SlideShare a Scribd company logo
4
Most read
7
Most read
11
Most read
MPLS : Hacking & Security Myth of The Beast In
Core Telecommunication Network
gcsf@nowhere
WHY?
 TELCO Technology? Industry, Community, Academic?
 Ask Others to also share their high quality research
 Taking Indonesian Hacking Scene to The Higher Level
(?)
MPLS?
 MPLS is routing mechanism in high-performance
network backbone
 Route the data traffic from a node to the next node
based on short path labels
 Avoiding complex forwarding mechanism in routing
table
 Operate in between layer 2 and layer 3 (OSI model),
taking advantage on the layer 2 switching performance
and layer 3 routing scalability
 MPLS Architecture is very well written on RFC 3031
MPLS Terminology?
 Label Distribution Protocol (LDP)
 Label Switched Path (LSP)
 Label Switching Router (LSR)
 Label Edge Router (LER) / MPLS Edge Node
 Virtual Routing & Forwarding (VRF)
 CE/PE/P Router
 MORE? (We only describe terminology used in this
document)
MPLS In Simple
MPLS Usage
 Virtual Private Routed Network (VPRN) – L3VPN
 Virtual Private LAN Service (VPLS) – L2VPN
 Virtual Leased Line (VLL)
 Traffic Engineering
 In order to limit this presentation, we will only discuss
L3VPN
MPLS In Broadband Network
Myth - MPLS Hacking & Security?
 Provider Edge (PE) router
 Encryption support
 Traffic Sniffing
 MPLS Label
 Label Distribution Protocol
 Border Gateway Protocol
REFERENCE : ERNW.DE
PE Router
• Usually to be shared among customers
• Multiple CE router from multiple customers is
connected to the single PE router
• Still, the security relies on the trust model of provider
private network
• Missing configuration of PE router? (E.G: Mgmt Access)
• A customer sending crafted packet to PE to deny
services
Encryption Support
 MPLS doesn’t provide encryption mechanism
 Encryption of traffic in core telco relies on the
encryption mechanism of higher OSI level
 The security relies on the trust model of provider
private network
 There are some appliance that can be used to help the
traffic encryption (Eg: SafeNet, Senetas)
 IPSEC over MPLS?
Traffic Sniffing?
 P/PE Router?
 Remember, by default no encryption support!
 Cisco Embeded Packet Capture (EPC)
 Cisco “debug packet” with hiden option “dump”
 Juniper “set forwarding-options packet-capture”
 Port Mirroring is commonly used
 Appliance is also commonly used (E.g: VSS, NetOptics)
 DPI? LI?
Network Tapping
DPI Device
Encryption
MPLS Label
• Injection of labeled traffic from customer CE router
– RFC 2547, labeled traffic from non trusted sources must be
discarded
• Injection of labeled traffic from Internet
– Again RFC 2547, labeled traffic from non trusted sources must
be discarded
• MPLS label rewriting in MPLS backbone
– Possible, can be reproduced in the Lab, hard (impossible?) to
implement in the real backbone
MPLS Label Rewrite
 MPLS, as previously stated, use label to forward traffic
 VRF “Black” & “Blue” in PE, store routing table virtually separated, hence overlap
network between Bank “Black” & Bank “Blue” can be forwarded correctly
 Bank “Black” can only communicate with Bank “Black” using VRF Black
 Bank “Blue” can only communicate with Bank “Blue” using VRF Black
MPLS Label Rewrite
 Someone in “Man In The Middle” position between
PE1 & PE2 can rewrite the MPLS Label
 Whoever they are, they can redirect traffic so Bank
“Black” can communicate with Bank “Blue”
 Bank “Black” has overlap network
with Bank “Blue”
 Hence, VRF “Black” and “Blue” has
same routing entry
 Attacker change label for traffic PE1
to PE2 with 21 & PE2 to PE1 with 15
(see table)
 PE2 only know that traffic from PE1
with label 21 is for Bank “Blue”
 PE1 only know that traffic from PE2
with label 15 is for Bank “Black”
 Bank “Black” can communicate with
Bank “Blue”
 Reproduce in lab, hard (impossible?)
in real MPLS network
Label Distribution Protocol
• Protocol used by MPLS routers to exchange label mapping information
• UDP 646 for Hello, TCP 646 for establishing LDP Session
• Two MPLS routers that established LDP session called LDP Peers
• Exchange of information (advertisement) is bi-directional between LDP
Peers
• Very well documented on RFC 5036
LDP Session Establishment (SRC: Wikipedia)
 Discovery Message
 Session Message
 Advertisement Message
 Notification Message
LDP Message Injection
• LDP is used to maintain LSP databases that are used to
forward traffic through MPLS Network
• How if someone can inject label mapping message to LSR?
• Attacker needs access to the MPLS backbone so he can:
1. Announce & maintain the presence of LSR (Hello/Discovery
Message)
2. Establish & maintain LDP session (Session Message)
3. Send advertisement with label mapping message & change label
database to redirect the traffic 
• Again, hard (impossible?) in real MPLS network but can be
reproduced in lab with specific conditions/requirements
Border Gateway Protocol
• MP-BGP, in MPLS network, usually runs between PE router
• It is used to route network which their routing table is in
VRF
• Attacker needs access to MPLS backbone either for:
– Intercept & tamper initial MP-BGP exchange OR
– Withdraw routes & insert new one (BGP Update with spoofed NLRI)
• Again, hard (impossible?) in real MPLS network but can be
reproduced in lab with specific conditions/requirements
AN EXAMPLE
PROVIDED BY LOKI PROJECT/ERNW.DE
 MPLS (We Only Use This For The Document)
◦ LDP, MPLS Label Rewrite
 ROUTING
◦ RIP, OSPF, EIGRP, BGP
 HOT-STANDBY
◦ HSRP, HSRPv2, BFD, VRRP, VRRPv3
 ARP
 Spoofing, MAC Flooding
 ICMPv6
 DOT1Q
 TCP-MD5
DEMO
DEMO TOPOLOGY
DISCUSSION?! Q & A
THANK YOU 

