SlideShare a Scribd company logo
Detecting Spoofing at IXPs
APRICOT 2018
Tom Paseka
About Cloudflare
Cloudflare makes websites faster and safer using our globally distributed network to
deliver essential services to any website
● Performance
● Content
● Optimisation
● Security
● 3rd party services
● Analytics
Some numbers...
● 100+ PoPs
● 50+ Countries
● 150+ Internet exchanges
● >400bn Web requests a day ~10% of all web requests
● Regular DDoS attacks larger than 500Gbps, 300M PPS
Spoofing?
Spoofing?
● A very small request becomes a very big attack
● Lots of focus on fixing the applications causing
the spoofing.
○ Not much on fixing the source of spoofing
Some of the projects:
● openntpproject.org
● openresolverproject.org
● bcp38.info
Spoofed Attacks - History that we’ve seen
When Nickname Type Volume
2011 SNMP Amp SNMP Amplification /
Reflection
80Gbps
2013 Spamhaus DNS Amplification /
Reflection
300Gbps
2014 "Winter of Attacks" Direct 400Gbps
2015 NTP Amp NTP Amplification /
Reflection
400Gbps+
2016 IoT Direct 500Gbps+
Why does this matter?
Spoofing Enables Impersonation
Why does spoofing
matter?
•This is my good friend
Walt Wollny
•Let’s say, he was
assaulted, but it was by
masked assailant
•Without removing the
mask, there can’t be legal
retribution
•Without attribution,
there can be no
discussion!
What about IXPs
Detecting Spoofing?
● Detecting spoofing can be challenging
● uRPF?
● Some Diagrams:
Where did the attack come from?
Where did the attack come from?
Detecting Spoofing
● Using flow (net, s, j, etc) it's easy to record
incoming interface
● Simple logic can determine if it’s spoofed:
An interface connected a hosting provider
is highly unlikely to have traffic from
Google IPs.
How about at an IXP?
How about at an IXP?
How about an IXP?
● OK, We can see the source interface on
our router, but there are hundreds of
possible sources on the other side.
● MAC addresses!
Enter some basic scripting!
sflowtool + my PHP = IXPantiSpoofer
# sflowtool -p 9888 -l | php sflow.php
defining AS-SETs to MAC matching
loading the IRR data into memory.
collecting flow data.....
Packet didnt match irr:
Source: 192.168.1.23,
Destination:104.16.23.235,
MAC:0ca4029f756a,
IRR SET:AS-SKYNETBE
IXP anti Spoofer
● Script does several things:
○ Takes input of ARP table from your router (as a text file)
○ Downloads that ASN’s IRR set with bgpq3 and aggregate
with aggregate/aggregate6 (manual step)
○ Receives sflow packets in text format from sflowtool
(https://github.com/sflow/sflowtool)
○ Matches MAC address to IRR set and checks if IP address
is member of IRR set.
● Code is here: https://github.com/tpaseka/IXPantiSpoofer
sflowtool + my awful PHP = IXPantiSpoofer
# sflowtool -p 9888 -l | php sflow.php
defining AS-SETs to MAC matching
loading the IRR data into memory.
collecting flow data.....
Packet didnt match irr:
Source: 192.168.1.23,
Destination:104.16.23.235,
MAC:0ca4029f756a,
IRR SET:AS-SKYNETBE
Make it better!
● Improve detection of spoofing.
● Code it properly, re-implement away from PHP
● Make it faster!
● Use better libraries (hint:
https://github.com/job/aggregate6 <3 Job)
● Collect metrics, draw pretty graphs
● IRR data isn’t 100%, but it's a first step.
Make it better!
● Get Cisco to support MAC address fields in
NetFlow v9
● Get Juniper to support MAC address fields
in IPFIX/jflow
● Can’t reiterate the above enough
● Please add this support!
Make it better!
Dear Cisco Juniper Other __________,
I require your software to support the following
feature(s)
MAC data in IPFIX/jflow/NetFlow v9/10
traceroute: IPv6 traceroute with as-number-lookup not
supported yet (Juniper ER: ER 28631)
These features are business requirements needed for me to
operate your product.
Make it better!
● Convince an IXP to run it!
● Huge value to report on spoofed traffic
● IXPs can help to alert members of
misconfiguration for spoofing
● For malicious members, these can be
stopped / isolated / disconnected
● Internet becomes a little bit better.
Make it better!
● I can already hear the IXPs saying “what
about privacy?!”
● This can be done in preprocessing, you
already process flow frames and this can
be added
● What might it look like?
Make it better!
<grafana of IXP traffic>
Make it better!
● Why stop here?
● IXPs can do further to help their members
● Further than source detection, look at
destination detection
● Transit-detection? See if someone is
sending a default to your port for free
transit.
Summary
● Data is easy to collect and available in many
cases already.
● Detection is simple.
● Identifying and stopping the source of spoofing
greatly improves the internet for everyone.
● IXPs might be able to offer better products too!
Questions ? Criticisms ? General Banter?
Thank you!

