Re: Alternate and/or hidden infrastructure addresses (BGP/TCP RST/SYN vulnerability)

2004-04-22 Thread Patrick W . Gilmore
On Apr 22, 2004, at 6:36 PM, Lane Patterson wrote:

Although someone mentioned using non-routable /30 or /31's on private 
eBGP peers, there hasn't been much broad-ranging discussion of keeping 
internal infrastructure addresses non-routable.  I am thinking of a 
couple different things here:

1.  Backbone addresses:  ISPs that hide interface addresses and/or 
primary loopback addresses, and best practices for doing so?  (e.g. 
traceroutes don't break, but the router uses say Loopback1 address to 
respond to them, while iBGP uses Loopback0.  All Loopback0 address 
blocks can be filtered at borders.)
If you use multi-hop peering with loopback0, why bother changing the 
traceroute replies?  Alternatively, if you make all traceroute replies 
from loopback1, then why bother turning on multi-hop BGP?

Hrmmm, would the GTSM work with loopback peering?  ISTR it allowed a 
TTL of 254, which should make it to the loopback interface.


2.  Public IX addresses:  ISPs that do not redistribute the IX prefix 
into their iBGP or IGP and do not use external next-hops (except local 
to the connected border router), but instead use the loopback of the 
border router when propogating these routes within their iBGP mesh.  
This should not break traceroutes "through" the exchange, but will 
break any traffic such as ping, spoofed packets, etc. to the exchange 
from a non-connected router.
Excellent idea.  And one which is, I believe, being used by several 
people already.  Perhaps more wide spread use would help?

I like the second one more than the first since the first is more of a 
security-through-obscurity than anything else.  But even obscurity is 
better security than nothing.

OTOH, the best security measure right now would be to do something like 
OpenBSD's random ephemeral port algorithm into the router OSes.  Then 
this "vulnerability" would be far, far less vulnerable.

--
TTFN,
patrick


Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread Patrick W . Gilmore
On Apr 22, 2004, at 10:18 PM, Christopher L. Morrow wrote:

BGP over PPP? Could be specified, but that'd require replacing the 
use of
TCP. Might be a bit ugly to implement, especially on larger routers 
with
separate control planes.
wasn't there a PPP over SMTP spec? that sounds like a plan for this!
I swear to ghod I was thinking of the telnet over SMTP spec when I read 
this, and wondering if we should use that and have the routers telnet 
to port 179 over SMTP.  Then you could PGP sign the messages!  Of 
course, you'd have to update your spam filters :)

--
TTFN,
patrick


Re: Backbone IP network Economics - peering and transit

2004-04-22 Thread Tom Vest
On Apr 22, 2004, at 9:29 PM, Michel Py wrote:

Deepak Jain wrote:
But that structure doesn't vary vastly if you'd traffic out
that gig via transit vs direct connect. It does vary (and
add lots of infrastructure) if you don't aggregate your
traffic at IXes and instead use loops to bring transit to
you instead of going to it. (say a few 100Mb/s or OC3s in
a few places instead of a GigE at an IX).
Indeed.

Perhaps we should (for technical reasons) describe
peering as "direct connecting".
This makes a lot of sense to me (although I would suggest a different
name later). Since the beginning I have been trying to make the point
that "direct connecting" was typically a no-brainer in terms of money.
Peering when you have to buy the local loop is not such a slam dunk.
Business reasons aside, technically the difference is
that with transit you are expecting access via indirect
connections to networks.
I'm not so sure about this. There are lots of people that buy transit
and are directly connected to their provider in an IX for example.
With peering you expect direct connections into a network.
If "direct connecting" != peering then definitely.

Maybe we need to say differentiate between:
- Connected transit
- Remote transit
- Connected peering
- Remote peering
And agree that, by default,
transit ~= remote transit
peering ~= direct peering
Michel.
The kind of relative cost dynamics described in this thread leave a 
measurable geographic imprint on the Internet. Big network operators 
make deployment decisions explicitly to optimize capex/opex over a 
relatively short horizon, with proximate peering opportunities often 
justifying higher upfront costs. Conversely, there are plenty of places 
where lack of public IX facilities, and/or exploitive metro/regional 
infrastructure costs make remote interconnection 
not-economically-viable -- so very little peering or multihoming in 
general. Regions or countries fitting the latter description typically 
have very few autonomous networks, because there's really very little 
be gained from running your own network. Infrastructure (layer2, "basic 
telecom," etc.) was once highly regulated everywhere, and 
didn't/doesn't really become affordable anywhere unless/until someone 
in authority compels sharing or underwrites the development of 
competing infrastructures. I don't think it was just a coincidence that 
EGP was developed during the same period that Ma Bell was being broken 
up into regional and national "independent operating entities"...

Voila: The origin and evolving structure of IDR is a product of layer 
8/9.

There's a time dimension to this dynamic as well, as infrastructure 
savings belatedly give rise to reduced transit costs; once and future 
operators jump into and out of the game at different points in the 
cycle. Anyone else notice how many "content providers" are now suddenly 
looking for peering coordinators? It's not because they expect other 
operators to come to their isolated data center(s)...they are building 
out, because that's what makes sense for them at this point in the 
cycle.

Now I will go back to hunkering down until SF.

Tom



Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread Christopher L. Morrow

On Thu, 22 Apr 2004, Daniel Senie wrote:

>
> At 05:56 PM 4/22/2004, Dan Hollis wrote:
>
> >Is there any way to move BGP completely out-of-band?
> >
> >I know multihop may be out of the question but maybe someone should write
> >up a proposal for PTP links. :-)
>
> BGP over PPP? Could be specified, but that'd require replacing the use of
> TCP. Might be a bit ugly to implement, especially on larger routers with
> separate control planes.

wasn't there a PPP over SMTP spec? that sounds like a plan for this!


Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread Daniel Senie
At 05:56 PM 4/22/2004, Dan Hollis wrote:

Is there any way to move BGP completely out-of-band?

I know multihop may be out of the question but maybe someone should write
up a proposal for PTP links. :-)
BGP over PPP? Could be specified, but that'd require replacing the use of 
TCP. Might be a bit ugly to implement, especially on larger routers with 
separate control planes. 



RE: Backbone IP network Economics - peering and transit

2004-04-22 Thread Michel Py

> Deepak Jain wrote:
> But that structure doesn't vary vastly if you'd traffic out
> that gig via transit vs direct connect. It does vary (and
> add lots of infrastructure) if you don't aggregate your
> traffic at IXes and instead use loops to bring transit to
> you instead of going to it. (say a few 100Mb/s or OC3s in
> a few places instead of a GigE at an IX).

Indeed.

> Perhaps we should (for technical reasons) describe
> peering as "direct connecting".

This makes a lot of sense to me (although I would suggest a different
name later). Since the beginning I have been trying to make the point
that "direct connecting" was typically a no-brainer in terms of money.
Peering when you have to buy the local loop is not such a slam dunk.


> Business reasons aside, technically the difference is
> that with transit you are expecting access via indirect
> connections to networks.

I'm not so sure about this. There are lots of people that buy transit
and are directly connected to their provider in an IX for example.

> With peering you expect direct connections into a network.

If "direct connecting" != peering then definitely.

Maybe we need to say differentiate between:
- Connected transit
- Remote transit
- Connected peering
- Remote peering

And agree that, by default,
transit ~= remote transit
peering ~= direct peering

Michel.



Re: Alternate and/or hidden infrastructure addresses (BGP/TCP RST/SYN vulnerability)

2004-04-22 Thread James

> Couldn't we use 2 /30 subnets on PtP links?  1 /30 with real IPs for 
> ICMP, MTU, reachability etc. and one RFC1918 /30 as secondary for eBGP 
> sessions.  I know when a router originates a packet (like with BGP) it 
> sets the source IP to the IP of the interface the packet leaves.  Is 
> BGP smart enough when setting up BGP neighbors to use an IP in the same 
> subnet as the neighbor (the secondary interface IP)?

in IOS bgp will bind source ip that is relevant to the subnet it is being peered
with, even if it is a secondary ip. i am not sure if it binds the ip to primary
ip for the first time, then fall back to secondary ip as primary fails though..
all i know is that when i've tried it by putting a bogus ip as primary, bgp 
session did turn up, but took a little longer than usual.. didn't investigate
any further however.

-J


-- 
James JunTowardEX Technologies, Inc.
Technical LeadNetwork Design, Consulting, IT Outsourcing
[EMAIL PROTECTED]  Boston-based Colocation & Bandwidth Services
cell: 1(978)-394-2867   web: http://www.towardex.com , noc: www.twdx.net


Re: Alternate and/or hidden infrastructure addresses (BGP/TCP RST/SYN vulnerability)

2004-04-22 Thread James

> 
> no! these are so easy to find
>
> $ host 65.116.132.145
> 145.132.116.65.in-addr.arpa domain name pointer lo0.b1.box2.twdx.net.

of course..  i wasn't saying i am one of those who are employing 'hide the
loopbacks from public' practice :) heh

but yea good point though, if you were to 'hide' them, reverse dns hostnames
should be taken into consideration as well.. 

-J



-- 
James JunTowardEX Technologies, Inc.
Technical LeadNetwork Design, Consulting, IT Outsourcing
[EMAIL PROTECTED]  Boston-based Colocation & Bandwidth Services
cell: 1(978)-394-2867   web: http://www.towardex.com , noc: www.twdx.net


Re: Alternate and/or hidden infrastructure addresses (BGP/TCP RST/SYN vulnerability)

2004-04-22 Thread Stephen J. Wilcox

On Thu, 22 Apr 2004, James wrote:

> > 1.  Backbone addresses:  ISPs that hide interface addresses and/or primary 
> > loopback addresses, and best practices for doing so?  (e.g. traceroutes don't 
> > break, but the router uses say Loopback1 address to respond to them, while iBGP 
> > uses Loopback0.  All Loopback0 address blocks can be filtered at borders.)
> 
> since ibgp's should be peered w/ loopbacks, loopback protection is all
> needed as as far as this bgp hysteria goes.

no! these are so easy to find

$ host 65.116.132.145
145.132.116.65.in-addr.arpa domain name pointer lo0.b1.box2.twdx.net.

> 
> so loopback0 with "secret" addresses for ibgp peering, use a loopback1
> to publish router ip addrs to public via looking glass, etc.
> 
> next thing to protect is customer ebgp sessions. some providers don't even
> route the p2p /30 links used between cust and their backbone (i.e. Sprint).
> so that's up to you.
> 
> some backbones even filter all traffic destined to backbone prefixes at
> ingress points (border routers, cust edge routers)... for example.. att
> being one. for example, here comes random test:
> 
> starbucks blahdy $ traceroute -M 8 12.123.205.65
> traceroute to 12.123.205.65 (12.123.205.65), 64 hops max, 44 byte packets
>  8  jfk-brdr-02.inet.qwest.net (205.171.230.21)  6.404 ms  6.138 ms  6.145 ms
>  9  * qwest-gw.n54ny.ip.att.net (192.205.32.169)  6.465 ms !X *
> 
> 
> all above options don't necessarily break traceroute as long as you implement
> it with care... 
> 
> -J
> 
> > 
> > 2.  Public IX addresses:  ISPs that do not redistribute the IX prefix into their 
> > iBGP or IGP and do not use external next-hops (except local to the connected 
> > border router), but instead use the loopback of the border router when propogating 
> > these routes within their iBGP mesh.  This should not break traceroutes "through" 
> > the exchange, but will break any traffic such as ping, spoofed packets, etc. to 
> > the exchange from a non-connected router.
> > 
> > Can anyone provide pro/con, better description of config templates for doing this, 
> > and/or discussion of major networks that choose to do this, or not do this?
> > 
> > Cheers,
> > -Lane
> 
> 



