Top Banner
Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference ( NDSS 2012)
14

Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Jan 03, 2016

Download

Documents

Bruce Kennedy
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Persistent OSPF Attacks

Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh

19th Annual Network & Distributed System Security Conference (NDSS 2012)

Page 2: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Outline

• Introduction (OSPF v2)

•OSPF Security Strengths

•Attack

• Impact and Analysis

•Mitigation Measures

Page 3: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Introduction (OSPF v2)

•Most used protocol in Autonomous System

• Link State Routing Protocol

• LSA is flooded throughout the AS

•Designated Router

•Database Description (DBD) Messages

Page 4: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Routing table

Page 5: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Adjacency set up

Page 6: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Security Strengths

•Per Link Authentication

•Flooding

•Fight Back

•LSA Content

Page 7: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Remote False Adjacency Attack• To fool a remote router

•Persistent control over routing table

•Denial of Service -Link overload-Routing loops -Delivery Failure

• Eavesdropping

Page 8: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Mechanism

Page 9: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.
Page 10: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Consequences

•Attack can be exploited to black hole traffic

•Black-holing most AS traffic with single phantom router

Page 11: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Real World Impact

List of AS topologies used

AS number ISP name Number of Routers

1221 Telstra 115

3967 Exodus 80

6461 Abovenet 145

Page 12: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Percentage of black-holed routers pairs when multiple phantom routers are used

1 2 3 40%

10%

20%

30%

40%

50%

60%

70%

80%

Telstra Exodus Abovenet

Page 13: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

Mitigation Measures

•Protocol Weakness•Same secret key•Master cannot see message content

•Anti source-IP spoofing

•Master must prove to slave that it has seen at least one message from slave

Page 14: Persistent OSPF Attacks Gabi Nakibly, Alex Kirshon and Dima Gonikman, Dan Boneh 19th Annual Network & Distributed System Security Conference (NDSS 2012)NDSS.

THANKYOU

AND

ANYQuestions?