Routing Security. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel

Size: px
Start display at page:

Download "Routing Security. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel"

Transcription

1 Routing Security Professor Patrick McDaniel CSE545 - Advanced Network Security Spring

2 AS7007 2

3 Routing 101 Network routing exists to provide hosts desirable paths from the source to destination What desirable means depends on the types of protocols being used Two main approaches to routing Link state - collected/metrics of paths between hosts, e.g., OSPF Distance vector - shortest path based on exchanged routing tables, e.g., BGP 3

4 Routing Security Bad guys play games with routing protocols. Traffic is diverted. Enemy can see the traffic. Enemy can easily modify the traffic. Enemy can drop the traffic. Cryptography can mitigate effects, but not stop them. History: we don t have a lot of good answers! 4

5 How is it Different? Most communications security failures happen because of buggy code or broken protocols. Routing security failures often happen despite good code and functioning protocols. The problem is a dishonest participant. Hop-by-hop authentication isn't sufficient. 5

6 Routing... Z Host B Host A 6

7 The Enemy's Goal? Z Host B Host A 7

8 Routing Protocols Routers speak to each other. They exchange topology and cost information. Each router calculates the shortest path to each destination. Routers forward packets along locally shortest path. Attacker can lie to other routers 8

9 Normal Behavior Z Host B 5 5 Y 10 5 Host A 10 Y :B(10) Y Z :B(10) Z :Y (5),B(15) A:Z(5),Y(5),B(15) 9

10 Malicious Behavior Z 3 Host B 5 5 Y 10 5 Host A 10 Y :B(10) Y Z :B(10) Z :Y (5), B(3) A:Z(5),Y(5), B(8) 10

11 Why is the Problem Hard? has no knowledge of Z's real connectivity. Even Y has no such knowledge. The problem isn't the link from to Z; the problem is the information being sent. (Note that Z might be deceived by some other neighbor Q.) 11

12 Worm-Holing Host B Host A Z Z 12

13 Worm-Holing Host B Host A Z Z 13

14 Link Cutting Host B Host A Z Z 14

15 Link Cutting Host B Host A Z Z 15

16 Why So Little Progress? It's a really, really hard problem. Actually, getting routing to work well is hard enough. Has been outside the scope of traditional communications security. 16

17 Routing in the Internet Two types, internal and external routing. Intradomain - Internal (within ISP, company): primarily OSPF. Interdomain routing - external (between ISPs, and some customers): BGP. Topology matters. 17

18 OSPF (Open Shortest Path First) Each node announces its own connectivity. Announcement includes link cost. Each node reannounces all information received from peers. Every node learns the full map of the network. Each node calculates the shortest path to all destinations. Z Host B Host A 10 5 Note: limited to a few thousand nodes at most. 18

19 Characteristics of Internal Networks Common management. Common agreement on cost metrics. Companies have less rich topologies, but less controlled networks. ISPs have very rich---but very specialized---topologies, but well-controlled networks. 19

20 Secure OSPF? Simple link security is hard: multiple-access net. Shared secrets guard against new machines being plugged in but not against an authorized party being dishonest. Solution: digitally sign each routing update (expensive!) List authorizations in certificate. Experimental RFC by Murphy et al., Note: everyone sees the whole map; monitoring station can note discrepancies from reality. (But bad guys can send out different announcements in different directions.) 20

21 BGP (Border Gateway Protocol) BGP is the protocol used to route information at the autonomous system level - (distance vector protocol) Everyone builds a route to every AS in the internet based on paths received from neighbors Routes are flooded to neighbors Path selection is based on policy (not always shortest path) 21

22 Routing in a nutshell The Internet... 22

23 Routing in a nutshell is made up of Autonomous Systems (ASes) 23

24 Routing in a nutshell linked at Border Routers. 24

25 Routing in a nutshell The Border Gateway Protocol determines which ASes to follow from source to destination. 25

26 Routing in a nutshell Each AS is responsible for moving packets inside it. Intra-AS routing is (mostly) independent from Inter-AS routing. 26

27 The BGP Protocol BGP messages Origin announcements: I own this block of addresses Route advertisements: To get to this address block, send packets destined for it to me. And by the way, here is the path of ASes it will take Route withdrawals: Remember the route to this address block I told you about, that path of ASes no longer works Route decisions Border routers receive many origin announcements/ route advertisements, one from each of their peers They choose the best path and send their selection downstream BGP Attributes BGP messages have additional attributes to help routers choose the best path AS_path (above), MED, community strings, CIDR Block Path Attributes / quest:bkup Systems and Internet Infrastructure Security Laboratory (SIIS) 27

28 Routing in a nutshell Propagate throughout the network. 28

29 BGP announcements n Which path gets picked depends on the advertised attributes. 29

30 BGP Connection FSM 30

31 BGP Operation: Connection Setup A router is speak BGP with another router, generally physically connected to it, in another AS These two routers are called BGP peers Before coming online, the router is in the Idle state When the router comes on line, it creates a BGP session with its peer BGP runs over TCP, and a TCP connection is made first between the two peers (port 179) The router is in the Connect state during this time When the connection is established, the router moves into the Established state 31

32 BGP Operation: Information Exchange Once the BGP session is active, the peers exchange routing data This information is passed through the UPDATE message Contains a list of advertised prefixes, known as network layer reachability information (NLRI), and withdrawn routes Prefixes with different policy attributes are sent in separate UPDATE messages Route setup can create heavy exchanges of messages and be computationally intensive for the router 32

33 BGP Operation: Path Attributes ORIGIN: shows whether prefix was learned through interior or exterior routing AS_PATH: the ASes that the prefix has passed through during this advertisement BGP is a path vector protocol, and the prefix with the fewest ASes traversed is usually preferred Including AS path vector prevents looping NET-HOP: the node to send packets back to in order to get them closer to their destination 33

34 Other Common Path Attributes MULTI-EIT DISCRIMINATOR: if two ASes connect in multiple locations, the MED can be used by a peer to favour a particular link to improve routing LOCAL-PREF: used by the local AS to assign a degree of preference of one link for a given prefix over another ATOMIC-AGGREGATE: lets the router know not to deaggregate an advertisement into more specific prefixes AGGREGATOR: specifies AS and router that performed aggregation of a prefix 34

