b o o

h a

m o

c .i

PROTECT NETWORK EDGE WITH BGP, URPF AND S/RTBH

s

by John Brown, CityLink Telecommunications, LLC

About Me

c .i

m o

Based in Albuquerque, NM US ¨  Will travel for packet$, food, and good Scotch.! ¨  MikroTik Trainer ¨  CityLink does Fiber/Wireless to Business and Home ¨  Ran IANA’s L-Root DNS for 3 years ¨  Built several global ATM networks while in SV ¨  CityLink has around 800 BGP peers ¨  LAX, SJC, ASH, AMS-IX(soon) ¨  We offer 1Gig for $595 and 10Gig for $1995 ¨ 

s

h a

b o o

What can we protect?

c .i

m o

We can protect the Edge ¨  We can protect the Core ¨  We can protect based destination address ¨  We can protect based on source address ¨  We can prevent source spoofed IP addresses! ¨ 

s

h a

b o o

Protecting Other Networks

c .i

m o

First, lets help protect other people’s network ¨  Source Spoofed Packets ¨  BCP 38 https://tools.ietf.org/html/bcp38 ¨  http://www.bcp38.info/index.php/Main_Page ¨  Some people don’t do it ¨ 

h a

b o o

n  Some

think its to hard n  Some don’t know ¨ 

s

JUST DO IT ! J

Where to Prevent Source Spoofed ¨ 

¤  Access

Edge ? ¤  Distribution Network? ¤  Inter-Provider Edge? ¤  Peers ? ¤  Transit ?

s

h a

b o o

m o

c .i

Where do you have control over this ?

How do we prevent bad packets? ¨ 

ACL’s ¤  You

c .i

m o

can write ACL’s (Filters) and apply them to each interface in your network. ¤  Place them on the access edge ¤  Easy to maintain even when you have 100’s of routers (NOT) ¨ 

h a

b o o

Is there a better way ??

s

Are there easier, better ways ? ¨ 

BGP ¤  Blackhole

based on destination ¤  Remote Trigger with BGP Peers ¨ 

b o o

c .i

m o

uRPF (https://www.ietf.org/rfc/rfc3704.txt) ¤  Typically

done in hardware ¤  Very low impact to CPU ¤  Has some interesting side benefits

s

h a

BGP Blackhole, how it works

c .i

m o

You and your BGP peers (transit, peers) agree. ¨  Special community tag will signal routes to BH ¨  Say Community 666:666 ¨  You send your BGP peer a route with 666:666 ¨  They then adjust next-hop for that route to be BLACKHOLE, or NULL, etc (vendor dependent) ¨  Traffic won’t goto that prefix anymore. ¨  You’ve pushed the problem upstream. ¨  But your victim can’t get ANY traffic!! Lesser of two ¨ 

s

h a

b o o

BGP Blackhole

c .i

m o

Use BGP to tell others (peers, transit) to drop traffic towards a particular prefix. ¨  So your customer is getting DDOS’d and its impacting the rest of your network. ¨  You can use blackhole to tell peers to drop towards the victim. ¨  POOF. Victim is now really a victim, but rest of network is now happier. ¨ 

s

h a

b o o

How does uRPF Work

c .i

m o

Routers typically make decisions based on Dest IP ¨  With uRPF, router now also looks at Source IP. ¨  Two Modes (Strict and Loose) ¨  Router looks at Source IP and then the routing table. ¨  If source is reachable via the input interface, then good, else drop (Strict) ¨  If source reachable via any route in routing table, then good, else drop. (Loose), except null. ¨ 

s

h a

b o o

Filtering Spoofed from your customers ¨ 

m o

c .i

Enabling uRPF Strict on your single homed customers ¤  Will

prevent spoofed packets from entering your net ¤  Will prevent your customers from participating in DDOS ¤  Will keep The “NET” cleaner ¤  Will SAVE YOU MONEY!! Less wasted bandwidth ¤  Will help your wireless network, Less wasted bandwidth

h a

b o o

MAKE SURE YOU TEST THIS IN A LAB FIRST ¨  MAKE SURE YOU UNDERSTAND IT! ¨  You CAN break your network, if not careful. ¨ 

s

But I can’t drop everything !

c .i

m o

If I drop all traffic my special customer will be dead. ¨  Can’t I just write an ACL ?? ¨  Sure, can you write one fast enough for 3000 random spoofed source addresses ?? ¨  And can you apply it to 4 core routers fast enough ? ¨  And what will you do if hacker changes SRC_IP ? ¨ 

s

h a

b o o

Use uRPF LOOSE Feature

c .i

m o

What you can do is use a part of uRPF/Loose ¨  Inject route into your FIB (Forward Info Base) ¨  Have the next hop o that route be BLACKHOLE ¨  uRPF/Loose will see NxtHop is Blackhole and DROP. ¨  So you inject the Src_IP’s of the bad traffic with NxtHop as Blackhole and Poof, traffic FROM (Source) goes away at your edge. ¨  You can use tools to real-time create these injects ¨ 

s

h a

b o o

Use BGP to Inject

m o

c .i

You can use BGP to inject sources you want to drop ¨  Have a “Injector Machine” ¨ 

b o o

¤  Put

routes you DO NOT want to receive from (Sources) ¤  Tag those routes with two communities ¤  NO-EXPORT and Say 65000:666 ¨ 

Your BGP production routers will peer with Injector

h a

¤  The

have a a bgp-in filter from your injector that sets next hop to BLACKHOLE / NULL, etc

¨ 

s

Route is updated at Injector, all of your BGP edge drops from that source.

CAUTION CAUTION CAUTION ¨ 

c .i

m o

You *MUST* (https://www.ietf.org/rfc/rfc2119.txt) ¤  Make

sure you do NOT redistribute these SOURCE prefixes to other Peers / Transit. ¤  DANGER DANGER DANGER ¤  Make sure your BGP-OUT filters DROP all prefixes with your 65000:666 community tag.

s

h a

b o o

What can I use as Injector ¨ 

My favorite is exabgp

c .i

m o

¤  https://github.com/Exa-Networks/exabgp/wiki

b o o

Its FREE ¨  It WORKS ¨  It supports cool things like JSON ¨  It has an API ¨  You can control it via many methods ¨  You can run it on something simple / low cost ¨ 

s

h a

Data sources for injectors ¨ 

NetFlow (nfsen, etc) ¤  Lorenzo ¤ 

¨ 

Busatti

b o o

http://mum.mikrotik.com/presentations/EU16/presentation_3049_1456752471.pdf

Bro

¤  https://www.bro.org/index.html ¨ 

c .i

m o

Suricata

h a

¤  https://suricata-ids.org/

s

THANK YOU ¨  ¨ 

¨  ¨  ¨ 

c .i

m o

Congratulations to all the new Mikrotik Trainers Thank you MikroTik for an awesome product and awesome people! Shout Out to Tom Smyth, my inspiration for presentation! Shout Out to Lorenzo Busatti, inspiration for Tik FlowsJ I can be reached at:

h a

b o o

¤  [email protected] ¤  +1.505.938.6309

s

¤  PGP

FINGERPRINT: 5A6126CF

05. Keamanan_Routing_dengan_BGP_sahoobi.pdf

̈ Ran IANA's L-Root DNS for 3 years. ̈ Built several ... ̈ We can prevent source spoofed IP addresses! ... Keamanan_Routing_dengan_BGP_sahoobi.pdf. 05.

647KB Sizes 1 Downloads 117 Views

Recommend Documents

0080-05-05
Jun 1, 2017 - minerals which are recognized as essential for animal nutrition. ..... and will maintain the normal weight of an adult animal whether working or at.

0080-05-05
Jun 1, 2017 - (d) The guaranteed analysis of the feed as required under the provisions of Section 0080-. 05-06-.05(l) of the Act include the following items, ...

01_R(05-05)Salt Tolerance.hwp
presence of high Na+ and Cl- concentrations and an altered water status leads to ... breeding approaches have yet to yield remarkable success because of the complexity of stress ... mechanisms: an account of transgenic salt tolerant plants.

0600-05
May 22, 2017 - processes for which it is intended; and. (b) If affixed or attached to real property, can be detached without material injury to such real property.

MEG-05
assignment for the elective English course entitled Literarycriticism and Theory (MEG - 05) ... Aims: This TMA is concerned mainly with assessing your application and understanding of the course ... question and how you propose to develop it. ... Wha

1050-05
May 1, 2017 - otherwise stated in the advertisement that a fixed fee for a service shall include the cost of all professional recognized components within ...

1180-05
Jun 21, 2017 - limited to, business solicitation, with or without limiting qualifications, in a ...... The petitioner shall submit a Petition for Order of Compliance, ...

0460-05
May 1, 2017 - administration and monitoring of nitrous oxide shall make ...... proportionate to the number of faculty, and to the availability of appropriate.

0460-05
May 1, 2017 - (IX) Management of reaction to, or complications with nitrous oxide;. (X) Taking and ...... (I) Patient. (II) Operator. (iii) Quality Assurance.

0460-05
May 1, 2017 - 0460-05-.03 Schools, Programs and Courses for the. 0460-05-.02. Schools ..... No high-speed handpiece is to be used in the course, ..... online. If any portion of the program is taught online, the subjects and number of.

1180-05
Jun 21, 2017 - limited to, business solicitation, with or without limiting qualifications, in a card, sign ..... (2) Fee Schedule: Licensed Assistant Behavior Analysts:.

1050-05
May 1, 2017 - 1050-05-.11 Inactive Status and Reactivation. 1050-05-.02 Scope of Practice. 1050-05-.12 Continuing Education. 1050-05-.03 Use of Titles.

05-05-17.pdf
Senior excited about sport of spikeball. Recently in gym class I had the privilege of learning the. game of spikeball. Spikeball is a sport played two-on-two, with a ...

ENG 05-05-2017.pdf
May 5, 2017 - ... of day and night. There is such extreme darkness. No one at all knows. the Father from whom they can receive light. They say that we actors have come here to play parts on this. field of action. However, they don't know who they are

1180-05
Jun 21, 2017 - 1180-05-.11 Mandatory Release of Client Records. 1180-05-.12 Continuing Education. 1180-05-.13 Professional Ethics. 1180-05-.14 Actions, ...

05 BROOKS_c
Jan 18, 2001 - science; rather, they are a mixture of science ... Part of the problem was the lack of computer ..... the Universe, subject to physical laws that we.

1240-06-05
Aug 1, 2017 - If two or more managers are tied for the sixth and final slot in terms of seniority, those managers who are tied will be permitted to interview. Additionally, any U.S. military veteran who was honorably discharged, who is licensed and o

0380-05-10
Oct 19, 2017 - Authority: T.C.A. §§ 8-4-108, 8-4-604, 10-7-501, et seq., and 10-7-503(g). Administrative History: Original rule filed July 10, 2012; effective December 29, 2012. Repeal filed July 21, 2017; effective. October 19, 2017. 0380-05-10-.0

0500-03-05
Apr 1, 2017 - Administrative History: Original rule filed February 5, 1991; effective May 29, 1991. Repeal filed January 17, 2017; effective April 17, 2017. Rule renumbered 0400-. 60-05. 0500-03-05-.02 REPEALED. Authority; T.C.A. §§ 4-3-510 through

1660-02-05
Jun 14, 2017 - BOATING. CHAPTER 1660-02-05. RULES AND REGULATIONS GOVERNING ISSUANCE OF WARNING CITATIONS. TABLE OF CONTENTS.

1720-05-04
Aug 1, 2017 - and new rule filed May 27, 1986; effective August 12, 1986. Repeal and new rule filed November 10,. 2005; effective March 30, 2006. Repeal ...

Turners Tours 386 2015-05-05.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Turners Tours ...

2016-05-05 HIT Workgroup Minutes.pdf
with integration efforts, and identifying gaps and solutions to fill them. All-Stars Characteristics Discussion: o The Workgroup discussed in some depth the ...