490 likes | 657 Views
BGP Security in Partial Deployment Is the Juice Worth the Squeeze?. Robert Lychev Sharon Goldberg Michael Schapira. Georgia Tech Boston University. Boston University. Hebrew University. General Theme.
E N D
BGP Security in Partial DeploymentIs the Juice Worth the Squeeze? Robert Lychev Sharon Goldberg Michael Schapira Georgia Tech Boston University Boston University Hebrew University
General Theme • Many widely used communication protocols on the Internet were not originally designed with security considerations in mind • When working on designing and deploying new secure protocolswe are faced with the following question: • How can we provide sufficient protection against attackers, while minimizing our resources and without introducing new complications? • This is especially crucial, when the new secure protocols have to be partially deployed together with legacy insecure protocols
Partial Landscape of BGP Defenses What does (partially-deployed) BGPSEC offer over RPKI? (Or, is the juice worth the squeeze?) • road to BGPSEC full-deployment is very tricky because introducing • security only partially introduces new vulnerabilities • not fully deployed BGPSEC provides only meager benefits over RPKI • if network operators do not prioritize security in their routing policies • Security Benefits or Juice 4323,2828, Orgn, prefix • In standardization • Crypto done online • In deployment • Crypto done offline SP, 4323, 2828, Orgn, prefix 2828, Orgn, prefix BGP and BGPSEC coexistence S S S • RPKI (origin authentication) • BGP • BGPSEC
Outline • Background: • BGP, RPKI, BGPSEC • routing policies when BGPSEC is only partially deployed • BGPSEC in partial deployment is tricky • Is the juice worth the squeeze? • Summary
The Border Gateway Protocol (BGP) 4323, 2828, Orgn prefix Sprint Sprint,4323,2828,Orgn prefix 4323 2828, Orgn prefix 2828 A Orgn prefix Origin prefix 5
Prefix Hijack 4323, 2828, Orgn prefix Sprint 4323 • ? A prefix A 2828 • Which route to choose? • Use routing policies: • e.g. prefer shorter routes. A Origin prefix prefix 6
RPKI Prevents Prefix Hijacks 4323, 2828, Orgn prefix Sprint RPKI invalid! RPKI 4323 A prefix Sprint checks that A is not authorized for this prefix A 2828 Origin prefix prefix Binds prefixes to ASes authorized to originate them. 7
The 1-Hop Hijack 4323, 2828, Orgn prefix Sprint RPKI invalid! RPKI 4323 • ? A, Orgn prefix A prefix A 2828 • Which route to choose? • Use routing policies: • e.g. prefer shorter routes. Origin prefix Binds prefixes to ASes authorized to originate them. 8
BGPSEC Prevents the 1-Hop Hijack Sprint can verify that the Origin never sent Sprint 2828, Orgn, prefix BGPSEC invalid! RPKI A, Orgn, prefix 4323 4323,2828,Orgn, prefix • ? A,Orgn,prefix 4323,2828, Orgn, prefix A 2828 SP, 4323,2828,Orgn, prefix SP,A,Orgn,prefix 2828, Orgn, prefix 2828, Orgn, prefix S Origin S S S S P/S P/S P/S P/S P/S S S S prefix 9
Partial Landscape of BGP Defenses suppose RPKI is fully deployed and focus on 1-hop hijack • prevent route manipulations • prevent prefix hijacks • Security Benefits or Juice 4323,2828, Orgn, prefix SP, 4323, 2828, Orgn, prefix 2828, Orgn, prefix What happens when BGP and BGPSEC coexist? S S S • RPKI (origin authentication) • BGP • BGPSEC
What Happens in Partial BGPSEC Deployment? • ? In BGPSEC insecure ASes use legacy BGP, and secure ASes must accept legacy insecure routes! Should Sprint choose the long secure route OR the short insecure one? Sprint RPKI 4323 A, Orgn prefix 4323, 2828, Orgn, prefix A 2828 SP, 4323, 2828, Orgn, prefix A 2828, Orgn, prefix Siemens S Origin P/S P/S P/S P/S P/S P/S S S prefix It depends on how Sprint prioritizes security in its routing decision! 11
