You are on page 1of 50

MPLS Virtual Private Network (VPN)

Security

An MFA Forum Sponsored Tutorial

Monique Morrow
MFA Forum Ambassador
CTO Consulting Engineer
Cisco Systems

Slide 1 Copyright © 2006 MFA Forum

MPLS VPN Security -


Agenda

• Analysis of the Architecture


• Secure MPLS VPN Design
ƒ General Best Practices
ƒ Internet Access
ƒ Inter-AS and Carriers’ Carrier
ƒ Layer 2 VPN Security
• Attacking an MPLS Network
• IPsec and MPLS
• Ongoing standardization work
• Summary
Slide 2 Copyright © 2006 MFA Forum

1
MPLS VPN Security Tutorial
Contributors

Developed by:
• Michael Behringer – Cisco Systems
• Monique Morrow – Cisco Systems

Contributors:
• Victoria Fineberg – DISA
• Ross Callon – Juniper
• David Christophe – Lucent

Slide 3 Copyright © 2006 MFA Forum

About this Presentation

• Advanced level
ƒ Expected: Basic understanding of MPLS protocols
and how MPLS VPNs operate.
• Target Audience:
ƒ Service providers
ƒ Network operators and designers
ƒ Network security engineers
ƒ Technical focus

Slide 4 Copyright © 2006 MFA Forum

2
Why Is MPLS VPN Security
Important?
• Customer buys “Internet Service”:
ƒ Packets from SP are not trusted
ƒ Perception: Need for firewalls, etc.
• Customer buys a “VPN Service”:
ƒ Packets from SP are trusted
ƒ Perception: Few or no further security measures
required

SP Must Ensure Secure


MPLS Operations

Slide 5 Copyright © 2006 MFA Forum

Objectives

• Understand how secure MPLS VPNs* are


ƒ And what IPsec offers in addition
• Best practices on how to secure
ƒ General MPLS VPN
ƒ Inter-provider VPN
ƒ Specific cases (Internet connectivity, etc)
• Examples are for IPv4 VPNs
ƒ Also applicable to IPv6 VPN

* Here: MPLS VPN = RFC 4364 (old “2547bis”)


Slide 6 Copyright © 2006 MFA Forum

3
Analysis of the MPLS
VPN Architecture
(RFC 4364)

Slide 7 Copyright © 2006 MFA Forum

MPLS Security Framework

Trusted Zone

External MPLS External


Network Network Network

External External
Network Network
Interface Interface

Control MPLS core signaling MPLS edge signaling


Plane LDP, RSVP, and BGP BGP, LDP, RIP, OSPF

Forwarding MPLS packet IP or MPLS packet


Plane forwarding forwarding

Slide 8 Copyright © 2006 MFA Forum

4
MPLS Security – Service
Provider View

Trusted Zone

Customer MPLS Peer SP


Network Network Network

External External
Service Network Connect
Interface Interface

MPLS Edge Security MPLS Core Security MPLS Inter-AS Security


• Security for VPN • Security for end-to-end • Security for network
service interface (PE-PE) MPLS traffic interconnect interface
• Focus on control integrity • Focus on data/control
plane access and • Focus on MPLS packet plane access on
resources on PE router forwarding ASBR

Slide 9 Copyright © 2006 MFA Forum

MPLS Security – Enterprise View

Trusted Zone

Extranet MPLS SP MPLS


Customer
Network Network Network

Extranet External
Service WAN
Interface Interface

Extranet Edge Security MPLS Core Security WAN Edge Security


• Security of extranet • Security for end-to-end • Security of WAN
VPN interface (PE-PE) MPLS traffic interface with SP
• Focus on data/control integrity • Focus on data/control
plane access across • Focus on MPLS traffic plane access across
interface with partner segmentation PE-CE link with SP

Slide 10 Copyright © 2006 MFA Forum

5
Comparison with ATM/FR

ATM/FR MPLS
Address Space
Yes Yes
Separation
Routing Separation Yes Yes
Resistance to
Yes Yes
Attacks
Resistance to
Yes Yes
Label Spoofing
Direct CE-CE
Authentication Yes With IPsec
(Layer 3)

Slide 11 Copyright © 2006 MFA Forum

Basic MPLS VPN Security:


Today’s Arguments

• Can be mis-configured
(operation) True, but same
• Routers can have bugs on ATM/FR
(implementation)
• PEs can be accessed
PEs can be secured,
from Internet, thus as Internet routers
intrinsically insecure
• Floods over Internet
Engineering/QoS
can impact VPN traffic

Slide 12 Copyright © 2006 MFA Forum

6
Security Relies on Three Pillars

Security

Implementation
Architecture/
Algorithm

Operation
Break One, and All Security Is Gone!
Slide 13 Copyright © 2006 MFA Forum

Address Planes: True


Separation!

