11.09.2012 1 Lecture 2 - Internet evolution (part 2) D.Sc. Arto Karila Helsinki Institute for Information Technology (HIIT) T-110.6120.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Secure Mobile IP Communication
1 Introduction to Mobile IPv6 IIS5711: Mobile Computing Mobile Computing and Broadband Networking Laboratory CIS, NCTU.
IPv6 Keith Wichman. History Based on IPv4 Based on IPv4 Development initiated in 1994 Development initiated in 1994.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Mobile IPv6 趨勢介紹 1. Mobile IP and its Variants Mobile IPv4 (MIPv4) – MIPv4 – Low-Latency Handover for MIPv4 (FMIPv4) – Regional Registration for MIPv4.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
T Special Course in Data Communication Software Mobility in the Internet Prof. Sasu Tarkoma.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
By Rod Lykins.  Background  Benefits  Security Advantages ◦ Address Space ◦ IPSec  Remaining Security Issues  Conclusion.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
ECE544: Communication Networks-II, Spring 2009 H. Liu Lecture 10 (Mobility) Includes tutorial materials from D. Raychaudhuri, C. Perkins, D. Reininger.
K. Salah1 Security Protocols in the Internet IPSec.
1 IPv6 Address Management Rajiv Kumar. 2 Lecture Overview Introduction to IP Address Management Rationale for IPv6 IPv6 Addressing IPv6 Policies & Procedures.
Host Identity Protocol
Networking Named Content
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Introduction to IPv6 NSS Wing,BSNL Mobile Services, Ernakulam 1.
T Computer Networks II Mobility Issues Prof. Sasu Tarkoma.
IP Security: Security Across the Protocol Stack
25/1/20101 Lecture 2: Evolutionary and Revolutionary Approaches D.Sc. Arto Karila Helsinki Institute for Information Technology (HIIT)
1 Network Security Lecture 8 IP Sec Waleed Ejaz
CSCE 715: Network Systems Security
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
TCP/IP Protocols Contains Five Layers
Karlstad University IP security Ge Zhang
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
1 Mobility Support in IPv6 (MIPv6) Chun-Chuan Yang Dept. Computer Science & Info. Eng. National Chi Nan University.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Introduction to Mobile IPv6
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
T Computer Networks II Mobility Issues Prof. Sasu Tarkoma.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer NAT, IPv6.
Mobile IP Definition: Mobile IP is a standard communication protocol, defined to allow mobile device users to move from one IP network to another while.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
T Special Course in Data Communication Software Mobility in the Internet Prof. Sasu Tarkoma.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
ROUTING MOBILE IP  Motivation  Data transfer  Encapsulation.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
RFC 3775 IPv6 Mobility Support
Mobile IP.
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
Network Virtualization
Mobile IP Presented by Team : Pegasus Kishore Reddy Yerramreddy Jagannatha Pochimireddy Sampath k Bavipati Spandana Nalluri Vandana Goyal.
Internet Protocol version 6 (IPv6)
Presentation transcript:

Lecture 2 - Internet evolution (part 2) D.Sc. Arto Karila Helsinki Institute for Information Technology (HIIT) T – Special Course in Future Internet Technologies M.Sc. Mark Ain Helsinki Institute for Information Technology (HIIT)

Evolutionary approaches Architectural 1. DNS (~1982) 2. EGP (precursor to BGP, ~1982) 3. TCP congestion control (mid-late 1980’s) 4. CIDR (~1993) 5. NAT (early 1990’s) 6. IPv6 (first RFC 1995, Internet standard 1998) 7. IPSEC (1995) 8. Mobile IP (~1996) 9. MPLS (~1996) 10. DiffServ / IntServ (~1998) 11. HIP (~1999, first RFC 2006) 12. BGPSec (mid 2000s) 13. DNSSec (~2004, first deployed at root level ~2010)