More Related Content

PDF
VLAN on mikrotik
Achmad Mardiansyah
 
PDF
Network Access Control (NAC)
Forescout Technologies Inc
 
PDF
Protocole IKE/IPsec
Thomas Moegli
 
PPTX
présentation sur le vpn
Manuel Cédric EBODE MBALLA
 
PPTX
WLAN Attacks and Protection
Chandrak Trivedi
 
PPT
Palo alto networks next generation firewalls
Castleforce
 
VLAN on mikrotik
Achmad Mardiansyah
 
Network Access Control (NAC)
Forescout Technologies Inc
 
Protocole IKE/IPsec
Thomas Moegli
 
présentation sur le vpn
Manuel Cédric EBODE MBALLA
 
WLAN Attacks and Protection
Chandrak Trivedi
 
Palo alto networks next generation firewalls
Castleforce
 

What's hot (20)

PPT
4 protocole de redondance(hsrp-vrrp-glbp)
medalaa
 
PDF
ISP load balancing with mikrotik nth
Achmad Mardiansyah
 
PDF
Mikrotik Network Simulator (MUM Presentation Material 2013)
Rofiq Fauzi
 
PDF
Blockchain : révolution ou évolution ?
Nicolas Marchand
 
DOC
Basic command to configure mikrotik
Tola LENG
 
PPT
Fortinet
Petre-doru Dragus
 
PPTX
Fortinet sandboxing
Nick Straughan
 
PDF
OpenStack Architecture
Mirantis
 
PPT
Fortigate Training
NCS Computech Ltd.
 
