RIPE Anti-Spoofing Task Force HOW-TO
Total Page:16
File Type:pdf, Size:1020Kb
RIPE Anti‐Spoofing Task Force HOW‐TO Fernando García (Tecnocom) and Juan P. Cerezo (BT GS) Document ID: ripe-431 Date: 9 Mai 2008 Table of Contents 1. Introduction .................................................................................................................2 2. Overview........................................................................................................................2 3. Definitions.....................................................................................................................2 4. Comm o n aspects related to IP networking........................................................2 4.1. Filtering prefixes ............................................................................................................. 2 4.1.1. Why to filter .............................................................................................................................2 4.1.2. What to filter............................................................................................................................3 4.1.3. Where to filter.........................................................................................................................3 4.2. Unicast Reverse Path Forwarding (uRPF) mechanism(s)................................. 3 4.3. Other filters: bogon prefix filtering........................................................................... 4 4.3.1. What are bogon prefixes.....................................................................................................4 4.3.2. Why filter bogons...................................................................................................................4 4.3.3. How to build the filters........................................................................................................4 4.3.4. Unallocated addresses.........................................................................................................4 5. Vendor specifics ..........................................................................................................5 5.1. Cisco features .................................................................................................................... 5 5.2. Juniper features ............................................................................................................... 5 6. Scena ri os........................................................................................................................5 6.1. Customer/provider scenarios..................................................................................... 5 6.1.1. One customer router, single provider with one router..........................................5 6.1.2. Multiple customer routers, single provider with one router...............................9 6.1.3. Multiple routers, single provider with multiple routers .................................... 16 6.1.4. Single customer outer, multiple providers, load balancing............................... 21 6.2. Customer access networks.........................................................................................23 6.3. Core networks.................................................................................................................23 7. IPv6............................................................................................................................... 25 7.1. uRPF....................................................................................................................................26 7.2. Routes from customers ...............................................................................................26 Routes from peers ................................................................................................................27 7.3....................................................................................................................................................27 7.3.1. Blocking martians............................................................................................................... 27 7.3.2. Blocking martians and bogons...................................................................................... 27 8. Conclusion.................................................................................................................. 28 9. References.................................................................................................................. 28 1. Introduction This document presents practical recommendations for the implementation of anti‐spoofing mechanisms at the critical points of the network infrastructure of carriers and/or ISPs. These practical recommendations are based on the experience of the editors and collaborators and on previous existing work, like existing best common practices [1]. 2. Overview This document starts with an enumeration of the most common attacks that networks connected to the Internet suffer today, followed by a brief description of the countermeasures that can be used to avoid or, at least, reduce the impact of these attacks. Finally, a set of recipes implementing these countermeasures in mainstream routers is presented in a way that is easy to deploy in a network. 3. Definitions CEF: Cisco Express Forwarding: a packet switching mode used in Cisco routers that increases the transmission speed while reducing CPU load. CPE: Customer Premises Equipment: a router placed in an end‐user office that connects to both the end‐user network and the provider network, usually through a point‐to‐point link. DFZ: Default Free Zone: the set of routers in the Internet that do not use a default route and that need to keep the full routing table in their memory. PE: Provider Edge: a router located in the provider network that connects directly with one or more CPEs. 4. Common aspects related to IP networking 4.1. Filtering prefixes 4.1.1. Why to filter The amount and severity of security incidents involving spoofed IP addresses is increasing. This suggests that applying some level of control over the correctness of the source IP address of packets can mitigate the impact of the attacks on the infrastructure. Also, the blocking of spoofed address would help to find the origin of such attacks. 4.1.2. What to filter IP traffic with a source address belonging to prefixes that should not be on the routing table of routers connected to (or that forward traffic from/to) the public Internet should be filtered. The most common list of these prefixes is the so‐ called bogon list [2]. 4.1.3. Where to filter Filtering should be applied, where possible, on at least one of: • The hosts in the network • The customer’s routers (CPE) • The ISP infrastructure equipment (access routers and concentrators, DFZ routers) The nearer the filters are applied to the origination of the spoofed traffic, the better the effects on the security and reliability of the hosts and the network will be. 4.2. Unicast Reverse Path Forwarding (uRPF) mechanism(s) uRPF [3] is a mechanism where routers check whether the source address of a received packet exists in the routing table. If it does not appear in the routing table, the packet is blocked. Various options exist regarding the strictness: • Strict uRPF will drop the packet unless the best route to the source address is through the interface on which the packet was received • Feasible path uRPF will drop the packet unless a route (not necessarily the best) to the source address is through the interface on which the packet was received. Feasible path uRPF prevents issues in asymmetric and multihomed scenarios • Loose uRPF will drop the packet unless a route to the source address exists. The interface is irrelevant for this type. A variation of this mechanism allows ignoring the existence of default routes in the forwarding table. The exact conditions for choosing one of these mechanisms are hard to describe, but the following rules of thumb apply: • Networks that apply strict uRPF must keep their routing symmetric. Strict uRPF can be problematic on peering routers that exchange routes with other ISPs (“hot potato“ routing, BGP filtering in both directions of the peering due to different routing policies). It can also cause problems in networks that have different links to other networks • Loose uRPF applied to interfaces in border routers will allow asymmetric routing, but will limit the automatic “pseudo‐filtering” benefits of uRPF to private (RFC 1918) and unallocated (“bogon“) IP addresses [4] 4.3. Other filters: bogon prefix filtering 4.3.1. What are bogon prefixes A bogon prefix as defined by Cymru [1] is “a route that should never appear in the Internet routing table. A packet routed over the public Internet (not including over VPN or other tunnels) should never have a source address in a bogon range. These are commonly found as the source addresses of DDoS attacks”. For the purpose of this how‐to, a packet received on an interface of a router is considered bogon if it’s source address should not be routable through that interface. This definition of bogon includes “martian” addresses (as listed in RFC 1918 and RFC 3330) and unallocated addresses as explained in the next subsection. Also included are addresses from networks that are always connected to other interfaces of the router. 4.3.2. Why filter bogons The Cymru document states that, according to some measurements, up to 60% of the IP addresses used in attacks are bogon. Filtering these addresses will greatly reduce the impact of such attacks.