Signpost: Trusted, Effectful Internet names



Similar documents
Internet Privacy Options

Application Note. Onsight TeamLink And Firewall Detect v6.3

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Application Note. Onsight Connect Network Requirements V6.1

Remote Access via VPN Configuration (May 2011)

iphone in Business How-To Setup Guide for Users

Application Note. Onsight Connect Network Requirements v6.3

Cisco Virtual Office Express

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

VPN. Date: 4/15/2004 By: Heena Patel

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

INTRODUCTION OF IPAD USE AT UT. Introduction of ipad use at the University of Twente Content Introduction... 2

iphone in Business How-To Setup Guide for Users

Deploying iphone and ipad Virtual Private Networks

Cisco RV215W Wireless-N VPN Router

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

How To Configure Apple ipad for Cyberoam L2TP

MaaS360 Mobile Enterprise Gateway

NEFSIS DEDICATED SERVER

TECHNICAL CHALLENGES OF VoIP BYPASS

Chapter 3 LAN Configuration

Hosted Microsoft Exchange Client Setup & Guide Book

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall

DrayTek Vigor High Performance Firewall Router. - VPN - Up to 200 concurrent tunnels. - Load Balancing & Failover between WAN ports

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Who s Endian?

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Recommended IP Telephony Architecture

VPN Configuration Guide. Dell SonicWALL

Internet Traffic Evolution

MaaS360 Mobile Enterprise Gateway

Private Cloud Solutions Virtual Onsite Data Center

Cisco RV 120W Wireless-N VPN Firewall

Systems Manager Cloud Based Mobile Device Management

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

LifeSize Transit Deployment Guide June 2011

Gigabit SSL VPN Security Router

Configuration Guide BES12. Version 12.2

Appendix C Network Planning for Dual WAN Ports

Hosted Microsoft Exchange Client Setup & Guide Book

Unified Services Router User Manual

Application Delivery Networking

Chapter 6 Virtual Private Networking Using SSL Connections

Getting Started with PRTG Network Monitor 2012 Paessler AG

Unified Services Routers

NetSpective Global Proxy Configuration Guide

March 2010 Webcasting: Dealing with significant audiences behind the corporate firewall

VPN Configuration Guide. Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router

Configuration Guide BES12. Version 12.1

athenahealth Interface Connectivity SSH Implementation Guide

AC 750. Wireless Dual Band ADSL2+ Modem Router. Highlights

Technical White Paper

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY

Copyright 2008 Link Technologies,Inc. A Proud Vendor Member of the

Deploying iphone and ipad Apple Configurator

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Network Configuration Settings

Firewalls und IPv6 worauf Sie achten müssen!

Security. TestOut Modules

AC Wireless Dual Band ADSL2+ Modem Router. Highlights

Cisco RV220W Network Security Firewall

Synology QuickConnect

What is the Barracuda SSL VPN Server Agent?

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

GoToMyPC Corporate Advanced Firewall Support Features

SVN5800 Secure Access Gateway

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice Upperside WiFi Voice 2005

SIP and VoIP 1 / 44. SIP and VoIP

Best Practices: Pass-Through w/bypass (Bridge Mode)

Endpoint Security VPN for Mac

List of Common TCP/IP port numbers

Key Term Quiz Answers

Internet Traffic and Content Consolidation

ENUM: Migrating to VoIP. P2P Voice Applications

Configuration Guide. BES12 Cloud

Zscaler Internet Security Frequently Asked Questions

Advanced Higher Computing. Computer Networks. Homework Sheets

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.

Network Administrator s Guide

Barracuda Link Balancer

Sync Security and Privacy Brief

Initial Access and Basic IPv4 Internet Configuration

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

Simple security is better security Or: How complexity became the biggest security threat

Deploying iphone and ipad Security Overview

Features of AnyShare

Transcription:

Signpost: Trusted, Effectful Internet names Jon Crowcroft from original slides by Anil Madhavapeddy, University of Cambridge Keynote for U-Net@ICC, Ottawa, 11.6.2012

BACKGROUND: 1980 Internet AOL Yahoo! PC B 12.13.14.15 PPP ISP

BACKGROUND: 1990 PC A 14.15.16.17 PPP ISP Internet AOL Yahoo! PC B 12.13.14.15 PPP ISP

BACKGROUND: 2000 PC A 14.15.16.17 PPP ISP 192.168.0.2 PC B 192.168.0.1 12.13.14.15 NAT PPP PC C 192.168.0.3 Internet ISP AOL Yahoo!

BACKGROUND: 2010 10.0.0.2 10.0.0.1 14.15.16.17 PC A NAT PPP ISP 192.168.0.2 PC B 192.168.0.1 12.13.14.15 NAT PPP PC C 192.168.0.3 Internet ISP Google Facebook Skype

BACKGROUND: 2012 10.0.0.2 10.0.0.1 14.15.16.17 PC A NAT PPP ISP 192.168.0.2 PC B 192.168.0.1 Internet STUN port punch Skype super node PC C NAT 12.13.14.15 PPP ISP 192.168.0.3

BACKGROUND: EDGE COMPLEXITY home PC work PC iphone ipad

BACKGROUND: EDGE COMPLEXITY home PC NAT Cable/DSL Virgin Media work PC CL sysadmin firewall JANET iphone wifi 3G proxy firewall O2 ipad wifi NAT firewall ISP 1 wgb

BACKGROUND: THE CLOUD home PC NAT Cable/DSL Virgin Media Google work PC CL sysadmin firewall JANET Facebook iphone wifi 3G proxy firewall O2 Dropbox ipad wifi NAT firewall ISP 1 wgb

BACKGROUND: THE CLOUD home PC NAT Cable/DSL Virgin Media Google work PC CL sysadmin firewall JANET Facebook iphone wifi 3G proxy firewall O2 Dropbox ipad wifi NAT firewall ISP 1 wgb

BACKGROUND: CLOUDS ROCK Identity: high-level, easy-to-use device registration ( my iphone, work computer ). Visibility: only outbound connections required. Reliability: an army of professional sysadmins to worry. Social: cloud services can connect to each other.

BACKGROUND: CLOUDS SUCK Privacy: all data controlled by third-party, with their own policies (Google real name!). Security: one leak is all it takes. Irrevocable loss. Cost: orders of magnitude more resources on edge networks (e.g. bandwidth/latency). Availability: what if your house is disconnected? Energy: cost of moving data to/from edge and cloud.

LET A MILLION CLOUDS BLOOM! Why can t we all have our own cloud between our devices and networks? #1: we have no identity online. #2: lack of end-to-end connectivity limits visibility. #3: who hosts our stuff reliably? #4: why bother? What new services does this enable?

SIGNPOSTS The minimum coordination infrastructure required to establish routes between edge devices. DNS is woefully under-used to date. (ab)use it for global signalling through middleboxes. Work offline and support lazy synchronisation Support confidential lookups Desired user experience: when I address a device by its hostname, the result should just work (e.g. iphone.anil)

PROBLEM #1: IDENTITY home PC work PC iphone ipad anil/home anil/work anil/phone anil/fluffy Dropbox dropbox.com

PROBLEM #1: IDENTITY home PC work PC iphone home.anil.recoil.org work.anil.recoil.org phone.anil.recoil.org signpost anil.recoil.org ipad fluffy.anil.recoil.org Anil PC Steve PC anil.cl.cam.ac.uk hand.cl.cam.ac.uk signpost cl.cam.ac.uk Cecilia PC cecilia.cl.cam.ac.uk

PROBLEM #1: IDENTITY. name. anil. seb. haris. ipad. phone

PROBLEM #1: IDENTITY. name. cam. anil. seb. haris. tigger ipad. phone work.

PROBLEM #1: IDENTITY Identity: every individual has a domain name hierarchy DNSSEC means you register a single public/private key (anil.recoil.org) Proxy identity to social networks (anilmadhavapeddy.facebook.com) Use address book to invisibly associate names to DNSSEC domain keys. Bind devices to your domain ( resurrected duckling )

LET A MILLION CLOUDS BLOOM! Why can t we all have our own cloud between our devices and networks? #1: we have no identity online. #2: lack of end-to-end connectivity limits visibility. #3: who hosts our stuff reliably? #4: why bother? What new services does this enable?

PROBLEM #2: CONNECTIVITY iphone NAT ISP PC DNSSEC Signpost ipad NAT ISP

PROBLEM #2: CONNECTIVITY iphone NAT ISP PC ipad me: 100.10.12.13 me: 12.13.14.15 NAT me: 12.13.14.17 DNSSEC Signpost ISP

PROBLEM #2: CONNECTIVITY iphone NAT ISP Q: pc.anil.recoil.org PC A: 12.13.14.15 DNSSEC Signpost ipad NAT ISP

PROBLEM #2: CONNECTIVITY iphone NAT ISP PC A: 12.13.14.15 (TTL 0) DNSSEC Signpost ipad NAT ISP

PROBLEM #2: CONNECTIVITY Parallel Routing Tactics for p2p: NAT punching: act as a 3rd party STUN server UPnP or other NAT control protocols Rendezvous zeroconf discovery of peers IPSec setup: VPN (great for dumb devices) HTTP/SMTP proxy: corporate networks Wifi hotspot? IP-over-DNS works (iodine) Last resort: tunnel traffic to the cloud Your signpost is the ultimate dirty fighting middleboxer!

