<videovortex> news.com: How Pakistan knocked YouTube offline
Geert Lovink
geert at xs4all.nl
Tue Feb 26 11:03:11 CET 2008
How Pakistan knocked YouTube offline (and how to make sure it never
happens again)
Posted by Declan McCullagh | 17 comments
http://www.news.com/8301-10784_3-9878655-7.html?tag=nl.e498
The graph that network-monitoring firm Keynote Systems provided to us
shows the worldwide availability of YouTube.com dropping dramatically
from 100 percent to 0 percent for over an hour. It didn't recover
completely until two hours had elapsed. (Credit: Keynote Systems)
A high-profile incident this weekend in which Pakistan's state-owned
telecommunications company managed to cut YouTube off the global Web
highlights a long-standing security weakness in the way the Internet is
managed.
After receiving a censorship order from the telecommunications ministry
directing that YouTube.com be blocked, Pakistan Telecom went even
further. By accident or design, the company broadcast instructions
worldwide claiming to be the legitimate destination for anyone trying
to reach YouTube's range of Internet addresses.
The security weakness lies in why those false instructions, which took
YouTube offline for two hours on Sunday, were believed by routers
around the globe. That's because Hong Kong-based PCCW, which provides
the Internet link to Pakistan Telecom, did not stop the misleading
broadcast--which is what most large providers in the United States and
Europe do.
This is not a new problem. A network provider in Turkey once pretended
to be the entire Internet, snarling traffic and making many Web sites
unreachable. Con Edison accidentally hijacked the Internet addresses
for Panix customers including Martha Stuart Living Omnimedia and the
New York Daily News. Problems with errant broadcasts go back as far as
1997.
It's also not an infrequent problem. An automatically-updated list of
suspicious broadcasts created by Josh Karlin of the University of New
Mexico shows apparent mischief--in the form of dubious claims to be the
true destination for certain Internet addresses--taking place on an
hourly basis.
So why hasn't anyone done something about it? False broadcasts can
amount to a denial-of-service attack and, if done with malicious
intent, can send unsuspecting users to a fake bank, merchant, or credit
card site.
To understand why this is both a serious Internet vulnerability and
also difficult to fix requires delving into the technical details a
little.
How to pretend to be YouTube.com
When you type a domain like "news.com" into your Web browser, it uses
the Domain Name System to cough up a numeric Internet address, which in
our case is 216.239.113.101. That IP address is handed to your router,
which uses a table of addresses to figure out the next hop toward the
news.com server.
Network providers--called autonomous systems, or ASs--broadcast the
ranges of IP addresses to which they'll provide access. One of the
functions of the Internet Corporation for Assigned Names and Numbers is
managing the master list of AS numbers, which it does by allocating
large blocks of 1,000 or so at a time to regional address registries.
Kim Davies, ICANN's manager of route zone services, says ICANN isn't
able to revoke the AS number of a misbehaving network provider. "It's
best to think of them as similar to post codes or ZIP codes," Davies
said. "We maintain a registry of them to ensure that they aren't
conflicting."
If the address information provided by AS is reliable, all is well. But
if an AS makes a false broadcast, because of a configuration mistake or
for malicious reasons, all hell can break loose.
This is what happened with YouTube, which Pakistan's government ordered
blocked because of offensive material, apparently a video depicting the
cartoons about Muhammad that had been posted in a Danish newspaper.
Some reports have said the video featured several minutes of a film
made by Dutch politician Geert Wilders, an outspoken critic of Islam.
A spokesman for the Pakistani embassy said on Monday that the order to
block access to YouTube came from the highest levels of the government.
It would have been passed along to Pakistan's Electronic Media
Regulatory Authority and then to Pakistan's telecom authority, the
spokesman said, which in turn would have issued the formal order to the
Internet providers.
Pakistan Telecom responded by broadcasting the false claim that it was
the correct route for 256 addresses in YouTube's 208.65.153.0 network
space. Because that was a more specific destination than the true
broadcast from YouTube saying it was home to 1,024 computers, within a
few minutes traffic started flowing to the wrong place.
A timeline created by Renesys, which provides real-time monitoring
services, says that it took about 15 seconds for large Pacific-rim
providers to direct YouTube.com traffic to the Pakistan ISP, and about
45 seconds for the central routers on much of the rest of the Internet
to follow suit.
YouTube took countermeasures within minutes, first trying to reclaim
its network by narrowing its 1,024 broadcast to 256 addresses. Eleven
minutes later, YouTube added an even more specific additional broadcast
claiming just 64 addresses--which, under the Border Gateway Protocol,
is more specific and therefore should overrule the Pakistani one. Over
two hours after the initial false broadcast, Pakistan Telecom finally
stopped.
How could this have been prevented? First, Pakistan Telecom shouldn't
have broadcast to the entire world that it was hosting YouTube's IP
addresses. Second, Hong Kong-based PCCW could have recognized the
broadcast as false and filtered it out.
An employee of PCCW, who wished to remain anonymous because he is not
authorized to speak for the company, said that as soon as the false
broadcast occurred, PCCW started receiving a flurry of phone calls from
global ISPs wondering what had gone wrong. A YouTube representative
also called.
Even Pakistan Telecom contacted PCCW. "I don't think they understood
what was going on," the employee said. A spokesman for PCCW's U.S.
operations, based in Herndon, Va., declined to provide details.
At the moment, large network providers tend to trust that other network
providers are behaving reasonably--and aren't intentionally trying to
hijack someone else's Internet addresses. And errors that do arise tend
to be fixed quickly by manual intervention.
But as the number of suspicious broadcasts grows, and the potential for
fraud increases, so does the justification for more aggressive
countermeasures. (Besides, some government will eventually order its
network providers to broadcast false information about the Internet
addresses of "offensive" Web sites. We've already seen domain name
blocking in Finland and Web page blocking in the United States, both
supposedly enlightened Western democracies.)
One way to handle this is for network providers to be automatically
notified when the virtual location of an Internet address changes,
which is what some researchers have suggested in the form of a "hijack
alert system." Another is to treat broadcasts with changes of addresses
as suspicious for 24 hours and then accept them as normal. Simple
filtering of broadcasts may not always work because some networks
provide connectivity to customers with thousands of different routes.
Probably the most extensive countermeasure would be a technology like
Secure BGP, which uses encryption to verify which network providers own
Internet addresses and are authorized to broadcast changes. But Secure
BGP has been around in one form or another form since 1998, and is
still not a widely-used standard, mostly because it adds complexity and
routers that understand will add additional cost.
At least that's been the conventional view. A high-profile incident
like YouTube being knocked offline may accelerate this process, said
Steven Bellovin of Columbia University. "I know there are serious
deployment and operational issues," Bellovin said. "The question is
this: When is the pain from routing incidents great enough that we're
forced to act? It would have been nice to have done something before
this, since now all the world's script kiddies have seen what can be
done."
News.com's Greg Sandoval contributed to this report.
More information about the videovortex
mailing list