Internet Infrastructure Security

30
4/27/2004 1 Internet Infrastructure Security Internet Infrastructure Security Simon Fraser University Scott Wakelin

Transcript of Internet Infrastructure Security

Page 1: Internet Infrastructure Security

4/27/2004 1

Internet Infrastructure SecurityInternet Infrastructure Security

Simon Fraser UniversityScott Wakelin

Page 2: Internet Infrastructure Security

4/27/2004 2

Road MapRoad Map

Project Goals and OverviewProject StatusNetwork Infrastructure– ISP Topology– ISP Interconnection

Routing ProtocolsRouting Protocol Security IssuesExample Case: OSPFFuture WorkReferences

Page 3: Internet Infrastructure Security

4/27/2004 3

Project GoalsProject Goals

Understand Internet Infrastructure and typical topologyUnderstand routing protocolsUnderstand attacks against Internet InfrastructureDemonstrate weaknesses of routing protocols using OPNET and NS-2.

Page 4: Internet Infrastructure Security

4/27/2004 4

Is it important?Is it important?

“Our very way of life depends on the secure and safe operations of critical systems that depend on cyberspace”

- Richard Clarke, Former US Homeland Security Advisor on Cyberterrorism

Page 5: Internet Infrastructure Security

4/27/2004 5

Current StatusCurrent StatusCompleted:– Implemented OSPF network using OPNET– Created “misbehaving” router scenario in OPNET– Used FlowAnalysis to analyze routing tables, in addition to link

and host statistics– Examined internal implementation of OSPF process module,

function blocks, identified potential code changes– Built NS model to simulate link cutting attacks

Work Remaining:– Determine feasibility of modifying OPNET to support “faulty”

router operation (eg. I know what to do, but can it be done?)– Gather additional traffic statistics– Code link selection/cutting algorithm in Tcl for NS-2– Demo, and Final Report

Page 6: Internet Infrastructure Security

4/27/2004 6

Internet InfrastructureInternet Infrastructure

“Network of Networks”Subscriber networks connect to ISP POP’sISP POP’s interconnected via IP backbone routersISP’s interconnected IXP (eg. MAE-WEST)

ISP = Internet Service ProviderPOP = Point of PresenceIXP = Internet Exchange Point

Page 7: Internet Infrastructure Security

4/27/2004 7

Subscriber to ISP NetworkSubscriber to ISP Network

ADM

OC-48OC-48

GE

DS3

OC-3

OC-12Metro SONET Ring

OC-192/STM64Network

A

NetworkB

NetworkC

Page 8: Internet Infrastructure Security

4/27/2004 8

Typical POP ArchitectureTypical POP Architecture

R b 0

R a 0 R a 1 R a 2 R a 3

R b 1

T o S u b s c rib e rs

T o "B a c k b o n e "

Page 9: Internet Infrastructure Security

4/27/2004 9

ISP POP InterconnectISP POP Interconnect

Ab0

Aa0 Aa1 Aa2 Aa3

Ab1

Seattle POP

Sb1

Sa0 Sa1 Sa2 Sa3

Sb0

Chicago POP

Cb1

Ca0 Ca1 Ca2 Ca3

Cb0

Portland POP

Lb0

La0 La1 La2 La3

Lb1

San Jose POP

End User A

End User B End User C

Page 10: Internet Infrastructure Security

4/27/2004 10

Interconnecting ISPInterconnecting ISP’’ss

Ab0

Aa0 Aa1 Aa2 Aa3

Ab1

ISP A POP

Sb1

Sa0 Sa1 Sa2 Sa3

Sb0

ISP B POP

Cb1

Ca0 Ca1 Ca2 Ca3

Cb0

ISP C POP

Lb0

La0 La1 La2 La3

Lb1

ISP D POP

to otherPOP's

to otherPOP's

to otherPOP'sto otherPOP's

Internet ExchangePoint (IXP)

Page 11: Internet Infrastructure Security

4/27/2004 11

Routing Protocols: OSPFRouting Protocols: OSPFOSPF is defined in RCF 2328Link State Routing protocolIntra-domain protocolOSPF Phases:– Neighbor Discovery– LSA Generation– LSA Propagation– Shortest Path Calculation

