31
Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident Rahul Hiran 1 , Niklas Carlsson 1 , Phillipa Gill 2 1 Linköping University, Sweden 2 University of Toronto, Canada 19 th March2013

Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Characterizing Large-scale Routing Anomalies: A Case Study of the

China Telecom Incident Rahul Hiran1, Niklas Carlsson1, Phillipa Gill2

1 Linköping University, Sweden 2University of Toronto, Canada

19th March2013

Page 2: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China Telecom incident

3/28/2013 2

Page 3: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China Telecom incident

• The incident occurred on 8th April 2010

• The congress report, 2010 in USA mentions the incident

• Questions about what was done with the data, attack or accident

• We characterize this incident using only publicly available data (e.g., Routeviews and iPlane)

Page 4: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China

Telecom

BGP (Border Gateway Protocol) refresher

ISP 1

Verizon Wireless

Level 3

AS 22394

66.174.0.0/16

22394 66.174.0.0/16

Page 5: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China

Telecom

BGP (Border Gateway Protocol) refresher

ISP 1

Verizon Wireless

Level 3

AS 22394

66.174.0.0/16

VZW, 22394 66.174.0.0/16

22394 66.174.0.0/16

Page 6: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China

Telecom

BGP (Border Gateway Protocol) refresher

ISP 1

Verizon Wireless

Level 3

Level3, VZW, 22394 66.174.0.0/16

AS 22394

66.174.0.0/16

VZW, 22394 66.174.0.0/16

22394 66.174.0.0/16

Page 7: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China

Telecom

BGP (Border Gateway Protocol) refresher

ISP 1

Verizon Wireless

Level 3

AS 22394 This prefix and 50K others were announced by China Telecom

66.174.0.0/16

22394 66.174.0.0/16

ChinaTel

66.174.0.0/16

Page 8: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

ChinaTel path is shorter

?

China

Telecom

BGP (Border Gateway Protocol) refresher

ISP 1

Verizon Wireless

Level 3

AS 22394 This prefix and 50K others were announced by China Telecom

66.174.0.0/16

22394 66.174.0.0/16

ChinaTel

66.174.0.0/16

Page 9: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China

Telecom

BGP (Border Gateway Protocol) refresher

ISP 1

Verizon Wireless

Level 3

AS 22394 This prefix and 50K others were announced by China Telecom

66.174.0.0/16

22394 66.174.0.0/16

ChinaTel

66.174.161.0/24

ChinaTel prefix is more specific

?

Page 10: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China

Telecom

BGP (Border Gateway Protocol) refresher

ISP 1

Verizon Wireless

Level 3

AS 22394 This prefix and 50K others were announced by China Telecom

Traffic for some prefixes was possibly intercepted 66.174.0.0/16

22394 66.174.0.0/16

ChinaTel

66.174.161.0/24

Page 11: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

BGP routing policies: Business relationships

• Heirarchical Internet structure

3/28/2013 11

$$

$$

Transit ISP Transit ISP

National ISP National ISP National ISP

Local ISP Local ISP Local ISP Local ISP

Local ISP

Page 12: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

BGP routing policies: Business relationships

• Heirarchical Internet structure

• Different relationships – Customer-Provider

– Peer-Peer

3/28/2013 12

$$

$$

Transit ISP Transit ISP

National ISP National ISP National ISP

Local ISP Loal ISP Local ISP Local ISP

Local ISP

Page 13: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

BGP routing policies: Business relationships

• Heirarchical Internet structure

• Different relationships – Customer-Provider

– Peer-Peer

3/28/2013 13

$$

$$

Transit ISP Transit ISP

National ISP National ISP National ISP

Local ISP Local ISP Local ISP Local ISP

Local ISP Customer route

Page 14: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

BGP routing policies: Business relationships

• Heirarchical Internet structure

• Different relationships – Customer-Provider

– Peer-Peer

3/28/2013 14

$$

$$

Transit ISP Transit ISP

National ISP National ISP National ISP

Local ISP Local ISP Local ISP Local ISP

Local ISP Customer route

Peer route

Page 15: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

BGP routing policies: Business relationships

• Heirarchical Internet structure

• Different relationships – Customer-Provider

– Peer-Peer

3/28/2013 15

$$

$$

Transit ISP Transit ISP

National ISP National ISP National ISP

Local ISP Local ISP Local ISP Local ISP

Local ISP Customer route

Provider route

Peer route

Page 16: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

BGP routing policies: Business relationships

• Heirarchical Internet structure

• Different relationships

– Customer-Provider

– Peer-Peer

• Preference order – Customer route (high)

