Analysis on binding distribution protocol and A proposed solution SAVI-CPS.

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

Security Issues In Mobile IP
SAVI Requirements and Solutions for ISP IPv6 Access Network ISP-access-01.txt.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
IPv6 Source Address Validation and IETF Efforts Jun Bi CERNET/Tsinghua University APAN 26 August, 2008.
Transmission of IP Packets over Ethernet over IEEE draft-riegel-16ng-ip-over-eth-over Max Riegel
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All 4over6 technology for IPv6 transition Yong CUI CCSA (Tsinghua University) Document No: GSC16-PLEN-71.
© 2006 Cisco Systems, Inc. All rights reserved.IP6FD v2.0—2-1 IPv6 Operations Defining and Configuring Neighbor Discovery.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
1 DHCP-based Fast Handover protocol NTT Network service systems laboratories Takeshi Ogawa draft-ogawa-fhopt-00.txt 62nd IETF - Minneapolis.
SAVI IP Source Guard draft-baker-sava- implementation Fred Baker.
IPv6 Address Provisioning In IPv6 world there are three provisioning aspects wich are independent of whether the IPv6 node is a Host or CE router: IPv6.
MOBILITY SUPPORT IN IPv6
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Review on Networking Technologies Linda Wu (CMPT )
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Networks Evolving? Justin Champion C208 Ext:3723
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Networking Components
Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
Host Identity Protocol
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
Chapter 4: Managing LAN Traffic
7 IPv6: transition and security challenges Selected Topics in Information Security – Bazara Barry.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Common Devices Used In Computer Networks
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
1 Internet Protocol. 2 Connectionless Network Layers Destination, source, hop count Maybe other stuff –fragmentation –options (e.g., source routing) –error.
IP Forwarding.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
A SAVI Solution for DHCP Draf-ietf-savi-dhcp-06 J. Bi, J. Wu, G. Yao, F. Baker IETF79, Beijing Nov. 9, 2010.
Source Address Validation Architecture (SAVA) Requirements of CNGI-CERENT2 Jianping Wu CERNET/Tsinghua University IETF 68 Prague March 2007.
1 November 2006 in Dagstuhl, Germany
Roaming Over Savi Device Tao Lin IETF 79. Outline DHCP/NDP Snooping mechanism Switch implementation Roaming over switches WLAN network Roaming over WLAN.
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
A Source Address Validation Architecture (SAVA) and IETF SAVI Working Group Jun Bi Tsinghua University/CERNET Oct 20, 2008.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Public 4over6: WGLC feedback Peng Wu IETF84. Feedback from WGLC Relationship with stateless 4-over-6 solutions? Different primary targets and application.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
Mobility With IP, implicit assumption that there is no mobility. Addresses -- network part, host part -- so routers determine how to get to correct network.
Introduction to Networks v6.0
Address Resolution Protocol (ARP)
Instructor Materials Chapter 5: Network Security and Monitoring
Instructor Materials Chapter 5: Ethernet
Chapter 5: Network Security and Monitoring
2002 IPv6 技術巡迴研討會 IPv6 Mobility
2018 Huawei H Real Questions Killtest
Address Resolution Protocol (ARP)
Consideration on IPv6 Address Management
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Lecture 4a Mobile IP 1.
SAVI Requirements and Solutions for IPv4/IPv6 Transition
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

Analysis on binding distribution protocol and A proposed solution SAVI-CPS

Outline Analysis on binding distribution protocol A proposed solution SAVI-CPS (Control Packet Snooping)

Analysis on binding distribution protocol Why distributing bindings? –If a SAVI device wants to set up an initial binding for an address, it must firstly decide whether this address has been “assigned to another node” in the subnetwork. –BDP tells the device whether this address has been “bound on other SAVI devices”. –DAD tells the device whether this address is “being used by another node”. –“address assigned to another node”,“address bound on other SAVI devices”, and “address being used by another node” have different meanings.

Analysis on binding distribution protocol Assigned AddressBound AddressBeing Used Address Address bound but not being used: Some protected static address ?? (could be manually set ?) Sleeping host (addr renew?) Temporarily disconnected host ?? Address being used but not bound: Hosts attached to non-SAVI device (SAVI-device and non-SAVI device In the same L2 link). Benefit of BDP Uncovered Area of BDP, Benefit of ND snooping Overlapping Area of BDP and DAD

Analysis on binding distribution protocol Benefits of BDP –The yellow part Limitations of BDP –For overlapping area (orange part), BDP is equal to DAD –For uncovered area (red part), DAD is still needed.

