Implementing Trust to Trust Using Customer Edge Switching. Raimo Kantola Aalto University Finland



Similar documents
Ceres Messaging and Routing Model

CMPT 471 Networking II

Chapter 11 Cloud Application Development

Firewalls P+S Linux Router & Firewall 2013

VLANs. Application Note

Proxy Server, Network Address Translator, Firewall. Proxy Server

Application Note. Onsight TeamLink And Firewall Detect v6.3

CIRA s experience in deploying IPv6

Security of IPv6 and DNSSEC for penetration testers

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

NAT and Firewall Traversal with STUN / TURN / ICE

FIREWALL AND NAT Lecture 7a

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP LTM for SIP Traffic Management

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

INTRODUCTION TO FIREWALL SECURITY

Firewall Firewall August, 2003

Firewall Design Principles Firewall Characteristics Types of Firewalls

Firewalls and Intrusion Detection

Chapter 8 Security Pt 2

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Lecture 17 - Network Security

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

Network Security Topologies. Chapter 11

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Protocol Security Where?

Internet Ideal: Simple Network Model

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Secure Inter-Provider IP VPNs

Firewalls. Chapter 3

Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer

Configuring Network Address Translation (NAT)

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Security Technology: Firewalls and VPNs

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

VLAN und MPLS, Firewall und NAT,

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

20. Switched Local Area Networks

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

TRILL for Data Center Networks

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

ITL BULLETIN FOR JANUARY 2011

CS Computer and Network Security: Firewalls

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Application Note. Onsight Connect Network Requirements v6.3

IAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

A S B

Debugging With Netalyzr

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Southwest Arkansas Telephone Cooperative Network Management Practices

Secure Software Programming and Vulnerability Analysis

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Secure Cloud Computing with a Virtualized Network Infrastructure

DDoS Attack Traceback

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Funkwerk UTM Release Notes (english)

CS Computer and Network Security: Firewalls

Are Second Generation Firewalls Good for Industrial Control Systems?

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Telematics. 14th Tutorial - Proxies, Firewalls, P2P

Understanding and Configuring NAT Tech Note PAN-OS 4.1

CIT 480: Securing Computer Systems. Firewalls

Chapter 9 Firewalls and Intrusion Prevention Systems

CIT 480: Securing Computer Systems. Firewalls

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

Introduction to Firewalls

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

Using SYN Flood Protection in SonicOS Enhanced

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Chapter 15. Firewalls, IDS and IPS

Classification of Firewalls and Proxies

Secure Networks for Process Control

21.4 Network Address Translation (NAT) NAT concept

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

allow all such packets? While outgoing communications request information from a

CS 356 Lecture 16 Denial of Service. Spring 2013

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

Boosting mobility performance with Multi-Path TCP

Linux Network Security

Cisco Configuring Commonly Used IP ACLs

How To Set Up A Net Integration Firewall

12. Firewalls Content

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Content Distribution Networks (CDN)

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation

Transcription:

Implementing Trust to Trust Using Customer Edge Switching Raimo Kantola Aalto University Finland 1

Agenda Big picture Identities Customer edge switching in operation Deployment and Challenges Conclusions Work partially sponsored by FP7 ETNA project and ICT SHOK in Finland 2

Problems in the Internet Lack of Trust middleboxes: NATs and Firewalls are not part of the Architecture Recommended NAT Traversal method = UNSAF does not scale well to mobile devices FW on mobile device exhausts battery Scaling the core, multi-homing Tunneling based edge not yet an accepted technology Unwanted traffic cost of communication is born by the receiver TKK/Raimo Kantola 22.4.2010 3

Principles: from End to End By Dave Clark Trust to Trust End to End argument, 1984 Trust to trust, 2007: The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at points where it can be trusted to perform its job properly. TKK/Raimo Kantola 22.4.2010 4

Three Tier Program for Trusted Internet Federated Global Trust - pushes cost of communication to the sender Access - isolates customer networks from Core Transport - Carrier Grade Ethernet The war against unwanted traffic can not be won by defense only Global Trust System Each tier can progress independent of the others 5

Communication Path is a Chain of Trust Trust Domains Originator network Public Service domain Target network trust boundary Customer Edge Provider Edge Trust domains do not publish address information to each other. A Packet crosses a Trust Boundary by presenting 2 IDs: source ID and target ID. There is connection state on the Trust Boundary. 6

