Title: Availability Centric Routing ACR
1Availability Centric Routing (ACR)
- Robust Interdomain Routing Without BGP Security
- July 25th, 2006
2Current Routing Security Focus
-
- Current proposals like S-BGP, etc. use
cryptography to provide control plane - origin authentication
- path validity
3Too Much and Too Little?
- These proposals are
- Heavy-weight requiring modifications to routers,
continually updated address registries, increased
BGP complexity. - Insufficient providing no protection from
malicious routers in the data-plane or links made
unusable by congestion or bad route convergence.
4A Different Approach
- Today end-hosts/edge routers often already
provide end-to-end security using mechanisms such
as SSL or IPSec. - With end-to-end security, we claim that
- The routing infrastructure only has to worry
about providing availability, i.e. the ability to
find and use a valid path if it exists.
5High-level Approach
- Clients learn multiple potential paths to a
destination, instead of a single best path. - Clients use end-to-end security mechanisms and
monitor path performance to detect good paths. - Clients can use adequate paths and change routes
if necessary.
6Taxonomy of Attacks
- Snooping Traffic Modification
- Traffic Analysis
- Destination Impersonation
- Spam Sources (unused space hijack)
- Black-holing Traffic
- Traffic Degradation
Lets think about whether the routing system
should handle them.
7Attack Data Confidentiality Integrity
- Where Data Control Plane
- A secure control plane could make it harder for
an attacker to get on path, but data-plane
adversaries can access traffic. - Verdict Use end-to-end encryption MACs, rather
than rely on routing protocol.
8Attack Traffic Analysis
- Where Data Control Plane
- Again, secure control plane makes attack more
difficult, but providing real guarantees at the
network layer is extremely difficult or even
impossible (data worm-hole attack). - Verdict Use mix-nets or other end-to-end
mechanisms if needed, as Internet routing cannot
provide an guarantees.
9Attack Destination Impersonation
- Where Data Control Plane
- Problems with data-plane attacker (local or
router) or DNS compromise means that even with
secure control plane identity is not certain. - Difficulty in having ISPs create and update
address registry. - Verdict End-to-End certificates or other
authentication are still needed, and obviate
requirement for identity in control plane (still
useful as an optimization though).
10Attack Spam Sources (unused hijack)
- Where Control Plane
- Spam is really caused by incentives and identity
problems within higher-level systems (e.g.
email), which would exist even with secure
routing. The real cost of this vulnerability
is minimal. - Verdict While authenticated address ownership
may be desirable, it is not a requirement for
reliable communication.
11Attack Black-holing Traffic
- Where Data Control Plane
- The ability to completely prevent communication,
particularly when another valid path exists, is
the key threat to a routing protocol. - Verdict Yes, this is central to routing.
12Attack Traffic Degradation / DoS
- Where Data Plane, remote hosts
- Paths can be rendered unusable for an
application even if they are not completely
unavailable according to the control plane.
- Verdict Yes, a routing protocol should allow
destinations to avoid such links.
13Defense Taxonomy Control Plane
Note Whisper only detects attacks, and only at a
limited number of ASes.
14Defense Taxonomy Data Plane
15What should routing security achieve?
- Its very hard to get guarantees about the
identity of the path of data-flow. - Furthermore, why would we care?
- If applications already use e2e security to
handle these risks. As a result, they care about
path quality, not path identity.
16Availability Centric Routing
- Goals
- 1)Communication in the face of control plane,
data plane, and link-DoS attacks. - 2)Incentivized deployment and low barriers to
adoption. - 3)No requirements for globally coordinated
adoption.
17What is done end-to-end?
- Assume
- 1)Confidentiality, integrity and destination
identity are handled end-to-end, e.g. SSL/IPSec. - 2) Path quality monitoring, to decide when to
change paths.
18Packet Deflections
- ISPs offer users alternate paths (deflections)
in addition to the normal path advertised via BGP.
D
A,B,C,D,F is normal BGP path for A -gt F. To
avoid D, A could request that C deflects packets
to E, yielding path A,B,C,E,F
A
B
C
F
E
19Availability Providers
- Most path diversity comes from the densely
connected tier-1 ISPs. - To simplify, what if just these ASes acted as
availability providers (APs) to offer
deflections?
20ACR Overview
- Source attempts to set-up a secure channel using
default path. - If set-up fails, it can request alternate paths
from its AP, probing until it finds a working
path. - Sources monitor path performance, requesting
alternate paths if the current path is
inadequate.
21Threats Against ACR with APs
- Deployment gaps between AP and source or
destination create attack opportunities. - Large number of invalid paths from AP makes
probing time unrealistic. - Path performance attacks
22Attacks Exploiting Deployment Gaps
- If a provider ISP is duped, it is possible that
a stub AS will not be reachable by any path seen
by the AP.
A
If U does not offer deflections, a malicious AS M
could fool U by announce Ds prefix, making it
completely unreachable by the availability
provider A.
U
D
M
23Handling Deployment Gaps
- Dests Business preferences help destinations
(only fellow customers can attack). - Sources Paths to a limited number of core APs
are easy to manage. - Local filtering can provide significant benefit.
As can identifying expected links based on
well-known core topology.
24Attacking Probing Efficiency
- With BGP, each malicious AS can introduce one bad
path to its neighbors. - Total of paths limited by an ASs of
neighbors, (more likely peers providers). - Claim
- It is non-trivial to introduce many attractive
paths quickly, especially without getting noticed.
25More Efficient Probing
- Base Shortest AS-Path
- Anomaly Detection
- Most paths are stable, keep with what has worked
(e.g. PGBGP). - Destination Hints
- Let destination sign distribute hints about
its upstream connectivity. Forces attacker paths
to be longer.
26Monitoring for Path Performance Attacks
- Data serves as probes to avoid preferential
treatments of probe packets. - Tricky Attack
- Malicious AS makes path appear valid, then
black-holes or degrades performance.
27Path Performance Monitoring
- Solutions
- Have traffic that is robust to hiccups (e.g.
non-realtime) - Duplicate traffic over paths that are likely to
be trust disjoint - Use smart probing techniques to help avoid bad
control plane paths.
28Deployability
- No requirement for address registries,
cryptographic hardware, ICANN-based PKI, or new
routing software. - Deflections can be implemented using IP-in-IP
encapsulation and MPLS over IP, which already
exists in routers today. - Deflections also improve performance.
29Dirty Laundry
- CIDR and sub-prefix hijacks
- (Answer Use /24s, which approximates flat
routing) - Datagram communication
- (Answer either run over long-term secure
channel, or have data be the identifier, ala
DNSSEC)
30ACR Summary
- Secure interdomain routing proposals are
heavy-weight, but still insufficient. - If end-points set up secure channels, the
routing infrastructure must only provide multiple
paths to guarantee availability. - This approach has highly attractive properties
for incentivized deployment