31
Prefix Hijacking Mitigation Somethin is better than nothin NANOG 46 – June 2009  James Cowie, Renesys T om Dal y , Dynamic Network Services Anton Kapela, Voxel T odd Underwood, Google

Prefix Hijacking Mitigation

Embed Size (px)

Citation preview

Page 1: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 1/31

Prefix Hijacking Mitigation

Somethin is better than nothin

NANOG 46 – June 2009

 

James Cowie, Renesys

Tom Daly, Dynamic Network Services

Anton Kapela, VoxelTodd Underwood, Google

Page 2: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 2/31

Outline

• Introduction to prefix hijacking

• Mitigating against an event

• Experiment

NANOG 46 – June 2009

• Questions

Page 3: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 3/31

Prefix Hijacking 101

• Announce someone else's prefix

• Announce a more specific of a someone else's

prefix

NANOG 46 – June 2009

• Synopsis: You are trying to “steal” someone

else’s traffic by getting it routed to you.

• Capture, sniff, redirect, manipulate traffic as

you wish.

Page 4: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 4/31

Same Prefix: Shorter AS Path Wins

AS 30

AS 10

Client

NANOG 46 – June 2009

AS 50

AS 40

AS 20

192.168.10/24192.168.10/24

Page 5: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 5/31

Same Path: More Specific Prefix Wins

AS 30

AS 10

Client

NANOG 46 – June 2009

AS 40

192.168.10/24 192.168.10/25

Page 6: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 6/31

Advanced Hijacking: Pilosov/

Kapela's MITM Attack

• http://eng.5ninesdata.com/~tkapela

• Create a new path for the hijacked traffic

• Copy/observe/record traffic

 

NANOG 46 – June 2009

• Return it to the rightful originator• Hide your tracks

• Includes prepending ASes along the returnpath and TTL modification for traceroute

hiding

Page 7: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 7/31

Impact• IP space that is in-use: (obvious operational

impact)

• Disrupts traffic, denies service to the traffic

• IP space not in-use (delayed operational

NANOG 46 – June 2009

impact)• Damage to reputation of the target

•Either way, you may or may not know it is

happening!

Page 8: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 8/31

Does It Actually Happen?• Yes!

• Famously: Youtube:http://nanog.org/meetings/nanog43/presentations/Brow

nyoutube_

 

NANOG 46 – June 2009

• so, a oo, oog e, an many, many ot ers• Not as often as some people think

• Certainly not a daily or weekly occurrence

• It may happen (and is worth preparing for it) but is notthe biggest threat you face.

• MITM hijacking unlikely so far

Page 9: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 9/31

Why Doesn't Someone Fix This?• We try! Sorta:

• Peers don't route-filter each other:• http://www.nanog.org/mtg-0510/deleskie.html

• No trust anchors built into the

NANOG 46 – June 2009

allocation/routing system from the start:• Randy Bush asked for one as an Eid present:

www.nanog.org/mtg-0602/pdf/bush.pdf 

• Didn't happen 2006, 2007 or 2008

• No way to validate routes in flight:

• SBGP, soBGP never implemented

Page 10: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 10/31

Mitigation Overview• Prepare (most important)

• Detect

• Investigate

• Mitigate (novel suggestion for how)

NANOG 46 – June 2009

• Clean up

Page 11: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 11/31

Mitigation 0: Prepare• Ensure prefixes are all provably yours:

• Gather allocation/SWIP documentation• Gather electronic versions of any LOAs from customers

• Register prefixes in IRRs

NANOG 46 – June 2009

• Ask providers to accept le /25 and testacceptance and propagation of the /25s inadvance

• Ask provider about response procedures tohijackings, DOSes

Page 12: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 12/31

Mitigation 0: Prepare (cont.)• Do not put important resources in the same

prefixes:• Youtube ran DNS in the same prefixes as web/videopreviously. Limits the scope of damage.

• Providers and peers should be selected on the

NANOG 46 – June 2009

basis of clue in dealing with this.• Join security groups, if possible.

• Most importantly: build relationships with as

many engineers/managers at major networks aspossible. There are the people that are going tohelp you when this happens to you!

Page 13: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 13/31

Mitigation 1: Detect (quickly!)• There are lots of tools that can do this for you.

Pick one (or two) and use them. – RIPE RIS

NANOG 46 – June 2009

 – 

 – BGPMon

 – Renesys

 – Something home grown

Page 14: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 14/31

Mitigation 1: Detection (How)• Change in origin ASN

• Change in route propagation through

unauthorized / unknown peers

 

NANOG 46 – June 2009

• Origination o a more speci ic pre ix• Traffic monitoring, etc.

Page 15: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 15/31

Mitigation 2: Investigate• Make sure it's a hijacking

• Make sure you understand who is responsible

and what routes they are sending to whom

 

NANOG 46 – June 2009

• Gat er your evi ence care u y

Page 16: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 16/31

Mitigation 3: Mitigate• Originate more specifics. Up to those /25s you

tested. This may help you get your traffic back.• Contact the “nearest responsible large

NANOG 46 – June 2009

,

filter.