35 In class exercise Fill in the routing tables... CIDR Block / / / / /24 AS PATH AS 1 Addresses: /24 CIDR Block / / / / /24 AS 4 Addresses: /24 AS PATH CIDR Block / / / / /24 AS PATH CIDR Block / / / / /24 AS PATH AS 3 Addresses: /24 AS 5 Addresses: /24 AS 2 Addresses: /16 CIDR Block / / / / /24 AS PATH 35

36 BGP: simplified routing algorithm 1. Initialize: advertise yourself as ORIGIN all of your CIDR blocks to all peers in UPDATE messages 2. Steady State: repeat (a) If a link fails, remove every route involving that link from the internal routing table (b) Receive UPDATES from peers, add new routes to internal table, remove all WITHDRAWN routes from internal tables (c) Selected best route for every CIDR block you have heard (d) If a previously advertised route is no longer best for that CIDR block, WITHDRAW it from all peers you advertised it to (e) Send a UPDATE for every best route that you have not perviously advertised to all peers except the AS in the path 36

37 BGP Misconfiguration One of the largest problems with BGP is misconfiguration Leading cause of instability on the Internet Causes Stupidity Poor configuration tools Under-specified network requirements Often misconfiguration can lurk for months or years before it is detected or its effects felt Changing network topology Unexpected network states 37

38 Mahajan et al. SIGCOMM 02 study of BGP misconfiguration Those instances where configurations caused problems: unintended suppression of legitimate advertisement unintended creation of illegitimate advertisement Human factors terminology slip - inadvertent errors, e.g., typos mistakes - design errors, e.g., Methodology: use data from RouteViews routing repository collected over 3 years and 23 vantage points located located over the globe. contacted ASes for information on causes 38

39 Study Results Errors detected prefix hijacking - incorrect advertisement of addresses improper route export - exporting routes/paths in violation of stated ISP policies Problems are universal, pervasive, and pathological prefixes seeing misconfiguration per day ( % of 2002 table size) 3 in 4 new prefix advertisements result of misconfigurations About 15 hijacks per day (how about today?) Result: constant stream of incorrect information being received by routers.* Interesting thought: how to secure in this environment? *only gets worse after

40 Attacks Against BGP Control Plane Timing Availability Data Plane Origin Path 40

41 Prefix Hijacking An attacker can forge an UPDATE message that claims to originate a known prefix For example, my organization could decide to be AT&T for a day, and advertise /8 Outbound route filtering should catch this, but many operators do not perform proper filtering policy within their AS 41

42 Prefix Destabilization By forcing route flapping on a given link, an attacker to a peer can cause BGP dampening to occur Routes that flap are penalized by being suppressed The period of suppression increases depending on how many times the BGP session changes state and length of the prefix (longer prefixes are penalized more than shorter ones) Black holes are a major problem of origin attacks 42

43 Black Holes are out of sight If another AS advertises one of our prefixes, bad things happen: AS 1 AS 2 AS 3 AS 5 AS 6 AS /16 C /16 legitimate not legitimate! C4 43

44 Black Holes are out of sight Prefix becomes unreachable from the part of the net believing C4 s announcement. AS 1 AS 2 AS 3 AS 5 AS 6 AS /16 C1 legitimate not legitimate! /16 C4 44

45 Self-deaggregation Within the AS, a prefix can be broken into smaller blocks and advertised as such Because of longest-prefix matching, these will be preferred (eg /24 is preferred over /8 because it is more specific) This is the heart of the AS7007 incident, where much of the Internet lost its routing It can also cause a large burden on the routers, because of increase in computation and routing table size 45

46 Path Modification BGP is a path-vector protocol, so the length of the path is a major factor in accepting a route AS path prepending can be used to bias a route (adding the same AS number repeatedly to a route) An attacker with the ability to modify the AS path can force traffic to follow patterns it otherwise wouldn t 46

47 Path Forgery If an AS_PATH attribute is completely forged, the attacker has even more control over traffic This can allow for traffic analysis since traffic is engineered in the direction the attacker desires This can also lead to black holes, as previously discussed 47

48 Policy Modification By modifying policy attributes, traffic can be be biased in certain ways and routing can be compromised Examples: changing the MED or Local_Pref values can cause suboptimal routing within the peer s or local AS, respectively 48

49 TCP SYN Attacks SYN forgery If the attacker sends a SYN, the peer may think this is a legitimate connection If the attacker guesses the correct SYN ACK, a collision will result, causing the legitimate connection to fail SYN-ACK forgery Attacker timing a SYN ACK and sending it during TCP setup can bring down connection SYN flood Overwhelm the router resources with SYN packets until it runs out of connections 49

50 Spoofing A forged BGP OPEN message can bring down a connection If a connection is in the process of being opened, an attacker sending an OPEN message can cause a collision Legitimate connection would be terminated Similarly, a BGP KEEPALIVE sent while peers are connecting will cause the session to fail If peers are in Connect, Active or OpenSent state 50

51 Modifying BGP Timers If the attacker can gain control of timer functionality, messages can be delayed and connections forced closed KeepAlive timer, Hold timer and OpenDelay timer - if altered, messages and the connection itself may be dropped KEEPALIVE messages are heartbeat messages to ensure the BGP connection exists 51

52 Availability Attacks through BGP Forged NOTIFICATION message NOTIFICATION is indicative of an error, so whenever this message is passed, the connection is brought down and the peer states change to Idle Syntax or parse errors with BGP messages If a packet is malformed, values are invalid or message headers contain errors, the peer will drop the connection 52

53 Route Flooding Any attack that brings down the causes a connection to bounce will force its peers to dump their routing tables to it These can overwhelm the router depending on the number of routes it receives, and is computationally and bandwidth intensive in any case Route flapping also an availability attack Penalized by BGP dampening algorithms that force suppression of the advertisement 53

54 Physical Attacks Link cutting If the attacker knows the network topology, bringing down certain links (through DoS attacks, or a backhoe) can force traffic into the pattern they desire Taking control of the router For example, exploiting a buffer overflow (such as the SNMP attack) Can cause the router to reboot Physical destruction of the router As always, network security is dependent on physical security 54

