3'/ ,6* 3r& 3ursrvdo 7hpsodwh 3r& 3urmhfw 'hwdlov20)000... · 3r& 3urmhfw...

9
PDL ISG - PoC Proposal Template 1 PoC Project Details 1.1 PoC Project PoC Number (assigned by ETSI) PoC Project Name: Decentralized Internet Infrastructure (DII) PoC Project Host: Universitat Politècnica de Catalunya (UPC) Short Description: Autonomous domains over the Internet have a number of security issues: prefix hijack, path hijack & route leak. We use decentralized Distributed Leger Technology to prevent the information from being falsely manipulated by compromised entities. It will demonstrate how to make Internet infrastructures more secure and robust, create innovative decentralized ecosystems and how they would operate in coordination with the ledgers. 1.2 Acronyms ASN: Autonomous System Number BGP: Border Gateway Protocol DII: Decentralized Internet Infrastructure DNS: Domain Name System OTT: Over The Top ROA: Route Origin Authorization 1.3 PoC Team Members Table: 1 PoC Team Members List Organization name ISG PDL participant (yes/no) Contact (Email) PoC Point of Contact (see note 1) Role (see note 2) PoC Components 1 (X) Universitat Politècnica de Catalunya (UPC) Yes [email protected] Albert Cabellos Research Institute Demo Space and presentation, Ideas & solutions 2 Telefonica Yes diego.r.lopez@telefon ica.com Diego Lopez Service Provider & Operator Demo Support 3 Huawei UK Yes liubingyang@huawei. com Liubingyang (Bryan) Manufacturer Equipment 4 UC3M No [email protected] marcelo bagnulo braun Research Institute Demo Support NOTE 1: Identify the PoC Point of Contact with an X. NOTE 2: The Role will be network operator/service provider, infrastructure provider, application provider or other as given in the Definitions of ETSI Classes of membership. All the PoC Team members listed above declare that the information in this proposal is conformant to their plans at this date and commit to inform ETSI timely in case of changes in the PoC Team, scope or timeline.

Upload: others

Post on 24-Jul-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 3'/ ,6* 3R& 3URSRVDO 7HPSODWH 3R& 3URMHFW 'HWDLOV20)000... · 3r& 3urmhfw 6frsh 3r& *rdov 7kh pdlq jrdo ri wkh 3r& lv wr ghprqvwudwh wkh hiilfdf\ ri xvlqj '/7 iru hqdeolqj vhfxuh

PDL ISG - PoC Proposal Template

1 PoC Project Details

1.1 PoC Project PoC Number (assigned by ETSI)

PoC Project Name: Decentralized Internet Infrastructure (DII)

PoC Project Host: Universitat Politècnica de Catalunya (UPC)

Short Description: Autonomous domains over the Internet have a number of security issues: prefix hijack, path hijack & route leak. We use decentralized Distributed Leger Technology to prevent the information from being falsely manipulated by compromised entities. It will demonstrate how to make Internet infrastructures more secure and robust, create innovative decentralized ecosystems and how they would operate in coordination with the ledgers.

1.2 Acronyms ASN: Autonomous System Number

BGP: Border Gateway Protocol

DII: Decentralized Internet Infrastructure

DNS: Domain Name System

OTT: Over The Top

ROA: Route Origin Authorization

1.3 PoC Team Members Table: 1 PoC Team Members List

Organization name ISG PDL

participant (yes/no)

Contact (Email) PoC Point of

Contact (see note 1)

Role (see note 2)

PoC Components

1 (X)

Universitat Politècnica de Catalunya (UPC)

Yes [email protected] Albert Cabellos

Research Institute

Demo Space and presentation, Ideas & solutions

2 Telefonica Yes diego.r.lopez@telefon

ica.com Diego Lopez Service

Provider & Operator

Demo Support

3 Huawei UK Yes liubingyang@huawei.

com Liubingyang (Bryan)

Manufacturer Equipment

4 UC3M No [email protected] marcelo

bagnulo braun

Research Institute

Demo Support

NOTE 1: Identify the PoC Point of Contact with an X. NOTE 2: The Role will be network operator/service provider, infrastructure provider, application provider or other as

given in the Definitions of ETSI Classes of membership.

All the PoC Team members listed above declare that the information in this proposal is conformant to their plans at this date and commit to inform ETSI timely in case of changes in the PoC Team, scope or timeline.

