[191436] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: "Defensive" BGP hijacking?

daemon@ATHENA.MIT.EDU (Sandra Murphy)
Wed Sep 14 17:51:58 2016

X-Original-To: nanog@nanog.org
From: Sandra Murphy <sandy@tislabs.com>
In-Reply-To: <CAD6AjGQWm7ULdOJuNs7kwC45aB7G6evdx1OQiBO94bUeRzDXwQ@mail.gmail.com>
Date: Wed, 14 Sep 2016 17:49:55 -0400
To: Ca By <cb.list6@gmail.com>,
 NANOG list <nanog@nanog.org>
Cc: Sandra Murphy <sandy@tislabs.com>
Errors-To: nanog-bounces@nanog.org


--Apple-Mail=_0CF0D85B-72FF-441A-82C0-E8F58545A5DD
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


> On Sep 13, 2016, at 8:08 PM, Ca By <cb.list6@gmail.com> wrote:
>=20
> On Tuesday, September 13, 2016, Doug Montgomery <dougm.work@gmail.com>
> wrote:
>=20
>> If only there were a global system, with consistent and verifiable =
security
>> properties, to permit address holders to declare the set of AS's =
authorized
>> to announce their prefixes, and routers anywhere on the Internet to
>> independently verify the corresponding validity of received =
announcements.
>>=20
>> *cough      https://www.nanog.org/meetings/abstract?id=3D2846     =
cough*
>>=20
>> I now return us to our discussion of network police, questionnaires =
for
>> network security, and the use of beer as a motivating force.
>>=20
>> dougm
>>=20
>>=20
> Interesting that backconnect has invalid ROA issued
>=20
> http://bgp.he.net/AS203959#_prefixes

Well, no, that=E2=80=99s not what the bgp.he.net (live long and =
prosper!) icons mean.

There is nothing invalid about the ROA.  And BackConnect did not issue =
it.

The red key means that AS203959 BackConnect Security LLC is announcing =
routes for 181.215.239.0/24, 191.96.128.0/24. etc that are invalid =
according to the RPKI.  Someone else with the right to use =
181.215.239.0/24, 191.96.128.0/24. etc, created ROAs authorizing some =
other AS(s) to originate the route.

You can look at the ROAs for those prefixes with red keys in =
http://rpki-browser.realmv6.org (and with the RPKIviz and EOM tools from =
www.securerouting.net).  You can see that there are ROAs for =
181.214.0.0/15 for AS50673, AS60458, AS61440.  and ROAs for =
191.96.0.0/16 for AS61440, AS60458, AS29073, AS33182, AS37692.  and ROAs =
for 191.101.0.0/16 for AS60458, AS37692, AS61440.

Except.

It looks like, maybe, BackConnect was re-allocated the four prefixes =
with red keys, and whoever reallocated the prefixes to them created ROAs =
for their aggregate =E2=80=94 but not for their customers.  See for =
example http://bgp.he.net/net/191.96.128.0/24 (and =
http://bgp.he.net/net/191.101.191.0/24)

This can occurred as the world backfills the existing allocations and =
the customers don=E2=80=99t keep up and their providers aren=E2=80=99t =
careful.  Some RPKI implementations will warn you that the ROA you are =
about to create will make existing routes appear invalid to the RPKI.

Just for fun, take a look at the IRR entries for the four prefixes with =
red key icons:

route:      191.96.128.0/24
descr:      Clan Servers
origin:     AS20473
notify:     net-support@ap.equinix.com
notify:     noc@ap.equinix.com
mnt-by:     MAINT-EQUINIXPAC
changed:    mvillalobos@ap.equinix.com 20151229
source:     NTTCOM

route:      191.96.129.0/24
descr:      Clan Servers
origin:     AS20473
notify:     net-support@ap.equinix.com
notify:     noc@ap.equinix.com
mnt-by:     MAINT-EQUINIXPAC
changed:    mvillalobos@ap.equinix.com 20151229
source:     NTTCOM

route:      191.101.191.0/24
descr:      Clan Servers
origin:     AS20473
notify:     net-support@ap.equinix.com
notify:     ap-noc@ap.equinix.com
mnt-by:     MAINT-EQUINIXPAC
changed:    mporquez@ap.equinix.com 20151227
source:     NTTCOM

route:      181.215.239.0/24
descr:      Proxy route object registered by AS2764
origin:     AS45177
remarks:    This route object was created by AAPT on behalf of a =
customer.
remarks:    As some of AAPTs upstream networks filter based on IRR =
objects,
remarks:    this route object has been created to ensure that the =
advertisement
remarks:    of this prefix is not rejected.
notify:     routing.shared@aapt.com.au
mnt-by:     MAINT-AS2764
changed:    nobody@aapt.com.au 20160106
source:     RADB

