Historical BGP routing attacks
Popular/effective ways of mounting an attack on naming/DNS
“Reflection” or “DNS Reflection”
What makes the internet insecure?
Which of the following make the internet’s design fundamentally insecure?
Resource exhaustion attacks
Components of Security
Security Threat
anything that may cause a violation of one of these properties
Attack
an action that results in the violation of one of these security properties
Difference between a threat and an attack
potential vs. action
Attaks on confidentiality
MITM
Man in the Middle Attack
Eve could suppress Alice’s original message, and she could effectively impersonate Bob or Alice
A Denial of Service is an attack on what property of internet security?
Availability
Note: if an attacker is distributed, a Denial of Service attack is called a Distributed Denial of Service Attack
Negative impacts of attacks
Control plane security
typically involves authentication of the messages being advertised by the routing protocol
A route hijack is an attack on which form of authentication?
-Origin: ensures flat AS advertising prefix is the owner
How might route attacks occur?
To launch a route attack, one might:
Most common route attack
a route hijack attack, or an attack on origin authentication
Why hijacks matter
Autonomous System Session Authentication
How to guarantee origin and path authentication
Path attestation prevents against
Certain attacks that path attestations cannot prevent against
DNS security
To understand the threats and vulnerabilities of DNS, look at the architecture of DNS:
* Stub resolver issues a query to a caching resolver. This could have a MITM attack, or an attacker which observes a query and forges a response.
* If a query goes further than a local caching resolver (for example, to an authoritative name server), an attacker could try to send a reply back to that caching resolver before a real reply comes back, to poison (corrupt) the cache with bogus DNS records for a particular name. This attack is particularly virulent and we’ll look at DNS poisoning later.
* Masters and slaves can both be spoofed, zone files an be corrupted, updates to the dynamic update system can also be spoofed.
* Defense to cache poisoning: OX20.
* Other defense to some of the spoofing attacks: DNSSEC