{"id":952,"date":"2019-06-14T09:55:12","date_gmt":"2019-06-14T07:55:12","guid":{"rendered":"https:\/\/pragma-security.com\/?p=952"},"modified":"2019-07-22T17:02:40","modified_gmt":"2019-07-22T15:02:40","slug":"decryptage-route-leak","status":"publish","type":"post","link":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/","title":{"rendered":"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"952\" class=\"elementor elementor-952\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5a6d3053 elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"5a6d3053\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-35ce7043\" data-id=\"35ce7043\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d6489cd elementor-widget elementor-widget-spacer\" data-id=\"3d6489cd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f27b067 elementor-widget elementor-widget-spacer\" data-id=\"f27b067\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebe9d86 elementor-widget elementor-widget-heading\" data-id=\"ebe9d86\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak)\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f069412 elementor-widget elementor-widget-spacer\" data-id=\"f069412\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7788bfb3 elementor-widget elementor-widget-text-editor\" data-id=\"7788bfb3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Publi\u00e9 le 14 Juin 2019<\/p><p><span style=\"font-weight: 400;\">Le 6 Juin dernier, plusieurs op\u00e9rateurs europ\u00e9ens voyaient une partie de leur trafic impact\u00e9 pendant plusieurs heures en raison d\u2019une fuite de leurs routes. Devenus des incidents r\u00e9seau communs, les <\/span><b><i>route leaks<\/i><\/b><span style=\"font-weight: 400;\"> illustrent bien les failles de l\u2019Internet. Comment les op\u00e9rateurs peuvent-ils r\u00e9duire la r\u00e9currence et l\u2019impact de ces incidents?<\/span><\/p><p><span style=\"font-weight: 400;\">Internet repose sur un maillage de r\u00e9seaux dits autonomes (AS) \u00e0 l\u2019\u00e9chelle mondiale. Chaque AS annonce son trafic au travers du protocole de routage BGP vers l\u2019ensemble des autres AS. Ceux-ci acceptent l\u2019annonce et la retransmettent \u00e0 leur tour. <\/span><\/p><p><span style=\"font-weight: 400;\">A l\u2019heure o\u00f9 le nombre de r\u00e9seaux ainsi que le nombre de routes ne cessent d\u2019augmenter (presque \u00a0800 000 routes \u00e0 ce jour),<\/span><span style=\"font-weight: 400;\"> ce mod\u00e8le d\u2019interd\u00e9pendance apporte son lot de vuln\u00e9rabilit\u00e9s mais aussi d\u2019attaques malveillantes. Par m\u00e9garde, un AS peut provoquer une redirection ill\u00e9gitime du trafic d\u2019un autre AS. Cela entra\u00eene une d\u00e9gradation, voire une interruption des services du r\u00e9seau propri\u00e9taire de ces routes. <\/span><\/p><p><span style=\"font-weight: 400;\">Il peut \u00e9galement s\u2019agir d\u2019un acte volontaire comme dans le cas d\u2019une usurpation de routes (<\/span><b><i>BGP hijack<\/i><\/b><span style=\"font-weight: 400;\">). Cette pratique consiste \u00e0 rediriger les donn\u00e9es d\u2019une entreprise dans le but d\u2019en conna\u00eetre le contenu ou encore d\u2019interrompre temporairement le(s) service(s) de l\u2019entreprise en question. <\/span><\/p><p><span style=\"font-weight: 400;\">Ces incidents sont devenus des \u00e9v\u00e9nements r\u00e9p\u00e9titifs pouvant toucher n\u2019importe quelle entit\u00e9 faisant du routage BGP: fournisseurs de services Internet aussi appel\u00e9 eyeballs dans la terminologie du peering, les fournisseurs de transit (tier-1, tier-2, tier-3), les fournisseurs de contenu (Google, Facebook, Microsoft, AWS, \u00a0etc\u2026) et \u00e9galement les entreprises. <\/span><\/p><p><span style=\"font-weight: 400;\">Nous vous pr\u00e9sentons ci-dessous les principes de fonctionnement de ces fuites de routes ainsi que leurs impacts au niveau de la s\u00e9curit\u00e9 et de la qualit\u00e9 de service.Notre exemple s\u2019inspire de l\u2019\u00e9v\u00e9nement survenu la semaine derni\u00e8re mais reste \u00e0 but p\u00e9dagogique et ne vise en aucun cas \u00e0 d\u00e9finir des responsables. <\/span><\/p><p><span style=\"font-weight: 400;\">Tout d\u2019abord, voyons comment est structur\u00e9 le routage du r\u00e9seau Internet et les diff\u00e9rents types d\u2019acteurs d\u2019un point de vue des relations de voisinage r\u00e9seau (BGP peering):<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e4f3e1 elementor-widget elementor-widget-spacer\" data-id=\"1e4f3e1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6edd7bf elementor-widget elementor-widget-image\" data-id=\"6edd7bf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1981\" height=\"821\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2019\/06\/Sch\u00e9ma-Route-Leak-1.jpg\" class=\"attachment-full size-full wp-image-966\" alt=\"Route Leak\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0b397e elementor-widget elementor-widget-text-editor\" data-id=\"d0b397e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><span style=\"font-weight: 400;\">Le r\u00e9seau de routage de l\u2019Internet est structur\u00e9, aussi bien d\u2019un point de vue technique que commercial, autour de trois types d\u2019acteurs. Tout d\u2019abord, les acteurs de l\u2019acc\u00e8s au service Internet aussi appel\u00e9 Eyeball (terminologie venant du monde des TV broadcasters, ce sont les op\u00e9rateurs qui connectent les utilisateurs du r\u00e9seau), les acteurs du contenu aussi appel\u00e9s \u201ccontent providers\u201d \u00a0(les c\u00e9l\u00e8bres GAFAM faisant partie de cette cat\u00e9gorie) et enfin les transitaires permettant, sch\u00e9matiquement, aux deux acteurs pr\u00e9c\u00e9demment cit\u00e9s d\u2019\u00e9changer du trafic. Il existe une hi\u00e9rarchie entre les transitaires: TIER 1, 2 et 3. Le TIER 1 est le plus gros de ces trois types de transitaire et il se d\u00e9finit comme \u00e9tant autosuffisant pour acc\u00e9der \u00e0 toutes les routes de l\u2019Internet. Il n\u2019ach\u00e8te de transit \u00e0 personne. <\/span><\/p><p><span style=\"font-weight: 400;\">Ce mod\u00e8le historique de l\u2019Internet a \u00e9t\u00e9 s\u00e9rieusement mis \u00e0 mal ces derni\u00e8res ann\u00e9es par l\u2019extension des r\u00e9seaux des acteurs du contenu mais cela est un autre sujet plus commercial et strat\u00e9gique que nous n\u2019abordons pas ici. <\/span><\/p><p><span style=\"font-weight: 400;\">Il ressort de ce d\u00e9coupage des relations de voisinage au sens du routage BGP de l\u2019Internet : relations peer to peer, customer to provider, provider to provider. Ces relations sont d\u00e9finies par des r\u00e8gles techniques et des accords commerciaux. Chaque type de relation impose une ing\u00e9nierie de routage particuli\u00e8re. Cette ing\u00e9nierie est directement li\u00e9e \u00e0 la configuration des \u00e9quipements routeurs de l\u2019acteur en question. Ces r\u00e8gles sont d\u00e9pendantes des \u00e9quipes qui les configurent et peuvent faire l\u2019objet d\u2019erreurs majoritairement involontaires.<\/span><\/p><p><span style=\"font-weight: 400;\">Afin de raccorder son r\u00e9seau \u00e0 l\u2019Internet, il est n\u00e9cessaire de se connecter aux acteurs du transit. Dans ce type de relation, le transitaire annonce toutes les routes de l\u2019Internet et le r\u00e9seau client du transitaire ne doit annoncer que ses propres routes (soit ses propres blocs d\u2019adresses IP).<\/span><\/p><p><span style=\"font-weight: 400;\">Dans une version simplifi\u00e9e, les \u00e9changes de routes entre les protagonistes ressemblent \u00e0 ce sch\u00e9ma :<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a53ed89 elementor-widget elementor-widget-spacer\" data-id=\"a53ed89\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b66e1e6 elementor-widget elementor-widget-image\" data-id=\"b66e1e6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2019\/06\/Relation-peering-AS.jpg\" title=\"Relation-peering-AS\" alt=\"Relations entre les r\u00e9seaux AS - peering et transit IP\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18cb054 elementor-widget elementor-widget-spacer\" data-id=\"18cb054\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-823db9f