1 Answers
Securing BGP Route Advertisements: A Multi-Layered Approach
Preventing BGP hijacking is paramount for maintaining network stability, data integrity, and service availability. A robust defense involves implementing a combination of technical measures, stringent policies, and collaborative efforts. Here's a comprehensive guide to best practices:
1. Implement Resource Public Key Infrastructure (RPKI)
RPKI is a cryptographic framework designed to secure the internet’s routing infrastructure. It allows legitimate holders of IP address blocks to cryptographically sign statements about which Autonomous Systems (AS) are authorized to originate routes for their prefixes. This creates Route Origin Authorizations (ROAs).
- Origin Validation: RPKI enables routers to validate whether a BGP announcement for a prefix originates from an AS authorized by the legitimate IP address holder.
- Deployment: Operators should create ROAs for all their announced prefixes and ensure their routers perform RPKI validation on incoming routes.
"RPKI is widely recognized as the most effective current defense against route origin hijacking, providing a cryptographically verifiable mechanism to assert routing authorization."
2. Maintain Accurate Internet Routing Registry (IRR) Records
IRRs are databases that store routing policy information, including which ASes are authorized to announce specific prefixes. While not cryptographically secure like RPKI, they are crucial for filtering and policy enforcement.
- Route Objects: Register your prefixes and the ASes authorized to announce them as "route" and "route-set" objects.
- AS-SETs: Use AS-SETs to define groups of ASes that are authorized to announce prefixes on your behalf, especially if you have downstream customers.
- Keep Records Updated: Outdated IRR records can lead to legitimate routes being filtered.
Comparison: RPKI vs. IRR
| Feature | RPKI | IRR (e.g., RADB) |
|---|---|---|
| Security Mechanism | Cryptographic (digital signatures) | Policy-based (text records) |
| Primary Use | Route Origin Validation | Route Filtering & Policy Exchange |
| Verification | Cryptographically verifiable by routers | Relies on trust and manual verification |
| Complexity | More complex initial setup | Simpler, but prone to human error |
3. Implement Strict Route Filtering
Filtering is a fundamental defense mechanism to prevent the acceptance of invalid routes and the advertisement of incorrect ones.
Ingress Filtering (Inbound)
Filter incoming BGP advertisements from peers and transit providers to accept only legitimate prefixes.
- Prefix Filtering: Only accept prefixes that are expected from a peer (e.g., based on IRR data or a mutually agreed-upon list).
- AS-PATH Filtering: Reject routes that contain your own AS number (AS-PATH prepending for traffic engineering is an exception and must be handled carefully), or private AS numbers where not explicitly intended.
- BOGON Filtering: Filter out unallocated or reserved IP address blocks (bogon routes).
Egress Filtering (Outbound)
Filter outgoing BGP advertisements to ensure you only announce your own legitimate prefixes and those you are authorized to announce for customers.
- Self-Originating Prefixes: Only advertise prefixes that you legitimately own or are authorized to originate.
- No Transitivity: Avoid advertising prefixes learned from one peer to another unless you are a transit provider and have a clear policy to do so.
4. Secure Peering Sessions
Protect the BGP sessions themselves from unauthorized access or manipulation.
- MD5 or TCP Authentication Option (TCP AO): Use cryptographic authentication for BGP sessions to prevent spoofing or unauthorized insertion of BGP updates. TCP AO is preferred over MD5 due to its stronger cryptographic properties.
- Dedicated Interconnects: Use dedicated VLANs or physical links for peering where possible to isolate BGP traffic.
- Strict ACLs: Apply Access Control Lists (ACLs) to BGP peering interfaces to permit BGP traffic only from the expected peer IP addresses.
5. Implement Robust Monitoring and Alerting
Early detection is critical for mitigating the impact of a BGP hijack.
- Real-time Monitoring: Use BGP monitoring services (e.g., BGPStream, Routeviews, RIPE RIS) to track your prefix advertisements globally.
- Anomaly Detection: Configure alerts for unexpected changes in origin AS, AS-PATH, prefix length, or reachability.
- Baseline Establishment: Understand your normal routing behavior to quickly identify deviations.
6. Participate in Industry Initiatives and Collaboration
Security is a shared responsibility within the routing community.
- Mutually Agreed Norms for Routing Security (MANRS): Adhere to MANRS actions, which include filtering, anti-spoofing, coordination, and global validation.
- Peer Engagement: Maintain good communication channels with your peers and upstream providers to quickly resolve routing issues.
7. Consider BGPSEC (Future-proofing)
While not widely deployed, BGPSEC aims to provide cryptographic verification of the entire AS-PATH, preventing path hijacking. Keep an eye on its development and consider its adoption as it matures.
By adopting these best practices, network operators can significantly enhance the security posture of their BGP route advertisements, making their networks more resilient against hijacking attempts and contributing to a more secure global routing infrastructure.
Know the answer? Login to help.
Login to Answer