25
Leonardo Serodio [email protected] May 2013 Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec

Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

Leonardo Serodio [email protected] May 2013

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec

Page 2: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

2

Distributed Denial of Service (DDoS) Attacks

Service Provider Network Internet

DDoS attack traffic saturates inline security

devices

DDoS attack traffic targets applications &

services

DDoS attack traffic consumes SP network

capacity

DDoS attacks launched from compromised

systems (bots)

Enterprise or IDC

Firewall IPS

Bots Victim

Page 3: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

3

Remotely Trigered Black Hole Filtering at Peer SP edge

Firewall IPS

RTBH

D/RTBH - All traffic to the victim is discarded!

Internet

BGP Prefix with next-hop set to predefined black-hole route.

Service Provider Network

Enterprise or IDC

Victim

Victim initiates BGP announcement

Cloud-based DDoS Defense with RTBH BGP Announcement Originated by the Victim

RTBH

Good traffic

Attack traffic

• Fourth most used tool to mitigate DDoS attacks [5]

• RFCs: RFC 3882, RFC 5635 (includes D/RTBH and S/RTBH)

BGP Announcement

Page 4: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

Service Provider Network

Enterprise or IDC

RTBH

Firewall IPS

Victim

Remotely Trigered Black Hole Filtering at SP edge

Cloud-based DDoS Defense with RTBH BGP Announcement Originated by the SP

RTBH

D/RTBH - All traffic to the victim is discarded!

Internet

BGP Prefix with next-hop set to predefined black-hole route.

Good traffic

Attack traffic

BGP Announcement

4

Page 5: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

5

BGP Flow Specification

• BGP Flowspec defines a new BGP Network Layer Reachability Information (NLRI) format used to distribute traffic flow specification rules.

­ NLRI (AFI=1, SAFI=133): IPv4 unicast filtering

­ NLRI (AFI=1, SAFI=134): BGP/MPLS VPN filtering

• Specified by RFC 5575 [1], extended to IPv6 in [2]

• Main application today is to automate the distribution of traffic filter lists to routers for the mitigation of DDoS attacks.

­ Selectively drop traffic flows based on L3/L4 information.

­ Intelligent control platform builds filter rules to drop harmful traffic, encodes them as BGP flowspec routes and advertises them to BGP peers.

Page 6: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

6

BGP Flow Specification

• The Flow specification can match on the following criteria:

­ Source / Destination Prefix ­ IP Protocol (UDP, TCP, ICMP, etc.) ­ Source and/or Destination Port ­ ICMP Type and Code ­ TCP Flags ­ Packet Length ­ DSCP (Diffserv Code Point) ­ Fragment (DF, IsF, FF, LF)

• Actions defined using Extended Communities:

­ 0x8006: traffic-rate (rate 0 discards all traffic for the flow) ­ 0x8007: traffic-action (sample) ­ 0x8008: redirect to VRF ­ 0x8009: traffic-marking (DSCP value )

Page 7: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

7

BGP Flow Specification – Why Use It for ACLs?

• ACLs are still the single most widely used tool to mitigate DDoS attacks [5].

­ But…ACLs are demanding in configuration & maintenance.

• BGP Flowspec leverages the BGP Control Plane to simplify the distribution of ACLs, greatly improving operations:

­ Inject new filter rules to all routers simultaneously without changing router configuration.

­ Reuse existing BGP operational knowledge and best practices.

­ Control policy propagation via BGP Communities.

• Improve response time to mitigate DDoS attacks.

• Route validation performed for eBGP sessions, see draft [3] for revised validation procedure for iBGP sessions.