How to Prioritize Security? • local preference (often based on business relationships with neighbors) 2. prefer short routes … 3. break ties in a consistent manner
How to Prioritize Security? Local Pref, Route Length Security Local Pref, Route Length Security Security 1st • local preference (often based on business relationships with neighbors) Security 2nd 2. prefer short routes Security 3rd 3. break ties in a consistent manner • NANOG survey of 100 network operators shows that 10%, 20%, and 41% would place security 1st, 2nd, and 3rdrespectively [Gill, Schapira, Goldberg’12]
Our Routing Model Security 1st • local preference (prefer customer routes over peer over provider routes) Security 2nd 2. prefer short routes Security 3rd 3. break ties in a consistent manner • To study routing outcomes, we use a concrete model of local preference.[Gao-Rexford’00, Huston’99, etc.] • Our results are robust with respect to various local pref models
Outline • Background: BGP, RPKI, BGPSEC, routing policies • BGPSEC in partial deployment is tricky • Protocol downgrade attacks • Collateral damages • Routing anomalies (Routing instabilities and BGP Wedgies) • Is the Juice worth the squeeze? • Summary
Protocol Downgrade Attack, Security 3rd! • ? Security 3rd: Route length trumps route security! Sprint 4323 A, Orgn prefix 4323,2828, Orgn, prefix A 2828 SP, 4323, 2828, Orgn, prefix 2828, Orgn, prefix Origin S S P/S P/S P/S P/S S prefix Protocol downgrade attack: Before the attack, Sprint has a legitimate secure route. During the attack, Sprint downgrades to an insecure bogus route . 16
Partial Deployment is Very Tricky! A • ? Sprint Protocol downgrade attack:A secure AS with a secure route before the attack, downgrades to an insecure bogus route during the attack. 4323 P/S P/S P/S P/S P/S A, Orgn prefix 2828 Siemens Origin prefix
Collateral Damages; Security 2nd 20960 3257 52142 12389 3356 5617 174 3491 10310 P/S P/S P/S P/S P/S M 7922 40426 prefix
Collateral Damages; Security 2nd Before X deploys BGPSEC W • ? Y X offers the shorter route Secure ASes: 5 Happy ASes: 8 Z X V • ? Shorter route! P/S P/S P/S P/S P/S M Orgn prefix
Collateral Damages; Security 2nd After X deploys BGPSEC W • ? Y experiences collateral damage because X is secure! Y W offers the shorter route! Z X V • ? Security 2nd: Security trumps route length! Secure ASes: 6 Happy ASes: 7 P/S P/S P/S P/S P/S P/S M Orgn prefix
Partial Deployment is Very Tricky! 20960 3257 Collateral damage (during the attack): Moresecure ASes leads to more insecure ASes choosing bogus routes • ? 52142 P/S P/S P/S P/S P/S P/S 12389 A 3356 5617 5617 174 • ? 3491 10310 prefix 7922 40426
BGPSEC Wedgies • Routing policies can also interact in ways that can cause BGP Wedgies[Griffin and Huston, rfc-4264, 2005] • can result in unpredictable and undesirable routing configurations
BGPSEC Wedgie 31027 for 29518, local pref is more important than security 29518 intended routing configuration for 31283 security is more important than local pref 31283 3 8928 P/S P/S P/S P/S P/S Origin prefix
BGPSEC Wedgie 31027 for 29518, local pref is more important than security 29518 unintended routing configuration for 31283 security is more important than local pref 31283 3 8928 P/S P/S P/S P/S P/S Origin prefix
Partial Deployment is Very Tricky! Routing anomalies such as BGPSEC Wedgiesand persistent routing oscillations and can be avoided as long as all ASes prioritize security the same way. Otherwise, these routing anomalies could happen.
