61
http://www.ripe.net RIPE Network Coordination Centre Facilitating Secure Internet Infrastructure Andrei Robachevsky RIPE NCC

Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Facilitating Secure Internet Infrastructure

Andrei Robachevsky RIPE NCC

Page 2: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 2 Andrei Robachevsky

About the RIPE NCC

•  Bottom-up, self-regulated, membership association, not-for-profit

•  Regional Internet Registry -  Allocation of IP addresses and AS numbers -  Reverse DNS

•  Network Coordination Centre -  Information Services, Coordination activities

•  Funded entirely by members; fully autonomous

 Open  Transparent  Neutral  Impartial

•  RIPE NCC is not RIPE

Page 3: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 3 Andrei Robachevsky

Regional Internet Registries (RIRs)

1992

1993

1997

2002

2005

Page 4: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 4 Andrei Robachevsky

The presenter

• Chief Technical Officer - General IT - On-line Services • RIPE Database • DNS & K-root •  Information Services

- Inter-RIR technical coordination

• Not a security expert, but - Coordinated deployment of DNSSEC at the RIPE NCC - Active participant in resource certification activities

Page 5: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 5 Andrei Robachevsky

Thanks

• Olaf Kolkman and Jaap Akkerhuis from NLNetLabs • Geoff Huston from APNIC • Daniel Karrenberg from RIPE NCC

- For allowing me to steal their slides

• RIPE NCC and other RIR teams - For doing the actual work

• The Security Forum - For inviting me

Page 6: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 6 Andrei Robachevsky

Outline

• Security and the Internet

• Security and DNS

• Security and Routing

• Challenges

Page 7: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 7 Andrei Robachevsky

There are many ways to be bad on the Internet

•  Enlist a Bot army and mount multi-gigabit DOS attacks -  Extortion leverage

•  Port Scan for known exploits -  Deploy a bot, spyware or simply annoy people

•  Spew spam -  Yes, there are still gullible folk out there!

•  Mount a fake web site attack -  And lure victims

•  Mount a routing attack -  And bring down an entire service / region / country / global network!

Page 8: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 8 Andrei Robachevsky

Internet Architecture

• A Network of Networks - Little intelligence inside the network - Most of the intelligence is in the end-systems •  Adding functionality doesn’t require network changes •  Adding security doesn’t require network changes

• Between Networks - Routing & Addressing - Domain Name System - Introducing changes here is more challenging

Page 9: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 9 Andrei Robachevsky

Securing the Internet

• Securing the Infrastructure - Cables, routers, power, colo’s, etc.

• Securing the edges - Servers, PCs, etc.

• Securing the “between” - The common good

Page 10: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 10 Andrei Robachevsky

Network Infrastructure

• Little intelligence - Little potential for exploitation and abuse

• Key business assets for ISPs - Lots of motivation for security

• Clear responsibility • Challenges

- Can be done locally and incrementally - Not a big problem

Page 11: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 11 Andrei Robachevsky

The end-systems

• Hosts, personal computers, servers - Intelligence here: a versatile abuse toolkit - Poorly defended: design flaws and lack of expertise - Increasing bandwidth: effective weapon - Responsibility: widely dispersed - Criminal activities: botnets, etc.

• Challenges - Cannot be done centrally - Little control and responsibility - Buggy applications - Growing number

Page 12: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 12 Andrei Robachevsky

The between - the common good

• Routing - Decentralised - Addressing - hierarchical

• DNS - Hierarchical, distributed

• Challenges - Responsibility is dispersed - Cannot be done centrally - Securing edges can be done easier - Tragedy of the commons

Page 13: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 13 Andrei Robachevsky

Outline

• Security and the Internet

• Security and DNS

• Security and Routing

Page 14: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 14 Andrei Robachevsky

Securing DNS

• Why to secure DNS? • DNSSEC • Deployment of DNSSEC • Challenges

Page 15: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 15 Andrei Robachevsky

The Problem

•  DNS data published by the registry is being replaced on its path between the “server” and the “client”.

•  This can happen in multiple places in the DNS architecture -  Some places are more vulnerable to attacks then others -  Vulnerabilities in DNS software make attacks easier

(and there will always be software vulnerabilities)

Page 16: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 16 Andrei Robachevsky

DNS Architecture

Registry DB

Primary DNS server

Secondary DNS server

Cache server

Registrars

Client

Cache server

DNS Protocol Provisioning

Page 17: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 17 Andrei Robachevsky

DNS Architecture

Registry DB

Server compromise

Registrars

DNS Protocol Provisioning

Inter-server communication

Cache Poisoning

Page 18: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 18 Andrei Robachevsky

Solution: DNSSEC

• Sign the data - Each resource record separately

• Secure delegation points - Sign the keys of the children

• Allow building a chain of trust from a Trust Anchor to the actual record

• A Metaphor: - Compare DNSSEC to a sealed transparent envelope

Page 19: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 19 Andrei Robachevsky

.net

How DNSSEC works

root

.net

www.ripe.net ?