55 Bellovin/Gansner Link Cutting Given : network G vertex (routers) V = {v 1...v n } edges (links) L = {l 1,...l m } adversary controlled vertices(routers) V source s V destination t V Goal : route s to t through v i 55

56 1. If some v i on path from s to t, done. 2. For each v i, computer shortest simple path from s to t through v i.if none exists, no solution possible. 3. Pick shortest path P of length l, set each edge an inifinite cut cost, set all others to Find the min s t cut of the graph C L. 5. For each edge c i in the cut, remove it if the shortest path for s to t through c i is less than l. 56

57 Example 1. If some v i on path from s to t, done. F E S A G T B D C S A G T 57

58 Example 2. For each v i, computer shortest simple path from s to t through v i.if none exists, no solution possible. F E S A G T B D SAGT =3 SABCDGT =6 C SAEF GT =5 58

59 Example 3. Pick shortest path P of length l, set each edge an inifinite cut cost, set all others to 1. F S A E F G T S A 1 1 B E D 1 1 G T 1 1 C 59

60 Example 4. Find the min s t cut C of the graph C L. F S A 1 1 B E D 1 1 G T 1 1 C 60

61 Example 5. For each edge c i in the cut, remove it if the shortest path for s to t through c i is less than or equal to l. F E S A G T B D SAGT =3 SABCDGT =6 C SAEF GT =5 61

62 Class notes Next Tue: Enck Thesis Next Tue: cybertorium (113 IST) 62

63 In class exercise Fill in the routing tables... CIDR Block / / / / /24 AS PATH AS 1 Addresses: /24 CIDR Block / / / / /24 AS 4 Addresses: /24 AS PATH CIDR Block / / / / /24 AS PATH CIDR Block / / / / /24 AS PATH AS 3 Addresses: /24 AS 5 Addresses: /24 AS 2 Addresses: /16 CIDR Block / / / / /24 AS PATH 63

64 Problems to Solutions? Independent of the type, routing requires securing the following information for a source: where the destination address? what is the best path to that address? Answering these questions in practice is complex, as it necessarily requires us to trust foreign entities or devices for which we may know little (if anything). This is the nasty secure distributed computation and everyone on the Internet must play. 64

65 Solving BGP Security Reality: most deployed techniques for securing BGP have been at the local level Filtering Securing BGP peering Future: a number of complex protocols have been proposed to solve some or all BGP security issue S-BGP sobgp IRV SPV BGPSEC We will be looking at these solutions over the next couple of lectures CSE598K/CSE545 - Advanced Network Security - McDaniel 65

66 Filtering Filtering just drops BGP message (typically advertisements) as they are passed between ASes Ingress filtering (as it is received) Egress filtering (as it is sent) Types of filtering By prefix (e.g., bogon/martian list) By path (e.g., customer advertisement of provider routes) By policy (e.g., some community strings that represent paths/policies that an AS does not want to support) ISP ASes aggressively filter (the security mechanism) CSE598K/CSE545 - Advanced Network Security - McDaniel 66

67 Protecting Peer Communication Two routers exchanging BGP messages (in a BGP session) need to secure communication. Integrity Confidentiality? Authenticity Non-repudability? Note: This is often defined as a transport security issue, where just secure point-to-point communication is necessary. CSE598K/CSE545 - Advanced Network Security - McDaniel 67

68 MD5 A simple solution (RFC 2385) Share a private secret (e.g., password) Compute an keyed message authentication code on each TCP packet passed between the two routers Check MAC upon receipt of each packet You get Integrity Authenticity Problem: this is manual configuration, which neither scales to many routers or supports key maintenance CSE598K/CSE545 - Advanced Network Security - McDaniel 68

69 Generalized TTL Security Mechanism TCP time-to-live (RFC 3682) At a packets origin, the TTL is set to the maximum number of hops that the packet can traverse TTL decremented at each hop Packets are dropped when TTL goes to 0 This ensures that packets stuck in transient routing loops do not congest the network Idea: can we use the TTL to ensure that every packet received came from peer (assuming one hop)? Set TTL = 255 (Q: how about TTL=1?) Receiver checks TTL on all packets, if not 254, then forged Issue: how much does this really tell you? CSE598K/CSE545 - Advanced Network Security - McDaniel 69

70 HOP Integrity HOP integrity protocols implement peering secure communication that provides integrity/authentication Diffie-Hellman style key negotiation, data integrity, data authentication Idea: provide public key based per hop security, and simple constructions to enforce integrity constraints Two protocols Weak - just per hop integrity (MAC) Strong - adds replay protection (sequence numbers) Note: used to secure communication between a range of peers via a per-hop security (limitation?) CSE598K/CSE545 - Advanced Network Security - McDaniel 70

71 Smith/Garcia-Luna-Aceves An (ad hoc?) suite of countermeasures 1. Encrypt all messages between peers 2. Add a message sequence number to all BGP messages Protects against replayed or deleted messages 3. Add a sequence number (or time-stamps) to UPDATES 4. Add a PREDECESSOR path attribute 5. Digitally sign all the UPDATEs Note: this gets beyond the basic peer security, and bleeds into the more general BGP security issues. CSE598K/CSE545 - Advanced Network Security - McDaniel 71

72 Question? What attacks do these measures prevent? If yes, how? Message replay Route replay Path forgery Path modification Forged route withdrawal Prefix hijacking CSE598K/CSE545 - Advanced Network Security - McDaniel 72

73 IPsec IPsec provides all of the basic guarantees needed to implement router-to-router BGP security Independent of intermediate connectivity IKE/ISAKMP used to establish transient keys Avoids cryptanalysis of long running keys ESP/AH provide confidentiality, integrity, replay protection... Problems: this is just a start Overheads can be expensive if not managed correctly Backward compatibility (less now) Key management CSE598K/CSE545 - Advanced Network Security - McDaniel 73

74 Peering Summary Integrity Confidentiality Replay Prevention DOS Prevention IPsec (ESP) yes yes yes yes IPsec (AH) yes no yes yes MD5 Integrity yes no yes no HOP Protocol yes no yes no GTSM no no no no Smith.et al. yes yes yes no Reality: most of these schemes were hacks or stop-gap measures until IPsec became widely available Where secured at all, IPsec is generally used AH/ESP w/out confidentiality is popular Singly-homed customer/isp peering is often not secured at all Question: why is this reasonable? CSE598K/CSE545 - Advanced Network Security - McDaniel 74