Outline • Background: BGP, RPKI, BGPSEC, routing policies • BGPSEC in partial deployment is tricky • Is the Juice worth the Squeeze? • How can we quantify BGPSEC benefits? • Can we bound BGPSEC benefits without knowing who may deploy it? • What are BGPSEC benefits beyond what RPKI can provide? • Summary
How to Quantifying BGPSEC Benefits? Fix a particular Origin, attacker A and let S be the set of ASes deploying BGPSEC The set of ASes choosing a legitimate route is Sprint 4323 2828 S = | Happy(S, A, Origin)| = 3 A Siemens Origin prefix prefix Happy S, , Origin 27 prefix A
How to Quantify BGPSEC Benefits? Fix a particular Origin, attacker A and let S be the set of ASes deploying BGPSEC The set of ASes choosing a legitimate route is Sprint 4323 2828 S = everyone | Happy(S, A, Origin)| = 5 A Siemens Origin prefix prefix P/S P/S P/S P/S P/S P/S Happy S, , Origin 28 prefix A
Quantifying Security: A Metric Fix a particular Origin, attacker A and let S be the set of ASes deploying BGPSEC Our metric is the average of the set of Happy ASes Sprint 4323 ∑ S = everyone | Happy(S, A, Origin)| = 5 2828 A Siemens allA allO Origin prefix prefix 1 P/S P/S P/S P/S P/S P/S Happy S, , Metric(S) = 3 |V| Origin 29 prefix A
Who Should Deploy BGPSEC? • We can efficiently compute bounds on BGPSEC benefits independently of who deploys it • to do this we figure out which ASes do not benefit from BGPSEC by considering only the scenario when no AS deploys BGPSEC
Bounding BGPSEC Benefits: Security 3rd Sprint The bogus route is shorter! 4323 A, Orgn prefix A 2828 Siemens Origin prefix 31
Bounding BGPSEC Benefits: Security 3rd Sprint Sprint is doomed The bogus route is shorter! 4323 A, Orgn prefix A 2828 Siemens Origin P/S P/S P/S P/S P/S prefix Regardless of who is secure, Sprint will select the shorter bogus route! 32
Bounding BGPSEC Benefits: Security 3rd Sprint Sprint is doomed The bogus route is shorter! The legitimate route is shorter! 4323 A, Orgn prefix A 2828 Siemens Origin P/S P/S P/S P/S P/S prefix 33
Bounding BGPSEC Benefits: Security 3rd Sprint Sprint is doomed The bogus route is shorter! 2828 and 4323 are immune The legitimate route is shorter! 4323 A, Orgn prefix A 2828 Siemens Origin prefix Regardless of who is secure, 4323 and 2828 will select legitimate routes! 34
Bounding BGPSEC Benefits: Security 3rd Sprint Sprint is doomed The bogus route is shorter! 2828 and 4323 are immune The legitimate route is shorter! 4323 A, Orgn prefix A 2828 Siemens Origin prefix Only Siemans is neither doomed nor immune! 35
Bounding BGPSEC Benefits: Security 3rd Sprint Sprint is doomed The bogus route is shorter! 2828 and 4323 are immune The legitimate route is shorter! 4323 A, Orgn prefix A 2828 Siemens Origin P/S P/S P/S P/S P/S prefix Only Siemans is neither doomed nor immune! Regardless of who is secure, only Siemans can benefit from BGPSEC! 36
Quantifying BGPSEC Benefits • Regardless of who deploys BGPSEC: • Doomed ASeswill always choose bogus routes • Immune ASeswill always choose legitimate routes • Only protectableASes can be benefit from BGPSEC • Security benefits lowerbound = fraction of immuneASes • Security benefits upper bound = 1 - fraction of doomedASes • Most ASes are immune or doomed when security is 3rd
BGPSEC Benefits Bounds over RPKI upper bound with BGPSEC 47% 36% 17% 53% Average Fraction of Happy ASes lower bound with RPKI In the most realistic security 3rd model, the best we could do is make extra 17% happy with security!
Securing 213 High Degree ASes & their Stubs(13 Tier 1’s + 100 Tier 2’s + 100 Tier 3’s + all their stubs) Securing 56% of ASes on the Internet 47% 36% 25% 17% 53% Average Fraction of Happy ASes lower bound with RPKI Improvements in the security 3rd and 2nd models are only 5% and 10% respectively.
