10.1145/2486001.2486010acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

BGP security in partial deployment: is the juice worth the squeeze?

Published:27 August 2013Publication History

ABSTRACT

As the rollout of secure route origin authentication with the RPKI slowly gains traction among network operators, there is a push to standardize secure path validation for BGP (i.e., S*BGP: S-BGP, soBGP, BGPSEC, etc.). Origin authentication already does much to improve routing security. Moreover, the transition to S*BGP is expected to be long and slow, with S*BGP coexisting in "partial deployment" alongside BGP for a long time. We therefore use theoretical and experimental approach to study the security benefits provided by partially-deployed S*BGP, vis-a-vis those already provided by origin authentication. Because routing policies have a profound impact on routing security, we use a survey of 100 network operators to find the policies that are likely to be most popular during partial S*BGP deployment. We find that S*BGP provides only meagre benefits over origin authentication when these popular policies are used. We also study the security benefits of other routing policies, provide prescriptive guidelines for partially-deployed S*BGP, and show how interactions between S*BGP and BGP can introduce new vulnerabilities into the routing system.

References

  1. IRR power tools. http://sourceforge.net/projects/irrpt/, 2011.Google ScholarGoogle Scholar
  2. Working group 6 Secure BGP Deployment Report. Technical report, FCC CSRIC http://transition.fcc.gov/bureaus/pshs/advisory/csric3/CSRICIII_9-12-12_WG6-Final-Report.pdf, 2012.Google ScholarGoogle Scholar
  3. B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig, and W. Willinger. Anatomy of a large european IXP. In SIGCOMM'12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alexa. The top 500 sites on the web. http://www.alexa.com/topsites, October 1 2012.Google ScholarGoogle Scholar
  5. B. Augustin, B. Krishnamurthy, and W. Willinger. IXPs: Mapped? In IMC'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. I. Avramopoulos, M. Suchara, and J. Rexford. How small groups can secure interdomain routing. Technical report, Princeton University Comp. Sci., 2007.Google ScholarGoogle Scholar
  7. H. Ballani, P. Francis, and X. Zhang. A study of prefix hijacking and interception in the Internet. In SIGCOMM'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Boldyreva and R. Lychev. Provable security of S-BGP and other path vector protocols: model, analysis and extensions. In CCS'12, pages 541--552. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. A. Brown. Rensys Blog: Pakistan hijacks YouTube. http://www.renesys.com/blog/2008/02/pakistan_hijacks_youtube_1.shtml.Google ScholarGoogle Scholar
  10. K. Butler, T. Farley, P. McDaniel, and J. Rexford. A survey of BGP security issues and solutions. Proceedings of the IEEE, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  11. H. Chang, D. Dash, A. Perrig, and H. Zhang. Modeling adoptability of secure BGP protocol. In SIGCOMM'06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y.-J. Chi, R. Oliveira, and L. Zhang. Cyclops: The Internet AS-level observatory. SIGCOMM CCR, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Cisco. BGP best path selection algorithm: How the best path algorithm works. Document ID: 13753, May 2012. http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094431.shtml#bestpath.Google ScholarGoogle Scholar
  14. J. Cowie. Rensys blog: China's 18-minute mystery. http://www.renesys.com/blog/2010/11/chinas-18-minute-mystery.shtml.Google ScholarGoogle Scholar
  15. A. Dhamdhere and C. Dovrolis. Twelve years in the evolution of the internet ecosystem. Trans. Netw., 19(5):1420--1433, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Gao, T. Griffin, and J. Rexford. Inherently safe backup routing with BGP. IEEE INFOCOM, 2001.Google ScholarGoogle Scholar
  17. L. Gao and J. Rexford. Stable Internet routing without global coordination. Trans. Netw., 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Gill, S. Goldberg, and M. Schapira. A survey of interdomain routing policies. NANOG'56, October 2012.Google ScholarGoogle Scholar
  19. P. Gill, M. Schapira, and S. Goldberg. Let the market drive deployment: A strategy for transistioning to BGP security. SIGCOMM'11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Goldberg, S. Halevi, A. D. Jaggard, V. Ramachandran, and R. N. Wright. Rationality and traffic attraction: Incentives for honest path announcements in BGP. In SIGCOMM'08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Goldberg, M. Schapira, P. Hummon, and J. Rexford. How secure are secure interdomain routing protocols? In SIGCOMM'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T. Griffin and G. Huston. BGP wedgies. RFC 4264, 2005.Google ScholarGoogle Scholar
