Skip to main content

AS Hijack Detection and Mitigation
draft-sriram-sidrops-as-hijack-detection-07

Document Type Active Internet-Draft (individual)
Authors Kotikalapudi Sriram , Doug Montgomery
Last updated 2024-01-24
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-sriram-sidrops-as-hijack-detection-07
IDR and SIDR                                                   K. Sriram
Internet-Draft                                             D. Montgomery
Intended status: Standards Track                                USA NIST
Expires: 27 July 2024                                    24 January 2024

                   AS Hijack Detection and Mitigation
              draft-sriram-sidrops-as-hijack-detection-07

Abstract

   This document proposes a method for detection and mitigation of AS
   hijacking.  In this mechanism, an AS operator registers a new object
   in the RPKI called 'ROAs Exist for All Prefixes (REAP)'.  REAP is
   digitally signed using the AS holder's certificate.  By registering a
   REAP object, the AS operator is declaring that they have Route Origin
   Authorization (ROA) coverage for all prefixes originated by their AS.
   A receiving AS will mark a route as Invalid if the prefix is not
   covered by any Validated ROA Payload (VRP) and the route origin AS
   has signed a REAP.  Here Invalid means that the route is determined
   to be an AS hijack.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 27 July 2024.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights

Sriram & Montgomery       Expires 27 July 2024                  [Page 1]
Internet-Draft     AS Hijack Detection and Mitigation       January 2024

   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  AS Hijack Detection and Mitigation Method . . . . . . . . . .   3
   3.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .   4
   5.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   4
     5.1.  Normative References  . . . . . . . . . . . . . . . . . .   4
     5.2.  Informative References  . . . . . . . . . . . . . . . . .   4
   Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . .   5
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   5

1.  Introduction

   AS hijacking occurs when one AS accidentally or maliciously uses of
   another AS's AS number (ASN) as the origin ASN in a BGP announcement.
   The offending AS typically inserts its own ASN as the second ASN in
   the path after the hijacked origin ASN.  The prefix in the
   announcement may sometimes belong to the hijacker.  But AS hijacking
   is often done in conjunction with hijacking a third-party prefix.
   The hijacker would typically choose a third-party prefix that does
   not have Route Origin Authorization (ROA) [RFC6482] coverage.  Then
   the route would receive NotFound rather than Invalid validation
   result when RPKI-based Origin Validation (RPKI-OV) [RFC6811] is
   performed.  This benefits the hijacker because NotFound routes are
   commonly included in route selection by the receiver.

   This document proposes a method for detection and mitigation of AS
   hijacking.  In this mechanism, an AS operator registers a new object
   in the RPKI called 'ROAs Exist for All Prefixes (REAP)'.  REAP is
   digitally signed using the AS holder's certificate.  By registering a
   REAP object, the AS operator is declaring that they have Route Origin
   Authorization (ROA) coverage for all prefixes originated by their AS.
   A receiving AS will mark a route as Invalid if the prefix is not
   covered by any Validated ROA Payload (VRP) and the route origin AS
   has signed a REAP.  Here Invalid means that the route is determined
   to be an AS hijack.  It is assumed that a router that supports REAP
   is also RPKI [RFC6482] and RPKI-OV [RFC6811] capable.

   To review some related work, the BGPsec protocol [RFC8205]
   effectively prevents AS hijack attacks but its adoption does not seem
   likely in the near future.  The ASPA method
   [I-D.ietf-sidrops-aspa-verification] is designed principally for

Sriram & Montgomery       Expires 27 July 2024                  [Page 2]
Internet-Draft     AS Hijack Detection and Mitigation       January 2024

   detection of route leaks.  In conjunction with checking peer ASN with
   BGP OPEN message (e.g., enforce-first-as [Cisco-IOS] or
   "peer_lookup_with_open" [Quagga]), ASPA also addresses AS hijacking
   in part.  However, due to its vulnerability to cut and paste attacks
   in partial deployment, ASPA will often label such attacks as Unknown
   rather than Invalid.  That gives leeway to an attacker to conduct AS
   hijacks in partial deployment.  Even when an AS creates its ASPA
   object, if its transit provider does not, then the attacker can
   conduct the cut and paste attacks involving the AS.  On the other
   hand, the proposed REAP method for detecting AS hijacks works much
   better even in partial deployment.  If AS A creates its REAP object,
   then a REAP-enabled AS Z (anywhere in the Internet) can perform AS
   hijack detection for AS A independent of the adoption status of any
   other ASes.  In other words, REAP can be deployed incrementally and
   the benefits accrue immediately for the REAP object creator and the
   ASes that have REAP-based AS hijack detection.  Of course REAP and
   ASPA work in a complementary manner.

   RPKI-OV is known to be vulnerable to forged-origin hijacks (see
   Section 4.3.1 in [NIST-800-189]), where a prefix and an origin AS
   that appear in a ROA are used together.  However, in that case the
   attacker is likely competing with the legitimate Valid announcement
   for the prefix, and that makes the attack more conspicuous.
   Generally, the hijacker would seek to remain under the radar.  So AS
   hijacks occur more commonly with a third-party prefix that does not
   have ROA coverage.  The REAP method effectively detects and mitigates
   this form of attack.

2.  AS Hijack Detection and Mitigation Method

   This document specifies a new RPKI object called 'ROAs Exist for All
   Prefixes (REAP)'.  As stated before, REAP is digitally signed using
   the AS holder's certificate.  It contains only an AS number that
   belongs to the signer.  By registering REAP, the AS operator is
   declaring that they have ROA coverage for all prefixes originated by
   their AS.  REAP extends normal RPKI-OV processing to check if any
   NotFound route has an origin AS with a valid REAP object.  If so, the
   NotFound result is changed to Invalid.

   The algorithm to be followed in a receiving BGP router for validating
   a route is as follows:

   1.  Perform the RPKI-OV process [RFC6811] as normal.

   2.  If the result of RPKI-OV is NotFound and the origin AS has a
       valid (per X.509) REAP object, then replace NotFound with
       Invalid.

Sriram & Montgomery       Expires 27 July 2024                  [Page 3]
Internet-Draft     AS Hijack Detection and Mitigation       January 2024

   The operator SHOULD apply policy to reject routes with Invalid
   outcome in order to perform AS hijack mitigation along with prefix
   hijack mitigation.

3.  IANA Considerations

   IANA is requested to register the following RPKI Signed Object:

        Name      OBJECT IDENTIFIER (OID) value    Reference
        -------   -----------------------------    ---------
        REAP      1.2.840.113549.1.9.16.1.TBD      [This document]

4.  Security Considerations

   The security considerations that apply to RPKI, ROAs, and RPKI-OV
   (see [RFC6480] [RFC6482] [RFC6811]) also apply to the procedure
   described in this document.

5.  References

5.1.  Normative References

   [RFC6480]  Lepinski, M. and S. Kent, "An Infrastructure to Support
              Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480,
              February 2012, <https://www.rfc-editor.org/info/rfc6480>.

   [RFC6482]  Lepinski, M., Kent, S., and D. Kong, "A Profile for Route
              Origin Authorizations (ROAs)", RFC 6482,
              DOI 10.17487/RFC6482, February 2012,
              <https://www.rfc-editor.org/info/rfc6482>.

   [RFC6811]  Mohapatra, P., Scudder, J., Ward, D., Bush, R., and R.
              Austein, "BGP Prefix Origin Validation", RFC 6811,
              DOI 10.17487/RFC6811, January 2013,
              <https://www.rfc-editor.org/info/rfc6811>.

5.2.  Informative References

   [Cisco-IOS]
              "Cisco IOS IP Routing: BGP Command Reference (enforce-
              first-as)", Cisco IOS information webpage ,  ,
              <https://www.cisco.com/c/en/us/td/docs/ios-
              xml/ios/iproute_bgp/command/irg-cr-book/bgp-
              a1.html#wp1026344430>.

Sriram & Montgomery       Expires 27 July 2024                  [Page 4]
Internet-Draft     AS Hijack Detection and Mitigation       January 2024

   [I-D.ietf-sidrops-aspa-verification]
              Azimov, A., Bogomazov, E., Bush, R., Patel, K., Snijders,
              J., and K. Sriram, "BGP AS_PATH Verification Based on
              Autonomous System Provider Authorization (ASPA) Objects",
              Work in Progress, Internet-Draft, draft-ietf-sidrops-aspa-
              verification-16, 29 August 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-
              aspa-verification-16>.

   [NIST-800-189]
              Sriram, K. and D. Montgomery, "Resilient Interdomain
              Traffic Exchange: BGP Security and DDoS Mitigation", NIST
              Special Publication NIST SP 800-189,  , December 2019,
              <https://doi.org/10.6028/NIST.SP.800-189>.

   [Quagga]   "LCOV - code coverage report (peer_lookup_with_open)",
              Quagga information webpage ,  , <https://nowhere.ws/dump/
              quagga-srcdest-coverage/bgpd/bgpd.c.func.html>.

   [RFC8205]  Lepinski, M., Ed. and K. Sriram, Ed., "BGPsec Protocol
              Specification", RFC 8205, DOI 10.17487/RFC8205, September
              2017, <https://www.rfc-editor.org/info/rfc8205>.

Acknowledgements

   The authors wish to thank Oliver Borchert and Kyehwan Lee for their
   review and comments.

Authors' Addresses

   Kotikalapudi Sriram
   USA National Institute of Standards and Technology
   100 Bureau Drive
   Gaithersburg, MD 20899
   United States of America
   Email: ksriram@nist.gov

   Doug Montgomery
   USA National Institute of Standards and Technology
   100 Bureau Drive
   Gaithersburg, MD 20899
   United States of America
   Email: dougm@nist.gov

Sriram & Montgomery       Expires 27 July 2024                  [Page 5]