On 26/7/2017 3:38 πμ, Matthew Hardeman via dev-security-policy wrote:
On Tuesday, July 25, 2017 at 1:00:39 PM UTC-5,birg...@princeton.edu  wrote:
We have been considering research in this direction. PEERING controls several 
ASNs and may let us use them more liberally with some convincing. We also have 
the ASN from Princeton that could be used with cooperation from Princeton OIT 
(the Office of Information Technology) where we have several contracts. The 
problem is not the source of the ASNs but the network anomaly the announcement 
would cause. If we were to hijack the prefix of a cooperating organization, the 
PEERING ASes might have their announcements filtered because they are seemingly 
launching BGP attacks. This could be fixed with some communication with ISPs, 
but regardless there is a cost to launching such realistic attacks. Matthew 
Hardeman would probably know more detail about how this would be received by 
the community, but this is the general impression I have got from engaging with 
the people who run the PEERING framework.
I have some thoughts on how to perform such experiments while mitigating the 
likelihood of significant lasting consequence to the party helping ingress the 
hijack to the routing table, but you correctly point out that the attack 
surface is large and the one consistent feature of all discussion up to this 
point on the topic of BGP hijacks for purpose of countering CA domain 
validation is that none of those discuss have, up to this point, expressed 
doubt as to the risks or the feasibility of carrying out these risks.  To that 
ends, I think the first case that would need to be made to further that 
research is whether anything of significance is gained in making the attack 
more tangible.

So far we have not been working on such an attack very much because we are 
focusing our research more on countermeasures. We believe that the attack 
surface is large and there are countless BGP tricks an adversary could use to 
get the desired properties in an attack. We are focusing our research on simple 
and countermeasures CAs can implement to reduce this attack space. We also aim 
to use industry contacts to accurately asses the false positive rates of our 
countermeasures and develop example implementations.

If it appears that actually launching such a realistic attack would be valuable 
to the community, we certainty could look into it further.
This is the question to answer before performing such an attack.  In effect, 
who is the audience that needs to be impressed?  What criteria must be met to 
impress that audience?  What benefits in furtherance of the work arise from 
impressing that audience?

Thanks,

Matt Hardeman
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

That was a very interesting topic to read. Unfortunately, CAs can't do much to protect against network hijacking because most of the counter-measures lie in the ISPs' side. However, the CAs could request some counter-measures from their ISPs.

Best practices for ISPs state that for each connected peer, the ISP need to apply a prefix filter that will allow announcements for only legitimate prefixes that the peer controls/owns. We can easily imagine that this is not performed by all ISPs. Another solution that has been around for some time, is RPKI <https://www.ripe.net/manage-ips-and-asns/resource-management/certification> along with BGP Origin Validation <https://www.ripe.net/manage-ips-and-asns/resource-management/certification/bgp-origin-validation>. Of course, we can't expect all ISPs to check for Route Origin Authorizations (ROAs) but if the major ISPs checked for ROAs, it would improve things a lot in terms of securing the Internet.

So, in order to minimize the risk for a CA or a site owner network from being hijacked, if a CA/site owner has an address space that is Provider Aggregatable (PA) (this means the ISP "owns" the IP space), they should check that their upstream network provider has properly created the ROAs for the CA/site operator's network prefix(es) in the RIR authorized list, and that they have configured their routers to validate ROAs for each prefix. If the CA/site operator has a Provider Independent (PI) address space (this means the CA/site operator "owns" the IP space), then the CA/site operator should create the ROAs.

In Matt's example, if eff.org had ROAs for their network prefixes (that include their DNS servers) and if Let's Encrypt provider (or Let's Encrypt router) was validating ROAs, this attack wouldn't work.


Dimitris.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to