[lacnog] RV: NWW: Fix to Chinese Internet traffic hijack due in January

alvaro.sanchez en adinet.com.uy alvaro.sanchez en adinet.com.uy
Mie Dic 8 16:23:29 BRST 2010



----Mensaje original----
De: eugen en leitl.org
Fecha: 08/12/2010 16:13 
Para: "NANOG list"<nanog en nanog.org>
Asunto: NWW: Fix to Chinese Internet traffic hijack due in January 


http://www.networkworld.com/cgi-bin/mailto/x.cgi?
pagetosend=/news/2010/120710-chinese-internet-traffic-fix.
html&pagename=/news/2010/120710-chinese-internet-traffic-fix.
html&pageurl=http://www.networkworld.com/news/2010/120710-chinese-
internet-traffic-fix.html&site=printpage&nsdr=n

Fix to Chinese Internet traffic hijack due in January

Registries to issue digital certificates for verifying IP addresses, 
routing
prefixes

By Carolyn Duffy Marsan, Network World

December 07, 2010 11:39 AM ET

Policymakers disagree about whether the recent Chinese hijacking of 
Internet
traffic was malicious or accidental, but there's no question about the
underlying cause of this incident: the lack of built-in security in 
the
Internet's main routing protocol.

Network engineers have been talking about this weakness in the 
Internet
infrastructure for a decade. Now a fix is finally on the way.

Policymakers disagree about whether the recent Chinese hijacking of 
Internet
traffic was malicious or accidental, but there's no question about the
underlying cause of this incident: the lack of built-in security in 
the
Internet's main routing protocol.

Network engineers have been talking about this weakness in the 
Internet
infrastructure for a decade. Now a fix is finally on the way.

Six worst Internet routing attacks

Beginning Jan. 1, Internet registries will add a layer of encryption 
to their
operations so that ISPs and other network operators can verify that 
they have
the authority to route traffic for a block of IP addresses or routing
prefixes known as Autonomous System Numbers.

The fix ? known as Resource Public Key Infrastructure (RPKI) ? is not
perfect. It will require adoption by all of the Internet registries as 
well
as major ISPs before it can provide a significant amount of protection
against incidents such as when China Telecom hijacked 15% of the 
world's
Internet traffic in April.  

Proponents of RPKI say it is a much-needed first step in improving the
security of the Border Gateway Protocol (BGP), which is the core 
routing
protocol of the Internet.

Not everyone believes it will work.

At a minimum, RPKI, if widely adopted, should prevent ISPs from 
accidentally
disrupting the flow of Internet traffic with erroneous routing 
information.

Geoff Huston, chief scientist at the Asia Pacific Network Information 
Centre
(APNIC), says RPKI will eliminate many routing incidents including the 
China
Telecom hijacking when it is coupled with follow-on work aimed at 
securing
BGP routes.

"The intent of the overall work, which involves the RPKI as the 
underlying
security platform and secure BGP as a way of introducing signed 
credentials
into the routing system, is to make lies in the routing system 
automatically
detectable and, therefore, automatically removable," Huston says. "It 
will
eliminate a large class of problems?Such a system would directly 
address the
[China Telecom] incident."

The RPKI development effort was funded in part by the U.S. Department 
of
Homeland Security, which has made bolstering the security of the 
Internet's
routing system a key cybersecurity initiative.

How quickly RPKI will be adopted is unknown. Among the companies that 
have
helped design RPKI are Cisco, Google, Deutsche Telecom, NTT, Sprint 
and
Equinix.

"RPKI will solve the vast majority of routing problems that crop up, 
but it's
not the final solution," says Stephen Kent, chief scientist for 
information
security at Raytheon BBN Technologies and a contributor to the RPKI 
standards
effort.

Kent says RPKI must be followed by adding security for route paths to 
BGP,
which is under development. This BGP update will take longer and be 
more
expensive to deploy than RPKI because it will require network 
operators to
upgrade their routers.

"If it turns out that RPKI solves 80% or 90% of the issues, then there 
is a
tremendous benefit from that," Kent says. "RPKI is the basis for doing 
the
fancier stuff later." Routing attacks multiply

The China Telecom incident is the latest in a string of high-profile 
Internet
routing attacks, such as when Pakistan Telecom brought down YouTube's 
Web
site for two hours in February 2008 or when Malaysian ISP DataOne 
hijacked
traffic to Yahoo's Santa Clara data center in May 2004.

RPKI was created by the Internet Engineering Task Force's Secure Inter-
Domain
Routing (SIDR) working group, which has been working on routing 
security
since 2005.

RPKI allows ISPs and other network operators to generate digital 
signatures
that verify that they have the authority to make changes to Internet
resources such as IP addresses or routing prefixes.

Most of the standards documents that describe how RPKI works are in 
the final
stages of approval at the IETF.

