这是我前段时间做的一个关于BGP 的分析,揭示了BGP存在的一些问题。
 
BGP Security Analysis


Abstract


BGP is one of the most important protocol running on the Internet. Now, it is 
updated to Version BGP-4 and other versions. But it's also vulnerable to 
multiple attacks. I'll identify several attack objectives and mechanisms, 
assuming that one or more BGP routers have been compromised.Then, 
I review the existing and proposed countermeasures, showing that they are 
either generally ineffictive (route ltering), or probably too heavyweight to 
deploy (S-BGP). I also review several recent proposals.




1.Introduction


The Internet routing infrastructure is also vulnerable to attacks. The 
objectives of routing attacks can include blackholing and loss of connectivity, 
traffic redirection to networks controlled by adversaries, traffic subversion 
and data interception, or persistent routing instability.


BGP protocol provides connectivity between AS. So BGP attacks have the 
potential to affect a much larger number of users and potentially compromise 
routing across the global Internet. In the report, I'll explore how an attacker 
might exploit the BGP protocol to compromise the interdomain routing 
infrastructure. The presented attacks are relatively easy to perform as long as 
a hacker manages to compromise one or more BGP speakers.


The rest of the report is organised as follow. Section 2 outlines the BGP 
mechanisms that enable malicous attacks. The effectiveness of the two major 
countermeasures (ltering and S-BGP) are described in Section 3. I conclude in 
Section 4.




2.Attack Mechanism 


A compromised router can modify, drop, or introduce fake BGP updates. The 
result can be that other routers have incorrect views of the network, leading 
to blackholing, redirection, or instability.
The effectiveness of some attacks depends on the AS topology and on the 
location of the compromised router relative to the victim network.


False UPDATEs and prefix hijacking are probably the most straightforward type 
of BGP attack. They occur when an AS announces a route that it does not have, 
or when an AS originates a prefix that it does not own. The effectiveness of 
false UPDATEs is limited by the location and connectivity of the hijacked BGP 
speaker.


De-Aggregation, when used as an attack, breaks up an address block into a 
number of more specific (i.e., longer) prefixes. Since the BGP route selection 
process gives higher preference to the longest matching prefix for a given 
destination, the attacker can use de-aggregation to announce
fake routes that will be preferred throughout the Internet over the legitimate 
routes to that network.


Contradictory advertisements, meaning diefferent routing announcements sent by 
the same AS to different BGP peers, is a legitimate technique for interdomain 
traffic engineering.


Update modications can be used by a compromised router to redirect traffic in a 
way that hurts the origin AS.


Advertent link flapping can be used to trigger route dampening for a victim 
network at an upstream router. A malicious router can advertently flap a route 
to a victim address block(s). This can be done by withdrawing and re-announcing 
the target routes at a sufficiently high rate
that the neighboring BGP speakers dampen those routes. A dampened route would 
force the traffic to the victim AS to take a diefferent path, enabling traffic 
redirection. Route dampening occurs even if the router cannot find an alternate 
path to the corresponding destination. The victim network, in that case, 
remains unreachable for the duration of the route dampening.


Instability, in the form of wide-scale cascading failures, can occur when a 
number of BGP sessions repeatedly timeout due to router reboots, link 
congestion, or physical link intermittent failures. Instability, in the form of 
delayed convergence (up to several minutes), can also occur upon routing or 
policy changes, due to the MinRouteAdver timer and the way BGP explores 
alternate paths.


Congestion-induced BGP session failures. An indirect way to attack the 
interdomain routing infrastructure is by causing heavy congestion in links that 
carry BGP peering sessions.




3. Countermeasures


In the current Internet, the possibility of BGP attacks and misconfigurations 
has been so far mostly dealt with “BestCommon Practice”(BCP) documents from 
router vendors. BCPs typically recommend practical measures to prevent a router 
from being hijacked, and to avoid fake or incorrect advertisements from being 
accepted by a router.


3.1 BGP Session Security
BGP TTL Security Hack(BTSH) protects against hackers that attempt to hijack a 
BGP session without controlling either of the two speakers. The basic idea is 
to set the IP header TTL field to a value that allows those BGP packets to 
reach the receiving router only if the latter is exactly one hop away from the 
sender.


