source address validation: from the current network ...fif.kr/gfi-summit/13/mt/17.pdfjun bi tsinghua...

27
1 Source Address Validation: from the Current Network Architecture to SDN-based Architecture Jun Bi Tsinghua University/CERNET GFI 2013 Nov. 20, 2013

Upload: lamnhu

Post on 16-Mar-2018

217 views

Category:

Documents


1 download

TRANSCRIPT

1

Source Address Validation: from the Current Network Architecture

to SDN-based Architecture

Jun Bi

Tsinghua University/CERNETGFI 2013

Nov. 20, 2013

2

Content• Source Address Validation Architecture (SAVA)

– SAVA solutions– SAVA Implementations– SAVA deployment at CNGI-CERNET2

• Leveraging SDN to enhance Source Address Validation– Access: Software Defined SAVI– Intra-AS: SDN based CPF– Inter-AS: Collaborative On-demand Spoofing

Defense• Conclusion

3

Source Address Validation Architecture (SAVA)

4

Source Address Spoofing• Source address spoofing still a problem

– Arbor Network annual network security report– MIT spoofer project– NANOG discussions

• Tsinghua university / CERNET proposed:– Source address validation architecture (SAVA) and solutions

for IPv6– Solutions implemented, collaborating with domestic vendors– Deployed at CNGI-CERENT2 backbone and 100

universities’ campus networks– Co-funders of IETF SAVI WG

– RFC 5210 SAVA– RFC 7039 SAVI Framework

5

SAVA: Source Address Validation Architecture (RFC 5210)

Transit AS

Access Network

ASAS

Access Network

AS

Inter-AS

Intra-AS

Interface IDLevel Granularity

IP Prifix LevelGranularity

AS LevelGranularity

Access Network

IP Prefix LevelGranularity

6

Access Level: SAVI-CPS(Control Packets Snooping based SAVI)

SAVI-DHCP SAVI-Stateless SAVI-MIX

7

SAVI-CPS Implementation• Huawei• ZTE• H3C• Ruijing• Digitial China• Centac• Bitwa• L3/L2 switch, WLAN

CalculatePath

……

Path Table

Src(inIf1)A1(inIf2)A2……(inIfn)DstSrc, Dst, inIF

FTDB

……

FTDB: Filter Table DB

Telnet+Scriptsconfigure ACL

SNMPcollect routing table and interface table

GenerateFTDB

xFlowcollect sampling info

……

FIT

FIT:  Flow Info TableSrc, Dst, inIF Match (Alarm)

Intra-AS Level: CPF (Calculation based Path Forwarding)

• Key problem to resolve- Reduce false positive caused by uRPF at partial deployment

9

CPF Implementation

Topology mgmt L3 devices mgmt

Spoofing alarm SAVI user mgmt

10

Inter-AS Level: SMA(State Machine based Authentication)

• Key problem to resolve– Incentive for deployment

• Trust Alliance• ACS

– Each member AS has a control server to negotiate parameter of SMs of each peer to trigger the same tag (random number) sequence

• ASBR– Add tags in IPv6 packets(in option header) and validate tags in destination

• Incentive– source address of Each AS can’t be spoofed within the Alliance

11

SMA Implementation• Huawei NE40E

core router line cards with 10G,GE ports

• Bitway BE12000core router line cards with OC48, GE ports

• Centec special box with 10G, GE (co-located with legacy routers)

12

SAVA Deployment at CNGI-CERNET2

6IX

Inter‐ISP(SMA)

Inter‐AS(SMA)

Intra-AS(CFP)

AccessNet(SAVI-CPS)

13

SAVA Deployment at CNGI-CERNET2

13

14

Leveraging SDN to enhance Source Address Validation

Motivations: enhancing Access• Complex scenarios

– Address assignment methods: Manual, SLACC, DHCP, SEND, Mixed, …

– Access methods: LAN, WLAN, DSL, 3G, …– Mobility: local, across-network– Special cases: IPv6 transition, DNA, … addr. related new stuff– Solutions implemented at switches for all scenarios

• Complex for design and implementation• Low efficiency (most scenarios are not common cases)

• Complex configuration– Coherent configurations for ALL switch ports at SAVI

“perimeter” in the whole access network

• Can we migrate complexity from switch to server ?

Software Defined SAVI (SDN-SAVI)

Rule Generator

Binding Rules

Control Plane

Data Plane NOS

Binding Rules

Message Adaptor

Data Plane

Controller

SAVI Switch

SAVI SwitchOF Messages

SAVI APP1: state machine SAVI APP2: rule generatorSAVI APP3: mobilitySAVI APP4: …..