elementor-widget elementor-widget-text-editor\" data-id=\"823db9f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><span style=\"font-weight: 400;\">Le trafic s\u2019\u00e9coule dans l\u2019Internet conform\u00e9ment aux accords de peering et de transit entre les diff\u00e9rentes parties prenantes. <\/span><\/p><p><span style=\"font-weight: 400;\">Qu\u2019a-t-il pu se passer lors de la fuite de routes du 6 Juin? Il est fort probable qu\u2019une erreur de configuration ou un bug logiciel se soit gliss\u00e9 dans les annonces r\u00e9seau d\u2019un acteur du contenu. Dans notre sch\u00e9ma l\u2019entreprise nomm\u00e9e ENT1. Celui-ci s\u2019est mis \u00e0 annoncer au r\u00e9seau d\u2019un TIER 2 des routes qu\u2019il avait apprises d\u2019autres transitaires. ENT1 a ainsi annonc\u00e9 un certain nombre de routes appartenant aux r\u00e9seaux de EBALL1 et de CTNT1 \u00e0 un transitaire TIER2 devenant ainsi un transitaire pour ces routes. <\/span><\/p><p><span style=\"font-weight: 400;\">Annoncer les routes d\u2019un autre r\u00e9seau que le sien va \u00e0 l\u2019encontre des r\u00e8gles de routage, \u00e0 l\u2019exception des fournisseurs de transit IP. Ces derniers ont la capacit\u00e9 d\u2019annoncer la table compl\u00e8te des destinations de l\u2019Internet.<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4fd8f0 elementor-widget elementor-widget-image\" data-id=\"e4fd8f0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2019\/06\/Route-Leak-\u00e9tape1.jpg\" title=\"Route-Leak-\u00e9tape1\" alt=\"Route Leak - fuite de routes - erreur de configuration BGP\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdb9860 elementor-widget elementor-widget-spacer\" data-id=\"bdb9860\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f013a90 elementor-widget elementor-widget-text-editor\" data-id=\"f013a90\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><span style=\"font-weight: 400;\">Le Tier 2, \u00e0 r\u00e9ception de ces routes, les a accept\u00e9es dans son r\u00e9seau puis les a propag\u00e9es vers les autres r\u00e9seaux avec lesquels il \u00e9change du trafic. Ces routes se sont donc propag\u00e9es vers d\u2019autres acteurs cl\u00e9s de l\u2019Internet : les Tier 1. Il s\u2019agit d\u2019une autre erreur de routage, cette fois-ci dans le r\u00e9seau du Tier 2. Par la suite, ces routes ont visiblement fini par \u00eatre propag\u00e9es par des fournisseurs de la plus haute hi\u00e9rarchie des transitaires, les Tier 1.<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d0ead0 elementor-widget elementor-widget-image\" data-id=\"9d0ead0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2019\/06\/Route-Leak-\u00e9tape2.jpg\" title=\"Route-Leak-\u00e9tape2\" alt=\"Route Leak aka fuite de route BGP\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a98cee1 elementor-widget elementor-widget-spacer\" data-id=\"a98cee1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-407bbcd elementor-widget elementor-widget-text-editor\" data-id=\"407bbcd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><span style=\"font-weight: 400;\">La propagation d\u2019une fuite de routage est donc l\u2019aboutissement d\u2019un encha\u00eenement d\u2019erreurs de configuration et d\u2019un manque de v\u00e9rification de la part de plusieurs r\u00e9seaux.<\/span><\/p><p>Illustration de l\u2019impact sur le routage du trafic:<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0914296 elementor-widget elementor-widget-image\" data-id=\"0914296\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2019\/06\/Route-Leak-\u00e9tape3.jpg\" title=\"Route-Leak-\u00e9tape3\" alt=\"Route-Leak-\u00e9tape3\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a526cf6 elementor-widget elementor-widget-spacer\" data-id=\"a526cf6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dba9d4 elementor-widget elementor-widget-text-editor\" data-id=\"1dba9d4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><span style=\"font-weight: 400;\">Dans le pire des cas, ce ph\u00e9nom\u00e8ne peut engendrer un perte importante de