A Source Address Validation Architecture (SAVA) and IETF SAVI Working Group Jun Bi Tsinghua University/CERNET Oct 20, 2008.

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

Security Issues In Mobile IP
SAVI Requirements and Solutions for ISP IPv6 Access Network ISP-access-01.txt.
Secure Mobile IP Communication
IPv6 Source Address Validation and IETF Efforts Jun Bi CERNET/Tsinghua University APAN 26 August, 2008.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Auto Configuration and Mobility Options in IPv6 By: Hitu Malhotra and Sue Scheckermann.
IPv6 Overview Brent Frye EECS710. Overview Google Drive Microsoft Cloud Drive Dropbox Paid-for alternatives 2.
1 IPv6. 2 Problem: 32-bit address space will be completely allocated by Solution: Design a new IP with a larger address space, called the IP version.
IPv6 – IPv4 Network Address, Port & Protocol Translation & Multithreaded DNS Gateway Navpreet Singh, Abhinav Singh, Udit Gupta, Vinay Bajpai, Toshu Malhotra.
Implementing IPv6 Module B 8: Implementing IPv6
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
IPv4 vs. IPv6 Anne-Marie Ethier Andrei Iotici "This report was prepared for Professor L. Orozco- Barbosa in partial fulfillment of the requirements for.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
IPv6 Network Security.
1 Mobile IP Myungchul Kim Tel:
SAVI IP Source Guard draft-baker-sava- implementation Fred Baker.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
IPv6 Address Provisioning In IPv6 world there are three provisioning aspects wich are independent of whether the IPv6 node is a Host or CE router: IPv6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
MOBILITY SUPPORT IN IPv6
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer.
Host Identity Protocol
7 IPv6: transition and security challenges Selected Topics in Information Security – Bazara Barry.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
Tracking and Tracing Cyber-Attacks
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
DHCPv6 Route Option (draft-dec-dhcpv6-route-option-03.txt) IETF 77, March 2010 : Wojciech Dec Richard Johnson
Chapter 22 Next Generation IP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 AutoconfBOF2.PPT / Aug / Singh,Perkins,Clausen IETF Not Confidential Ad hoc network autoconfiguration: definition and problem statement (draft-singh-autoconf-adp-00.txt)
A SAVI Solution for DHCP Draf-ietf-savi-dhcp-06 J. Bi, J. Wu, G. Yao, F. Baker IETF79, Beijing Nov. 9, 2010.
Prefix Delegation Protocol Selection T.J. Kniveton MEXT Working Group IETF 70 - December ’07 - Vancouver.
Source Address Validation Architecture (SAVA) Requirements of CNGI-CERENT2 Jianping Wu CERNET/Tsinghua University IETF 68 Prague March 2007.
1 Julien Laganier MEXT WG, IETF-79, Nov Authorizing MIPv6 Binding Update with Cryptographically Generated Addresses
Draft-vandevelde-v6ops-addcon-00.txt IPv6 Unicast Address Assignment Considerations Gunter Van de Velde (editor) Tim Chown Ciprian Popoviciu IETF 65, March.
Karlstad University IP security Ge Zhang
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Module 2: Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
Secure Neighbor Discovery in IPv6 Jari Arkko Ericsson Research James Kempf DoCoMo US Labs.
CGA Extension Header for IPv6 draft-dong-savi-cga-header-03.txt Margaret Wasserman IETF 78, Maastricht July 2010.
SAVI Analysis for PANA with SLACC Yilan Ding IETF 79 draft-ding-savi-pana-with-slacc-00.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Bjorn Landfeldt, The University of Sydney 1 NETS 3303 IPv6 and migration methods.
Scaling Networks with Network Address Translation Scaling Networks with Network Address Translation Solutions for IPv4 Security and Scalability ECPI College.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
Analysis on binding distribution protocol and A proposed solution SAVI-CPS.
OSPF WG Security Extensions for OSPFv2 when using Manual Keying Manav Bhatia, Alcatel-Lucent Sam Hartman, Huawei Dacheng Zhang, Huawei IETF 80, Prague.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
Computer Networks 0110-IP Gergely Windisch
Cryptography CSS 329 Lecture 13:SSL.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
CHAPTER 10: DHCP Routing & Switching. Objectives 10.0 Introduction 10.1 Dynamic Host Configuration Protocol v Dynamic Host Configuration Protocol.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
Outline The spoofing problem Approaches to handle spoofing
Computer Networks Protocols
SAVI Requirements and Solutions for IPv4/IPv6 Transition
Presentation transcript:

A Source Address Validation Architecture (SAVA) and IETF SAVI Working Group Jun Bi Tsinghua University/CERNET Oct 20, 2008

Outline Background and Requirements A Source Address Validation Architecture (SAVA) and CNGI-CERNET2 SAVA Testbed – RFC5210: J Wu, J Bi, X Li, et.al. IETF SAVI (Source Address Validation Improvements) WG and Proposed Solutions

What Is the problem Current situation in IPv4 and IPv6 is that: –destination address based packet forwarding –In the forwarding process, the source IP address is not checked in most cases. –Easy to spoof the source address of the IP packet. Packets with spoofed source addresses are unwanted. –Security (Attacks such as DNS reflection) –Management (Administration: hard to trace back, measurement) –Accounting (source address based accounting)

Some Figures Arbor Worldwide Infrastructure Security Report

Related Work IETF BCP 38 filtering (needs to be fully deployed), if it were universally applied would solve the problem. Unfortunately this is not the case –about ¼ of the Internet at least allows spoofed source addresses in packets (MIT Spoofer Project) –BCP 38 deployment ratio is less than 50% (Arbort report) Cryptographic based methods –Cost/feasibility Traceback based methods –Reactive, not proactive

SAVA Design Principles 1.Hierarchical Architecture (Multi-fence solutions) 2.Solutions for IPv6 first (feasible way to deploy) 3.Proactive protection 4.Incrementally Deployable (Incomplete deployment still be beneficial) 5.Provide incentive for deployment (The source address space of a network that deployed SAVA can not be spoofed by others) 6.Performance, Cost and Scalability

SAVA Architecture in CNGI-CERNET2 IP Prefix Level Granularity

Current SAVA Solutions in CNGI-CERNET2 Inter-AS (early stage): lightweight signature between the source AS and the destination AS (End-to-end) Inter-AS (neighboring ASes): AS relationship based method deployed in the neighboring AS boarder routers Intra-AS: deploy Ingress filtering on all edge routers in an AS (the ingress filtering relies on fully deployment. it’s not feasible to fully deploy in the whole Internet, but it’s feasible to deploy in a single AS). Access Network (First-Hop, Local Subnet)

A End-to-end lightweight signature based solution for Inter-AS SAVA

A End-to-end lightweight Signature based Solution for Inter-AS SAVA Add signature check signature, valid Remove signature Ingress filtering Check signature, invalid Unsigned Flow Signed Flow

SAVA Testbed: Test Result (1) Before spoofing attack

SAVA Testbed: Test Result (2) After spoofing attack

SAVA Testbed: Test Result (3) Enable SAVA

Test-bed in CERNET2/Tsinghua Univ.

SAVA Deployment in CNGI-CERNET2: Prototype implemented and 12 SAVA test AS deployed 用户接入网 SAVA 用户接入网 SAVA

IETF Efforts IETF 66 (Montreal, July 2006), SAVA Side Meeting with IAB/IESG IETF 67 (San Diego, Nov 2006), Internet Area Open Meeting IETF 68 (Prague, March 2007), first BoF Discussion IETF 69 (Chicago, July 2007), RFC drafts proposed, Internet Area Open Meeting and SAVA Side Meeting with IESG to prepare the 2nd BoF IETF 70 (Vancouver, Dec. 2007), BoF for SAVI Working Group (Source Address Validation Improvements) IETF 71 (Philadelphia, March 2008), discuss/revise WG charter RFC 5210 and SAVI WG were approved by IESG in May 2008 IETF 72 (Dublin, July 2008), the first SAVI WG meeting To Subscribe:

IETF SAVI WG To resolve the source address validation in the access network Co-chairs: –Christian Vogt –Bill Fenner Technical Advisor: –Jianping Wu Secretary –Jun Bi

Why we need host-granularity anti-spoofing

IPv6 source address assigned Access request Binding in switch Access network 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 } Access accepted 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 } } 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 = Match ? Assigned address 2001:250:f001:f002: 210:5cff:fec7:1204 Spoof address 2001:250:f001:f002: 210:5cff:fec7:1203 Match ? 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 } 2001:250:f001:f002: 210:5cff:fec7: F-B6-DC-9A ++{ Port 2 } ≠ Access denied Switch port based Solution

Protocols

Special Problems in IPv6 Various Address Allocation Methods –Stateless Auto-configuration –DHCPv6 –Manual Configuration/Static –Cryptographically (CGA) –Private Multiple addresses are assigned to an interface

CGA based Solution Phase 1: Address Authorization –Filtering based on the knowledge of address assignment (to adapt all address allocation ways) –Host Identifier (CGA Identifier) without PKI –Binding Host Identifier and address at the first Layer-3 hop –Secure Shared Secret Exchange (Signature seed used in Authentication phase) Phase 2: Address Authentication –Light-weight signature generation –Light-weight signature adding and removal

Overview of Procedure Phase1: Address Authorization (5 steps) (4) Check whether identifier H can use the required address A (3) I’m H and I require to use address A (5) Return a “signature seed” for future authentication (2) An identifier is used to show the applicant is H (1) Prepare an address A

Overview of Procedure Phase2: Address Authentication Add Signature Check Signature and Remove it Generate Signature based on “signature seed”

Phase1: Address Authorization Step 1: Address Preparation –The Node gets an address through the appointed address assignment mechanism Host in IPv4: Manual Configuration, DHCP Host in IPv6: DHCP, Stateless Autoconfiguration, Manual Configuration, Cryptographically Generated Address, Privacy

Address Authorization Step 2: Identifier Generation –Node generates a secure identifier For anonymity address owner (DHCP,SCA,CGA,Privacy), identifier = hash(Public Key) [Described in CGA] For any address allocation mechanism involving manual configuration, identifier = hash(Public Key + Share Secret ). The Share Secret is a bit string allocated to the node with the static address by network administrator.

Address Authorization Step 3: Address Authorization Request –Nodes send a request packet to the first layer 3 hop (gateway/router) An ICMP packet with source address set to the address prepared in phase 1 The CGA option and RSA signature option are the same as described in [SEND]

Address Authorization Step 4: Gateway Authorizing Address –Gateway checks whether the request node has the right to use the address. The knowledge is based on address allocation. –Manual Configuration: Re-compute the identifier using the shared secret of the address owner. –SCA/Privacy/CGA: The address has not been registered by another node. In CGA case, the request address must be a correct CGA address computed on the public key. –DHCP: The identifier in the request packet must be the one which was used to apply address/prefix from DHCP server/router. [See next page]

Address Allocation in DHCP Case Source address set to the CGA identifier Record the CGA identifier Record the address allocated. Bind the identifier and the address. DHCP Solicitation

Address Authorization Step 5: Signature Seed Assignment –Gateway returns a bit string named “signature seed” to the applicant, encrypted by the public key in the request packet. –Node decrypts the “signature seed”.

Phase 2: Address Authentication Signature Generation (All based on the shared secret “signature seed”) –HMAC –Pseudo Random Number (Preference) Signature sequence, hard to guess and replay Using the sliding window to handle the packet re-order (not a big deal in local subnet) Signature Adding (3 choices to implement) –IPSEC Authentication Header –A new option header (e.g. Hop-by-hop) –Address Rewrite (The signature is used as local address, the router rewrite with the authorized address for out world, to save the cost of memory copy and locating header) Signature Verification (matching the random number)

Thank You! Q & A