a7esta;ons     about  addresses  and  their  use   •  Digital  signatures  that  can  be  validated  in  this  PKI  can  be  used  to   sign:   –  Route  Registry  Entries   –  Route  Requests   –  BGP   * Yes, that’s a personal opinion!
  • 47. What about BGP? •  What  are  the  trade-­‐offs  in  adding  any  of  these   approaches  into  the  context  of  BGP?   –  How  a  BGP  speaker  can  be  assured  that  the  origina;on  of   the  route  is  valid?   –  And  that  the  AS  path  that  is  being  presented  is  an   authen;c  representa;on  of  a  viable  forwarding  path  to   the  address?  
  • 48. BGP Elements •  Origina;on   – Is  the  address  valid?   – Is  the  origina;on  of  this  route  a  duly  authorized   use  of  this  address?   •  Path   – Is  the  forwarding  path  represented  in  the  route  an   authen;c  path?   – If  I  pass  a  packet  into  this  path  will  it  get  to  its   intended  des;na;on?  
  • 49. BGP Origination (1) Managed  Filters   –  Filter  lookup  is  fast  within  the  router,  and  filter  construc;on  can  be   undertaken  by  a  trusted  off-­‐unit  subsystem,  using  an  incremental   difference  sync  protocol  to  keep  the  router  state  in  sync   –  Route  Registry  model  of  declaring  in  advance  what  addresses  you  may   adver;se  to  your  BGP  peers   •  The  peer  constructs  an  acceptance  filter  based  on  this  list   –  RPKI  ROA  model  of  declaring  in  advance  what  addresses  you  may   adver;se  to  your  BGP  peers   •  The  peer  constructs  an  acceptance  filter  based  on  this  list  
  • 50. A filter-based architecture for securing BGP origination eBGP   Router  BGP  Filter   (Origin  AS  +   prefix  mask)   Local  Route   Policy  Engine   DistribuCon  /   SynchronisaCon   Route  OriginaCon  InformaCon   (Route  Registries  or    RPKI  certs  and  ROAS)  
  • 51. BGP Origination (2) Update  Filtering   –  Update  filtering  allows  the  creden;al  informa;on  to  be  passed  with   the  data,  allowing  for  “just  in  ;me”  delivery  of  creden;als  and   informa;on   –  Can  be  undertaken  on-­‐board,  or  outsourced  to  update  filtering  BGP   route  server(s)  within  each  AS   –  RKPI  ROA  a7ached  to  the  update  as  an  opaque  transi;ve  a7ribute?   •  BGP  bloat?   •  Digital  signatures  plus  PKI  Certs  can  add  significant  size  to  updates  and   processing  load  to  routers  (as  in  a  BGP  peer  session  reset)   –  Or  perform  a  Reverse  DNS  lookup   •  Validate  origina;ng  AS  through  a  DNS  query  of  the  prefix  
  • 52. A update-based architecture for securing BGP origination eBGP   Router   BGP   Update   Origin  AS   Address   AS  Path   Origina;on   Creden;als   Local  Trust  Material   Origina;on   Creden;als   Origin  AS   Address   + Local  ValidaCon   FuncCon   Y/N  
  • 53. Path Validation Origina;on  valida;on  reduces  the  a7ack  surface,  but   an  a7acker  can  s;ll  inject  bogus  routes  as  long  as  it   synthesizes  the  specified  origina;ng  AS  in  the  bogus   route  entry   So  while  origina;on  protec;on  is  a  good  ini;al  step,  it   is  just  an  ini;al  step  and  by  itself  its  not  a  completely   adequate  approach  to  rou;ng  security   But  how  far  (and  at  what  cost)  should  we  go  to  secure   AS  Paths?  
  • 54. option a: Route Registries and RPSL •  Using  RPSL  and  various  forms  of  export  and  import   a7esta;ons  in  a  route  registry  it  is  feasible  to  construct  AS   Path  filters  that  allow  a  BGP  speaker  to  filter  out  implausible   AS  Paths  from  incoming  updates   •  In  prac;ce  RPSL  never  gained  widespread  acceptance.  Some   communi;es  worked  hard  to  promulgate  its  use,  but  overall  it   was  unable  to  achieve  widespread  adop;on  and  the  effort  /   benefit  equa;on  was  unsustainable   •  RPSL  path  filters  can  filter  out  what’s  implausible    
  • 55. option b: AS Adjacency and soBGP •  A  similar  approach  was  described  in  soBGP,  where  a  pair  of   adjacent  ASs  would  publish  and  propagate  a  signed  AS   Adjacency  A7esta;on     •  If  a  BGP  speaker  receives  a  AS  Path  it  can  break  the  path  into   a  sequence  of  AS  adjacency  pairs  and  determine  if  the  AS   Path  represents  a  plausible  transit  path  through  the  network   •  This  plausibility  test  can  be  performed  through  a  filter   opera;on  performed  on  received  updates,  either  on-­‐board  or   off-­‐loaded  
  • 56. option c: AS Path Validation and BGPsec •  BGPsec  proposes  a  stricter  form  of  AS  Path  valida;on  where   each  eBGP  speaker  uses  its  own  digital  key  to  sign  across  the   path  and  the  AS  to  whom  the  update  is  being  sent   •  It  is  not  possible  for  a  third  party  to  construct  a  bogus  route  in   this  scenario  unless  it  gains  access  to  keys   •  But  this  sequence  of  interlocking  signatures  implies:   –  BGPsec  routers  are  required  to  unchain  the  signature  set  and  match  it   to  the  AS  Path  in  the  update,  using  the  local  RPKI  cache  to  validate  the   router  signatures   –  BGP  bloat  in  carrying  interlocking  signatures   –  a  high  crypto  processing  overhead  in  processing  updates   –  no  useful  valida;on  in  cases  of  piecemeal  adop;on  of  BGPsec  
  • 57. Concerns A  major  issue  here  is  that  of  par1al  use  and  deployment   –  This  security  mechanism  has  to  cope  with  par;al  deployment  in   the  rou;ng  system   •  The  basic  conven;onal  approach  of  “what  is  not  cer;fied  and  proved  as  good   must  be  bad”  will  not  work  in  a  par;al  deployment  scenario   –  In  BGP  we  need  to  think  about  both  origina;on  and  the  AS  Path   of  a  route  object  in  a  par;al  deployed  environment   •  AS  path  valida;on  is  challenging  indeed  in  an  environment  of  piecemeal  use  of   secure  creden;als,  as  the  mechanism  cannot  tunnel  from  one  BGPsec  “island”  to   the  next  “island”   –  A  par;ally  secured  environment  may  incur  a  combina;on  of   high  incremental  cost  with  only  marginal  net  benefit  to  those   deploying  BGPsec  
  • 58. Concerns Is  a  trust  hierarchy  the  best  approach  to  use?   –  The  concern  here  is  concentra(on  of  vulnerability   If  valida;on  of  rou;ng  informa;on  is  dependent  on  the  availability   and  validity  of  a  single  root  trust  anchor  then  what  happens  when   this  single  digital  ar;fact  is  a7acked?   –  But  is  there  a  viable  alterna;ve  approach?   Can  you  successfully  incorporate  robust  diversity  of  authen;ca;on   of  security  creden;als  into  a  supposedly  highly  resilient  secure  trust   framework?   This  is  a  very  challenging  ques;on  about  the  nature  of   trust  in  a  diverse  networked  environment!  
  • 59. Concerns Is  cer;fica;on  the  only  way  to  achieve  useful  outcomes  in   securing  rou;ng?   –  Is  this  form  of  augmenta;on  to  BGP  to  enforce  “protocol  payload   correctness”  over-­‐engineered,  and  does  it  rely  on  imprac;cal  models   of  universal  adop;on?   –  Can  various  forms  of  rouCng  anomaly  detectors  adequately  detect  the   most  prevalent  forms  of  typos  and  deliberate  lies  in  rou;ng  with  a  far   lower  overhead,  and  allow  for  unilateral  detec;on  of  rou;ng   anomalies?   –  Or  are  such  anomaly  detectors  yet  another  instance  of  “cheap  security   pantomime”  that  offer  a  thinly  veiled  placebo  of  apparent  security   that  is  easily  circumvented  or  fooled  by  determined  malicious  a7ack?  
  • 60. What are we trying to do? Is  securing  the  rou;ng  system  alone  actually  enough?   –  Can  you  validate  the  “correctness”  of  the  forwarding  paths  being  proposed  by   a  rou;ng  system?   •  Is  secure  rou;ng  helpful  in  and  of  itself?   •  Or  this  this  just  pushing  the  vulnerability  set  to  a  different  point  in  the  network   integrity  space?   •  Does  this  adequately  reduce  the  level  of  exposure  to  a7ack?   •  Is  BGP  too  incomplete  in  terms  of  its  informa;on  distribu;on  proper;es  to  allow   robust  valida;on  of  the  intended  forwarding  state?   If  not,  then  is  this  a  case  of  too  high  a  cost  or  too  low  a  benefit?   –  Is  this  a  case  of  reducing  the  security  creden;al  genera;on  and  valida;on   workload  by  reducing  the  security  outcomes  through  reduced  trust  and/or   reduced  amount  of  validated  informa;on   –  Or  is  this  a  case  of  increasing  the  level  of  assurance  and  the  amount  of  rou;ng   informa;on  secured  by  these  mechanisms  
  • 61. What are we trying to do? Is  Par;al  Deployment  of  any  value?   –  Are  the  seman;cs  of  rou;ng  security  and  incomplete  creden;als   compa;ble  concepts?   •  Can  you  deploy  high  integrity  security  using  par;al  deployment  scenarios?   •  The  issue  here  is  that  creden;als  can  assure  a  recipient  that  the  informa;on  that   they  receive  are  authen;c.  They  can  mark  what’s  “good”.  But  the  aim  of  the   exercise  is  to  iden;fy  what’s  “bad”.     •  In  a  scenario  of  comprehensive  deployment,  then  the  inability  to  determine  “good”   implies  “bad”   •  In  par;al  deployment  scenarios  the  inability  to  determine  “good”  means…?  
  • 62. Good, Fast, or Cheap? Pick one! We  just  can’t  make  secure  rou;ng  mechanisms   cheaper,  faster,  more  robust,  and  more  effec;ve  than   exis;ng  rou;ng  tools  …   –  We  can  make  it  robust,  but  it  won’t  be  cheap,  and   probably  not  fast!   –  We  can  make  it  fast,  but  it  won’t  be  robust  and  it  won’t  be   cheap!   –  We  can  make  it  cheap,  but  it  won’t  be  completely  robust!    
  • 63. Good, Fast, or Cheap? Pick one! We  just  can’t  make  secure  rou;ng  mechanisms   cheaper,  faster,  more  robust,  and  more  effec;ve  than   exis;ng  rou;ng  tools  …   –  We  can  make  it  robust,  but  it  won’t  be  cheap,  and   probably  not  fast!   –  We  can  make  it  fast,  but  it  won’t  be  robust  and  it  won’t  be   cheap!   –  We  can  make  it  cheap,  but  it  won’t  be  completely  robust!     So where should we compromise in the design of a secure routing infrastructure?      
  • 64. Caution: Opinions! My  personal  view  of  design  compromise:   –  Improve  the  robustness  of  RPKI  certs  by  altering  the  cert  valida;on  algorithm   –  Place  origina;on  signatures,  ROAs  and  certs  into  the  BGP  protocol  updates  as  opaque   a7ributes   –  Use  AS  Adjacency  a7esta;ons  in  preference  to  a  fully  signed  path   –  Place  AS  Adjacency  a7esta;ons  into  BGP  protocol  updates  as  opaque  a7ributes   –  Exploit  the  use  of  TCP  in  BGP  to  never  resend  already  sent  certs   –  Fla7en  parts  of  the  CA  hierarchy  by  using  RAs  rather  than  CA  delega;ons   –  Reduce  OOB  creden;al  distribu;on  to  TA  material   •  For  which  you  can  use  the  DNS  and  DNSSEC  if  you  really  want!   Like  all  the  other  approaches,  this  represents  a  parCcular  set  of  compromises   about  speed,  complexity,  cost,  deployment  characterisCcs  and  robustness  –  it  has   it’s  weaknesses  in  terms  of  comprehensive  robustness,  but  it  aQempts  to  reduce   the  number  of  disCnct  moving  parts