On the Impact of Security Protocols on the Performance of SNMP J. Schonwalder and V. Marinov IEEE Transactions on Network and Service Management, 2011,

Slides:



Advertisements
Similar presentations
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Advertisements

Encrypting Wireless Data with VPN Techniques
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
SNMP v3.
Implementation and Performance Analysis of SNMP on a TLS/TCP Base. Du, Shayman and Rozenblitz Sarwar S Raza WPI – CS 577.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 5 Network Security Protocols in Practice Part I
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Stream Control Transmission Protocol 網路前瞻技術實驗室 陳旻槿.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
1 SNMP Simple Network Management Protocol. 2 SNMP Overview Define mechanism for remote management of network devices (routers, bridges, etc.) Fundamental.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
UDP© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science Department.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Integrated Security Model for SNMPv3 (ISMS) pronounced "is" "miss" David T. Perkins & Wes Hardaker 60 th IETF August 6, 2004.
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
Gursharan Singh Tatla Transport Layer 16-May
1 Implementation and Performance Analysis of SNMP on a TLS/TCP Base X. Du, M. Shayman M. Rozenblit X. Du, M. Shayman M. Rozenblit University of Maryland.
OIS Model TCP/IP Model.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SNMP Simple Network Management Protocol Team: Matrix CMPE-208 Fall 2006.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
Slide 1 SNMPv3, SSH & Cisco Matthew G. Marsh Chief Scientist of the NEbraskaCERT.
Network Management Security
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
Network Management Security
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
SCTP: A new networking protocol for super-computing Mohammed Atiquzzaman Shaojian Fu Department of Computer Science University of Oklahoma.
ISMS IETF72 David Harrington. Status IETF72 Transport Subsystem for the Simple Network Management Protocol (SNMP) –IETF69: draft-ietf-isms-tmsm-09.txt.
Teacher:Quincy Wu Presented by: Ying-Neng Hseih
SSHSM Issues David Harrington IETF64 ISMS WG Vancouver, BC.
Presentation at ISMS WG Meeting1 ISMS – March 2005 IETF David T. Perkins.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
Performance Evaluation of L3 Transport Protocols for IEEE (2 nd round) Richard Rouil, Nada Golmie, and David Griffith National Institute of Standards.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Cryptography CSS 329 Lecture 13:SSL.
Transport Mapping Security Model D. Harrington. Architecture Transport Mapping Dispatcher Message Processing Model ApplicationsAccess Control Model TM.
The Transport Layer Implementation Services Functions Protocols
File Transfer Issues with TCP Acceleration with FileCatalyst
Computer Networks Protocols
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Presentation transcript:

On the Impact of Security Protocols on the Performance of SNMP J. Schonwalder and V. Marinov IEEE Transactions on Network and Service Management, 2011, pp slides Group 6 KHAN, Taimur KONG, Jing SHIH, Min SUN, Mengti YU, Chenglin

Summary 2 Question: How can SSH, TLS, DTLS be used to address limitations in SNMPv3/USM? Analyzing impact and performance between the various options to secure SNMP Answer this question by

Outline Background SNMP Architecture Message-based Security Session-based Security Performance Evaluation Key Findings Guidelines for Choosing Solutions 3

Background SSH, TLS, DTLS are introduced which can take advantage of already deployed key management infrastructures 4 SNMPv1 has no cryptographic security && the engineered solution on SNMPv2 is too complex USM (User- based Security Model) on SNMPv3 SNMPv3 and USM have to deploy another user and key management infrastructure  high cost

SNMP Architecture 5 Ref. RFC3414(USM), 3584(CSM), 5591(TSM), 5592(SSHTM), 6353(TLSTM) ASIs are the interfaces between subsystem

SNMP Architecture SNMP engine – Dispatcher organizes data flows – Subsystems contain multiple models – Abstract Service Interfaces (ASIs) are used between the communicating subsystems 6 Ref. RFC3411, 5590

SNMP Engine Subsystems Message Processing Security – User-based Security Model (USM) – Community-based Security Model (CSM) – Transport Security Model (TSM) Interacts with session-based transports through cache Access Control – View-based Access Control Model (VACM) Transport – SSH Transport Model (SSHTM) – (D)TLS Transport Model (TLSTM) 7

Message-based Security CSM (SNMPv1, SNMPv2c) – Plain-text community string which provides very little security. USM (SNMPv3) – noAuthNoPriv (nn) no authentication, no encryption – authNoPriv (an) message authentication, message integrity, timeliness checking no encryption – authPriv (ap) message authentication, message integrity, timeliness checking encryption of the payload of SNMP messages 6

TSD for Message-based Security 7

Session-based Security Transport Security Model – Negligible costs on passing existing information SSH Transport Model – Many methods for authentication TLS Transport Model for TLS – Session resumption mechanism – X.509 certificates for authentication TLS Transport Model for DTLS (over datagram) 8

TSD for Session-based Security 9

Performance Evaluation Session Establishment Latency without Packet Loss Bandwidth Usage Latency with Packet Loss Impact of Bulk Retrieval 10

11 Session Establishment PERFORMANCE OF A SINGLE SNMPGET REQUESTS (SYSDESCR.0)

Session Establishment TCP > UDP, otherwise SNMPv1 ≈ SNMPv2c USM > CSM, however USM/ap ≈ USM/nn Session establishment = significant delays especially on slow machine SSH > TLS/DTLS TLS with session resumption is close to USM in terms of bandwidth and packets exchanged 14

12 USM/ap ≈ USM/an ≈ USM/nn little benefit in removing auth/priv Slow machine Fast machine

13 USM/ap ≈ TSM/SSH ≈ TSM/(D)TLS difference of protocols do not have much impact on delays if using similar hash functions and encryption transformations Latency without Packet Loss ( II )

14 For v3/USM/ap, v3/USM/nn, v2/CSM over UDP ≈ over TCP UDP ≈ TCP in a fast reliable network

15 USM/ap > USM/an > USM/nn > SNMPv2/TCP >SNMPv2/UDP

16 TSM/TLS > TSM/SSH > USM > TSM/DTLS

Bandwidth Usage USM/ap > USM/an > USM/nn > SNMPv2/TCP > SNMPv2/UDP – carrying security parameters – TCP header > UDP header Interestingly USM/ap-nn ≈ SNMPv2/tcp-udp TSM/TLS > TSM/SSH > USM > TSM/DTLS – TCP header > UDP header – TLS is less efficient than SSH in message encodings Interestingly TSM/SSH/TCP/ap ≈ USM/UDP/ap 20

Latency with Packet Loss TCP's retransmission algorithm clearly outperforms simple non-adaptive SNMP retransmission algorithm 17 PACKET SIZES FOR ALL SECURITY MODEL / TRANSPORT / SECURITY LEVEL COMBINATIONS

18 Impact of Bulk Retrieval ↑ max-repetitions parameter (r) ↓ number of interaction needed ↓ overall latency In the best case, r reduces the number of interactions to 1/r. But not the same factor for latency

Impact of Bulk Retrieval ↑ max-repetitions parameter (r) ↓ number of interaction needed ↓ overall latency In the best case, r reduces the number of interactions to 1/r But not the same factor for latency – larger response messages – startup costs not affected 23

Key Findings TLS session resumption feature significantly reduces the session reestablishment costs. – The resumption mechanism for SSH has yet to be standardised The difference between USM, SSH, TLS and DTLS in terms of latency is small after the session is established. The non-adaptive SNMP retransmission algorithm is outperformed by TCP algorithms in packet loss networks. The usage of GetBulk dramatically reduces the number of requests sent over the network, resulting in much better overall performance. 19

Guidelines for Choosing Solutions (SNMPv3/TSM/SSH) Good AAA Integration Easy derivation of securityName Efficient message encoding × Large session establishment overhead × Lack of session resumption mechanisms TCP Supports large messages better than UDP TCP retransmission algorithms work well 20

Guidelines for Choosing Solutions (SNMPv3/TSM/TLS) Same pros and cons of using TCP as SSHTM TLS session resumption Less session startup overhead than SSH × Less efficient in message encodings than SSH × Complicated derivation of securityName × Lack of good AAA integration × X.509 infrastructure must be in place 21

Guidelines for Choosing Solutions (SNMPv3/TSM/DTLS) Shares most of the pros and cons of TLSTM Smaller framing overhead over UDP Applications have control over retransmissions Although application retransmission timers are to be coordinated with DTLS retransmission timers 22

Guidelines for Choosing Solutions (SNMPv3/USM/UDP) Separate key management infrastructure – Ensures the availability of security regardless of the presence of other infrastructures – × Expensive to deploy Works efficiently if interactions are sporadic Applications have full control over retransmissions. SNMP/UDP may suffer from IP fragmentation 23

Related work Session resumption for the secure shell protocol Thank you! Question? 24