1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
|
Network Working Group A. Barbir
Request for Comments: 4593 Nortel
Category: Informational S. Murphy
Sparta, Inc.
Y. Yang
Cisco Systems
October 2006
Generic Threats to Routing Protocols
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
Routing protocols are subject to attacks that can harm individual
users or network operations as a whole. This document provides a
description and a summary of generic threats that affect routing
protocols in general. This work describes threats, including threat
sources and capabilities, threat actions, and threat consequences, as
well as a breakdown of routing functions that might be attacked
separately.
Barbir, et al. Informational [Page 1]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
Table of Contents
1. Introduction ....................................................2
2. Routing Functions Overview ......................................3
3. Generic Routing Protocol Threat Model ...........................4
3.1. Threat Definitions .........................................4
3.1.1. Threat Sources ......................................4
3.1.1.1. Adversary Motivations ......................5
3.1.1.2. Adversary Capabilities .....................5
3.1.2. Threat Consequences .................................7
3.1.2.1. Threat Consequence Scope ...................9
3.1.2.2. Threat Consequence Zone ...................10
3.1.2.3. Threat Consequence Periods ................10
4. Generally Identifiable Routing Threat Actions ..................11
4.1. Deliberate Exposure .......................................11
4.2. Sniffing ..................................................11
4.3. Traffic Analysis ..........................................12
4.4. Spoofing ..................................................12
4.5. Falsification .............................................13
4.5.1. Falsifications by Originators ......................13
4.5.1.1. Overclaiming ..............................13
4.5.1.2. Misclaiming ...............................16
4.5.2. Falsifications by Forwarders .......................16
4.5.2.1. Misstatement ..............................16
4.6. Interference .........................................17
4.7. Overload .............................................18
5. Security Considerations ........................................18
6. References .....................................................18
6.1. Normative References ......................................18
Appendix A. Acknowledgments .......................................20
Appendix B. Acronyms ..............................................20
1. Introduction
Routing protocols are subject to threats and attacks that can harm
individual users or the network operations as a whole. The document
provides a summary of generic threats that affect routing protocols.
In particular, this work identifies generic threats to routing
protocols that include threat sources, threat actions, and threat
consequences. A breakdown of routing functions that might be
separately attacked is provided.
This work should be considered a precursor to developing a common set
of security requirements for routing protocols. While it is well
known that bad, incomplete, or poor implementations of routing
protocols may, in themselves, lead to routing problems or failures or
may increase the risk of a network's being attacked successfully,
these issues are not considered here. This document only considers
Barbir, et al. Informational [Page 2]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
attacks against robust, well-considered implementations of routing
protocols, such as those specified in Open Shortest Path First (OSPF)
[4], Intermediate System to Intermediate System (IS-IS) [5][8], RIP
[6] and BGP [7]. Attacks against implementation-specific weaknesses
and vulnerabilities are out of scope for this document.
The document is organized as follows: Section 2 provides a review of
routing functions. Section 3 defines threats. In Section 4, a
discussion on generally identifiable routing threat actions is
provided. Section 5 addresses security considerations.
2. Routing Functions Overview
This section provides an overview of common functions that are shared
among various routing protocols. In general, routing protocols share
the following functions:
o Transport Subsystem: The routing protocol transmits messages to
its neighbors using some underlying protocol. For example, OSPF
uses IP, while other protocols may run over TCP.
o Neighbor State Maintenance: Neighboring relationship formation is
the first step for topology determination. For this reason,
routing protocols may need to maintain state information. Each
routing protocol may use a different mechanism for determining its
neighbors in the routing topology. Some protocols have distinct
exchanges through which they establish neighboring relationships,
e.g., Hello exchanges in OSPF.
o Database Maintenance: Routing protocols exchange network topology
and reachability information. The routers collect this
information in routing databases with varying detail. The
maintenance of these databases is a significant portion of the
function of a routing protocol.
