What Is BGP? Understanding Network Protocols By WireX Systems

BGP: Network Protocol Explained

Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems on the Internet. It is a crucial component of the global Internet routing infrastructure, enabling routers within an autonomous systems (ASes) to communicate with routers in other ASes, thus facilitating the exchange of routing information between networks.

Key BGP concepts:

  1. Autonomous Systems (ASes): An AS is a group of IP networks and routers under the control of a single organization that presents a common routing policy to the Internet. Each AS is assigned a unique AS number (ASN) to identify it on the Internet.
  2. BGP messages: BGP uses four types of messages to communicate routing information: OPEN, UPDATE, NOTIFICATION, and KEEPALIVE. OPEN messages establish connections, UPDATE messages convey routing information, NOTIFICATION messages report errors, and KEEPALIVE messages maintain connections.
  3. BGP peers: Routers participating in BGP are known as BGP speakers, which form peer relationships with one another to exchange routing information. These connections can be categorized as External BGP (eBGP) between different ASes or Internal BGP (iBGP) within the same AS.
  4. BGP attributes: Routing information exchanged by BGP speakers is stored in the form of attributes. Some key attributes are AS_PATH (sequence of ASes traversed), NEXT_HOP (IP address of the next router), and LOCAL_PREF (local preference value).
  5. BGP route selection: BGP uses a decision process to select the best route to a destination based on multiple factors, including the length of the AS_PATH, the value of LOCAL_PREF, and the router ID. The best route is then installed in the router’s routing table and advertised to its peers.
  6. Route aggregation and filtering: BGP can aggregate multiple routes into a single route to reduce the size of routing tables. It can also filter routes based on various criteria, such as prefixes or AS_PATH, to implement routing policies.
  7. BGP convergence: BGP convergence is the process by which all BGP routers in the network agree on the best route to a destination. Slow convergence may cause temporary routing loops and suboptimal routing.
  8. BGP security: BGP relies on trust among routers to exchange accurate routing information. However, this makes it vulnerable to attacks and misconfigurations. BGP security measures include filtering routes, using cryptographic authentication, and implementing the Resource Public Key Infrastructure (RPKI) for route origin validation.

BGP is an essential component of the global Internet routing infrastructure, providing reachability and stability to the vast and ever-growing network. By exchanging routing information between ASes, BGP ensures that data packets are routed efficiently and reliably across the Internet.

What Is BGP

BGP is a standardized exterior gateway protocol used to exchange routing and reachability information between autonomous systems (ASes) on the Internet. Its primary purpose is to facilitate communication between different networks and enable data packets to be efficiently and reliably routed across the Internet.

An autonomous system (AS) is a collection of IP networks and routers under the control of a single organization, presenting a common routing policy to the Internet. Each AS is assigned a unique AS number (ASN) for identification purposes.

BGP routers, also known as BGP speakers, form peer relationships with one another to exchange routing information. These connections can be classified as either External BGP (eBGP) between different ASes or Internal BGP (iBGP) within the same AS.

BGP uses a decision process to select the best route to a particular destination based on various factors, including the length of the AS_PATH, the value of the LOCAL_PREF attribute, and the router ID. The selected route is then installed in the router’s routing table and advertised to its peers.

BGP plays a crucial role in the global Internet routing infrastructure by ensuring reachability and stability across the vast and continually growing network. It allows different networks to communicate with one another, making the Internet a global and interconnected system.

The Purpose Of BGP

The primary purpose of BGP is to facilitate communication and exchange of routing information between different networks, called autonomous systems (ASes), on the Internet. BGP enables data packets to be efficiently and reliably routed across the Internet by providing reachability and stability for the global routing infrastructure. Some of the main purposes of BGP include:

  1. Path vector protocol: BGP is a path vector protocol that maintains a list of ASes traversed by a route in the AS_PATH attribute. This helps in preventing routing loops and choosing the best path to reach a destination.
  2. Policy-based routing: BGP allows network administrators to implement routing policies based on various factors, such as AS_PATH length, LOCAL_PREF, and MED values. This enables them to control the selection of preferred routes and influence traffic flow in and out of their AS.
  3. Scalability: BGP is designed to handle thousands of routes, making it suitable for large networks like the Internet. BGP routers can also aggregate multiple routes into a single route, reducing the size of routing tables and improving scalability.
  4. Flexible peering: BGP supports both External BGP (eBGP) peering between different ASes and Internal BGP (iBGP) peering within the same AS. This flexibility allows BGP to maintain routing information at various levels, from global Internet routing to routing within large enterprises.
  5. Multi-protocol support: BGP can carry routing information for multiple network layer protocols, such as IPv4 and IPv6, using Multi-Protocol BGP extensions (MP-BGP). This makes BGP a versatile protocol for the exchange of routing information across diverse networks.

