persistent ospf attacks gabi nakibly, alex kirshon and dima gonikman, dan boneh 19th annual network...

14
Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference ( NDSS 2012)

Upload: bruce-kennedy

Post on 03-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Persistent OSPF Attacks

Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh

19th Annual Network & Distributed System Security Conference (NDSS 2012)

Page 2: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Outline

• Introduction (OSPF v2)

•OSPF Security Strengths

•Attack

• Impact and Analysis

•Mitigation Measures

Page 3: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Introduction (OSPF v2)

•Most used protocol in Autonomous System

• Link State Routing Protocol

• LSA is flooded throughout the AS

•Designated Router

•Database Description (DBD) Messages

Page 4: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Routing table

Page 5: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Adjacency set up

Page 6: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Security Strengths

•Per Link Authentication

•Flooding

•Fight Back

•LSA Content

Page 7: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Remote False Adjacency Attack• To fool a remote router

•Persistent control over routing table

•Denial of Service -Link overload-Routing loops -Delivery Failure

• Eavesdropping

Page 8: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Mechanism

Page 9: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS
Page 10: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Consequences

•Attack can be exploited to black hole traffic

•Black-holing most AS traffic with single phantom router

Page 11: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Real World Impact

List of AS topologies used

AS number ISP name Number of Routers

1221 Telstra 115

3967 Exodus 80

6461 Abovenet 145

Page 12: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Percentage of black-holed routers pairs when multiple phantom routers are used

1 2 3 40%

10%

20%

30%

40%

50%

60%

70%

80%

Telstra Exodus Abovenet

Page 13: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

Mitigation Measures

•Protocol Weakness•Same secret key•Master cannot see message content

•Anti source-IP spoofing

•Master must prove to slave that it has seen at least one message from slave

Page 14: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS

THANKYOU

AND

ANYQuestions?