June, 2006 Stanford 2006 Ethane. June, 2006 Stanford 2006 Security and You  What does security mean to you?  Data on personal PC?  Data on family PC?

Slides:



Advertisements
Similar presentations
June 2007NSF Find Forensics and Attribution in Ethane Martin Casado Stanford University With: Michael Freedman, Justin Pettit, Jianying Luo, Natasha Gude,
Advertisements

Flow-based Management Language Tim Hinrichs Natasha Gude* Martín Casado John Mitchell Scott Shenker University of Chicago Stanford University ICSI/UC Berkeley.
Router Implementation Project-2
Internetworking II: MPLS, Security, and Traffic Engineering
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
Implementing Inter-VLAN Routing
IUT– Network Security Course 1 Network Security Firewalls.
An Overview of Software-Defined Network Presenter: Xitao Wen.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Ethane: Taking Control of the Enterprise
Module 5: Configuring Access for Remote Clients and Networks.
May, 2006 EdgeNet 2006 The Protection Problem in Enterprise Networks Martin Casado PhD Student in Computer Science, Stanford University
Security Firewall Firewall design principle. Firewall Characteristics.
SANE: A Protection Architecture for Enterprise Networks Authors: Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman Dan Boneh, Nick McKeown,
June, 2006 Stanford 2006 Ethane: Addressing the Protection Problem in Enterprise Networks Martin Casado Michael Freedman Glen Gibb Lew Glendenning Dan.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
August, 2006 Usenix Security 2006 SANE: Addressing the Protection Problem in Enterprise Networks Martin Casado Tal Garfinkel Michael Freedman Aditya Akaella.
An Overview of Software-Defined Network
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Routing of Outgoing Packets with MP-TCP draft-handley-mptcp-routing-00 Mark Handley Costin Raiciu Marcelo Bagnulo.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
An Overview of Software-Defined Network Presenter: Xitao Wen.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
InterVLAN Routing Design and Implementation. What Routers Do Intelligent, dynamic routing protocols for packet transport Packet filtering capabilities.
Chapter 4: Managing LAN Traffic
CEN Network Fundamentals Chapter 19 Binding Protocol Addresses (ARP) To insert your company logo on this slide From the Insert Menu Select “Picture”
© 2006 Cisco Systems, Inc. All rights reserved.1 Microsoft Network Load Balancing Support Vivek V
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
SANE: A Protection Architecture for Enterprise Networks
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
DHCP Security DHCP Snooping and Security David Mitchell 03/19/2008.
© 1999, Cisco Systems, Inc. Module 9: Understanding Virtual LANs.
1 TCP/IP Networking. 2 TCP/IP TCP/IP is the networking protocol suite most commonly used with UNIX, Windows, NT and most other OS’s. TCP/IP defines a.
Mahindra-British Telecom Ltd. Exploiting Layer 2 By Balwant Rathore.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 CSCD 433 Network Programming Fall 2011 Lecture 5 VLAN's.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Homework 02 NAT 、 DHCP 、 Firewall 、 Proxy. Computer Center, CS, NCTU 2 Basic Knowledge  DHCP Dynamically assigning IPs to clients  NAT Translating addresses.
Presented by Rebecca Meinhold But How Does the Internet Work?
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Internet Protocol: Routing IP Datagrams Chapter 8.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Network Virtualization Sandip Chakraborty. In routing table we keep both the next hop IP (gateway) as well as the default interface. Why do we require.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Ethane: Taking Control of the Enterprise Presenter: KyoungSoo Park Department of Electrical Engineering KAIST.
Network Virtualization Ben Pfaff Nicira Networks, Inc.
An Introduction To ARP Spoofing & Other Attacks
NAT、DHCP、Firewall、FTP、Proxy
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Planning and Troubleshooting Routing and Switching
NOX: Towards an Operating System for Networks
Chapter 4 Data Link Layer Switching
The Stanford Clean Slate Program
Firewalls Routers, Switches, Hubs VPNs
Ethane: Addressing the Protection Problem in Enterprise Networks
Ch 17 - Binding Protocol Addresses
Ethane: Addressing the Protection Problem in Enterprise Networks
Presentation transcript:

June, 2006 Stanford 2006 Ethane

June, 2006 Stanford 2006 Security and You  What does security mean to you?  Data on personal PC?  Data on family PC?  How do you implement these policies?