CE
VPN1 Address Space CE
0.0.0.0—255.255.255.255

CE
VPN2 Address Space CE
0.0.0.0—255.255.255.255 mbehring

PE-CE
Several Data Interfaces
Planes: Belong to VPN;
VPNv4 Addr. Only Attack
PE P PE
Point!!
Control Plane:
IPv4 Addr.
Core Address Space
0.0.0.0—255.255.255.255

Slide 14 Copyright © 2006 MFA Forum

7
Secure MPLS VPN Design ―
General Security Best Practices

Slide 15 Copyright © 2006 MFA Forum

Secure MPLS/VPN Core Design

• Don’t let packets into the core


(for MPLS: PE routers) Still “Open”:
Routing
–No way to attack core, except Protocol
through routing, thus:
• Secure the routing protocol Only Attack
–Neighbor authentication, Vector:
maximum routes, dampening,… Transit Traffic
• Design for transit traffic
–QoS to give VPN priority
Now Only
over Internet
Insider Attacks
–Choose correct router Possible
for bandwidth
–Separate PEs where necessary
• Operate Securely Avoid Insider
Attacks
Slide 16 Copyright © 2006 MFA Forum

8
PE-CE Routing Security

In order of security preference


(for both CE and PE):
1. Static: If no dynamic routing required; also
static default route
(no security implications)
2. BGP: For redundancy and dynamic updates
(many security features)
3. IGP: If BGP not supported
(limited security features)

Slide 17 Copyright © 2006 MFA Forum

Securing the MPLS Core

MPLS Core
CE
BGP Route Reflector Internet
PE
P
VPN PE
P
CE VPN
P

CE VPN BGP Peering With


PE MD5 Authentic.
PE PE
VPN VPN

LDP With MD5


CE CE CE
ACL, and
Secure Routing
Slide 18 Copyright © 2006 MFA Forum

9
Securing the Core:
Infrastructure ACLs

Easy with MPLS!


CE PE
VPN
In MPLS:
VRF Belongs to
Customer VPN!
• On PE:
“deny ip any <VRF address space on the PE>”
ƒ Exception: routing protocol from host to host
• Idea: no traffic to PE/P you can’t attack
• Prevents intrusions 100%
• DoS: very hard, but traffic over router
theoretically enables DoS
Slide 19 Copyright © 2006 MFA Forum

Securing the Core:


Infrastructure ACLs

CE PE PE CE
.2 1.1.1.0/30 .1 .1 1.1.1.8/30 .2
VPN VPN

CE PE PE CE
.2 1.1.1.4/30 .1 .1 1.1.1.12/30 .2
VPN VPN

• Example: This Is VPN Address


ƒ deny ip any 1.1.1.0 0.0.0.255 Space, Not Core!
ƒ permit ip any any
• Caution: This also blocks packets to the CE’s!
ƒ Alternatives: List all PE i/f in ACL, or use secondary
i/f on CE
Slide 20 Copyright © 2006 MFA Forum

10
Neighbor Authentication

• Router “knows” his neighbors


ƒ Verification through MD5 based authentication
• Verifies updates it receives from neighbor
• Supported: BGP, ISIS, OSPF, RIPv2, LDP
• Key chains for key rollover
ƒ Use them where available
• Config easy

Slide 21 Copyright © 2006 MFA Forum

Maximum Prefix Control

• Injection of too many routes:


ƒ Potential memory overflow
ƒ Potential DoS attack
• Two security mechanisms:
Specify maximum number of routes
ƒ For a VRF
ƒ For a BGP peer

Slide 22 Copyright © 2006 MFA Forum

11
VRF Maximum Prefix Number

• Injection of too many routes:


ƒ Potential memory overflow Æ Potential DoS attack
• For a VRF: Specify the maximum number of
routes allowed

In This VRF…
…Accept Max 45 Prefixes…

ip vrf red
maximum routes 45 80

…and Log a Warning at


80% (of 45)…

Slide 23 Copyright © 2006 MFA Forum

Control of Routes from a BGP


Peer
• Injection of too many routes:
ƒ Potential memory overflow Æ Potential DoS attack
• Control with “maximum prefix” command
ƒ (under the BGP neighbor definition)

From This …Accept Max 45 Prefixes,


Neighbor… Then Reset Session…

router bgp 13
neighbor 140.0.250.2 maximum-prefix 45 80 restart 2

… Log a Warning at 80% …and Restart the BGP


(of 45)… Session After 2 min.

Slide 24 Copyright © 2006 MFA Forum

12
Control of Routes from a BGP Peer:
Logging

6d22h: %BGP-4-MAXPFX: No. of prefix received from


140.0.250.2 (afi 2) reaches 37, max 45
6d22h: %BGP-3-MAXPFXEXCEED: No. of prefix received
from 140.0.250.2 (afi 2): 46 exceed limit 456d22h: %BGP-
5-ADJCHANGE: neighbor 140.0.250.2 vpn vrf
VPN_20499 Down BGP Notification sent
6d22h: %BGP-3-NOTIFICATION: sent to neighbor
140.0.250.2 3/1 (update malformed) 0 bytes FFFF FFFF
FF

Slide 25 Copyright © 2006 MFA Forum

Best Practice Security Overview

• Secure devices (PE, P): They are trusted!