– Peer route

– Provider route (low)

3/28/2013 16

$$

$$

Transit ISP Transit ISP

National ISP National ISP National ISP

Local ISP Local ISP Local ISP Local ISP

Local ISP Customer route

Provider route

Peer route

Page 17: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Analysis outline

• Prefix hijack analysis

Country-based analysis

• Subprefix hijack analysis

• Interception analysis

Reasons for interception

3/28/2013 17

Page 18: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Country-based analysis

• Was any country targeted?

• Geographic distribution of prefixes

3/28/2013 18

Page 19: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Country-based analysis Distribution of hijacked prefixes do not deviate

from global distribution of prefixes

3/28/2013 19

Page 20: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Subprefix hijack analysis

• 21% (9,082) prefixes longer than existing prefixes at all six Routeviews monitors

• 95% of this prefixes belong to China Telecom • <1% (86) prefixes subprefix hijacked excluding the

top-3 ASes in table

3/28/2013 20

Page 21: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Subprefix hijack analysis

No evidence for intentional subprefix hijacking

3/28/2013 21

Page 22: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China Telecom, China Telecom DC, China Telecom DC 66.174.161.0/24

How did interception occur?

Two required routing decisions for traffic interception:

3/28/2013 22

China Telecom

AT&T

Level 3

Verizon Verizon wireless

China Telecom

data centre

Level3, Verizon, Verizon W 66.174.161.0/24

Page 23: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China Telecom, China Telecom DC, China Telecom DC 66.174.161.0/24

How did interception occur?

Two required routing decisions for traffic interception:

1. A neighbor routes to China Telecom for hijacked prefix

3/28/2013 23

China Telecom

AT&T

Level 3

Verizon Verizon wireless

China Telecom

data centre

Level3, Verizon, Verizon W 66.174.161.0/24

Page 24: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China Telecom, China Telecom DC, China Telecom DC 66.174.161.0/24

How did interception occur?

Two required routing decisions for traffic interception:

1. A neighbor routes to China Telecom for hijacked prefix

2. Another neighbor does not do so

3/28/2013 24

China Telecom

AT&T

Level 3

Verizon Verizon wireless

China Telecom

data centre

Level3, Verizon, Verizon W 66.174.161.0/24

Page 25: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

China Telecom, China Telecom DC, China Telecom DC 66.174.161.0/24

How did interception occur?

Two required routing decisions for traffic interception:

1. A neighbor routes to China Telecom for hijacked prefix

2. Another neighbor does not do so

3/28/2013 25

China Telecom

AT&T

Level 3

Verizon Verizon wireless

China Telecom

data centre

Level3, Verizon, Verizon W 66.174.161.0/24

Page 26: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

• Identification of interception instances

• Used traceroute data from iPlane project

Interception analysis

3/28/2013 26

1575

Page 27: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

• Identification of interception instances

• Used traceroute data from iPlane project

Interception analysis

3/28/2013 27

357

Page 28: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Interception analysis Reasons for neighbors not choosing 4134

3/28/2013 28

Page 29: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Interception analysis: Reasons for neighbors not choosing 4134

• Routing policies and business relationships resulted in interception

• Accidental interception possible

3/28/2013 29

Page 30: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Conclusion and discussion

• Characterized the China Telecom incident – Accidental interception possible

– Sheds light on properties of announced prefixes

– Supports the conclusion that incident was a leak of random prefixes

– However, it does not rule out malicious intent

• Our study highlights – Challenges of diagnosing routing incidents

– Importance of public and rich available data

3/28/2013 30

Page 31: Characterizing Large-scale Routing Anomalies: A Case Study ...pam2013.comp.polyu.edu.hk/ma/slides/slides_23.pdf · 1. A neighbor routes to China Telecom for hijacked prefix 2. Another

Questions? Rahul Hiran

[email protected]

Linköping University expanding reality