1 EU SP Security Forum, December, 2008 Vince Fuller (for the LISP crew) Introduction to LISP.

Slides:



Advertisements
Similar presentations
LISP Mobile Node LISP Mobile Node draft-meyer-lisp-mn-00.txt Dino Farinacci, Vince Fuller, Darrel Lewis and David Meyer IETF StockholmHiroshima LISP Working.
Advertisements

Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Deployment of MPLS VPN in Large ISP Networks
Why do current IP semantics cause scaling issues? −Today, “addressing follows topology,” which limits route aggregation compactness −Overloaded IP address.
Routing Basics.
Internetworking II: MPLS, Security, and Traffic Engineering
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IETF 72 – July 2008 Vince Fuller, Darrel Lewis, Eliot Lear, Scott Brim, Dave Oran, Noel Chiappa, John Curran, Dino Farinacci, and David Meyer LISP Deployment.
Introduction to LISP (not (the (programming ( language))))
LISP-CONS A Mapping Database Service NANOG 41 David Meyer, Dino Farinacci, Vince Fuller, Darrel Lewis, Scott Brim, Noel Chiappa NANOG 41 October, 2007.
Internet Draft Status Internet Draft Status draft-farinacci-lisp-{00-12}.txt Dave Meyer, Vince Fuller, Darrel Lewis, Dino Farinacci IETF San Francisco.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
NANOG-46 Philadelphia, June 2009 Vince Fuller & Dave Meyer (for the rest of the LISP crew: Noel Chiappa, Dino Farinacci, Darrel Lewis, Andrew Partan, and.
Oct 26, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
RIPE-59 Lisbon, October 2009 Vince Fuller (for the rest of the LISP crew: Noel Chiappa, Dino Farinacci, Darrel Lewis, Dave Meyer, Andrew Partan, and John.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Petteri Sirén. Content Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary.
– Chapter 4 – Secure Routing
LISP Tech Talk - Part 3 Deployed Network and Use-Cases Dino Farinacci, Dave Meyer, Darrel Lewis, Vince Fuller, Gregg Schudel February 24, 2010.
LISP Mapping Request Format And related topics Joel M. Halpern
NAGing about LISP LISP Designers/Implementors: Dave Meyer, Vince Fuller, Darrel Lewis, Eliot Lear, Scott Brim, Dave Oran, Dana Blair, Noel Chiappa, John.
LISP-Multicast draft-farinacci-lisp-multicast-00.txt Dino Farinacci, Dave Meyer, John Zwiebel, Stig Venaas IETF Dublin - July 2008.
IETF Vancouver - December 2007 Dave Meyer, Vince Fuller, Darrel Lewis, Eliot Lear, Scott Brim, Dave Oran, Noel Chiappa, John Curran & Dino Farinacci Locator/ID.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 New LISP Mapping System: LISP-DDT Presentation to LNOG Darrel Lewis on behalf.
HAIR: Hierarchical Architecture for Internet Routing Anja Feldmann TU-Berlin / Deutsche Telekom Laboratories Randy Bush, Luca Cittadini, Olaf Maennel,
Chapter 9. Implementing Scalability Features in Your Internetwork.
LISP BOF, IETF Dublin, July, 2008 Vince Fuller (for the LISP crew) LISP+ALT Mapping System.
EID: RLOC: IRTF MobOpts – Quebec City July
Cisco Global Routing Summit, August, 2008 Vince Fuller (for the LISP crew) Introduction to LISP+ALT.
RIPE Berlin – May, 2008 Vince Fuller (for Dino, Dave, Darrel, et al) LISP: Intro and Update
Locator/ID Separation Protocol (LISP) Architecture & Protocols LISP Team: Vince Fuller, Darrel Lewis, Eliot Lear, Scott Brim, Dave Oran, Elizabeth McGee,
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
APRICOT Taipei – February, 2008 Dave Meyer, Vince Fuller, Darrel Lewis, Eliot Lear, Scott Brim, Dave Oran, Noel Chiappa, John Curran & Dino Farinacci Locator/ID.
Network Security1 Secure Routing Source: Ch. 4 of Malik. Network Security Principles and Practices (CCIE Professional Development). Pearson Education.
LISP Deployment Scenarios Darrel Lewis and Margaret Wasserman IETF 76, Hiroshima, Japan.
IETF/IRTF Chicago - July 2007 Dino Farinacci Dave Meyer Vince Fuller Darrel Lewis LISP Implementation Report.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
LISP BOF Update draft-farinacci-lisp-08.txt Dino Farinacci, Dave Meyer, Vince Fuller, Darrel Lewis, Scott Brim, Dave Oran IETF Dublin - July 2008.
LISP-CONS A Mapping Database Service IETF/IRTF - July 2007 Dave Meyer Dino Farinacci Vince Fuller Darrel Lewis Scott Brim Noel Chiappa.
LISP Internet Groper (LIG) LISP Internet Groper (LIG) draft-farinacci-lisp-lig-01.txt Dino Farinacci, Vince Fuller, Darrel Lewis and David Meyer IETF Stockholm/Hiroshima.
Dave Meyer & Dino Farinacci LISP Designers: Dave Meyer, Vince Fuller, Darrel Lewis, Andrew Partan, John Zwiebel, Scott Brim, Noel Chiappa & Dino Farinacci.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
Separating Location from Identification Dino Farinacci March 3, 2008.
NANOG Brooklyn – June, 2008 Vince Fuller (for Dino, Dave, Darrel, et al) LISP Update
LISP Locator Reachability Algorithms Dino Farinacci, Dave Meyer, Darrel Lewis, Vince Fuller, Andrew Partan, Noel Chiappa IETF Stockholm LISP Working Group.
1 John Scudder, David Ward Emerging Routing Issues.
Inter-domain Routing Outline Border Gateway Protocol.
6to4
LISP Map Server LISP WG IETF-74 San Francisco draft-fuller-lisp-ms-00.txt Vince Fuller & Dino Farinacci.
COM594: Mobile Technologies Location-Identifier Separation.
November 2008 LISP Implementation Team: Vince Fuller, Darrel Lewis, David Meyer, Dino Farinacci, Andrew Partan, John Zwiebel LISP: Practice and Experience.
IDR WG, IETF Dublin, August, 2008 Vince Fuller (for the LISP crew) LISP+ALT Mapping System.
MPLS Virtual Private Networks (VPNs)
IP: Addressing, ARP, Routing
LISP Implementation Report
IETF/IRTF Vancouver - December 2007
Draft-ermagan-lisp-nat-traversal-00 Vina Ermagan, Dino Farinacci, Darrel Lewis, Fabio Maino, Jesper Skriver, Chris White Presenter: Vina Ermagan IETF.
LISP BOF, IETF 72 Dublin, July, 2008 Darrel Lewis (for the LISP crew)
LISP: A Level of Indirection for Routing
Stateless Source Address Mapping for ICMPv6 Packets
IDR WG, IETF Dublin, July, 2008 Vince Fuller (for the LISP crew)
An Update on Multihoming in IPv6 Report on IETF Activity
ITIS 6167/8167: Network and Information Security
Presentation transcript:

1 EU SP Security Forum, December, 2008 Vince Fuller (for the LISP crew) Introduction to LISP

EU SP Security Forum, December, 2008Slide 2 Acknowledgements This work is a collaborative effort, most notably with my colleagues on the LISP “core” team: –Dino Farinacci – leader, instigator, and implementer –Dave Meyer – evangelist –Darrel Lewis – security geek Special thanks are due to J. Noel Chiappa who’s writings on naming and addressing opened my eyes to the concepts of “identifier” and “locator” –See: “Endpoints and Endpoint names: A Proposed Enhancement to the Internet Architecture”, J. Noel Chiappa, 1999, –“On the Naming and Binding of Network Destinations”, J. Saltzer, August, 1993, published as RFC1498,

Introduction to LISPEU SP Security Forum, December, 2008Slide 3 Agenda What is the problem? What is LISP? Why Locator/ID Separation? Data Plane Operation Finding Mappings – LISP+ALT A word or two about “interworking” Implementation and pilot network Securiy considerations for LISP Call for participation

Introduction to LISPEU SP Security Forum, December, 2008Slide 4 Problem Statement There are reasons to believe that current trends in the growth of routing and addressing state on the global Internet may cause difficulty in the long term The Internet needs an easier, more scalable mechanism for multi-homing with traffic engineering

Introduction to LISPEU SP Security Forum, December, 2008Slide 5 Problem Statement An Internet-wide replacement of IPv4 with ipv6 represents a one-in-a-generation opportunity to either continue current trends or to deploy something truly innovative and sustainable As currently specified, routing and addressing with ipv6 is not significantly different than with IPv4 – it shares many of the same properties and scaling characteristics More at:

