[ISN] ITL Bulletin for July 2007

From: InfoSec News (alerts@private)
Date: Thu Jul 26 2007 - 23:23:58 PDT


Forwarded from: Elizabeth Lennon <elizabeth.lennon (at) nist.gov>

ITL BULLETIN FOR JULY 2007

BORDER GATEWAY PROTOCOL SECURITY

Shirley Radack, Editor
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Technology Administration
U.S. Department of Commerce

The Border Gateway Protocol (BGP) may not be familiar to the average 
user, but it plays a critical role in the effective operation of the 
Internet. BGP has been used since the commercialization of the Internet 
to update routing information between major systems. This routing 
function makes it possible for systems connected to the Internet to 
receive and transmit traffic correctly, and to deliver electronic mail 
and web page transmissions efficiently to users.

Because BGP performs a vital task in keeping the Internet running 
smoothly, the security of BGP routers is a high-priority concern for 
organizations. Many organizations do not directly operate BGP 
routers­the organizations use Internet service providers (ISPs) to 
handle the routing functions­but other large organizations with 
extensive networks operate their own routers that run BGP and other 
routing protocols.

A new guide that provides information on BGP and the methods available 
to improve the security of BGP routers was recently issued by the 
Information Technology Laboratory at the National Institute of Standards 
and Technology (NIST). While primarily directed toward helping federal 
agencies carry out their responsibilities under the Federal Information 
Security Management Act (FISMA) of 2002 (Public Law 107-347), the new 
guide is also available to private sector organizations that wish to use 
it.

NIST Special Publication (SP) 800-54, Border Gateway Protocol Security

Issued in June 2007, NIST SP 800-54, Border Gateway Protocol Security: 
Recommendations of the National Institute of Standards and Technology, 
was written by Rick Kuhn, Kotikalapudi Sriram, and Doug Montgomery. The 
publication explains the structure and the functions of BGP in terms 
that will enable those who are not familiar with the protocol to 
understand its use in networking. Potential attacks that threaten the 
security of BGP functions, the countermeasures that are available to 
thwart attacks, and their associated costs and benefits are discussed in 
detail in the guide. The emphasis is on countermeasures that can be 
applied without significant additions or changes to equipment. NIST SP 
800-54 identifies specific recommendations that help decision makers 
select the measures that can be deployed rapidly and that will 
significantly improve routing security.

The appendices to NIST SP 800-54 contain an extensive reference list of 
in-print and online resources, including references to the voluntary 
industry standards that have been developed primarily by the Internet 
Engineering Task Force (IETF) to define BGP. Also included in the 
appendices are an acronym list, definitions of the terms used in the 
publication, and a table summarizing BGP state transitions.

NIST SP 800-54 is available from NIST’s website at 
http://csrc.nist.gov/publications/nistpubs/index.html.

BGP Security

BGP, a routing protocol, has an important role in enabling the systems 
that are connected to the Internet to receive and transmit traffic 
correctly. Each network communication, such as sending and receiving 
mail and viewing websites, is accomplished through messages called 
packets. These packets contain the source and destination addresses for 
the transactions, but the packets do not go directly from a user’s 
computer to their destination. Many intermediate systems may be involved 
in the transmission of the packets, and not all of the packets follow 
the same path from source to destination. The packets pass through 
systems and are forwarded to other systems, based on the destination 
address and information contained in a routing table. For example, the 
routing table could state that packets with a destination of A can be 
sent to system H, which will then forward the packets to their 
destination, possibly through other intermediate nodes.

The routers, computers, and other components within a single 
administrative domain compose an autonomous system (AS). A university, a 
company network, and an ISP are examples of a single AS. In some cases, 
corporate networks tied to the ISP may also be part of the ISP’s AS, 
although some aspects of the network administration are not under the 
control of the ISP. AS numbers are managed by the Internet Corporation 
for Assigned Names and Numbers (ICANN), a nonprofit organization 
established by the U.S. Department of Commerce, which authorizes 
Internet registration organizations to assign AS numbers. As of May 
2007, the Internet included more than 25,000 registered autonomous 
systems.

Because the systems connected to the Internet change frequently, the 
most efficient paths between systems and the routing tables must be 
updated on a regular basis. The information in the routing tables has 
also increased considerably with the growth of the Internet.

Each AS has many routers for internal communication and one or more 
routers for communications outside the local network. Internal routers 
use interior BGP (IBGP) to communicate with each other, and external 
routers use external BGP (EBGP). Two routers that have established a 
connection for exchanging BGP information are referred to as peers. BGP 
peers use the Transmission Control Protocol (TCP), the same protocol 
used for e-mail and web page transmissions, to exchange routing 
information in the form of address prefixes that the routers recognize, 
as well as additional data that is used to select the best route for the 
information.

Risks and Attacks

If BGP fails to carry out the routing function, portions of the Internet 
may become unusable for periods of time ranging from minutes to hours. 
Most of the risk to BGP comes from accidental failures, but there is 
also a significant risk that attackers could disable parts or all of 
networks, disrupting communications, commerce, and possibly putting 
lives and property in danger.

