Analysis of BFD Security According to KARP Design Guide draft-ietf-karp-bfd-analysis-01 draft-ietf-karp-bfd-analysis-01 Manav Bhatia Dacheng Zhang Mahesh.

Slides:



Advertisements
Similar presentations
IS-IS ESN TLV draft-chunduri-isis-extended-sequence-no-tlv-01 Uma Chunduri, Wenhu Lu, Albert Tian Ericsson Inc. Naiming Shen Cisco Systems, Inc. IETF 83,
Advertisements

Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
TRILL over IP draft-ietf-trill-over-ip-01.txt IETF 91, Honolulu Margaret Wasserman Donald Eastlake, Dacheng Zhang.
Simplified BFD Procedures for Bi-Directional LSPs.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Optimizing BFD Authentication draft-mahesh-bfd-authentication-00 Mahesh Jethanandani, Ashesh Mishra Manav Bhatia, Ankur Saxena.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
7/11/2006IETF-66 MSEC IPsec composite groups page 1 George Gross IdentAware ™ Multicast Security IETF-66, Montreal, Canada July.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
OSPF WG Stronger, Automatic Integrity Checks for OSPF Packets Paul Jakma, University of Glasgow Manav Bhatia, Alcatel-Lucent IETF 79, Beijing.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Securing Network Communications Using IPSec Chapter Twelve.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
RTCWEB STUN Usage for Consent Freshness and Session Liveness draft-muthu-behave-consent-freshness-01 Authors: D. Wing, Muthu A M. Perumal, R. Ram Mohan,
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
Session Traversal Utilities for NAT (STUN) IETF-92 Dallas, March 26, 2015 draft-ietf-tram-stunbis Marc Petit-Huguenin, Gonzalo Salgueiro.
OSPF WG Cryptographic Algorithm Implementation Requirements for OSPF draft-bhatia-manral-crypto-req-ospf-00.txt Vishwas Manral, IPInfusion Manav Bhatia,
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Simplified BFD Procedures for Bi-Directional LSPs for MPLS OAM (particularly MPLS-TP OAM) George Swallow cisco.
OSPF WG Security Extensions for OSPFv2 when using Manual Keying Manav Bhatia, Alcatel-Lucent Sam Hartman, Huawei Dacheng Zhang, Huawei IETF 80, Prague.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
ISIS IETF 68 Chris Hopps, David Ward. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft.
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations (RFC 6324) Po-Kang Chen Oct 19,
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
November 14, 2016 Secure MAC algorithms for use with NTP draft-aanchal4-ntp-mac-03 CFRG: IETF97 Aanchal Malhotra Sharon Goldberg.
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
CSE 4905 IPsec.
J.W. Atwood PIM WG 2010/03/23 The KARP Working Group J.W. Atwood PIM WG 2010/03/23
IETF 96 Berlin, Germany Key Chain Yang Data Model
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
Somesh Jha University of Wisconsin
RPSEC WG Issues with Routing Protocols security mechanisms
IS-IS WG IS-IS Cryptographic Authentication Requirements
Agenda CCSDS Network Layer Security IPSec+IKE Profile for CCSDS
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
IPSec IPSec is communication security provided at the network layer.
IS3120 Network Communications Infrastructure
Chapter 5: Dynamic Routing
– Chapter 3 – Device Security (B)
MAC: Message Authentication Code
Practical IPv6 Filtering
Greg Mirsky IETF-99 July 2017, Prague
– Chapter 3 – Device Security (B)
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Outline Using cryptography in networks IPSec SSL and TLS.
Virtual Private Networks (VPNs)
Security Issues with Wireless Protocols
PW security measures PWE3 – 65th IETF 21 March 2005 Yaakov (J) Stein.
PANA enabling IPsec based Access control
Extended BFD draft-mirmin-bfd-extended
OSPF WG Supporting Authentication Trailer for OSPFv3
Lecture 36.
Lecture 36.
E. Bellagamba, Ericsson P. Sköldström, Acreo D. Ward, Juniper
Presentation transcript:

Analysis of BFD Security According to KARP Design Guide draft-ietf-karp-bfd-analysis-01 draft-ietf-karp-bfd-analysis-01 Manav Bhatia Dacheng Zhang Mahesh Jethanandani 1

Agenda Why KARP Analysis Existing algorithms Recommended algorithms Impact Conclusions Questions Last presented at IETF 87 (Berlin) 2

Why? BFD used for liveliness check IP BFD Next hop liveliness check IS-IS, OSPFv2, RIPv2 LSP BFD MPLS(-TP) End-to-end tunnel check 3

Why (cont.)? BFD used for liveliness check In lieu of routing protocols “hellos” 3 x 30 sec Something shorter Across AS boundaries eBGP 4

KARP Analysis of BFD KARP threat analysis [RFC 6862] Replay Protection 32 bit sequence number Incremented every 3.3 ms in Meticulous mode 24 weeks Weak authentication algorithms MD5 or SHA-1 based DoS attacks Authentication packet send at a short interval 5

Existing Authentication Mechanisms [RFC5880] describes five authentication mechanisms Authentication Mechanisms FeaturesSecurity Strength Simple Password Password transported in plain text weak Keyed MD5 sequence member required to increase occasionally Subject to both intra and inter -session replay attacks Keyed SHA-1 Same as Keyed MD5 Meticulous Keyed MD5 sequence member required to increase monotonically Subject to inter-session replay attacks Meticulous Keyed SHA-1 Same as Meticulous Keyed MD5 6

Recommended Authentication Algorithms SHA-2 SHA-256 SHA-384 SHA-512 HMAC FIPS-198 GMAC 7

Impact of Authentication Requirement BFD session in software BFD session is offloaded (hardware assist) BFD session is implemented in hardware 8

Impact of Authentication BFD in software CPU 500 MHz – Dual Core Cavium Meticulous algorithm No hardware support for authentication Entirely in software SHA-256 and HMAC 9

Impact of Authentication BFD in software (cont.) Time interval 10 ms 30 ms detection No authentication 16 sessions (tx + rx) With authentication in software 2 sessions (tx + rx) (prediction) Time interval of 1 s. 3 s detection No authentication 1K sessions (tx + rx) With authentication 125 sessions (tx + rx) (prediction) 10

Impact of Authentication BFD with hw assist Meticulous algorithm SHA-2 and HMAC No hardware support for authentication Hardware does tx and rx Packet constructed in software FSM in software 11

Impact of Authentication BFD offloaded to hardware (cont.) Time interval 3.3 ms 10 ms detection No authentication 2K sessions (tx + rx) With authentication in software 1 sessions (tx + rx) (prediction) Time interval of 10ms. 30 ms detection No authentication 8K sessions (tx + rx) With authentication 2 sessions (tx + rx) (prediction) 12

Impact of Authentication BFD implemented in hw Meticulous algorithm SHA-1 “Hardware support” for authentication Hardware manages entire session in hardware Including FSM 13

Impact of Authentication BFD implemented in hw (cont.) Time interval 3.3 ms 10 ms detection No authentication 128 sessions (tx + rx) With authentication in software 16 sessions (tx + rx) Time interval of 10ms. 30 ms detection No authentication 800 sessions (tx + rx) With authentication 100 sessions (tx + rx) GMAC 14

Conclusions Carefully evaluate why and where Be willing to pay for it In performance By adding hardware auth support 15

Questions? 16