ƒ See next slide for risks…
• PEs: Secure with ACLs on all interfaces
• Static PE-CE routing where possible
• If dynamic routing: Use authentication (MD5)
• Maximum number of routes per peer (only BGP)
• Separation of CE-PE links where possible
(Internet/VPN)
• LDP authentication (MD5)
• VRF: Define maximum number of routes
• Note: Overall security depends on weakest link!

Slide 26 Copyright © 2006 MFA Forum

13
Key: PE Security

• What happens if a single PE in the core gets


compromised?
ƒ Intruder has access to all VPNs; GRE tunnel to “his”
CE in the Internet, bring that CE into any VPN
ƒ That VPN might not even notice…
ƒ Worst Case!!!!
• Therefore: PE Security is Paramount!!!!!!!
• Therefore: No PE on customer premises!!!!!!!
ƒ (Think about console access, password recovery…)

Slide 27 Copyright © 2006 MFA Forum

Solution: Operational Security

• Security depends on SP!


ƒ Employee can make mistake, or malicious
misconfiguration
• Potential Security hole:
ƒ If PE compromised, VPNs might be insecure
• Cannot *prevent* all misconfigs
ƒ Need to operationally control this

Slide 28 Copyright © 2006 MFA Forum

14
Operational Security

• Logging config changes


ƒ Dual Control: Network operators must have no
access to logging facility
• AAA for access
• Use command authorization where possible
ƒ Keep logs in a secure place
ƒ (Malicious employee might change logs too)
• Tight control
• Disable password recovery where possible
Secure Operations Is Hard!!!
Slide 29 Copyright © 2006 MFA Forum

MPLS VPNs are Quite Secure

• Perfect Separation of VPNs


ƒ No intrusions possible
• Perfect Separation of the Core from VPNs
ƒ Again, no intrusions possible

But there is one remaining issue…

Slide 30 Copyright © 2006 MFA Forum

15
Issue: DoS Through a Shared PE
Might Affect VPN Customer

PE Has Shared CPU/Memory/Bandwidth:


Traffic COULD affect VPN customer
(however, risk probably acceptable)
MPLS core
PE P
Customer VPN
P
VPN Customer

VRF CE1 P

ck
Internet Customer global Atta
S P
table
Do
P

Slide 31 Copyright © 2006 MFA Forum

Today’s Best Practice:

PE Routers Should Contain Only VRFs of


the Same Security Level; Example:
To Internet
PE1
CE1
• Level 0: Internet
Customer

VRF Internet • Level 1: VPN


Network

CE2 PE2 customers


VRF VPN
• (Level 2: Mission
To VPN
critical infrastructure)

Note: This is negotiable: Shared Internet/VPN PE may be acceptable if price and


conditions are right
Slide 32 Copyright © 2006 MFA Forum

16
Separate VPN and Internet
Access

Customer LAN MPLS core

To Internet P
PE1
Firewall/NAT CE1

VRF Internet
IDS PE2
CE2

VRF VPN

To VPN

• Separation: +++
• DoS resistance: +++
• Cost: $$$ (two lines and two PEs: expensive!)
Slide 33 Copyright © 2006 MFA Forum

Shared Access Line, CE with


VRF Lite

Customer LAN MPLS core

P
PE1
Firewall/NAT Internet CE

IDS VRF Internet


VRF Internet VRF VPN

VPN CE Logical Links


(e.g. FR)
• Separation: +++
• DoS resistance: + (DoS might affect VPN on PE,
attachment circuit, CE)
• Cost: $
Slide 34 Copyright © 2006 MFA Forum

17
Hub-and-Spoke VPN with
Internet Access
Hub Site MPLS core Internet

To Internet →
Firewall Internet
NAT CE PE1

VRF Internet
IDS PE2
VPN CE
mbehring

VRF VPN
To VPN

PEs VPN VPN VPN

CEs

Spoke 1 Spoke 2 Spoke 3

Slide 35 Copyright © 2006 MFA Forum

Extranet and Firewalling

Extranet /
Internet

VPN Customer VRF A VRF B Customer VPN


A PE PE B

VRF A VRF B

• Extranet means: Connecting VPNs


ƒ Route Targets define where traffic is going
• Usually firewalling required to restrict
connectivity and maintain separation
Slide 36 Copyright © 2006 MFA Forum

18
Alternative Topologies

• Full VPN mesh, one Internet access


• Internet access at several sites
ƒ Several firewalls needed
ƒ More complex
• Internet access from all sites
ƒ Complex, one firewall per site

Slide 37 Copyright © 2006 MFA Forum

Secure MPLS VPN Design ―


Internet Access

Slide 38 Copyright © 2006 MFA Forum

19
Internet Provisioning on an
MPLS Core
Two basic possibilities:
1. Internet in global table, either:
ƒ 1a) Internet-free core (using LSPs between PEs)
ƒ 1b) hop-by-hop routing
2. Internet in VRF
ƒ Internet carried as a VPN on the core