TCP MD5 encryption protects against spoofed messages and TCP connection 
hijacking.


Unicast Reverse Path Filtering (Unicast-RPF) examining whether the received BGP 
messages have the source address of the peering BGP speaker.


3.2 Route Filtering


Currently, the main use of route filtering is to enforce business relationships 
between ASs. Filtering works by creating Access Control Lists of prefixes or 
ASs which are then used by a router when it sends or receives UPDATEs. Outgoing 
UPDATEs pass through egress filters allowing operators to
control which routes are announced to peers. Ingress filters, on the other 
hand, are applied to incoming UPDATEs and they can be used to check the 
validity of the received routes.


3.3 S-BGP


Secure BGP (S-BGP) was designed by researchers at BBN as an extension to BGP 
with the objective to protect BGP from erroneous or malicious UPDATEs. S-BGP 
adds strong authorization and authentication capabilities to BGP based on 
public-key cryptography.


A deployment obstacle, however, is that it requires the presence of a 
hierarchical PKI infrastructure and distribution system, trusted by all 
participating ISPs. Another obstacle is that S-BGP is quite cryptographically 
intensive, requiring each UPDATE to be verified and signed by each S-BGP router 
(or by each participating AS) it goes through. Aggregation is an additional 
problem for S-BGP.


3.4 Secure Origin BGP 


soBGP is a lightweight alternative to S-BGP, mostly proposed by researchers at 
Cisco Systems. soBGP aims to authenticate two aspects of routing information. 
First, soBGP validates that an AS is authorized to originate a given prefix. 
Second, soBGP attempts to verify that an AS advertising a prefix has at least 
one valid (in terms of policy and topology) path to that destination. soBGP is 
based on the use of three certificate types: Entity Certificate, Authorization 
Certificate, Policy Certificate. Instead of relying on a hierarchical PKI 
infrastructure, soBGP uses a Web-of-Trust model to validate certificate, 
relying on the existing relations between ISPs.




4. Conclusion


In this report, I identified several attacking mechanisms, assuming that one or 
more BGP routers have been compromised. Then, I provides some countermeasures 
to protect BGP against attacks. But for now, there are only a few attacks 
reported. 


For our company, I think it may be not worth of bringing in some effective 
mechanisms to our products. 




crack
2008-08-29



发件人: 四不象
发送时间: 2008-08-28 14:37:37
收件人: [email protected]
抄送: 
主题: [Ph4nt0m] 这个漏洞谁了解?《Internet另一超级漏洞被公布 》

Internet 另一超级漏洞被公布 
 
作者: its|发布: 2008-8-27 (15:13)|阅读: 262|评论: 0 
两名安全研究专家最近演示了一种新技术,可以截获 Internet 上的数据包,这种截获方式以前曾被认为不可能实现。



该技术利用 Internet 路由协议 BGP(Border Gateway Protocol),让入侵者监视世界上任何地方的 Internet 
数据流,甚至可以对数据包进行篡改。

该演示只是为了显示 Internet 核心协议在安全方面的不足,Internet 
核心协议多数开发于70年代,基于当时初生的网络,人们假设网络上的节点都是可信的。这些假设正被一一击破,7月份,Dan Kaminsky 公布了 DNS 
系统一个严重漏洞(参见:DNS 漏洞细节被泄露,攻击即将开始。以及DNS 漏洞发现者 Dan Kaminsky 
访谈录。),安全专家称,新发现的漏洞的受害范围将更广泛。

这是一个非常严重的问题,甚至比 DNS 漏洞更严重,著名安全专家,L0pht 黑客组织前成员 Peiter "Mudge" Zatko 说,Peiter 
1998 年在国会作证的时候曾表示,他可以使用类似 BGP 攻击技术,在30分钟之内将 Internet 干掉,他还私下向政府机构透露如何使用 BGP 
进行窃听。Peiter 说,他研究这个问题已经十几二十年,并向情报局,以及国家安全局讲述过这个问题。

该攻击利用 BGP 协议欺骗路由器将数据转发到窃听网络上。

任何拥有 BGP 路由器的人(ISP 以及在运营商租赁了机房的公司)都可以截获数据,但本攻击只能截获流向目标地址的数据,并不能在网络间自由穿行。
 



--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

回复