In a routing protocol, there are message exchanges that are intended
for the control of the state of the protocol. For example, neighbor
maintenance messages carry such information. On the other hand,
there are messages that are used to exchange information that is
intended to be used in the forwarding function, for example, messages
that are used to maintain the database. These messages affect the
data (information) part of the routing protocol.
Barbir, et al. Informational [Page 3]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
3. Generic Routing Protocol Threat Model
The model developed in this section can be used to identify threats
to any routing protocol.
Routing protocols are subject to threats at various levels. For
example, threats can affect the transport subsystem, where the
routing protocol can be subject to attacks on its underlying
protocol. An attacker may also attack messages that carry control
information in a routing protocol to break a neighboring (e.g.,
peering, adjacency) relationship. This type of attack can impact the
network routing behavior in the affected routers and likely the
surrounding neighborhood as well. For example, in BGP, if a router
receives a CEASE message, it will break its neighboring relationship
to its peer and potentially send new routing information to any
remaining peers.
An attacker may also attack messages that carry data information in
order to break a database exchange between two routers or to affect
the database maintenance functionality. For example, the information
in the database must be authentic and authorized. An attacker who is
able to introduce bogus data can have a strong effect on the behavior
of routing in the neighborhood. For example, if an OSPF router sends
LSAs with the wrong Advertising Router, the receivers will compute a
Shortest Path First (SPF) tree that is incorrect and might not
forward the traffic. If a BGP router advertises a Network Layer
Reachability Information (NLRI) that it is not authorized to
advertise, then receivers might forward that NLRI's traffic toward
that router and the traffic would not be deliverable. A Protocol
Independent Multicast (PIM) router might transmit a JOIN message to
receive multicast data it would otherwise not receive.
3.1. Threat Definitions
In [1], a threat is defined as a potential for violation of security,
which exists when there is a circumstance, capability, action, or
event that could breach security and cause harm. Threats can be
categorized as threat sources, threat actions, threat consequences,
threat consequence zones, and threat consequence periods.
3.1.1. Threat Sources
In the context of deliberate attack, a threat source is defined as a
motivated, capable adversary. By modeling the motivations (attack
goals) and capabilities of the adversaries who are threat sources,
one can better understand what classes of attacks these threats may
mount and thus what types of countermeasures will be required to deal
with these attacks.
Barbir, et al. Informational [Page 4]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
3.1.1.1. Adversary Motivations
We assume that the most common goal of an adversary deliberately
attacking routing is to cause inter-domain routing to malfunction. A
routing malfunction affects data transmission such that traffic
follows a path (sequence of autonomous systems in the case of BGP)
other than one that would have been computed by the routing protocol
if it were operating properly (i.e., if it were not under attack).
As a result of an attack, a route may terminate at a router other
than the one that legitimately represents the destination address of
the traffic, or it may traverse routers other than those that it
would otherwise have traversed. In either case, a routing
malfunction may allow an adversary to wiretap traffic passively, or
to engage in man-in-the-middle (MITM) active attacks, including
discarding traffic (denial of service).
A routing malfunction might be effected for financial gain related to
traffic volume (vs. the content of the routed traffic), e.g., to
affect settlements among ISPs.
Another possible goal for attacks against routing can be damage to
the network infrastructure itself, on a targeted or wide-scale basis.
Thus, for example, attacks that cause excessive transmission of
UPDATE or other management messages, and attendant router processing,
could be motivated by these goals.
Irrespective of the goals noted above, an adversary may or may not be
averse to detection and identification. This characteristic of an
adversary influences some of the ways in which attacks may be
accomplished.
3.1.1.2. Adversary Capabilities
Different adversaries possess varied capabilities.
o All adversaries are presumed to be capable of directing packets to
routers from remote locations and can assert a false IP source
address with each packet (IP address spoofing) in an effort to
cause the targeted router to accept and process the packet as
though it emanated from the indicated source. Spoofing attacks
may be employed to trick routers into acting on bogus messages to
effect misrouting, or these messages may be used to overwhelm the
management processor in a router, to effect DoS. Protection from
such adversaries must not rely on the claimed identity in routing
packets that the protocol receives.