75 BGP Security Protocols The big two, plus one sbgp (Secure Border Gateway Protocol) [Kent et al. 99] sobgp (Secure Origin BGP) [White et al. 03] IRV (Internet Routing Validation) [Goodell et al. 03] CSE598K/CSE545 - Advanced Network Security - McDaniel 75

76 sbgp sbgp was the first leading candidate for routing security, and highlighted much of IR security issues Still under consideration, but somewhat limited Model: Routing and origination announcements are signed signatures are validated based on shared trust associations (CAs) It all begins with the keys (really two parallel PKIs) 1. Binding routers and organizations to ASes. 2. Origin authentication PKI CSE598K/CSE545 - Advanced Network Security - McDaniel 76

77 Organization PKI Keys for routers, AS numbers Route attestations - attestations to the transient state of the network, e.g., the advertisements/routes Keys used to create these advertisements Router certificates need to ascertain validity of instantaneous advertisements. You need to prove association between the network elements making statements and AS/organizations CSE598K/CSE545 - Advanced Network Security - McDaniel 77

78 Route Attestations AS 1 AS 2 AS 3 AS 4 AS 5 Signing recursively: each advertisement signs everything it receives, plus the last hop. (5, (4, (3, (2, 1) kas1 ) kas2 ) kas3 ) kas4 CSE598K/CSE545 - Advanced Network Security - McDaniel 78

79 Address Attestations Attestations of ownership and delegation These are the simple attestations For example, assume that organization A delegates prefix p to organization B: (p, B) ka Note: (surprisingly) sbgp distributes with address attestations out-of-band Thus everyone is required to obtain and validate their own copies of origin/ownership proving certificates. As in OA, validate path to ICANN CSE598K/CSE545 - Advanced Network Security - McDaniel 79

80 sbgp Issues Single point of trust: is an authority that everyone will trust to provide address/path certification? Chinese Military vs. NSA? Cost: validating signatures is very computationally expensive Can a router sustain the load? Incremental deployability: requires changes to BGP message formats All implementations must change CSE598K/CSE545 - Advanced Network Security - McDaniel 80

81 sobgp CISCO s entry in the securing Internet routing rodeo Viewed as the manufacturer approach to implementing security within BGP Released as a kind of refutation of sbgp, which was seen as too expensive and unwieldy to be practical. A more open model that allows providers to implement security much more flexibly, i.e., within the confines of existing policy and infrastructure Basic approach: network providers themselves act as a joint authority, and issue certificates for all relevant routing data, e.g., policy, address management, paths. CSE598K/CSE545 - Advanced Network Security - McDaniel 81

82 sobgp Design Requirements System should take advantage of operational experience and existing Internet Architecture. Implicit trust built into the Internet IP address assignment and delegation system Minimize impact to current implementations of the BGP protocol Minimum changes to existing protocol formats. Optimize memory and processing requirements. CSE598K/CSE545 - Advanced Network Security - McDaniel 82

83 sobgp Design Requirements Must not rely on a central authority of any type. Distributed processing and trust Must be incrementally deployable (it must provide some level of security without the participation of every AS). CSE598K/CSE545 - Advanced Network Security - McDaniel 83

84 Solution* Verifies originator of a route is authorized to do so. Verifies that the advertised AS_PATH represents a valid path to the originator. (plausible path?) BGP Security Message (extension to BGP) New BGP Message used to carry security information No changes to existing messages for backwards compatibility and incremental deployment. (removal of messages?) Leverages existing protocol and security mechanisms Fixed additional scalability requirements Per-AS information and route policies advertised once. (caching) No additional information in UPDATES, resulting in low processing impact. (well, sort of) CSE598K/CSE545 - Advanced Network Security - McDaniel *CISCO text in black, my text in red. 84

85 BGPSEC CSE598K/CSE545 - Advanced Network Security - McDaniel 85

86 Certificates Databases of certificates that advertise and correlate AS identity, prefix ownership and route policy. Certificate types: Entity Certificate = Used to establish (AS) identity Authorization Certificate = Assigns/delegates IP addresses Policy Certificate = Used to define per-as or pre-prefix policies and propagate AS interconnectivity topology map Certificate exchanges/trust relations are not defined Prior to or within routing exchanges Uses Web-of-Trust model to validate certificates. CSE598K/CSE545 - Advanced Network Security - McDaniel 86

87 PolicyCerts AS 1 AS 2 AS 3 AS 4 AS 5 Pairwise signing: the topology database contains peering attestations. (2, 1) kas1, (3, 2) kas2, (4, 3) kas3, (4, 5) kas4 CSE598K/CSE545 - Advanced Network Security - McDaniel 87

88 AuthCert and EntityCert AuthCerts define the delegation of address space Operates in essentially the same way as sbgp/oa Some looked at OA in sobgp and looked to learn the correct address assignment by viewing history Kinda intrusion detection for address usage (open problem) EntityCerts identifies who/what router is associated with which AS. Again note: which of these certs you believe is up to you (its a web of trust, caveat emptor) CSE598K/CSE545 - Advanced Network Security - McDaniel 88

89 Path Authentication vs. Path Plausibility Is Path Authentication stronger than Path Plausibility? Since each AS in sbgp is authentication a relationship between itself and its predecessor and successor ASes, the set of acceptable AS paths in sbgp is a subset of the set paths acceptable under SoBGP Argue for (and explain why or why not): AS 1 AS 2 AS 3 AS 4 AS 5 (5, (4, (3, (2, 1) kas1 ) kas2 ) kas3 ) kas4 (2, 1) kas1, (3, 2) kas2, (4, 3) kas3, (4, 5) kas4 Q1: Is Path Lengthening in sobgp but not sbgp? Q2: Is Path Shortening possible in sbgp but not sobgp? CSE598K/CSE545 - Advanced Network Security - McDaniel 89

90 sobgp Issues Soft security: the guarantees provided are limited E.g., plausible, not actual secure paths Nebulus trust: not clear under what conditions or trust model a certificate was created Signatures in web of trust have unclear semantics Assumes transitive trust CSE598K/CSE545 - Advanced Network Security - McDaniel 90