June, 2006 Stanford 2006 Enterprise Security  How does this defer in the enterprise setting?  Current approach  Difficult to express policies  Policies are easily broken or circumvented

June, 2006 Stanford 2006 Goal Design network where connectivity is governed by high-level, global policy “Nick can talk to Martin using IM” “marketing can use http via web proxy” “Administrator can access everything” “Traffic from secret access point cannot share infrastructure with traffic from open access point”

June, 2006 Stanford 2006 Two Main Challenges  Provide a secure namespace for the policy  Design mechanism to enforce policy

June, 2006 Stanford 2006 Goal: Provide Secure Namespace  Policy declared over network namespace (e.g. martin, machine-a, proxy, building1)  Words from namespace generally represent physical things (users, hosts, groups, access points)  Or at times, virtual things (e.g. services, protocol, QoS classes ) “Nick can talk to Martin using IM” “nity.stanford.edu can access dev-machines” “marketing can use http via web proxy” “Administrator can access everything”

June, 2006 Stanford 2006 Today’s Namespace  Lots of names in network namespace today  Hosts  Users  Services  Protocols  Names are generally bound to network realities (e.g. DNS names are bound to IP addresses)  Often are multiple bindings that map a name to the entity it represents (DNS -> IP -> MAC -> Physical Machine)

June, 2006 Stanford 2006 Problem with Bindings Today Host Name IP MAC Physical Interface Goal: map “hostname” to physical “host” But!!! What if attacker can interpose between any of the bindings? (e.g. change IP/MAC binding) What if bindings change dynamically? (e.g. DHCP lease is up) Or physical network changes? Host MAC Physical Interface Host

June, 2006 Stanford 2006 Examples of Problems Today are LEGION  ARP is unauthenticated (attacker can map IP to wrong MAC)  DHCP is unauthenticated (attacker can map gateway to wrong IP)  DNS caches aren’t invalidate as DHCP lease times come up (or clients leave)  Security filters aren’t often invalidated with permission changes  Many others …

June, 2006 Stanford 2006 Need “Secure Bindings” 1.Bindings are authenticated 2.Cached bindings are appropriately invalidated  Address reallocation  Topology change  Permissions changes/Revocation

June, 2006 Stanford 2006 Why Not Statically Bind?  This is very commonly done!  E.g.  Static ARP cache to/from gateway  MAC addresses tied to switch ports  Static IP allocations  Static rules for VLAN tagging  Results in crummy (inflexible) networks

June, 2006 Stanford 2006 Two Main Challenges  Provide a namespace for the policy  Design Mechanism to Enforce Policy

June, 2006 Stanford 2006 Policy Language  Declare connectivity constraints over  Users/groups  Hosts/Nodes  Access points  Protocols  Services  Connectivity constraints are …  Permit/deny  Require middlebox interposition  Isolation  Physical security

June, 2006 Stanford 2006 Threat Environment  Suitable for use in.mil,.gov,.com and.edu  Insider attack  Compromised machines  Targeted attacks yet …  Flexible enough for use in open environments

June, 2006 Stanford 2006 Our Solution: Ethane  Flow-based network  Central Domain Controller (DC)  Implements secure bindings  Authenticates users, hosts, services, …  Contains global security policy  Checks every new flow against security policy  Decides the route for each flow  Access is granted to a flow  Can enforce permit/deny  Can enforce middle-box interposition constraints  Can enforce isolation constraints