Barbir, et al. Informational [Page 5]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
o Some adversaries can monitor links over which routing traffic is
carried and emit packets that mimic data contained in legitimate
routing traffic carried over these links; thus, they can actively
participate in message exchanges with the legitimate routers.
This increases the opportunities for an adversary to generate
bogus routing traffic that may be accepted by a router, to effect
misrouting or DoS. Retransmission of previously delivered
management traffic (replay attacks) exemplify this capability. As
a result, protection from such adversaries ought not to rely on
the secrecy of unencrypted data in packet headers or payloads.
o Some adversaries can effect MITM attacks against routing traffic,
e.g., as a result of active wiretapping on a link between two
routers. This represents the ultimate wiretapping capability for
an adversary. Protection from such adversaries must not rely on
the integrity of inter-router links to authenticate traffic,
unless cryptographic measures are employed to detect unauthorized
modification.
o Some adversaries can subvert routers, or the management
workstations used to control these routers. These Byzantine
failures represent the most serious form of attack capability in
that they result in emission of bogus traffic by legitimate
routers. As a result, protection from such adversaries must not
rely on the correct operation of neighbor routers. Protection
measures should adopt the principle of least privilege, to
minimize the impact of attacks of this sort. To counter Byzantine
attacks, routers ought not to trust management traffic (e.g.,
based on its source) but rather each router should independently
authenticate management traffic before acting upon it.
We will assume that any cryptographic countermeasures employed to
secure BGP will employ algorithms and modes that are resistant to
attack, even by sophisticated adversaries; thus, we will ignore
cryptanalytic attacks.
Deliberate attacks are mimicked by failures that are random and
unintentional. In particular, a Byzantine failure in a router may
occur because the router is faulty in hardware or software or is
misconfigured. As described in [3], "A node with a Byzantine failure
may corrupt messages, forge messages, delay messages, or send
conflicting messages to different nodes". Byzantine routers, whether
faulty, misconfigured, or subverted, have the context to provide
Barbir, et al. Informational [Page 6]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
believable and very damaging bogus routing information. Byzantine
routers may also claim another legitimate peer's identity. Given
their status as peers, they may even elude the authentication
protections, if those protections can only detect that a source is
one of the legitimate peers (e.g., the router uses the same
cryptographic key to authenticate all peers).
We therefore characterize threat sources into two groups:
Outsiders: These attackers may reside anywhere in the Internet, have
the ability to send IP traffic to the router, may be able to
observe the router's replies, and may even control the path for a
legitimate peer's traffic. These are not legitimate participants
in the routing protocol.
Byzantine: These attackers are faulty, misconfigured, or subverted
routers; i.e., legitimate participants in the routing protocol.
3.1.2. Threat Consequences
A threat consequence is a security violation that results from a
threat action [1]. To a routing protocol, a security violation is a
compromise of some aspect of the correct behavior of the routing
system. The compromise can damage the data traffic intended for a
particular network or host or can damage the operation of the routing
infrastructure of the network as a whole.
There are four types of general threat consequences: disclosure,
deception, disruption, and usurpation [1].
o Disclosure: Disclosure of routing information happens when an
attacker successfully accesses the information without being
authorized. Outsiders who can observe or monitor a link may cause
disclosure, if routing exchanges lack confidentiality. Byzantine
routers can cause disclosure, as long as they are successfully
involved in the routing exchanges. Although inappropriate
disclosure of routing information can pose a security threat or be
part of a later, larger, or higher layer attack, confidentiality
is not generally a design goal of routing protocols.
o Deception: This consequence happens when a legitimate router
receives a forged routing message and believes it to be authentic.
Both outsiders and Byzantine routers can cause this consequence if
the receiving router lacks the ability to check routing message
integrity or origin authentication.
Barbir, et al. Informational [Page 7]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
o Disruption: This consequence occurs when a legitimate router's
operation is being interrupted or prevented. Outsiders can cause
this by inserting, corrupting, replaying, delaying, or dropping
routing messages, or by breaking routing sessions between
legitimate routers. Byzantine routers can cause this consequence
by sending false routing messages, interfering with normal routing
exchanges, or flooding unnecessary routing protocol messages.
(DoS is a common threat action causing disruption.)
o Usurpation: This consequence happens when an attacker gains
control over the services/functions a legitimate router is
providing to others. Outsiders can cause this by delaying or
dropping routing exchanges, or fabricating or replaying routing
information. Byzantine routers can cause this consequence by
sending false routing information or interfering with routing
exchanges.
Note: An attacker does not have to control a router directly to
control its services. For example, in Figure 1, Network 1 is dual-
homed through Router A and Router B, and Router A is preferred.
However, Router B is compromised and advertises a better metric.
Consequently, devices on the Internet choose the path through Router
B to reach Network 1. In this way, Router B steals the data traffic,
and Router A loses its control of the services to Router B. This is
depicted in Figure 1.
+-------------+ +-------+
| Internet |---| Rtr A |
+------+------+ +---+---+
| |
| |
| |
| *-+-*
+-------+ / \
| Rtr B |----------* N 1 *
+-------+ \ /
*---*
Figure 1. Dual-homed network
Several threat consequences might be caused by a single threat
action. In Figure 1, there exist at least two consequences: routers
using Router B to reach Network 1 are deceived, and Router A is
usurped.
Barbir, et al. Informational [Page 8]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
3.1.2.1. Threat Consequence Scope
As mentioned above, an attack might damage the data traffic intended
for a particular network or host or damage the operation of the
routing infrastructure of the network as a whole. Damage that might
result from attacks against the network as a whole may include the
following:
o Network congestion. More data traffic is forwarded through some
portion of the network than would otherwise need to carry the
traffic.
o Blackhole. Large amounts of traffic are unnecessarily re-directed
to be forwarded through one router and that router drops
many/most/all packets.
o Looping. Data traffic is forwarded along a route that loops, so
that the data is never delivered (resulting in network
congestion).
o Partition. Some portion of the network believes that it is
partitioned from the rest of the network when it is not.
o Churn. The forwarding in the network changes (unnecessarily) at a
rapid pace, resulting in large variations in the data delivery
patterns (and adversely affecting congestion control techniques).
o Instability. The protocol becomes unstable so that convergence on
a global forwarding state is not achieved.
o Overcontrol. The routing protocol messages themselves become a
significant portion of the traffic the network carries.
o Clog. A router receives an excessive number of routing protocol
messages, causing it to exhaust some resource (e.g., memory, CPU,
battery).
The damage that might result from attacks against a particular host
or network address may include the following:
o Starvation. Data traffic destined for the network or host is
forwarded to a part of the network that cannot deliver it.
o Eavesdrop. Data traffic is forwarded through some router or
network that would otherwise not see the traffic, affording an
opportunity to see the data or at least the data delivery pattern.
Barbir, et al. Informational [Page 9]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
o Cut. Some portion of the network believes that it has no route to
the host or network when it is in fact connected.
o Delay. Data traffic destined for the network or host is forwarded
along a route that is in some way inferior to the route it would
otherwise take.
o Looping. Data traffic for the network or host is forwarded along
a route that loops, so that the data is never delivered.
It is important to consider all consequences, because some security
solutions can protect against one consequence but not against others.
It might be possible to design a security solution that protects
against eavesdropping on one destination's traffic without protecting
against churn in the network. Similarly, it is possible to design a
security solution that prevents a starvation attack against one host,
but not a clogging attack against a router. The security
requirements must be clear as to which consequences are being avoided
and which consequences must be addressed by other means (e.g., by
administrative means outside the protocol).
3.1.2.2. Threat Consequence Zone
A threat consequence zone covers the area within which the network
operations have been affected by threat actions. Possible threat
consequence zones can be classified as a single link or router,
multiple routers (within a single routing domain), a single routing
domain, multiple routing domains, or the global Internet. The threat
consequence zone varies based on the threat action and the position
of the target of the attack. Similar threat actions that happen at
different locations may result in totally different threat
consequence zones. For example, when an outsider breaks the routing
session between a distribution router and a stub router, only
reachability to and from the network devices attached to the stub
router will be impaired. In other words, the threat consequence zone
is a single router. In another case, if the outsider is located
between a customer edge router and its corresponding provider edge
router, such an action might cause the whole customer site to lose
its connection. In this case, the threat consequence zone might be a
single routing domain.
3.1.2.3. Threat Consequence Periods
A threat consequence period is defined as the portion of time during
which the network operations are impacted by the threat consequences.
The threat consequence period is influenced by, but not totally
dependent on, the duration of the threat action. In some cases, the
network operations will get back to normal as soon as the threat
Barbir, et al. Informational [Page 10]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
action has been stopped. In other cases, however, threat
consequences may persist longer than does the threat action. For
example, in the original Advanced Research Projects Agency Network
(ARPANET) link-state algorithm, some errors in a router introduced
three instances of a Link-State Announcement (LSA). All of them
flooded throughout the network continuously, until the entire network
was power cycled [2].
4. Generally Identifiable Routing Threat Actions
This section addresses generally identifiable and recognized threat
actions against routing protocols. The threat actions are not
necessarily specific to individual protocols but may be present in
one or more of the common routing protocols in use today.
4.1. Deliberate Exposure
Deliberate exposure occurs when an attacker takes control of a router
and intentionally releases routing information to other entities
(e.g., the attacker, a web page, mail posting, other routers) that
otherwise should not receive the exposed information.
The consequence of deliberate exposure is the disclosure of routing
information.
The threat consequence zone of deliberate exposure depends on the
routing information that the attackers have exposed. The more
knowledge they have exposed, the bigger the threat consequence zone.
The threat consequence period of deliberate exposure might be longer
than the duration of the action itself. The routing information
exposed will not be outdated until there is a topology change of the
exposed network.
4.2. Sniffing
Sniffing is an action whereby attackers monitor and/or record the
routing exchanges between authorized routers to sniff for routing
information. Attackers can also sniff data traffic information
(however, this is out of scope of the current work).
The consequence of sniffing is disclosure of routing information.
The threat consequence zone of sniffing depends on the attacker's
location, the routing protocol type, and the routing information that
has been recorded. For example, if the outsider is sniffing a link
that is in an OSPF totally stubby area, the threat consequence zone
should be limited to the whole area. An attacker that is sniffing a
Barbir, et al. Informational [Page 11]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
link in an External Border Gateway Protocol (EBGP) session can gain
knowledge of multiple routing domains.
The threat consequence period might be longer than the duration of
the action. If an attacker stops sniffing a link, their acquired
knowledge will not be out-dated until there is a topology change of
the affected network.
4.3. Traffic Analysis
Traffic analysis is an action whereby attackers gain routing
information by analyzing the characteristics of the data traffic on a
subverted link. Traffic analysis threats can affect any data that is
sent over a communication link. This threat is not peculiar to
routing protocols and is included here for completeness.
The consequence of data traffic analysis is the disclosure of routing
information. For example, the source and destination IP addresses of
the data traffic and the type, magnitude, and volume of traffic can
be disclosed.
The threat consequence zone of the traffic analysis depends on the
attacker's location and what data traffic has passed through. An
attacker at the network core should be able to gather more
information than its counterpart at the edge and would therefore have
to be able to analyze traffic patterns in a wider area.
The threat consequence period might be longer than the duration of
the traffic analysis. After the attacker stops traffic analysis, its
knowledge will not be outdated until there is a topology change of
the disclosed network.
4.4. Spoofing
Spoofing occurs when an illegitimate device assumes the identity of a
legitimate one. Spoofing in and of itself is often not the true
attack. Spoofing is special in that it can be used to carry out
other threat actions causing other threat consequences. An attacker
can use spoofing as a means for launching other types of attacks.
For example, if an attacker succeeds in spoofing the identity of a
router, the attacker can send out unrealistic routing information
that might cause the disruption of network services.