In summary, BGP serves as the backbone of the Internet’s routing infrastructure by enabling communication and routing information exchange between autonomous systems. It helps ensure that data packets can be efficiently and reliably routed across the Internet, providing reachability, stability, and policy-based routing control.

Benefits Of BGP

BGP offers several benefits as a critical component of the global Internet routing infrastructure. Some of the key benefits include:

  1. Path Selection: BGP provides a sophisticated path selection process that evaluates multiple factors, such as AS_PATH length, LOCAL_PREF, MED, and router ID, to determine the best route to a destination. This helps in selecting efficient and reliable paths for data packets across the Internet.
  2. Policy-Based Routing: BGP allows network administrators to implement routing policies based on various attributes, enabling them to control the selection of preferred routes and influence traffic flow in and out of their autonomous systems (ASes). This helps organizations optimize network performance, manage traffic engineering, and enforce security policies.
  3. Scalability: BGP is designed to handle a large number of routes, making it suitable for the vast and ever-growing global Internet routing infrastructure. It supports route aggregation, which can reduce the size of routing tables and improve scalability.
  4. Stability: BGP contributes to the overall stability of the Internet by using various mechanisms, such as the AS_PATH attribute, to prevent routing loops and maintain consistent routing information. Additionally, BGP’s incremental update mechanism ensures that only changes in routing information are exchanged, reducing the load on routers and minimizing network instability.
  5. Multi-Protocol Support: BGP can carry routing information for multiple network layer protocols, such as IPv4 and IPv6, using Multi-Protocol BGP extensions (MP-BGP). This versatility allows BGP to support the exchange of routing information across diverse networks and facilitate the coexistence of multiple network layer protocols.
  6. Flexible Peering: BGP supports both External BGP (eBGP) peering between different ASes and Internal BGP (iBGP) peering within the same AS. This flexibility enables BGP to maintain routing information at various levels, from global Internet routing to routing within large enterprises.
  7. Interdomain Routing: BGP enables interdomain routing by exchanging routing information between different ASes on the Internet. This ensures global reachability and interoperability among the vast number of networks that make up the Internet.

In summary, BGP offers numerous benefits as the backbone of the Internet’s routing infrastructure. It provides efficient path selection, policy-based routing, scalability, stability, multi-protocol support, flexible peering, and interdomain routing capabilities, making it an essential component for maintaining the global Internet’s reachability and performance.

Limitations Of BGP

Despite its crucial role in the global Internet routing infrastructure, BGP has certain limitations and challenges:

  1. Convergence Time: BGP can take a significant amount of time to converge after a network topology change, such as a link failure or a new route advertisement. During the convergence process, temporary routing loops and suboptimal routing may occur, affecting network performance.
  2. Lack of Traffic Engineering: BGP’s primary focus is on policy-based routing and reachability, not optimizing traffic flow or load balancing. Network administrators often have to employ complex configurations or rely on other protocols (such as MPLS) to achieve traffic engineering goals.
  3. Security Vulnerabilities: BGP relies on trust among routers to exchange accurate routing information, which makes it vulnerable to attacks, misconfigurations, and route leaks. BGP security measures, such as prefix filtering, cryptographic authentication, and Resource Public Key Infrastructure (RPKI) for route origin validation, are necessary to mitigate these risks.
  4. Limited Metric-Based Routing: BGP primarily uses AS_PATH length as its metric, which doesn’t necessarily reflect the actual performance (e.g., latency or bandwidth) of a path. As a result, BGP may not always select the optimal route based on performance metrics.
  5. Scalability Concerns: Although BGP is designed to handle a large number of routes, the growth of the Internet and the increasing size of routing tables can pose scalability challenges for routers, particularly those with limited resources.
  6. Complexity: BGP configurations and policy implementations can be complex, particularly in large networks with numerous routing policies and peering relationships. This complexity can lead to misconfigurations and increased operational overhead.
  7. No built-in Quality of Service (QoS): BGP does not have built-in support for QoS, which means it cannot prioritize or classify traffic based on application requirements. Network administrators have to rely on other mechanisms, such as Differentiated Services (DiffServ) or MPLS, to provide QoS.

