named data networking - university of california,...

40
Named Data Networking NSF FIA PI Meeting Berkeley, CA May 25-26 2011 www.named-data.net 1

Upload: others

Post on 01-Aug-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Named Data Networking

NSF FIA PI Meeting Berkeley, CA

May 25-26 2011

www.named-data.net

1

Page 2: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

We are NDN

2

Page 3: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Agenda

A.  NDN Overview B.  Two Initial Security Problems

1)  Routing – OSPF

2)  Instrumented Environments – Lighting Application

C.  Privacy Considerations D.  Summary

3

Page 4: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

The problem

4

ISP

ISP

Page 5: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Communication v. Distribution

5

Communication Distribution

Naming Endpoints Content

Security Secure Process Secure Content

Page 6: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Today

6

Path determined by global routing, not local choice

Structural asymmetry precludes market mechanisms and encourages monopoly formation

X

Page 7: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

7

? a/b/c

NDN approach

Page 8: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

8

a/b/c/d

Data a/b/c/d

? a/b/c

NDN approach

Page 9: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

9

a/b

• Packets say ‘what’ not ‘where’ (no src or dst)

• Forwarding decision is local

• Upstream performance is measurable

? a/b/c/e

NDN approach

Page 10: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

We envision replacing this:

10

ISP

ISP

Page 11: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

11

ISP

ISP

With THIS:

Page 12: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Research Snapshot

12

Routing • Existing models • New models

Security • Fast Signing • Usable Trust • Privacy • Attack-resistance • App. Security

Fundamental Theory • Any-to-Any communication • Bandwidth / Memory / Distance tradeoffs

Page 13: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Securing Content

•  Integrity: is data intact and complete?

• Origin: who asserts this data is an answer?

•  Correctness: is this an answer to my question? 13

Any consumer can ascertain:

Content Packet = 〈 name, data, signature 〉

Page 14: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

14

Evidentiary Trust

Content ↕

Key

Content ↕

Key

Name Hierarchy & Links

Key Certification Graph

Content ↕

Key Content ↕

Key

Content ↕

Key Content ↕

Key

A web of trust gradually & organically arises from named and signed content:

Page 15: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Attack Resistance

Many current DoS + DDoS attacks/threats become irrelevant because of NDN architecture

• A few notable features: • Content caching mitigates targeted DoS • Content not forwarded w/out prior state set up by interests • Multiple interests for same content are collapsed

• One copy of content per “interested” interface is returned

15

Page 16: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Agenda A.  NDN Overview B.  Two Initial Security Problems

1)  Routing – OSPF

2)  Instrumented Environments – Lighting Application

C.  Privacy Considerations D.  Summary

16

Page 17: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Routing Security in NDN

We start with IGP (OSPF) 17

Page 18: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Routing Security with NDN

•  Routing is a core function •  A means to populate router FIBs

•  Routers exchange info about "where” content prefix is reachable

•  How do we secure this process?

•  NDN features help •  Protect routing updates

•  Authenticity + integrity, freshness + timeliness, etc.

18

Page 19: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Data plane resilience •  IP data delivery strictly follows FIB direction:

•  One-way data flow -- cannot detect failures •  Has no effect on routing decisions

•  NDN content delivery is a 2-step process: •  Interest forwarding to set up state •  Content traversal of interest path in reverse

•  Interest forwarding state eliminates looping, allows exploitation of topological redundancies and use of multipath interest forwarding

•  Content packets measure quality of selected (interest) paths lets forwarding plane incorporate congestion and fault mitigation into path decisions

•  If adversary is black-holing, forwarding plane can go around directly •  If adversary sends false data: nodes that verify signatures (routers or

end-nodes) can inform the forwarding plane to go around adversary 19

Page 20: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Using NDN Security Features

•  Router names follow network management hierarchy

•  Names associated with signing keys (not only 1:1)

•  Keys are authenticat-able:

•  Network operator configures trust anchor for each router, e.g., public key for /ndn/ucla.edu/

•  Router key (e.g., /ndn/ucla.edu/bb1) certified by anchor key

•  Each interface has a name, (e.g., /ndn/ucla.edu/bb1/f1); router key certifies each interface key

•  Updates from each interface signed by that interface key

20

Page 21: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Agenda

A.  NDN Overview B.  Two Initial Security Problems

1)  Routing – OSPF

2)  Instrumented Environments – Lighting Application

C.  Privacy Considerations D.  Summary

21

Page 22: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Testbed: UCLA Film & TV Studio #1

NDN Lighting Control Application

22

  Special case of actuators in an instrumented environment   Rich set of use cases (e.g., entertainment)

Page 23: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

IP in Lighting Systems?

•  Security currently achieved by:

•  Physical network segregation, or

•  VLANs + firewalls

•  Devices increasingly receive over-the-air upgrades & updates

•  Not clear how to accommodate with above in scalable manner

•  IP-based addressing irrelevant to applications

•  Easier to address fixtures in application-specific terms without having to know through/to which gateway they connect

•  IP configuration particularly brittle for dynamic systems

•  Lighting devices (fixtures) can come & go frequently

•  Certain building systems incorporate mobile devices

23

Page 24: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

NDN for Lighting Control Two challenges: Configuration and Control

Design goals •  No IP-like configuration issues

•  Application-assigned meaningful names

•  Secure enough to use over Internet

•  Multiple controlling applications with different capabilities

•  Scalability (many fixtures!)