PROBLEM #2: CONNECTIVITY Effectful name lookups When a name is looked up, the Signpost executes tactics to discover and establish routes. Tactics form a simple dataflow graph of goals. E.g.: ipad wants to connect to iphone iphone requires a VPN tunnel or a NAT punch attempt NAT punch - FAIL attempt VPN setup - SUCCESS. Return IP to ipad. Tactics are composed via functional reactive programming. Lets us inspect why a route exists based on successful tactics.

PROBLEM #2: CONNECTIVITY Routing tactics can auto derive other security keys from global public key! L2: Ethernet authentication (802.1X), WPA certificates L3: IPSec, L2TP, OpenVPN L4: SSL (Notaries), TCPcrypt L7: HTTPS (Google Chrome), SSH (RFC4255), IMAP, CalDAV, WebDAV L8 : Browser passwords, file encryption

PROBLEM #2: CONNECTIVITY anil iphone anil.recoil.org Signpost seb PC seb.eide.name Signpost seb ipad

PROBLEM #2: CONNECTIVITY anil iphone Q: ipad.seb.eide.name anil.recoil.org Signpost seb PC seb.eide.name Signpost seb ipad

PROBLEM #2: CONNECTIVITY anil iphone A: 190.10.23.45 anil.recoil.org Signpost seb PC seb ipad VPN 190.10.23.45 seb.eide.name Signpost

PROBLEM #2: CONNECTIVITY anil iphone anil.recoil.org Signpost A: 190.10.23.45 anil.recoil.org Signpost VPN seb PC seb ipad 190.10.23.45 seb.eide.name Signpost seb.eide.name Signpost

LET A MILLION CLOUDS BLOOM! Why can t we all have our own cloud between our devices and networks? #1: we have no identity online. #2: lack of end-to-end connectivity limits visibility. #3: who hosts our stuff reliably? #4: why bother? What new services does this enable?

PROBLEM #3: RELIABILITY Mobile anil iphone anil.recoil.org Signpost Cloud anil.recoil.org Signpost anil PC Home anil.recoil.org Signpost Work anil.recoil.org Signpost anil ipad anil Fridge anil TV

PROBLEM #3: RELIABILITY All signposts stay in communication and sync data Eventually consistent lazy replication (Bayou) Natural fit to DNS consistency model Coordination data only: very low bandwidth Request resolution is a dataflow graph, where the nodes represent possible tactics (e.g. STUN or route setup).

LET A MILLION CLOUDS BLOOM! Why can t we all have our own cloud between our devices and networks? #1: we have no identity online. #2: lack of end-to-end connectivity limits visibility. #3: who hosts our stuff reliably? #4: why bother? What new services does this enable?

PROBLEM #4: WHY BOTHER? Efficiency: Apple devices support sleep proxies and multicast DNS *http://en.wikipedia.org/wiki/bonjour_sleep_proxy Devices register DNS services records (e.g. itunes sharing or website) and go to sleep. Router proxy wakes them up (Time Capsule or Airport Extreme). Evaluation #1: run Bittorrent to share files between two phones. Cycle between two spots in Cambridge: we hit eduroam, 3G, wgb wifi.

PROBLEM #4: WHY BOTHER? Low latency services, simply not possible with cloud. Sub-millisecond image processing Real-time video stitching (concerts, Olympics)

PROBLEM #4: WHY BOTHER? Low latency services, simply not possible with cloud.

PROBLEM #4: WHY BOTHER? Low latency services, simply not possible with cloud. Sub-millisecond image processing Real-time video stitching (concerts, Olympics) Evaluation #2: multipath video streaming is trivial with Signposts, as they take care of route setup and failover.

PROBLEM #4: WHY BOTHER? Democratise our infrastructure! Hardware printing now possible (diydrones.com), Arduino, Raspberry Pi. Not practical to hook things up to Twitter and Facebook at scale. Machine-to-machine trust via Signpost gets more secure as it grows (see Perspectives, USENIX Security) Evaluation #3: middlebox probing and enable most efficient path security (TCPcrypt, IPSec). Policies in the ends, middlebox probing in the middle

SUMMARY An architecture for dynamic routing across distributed clouds via middlebox-controlled context-dependent naming or: Network names that just work! Coming soon: http://signpo.st/ http://github.com/avsm/ Related work: Intentional names (MIT), Named Data Networking, Perspectives, Internet Indirection Infrastructure (I3)