Secure routing for structured peer-to-peer overlay networks M. Castro, P. Druschel, A. Ganesch, A. Rowstron, D.S. Wallach 5th Unix Symposium on Operating.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Scalable Content-Addressable Network Lintao Liu
Storage management and caching in PAST Antony Rowstron and Peter Druschel Presented to cs294-4 by Owen Cooper.
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005.
SplitStream: High- Bandwidth Multicast in Cooperative Environments Monica Tudora.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker Presented by Greg Nims.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Storage Management and Caching in PAST, a large-scale, persistent peer- to-peer storage utility Authors: Antony Rowstorn (Microsoft Research) Peter Druschel.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan.
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Presented by.
Pastry Partially borrowed for Gabi Kliot. Pastry Scalable, decentralized object location and routing for large-scale peer-to-peer systems  Antony Rowstron.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Centre for Wireless Communications University of Oulu, Finland
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Microsoft Research.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Wide-area cooperative storage with CFS
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems (Antony Rowstron and Peter Druschel) Shariq Rizvi First.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Security Considerations for Structured p2p Peng Wang 6/04/2003.
Wide-area cooperative storage with CFS Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Practical Byzantine Fault Tolerance
CIS 640-2, Presenter: Yun Mao1 Security for Structured Peer- to-peer Overlay Networks By Miguel Castro et al. OSDI ’ 02 Presented by Yun Mao in CIS640.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Secure Routing for Structured Peer-to-Peer Overlay Networks M. Castro, P. Druschel, A. Ganesh, A. Rowstron and D. S. Wallach Proc. Of the 5 th Usenix Symposium.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel, Middleware 2001.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Chord Advanced issues. Analysis Theorem. Search takes O (log N) time (Note that in general, 2 m may be much larger than N) Proof. After log N forwarding.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Chord Advanced issues. Analysis Search takes O(log(N)) time –Proof 1 (intuition): At each step, distance between query and peer hosting the object reduces.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Controlling the Cost of Reliability in Peer-to-Peer Overlays
COS 461: Computer Networks
Accessing nearby copies of replicated objects
PASTRY.
Secure Routing for Structured Peer-to-Peer Overlay Networks
COS 461: Computer Networks
Presentation transcript:

Secure routing for structured peer-to-peer overlay networks M. Castro, P. Druschel, A. Ganesch, A. Rowstron, D.S. Wallach 5th Unix Symposium on Operating Systems Design and Implementation (OSDI), December 2002 Seminar of Distributed Computing Anna Wojtas

6/2/2015Anna Wojtas2 Security in Peer-to-Peer networks  Peer-to-Peer networks are meant to be open and autonomous  availability  authenticity of documents  anonymity  access control  Possible attacks:  denial of service  poisoning attack  insertion of viruses to carried data

6/2/2015Anna Wojtas3 Agenda  Definition: Overlay network  Motivation  Model  Secure node assignment  Secure routing table maintenance  Secure message forwarding  Self-certifying data  Conclusions

6/2/2015Anna Wojtas4 Definition: Overlay network overlay edge

6/2/2015Anna Wojtas5 Agenda  Definition: Overlay network  Motivation  Model  Secure node assignment  Secure routing table maintenance  Secure message forwarding  Self-certifying data  Conclusions

6/2/2015Anna Wojtas6 Motivation Status quo (2002):  self-organizing  scalable  fault-tolerant  provide effective load balancing Support for open environments:  robustness against malicious nodes

6/2/2015Anna Wojtas7 Agenda  Definition: Overlay network  Motivation  Model  Secure node assignment  Secure routing table maintenance  Secure message forwarding  Self-certifying data  Conclusions

6/2/2015Anna Wojtas8 Model: routing overlay  Large Id space (128-bit)  Node identifiers  nodeIds  Application-specific objects  keys  Mapping key x nodeId  key’s root  nodeIds x IP addresses  routing table  Closest nodeIds  neighbor set  Key  replica keys  replica roots  replica function

6/2/2015Anna Wojtas9 Model: Pastry 02^ a1fc Route(d46a1c) neighbor set d13da3 d4213f d462ba d467c4 d471f1

6/2/2015Anna Wojtas10 Pastry cont. nodeId 6x 65x 65ax 65a1x 65a 1 x

6/2/2015Anna Wojtas11 Model: system N nodes f (0<f<1) c (1/N<c<f) static IP Communication: network- level, overlay-level Adversary: complete control of nw-level communication delay messages between correct nodes

6/2/2015Anna Wojtas12 Model: secure routing Routing primitive:  best-effort service to deliver a message to a replica root associated with a given key Cannot be used to construct secure applications:  corrupt, delete, deny access to or supply stale copies of replicas

6/2/2015Anna Wojtas13 Model: secure routing cont. Secure routing primitive:  ensures that when a non-faulty node sends a message to a key k, the message reaches all non-faulty members in the set of replica roots with a very high probability Requires solution for:  securely assigning nodeIds to nodes  securely maintaining the routing tables  securely forwarding messages

6/2/2015Anna Wojtas14 Agenda  Definition: Overlay network  Motivation  Model  Secure node assignment  Secure routing table maintenance  Secure message forwarding  Self-certifying data  Conclusions

6/2/2015Anna Wojtas15 Secure node assignment Attacks:  network partitioning  DoS on single nodes / objects  Attacker cannot choose the value of the nodeId assigned to the node she controls Solution :  certified nodeIds

6/2/2015Anna Wojtas16 Secure assignment cont.  Victim’s access to the overlay completely mediated by the attacker Victim  Control of other nodes accessing a victim’s file

6/2/2015Anna Wojtas17 Secure assignment cont. More attacks:  delete, corrupt or deny access to objects  attacker cannot choose the value of the nodeId assigned to the node she controls Solution :  certified nodeIds

6/2/2015Anna Wojtas18 Secure node assignment Certified nodeIds:  CAs assign nodeId certificates  binding of a random nodeId to the public key for a IP address  nodeId swapping attacks harder  only for static IP addresses  works well only for fixed nodeIds  doesn’t solve all problems…

6/2/2015Anna Wojtas19 Secure assignment cont. Sybil attacks:  peer impersonates multiple virtual peers  destroy cohesion of the overlay  observe network status  slow down, destroy overlay  DoS  attacker cannot easily obtain a large number of nodeId certificates

6/2/2015Anna Wojtas20 Secure assignment cont. Solution:  pay for certificates  cost $20, controlling 10% of  1000 nodes  $2,000  1,000,000 nodes  $2,000,000  bind nodeIds to real-world identities  for overlays run by an organization

6/2/2015Anna Wojtas21 Secure assignment cont. Distributed nodeId generation:  CA is point of failure  techniques to moderate the rate at which attackers can acquire nodeIds  crypto puzzles

6/2/2015Anna Wojtas22 Agenda  Definition: Overlay network  Motivation  Model  Secure node assignment  Secure routing table maintenance  Secure message forwarding  Self-certifying data  Conclusions

6/2/2015Anna Wojtas23 Secure routing table maintenance Goal:  create routing table, neighbor sets for joining nodes and maintaining them  secure nodeId assignment necessary but not sufficient  Attacks…

6/2/2015Anna Wojtas24 Secure routing table cont.  Routing algorithms using network proximity information: ping pong  Increased probability that faulty nodes are used for routing

6/2/2015Anna Wojtas25 Secure routing table cont.  Systems with weak constraints on routing updates  updates received during joining  periodical fetch of routing table entries  attackers can easily supply updates pointing to faulty nodes  probability of routing table entry is faulty after update (1-f)*f +f*1 > f  fraction of faulty entries  1

6/2/2015Anna Wojtas26 Secure routing table cont. Theoretical solution:  strong constraints on the set of nodeIds that can fill each slot of the routing table  e.g. closest nodeId to some point in id space  can be verified  independent of network proximity information

6/2/2015Anna Wojtas27 Secure routing table cont. Practical solution (Pastry):  2 routing tables  locality-aware routing table exploits network proximity information for efficient routing  used to forward messages to achieve good performance  prefix D whatever  additional table constraints routing table entries  used when the efficient routing technique fails  prefix D suffix

6/2/2015Anna Wojtas28 Agenda  Definition: Overlay network  Motivation  Model  Secure node assignment  Secure routing table maintenance  Secure message forwarding  Self-certifying data  Conclusions

6/2/2015Anna Wojtas29 Secure message forwarding  Certified IDs & secure routing table maintenance  guarantees that each constraint routing table has an average fraction f of entries pointing to faulty nodes  attacker can reduce probability of successful delivery by not forwarding according to the algorithm

6/2/2015Anna Wojtas30 Secure message forwarding cont. Attacks:  drop the message  route the message to the wrong place  pretend to be the key’s root  Probability of routing successfully to a replica root is (1-f) h  h is the number of average hops for delivering a message  h depends on the overlay

6/2/2015Anna Wojtas31 Secure message forwarding cont.  it is important to have a mechanism to route securely

6/2/2015Anna Wojtas32 Secure message forwarding cont. Theoretical solution:  route a message efficiently  apply failure test to determine if routing has worked  upon failure of the test use redundant routing

6/2/2015Anna Wojtas33 Secure message forwarding cont. Practical solution (Pastry):  use locality-aware routing table for efficient routing  collect the prospective set of replica roots from the prospective root node  apply failure test to the set  if test negative, accept the replica roots as correct  if test positive, send message copies over diverse routes towards various replica roots

6/2/2015Anna Wojtas34 Secure message forwarding cont. Failure test:  average density of nodeIds per unit of “volume” in the id space is greater than the average density of faulty nodes  compare densities replica roots = subset of key’s root neighbor set sender prospective key’s root µ sender average numerical distance between consecutive nodes in sender’s neighbor set rn = id 0,…, id l+1 prospective root neighbor set µ rn average numerical distance between consecutive nodes in rn Test:  all nodes in rn have a valid nodeId certificate  µ rn < µ sender * γ

6/2/2015Anna Wojtas35 Secure message forwarding cont. Problems  false positives (α), false negatives (β)  γ controls tradeoff between α and β Attacker can  collect nodeId certificates of node that have left the overlay  increase density of a prospective root neighbor set  include nodeId it controls and nodeIds of correct nodes Solution  sender has to contact all neighbors to find out if they are alive and have the same nodeId certificate

6/2/2015Anna Wojtas36 Secure message forwarding cont. NodeId suppression attack  suppress nodeIds close to the sender  increase false negatives (β)  suppress nodeIds in the root’s neighbor set  increases false positives (α)  combination of both  routing test is not very accurate  tradeoff increased α to achieve targeted β  β=0.001, c=f ≤ 0.3  α no_attack =0.12, α attack =0.77

6/2/2015Anna Wojtas37 Secure message forwarding cont. Redundant routing  use multiple routes  neighbor set anycast sender p destination key x message m (nonce) x’s neighbor set Sig(nonce) s collects in a set N l/2+1 numerically closest to x on the left and on the right only certificates with valid signed nonces are added to N and marked pending after timeout or after all replies received, s sends a list with nodeIds in N to each node marked pending in N and marks the nodes done list m ok probability of reaching all correct replica roots ~ probability that at least one of the anycast messages is forwarded over a route with no faults for 100,000 nodes, l = 32  for f < 0.3

6/2/2015Anna Wojtas38 Agenda  Definition: Overlay network  Motivation  Model  Secure node assignment  Secure routing table maintenance  Secure message forwarding  Self-certifying data  Conclusions

6/2/2015Anna Wojtas39 Self-certifying data  minimize use of secure routing by storing self-certifying data in the overlay  clients use efficient routing to request a copy of an object  client performs integrity check and use secure routing only upon failure  does not help when inserting new objects  node joining requires secure routing  self-certifying data can eliminate the overhead of secure routing in common cases

6/2/2015Anna Wojtas40 Conclusions  The authors analyzed various approaches for the problems  Weak performance evaluation  Paper cited in ~40 other papers

Questions?