North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: MD5 in BGP4

  • From: Steven M. Bellovin
  • Date: Wed Jul 12 14:09:44 2000

In message <[email protected]>, Danny McPherson writes:
>
>
>The primary goal of the BGP MD5 signature option is 
>to protect the TCP substrate from introduction of 
>spoofed TCP segments such a TCP RSTs.  These segments
>could easily be injected from anywhere on the Internet.
>
>Lots of service providers employ the TCP MD5 signature 
>option stuff to protect both internal and external BGP 
>sessions in their networks.  It really doesn't matter 
>if the neighbors are directly connected or not, BGP 
>rides on IP and is therefore vulnerable to "packet bombs" 
>and the like from anywhere, regardless of whether the 
>peer is internal, external or external multi-hop.
>
>Expoliting such a vulernability is trivial, actually, in 
>any of these configurations.  All one needs to know is a 
>tiny amount of information associated with the BGP session.  
>Though MD5 clearly isn't perfect, it does make is 
>considerably more difficult.  
>
>Using MD5 stuff with IP-based protocols such as BGP & OSPF
>is strongly advised.  Obviously, IS-IS and similar protocols
>are less vulnerable.

Right.  To learn how to hijack a TCP session, see 

@inproceedings{hijack,
        title = {A Simple Active Attack Against {TCP}},
        author = {Laurent Joncheray},
        year = 1995,
        booktitle = {Proceedings of the Fifth Usenix \Unix\ Security Symposium},
        address = {Salt Lake City, UT}
}

IPsec protection is even stronger than the MD5 signature option 
described in RFC 2385, but 2385 if *far* better than nothing.  (Btw -- 
since 2385 requires a TCP option, it's implemented in the stack, and 
not at application level.)

		--Steve Bellovin