91 IRV Intended to solve BGP without changing any of existing routing infrastructure [Goodell et al. 2003] Idea: validate all information by actively querying databases of policy, address, and path information provided by Post-facto verification - receive and optimistically accept routing information AS-centralized verification - an IRV service exists outside the domain of the AS, provides validation information in real time to all routers (win--no per router cost) CSE598K/CSE545 - Advanced Network Security - McDaniel 91

92 IRV Operation ASes provide a well-known IRV server from which any external party can query for the validity of information Authenticated responses provide assurance that advertisements are correct Routing Policy Specification Language (RPSL) BGP Router IRV AS1 IRV I R V Q u e r y IRV AS2 AS3 CSE598K/CSE545 - Advanced Network Security - McDaniel 92

93 IRV Issues DOS opportunities - IRV can get flooded with requests by malicious party Under normal operation following, for example, a table reset. Offline operation - when the network fails, little ability to return system to stable state Possible solutions: Peering repositories Shadow control network CSE598K/CSE545 - Advanced Network Security - McDaniel 93

94 BGP Security Now: After almost two decades of work, we are not much closer to a global security solution... Problems are often not technical... Cost of building routers Backward compatibility Incremental deployment Future: we will move from a border filtering to more and more cryptographically aided solutions. Mining past advertisements and understanding expected routing advertisements will also be key where crypto is not appropriate or feasible. CSE598K/CSE545 - Advanced Network Security - McDaniel 94

Routing Security Security Solutions

Routing Security Security Solutions Routing Security Security Solutions CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 Page 1 Solving BGP Security Reality: most attempts at securing BGP have been at the local level

More information

Module: Routing Security. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Module: Routing Security. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security CMPSC443 - Introduction to Computer and Network Security Module: Routing Security Professor Patrick McDaniel Spring 2009 1 Routing 101 Network routing exists to provide hosts desirable paths from the source

More information

Routing Security* CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring * Thanks to Steve Bellovin for slide source material.

Routing Security* CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring * Thanks to Steve Bellovin for slide source material. Routing Security* CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 * Thanks to Steve Bellovin for slide source material. 1 Routing 101 Network routing exists to provide hosts desirable

More information

Network Security - ISA 656 Routing Security

Network Security - ISA 656 Routing Security Network Security - ISA 656 Angelos Stavrou December 4, 2007 What is? What is Routing Security? History of Routing Security Why So Little Work? How is it Different? The Enemy s Goal? Bad guys play games

More information

Steven M. Bellovin AT&T Labs Research Florham Park, NJ 07932

Steven M. Bellovin AT&T Labs Research Florham Park, NJ 07932 Steven M. Bellovin! " $#"##%& '( ) * 973-360-8656 AT&T Labs Research Florham Park, NJ 07932 Steven M. Bellovin June 13, 2003 1 What is? Bad guys play games with routing protocols. Traffic is diverted.

More information

A Survey of BGP Security: Issues and Solutions

A Survey of BGP Security: Issues and Solutions A Survey of BGP Security: Issues and Solutions Butler, Farley, McDaniel, Rexford Kyle Super CIS 800/003 October 3, 2011 Outline Introduction/Motivation Sources of BGP Insecurity BGP Security Today BGP

More information

Network Security - ISA 656 Routing Security

Network Security - ISA 656 Routing Security What is? Network Security - ISA 656 Angelos Stavrou What is Routing Security? History of Routing Security Why So Little Work? How is it Different? Bad guys play games with routing protocols. Traffic is

More information

Securing BGP. Geoff Huston November 2007

Securing BGP. Geoff Huston November 2007 Securing BGP Geoff Huston November 2007 Agenda An Introduction to BGP BGP Security Questions Current Work Research Questions An Introduction to BGP Background to Internet Routing The routing architecture

More information

A Survey of BGP Security Review

A Survey of BGP Security Review A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border

More information

CSCD 433/533 Network Programming Fall Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing

CSCD 433/533 Network Programming Fall Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing CSCD 433/533 Network Programming Fall 2012 Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing 1 Topics Interdomain Routing BGP Interdomain Routing Benefits vs. Link State Routing

More information

Security Issues of BGP in Complex Peering and Transit Networks

Security Issues of BGP in Complex Peering and Transit Networks Technical Report IDE-0904 Security Issues of BGP in Complex Peering and Transit Networks Presented By: Supervised By: Muhammad Adnan Khalid Qamar Nazir Olga Torstensson Master of Computer network engineering

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 15 BGP Spring 2018 Rachit Agarwal Autonomous System (AS) or Domain Region of a network under a single administrative entity Border Routers Interior

More information

CNT Computer and Network Security: BGP Security

CNT Computer and Network Security: BGP Security CNT 5410 - Computer and Network Security: BGP Security Professor Kevin Butler Fall 2015 Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means

More information

Lecture outline. Internet Routing Security Issues. Previous lecture: Effect of MinRouteAdver Timer. Recap of previous lecture

Lecture outline. Internet Routing Security Issues. Previous lecture: Effect of MinRouteAdver Timer. Recap of previous lecture Lecture outline Internet Routing Security Issues Z. Morley Mao Lecture 3 Jan 14, 2003 Recap of last lecture, any questions? Existing routing security mechanisms - SBGP General threats to routing protocols

More information

Securing BGP Networks using Consistent Check Algorithm

Securing BGP Networks using Consistent Check Algorithm Securing BGP Networks using Consistent Check Algorithm C. K. Man, K.Y. Wong, and K. H. Yeung Abstract The Border Gateway Protocol (BGP) is the critical routing protocol in the Internet infrastructure.

More information

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing

More information

Security in inter-domain routing

Security in inter-domain routing DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks

More information

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783.

