A policy framework for the future Internet

Slides:



Advertisements
Similar presentations
Network Support for Accountability Nick Feamster Georgia Tech Collaborative Response with David Andersen (CMU), Hari Balakrishnan (MIT), Scott Shenker.
Advertisements

Network Support for Sharing. 2 CABO: Concurrent Architectures are Better than One No single set of protocols or functions –Different applications with.
Loose Source Routing as a Mechanism for Traffic Policies Katerina Argyraki and David R. Cheriton Presented by Thuan Huynh, Robert Patro, and Shomir Wilson.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
SDX: A Software-Defined Internet Exchange
A Policy Framework for a Secure Future Internet Jad Naous (Stanford University) Arun Seehra (UT Austin) Michael Walfish (UT Austin) David Mazières (Stanford.
Information-Centric Networks02b-1 Week 2 / Paper 2 Tussle in Cyberspace: Defining Tommorow’s Internet –David D. Clark, John Wroclawski, Karen R. Sollins.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Kunal.
Zhang Fu, Marina Papatriantafilou, Philippas Tsigas Chalmers University of Technology, Sweden 1 ACM SAC 2010 ACM SAC 2011.
The Internet An Engineering Approach to Computer Networking.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Amit Mondal Courtesy to Ahamed Mohammed/Rice.
Decoupling Policy from Mechanism in Internet Routing Alex C. Snoeren and Barath Raghavan University of California, San Diego.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
CS 268: Future Internet Architectures Ion Stoica May 6, 2003.
A System for Authenticated Policy-Compliant Routing Barath Raghavan and Alex C. Snoeren UC San Diego.
Network Security via Explicit Consent Michael Walfish The University of Texas at Austin.
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Tussel in Cyberspace Based on Slides by I. Stoica.
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
Reducing Transient Disconnectivity using Anomaly-Cognizant Forwarding Andrey Ermolinskiy, Scott Shenker University of California – Berkeley and ICSI.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Ahamed Mohammed.
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
Policy and mechanism in the future Internet Michael Walfish The University of Texas at Austin in collaboration with: Arun Seehra (UT Austin), Jad Naous.
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Security for Broadcast Network
The NEBULA Future Internet Architecture: A Research Agenda 1.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
15-849: Hot Topics in Networking Policy and Networks Srinivasan Seshan 1.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
P & NP.
Problem: Internet diagnostics and forensics
Multi-layer software defined networking in GÉANT
COMPUTER NETWORKS and INTERNETS
New Directions in Routing
Auto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes?
Lecture 2: Leaf-Spine and PortLand Networks
Distributed Systems.
Outline Basics of network security Definitions Sample attacks
The Design Philosophy of the DARPA Internet Protocols [Clark 1988]
Goals of soBGP Verify the origin of advertisements
Distributed Systems (Section B)
HSCN Supplier Workshop – 19th May 2016
Magda El Zarki Professor, ICS UC, Irvine
A DoS-limiting Network Architecture
0x1A Great Papers in Computer Security
Introduction There are many situations in which we might use replicated data Let’s look at another, different one And design a system to work well in that.
A policy framework for the future Internet
APNIC Trial of Certification of IP Addresses and ASes
Outline Basics of network security Definitions Sample attacks
An Update on Multihoming in IPv6 Report on IETF Activity
Towards Distributed Test-Lab for Planetary-Scale Services
Governmental Control of Network Activities CS 239 Advanced Topics in Computer Security Peter Reiher September 30, 2010.
EE 122: Lecture 22 (Overlay Networks)
Advanced Computer Networks
Overview of Networking
Outline Basics of network security Definitions Sample attacks
An Engineering Approach to Computer Networking
SPINE: Surveillance protection in the network Elements
Presentation transcript:

A policy framework for the future Internet Arun Seehra*, Jad Naous†, Michael Walfish*, David Mazières†, Antonio Nicolosi§, and Scott Shenker¶ *The University of Texas at Austin †Stanford §Stevens Institute of Technology ¶UC Berkeley and ICSI

Who should control communications? What should they control? Many Internet stakeholders: senders, receivers, transit providers, edge providers, middleboxes, … Each has many valid policy goals Where do your sympathies lie?