Slide 39 Copyright © 2006 MFA Forum

Internet in Global Routing Table


Using LSPs Between PEs

Internet Service
Provider

Internet CE

Internet PE
VPN Customer Customer VPN
Customer PE PE Customer
P P

VPN
Customer

LSP Internet
Internet Routing Table Customer
(Global Routing Table)
VPN in a VRF
Slide 40 Copyright © 2006 MFA Forum

20
Internet in Global Routing Table
Using LSPs Between PEs
• Default behavior, if Internet in global table!!
ƒ On ingress PE: BGP next hop: Egress PE loopback
ƒ Next hop to egress usually has label!
ƒ LSP is used to reach egress PE
ƒ P routers do not need to know Internet routes
(nor run BGP)
• Security consequence:
ƒ PE routers are fully reachable from Internet, by default
(bi-directional)
ƒ P routers are also by default reachable from Internet;
but only uni-directional, they don’t know the way
back!
Slide 41 Copyright © 2006 MFA Forum

Internet in Global Routing Table


Using LSPs Between PEs
Recommendations:
• Fully secure each router!
• Do not advertise IGP routes outside
ƒ (General recommendation for all cores!)
ƒ P routers not reachable (unless someone
defaults to you)
ƒ PE routers not reachable (possible exception:
Peering PE)
• Infrastructure ACLs to block core space:
ƒ Additional security mechanism
ƒ Even if someone defaults to you, he cannot
reach the core
Slide 42 Copyright © 2006 MFA Forum

21
Internet in Global Routing Table
Hop-by-Hop Routing

Internet Service
Provider

Internet CE

Internet PE
VPN Customer Customer VPN
Customer PE PE Customer
P P

VPN
Customer

Internet
Internet Routing Table
(Global Routing Table) Customer
VPN in a VRF
Slide 43 Copyright © 2006 MFA Forum

Internet in Global Routing Table


Hop-by-Hop Routing
• Like in standard IP core
ƒ Each router speaks BGP, and carries Internet routes
ƒ Not default, must be configured!
• Security consequence:
ƒ P and PE routers by default fully reachable from
Internet
• Recommendations: (like before)
ƒ Fully secure each router!
ƒ Do not advertise IGP routes outside
ƒ Infrastructure ACLs

Slide 44 Copyright © 2006 MFA Forum

22
Internet in a VRF

Internet Service
Provider

Internet CE

Internet PE
VPN Customer Customer VPN
Customer PE PE Customer
P P

VPN
Customer

Internet
Internet Routing Table Internet in a VRF
(Global Routing Table)
Customer
VPN in a VRF
Slide 45 Copyright © 2006 MFA Forum

Internet in a VRF
• Internet is a VPN on the core
ƒ Full separation to other VPNs, and the core, by
default!
ƒ “Connection” Internet ↔ VPN (for service) must be
specifically configured
• Security consequence:
ƒ P routers not reachable from anywhere!
ƒ PE routers only reachable on outbound facing
interfaces
ƒ Very limited access to core
ƒ Much easier to secure
• But!!! Routes in a VRF take more memory!!
ƒ Check feasibility of putting Internet into the VRF!!
ƒ Plus other restrictions, convergence, etc. Copyright © 2006 MFA Forum
Slide 46

23
Internet in a VRF

Recommendations:

• Fully secure each router (you never


know…)
• Secure external facing PE interfaces!
ƒ Use Infrastructure ACLs for this (see earlier)
ƒ (Internal PE i/f and P cannot be reached from
outside)

Slide 47 Copyright © 2006 MFA Forum

Alternatively:
No Internet on the Core
• Pure MPLS VPN service considered “most
secure”
• But what about:

PE PE

CE B VRF B VRF B CE B

CE A VRF A mbehring

VRF A mbehring

CE A

Internet
Service
Provider however, bandwidth usually limited
and some firewall / control applied

Slide 48 Copyright © 2006 MFA Forum

24
VPNs Private Internet
Connection

CE B VRF B VRF B CE B

CE A VRF A mbehring

VRF A mbehring

CE A

Internet
Service
Provider

• VPN customer has private Internet connection


• Announces his address space to ISP
ƒ If that includes CE-PE links, PEs are accessible from
Internet
ƒ If not, only transit traffic attacks Æ very hard (limited in
b/w by CE-PE link)
Slide 49 Copyright © 2006 MFA Forum

Secure MPLS VPN Design


― Inter-AS and CsC

Slide 50 Copyright © 2006 MFA Forum

25
Standard-based L3 IPVPN Interconnect

Inter-AS/Interprovider specification in RFC4364

• IETF, RFC4364, Paragraph 10 :


ƒ 10A: Simple IP interconnect: The other network looks like a
CE for each cross-SP VPN
ƒ 10B: Trusted MPLS interconnect: One logical connection for
all VPN’s but VPN routes still have to be maintained on
provider border routers
ƒ 10C: Trusted and even more scalable MPLS interconnect:
Provider border routers don’t have to maintain VPN routes
• Current deployments
• 10A: Simple, low volume Interconnects between ‘untrusted’
parties
• 10B and 10C: Mostly deployed for higher volume or when
there is a shareholder relation between SPs