What kind of IDs Globally unique deterministic IDs high OPEX Temporary ID is managed by the visited Network How to preserve ID in case of multi-homed networks and roaming accross national borders ID blocks are allocated like frequencies in GSM management cost Random IDs managed by the home network Clear responsibilities for trust provisioning ID does not need to change in case of multi-homing or roaming if ID stretched to hosts, TCP session can be preserved 7

How many bits are needed for random user identities used in CES nodes? 1.E+12 NROF Ids In a single CES 1.E+10 1.E+08 1.E+06 1.E+04 1.E+02 1.E+00 0 20 40 60 80 100 NROF Bits This is based on the birtday paradox. We assume that the probability of a clash of identities is < 1 in a million when all uits are compared one by one. If uit dependent filtering akin to address dependent filtering in NATs is used, a pair of uits is compared to another pair of uits. This gives an additional safety margin. 8

Assumptions Transport: routed IP, IP/MPLS, MPLS-TP or Carrier Grade Ethernet (a la ETNA) Users are connected to User Networks (UN) (stub networks UN-A is the network of the initiator of communication, UN-B is the destination UN each has one or several Customer Edge Switches each with one or more routing locators CES-A is in sender s network, CES-B in the target network CES owns a large pool of IP addresses (s) in its private network User network can be e.g. mobile access or a corporate network There is a DS Directory Service e.g. DNS with particular configuration (no new RRs or changes to the protocol) can be used 9

Customer Edge Switching variant with random IDs managed by the home network CES = Customer Edge Switch User Identity Tag = UIT identifies a user or a service or a host (or an application on a host). is generated from a name + other parameters by a hash (or other) algorithm selected by the home network administrator Protocol stack IP over MAC -in-mac IP over new T2T protocol over IP Etc Forwarding method is orthogonal to how we do the access 10

Message Flow Host- A ic Ingress CES Ri DNS Re Egress CES ec n.neno@tkk.fi Host B Q: n.neno@tkk.fi Q: (Ri:Dns)/n.neno@tkk.fi R: (ic-b,p-b)=n.neno@tkk.fi R:(Re:Ri)[Idb, Re1, ReN, n.neno@tkk.fi] M: (a,ic-b) M: (Ri,Re)[Ida,Idb] M:(ec-a,b) M: (ic-b, a) M: (Re,Ri)[Idb,Ida] M:(b, ec-a) cs t a ic:b Ida Idb Ri Re1 ReN cs t ec:a b Idb Ida Re Ri1 RiN a IP address of host a Ida ID of host a ic address pool of ingress CES Idb ID of host b ic:b IP address representing host b to host a ec address pool of egress CES p-b port allocated by i-ces for communication with host b ec:a IP address representing Ri (Ri1.RiN) Routing locators of ingress CES host a to host b Re (Re1 ReN) Routing locators of egress CES cs connection state, t - timeout

Trust processing for inbound flows in Egress CES Any sender is a suspect track behavior, deny all service to and black-list scanners and too active senders ACK TCP SYN to detect source address spoofing, similarly send COOKIE in SCTP Send a puzzle to the sender Authenticate the sender Tighten policy towards suspects Swap all IDs when under attack Firewall rules managed by hosts etc TKK/Raimo Kantola 22.10.2009 12

Ease of deployment ALL CASES + develop CES as an extended NAT + configure DNS appropriately + egress CES also hosts proxy ingress CES for compatibility with legacy senders + no changes in hosts + provides incentives to invest both to mobile operators and corporations + no alternative topology like in LISP Carrier Grade Ethernet core Low header overhead Full OAM for mission critical communications IP core Cuts into MTU like LISP 13

Challenges http, ssh, mail protocols traverse CES nicely SIP, FTP (others) that pass IP address information on a control channel rather than query DNS do not traverse a simple CES Solution: CES has to look up protocol field and use an application specific state machine (similar to what Firewalls do) protocols such as SIP/SDP should really use names instead of IP addresses Are needed for DNS, FTP and SIP/SDP 14

Conclusions CES is an implementation of the Trust-to-Trust principle advocated by Dave Clark Global communication takes place using global names, local addresses and local IDs. End-to-End connectivity is based on switching on trust boundaries + routing elsewhere is like NATxNAT why do we need IPv6? scales as well as NAT scales in terms of the network and better for mobile hosts Works with Ethernet Core, with IP or IP/MPLS or MPLS-TP core 15