trafic et dans tous les cas, le trafic ainsi d\u00e9tourn\u00e9 subira un latence sup\u00e9rieure \u00e0 la normale. Dans le cas du route leak du 6 juin, le pire a \u00e9t\u00e9 \u00e9vit\u00e9 gr\u00e2ce \u00e0 la pertinence de la configuration du routage des op\u00e9rateurs concern\u00e9s. <\/span><\/p><p><span style=\"font-weight: 400;\">Ce type de ph\u00e9nom\u00e8ne r\u00e9seau peut aussi faire l\u2019objet d\u2019acte volontaire afin de d\u00e9tourner le trafic vers des \u00e9quipements d\u2019analyse et produire ainsi une attaque de type MiM (Man In the Middle). Ce fut le cas chez Amazon comme pr\u00e9cis\u00e9 dans ce blog post : <\/span><a href=\"http:\/\/pragma-security.com\/index.php\/2018\/04\/25\/arnaques-crimes-bgp\/\"><span style=\"font-weight: 400;\">http:\/\/pragma-security.com\/index.php\/2018\/04\/25\/arnaques-crimes-bgp\/<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p><p><span style=\"font-weight: 400;\">Ce type \u201cd\u2019erreurs volontaires\u201d se produisent essentiellement lorsque le trafic repr\u00e9sente une valeur marchande. Il peut aussi exister une simple volont\u00e9 de nuire. Ces ph\u00e9nom\u00e8nes font donc partie des probl\u00e9matiques de d\u00e9ni de service et il fait sens de mener des actions de pr\u00e9vention pour y rem\u00e9dier.<\/span><\/p><p><span style=\"font-weight: 400;\">Pour faire face aux vuln\u00e9rabilit\u00e9s BGP, la communaut\u00e9 internationale des op\u00e9rateurs travaille \u00e0 l\u2019adoption de mesures de s\u00e9curit\u00e9 sp\u00e9cifiques. Par exemple, la mise en place de certificats pour valider l\u2019origine des routes (ROA RPKI) ou encore des initiatives pour \u00e9tendre cette approche RPKI aux AS_PATH (chemin entre op\u00e9rateurs) via l\u2019utilisation d\u2019une base partag\u00e9e : Autonomous System Provider Authorization (ASPA) comme d\u00e9crit dans ce document <\/span><a href=\"https:\/\/radar.qrator.net\/blog\/eliminating-traffic-hijacking_36\"><span style=\"font-weight: 400;\">https:\/\/radar.qrator.net\/blog\/eliminating-traffic-hijacking_36<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p><p><span style=\"font-weight: 400;\">Dans l\u2019imm\u00e9diat, s\u2019appuyer sur des outils de monitoring devient une n\u00e9cessit\u00e9 pour les op\u00e9rateurs et entreprises faisant du routage BGP sur Internet. Lors d\u2019un incident, l\u2019entreprise concern\u00e9e est alert\u00e9e et peut agir au plus t\u00f4t pour r\u00e9soudre ou limiter l\u2019impact sur ses services. Dans un deuxi\u00e8me temps, le monitoring permet de produire une analyse post mortem de l\u2019incident et de mettre en place les am\u00e9liorations de processus de r\u00e9solution.<\/span><\/p><p><span style=\"font-weight: 400;\">Utilis\u00e9 par de nombreuses entreprises <\/span><span style=\"font-weight: 400;\">fran\u00e7aises<\/span><span style=\"font-weight: 400;\">, l\u2019outil <\/span><b><i><a href=\"https:\/\/radar.qrator.net\/\" target=\"_blank\" rel=\"noopener\">Radar<\/a> <\/i><\/b><span style=\"font-weight: 400;\">offre une supervision permanente des communications BGP et d\u00e9tecte tous types d\u2019anomalies (<\/span><span style=\"font-weight: 400;\">connectivit\u00e9, Route Leak, Hijack, Bogon prefix, etc&#8230;. )<\/span><span style=\"font-weight: 400;\"> gr\u00e2ce \u00e0 son analyse des routes emprunt\u00e9es pour chaque AS ainsi que le mod\u00e8le relationnel entre AS. En souscrivant au service, toute entreprise peut d\u00e8s lors recevoir des alertes lorsque son r\u00e9seau est affect\u00e9 et mettre en action les recommandations prescrites. <\/span><\/p><p><span style=\"font-weight: 400;\">Exemple d\u2019alerte en cas de fuite de routes: <\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2da0ead elementor-widget elementor-widget-image\" data-id=\"2da0ead\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2019\/06\/Prefixes-in-Route-Leaks_b.png\" title=\"Prefixes in Route Leaks_b\" alt=\"Alerte Radar - BGP route leak\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1a7443 elementor-widget elementor-widget-spacer\" data-id=\"e1a7443\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08fde48 