Slide 51 Copyright © 2006 MFA Forum

Inter-AS: What are we trying to


achieve?
• An SP should have:
ƒ 100% (full) reachability to all Inter-AS VPNs
(control plane and data plane)
ƒ 0% (no) reachability to VPNs that are not shared
(control plane and data plane)
• SP networks should be independent:
ƒ Not attackable from outside (other SP, customer,
Internet)
ƒ Limited reachability from outside

Slide 52 Copyright © 2006 MFA Forum

26
Inter-AS: What Are We NOT
Trying to Achieve?

Any Form of Separation Between Inter-AS


VPNs (Control or Data Plane)
• Interconnection of VPNs is 100%
• No firewalling, no limitations, no sanity
checks within an Inter-AS VPN

If an SP Holds VPN Sites in an


Inter-AS Set-Up, He Has Full Access
to All VPN Sites, Also on Other ASes

Slide 53 Copyright © 2006 MFA Forum

From RFC 4364


Data Plane Protection

1. a backbone router does not accept labeled packets


over a particular data link, unless it is known that that
data link attaches only to trusted systems, or unless it is
known that such packets will leave the backbone before
the IP header or any labels lower in the stack will be
inspected, and …

• Inter-AS should only be provisioned


over secure, private peerings
• Specifically NOT: Internet Exchange
Points (anyone could send labelled
packets!! No filtering possible!!)
Slide 54 Copyright © 2006 MFA Forum

27
Inter-AS: Case A
VRF-VRF Back-to-Back

Cust. AS 1 AS 2 Cust.
CE1 CE2
PE1 ASBR1 ASBR2 PE2
mbehring

LSP IP Data LSP

• Control plane: No signalling, no labels


• Data plane: IPv4 only, no labels accepted
• Security: as in single AS (very good)
• SPs are completely separated
Slide 55 Copyright © 2006 MFA Forum

Security of Inter-AS case A

• Static mapping
ƒ Only IP interfaces
ƒ SP1 does not “see” SP2’s network
ƒ And does not run routing with SP2, except within
the VPNs
ƒ Æ Quite secure
• Potential issues:
ƒ SP 1 can incorrectly connect VPNs
(like in ATM/FR)
ƒ Customer can flood routing table on PE (this is the
same issue as in single-AS; solution: prefix limits)

Slide 56 Copyright © 2006 MFA Forum

28
Inter-AS: Case B: ASBR
exchange labelled VPNv4 routes

Cust. AS 1 AS 2 Cust.
CE1 CE2
PE1 ASBR1MP-eBGP+Labels ASBR2 PE2
mbehring

LSP VPN label IP Data LSP

• Control plane: MP-eBGP, labels


• Data plane: Packets with one label

Slide 57 Copyright © 2006 MFA Forum

Security of Inter-AS Case B:


Summary

• Control Plane can be secured well


• Data Plane can also be secured
ƒ Permit packets with labels that were assigned on
the control plane
ƒ Deny others
• Good: No “visibility” of other AS
(except ASBR i/f)

Slide 58 Copyright © 2006 MFA Forum

29
Inter-AS Case C:
ASBRs Exchange PE loopbacks

Cust. AS 1 AS 2 Cust.
CE1 VPNv4 Routes + Labels CE2
PE1 ASBR1 PE Loopb+Labels ASBR2 PE2
mbehring

PE label VPN label IP Data


LSP

• Control plane: ASBR: just PE loopback + labels;


PE/RR: VPNv4 routes + labels
• Data plane: PE label + VPN label
• AS1 can insert traffic into VPNs in AS2
ƒ Only requirement: Must have LSP to correct egress PE
• Customer must trust both SPs
Slide 59 Copyright © 2006 MFA Forum

Security of Inter-AS Case C

• ASBR-ASBR signalling (BGP)


RR-RR signalling (MP-BGP)
ƒ Much more “open” than Case A and B
ƒ More interfaces, more “visible” parts (PE, RR)
• Potential Issues:
ƒ SP1 can intrude into any VPN on PEs which have a
Inter-AS VPN configured
ƒ Cannot check what’s underneath the PE label
• Very open architecture
ƒ Acceptable for ASes controlled by the same SP

Slide 60 Copyright © 2006 MFA Forum

30
Inter-AS Summary and
Recommendation
• Three different models for Inter-AS
ƒ Different security properties
ƒ Most secure: Static VRF connections (case A),
but least scalable
• Basically the SPs have to trust each other
ƒ Hard/impossible to secure against other SP in this
model
ƒ But: Can monitor with flow monitoring
• Case B and C are okay if all ASes are in control
of one SP
• Otherwise: Current Recommendation:
Use case A
Slide 61 Copyright © 2006 MFA Forum

From RFC4364:
Data Plane Protection

1. a backbone router does not accept labeled packets


over a particular data link, unless it is known that that
data link attaches only to trusted systems, or unless it is
known that such packets will leave the backbone before
the IP header or any labels lower in the stack will be
inspected, and …