Analysis on binding distribution protocol How should a perfect BDP look like? –Once a binding is established or removed on a SAVI device, any other SAVI devices have the ability to get known this event immediately through the BDP. –Once a binding event is synchonized by BDP, the corresponding binding must be truly established or removed.

Analysis on binding distribution protocol Difficulties of designing a good BDP –Synchronization in real-time Push or pull? Push: handling the conflict, etc… Pull: Not real time –Source authentication and event verification Didn’t see a good BDP yet If there is a BDP, we would provide more analysis

A proposed solution SAVI-CPS

SAVI-CPS CPS (Control Plan Snooping): Initial binding based on control packet snooping Discuss: Handle special cases (when re- binding is necessary)

Control Packet Snooping Benefits –Support the existing address assignment standards –Don’t need to design a real-time BDP –Initial binding based on only control packets not data packets (important advice from some vendors)

Control Packet Snooping Which protocols to snoop? –DHCP DHCPv4 DHCPv6 –Duplicate Address Detection –Gratuitous ARP Handle static address –Manually bind static address with anchor

Control Packet Snooping SAVI Device State Transition Diagram

Example: ND snooping

Handle special cases of SAVI Two special cases are hard to handle –node that move to another port on the same link Static address DHCP/Stateless address will not cause a problem –node with multiple interfaces to the same link It’s re-binding (a separate question from initial binding) It could be handled by many ways –SeND, HIP (by using unique id of the host) –we also propose a method called “tentative test”

Handle special cases of SAVI Tentative test –A test to distinguish multiple interfaces to the same LAN and movement of static address from spoofing. –Assumption: 2 or more addresses(IPv4 or IPv6) are assigned to an interface of a host Usually works for IPv6 Also works for IPV4 if it is a dual-stack node

Movement of static address Switch Port-ACL PortAddress AIPA:Static AIPB Port APort B

Movement of static address IP C IP D IPEIPFIP G IP H IP B IPIIPJ Switch Port-ACL PortAddress AIPA:Static AIPB Packet with source address IPA Probe NS or ARP Port B Choose IPB Port A Pass! Relpy IPB

Movement of static address IP C IP D IPEIPFIP G IP H IP B IPIIPJ Switch Port-ACL PortAddress AIPA:Static AIPB Packet with source address IPA Probe NS or ARP Port B Choose wrong probe Port A Fail!

Multiple interfaces to the same link Switch Port-ACL PortAddress AIPA:Static AIPB Port APort B

Multiple interfaces to the same link IP C IP D IPEIPFIP G IP H IP B IPIIPJ Switch Port-ACL PortAddress AIPA:Static AIPB Packet with source address IPA Probe NS or ARP Port B Choose IPB Port A Reply IPB to Port B Pass! Or Reply IPB to Port A Pass!

Thank You! Q & A

SAVI Progress Report in CERNET2 Jianping Wu, Jun Bi, Guang Yao Tsinghua University/CERNET March 23, 2009

Outline Background Scenarios Framework Progress report on vendors’ support

Background

Trustworthy Next Generation Internet Trustworthy Network Infrastructure (IP spoofing free) Trustworthy Network Service (For Trustworthy ID : ID/Loc mapping, AAA, key management, etc) Trustworthy Network Applications ( , BBS, VoIP, IPTV/iTV, Mobility App, E-Governence) 、 Monitoring and Control Architecture and Standards

SAVA Architecture in CNGI-CERNET2 IP Prefix Level Granularity

Goals and Approach Deployment Scale –CERNET2 backbone: Inter-AS anti-spoofing –25 Regions (ASes): Intra-AS anti-spoofing –100 Campus networks: Access Network anti-spoofing –1K-10K SAVI Sub-networks –1 Million users without IP spoofing –1 Million / 20 ports = ~50K Ethernet Switches deployment Funding –Project funding –Part of Government's New Deal –Matching funds from 100 Universities Time frame: Starting from SAVI

Source Address Validation Deployment in CERNET2 用户接入网 SAVI 用户接入网 SAVI

Goals and Approach Currently 7 vendors participated or being involved (tested in Feb to purchase soon): –8 catalog of devices (2 core, 3 aggregation, 3 access) –Huawei –ZTE –H3C (3Com) –Bitway –Digital China –Ruijie –GalaxyWind 2 Vendors are interested –Cisco (6509 informally participated part of test in Feb.) –Juniper

Scenarios at SAVI level

SCENARIOSANCHORSDESCRIPTION Secure MAC AddressMAC AddressOnly in Ethernet. Exclusive Switch PortSwitch PortOnly in Wired network. Secure Layer2 Associations Layer2 AssociationsOften in Wireless network. Cable Modem Network Combination of MAC and Customer Relationship In Cable Modem network Classical DSL network ATM Virtual Channel, or PPPoE or L2TP Session ID. Classical DSL network Tunneling TechnologySome Property of Tunnel Tech IP/IP tunnel, MPLS LSP, or similar tunneling technology Other ScenariosCryptographic InformationNo other anchor is available. draft-baker-sava-implementation-00.txt

