IPv6 Source Address Validation and IETF Efforts Jun Bi CERNET/Tsinghua University APAN 26 August, 2008.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
CNGI/CERNET2 Updates Jilong Wang, Tsinghua U
1 IPv6 Development in China Xing Li Outline l A brief history l Experience l CNGI project l CERNET2 design.
Security Issues In Mobile IP
FI Research in China Jun Bi Tsinghua Univ./CERNET Beijing China.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
SAVI Requirements and Solutions for ISP IPv6 Access Network ISP-access-01.txt.
Release 5.1, Revision 0 Copyright © 2001, Juniper Networks, Inc. Advanced Juniper Networks Routing Module 9: Static Routes & Routing Table Groups.
Secure Mobile IP Communication
Windows® Deployment Services
Public IPv4 over Access IPv6 network draft-cui-softwire-host-4over6-06 draft-cui-softwire-dhcp-over-tunnel-01 Y. Cui, J. Wu, P. Wu Tsinghua Univ. C. Metz.
1 IPv6 Advantages May 2001 May 2001
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Auto Configuration and Mobility Options in IPv6 By: Hitu Malhotra and Sue Scheckermann.
1 IPv6. 2 Problem: 32-bit address space will be completely allocated by Solution: Design a new IP with a larger address space, called the IP version.
IPv6 – IPv4 Network Address, Port & Protocol Translation & Multithreaded DNS Gateway Navpreet Singh, Abhinav Singh, Udit Gupta, Vinay Bajpai, Toshu Malhotra.
Implementing IPv6 Module B 8: Implementing IPv6
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
IPv6 Network Security.
1 Mobile IP Myungchul Kim Tel:
Chapter 5 Network Security Protocols in Practice Part I
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
IPv6 Address Provisioning In IPv6 world there are three provisioning aspects wich are independent of whether the IPv6 node is a Host or CE router: IPv6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
SAVE: Source Address Validity Enforcement Protocol Jun Li, Jelena Mirković, Mengqiu Wang, Peter Reiher and Lixia Zhang UCLA Computer Science Dept 10/04/2001.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Name Resolution Domain Name System.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
1 AutoconfBOF2.PPT / Aug / Singh,Perkins,Clausen IETF Not Confidential Ad hoc network autoconfiguration: definition and problem statement (draft-singh-autoconf-adp-00.txt)
A SAVI Solution for DHCP Draf-ietf-savi-dhcp-06 J. Bi, J. Wu, G. Yao, F. Baker IETF79, Beijing Nov. 9, 2010.
Source Address Validation Architecture (SAVA) Requirements of CNGI-CERENT2 Jianping Wu CERNET/Tsinghua University IETF 68 Prague March 2007.
1 Julien Laganier MEXT WG, IETF-79, Nov Authorizing MIPv6 Binding Update with Cryptographically Generated Addresses
Karlstad University IP security Ge Zhang
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Module 2: Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
JELENA MIRKOVIC (USC) PETER REIHER (UCLA) Building Accountability into the Future Internet In Proc. IEEE NPSec, 2009 Speaker: Yun Liaw.
CGA Extension Header for IPv6 draft-dong-savi-cga-header-03.txt Margaret Wasserman IETF 78, Maastricht July 2010.
A Source Address Validation Architecture (SAVA) and IETF SAVI Working Group Jun Bi Tsinghua University/CERNET Oct 20, 2008.
SAVI Analysis for PANA with SLACC Yilan Ding IETF 79 draft-ding-savi-pana-with-slacc-00.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Analysis on binding distribution protocol and A proposed solution SAVI-CPS.
OSPF WG Security Extensions for OSPFv2 when using Manual Keying Manav Bhatia, Alcatel-Lucent Sam Hartman, Huawei Dacheng Zhang, Huawei IETF 80, Prague.
 Router Configurations part2 2 nd semester
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
Computer Networks 0110-IP Gergely Windisch
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Cryptography CSS 329 Lecture 13:SSL.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
LESSON Networking Fundamentals Understand IPv4.
Preventing Internet Denial-of-Service with Capabilities
Consideration on IPv6 Address Management
Chapter 11: Network Address Translation for IPv4
Outline The spoofing problem Approaches to handle spoofing
Computer Networks Protocols
SAVI Requirements and Solutions for IPv4/IPv6 Transition
Presentation transcript:

IPv6 Source Address Validation and IETF Efforts Jun Bi CERNET/Tsinghua University APAN 26 August, 2008

Outline Background and Requirements A Source Address Validation Architecture (SAVA) and CNGI-CERNET2 SAVA Testbed – RFC5210: J Wu, J Bi, X Li, et.al. IETF SAVI (Source Address Validation Improvements) WG and Proposed Solutions

What Is the problem Current situation in IPv4 and IPv6 is that: –destination address based packet forwarding –In the forwarding process, the source IP address is not checked in most cases. –Easy to spoof the source address of the IP packet. Packets with spoofed source addresses are unwanted. –Security (Attacks such as DNS reflection) –Management (Administration: hard to trace back, measurement) –Accounting (source address based accounting)

Some Figures Arbor Worldwide Infrastructure Security Report

Related Work IETF BCP 38 filtering (needs to be fully deployed), if it were universally applied would solve the problem. Unfortunately this is not the case –about ¼ of the Internet at least allows spoofed source addresses in packets (MIT Spoofer Project) –BCP 38 deployment ratio is less than 50% (Arbort report) Cryptographic based methods –Cost/feasibility Traceback based methods –Reactive, not proactive

SAVA Design Principles 1.Hierarchical Architecture (Multi-fence solutions) 2.Solutions for IPv6 first (feasible way to deploy) 3.Proactive protection 4.Incrementally Deployable (Incomplete deployment still be beneficial) 5.Provide incentive for deployment (The source address space of a network that deployed SAVA can not be spoofed by others) 6.Performance, Cost and Scalability

SAVA Architecture in CNGI-CERNET2 IP Prefix Level Granularity

Current SAVA Solutions in CNGI-CERNET2 Inter-AS (early stage): lightweight signature between the source AS and the destination AS (End-to-end) Inter-AS (neighboring ASes): AS relationship based method deployed in the neighboring AS boarder routers Intra-AS: deploy Ingress filtering on all edge routers in an AS (the ingress filtering relies on fully deployment. it’s not feasible to fully deploy in the whole Internet, but it’s feasible to deploy in a single AS). Access Network (First-Hop, Local Subnet):

A End-to-end lightweight signature based solution for Inter-AS SAVA

A End-to-end lightweight Signature based Solution for Inter-AS SAVA Add signature check signature, valid Remove signature Ingress filtering Check signature, invalid Unsigned Flow Signed Flow

SAVA Testbed: Test Result (1) Before spoofing attack

SAVA Testbed: Test Result (2) After spoofing attack

SAVA Testbed: Test Result (3) Enable SAVA

Test-bed in CERNET2/Tsinghua Univ.

SAVA Deployment in CNGI-CERNET2: Prototype implemented and 12 SAVA test AS deployed 用户接入网 SAVA 用户接入网 SAVA

IETF Efforts IETF 66 (Montreal, July 2006), SAVA Side Meeting with IAB/IESG IETF 67 (San Diego, Nov 2006), Internet Area Open Meeting IETF 68 (Prague, March 2007), first BoF Discussion IETF 69 (Chicago, July 2007), RFC drafts proposed, Internet Area Open Meeting and SAVA Side Meeting with IESG to prepare the 2nd BoF IETF 70 (Vancouver, Dec. 2007), BoF for SAVI Working Group (Source Address Validation Improvements) IETF 71 (Philadelphia, March 2008), discuss/revise WG charter RFC 5210 and SAVI WG were approved by IESG in May 2008 IETF 72 (Dublin, July 2008), the first SAVI WG meeting To Subscribe:

Why we need host-granularity anti-spoofing

IPv6 source address assigned Access request Binding in switch Access network 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 } Access accepted 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 } } 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 = Match ? Assigned address 2001:250:f001:f002: 210:5cff:fec7:1204 Spoof address 2001:250:f001:f002: 210:5cff:fec7:1203 Match ? 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 } 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 } ≠ Access denied Switch port based Solution

Protocols

Special Problems in IPv6 Various Address Allocation Methods –Stateless Auto-configuration –DHCPv6 –Manual Configuration/Static –Cryptographically (CGA) –Private Multiple addresses are assigned to an interface

CGA based Solution Phase 1: Address Authorization –Filtering based on the knowledge of address assignment (to adapt all address allocation ways) –Host Identifier (CGA Identifier) without PKI –Binding Host Identifier and address at the first Layer-3 hop –Secure Shared Secret Exchange (Signature seed used in Authentication phase) Phase 2: Address Authentication –Light-weight signature generation –Light-weight signature adding and removal

Overview of Procedure Phase1: Address Authorization (5 steps) (4) Check whether identifier H can use the required address A (3) I’m H and I require to use address A (5) Return a “signature seed” for future authentication (2) An identifier is used to show the applicant is H (1) Prepare an address A

Overview of Procedure Phase2: Address Authentication Add Signature Check Signature and Remove it Generate Signature based on “signature seed”

Phase1: Address Authorization Step 1: Address Preparation –The Node gets an address through the appointed address assignment mechanism Host in IPv4: Manual Configuration, DHCP Host in IPv6: DHCP, Stateless Autoconfiguration, Manual Configuration, Cryptographically Generated Address, Privacy

Address Authorization Step 2: Identifier Generation –Node generates a secure identifier For anonymity address owner (DHCP,SCA,CGA,Privacy), identifier = hash(Public Key) [Described in CGA] For any address allocation mechanism involving manual configuration, identifier = hash(Public Key + Share Secret ). The Share Secret is a bit string allocated to the node with the static address by network administrator.

Address Authorization Step 3: Address Authorization Request –Nodes send a request packet to the first layer 3 hop (gateway/router) An ICMP packet with source address set to the address prepared in phase 1 The CGA option and RSA signature option are the same as described in [SEND]

Address Authorization Step 4: Gateway Authorizing Address –Gateway checks whether the request node has the right to use the address. The knowledge is based on address allocation. –Manual Configuration: Re-compute the identifier using the shared secret of the address owner. –SAC/Privacy/CGA: The address has not been registered by another node. In CGA case, the request address must be a correct CGA address computed on the public key. –DHCP: The identifier in the request packet must be the one which has been used to apply address/prefix from DHCP server/router. [See next page]

Address Allocation in DHCP Case Source address set to the CGA identifier Record the CGA identifier Record the address allocated. Bind the identifier and the address. DHCP Solicitation

Address Authorization Step 5: Signature Seed Assignment –Gateway returns a bit string named “signature seed” to the applicant, encrypted by the public key in the request packet. –Node decrypts the “signature seed”.

Phase 2: Address Authentication Signature Generation (All based on the shared secret “signature seed”) –HMAC –Pseudo Random Number (Preference) Signature sequence, hard to guess and replay Using the sliding window to handle the packet re-order (not a big deal in local subnet) Signature Adding (3 choice to implement) –IPSEC Authentication Header –A new option header (e.g. Hop-by-hop) –Address Rewrite (The signature is used as local address, the router rewrite with the authorized address for out world, to save the cost of memory copy and locating header) Signature Verification (matching the random number)

SAVA Deployment Plan Phase 1: –Prototypes implemented and 12 SAVA test ASes deployed in CNGI-CERNET2 –Supported by “863” High-tech project and CNGI project Phase 2: –Collaborating with vendors to implement SAVA in router/switch products (Cisco, Juniper, Huawei, and Bitway showed interests). –Deploy 100 SAVA campus networks in CNGI- CERNET2 and to protect 1 Million users with source address spoofing prevention methods –Collaborate with China Telecom, China Mobile, etc. to deploy SAVA on the whole CNGI network in the future. –IETF efforts: solutions revision/RFC standardization. –Supported by MOST 11th 5-year Plan Project

Thank You!