PDF
Palo alto-review
Rayan Darine
 
PPTX
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
NetProtocol Xpert
 
PDF
ClearPass 6.3.6 Release Notes
Aruba, a Hewlett Packard Enterprise company
 
PDF
Introduction to Filecoin
Vanessa Lošić
 
PDF
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Cisco Canada
 
PPTX
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
PDF
17 palo alto threat prevention concept
Mostafa El Lathy
 
PPTX
SD WAN
Bri Molina
 
PPTX
Understanding NMAP
Phannarith Ou, G-CISO
 
PDF
VPN NOMADE AVEC AUTHENTIFICATIO AD SOUS ROUTEUR CISCO
Manassé Achim kpaya
 
PPT
Ccnp securite vpn
sara ousaoud
 
4 protocole de redondance(hsrp-vrrp-glbp)
medalaa
 
ISP load balancing with mikrotik nth
Achmad Mardiansyah
 
Mikrotik Network Simulator (MUM Presentation Material 2013)
Rofiq Fauzi
 
Blockchain : révolution ou évolution ?
Nicolas Marchand
 
Basic command to configure mikrotik
Tola LENG
 
Fortinet sandboxing
Nick Straughan
 
OpenStack Architecture
Mirantis
 
Fortigate Training
NCS Computech Ltd.
 
Palo alto-review
Rayan Darine
 
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
NetProtocol Xpert
 
ClearPass 6.3.6 Release Notes
Aruba, a Hewlett Packard Enterprise company
 
Introduction to Filecoin
Vanessa Lošić
 
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Cisco Canada
 
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
17 palo alto threat prevention concept
Mostafa El Lathy
 
SD WAN
Bri Molina
 
Understanding NMAP
Phannarith Ou, G-CISO
 
VPN NOMADE AVEC AUTHENTIFICATIO AD SOUS ROUTEUR CISCO
Manassé Achim kpaya
 
Ccnp securite vpn
sara ousaoud
 

Similar to Mpls hacking security Myth (20)

PPT
Mpls
rahulvce07
 
PDF
MPLS Presentation
Unni Kannan VijayaKumar
 
PDF
MPLS Lecture1(H)-102020.pdf
MulugetaTsehay1
 
PPT
Mpls Services
Kristof De Brouwer
 
PPT
Mpls Traffic Engineering ppt
Nitin Gehlot
 
PPT
MPLS-extra.ppt
SidharthSharma546629
 
PDF
Georgi Geshev, warranty void if label removed
PacSecJP
 
PPT
yun-MPLS.ppt
ssuserd0c720
 
PPT
Multi protocol label switching basics tutorial for beginners.ppt
samuela24
 
PPT
yun-MPLSDASDFETGREGRTRRETRETRERTDFGDFG.ppt
ajaiesg
 
PDF
[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS Networks
G. Geshev
 
PDF
MPLS Deployment Chapter 1 - Basic
Ericsson
 
PPTX
An introduction to MPLS networks and applications
Shawn Zandi
 
PDF
QOS of MPLS
IOSR Journals
 
PDF
J010136172
IOSR Journals
 
PPTX
Mpls
arbhatawdekar
 
PDF
mpls-lecture.pdf
YagneshDodiya2
 
PDF
VPN Using MPLS Technique
Ahmad Atta
 
PPTX
Multiprotocol label switching (mpls) - Networkshop44
Jisc
 
MPLS Presentation
Unni Kannan VijayaKumar
 
MPLS Lecture1(H)-102020.pdf
MulugetaTsehay1
 
Mpls Services
Kristof De Brouwer
 
Mpls Traffic Engineering ppt
Nitin Gehlot
 
MPLS-extra.ppt
SidharthSharma546629
 
Georgi Geshev, warranty void if label removed
PacSecJP
 
yun-MPLS.ppt
ssuserd0c720
 
Multi protocol label switching basics tutorial for beginners.ppt
samuela24
 
yun-MPLSDASDFETGREGRTRRETRETRERTDFGDFG.ppt
ajaiesg
 
[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS Networks
G. Geshev
 
MPLS Deployment Chapter 1 - Basic
Ericsson
 
An introduction to MPLS networks and applications
Shawn Zandi
 
QOS of MPLS
IOSR Journals
 
J010136172
IOSR Journals
 
mpls-lecture.pdf
YagneshDodiya2
 
VPN Using MPLS Technique
Ahmad Atta
 
Multiprotocol label switching (mpls) - Networkshop44
Jisc
 

More from idsecconf (20)

