Keying & Authentication for Routing Protocols (KARP) draft-lebovitz-kmart-roadmap-03

Similar documents
Internet Engineering Task Force (IETF) Request for Comments: 6862 Category: Informational. B. Weis Cisco Systems March 2013

Internet Engineering Task Force (IETF) Category: Informational. L. Zheng Huawei Technologies May 2013

An Operational Perspective on BGP Security. Geoff Huston February 2005

Problem Statement and Considerations for ROA Mergence. 96 SIDR meeting

Control Plane Security Overview

Global Table Multicast with BGP-MVPN Protocol draft-zzhang-mboned-mvpn-global-table-mcast-00

Introduction to BGP ISP/IXP Workshops

IETF Activities Update

Internet Engineering Task Force (IETF) Category: Informational. June 2014

IETF Activities Update

NETLMM Security Threats on the MN-AR Interface draft-kempf-netlmm-threats-00.txt

Agenda DUAL STACK DEPLOYMENT. IPv6 Routing Deployment IGP. MP-BGP Deployment. OSPF ISIS Which one?

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011

CIS 5373 Systems Security

Protecting an EBGP peer when memory usage reaches level 2 threshold 66 Configuring a large-scale BGP network 67 Configuring BGP community 67

Security Baseline Data Model for Network Infrastructure Device draft-xia-sacm-nid-dp-security-baseline-00 draft-dong-sacm-nid-cp-security-baseline-00

IETF Activities Update

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

IETF Activities Update

How does Internet (Big-I) routing work? The Internet is broken up into Autonomous Systems (AS) An AS is an administrative boundary. Each ISP has 1 or

BGP-TE APPLICATION LEVEL TOPOLOGY INTELLIGENCE

Network Configuration Example

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

IPv6 Flow Label Specification

Routing Protocols. Technology Description BGP CHAPTER

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model

Internet Routing : Fundamentals of Computer Networks Bill Nace

ASM. Engineering Workshops

Network Working Group Request for Comments: 3446 Category: Informational H. Kilmer D. Farinacci Procket Networks January 2003

Configuring BGP community 43 Configuring a BGP route reflector 44 Configuring a BGP confederation 44 Configuring BGP GR 45 Enabling Guard route

TDC 375 Network Protocols TDC 563 P&T for Data Networks

Bidirectional Forwarding Detection (BFD) NANOG 39

Subject: Adhoc Networks

Configuration prerequisites 45 Configuring BGP community 45 Configuring a BGP route reflector 46 Configuring a BGP confederation 46 Configuring BGP

Egress Protection (draft-shen-mpls-egress-protection-framework) Presented by Krzysztof G. Szarkowicz NANOG71 October 4, 2017

mdns/dnssd Threat Model

IP over ETH over IEEE draft-riegel-16ng-ip-over-eth-over Max Riegel

Narten Thomas ARIN

Introduction to BGP. ISP/IXP Workshops

Table of Contents. BGP Configuration 1

When the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Introduction to Routing

IPv6 Module 6x ibgp and Basic ebgp

Module 6 ibgp and Basic ebgp

Category: Standards Track Redback Networks June 2008

TELE 301 Network Management

IETF RFCs Supported by Cisco NX-OS Unicast Features Release 6.x

IPv6- IPv4 Threat Comparison v1.0. Darrin Miller Sean Convery

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

ISP Border Definition. Alexander Azimov

Enhanced Feasible-Path Unicast Reverse Path Filtering draft-sriram-opsec-urpf-improvements-01

Introduction to OSPF

A Border Gateway Protocol 3 (BGP-3) DNS Extensions to Support IP version 6. Path MTU Discovery for IP version 6

Analysis of VPLS Deployment

Internet Engineering Task Force (IETF) Category: Standards Track. T. Morin France Telecom - Orange Y. Rekhter. Juniper Networks.

Lecture 13 Page 1. Lecture 13 Page 3

PIM-tunnels and MPLS P2MP as Multicast data plane in IPTV and MVPN. Lesson learned

SSL/TLS. How to send your credit card number securely over the internet

CS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing:

Securing BGP: The current state of RPKI. Geoff Huston Chief Scientist, APNIC

Module 14 Transit. Objective: To investigate methods for providing transit services. Prerequisites: Modules 12 and 13, and the Transit Presentation

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

RPKI and Internet Routing Security ~ The regional ISP operator view ~

High Availability for 2547 VPN Service

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783.

Peering observations on security and resiliency at IXPs Greg Hankins, AS NANOG 67

APT: A Practical Transit-Mapping Service Overview and Comparisons

Vendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Border Gateway Protocol. Version: Demo

BGP Origin Validation

Time Synchronization Security using IPsec and MACsec

ENTERPRISE MPLS. Kireeti Kompella

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Module 6 More ibgp, and Basic ebgp Configuration

Introduction to Segment Routing

BraindumpsQA. IT Exam Study materials / Braindumps

Cisco Implementing Cisco IP Routing v2.0 (ROUTE)

Intended status: Informational Expires: March 7, 2019 Huawei Technologies N. Leymann Deutsche Telekom G. Swallow Independent September 3, 2018

Juniper Exam JN0-643 Enterprise Routing and Switching, Professional (JNCIP-ENT) Version: 13.0 [ Total Questions: 221 ]

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes

Emerging MPLS OAM mechanisms

WAN Edge MPLSoL2 Service

Architectural Approaches to Multi-Homing for IPv6

CSC 6575: Internet Security Fall 2017

Module 18 Transit. Objective: To investigate methods for providing transit services. Prerequisites: Modules 12 and 13, and the Transit Presentation

Juniper JN0-647 Exam. Volume: 65 Questions. Question: 1 Which protocol is a multicast routing protocol? A. OSPF B. BGP C. PIM D. IS-IS.

Security by BGP 101 Building distributed, BGP-based security system

Supported Standards. Class of Service Tagging for Ethernet frames. Multiple Spanning Tree Protocol. Rapid Spanning Tree Protocol

CCNP 1: Advanced Routing

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Expires: January 16, 2014 Painless Security D. Zhang Huawei July 15, 2013

A Reference Model for Autonomic Networking draft-behringer-anima-reference-model-00.txt

Lecture 12 Page 1. Lecture 12 Page 3

UNIT 1 Questions & Solutions

IPv6 Module 6 ibgp and Basic ebgp

Bank Infrastructure - Video - 1

Configuring MPLS L3VPN

Configuring BGP on Cisco Routers Volume 1

Using MSDP to Interconnect Multiple PIM-SM Domains

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Transcription:

Keying & Authentication for Routing Protocols (KARP) KARP BoF IETF76, Hiroshima, Tue, 09 Nov, 2009 Gregory M. Lebovitz, Juniper gregory.ietf@gmail.com

Intellectual Property When starting a presentation you MUST say if: There is IPR associated with your draft The restrictions listed in section 5 of RFC 3978/4748 apply to your draft No IPR that I know of on this document. No restrictions.

Agenda Goals / Overview Threat Model Requirements Framework What changed in -03

Agenda Goals / Overview Threat Model Requirements Framework What changed in -03

We have a Big Harry Audacious Goal Harden the Internet s routing infrastructure Achieve via incremental improvements Allow routing protocol documents to advance with step by step security improvements Will take some time to get to best-possiblesecurity-known-to-man-kind

Direction from RFC4948 Mar 2006 Unwanted Internet Traffic IAB workshop, RFC 4948, Sect 8.1 "A simple risk analysis would suggest that an ideal attack target of minimal cost but maximal disruption is the core routing infrastructure. Sect 8.2 Tightening the security of the core routing infrastructure via four steps: More secure mechanisms and practices for operating routers. AI: OPSEC WG. Clean up the Internet Routing Registry repository [IRR], and securing both the database and the access, so that it can be used for routing verifications. AI: Liaisons with the RIR's & IRR s globally. Specifications for cryptographic validation of routing message content. AI: SIDR WG. Securing the routing protocols' packets on the wire. AI: KARP

KARP is more narrowly scoped Prevent attacks at the Routing Protocol s bits on the wire Cryptographically provide: Neighbor Authentication & Message Integrity First with Manual Keys, next with KMPs

Agenda Goals / Overview Threat Model Requirements Framework What changed in -03

We want to prevent: High Level Threat Coverage: Attacks from OUTSIDERS, Rogue sender, nonauthorized peer Some DoS attacks Impersonation of peer Maliciously changing route messages while in transit Terminated employee issue

A bit more on threat model IN scope Spoofing Falsification Brute force attack against keys/passwords Interference Adding noise Replaying outdated packets Inserting messages Corrupting messages Breaking synchronization Change message content DoS on transport sub-system, on keying system, OUT of scope Sniffing Falsification before sending Interference due to Not forwarding packets Delaying message Denial of Receipt Unauthorized message content (SIDR) Any other DoS attacks

KARP is NOT Message Confidentiality, i.e. encrypting contents so people can t read it on the wire Message content validation; that s SIDR s aim STOP HERE Everyone On Board?