Page 2: 3'/ ,6* 3R& 3URSRVDO 7HPSODWH 3R& 3URMHFW 'HWDLOV20)000... · 3r& 3urmhfw 6frsh 3r& *rdov 7kh pdlq jrdo ri wkh 3r& lv wr ghprqvwudwh wkh hiilfdf\ ri xvlqj '/7 iru hqdeolqj vhfxuh

1.4 PoC Project Scope

1.4.1 PoC Goals

The main goal of the PoC is to demonstrate the efficacy of using DLT for enabling secure and robust DII (Decentralized Internet Infrastructure). The PoC will demonstrate these use cases and report on the suitability of the PDL

DII (Decentralized Internet Infrastructure) for BGP Security: DII can not only prevent prefix hijacking, but also path hijacking and route leakage to build a complete BGP route security service. The three goals are to use DTL technology to address the three problems, illustrated below.

First goal, Prefix Hijack: Google (as an example of an OTT service provider) has announced an IP prefix that belongs to NTT As an example of an Operator) to Verizon (as an example of a second operator). The traffic from Verizon (operator 2) to NTT (Operator 1) is sent to Google (the OTT service provider), causing a large-scale network disconnection in Japan (as a remote country) for one hour [1].

• DII maintains trusted IP prefix ownership info and mapping info between the IP prefix and ASN

(Autonomous System Number), called ROA (Route Origin Authorization) info.

• Only the owner of IP Prefix (e.g.: NTT) can create such ROA info (10.0.0.0/8, AS1234).

• Based on the ROA info, For example: Verizon can prevent the hijacked route from Google. Note: The company names are examples only. There is no suggestion of known problems in their networks.

Figure 1: BGP Prefix Hijack Example

Second goal, Path Hijack: AS 666 (Autonomous System) announced false information, claiming that it has only one hop with AS 1. As a result, all traffic destined for AS 1 is hijacked to AS 666[2].

• DII maintains trusted ASN ownership info and mapping info between the ASs, called AS neighbor info.

• AS 666 cannot forge non-existent AS neighbor info.

• Based on this info, victim can prevent the Path hijacked route from AS 666.

Figure 2: BGP Path Hijack Example

Page 3: 3'/ ,6* 3R& 3URSRVDO 7HPSODWH 3R& 3URMHFW 'HWDLOV20)000... · 3r& 3urmhfw 6frsh 3r& *rdov 7kh pdlq jrdo ri wkh 3r& lv wr ghprqvwudwh wkh hiilfdf\ ri xvlqj '/7 iru hqdeolqj vhfxuh

Third goal, Route Leak: Hathway leaks the route learned from the peer provider (e.g.: Google) to the second provider (e.g.: Airtel). As a result, the route from the second provider (e.g.: Airtel) to the first provider (e.g.: Google) bypasses Hathway carrier, causing congestion [3].

• DII maintains trusted ASN ownership info and trusted business relationships between ASs . • This info enables Airtel to filter out the advertisement of the Hathway because of route leakage.

Figure 3: BGP Route Leak Example EXAMPLE: ETSI GS PDL 005 extract of Table 1 in Clause 4.4 below.

Table: 2: Main Areas of CDPR & PDL Applications

HORIZONTAL DOMAIN VERTICAL DOMAIN Infrastructure Management ICT: Internet resource management, Trust

infrastructure (e.g. PKI), Network security

1.4.2 PoC Topics

PoC Topics identified in this clause need to be taken for the PoC Topic List identified by ISG PDL and publicly available, i.e. the three topics identified in clause 4.5 of the PDL PoC Framework. PoC Teams addressing these topics commit to submit the expected contributions in a timely manner.

Table: 23 PoC Topics

PoC Topic Description Related WI Expected Contribution Target Date The PoC uses Smart contracts to enable the hyperlogic

PDL-004 Smart contracts

Review of requirements and validation

01.08.2020

The PoC uses many sites distributed over the globe

PDL-006 Interconnection

Review of the interworking 01.11.2020

1.4.3 Other topics in scope

List here any additional topic for which the PoC plans to provide input/feedback to the ISG PDL.

Table: 34 Feedback Plans for ISG PDL

PoC Topic Description Related WI Expected Contribution Target Date Demonstration of Hyperledger fabric

PDL 001 unknown See Note

Demonstration of BGP PDL-006 Interconnection proof of requirements

01.11.2020

Smart contract use PDL-004 Smart contracts use and validation

01.08.2020

Page 4: 3'/ ,6* 3R& 3URSRVDO 7HPSODWH 3R& 3URMHFW 'HWDLOV20)000... · 3r& 3urmhfw 6frsh 3r& *rdov 7kh pdlq jrdo ri wkh 3r& lv wr ghprqvwudwh wkh hiilfdf\ ri xvlqj '/7 iru hqdeolqj vhfxuh

Interconnection of Ledgers

PDL-006 Security and use of BGP in the Interconnection of Ledgers

01.09.2020

Note: PDL 001 is published and the work-item closed. If it is found necessary to revise it a new revision work-item needs to be contributed with a contribution. The current reference to hyperledger fabric is sufficient, if more is needed that is not applicable to PDL-004 & PDL-006 this will be considered.