  23. T. Griffin, F. B. Shepherd, and G. Wilfong. The stable paths problem and interdomain routing. Trans. Netw., 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. Huston. Peering and settlements - Part I. The Internet Protocol Journal (Cisco), 2(1), March 1999.Google ScholarGoogle Scholar
  25. G. Huston. Peering and settlements - Part II. The Internet Protocol Journal (Cisco), 2(2), June 1999.Google ScholarGoogle Scholar
  26. S. Kent and A. Chi. Threat model for BGP path security. Internet draft: draft-ietf-sidr-bgpsec-threats-04, 2013.Google ScholarGoogle Scholar
  27. S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). JSAC, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. C. Labovitz. Arbor blog: Battle of the hyper giants. http://asert.arbornetworks.com/2010/04/ the-battle-of-the-hyper-giants-part-i-2/.Google ScholarGoogle Scholar
  29. C. Labovitz. Internet traffic 2007 - 2011. Global Peering Forum. Santi Monica, CA., April 2011.Google ScholarGoogle Scholar
  30. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, and F. Jahanian. Internet inter-domain traffic. In SIGCOMM'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. Lepinski. Bgpsec protocol specification: draft-ietf-sidr-bgpsec-protocol-06. Internet-Draft, 2012.Google ScholarGoogle Scholar
  32. M. Lepinski and S. Kent. RFC 6480: An Infrastructure to Support Secure Internet Routing.Google ScholarGoogle Scholar
  33. R. Lychev, S. Goldberg, and M. Schapira. Network destabilizing attacks. In PODC'12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. R. Lychev, S. Goldberg, and M. Schapira. Is the juice worth the squeeze? BGP security in partial deployment. Technical report, Arxiv, 2013.Google ScholarGoogle Scholar
  35. P. McDaniel, W. Aiello, K. Butler, and J. Ioannidis. Origin authentication in interdomain routing. Computer Networks, November 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Misel. "Wow, AS7007!". Merit NANOG Archive, April 1997. http://www.merit.edu/mail.archives/nanog/ 1997-04/msg00340.html.Google ScholarGoogle Scholar
  37. P. Mohapatra, J. Scudder, D. Ward, R. Bush, and R. Austein. BGP Prefix Origin Validation. Internet Engineering Task Force Network Working Group, 2012. http://tools.ietf.org/html/ draft-ietf-sidr-pfx-validate-09.Google ScholarGoogle Scholar
  38. P. Palse. Serving ROAs as RPSL route{6} Objects from the RIPE Database. RIPE Labs, June 2010. https://labs.ripe.net/Members/Paul_P_/content-serving-roas-rpsl-route-objects.Google ScholarGoogle Scholar
  39. T. Paseka. Cloudflare blog: Why google went offline today., November 2012. http://blog.cloudflare.com/why-google-went-offline-today-and-a-bit-about.Google ScholarGoogle Scholar
  40. A. Pilosov and T. Kapela. Stealing the Internet: An Internet-scale man in the middle attack, 2008. DEFCON'16.Google ScholarGoogle Scholar
  41. Reuters. Internet providers pledge anti-botnet effort, March 22 2012.Google ScholarGoogle Scholar
  42. M. Roughan, W. Willinger, O. Maennel, D. Perouli, and R. Bush. 10 lessons from 10 years of measuring and modeling the internet?s autonomous systems. JSAC, 29(9):1810--1821, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  43. R. Sami, M. Schapira, and A. Zohar. Searching for stability in interdomain routing. In INFOCOM'09, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  44. Sandvine. Fall 2012 global internet phenomena, 2012.Google ScholarGoogle Scholar
  45. K. Sriram. BGPSEC design choices and summary of supporting discussions. Internet-Draft: draft-sriram-bgpsec-design-choices-03, January 2013.Google ScholarGoogle Scholar
  46. R. White. Deployment considerations for secure origin BGP (soBGP). draft-white-sobgp-bgp-deployment-01.txt, June 2003, expired.Google ScholarGoogle Scholar

Index Terms

  1. BGP security in partial deployment: is the juice worth the squeeze?

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCOMM '13: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
      August 2013
      580 pages
      ISBN:9781450320566
      DOI:10.1145/2486001
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 43, Issue 4
        October 2013
        595 pages
        ISSN:0146-4833
        DOI:10.1145/2534169
        Issue’s Table of Contents

      Copyright © 2013 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 August 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SIGCOMM '13 Paper Acceptance Rate 38 of 246 submissions, 15%Overall Acceptance Rate 522 of 3,324 submissions, 16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!