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"08fde48\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"mailto:info@pragma-security.com\" target=\"_blank\" class=\"elementor-button-link elementor-button elementor-size-lg\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">En savoir plus sur l'outil Radar<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak) Publi\u00e9 le 14 Juin 2019 Le 6 Juin dernier, plusieurs op\u00e9rateurs europ\u00e9ens voyaient une partie de leur trafic impact\u00e9 pendant plusieurs heures en raison d\u2019une fuite de leurs routes. Devenus des incidents r\u00e9seau communs, les route leaks illustrent bien les failles de l\u2019Internet. Comment les op\u00e9rateurs peuvent-ils [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_canvas","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[8,16],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak) - Pragma Security<\/title>\n<meta name=\"description\" content=\"Qu&#039;est-ce qu&#039;une fuite de route (Route leak) ? Dans l&#039;exemple ci-dessous, nous pr\u00e9sentons les raisons d&#039;un tel incident et comment en limiter l&#039;impact.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak) - Pragma Security\" \/>\n<meta property=\"og:description\" content=\"Qu&#039;est-ce qu&#039;une fuite de route (Route leak) ? Dans l&#039;exemple ci-dessous, nous pr\u00e9sentons les raisons d&#039;un tel incident et comment en limiter l&#039;impact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/\" \/>\n<meta property=\"og:site_name\" content=\"Pragma Security\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-14T07:55:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-22T15:02:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2019\/06\/Sch\u00e9ma-Route-Leak-1.jpg\" \/>\n<meta name=\"author\" content=\"Solene Souquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Solene Souquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/\"},\"author\":{\"name\":\"Solene Souquet\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd\"},\"headline\":\"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak)\",\"datePublished\":\"2019-06-14T07:55:12+00:00\",\"dateModified\":\"2019-07-22T15:02:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/\"},\"wordCount\":1472,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/pragma-security.com\/#organization\"},\"articleSection\":[\"Cas pratique\",\"Incidents\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/\",\"url\":\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/\",\"name\":\"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak) - Pragma Security\",\"isPartOf\":{\"@id\":\"https:\/\/pragma-security.com\/#website\"},\"datePublished\":\"2019-06-14T07:55:12+00:00\",\"dateModified\":\"2019-07-22T15:02:40+00:00\",\"description\":\"Qu'est-ce qu'une fuite de route (Route leak) ? Dans l'exemple ci-dessous, nous pr\u00e9sentons les raisons d'un tel incident et comment en limiter l'impact.\",\"breadcrumb\":{\"@id\":\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pragma-security.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pragma-security.com\/#website\",\"url\":\"https:\/\/pragma-security.com\/\",\"name\":\"Pragma Security\",\"description\":\"Protection anti-DDoS | DNS | WAF\",\"publisher\":{\"@id\":\"https:\/\/pragma-security.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pragma-security.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pragma-security.com\/#organization\",\"name\":\"Pragma Security\",\"url\":\"https:\/\/pragma-security.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg\",\"contentUrl\":\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg\",\"width\":436,\"height\":394,\"caption\":\"Pragma Security\"},\"image\":{\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd\",\"name\":\"Solene Souquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g\",\"caption\":\"Solene Souquet\"},\"url\":\"https:\/\/pragma-security.com\/index.php\/author\/soso\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak) - Pragma Security","description":"Qu'est-ce qu'une fuite de route (Route leak) ? Dans l'exemple ci-dessous, nous pr\u00e9sentons les raisons d'un tel incident et comment en limiter l'impact.