Skip to content

Commit f6ac5e8

Browse files
committed
early outline of infra security chapter
1 parent d2fd649 commit f6ac5e8

File tree

1 file changed

+133
-0
lines changed

1 file changed

+133
-0
lines changed

infra.rst

Lines changed: 133 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,142 @@
11
Chapter 8. Securing Network Infrastructure
22
==========================================
3+
.. Brad notes
4+
I really enjoyed the CCR paper with anonymous authors on collateral
5+
damage of China’s censorship (IIRC, causing DNS lookup failures in
6+
other countries).
7+
That paper is not exactly current now, but it is a nice example of
8+
how a state actor can deploy things that break infrastructure
9+
outside its own state boundaries.
10+
My gut feeling is that material on why stock DNS is vulnerable to
11+
attack, what DNSSEC is, how it’s supposed to make things better,
12+
and why it’s hard to deploy would definitely be useful.
13+
And probably the same for BGP and the RPKI. Goldberg has a paper on
14+
why it’s so hard to secure routing; I think it was in Queue.
15+
I wonder if a synthesis of any sort is possible on this
16+
topic. Certainly certificate chains and delegated signature authority
17+
are at the core of both DNSSEC and the RPKI.
18+
Perhaps there is a unifying theme of securing infrastructure with distributed domains of control.
19+
In a way CAs fit this model, too.
20+
21+
22+
In the preceding chapters we have focused on the security of
23+
end-systems connected to the Internet and on securing communication
24+
between parties as their traffic traverses the Internet. But the
25+
Internet itself consists of infrastructure, such as routers, that must
26+
also be defended against attacks. Two areas of particular concern are
27+
the interdomain routing system and the domain name system. Both
28+
systems routinely come under attack. There are efforts under way to
29+
make them more resistant to attacks as we discuss in the following
30+
sections.
31+
332

433
8.1 BGP
534
----------
635

36+
In most respects, a router is just a special-purpose computer with
37+
some high-speed interfaces and specialized software to perform tasks
38+
such as route computation and advertisement. So they need to be
39+
protected like end-systems, e.g., with strong passwords and
40+
multi-factor authentication, using access control lists and firewalls,
41+
etc. That is only a starting point, however, because the actual
42+
routing protocols themselves represent an opportunity for attack. BGP,
43+
the Border Gateway Protocol, is vulnerable to a wide range of
44+
attacks, and is the only protocol that is expected to cross the
45+
boundaries of a single administrative domain, so we focus our
46+
attention here.
47+
48+
The primary challenge in securing the Internet's routing
49+
infrastructure boils down to this: how can you trust a routing
50+
announcement received via BGP? At first glance, this looks similar to
51+
the problem solved by TLS: how do we know that we're talking to the
52+
web site we wanted to connect to? But there are multiple levels to
53+
this problem when it comes to inter-domain routing. When you have a
54+
secure, encrypted connection to your bank, you probably trust them to
55+
show you accurate information about your account (mostly-banks do make
56+
mistakes on occasions) and the secure connection protects if from
57+
modification by an attacker. A secure, encrypted connection to the
58+
website of the New York Times, however, doesn't mean you should
59+
believe every word published by the New York Times. Similarly, a
60+
secure connection to a BGP speaker doesn't imply that every route
61+
advertisement provided by that speaker is reliable. We need to look a
62+
bit more closely at how BGP works to see where the challenges lie.
63+
64+
BGP speakers advertise *paths* to reach *prefixes*. When a BGP speaker
65+
receives a set of path advertisements from its peers, it runs a route
66+
selection process to determine the "best" path to any prefix, using a
67+
fairly large set of criteria to decide what is "best". For example, a
68+
path to a given prefix that is shorter (as measured by the number of autonomous systems
69+
it contains) may be preferred to one that is longer. However, there are
70+
many other criteria, notably the business relationship between the
71+
peers, which are used to determine the ultimate choice of path. For a
72+
more full discussion of how BGP works, refer to the section on
73+
Inter-domain routing in our main textbook.
74+
75+
.. _reading_bgp:
76+
.. admonition:: Further Reading
77+
78+
Peterson, L. and Davie, B. `Computer Networks: A Systems Approach. Interdomain
79+
Routing <https://book.systemsapproach.org/scaling/global.html#interdomain-routing-bgp>`__.
80+
81+
A BGP speaker needs to trust that the paths that it is receiving from
82+
its peers are correct, and this turns out to be a multi-faceted
83+
challenge. Geoff Huston, the Chief Scientist at APNIC, has written a
84+
useful taxonomy of the threats that BGP faces, all of which relate to
85+
the trust among peers.
86+
87+
The taxonomy asks the following questions of the communication between
88+
two BGP speakers:
89+
90+
* How is the BGP session protected from
91+
modification or disruption?
92+
* How does a speaker verify the identity of its peer?
93+
* How does a speaker verify the authenticity and completeness of the
94+
routing information received from a peer?
95+
* How does a speaker know that the advertisements received actually
96+
represent the true forwarding state of the peer?
97+
* How current is the information received, and is it still valid?
98+
99+
.. _reading_threat:
100+
.. admonition:: Further Reading
101+
102+
Geoff Huston. `A Survey on Securing Inter-Domain Routing Part 1 –
103+
BGP: Design, Threats and Security Requirements
104+
<https://labs.apnic.net/index.php/2021/08/03/a-survey-on-securing-inter-domain-routing-part-1-bgp-design-threats-and-security-requirements/>`__.
105+
APNIC Blog, August 2021.
106+
107+
Since BGP runs over a TCP connection, it was recommended for many
108+
years that the TCP connection be authenticated and integrity-protected
109+
using MD5 authentication. The MD5 authentication option for TCP is now
110+
viewed as insufficiently secure (due to known attacks on the MD5
111+
algorithm). It also lacks dynamic key management and the ability to update the
112+
cryptographic algorithm, so it is now deprecated in favor of a more
113+
general TCP authentication option which is described in RFC 5925.
114+
115+
RFC 5925
116+
117+
RFC 7454
118+
119+
.. _reading_BGPTLS:
120+
.. admonition:: Further Reading
121+
122+
Thomas Wirtgen, Nicolas Rybowski, Cristel Pelsser, Olivier
123+
Bonaventure. `The Multiple Benefits of Secure Transport for BGP <https://conferences.sigcomm.org/co-next/2024/files/papers/p186.pdf/>`__.
124+
ACM Conext, December 2024.
125+
126+
.. _reading_rpki:
127+
.. admonition:: Further Reading
128+
129+
Sharon Goldberg. `Why Is It Taking So Long to Secure Internet
130+
Routing? <https://dl.acm.org/doi/pdf/10.1145/2668152.2668966/>`__.
131+
ACM Queue, August 2014.
132+
7133
8.2 DNS
8134
----------
9135

136+
DNS over HTTP (DoH)
137+
138+
DNSSEC
139+
140+
Geoff Huston. `Calling Time on DNSSEC?
141+
<https://labs.apnic.net/index.php/2024/05/27/calling-time-on-dnssec/>`__.
142+
APNIC Blog, May 2024.

0 commit comments

Comments
 (0)