Routing Security Flashcards

1
Q

Autonomous System

A

Collection of prefixes owned and managed by an entity
-> have clearly defined internal IGP and external EGP routing policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BGP

A
  • Standard exterior gateway protocol
  • Routing policy based on shortest-prefix and shortest-path
  • Supports destination-based forwarding paradigm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerabilities in BGP

A
  • Attack vectors:
    -> sub-prefix hijacking
    -> same-prefix hijacking (shortest path exploit)
  • Attack Objectives:
    -> Blackholing
    -> Redirection
    -> Subversion (Umsturz)
    -> Routing Instability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Resource PKI

A
  • Distributed Database of resources that complement BGP table decision-making process
  • Repositories are called Publication Point
  • Most important file is Route Origin Authorization (ROA). A cryptographically signed mapping of prefixes to ASes that own them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerabilities in the RPKI Environment

A
  • Rate-limiting in DNS
  • RP Predictability
  • Unlimited Delegation Chain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RPKI: Stalloris: Downgrade Attack

A
  1. Relying Party (RP) connects to the attacker’s Publication Points (PP)
  2. Attacker makes target PP unreachable via rate-limiting
    -> Spoof TCP SYNs packets to PP with victim IP
    -> Spoof DNS queries to PP name servers with victim IP
  3. Queries from RP and its resolvers go unanswered, repeat periodically until
  4. Objects in cache expires
    -> ROAs of target PP are no longer available
    -> BGP Router gets incomplete data => RPKI downgrade
How well did you know this?
1
Not at all
2
3
4
5
Perfectly