Page 20: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 20 Andrei Robachevsky

ripe.net

.net

How DNSSEC works

root

.net

www.ripe.net ?

Page 21: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 21 Andrei Robachevsky

ripe.net

.net

.net =

How DNSSEC works

root root=

.net

www.ripe.net ?

Trust anchor

Page 22: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 22 Andrei Robachevsky

ripe.net

ripe.net =

.net

.net =

How DNSSEC works

root root=

.net

ripe.net

www.ripe.net ?

Trust anchor

Page 23: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 23 Andrei Robachevsky

www.ripe.net=193.0.19.25

ripe.net

ripe.net =

.net

.net =

How DNSSEC works

root root=

.net

ripe.net

www.ripe.net ?

Trust anchor

Page 24: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 24 Andrei Robachevsky

DNSSEC protection

Registry DB

Registrars Registrants

‘envelope sealed’ ‘Seal checked’

‘Seal checked’ DNS Protocol Provisioning

Page 25: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 25 Andrei Robachevsky

DNSSEC properties

•  DNSSEC secures the name to address mapping -  Transport and Application security are just other layers

•  DNSSEC provides message authentication and integrity verification through cryptographic signatures -  Authentic DNS source -  No modifications between signing and validation

•  It does not provide authorisation •  It does not provide confidentiality

Page 26: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 26 Andrei Robachevsky

DNSSEC secondary benefits

•  DNSSEC provides an “independent” trust path -  The person administering “https” is most probably a

different from person from the one that does “DNSSEC” -  The chains of trust are most probably different

Page 27: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 27 Andrei Robachevsky

DNSSEC at the RIPE NCC

• Service commitment with the community drawn up in 2005 • DNSSEC operations introduced on 1 January 2006 •  Initially, the NCC signed all forward zones

(eg. ripe.net) and reverse /8 zones (eg. 193.in-addr.arpa) ‏• The NCC also began

signing the ENUM (e164.arpa) zone in November 2007

Page 28: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 28 Andrei Robachevsky

DNSSEC Setup

signer

provisioning server ns-pri.ripe.net

unsigned zones signed zones

publish signed zones

RIPE database Domain

objects

Page 29: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 29 Andrei Robachevsky

Trust anchors

• Because the parent is not signed each /8 is a trust anchor • Trust anchors of all our signed zones are published at

https://www.ripe.net/projects/disi/keys/index.html • BIND-style file which can be easily included • File is signed with the RIPE NCC PGP key

Page 30: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 30 Andrei Robachevsky

Secure delegation points

• Users insert their DS (delegated signer) records into parents zones via the RIPE database • Create domain objects with the appropriate DS

attributes

Page 31: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 31 Andrei Robachevsky

Operational impact of DNSSEC

• CPU usage on the server doubled - from about 8% to about 16%

• Traffic to the server went up by 60% • There was no noticeable increase in memory usage

Page 32: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 32 Andrei Robachevsky

How about the ‘client’ side

• Set up your caching nameserver to perform validation and the infrastructure behind it is protected

• DNSSEC has not yet been pushed to the host or application

• Costs are in maintaining trust anchors - There is no standard to automate against

Page 33: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 33 Andrei Robachevsky

Challenges

• New technology; chicken and egg • L9 issues at the top • Zone walking possibility

- Is this really an issue in your environment? - Solutions are there - NSEC3

• Higher security vs increased complexity • Automated key rollover and distribution

Page 34: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 34 Andrei Robachevsky

Outline

• Security and the Internet

• Security and DNS

• Security and Routing

Page 35: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 35 Andrei Robachevsky

Securing Routing

• Why to secure Routing • Certification: A starting point for routing security •  Internet resource certification • Challenges

Page 36: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Why to secure routing?

Page 37: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 37 Andrei Robachevsky

If I were really bad (and evil)…

I’d attack the routing system •  Through routing I’d attack:

-  the DNS system -  isolate critical public servers and resources -  overwhelm the routing system with spurious information -  generate a massive routing overload situation to bring

down entire regional routing domains

•  And see if I could bring the network to a complete chaotic halt

Page 38: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 38 Andrei Robachevsky

What’s the base problem here?

•  Routing is built on mutual trust models of varying quality •  Routing auditing is a low value but expensive activity •  It’s a tragedy of the commons situation:

-  Nobody can single-handedly apply rigorous tests on the routing system

-  And the lowest common denominator approach is to apply no integrity tests at all

-  All trust and no defence

Page 39: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 39 Andrei Robachevsky

So we need routing security

like we need clean air and clean water

•  But what does this “need” mean? -  Who wants to pay for decent security? -  What’s the business drivers for effective security? -  How do you avoid diversions into security

pantomimes and functionless veneers?

