20
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London http://nrg.cs.ucl.ac.uk/mjh/servernets.pdf

Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Embed Size (px)

Citation preview

Page 1: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Using Routing and Tunnelling to Combat DoS Attacks

Adam Greenhalgh, Mark Handley, Felipe HuiciDept. of Computer ScienceUniversity College London

http://nrg.cs.ucl.ac.uk/mjh/servernets.pdf

Page 2: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Background:

Using Addressing to Combat DoS Attacks

In previous work, we suggested that many of unwanted modes of operation of the Internet could be prevented by simple changes to the addressing architecture.http://www.cs.ucl.ac.uk/staff/M.Handley/papers/dos-arch.pdf

Unfortunately these changes would be hard to deploy in practice.Needs IPv6, HIP, large-scale agreement on the

solution.

Page 3: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Towards deployable solutions.

To be deployable in the near term, a solution needs to satisfy the following criteria:Feasible with IPv4.Use off-the-shelf hardware.No changes to most Internet hosts.No changes to most Internet routers.Use existing routing protocols.

Page 4: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Towards evolvable solutions

It is important that in providing short-term solutions we don’t sacrifice the future evolution of the Internet.

Anything that goes in the middle of the network should be:Application independent.Impose minimal dependencies on transport

protocols.

Page 5: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Goals

Defend servers against DoS attacks. Opt-in. Servers have to choose to be defended.

Shut down unwanted traffic in the network as close to the source of that traffic as possible. Server decides certain traffic is unwanted. Requests traffic is shut down. Network filters traffic.

Only network filtering can defend against link-flooding attacks.

Page 6: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Very Simple Architectural Overview

Place control points in the network that are capable of performing IP-level filtering. Cause unwanted traffic to our servers to traverse these

control points. Provide a signalling mechanism to allow the servers to

request certain traffic is filtered.Problem 1:

How to determine which control point can shut down certain traffic?

Problem 2: How to ensure that only the recipient of unwanted traffic

can request its filtering.

Page 7: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Revised Architectural Overview

Place control points in the network. Cause all traffic to server subnets to traverse at least

one control point.Control points mark the traffic with their identity.

Receivers can see which control points are on the path from sender.Can request correct control point to install filter.

Page 8: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Constraints

To provide a protocol-independent solution, we must primarily work at the IP layer.

The main IP-layer tools available to us are:AddressingRoutingEncapsulaton

Page 9: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Using these tools...

Addressing To identify server subnets.

Routing To limit and control the paths to the server subnets. To direct traffic through control points near to the source

of the traffic.

Encapsulation To record information about the control points traversed

on the path from client to server.

Page 10: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Incremental Deployment

First we’ll sketch out how servernets might be deployed in a single ISP.Can only push back as far as ISP border.Useful for large ISPs with many peering points, as

attack has not yet fully converged. Next we’ll explain how cooperating ISPs can deploy

multi-ISP servernets.Greater benefits as pushback can be much closer

to attack source.

Page 11: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

S

1 2Border Router

LocalRouter

ServerISP Network

Normal ISP Routing

E-BGP

E-BGP

E-BGP

I-BGP+

OSPF 3

TrafficSource

Page 12: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

S

1 2

ServerISP Network

Encapsulation

E-BGP:Advertise S

E-BGPAdvertise S

I-BGP

3

TrafficSource

Monitor

RequestFilter

Page 13: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

S

1 2

ServerISP Network

Routing

I-BGPNet SNexthop D,“servernet”“no export”

I-BGPNet SNexthop D,“servernet”“no export”

3

D

E1

E2

S not advertised

E-BGPNet SNexthop E1

E-BGPNet SNexthop E1

E-BGPNet SNexthop E2

E-BGPNet SNexthop E2

Key Points:

Only route from outside to S is via an encapsulator.

Net D is not externally advertised at all.

Key Points:

Only route from outside to S is via an encapsulator.

Net D is not externally advertised at all.

Page 14: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

S

1

Server

Routing for Internal Clients

I-BGPNet SNexthop D,“servernet”“no export”

I-BGPNet SNexthop D,“servernet”“no export” 3

D

E1

E2

C Client

Local DoS attack?

OSPF:Net Svia E1

OSPF:Net Svia E1

OSPF:Net Svia E2

OSPF:Net Svia E2

Page 15: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

S Server

D1R1

I-BGPNet SNexthop D,“servernet”“no export”

I-BGPNet SNexthop D,“servernet”“no export”

R2

I-BGPNet SNexthop R1,“servernet”“servernet-transit”“no export”

I-BGPNet SNexthop R1,“servernet”“servernet-transit”“no export”

Multi-ISP Servernets

I-BGPNet SNexthop R1,“servernet”“servernet-transit”“no export”

I-BGPNet SNexthop R1,“servernet”“servernet-transit”“no export”

To rest of world(external clients)

E-BGPNet S, R1“servernet”“no export”

E-BGPNet S, R1“servernet”“no export”

Page 16: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

S Server

D1R1

R2

Multi-ISP Servernets

I-BGPNet SNexthop R1,“servernet”“servernet-transit”“no export”

I-BGPNet SNexthop R1,“servernet”“servernet-transit”“no export”

Client

Page 17: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Protection

Provide defense against non-spoofed traffic for servers that opt-in.Automatic mechanism reduces costs for ISP.Lower collateral damage for ISP.

Assumes a detection mechanism exists that can identify bad traffic sources.

What about spoofed traffic?

Page 18: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Attack landscape

Currently most DoS attacks are not spoofed.No need to!

Servernets change the landscape. Attackers will then need to:Spoof source addresses.Disguise their attack traffic to fly below the

detection threshold.

Page 19: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Spoofing

The existence of servernets would provide stronger motivation for deployment of ingress filtering. Currently there’s limited gain from doing so.

Servernet encapsulators are a natural place to perform source address validation. Only current ways to do this are hacks, but future

extensions to protocol stack could provide simple address authentication.

Eg. ICMP nonce-exchange. This is a longer-term solution.

Page 20: Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Implement and test the scheme in the lab.Software implementation on fast PC hardware.Goal is to encap/decap and firewall at 1Gb/s.Already in progress (3 to 6 months).

Deploy the scheme in the wild.Industrial collaborators are most welcome.

Future work