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/","og_locale":"fr_FR","og_type":"article","og_title":"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak) - Pragma Security","og_description":"Qu'est-ce qu'une fuite de route (Route leak) ? Dans l'exemple ci-dessous, nous pr\u00e9sentons les raisons d'un tel incident et comment en limiter l'impact.","og_url":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/","og_site_name":"Pragma Security","article_published_time":"2019-06-14T07:55:12+00:00","article_modified_time":"2019-07-22T15:02:40+00:00","og_image":[{"url":"https:\/\/pragma-security.com\/wp-content\/uploads\/2019\/06\/Sch\u00e9ma-Route-Leak-1.jpg"}],"author":"Solene Souquet","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Solene Souquet","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/#article","isPartOf":{"@id":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/"},"author":{"name":"Solene Souquet","@id":"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd"},"headline":"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak)","datePublished":"2019-06-14T07:55:12+00:00","dateModified":"2019-07-22T15:02:40+00:00","mainEntityOfPage":{"@id":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/"},"wordCount":1472,"commentCount":0,"publisher":{"@id":"https:\/\/pragma-security.com\/#organization"},"articleSection":["Cas pratique","Incidents"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/","url":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/","name":"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak) - Pragma Security","isPartOf":{"@id":"https:\/\/pragma-security.com\/#website"},"datePublished":"2019-06-14T07:55:12+00:00","dateModified":"2019-07-22T15:02:40+00:00","description":"Qu'est-ce qu'une fuite de route (Route leak) ? Dans l'exemple ci-dessous, nous pr\u00e9sentons les raisons d'un tel incident et comment en limiter l'impact.","breadcrumb":{"@id":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pragma-security.com\/index.php\/2019\/06\/14\/decryptage-route-leak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pragma-security.com\/"},{"@type":"ListItem","position":2,"name":"D\u00e9cryptage d\u2019une fuite de routes BGP (Route leak)"}]},{"@type":"WebSite","@id":"https:\/\/pragma-security.com\/#website","url":"https:\/\/pragma-security.com\/","name":"Pragma Security","description":"Protection anti-DDoS | DNS | WAF","publisher":{"@id":"https:\/\/pragma-security.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pragma-security.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/pragma-security.com\/#organization","name":"Pragma Security","url":"https:\/\/pragma-security.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/","url":"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg","contentUrl":"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg","width":436,"height":394,"caption":"Pragma Security"},"image":{"@id":"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd","name":"Solene Souquet","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pragma-security.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g","caption":"Solene Souquet"},"url":"https:\/\/pragma-security.com\/index.php\/author\/soso\/"}]}},"_links":{"self":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts\/952"}],"collection":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/comments?post=952"}],"version-history":[{"count":29,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts\/952\/revisions"}],"predecessor-version":[{"id":1050,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts\/952\/revisions\/1050"}],"wp:attachment":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/media?parent=952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/categories?post=952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/tags?post=952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}