• In CsC packets are switched through


the core based on the top label
• The packet is not further inspected on
the core

Slide 62 Copyright © 2006 MFA Forum

31
Carrier’s Carrier

Carrier’s Cust.
Cust. Carrier Carrier
Carrier
CE1 CE2
PE1 PE2
CsC CsC
CE1 CsC CsC CE2
PE1 PE2

IP data IP data

label IP data label IP data

label label IP data

• Same principles as in normal MPLS


• Customer trusts carrier who trusts carrier
Slide 63 Copyright © 2006 MFA Forum

Carrier’s Carrier: The Interface

Carrier’s
Carrier
Carrier
CsC-CE CsC-PE

• Control Plane:
ƒ CsC-PE assigns label to CsC-CE
• Data Plane:
ƒ CsC-PE only accepts packets with this label on
this interface
ÆCsC-PE controls data plane, no spoofing
possible

Slide 64 Copyright © 2006 MFA Forum

32
Carrier’s Carrier: Security

• Carrier is a VPN on core Carrier’s network


• Cannot spoof other VPN/carrier:
ƒ CsC-PE verifies top incoming label in data path
ƒ Top label determines egress PE (+interface, +prefix)
• Can mess up his own VPN!
• Basically like in a single AS

Slide 65 Copyright © 2006 MFA Forum

Carrier’s Carrier: Summary

• Can be secured well


ƒ Carrier has VPN on Carrier’s Carrier MPLS cloud
ƒ Carrier cannot intrude into other VPNs.
• End customer must trust both SPs.

Slide 66 Copyright © 2006 MFA Forum

33
L2VPN Security

Slide 67 Copyright © 2006 MFA Forum

Watch out for Layer 2 Security!!

ASBR IXP ASBR

3rd party in same VLAN (e.g. IXP) can:


ƒ insert spoofed packets into VPNs
(cannot be prevented today technically!!)
ƒ Do layer 2 attacks to do man-in-the-middle
(could be mostly prevented, but is often not
done)
Recommendation: Inter-AS and CsC
connections only on private peerings!!
Slide 68 Copyright © 2006 MFA Forum

34
What the Standards Say

• RFC 3985 (PWE3 Architecture)


ƒ “PWE3 provides no means of protecting the integrity,
confidentiality, or delivery of the native data units.
The use of PWE3 can therefore expose a particular
environment to additional security threats.
Assumptions that might be appropriate when all
communicating systems are interconnected via a
point-to-point or circuit-switched network may no
longer hold when they are interconnected with an
emulated wire carried over some types of PSN.”

Note: This talks only about customer security!

Slide 69 Copyright © 2006 MFA Forum

Virtual Private Wire Service


(VPWS) Overview

Attachment Attachment
circuit Private Wire circuit
PSN Tunnel

CE VPWS P P P VPWS CE
PE PE

Directed LDP

• In VPWS: Packets coming in on one side, are


blindly forwarded to the other. Æ Low security
exposure
Slide 70 Copyright © 2006 MFA Forum

35
Virtual Private LAN Service
(VPLS) Overview
• Network behaves as a switch
ƒ Spanning Tree
ƒ MAC address learning
ƒ ARP, etc.
• Æ Examine threats to a switch to understand
VPLS security

Slide 71 Copyright © 2006 MFA Forum

VPLS Security Threats

• VLAN “Hopping”
• MAC Attacks
• DHCP Attacks
• ARP Attack
• Spoofing Attacks
• Other Attacks

Slide 72 Copyright © 2006 MFA Forum

36
Best Practices for L2 Security

1.1. Always
Alwaysuseuseaadedicated
dedicatedVLAN
VLANID IDfor
forTrunk
TrunkPorts
Ports
2.2. Disable
Disableunused
unusedports
portsand
andput
putthem
themin inan
anunused
unusedVLANVLAN
3.3. Use
UseSecure
SecureTransmission
Transmissionwhenwhenmanaging
managingSwitches
Switches(SSH,
(SSH,OOB,
OOB,Permit
Permit
Lists)
Lists)
4.4. Deploy
DeployPort
PortSecurity
Security
5.5. Set
Set all hostports
all host portsto
toNon
NonTrunking
Trunking
6.6. ALWAYS
ALWAYS use a dedicatedVLAN
use a dedicated VLANfor forTrunk
TrunkPorts
Ports
7.7. Avoid
Avoidusing
usingVLANVLAN11
8.8. Have
Haveaaplan
planfor
forARP
ARPSecurity
Securityissues
issuesandandimplement
implementit!!!
it!!!
9.9. Use SNMP V3 to secure SNMP transmission
Use SNMP V3 to secure SNMP transmission
10.
10. Use
UseSTP
STPAttack
Attackmitigation
mitigation
11.
11. Use
UseMD5
MD5Authentication
AuthenticationforforVTP
VTP
12.
12. Plan for and implement DHCPAttack
Plan for and implement DHCP Attackmitigation
mitigation
13.
13. Use Private VLAN’s to better secureguest
Use Private VLAN’s to better secure guestVLAN’s
VLAN’s
14.
14. Use
Useand
andimplement
implement802.1x
802.1xtotoprotect
protectentry
entryinto
intoyour
yournetwork
network
15.
15. Consider
Considerusing
usingVACL’s
VACL’stotolimit
limitaccess
accessto tokey
keynetwork
networkresources…
resources…