Despite these limitations, BGP remains the backbone of the Internet routing infrastructure due to its ability to provide reachability, policy-based routing, and scalability. Network operators and administrators continue to employ various techniques, tools, and complementary protocols to address BGP’s limitations and ensure the stability and performance of the global Internet.

How Does BGP Work

BGP is the primary protocol used to exchange routing information between different autonomous systems (ASes) on the Internet. It enables routers within an AS to communicate with routers in other ASes, thus facilitating the exchange of routing information between networks. Here’s an overview of how BGP works:

  1. BGP Peering: BGP routers, also known as BGP speakers, form peer relationships or sessions with one another to exchange routing information. These sessions can be External BGP (eBGP) between routers in different ASes or Internal BGP (iBGP) between routers within the same AS.
  2. BGP Messages: BGP uses four types of messages to communicate between peers:
    • OPEN: Establishes a BGP session between peers and negotiates BGP parameters.
    • UPDATE: Conveys routing information, including new routes and withdrawn routes.
    • NOTIFICATION: Reports errors or problems with the BGP session and causes the session to be terminated.
    • KEEPALIVE: Maintains the BGP session by verifying that the peer is still active.
  3. BGP Routing Information Base (RIB): Each BGP router maintains three RIBs:
    • Adj-RIBs-In: Contains unprocessed routing information received from BGP peers.
    • Loc-RIB: Contains the best routes selected by the BGP decision process.
    • Adj-RIBs-Out: Contains routes to be advertised to BGP peers.
  4. BGP Attributes: BGP routes have associated attributes that provide information about the route and influence the path selection process. Some key attributes are:
    • AS_PATH: A sequence of ASes traversed by the route.
    • NEXT_HOP: The IP address of the next router to forward the packet to.
    • LOCAL_PREF: A locally significant value indicating the preferred route within an AS.
    • MULTI_EXIT_DISC (MED): A value that can be used to influence the selection of an entry point into an AS.
  5. BGP Decision Process: BGP routers use a decision process to select the best route to a destination based on the route attributes. This process typically involves the following steps:
    • Highest LOCAL_PREF
    • Shortest AS_PATH
    • Lowest MED (Multi-Exit Discriminator)
    • eBGP routes preferred over iBGP routes
    • Lowest IGP (Interior Gateway Protocol) cost to the NEXT_HOP
    • Lowest router ID

The best route is then installed in the router’s routing table and advertised to its BGP peers.

  1. Route Propagation: BGP routers advertise their best routes to their peers, which in turn evaluate these routes and potentially advertise them further. This process ensures that routing information is propagated throughout the Internet.
  2. Route Aggregation and Filtering: BGP routers can aggregate multiple routes into a single route, reducing the size of routing tables. They can also filter routes based on various criteria, such as prefixes or AS_PATH, to implement routing policies and maintain security.

BGP plays a vital role in the global Internet routing infrastructure, providing reachability, stability, and policy-based routing control. By exchanging routing information between ASes, BGP ensures that data packets are efficiently and reliably routed across the Internet.

Security Concerns Of BGP

BGP plays a crucial role in the global Internet routing infrastructure. However, it also has several security concerns, mainly because it was designed with trust among routers as a fundamental assumption. Some of the primary security concerns associated with BGP are:

  1. Route Hijacking: A malicious AS can advertise false routes to a specific IP prefix, causing traffic destined for that prefix to be redirected to the attacker’s network. This can result in a loss of confidentiality, integrity, or availability of data, and can also be used for denial-of-service (DoS) attacks.
  2. Route Leaks: Misconfigurations or software bugs can cause a router to inadvertently advertise routes that it should not. This can lead to suboptimal routing, increased latency, or even network outages in extreme cases.
  3. AS_PATH Spoofing: An attacker can manipulate the AS_PATH attribute of a BGP route to create routing loops, make a route appear more attractive, or bypass filtering policies. This can lead to instability in the routing infrastructure or traffic being routed through unauthorized networks.
  4. IP Prefix Spoofing: Attackers can advertise unauthorized IP prefixes, leading to traffic being sent to incorrect destinations or causing routing instability.
  5. Unintentional Route Announcements: Human errors or misconfigurations can lead to the announcement of incorrect routes, causing traffic disruptions or suboptimal routing.
  6. Eavesdropping and Traffic Interception: By manipulating BGP routes, an attacker can redirect traffic through their network to eavesdrop on or intercept data in transit.

