Network Security Flashcards
BGP Route hijacks
ASes believe other ASes routing advertisements, allowing an AS to hijack routes
DNS Reflection
Distributed Denial of Service
Security Components
Confidentiality
Integrity
Availability
Authenticity
Confidentiality
Information only provided to authorized parties
Integrity
Information isnt changed in storage / transit
Availability
Information accessible when needed
Authenticity
Information origin is accurate
Threat
Potential violation of security components
Attack
Action that violates a security component
Routing Security
Control Plane Authentication
Session
Path
Origin
DNS Masquerade
Spoof DNS Server IP address
Provide name:IP mapping to attackers address
Session Authentication
ASes send message, and message hash ( md5(message,key))
Kaminsky Attack
DNS attack where attack sends fake DNS requests to recursive server.
When recursive server queries authoritative server for answer, attacker responds first, winning the race condition.
Attackers response has NS match in it, poisoning the cache
DNS Poison defenses
ID randomization
Source Port randomization
0x20 (random hostname capitalization)
DNS Sec
Adds authentication to DNS protocol to allow devices to confirm identity of senders
What does BGPSec protect against?
Attacker claiming to be neighbor
AS claiming to be origin for subnet
AS claiming untrue path to subnet
Prevented with a chain of signed paths
How is BGP hijacking made undetectable
Attacking AS does not decrement the TTL
Calculate Attack Rate
(num IP Addresses / 2^32) * num backscatter packets = total attack rate
or
num backscatter = attack rate * (2 ^ 32 / num IP addresses)
BGP manipulation
BGP does not validate information, so can be manipulated
Origin Authentication manipulation
AS cant claim victim’s prefix
CAN announce path that ends at proper AS
soBGP manipulation
verifies path exists
CAN advertise unavailable path
S-BGP manipulation
uses path verification
CAN have shorter more expensive path announced, but forward traffic on longer cheaper route
Data plane verification manipulation
Manipulator must forward traffic on path he is announcing
Defensive filtering manipulation
Eliminates attacks from stubs