What are possible consequences of attacks towards an OSPF-domain?
Attacks can originate externally, but also from the inside originating from router compromise.
What are the possible authentication types inside the OSPF-header authentication field?
Sequence numbers is used to address replay attacks. Shared keys + weak hashing (MD5) makes the security infeasible.
Mention attack vectors and defence mechanisms of OSPF
Defences:
Attacks vectors:
Mention security concerns of BGP
Byzantine robustness can mitigate risk.
How can BGP sessions be better protected?
TTL attributes in the IP-protocol can also help:
Use of IPsec:
How can BGP monitor for threats?
Use of “routing registries” where AS provide policy and topology info.
- Constructs global view of routing info but requires registry information to be correct.
“Looking glass” structures monitors BGP routing tables for anomalies.
Mention two security extensions for BGP
Explain how RPKI works.
It allows for verification of the “association between resource holders and their internet resources”.
Illustrations of RPKI on session 3 slides 143-152
The RPKI relying party model:
Explain Secure Path Validation with BGPSec
In order to keep paths valid, updates must satisfy:
What is RIB?
RIB stands for the Routing Information Base: a data table residing inside routers or hosts listing network destinations and metrics to other network destinations.
What is MPLS and what security mechanism exists for the protocol?
MPLS (Multiprotocol Label Switch) is a “layer 2.5” protocol, working between Layer 2 and Layer 3 of the OSI model. Often used when the need for speed and reliability is considered. It can provide better QoS in the organisation, and are often deployed by service providers and carriers.
Carriers can use it to provide services based on traffic’s characteristics.
For security, MPLS can utilize VPN services, either logically in L2/L3 in OSI. The infrastructure is the same regardless of layer, but the label-based routing is different. Allowsuse of abitrarity underlaying network protocols (more flexible and applicable).
MPLS equipment distinctions:
P = provider
C = customer
CE = customer edge router
NB: The VPN security of MPLS depends on router ability to separate flows. Lack of separate cryptographic protection makes assurance of the VPNs effectivness reliant on the trused IP network. This could introduce attacks that infiltrates labelled traffic from compromised CE routers.
The trust model assumes nobody has access to the IP network to modify labels.