Page 8: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

8

Cloud-based DDoS Defense with BGP Flowspec Inter-domain flowspec injection

Flowspec mitigation controlled by ISP customer under attack

Firewall IPS

Good traffic

Attack traffic

Victim

Only clean traffic delivered to enterprise/IDC

Flowspec

Flowspec

Flowspec

Flowspec

Volumetric attack traffic removed at ISP network edge

Service Provider Network Internet

Enterprise or IDC

Page 9: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

9

Cloud-based DDoS Defense with BGP Flowspec Intra-domain flowspec injection

Only clean traffic delivered to enterprise/IDC

Flowspec

Firewall IPS

Good traffic

Attack traffic

Victim

Flowspec mitigation controlled by the ISP or ISP customer via Portal

Flowspec

SOC

Flowspec

Flowspec

Volumetric attack traffic removed at ISP network edge

Service Provider Network Internet

Enterprise or IDC

Page 10: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

10

BGP Flow Specification – Vendors & Users

• Router vendors supporting BGP Flowspec:

­ Alcatel-Lucent 7750 SROS 9.0R1

­ Juniper JunOS 7.3

• DDoS mitigation vendors:

­ Arbor Peakflow SP 3.5

• BGP Tools:

­ ExaBGP Injector [7]

• Users:

­ North America: TW Telecom (TWTC) [6], other Tier 1, Tier 2

­ Europe: Tier 1, Tier 2

­ Latin America & Caribbean: RNP (Brasil) [8]

­ Flowspec itself is the 8th most used tool to mitigate attacks [5]

Page 11: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

11

DDoS attacks: Increasing Scale & Sophistication

DDoS Attack Bandwidth (Gbps)

Volumetric Attacks

Network Infrastructure

Source: Arbor Networks – 2012 Worldwide Infrastructure Security Report, Volume VIII

Application Attacks

IDCs & Services

Page 12: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

12

DDoS Protection with Mitigation Appliance (IDMS) “Surgical Mitigation”

• Traffic anomaly is scrubbed by a DPI-capable mitigation appliance that surgically removes the attack traffic only.

• Mitigation appliances are also known as Intelligent DDoS Mitigation Systems (IDMS). IDMS are the second most used tool for DDoS protection [5].

• Able to mitigate complex, application-layer DDoS attacks without completing the attack.

• Typically a shared resource in the network infrastructure.

• Traffic anomalies need to be redirected in the network to go through the IDMS before reaching the intended destination:

- Traffic Diversion or Offramping

- Traffic Reinjection or Onramping

Page 13: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

13

IDMS-based DDoS Mitigation Terminology

• Diversion or Offramping: rerouting of traffic destined to the victim to the DDoS mitigation appliance for scrubbing.

• Reinjection or Onramping: redirection of scrubbed (clean) traffic back to its intended destination.

• Typically, traffic diversion takes place through more specific BGP prefix announcements (victim addresses), usually in the GRT (called diversion/offramp route):

­ Easier to control & manipulate routes (NH, Communities)

­ Can be signaled across AS boundaries if required

• Traffic Reinjection usually requires tunneling or an alternate routing domain (VRF) to get clean traffic back to its intended destination without looping.

Page 14: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

14

IDMS-based DDoS Mitigation Scrubbing Center Design

Good traffic

Attack traffic

Detection& Control

Traffic Diversion

Scrubbed Traffic Reinjection

GRE Tunnel or VRF (dotted yellow line)

Diversion Prefixes (BGP)

BGP Prefix Diversion

Firewall IPS

Victim

Enterprise or IDC

Internet

Internet

Scrubbing Center

IDMS (Mitigation Appliance)

Page 15: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

15

IDMS-based DDoS Mitigation Distributed Design – Embedded IDMS

Good traffic

Attack traffic

IDMS (Mitigation Appliance)

Detection& Control

Internal Traffic Diversion & Scrubbing

Embedded IMDS

BGP Prefix Diversion

Firewall IPS

Victim

Enterprise or IDC

Internet

Internet

IMDS

IMDS

Scrubbing Center

Page 16: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

16

Traffic Diversion with BGP Prefixes – The Good & The Bad

• Real mitigation of DNS attack

Page 17: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

17

DDoS Mitigation Appliance – “Surgical Diversion” Using BGP Flowspec “Redirect to VRF” Action

MitigationAppliance

Detection& Control

Traffic diversion using a VRF (subset of all

traffic to victim).