SCENARIOSANCHORSDESCRIPTION Exclusive Switch PortSwitch Port In switch based wired network. Secure MAC AddressMAC Address In Wired/Wireless Ethernet that enabling secure L2 association No Popper lower layer Anchor Cryptographic Information in data packets No other anchors are available.  Three Most Significant Scenarios, by available binding anchor (entity that unspoofable and exclusive for the host)

 Exclusive Switch Port  Bind IP address with Switch Port

 Secure MAC Address (802.ae/af,802.11i)  Bind IP address with MAC address

 No Available Lower Layer Anchors  Bind IP address with Cryptographic Information in data packets HOST CHANGE ! 1 (Key1) 2 (Key2) Packet (head, SIG X, payload) Key Table HOSTKEYSIG Host 1Key1X Host2Key2Y ………

Special Cases –Multiple IP addresses(Multi-IP) Multiple IP addresses on one interface –Multiple MAC Addresses (Multi-MAC) Multiple MAC addresses on one interface –Multiple Interfaces (Multi-IF) Multiple interfaces on one host to the same link –Lower Layer Mobility (LLM) Change to another Port of the Same Switch Change to another Switch

Figure 1 Typical SAVI access network

Framework at SAVI level

Content Choosing right binding anchors How to set up the initial binding How to handle the special cases (re-binding)

Binding Anchors Switched Network –Binding with exclusive port for the host Secure MAC –Binding with secure L2 association (802.11ae/af, i) No popper lower layer binding anchor –Binding with Cryptographic Information (Host changes) –CSA (presented in IETF 72 at Dublin) –SAVAH (another version of CSA, presented in HIP RG by A. Gurtov) –Some degree of “host-change”

Initial Binding Address Assignment Mechanism (AAM) –Stateless –DHCP –Manual –SeND/CGA During the Address Assigning Process –Spoofing happens when host uses the IP address that is not assigned to it by the AAM or hasn’t experienced a successful DAD procedure. –How can SAVI device know the assigned address? Snoop the Address Assigning Process –SAVI-CPS

Handling Special Cases Special Cases –Multi-IP, Multi-MAC: add binding entries –Multi-IF –Lower Layer Mobility (LLM): Preserve the original IP address? NO (such as stateless case): Setup a new binding. Remove the old one. YES: (static address) How to handle the special cases of Multi-IF and LLM of static address –Tentative IP address test –SeND (by unique CGA identifier) –HIP (by unique HIP identifier)

Progress report on vendors’ support

Source address validation related testing in Feb. –Processing of IPv6 option header with lightweight signature (tag) –IPv4 uRPF –IPv6 uRPF –IPv4 ACL –IPv6 ACL –Binding IP address with port –Binding IP address with MAC –NDP snooping –ARP snooping –DHCPv4 snooping –DHCPv6 snooping –802.1x snooping

Progress report on vendors’ support 7 Vendors fully tested in Feb –2 catalog of Core devices (10G/GE interfaces) –3 catalog of Aggregation devices (10G uplink, GE interfaces) –3 catalog of Access devices (GE/100M interfaces, 1U standalone box) –~300USD per SAVI-enabled 2.5 Layer switch (IPv4/IPv6 L3-awared L2 switch, with 24x100M ports+2 GE uplinks)

Testing results Processing of IPv6 option header and lightweight signature (tag) –All vendors support and some vendor could reach line rate All vendors support with line rate: –IPv4 uRPF, IPv6 uRPF –IPv4 ACL, IPv6 ACL –Binding IP/port, IP/MAC All vendors support snooping, half of them even establish binding table for filtering (see example) –NDP snooping, ARP snooping –DHCPv4 snooping, DHCPv6 snooping –802.1x snooping

NP snooping and binding table H3C (3Com) console

DHCPv6 snooping and binding table H3C (3Com) console

Progress report on vendors’ support 8:30am-1:30am 8 Days

Vendors feedback Vendors like these features. To enhance the network security is a selling port to other customers. Some vendors are tracking SAVI mailing-list. Some vendors followed other vendors to quickly deliver the control plan snooping (not complex to implement, seems taking 1 week) 20 Million users/thousands campus networks in CERNET. It’s hard to upgrade all switches to SAVI devices in a short term, so still need Intra-AS and Inter-AS anti-spoofing solutions.

Thank You! Q & A

IPv4 binding

DHCP snooping