(like the =E2=80=9Cnobody=E2=80=9D part???)


At least the aggregate announcements aren=E2=80=99t proxies.

route:      181.214.0.0/19
descr:      Digital Energy Technologies LTD.
origin:     AS61440
mnt-by:     MAINT-AS61440
changed:    modestas@host1plus.com 20140814  #13:04:53Z
source:     RADB

route:      191.101.0.0/21
descr:      Digital Energy Technologies LTD.
origin:     AS25761
mnt-by:     MAINT-AS61440
changed:    modestas@host1plus.com 20150610  #08:53:38Z
source:     RADB

=E2=80=94Sandy

(Since bgp.he.net changes as the routing world changes, the red keys =
could be gone by the time anyone looks, of course.)



>=20
> On Tue, Sep 13, 2016 at 2:51 PM, Mel Beckman <mel@beckman.org =
<javascript:;>>
>> wrote:
>>=20
>>> Blake,
>>>=20
>>> I concur that these are key questions. Probably _the_ key questions. =
The
>>> fabric of the Internet is today based on trust, and BGP's integrity =
is
>> the
>>> core of that trust.
>>>=20
>>> I realize that BGP hijacking is not uncommon. However, this is the =
first
>>> time I've seen in it used defensively. I don't see a way to ever =
bless
>> this
>>> kind of defensive use without compromising that core trust. If =
Internet
>>> reachability depends on individual providers believing that they are
>>> justified in violating that trust when they are attacked, how can =
the
>>> Internet stand?
>>>=20
>>> In addition to the question posed to Bryant about whether he would =
take
>>> this action again, I would like to add: what about the innocent =
parties
>>> impacted by your actions? Or do you take the position there were no
>>> innocent parties in the hijacked prefixes?
>>>=20
>>> -mel via cell
>>>=20
>>>> On Sep 13, 2016, at 11:40 AM, Blake Hudson <blake@ispn.net
>> <javascript:;>> wrote:
>>>>=20
>>>>=20
>>>>=20
>>>> Bryant Townsend wrote on 9/13/2016 2:22 AM:
>>>>> This was the point where I decided
>>>>> I needed to go on the offensive to protect myself, my partner,
>> visiting
>>>>> family, and my employees. The actions proved to be extremely
>> effective,
>>> as
>>>>> all forms of harassment and threats from the attackers immediately
>>> stopped.
>>>>=20
>>>>=20
>>>> Bryant, what actions, exactly, did you take? This topic seems
>>> intentionally glossed over while you spend a much larger amount of =
time
>>> explaining the back story and your motivations rather than your =
actions.
>>>>=20
>>>> Questions I was left with:
>>>>=20
>>>> 1. What prefixes have you announced without permission (not just =
this
>>>>  event)?
>>>> 2. How did you identify these prefixes?
>>>> 3. Did you attempt to contact the owner of these prefixes?
>>>> 4. Did you attempt to contact the origin or transit AS of these
>> prefixes?
>>>> 5. What was the process to get your upstream AS to accept these =
prefix
>>>>  announcements?
>>>> 6. Was your upstream AS complicit in allowing you to announce =
prefixes
>>>>  you did not have authorization to announce?
>>>>=20
>>>=20
>>=20
>>=20
>>=20
>> --
>> DougM at Work
>>=20


--Apple-Mail=_0CF0D85B-72FF-441A-82C0-E8F58545A5DD
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=iZcH
-----END PGP SIGNATURE-----

--Apple-Mail=_0CF0D85B-72FF-441A-82C0-E8F58545A5DD--

home help back first fref pref prev next nref lref last post