Network Address Translation (NAT) – 4 types  Problem: address space exhaustion

Network Address Translation (NAT) – 4 types

Network Address Translation (NAT) – 4 types

Network Address Translation (NAT) – 4 types  NAT is ugly, breaks E2E… but it works

IPv6 7  Problem: address space exhaustion  IPv6 was born in 1995 after long work  There are over 30 IPv6-related RFCs  The claimed improvements in IPv6 are: Large 128-bit address space Stateless address auto-configuration Multicast support Mandatory network layer security (IPSEC) Simplified header processing by routers Efficient mobility (no triangular routing) Extensibility (extension headers) Jumbo packets (up to 4 GB)

IPv  Major operating systems and many ISPs support IPv6  The use of IPv6 is slowly increasing in Europe and North America but more rapidly in Asia  In China, CERNET 2 runs IPv6, interconnecting 25 points of presence in 20 cities with 2.5 and 10 Gbps links  IPv6 really only solves the exhaustion of Internet address space

IPv PlannedActual ?

IPSec  Problem: security  IPSec is the IP-layer security solution of the Internet to be used with IPv4 and IPv6  Authentication Header (AH) only protects the integrity of an IP packet  Encapsulating Security Payload (ESP) also ensures confidentiality of the data  IPSec works within a Security Association (SA) set up between two IP addresses  ISAKMP (Internet Security Association and Key Management Protocol) is a very complicated framework for SA mgmt

Encapsulating Security Payload (IPv4) Original IPv4 Header Security Parameter Index (SPI) Sequence Number Coverage of Authentication UDP/TCP Header Data Padding Pad Len Next Hdr Authentication Data Coverage of Confidentiality ESP Header ESP Payload ESP Trailer

Encapsulating Security Payload (IPv6) ESP Payload Hop-by-Hop Extensions Security Parameter Index (SPI) Sequence Number Coverage of Authentication End-to-End Extensions Data Padding Authentication Data Coverage of Confidentiality ESP Header ESP Trailer Original IPv6 Header UDP/TCP Header

Mobile IPv  Problem: mobility  Basic concepts: Mobile Node (MN) Correspondent Node (CN) Home Agent (HA) Foreign Agent (FA) Care-of-Address (CoA)  The following can be problematic: Firewalls and ingress filtering Triangular routing

Mobility Example:Mobile IP Triangular Routing Home Agent Correspondent Host Foreign Agent Mobile Host Ingress filtering causes problems for IPv4 (home address as source), IPv6 uses CoA so not a problem. Solutions: (reverse tunnelling) or route optimization Foreign agent left out of MIPv6. No special support needed with IPv6 autoconfiguration DELAY! Care-of-Address (CoA) Source: Professor Sasu Tarkoma

Ingress Filtering Home Agent Correspondent Host Packet from mobile host is deemed "topologically incorrect“ (as in source address spoofing) With ingress filtering, routers drop source addresses that are not consistent with the observed source of the packet Source: Professor Sasu Tarkoma

Reverse Tunnelling Home Agent Correspondent Host Router Mobile Host DELAY! Firewalls and ingress filtering no longer a problem Two-way tunneling leads to overhead and increased congestion Firewalls and ingress filtering no longer a problem Two-way tunneling leads to overhead and increased congestion Source: Professor Sasu Tarkoma Care-of-Address (CoA)

Mobile IPv6 Route Optimization Home Agent Correspondent Host Router Mobile Host MH sends a binding update to CH when it receives a tunnelled packet. CH sends packets using routing header First, a Return Routability test to CH. CH sends home test and CoA test packets. When MH receives both, It sends the BU with the Kbm key. Secure tunnel (ESP) Source: Professor Sasu Tarkoma

Differences btw MIPv6 and MIPv4  In MIPv6 no FA is needed (no infrastructure change)  Address auto-configuration helps in acquiring CoA  MH uses CoA as the source address in foreign link, so no problems with ingress filtering  Option headers and neighbor discovery of IPv6 protocol are used to perform mobility functions  128-bit IP addresses help deployment of mobile IP in large environments  Route optimization is supported by header options Source: Professor Sasu Tarkoma

Extension Headers Mobility Header Upper Layer headers Data MH CN to MNMN to CN MN, HA, and CN for Binding MH Type in Mobility Header: Binding Update, Binding Ack, Binding Err, Binding refresh Source: Chittaranjan Hota, Computer Networks II lecture

(G)MPLS  Problems: scalable transport, QoS, resource usage, business incentives etc.  (Generalized) Multi-Protocol Label Switching  Layer 2.5 protocol  High-performance transport of any layer 3 protocol over any layer 2 data link over any layer 1 medium  Routing via short path labels (path switching)  Layer 2 and layer 3 services (e.g. PtP and PtMP VPN)  Routing implemented in hardware (i.e. switching); much faster than IP longest-prefix matching

(G)MPLS

QoS  Problem: need better traffic control, satisfy business incentives, better services etc

DiffServ  Differentiated Services (DiffServ, RFC 2474) redefines the ToS octet of the IPv4 packet or Traffic Class octet of IPv6 as DS  Allows operators to control treatment of packets but does not guarantee any particular level of service or policy adherence across network boundaries.  The first 6 bits of the DS field are used as Differentiated Services Code Point (DSCP) defining the Per-Hop Behavior of the packet  DiffServ is stateless (like IP) and scales  Service Profiles can be defined by ISP for customers and by transit providers for ISPs  DiffServ is very easily deployable and could enable well working VoIP and real-time video  Unfortunately, it is not used between operators

IntServ  Integrated Services  Unlike DiffServ, IntServ reserves network resources and attempts to guarantee conditions of network flow end-to-end  However, the process is complex, resource intensive, and requires supportive cooperating routers across all AS’s from source to sink

HIP  Problems: mobility, security, multihoming, IPv4/IPv6 interoperation etc.  Host Identity Protocol (HIP, RFC4423) defines a new global Internet name space  The Host Identity name space decouples the name and locator roles, both of which are currently served by IP addresses  The transport layer now operates on Host Identities instead of IP addresses  The network layer uses IP addresses as pure locators (not as names or identifiers)

HIP Architecture

HIP  HIs are self-certifying (public keys)  HIP is a fairly simple technique based on IPSEC ESP and HITs (128-bit HI hashes)  HIP is ready for large-scale deployment  See for more infohttp://infrahip.hiit.fi

Base exchange InitiatorResponder I1HIT I, HIT R or NULL R1HIT I, [HIT R, puzzle, DH R, HI R ] sig I2[HIT I, HIT R, solution, DH I,{HI I }] sig R2[HIT I, HIT R, authenticator] sig ESP protected TCP/UDP, no explicit HIP header User data messages solve puzzle verify, authenticate, replay protection draft-ietf-hip-base-02.txt, draft-jokela-hip-esp-00.txt Based on SIGMA family of key exchange protocols standard authenticated Diffie- Hellman key exchange for session key generation Select precomputed R1. Prevent DoS. Minimal state kept at responder! Does not protect against replay attacks.

HIP Mobility  Mobility is easy – retaining the SA for ESP

HIP in Combining IPv4 and IPv IPv4 access network Internet HIP MN Music Server WWW Proxy HIP CN  An early demo seen at L.M. Ericsson Finland (source: Petri Jokela, LMF)

BGPSec and DNSSec  Problem: security (within two critical architectural solutions)  BGP Security Extensions:  Authentication of inter-AS BGP data via Resource Public Key Infrastructure (RPKI) i.e. digital signatures  Does NOT provide confidentiality or guaranteed availability  Provides limited protection against certain mis- origination attacks  Not widely implemented

BGPSec and DNSSec  DNS Security Extensions:  Authentication and integrity (of DNS query results) via digital signatures  Does NOT provide confidentiality or guaranteed availability  Protects against e.g. cache poisoning and other forgeries  Not widely implemented

Key limitations, solutions, underlying ossifications Limitation(s)Solution(s)Key underlying ossification(s) Name-address translationDNS  Network vs. human-friendly naming dichotomy Scalability, routing inflexibility, combined addressing and transport TCP/IP, MPLS  Endpoint-centrism  Rigid core protocol stack CongestionTCP congestion control  Lack of built-in protocol-independent QoS  Rigid core protocol stack Traffic controlBGP, IGPs + EGPs  Endpoint-centrism  Send-receive communication paradigm Address space exhaustionCIDR, NAT, DHCP etc.  IPv4 Mobility, multihomingMIP, HIP  Endpoint-centrism  Rigid core protocol stack QoSDiffserv + Intserv  Lack of built-in protocol-independent QoS  Rigid core protocol stack SecurityVarious (e.g. DNSSec, BGPSec, and many others!)  Endpoint-centrism  Send-receive communication paradigm  Rigid core protocol stack

Evolutionary approaches Application-level 1. Scalable content delivery 1. DHTs (~2001) 2. P2P networks 3. CDNs (e.g. Akamai) 2. Security (confidentiality, anonymity, authentication etc.) 1. Asymmetric crypto (e.g. RSA ~1977 or ~1973, DH ~1976) 2. PGP (~1991) 3. SSL/TLS (mid-1990’s, late-1990’s) 4. PKI (1990’s) 5. VPNs E.g. PPTP (~1999) 6. Wireless security e.g. WPA/WPA2/EAP (late 1990’s and beyond) 7. Tor (mid 2000’s) 3. Cloud computing

Distributed Hash Table (DHT)  Distributed Hash Table (DHT) is a service for storing and retrieving key-value pairs  There is a large number of peer machines  Single machines leaving or joining the network have little effect on its operation  DHTs can be used to build e.g. databases (new DNS), or content delivery systems  BitTorrent is using a DHT  The real scalability of DHT is still unproven  All of the participating hosts need to be trusted (at least to some extent)

DHT  The principle of Distribute Hash Table (source: Wikipedia)

27/1/ Overlay Routing  In overlay routing the topology is formed over an underlying (usually IP) network  DHTs are examples of overlay routing  DHT techniques can be utilized e.g. in implementing non-hierarchical rendezvous  An example of DHT-based solutions is the Content Addressable Network (CAN)  CAN is based on a d-dimensional Cartesian space, each node having a coordinate zone that it is responsible for

27/1/ CAN  A two-dimensional example

27/1/ Chord Ring  Greedy forwarding (cmp w/ ROFL)

27/1/ Pastry DHT  An example with hexadecimal identifiers

P2P networks & CDNs  Napster, Gnutella, BitTorrent (also utilizes DHT) etc.  Akamai CDN

Security  Confidentiality, anonymity, authentication etc. 1. Asymmetric crypto (e.g. RSA ~1977 or ~1973, Diffie-Hellman ~1976) 2. PGP (~1991) 3. SSL/TLS (mid-1990’s, late-1990’s) 4. PKI (1990’s) 5. VPNs e.g. PPTP (~1999) 6. Wireless security e.g. WPA/WPA2/EAP (late 1990’s and beyond) 7. Tor (mid 2000’s)

Cloud computing  Computing resources are delivered via the network  “x”aaS i.e. “x” as a service  E.g. software, storage, processing etc.  Goal is to achieve resourcefulness and efficiency via computing economies of scale  Examples:  Amazon, Apple, Google etc

For next week…  READ (lecture 3):  M. Handley Why the Internet only just works. BT Technology Journal 24, 3 (July 2006), DOI= /s z  READ (lecture 4):  Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, and Rebecca L. Braynard Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09). ACM, New York, NY, USA, DOI= /

Thank you for your attention! Questions? Comments?