Re: Alternate and/or hidden infrastructure addresses (BGP/TCP RST/SYN vulnerability)

2004-04-22 Thread Matthew Crocker

next thing to protect is customer ebgp sessions. some providers don't 
even
route the p2p /30 links used between cust and their backbone (i.e. 
Sprint).
so that's up to you.

some backbones even filter all traffic destined to backbone prefixes at
ingress points (border routers, cust edge routers)... for example.. att
being one. for example, here comes random test:
Couldn't we use 2 /30 subnets on PtP links?  1 /30 with real IPs for 
ICMP, MTU, reachability etc. and one RFC1918 /30 as secondary for eBGP 
sessions.  I know when a router originates a packet (like with BGP) it 
sets the source IP to the IP of the interface the packet leaves.  Is 
BGP smart enough when setting up BGP neighbors to use an IP in the same 
subnet as the neighbor (the secondary interface IP)?



Re: Alternate and/or hidden infrastructure addresses (BGP/TCP RST/SYN vulnerability)

2004-04-22 Thread James

> 1.  Backbone addresses:  ISPs that hide interface addresses and/or primary loopback 
> addresses, and best practices for doing so?  (e.g. traceroutes don't break, but the 
> router uses say Loopback1 address to respond to them, while iBGP uses Loopback0.  
> All Loopback0 address blocks can be filtered at borders.)

since ibgp's should be peered w/ loopbacks, loopback protection is all
needed as as far as this bgp hysteria goes.

so loopback0 with "secret" addresses for ibgp peering, use a loopback1
to publish router ip addrs to public via looking glass, etc.

next thing to protect is customer ebgp sessions. some providers don't even
route the p2p /30 links used between cust and their backbone (i.e. Sprint).
so that's up to you.

some backbones even filter all traffic destined to backbone prefixes at
ingress points (border routers, cust edge routers)... for example.. att
being one. for example, here comes random test:

starbucks blahdy $ traceroute -M 8 12.123.205.65
traceroute to 12.123.205.65 (12.123.205.65), 64 hops max, 44 byte packets
 8  jfk-brdr-02.inet.qwest.net (205.171.230.21)  6.404 ms  6.138 ms  6.145 ms
 9  * qwest-gw.n54ny.ip.att.net (192.205.32.169)  6.465 ms !X *


all above options don't necessarily break traceroute as long as you implement
it with care... 

-J

> 
> 2.  Public IX addresses:  ISPs that do not redistribute the IX prefix into their 
> iBGP or IGP and do not use external next-hops (except local to the connected border 
> router), but instead use the loopback of the border router when propogating these 
> routes within their iBGP mesh.  This should not break traceroutes "through" the 
> exchange, but will break any traffic such as ping, spoofed packets, etc. to the 
> exchange from a non-connected router.
> 
> Can anyone provide pro/con, better description of config templates for doing this, 
> and/or discussion of major networks that choose to do this, or not do this?
> 
> Cheers,
> -Lane

-- 
James JunTowardEX Technologies, Inc.
Technical LeadNetwork Design, Consulting, IT Outsourcing
[EMAIL PROTECTED]  Boston-based Colocation & Bandwidth Services
cell: 1(978)-394-2867   web: http://www.towardex.com , noc: www.twdx.net


Alternate and/or hidden infrastructure addresses (BGP/TCP RST/SYN vulnerability)

2004-04-22 Thread Lane Patterson

Although someone mentioned using non-routable /30 or /31's on private eBGP peers, 
there hasn't been much broad-ranging discussion of keeping internal infrastructure 
addresses non-routable.  I am thinking of a couple different things here:

1.  Backbone addresses:  ISPs that hide interface addresses and/or primary loopback 
addresses, and best practices for doing so?  (e.g. traceroutes don't break, but the 
router uses say Loopback1 address to respond to them, while iBGP uses Loopback0.  All 
Loopback0 address blocks can be filtered at borders.)

2.  Public IX addresses:  ISPs that do not redistribute the IX prefix into their iBGP 
or IGP and do not use external next-hops (except local to the connected border 
router), but instead use the loopback of the border router when propogating these 
routes within their iBGP mesh.  This should not break traceroutes "through" the 
exchange, but will break any traffic such as ping, spoofed packets, etc. to the 
exchange from a non-connected router.

Can anyone provide pro/con, better description of config templates for doing this, 
and/or discussion of major networks that choose to do this, or not do this?

Cheers,
-Lane


Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread E.B. Dreger

RT> Date: Tue, 20 Apr 2004 23:11:28 -0500 (CDT)
RT> From: Rob Thomas


RT> We manage well over 150 peering sessions with MD5 passwords
RT> in place.  This includes bogon peering, route-server peering,

CYMRU bogon (et al.) route servers are an example of where MD5 or
IPSec definitely is a good idea.  However, most peer/peer and
carrier/downstream BGP sessions aren't multihop spanning a
network or three.

Of course, if ingress SAV were universal...


