Re: [swinog] Research project and survey: Network filtering and IP spoofing

2017-03-07 Diskussionsfäden Jeroen Massar
On 2017-03-01 23:49, Jeroen Massar wrote:
> On 2017-03-01 17:02, Franziska Lichtblau wrote:

[..]

Related paper:

http://www.caida.org/publications/papers/2017/using_loops_observed_traceroute/

Using Loops Observed in Traceroute to Infer the Ability to Spoof

8<---
Despite source IP address spoofing being a known vulnerability for at
least 25 years, and despite many efforts to shed light on the problem,
spoofing remains a popular attack method for redirection, amplification,
and anonymity. To defeat these attacks requires operators to ensure
their networks filter packets with spoofed source IP addresses, known as
source address validation (SAV), best deployed at the edge of the
network where traffic originates. In this paper, we present a new method
using routing loops appearing in traceroute data to infer inadequate SAV
at the transit provider edge, where a provider does not filter traffic
that should not have come from the customer. Our method does not require
a vantage point within the customer network. We present and validate an
algorithm that identifies at Internet scale which loops imply a lack of
ingress filtering by providers. We found 703 provider ASes that do not
implement ingress filtering on at least one of their links for 1,780
customer ASes. Most of these observations are unique compared to the
existing methods of the Spoofer and Open Resolver projects. By
increasing the visibility of the networks that allow spoofing, we aim to
strengthen the incentives for the adoption of SAV.
-->8

Greets,
 Jeroen



___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Research project and survey: Network filtering and IP spoofing

2017-03-01 Diskussionsfäden Jeroen Massar
On 2017-03-01 17:02, Franziska Lichtblau wrote:
> On Wed, Mar 01, 2017 at 12:50:49PM +0100, Jeroen Massar wrote:
>> On 2017-03-01 11:59, Franziska Lichtblau wrote:
>> [..]
 Oh, and indeed, Switzerland is a bad place for BCP38, most networks
 allow spoofing on both IPv4 and IPv6.
>>>
>>> Which is "kinda good" for me cause only answers from people who are 
>>> implementing
>>> all of that won't help us much understanding whats going on ;) 
>>
>> That is not "kinda good" as it means that spoofing can happen easily and
>> those kind of attacks are much harder to trace than ones that do proper
>> full TCP (or heck UDP).
> 
> You got me wrong there. I didn't mean to say it's good that the possibility 
> for spoofing is out there. What I meant to convey was, that if I only speak
> to operators or regions where a ''perfect'' level of filtering is applied I 
> will not get meaningful insights about why it is not done everywhere and 
> how we can improve on that. 
> That's one of the biggest challenges - to actually talk to the people who are
> not doing as we all would want them to. 

The only place where a 'perfect level of filtering' is in place is Finland.

And that is because FICORA (their ~BAKOM) has made BCP38 mandatory in 2014:

https://www.viestintavirasto.fi/attachments/cert/tietoturvakatsaukset/Cyber_review_Q1_2014_EN.pdf

And they have good successes with it. Google for the many reports about
this by the great people from FICORA.

The rest of the world, you will not find a lot of BCP38 to the joy of
many many people who provide 'security services' (be that
booters/testers/etc or the ones selling protection against ddos)

>> But with this whole Mirai thing and hundreds of thousands of hosts being
>> compromised of end-sites or Wordpress/Joomla/etc on servers with proper
>> upstream connectivity, it really does not matter, as spoofing is not
>> even really needed to properly DDoS any network, unless we are talking
>> about distributed or properly anycasted networks.
> 
> That is completely true. But that's a completely different problem (which I 
> used
> to work on very superficially). One that I'd actually like to see fixed, but 
> I'm
> not sure what a research perspective (which is the one I can offer) can help
> there. I'm totally open to suggestions. 

Research unfortunately won't solve BCP38 deployment either.

Regulatory enforcement like in Finland seems to be the only way.

Like IPv6, as long as there is no real business interest -- read: money
can be made from it nothing will happen. (the eyeball networks getting
ddossed of the net by bots on their own network for instance would make
a business interest, again *not a hint* ;) )

>> Eyeball networks though are both the source of many problems and when
>> miscreants figure out they can take down an eyeball network (which
>> cannot be protected with tricks like anycast and throwing more resources
>> at it, as pipe full == pipe full... *not a hint* ;) ) and ransom those
>> networks, lots of fun will happen.
> 
> There are things you can not not think once you've thought about them once ;) 
> I agree - there's lots of potential fun out there 
> 
>> The fun part is then also that those networks will just not work, they
>> will also get overloaded call centers which is amazing from a money
>> perspective thus it will do a lot of damage.
>>
>> But maybe then those eyeball networks finally will start taking action
>> in cleaning up their userbase, thus IMHO, it can't happen early enough
>> as then we finally will have a proper Internet where that nonsense gets
>> taken care of instead of just ignored...
> 
> The problem is always, that people need incentives - there's a good amount
> of people that you can get with the global idea of a well working community...