PDF
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
idsecconf
 
PDF
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnera...
idsecconf
 
PDF
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requiremen...
idsecconf
 
PDF
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendara...
idsecconf
 
PDF
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber den...
idsecconf
 
PDF
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf
idsecconf
 
PDF
IDSECCONF2024 - Muhammad Dwison - The Implementation Of One Pixel Attack To S...
idsecconf
 
PDF
IDSECCONF2024 - Kang Ali - Local LLM can Simulate Apt Malware With Jailbreak ...
idsecconf
 
PDF
IDSECCONF2024 - Brian Nasywa - Comparison of Quantum Key Distribution Protoco...
idsecconf
 
PDF
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf
 
PDF
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf
 
PDF
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf
 
PDF
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf
 
PDF
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf
 
PDF
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf
 
PDF
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf
 
PDF
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
idsecconf
 
PDF
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
idsecconf
 
PDF
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
idsecconf
 
PDF
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
idsecconf
 
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
idsecconf
 
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnera...
idsecconf
 
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requiremen...
idsecconf
 
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendara...
idsecconf
 
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber den...
idsecconf
 
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf
idsecconf
 
IDSECCONF2024 - Muhammad Dwison - The Implementation Of One Pixel Attack To S...
idsecconf
 
IDSECCONF2024 - Kang Ali - Local LLM can Simulate Apt Malware With Jailbreak ...
idsecconf
 
IDSECCONF2024 - Brian Nasywa - Comparison of Quantum Key Distribution Protoco...
idsecconf
 
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
idsecconf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
idsecconf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
idsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
idsecconf
 

Recently uploaded (20)

PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
Software Development Company | KodekX
KodekX
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Architecture of the Future (09152021)
EdwardMeyman
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Software Development Methodologies in 2025
KodekX
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Software Development Company | KodekX
KodekX
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
This slide provides an overview Technology
mineshkharadi333
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Architecture of the Future (09152021)
EdwardMeyman
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Software Development Methodologies in 2025
KodekX
 