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
  DO NOT send mail to the following addresses :
  [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread Dan Hollis

Is there any way to move BGP completely out-of-band?

I know multihop may be out of the question but maybe someone should write 
up a proposal for PTP links. :-)

-Dan



Re: IP economics morphed into (TCP/RST)

2004-04-22 Thread E.B. Dreger

IvB> Date: Thu, 22 Apr 2004 18:03:33 +0200
IvB> From: Iljitsch van Beijnum


IvB> Who says BGP sessions must run over IP(v4)?

NetBEUI, anyone?  No bickering over RFC1918 on WAN links... ;-)


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
  DO NOT send mail to the following addresses :
  [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



Re: TCP/BGP vulnerability - easier than you think

2004-04-22 Thread E.B. Dreger

EBD> Date: Wed, 21 Apr 2004 10:56:26 + (GMT)
EBD> From: E.B. Dreger

EBD> This is more appropriate for cisco-nsp, where it's already
EBD> been covered, but the TTL 255 hack was introduced in
EBD> 12.0(22)S and 12.3(7)T if memory serves me.  Pretty sparse

Memory did not serve me.

s/12.0(22)S/12.0(27)S/

http://www.cisco.com/en/US/products/sw/iosswrel/ps1829/products_feature_guide09186a008020e6f5.html


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
  DO NOT send mail to the following addresses :
  [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread James

Hi Deepak,

Yes you are correct, but really... getting all your peers to do
this new security policy gets into politics. the fact that you don't
control your peer's security policy is the problem.. The issue here is
that you have to make sure you protect your peer for traffic origined
from your network, whether via filter or blackhole, and your peer has
to do the same for traffic originating from theirs. What if someone
at either end by mistake mess up the filter? It's a royal pain in the
[EMAIL PROTECTED]

running bgp session over a /30 that's invisible from traceroute and
obscured from public knowledge is a better idea, although it is security
by obscurity, it is a better practice, and easier to manage than having
both sides abide to a filtering / mutual protection policy.

-J

On Thu, Apr 22, 2004 at 04:34:34PM -0400, Deepak Jain wrote:
> 
> You can add a RPF-flavored filter like:
> 
> Make core-facing network interfaces drop or not route the /30 or /24 
> your peering interface is on. Many NAP fabrics IPs are blackholed at 
> borders like they should be.
> 
> Or you could move your peers to 10.x.x.x addresses and NOT route them 
> inside your network, or have them destined to your blackhole community..
> 
> Better still. Just have all of your border routers announce the specpfic 
> address blocks you have peers or directly connected interfaces on with 
> your blackhole community. The routers with directly connected interfaces 
> shouldn't mind the exported route and the routers that receive it 
> shouldn't be routing it anyway.
> 
> Deepak Jain
> AiNET
> 
> James wrote:
> 
> >anti spoofing filtering won't help you with your ebgp peer if the packet
> >is spoofed to your peer's address and hits the peering interface. try
> >adding GTSM with anti-spoofing. makes it far harder..
> >
> >-J
> >
> >
> >On Thu, Apr 22, 2004 at 12:14:55AM -0700, Alexei Roudnev wrote:
> >
> >>If they make proper anty-spoofiing filtering, no need in MD5. 
> >>
> >>
> >>
> >>>Perhaps we are all making too much of this...
> >>>
> >>>It appears that Winstar feels that there is no need for MD5
> >>>authentication of peering sessions. One of our customers has just had
> >>>the following response from Winstar following a request to implement MD5
> >>>on their OC3 connection to Winstar. My first suggestion is to locate
> >>>another upstream provider (they have 3 already).
> >>>
> >>>However, perhaps someone from Winstar would care to help us all
> >>>understand what the alternative solution is to securing the session via
> >>>MD5? I would *love* an alternative to the 5 days of work we've just gone
> >>>through.
> >>>
> >>>
> -Original Message-
> From: Justin Crawford - NMCW Engineer [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, April 20, 2004 11:13 AM
> To: xx
> Subject: Re: *SPAM* MD5 implimentation on BGP
> 
> x,
> 
> Winstar does not currently run MD5 authentication with our peers.
> 
> Thanks
> 
> Justin
> 
> Thank you for your time and business
> 
> Justin Crawford
> Winstar NMCW
> Ph: 206-xxx.
> >>>
> >>>Has anyone else run in to this with Winstar?
> >>>
> >>>-- 
> >>>Rodney Joffe
> >>>CenterGate Research Group, LLC.
> >>>http://www.centergate.com
> >>>"Technology so advanced, even we don't understand it!"(SM)
> >
> >

-- 
James JunTowardEX Technologies, Inc.
Technical LeadNetwork Design, Consulting, IT Outsourcing
[EMAIL PROTECTED]  Boston-based Colocation & Bandwidth Services
cell: 1(978)-394-2867   web: http://www.towardex.com , noc: www.twdx.net


Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread Deepak Jain


You can add a RPF-flavored filter like:

Make core-facing network interfaces drop or not route the /30 or /24 
your peering interface is on. Many NAP fabrics IPs are blackholed at 
borders like they should be.

Or you could move your peers to 10.x.x.x addresses and NOT route them 
inside your network, or have them destined to your blackhole community..

Better still. Just have all of your border routers announce the specpfic 
address blocks you have peers or directly connected interfaces on with 
your blackhole community. The routers with directly connected interfaces 
shouldn't mind the exported route and the routers that receive it 
shouldn't be routing it anyway.

