Lesson 11 - Network Security Flashcards
Historical BGP routing attacks
- In April 2010, China advertised 50,000 IP prefixes from 170 countries. Lasted for ~20 minutes and appears to have been accidental. The prefixes were long enough so that they didn’t disrupt existing routes.
- The fact that they could leak in the first place highlights vulnerability of BGP.
- BGP basically allows any AS to advertise an IP prefix to a neighboring AS, and that AS will just believe it, and advertise that route to the rest of the internet.
- These events where an AS advertises a prefix that it does not own are called route hijacks. They tend to occur more often than one might expect.
- In Feb 2008: Pakistan “hijacked” the YouTube prefixes, potentially as a botched attempt to block YouTube in the country following a government order.
- Resulted in a disruption of connectivity to YouTube for people all around the world.
- In Jan 2006, ConEdison accidentally hijacked a lot of transit networks, including Level 3, YooNet, and several other large ISPs disrupting connectivity to many customers.
- In April 1995: AS 7007 incident, where this AS advertised all of the IP prefixes on the entire internet as originating in its own AS, resulting in disruption of connectivity to huge fractions of the internet. This case is pretty famous.
Popular/effective ways of mounting an attack on naming/DNS
“Reflection” or “DNS Reflection”
- A way of generating very large amounts of traffic targeted at a victim in an attack called a Distributed Denial of Service (DDOS) attack (pronounced “dee-dos”)
- DDOS attacks are extremely common and can be mounted in a variety of ways. They can be mounted in ways other than Reflection. We’ll explore some others later.
- Another type of attack on the naming system is Phishing, whereby an attacked exploits the domain name system in an attempt to trick a user into revealing personal information such as passwords on a rogue website
What makes the internet insecure?
- The internet’s design is fundamentally insecure.
- The internet was designed for simplicity, and as a result, security was not a primary consideration.
- The internet is on by default, meaning when a host is connected to the internet, it is by default, reachable by any other host that has a public IP address. This means that if one has an insecure host, that host is effectively wide open to attack by other hosts on the internet.
- This was not an issue when the internet started out as a small number of trusted networks, but as it has grown, this on-by-default design has come under fire.
- Reason the on-by-default model does not work well:
- Hosts are insecure: makes it possible for remote attacker to compromise a machine connected to the internet and commandeer it for the purposes of attack
- In many cases, an attack might look like “normal” traffic.
- Example: in an attack on a victim web server, every individual request might look normal, but the collection of requests together mounted as parr of a DDOS attack, might add up to a volume of traffic that the server is unable to handle.
- Federated design: obstructs cooperation for diagnosis or mitigation. Because the internet is run by 10s of 1000s of independently operated networks, it can be difficult to coordinate a defense against an attack.
Which of the following make the internet’s design fundamentally insecure?
- On by default
- IP addresses are easy to guess
- Attacks look like normal traffic
- Federation
- On by default
- Attacks look like normal traffic
- Federation
Resource exhaustion attacks
- One of the internet’s fundamental design tenants is Packet Switching
- In a packet-switched network, resources are not reserved, and packets are self-contained. Every packet has a destination IP address, and each packet travels independently to the destination host.
- A link may be shared by multiple senders at any given time using statistical multiplexing.
- Packet switched networks allow for high utilization, but also have drawback that a large # of senders can overload a network resources such as a node or a link. Note that circuit switched networks like a phone network do NOT have this problem.
- Therefore, packet-switched networks are extremely vulnerable to resource exhaustion attacks.
- Resource Exhaustion attacks a basic component of security known as availability.
- In a packet-switched network, resources are not reserved, and packets are self-contained. Every packet has a destination IP address, and each packet travels independently to the destination host.
Components of Security
- Availability: ability to use a resource
- Confidentiality: concealing information
- Example: for a sensitive banking transaction, or a private conversation, you’d like the internet to provide some level of confidentiality
- Authenticity: assures the identity of the origin of a piece of information
- Example: if you’re reading a news article, you want to know that it actually came from the New York Times website as opposed to some other place on the internet
- Integrity: want to know that information wasn’t modified in flight. Prevents unauthorized changes to information as it traverses the network.
Security Threat
anything that may cause a violation of one of these properties
Attack
an action that results in the violation of one of these security properties
Difference between a threat and an attack
potential vs. action
Attaks on confidentiality
- Eavesdropping: attacker “Eve” might gain unauthorized access to information being sent between Alice and Bob. Example: Alice and Bob chatting on IM, or Alice sending email to Bob, the potential exists (AKA there is a threat) that Eve might be able to hear that communication.
* Various packet sniffing tools such as WireShark or TCPDump that set a machine’s network interface card into what’s called promiscuous mode. If Alice, Bob, and Eve are on the same local area network where packets are being flooded (i.e. connected by a hub, or if the learning switch did not have an entry for Alice or Bob), then Eve might be able to hear some of those packets.
* If NIC is in promiscuous mode, then Eve’s machine will be able to capture some of the packets that are being exchanged between Alice and Bob
* Different aspects of communication can provide attacker with different information.
* Ability to capture DNS lookups can provide attacker with information about what websites you’re visiting
* Ability to capture packet headers might give attacker information about where you’re exchanging traffic, and what types of applications you’re using
* Ability to see a full packet payload would allow an attacker the ability to effectively see every single thing that you’re sending on the network, including content you’re exchanging with other people.
MITM
Man in the Middle Attack
Eve could suppress Alice’s original message, and she could effectively impersonate Bob or Alice
A Denial of Service is an attack on what property of internet security?
- Availability
- Confidentiality
- Authenticity
- Integrity
Availability
Note: if an attacker is distributed, a Denial of Service attack is called a Distributed Denial of Service Attack
Negative impacts of attacks
- Theft of confidential information
* Unauthorized use of network bandwidth or computing resources
* Spread of false information
* Disruption of legitimate services - All of these attacks are related, very dangerous, and sometimes they come hand-in-hand
Control plane security
typically involves authentication of the messages being advertised by the routing protocol
- Goal: determine the veracity of routing advertisements.
- Various aspects of routing protocol that we seek to verify using control plane authentication:
* Session authentication: protects the point-to-point communication between routers
* Path authentication: protects the AS path, and sometimes other attributes
* Origin authentication: protects origin AS in the AS path, effectively guaranteeing that the Origin AS that advertises a prefix is in fact the owner of that prefix
A route hijack is an attack on which form of authentication?
- Session: point-to-point b/w routes
- Path: protects AS path
- Origin: ensures flat AS advertising prefix is the owner
-Origin: ensures flat AS advertising prefix is the owner