Our Methodology • Graph: A UCLA AS-level topology from 09-24-2012 • 40K ASes, 73.5K and 62K customer-provider and peer links • Used large-scale simulations to determine • upper and lower bounds on metric improvement • security-benefits for many different BGPSEC deployments • Robustness Tests • added 550K extra peering links inferred from IXP data on 09-24-2012 • accounted for traffic patterns by focusing on only certain destinations (e.g. content providers) and attackers • repeated analysis with respect to different local pref models
The LPk Local Pref Model • Survey shows ~80% of network operators prefer customer over peer routes, but some (e.g. content providers) prefer shorter peer routes over longer customer routes [Gill, Schapira, Goldberg 2012] • In the LPk model, for any k ≥ 0, rank routes as follows: • customer routes of length 1 • peer routes of length 1 • … • customer routes of length k • peer route of length k • customer routes of length > k • peer routes of length > k • provider routes
Securing 213 High Degree ASes & their Stubs(13 Tier 1’s + 100 Tier 2’s + 100 Tier 3’s + all their stubs) Securing 56% of ASes on the Internet 12% 9% 0.8 12% 17% Sec 3rd Average Fraction of Happy ASes 0.4 53% 68% 80% 81% 0.0 LP50 LP1 LP0 LP2 As k increases, metric improvements are 5%, 4%, 4%, and 6%.
So Is the Juice Worth the Squeeze? • Unless Security is 1st or BGPSEC deployment is very large, security benefits from partially deployed BGPSEC are meager on average • On average, not much observable difference between Sec 2nd and 3rd • Tier 1 ASes are good candidates for initial deployment when security is 1stbut terrible candidates otherwise (see paper for details) • Security Benefits or Juice protocol downgrades collateral damages routing anomalies (very important) 4323,2828, Orgn, prefix SP, 4323, 2828, Orgnprefix 2828, Orgn, prefix BGP and BGPSEC coexistence: very tricky S S S • RPKI (origin authentication) • BGP • BGPSEC
THANK YOU check out the full version at http://arxiv.org/abs/1307.2690 More empirical analysis and plots More Robustness tests BGPSEC deployment guidelines
Securing 213 High Degree ASes & their Stubs(13 Tier 1’s + 100 Tier 2’s + 100 Tier 3’s + all their stubs) Securing 56% of ASes on the Internet 0.4 Sec 3rd Average Fraction of ASes 0.2 21% 18% 10% 10% 6% 6% 4% 3% 0.0 LP50 LP1 LP0 LP2 As k increases, the fraction of ASes with secure routes grows, but most of them are happy anyway.
Securing 213 High Degree ASes & their Stubs(13 Tier 1’s + 100 Tier 2’s + 100 Tier 3’s + all their stubs) Securing 56% of ASes on the Internet 14% 15% 24% 0.8 36% Sec 2nd Average Fraction of ASes 0.4 53% 68% 80% 81% 0.0 LP50 LP1 LP0 LP2 As ASes become more stubborn (i.e. k increases), metric improvements are 9.9%, 9.7%, 10.1%, and 9.8%
Securing 213 High Degree ASes & their Stubs(13 Tier 1’s + 100 Tier 2’s + 100 Tier 3’s + all their stubs) Securing 56% of ASes on the Internet 0.4 Sec 2nd Average Fraction of ASes 0.2 21% 19% 12% 12% 4% 4% 3% 3% 0.0 LP50 LP1 LP0 LP2 As ASes become more stubborn (i.e. k increases), fraction of ASes with secure routes grows, but most of them are happy anyway
Securing 213 High Degree ASes & their Stubs(13 Tier 1’s + 100 Tier 2’s + 100 Tier 3’s + all their stubs) Securing 56% of ASes on the Internet 19% 20% 32% 0.8 47% Sec 1st Average Fraction of ASes 0.4 53% 68% 80% 81% 0.0 LP50 LP1 LP0 LP2 As ASes become more stubborn (i.e. k increases), metric improvements are 24.8%, 24.7%, 17.2%, and 16.1%
Securing 213 High Degree ASes & their Stubs(13 Tier 1’s + 100 Tier 2’s + 100 Tier 3’s + all their stubs) Securing 56% of ASes on the Internet 0.4 Sec 1st 10% 9% Average Fraction of ASes 14% 14% 0.2 22% 23% 18% 18% 0.0 LP50 LP1 LP0 LP2 As ASes become more stubborn (i.e. k increases), fraction of happy ASes with secure routes grows