Deepak Jain
AiNET
James wrote:

anti spoofing filtering won't help you with your ebgp peer if the packet
is spoofed to your peer's address and hits the peering interface. try
adding GTSM with anti-spoofing. makes it far harder..
-J

On Thu, Apr 22, 2004 at 12:14:55AM -0700, Alexei Roudnev wrote:

If they make proper anty-spoofiing filtering, no need in MD5. 



Perhaps we are all making too much of this...

It appears that Winstar feels that there is no need for MD5
authentication of peering sessions. One of our customers has just had
the following response from Winstar following a request to implement MD5
on their OC3 connection to Winstar. My first suggestion is to locate
another upstream provider (they have 3 already).
However, perhaps someone from Winstar would care to help us all
understand what the alternative solution is to securing the session via
MD5? I would *love* an alternative to the 5 days of work we've just gone
through.

-Original Message-
From: Justin Crawford - NMCW Engineer [mailto:[EMAIL PROTECTED]
Sent: Tuesday, April 20, 2004 11:13 AM
To: xx
Subject: Re: *SPAM* MD5 implimentation on BGP
x,

Winstar does not currently run MD5 authentication with our peers.

Thanks

Justin

Thank you for your time and business

Justin Crawford
Winstar NMCW
Ph: 206-xxx.
Has anyone else run in to this with Winstar?

--
Rodney Joffe
CenterGate Research Group, LLC.
http://www.centergate.com
"Technology so advanced, even we don't understand it!"(SM)





Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread James

anti spoofing filtering won't help you with your ebgp peer if the packet
is spoofed to your peer's address and hits the peering interface. try
adding GTSM with anti-spoofing. makes it far harder..

-J


On Thu, Apr 22, 2004 at 12:14:55AM -0700, Alexei Roudnev wrote:
> 
> If they make proper anty-spoofiing filtering, no need in MD5. 
> 
> 
> > 
> > Perhaps we are all making too much of this...
> > 
> > It appears that Winstar feels that there is no need for MD5
> > authentication of peering sessions. One of our customers has just had
> > the following response from Winstar following a request to implement MD5
> > on their OC3 connection to Winstar. My first suggestion is to locate
> > another upstream provider (they have 3 already).
> > 
> > However, perhaps someone from Winstar would care to help us all
> > understand what the alternative solution is to securing the session via
> > MD5? I would *love* an alternative to the 5 days of work we've just gone
> > through.
> > 
> > > -Original Message-
> > > From: Justin Crawford - NMCW Engineer [mailto:[EMAIL PROTECTED]
> > > Sent: Tuesday, April 20, 2004 11:13 AM
> > > To: xx
> > > Subject: Re: *SPAM* MD5 implimentation on BGP
> > > 
> > > x,
> > > 
> > > Winstar does not currently run MD5 authentication with our peers.
> > > 
> > > Thanks
> > > 
> > > Justin
> > > 
> > > Thank you for your time and business
> > > 
> > > Justin Crawford
> > > Winstar NMCW
> > > Ph: 206-xxx.
> > 
> > Has anyone else run in to this with Winstar?
> > 
> > -- 
> > Rodney Joffe
> > CenterGate Research Group, LLC.
> > http://www.centergate.com
> > "Technology so advanced, even we don't understand it!"(SM)

-- 
James JunTowardEX Technologies, Inc.
Technical LeadNetwork Design, Consulting, IT Outsourcing
[EMAIL PROTECTED]  Boston-based Colocation & Bandwidth Services
cell: 1(978)-394-2867   web: http://www.towardex.com , noc: www.twdx.net


Re: Backbone IP network Economics - peering and transit

2004-04-22 Thread Deepak Jain


[EMAIL PROTECTED] wrote:
where's the "lot of cost"?

Stephen J. Wilcox
This is private vs public..
Even if it's private, and assuming that you're clever enough not to peer
for a modem's worth of traffic, the cost is a no-brainer, IMHO.
Someone checks my math please:
At $20 per megabit for transit (which I find very low, but let's go for
it anyway) a GE link for peering with an average use of 10% means $24000
per year saved; pays for the xconnect.


If you have a gig of traffic to peer out to a single AS, you need quite a
bit of infrastructure to support the peering and that infrastructure does
not come cheap.
But that structure doesn't vary vastly if you'd traffic out that gig via 
transit vs direct connect. It does vary (and add lots of infrastructure) 
if you don't aggregate your traffic at IXes and instead use loops to 
bring transit to you instead of going to it. (say a few 100Mb/s or OC3s 
in a few places instead of a GigE at an IX).

Perhaps we should (for technical reasons) describe peering as "direct 
connecting". Business reasons aside, technically the difference is that 
with transit you are expecting access via indirect connections to 
networks. With peering you expect direct connections into a network.

Deepak Jain
AiNET


Re: Backbone IP network Economics - peering and transit

2004-04-22 Thread alex

> >> where's the "lot of cost"?
> 
> > Stephen J. Wilcox
> > This is private vs public..
> 
> Even if it's private, and assuming that you're clever enough not to peer
> for a modem's worth of traffic, the cost is a no-brainer, IMHO.
> Someone checks my math please:
> At $20 per megabit for transit (which I find very low, but let's go for
> it anyway) a GE link for peering with an average use of 10% means $24000
> per year saved; pays for the xconnect.

If you have a gig of traffic to peer out to a single AS, you need quite a
bit of infrastructure to support the peering and that infrastructure does
not come cheap.

Alex


Re: TCP/BGP vulnerability - easier than you think

2004-04-22 Thread Iljitsch van Beijnum
On 21-apr-04, at 22:00, Paul Jakma wrote:

Why would MD5 be more of a crypto DoS risk with IPSec AH headers than
with bgp tcp-md5?