Prior proposals: large union, small intersection x o o o o o source routing x o o - - - - - - o o x NIRA o - - - - x TVA BGP - - - o x o - - o x o o - o x o o o o x o o o o o x o - - o o - - o x o NUTSS LSRR o o o o x - o o o x - - o o x - - - o x - - - - - - o - - x i3, DOA Proposals generally choose particular concerns To the exclusion of other concerns Our community: lots of sympathy, little consensus

So what options does our community have? Embrace the status quo: do nothing This is architectural abdication Make a hard choice: select the “right” subset This would be a gamble On a choice that must last another 30 years By a community not known for accurate predictions Choose “all of the above”: take the union of controls This preserves our options; no picking winners/losers The late binding avoids guesses about unknowables

“All of the above” brings challenges 1. Can we identify a coherent union? 2. Can we build a mechanism to support it? Rest of this talk

Allow a communication iff all participants approve What is the right union? Rough consensus only about who doesn’t get a say x o o o o o o o o o o o o x o o o x o o o o x o o o o o o o o o o x o o o x o o o o o o o o x o o policy principle We propose: Allow a communication iff all participants approve Overkill for any application, not for a framework Conjecture: nothing weaker meets all policy goals, nothing stronger needed

Veto power for all?! You might worry: ISPs get a lever x o o o o o o o o o o o o x o o o x o o o o x o o o o o o o o o o x o o o x o o o o o o o o x o o You might worry: ISPs get a lever Which could threaten Net neutrality Universal connectivity On the other hand: Endpoints empowered Which could create Competition Instead of monopoly We didn’t create this tussle* and can’t end it today We can seek an outlet for it … *[Clark et al. SIGCOMM 2002]

The challenges in “all of the above”: x o o o o o o o o o o o o x o o o x o o o o x o o o o o o o o o o x o o o x o o o o o o o o x o o 1. Can we identify a coherent union? 2. Can we build a mechanism to support it? (My goal is to convince you it’s feasible)

Requirements for a candidate mechanism x o o o o o o o o o o o o x o o o x o o o o x o o o o o o o o o o x o o o x o o o o o o o o x o o Communication needs approval from all parties Communication follows the approved path Adversarial environment No centralization or trusted entities Data plane is feasible, even at backbone speeds

ICING from 30,000 feet CS applies policy; can also abdicate, delegate Ri = public key P = {R0,R1,R2,R3,R4} Ci = MAC(si, P) path server “D” P consent server 1 CS 2 CS 3,4 C1 C2 C3,C4 s1 (knows s1) s2 s3 s3, s4 s4 D C1 C2 C3 C4 R0 R4 R1 R2 R3 CS applies policy; can also abdicate, delegate Not covering how R0 gets approval to reach CSi, PS Packets must be bound to paths efficiently With no key distribution or pairwise coordination While resisting attacks

Binding a packet to its path Ri = pubkey P = {R0,R1,R2,R3,R4} Ci = MAC(si, P) xi = privkey of Ri ki,j = H(gxixj, Ri, Rj) Honest realms: 1. verify consent, provenance 2. prove to later realms R0 R0 R1 R2 R3 R4 M C1 C2 C3 C4 R1 R0 R1 R2 R3 R4 M C1 C2 C3 C4   R0 R1 R2 R3 R4 M C1 C2 C3 C4 R2 R3 ? C2 ^ MAC(k0,2, 0||H(P,M)) ^ MAC(k1,2, 1||H(P,M)) R4

ICING’s data plane in a nutshell Binds a packet to its path (required by “union”) Packet carries path (list of public keys), auth tokens Realms use ki,j to transform auth tokens For j<i, Ri verifies that all kj,i were applied For j>i, Ri proves to Rj using ki,j No key distribution: Ri derives ki,j from Rj’s name Resists attack: forgery, injection, short-circuiting, … Feasibility: is required space, computation tolerable?

ICING’s data plane is feasible Space overhead? Average ICING header: ~250 bytes Average packet size: ~1300 bytes [CAIDA] So, total overhead from ICING: ~20% more space Can forwarding happen at backbone speeds? On NetFPGA, ICING speed is ~80% of IP speed At what hardware cost? Equiv. gate count: 13.4 M for ICING vs. 8.7 M for IP Total logic area: ICING costs 78% more than IP R0 R1 R2 R3 R4 M 20 bytes (ECC) 16 bytes

Reflecting on ICING Communication needs approval from all parties consent server 1 CS 2 CS 3,4 D ICING meets its requirements: Communication needs approval from all parties Communication follows the approved path Adversarial environment No trusted entities Data plane is feasible, even at backbone speeds

Aspects of ICING that this talk punted The control plane (which is pluggable) Handles configuration, path selection, getting Ci, … Runs in commodity servers, unseen by data plane Ensures unapproved communications blocked early Lots about the data plane Expiration and revocation: Ci, keys, secrets Handling network failure, defending against attack Deployment

Recap Many good policies; no consensus on “best” So try to uphold “all of the above” Brings technical challenges ICING addresses those challenges Today: not implausible. Tomorrow: not impractical. 100,000-foot view: bandwidth and computation keep increasing, so use them to buy new properties We think ICING’s properties are worth its price x o o o o o o o o o o o o x o o o x o o o o x o o o o o o o o o o x o o o x o o o o o o o o x o o