© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-00.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Chris Karlof and David Wagner
Akshat Sharma Samarth Shah
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00 Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black,
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
1 MITP 458 : Information Security and Assurance VOIP Xeon Group Rohit Bhat Ryan Hannan Alan Mui Irfan Siddiqui.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Towards Application Security On Untrusted OS
Introduction (Pendahuluan)  Information Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chapter 1: Hierarchical Network Design
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
WEP Protocol Weaknesses and Vulnerabilities
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
ACM 511 Introduction to Computer Networks. Computer Networks.
Security Requirements for Software Defined Networks Internet Area WG IETF 85: Atlanta November 4, 2012 Margaret Wasserman
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 24 Wireless Network Security
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 68 - ANCP WG March 18-23, 2007 draft-ietf-ancp-security-threats-00.txt.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black, Murari.
11 Softwire Security Analysis and Guidance for Mesh Shu Yamamoto Carl Williams Florent Parent Hidetoshi Yokota draft-ietf-softwire-security-requirements-XX.txt.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Network Security Celia Li Computer Science and Engineering York University.
Introduction to Network Systems Security Mort Anvari.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
Securing Access to Data Using IPsec Josh Jones Cosc352.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Computer Security Network Security
Introduction to Network Security
Security in SDR & cognitive radio
Presentation transcript:

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-00 Sam Hartman, Dacheng Zhang, Margaret Wasserman IETF 86, March. 2013, Orlando, USA

2 Introduction  Propose a threat model in order to specify the attacks of concern  Analyze the security requirements that the control plane and the data plane MUST or MAY fulfill in order to tolerate the attacks concerned

3 Threat Model (1)  NOV3 should be secure even when an attacker has the capability of  Intercepting the packets transported through a virtual data center network  Replaying the intercepted packets  Generating fake packets and injecting them into the network  When using the above capability to perform a successful attack on a virtual data center network, an attacker may be able to  Obtain the data which it is un-authorized to access  Analyze the traffic pattern of a tenant or a end device  Disrupt the service quality of the network or the integrity of application running over the network

4 Threat Model (2)  Under the attacks performed by an attacker, a virtual data center network MUST guarantee the following security properties  Isolation of virtual networks The traffic within a virtual network can only be transited into another one in a controlled fashion An entity cannot make use of its privilege obtained within a VN to manipulate the overlay control plane to affect on the operations of other VNs  Integrity and origin authentication of the control plane: All the control pane implementations of the overlay MUST support the integrity protection on the signaling packets.  Availability of the control plane: The design of the control plan must consider the DDOS or DOS attacks.

5 Threat Model (3)  The following properties SHOULD be optionally provided:  Confidentiality and integrity of the TES traffic If most of the TES data is headed towards the Internet and nothing is confidential, encryption is redundant in the cases where the underlay network is secure enough, no additional cryptographic protection needs to be provided  Confidentiality of the control plane. On many occasions, the signaling messages can be transported in plaintext When some information contained within the signaling messages are sensitive to a tenant (e.g., the location of a TES, when a TES migration happens), the signaling messages related with that tenant should be encrypted.

6 Security Requirements Between NVEs and TESes  When a NVE and the TESes it supports can be deployed in a distributed way:  Optional security protection on the data traffic  Integrity of signaling messages: Mutual Authentication needs to be provided  Isolation between different VNs: data traffic and signaling messages (Authorization is required)  When a NVE and the TESes it supports can be deployed in a co-located way:  Isolation between different VNs  Isolation of Memory and Computing Resources

7 Security Requirements within Overlays -Control Plane  The integrity and origin authentication of the signaling messages must be guaranteed  DOS attacks  The NVEs SHOULD be only allowed to send signaling message in the overlay with a limited frequency  Protection on the centralized servers  Inside attacks where one or more NVEs are compromised  Authentication and authorization  Isolation enforced with cryptographic keys

8 Security Issues Imposed by the New Overlay Design Characteristics  Scalability  If a NVE needs to securely communicate with a large number of peers, the scalability issue could be serious.  In[I-D.ietf-ipsecme-ad-vpn-problem], it has been demonstrated it is not trivial to enabling a large number of systems to communicate directly using IPsec to protect the traffic between them.  Influence introduced by data encryption on Security Devices  Security Issues with VM Migration  State Migration  Redirection

9 Questions?