[nsp-sec] AS Path Forging - Observations from an incident
Hank Nussbacher
hank at efes.iucc.ac.il
Thu Jan 8 07:04:47 EST 2009
At 07:33 PM 01-12-08 -0500, Heather Schiller wrote:
>----------- nsp-security Confidential --------
>
>
>***Please do not redistribute.. standard NSP-sec confidentiality applies***
>
>A couple of weeks ago I stumbled across a case of ASpath forging.. (how?
>dumb luck and stubborn curiosity..) This seemed to get a lot of attention
>over the summer, everyone agreed it was a problem. I don't think anyone
>reported any incidents? So, I thought I'd write up a bit of what we saw
>and some thoughts about the problem in general. I would appreciate any
>feedback, suggestions or ideas.
>
> I think the real danger is that, if done correctly, the routes "look
> legitimate", nothing is "broken", no one complains, and it's likely to go
> entirely unnoticed.
>
>
>We noticed one netblock with an as-path that did not have a matching route
>inside our network.. when we looked further we saw several netblocks with
>the same path.
>
>In all cases the as-path was: 3277 3216 3549 701 11486
>
>We could easily verify where 701 and 11486 were forged, by checking our
>routes internally and seeing that the route did not exist, or did not
>match what we have internally. We were also able to use Global Crossing's
>looking glass to verify that they did not have these routes in their
>network either.
>
>Some of the netblocks were our IP space, but not assigned.. so we
>considered those straight hijacks and began announcing competing
>routes. Some of the netblocks were direct allocations from ARIN to our
>customers and were more specifics of routes we had in our network. We
>were concerned about a possible MITM for those.. but realized, there is no
>good way to verify this.
>
>By the time we could get our legal and management act together, the routes
>were gone.. One thing I would suggest, if you are an ISP and have strict
>policies on taking action, work w/ your mgmt or legal group to make sure
>your AUP covers this, and that you have an escalation process and
>documentation in place if your customer does this, or you discover someone
>else doing this.
>
>Not sure if anyone is interested, but below are some notes I pulled
>together about why these are such a pain. Other than a possible means of
>detection, I don't have much by way of solutions.. except that "we" (the
>peoples that run the internet) should collectively agree on some technical
>solution that includes a way to document AS relationships for prefixes and
>verify an organizations authority to use a resource.. netblocks and ASNs.
>
>
>Key Problems:
>
>Detection:
> 1) No mechanism exists to automatically detect and notify (see below for
> notes about why)
>
> 2) Since the aspath is forged, you aren't accepting the route back into
> your network (the aspath is looped so the route gets dropped) - so it's
> hard to see from your own network.
>
>
>Verification:
> 3) If you don't have access to the device configs or a looking glass you
> trust for each network, it is hard to verify each ASN in the path to
> figure out where the forgery is starting.
I am possibly encountering an issue with a forged /24. I am not interested
in prevention or resolution for now. I am interested in detection. The
path looks valid and doesn't have any strange ASNs. Any new ideas in the
past month to do MITM AS-path forging detection?
Thanks,
Hank
>Notification:
> 4) Since you can't identify who is starting the forgery, it is difficult
> to know who to notify.
>
>
>Resolution:
> 5) Successful resolution is when the offender stops announcing the
> route. No concrete method exits to motivate the offender to stop, short
> of terminating service or depeering.
> a) Announcing a competing route for the affected netblock disrupts
> them at best, but does not return the netblock to a useable state.
> b) Not accepting routes with the offeding AS similarly disrupts all of
> their traffic, but does not return the netblock to a useable state.
>
> 6) If a customer does this, all we can do is remove the prefix from
> their prefix list and not accept the announcement.
>
>
>Prevention:
> 7) No mechanism to prevent our customers from doing this. We can only
> verify that our customers are authorized to use the ASN we configure them
> with. They or their customers can forge the aspath of routes they send
> to us. (Look into a method to filter and reject based on the AS's in the
> path of routes they send us, and way to load list of acceptable ASN's in
> the path for each prefix (not just origin) Get that list published in RIR
> whois records or similar?)
>
> 8)Make sure our AUP/IPUP policies cover this and we have a process to
> notify, escalate and resolve if we find a customer doing this.
>
> 9) No mechanism to prevent peers or other external entities from doing
> this. There is no community wide standard method for AS or route
> authorization and verification.
>
>
>
>All the public tools (free) tools that exist today, basically have some
>subset of the problems below.
>
> 1) Do not peer heavily enough, so they don't have a wide base of
> data/different views
>
> 2) Not suitable for large scale service providers, with dozens of ASN's
> and hundreds of aggregates and thousands of prefixes.
>
> 3) They do not get data 'fast' enough - I think all the systems I have
> looked at depend on either Routeviews or RIPE RIS data. If I'm not
> mistaken Routeviews data is published every 2 hours and RIPE RIS every 8
> hours (if you don't want to process every update).
>
> 4) The biggest problem - None compares your internal routing table and
> paths, with a public view. At the moment, that's the only way I can
> think of, for finding these.
>
>[1-4 are applicable to the Kapella Forged ASpath issue. 1-3 are also
>applicable to standard hijacks]
>
>
>--
>====================================================
> Heather Schiller Verizon Business
> Customer Security 1.800.900.0241
> IP Address Management help4u at verizonbusiness.com
>=====================================================
>
>
>
>_______________________________________________
>nsp-security mailing list
>nsp-security at puck.nether.net
>https://puck.nether.net/mailman/listinfo/nsp-security
>
>Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
>community. Confidentiality is essential for effective Internet security
>counter-measures.
>_______________________________________________
More information about the nsp-security
mailing list