•  Can you make decent security and also support “better, faster and cheaper” networked services?

Page 40: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 40 Andrei Robachevsky

Threats

•  Corrupting the routers’ forwarding tables can result in: -  Misdirecting traffic (subversion, denial of service, third

party inspection, passing off) -  Dropping traffic (denial of service, compound attacks) -  Adding false addresses into the routing system (support

compound attacks) -  Isolating or removing the router from the network

Page 41: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 41 Andrei Robachevsky

Address and Routing Security

The basic routing payload security questions that need to be answered are:

-  Is this a valid address prefix?

-  Who injected this address prefix into the network?

-  Did they have the necessary credentials to inject this address prefix?

-  Is the forwarding path to reach this address prefix an acceptable representation of the network’s forwarding state?

Can these questions be answered reliably, cheaply and quickly?

Page 42: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 42 Andrei Robachevsky

A Foundation for Routing Security

•  The use of authenticatable attestations to allow automated validation of: -  the authenticity of the route object being advertised -  authenticity of the origin AS -  the binding of the origin AS to the route object

•  Such attestations used to provide a cost effective method of validating routing requests -  as compared to the today’s state of the art based on

techniques of vague trust and random whois data mining

Page 43: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 43 Andrei Robachevsky

•  Certification of the “Right-of-Use” of IP Addresses and AS numbers as a linked attribute of the Internet’s number resource allocation and distribution framework

•  Adoption of some basic security functions into the Internet’s routing domain: •  Injection of reliable trustable data

A Resource PKI as the base of validation of network data

•  Explicit verifiable mechanisms for integrity of data distribution Adoption of some form of certified authorization mechanism to

support validation of credentials associated with address and routing information

Certification: A Starting Point for Routing Security

Page 44: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 44 Andrei Robachevsky

X.509 Extensions for IP Addresses

• RFC3779 defines extension to the X.509 certificate format for IP addresses & AS number

•  The extension binds a list of IP address blocks and AS numbers to the subject of a certificate

•  These extensions may be used to convey the issuer’s authorization of the subject for exclusive use of the IP addresses and autonomous system identifiers contained in the certificate extension

•  The extension is defined as a critical extension -  Validation includes the requirement that the Issuer’s certificate

extension must encompass the resource block described in the extension of the certificated being validated

Page 45: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 45 Andrei Robachevsky

What is being Certified For example: RIPE NCC (the “Issuer”) certifies that:

the certificate “Subject” whose public key is contained in the certificate

is the current controller of a set of IP address and AS resources that are listed in the certificate extension

RIPE NCC does NOT certify the identity of the subject, nor their good (or evil) intentions!

Page 46: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Resource Certificates

AFRINIC APNIC ARIN RIPE NCC LACNIC

LIR1 LIR2

ISP ISP ISP ISP ISP ISP ISP

Resource Allocation Hierarchy

Page 47: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Resource Certificates

AFRINIC APNIC ARIN RIPE NCC LACNIC

LIR LIR

ISP ISP ISP ISP ISP ISP ISP

Resource Allocation Hierarchy

Issued Certificates match allocation actions

Page 48: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Resource Certificates

AFRINIC APNIC ARIN RIPE NCC LACNIC

LIR1 LIR2

ISP ISP ISP ISP4 ISP ISP ISP

Issuer: RIPE NCC Subject: LIR2 Resources: 192.2.0.0/16 Key Info: <lir2-key-pub> Signed: <ripencc-key-priv>

Issued Certificates

Resource Allocation Hierarchy

Page 49: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Resource Certificates

AFRINIC APNIC ARIN RIPE NCC LACNIC

LIR1 LIR2

ISP ISP ISP ISP4 ISP ISP ISP

Issuer: RIPE NCC Subject: LIR2 Resources: 192.2.0.0/16 Key Info: <lir2-key-pub> Signed: <ripencc-key-priv>

Issued Certificates

Resource Allocation Hierarchy

Issuer: LIR2 Subject: ISP4 Resources: 192.2.200.0/24 Key Info: <isp4-key-pub> Signed: <lir2-key-priv>

Page 50: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Resource Certificates

AFRINIC APNIC ARIN RIPE NCC LACNIC

NIR1 NIR2

ISP ISP ISP ISP4 ISP ISP ISP

Issuer: RIPE NCC Subject: LIR2 Resources: 192.2.0.0/16 Key Info: <lir2-key> Signed: <ripencc-key-priv>

Issued Certificates

Resource Allocation Hierarchy

Issuer: LIR2 Subject: ISP4 Resources: 192.2.200.0/22 Key Info: <isp4-key> Signed: <lir2-key-priv>

Issuer: ISP4 Subject: ISP4-EE Resources: 192.2.200.0/24 Key Info: <isp4-ee-key> Signed: <isp4-key-priv>

Page 51: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 51 Andrei Robachevsky

What could you do with Resource Certificates?