There are a few cases where spoofing can be an attack in and of
itself. For example, messages from an attacker that spoof the
identity of a legitimate router may cause a neighbor relationship to
form and deny the formation of the relationship with the legitimate
router.
Barbir, et al. Informational [Page 12]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
The consequences of spoofing are as follows:
o The disclosure of routing information. The spoofing router will
be able to gain access to the routing information.
o The deception of peer relationship. The authorized routers, which
exchange routing messages with the spoofing router, do not realize
that they are neighboring with a router that is faking another
router's identity.
The threat consequence zone is as follows:
o The consequence zone of the fake peer relationship will be limited
to those routers trusting the attacker's claimed identity.
o The consequence zone of the disclosed routing information depends
on the attacker's location, the routing protocol type, and the
routing information that has been exchanged between the attacker
and its deceived neighbors.
Note: This section focuses on addressing spoofing as a threat on its
own. However, spoofing creates conditions for other threats actions.
The other threat actions are considered falsifications and are
treated in the next section.
4.5. Falsification
Falsification is an action whereby an attacker sends false routing
information. To falsify the routing information, an attacker has to
be either the originator or a forwarder of the routing information.
It cannot be a receiver-only. False routing information describes
the network in an unrealistic fashion, whether or not intended by the
authoritative network administrator.
4.5.1. Falsifications by Originators
An originator of routing information can launch the falsifications
that are described in the next sections.
4.5.1.1. Overclaiming
Overclaiming occurs when a Byzantine router or outsider advertises
its control of some network resources, while in reality it does not,
or if the advertisement is not authorized. This is given in Figures
2 and 3.
Barbir, et al. Informational [Page 13]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
+-------------+ +-------+ +-------+
| Internet |---| Rtr B |---| Rtr A |
+------+------+ +-------+ +---+---+
| .
| |
| .
| *-+-*
+-------+ / \
| Rtr C |------------------* N 1 *
+-------+ \ /
*---*
Figure 2. Overclaiming-1
+-------------+ +-------+ +-------+
| Internet |---| Rtr B |---| Rtr A |
+------+------+ +-------+ +-------+
|
|
|
| *---*
+-------+ / \
| Rtr C |------------------* N 1 *
+-------+ \ /
*---*
Figure 3. Overclaiming-2
The above figures provide examples of overclaiming. Router A, the
attacker, is connected to the Internet through Router B. Router C is
authorized to advertise its link to Network 1. In Figure 2, Router A
controls a link to Network 1 but is not authorized to advertise it.
In Figure 3, Router A does not control such a link. But in either
case, Router A advertises the link to the Internet, through Router B.
Both Byzantine routers and outsiders can overclaim network resources.
The consequences of overclaiming include the following:
o Usurpation of the overclaimed network resources. In Figures 2 and
3, usurpation of Network 1 can occur when Router B (or other
routers on the Internet not shown in the figures) believes that
Router A provides the best path to reach the Network 1. As a
result, routers forward data traffic destined to Network 1 to
Router A. The best result is that the data traffic uses an
unauthorized path, as in Figure 2. The worst case is that the
Barbir, et al. Informational [Page 14]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
data never reaches the destination Network 1, as in Figure 3. The
ultimate consequence is that Router A gains control over Network
1's services, by controlling the data traffic.
o Usurpation of the legitimate advertising routers. In Figures 2
and 3, Router C is the legitimate advertiser of Network 1. By
overclaiming, Router A also controls (partially or totally) the
services/functions provided by the Router C. (This is NOT a
disruption, as Router C is operating in a way intended by the
authoritative network administrator.)
o Deception of other routers. In Figures 2 and 3, Router B, or
other routers on the Internet, might be deceived into believing
that the path through Router A is the best.
o Disruption of data planes on some routers. This might happen to
routers that are on the path that is used by other routers to
reach the overclaimed network resources through the attacker. In
Figures 2 and 3, when other routers on the Internet are deceived,
they will forward the data traffic to Router B, which might be
overloaded.