OSPF runs over IPOSPF: Open Shorted Path FirstLSA: Link State Advertisement

Page 12: Internet Infrastructure Security

4/27/2004 12

OSPF Packet HeaderOSPF Packet Header

VersionPacket Type

Packet LengthRouter IDArea ID

ChecksumAuthentication TypeAuthentication Data

Octets1

1

2

4

4

2

2

8

Page 13: Internet Infrastructure Security

4/27/2004 13

Routing Protocols: BGPRouting Protocols: BGP--44

BGP-4 is defined in RFC 1771Path-Vector algorithmInter-domain protocolBGP Phases:– Opening a BGP Connection– Exchange of routing tables– Maintenance of the connection

BGP Runs over TCP

BGP: Border Gateway Protocol

Page 14: Internet Infrastructure Security

4/27/2004 14

OSPF/BGP OSPF/BGP InterworkingInterworking

OSPF and BGP work alongside each other in a routerRouter maintain two route tables, one internal, one externalRouter uses BGP next-hop to index into OSPF table

Page 15: Internet Infrastructure Security

4/27/2004 15

Routing Protocol SecurityRouting Protocol Security

….or lack thereof…Implicit trust relationship amongst routersAttacks can be devastating:– Service disruption– Loss of confidentiality

And difficult to detect– How does one router know another is lying?

Page 16: Internet Infrastructure Security

4/27/2004 16

OSPF ExampleOSPF Example

One router can lie and advertise incorrect costsThe lying router then becomes the part of the preferred route to some other router (perhaps gateway)The lying router can then do just about anything it wants with the traffic

Page 17: Internet Infrastructure Security

4/27/2004 17

Example Topology using Example Topology using OPNETOPNET

•Assume gateway1 has sensitive data to send to gateway2•Assume all link costs equal•Normal route:

•G1 -> R1 -> R2 -> G2

Page 18: Internet Infrastructure Security

4/27/2004 18

But what ifBut what if……

Router 3 lies?Routers 1, 2 and the gateway routers don’t know that Router 3 is lying.They assume that what Router 3 advertises is correct

Page 19: Internet Infrastructure Security

4/27/2004 19

OSPF Failure CaseOSPF Failure CaseNow all traffic from G1 -> G2 goes through Router 3New Route:– G1 -> R1 -> R3 ->

R2 -> G2Possible results:– Snooping– Packet

mistreatment– Congestion– ???

Page 20: Internet Infrastructure Security

4/27/2004 20

But what about OSPF Auth?But what about OSPF Auth?

Authentication field in OSPF only provides assurance that Router 3 sent the messageAuthentication field DOES NOT mean that the information is correct

Page 21: Internet Infrastructure Security

4/27/2004 21

SS--OSPF: A Solution?OSPF: A Solution?

One solution is to have each router digitally sign/authenticate each LSAProblems:– Computationally expensive– Requires PKI for certification– Others

Still not a complete solution– Link Cutting

Page 22: Internet Infrastructure Security

4/27/2004 22

Link CuttingLink CuttingTargetting specific hosts/links and bringing them downHow? – Fibre cuts (for the serious attacker)– DDoS attacks– Others…

Idea: Force traffic to go through a node/link controlled by an attackerRequires some knowledge of the network topology:– Not so hard to obtain…See Rocketfuel research.

Bellovin et al. developed algorithm to select which links to cut.

Page 23: Internet Infrastructure Security

4/27/2004 23

Link CuttingLink Cutting……cont.cont.

Traceroute can provide a lot of information:

Tracing route to www.sprint.net [199.0.233.22]over a maximum of 30 hops:

1 20 ms 30 ms 20 ms 209.53.1.2262 20 ms 30 ms 20 ms 208.181.229.1183 20 ms 30 ms 20 ms vancbc01gr01.bb.telus.com [154.11.4.97]4 30 ms 30 ms 30 ms vancbc01br01.bb.telus.com [154.11.10.49]5 20 ms 30 ms 30 ms sttlwa01gr01.bb.telus.com [209.53.75.166]6 20 ms 30 ms 30 ms sl-gw14-sea-10-0.sprintlink.net [144.224.23.33]7 20 ms 30 ms 30 ms sl-bb21-sea-9-1.sprintlink.net [144.232.6.133]8 70 ms 70 ms 70 ms sl-bb25-chi-2-0.sprintlink.net [144.232.20.157]9 70 ms 71 ms 70 ms sl-bb23-chi-15-0.sprintlink.net [144.232.26.93]

10 90 ms 90 ms 90 ms sl-bb27-rly-11-0.sprintlink.net [144.232.20.185]11 90 ms 90 ms * sl-bb22-rly-10-0.sprintlink.net [144.232.14.177]

Page 24: Internet Infrastructure Security

4/27/2004 24

Link Cutting Example: NSLink Cutting Example: NS--22

Network built using ISP topology shown on pg. 7.Attacker wants to see traffic flowing between Node 27 and 25Assume attacker has control of backbone router 4Normal path:– Nodes 27 -> 18 -> 23 -> 10 -> 6 -> 25

Page 25: Internet Infrastructure Security

4/27/2004 25

Normal Case: NSNormal Case: NS--22

Page 26: Internet Infrastructure Security

4/27/2004 26

Link Cutting AttackLink Cutting Attack

Attack Links 23-10, 22-17 Causes traffic to flow through backbone router 4New route:– 27, 18, 23, 5, 4, 11, 6, 25

Page 27: Internet Infrastructure Security

4/27/2004 27

Link Cutting Attack, cont.Link Cutting Attack, cont.

Page 28: Internet Infrastructure Security

4/27/2004 28

Future WorkFuture Work

Implement S-BGP– IBGP, EBGP peers communicate using

IPSec– Each router cryptographically signs its

advertisementsImplement S-OSPFAre the solutions scalable?What other pitfalls exist?

Page 29: Internet Infrastructure Security

4/27/2004 29

ReferencesReferences[1] J. Moy, “OSPF Version 2”, RFC 2328, April 1998.[2] Y. Rekhter and P. Gross, “Application of the Border Gateway Protocol in the Internet”, RFC 1772, March 1995.[3] C. Metz, “Interconnecting ISP Networks”, IEEE Internet Computing, vol. 5, no. 2, March-April 2001, pp 74-80.[4] S. Kent, C. Lynn, and K. Seo, “Secure Border Gateway Protocol (S-BGP)”, IEEE Journal on Selected Areas in Communications, vol. 18, no. 4, April 2000. pp. 582-592.[5] S. Kent, C. Lynn, and K. Seo, “Public-key infrastructure for the Secure Border Gateway Protocol (S-BGP)”, Proc. Darpa Information Survivability Conference and Exposition II, vol. 1, June 2001, pp. 239-252.[6] S. Kent, C. Lynn, and K. Seo, “Design and analysis of the Secure Border Gateway Protocol (S-BGP)”, Proc. Darpa Information Survivability Conference and Exposition II, vol. 1, Jan. 2000, pp 18-33.[7] H. Papadimitratos, “Securing the Routing Infrastructure”, IEEE Communications Magazine, vol. 40, no. 10, Oct. 2002, pp. 60-68.[8] A. Chakrabarti, and G. Manimaran, “Internet Infrastructure Security: A Taxonomy”, IEEE Network, vol. 16, no. 6, Nov.-Dec. 2002, pp. 13-21.[9] S. M. Bellovin, and E. R. Gansner, “Using Link Cuts to Attack Internet Routing”, DRAFT, May 2003.[10] Rocketfuel, http://www.cs.washington.edu/research/networking/rocketfuel/[11] Marc Greis’ Tutorial for the UCB/LBNL/VINT Network Simulator “ns”, http://www.isi.edu/nsnam/ns/tutorial/index.html

Page 30: Internet Infrastructure Security

4/27/2004 30

Questions?Questions?