...
Let's consider off-axis risks.
Originator O, Relying party R, Weak-operator W, and Bad Actor B.
If poor key management on W makes it possible for the private keys of
a single router in W's network to be learned by B, then all bets are
off for anything advertised via W.
To put this into perspective you need to say how the secruity problem
created by poor key management by W for this router is substantively
different from B successfully attacking W's network management system
or compromising the router in question to achieve the same goal.
Here's why:
Presume all the good stuff you want about O, and the RPKI system.
Route X, originated by O, is fully validated and legitimate.
Topologically, let's say the following BGPSEC sessions and links exist:
O--?--W--?--R--?--B--?
(All the "?" mean there could be intermediate parties, but none are
required for this example to still be applicable.)
In order to spoof announcements, B need two things: The private key of
a single router (such as the key for a W router), and the data that
would be signed by that router (for X).
You're example is a bit underspecified, so I'll try to fill in the blanks.
- B's goal is to send a route to R, for address space
legitimately originated by O, which will attract traffic to B rather
than to W, right?
- B needs to acquire an update for the target (O), that
passed through W, otherwise the forward sig on the BGPSEC update will
fail, making the attack fail.
- in your example, B will get the BGPSEC update for O, from
R, after it has passed through W, which satisfies the criteria above.
The process would be:
B sets up a router F ( which claims to be the W router for which the
key was compromised).
The (W_fake) router F is configured with ASN == W.
B sets up a BGPSEC session between F and B, and signs the results.
In many cases, ASes have external info about neighbors to which they
are directly connected, e.g., they executed a contract, paid for a
link, etc. So, if B tries to claim it's W, based only on having a key
from one of W's routers, that often may not work. (It might work if B
and R are peers at an IXP and the VLAN at the IXP is not too strong.)
I would expect the attack to be:
- upon receiopt of the signed update, B strips the sigs
applied by W, and by any ASes between W and R, and any ASes between R
and B.
- using the compromised router key from W, B generates an update
that shows O-?-W-B. it signs the update using its (B's) key, and
sends it to R, possibly via an intermediate AS ("?"). this way B does
not have to pretend to be W. It only asserts that it (B) has a link
to W, and that it has the same path to O as W had, plus itself.
If there are one or more ASes between W and R, legitimately, then the
bogus route is shorter and probably preferable. So, the presence of
one or more "?" ASes between W and R is critical, contrary to your
assertion. If W is directly connected to R, the bogus route is longer
and may not be preferred.
You go on to observe that W's poor key management practices allow B
to cause O's traffic to be routed through it, even though O and R did
nothing wrong. That's true. But it also would be true if B
compromised a router or network management computer in W and caused
the AS/router to forward traffic destined for O (from R) to B. Or, W
may be evil and takes $ from B to send it a copy of traffic from R to
O. All of these are ways that the targeted traffic ca be misrouted,
due to some bad behavior by W. This is an inherent limitation, in
your example; R is dependent on W's secruity, realtive to traffic
beign sent to O, because W is between O and R.
I don't agree with any of your proposed changes for the design.
#1 calls for a level of micromanagement that is not common in IETF standards
#2 is not relevant; my detailed attack example did not need to
acquire the updates by wiretapping "off axis."
#3 suggests multiple sigs per something (AS?, router?) are more
secure than a single sig. Absent a lot of unspecified context
details, this assertion is not valid.
#4, viewed in the context of Eric's message, seems to suggest that if
every AS were required to publish self-assertions about key
management, then this info would be used as a "trust" value inputs to
local routing policy by other ASes. Really?
Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr