ATIS Open Web Alliance. Jim McEachern Senior Technology Consultant ATIS



Similar documents
An Analysis of the SPDY Protocol and the SPDY Proxy

Why Mobile Performance is Hard

Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms Abstract

Global Internet Phenomena Spotlight: Encrypted Internet Traffic

WompMobile Technical FAQ

Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014

Scenario: IPsec Remote-Access VPN Configuration

SiteCelerate white paper

Testing & Assuring Mobile End User Experience Before Production. Neotys

Internet Privacy Options

QUIC. Quick UDP Internet Connections. Multiplexed Stream Transport over UDP. IETF-88 TSV Area Presentation

Application Delivery Networking

Cisco AnyConnect Secure Mobility Solution Guide

Web Security Firewall Setup. Administrator Guide

Configuration Guide BES12. Version 12.2

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Chapter 11 Cloud Application Development

Cisco ACI and F5 LTM Integration for accelerated application deployments. Dennis de Leest Sr. Systems Engineer F5

Software Product Information. Faba5 Website

Eucalyptus User Console Guide

Deploying F5 for Microsoft Office Web Apps Server 2013

Configuration Guide BES12. Version 12.1

Examining Proxies to Mitigate Pervasive Surveillance

InTouch Access Anywhere

High Availability HTTP/S. R.P. (Adi) Aditya Senior Network Architect

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

athenahealth Interface Connectivity SSH Implementation Guide

A digital Creative Company

464XLAT: Breaking Free of IPv4. APRICOT 2014

Content Delivery Networks

Application Note. Onsight Connect Network Requirements v6.3

Anonymity on the Internet Over Proxy Servers

Online course syllabus. MAB: Voice over IP

464XLAT: Breaking Free of IPv4. T-Mobile.com NANOG 61 June 2014

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Citrix Receiver for Mobile Devices Troubleshooting Guide

Introduction to the Mobile Access Gateway

My Stuff Everywhere Your Content On Any Screen

Interwise Connect. Working with Reverse Proxy Version 7.x

SSL SSL VPN

Reverse Proxy with SSL - ProxySG Technical Brief

Next Generation Network Firewall

Zscaler Internet Security Frequently Asked Questions

MikroTik User Meeting Larnaca, Cyprus, 12 th of June Hotspot using social accounts. Ionas Iona

Deploying the BIG-IP System with Microsoft IIS

Project X Mass interception of encrypted connections

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

Proxies. Chapter 4. Network & Security Gildas Avoine

Sophos Mobile Control SaaS startup guide. Product version: 6

Internet Traffic Evolution

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Network Defense Tools

Customer Service Description Next Generation Network Firewall

Configuration Example

SuperLumin Nemesis. Administration Guide. February 2011

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

USG40HE Content Filter Customization

LifeSize Transit Deployment Guide June 2011

Configuration Guide BES12. Version 12.3

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

ITP 342 Mobile App Development. APIs

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

Zorp and KZorp: Integrating Packet Filtering and Userspace proxying

Deployment Guide Microsoft IIS 7.0

Using TestLogServer for Web Security Troubleshooting

Chapter 3 LAN Configuration

NEFSIS DEDICATED SERVER

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

Application Note. Onsight TeamLink And Firewall Detect v6.3

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Network Security Topologies. Chapter 11

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Drupal Performance Tuning

Secure Traffic Inspection

PQ v3.0. Voice over Wi-Fi. Datasheet

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5

Cisco Application Control Engine Appliance

Accelerating Mobile Access

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

Installation Guide for Pulse on Windows Server 2008R2

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Implementing Network Address Translation and Port Redirection in epipe

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, "Positive Technologies"

SAML-Based SSO Solution

Transcription:

Jim McEachern Senior Technology Consultant ATIS

Objective This presentation provides an introduction to the, and the motivation behind its formation. 2

Overview SPDY was introduced by Google to reduce webpage load times. An experimental protocol for a faster web SPDY includes mandatory encryption for all traffic SPDY accepted by the IETF as the basis for HTTP/2.0. IETF undecided on mandatory encryption for all HTTP/2.0 traffic Target date for HTTP/2.0 is November 2014. 3

SPDY Protocol and SPDY Proxies SPDY proxies have been deployed to help implement the SPDY protocol for communications with non-spdy servers. The SPDY protocol and SPDY proxies have implications for network management, content distribution and network services. The problem is bundling multiple flows inside a single opaque (encrypted) tunnel Additional background available in white paper: An Analysis of the SPDY Protocol and the SPDY Proxy. 4

Network Services User Device Operating System Browser Apps Network DNS CDN Redirect Content Filters Network Services Network management takes advantage of information inside traffic flows Effective content distribution must be aware of traffic patterns Most network services must look inside packet headers (e.g., NAT, FW, DNS) Some network services need to look inside the packets to analyze the content (e.g., parental controls) Web Servers 5

SPDY Proxy User Device Operating System Browser Apps Network DNS CDN Redirect Content Filters Network Services Encrypted tunnel to SPDY proxy bundles all traffic and hides all flows Breaks network management, content distribution and network services DNS CDN Redirect Content Filters SPDY Proxy Web Servers 6

SPDY Proxies and Impacts Amazon Silk Browser Google Chrome Dramatically changes traffic flows, infrastructure scaling, and peering relationships: Changes flow size and duration (fewer, higher-bandwidth flows) Increasing inbound traffic from proxy owner (to end users) Increasing outbound traffic to proxy owner (from other CSP, ASP) Eliminates visibility into traffic flows Lost visibility into individual flows (5-tuples) Lost visibility into DNS requests (clients don t resolve DNS) Changes VAS paradigm Bypasses carrier VAS services Couples caching, video optimization, image compression, web acceleration with proxy Enables co-processing model for HTTP (networking, HTML, page rendering, etc.) 7

What is SPDY? HTTP HTTPS SPDY Application Transport Network Data Link Physical Google Protocol to replace HTTP(S) that forms the foundation for HTTP 2.0 Goals: Improve page load time, content protection and consumer privacy Implementation: Combination of TCP INTCWIND modification, request multiplexing, SSL encryption Foundation for HTTP 2.0 (IETF HTTPBIS Working Group) Source: Cisco, State of the Mobile Service Provider: Middleboxes & SPDY 8

SPDY Market Position Low number of destinations, High Impact Used by few (~0.7%) websites Compare to IPv6 (3.8% of websites) Websites include Google/YouTube (2012) - #1 / #3 Twitter (2012) - #11 Wordpress (2012) - #18 Facebook (Mar 2013) - #2 Tumblr (2014) Functional in most devices and browsers Android / Kindle Chrome (All OS) Firefox (All OS) Internet Explorer (Win8) Absent in Safari (All OS) 9

Impact on Mobile Middleboxes YouTube Instagram Encrypted traffic on the Internet has grown from 9% to 24% in the last 18 months Pandora Facebook Porn YouTube Facebook Google Policies, Charging and Analytics 3GPP Gn Packet Core 3GPP Gi Packet Inspectors Content Modifiers Protocol Proxies Value-Added Services Services Domain SP losing visibility into content and applications running across their infrastructure Impacts ability to manage traffic, improve subscriber experience, and drive new revenue models 10

Open Web Alliance ATIS is launching Open Web Alliance to initiate a broad engagement with all segments of the Internet business ecosystem to: Develop solutions that do not infringe on the established trust relationships with the user Collaborate with privacy advocacy groups to promote the use of secure communications and educate the user community Consult with regulatory bodies in realignment of the requirements with the current Internet reality See An Analysis of the SPDY Protocol and the SPDY Proxy for additional background. 11

Scope Analysis of Open (SPDY) Service Optimization Proxy Technology impact (clients, applications, DNS, CDN) Business model impact (peering, CDN, VAS) Specify how to subscribe to a SPDY proxy from client browser/application (Search / Discover? Beacon? DNS resolution?) Determine how deep to embed in mobile OS Architecture for supporting localization of SPDY traffic during roaming and handovers (mobile) 12

Output Open Service Optimization Proxy: Formally document the high level characteristics of an open service optimization proxy. Use cases Architectural context Requirements Value proposition Related work Open issues Publish open service optimization proxy document before the completion of HTTP/2.0 (November 2014). 13

Open Service Optimization Proxy User Device OS Browser Apps Network Providers DNS CDN Redirect Content Filters Network Services Search / OTT Apps/Content Open Service Optimization Proxy Architectural context Network metadata What data is available? Who has access? How is it protected? Requirements to protect trust relationships with user Web Servers 14

In Summary SPDY is an indication of a broader emerging challenge: Split browsers The role of proxies Opportunistic encryption of all traffic One size does not fit all. The user should be involved in making trade-offs. SPDY proxy bypasses intermediate services the user may want to access Open Web Alliance objective is to begin the dialog. 15

Launching For additional information contact Jim McEachern at jmceachern@atis.org 16