The threat consequence zone varies based on the consequence:
o Where usurpation is concerned, the consequence zone covers the
network resources that are overclaimed by the attacker (Network 1
in Figures 2 and 3), and the routers that are authorized to
advertise the network resources but lose the competition against
the attacker (Router C in Figures 2 and 3).
o Where deception is concerned, the consequence zone covers the
routers that do believe the attacker's advertisement and use the
attacker to reach the claimed networks (Router B and other
deceived routers on the Internet in Figures 2 and 3).
o Where disruption is concerned, the consequence zone includes the
routers that are on the path of misdirected data traffic (Router B
in Figures 2 and 3 and other routers in the Internet on the path
of the misdirected traffic).
The threat consequence will not cease when the attacker stops
overclaiming and will totally disappear only when the routing tables
are converged. As a result, the consequence period is longer than
the duration of the overclaiming.
Barbir, et al. Informational [Page 15]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
4.5.1.2. Misclaiming
A misclaiming threat is defined as an action whereby an attacker is
advertising some network resources that it is authorized to control,
but in a way that is not intended by the authoritative network
administrator. For example, it may be advertising inappropriate link
costs in an OSPF LSA. An attacker can eulogize or disparage when
advertising these network resources. Byzantine routers can misclaim
network resources.
The threat consequences of misclaiming are similar to the
consequences of overclaiming.
The consequence zone and period are also similar to those of
overclaiming.
4.5.2. Falsifications by Forwarders
In each routing protocol, routers that forward routing protocol
messages are expected to leave some fields unmodified and to modify
other fields in certain circumscribed ways. The fields to be
modified, the possible new contents of those fields and their
computation from the original fields, the fields that must remain
unmodified, etc. are all detailed in the protocol specification.
They may vary depending on the function of the router or its network
environment. For example, in RIP, the forwarder must modify the
routing information by increasing the hop count by 1. On the other
hand, a forwarder must not modify any field of the type 1 LSA in OSPF
except the age field. In general, forwarders in distance vector
routing protocols are authorized to and must modify the routing
information, while most forwarders in link state routing protocols
are not authorized to and must not modify most routing information.
As a forwarder authorized to modify routing messages, an attacker
might also falsify by not forwarding routing information to other
authorized routers as required.
4.5.2.1. Misstatement
This is defined as an action whereby the attacker modifies route
attributes in an incorrect manner. For example, in RIP, the attacker
might increase the path cost by two hops instead of one. In BGP, the
attacker might delete some AS numbers from the AS PATH.
Barbir, et al. Informational [Page 16]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
Where forwarding routing information should not be modified, an
attacker can launch the following falsifications:
o Deletion. Attacker deletes valid data in the routing message.
o Insertion. Attacker inserts false data in the routing message.
o Substitution. Attacker replaces valid data in the routing message
with false data.
A forwarder can also falsify data by replaying out-dated data in the
routing message as current data.
All types of attackers, outsiders and Byzantine routers, can falsify
the routing information when they forward the routing messages.
The threat consequences of these falsifications by forwarders are
similar to those caused by originators: usurpation of some network
resources and related routers; deception of routers using false
paths; and disruption of data planes of routers on the false paths.
The threat consequence zone and period are also similar.
4.6. Interference
Interference is a threat action whereby an attacker inhibits the
exchanges by legitimate routers. The attacker can do this by adding
noise, by not forwarding packets, by replaying out-dated packets, by
inserting or corrupting messages, by delaying responses, by denial of
receipts, or by breaking synchronization.
Byzantine routers can slow down their routing exchanges or induce
flapping in the routing sessions of legitimate neighboring routers.
The consequence of interference is the disruption of routing
operations.
The consequence zone of interference depends on the severity of the
interference. If the interference results in consequences at the
neighbor maintenance level, then there may be changes in the
database, resulting in network-wide consequences.
The threat consequences might disappear as soon as the interference
is stopped or might not totally disappear until the networks have
converged. Therefore, the consequence period is equal to or longer
than the duration of the interference.