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783. Understanding, Implementing and troubleshooting BGP 01 Introduction http:// Instructor Introduction Keith Barker, CCIE #6783 CCIE Routing and Switching 2001 CCIE Security 2003 kbarker@ine.com YouTube -

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology internet technologies and standards Piotr Gajowniczek BGP (Border Gateway Protocol) structure of the Internet Tier 1 ISP Tier 1 ISP Google

More information

PART III. Implementing Inter-Network Relationships with BGP

PART III. Implementing Inter-Network Relationships with BGP PART III Implementing Inter-Network Relationships with BGP ICNP 2002 Routing Protocols Autonomous System BGP-4 BGP = Border Gateway Protocol Is a Policy-Based routing protocol Is the de facto EGP of today

More information

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding

More information

Internet Routing : Fundamentals of Computer Networks Bill Nace

Internet Routing : Fundamentals of Computer Networks Bill Nace Internet Routing 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Looking Ahead Lab #2 just due Quiz #2

More information

On the State of the Inter-domain and Intra-domain Routing Security

On the State of the Inter-domain and Intra-domain Routing Security On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing

More information

COMP/ELEC 429 Introduction to Computer Networks

COMP/ELEC 429 Introduction to Computer Networks COMP/ELEC 429 Introduction to Computer Networks Lecture 11: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 12: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-3 BGP Outline BGP ASes, Policies BGP Attributes BGP Path Selection ibgp 2 1 Autonomous Systems (ASes) Autonomous Routing Domain Glued together by a common administration,

More information

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP) Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be

More information

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection

More information

Module 6 Implementing BGP

Module 6 Implementing BGP Module 6 Implementing BGP Lesson 1 Explaining BGP Concepts and Terminology BGP Border Gateway Protocol Using BGP to Connect to the Internet If only one ISP, do not need BGP. If multiple ISPs, use BGP,

More information

Examination. ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491

Examination. ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Examination ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: October 21st 2008 10:00 13:00 a) No help material is allowed

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea CS 640 2 Internet Structure Today CS 640 3 Route Propagation in the Internet Autonomous System (AS) corresponds to

More information

Routing Unicast routing protocols

Routing Unicast routing protocols Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type

More information

Internet Routing Protocols Lecture 03 Inter-domain Routing

Internet Routing Protocols Lecture 03 Inter-domain Routing Internet Routing Protocols Lecture 03 Inter-domain Routing Advanced Systems Topics Lent Term, 2008 Timothy G. Griffin Computer Lab Cambridge UK Autonomous Routing Domains A collection of physical networks

More information

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure Outline 15-441 15-441 Computer Networking 15-641 Lecture 10: Inter-Domain outing Border Gateway Protocol -BGP Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 outing hierarchy Internet structure

More information

Interdomain Routing Reading: Sections K&R EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277)

Interdomain Routing Reading: Sections K&R EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277) Interdomain Routing Reading: Sections K&R 4.6.3 EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277) Guest Lecture by Brighten Godfrey Instructor: Vern Paxson TAs: Lisa Fowler, Daniel

More information

Interdomain Routing Reading: Sections P&D 4.3.{3,4}

Interdomain Routing Reading: Sections P&D 4.3.{3,4} Interdomain Routing Reading: Sections P&D 4.3.{3,4} EE122: Intro to Communication Networks Fall 2006 (MW 4:00-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/

More information

BGP. Inter-domain routing with the Border Gateway Protocol. Iljitsch van Beijnum Amsterdam, 13 & 16 March 2007

BGP. Inter-domain routing with the Border Gateway Protocol. Iljitsch van Beijnum Amsterdam, 13 & 16 March 2007 BGP Inter-domain routing with the Border Gateway Protocol Iljitsch van Beijnum Amsterdam, 13 & 16 March 2007 1 Routing Between ISPs Internal routing protocols don't work here: too much information So:

More information

Routing. Jens A Andersson Communication Systems

Routing. Jens A Andersson Communication Systems Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data

More information

BGP. Autonomous system (AS) BGP version 4

BGP. Autonomous system (AS) BGP version 4 BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 1.5, 2011/03/06 13:35:28) Monday, March 7, 2011 General ideas behind BGP Background Providers,

More information

Operation Manual BGP. Table of Contents

Operation Manual BGP. Table of Contents Table of Contents Table of Contents... 1-1 1.1 BGP/MBGP Overview... 1-1 1.1.1 Introduction to BGP... 1-1 1.1.2 BGP Message Types... 1-2 1.1.3 BGP Routing Mechanism... 1-2 1.1.4 MBGP... 1-3 1.1.5 BGP Peer

More information

Internet Routing Protocols Lecture 01 & 02

Internet Routing Protocols Lecture 01 & 02 Internet Routing Protocols Lecture 01 & 02 Advanced Systems Topics Lent Term, 2010 Timothy G. Griffin Computer Lab Cambridge UK Internet Routing Outline Lecture 1 : Inter-domain routing architecture, the

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Inter-Domain Routing Internet is a network of networks Hierarchy

More information

Connecting to a Service Provider Using External BGP

Connecting to a Service Provider Using External BGP Connecting to a Service Provider Using External BGP First Published: May 2, 2005 Last Updated: August 21, 2007 This module describes configuration tasks that will enable your Border Gateway Protocol (BGP)

More information

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System)

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System) BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 310, 2014/03/11 10:50:06) Monday, March 10, 2014 General ideas behind BGP Background Providers,

More information

BGP. Autonomous system (AS) BGP version 4

BGP. Autonomous system (AS) BGP version 4 BGP Border Gateway Protocol (an introduction) dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 11, 2008 General ideas behind BGP Background Providers, Customers and Peers External

More information

Lecture 18: Border Gateway Protocol

Lecture 18: Border Gateway Protocol Lecture 18: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday Some figures courtesy Mike Freedman & Craig Labovitz Lecture 18 Overview Path-vector Routing Allows scalable,

More information

Outline. 0 Topic 5.1: TCP/IP Vulnerabilities. 0 Topic 5.2: Routing Security

Outline. 0 Topic 5.1: TCP/IP Vulnerabilities. 0 Topic 5.2: Routing Security Outline 0 Topic 5.1: TCP/IP Vulnerabilities 0 TCP/IP security problems 0 Topic 5.2: Routing Security 0 BGP security 0 Topic 5.3: Attack Mitigation and Countermeasures 0 Topic 5.4: Attack Detection 2 TCP/IP

More information

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System)

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System) BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 1.9, 2012/03/14 10:21:22) Monday, March 12, 2012 General ideas behind BGP Background Providers,

More information

BGP Security. Kevin s Attic for Security Research

BGP Security. Kevin s Attic for Security Research Kevin s Attic for Security Research kevinkoo001@gmail.com Table 1. BGP Operation (1): Concept & Topology 2. BGP Operation (2): Message Exchange, Format and Path Decision Algorithm 3. Potential Attacks

