Information-Centric Networks Section # 7.3: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.

Slides:



Advertisements
Similar presentations
Accountable Internet Protocol
Advertisements

Network Support for Accountability Nick Feamster Georgia Tech Collaborative Response with David Andersen (CMU), Hari Balakrishnan (MIT), Scott Shenker.
Accountable Internet Protocol David Andersen (CMU) Hari Balakrishnan (MIT) Nick Feamster (Georgia Tech) Scott Shenker (Berkeley)
IP Security Nick Feamster CS 6262 Spring IP Security have a range of application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Multihoming and Multi-path Routing
Network Support for Sharing. 2 CABO: Concurrent Architectures are Better than One No single set of protocols or functions –Different applications with.
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
Improving Internet Availability Network Accountability Architectural foundations for defense against spoofing, route hijacking, etc. Architecture for Market.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Lecture 5 - Routing On the Flat Labels M.Sc Ilya Nikolaevskiy Helsinki Institute for Information Technology (HIIT)
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Inter-domain Routing security Problems Solutions.
Efficient and Secure Source Authentication with Packet Passports Xin Liu (UC Irvine) Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas.
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Host Identity Protocol
Information-Centric Networks07b-1 Week 7 / Paper 2 NIRA: A New Inter-Domain Routing Architecture –Xiaowei Yang, David Clark, Arthur W. Berger –IEEE/ACM.
1 Accountable Internet Protocol David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker Carnegie Mellon University,
Information-Centric Networks04a-1 Week 4 / Paper 1 Open issues in Interdomain Routing: a survey –Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Information-Centric Networks07c-1 Week 7 / Paper 3 Accountable Internet Protocol (AIP) –Michael Walfish, Hari Balakrishnan and Scott Shenker David G. Andersen,
SANE: A Protection Architecture for Enterprise Networks
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Information-Centric Networks06a-1 Week 6 / Paper 1 Untangling the Web from DNS –Michael Walfish, Hari Balakrishnan and Scott Shenker –Networked Systems.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
Multimedia & Mobile Communications Lab.
How to use DNS during the evolution of ICN? Zhiwei Yan.
Information-Centric Networks06c-1 Week 6 / Paper 3 Middleboxes No Longer Considered Harmful –Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan,
Introduction to Mobile IPv6
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Dynamic Routing Protocols II OSPF
Information-Centric Networks Section # 3.2: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.3: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 9.3: Clean Slate Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 7.2: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 10.2: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 3.3: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 3.1: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 7.1: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 4.3: Routing Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.1: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 10.3: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 4.1: Routing Issues Instructor: George Xylomenos Department: Informatics.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Information-Centric Networks Section # 4.2: Routing Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 2.3: Internet Evolution Instructor: George Xylomenos Department: Informatics.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Naming in Content-Oriented Architectures 1. select produce Data publishing RWINameKey Data own certify 2.
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Accountable Internet Protocol David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker
Dynamic Routing Protocols II OSPF
Global Locator, Local Locator, and Identifier Split (GLI-Split)
Presentation transcript:

Information-Centric Networks Section # 7.3: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics

Funding These educational materials have been developed as part of the instructors educational tasks. The “Athens University of Economics and Business Open Courses” project only funded the reformatting of these educational materials. The project is being implemented as part of the Operational Program “Instruction and Lifelong Learning” and is co- financed by the European Union (European Social Fund) and national funds.

Licencing These educational materials are subject to a Creative Commons License.

Week 7 / Paper 3 Accountable Internet Protocol (AIP) –Michael Walfish, Hari Balakrishnan and Scott Shenker David G. Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker –ACM SIGCOMM 2008 Main point –Accountability at the forefront of the Internet Prevention of source spoofing, DoS, route hijacking, route forgery –AIP uses a hierarchy of self-certifying addresses –Each component is derived from a public key Information-Centric Networks07c-4

Introduction The Internet is rife with IP level vulnerabilities –Misconfigured routers wreak havoc on packet delivery –Hijacked routes used to send untraceable spam –Hijacked hosts spoof source addresses –DoS attacks occur on a daily basis Many solutions proposed, but all have shortcomings –Complicated mechanisms that change the Internet model –External sources of trust to certify BGP updates –Operator vigilance to keep updating filters Maybe the fundamental architecture is at fault –AIP uses self-certifying flat addresses Hosts can prove they own an address without a PKI But, flat addressing is a scalability challenge Information-Centric Networks07c-5

AIP design Basic structure and function –Hierarchical addresses with two or more components –Each network is divided into Accountability Domains (ADs) –Each host is an Endpoint IDentifier (EID) Both AD and EID are globally unique Addresses have the form AD:EID –ADs may be subdivided into units In general addresses are AD1:AD2:…:ADk:EID –The AD and EID is the hash of the public key of an entity Each component is 160 bits long ( ) Direct link between identity (public key) and name (AD/EID) –Each AD/EID has the form Version:Key Hash:Interface Version indicates the scheme used to generate the AD/EID Interface indicates one of the interfaces of a host Information-Centric Networks07c-6

AIP design Forwarding and routing –Each packet contains source and destination AD:EID –Multiple AD levels are treated as a stack Forwarding proceeds towards the current AD Border routers switch to the next AD in the stack –Interdomain routing can use BGP or any other protocol Routers advertise reachability to ADs, not prefixes ADs can be grouped into ASes if needed DNS and mobility –A multihomed host will have different ADs but the same EID –Transport protocols bind to the EID, not the AD –Mobile hosts need to change their AD only –Changes can be authenticated since EIDs are bound to keys Information-Centric Networks07c-7

Uses of accountability Source accountability (no source spoofing) –Common source spoofing variants Pretending to be a host at another network Pretending to be another host at your network Creating large numbers of unused addresses –EID verification: at first hop router On reception of data from unverified host –Drop packet and return verification packet V –V contains source/destination addresses, packet hash and interface –V is signed using a secret that changes regularly –The sender returns V signed with its private key –The router verifies the signature and if correct passes next packets –Replay attacks at the router prevented by the secret –Replay attacks at the sender prevented by inserting random packet ID –Only the sender needs to cache hashes of recent packets Information-Centric Networks07c-8

Uses of accountability Source accountability (no source spoofing) –AD verification (at AD boundaries) On reception of packet from AD B, AD A checks that: –If B is trusted to check packets, forward it –Otherwise check if the packet is on the route to the source –Otherwise drop packet and verify the source as with the EID –The last step allows multihoming and asymmetric paths –Ensuring scalability at border routers Only packets that arrive from an unexpected route are remembered If the AD:EID pairs for the same AD are many, use a wildcard AD:* This is dangerous if an attacker controls some hosts in the AD –It can force the border router to insert a wildcard –Limiting address minting Routers can limit the number of new EIDs they accept per minute Similarly for ADs in border routers Information-Centric Networks07c-9

Uses of accountability Shut-off protocol –Requires a smart-NIC that rate-limits transmission if needed The NIC records hashes of recently sent packets It also accepts Shut-Off Packets (SOPs) independently A SOP contains a packet hash and a TTL, signed by the destination The NIC accepts the packet if it contains a valid hash and signature Then it shuts-off traffic for the TTL The random packet ID prevents replay attacks Hashes of thousands of packet can be kept in a Bloom filter Securing BGP –BGP peering sessions are encrypted with AD public keys –BGP routers sign their routing announcements –Routers only need to know the public keys of other ADs Information-Centric Networks07c-10

Routing scalability Routing growth estimates –The AS diameter increases slowly (less than 5 hops) –Routing tables grow 17% per year (about 1.6 million in 2020) –Routing traffic grows linearly with table size Estimate 1.5 updates per day per prefix Effects of moving to AIP –RIB/FIB size increase due to 160 bit AD and 2048 bit public key Doubles for two level ADs –BUT: lookups are flat, not longest prefix Estimated 80% reduction in memory accesses –The AS diameter may grow by 2-3 hops due to two level ADs –CPU costs that same as those needed for S-BGP Information-Centric Networks07c-11

Routing scalability Semiconductor growth trends –Assume the ITRS roadmap of density doubling every 3 years Resource requirements –RIB (DRAM): Roughly triple the amount of RAM needed by IP No problem with current growth trends –FIB (DR/SR/CAM): SRAM will grow much faster than FIBs –CPU: Loading time of tables to memory Estimated to be less than 30 seconds –Cryptography: 66 seconds for all tables May need acceleration as it is slower than the loading time Information-Centric Networks07c-12

Key management Key compromise: what if a private key is exposed? –Key revocation is tricky but feasible –The biggest problem is the false confidence in lost keys Therefore mechanisms for rapid loss detection are needed –Public registries for ADs are needed They only store self certifying data (no PKI needed) Can be automatically populated (no human intervention) Local (per domain) and global registries possible –Types of information stored in registries Identity/public key pairs Revoked public keys, signed by private keys (write once!) Peering relationships, signed by both peers Certificates binding EIDs to ADs (may be multiple) Certificates binding EIDs to first hop routers (can be multiple) Information-Centric Networks07c-13

Key management Maintaining domain registries –Domains should be forced to sign AD:EID to get it into DNS –Hosts check the registries of the domains hosting them –Domains check the registries of their peers Key discovery: what is the destination address? –Use DNS and verify keys against AD identifiers –Establish out-of-band trust between peering domains Cryptographic algorithm compromise –This is why version numbers are added to identities –New algorithms can co-exist with older ones –A version number indicates a hash/sign combination pair Information-Centric Networks07c-14

Traffic engineering and AD size Traffic engineering maps offered load to a set of paths –Performed by DNS and selective prefix advertising –ADs cannot be split to smaller prefixes for control But they can be split hierarchically –AD granularity: a set of hosts under common administration –Splitting ADs for traffic engineering can be done It is aggregating these prefixes that is impossible! –Experiments show that such aggregation is quite rare –Another possibility is to use the interface bits Each interface could be advertised separately Allows aggregation by zeroing out the interface bits –DNS load balancing does not change The interface bits can make it easier Information-Centric Networks07c-15

End of Section # 7.3 Course: Information-Centric Networks, Section # 7.3: Evolved Addressing & Forwarding Instructor: George Xylomenos, Department: Informatics