Slide 73 Copyright © 2006 MFA Forum

Exposure to Customer

• Must trust provider


• Protocols carried over PW might not be
designed for high-grade security
ƒ Æ Easy to break security (integrity, confidentiality,
availability)
ƒ Example: VRRP / HSRP
• Depends on what you do with PW
ƒ Make sure you understand what you run on top of PW
ƒ No general answer possible

Slide 74 Copyright © 2006 MFA Forum

37
Exposure to SP

• PEs do not analyse L2 frames


• PEs just encapsulate and forward L2 frames
• Also applies to L2 signalling

Therefore:
• PEs cannot be attacked on control plane
(there is none to the outside)
• PEs may be overwhelmed on data plane
(too much traffic to forward Æ DoS)
ƒThis threat is identical to any other network
ƒCorrect provisioning solves this issue

Slide 75 Copyright © 2006 MFA Forum

Attacking an MPLS Network

Slide 76 Copyright © 2006 MFA Forum

38
Threat Model

Security Security
Description
Threats Vulnerability

MPLS network resources


Denial of Service
become unavailable to
(DoS) attacks
authorized users
Malicious user behavior
MPLS network resources
Intrusion attacks become available to un-
authorized users
MPLS network resources
Undesired MPLS
Unintended human become available to
protocol side effects
error, mis- unauthorized users as a result
configuration, protocol of unintended device mis-
MPLS device
side effects configuration or unexpected
misconfiguration
protocol side effects

Slide 77 Copyright © 2006 MFA Forum

Security Threats

CE PE ASBR ASBR PE CE
P P

MPLS Service Edge MPLS Core MPLS Inter-AS


(PE Router) (P routers) Edge (ASBR)
• Control plane DoS • Unauthorized VPN/IGP
attacks (ie:BGP) access via label
Malicious user • Control plane DoS spoofing
• Unauthorized control attacks (ie: LDP)
behavior plane access (ie: • Control plane DoS
SNMP,) attack
• Unintended P router
Unintended access due to
• Unintended VPN Route
• Unintended VPN Route incorrect/missing access
human error, leakage due to VRF mis- control configuration
leakage due to VRF mis-
configuration or incorrect
mis- configuration and/or IGP route
VPN route distribution
configuration, • PE router access due to distribution
• ASBR router access due
incorrect/missing access • VPN traffic mis-
protocol side configuration forwarding due to
to incorrect/missing
effects unexpected (rare)
access configuration
Copyright © 2006 MFA Forum
Slide 78
protocol side effects

39
Ways to Attack

• “Intrusion”: Get un-authorized access


ƒ Theory: Not possible (as shown before)
ƒ Practice: Depends on:
No Trust?
ƒ - Vendor implementation
ƒ - Correct configuration and management
Use IPSec
• “Denial-of-Service”: Deny access of others
Between CEs!

ƒ Much more interesting…

Slide 79 Copyright © 2006 MFA Forum

DoS Against MPLS

• DoS is about Resource Starvation, one of:


ƒ Bandwidth
ƒ CPU
ƒ Memory (buffers, routing tables…)
• In MPLS, we have to examine:

CE PE
• Rest is the same as in other networks

Slide 80 Copyright © 2006 MFA Forum

40
Attacking a CE from MPLS
(Other VPN)
• Is the CE reachable from the MPLS side?
ƒ Æ only if this is an Internet CE, otherwise not
(CE-PE addressing is part of VPN!)
• For Internet CEs:
ƒ Same security rules apply as for any other access
router

MPLS Hides VPN-CEs: Secure!


Internet CEs: Same as In Other Networks

Slide 81 Copyright © 2006 MFA Forum

Attacking a CE-PE Line

• Also depends on reachability of CE or the VPN


behind it
• Only an issue for lines to Internet-CEs
ƒ Same considerations as in normal networks
• If CE-PE line shared (VPN and Internet):
ƒ DoS on Internet may influence VPN!

MPLS Hides VPN-CEs: Secure!


Internet CEs: Same as In Other Networks
Slide 82 Copyright © 2006 MFA Forum

41
Attacking a PE Router

PE
IP(P)
IP(PE; l0)
CE1
IP(CE1) IP(PE; fa0)
VRF CE1

CE2
IP(CE2) IP(PE; fa1) VRF CE2

VRF
Internet
Attack Points

Only Visible: “Your” Interface


and Interfaces of Internet CEs
Slide 83 Copyright © 2006 MFA Forum

DoS Attacks to PE Can Come


from…
• Other VPN, connected to same PE
• Internet, if PE carries Internet VRF
Possible Attacks:
• Resource starvation on PE
ƒ Too many routing updates, too many SNMP
requests, small servers…

Has to Be Secured
and Can Be Secured!

