Stealing The Internet An Internet-Scale Man In The Middle Attack

Tony Kapela [email protected]

Agenda • • • •

Hijacking Mechanics Route Filtering Analysis Prior Work

What’s Novel? • Sub-prefix hijacking is not new – I’m well aware of this

• Creating Feasible Return path in-place – Possibly novel contribution

• Half-novel – TTL increment to hide Layer 3 path – Transparent-AS, route-server-client style – Hide hijacker from monitoring ASN’s

BGP MITM Hijack Concept •

Attacker must have a feasible path back to the victim (to sink traffic) – (Ab)uses AS-PATH loop detection of BGP to create the path (DAG)



Hijacked route + feasible path to victim permit interception

BGP MITM Setup 1. Plan a viable path to target 2. Note the ASN’s seen towards target from the attacker’s vantage point 3. Apply as-path prepends naming each of the ASN’s intended for viable path 4. Install static routes towards the next-hop of the first AS in viable path 5. Adjourn to Lobby Bar

Forwarding pre BGP-MITM BGP Update: 192.168.0.0/16

Network Provider #2

Network Provider #5

Network Provider #3

Network Provider #4

Network Provider #1

Attacker Network

Victim Network

Forwarding post BGP-MITM BGP Update: 192.168.0.0/16

Network Provider #2

Network Provider #1

Network Provider #5

BGP Update: 192.168.1.0/24)

BGP Update: 192.168.1.0/24)

Network Provider #3

BGP Update: 192.168.1.0/24 AS-PATH prepend: + 4 5 {V}

Attacker Network

Network Provider #4

Victim Network

Defcon Hijack Uptake Summary

Timestamp

Plus-t0

Carrying /22

Carrying /24

1218396798

0

252

0

1218396887

80

252

238

Data courtesy Martin Brown of Renesys Corp.

Defcon Prefix Hijacking Statistics Cumulative Uptake of 238 AS's reporting 24.120.56.0/24 1.00

30

0.90

27

0.80

24

0.70

21

0.60

18

0.50

15

0.40

12 CU of AS's reporting hijacked /24

0.30

9

AS's reporting at delta (t)

0.20

6

0.10

3

0.00

0 0

5

10

15

20

25

30

35

40

45

Seconds (t) since first report

Data courtesy Martin Brown of Renesys Corp.

50

55

60

65

70

75

80

Observations • Route propagates (as expected) – Nearly everyone accepted – Can’t speak to ‘true’ forwarding reality of 30k ASN’s

• Low disruption at “Ramp Up” of hijack – “Nearly silent” insertion of eavesdropper

• Definite hit at “Ramp-Down” of hijack – FIB micro-loops as expected

Future Of Filtering • Researchers Welcomed – soBGP, sBGP: new features in routing system – R-PKI: happens outside routing system – Need more creative minds on this problem

• How do we address ‘trust?’ – Maybe we don’t, build fast alerting systems – RIR’s could anchor something

Anonymyzing The Hijacker • We add value to TTL of packets in transit (iptables) • Effectively hides hops for the hijacked inbound traffic and ‘viable path’ to target – It’s easy: iptables -I PREROUTING -d 24.120.56.0/24 -j TTL --ttl-inc 10 -t mangle

TTL Re-Writing (Additive) Packet TTL: 255

Packet TTL: 254

Packet TTL: 253

Packet TTL: 252

Network Provider #2

Network Provider #5

Victim Network

Packet TTL: 1 Geneates TIMEEXCEDED

Network Provider #1 Packet TTL: 2

Network Provider #3TTL: Packet 1

IP TTL increment: +3

Attacker Network Normal forwarding: TTL -1

Network Provider #4 Packet TTL: 2

DEFCON Prefix Hijack Without TTL adjustment 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

