1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

18
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston

description

3 What is a hijack signature? What address blocks would not be noticed if they were used for a short period? −Has been unadvertised for a ‘long time’ −Is used only for a ‘short time’ −Uses an entirely different origin AS and first hop AS −Is not covered by an aggregate announcement idle interval Reannouncement interval

Transcript of 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

Page 1: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

1

Auto-Detecting Hijacked Prefixes?

Routing SIG 7 Sep 2005

APNIC20, Hanoi, Vietnam

Geoff Huston

Page 2: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

2

Address hijacking• unauthorized use of an address prefix as an

advertised route object on the Internet−Not a bogon

• address block has been assigned by an RIR for use

−May include identity fraud• may involve misrepresentation of identity in order to

undertake a database change

−Commonly associated with identity cloaking• Spam generation, attack launching platforms, etc

• How prevalent is this?−Very hard to isolate hijacking incidents

Page 3: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

3

What is a hijack signature?• What address blocks would not be noticed if

they were used for a short period?−Has been unadvertised for a ‘long time’−Is used only for a ‘short time’−Uses an entirely different origin AS and first hop AS−Is not covered by an aggregate announcement

idle interval

Reannouncement interval

Page 4: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

4

Data collections• Aggregated BGP route collection data• Can provide information for any prefix:

−When was this prefix advertised and withdrawn?−What was the announcing AS?−What was the first hop AS?−What other prefixes were also advertised at the same time?

Page 5: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

5

Noise reduction in BGP data• BGP update logs are possibly unhelpful

here−High frequency noise of BGP convergence is different from the longer frequency signal of prefix use through network connectivity and prefix advertisement

• Use successive static BGP snapshots−Highest frequency component of 2 hours reduces protocol-induced noise levels in the data

Page 6: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

6

Initial results• Readvertisement of prefixes with different

Origin AS and First Hop AS

Dormant Interval (Months)

0

1000

2000

3000

4000

5000

6000

7000

1 7 13 19 25 31 37 43 49 55 61 67 73

Months

Number of Prefixes

Page 7: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

7

2nd Pass• Very short window announce

> 2 months down, < 3 days up, > 1 month down

Prefix Dormant Time (Months)

0

1000

2000

3000

4000

5000

6000

7000

0 12 24 36 48 60 72

Months

Prefixes

No Window

Short Window

Page 8: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

8

3rd Pass• Short window

> 2 months down, 5 - 14 days up, > 1 month down

Prefix Dormant Period (Months)

0

50

100

150

200

250

0 10 20 30 40 50 60 70 80

Months

Series1Series2

Series3

Page 9: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

9

Some comments• Address announcement patterns do not appear to be a

reliable hijack indicator in isolation. −There is no clear signature in the patterns of prefix appearance

that forms a reliable indicator of misuse.

• Address use profiles can assist in the process of identifying address hijacking for suspect prefixes. −Additional information is necessary to reliably identify candidate

hijack prefixes.

• Careful checking of the provenance of an address before accepting it into the routing system make good sense−But thorough checks of a prefix’s history of use as a

precondition to accepting it into the local routing session as a valid advertisement consume time and increase an ISPs’ operating overhead costs

Page 10: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

10

It’s not a very reassuring answer.

Page 11: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

11

Address and Routing SecurityThe basic routing payload security questions that need to be answered are:

−Is this a valid address prefix?

−Who injected this address prefix into the network?

−Did they have the necessary credentials to inject this address prefix?

−Is the forwarding path to reach this address prefix an acceptable representation of the network’s forwarding state?

Page 12: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

12

Address and Routing Security

What we have today is a relatively insecure system that is vulnerable to various forms of deliberate disruption and subversion

Address hijacking is just one aspect of the insecurity of the Internet’s routing system

Page 13: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

13

What I really would like to see…

The use of a public key infrastructure to support attestations that allow automated validation of:

−the authenticity of the address object being advertised

−authenticity of the origin AS

−the explicit authority given from the address to AS that permits a routing announcement

Page 14: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

14

What would also be good…• If the attestation referred to the address

allocation path−use of an RIR issued certificate to validate the

attestation signature chain

• If the attestation was associated with the route advertisement−Such attestations to be carried in BGP as an Update

attribute

• If validation these attestations was treated as a route object preference indicator−Attestation validation to be a part of the BGP route

acceptance process

Page 15: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

15

But…We are nowhere near where we need to

be:−We need more than “good router housekeeping” – it’s trusting the protocol payload as well as trusting the protocol’s operation and the routing engines

−We need so much more than piecemeal distributed 2nd hand bogon and martian lists, filters and heuristics about use patterns for guessing at ‘bad’ addresses and ‘bad’ routes

Page 16: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

16

We adopt some basic security functions into the Internet’s routing domain:

• Injection of reliable trustable data– Address and AS certificate PKI as the base of validation

of network data

• Explicit verifiable mechanisms for integrity of data distribution

– Adoption of some form of certification mechanism to support validation of distributed address and routing information

What I’d like to see...

Page 17: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

17

Oh yes, and about address hijacking…

• This type of resource security framework would make address hijacking much harder to perform!

Page 18: 1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.

18

Thank You