More Related Content

PPTX
FastNetMon Advanced DDoS detection tool
PDF
Things I wish I had known about IPv6 before I started
DOCX
CCNP Quizzes
PDF
Orchestrating Shared Networks, Physical Load Balancer and DNS on CloudStack
PPTX
DeiC DDoS Prevention System - DDPS
PDF
Jon Nield FastNetMon
PDF
Protect your edge BGP security made simple
RTF
More Information
FastNetMon Advanced DDoS detection tool
Things I wish I had known about IPv6 before I started
CCNP Quizzes
Orchestrating Shared Networks, Physical Load Balancer and DNS on CloudStack
DeiC DDoS Prevention System - DDPS
Jon Nield FastNetMon
Protect your edge BGP security made simple
More Information

What's hot (19)

PPT
flowspec @ APF 2013
ODP
pfSense presentation
PDF
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
PDF
FastNetMonを試してみた
PDF
Api world apache nifi 101
PPTX
Vandyke SecureCRT tips and tricks
PDF
OSMC 2018 | SLA Monitoring mit Icinga & Prometheus by Moritz Tanzer
PDF
Introduction to OverTheBox
PDF
NFD9 - Dinesh Dutt, Data Center Architectures
PDF
Using apache mx net in production deep learning streaming pipelines
PPTX
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
PDF
Software Networking and Interfaces on Linux
PPT
Netflow slides
PDF
Successes and Challenges of IPv6 Transition at APNIC
PPTX
Implementing Telematic Services
PDF
Implementing BGP Flowspec at IP transit network
PDF
Using the FLaNK Stack for edge ai (apache mxnet, apache flink, apache nifi, a...
PDF
Dreamhost deploying dreamcompute at scale
DOCX
Packet Tracer: Nat protocol
flowspec @ APF 2013
pfSense presentation
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
FastNetMonを試してみた
Api world apache nifi 101
Vandyke SecureCRT tips and tricks
OSMC 2018 | SLA Monitoring mit Icinga & Prometheus by Moritz Tanzer
Introduction to OverTheBox
NFD9 - Dinesh Dutt, Data Center Architectures
Using apache mx net in production deep learning streaming pipelines
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
Software Networking and Interfaces on Linux
Netflow slides
Successes and Challenges of IPv6 Transition at APNIC
Implementing Telematic Services
Implementing BGP Flowspec at IP transit network
Using the FLaNK Stack for edge ai (apache mxnet, apache flink, apache nifi, a...
Dreamhost deploying dreamcompute at scale
Packet Tracer: Nat protocol
Ad

Similar to Detecting Spoofing at IXPs (20)