• Work upstream from yourself and the hijacker,

asking for filtering.• Your RIR/IRR/LOA data may be critical here.

Page 17: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 17/31

Mitigation 4: Clean Up• Get attacker to stop announcing prefixes.

• Get attacker’s upstream to properly filter the

attacker.

• Stop originating more specifics from your own

NANOG 46 – June 2009

network.• Thank everyone who helped, profusely. Buy

them beverages. You'll need their help again

soon.

Page 18: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 18/31

Hypothesis

• Can the affects of route flap dampening be

NANOG 46 – June 2009

use to mitigate a pre ix ijac ing

Page 19: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 19/31

Mitigation: The Flapping• Novel concept: flap the hijacked more specific

• Assuming:• P/23 is the covering prefix originated by ASNA

 

NANOG 46 – June 2009

 

• ASNA should originate and then flap P/24

• P/24 should be flap dampened (at least

somewhat) and the covering /23 will catch thetraffic

Page 20: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 20/31

Lower P/24 part of P/23 Upper P/24 part of P/23

Normal State: P/23 originated by ASN A

Lower P/24 originated by attacker

Hijacked State: P/23 originated by ASN A

NANOG 46 – June 2009

Lower P/24 originated by attacker

ASN BUpper P/24 part of P/23

Flapped State: P/23 originated by ASN A

ASN B 

Page 21: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 21/31

Flapping: An Experiment• The Players:

 – AS33517: Dynamic Network Services• Has 216.146.34.0/23, originates 216.146.34.0/23 and

216.146.35.0/24

 

NANOG 46 – June 2009

 – AS16842: Five Nines Data• Hijacking 216.146.34.0/24

• AS16842 originates 216.146.34.0/24, stealing half of 

AS33517’s /23.• AS33517 responds by announcing the stolen /24.

• Observe the steady state.

Page 22: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 22/31

Flapping: An Experiment (2)• The flapping:

 – AS33517 begins flapping 216.146.34.0/24 in anattempt to suppress the more specific (and get

traffic back

NANOG 46 – June 2009

 

 – Two different geographic sources and rates of flapping were attempted in order to ensure

propagation and thresholding did not reduce the

effectiveness (NYC and ORD, Quagga and JUNOS)

Page 23: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 23/31

Flapping: Results/Analysis• Used BGP update data from Renesys Routing

Intelligence and its global peerset.

 

NANOG 46 – June 2009

• Summary: T is tec nique oesn t wor . – The rightful owner just becomes a big prefix

flapping jerk!

Page 24: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 24/31

Preliminary AnalysisNYC Defense

ORD Defense

NANOG 46 – June 2009

Percentage of peers selecting:hijacked prefix (AS16842-P/24) in blue“real” prefix (AS33517-P/24) in yellowno prefix – withdrawn – in orange

Page 25: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 25/31

Deeper Analysis• Horizontal lines are individual peers.

• Each circle is an update.

• First slide shows the whole peer tableau, with

the “contested zone” on top, and the “closer

NANOG 46 – June 2009

to the attacker zone” down below (never inplay; note the lack of 

withdrawals/dampening).

• Subsequent slides zero in on the contested

zone, where the defender has a chance.

Page 26: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 26/31

Peer

Initial hijackDefenderresponds

Steady State1

First Trial Second Trial  

Steady State2

NANOG 46 – June 2009Time

Page 27: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 27/31

Defender responds, basins ofattraction identified; steady state

Flapping! First

Trial

NANOG 46 – June 2009Time

Flapping! Green circles are (rare) ithdra als

Page 28: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 28/31

Second

Trial

(Steady State)

Flapping! Green circles are (rare) withdrawals.

On balance, blue circles (defender) arebeing turned into red circles (attacker), not dampened.

Remember, this is the defender's turf to lose (note steady state).

NANOG 46 – June 2009

Page 29: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 29/31

Conclusion• The steady-state originator always has the

advantage (older route in tables)

• In this case, the defender has all the ground to

lose.

NANOG 46 – June 2009

• Duplicate originations help get some trafficback.

• Flapping severely hurts the defenders attempt

to get traffic back.

Page 30: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 30/31

Open Questions• Does anyone still flap dampen?

• Does this work at all?

• How much do you have to flap to keep it

NANOG 46 – June 2009

wor ing• Could this strategy be effective?

• Are we all insane for even thinking it would

work?

Page 31: Prefix Hijacking Mitigation

8/8/2019 Prefix Hijacking Mitigation

http://slidepdf.com/reader/full/prefix-hijacking-mitigation 31/31

Thank You

NANOG 46 – June 2009

James Cowie, Renesys

Tom Daly, Dynamic Network Services

Anton Kapela, VoxelTodd Underwood, Google