Deployable BGP Security
نویسنده
چکیده
The routing protocol that connects the Autonomous Systems, BGP, is vulnerable to a number of potentially crippling attacks because it trusts unverified control plane information received from external networks. Within the last year we have seen ConEdison hijack Panix’s /16 [1], TTNET hijack several /8’s including 1247 more specifics of AT&T’s 12/8 [2], NW Network Cable announce several /8’s including nearly 2800 more specifics [3], multiple ASs (8437, 16215) announce the entirety of published dark space [4], and AS 22773 announced 128/1. We know that these events are bogus because they are so severe. Smaller attacks and misconfigurations are not so easily identified and there are likely hundreds of hijacks that we have not been able to verify. However, it has been difficult to convince the operator community to adopt any of several proposed security solutions. The draft RFC for soBGP [5] has expired, and the community has not even started distributing AS number certificates, a prerequisite to complete verification. In this paper I discuss some of the deployment difficulties that BGP security enhancements have faced, suggest directions for future research, and propose an initial framework for a simple yet effective security improvement for BGP that can be rapidly deployed.
منابع مشابه
Securing BGP - A Literature Survey
The Border Gateway Protocol (BGP) is the Internet’s inter-domain routing protocol. One of the major concerns related to BGP is its lack of effective security measures, and as a result the routing infrastructure of the Internet is vulnerable to various forms of attack. This paper examines the Internet’s routing architecture and the design of BGP in particular, and surveys the work to date on sec...
متن کاملSecure Border Gateway Protocol (Secure-BGP)
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems (ASes), is a critical component of the Internet’s routing infrastructure. It is highly vulnerable to a variety of malicious attacks, due to the lack of a secure means of verifying the authenticity and legitimacy of BGP control traffic. This document describes a secure, scalable, deploya...
متن کاملBootstrapping Accountability in the Internet We Have
Lack of accountability makes the Internet vulnerable to numerous attacks, including prefix hijacking, route forgery, source address spoofing, and DoS flooding attacks. This paper aims to bring accountability to the Internet with low-cost and deployable enhancements. We present IPA, a design that uses the readily available toplevel DNSSEC infrastructure and BGP to bootstrap accountability. We sh...
متن کاملPretty Good BGP: Protecting BGP by Cautiously Selecting Routes
The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks primarily due to operator misconfiguration. Proposed solutions with strong guarantees require a public-key infrastructure, accurate routing registries, and changes to BGP. Until such a large proposal is adopted, networks will remain vulnerable to false information injected into BGP. However, BGP rout...
متن کاملPretty Good BGP: Protecting BGP by Cautiously Selecting Routes
The Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, is vulnerable to a number of damaging attacks. Proposed solutions either (i) rely on a public-key infrastructure and accurate routing registries or (ii) detect attacks only after they have spread throughout the network. However, BGP routers could avoid selecting and propagating malicious routes if they were cautious...
متن کامل