PDF
DDos, Peering, Automation and more
PDF
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?
PDF
IoT Edge Data Processing with NVidia Jetson Nano oct 3 2019
PDF
PLNOG14: Waltzing on that gentle trade‐off between internet routes and FIB sp...
PDF
DIY Netflow Data Analytic with ELK Stack by CL Lee
PDF
Ipv6 tutorial
PDF
Ipv6 tutorial
PDF
Scala for Everything: From Frontend to Backend Applications - Scala Matsuri 2020
PPTX
ARIN 34 IPv6 IAB/IETF Activities Report
PPTX
How to Configure NetFlow v5 & v9 on Cisco Routers
PDF
Model driven telemetry
PPTX
Network Automation - Interconnection tools
PDF
The advantages of Arista/OVH configurations, and the technologies behind buil...
PDF
DBCC 2021 - FLiP Stack for Cloud Data Lakes
PDF
Kamailio - SIP Servers Everywhere
PPT
I pv6 mrtg_20111025
PPTX
Tracking Crime as It Occurs with Apache Phoenix, Apache HBase and Apache NiFi
PDF
Martin Zeiser, Universal Pwn n Play - pacsec -final
PDF
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
DDos, Peering, Automation and more
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?
IoT Edge Data Processing with NVidia Jetson Nano oct 3 2019
PLNOG14: Waltzing on that gentle trade‐off between internet routes and FIB sp...
DIY Netflow Data Analytic with ELK Stack by CL Lee
Ipv6 tutorial
Ipv6 tutorial
Scala for Everything: From Frontend to Backend Applications - Scala Matsuri 2020
ARIN 34 IPv6 IAB/IETF Activities Report
How to Configure NetFlow v5 & v9 on Cisco Routers
Model driven telemetry
Network Automation - Interconnection tools
The advantages of Arista/OVH configurations, and the technologies behind buil...
DBCC 2021 - FLiP Stack for Cloud Data Lakes
Kamailio - SIP Servers Everywhere
I pv6 mrtg_20111025
Tracking Crime as It Occurs with Apache Phoenix, Apache HBase and Apache NiFi
Martin Zeiser, Universal Pwn n Play - pacsec -final
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
Ad

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
DNSSEC Made Easy, presented at PHNOG 2025
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
PDF
The Internet - By the numbers, presented at npNOG 11
PDF
Transmission Control Protocol (TCP) and Starlink
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
PDF
Make DDoS expensive for the threat actors
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
APNIC Report, presented at APAN 60 by Thy Boskovic
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
Triggering QUIC, presented by Geoff Huston at IETF 123
DNSSEC Made Easy, presented at PHNOG 2025
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
IPv6 Deployment and Best Practices, presented by Makito Lay
Cleaning up your RPKI invalids, presented at PacNOG 35
The Internet - By the numbers, presented at npNOG 11
Transmission Control Protocol (TCP) and Starlink
DDoS in India, presented at INNOG 8 by Dave Phelan
Global Networking Trends, presented at the India ISP Conclave 2025
Make DDoS expensive for the threat actors
Fast Reroute in SR-MPLS, presented at bdNOG 19
DDos Mitigation Strategie, presented at bdNOG 19
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Measuring Starlink Protocol Performance, presented at LACNIC 43

Recently uploaded (20)

PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Funds Management Learning Material for Beg
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPT
tcp ip networks nd ip layering assotred slides
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
innovation process that make everything different.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
DOCX
Unit-3 cyber security network security of internet system
PPTX
Internet___Basics___Styled_ presentation
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
Tenda Login Guide: Access Your Router in 5 Easy Steps
An introduction to the IFRS (ISSB) Stndards.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Funds Management Learning Material for Beg
Design_with_Watersergyerge45hrbgre4top (1).ppt
tcp ip networks nd ip layering assotred slides
presentation_pfe-universite-molay-seltan.pptx
Sims 4 Historia para lo sims 4 para jugar
Paper PDF World Game (s) Great Redesign.pdf
innovation process that make everything different.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
SASE Traffic Flow - ZTNA Connector-1.pdf
Decoding a Decade: 10 Years of Applied CTI Discipline
Unit-3 cyber security network security of internet system
Internet___Basics___Styled_ presentation
Slides PDF The World Game (s) Eco Economic Epochs.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Introuction about ICD -10 and ICD-11 PPT.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
Unit-1 introduction to cyber security discuss about how to secure a system

