Routing Security Flashcards
1
Q
Autonomous System
A
Collection of prefixes owned and managed by an entity
-> have clearly defined internal IGP and external EGP routing policies
2
Q
BGP
A
- Standard exterior gateway protocol
- Routing policy based on shortest-prefix and shortest-path
- Supports destination-based forwarding paradigm
3
Q
Vulnerabilities in BGP
A
- Attack vectors:
-> sub-prefix hijacking
-> same-prefix hijacking (shortest path exploit) - Attack Objectives:
-> Blackholing
-> Redirection
-> Subversion (Umsturz)
-> Routing Instability
4
Q
Resource PKI
A
- Distributed Database of resources that complement BGP table decision-making process
- Repositories are called Publication Point
- Most important file is Route Origin Authorization (ROA). A cryptographically signed mapping of prefixes to ASes that own them
5
Q
Vulnerabilities in the RPKI Environment
A
- Rate-limiting in DNS
- RP Predictability
- Unlimited Delegation Chain
6
Q
RPKI: Stalloris: Downgrade Attack
A
- Relying Party (RP) connects to the attacker’s Publication Points (PP)
- Attacker makes target PP unreachable via rate-limiting
-> Spoof TCP SYNs packets to PP with victim IP
-> Spoof DNS queries to PP name servers with victim IP - Queries from RP and its resolvers go unanswered, repeat periodically until
- Objects in cache expires
-> ROAs of target PP are no longer available
-> BGP Router gets incomplete data => RPKI downgrade