Traffic Reinjection

BGP Flowspec filter to redirect only specified traffic

Firewall IPS

Victim

Enterprise or IDC

Good traffic

Attack traffic

BGP Flowspec Diversion

Internet

Internet

Scrubbing Center

“Dirty” VRF

Page 18: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

18

“Surgical Diversion” Using BGP Flowspec – Optimized Design & Operation

• No changes to the Global Routing Table (GRT)

­ Diversion performed by Flowspec NLRI

­ Flowspec filter Action configured to “Redirect to VRF”

­ Extended Community 0x8008.

­ Less intrusive to the routing system

• No need for a tunneling design for reinjection/onramping

­ Clean traffic can simply be sent back to the GRT

• More granular control of diverted traffic

­ Allows for the redirection of only a subset of the traffic to the victim: specific protocols, ports, source prefix, destination prefix

­ Less traffic overhead for Mitigation Appliance to deal with

Page 19: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

19

“Surgical Diversion” Using BGP Flowspec – Enabling New Workflows

• Facilitates the implementation of new mitigation workflows for demanding use cases:

­ “Always on” Mitigations for critical resources:

­ HTTPS traffic only (normal web traffic follows on-demand mitigation model)

­ ICMP & UDP traffic

­ Victims with very large traffic volume

­ Divert just traffic from a certain block, or geographical region (based on IP Location)

Page 20: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

20

“Surgical Diversion” for Data Centers – Optimizing the Mitigation of Application-Layer DDoS Attacks

• On-demand or continuous mitigation of selective traffic

• Benefits of continuous DPI traffic scrubbing without the risks and demands of in-line deployments.

Data Center Network

Firewall / IPS / WAF

Public

Facin

g S

erv

ers

Attackers

Legitimate Users

GRT

VRF

Flowspec

IDMS

Backbone / Internet

Page 21: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

21

BGP Flowspec Diversion – Work in Progress

• New “Redirect to IP Next-Hop” Flowspec Action

­ Described in draft-simpson-idr-flowspec-redirect-02.txt [4]

­ New Extended Community value 0x0800

• Enables BGP flowspec redirection using encapsulations other than VRFs, such as GRE or MPLS tunnels.

Victim

Enterprise or IDC

MitigationAppliance

Scrubbing Center

MPLS or GRE Tunnel

Page 22: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

22

Summary – “Surgical Diversion” Benefits Using BGP Flowspec:

­ Greatly simplifies traffic diversion design and operation:

­ Less intrusive to the routing system – no changes to the Global Routing Table (GRT).

­ On the reinjection side, there is no need to use tunneling (GRE) or VRF designs.

­ Optimizes the benefits of a DDoS Mitigation Appliance (“surgical mitigation”) with precise diversion:

­ Allows for a better optimization of the shared mitigation capacity of the mitigation appliance.

­ Addresses demanding mitigation use cases.

­ On-demand & continuous scrubbing per application or other criteria.

Page 23: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information

23

References:

• [1] RFC 5575, Dissemination of Flow Specification Rules

• [2] draft-ietf-idr-flow-spec-v6-03 – Dissemination of Flow Specification Rules for IPv6

• [3] draft-ietf-idr-bgp-flowspec-oid-01 – Revised Validation Procedure for BGP Flow Specifications

• [4] draft-simpson-idr-flowspec-redirect-02.txt – BGP Flow-Spec Extended Community for Traffic Redirect to IP Next Hop

• [5] Arbor Networks – 2012 Worldwide Infrastructure Security Report, Volume VIII

• [6] 2006 - NANOG 38, D. Gassen, R. Lozano (Time Warner Telecom), D. McPherson, C. Labovitz (Arbor Networks), "BGP Flow Specification Deployment Experience“

• [7] 2010 - LINX69, Thomas Mangin (Exa Networks), Andy Davidson (NetSumo), "BGP Route Injection” http://www.andyd.net/media/talks/BGPRouteInjection.pdf

• [8] GTER/GTS 2007, Raniery Pontes (RNP), “Flowspec em ação - Experiência de uso no backbone da RNP”

Page 24: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information
Page 25: Traffic Diversion Techniques for DDoS Mitigation using BGP ...traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information