Mpls hacking security Myth

  • 1. MPLS : Hacking & Security Myth of The Beast In Core Telecommunication Network gcsf@nowhere
  • 2. WHY?  TELCO Technology? Industry, Community, Academic?  Ask Others to also share their high quality research  Taking Indonesian Hacking Scene to The Higher Level (?)
  • 3. MPLS?  MPLS is routing mechanism in high-performance network backbone  Route the data traffic from a node to the next node based on short path labels  Avoiding complex forwarding mechanism in routing table  Operate in between layer 2 and layer 3 (OSI model), taking advantage on the layer 2 switching performance and layer 3 routing scalability  MPLS Architecture is very well written on RFC 3031
  • 4. MPLS Terminology?  Label Distribution Protocol (LDP)  Label Switched Path (LSP)  Label Switching Router (LSR)  Label Edge Router (LER) / MPLS Edge Node  Virtual Routing & Forwarding (VRF)  CE/PE/P Router  MORE? (We only describe terminology used in this document)
  • 6. MPLS Usage  Virtual Private Routed Network (VPRN) – L3VPN  Virtual Private LAN Service (VPLS) – L2VPN  Virtual Leased Line (VLL)  Traffic Engineering  In order to limit this presentation, we will only discuss L3VPN
  • 8. Myth - MPLS Hacking & Security?  Provider Edge (PE) router  Encryption support  Traffic Sniffing  MPLS Label  Label Distribution Protocol  Border Gateway Protocol REFERENCE : ERNW.DE
  • 9. PE Router • Usually to be shared among customers • Multiple CE router from multiple customers is connected to the single PE router • Still, the security relies on the trust model of provider private network • Missing configuration of PE router? (E.G: Mgmt Access) • A customer sending crafted packet to PE to deny services
  • 10. Encryption Support  MPLS doesn’t provide encryption mechanism  Encryption of traffic in core telco relies on the encryption mechanism of higher OSI level  The security relies on the trust model of provider private network  There are some appliance that can be used to help the traffic encryption (Eg: SafeNet, Senetas)  IPSEC over MPLS?
  • 11. Traffic Sniffing?  P/PE Router?  Remember, by default no encryption support!  Cisco Embeded Packet Capture (EPC)  Cisco “debug packet” with hiden option “dump”  Juniper “set forwarding-options packet-capture”  Port Mirroring is commonly used  Appliance is also commonly used (E.g: VSS, NetOptics)  DPI? LI?
  • 13. MPLS Label • Injection of labeled traffic from customer CE router – RFC 2547, labeled traffic from non trusted sources must be discarded • Injection of labeled traffic from Internet – Again RFC 2547, labeled traffic from non trusted sources must be discarded • MPLS label rewriting in MPLS backbone – Possible, can be reproduced in the Lab, hard (impossible?) to implement in the real backbone
  • 14. MPLS Label Rewrite  MPLS, as previously stated, use label to forward traffic  VRF “Black” & “Blue” in PE, store routing table virtually separated, hence overlap network between Bank “Black” & Bank “Blue” can be forwarded correctly  Bank “Black” can only communicate with Bank “Black” using VRF Black  Bank “Blue” can only communicate with Bank “Blue” using VRF Black
  • 15. MPLS Label Rewrite  Someone in “Man In The Middle” position between PE1 & PE2 can rewrite the MPLS Label  Whoever they are, they can redirect traffic so Bank “Black” can communicate with Bank “Blue”  Bank “Black” has overlap network with Bank “Blue”  Hence, VRF “Black” and “Blue” has same routing entry  Attacker change label for traffic PE1 to PE2 with 21 & PE2 to PE1 with 15 (see table)  PE2 only know that traffic from PE1 with label 21 is for Bank “Blue”  PE1 only know that traffic from PE2 with label 15 is for Bank “Black”  Bank “Black” can communicate with Bank “Blue”  Reproduce in lab, hard (impossible?) in real MPLS network
  • 16. Label Distribution Protocol • Protocol used by MPLS routers to exchange label mapping information • UDP 646 for Hello, TCP 646 for establishing LDP Session • Two MPLS routers that established LDP session called LDP Peers • Exchange of information (advertisement) is bi-directional between LDP Peers • Very well documented on RFC 5036 LDP Session Establishment (SRC: Wikipedia)  Discovery Message  Session Message  Advertisement Message  Notification Message
  • 17. LDP Message Injection • LDP is used to maintain LSP databases that are used to forward traffic through MPLS Network • How if someone can inject label mapping message to LSR? • Attacker needs access to the MPLS backbone so he can: 1. Announce & maintain the presence of LSR (Hello/Discovery Message) 2. Establish & maintain LDP session (Session Message) 3. Send advertisement with label mapping message & change label database to redirect the traffic  • Again, hard (impossible?) in real MPLS network but can be reproduced in lab with specific conditions/requirements
  • 18. Border Gateway Protocol • MP-BGP, in MPLS network, usually runs between PE router • It is used to route network which their routing table is in VRF • Attacker needs access to MPLS backbone either for: – Intercept & tamper initial MP-BGP exchange OR – Withdraw routes & insert new one (BGP Update with spoofed NLRI) • Again, hard (impossible?) in real MPLS network but can be reproduced in lab with specific conditions/requirements
  • 19. AN EXAMPLE PROVIDED BY LOKI PROJECT/ERNW.DE  MPLS (We Only Use This For The Document) ◦ LDP, MPLS Label Rewrite  ROUTING ◦ RIP, OSPF, EIGRP, BGP  HOT-STANDBY ◦ HSRP, HSRPv2, BFD, VRRP, VRRPv3  ARP  Spoofing, MAC Flooding  ICMPv6  DOT1Q  TCP-MD5
  • 20. DEMO