Skip to Content.
Sympa Menu

netsec-sig - Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes

Subject: Internet2 Network Security SIG

List archive

Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes


Chronological Thread 
  • From: "Garrett, Seth B" <>
  • To: "" <>, Andrew Gallo <>
  • Subject: Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
  • Date: Mon, 20 Aug 2018 16:06:21 +0000
  • Accept-language: en-US
  • Ironport-phdr: 9a23:6hqQchY/9Beoy2EsIaKLCw7/LSx+4OfEezUN459isYplN5qZrs69bnLW6fgltlLVR4KTs6sC17KI9fi4EUU7or+5+EgYd5JNUxJXwe43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQviPgRpOOv1BpTSj8Oq3Oyu5pHfeQpFiCa8bL9oMBm6sRjau9ULj4dlNqs/0AbCrGFSe+RRy2NoJFaTkAj568yt4pNt8Dletuw4+cJYXqr0Y6o3TbpDDDQ7KG81/9HktQPCTQSU+HQRVHgdnwdSDAjE6BH6WYrxsjf/u+Fg1iSWIdH6QLYpUjm58axlVAHnhzsGNz4h8WHYlMpwjL5AoBm8oxBz2pPYbJ2JOPZ7eK7WYNEUSndbXstJVyJPHJ6yb5cBAeQCM+ZXrYj9qEcBohalHwagGPnixyVUinPqwKE31fkqHwHc3AwnGtIDqHrYotTvO6cIS+C60rXIzSnbY/hLxDny9pTIchA8qvyRU757bM3cyVI0GAPKlFqQs5blMC2J1ukWsmib8vBsWvyyhG46sgx8pCWkyMkrionMnI0Vy1bE+D1hwIkrO9K4Uk97YdirEJRNrC6WLZd5QsQnQ2xupS00yaUGtIamcCUEx5kr3R/SZv+df4SW/B7vSPydLDl2iX59Zb6yhgi+/VK+xuHiV8S4yllHojZfntXSuX0BzxLT5daER/dh+0qs3DmC2BzN5uxFJE05lbTXJIUvz7M1mJoev0vOETXzlUjygq+aakcp9+614Or9eLrmvIWTN4pshwH+LKsunsu/DPwiMggJRGeb+OK82Kf+/U34XLVKlec6kqjEsJzAO8sUu7O5DxdU0oYl9Rm/Ey+r3MkWkHQINl5IeRGKg5L3N13QPPz0F/myjlq0nDdu3f/GP7nhApvXLnjElbfsZa195FVTyAUp19Bf/YxbCq0aLfLyR0/9rsLXAQIkMwCs2eboFM191p8CWWKIGqKZK73dvkOV5uI1IumMeI8UtC/zKvgq/PPuiX45mUQBfamyw5cbcnG4HvJ6I0qHe3rshMkOEXsUsgYkUuPllUCCAnZvYCP4RK83+ys6FJPjEojrR4axjaaH0TvhWJBaeyoOXkuBGmrydpmVHugDQCOUPsJ7lDEYD/6sR5J3kVmHsgPgxqUvAePQ/ipQ4Zvs3dxx4MXcigx0+DBpWZezyWaIGitbl3kSSiMqmOhErFB9gn3JmfxjifNRD8Ze+9tIT0E3OYOKnL8yMMz7Rg+UJoTBc12hWNjzRGhpFt8=

In its current state its a trade-off.  You're enabling valid scrubbing prefixes in a manner that exposes the least amount of surface by defining the specific prefixes rather than using maxlength.  Its well established beforehand too so you know whats in play if that does happen.


In the case of a /16 route with a bunch of /24s also in RPKI:


Invalid AS:

/16 through /24 protected in RPKI using maxlength or not.


AS Spoof:

/16 and /24s vulnerable

/17 through /23 not vulnerable


However, you're countermeasures can be to advertise your /24 back.   The attacker then has to challenge that directly.  You also do not have to generate a /24 for the entire /16 if you only have specific services you want to protect with valid scrubbed routes.  


Its not perfect, but it does create a smaller surface to attack.  The value of an organization working through this decision on how to use RPKI combined with their scrubbing service is important as well.  There is no one-size fits all here, but you walk away with 1) Using RPKI and 2) Knowing exactly how your RPKI is configured and where the weaknesses are (and why).  That is much better done before an attack than after.  



Seth Garrett
Principal Network Engineer
Indiana University


From: <> on behalf of Jeff Bartig <>
Sent: Monday, August 20, 2018 11:49 AM
To: ; Andrew Gallo
Subject: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
 
This message was sent from a non-IU address. Please exercise caution when clicking links or opening attachments from external sources.


Andrew Gallo wrote on 8/20/18 10:07 AM:

   I'm really failing to see the big win here.   It's not so much the use of maxlength that's the
issue, but rather having ROA's allowing announcements of prefixes which
you do not normally announce (which are more specifics of prefixes you normally do announce).
When you use maxlength, the attacker still needs to spoof origin AS in the AS_PATH
in order to hijack a prefix.    By registering a bunch of /24's (or /48's) which
are not normally announced, you still opening yourself up to hijacks of those individual
prefixes with the same type of origin AS spoofing.   For most networks, hijacking a few strategic
/24's or /48's will likely be just as deadly as hijacking a larger block.


 -Larry Blunk
  Merit

Yes, that is true, creating ROAs for all the /24s does create a large attack surface.  BUT, it is still less than creating *all* the prefixes between /16 and /24

Creating a ROA that covers a /16 and all /24s is 257 prefixes, while 16-24 (inclusive) would be 511 total prefixes, some of which are pretty large.

You are correct in that this type of attack would require AS spoofing, which should (hopefully) be harder.

Larry makes a good point.  Is there really much difference in the attack surface here?  In both examples, the /24s really define the attack surface.  I really don't see an evil attacker giving up because they couldn't announce /23s.  If /24s can be advertised in a hijacking attack, I think that would be preferred over other shorter prefixes.

Jeff

--
Jeff Bartig
Interconnection Architect
Internet2  AS11164 / AS11537
+1-608-616-9908



Archive powered by MHonArc 2.6.19.

Top of Page