Beats me. But why do you bring up IPsec?

The paragraph is quoted is your advice against using IPSec,
Unless I was really sleep-typing I didn't say anything about IPsec, 
just about "crypto", which as far as I'm concerned includes MD5, which 
we were talking about.

I dont
see why an MD5 auth header IPSec protected sessions would have more
risk of crypto DoS than compared to the simple BGP TCP MD5 hack. The
risk is due to MD5, not IPSec :).
As Crist Clark just pointed out: the presence of the SPI and replay 
counter actually makes it harder to do a crypto DoS against IPsec than 
the TCP MD5 option (assuming the traffic can't be sniffed).

Makes you wonder if those TDM guys weren't on to something with out of 
band signalling, doesn't it?

Anyway, what needs to happen is a form of crypto where the
expensive algorithms are only executed for good packets and not for
all packets.

So configure ipsec to authenticate packets between the peers allowing
only md5 or somesuch. I dont know about other IOS, but other
implementations do allow one to specify security associations on a
per port basis.
Another advantage of IPsec is that it allows for key changes in a sane 
way. I'm not sure I'd want my routers to run IKE, though.

However, note that even a relatively light-weight check such as an 
HMAC-MD5 can blow away a typical router CPU at orders of magnitude 
below line rate, so it is essential that attackers don't get to bypass 
the non-crypto checks for than a tiny fraction of the packets they 
spoof.



Re: TCP/BGP vulnerability - easier than you think

2004-04-22 Thread Crist Clark
David Luyer wrote:
[snip]
With ipsec, you have crypto overhead before you have any opportunity
to do the basic sanity check.
Minor point, but with IPsec, the 32-bit SPI and the 32-bit replay counter
are very low cost ways to drop the majority of traffic from a flood of
random junk with no crypto calculations. You actually have more bits
with AH or ESP than with TCP. The 32-bit SPI must be an exact match
like the two 16-bit port fields, and you have 32-bits of sequence number
in both, but the TCP window is much larger than the IPsec window (usually
6-bit by default) leaving you more bits to check.
--
Crist J. Clark   [EMAIL PROTECTED]
Globalstar Communications(408) 933-4387


Re: IP economics morphed into (TCP/RST)

2004-04-22 Thread Iljitsch van Beijnum
On 22-apr-04, at 16:11, Stephen J. Wilcox wrote:

There are more protection methods available than just MD5 (as you 
allude to
Steve).  One mitigator is to use "non-routed" space for BGP peer
connections.

Hmm ok so assume for a moment that I dont want RFC1918 for my links, 
what are my options? :

There isnt a "link-local" for IP altho this would be a great solution 
(surely
this can be written for BGP??).
Who says BGP sessions must run over IP(v4)?

In theory it shouldn't be a problem to exchange IPv4 routing 
information over IPv6 BGP TCP sessions. (But it seems some of our 
favorite vendors didn't add this scenario to their regression tests.)

Or I could use all eBGP addresses from a block which I dont route and 
filter
internally.. I suspect this is a non-starter, I will have to include 
all my
addresses given to me by peers and its gonna screw traces, monitoring 
etc.

Can I use secondary IP addresses and then BGP with these addresses, 
this would
be a form of "security by obscurity" but providing you can keep the 
info a
secret thats surely going to do it?
If you combine the two approaches above and filter all traffic to the 
primary address, traceroutes et al still work but people from the 
outside don't get to hit the route processor.



RE: IP economics morphed into (TCP/RST)

2004-04-22 Thread Stephen J. Wilcox

On Thu, 22 Apr 2004, Blaine Christian wrote:

> 
> 
> > Can I use secondary IP addresses and then BGP with these addresses, this
> > would be a form of "security by obscurity" but providing you can keep the
> > info a secret thats surely going to do it?
> 
> It will depend on your architecture in large part.  In some cases there is
> absolutely no need to route the prefixes that you use for your BGP sessions
> beyond the devices doing BGP.  This can reduce your exposure to MD5 related
> cpu churn etc...

Yes, but (1) its difficult and (2) as these are external sessions I need to 
ensure my peers are doing the same, as the chances are they wont and the chances 
are the attack comes in externally then I'm still at risk

Steve



Re: IP economics morphed into (TCP/RST)

2004-04-22 Thread Stephen J. Wilcox

On Thu, 22 Apr 2004, Niels Bakker wrote:

> * [EMAIL PROTECTED] (Stephen J. Wilcox) [Thu 22 Apr 2004, 16:11 CEST]:
> > There isnt a "link-local" for IP altho this would be a great solution
> > (surely this can be written for BGP??).
> 
> 169.254/16

is not link-local and will be routed if you try. i was thinking link-local as in 
ISIS style

> > Or I could use all eBGP addresses from a block which I dont route and filter
> > internally.. I suspect this is a non-starter, I will have to include all my
> > addresses given to me by peers and its gonna screw traces, monitoring etc.
> 
> I've seen e.g. BT do this

and public peering? or when viewed from their peers networks..?

Steve

> 
> 
>   -- Niels.
> 



RE: IP economics morphed into (TCP/RST)

2004-04-22 Thread Blaine Christian


> Can I use secondary IP addresses and then BGP with these 
> addresses, this would 
> be a form of "security by obscurity" but providing you can 
> keep the info a 
> secret thats surely going to do it?

It will depend on your architecture in large part.  In some cases there is
absolutely no need to route the prefixes that you use for your BGP sessions
beyond the devices doing BGP.  This can reduce your exposure to MD5 related
cpu churn etc...




RE: Backbone IP network Economics - peering and transit

2004-04-22 Thread Michel Py

>> where's the "lot of cost"?