June, 2006 Stanford 2006 Host authenticate hi, I’m host B, my password is … Can I have an IP? Send tcp SYN packet to host A port 2525 User Authentication “ hi, I’m martin, my password is” Ethane: High-Level Operation Domain Controller Host A Host Authentication “ hi, I’m host A, my password is … can I have an IP address?” Host B User authentication hi, I’m Nick, my password is ? Permission check Route computation Secure Binding State ICQ → 2525/tcp IP switch3 port 4 Host A IP switch 1 port 2 HostB Network Policy “Nick can access Martin using ICQ” Host A → IP → Martin → Host B → IP → Nick →

June, 2006 Stanford 2006  Don’t have to maintain consistency of distributed access control lists  DC picks route for every flow  Can interpose middle-boxes on route  Can isolate flow to be within physical boundaries  Can isolate two sets of flows to traverse different switches  Can load balance requests over different routes  DC determines how a switch processes a flow  Different queue, priority classes, QoS, etc  Rate limit a flow  Amount of flow state is not a function of the network policy  Forwarding complexity is not a function of the network policy  Anti-mobility: can limit machines to particular physical ports  Can apply policy to network diagnostics Some Cool Consequences

June, 2006 Stanford 2006  How do you bootstrap securely?  How is forwarding accomplished?  What are the performance implications? Many Unanswered Questions

June, 2006 Stanford 2006 Component Overview Domain Controller Switches End-Hosts Authenticates users/switches/end-hosts Manages secure bindings Contains network topology Does permissions checking Computes routes Send topology information to the DC Provide default connectivity to the DC Enforce paths created by DC Handle flow revocation Request access to services

June, 2006 Stanford 2006  Finding the DC  Authentication  Generating topology at DC Bootstrapping

June, 2006 Stanford 2006  DC knows all switches and their public keys  All switches know DC’s public key Assumptions

June, 2006 Stanford 2006 Finding the DC  Switches construct spanning tree Rooted at DC  Switches don’t advertise path to DC until they’ve authenticated  Once authenticated, switches pass all traffic without flow entries to the DC (next slide)

June, 2006 Stanford 2006 Establishing Topology  Switches generate neighbor lists during MST algorithm  Send encrypted neighbor-list to DC  DC aggregates to full topology  Note: no switch knows full topology K sw1 K sw2 K sw3 K sw4 K sw1 K sw3 K sw4 K sw2

June, 2006 Stanford 2006 Establishing Topology 2

June, 2006 Stanford 2006  Each switch maintains flow table  Only DC can add entry to flow table  Flow lookup is over: in port, ether proto, src ip, dst ip, src port, dst port Forwarding = Really simple out port

June, 2006 Stanford 2006  Switches disallow all Ethernet broadcast (and respond to ARP for all IPs)  First packet of every new flow is sent to DC for permission check  DC sets up flow at each switch  Packets of established flows are forwarded using multi-layer switching DC AliceBob ? Detailed Connection Setup

June, 2006 Stanford 2006 Traffic to DC  All packets to the DC (except first hop switch) are tunneled  Tunneling includes incoming port  DC can shut off malicious packet sources

June, 2006 Stanford 2006  Decouple control and data path in switches  Software control path (connection setup) (slightly higher latency)  DC can handle complicated policy  Switches just forward (very simple datapath)  Simple, fast, hardware forwarding path (Gigabits)  Single exact-match lookup per packet Performance

June, 2006 Stanford 2006  Exists today, sort of.. (DNS)  Paths can be long lived (used by multiple transport-level flows)  Permission check is fast  Replicate DC  Computationally (multiple servers)  Topologically (multiple servers in multiple places) Permission Check per Flow?

June, 2006 Stanford 2006 Ethane Summary  Current networks insecure and difficult to manage  Useless namespace  Topology encoded in config  Ethane addresses issues via architectural changes  Centralized  Authenticated bindings  “default off”

June, 2006 Stanford 2006 Questions?