•  You could sign routing origination authorities or routing requests with your private key, providing an authority for an AS to originate a route for the named prefix. A Relying Party can validate this authority in the RPKI

•  You could use the private key to sign routing information in an Internet Route Registry

•  You could attach a digital signature to a protocol element in a routing protocol

•  You could issue signed derivative certificates for any sub-allocations of resources

Page 52: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Signed Objects

AFRINIC APNIC ARIN RIPE NCC LACNIC

LIR1 LIR2

ISP ISP ISP ISP4 ISP ISP ISP

Issued Certificates

Resource Allocation Hierarchy

Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix 192.2.200.0/24”

Attachment: <isp4-ee-cert>

Signed, ISP4 <isp4-ee-key-priv>

Page 53: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Signed Object Validation

AFRINIC APNIC ARIN RIPE NCC LACNIC

LIR1 LIR2

ISP ISP ISP ISP4 ISP ISP ISP

Issued Certificates

Resource Allocation Hierarchy

Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix 192.2.200.0/24”

Attachment: <isp4-ee-cert>

Signed, ISP4 <isp4-ee-key-priv>

1. Did the matching private key sign this text?

Page 54: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Signed Object Validation

AFRINIC APNIC ARIN RIPE NCC LACNIC

LIR1 LIR2

ISP ISP ISP ISP4 ISP ISP ISP

Issued Certificates

Resource Allocation Hierarchy

Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix 192.2.200.0/24”

Attachment: <isp4-ee-cert>

Signed, ISP4 <isp4-ee-key-priv> 2. Is this certificate valid?

Page 55: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Signed Object Validation

AFRINIC APNIC ARIN RIPE NCC LACNIC

LIR1 LIR2

ISP ISP ISP ISP4 ISP ISP ISP

Issued Certificates

Resource Allocation Hierarchy

Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix 192.2.200.0/24”

Attachment: <isp4-ee-cert>

Signed, ISP4 <isp4-ee-key-priv>

RIPE NCC Trust Anchor

3. Is there a valid certificate path from a Trust Anchor to this certificate?

Page 56: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

Signed Object Validation

AFRINIC APNIC ARIN RIPE NCC LACNIC

LIR1 LIR2

ISP ISP ISP ISP4 ISP ISP ISP

Issued Certificates

Resource Allocation Hierarchy

Route Origination Authority “ISP4 permits AS65000 to originate a route for the prefix 192.2.200.0/24”

Attachment: <isp4-ee-cert>

Signed, ISP4 <isp4-ee-key-priv>

RIPE NCC Trust Anchor Validation Outcomes

1.  ISP4 authorized this Authority document

2.  192.2.200.0/24 is a valid address, derived from an RIPE NCC allocation

3.  ISP4 holds a current right-of-use of 192.2 200.0/24

4.  A route object, where AS65000 originates an advertisement for the address prefix 192.2.200.0/24, has the explicit authority of ISP4, who is the current holder of this address prefix

Page 57: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 57 Andrei Robachevsky

Intended Objectives •  Create underlying framework for route security measures •  Assist ISP business process accuracy with Peering and Customer

Configuration tool support •  Improve the integrity of published data through the signing and verification

capability in the RIPE Database, IRR and similar

Page 58: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 58 Andrei Robachevsky

What this does NOT do

•  Compete with sBGP, soBGP, pgBGP, … proposals -  It is intended to provide a robust validation framework that

supports the operation of such proposals that intend to secure the operation of the BGP protocol

•  Insert another critical point of vulnerability into the Internet -  No intention of defining a framework of certificate-enforced

compliance as a precursor to network reachability -  Interpretation of validation outcomes is a local policy

preference outcome

Page 59: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 59 Andrei Robachevsky

Challenges

• Critical mass of adoption - Even basic route filtering is not a common practice - Little incentive

• More complex provisioning system - Requires modifications and expertise

• A long road to secure routing - RPKI and ROAs only secure origination requests - S*-BGP - more comprehensive proposals, but much more

complex and demanding

Page 60: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Security Forum, April 23, 2008 60 Andrei Robachevsky

Summary

• Securing the Internet means securing: - The edge - The infrastructure - The between

• Securing DNS and routing is challenging and requires a lot of coordination - Lead by example, share experience - Take responsibility as a community - Make it easier

• But this will make the Internet a better and safer place

Page 61: Facilitating Secure Internet Infrastructure · 2008. 4. 23.  · A Foundation for Routing Security • The use of authenticatable attestations to allow automated validation of: -

http://www.ripe.net

RIPE Network Coordination Centre

Questions?