That does not make a business incentive aka earning money though.

> but sadly not all of them. That's one of the reasons why we ask what are the
> incentives of people who try to keep their network clean and now we can
> lower the bars for those who are not yet there. 

Make a business case and then convince the management of ISPs about the
risk of the Mirai hosts (and many others) in their network.

Because of Mirai existing though, BCP38 would not do anything to stop
that, thus you'll have to find a better example botnet that actually
spoofs. As long as Mirai and friends exist, spoofing is not needed and
thus BCP38 only solves a little bit of a puzzle unfortunately.


As I note above: Regulatory requirement are likely the only way.

Greets,
 Jeroen




___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Research project and survey: Network filtering and IP spoofing

2017-03-01 Diskussionsfäden Franziska Lichtblau
On Wed, Mar 01, 2017 at 12:50:49PM +0100, Jeroen Massar wrote:
> On 2017-03-01 11:59, Franziska Lichtblau wrote:
> [..]
> >> Oh, and indeed, Switzerland is a bad place for BCP38, most networks
> >> allow spoofing on both IPv4 and IPv6.
> > 
> > Which is "kinda good" for me cause only answers from people who are 
> > implementing
> > all of that won't help us much understanding whats going on ;) 
> 
> That is not "kinda good" as it means that spoofing can happen easily and
> those kind of attacks are much harder to trace than ones that do proper
> full TCP (or heck UDP).

You got me wrong there. I didn't mean to say it's good that the possibility 
for spoofing is out there. What I meant to convey was, that if I only speak
to operators or regions where a ''perfect'' level of filtering is applied I 
will not get meaningful insights about why it is not done everywhere and 
how we can improve on that. 
That's one of the biggest challenges - to actually talk to the people who are
not doing as we all would want them to. 

> But with this whole Mirai thing and hundreds of thousands of hosts being
> compromised of end-sites or Wordpress/Joomla/etc on servers with proper
> upstream connectivity, it really does not matter, as spoofing is not
> even really needed to properly DDoS any network, unless we are talking
> about distributed or properly anycasted networks.

That is completely true. But that's a completely different problem (which I used
to work on very superficially). One that I'd actually like to see fixed, but I'm
not sure what a research perspective (which is the one I can offer) can help
there. I'm totally open to suggestions. 

> Eyeball networks though are both the source of many problems and when
> miscreants figure out they can take down an eyeball network (which
> cannot be protected with tricks like anycast and throwing more resources
> at it, as pipe full == pipe full... *not a hint* ;) ) and ransom those
> networks, lots of fun will happen.

There are things you can not not think once you've thought about them once ;) 
I agree - there's lots of potential fun out there 

> The fun part is then also that those networks will just not work, they
> will also get overloaded call centers which is amazing from a money
> perspective thus it will do a lot of damage.
> 
> But maybe then those eyeball networks finally will start taking action
> in cleaning up their userbase, thus IMHO, it can't happen early enough
> as then we finally will have a proper Internet where that nonsense gets
> taken care of instead of just ignored...

The problem is always, that people need incentives - there's a good amount
of people that you can get with the global idea of a well working community...
but sadly not all of them. That's one of the reasons why we ask what are the
incentives of people who try to keep their network clean and now we can
lower the bars for those who are not yet there. 

Greets,
Franziska 
-- 
Franziska Lichtblau, M.A.building MAR, 4th floor, room 4.004
Fachgebiet INET - Sekr. MAR 4-4  phone: +49 30 314 757 33
Technische Universität Berlin   gpg-fp: 4FA0 F1BC 8B9A 7F64 797C
Marchstrasse 23 - 10587 Berlin  221C C6C6 2786 91EC 5CD5


signature.asc
Description: PGP signature

___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Research project and survey: Network filtering and IP spoofing

2017-03-01 Diskussionsfäden Jeroen Massar
On 2017-03-01 11:59, Franziska Lichtblau wrote:
[..]
>> Oh, and indeed, Switzerland is a bad place for BCP38, most networks
>> allow spoofing on both IPv4 and IPv6.
> 
> Which is "kinda good" for me cause only answers from people who are 
> implementing
> all of that won't help us much understanding whats going on ;) 

That is not "kinda good" as it means that spoofing can happen easily and
those kind of attacks are much harder to trace than ones that do proper
full TCP (or heck UDP).