> Stephen J. Wilcox
> This is private vs public..

Even if it's private, and assuming that you're clever enough not to peer
for a modem's worth of traffic, the cost is a no-brainer, IMHO.
Someone checks my math please:
At $20 per megabit for transit (which I find very low, but let's go for
it anyway) a GE link for peering with an average use of 10% means $24000
per year saved; pays for the xconnect.

Michel.
 


Re: IP economics morphed into (TCP/RST)

2004-04-22 Thread Niels Bakker

* [EMAIL PROTECTED] (Stephen J. Wilcox) [Thu 22 Apr 2004, 16:11 CEST]:
> There isnt a "link-local" for IP altho this would be a great solution
> (surely this can be written for BGP??).

169.254/16


> Or I could use all eBGP addresses from a block which I dont route and
> filter internally.. I suspect this is a non-starter, I will have to
> include all my addresses given to me by peers and its gonna screw
> traces, monitoring etc.

I've seen e.g. BT do this


-- Niels.


RE: asymmetric/peer RPF [RE: TCP/BGP vulnerability - easier than you think]

2004-04-22 Thread Michel Py

From: Pekka Savola [mailto:[EMAIL PROTECTED] 
> When discussing RPF towards peers or w/ asymmetric
> paths, I'd recommend to read RFC 3704

I have, this is a very good document.

> If your prefix filter stops a neighbor from
> advertising a prefix, maybe you would have to
> revise your prefix filtering policy (e.g.,
> revise it more often, get notice if the peer
> sends you something you're filtering, tell to
> peers not to advertise anythnig that's not
> properly in the routing DB's, etc.)?  This
> doesn't seem so bad to me...

I agree, but there are many people that think it is very bad. Trouble
is, using RPF has a great potential for problems as it will drop traffic
(which is the reason it's not being used in the first place). The point
I was trying to make is as follows: if you don't use RPF (which is
probably the case) then there is no harm in prefix-filtering peers (if
you are not a tier-1) even if the prefix-filters are not perfect.
Needless to say, there is no point prefix-filtering if your filters are
completely messed up.

Michel.



RE: Backbone IP network Economics - peering and transit

2004-04-22 Thread Stephen J. Wilcox

On Tue, 20 Apr 2004, Michel Py wrote:

> > Stephen J. Wilcox wrote:
> > I assume Vijay meant the cost of a port for private peering, in which case
> > if you private with all your peers and you have a lot of small peers thats
> > going to be a lot of cost for a few kbps of traffic
> 
> I'm having trouble parsing this. You connect your FE or GE port to an
> ISL/802.11q trunk to the colo's/IX switch. Then either a)everyone is in
> the same broadcast domain (dumb but no config), or there's a VLAN on
> that trunk from/to you to your peer(s). Save for the colo's/IX
> administrative/xconnect fee, where's the "lot of cost"?

This is private vs public..

Steve



Re: IP economics morphed into (TCP/RST)

2004-04-22 Thread Stephen J. Wilcox

On Tue, 20 Apr 2004, Blaine Christian wrote:

> > The other is our new hot topic of security, not sure if anyone has thought
> > of this yet (or how interesting it is) but the nature of the bgp attack
> > means that if you can view a BGP session you can figure things about a peer
> > that would otherwise be hidden from you in particular the port numbers in
> > use.. and I'm not entirely clear on the details but it sounds like when you
> > hit the first session, you can take the rest out very easily.
> > 
> > We cant take BGP out of band (yet!), perhaps we can keep it better hidden
> > from view tho..
> 
> There are more protection methods available than just MD5 (as you allude to
> Steve).  One mitigator is to use "non-routed" space for BGP peer
> connections.  If you have the ability to filter on TTL 255 you are in even
> better shape (arguably perfectly secure against all but
> configuration/hardware failures).  You have some vulnerability with
> non-routed space if you do default routing or have folks who default towards
> the device doing the BGP peering though.  Source routing is also a potential
> hazard for the non-routed solution (does anyone have this enabled anymore?).
> 
> Apologies for the morph but this raised a great point.   

Hmm ok so assume for a moment that I dont want RFC1918 for my links, what are my 
options? :

There isnt a "link-local" for IP altho this would be a great solution (surely
this can be written for BGP??).

Or I could use all eBGP addresses from a block which I dont route and filter 
internally.. I suspect this is a non-starter, I will have to include all my 
addresses given to me by peers and its gonna screw traces, monitoring etc.

Can I use secondary IP addresses and then BGP with these addresses, this would 
be a form of "security by obscurity" but providing you can keep the info a 
secret thats surely going to do it?

Steve




Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread Alexei Roudnev

May be, it is reasonable to have a simple MD-5 key - I mean, without a
rotation, use e-mail to exchange it instead of the phone,
do not generate but use simple password, and so on. If this key is never
changed, then risk to lost a session is very low, and I do not see _any_
reason to keep it on rotation plan (hacker must know too much and can damage
too little, in this case).

Even such keys as '415' or 'monday' will prevent TCP attacks in alll cases -
if single attack require 5 - 30 minutes for the one hit, then no any way
exists to use dictionary 'guess' for password cracking.

Now, we can see a _histeria_ around this problem; but yes, when it will coll
down (1 - 2 weeks), it will be a time to make a reasonable improvements.