1.5 PoC Project Stages/Milestones Table: 5 PoC Stages/Milestones

PoC Milestone Stages/Milestone description Target Date

Additional Info

P.S PoC Project Start 01.07.2020

P.D1 PoC Demo 1 01.08.2020

ETSI Bright talk presentation

P.D2 PoC Demo 2 01.10.2020

Layer 123 demo(s)

Currently their website (https://events.layer123.com/sdn/agenda-live-1747TP-7409L4.html) they keep the 12-15 October 2020 dates. ETSI (Marion or David) knows how to co-ordinate

The project would seek to organize a webinar event. Event producers like Layer123 are eager for this kind of virtual events due to the impact of the pandemics on their business and visibility.

P.D3 PoC Demo 3 7-11.12.2020

Demo proposal at IEEE GLOBECOM 2020 (deadline for the demo July 1st, notification of acceptance July 15th). Demo to be organized 7-11 Dec in Taipei, Taiwan. More information about the venue here: https://globecom2020.ieee-globecom.org (See Note 1 & 2 below)

Page 5: 3'/ ,6* 3R& 3URSRVDO 7HPSODWH 3R& 3URMHFW 'HWDLOV20)000... · 3r& 3urmhfw 6frsh 3r& *rdov 7kh pdlq jrdo ri wkh 3r& lv wr ghprqvwudwh wkh hiilfdf\ ri xvlqj '/7 iru hqdeolqj vhfxuh

P.D4 PoC Demo 4 10-13.05.2021

IEEE INFOCOM (10-13 May 2021, Vancouver) (See Note 1 below)

P.C1 PoC Expected Contribution 1 01.08.2020

Smart contracts use and validation

P.C2 PoC Expected Contribution 2 01.09.2020

Interconnection of Ledgers

P.C3 PoC Expected Contribution 3 01.11.2020

Interconnection proof of requirements

… …

P.R PoC Report 01.01.2021

P.E PoC Project End 01.02.2021

NOTE 1: Given the current situation with the pandemic international conferences face a significant degree of uncertainty both in the dates and in the organization itself (virtual vs. physical). We will adapt this plan according to the upcoming events.

NOTE 2: The details are under consideration.

1.6 Additional Details We will report the outcome of the demo in an academic paper submitted to a top IEEE ComSoc open-access journal with high impact factor. A potential candidate for this is are IEEE Access and IEEE Network Magazine.

2 PoC Technical Details

2.1 PoC Overview DII uses decentralized blockchain to prevent the information from falsely manipulating by compromised entities. It will make Internet infrastructures more secure and robust, and create innovative decentralized ecosystems [4].

Page 6: 3'/ ,6* 3R& 3URSRVDO 7HPSODWH 3R& 3URMHFW 'HWDLOV20)000... · 3r& 3urmhfw 6frsh 3r& *rdov 7kh pdlq jrdo ri wkh 3r& lv wr ghprqvwudwh wkh hiilfdf\ ri xvlqj '/7 iru hqdeolqj vhfxuh

Figure 4: DII Architecture

3rd-party trusted Apps

• Decentralized PKI. A decentralized PKI system can be built based on DII without highly centralized root CA, and avoid the single point of failure problem.

• Near-source DDoS mitigation. Based on the network-related information like IP address ownership, the DDoS victim could find out the from which edge network the attack traffic comes from, and also DII enables a victim network to on-demand purchase DDoS mitigation services close to the attack sources.

Trusted name spaces

• IP ASN: trusted BGP routing. The mappings of IP prefix and ASN are recorded in DII, so the BGP routing system could verify the origin of BGP Updates message to make sure it originated by a valid AS.

• Name IP: trusted DNS. The mappings from IP addresses to domain names could be used to verify the mapping is not modified by malicious attackers.

Global Block-chain infrastructure

The PoC will demonstrate the following requirements.

Requirement of DII Descriptions Related Feature of PDL

Permissioned control The participants of DII needed to be authorized. Access Control

Resistance to Single point failure

The resource management in DII doesn’t depend on single authority.

Decentralized consensus protocol

Peer-to-peer trust model. Agreement is made by a decentralized consensus protocol, run by all peers.

The creation of records in DII should be trustable.

Page 7: 3'/ ,6* 3R& 3URSRVDO 7HPSODWH 3R& 3URMHFW 'HWDLOV20)000... · 3r& 3urmhfw 6frsh 3r& *rdov 7kh pdlq jrdo ri wkh 3r& lv wr ghprqvwudwh wkh hiilfdf\ ri xvlqj '/7 iru hqdeolqj vhfxuh

The records are tamper-resistant. Decentralized data management

Data is maintained by all peer nodes. All data operations are transparent, and data availability is much higher.

Trustable autonomous procedure

Autonomous procedure can avoid the configuration errors and misbehavior.

Smart contract

A Turing-complete computation model to support any decentralized application.

Trustable Transaction Capability

Trustable transaction capability is important to Internet resource.

Transaction

Peer nodes can send transactions between each other, enabling service monetization with inherent trust.

2.2 PoC Architecture DII based on Permissioned Distributed Ledger. The General DLT Architecture using Hyperledger fabric shown in Figure 1 below uses secure address tables and BGP to secure the IP ASN Prefix, the Path & the Route taken over routers to prevento avoid BGP attacks. Especially when routed globally.

Hyperledger Fabric

ROA

IP Maxlength ASN

1.1.1.1/32 32 100

IP Owner Exp date

1.1.1.1/32 ISP1 19/10

IP Ownership

ASN Owner Exp date

AS100 ISP1 19/10

ASN Ownership

ROA(IP->ASN)

BGP Update

Source Target

AS100 AS200

AS200 AS300

AS Neighbor(ASN->ASN)

1.Route origin verification2.Path verification3.Route leak detection

Manage IP,ASN,ROA, AS Neighbor information

Store IP Ownership,ROA and AS Neighbor Info in world state.

Fabric-CA

Source Target Type

AS100 AS200 P2P

AS200 AS300 P2P

Decentralized Consensus

Access Control

AS Business Relationship(ASN->ASN)

Only owner can create ROA record

Only owner can createNeighbor record.

Decentralized Data storage

Ledger

CommitterEndorser

TxLedger

CommitterEndorser

Tx

Transaction&Smart Contract

RIR

NIR

ISP

Enterprise

University

Figure 5: General Hyperledger architecture

The Figure 2 Below shows how an attacker Hacker attempts a Path & Address hijack and the DTL infrastructure is self-healing and uses the Smart contract to correct and re-establish the address and the path.

Page 8: 3'/ ,6* 3R& 3URSRVDO 7HPSODWH 3R& 3URMHFW 'HWDLOV20)000... · 3r& 3urmhfw 6frsh 3r& *rdov 7kh pdlq jrdo ri wkh 3r& lv wr ghprqvwudwh wkh hiilfdf\ ri xvlqj '/7 iru hqdeolqj vhfxuh

4. BGP router syncs database, and rejects (2F00:3::/48, 500),

accepts (2F00:3::/32, 400).

Video stream comes back.

AS 400

Demo of Decentralized Internet Infrastructure for BGP Security

AS 100AS 500

2. BGP Update (2F00:3::1/128, 400)

AS 500 hijacks Server’s prefix. Client cannot reach server.

DII node

DII node

DII Global Blockchain

3. AS 400 initiates a transaction, associating 2F00:3::/32 to AS 400 (router origin authorization).ASes reach consensus on this: 2F00:3::/32 can only be announced by AS 500.

Figure 6: Demonstration of a Prefix Hijack attack and corrective self–healing behaviour

2.3 PoC Success Criteria The DII PoC success is measured by showing that BGP on Hyper-ledger Fabric can mitigate and automatically heal situations where prefix hijacking, path hijacking and route leakage are a likely risk to networks and the services delivered. To build a service with security. There is a need to demonstrate:

Access Control; Decentralized consensus protocol, Peer-to-peer trust model, where agreement is made by a

decentralized consensus protocol, and run by all peers; Decentralized data management, where data is maintained by all peer nodes, all data operations are

transparent, and data availability is much higher; Smart contract, a Turing-complete computation model to support any decentralized application and Transaction control, peer nodes can send transactions between each other, enabling service

monetization with inherent trust.

2.4 Additional information Include additional information as useful.No additional information.

References: [1] https://www.thedrum.com/news/2017/08/28/google-hijack-made-japan-land-no-internet-more-30-minutes

[2] https://datatracker.ietf.org/meeting/98/materials/slides-98-rtgarea-jumpstarting-bgp-security-with-path-end-validation-00

[3] http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjHkdqIrY_qAhXo-GEKHYleBq04ChAWMAJ6BAgFEAE&url=http%3A%2F%2Fwww.infocomm-

Page 9: 3'/ ,6* 3R& 3URSRVDO 7HPSODWH 3R& 3URMHFW 'HWDLOV20)000... · 3r& 3urmhfw 6frsh 3r& *rdov 7kh pdlq jrdo ri wkh 3r& lv wr ghprqvwudwh wkh hiilfdf\ ri xvlqj '/7 iru hqdeolqj vhfxuh

journal.com%2Fcjnis%2FCN%2Farticle%2FdownloadArticleFile.do%3FattachType%3DPDF%26id%3D160313&usg=AOvVaw0j_1MmF7mUYqxr2xYOsw_-

[4] T17-SG13-190304-TD-WP3-0224!!MSW-E, ITU-T SG-13 Q2 WI-DNI