Motivations: enhancing Intra-AS• Complexity to deal with legacy management and

control interfaces– No unified MIBs (private MIBs) – No unified sampling protocol (sFlow, NetFlow,

NetStream, etc)– No friendly programmable interfaces to configure ACLs

(telnet + scripts are dangerous for production nets)• Performance

– Delay of network status update– Delay of control update

• Require unified and realtime mgmt/ctrl interfaces

SDN based CPF

SNMP

Global view

CPF

NOS(Network OS)

Data Plane

Network APPControl Plane

xFlow TCL telnet

OpenFlow Protocol

Control Plane

OpenFlow RTM

OSPF

BGP

RIP

OpenFlow Switch

xFlow QoS&ACL FIB

Data Plane

OpenFlow

Packet SampleMessage Processor

Network StateMessage Processor

Control RuleMessage Processor

NOS-NAPP

NOS

OpenFlow+ Protocol

Address Validation Module

Filter Generator Module

Rule Adaptor Module

CPF

NOS-NAPP

NOS-NAPP Protocol

OpenFlow Protocol

OpenRouter

Filtering Rules Enforcement Delay causes false positive, reflects the filtering effect

Integrated Protocol: To takes placeof SNMP/xFlow/Telnet in order toreduce the complication caused bymultiple control interfaces withOpenFlow protocol.

Central Control: To get a globalforwarding path and then resolve falsepositive of filtering information caused byasymmetric routing more than ingressfiltering.

Demonstrated at INFOCOM2012 InSAVO: Intra-AS IPv6 Source Address Validation Solution with OpenRouter

Evolvable Deployment: To provide software-defined abilities by extendingOpenFlow, but also give a tradeoff between existing hardware and evolution cost.

Motivations: enhancing Inter-AS• Security: SMA uses lightweight tags for verification.

An attacker might monitor packets in the backbone and replay the tag with spoofed packets– Solution- cryptographic tags to prevent replay

• Cost: Per-packet crypto marking incurs heavy data processing overhead beyond hardware capacity.– Solution- on-demand defense to reduce overhead– “When”: defend only attack is detected (cost effective)– “Which”: define N defense functions, chosen by operators

by the type of attack– “Who”: only filtering the specific flows with self-benefit

CoFence: Collaborative On-demand Spoofing Defense

• Distributed inter-AS collaboration– Deployer discovery, peering and defense invocation

• Spoofing defense functions– Against d-DoS: DP and CDP (CDP uses crypto marking)– Against s-DoS: SP and CSP (CSP uses crypto marking)– Extensible: can define more functions

• Function invocation– Quadruple: (function, parameters, prefix, time)

• Function: the function to be invoked• Parameters: parameters for the function (e.g., keys for crypto)• Prefix: the src/dst prefix to be protected• Time: the time duration for this invocation

• These lead to SDN-based design

SDN (not OpenFlow) based CoFence

SW BGP‐d

peering

on‐demanddefensepolicy

loc‐infopeer‐info

northboundinterfaces

southboundinterfaces

east‐westinterfaces

CoFence‐d

Controller

HW tables dataflow

secureC‐Rchannel iBGP

Router

Router

Controller

Internet

eBGP

secureC‐Cchannel

ASi ASj

Apps Apps

monitor control

policy API

analysis

CoFence-d communicateswith controller and managestables to define data-planebehavior.

Controller communicates with other domains, and bridges apps with routers, using SDN interfaces. It provides CoFence-specificfunctionalities and maintainsdomain-wide information.

Higher-layer features can be added in apps, e.g., attack monitoring, traffic analysis, AS-wide policy and control, manual-config GUI and auto-config APIs for IDS.

GUI

• WE-Bridge proposed in China 863 High-tech R&D project FINE• Demoed at CANS13 and SupterComputing2013

“WE-Bridge” proposed in FINE

DPA1

Open Devices

Local ViewAPI

Global Physical View API

Logical ViewAPI

AS-1 (Doman 1)

DPA2 DPAn

APP-1 APP-2 APP-n

DPA1

AS-2 (Domain 2)

DPA2 DPAn

APP-1 APP-2 APP-n

IDN

IDN

IDN

IDN

Open Devices

NOS-1 NOS-2

VCP-1 VCP-2

WE-Bridge

26

Conclusion• SAVA and solutions

• Architecture• Access level: SAVI-CPS• Intra-AS level: CPF• Inter-AS level: SMA• Implementation, and deployment at CNGI-CERNET2

• Leveraging SDN to enhance Source Address Validation• Motivations

– Handling complexity– Providing agility– Improving performance

• Programmability is key to decoupling infrastructure andfunctionality (to migrate the complexity to APPs)

• Leveraging centralized view for access (e.g. configuration,mobility) and intra-AS, and negotiated view for inter-AS SAV

27

Thanks!