12.87.94.9 [AS 7018] 4 msec 4 msec 8 msec tbr1.cgcil.ip.att.net (12.122.99.38) [AS 7018] 4 msec 8 msec 4 msec ggr2.cgcil.ip.att.net (12.123.6.29) [AS 7018] 8 msec 4 msec 8 msec 192.205.35.42 [AS 7018] 4 msec 8 msec 4 msec cr2-loopback.chd.savvis.net (208.172.2.71) [AS 3561] 24 msec 16 msec 28 msec cr2-pos-0-0-5-0.NewYork.savvis.net (204.70.192.110) [AS 3561] 28 msec 28 msec 28 msec 204.70.196.70 [AS 3561] 28 msec 32 msec 32 msec 208.175.194.10 [AS 3561] 28 msec 32 msec 32 msec colo-69-31-40-107.pilosoft.com (69.31.40.107) [AS 26627] 32 msec 28 msec 28 msec tge2-3-103.ar1.nyc3.us.nlayer.net (69.31.95.97) [AS 4436] 32 msec 32 msec 32 msec * * * (missing from trace, 198.32.160.134 – exchange point) tge1-2.fr4.ord.llnw.net (69.28.171.193) [AS 22822] 32 msec 32 msec 40 msec ve6.fr3.ord.llnw.net (69.28.172.41) [AS 22822] 36 msec 32 msec 40 msec tge1-3.fr4.sjc.llnw.net (69.28.171.66) [AS 22822] 84 msec 84 msec 84 msec ve5.fr3.sjc.llnw.net (69.28.171.209) [AS 22822] 96 msec 96 msec 80 msec tge1-1.fr4.lax.llnw.net (69.28.171.117) [AS 22822] 88 msec 92 msec 92 msec tge2-4.fr3.las.llnw.net (69.28.172.85) [AS 22822] 96 msec 96 msec 100 msec switch.ge3-1.fr3.las.llnw.net (208.111.176.2) [AS 22822] 84 msec 88 msec 88 msec gig5-1.esw03.las.switchcommgroup.com (66.209.64.186) [AS 23005] 84 msec 88 msec 88 msec 66.209.64.85 [AS 23005] 88 msec 88 msec 88 msec gig0-2.esw07.las.switchcommgroup.com (66.209.64.178) [AS 23005] 88 msec 88 msec 88 msec acs-wireless.demarc.switchcommgroup.com (66.209.64.70) [AS 23005] 88 msec 84 msec 84 msec

Before & After BGP-MITM+TTL Original: 2 3 4 5 6 7 8 9 10 11 12 13 14

12.87.94.9 [AS 7018] 8 msec 8 msec 4 msec tbr1.cgcil.ip.att.net (12.122.99.38) [AS 7018] 8 msec 8 msec 8 msec 12.122.99.17 [AS 7018] 8 msec 4 msec 8 msec 12.86.156.10 [AS 7018] 12 msec 8 msec 4 msec tge1-3.fr4.sjc.llnw.net (69.28.171.66) [AS 22822] 68 msec 56 msec 68 msec ve5.fr3.sjc.llnw.net (69.28.171.209) [AS 22822] 56 msec 68 msec 56 msec tge1-1.fr4.lax.llnw.net (69.28.171.117) [AS 22822] 64 msec 64 msec 72 msec tge2-4.fr3.las.llnw.net (69.28.172.85) [AS 22822] 68 msec 72 msec 72 msec switch.ge3-1.fr3.las.llnw.net (208.111.176.2) [AS 22822] 60 msec 60 msec 60 msec gig5-1.esw03.las.switchcommgroup.com (66.209.64.186) [AS 23005] 60 msec 60 msec 60 msec 66.209.64.85 [AS 23005] 64 msec 60 msec 60 msec gig0-2.esw07.las.switchcommgroup.com (66.209.64.178) [AS 23005] 60 msec 64 msec 60 msec acs-wireless.demarc.switchcommgroup.com (66.209.64.70) [AS 23005] 60 msec 60 msec 60 msec

Hijacked: 2 3 4 5 6 7 8 9 10 11 12 13

12.87.94.9 [AS 7018] 8 msec 8 msec 4 msec tbr1.cgcil.ip.att.net (12.122.99.38) [AS 7018] 4 msec 8 msec 8 msec ggr2.cgcil.ip.att.net (12.123.6.29) [AS 7018] 4 msec 8 msec 4 msec 192.205.35.42 [AS 7018] 8 msec 4 msec 8 msec cr2-loopback.chd.savvis.net (208.172.2.71) [AS 3561] 16 msec 12 msec * cr2-pos-0-0-5-0.NewYork.savvis.net (204.70.192.110) [AS 3561] 28 msec 32 msec 32 msec 204.70.196.70 [AS 3561] 28 msec 32 msec 32 msec 208.175.194.10 [AS 3561] 32 msec 32 msec 32 msec gig5-1.esw03.las.switchcommgroup.com (66.209.64.186) [AS 23005] 88 msec 88 msec 84 msec 66.209.64.85 [AS 23005] 88 msec 88 msec 88 msec gig0-2.esw07.las.switchcommgroup.com (66.209.64.178) [AS 23005] 84 msec 84 msec 88 msec acs-wireless.demarc.switchcommgroup.com (66.209.64.70) [AS 23005] 88 msec 88 msec 88 msec

