Management Issues in ICMP (Internet Control Message Protocol)

Slides:



Advertisements
Similar presentations
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
Advertisements

CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Internet Control Message Protocol (ICMP)
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Control Message Protocol (ICMP) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Internet Command Message Protocol (ICMP) CS-431 Dick Steflik.
1 K. Salah Module 5.3: Internet Control Message Protocol Why need ICMP? IP and ICMP ICMP Message Format ICMP Error Reporting messages ICMP Query messages.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Defining the IP Packet Delivery Process INTRO v2.0—4-1.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
1 Figure 3-33: Internet Control Message Protocol (ICMP) ICMP is for Supervisory Messages at the Internet Layer ICMP and IP  An ICMP message is delivered.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Internet Control Message Protocol (ICMP)
1 Computer Communication & Networks Lecture 20 Network Layer: IP and Address Mapping (contd.) Waleed.
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
© 2002, Cisco Systems, Inc. All rights reserved..
CCNA 2 Week 8 TCP/IP Suite Error Control Messages.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 4 Internet Control Message Protocol (ICMP)
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
Chapter 23 Internet Control Message Protocol used to report information and errors IP uses ICMP when it sends an error message ICMP uses IP to transport.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Internet Control Message Protocol (ICMP) Chapter 7.
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
ICMPv6 Error Message Types Informational Message Types.
Guide to TCP/IP Fourth Edition Chapter 5: Internet Control Message Protocol.
INTERNET CONTROL MESSAGE PROTCOL. ICMP n allows router to send error or control messages to another router or host n provides communication between IP.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
Understanding IPv6 Slide: 1 Lesson 5 ICMPv6. Understanding IPv6 Slide: 2 Lesson Objectives Purpose of ICMPv6 and the structure of all ICMPv6 messages.
COMPUTER NETWORKS CS610 Lecture-32 Hammad Khalid Khan.
Module 8 JEOPARDY CCNA2 v3 Module 8 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
CCNA 2 Router and Routing Basics Module 8 TCP/IP Suite Error and Control Messages.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
ICMP The IP provides unreliable and connectionless datagram delivery. The IP protocol has no error-reporting or error-correcting mechanism. The IP protocol.
Chapter 19 Network Layer Protocols
21-2 ICMP(Internet control message protocol)
Chapter 9 ICMP.
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
Error and Control Messages in the Internet Protocol
8 Network Layer Part V Computer Networks Tutun Juhana
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
ITIS 6167/8167: Network Security
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol Version 4 (ICMPv4)
Internet Control Message Protocol
Chapter 15. Internet Protocol
Internet Control Message Protocol
ITIS 6167/8167: Network and Information Security
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Presentation transcript:

Management Issues in ICMP (Internet Control Message Protocol) Byungchul Park DPNM Lab., CSE, POSTECH Email: fates@postech.ac.kr 2008. 5. 12 1 1

Table of Contents Introduction ICMP functionalities MIB for ICMP Security Vulnerabilities of ICMP Redesign ‘Source Quench’ error report Summary

Introduction (1/2) Unreliable IP protocol - “Best Effort” What will happen if… Packet can not find a router to go to final destination TTL value goes 0 Fragmented packets can not reach to final destination in time Network error A host or router need some information from other hosts or routers

Introduction (2/2) Why the ICMP is needed? Lacks of IP protocol’s functionality!!! Unreliable and connectionless datagram delivery Best-effort delivery service Lack of error control and lack of assistance mechanisms No error-reporting and error-correcting mechanisms Lacks of mechanism for host and management queries  ICMP has been designed to compensate for the above deficiencies

ICMP Functionalities (1/3) ICMP Messages Error-reporting Query Error reporting : report problems that a router or host may encounter when it processes an IP packet Query message : get specific information from router or a host in order to help a host or network management.

ICMP Functionalities (2/3) ICMPv4

ICMP Functionalities (3/3) ICMPv6

What are the important things that need to be monitored and controlled? 1 1

MIB for ICMP (1/2) Important functionalities Error report Query for network management  Monitoring every ICMP message is meaningful in network management aspect Example Too many “source quench” message  network congestion?! Too many “redirection” messages  ICMP attack?!

MIB for ICMPv6 - RFC2466 (2/2) ipv6IfIcmpInMsgs, ipv6IfIcmpInErrors, ipv6IfIcmpInDestUnreachs, ipv6IfIcmpInAdminProhibs, ipv6IfIcmpInTimeExcds, ipv6IfIcmpInParmProblems, ipv6IfIcmpInPktTooBigs, ipv6IfIcmpInEchos, ipv6IfIcmpInEchoReplies, ipv6IfIcmpInRouterSolicits, ipv6IfIcmpInRouterAdvertisements, ipv6IfIcmpInNeighborSolicits, ipv6IfIcmpInNeighborAdvertisements, ipv6IfIcmpInRedirects, ipv6IfIcmpInGroupMembQueries, ipv6IfIcmpInGroupMembResponses, ipv6IfIcmpInGroupMembReductions

 How can we correct errors? More Issues Simple statistics information is not enough to manage every network problem ICMP does not correct errors, it simply reports them. Tracking every error message’s source host is important to correct errors SNMP and MIB can not add additional information dynamically  How can we correct errors?

What are existing problems with the protocol? Security Vulnerabilities 1 1

Security Vulnerabilities (1/3) Every ICMP message can be used for network attack ‘Echo’ and ‘Echo Reply’ messages Echo requests can be used by an outsider to map our network ‘Destination Unreachable’ message Blind connection-reset attack: Send a ‘Protocol unreachable’ message to a client with spoofed IP address Path MTU discovery attack: Send ‘Fragmentation needed’ message to a client (c.f. PMTUD mechanism)

Security Vulnerabilities (2/3) ‘Source Quench’ message ICMP Source Quench attack: attacker (probably combined with IP spoofing) sends this message in order to make a very effective DoS attack ‘Redirect’ message Attacker sends this message to subvert the routing table ‘Time Exceeded’ message Attacker can use traceroute to find out which hosts are the routers in our network

Security Vulnerabilities (3/3) ‘Time Stamp request & reply’ messages Attacker can use this message to map our network (alternative to ping) ‘Address Mask request & reply’ messages Attacker can use these messages to learn the topology of our network These vulnerabilities caused by lack of authentication mechanism Firewall is used for filtering ICMP messages (inbound/outbound) Authentication mechanism should be integrated into ICMP

What are existing problems with the protocol What are existing problems with the protocol? If you had to redesign the protocol from scratch, how would you do it differently, considering its manageability? 1 1

Source Quench Error (1/3) Generated if the router or host does not have sufficient buffer space to process the request Requests the sender to decrease the traffic rate of messages to a router or host (congestion control)

Source Quench Error (2/3) Problems A host or router will send source quench error messages responsible for every discarded packet (network overhead) A host or router can not determine which host is responsible for network congestion No mechanism to notify the end of congestion

Source Quench Error (3/3) Redesign of Source quench error function A host or router will send source quench error messages responsible for every discarded packet (network overhead) Sending an error message per source host (What will happen if the error message disappear? I don’t know!) A host or router can not determine which host is responsible for network congestion  Using statistics of received datagram, a host or router can determine the responsible sender No mechanism to notify the end of congestion  New message type (available bandwidth) is needed

Question? ?