Slide 84 Copyright © 2006 MFA Forum

42
IPsec and MPLS

Slide 85 Copyright © 2006 MFA Forum

Use IPsec If You Need:

• Encryption of traffic
• Direct authentication of CEs
• Integrity of traffic
• Replay detection

• Or: If you don’t want to trust your ISP for


traffic separation!

Slide 86 Copyright © 2006 MFA Forum

43
Where to Apply IPsec

CE PE PE CE

IPsec CE-CE

Application:
VPN Security
IPsec PE-PE
Application:
Special Cases
IPsec CE-PE
Application: Remote
Access into VPN

Slide 87 Copyright © 2006 MFA Forum

Applications of PE-PE IPSec

• If core is not pure MPLS, but IP based


ƒ Standard 4364 requires MPLS core, PE-PE IPSec
does not
ƒ Alternative: MPLS in IP/GRE/L2TPv3, but with PE-PE
IPSec spoofing impossible
• Protect against misbehaving transit nodes
• Protection against sniffing on core lines

Slide 88 Copyright © 2006 MFA Forum

44
draft-ietf-l3vpn-ipsec-2547-05.txt:
PE-PE IPsec in MPLS VPNs

• Normal RFC 4364


• Instead of LSPs between PEs, use IPsec
• Packets on the core instead of this:
PE label VPN IP Data
Actually, the Labelled
• Look like this: Packet Is First IP/GRE
Encapsulated, Then
Put in IPsec Transport
IPsec Header VPN IP Data Mode; IPsec Requires
an IP Packet!!

• Careful: Does not encrypt CE-PE: Most


vulnerable!!
• Work in progress, pretty stable

Slide 89 Copyright © 2006 MFA Forum

PE-PE IPSec: How It Works

1. Egress PE Signals IPSec


Policy Per VPN Prefix

BGP + Ext. Community

PE PE
VPN IPSec VPN

2. Ingress PEs Establish


IPSec Tunnel for Prefix

• Not defined in draft:


ƒ How to establish IPSec tunnel
Slide 90 Copyright © 2006 MFA Forum

45
IPsec: PE-PE vs. CE-CE

Hacker wants to… IPsec CE-CE IPsec PE-PE

…read VPN traffic Protects Fully Protects Partially

…insert traffic into VPN Protects Fully Protects Partially

…join a VPN Protects Fully Doesn’t Protect

…DoS a VPN/the core Doesn’t Protect Doesn’t Protect

Slide 91 Copyright © 2006 MFA Forum

Ongoing Standardizations Work

Slide 92 Copyright © 2006 MFA Forum

46
Relevant Standardization

• IETF L3VPN WG:


ƒ Working on Layer 3 VPN architectures, such as MPLS IP
VPNs, IP VPNs using virtual routers, and IPsec VPNs.
ƒ http://www.ietf.org/html.charters/l3vpn-charter.html
• IETF L2VPN WG:
ƒ Working on Layer 2 VPN architectures, such as VPLS and
VPWS
ƒ http://www.ietf.org/html.charters/l2vpn-charter.html

Slide 93 Copyright © 2006 MFA Forum

Summary

Slide 94 Copyright © 2006 MFA Forum

47
MPLS doesn’t provide:

• Protection against
mis-configurations in the core
• Protection against
attacks from within the core
• Confidentiality, authentication, integrity, anti-
replay -> Use IPsec if required
• Customer network security

Slide 95 Copyright © 2006 MFA Forum

Summary

• MPLS VPNs can be secured as well as


ATM/FR VPNs
• Security depends on correct architecture,
operation and implementation
• MPLS backbones can be more secure than
“normal” IP backbones
ƒ Core not accessible from outside
ƒ Separate control and data plane
• Key: PE security
ƒ Advantage: Only PE-CE interfaces accessible
from outside
ƒ Makes security easier than in “normal”
networks
Slide 96 Copyright © 2006 MFA Forum

48
References

• MPLS VPN Security – ISBN 1587051834


• RFC4381 – Analysis of MPLS VPN Security
• RFC2082 – RIP-2 MD5 Authentication
• RFC2154 – OSPF with Digital Signatures
• RFC2385 – Protection of BGP Sessions via the TCP MD5
Signature Option
• RFC3013 – Recommended Internet Service Provider Security
Services and Procedures
• RFC2196 – Site Security Handbook
• Garnter research note M-17-1953: "MPLS Networks: Drivers
Beat Inhibitors in 2003"; 10 Feb 2003
• MPLS and VPN Architectures – ISBN 1587050021
• MPLS VPN Security – ISBN 1587051834

Slide 97 Copyright © 2006 MFA Forum

For More Information. . .

• http://www.mfaforum.org
• http://www.ietf.org
• http://www.itu.int
• http://www.mplsrc.com

For questions, utilize the MFA Forum Message Board


Website: http://www.mfaforum.org/board/

Slide 98 Copyright © 2006 MFA Forum

49
Thank you for attending the

MPLS VPN Security Tutorial

Slide 99 Copyright © 2006 MFA Forum

50

You might also like