To address these security concerns, several best practices and security mechanisms can be implemented:

  1. Route Filtering: Network operators should implement strict filtering policies to ensure that only legitimate routes are accepted and propagated.
  2. BGP Authentication: Using cryptographic authentication mechanisms, such as MD5 or TCP-AO (TCP Authentication Option), can protect BGP sessions from unauthorized access or manipulation.
  3. Resource Public Key Infrastructure (RPKI): RPKI provides a way to cryptographically verify the legitimacy of route origin announcements, helping prevent IP prefix hijacking and spoofing.
  4. BGPsec: BGPsec is a security extension to BGP that adds cryptographic signatures to the AS_PATH attribute, making it more difficult for attackers to manipulate routes.
  5. Monitoring and Anomaly Detection: Regularly monitoring BGP updates and detecting anomalies can help network operators identify and react to potential security incidents or misconfigurations.

Although BGP has inherent security concerns, network operators can mitigate these risks by implementing best practices, security mechanisms, and continuously monitoring the routing infrastructure for signs of compromise or misconfiguration.

Attack Examples Using BGP

There have been several incidents where attackers exploited the BGP protocol to redirect Internet traffic or cause disruption. Some notable examples include:

  1. YouTube Hijacking : Pakistan Telecom inadvertently hijacked YouTube’s IP address space while trying to block access to the platform within Pakistan. Pakistan Telecom announced a more specific route for YouTube’s IP prefix, which was then propagated by their upstream provider, PCCW, to the rest of the Internet. As a result, YouTube was inaccessible for users worldwide for about two hours.
  2. Bitcoin Mining Hijacking : Attackers hijacked the traffic of several Bitcoin mining pools by exploiting a vulnerability in the BGP protocol. The attackers announced more specific BGP routes for the IP addresses of the target mining pools, redirecting their traffic to a rogue network. This allowed the attackers to steal mining resources and the associated cryptocurrency rewards.
  3. Amazon Route 53 Hijacking : Attackers exploited BGP to hijack Amazon’s Route 53 DNS service, targeting the cryptocurrency website MyEtherWallet.com. By announcing a more specific route for Amazon’s IP prefixes, the attackers redirected users to a phishing site that appeared to be MyEtherWallet.com, stealing cryptocurrency from unsuspecting users.
  4. MainOne and Google : Nigerian ISP MainOne accidentally propagated incorrect BGP routes for several Google services, causing outages and traffic redirection for over an hour. While the incident was reportedly due to a misconfiguration, it demonstrated the potential impact of BGP hijacking on major Internet services.

These incidents highlight the importance of securing BGP and implementing best practices to minimize the risk of hijacking and traffic redirection. Implementing route filtering, cryptographic authentication, RPKI, and monitoring BGP updates can help protect against such attacks and maintain the stability of the global Internet routing infrastructure.

WireX Systems NDR can Help with BGP Investigations

WireX Systems Ne2ition NDR (Network Detection and Response) is a security approach that focuses on monitoring network traffic, detecting anomalies and threats, and providing automated or manual response capabilities to mitigate identified risks. Ne2ition NDR solutions can be valuable in investigating attacks involving BGP by providing visibility into network activities and identifying suspicious behavior. Here’s how Ne2ition can help:

  1. Traffic Monitoring and Analysis: Ne2ition NDR solutions continuously monitor network traffic, capturing and analyzing data packets. By monitoring traffic in real-time or through historical records, Ne2ition can help identify patterns or events that suggest BGP hijacking or other routing issues, such as sudden changes in traffic volume or unexpected traffic redirection.
  2. Anomaly Detection: Ne2ition NDR solutions use advanced analytics, machine learning, or artificial intelligence to detect deviations from normal behavior or known malicious patterns. In the context of BGP attacks, Ne2ition can help identify unusual routing updates, unauthorized BGP sessions, or traffic traversing unexpected paths.
  3. Alerting and Reporting: When Ne2ition NDR solutions detect anomalies or threats related to BGP, they can generate alerts or reports, providing network security teams with actionable insights. This enables security analysts to investigate the incidents further, determine the root cause, and implement appropriate countermeasures.
  4. Threat Intelligence Integration: Ne2ition NDR solutions can integrate with external threat intelligence feeds, providing up-to-date information on known malicious IP addresses, domains, or AS numbers. This can help identify potential BGP hijacking attempts or other routing attacks, enhancing the overall security posture.
  5. Incident Response and Mitigation: Ne2ition NDR provides automated or manual response capabilities, allowing security teams to quickly react to identified BGP attacks. This can involve isolating affected network segments, blocking malicious traffic, or coordinating with upstream providers to resolve routing issues.
  6. Forensic Investigation: Ne2ition NDR can store network traffic data for extended periods, enabling security teams to conduct in-depth forensic analysis of BGP incidents. This can help determine the attack’s origin, tactics, techniques, and procedures (TTPs), and improve the organization’s ability to defend against similar attacks in the future.

