Skip to Content.
Sympa Menu

netsec-sig - [Security-WG] I2 - GTSM topic

Subject: Internet2 Network Security SIG

List archive

[Security-WG] I2 - GTSM topic


Chronological Thread 
  • From: gcbrowni <>
  • To:
  • Subject: [Security-WG] I2 - GTSM topic
  • Date: Fri, 27 Jan 2017 13:18:41 -0500
  • Ironport-phdr: 9a23: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

I went ahead and write up another topic, GTSM, at https://spaces.internet2.edu/display/RS/GTSM

There’s some ambuiguity with the Brocade command. I’m inquiring to get mroe information.

As always, and input or feedback is appreciated! Especially on modern configurations for the three vendors...







GTSM

Section 5.2 of RFC 7454 discusses BGP TTL filtering, otherwise known as the Generalized TTL Security Mechanism, GTSM.


The concept uses the TTL value in TCP packets to provide a quite strong mechanism to prevent spoofed packets from being accepted. When a packet passes through the router the router decrements the TTL value by one. If your directly connected BGP neighbor explicitly sets the TTL on their outgoing BGP packets to 255 then you can check all packets from that neighbor to ensure they equal 255. If the TTL value is less than 255 then you know the packet is spoofed; it has passed through at least one router, which has decremented the TTL value.

Since the TTL field is 8-bits, and 255 is therefore the maximum, sessions using GTSM set their values to 255 and check to ensure that their adjacent neighbors BGP session packets have a value of 255, throwing out all others with a lower value from that neighbor. This is a very powerful mechanism that uses the default behaviour of the routers interacting with the TTL field to ensure spoofed packets can’t reach your session from more than one hop away … at least for those neighbors that have it configured.

There are some things to watch out for …

First, GTSM needs to be configured on both sides of the BGP session, on a per BGP session basis. You need to set your TTL to 255 and you need to check to ensure that your neighbor s BGP packets have 255 TTL when you receive them. And your neighbor needs to ensure the same thing. At a minimum to you need to coordinate the setting of the TTL to 255 with them.

Second, a TTL of 255 is not always correct. If your neighbor is not directly connected/you’re doing multi-hop BGP, then the TTL value will be something other than 255. You and your neighbor will need to coordinate on the appropriate value to check for. (Although, you WILL be setting your TTL to 255 regardless of how many hops away they are.) The drawback, of course, is that you are now more vulnerable to spoofing from that connection. As the RF notes “anyone inside the TTL diameter could spoof the TTL.”


Juniper Example

Junipers implementation is a bit cumbersome, relying on setting up a filter with the “ttl-except” keyword and applying that filter on the appropriate interfaces.

filter ttl-security {
 term gtsm {
  from {
   source-address {
    10.1.2.3/32; }
   protocol tcp;
   ttl-except 255;
   port 179; }
  then {
   discard; }}
 term else {
  then {
   Accept;


There’s more information on the  ttl mechanism on the Juniper site at:

https://www.juniper.net/documentation/en_US/junos13.3/topics/reference/configuration-statement/ttl-edit-protocols-bgp-mulithop.html



Cisco Example

Cisco BGP configurations support the “ttl” option, meaning it’s quite easy to configure GTSM. The following example uses groups, but you can also use the neighbor statement “ttl-security hops 1”

bgp {
 group toAS2 {
  type external;
  peer-as 2;
  ttl 255;
  neighbor 10.1.2.3;


There a decent set of document about this feature on Cisco’s site at:

https://supportforums.cisco.com/document/86776/securing-ebgp-sessions-ttl-security-feature


Brocade Example

Brocade supports GTM with the “ebgp-btsh” bgp neighbor command. This works with a TTL for 255/254, but it’s unclear if other TTL’s can be supported.

neighbor 10.10.10.1 remote-as 2
neighbor 10.10.10.1 ebgp-btsh


There’s Brocade documentation to explain the command further at:

http://www.brocade.com/content/html/en/command-reference-guide/FI_08030_CMDREF/GUID-20AF9E52-5746-4D0D-8871-663F15EFE4F7.html

Attachment: smime.p7s
Description: S/MIME cryptographic signature




Archive powered by MHonArc 2.6.19.

Top of Page