- Original Message - 
From: "Patrick W.Gilmore" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: "Patrick W.Gilmore" <[EMAIL PROTECTED]>
Sent: Tuesday, April 20, 2004 8:49 PM
Subject: Re: Winstar says there is no TCP/BGP vulnerability


>
> On Apr 20, 2004, at 11:29 PM, Michel Py wrote:
>
> > Please forgive me if I'm naive and/or ask a stupid question, but is
> > there any reason (besides your platform not supporting it) _not_ to MD5
> > your BGP sessions? Geez, on my _home_ router all my v4 BGP sessions are
> > MD5ed (v6 not there yet).
>
> There is serious operational overhead in maintaining sync'ed passwords
> between separate organizations.  IOW: Eventually someone will screw up
> and lose the password.  When they do, the session goes down, and
> probably for far longer than if some miscreant tries to RST it via the
> "vulnerability".
>
> Actual data: Over the past three plus years an organization with on the
> order of a dozen MD5-ized BGP sessions has has multiple down sessions
> due to, for instance, a peer doing standard (for them) password
> rotation and forgetting to inform the organization.  Each time incurred
> a minimum of several hours downtime, once stretching into several days
> as the peer could not figure out what was wrong and get the right
> person with the password to give it to the organization.
>
> Over the past three plus years with over 1000 non-MD5-ized BGP
> sessions, the same organization experienced exactly *ZERO* seconds of
> downtime identified as due to RST-style attacks.  And certainly no
> prolonged outages due to it.
>
>
> Add to that the additional CPU overhead some people have reported,
> making it easier to packet the router to its knees, and MD5 looks like
> a cure worse than the disease.
>
>
> All that said, it is your router, your peers, your decision.  I would
> never dream of telling anyone who wanted MD5 to not do it.  I just
> don't understand people who want to do it.  Especially when they could
> be doing things like filtering at the leaf nodes and forcing their
> vendors to support the TTL hack.
>
> But that's me.
>
> -- 
> TTFN,
> patrick
>



Re: Massive stupidity (Was: Re: TCP vulnerability)

2004-04-22 Thread Alexei Roudnev

Assuming that he do not know port number and must try 20 - 40 ports, it
takes 200 * 10 = 2000 seconds to resert a single session... Useless except a
very special cases 9such as a big community decided to knock down SCO, for
example).



>
> At 05:09 PM 20/04/2004, Richard A Steenbergen wrote:
>
> >party to know which side won the collision handling. Therefore you need
> >262144 packets * 3976 ephemeral ports (assuming both sides are jnpr,
again
> >worst case) * 2 (to figure out who was the connecter and who was the
> >accepter) = 2084569088 packets to exhaustively search all space on this
> >one single Juniper to Juniper session. Now, lets just for the sake of
> >argument say that the router is capable of actively processing 10,000
> >packets/sec of rst (a fairly exagerated number) and still have this be
> >considered a tcp attack instead of a straight DoS against the routing
> >engine. This will still take 208456 seconds, or 57.9 hours.
> 
> I dont understand why the large differences in claims
>
> http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt
>
> says
> Modern operating
> systems normally default the RCV.WND to about 32,768 bytes. This
> means that a blind attacker need only guess 65,535 RST segments
> (2^^32/(RCV.WND*2)) in order to reset a connection. At DSL speeds
> this means that most connections (assuming the attacker can
> accurately guess both ports) can be reset in under 200 seconds
> (usually far less). With the rise of broadband availability and
> increasing available bandwidth, many Operating Systems have raised
> their default RCV.WND to as much as 64k, thus making these attacks
> even easier.
>
>
> Also, with the various 'bots' at peoples disposal, why the assumption the
> attack would not be distributed.
>
>  ---Mike
>



Re: snmp vuln

2004-04-22 Thread Saku Ytti

On (2004-04-21 23:24 -0700), Alexei Roudnev wrote:

> If you ever read SNMP specs, you can realize, that there is not any C or C++
> SNMP  implementation without such problem. So, rule number 1 is _never
> expose SNMP to Internet, and be careful to filter out any inbound packets,
> forwarded to your SNMP ports.

 Which makes me wonder, why in most implementations services listen in
each configured address. Provider might have lot of link networks, even
from customers demand from his link network. This makes filtering in 
borders little less feasible. And for this particular attack two
way comminication is not needed, so SNMP with ACL is not enought to
mitigate this. With explicitly defined listen addresses, filtering in border
would be easy.
 JunOS allows to set interfaces to SNMP, but according to netstat it
still listens in *.161.

-- 
  ++ytti


Re: Winstar says there is no TCP/BGP vulnerability

2004-04-22 Thread Alexei Roudnev

If they make proper anty-spoofiing filtering, no need in MD5. 


> 
> Perhaps we are all making too much of this...
> 
> It appears that Winstar feels that there is no need for MD5
> authentication of peering sessions. One of our customers has just had
> the following response from Winstar following a request to implement MD5
> on their OC3 connection to Winstar. My first suggestion is to locate
> another upstream provider (they have 3 already).
> 
> However, perhaps someone from Winstar would care to help us all
> understand what the alternative solution is to securing the session via
> MD5? I would *love* an alternative to the 5 days of work we've just gone
> through.
> 
> > -Original Message-
> > From: Justin Crawford - NMCW Engineer [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, April 20, 2004 11:13 AM
> > To: xx
> > Subject: Re: *SPAM* MD5 implimentation on BGP
> > 
> > x,
> > 
> > Winstar does not currently run MD5 authentication with our peers.
> > 
> > Thanks
> > 
> > Justin
> > 
> > Thank you for your time and business
> > 
> > Justin Crawford
> > Winstar NMCW
> > Ph: 206-xxx.
> 
> Has anyone else run in to this with Winstar?
> 
> -- 
> Rodney Joffe
> CenterGate Research Group, LLC.
> http://www.centergate.com
> "Technology so advanced, even we don't understand it!"(SM)