But with this whole Mirai thing and hundreds of thousands of hosts being
compromised of end-sites or Wordpress/Joomla/etc on servers with proper
upstream connectivity, it really does not matter, as spoofing is not
even really needed to properly DDoS any network, unless we are talking
about distributed or properly anycasted networks.

Eyeball networks though are both the source of many problems and when
miscreants figure out they can take down an eyeball network (which
cannot be protected with tricks like anycast and throwing more resources
at it, as pipe full == pipe full... *not a hint* ;) ) and ransom those
networks, lots of fun will happen.

The fun part is then also that those networks will just not work, they
will also get overloaded call centers which is amazing from a money
perspective thus it will do a lot of damage.

But maybe then those eyeball networks finally will start taking action
in cleaning up their userbase, thus IMHO, it can't happen early enough
as then we finally will have a proper Internet where that nonsense gets
taken care of instead of just ignored...

Greets,
 Jeroen



___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Research project and survey: Network filtering and IP spoofing

2017-03-01 Diskussionsfäden Franziska Lichtblau
On Wed, Mar 01, 2017 at 11:22:44AM +0100, Jeroen Massar wrote:
> On 2017-03-01 09:58, Franziska Lichtblau wrote:
> > we are a team of researchers from TU Berlin [1] working on a measurement 
> > project
> > to assess the ramifications of traffic with spoofed source IP addresses in 
> > the 
> > Internet.
> > 
> > To better understand the operational challenges that you as network 
> > operators
> > face when deploying (or not deploying) source IP address filtering 
> > techniques,
> > we'd like to invite you to participate in our survey.
> > 
> > If you could spare 5 minutes of your time, we'd be delighted if you could 
> > fill
> > out our survey form and tell us about your current practices regarding 
> > network
> > filtering.
> > 
> > To participate, please visit:
> > [2] http://filteringsurvey.inet.tu-berlin.de/
> 
> You are missing the option for:
> 
>  "hardware does not support it at line rate"
> 
> Which is the most important excuse by the larger networks to not enable
> BCP38/SAVE[1]/MANRS[2].

Good point! I hope people suffering from that will tell us that with the open
option, but you're right we should have considered that. 

> Most smaller shops, where the traffic conditions fit inside the hardware
> budget, just do not care enough unfortunately...

That was my feeling.

> Oh, and indeed, Switzerland is a bad place for BCP38, most networks
> allow spoofing on both IPv4 and IPv6.

Which is "kinda good" for me cause only answers from people who are implementing
all of that won't help us much understanding whats going on ;) 

Thank you! 
Franziska 

-- 
Franziska Lichtblau, M.A.building MAR, 4th floor, room 4.004
Fachgebiet INET - Sekr. MAR 4-4  phone: +49 30 314 757 33
Technische Universität Berlin   gpg-fp: 4FA0 F1BC 8B9A 7F64 797C
Marchstrasse 23 - 10587 Berlin  221C C6C6 2786 91EC 5CD5


signature.asc
Description: PGP signature

___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog


Re: [swinog] Research project and survey: Network filtering and IP spoofing

2017-03-01 Diskussionsfäden Jeroen Massar
On 2017-03-01 09:58, Franziska Lichtblau wrote:
> Hi,
> 
> we are a team of researchers from TU Berlin [1] working on a measurement 
> project
> to assess the ramifications of traffic with spoofed source IP addresses in 
> the 
> Internet.
> 
> To better understand the operational challenges that you as network operators
> face when deploying (or not deploying) source IP address filtering techniques,
> we'd like to invite you to participate in our survey.
> 
> If you could spare 5 minutes of your time, we'd be delighted if you could fill
> out our survey form and tell us about your current practices regarding network
> filtering.
> 
> To participate, please visit:
> [2] http://filteringsurvey.inet.tu-berlin.de/

You are missing the option for:

 "hardware does not support it at line rate"

Which is the most important excuse by the larger networks to not enable
BCP38/SAVE[1]/MANRS[2].

Most smaller shops, where the traffic conditions fit inside the hardware
budget, just do not care enough unfortunately...

Oh, and indeed, Switzerland is a bad place for BCP38, most networks
allow spoofing on both IPv4 and IPv6.

Greets,
 Jeroen

[1] http://www.redbarn.org/internet/save
[2] http://www.routingmanifesto.org/manrs/



___
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog