12. Security Considerations
- Security Considerations
The introduction of routing protocols that support classless prefixes
and a move to a forwarding model that mandates that more-specific
(longest-match) routes be preferred when they overlap with routes to
less-specific prefixes introduces at least two security concerns:
-
Traffic can be hijacked by advertising a prefix for a given
destination that is more specific than the aggregate that is
normally advertised for that destination. For example, assume
that a popular end system with the address 192.168.17.100 is
connected to a service provider that advertises 192.168.16.0/20.
A malicious network operator interested in intercepting traffic
for this site might advertise, or at least attempt to advertise,
192.168.17.0/24 into the global routing system. Because this
prefix is more specific than the "normal" prefix, traffic will be
diverted away from the legitimate end system and to the network
owned by the malicious operator. Prior to the advent of CIDR, it
was possible to induce traffic from some parts of the network to
follow a false advertisement that exactly matched a particular
network number; CIDR makes this problem somewhat worse, since
longest-match routing generally causes all traffic to prefer
more-specific routes over less-specific routes. The remedy for
the CIDR-based attack, though, is the same as for a pre-CIDR-
based attack: establishment of trust relationships between
providers, coupled with and strong route policy filters at
provider borders. Unfortunately, the implementation of such
filters is difficult in the highly de-centralized Internet. As a
workaround, many providers do implement generic filters that set
upper bounds, derived from RIR guidelines for the sizes of blocks
that they allocate, on the lengths of prefixes that are accepted
from other providers. Note that "spammers" have been observed
using this sort of attack to hijack address space temporarily in
order to hide the origin of the traffic ("spam" email messages)
that they generate.
-
Denial-of-service attacks can be launched against many parts of
the Internet infrastructure by advertising a large number of
routes into the system. Such an attack is intended to cause
router failures by overflowing routing and forwarding tables. A
good example of a non-malicious incident that caused this sort of
failure was the infamous "AS 7007" event [7007], where a router
mis-configuration by an operator caused a huge number of invalid
routes to be propagated through the global routing system.
Again, this sort of attack is not really new with CIDR; using
legacy Class A/B/C routes, it was possible to advertise a maximum
of 16843008 unique network numbers into the global routing
system, a number that is sufficient to cause problems for even
the most modern routing equipment made in 2005. What is
different is that the moderate complexity of correctly
configuring routers in the presence of CIDR tends to make
accidental "attacks" of this sort more likely. Measures to
prevent this sort of attack are much the same as those described
above for the hijacking, with the addition that best common
practice is also to configure a reasonable maximum number of
prefixes that a border router will accept from its neighbors.
Note that this is not intended to be an exhaustive analysis of the
sorts of attacks that CIDR makes easier; a more comprehensive
analysis of security vulnerabilities in the global routing system is
beyond the scope of this document.