Auth usage is increasing!! 57% use TCP MD5 on ibgp 73% use TCP MD5 on ebgp 50% use MD5 on IGPs ALL USE 1 KEY, HAVEN T CHANGED A considerable increase was observed over previous editions of the survey for use of TCP MD5 with external peers (ebgp), internal peers (ibgp) and MD5 extensions for IGPs. - Arbor Networs Worldwide Infrastructure Security Report, Volume IV, Oct 2008

Agenda Goals / Overview Threat Model Requirements Framework What changed in -03

Employ contemporary cryptographic best practices Define protected elements of the transmission Strong algos Algo agility Secure use of simple PSK s Inter-conn. replay protection Intra-conn. replay protection Change parameters forces change of traffic keys Use new key within a connection without data loss Efficient re-keying Prevent in-scope DoS Change of security mechanism / Key causes refresh of route updates or additional route updates to be generated Support manual keying All for future use of KMP

Agenda Goals / Overview Threat Model Requirements Framework What changed in -03

We ll use a 2-steps program Step 1 (Sect 4.2) Beef up existing protocols basic authentication mechanism(s). Usually manual key or OOB management mechanism Strong algorithms, Algo agility, secure use of simple PSKs, Replay protection, mid-session key agility, etc. Get ready for a KMP, or at least don t do anything that would prevent using one.

Step 2 of 2 Introduce a KMP for operational efficiency gains Use a common Framework for multiple routing protocols 2 Step Example: TCP-AO First update manual key mode. Once done Introduce a KMP to provide those keys.

But why do we need a KMP? To address brute force attacks [RFC3562] recommends: frequent key rotation, limited key sharing, key length restrictions, etc. Advances in computational power make that management burden untenable for MD5 implementations in today s routing Keys must be of a size and composition that makes configuration and maintenance difficult or keys must be rotated with an unreasonable frequency. KMPs help A LOT, IF you can make them operationally usable

Step 1 KeyStore Configured PSK Traffic Keys Basic Routing Proto 1. Define protected elements 2. Strong algos 3. Algo agility 4. Secure use of simple PSK s 5. Inter-conn. replay protection 6. Intra-conn. replay protection 7. Change parameters forces change of traffic keys 8. Use new key within a connection without data loss 9. Efficient re-keying 10. Prevent in-scope DoS 11. Support manual keying 12. All for future use of KMP

Step 2 ID s KMP-to- KeyStore API KeyStore-to- Routing Proto API KMP Function KeyStore Traffic Keys Proof of ID s KMP-to-Routing Proto API Common Auth Mechanisms/I.F. s Basic Routing Proto 1. Layer in KMP 2. Define Identifier types/formats 3. Define ID proof mechanisms 4. Re-use KeyStore 5. Re-use Routing Proto s Manual key structure 6. Common Elements: 1. KeyStore 2. KeyStore-to-Routing Proto API 3. KMP-to-KeyStore API 4. KMP-to-Routing Proto API 5. KMP Function

Categorization Communication model One-to-One, e.g. BGP, LDP One-to-Many, e.g. OSPF, IS-IS Multicast, e.g. PIM Client-Server, BGP route reflector Discovery (?) Dave Ward Keying Model Peer Keying Group Keying

Categorize the work into like protocols Re-use as much as possible from common framework But not all Routing Protos created equally. Will be uniqueness for each grouping : PIM-SM BFD BGP/LDP/MSDP OSPF/ISIS/RIP RSVP, RSVP-TE

Agenda Goals / Overview Threat Model Requirements Framework What changed in -03

Changes in -03 Filled out the terminology section Added PIM-SM in 4.6 Priorities. Lowered OSPF & BFD, raised PIM- SM, per feedback on list. New text in work plan section: Transition and Deployment Considerations. Pulled some of Sect 4 out into own top level section Define where KMART and KARP came from in text Captured distinction of OSPF/IS-IS in P2P modes on PtP or NBMA networks, different than link-local Changed "BaseRP" to "Routing Protocol" throughout the doc Changed "KMART" to "KARP" in everything but the title, since the. Will change the title to KARP after the BoF. added "Brute Force Attacks Against Password/Keys" to Threats Section 2.1 section.

Changes in -03 Significant updates to Security Considerations section 4.3 2nd to last Paragraph - added a comment to clarify that two parties (or an org) must discuss ahead of time what they want their connections' security properties to be. - dward added 3.3 (but not sure if this is right)- endpoint discovery mechanisms? endpoint discovery mechanism (L2VPN, L3VPN, etc). Discovery is much different security properties than passing Routing updates. - dward More requirements: Added to 4.2: X - convergence SHOULD not be affected by what we choose; adding security SHOULD not cause a refresh of route updates or cause additional route updates to be generated; adding auth should not be an attack vector itself. updated stats on MD5 usage, and cited [ISR2008]. - mchpherson

Let s get to work Submit draft with new title, changing KMART to KARP Create 4 smaller docs. Additional Editors/Authors: Threat Model Requirements Framework Guidance to Routing Protocol KARP work teams

Feedback?