The HIP-HOP proposal draft-matthews-p2psip-hip-hop-00 Philip Matthews

Slides:



Advertisements
Similar presentations
IPv6 Keith Wichman. History Based on IPv4 Based on IPv4 Development initiated in 1994 Development initiated in 1994.
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Address Settlement by Peer to Peer (ASP) Jonathan Rosenberg Cullen Jennings Eric Rescorla.
NAT Traversal for P2PSIP Philip Matthews Avaya. Peer X Peer Y Peer W 2. P2PSIP Network Establishing new Peer Protocol connection Peer Protocol messages.
SCTP Tutorial Randall Stewart
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Dr. Philip Cannata 1 Principles of Network Applications.
Basavaraj Patil IETF 78.  Implementation details: Implemented on Nokia N900 and Ubuntu 10, and Debian 5 linux variants TLS connection is established.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
Host Identity Protocol
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 4 Network Layer.
CS 5565 Network Architecture and Protocols
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 Tracker Protocol Proposal.
P2PSIP Charter Proposal Many people helped write this charter…
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
Update on the Internet Research Task Force Aaron Falk IRTF Chair IETF-72 – Dublin.
1 Chapter 4: Network Layer r 4.4 IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP m IPv6 r 4.5 Routing algorithms m Hierarchical routing.
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
The PROXIDOR Service draft-akonjang-alto-proxidor-00.txt S. Previdi O. Akonjang A. Feldmann
PPSP NAT traversal Lichun Li, Jun Wang, Wei Chen {li.lichun1, draft-li-ppsp-nat-traversal-02.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
Problems in using HIP for P2PSIP Philip Matthews Avaya
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
Yallcast Architecture Overview Paul Francis NTT PF Labs
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
The NAT Traversal Problem in P2PSIP Bruce Lowekamp (SIPeerior) Philip Matthews (Avaya)
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
HIP & MIP V 6 SECURITY Research: Security Architecture IRT Lab, Columbia University.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
CSE5803 Advanced Internet Protocols and Applications (13) Introduction Existing IP (v4) was developed in late 1970’s, when computer memory was about.
Network Layer Security Network Systems Security Mort Anvari.
IETF #57 in Viena1 IPv6 Address Assignment and Route Selection for End-to-End Multihoming Kenji Ohira Kyoto University draft-ohira-assign-select-e2e-multihome-01.txt.
1 P2PSIP Peer Protocol Design Questions Presenter: Philip Matthews (based on input from the authors of the various proposals)
Draft-ietf-p2psip-base-08 Cullen Jennings Bruce Lowekamp Eric Rescorla Salman Baset Henning Schulzrinne March 25, 2010.
ID-LOC Proposal Philip Matthews Eric Cooper Alan Johnston Avaya With contributions from Cullen Jennings, David Bryan, and Bruce Lowekamp.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
HIP-Based NAT Traversal in P2P-Environments
11/18/2016Basic TCP/IP Networking 1 TCP/IP Overview Basic Networking Concepts.
Introduction to Networks
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Transport of Media Independent HO Messages over IP
Encryption and Network Security
Compression Format for IPv6 Datagrams in 6LoWPAN Networks
Multiple Addresses in Transport - For Discussion
LOCSER + HIP draft-hautakorpi-p2psip-peer-protocol-00
Wide Area Networks and Internet CT1403
FARA: Reorganizing the Addressing Architecture
DHCP and NAT.
DHCP: Dynamic Host Configuration Protocol
Lecture 4a Mobile IP 1.
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

The HIP-HOP proposal draft-matthews-p2psip-hip-hop-00 Philip Matthews

HIP-HOP vs. the others Uses HIP (Host Identity Protocol) and leverages work of HIP WG. Three key differences: 1) Architecture of P2P layer 2) Definition of Peer ID 3) How forwarding at peers is done

Diff #1: Architecture Other proposals: monolithic P2P layer. HIP-HOP: Three separate protocols. Distributed Transport: deliver msg to arbitrary peer (even if behind NAT). –Focus of HIP-HOP proposal. Can adapt other proposals to provide Distributed DB and Overlay Maint protocols. –Distributed DB, Overlay Maint, SIP, and other apps use this layer for sending/receiving. –Supports apps other than SIP. P2P Layer

Diff #2: Peer IDs in HIP-HOP Public key is ultimate identifier of a peer. –Peer can prove ownership because it alone knowns private key. Peer ID looks like IPv6 addr, but is distinguishable due to prefix. Public / private key pair 2001:10/28100-bit suffix SHA-1 hash Peer ID looks like IPv6 address Process defined in RFC 4843 and draft-ietf-hip-base.

Diff #2: Peer IDs HIP-HOP Peer ID is special IPv6 address with crypto: Prevents identity theft; Re-uses existing APIs and IPv6 protocol work; Other Proposals Peer ID is 160 bits (ASP is 128), no crypto: Can hijack a Peer ID; Need new APIs and protocol extensions;

Diff #3: Forwarding A UDP encapsulation layer is used when necessary to transport HIP through NATs. HIP layer also replaced/removed in certain cases.  Socket API  Forwarding at each peer done at this layer

Diff #3: Forwarding at Peers HIP-HOP Forwarding done below transport layer: Use Socket API and all existing transport protocols –Many apps = no change –Transport protos work with Peer IDs, not IP addresses Transport conn = end-to- end; –TLS security / reliability / congest cntl is end-to-end NAT traversal and mobility handled at HIP layer. Other Proposals Forwarding done above transport layer: Need new APIs –All apps must change Transport conn = hop-by- hop –TLS security / reliability / congest cntl is hop-by-hop = “link layers” –Some proposals try to patch some of these problems NAT traversal and mobility handled by each app separately.

Other Details in Brief Inherits well-though-out security properties of HIP. Inherits HIP mobility support. High-level NAT Traversal strategy as in draft- matthews-p2psip-nats-and-overlays –(Same as dSIP, RELOAD, ASP) –Detailed NAT traversal procedures use HIP procedures (ICE) Bootstrap procedures as in draft-matthews-p2psip- bootstrap (adapted for HIP) HIP used for signaling overlay connections, and encapsulating application data –HIP header carries src and dst peer ID, etc. Interoperable open-source implementations of HIP for Windows, MacOS, Linux, and FreeBSD. –Working on HIP-HOP extensions.