More information

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011 Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn

More information

Introduction to IP Routing. Geoff Huston

Introduction to IP Routing. Geoff Huston Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet

More information

Border Gateway Protocol (an introduction) Karst Koymans. Monday, March 10, 2014

Border Gateway Protocol (an introduction) Karst Koymans. Monday, March 10, 2014 .. BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 3.10, 2014/03/11 10:50:06) Monday, March 10, 2014 Karst Koymans (UvA) BGP Monday, March

More information

Routing Between Autonomous Systems (Example: BGP4) RFC 1771

Routing Between Autonomous Systems (Example: BGP4) RFC 1771 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-7B Routing Between Autonomous Systems (Example: BGP4) RFC 1771 52 53 BGP4 Overview Example of Operations BGP4 is a path

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

Routing Protocols --- Exterior Gateway Protocol

Routing Protocols --- Exterior Gateway Protocol Content Routing Protocols --- Exterior Gateway Protocol Linda Wu (CMPT 471 23-3) Limiting router interaction Autonomous system BGP protocol BGP messages Other issues on BGP Reference: chapter 15 Notes-13

More information

Ravi Chandra cisco Systems Cisco Systems Confidential

Ravi Chandra cisco Systems Cisco Systems Confidential BGP4 1 Ravi Chandra cisco Systems 0799_04F7_c2 Cisco Systems Confidential 2 Border Gateway Protocol (BGP) Introduction to BGP BGP Peer Relationship BGP Attributes Applying Policy with BGP Putting it all

More information

Configuring BGP. Cisco s BGP Implementation

Configuring BGP. Cisco s BGP Implementation Configuring BGP This chapter describes how to configure Border Gateway Protocol (BGP). For a complete description of the BGP commands in this chapter, refer to the BGP s chapter of the Network Protocols

More information

Lecture 17: Border Gateway Protocol

Lecture 17: Border Gateway Protocol Lecture 17: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren Some figures courtesy Mike Freedman Lecture 18 Overview Border Gateway Protocol (BGP) The canonical path vector protocol How

More information

BGP. Autonomous system (AS) BGP version 4

BGP. Autonomous system (AS) BGP version 4 BGP Border Gateway Protocol (an introduction) dr. C. P. J. Koymans Informatics Institute University of Amsterdam (version 1.3, 2010/03/10 20:05:02) Monday, March 8, 2010 General ideas behind BGP Background

More information

CS BGP v4. Fall 2014

CS BGP v4. Fall 2014 CS 457 - BGP v4 Fall 2014 Autonomous Systems What is an AS? a set of routers under a single technical administration uses an interior gateway protocol (IGP) and common metrics to route packets within the

More information

Internet Interconnection Structure

Internet Interconnection Structure Internet Interconnection Structure Basic Concepts (1) Internet Service Provider (ISP) Provider who connects an end user customer with the Internet in one or few geographic regions. National & Regional

More information

Lecture 16: Border Gateway Protocol

Lecture 16: Border Gateway Protocol Lecture 16: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren Some figures courtesy Mike Freedman Lecture 16 Overview Border Gateway Protocol (BGP) The canonical path vector protocol How

More information

A Measurement Study of BGP Misconfiguration

A Measurement Study of BGP Misconfiguration A Measurement Study of BGP Misconfiguration Ratul Mahajan, David Wetherall, and Tom Anderson University of Washington Motivation Routing protocols are robust against failures Meaning fail-stop link and

More information

Outline. Organization of the global Internet. BGP basics Routing policies The Border Gateway Protocol How to prefer some routes over others

Outline. Organization of the global Internet. BGP basics Routing policies The Border Gateway Protocol How to prefer some routes over others BGP/2003.2.1 November 2004 Outline Organization of the global Internet BGP basics Routing policies The Border Gateway Protocol How to prefer some routes over others BGP in large networks Interdomain traffic

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0

More information

BGP Protocol & Configuration. Scalable Infrastructure Workshop AfNOG2008

BGP Protocol & Configuration. Scalable Infrastructure Workshop AfNOG2008 BGP Protocol & Configuration Scalable Infrastructure Workshop AfNOG2008 Border Gateway Protocol (BGP4) Case Study 1, Exercise 1: Single upstream Part 6: BGP Protocol Basics Part 7: BGP Protocol - more

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in

More information

A Survey of BGP Security Issues and Solutions

A Survey of BGP Security Issues and Solutions A Survey of BGP Security Issues and Solutions Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford 1 Abstract The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol

More information

Chapter 13 Configuring BGP4

Chapter 13 Configuring BGP4 Chapter 13 Configuring BGP4 This chapter provides details on how to configure Border Gateway Protocol version 4 (BGP4) on HP products using the CLI and the Web management interface. BGP4 is supported on

More information

Routing part 2. Electrical and Information Technology

Routing part 2. Electrical and Information Technology Routing part 2 Jens A Andersson Electrical and Information Technology Routing Introduction Inside the Router Unicast Routing Intra Domain Routing Inter Domain Routing MANET and AdHoc routing Multicast

More information

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System)

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System) BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 16.4, 2017/03/13 13:32:49) Tuesday, March 14, 2017 General ideas behind BGP Background

More information

TDC 375 Network Protocols TDC 563 P&T for Data Networks

TDC 375 Network Protocols TDC 563 P&T for Data Networks TDC 375 Network Protocols TDC 563 P&T for Data Networks Routing Threats TDC 375/563 Spring 2013/14 John Kristoff DePaul University 1 One of two critical systems Routing (BGP) and naming (DNS) are by far

More information

Connecting to a Service Provider Using External BGP

Connecting to a Service Provider Using External BGP Connecting to a Service Provider Using External BGP This module describes configuration tasks that will enable your Border Gateway Protocol (BGP) network to access peer devices in external networks such

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

Border Gateway Protocol (an introduction) Karst Koymans. Tuesday, March 8, 2016

Border Gateway Protocol (an introduction) Karst Koymans. Tuesday, March 8, 2016 .. BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 15.6, 2016/03/15 22:30:35) Tuesday, March 8, 2016 Karst Koymans (UvA) BGP Tuesday,

More information

EECS 122, Lecture 17. The Distributed Update Algorithm (DUAL) Optimization Criteria. DUAL Data Structures. Selecting Among Neighbors.