•  Quasi-real-time performance (ca. 50ms response time for now)

24

  Industry-standard LED lighting by Philips Color Kinetics   Commonly used in architectural and entertainment settings.   IP and Ethernet for fixture & power supply discovery, configuration & control

Page 25: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Multiple Controlling Processes

25

NOTE: Every entity has a public/private key-pair, including: fixtures, power supplies, embedded interfaces and applications

Page 26: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Bootstrapping   No preconfigured information in fixture, other than manufacturer-supplied:

•  Public/Private key-pair •  Initial authenticator

  Standard mechanisms used for lighting interface to connect to NDN on one side and discover fixtures on another

  Fixture starts with pre-configured name: /ndn//lighting/<manufacturer>/<Pubkey-hash>

  To discover fixtures, configuration manager sends interests for: /ndn/lighting/

•  Once located new fixture, retrieves (via interest) its public key data: /ndn/lighting/<manufacturer>/<Pubkey-hash>/key

•  Out of band, application obtains initial authenticator & fingerprint of public key per fixture

  Configuration manager issues “signed interest” authorizing its public key to configure fixture •  Contains KeyLocator for configuration manager public key •  Includes initial authenticator of fixture, encrypted with latter’s public key

26

Page 27: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Control •  After bootstrapping, configuration manager grants permissions to

applications by publishing their keys under names representing (authorized) capabilities

•  Signed by key already authorized for fixture:

<app-key, capability, authorized-key>

•  Fixture checks if application signing key is in:

(1) its cache of authorized keys, or (2) built-in trust anchor list created at bootstrap time

If in neither, fixture issues interest for:

<path-to-key>/authority/<name-used-to-access-fixture>/<capability>

and checks that corresponding content signed by an authorized key

27

Page 28: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Control via Signed Interests •  Application initiates control actions: need to minimize delay

•  Capabilities (commands): name, configure, control, read and override

•  Expressed as part of name within interest

•  Application issues signed interest

•  signs empty content with appropriate name

•  To prevent replay, includes counter (or timestamp)

•  Fixture replies with content representing ACK or current state

28

Synchronized control of multiple fixtures via fixture-issued long-lived interests

Page 29: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Agenda

A.  NDN Overview B.  Two Initial Security Problems

1)  Routing – OSPF

2)  Instrumented Environments – Lighting Application

C.  Privacy Considerations D.  Summary

29

Page 30: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Communication Privacy •  Interest: •  Generally does not say where it will end up

•  Away from consumer: says nothing about who requested content

•  Close to consumer (Alice): leaks name of requested content (Bob’s video)

•  Content: •  Does not say where it is coming from now

•  Traditional signatures leak origin (producer)

30

Page 31: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Whither Name Privacy? NDN names are expressive and meaningful, but…

•  Leak information about requested content

•  Can make it easy to filter, e.g., block all content to/from:

/ndn/cnn/world-news/china/

31

However:

•  NDN names are opaque to network

•  Routers only need to know name component boundaries

•  Names can carry binary data

Page 32: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Name Privacy Requirements

•  Observers close to consumer should not learn what is being requested

•  Name in interest needs to be hidden

•  Content name and signature must not leak origin •  Consumer needs to verify content signatures

•  Consumer hiding its identity from producer •  Already provided by NDN – does not require encryption

32

Page 33: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Anonymization Services

•  Usually done at higher layer(s)

•  Consumer picks a set of anonymization servers

• Only last server learns name in interest

•  Content encapsulated/encrypted and routed back

•  Drawback: suboptimal routing

•  Can also be done at NDN layer (see below)

33

Page 34: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

General Approach Flexible name encryption: •  Consumer picks components to encrypt

•  Names with encrypted components adhere to NDN syntax, e.g.,

/ndn/uc/ EUC(uci) /staff/ EUCI(cs/Alice/blog/) / today/joke

•  Each router offering this service advertizes its public (encryption) key

•  Public keys are namespace-specific

34

Page 35: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Routing Encrypted Names

•  Concentric encapsulation

•  Full encapsulation (akin to anon. services)

35

Caveat: what’s good for privacy, not always so for security. Encrypted names in interests:

•  Inhibit collapsing interests in routers •  Can prompt DoS possibilities

Page 36: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Concentric Encapsulation

/ndn/uc/uci/cs/Alice/blog/today/

/ndn/uc/EUC(uci / EUCI(cs/Alice/blog/today/, k) )

•  Last decrypted component carries symmetric key

•  Decrypting routers replace signatures on content

•  Consumer receives original producer signature

•  Separate from content encryption 36

Page 37: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Full Encapsulation

/ndn/uc/uci/cs/Alice/blog/today/

X=EYALE(/ndn/uc/uci/cs/Alice/blog/today/, k)

Y=EWASHU(/ndn/yale/anon/X, k’)

/ndn/washu/anon/Y/

37

Page 38: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

UC UCI

Consumer Producer

/ndn/uc/EUC(uci/EUCI(cs/Alice/…/, k))

/ndn/uc/uci/EUCI(cs/Alice/…, k)

/ndn/uc/uci/cs/Alice/…

Content, Sigproducer

Ek (Content, Sigproducer), Siguci Ek (Content, Sigproducer), Siguc

k

Concentric Encapsulation

38

Page 39: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

Agenda

A.  NDN Overview B.  Two Initial Security Problems

1)  Routing – OSPF

2)  Instrumented Environments – Lighting Application

C.  Privacy Considerations D.  Summary

39

Page 40: Named Data Networking - University of California, Irvinesprout.ics.uci.edu/projects/ndn/slides/fia-tsudik.pdf · 2014. 3. 12. · Named Data Networking NSF FIA PI Meeting Berkeley,

SUMMARY

•  Lots of work underway

•  Much of what was presented not “cast in stone”

•  Didn’t cover:

•  Signature schemes (e.g., batch operations, streaming content)

•  Trust establishment / Trust frameworks

•  Usability of S&P

•  Security in other apps, e.g., sensing, conferencing

40