Introduction to LISPEU SP Security Forum, December, 2008Slide 6 Scaling of Global Routing

Introduction to LISPEU SP Security Forum, December, 2008Slide 7 Global Routing – Log view

Introduction to LISPEU SP Security Forum, December, 2008Slide 8 Instead of IP addresses, two numbering spaces: –Endpoint Identifiers (EIDs): hierarchically assigned to sites along administrative lines (like DNS hostnames) Do not change on devices that remain associated with the site; think “PI” but not globally-routable –Routing Locators (RLOCs): assigned according to network topology, like “PA” address assignments Locators are aggregated/abstracted at topological boundaries to keep routing state scalable When site’s connection to network topology changes, so do the locators – aggregation is preserved What is ID/Loc Separation?

Introduction to LISPEU SP Security Forum, December, 2008Slide 9 Hierarchical EID assignment Provider A /8 Provider B /8 R1R2 PI EID-prefix / ISP allocates 1 locator address per physical attachment point (follows network topology) RIR allocates EID-prefixes (follows org/geo hierarchy) Site Legend: EIDs -> Green Locators -> Red

Introduction to LISPEU SP Security Forum, December, 2008Slide 10 Provider A /8 Provider B /8 R1R2 BGP End Site Benefit (1)Easier Transition to ipv6 (maybe) (2)Change provider without address change Lower OpEx for Sites and Providers (1)Improve site multi-homing (2)Improve provider traffic engineering (3)Reduce size of core routing tables What Features do I get? Site with PI Addresses

Introduction to LISPEU SP Security Forum, December, 2008Slide 11 What is LISP? Locator/ID Separation Protocol Ground rules for LISP: –Network-based solution –No changes to hosts whatsoever –No new addressing changes to site devices –Very few configuration file changes –Imperative to be incrementally deployable –Address family agnostic

Introduction to LISPEU SP Security Forum, December, 2008Slide 12 New Network Elements Ingress Tunnel Router (ITR) –Finds EID to RLOC mapping –Encapsulates to Locators at source site Egress Tunnel Router (ETR) –Owns EID to RLOC mapping –Decapsulates at destination site

Introduction to LISPEU SP Security Forum, December, 2008Slide 13 Packet Forwarding Provider A /8 Provider B /8 S ITR D ETR Provider Y /8 Provider X /8 S1 S2 D1 D2 PI EID-prefix /8 PI EID-prefix /8 DNS entry: D.abc.com A EID-prefix: /8 Locator-set: , priority: 1, weight: 50 (D1) , priority: 1, weight: 50 (D2) Mapping Entry > > Legend: EIDs Locators > > > Policy controlled by destination site

Introduction to LISPEU SP Security Forum, December, 2008Slide 14 When the ITR has no Mapping ITR needs RLOCs from a site ETR for a particular EID prefix ITR sends Map Request (or Data Probe) ETR returns Map Reply But how does the ITR find the right ETR? –Using the mapping system…

Introduction to LISPEU SP Security Forum, December, 2008Slide 15 Mapping System: What and Why Need a scalable EID to Locator mapping lookup mechanism Network based solutions –Have query/reply latency –Can have packet loss characteristics –Or, have a full table like BGP does How does one design a scalable Mapping Service?

Introduction to LISPEU SP Security Forum, December, 2008Slide 16 Scaling Constraints Build a large distributed mapping database service Scalability paramount to solution How to scale: (state * rate) If both factors large, we have a problem –state will be O(10 10 ) hosts Aggregate EIDs into EID-prefixes to reduce state –rate must be small Dampen locator reachability status and locator-set changes Each mapping system design does it differently

Introduction to LISPEU SP Security Forum, December, 2008Slide 17 Tough Questions/Issues Where to store the mappings? How to find the mappings? Push model or pull model? Full database or cache? Secondary storage? How to secure mapping entries? How to secure control messages? Protecting infrastructure from attacks Control over packet loss and latency

Introduction to LISPEU SP Security Forum, December, 2008Slide 18 Ideas Considered DNS – considered, many issues DHTs – considered, research pending CONS – new protocol, hybrid push+pull –Push EID-prefixes at top levels of hierarchy –Pull mappings from lower levels of hierarchy EMACS – multicast-group-based NERD – pure Push design ALT – GRE/BGP based, current focus