In summary, WireX Systems Ne2ition NDR solutions can play a crucial role in detecting, investigating, and responding to attacks involving BGP by providing comprehensive visibility into network activities, identifying suspicious behavior, and enabling security teams to take appropriate action. By leveraging Ne2ition’s capabilities, organizations can improve their overall security posture and better defend against BGP-related threats.

Overall, WireX Systems leverages the power of network analysis to detect and protect against cyber threats.

WireX Systems Ne2ition analyzes BGP traffic, extracts and indexes different attributes to provide in-depth visibility and context for detection, response, forensics and hunting scenarios over BGP.

These attributes will also help WireX Systems map into the MITRE ATT&CK framework techniques and tactics.

MITRE ATT&CK and BGP

MITRE ATT&CK is a knowledge base and framework that categorizes various tactics and techniques used by adversaries during cyberattacks. While the framework does not explicitly list BGP attacks as a specific technique, there are several tactics and techniques that can be associated with attacks over BGP:

  1. Tactic: Initial Access
    • Technique T1195.001: Supply Chain Compromise – Network Manipulation: An attacker could compromise an organization’s upstream network provider to manipulate BGP and alter routing information, affecting the target organization’s connectivity.
  2. Tactic: Command and Control
    • Technique T1090: Proxy: BGP hijacking can be used by an attacker to redirect traffic through their network, acting as a proxy for command and control (C2) communications, making it difficult to trace the source of the C2 server.
  3. Tactic: Exfiltration
    • Technique T1048: Exfiltration Over Alternative Protocol: BGP hijacking can be used to redirect traffic, enabling an attacker to exfiltrate data over a less monitored or less suspicious network path.
  4. Tactic: Impact
    • Technique T1491: Defacement: BGP hijacking can be used to redirect users to a malicious website or defaced version of the target website, impacting the target organization’s reputation and user trust.
    • Technique T1499: Endpoint Denial of Service: BGP hijacking can be used to cause denial-of-service (DoS) attacks on a target organization’s network by redirecting traffic to an incorrect destination or causing routing loops.

While BGP attacks may not have a direct mapping to specific MITRE ATT&CK techniques, the impact of these attacks can be related to various tactics and techniques within the framework. Understanding the potential effects of BGP attacks and relating them to the MITRE ATT&CK framework can help organizations identify, investigate, and defend against such threats.

Conclusion

In conclusion, BGP (Border Gateway Protocol) is a vital component of the global Internet routing infrastructure, enabling routers within autonomous systems (ASes) to communicate and exchange routing information with routers in other ASes. BGP ensures that data packets are efficiently and reliably routed across the Internet by establishing peering relationships, exchanging routing information through BGP messages, maintaining Routing Information Bases (RIBs), and applying a decision process based on route attributes.

However, BGP has its limitations, including convergence time, lack of traffic engineering, limited metric-based routing, security vulnerabilities, scalability concerns, complexity, and the absence of built-in Quality of Service (QoS) support. These limitations can be addressed by network operators and administrators employing various techniques, tools, and complementary protocols.

The trust-based design of BGP makes it vulnerable to security concerns such as route hijacking, route leaks, AS_PATH spoofing, IP prefix spoofing, unintentional route announcements, and eavesdropping and traffic interception. To mitigate these risks, network operators can implement best practices and security mechanisms, including route filtering, BGP authentication, Resource Public Key Infrastructure (RPKI), BGPsec, and monitoring and anomaly detection.

Despite its limitations and security concerns, BGP remains the backbone of the Internet routing infrastructure due to its ability to provide reachability, policy-based routing, and scalability. By understanding its working principles, limitations, and security concerns, organizations can better secure their networks and contribute to the stability and performance of the global Internet.

 

Scroll to top
Turn Your Security Operator Into a Valuable Analyst Now!