"There's been a push to get these documents out and approved," Kent 
says. "I
think they will be popping out through the?first quarter of next 
year."

One factor driving the release of the RPKI standards is that the 
regional
Internet registries have already committed to start issuing
production-quality certificates to their members.

The registries have been working for several years to get the 
processes,
procedures and software in place to support RPKI. They've also been 
improving
the accuracy of their databases that list which IP addresses and 
routing
prefixes are allocated to particular network operators.

APNIC already has a resource certification system in production mode. 
Several
other registries, including Europe's RIPE NCC, plan to go live with 
their
implementations of RPKI on Jan. 1, 2011.

The American Registry for Internet Numbers (ARIN), which provides IP
addresses and routing prefixes to ISPs in North America, said it will 
support
RPKI  in the second quarter of 2011.

"ARIN plans to release a production-grade Resource Certification 
service
early in the second quarter of 2011," says Mark Kosters, CTO of ARIN. 
"There
is a pilot program as an interim measure that has been in place since 
June
2009."

Network operators must verify their IP addresses and routing prefixes 
with
their registries through the new RPKI system, and they will need to 
check the
authoritative database created by the registries to construct their 
routing
filters. Various organizations including Raytheon BBN have created 
open
source software to handle this extra network management function.

"For the really small ISPs, the Web portal design by [registries] 
makes this
trivial. They have to do it once, and set it and forget it," Kent 
says. "If
you're a big ISP, then it will take more effort to integrate [RPKI] 
into your
overall system."

Enterprises that multi-home their networks ? or split their network 
traffic
between multiple carriers ? can take advantage of RPKI if they want 
the extra
protection it provides.

Huston says enterprise network managers should support the RPKI effort
because it bolsters the security of the Internet's routing 
infrastructure and
protects against snooping, traffic redirection, distributed denial of 
service
and man-in-the-middle attacks.

"Everyone ultimately relies on the public network," Huston says. 
"Enterprise
folk use it for VPNs, they use it for public facing services, they use 
it for
business-to-business communication. If you can subvert the integrity 
of the
routing system and send packets to the wrong places, all kinds of 
risks
ensue." Doubts about RPKI

Not everyone thinks RPKI is going to work.

"I'm not wildly optimistic about it," says Bill Woodcock, research 
director
for the Packet Clearing House, which offers open source software 
called the
Prefix Sanity Checker that's used by ISPs to check BGP routing filters 
for
errors.

"The theory behind RPKI is that you would do a cryptographic signing 
of your
routing announcements and that other people would build filters to not 
allow
routes that didn't include that cryptographic signature," Woodcock 
explains.
"It's more complicated than our software, and it only works if the 
person on
the other end has done this crypto operation."

Woodcock says network operators are notoriously bad at maintaining 
current
information about their IP addresses and routing prefixes in databases
operated by the regional registries. And they're also lax about using
software such as Prefix Sanity Checker to avoid typographical errors. 
That's
why he thinks it's unlikely that enough ISPs will deploy something as 
complex
as RPKI.  

"There's no user demand for this, which is going to make it hard to 
cram down
the throats of network operators," Woodcock adds.

Woodcock says network operators misconfigure routers regularly, and 
that
there's no reason to believe the China Telecom incident is anything 
other
than another mistake.  

"This was an embarrassment for the entire world to see," he says. "If 
it had
been malicious, it's very likely it would have taken a very different 
form. ?
The things to look for in a real attack would be specific individual 
targets
whose traffic was being diverted and a cover-up of that. This was so 
obvious
and blatant."

Craig Labovitz, chief scientist at Arbor Networks, says he can't tell 
if the
China Telecom incident was accidental or malicious. Labovitz studied 
errors
in routing prefixes for his PhD research 15 years ago.

"I just don't know" if China Telecom was being malicious, Labovitz 
says.
"We've seen many errors in the past: errors and fat fingers and 
incompetence.
But at the same time, we've seen malicious use of BGP by spammers."

Labovitz says network operators can take steps such as filtering 
router
announcements to avoid these kinds of traffic hijacking incidents 
between now
and when RPKI is widely deployed.

"There are things that can be done today without any additional 
spending,
without upgrading routers, but they are just not being done," Labovitz 
says.
"A best common practice for ISPs is that you should filter routing
announcements from your customers. It's a little bit depressing that 
after 15
years, we have large sections of the Internet that are not following 
best
common engineering packages."

Labovitz says it may take a more significant routing incident than 
China
Telecom's to prompt deployment of RPKI and BGP security. He points to 
the
example of the Kaminsky threat, which is propelling domain name 
registries to
support new security measures.

DNS security "took an event that was so scary to force action," 
Labovitz
says. "Maybe the growing number of BGP incidents will be enough to 
drive
industry and government consensus to act?I think this is something 
that we
need to fix, and we are on borrowed time." 







Más información sobre la lista de distribución LACNOG