Www.opendaylight.org Secure Network Bootstrapping Infrastructure May 15, 2014.

Slides:



Advertisements
Similar presentations
Router Identification Problem Statement J.W. Atwood 2008/03/11
Advertisements

Proposal: Model-Driven SAL for the OpenDaylight Controller
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
DHCPv6.
Neighbor Discovery for IPv6 Mangesh Kaushikkar. Overview Introduction Terminology Protocol Overview Message Formats Conceptual Model of a Host.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Implementing IPv6 Module B 8: Implementing IPv6
IPv4 & IPv6 Coexistence & Migration Joe Zhao SW2 Great China R&D Center ZyXEL Communications, Inc.
Host Autoconfiguration ALTTC, Ghaziabad. IPv4 Address and IPv6 equivalents ALTTC, Ghaziabad.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Lecture Week 7 Implementing IP Addressing Services.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Managing DHCP. 2 DHCP Overview Is a protocol that allows client computers to automatically receive an IP address and TCP/IP settings from a Server Reduces.
Asymmetric Extended Route Optimization (AERO)
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
2002 년 2 학기이동인터넷프로토콜 1 Mobile IP:Overview 년 2 학기이동인터넷프로토콜 2 Mobile IP overview Is Mobile IP an official standard? What problems does Mobile IP solve?
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Network+ Guide to Networks, Fourth Edition
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Cisco Certified Network Associate CCNA Access the WAN Asst.Prof. It-arun.
Chapter 4 Networking and the Internet Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
70-411: Administering Windows Server 2012
draft-kwatsen-netconf-zerotouch-01
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
Module 2: Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
Yallcast Architecture Overview Paul Francis NTT PF Labs
1/28/2010 Network Plus IP Addressing Review. IP Address Classes.
© Cengage Learning 2014 How IP Addresses Get Assigned A MAC address is embedded on a network adapter at a factory IP addresses are assigned manually or.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
1 Configuring Sites Configuring Site Settings Configuring Inter-Site Replication Troubleshooting Replication Maintaining Server Settings.
An Introduction to Mobile IPv4
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Dynamic Host Configuration Protocol (DHCP)
CHAPTER 10: DHCP Routing & Switching. Objectives 10.0 Introduction 10.1 Dynamic Host Configuration Protocol v Dynamic Host Configuration Protocol.
Windows Vista Configuration MCTS : Advanced Networking.
Port Based Network Access Control
SDN controllers App Network elements has two components: OpenFlow client, forwarding hardware with flow tables. The SDN controller must implement the network.
91th IETF, 10 Nov 2014  Michael Behringer Steinthor Bjarnason Balaji BL
Booting up on the Home Link
A Reference Model for Autonomic Networking draft-ietf-anima-reference-model-03.txt 97th IETF, Nov 2016 Michael Behringer (editor), Brian Carpenter, Toerless.
Configuring and Troubleshooting Routing and Remote Access
Understand Networking Services
Introducing To Networking
Containers as reference environment “Secure Network Bootstrapping Infrastructure” in OpenDaylight Frank Brockners, Kannan Varadhan, Liming Wei, Y F Siu.
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Lecture 4a Mobile IP 1.
Network-based and Client-based DMM solutions using Mobile IP mechanisms draft-bernardos-dmm-cmip-07 draft-bernardos-dmm-pmip-08 draft-bernardos-dmm-distributed-anchoring-09.
Update on BRSKI-AE – Support for asynchronous enrollment
Presentation transcript:

Secure Network Bootstrapping Infrastructure May 15, 2014

 How do devices get initial secure IP connectivity?  Several southbound protocols assume IP connectivity exist for the control protocol (e.g. OpenFlow, Netconf,..)  How do we ensure devices associate with the “right” controller and get an appropriate IP address to do so? (Join a particular Domain)  How do we ensure connectivity to all the devices which have joined a particular domain ? (Reachability)  How do we ensure that devices once connected do not get silently swapped? (Security) Motivation: Secure Network Bootstrapping Infrastructure 2 FE 1 FE 3 FE 5 FE 6 FE 2 FE 4 C1C1 C1C1 C2C2 C2C2

 Fully automatic: Incremental discovery and attachment of devices to a network domain  Manufacturer installed IEEE 802.1AR credentials for device identification  Automatic enrollment of certificates to devices to secure communication and device identity  Automatic assignment of IP-addresses  Virtual out-of-band channel (VOOBC) to connect devices – “hop-by-hop” tunneling  Scalable connectivity (e.g. no star topology overlay)  Routing over tunneled network ensures “always- on” reachability in case of topology changes. Approach Zero touch secure connectivity establishment FE 1 FE 3 FE 5 FE 6 FE 2 FE 4 C1C1 C1C1 C2C2 C2C2  Nice “side effects”:  Topology discovery  Virtual out-of-band channel can be used by other control protocols running between Controller and Forwarding Elements (e.g. Netconf, OpenFlow); i.e. we bootstrap the management network over which OpenFlow, Netconf, etc. can run X

Key Components - Overview 4

Automatic Network Bootstrapping 5 Can you connect me ? What’s your Identifier ? I have 802.1AR credentials Perfect, Let’s talk! Michael Controller Forwarding Element Registrar

Domain Certificates 6 Domain Certificate Present credentials e.g 802.1AR Validate credentials e.g Against Local white list Controller Forwarding Element Registrar

FE 2 Proxy Bootstrap Discovery Hello 802.1AR New Guy! 802.1AR Can you connect me ? Present your Credentials Please ? Controller Registrar FE 1

Virtual Out Of Band Channel 8 1.Secure Tunnel Infra is created Hop by Hop. 2.Each Element gets a IPv6 ULA address (Hash of domain name and device number) 3.Enabling Routing over this Infra provides end-to-end connectivity Michael Forwarding Element FE2 Forwarding Element FE2 Forwarding Element FE1 Forwarding Element FE1 Controller Registrar Secure Tunnel 1 Secure Tunnel 2 Physical Link

FE 1 FE 2 FE 8 FE 7 FE 9 FE 6 FE 5 FE 4 FE 3 SNBI Build-up … 9 Controller Registrar … automatic discovery of topology as side effect.

 Controller  SNBI Registrar – Trust anchor of the domain  SNBI SB plugin – Device discovery/handshake, certificate distribution, virtual out of band channel  Forwarding Element  SNBI client/proxy - Device discovery/handshake, certificate distribution, virtual out of band channel  Portable foundation – Reference environment for forwarding element, using containers  Test environment for system test (controller and forwarding element) SNBI - Key Components 10

 Project Proposal:Secure Network Bootstrapping Infrastructure Project Proposal:Secure Network Bootstrapping Infrastructure  SNBI draft release plan SNBI draft release plan  Project IRC channel on Freenode: #opendaylight-snbi References 11

Q & A 12

Details New device Domain edge device (proxy) SNBI Registrar Domain Discovery.1AR credential Device belongs to domain? Authorization token Domain information Domain enrollment Domain certificate Establish virtual out of band channel

1. The new device discovers the Domain. This starts with a search for a SNBI-Registrar. Contact to the SNBI-Registrar will typically be supplied via a “domain edge device” which is already part of the Domain, has the SNBI active, and acts as a proxy for the SNBI-Registrar. Discovery will first try to locate a “domain edge device” on the local link using neighbor discovery, in case this fails, it will try to obtain an address using DHCP and search for a registrar using DNS service discovery. If this is also not successful, it could search for a predefined, factory- provided global registrar using DNS. Note that the latter two methods already require some form of IP connectivity to the DNS server. 2. The new device presents its 802.1AR credentials to the discovered SNBI-Registrar. The message can be relayed by the “domain edge device” serving as proxy. 3. The SNBI-Registrar checks whether device belongs to the Domain. If true, invites the new device to join the “Domain” and provides it with a “device id”. 4. The new device validates the SNBI-Registrar signature in the invite message and, if valid, decides to join the domain. 5. After accepting the invite message, the new device generates a certificate signing request. It creates a public and private key. 6. The new device then initiates a “Boot strap request” message towards the registrar and provides a PKCS10, PKCS10_signature and the public key. 7. The SNBI-Registrar negotiates to enroll with a Certificate Authority (CA) using the SCEP protocol contained within the SNBI-Registrar component. 8. The result of the negotiation provides a “Domain certificate”, which is relayed from the SNBI-Registrar to the new device using a “Bootstrap response” message. 9. The device is now a member of the domain and will only repeat the discovery process if it is returned to factory default settings. 10. Once enrolled, the new device establishes a “virtual out-of-band channel” to the domain edge device, which connects it securely to the Domain and configures basic IP connectivity:  Create a loopback interface on the new device and assign it an address from an SNBI specific address prefix (e.g. combining the prefix with a hash of the device serial number and domain name).  Establish a secure tunnel between the new device and the domain-edge device.  Automatically configure a routing protocol (e.g. RPL) over the newly established tunnel.RPL Details 14