BGP, which was developed before security became a serious issue for the 
Internet, does not have a built-in authentication mechanism to ensure 
that a message is really from the AS that is shown as the source in 
messages. As a result, BGP may be vulnerable to attacks, despite 
extensions that have been developed to improve its security. Many of the 
methods developed over the years to improve the dependability of BGP 
also contribute to security against outside attackers. Attacks on BGP 
could cause a loss of connectivity between critical portions of the 
Internet; that is, e-mail, e-commerce, and web accesses would not 
function. Because of the volume of commercial transactions conducted 
over the Internet, plus increasing use of the Internet for voice 
communications (voice over IP [VOIP]), such an outage could have a 
significant impact on the economy and possibly interrupt critical 
functions such as emergency services communications. The outage could be 
either widespread, affecting large portions of the Internet, or a 
targeted denial of service attack against a particular organization’s 
network.

Another security concern is the potential loss of confidentiality of 
information if packets are misrouted. Internet communication is not 
secure unless special measures are taken, such as encryption, and most 
users do not encrypt e-mail or other traffic. An eavesdropper could 
mount an attack by changing routing tables to redirect traffic through 
nodes that can be monitored. The attacker could thus monitor the 
contents or source and destination of the redirected traffic or modify 
it maliciously. Insider attacks, either malicious or accidental, are 
another concern. Threats from insiders require extra measures of access 
control enforced within an organization.

Countermeasures

When developed originally, BGP had no built-in security functionality. 
However, the security of BGP can be improved through the application of 
countermeasures, which are described in NIST SP 800-54. NIST provides 
approximate ratings of countermeasures for effectiveness and cost as Low 
(L), Medium (M), or High (H). These ratings are subjective and intended 
as an approximate guide only. Actual cost and effectiveness will vary 
with the installation. Comprehensive BGP security solutions have not yet 
emerged, and current “best common practices” are somewhat overlapping, 
confusing in scope and applicability, and often neglect cost/benefit 
trade-offs.

Recovery and Restart

Improving the dependability of some systems subject to denial of service 
attacks can be done by increasing the difficulty of an attack or 
reducing the time needed to recover from such an attack. In terms of 
system availability, the first option corresponds to increasing system 
uptime, U, while attack recovery corresponds to reducing downtime, D 
(ignoring other sources of downtime). Availability is calculated as U/(U 
+ D). For example, a system with uptime of 1000 hours (over a 
measurement period) and a downtime of 1 hour has availability of 
1000/1001 = 99.9%. If recovery time can be reduced to 0.1 hours, 
availability improves significantly, to 99.99%. By contrast, if recovery 
time remains at 1 hour, defenses would have to be strengthened to hold 
off attacks for 10,000 hours to achieve the same 99.99% availability. 
Reducing the time needed to recover from a denial of service attack can 
improve BGP availability and, for some attacks, may be a more 
cost-effective strategy than hardening defenses. Quicker recovery also 
means less disruption to other parts of the network.

NIST Recommendations for the Security of BGP Routers

NIST recommends that organizations adopt a program of best practices to 
help protect BGP routers. The recommendations, which are detailed in 
NIST SP 800-54, can be implemented on current BGP routers to improve 
security.

Following is a summary of NIST’s technical recommendations; in some 
cases, references are provided to specific sections of the BGP guide, 
which explains in more detail the rationale for the actions and the 
recommended steps to be taken. These steps alone are not a complete 
defense against all threats, and security administrators and decision 
makers should select and apply these methods based on their unique 
needs.

* Establish and use access control lists. This feature is available on 
  nearly all routers (see Section 4.2 of the publication).

* Use BGP graceful restart, when available with latest 
  manufacturer-recommended default settings (see Section 5.1).

* Use BGP peer authentication. Authentication is one of the strongest 
  mechanisms for preventing malicious activity. Use Internet Protocol 
  Security (IPsec) or BGP MD5 authentication mechanisms, if available 
  (see Section 4.5 and Section 4.6).

* Use prefix limits to avoid filling router tables. Routers should be 
  configured to disable or terminate a BGP peering session and issue 
  warning messages to administrators when a neighbor sends in excess of 
  a preset number of prefixes (see Section 4.2).

* Only allow peers to connect to port 179. The standard port for 
  receiving BGP session OPENs is port 179, so attempts by peers to reach 
  other ports are likely to indicate faulty configuration or potential 
  malicious activity.

* Configure BGP to allow announcing only designated netblocks. This 
  option will prevent the router from inadvertently providing transit to 
  networks not listed by the autonomous system (AS) (see Section 2.3).

* Filter all bogon (an address that is reserved but not yet registered) 
  prefixes. These prefixes (see Section 4.2.2) are invalid, so they 
  should not appear in routes. Filtering them reduces load and helps 
  reduce the ability of attackers to use forged addresses in denial of 
  service or other attacks.

* Where feasible, routers should do ingress filtering (filtering of 
  incoming prefixes) on peers (see Section 4.2, including 4.2.5).

* Do not allow over-specific prefixes. Requiring routers to maintain 
  large numbers of very specific prefixes can place excessive load on 
  system resources. Recommendations vary as to what prefixes should be 
  considered “over-specific,” but a reasonable criterion could be 
  those with prefix addresses in the range of /24 to /30.  (IP address 
  blocks are given in the Classless Interdomain Routing [CIDR] format, 
  A/n, where A is an IP address and n is the prefix length.)

* Turn off fast external failover to avoid major route changes due to 
  transient failures of peers to send keepalives. The “fast external 
  failover” feature was designed to allow rapid failover to an 
  alternate system when a link goes down. Without this feature, failover 
  would not occur until BGP keepalive timers would permit recognition 
  that the line had failed. It is not uncommon for lines to drop BGP 
  sessions and then return.  This is referred to as route flapping (see 
  Section 3.2.4). Frequent flapping can trigger flap damping in upstream 
  peers. Due to fast external failovers, flap damping would occur at 
  upstream routers, which in turn results in prolonged peer-prefix 
  unreachability and system instability. So turning off fast external 
  failover normally represents a positive trade-off in today's Internet.

* Trade-offs are involved with route flap damping (RFD), and current 
  research suggests that it contributes to a number of problems. It 
  should not be enabled unless the organization has a strong case for 
  its use. See Section 3.2.4 for a discussion of RFD. If route flap 
  damping is used, longer prefixes should be damped more aggressively.  
  Longer prefixes tend to be less stable, so longer RFD times are 
  preferable. Sample half-time periods of RFD decay are as follows:

-  less than /21 - manufacturer recommendation
   (conventional default is 15 minutes);
-  /21 and shorter prefixes - not more than 30 minutes;
-  /22 to /23 prefixes - not more than 45 minutes; and
-  /24 and greater prefixes - not more than 60 minutes.

* Do not use route flap damping for netblocks that contain domain name 
  system (DNS) root servers. These networks are normally the most stable 
  and can be expected to remain operating in all but the most 
  exceptional circumstances. Damping these netblocks would therefore be 
  likely to have more negative results than benefits. DNS root servers 
  are also critical for Internet operations, so degraded access to them 
  could cause widespread disruption of network operations.

* Use soft reconfiguration, where practical. Normally a change in policy 
  requires BGP sessions to be cleared before the new policy can be 
  initiated, resulting in a need to rebuild sessions with consequent 
  impact on routing performance. Thus, spoofed policy changes could be 
  used for a denial of service attack, even if the policy changes 
  themselves do not violate AS rules. Soft reconfiguration allows new 
  policies to be initiated without resetting sessions. It is done on a 
  per-peer basis and can be set up for either inbound or outbound or 
  both (for updates from and to neighbors, respectively).

* Record peer changes. Log whenever a peer enters or leaves Established 
  state, providing useful records for debugging or audit trails for 
  investigating possible security problems.

Future Activities

A variety of proposals have been introduced in standards bodies for more 
comprehensive approaches to BGP security, but issues are not yet settled 
as to which, if any, of these proposals will be adopted by the producers 
and consumers of routing equipment. When the extensions become more 
widely accepted, NIST will consider developing updated recommendations 
for BGP security.

More Information

NIST publications assist organizations in planning and implementing a 
comprehensive approach to information security, including basic planning 
functions, the risk management process, and the selection, 
implementation, and assessment of security controls.

Publications dealing specifically with network protocol issues include:

NIST SP 800-77, Guide to IPsec VPNs, by Sheila Frankel, Karen Kent, Ryan 
Lewkowski, Angela D. Orebaugh, Ronald W. Ritchey, and Steven R. Shama, 
explains security controls that can be implemented to protect 
Transmission Control Protocol/Internet Protocol (TCP/IP) network 
communications.

NIST SP 800-52, Guidelines for the Selection and Use of Transport Layer 
Security (TLS) Implementations, by C. Michael Chernick, Charles Edington 
III, Matthew J. Fanto, and Rob Rosenthal, discusses computer 
communications architectural concepts and the foundations of 
communications security.

These publications and other security-related publications, including 
Federal Information Processing Standards (FIPS), are available from 
NIST’s website http://csrc.nist.gov/publications/nistpubs/index.html.

Disclaimer

Any mention of commercial products or reference to commercial 
organizations is for information only; it does not imply recommendation 
or endorsement by NIST nor does it imply that the products mentioned are 
necessarily the best available for the purpose.


Elizabeth B. Lennon
Writer/Editor
Information Technology Laboratory
National Institute of Standards and Technology
100 Bureau Drive, Stop 8900
Gaithersburg, MD 20899-8900
Telephone (301) 975-2832
Fax (301) 975-2378



_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com



This archive was generated by hypermail 2.1.3 : Thu Jul 26 2007 - 23:34:21 PDT