Toward Practical Convergence of Middleboxes and Software-Defined Networking Vyas Sekar Joint work with: Seyed Kaveh Fayazbakhsh, Zafar Qazi, Luis Chiang,

Slides:



Advertisements
Similar presentations
New Directions in Enterprise Network Management Aditya Akella University of Wisconsin, Madison MSR Networking Summit June 2006.
Advertisements

Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
Seyed K. Fayazbakhsh Vyas Sekar Minlan Yu Jeff Mogul
Towards Software Defined Cellular Networks
Practical and Incremental Convergence between SDN and Middleboxes 1 Zafar Qazi, Cheng-Chun Tu, Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Toward Practical Integration of SDN and Middleboxes
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
SIMPLE-fying Middlebox Policy Enforcement Using SDN
Programmable Measurement Architecture for Data Centers Minlan Yu University of Southern California 1.
Slick: A control plane for middleboxes Bilal Anwer, Theophilus Benson, Dave Levin, Nick Feamster, Jennifer Rexford Supported by DARPA through the U.S.
Practical and Incremental Convergence between SDN and Middleboxes 1 Zafar Qazi Cheng-Chun Tu Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
SDN: Extensions Middleboxes 1 Ack: Vyas Sekar, Aaron Gember, Felipe Huici, Zafar Qazi.
Design and Implementation of a Consolidated Middlebox Architecture 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi.
Software Defined Networking COMS , Fall 2013 Guest Speaker: Seyed Kaveh Fayazbakhsh Stony Brook University 11/12/2013: SDN and Middleboxes.
15-744: Computer Networking
SDN and Openflow.
Scalable Flow-Based Networking with DIFANE 1 Minlan Yu Princeton University Joint work with Mike Freedman, Jennifer Rexford and Jia Wang.
Data Center Middleboxes Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking November 24,
The Middlebox Manifesto: Enabling Innovation in Middlebox Deployment 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi.
SIMPLE-fying Middlebox Policy Enforcement Using SDN Zafar Ayyub Qazi Cheng-Chun Tu Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
Cellular Core Network Architecture
Enabling Innovation Inside the Network Jennifer Rexford Princeton University
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Composing Software Defined Networks Jennifer Rexford Princeton University With Joshua Reich, Chris Monsanto, Nate Foster, and.
Software-Defined Networks Jennifer Rexford Princeton University.
Software Defined Networks and OpenFlow SDN CIO Summit 2010 Nick McKeown & Guru Parulkar Stanford University In collaboration with Martin Casado and Scott.
VeriFlow: Verifying Network-Wide Invariants in Real Time
Higher-Level Abstractions for Software-Defined Networks Jennifer Rexford Princeton University.
CloudNaaS: A Cloud Networking Platform for Enterprise Applications Theophilus Benson*, Aditya Akella*, Anees Shaikh +, Sambit Sahu + (*University of Wisconsin,
Bohatei: Flexible and Elastic DDoS Defense
FUTURE OF NETWORKING SAJAN PAUL JUNIPER NETWORKS.
Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags Seyed K. Fayazbakhsh *, Luis Chiang ¶, Vyas Sekar *, Minlan.
Extending SDN to Handle Dynamic Middlebox Actions via FlowTags (Full version to appear in NSDI’14) Seyed K. Fayazbakhsh, Luis Chiang, Vyas Sekar, Minlan.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Programming Languages for Software Defined Networks Jennifer Rexford and David Walker Princeton University Joint work with the.
Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin-Madison.
CellSDN: Software-Defined Cellular Core networks Xin Jin Princeton University Joint work with Li Erran Li, Laurent Vanbever, and Jennifer Rexford.
SIMPLE-fying Middlebox Policy Enforcement Using SDN
FlowTags: Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions Author: Seyed Kaveh Fayazbakhsh, Vyas Sekar, Minlan Yu and Jeffrey.
SIMPLE-fying Middlebox Policy Enforcement Using SDN Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang Vyas Sekar, Rui Miao, Minlan Yu Presenter : ChoongHee.
NEWS: Network Function Virtualization Enablement within SDN Data Plane.
BUZZ: Testing Context-Dependent Policies in Stateful Networks Seyed K. Fayaz, Tianlong Yu, Yoshiaki Tobioka, Sagar Chaki, Vyas Sekar.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Seyed K. Fayazbakhsh Vyas Sekar Minlan Yu Jeff Mogul
NFP: Enabling Network Function Parallelism in NFV
Ready-to-Deploy Service Function Chaining for Mobile Networks
Xin Li, Chen Qian University of Kentucky
SDN challenges Deployment challenges
Yotam Harchol The Hebrew University of Jerusalem
Yotam Harchol The Hebrew University of Jerusalem
A Survey of Network Function Placement
15-744: Computer Networking
15-744: Computer Networking
The DPIaaS Controller Prototype
Authors: Justine Sherry. , Shaddi Hasan. , Colin Scott
ETHANE: TAKING CONTROL OF THE ENTERPRISE
15-744: Computer Networking
NOX: Towards an Operating System for Networks
Yotam Harchol The Hebrew University of Jerusalem
of Dynamic NFV-Policies
Stanford University Software Defined Networks and OpenFlow SDN CIO Summit 2010 Nick McKeown & Guru Parulkar In collaboration with Martin Casado and Scott.
Software Defined Networking (SDN)
NFP: Enabling Network Function Parallelism in NFV
ClosedFlow: OpenFlow-like Control over Proprietary Devices
Programmable Networks
Yotam Harchol The Hebrew University of Jerusalem
SDN + NetSec Vyas Sekar.
Presentation transcript:

Toward Practical Convergence of Middleboxes and Software-Defined Networking Vyas Sekar Joint work with: Seyed Kaveh Fayazbakhsh, Zafar Qazi, Luis Chiang, Rui Miao, William Tu, Jeff Mogul, Minlan Yu

Network “101” vs. Reality 2 Traditional view: “Dumb” network Reality: Lots of in-network processing Appliances or Middleboxes: IDS, Firewall, Proxies, Application Gateways ….

Type of applianceNumber Firewalls166 NIDS127 Media gateways110 Load balancers67 Proxies66 VPN gateways45 WAN Optimizers44 Voice gateways11 Total Middleboxes636 Total routers~900 Middleboxes Galore! Data from a large enterprise Survey across 57 network operators 3 Just network security  $10 billion (2016)

Middlebox management is hard! 4 Critical for security, performance, compliance But expensive, complex and difficult to manage

Can SDN help middlebox management? Centralized Controller “ Flow ” FwdAction …… “ Flow ” FwdAction …… OpenFlow 5 Proxy IDS Necessity and an Opportunity: Incorporate functions markets views as important [Metzler 2012] Firewall IDS Proxy Web

What makes SDN + MB challenging? Centralized Controller “ Flow ” FwdAction …… “ Flow ” FwdAction …… OpenFlow 6 Proxy IDS New dimensions beyond simple forwarding: e.g., Policy-based “steering” composition New resource management Packet transformations/hidden actions Firewall IDS Proxy Web

Our work on SDN-middlebox convergence 7 FlowTags: Handling dynamic middlebox actions New APIs + minimal extensions to middleboxes SIMPLE: SDN-based traffic steering Unmodified middleboxes, current SDN APIs

Talk Outline Motivation Design of SIMPLE (SIGCOMM 2013) Design of FlowTags (NSDI 2014) Other middlebox research 8

Firewall IDS Proxy Web SIMPLE: High-level view Legacy Middleboxes OpenFlow capable FlowAction …… FlowAction …… 9 Policy enforcement layer for middlebox-specific traffic steering

Challenge: Policy Composition S1 S2 10 Firewall Proxy IDS FirewallIDSProxy * Policy Chain: Forward Pkt to IDS or Dst? Dst “Loops”  Simple flow rules don’t work

Rule Generator  Tag Processing State 11 FirewallIDSProxy * Policy Chain: S1 S2 Firewall Proxy IDS Dst ORIGINAL Post-Firewall Post-IDS Post-Proxy Fwd to Dst Insight: Distinguish different instances of the same packet

Challenge: Resource Constraints S1 S2 S4 S3 Proxy Firewall IDS1 = 50% IDS2 = 50% Enough TCAM space for traffic split? Can we set up “feasible” forwarding rules and load balance optimally? 12 FlowAction …… FlowAction ……

Resource manager  Joint Optimization Resource Manager Topology & Traffic Switch TCAM Middlebox Capacity + Footprints Policy Spec Optimal & Feasible load balancing Theoretically hard Not obvious if some configuration is feasible 13

Offline + Online Decomposition 14 Offline StageOnline Step Deals with Switch constraintsDeals with only load balancing Resource Manager Network Topology Switch TCAM Policy Spec Traffic Matrix Mbox Capacity + Footprints

15 S1 Proxy S2 User 1 User 2 Proxy may modify flows Actually a more fundamental problem Will revisit in FlowTags Challenge: Dynamic Modifications Firewall User1: Proxy  Firewall User2: Proxy

Modifications Handler  Flow correlation 16 Correlate flows Install rules S1 Proxy S2 User 1 User 2 Firewall User1: Proxy  Firewall User2: Proxy Payload Similarity

Rule Generator Avoid Loops Resource Manager Handle resource constraints Modifications Handler Deal w/ flow modifications SIMPLE System Overview Legacy Middleboxes OpenFlow capable FlowAction …… FlowAction …… 17 Firewall IDS Proxy Web

SIMPLE = Optimal Load balancing 4-7X better that status quo 18 Optimal

Talk Outline Motivation Design of SIMPLE (SIGCOMM 2013) Design of FlowTags (NSDI 2014) Other middlebox research 19

Middlebox actions violate SDN tenets Revisit SDN tenets from Ethane [SIGCOMM 07] Origin Binding: There should be a strong binding between a packet and its “origin” Paths follow policy: Explicit policy should determine the paths that packets follow 20

Attribution is hard NAT hides the true packet sources 21 S1 S2 NIDS NAT Internet H2 H1 NIDS: Flag host if it creates too many connections

Network Diagnosis is difficult Difficult to correlate network logs for diagnosis 22 S1 S2 Load BalancerFirewall H2 H1 Server 2 Server 1 H1 sees very high web server delay – but what’s causing it?

Policy violations may occur S1S2 Proxy Internet H2 H1 Web ACL: Block H2  xyz Get xyz.com Cached response Response Lack of visibility into the middlebox context 23 Cached response

Seemingly natural (non)solutions IdeasAttribution e.g., NAT Diagnosis e.g., Load Balancer Policy violation e.g., cache PlacementYesNoYes TunnelingNoEven harder!No ConsolidationNo Correlation (SIMPLE) Not 100% accurate and high overhead 24

High-level idea Middleboxes “help” restore SDN tenets – Possibly only option for correctness Add missing contextual information as FlowTags – E.g., NAT or Load balancer give IP mappings; Proxy gives cache hit/miss state SDN+ Controller controls tagging logic – For both switches and middleboxes 25

S1S1 S2S2 Firewall NAT Internet H H H SrcIPTag TagOrigSrcIP Block Block NAT Add Tags Decode Tags Firewall Config w.r.t original principals TagForward 1,3FW 2Internet S2 FlowTable Example of FlowTags in action Tag Generation Tag Consumption 26

Control Apps e.g., steering, verification Control Apps e.g., routing, traffic eng. Network OS Control Data SDN Switches FlowTable FlowTags Enhanced Middleboxes FlowTags Tables Control Apps e.g., steering, verification Admin Mbox Config FlowTags APIs Existing APIs e.g., OpenFlow Legacy interface New interface FlowTags Architecture 27 “Produce” + “consume” FlowTags Only “consume” FlowTags

Challenges in realizing FlowTags vision What semantics should FlowTags capture? Can we build a practical FlowTags controller? How easy is it to modify middleboxes? Can we encode FlowTags in packets? 28

Semantics: Dynamic Policy Graph 29 Proxy ACL Drop {H1}; Blocked H1 H2 {H1}; - {H2}; - {H1}; Hit {H1}; Miss {H1}; {H2}; Miss {H1}; Internet {H2}; Hit Conceptually need a tag in this DPG In practice: temporal reuse, spatial reuse, policy classes etc

Translate DPG to find a data-plane realization Middlebox event handlers: – Handle tag Consume and Generate events Switch and flow expiry handlers: – Similar to traditional OpenFlow handlers – The tag is used to look up the forwarding entries 30 FlowTags-enhanced Controller

Extending middleboxes to support FlowTags Minimal code modification needed 31 MiddleboxTotal LOCModified LOC Squid216,00075 Snort336,00045 Balance PRADS

Scalability of FlowTags controller 32

Talk Outline Motivation Design of SIMPLE Design of FlowTags Other middlebox research 33

Broader Research Agenda 34 High Capital costs Device Sprawl High management complexity Inflexible, difficult to extend  need for new boxes Consolidated Architecture [CoMb NSDI ‘12] Cloud Outsourcing [APLOMB SIGCOMM ’12] SDN Integration [SIMPLE, FlowTags, this talk]

New challenges and opportunities Policy languages/graph generation? Automating middlebox extensions? New testing/verification tools? Better hardware/software platforms? … 35

Conclusions Middleboxes: Necessity and opportunity for SDN New challenges in SDN: Composition, resource constraints, modifications First steps in practical SDN + middlebox integration – SIMPLE for traffic steering – FlowTags to handle dynamic/hidden middlebox actions Broader agenda -- “Middlebox Manifesto” Rethink middlebox design and management 36

Consolidating Middleboxes [NSDI 2012] 37 ProxyFirewallIDS/IPS AppFilter Today: Independent, specialized boxes Decouple Hardware and Software Commodity hardware: e.g., PacketShader, RouteBricks, ServerSwitch, SwitchBlade Consolidation reduces capital expenses and sprawl

Internet Cloud Provider + Economies of scale, pay-per use + Simplifies configuration & deployment 38 Outsourcing Middleboxes [SIGCOMM 2012]

Overhead: Reconfiguration Time Around 125 ms to reconfigure, most time spent in pushing rules node topology including 11 switches

40 S1 Proxy S2 User 1 User 2 Proxy may modify flows Actually a more fundamental problem Revisit Dynamic Modifications Firewall User1: Proxy  Firewall User2: Proxy

Modifications Handler  Flow correlation 41 Correlate flows Install rules S1 Proxy S2 User 1 User 2 Firewall User1: Proxy  Firewall User2: Proxy Payload Similarity

Entire backbone runs on SDN SDN: New Trend in Network Management Bought for $1.2 x

Quick Intro to SDN Centralized Controller “ Flow ” Action …… “ Flow ” Action …… Open API e.g., OpenFlow 43 Traditional network: Closed hardware + Management embedded in routing state SDN: Switch/router actions can be “programmed” Management logic is consolidated  * : Block  : Use low congestion path

Need for Network Innovation 44 New devices New application drivers Evolving threats Policy constraints Security Performance Compliance

Consolidation is practical Low overhead for existing applications (0.7%) Controller takes < 1.6s for 52-node topology – Strawman-LP takes 9000s 5x better than VM-based consolidation Do not need very “beefy” nodes 45

Challenges in Cloud Outsourcing Minimal Complexity Functional equivalence e.g., Stateful connection Low Overhead i.e., Latency, bandwidth 46 VPN tunnel Off-the-shelf DNS based fwding Intelligent PoP selection Generic compression

New challenges and opportunities Policy languages/graph generation? Automating middlebox extensions? New testing/verification tools? Better hardware/software platforms? … 47

48 S1 Proxy S2 User 1 User 2 Proxy may modify flows/packets Are forwarding rules at S2 still correct? Challenge: Dynamic Modifications Firewall User1: Proxy  Firewall User2: Proxy

Broader Research Agenda 49 High Capital costs Device Sprawl High management complexity Inflexible, difficult to extend  need for new boxes Consolidated Architecture [NSDI ‘12] Software Defined Networking [this talk]