BGP Flashcards
IP Prefix Hijacking
- malicious AS originates a prefix it does not own
- subprefix hijacking: originate longer (more specific prefix)
BGP Protocol
- TCP messages over port 179
- OPEN, UPDATE, KEEP-ALIVE, NOTIFICATION
BGP Interception
- Hijack traffic and then send it to leg. AS
1. selectively announce prefix to some neighbors
2. use bgp poisoning
3. use bgp communities to ensure that announcement only reaches certain ASes
BGP poisoning
Hijack some prefix by originating target prefix, but add a neighbor AS in the AS path, so that this AS will reject the path and can act as leg. path to the target prefix for interception attacks.
Get TLS Certificate
request cert but hijack traffic in which CA tries to validate HTML challenge to attackers server. Obviously attacker can prove control of this server.
RPKI
origin authentication for prefix announcements
- AS checks origin of prefix against secure database (RPKI) of Route Origin Authenticatinos (ROAs)
- origin auth. is not enough. malicious AS can append itself to a existing path
- verification of signatures is done offline
BGPSec
- Secures the AS-PATH attribute
- origin authentication + cryptographic sig. to prove that path was correctly updated
- RPKI used to verify AS key material
ISSUE: - AS use legacy BGP and most don’t priorities security
- performance degradation
Path End Validation
additionally to origin auth. store next hop as well in RPKI. Attacker can not directly append itself to the origin and longer routes are usually not taken.
extensive monitoring
- monitor update messages and prefer routes that agree with the past
- generate reports or alerts
OSPF
- Open shortest path first
- Interior gateway protocol