Introduction to LISPEU SP Security Forum, December, 2008Slide 19 Why LISP+ALT was Selected Use existing technology where reasonable Low memory impact on ITR Optional data path to reduce latency (deprecated data probes) Allow infrastructure players to achieve new revenue source

Introduction to LISPEU SP Security Forum, December, 2008Slide 20 LISP+ALT: What and How Hybrid push/pull approach –ALT pushes aggregates - find ETRs for EID –ITR uses LISP to find RLOCs for specific EID Hierarchical EID prefix assignment –Aggregation of EID prefixes Tunnel-based overlay network BGP used to advertise EIDs on overlay Option for data-triggered Map-Replies (deprecated for now)

Introduction to LISPEU SP Security Forum, December, 2008Slide 21 LISP-ALT Routers and the ALT LISP+ALT routers form “Alternative Logical Topology” (ALT) –Interconnected by tunnels (GRE or …) –eBGP used for EID prefix propagation –Isomorphic topology and EID assignment ITRs and ETRs connect at “edge”

Introduction to LISPEU SP Security Forum, December, 2008Slide 22 Tunnel and BGP Operation EID prefixes originated into BGP at edge –advertised by ETR to its first-hop ALT router ITR learns EID prefixes via eBGP – advertised by first-hop ALT router to ITR Map-Request forwarded into the ALT via first- hop ALT router –intermediate ALT routers forward Map-Request to ETR that “owns” an EID prefix ALT routers aggregate prefixes “upward” in the alternative topology

Introduction to LISPEU SP Security Forum, December, 2008Slide 23 Legend: EIDs -> Green Locators -> Red GRE Tunnel Low Opex Physical link Data Packet Map-Request Map-Reply ETR ITR EID-prefix /24 ALT > > EID-prefix / > > > ALT-rtr ? > > ? > > ? < /24 < /24 < /16 ? LISP+ALT in action

Introduction to LISPEU SP Security Forum, December, 2008Slide 24 “low-opex” xTR – what & why BGP configuration complexity is a barrier to site-multihoming Remove xTR/CPE BGP requirement: –ITR has “static default EID-prefix route” to “first hop” ALT router –“first hop” ALT router has “static EID-prefix route” pointing to ETR –originates EID prefix on behalf of ETR Considering new “map-server” element

Introduction to LISPEU SP Security Forum, December, 2008Slide 25 A few open ALT issues Who runs the ALT network? –What’s the business model? –Should it be rooted at/run by the RIRs? IXCs? Some other neutral parties? –Different levels run by different orgs –Should it be free? OK to renumber to get “PI” EID prefix? Interworking/transition strategies (later) Work in standards/ops community (later) Others?

Introduction to LISPEU SP Security Forum, December, 2008Slide 26 Interworking LISP will not be deployed overnight –And may never be deployed at some sites Need “Interworking” between LISP sites and non-LISP sites Two choices: –Proxy Tunnel Routers – advertise EID space to Internet; act as ITR for non-LISP sites –LISP-NAT – LISP site xTR translates EIDs into “legacy” Internet addresses draft-lewis-lisp-interworking-01.txt

Review: LISP in one Slide Today’s Internet - Data Plane LISP-ALT Control Plane LISP Site Non-LISP Site LISP Site GRE Tunnels Physical Links CE LISP Routers LISP Routers RLOCs EIDs EIDs assigned by Internet Registries RLOCs assigned by Service Providers Configure EID -> RLOCs database mappings for local site Stores EID -> RLOCs cache mappings for remote sites Benefits: Improved low-opex multihoming Site based policy and reachability Reduces routing tables in core routers No site renumbering when changing ISPs No changes to site hosts No changes to site switches/routers No changes to core routers No DNS changes No site addressing changes Works with PI or PA prefixes Supports 4to4-over-6 and 6to6-over-4 Sites authoritative for their mappings Interworks with non-LISP sites using translation or PTRs Costs: Mapping system required New Software in CE routers New LISP-ALT infrastructure Legend: EIDs (End Site IDs) in green RLOCs (Routing Locators) in red CE: Customer Premise Edge Router ALT: Alternative LISP Topology OH: Outer header, CE to CE IH: Inner header, host to host “Separating ID and Location in an IP address through a level of indirection” CE Advertises RLOCs to maintain aggregation and provide reachability to sites RLOCs EIDs Data Packet Payload OHIHHost Data Wed Nov 26 16:23:38 PST 2008 CE Advertises EID-prefixes to find mappings

Introduction to LISPEU SP Security Forum, December, 2008Slide 28 Implementation Status cisco has a LISP prototype implementation –Started in March 2007 –Testing on pilot network since summer ‘07 OS platform is NX-OS (on top of Linux) Hardware platform is Titanium –1 RU dual-core off-the-shelf PC with 7 GEs Based on draft-farinacci-lisp-10.txt Software switching only Supports both IPv4 and ipv6 Includes ALT and Interworking Traceroute and debugging features

Introduction to LISPEU SP Security Forum, December, 2008Slide 29 Implementation Status IOS 12.4T prototype is in the works OpenLISP implementation: draft-iannone-openlisp-implementation-00.txt Would really like to see more

Introduction to LISPEU SP Security Forum, December, 2008Slide 30 LISP: Practice & Experience NANOG 44 Slide 30 Deployment status – ALT pilot LISP: Practice & Experience Slide 30 NANOG 44

Introduction to LISPEU SP Security Forum, December, 2008Slide 31 Security in LISP Control Plane Security –What’s going on in the ALT? Data Plane Security –What are the implications of security in a loc/id split world Site Security –What needs to be able to talk to my RLOCs? Likely more work needed…

Introduction to LISPEU SP Security Forum, December, 2008Slide 32 Control Plane Security Use existing/proposed BGP security mechanisms –Filtering of ETR-to-ALT announcements –MD5 authentication of sessions –S-BGP/SO-BGP as they are developed –SIDR for address assignment checking GRE Tunnels need love too –ACLs to prevent anything other than BGP, ICMP, and UDP 4342 –Likely need something other than just GRE in the longer term due to data-insertion issues

Introduction to LISPEU SP Security Forum, December, 2008Slide 33 Data Plane Security In the Core, things look… different with lots of LISP flows –All LISP data is encapsulated into UDP4341 –The inner header/data is there, 36 Bytes from the start –Think about how to look at that data… Spoofing, and (spoofing) –Outer Header spoofing is no different than UDP today –Inner header spoofing is a little bit more tricky

Introduction to LISPEU SP Security Forum, December, 2008Slide 34 ITR/ETR/ALT are vulnerable ITRs and ETRs represent new targets for attacks (as do ALT routers) Nonce in LISP request/reply exchange –Guards against third-party spoofing –But doesn’t prevent “man-in-the-middle” attacks Mitigation using well-known control plane protection techniques (infrastructure hiding, iACLs, rACLs, CoPP, etc.) More work likely needed… …must balance against deployability

Introduction to LISPEU SP Security Forum, December, 2008Slide 35 Site Security At the site, securing your xTR is pretty straightforward. –Allow LISP (data & control) packets to your RLOCs –Allow GRE (for ALT) to your RLOCs –Allow for ICMP to your RLOCs –LISP enforces spoofing on decapsulation Outgoing –LISP enforces uRPF on encapsulation so you are prohibited from spoofing inner headers

Introduction to LISPEU SP Security Forum, December, 2008Slide 36 Site Security (Continued) Post encapsulation, your site’s policies can remain the same Flexible packet matching is an existing IOS tool that can be used to build ACLs on inner/lisp/outer header chains (12.4T) More work needed here so if you’re interested…

Introduction to LISPEU SP Security Forum, December, 2008Slide 37 Interested in more? Considering additional external test sites –Must be able to dedicate minimum of 1 day a week Goals: –Test multiple implementations –Experience with operational practices –Learn about revenue making opportunities Developers at: Discussion at:

Introduction to LISPEU SP Security Forum, December, 2008Slide 38 LISP Internet Drafts draft-farinacci-lisp-10.txt draft-fuller-lisp-alt-03.txt draft-lewis-lisp-interworking-01.txt draft-farinacci-lisp-multicast-01.txt draft-meyer-lisp-eid-block-01.txt draft-mathy-lisp-dht-00.txt draft-iannone-openlisp-implementation-01.txt draft-brim-lisp-analysis-00.txt draft-meyer-lisp-cons-04.txt draft-lear-lisp-nerd-04.txt draft-curran-lisp-emacs-00.txt

Introduction to LISPEU SP Security Forum, December, 2008Slide 39 Questions/Comments? Thanks! Discussion: Information: OpenLISP: