MPLS-based Traffic Shunt...Nicolas FISCHBACH [[email protected]] Senior Manager - IP...

19
MPLS-based traffic shunt Nicolas FISCHBACH [[email protected]] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003

Transcript of MPLS-based Traffic Shunt...Nicolas FISCHBACH [[email protected]] Senior Manager - IP...

Page 1: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

MPLS-based traffic shunt

Nicolas FISCHBACH [[email protected]]Senior Manager - IP Engineering/SecurityRIPE46 - Sept. 2003

Page 2: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

Contributors

§ COLT Telecom– Andreas Friedrich– Marc Binderberger

§ Riverhead Networks– Yehuda Afek– Anat Bremler-Barr– Boaz Elgar– Roi Hermoni

§ Cisco Systems– Roy Brooks– Paul Quinn

Page 3: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

Agenda

§ DDoS Protection

§ Deployed mitigation methods

§ MPLS-based traffic shunt

§ Conclusion

§ Securing the infrastructure ?– To be discussed at the nsp-sec BoF Tuesday evening !

Page 4: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

Distributed Denial of Service Protection

§ Data-center vs infrastructure approach§ Why strict filtering isn’t (always) the answer

– usually means the attacker “won”– some traffic can’t be filtered at the router level

– layer 4+– traffic requiring *real* state information (not only “bit is

set)– after “everything on top of IP” the trend is “everything

on top of HTTP”… wanna filter 80/tcp ? ;-)– is your network’s physical and logical structure enabling

you to filter at the Edge and not in the Core ?– you are tired of arguing with your network architecture

team (“we are here to transport packets” vs “the Internetfirewall” ;-)

Page 5: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

Deployed mitigation methods

§ What do/should SPs support/do ?– (propagated) blackholing– (de-aggregate and) stop to announce - bad practice ?

[dampening, BGP table size, filters, etc.]– sinkholes– rate-limiting– ACLs

– iACLs (infrastructure)– tACLs (transit)

– re-coloring

Page 6: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

Sinkhole

61.1.1.1

Announce: 61.1.1.1 -> Sinkhole

Sinkholeserver

Page 7: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

Traffic Shunt

61.1.1.1

Inspectiondevice

“Good”traffic

“Bad”traffic

Page 8: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

Sinkhole vs Shunt

§ Sinkhole– Uni-directional

– Data in, no data out

– IP based

– Blackholing traffic,forensics

– [CenterTrack,NANOG17]

§ Shunt– Bi-directional

– Data in, processedand data out

– Tunnels: GRE, MPLS,L2TPv3, etc.

– DDoS cleaning, reserveproxy, traffic analysis

– [Bellwether, NANOG19]

Page 9: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

IP-based Traffic Shunt

§ Tunnels examples– From the peering/upstream routers to the inspection

device– From the inspection device to the CPE/end-system– A mix/combination of both

§ Limitations– Careful setup required to avoid loops– Returned traffic must not pass through a peering router– Cisco GSRs and Juniper require a dedicated interface

card to act as a tunnel server (GRE/IPIP)– Processing overhead

Page 10: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

MPLS-based Traffic Shunt

§ Advantages– Doesn’t require a special/dedicated interface card– No extra HW load or SW (IOS 12.0(17)ST+ and JunOS

5.4+)– If your network is MPLS-enabled, operations knowledge

should be there: no need for the network to be MPLS-only!“Normal” routed IPv4 traffic can be carried in parallel

– Minimal (initial) static configuration with dynamic LSPs(iBGP triggered)

– Low (zero ?) overhead [did someone just say “why notuse Policy Based Routing” ? ;-]

– A MPLS-speaking inspection device isn’t required (option)

Page 11: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

MPLS-based Traffic Shunt

§ Advantages (cont.)– Enables you to overcome the “this device is in-line only”

and “you need one inspection device perpeering/upstream)” limitations: profile traffic and (potential)victims, select key POPs/IXes and deploy there

– Not on the critical path and quite scalable– LDP only carries the loopback address of the inspection

device

§ Caveats– You may carry the traffic through the backbone

(depending on how distributed your deployment is)– Latency: a few more ms (extra hops/distance)– Peering Router that also acts as an Access Router

(unless you (can) use more specific routes)

Page 12: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

MPLS-based Traffic Shunt

§ Two methods– Pure MPLS using Proxy Egress LSP (*)

– Penultimate hop popping– RFC 3031

– MPLS VPNs using VRFs– see: http://www.nanog.org/mtg-0306/afek.html

[NANOG28]

Page 13: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

MPLS LSPs based on loopbacks

61.1.1.1

LSPs

Inspectiondevice

Page 14: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

4

In OutMPLS Table

(6, 3 )(5, 42)

In OutMPLS Table

(5, 25 )(2, 3)

In OutMPLS Table

(2, untagged)(4, 25)

IP42IP 3IP 25IP

IP

In OutMPLS Table

(2, 42)IP: a Loop back

2 2 565 2

IP:a

LSP

LSP ProxyEgress

Loopback

Insp.Device

iBGP

IP Lookup

Penultimate Router

MPLS LSP Proxy Egress

Page 15: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

61.1.1.1

Penultimate RouteriBGP

MPLS LSP Proxy Egress

Page 16: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

FRANKFURT#show mpls forwarding-table labels 16Local Outgoing Prefix Bytes tag Outgoing Next Hoptag tag or VC or Tunnel Id switched interface16 Untagged 61.222.65.77/32 24831266 Gi6/0 61.44.88.111

LONDON#show mpls forwarding-table 61.222.65.77Local Outgoing Prefix Bytes tag Outgoing Next Hoptag tag or VC or Tunnel Id switched interface503 560 61.222.65.77/32 0 PO11/0 point2point

Deployment example

Page 17: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

61.1.1.1

iBGP IPv4 FBF interface

The Juniper way (courtesy of Riverhead)

Page 18: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

Conclusion

§ Actually deployed, not only in the lab

§ Proved easy to deploy, maintain and use

§ Improved DDoS detection, mitigation andanalysis/post-mortem in conjunction with Netflow-based detection solution and customer profiling(filtering templates)

§ Any question ?§ Technical Notes & configurations examples:

[email protected]

Page 19: MPLS-based Traffic Shunt...Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003 Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom

Nicolas FISCHBACH - RIPE46 Sept. 2003

Thank you

Nicolas FISCHBACH - RIPE46 Sept. 2003