Barbir, et al. Informational [Page 17]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
4.7. Overload
Overload is defined as a threat action whereby attackers place excess
burden on legitimate routers. For example, it is possible for an
attacker to trigger a router to create an excessive amount of state
that other routers within the network are not able to handle. In a
similar fashion, it is possible for an attacker to overload database
routing exchanges and thus to influence the routing operations.
5. Security Considerations
This entire document is security related. Specifically, the document
addresses security of routing protocols as associated with threats to
those protocols. In a larger context, this work builds upon the
recognition of the IETF community that signaling and
control/management planes of networked devices need strengthening.
Routing protocols can be considered part of that signaling and
control plane. However, to date, routing protocols have largely
remained unprotected and open to malicious attacks. This document
discusses inter- and intra-domain routing protocol threats that are
currently known and lays the foundation for other documents that will
discuss security requirements for routing protocols. This document
is protocol independent.
6. References
6.1. Normative References
[1] Shirey, R., "Internet Security Glossary", RFC 2828, May 2000.
[2] Rosen, E., "Vulnerabilities of network control protocols: An
example", RFC 789, July 1981.
[3] Perlman, R., "Network Layer Protocols with Byzantine
Robustness", PhD thesis, MIT LCS TR-429, October 1988.
[4] Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998.
[5] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and dual
environments", RFC 1195, December 1990.
[6] Malkin, G., "RIP Version 2", STD 56, RFC 2453, November 1998.
[7] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway Protocol 4
(BGP-4)", RFC 4271, January 2006.
Barbir, et al. Informational [Page 18]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
[8] ISO 10589, "Intermediate System to Intermediate System intra-
domain routeing information exchange protocol for use in
conjunction with the protocol for providing the connectionless-
mode network service (ISO 8473)", ISO/IEC 10589:2002.
Barbir, et al. Informational [Page 19]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
Appendix A. Acknowledgments
This document would not have been possible save for the excellent
efforts and teamwork characteristics of those listed here.
o Dennis Beard, Nortel
o Ayman Musharbash, Nortel
o Jean-Jacques Puig, int-evry, France
o Paul Knight, Nortel
o Elwyn Davies, Nortel
o Ameya Dilip Pandit, Graduate student, University of Missouri
o Senthilkumar Ayyasamy, Graduate student, University of Missouri
o Stephen Kent, BBN
o Tim Gage, Cisco Systems
o James Ng, Cisco Systems
o Alvaro Retana, Cisco Systems
Appendix B. Acronyms
AS - Autonomous system. Set of routers under a single technical
administration. Each AS normally uses a single interior gateway
protocol (IGP) and metrics to propagate routing information within
the set of routers. Also called routing domain.
AS-Path - In BGP, the route to a destination. The path consists of
the AS numbers of all routers a packet must go through to reach a
destination.
BGP - Border Gateway Protocol. Exterior gateway protocol used to
exchange routing information among routers in different autonomous
systems.
LSA - Link-State Announcement
NLRI - Network Layer Reachability Information. Information that is
carried in BGP packets and is used by MBGP.
OSPF - Open Shortest Path First. A link-state IGP that makes routing
decisions based on the shortest-path-first (SPF) algorithm (also
referred to as the Dijkstra algorithm).
Barbir, et al. Informational [Page 20]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
Authors' Addresses
Abbie Barbir
Nortel
3500 Carling Avenue
Nepean, Ontario K2H 8E9
Canada
EMail: abbieb@nortel.com
Sandy Murphy
Sparta, Inc.
7110 Samuel Morse Drive
Columbia, MD
USA
Phone: 443-430-8000
EMail: sandy@sparta.com
Yi Yang
Cisco Systems
7025 Kit Creek Road
RTP, NC 27709
USA
EMail: yiya@cisco.com
Barbir, et al. Informational [Page 21]
^L
RFC 4593 Generic Threats to Routing Protocols October 2006
Full Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Barbir, et al. Informational [Page 22]
^L
|