Detecting Spoofing at IXPs

  • 1. Detecting Spoofing at IXPs APRICOT 2018 Tom Paseka
  • 2. About Cloudflare Cloudflare makes websites faster and safer using our globally distributed network to deliver essential services to any website ● Performance ● Content ● Optimisation ● Security ● 3rd party services ● Analytics
  • 3. Some numbers... ● 100+ PoPs ● 50+ Countries ● 150+ Internet exchanges ● >400bn Web requests a day ~10% of all web requests ● Regular DDoS attacks larger than 500Gbps, 300M PPS
  • 5. Spoofing? ● A very small request becomes a very big attack ● Lots of focus on fixing the applications causing the spoofing. ○ Not much on fixing the source of spoofing Some of the projects: ● openntpproject.org ● openresolverproject.org ● bcp38.info
  • 6. Spoofed Attacks - History that we’ve seen When Nickname Type Volume 2011 SNMP Amp SNMP Amplification / Reflection 80Gbps 2013 Spamhaus DNS Amplification / Reflection 300Gbps 2014 "Winter of Attacks" Direct 400Gbps 2015 NTP Amp NTP Amplification / Reflection 400Gbps+ 2016 IoT Direct 500Gbps+
  • 7. Why does this matter?
  • 9. Why does spoofing matter? •This is my good friend Walt Wollny •Let’s say, he was assaulted, but it was by masked assailant •Without removing the mask, there can’t be legal retribution •Without attribution, there can be no discussion!
  • 11. Detecting Spoofing? ● Detecting spoofing can be challenging ● uRPF? ● Some Diagrams:
  • 12. Where did the attack come from?
  • 13. Where did the attack come from?
  • 14. Detecting Spoofing ● Using flow (net, s, j, etc) it's easy to record incoming interface ● Simple logic can determine if it’s spoofed: An interface connected a hosting provider is highly unlikely to have traffic from Google IPs.
  • 15. How about at an IXP?
  • 16. How about at an IXP?
  • 17. How about an IXP? ● OK, We can see the source interface on our router, but there are hundreds of possible sources on the other side. ● MAC addresses!
  • 18. Enter some basic scripting!
  • 19. sflowtool + my PHP = IXPantiSpoofer # sflowtool -p 9888 -l | php sflow.php defining AS-SETs to MAC matching loading the IRR data into memory. collecting flow data..... Packet didnt match irr: Source: 192.168.1.23, Destination:104.16.23.235, MAC:0ca4029f756a, IRR SET:AS-SKYNETBE
  • 20. IXP anti Spoofer ● Script does several things: ○ Takes input of ARP table from your router (as a text file) ○ Downloads that ASN’s IRR set with bgpq3 and aggregate with aggregate/aggregate6 (manual step) ○ Receives sflow packets in text format from sflowtool (https://github.com/sflow/sflowtool) ○ Matches MAC address to IRR set and checks if IP address is member of IRR set. ● Code is here: https://github.com/tpaseka/IXPantiSpoofer
  • 21. sflowtool + my awful PHP = IXPantiSpoofer # sflowtool -p 9888 -l | php sflow.php defining AS-SETs to MAC matching loading the IRR data into memory. collecting flow data..... Packet didnt match irr: Source: 192.168.1.23, Destination:104.16.23.235, MAC:0ca4029f756a, IRR SET:AS-SKYNETBE
  • 22. Make it better! ● Improve detection of spoofing. ● Code it properly, re-implement away from PHP ● Make it faster! ● Use better libraries (hint: https://github.com/job/aggregate6 <3 Job) ● Collect metrics, draw pretty graphs ● IRR data isn’t 100%, but it's a first step.
  • 23. Make it better! ● Get Cisco to support MAC address fields in NetFlow v9 ● Get Juniper to support MAC address fields in IPFIX/jflow ● Can’t reiterate the above enough ● Please add this support!
  • 24. Make it better! Dear Cisco Juniper Other __________, I require your software to support the following feature(s) MAC data in IPFIX/jflow/NetFlow v9/10 traceroute: IPv6 traceroute with as-number-lookup not supported yet (Juniper ER: ER 28631) These features are business requirements needed for me to operate your product.
  • 25. Make it better! ● Convince an IXP to run it! ● Huge value to report on spoofed traffic ● IXPs can help to alert members of misconfiguration for spoofing ● For malicious members, these can be stopped / isolated / disconnected ● Internet becomes a little bit better.
  • 26. Make it better! ● I can already hear the IXPs saying “what about privacy?!” ● This can be done in preprocessing, you already process flow frames and this can be added ● What might it look like?
  • 27. Make it better! <grafana of IXP traffic>
  • 28. Make it better! ● Why stop here? ● IXPs can do further to help their members ● Further than source detection, look at destination detection ● Transit-detection? See if someone is sending a default to your port for free transit.
  • 29. Summary ● Data is easy to collect and available in many cases already. ● Detection is simple. ● Identifying and stopping the source of spoofing greatly improves the internet for everyone. ● IXPs might be able to offer better products too!
  • 30. Questions ? Criticisms ? General Banter?