Anonymizing The Hijacker, More • Transparent-AS and Route-reflector-client operation – Permits attacker to originate prefixes with $whatever for AS-PATH

• AS-PATH now ‘clean’ – Attacker ASN is simply not present – feasible path now looks ‘more correct’

Prior MITM Work • NIST Report July 07: says “it’s possible” • Paul Francis et. al (Cornell): hijack through AS-PATH – >50% interception rate • Jintae Kim et. Al (UIUC):, A BGP Attack Against Traffic Engineering, doesn’t create feasible paths towards target

In conclusion • We saw that BGP MITM can happen nearly invisibly • We noted the BGP as-path does reveal the attacker unless massaged • Duh; filter your customers • Enforce next-as (where you can)

Acknowledgements • Todd Underwood, Martin Brown, and Renesys Staff • Latt Mevine (transparent-as) • Tom Scholl, ATT Labs

Anton Kapela - Stealing the Internet.pdf

Loading… Page 1. Whoops! There was a problem loading more pages. Anton Kapela - Stealing the Internet.pdf. Anton Kapela - Stealing the Internet.pdf. Open.

91KB Sizes 1 Downloads 213 Views

Recommend Documents

anton stankowski.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Caught Stealing - Cato Institute
Oct 27, 2004 - near-giddy. John Fogerty's ... forms and carrying balls, hunted for auto- .... will flow into establishments outside the sta- ..... Show Me the Money! ... School Choice in the District of Columbia: Saving Taxpayers Money, Increasing.

Chejov Anton - Kashtanka.PDF
Por la mañana, su amo, el ebanista Luká Ale- xándrich, se había puesto el gorro, había tomado. Page 3 of 45. Chejov Anton - Kashtanka.PDF. Chejov Anton ...

anton lavey pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. anton lavey pdf.

Caught Stealing - Cato Institute
Oct 27, 2004 - forms and carrying balls, hunted for auto- graphs from former ..... For further technical discussion of these results, see Dennis ... Lessons from Florida: School Choice Gives Increased Opportunities to Children with Special ...

Anton Corbijn life
alone 1-2-3.AntonCorbijn life.AntonCorbijn life.Asisters progres.Ultra minigolfadventures. Jason derulo talk dirty feat. 2 chainz.291211267.Doraemon hindi 2015.C advanced 3d game programmingwith directx 9.0.pdf.Japanese massage. les.The war doctor vo

Ioana - Anton Holban.pdf
Page 3 of 82. Ioana - Anton Holban.pdf. Ioana - Anton Holban.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Ioana - Anton Holban.pdf.

the satanic bible anton szandor lavey pdf
File: The satanic bible anton szandor. lavey pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. the satanic bible anton szandor lavey pdf. the satanic bible anton szandor lavey pdf. Open. Extract. Open with. Sign

PdF Download Stealing the Corner Office: The Winning ...
... Office: The Winning Career. Strategies They ll Never Teach You in Business School Full Books ... for MBA students, young corporate managers, and top-.

PDF Download The Satanic Witch By Anton Szandor ...
... The Satanic Witch ,ebook reader software The Satanic Witch ,google ebook .... The Satanic Witch ,kindle The Satanic Witch ,epub creator The Satanic Witch ...

Systemic Risk-Taking - of Anton Korinek
Abstract. This paper analyzes the risk-taking behavior of agents in an economy that is prone to systemic risk, captured by financial amplification effects that involve a feedback loop of falling asset prices, tightening financial constraints and fire

Anton S. Kraievoy - Curriculum Vitae - GitHub
Nov 4, 2011 - Experience: 7 years of experience in web/Java development and network computing ... Application design, development and support skills.

The Data Locality of Work Stealing - Carnegie Mellon School of ...
Department of Computer Sciences. University of Texas at Austin .... race-free computation that can be represented with a series-parallel dag [33]. ... In the second class, data-locality hints supplied by the programmer are used in thread ...