EECS 122, Lecture 17. The Distributed Update Algorithm (DUAL) Optimization Criteria. DUAL Data Structures. Selecting Among Neighbors. EECS 122, Lecture 17 Kevin Fall kfall@cs.berkeley.edu edu The Distributed Update Algorithm (DUAL) J.J. Garcia-Luna Luna-Aceves [SIGCOMM 89] Aims at removing transient loops in both DV and LS routing protocols

More information

Vendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Border Gateway Protocol. Version: Demo

Vendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Border Gateway Protocol. Version: Demo Vendor: Alcatel-Lucent Exam Code: 4A0-102 Exam Name: Alcatel-Lucent Border Gateway Protocol Version: Demo QUESTION 1 Upon the successful establishment of a TCP session between peers, what type of BGP message

More information

Configuring BGP community 43 Configuring a BGP route reflector 44 Configuring a BGP confederation 44 Configuring BGP GR 45 Enabling Guard route

Configuring BGP community 43 Configuring a BGP route reflector 44 Configuring a BGP confederation 44 Configuring BGP GR 45 Enabling Guard route Contents Configuring BGP 1 Overview 1 BGP speaker and BGP peer 1 BGP message types 1 BGP path attributes 2 BGP route selection 6 BGP route advertisement rules 6 BGP load balancing 6 Settlements for problems

More information

A PKI For IDR Public Key Infrastructure and Number Resource Certification

A PKI For IDR Public Key Infrastructure and Number Resource Certification A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect

More information

Other Developments: CIDR

Other Developments: CIDR Other Developments: CIDR CIDR (classless Inter domain routing) Too many small networks requiring multiple class C addresses Running out of class B addresses, not enough nets in class A Assign contiguous

More information

BGP Commands. Network Protocols Command Reference, Part 1 P1R-355

BGP Commands. Network Protocols Command Reference, Part 1 P1R-355 BGP Commands Use the commands in this chapter to configure and monitor Border Gateway Protocol (BGP). For BGP configuration information and examples, refer to the Configuring BGP chapter of the Network

More information

Link State Routing & Inter-Domain Routing

Link State Routing & Inter-Domain Routing Link State Routing & Inter-Domain Routing CS640, 2015-02-26 Announcements Assignment #2 is due Tuesday Overview Link state routing Internet structure Border Gateway Protocol (BGP) Path vector routing Inter

More information

Professor Yashar Ganjali Department of Computer Science University of Toronto.

Professor Yashar Ganjali Department of Computer Science University of Toronto. Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Don t forget the programming assignment Due: Friday

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Interdomain Routing Design for MobilityFirst

Interdomain Routing Design for MobilityFirst Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network

More information

TELE 301 Network Management

TELE 301 Network Management TELE 301 Network Management Lecture 24: Exterior Routing and BGP Haibo Zhang Computer Science, University of Otago TELE301 Lecture 16: Remote Terminal Services 1 Today s Focus How routing between different

More information

CS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing:

CS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing: : Computer Networks Lecture 4, Part 5: Mar 1, 2004 Internet Routing: AS s, igp, and BGP As we said earlier, the Internet is composed of Autonomous Systems (ASs) Where each AS is a set of routers, links,

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

Routing Basics. ISP Workshops. Last updated 10 th December 2015

Routing Basics. ISP Workshops. Last updated 10 th December 2015 Routing Basics ISP Workshops Last updated 10 th December 2015 1 Routing Concepts p IPv4 & IPv6 p Routing p Forwarding p Some definitions p Policy options p Routing Protocols 2 IPv4 p Internet still uses

More information

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1 Network Protocols Routing TDC375 Autumn 03/04 John Kristoff - DePaul University 1 IPv4 unicast routing All Internet hosts perform basic routing for local net destinations, forward to local host for non-local

More information

EE 122: Inter-domain routing Border Gateway Protocol (BGP)

EE 122: Inter-domain routing Border Gateway Protocol (BGP) EE 122: Inter-domain routing Border Gateway Protocol (BGP) Ion Stoica October 2, 2002 (* this presentation is based on Lakshmi Subramanian s slides) Big Picture Large ISP Large ISP St u b D i al - U p

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

CS 457 Networking and the Internet. The Global Internet (Then) The Global Internet (And Now) 10/4/16. Fall 2016

CS 457 Networking and the Internet. The Global Internet (Then) The Global Internet (And Now) 10/4/16. Fall 2016 CS 457 Networking and the Internet Fall 2016 The Global Internet (Then) The tree structure of the Internet in 1990 The Global Internet (And Now) A simple multi-provider Internet 1 The Global Internet Some

More information

Using MSDP to Interconnect Multiple PIM-SM Domains

Using MSDP to Interconnect Multiple PIM-SM Domains Using MSDP to Interconnect Multiple PIM-SM Domains This module describes the tasks associated with using Multicast Source Discovery Protocol (MSDP) to interconnect multiple Protocol Independent Multicast

More information

Protecting an EBGP peer when memory usage reaches level 2 threshold 66 Configuring a large-scale BGP network 67 Configuring BGP community 67

Protecting an EBGP peer when memory usage reaches level 2 threshold 66 Configuring a large-scale BGP network 67 Configuring BGP community 67 Contents Configuring BGP 1 Overview 1 BGP speaker and BGP peer 1 BGP message types 1 BGP path attributes 2 BGP route selection 6 BGP route advertisement rules 6 BGP load balancing 6 Settlements for problems

More information

CS 204: BGP. Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences

CS 204: BGP. Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences CS 204: BGP Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Overview AS relationships Inter-AS routing BGP Example Paper discussion

More information

Next Lecture: Interdomain Routing : Computer Networking. Outline. Routing Hierarchies BGP

Next Lecture: Interdomain Routing : Computer Networking. Outline. Routing Hierarchies BGP Next Lecture: Interdomain Routing BGP 15-744: Computer Networking L-3 BGP Assigned Reading MIT BGP Class Notes [Gao00] On Inferring Autonomous System Relationships in the Internet Ooops 2 Outline Need

More information