+ All Categories
Home > Documents > SCION - larc.smu.edu.sg

SCION - larc.smu.edu.sg

Date post: 07-Dec-2021
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
15
1 1 SCION: Scalability, Control and Isola2on On NextGenera2on Networks Xin Zhang, HsuChun Hsiao, Geoff Hasker, Haowen Chan, Adrian Perrig, David Andersen Reasons for Clean-Slate Design Someone may just want to deploy a new Internet Possible for specialized high-reliability networks, e.g., smart grid We need to have a design ready Even if we want to evolve current Internet, we need to have a goal, know how good a network could be 2 The question is not: why deploy a new Internet? But: why are we still putting up with the current Internet?
Transcript
Page 1: SCION - larc.smu.edu.sg

1

1

SCION: Scalability,  Control  and  Isola2on  On  

Next-­‐Genera2on  Networks  

Xin  Zhang,  Hsu-­‐Chun  Hsiao,  Geoff  Hasker,    Haowen  Chan,  Adrian  Perrig,  David  Andersen  

Reasons for Clean-Slate Design •  Someone may just want to deploy a new Internet

  Possible for specialized high-reliability networks, e.g., smart grid

 We need to have a design ready

•  Even if we want to evolve current Internet, we need to have a goal, know how good a network could be

2

The question is not: why deploy a new Internet? But: why are we still putting up with the current Internet?

Page 2: SCION - larc.smu.edu.sg

2

Applica2on  

Transport  

Data  link  

Network  

Physical  

AAer  years  of  patching,  the  Internet  is  s2ll  neither  Reliable  nor  Secure!  

3  

Feb  2008:  Pakistani  ISP  hijacks  YouTube  prefix  

Apr  2010:  A  Chinese  ISP  inserts  fake  routes  affec2ng  thousands  of  US  networks.  

Nov  2010:  10%  of  Internet  traffic  'hijacked'  to  Chinese  servers  due  to  DNS  Tampering.  

S-­‐BGP  orig

in  

aYesta2on

 S-­‐BG

P  route  

aYesta2o

n  

DNSSec  Mul2-­‐path    rou2ng   Fixes  to  date  –  ad  hoc,  patches  

 Inconvenient  truths   S-­‐BGP:  delayed  convergence     Global  PKI:  single  root  of  trust  

Fundamental  BGP  Limita2ons   Des2na2on  or  ISP  have  no  control  over  inbound  paths  

 Route  inconsistencies   Forwarding  state  may  be  different  from  announced  state  

D  

C  

A  

B   M  

D’s  prefix  here!  

4  

Prefer  the    red  path  …  

Page 3: SCION - larc.smu.edu.sg

3

Fundamental  BGP  Limita2ons  (cont’d)   Lack  of  rou2ng  isola2on  

 A  failure/aYack  can  have  global  effects   Global  visibility  of  paths  is  not  scalable  

 Slow  convergence  /  route  oscilla2on   Large  rou2ng  tables  

 Mul2-­‐homing  /  flat  namespaces  prevent  aggrega2on  

 Lack  of  route  freshness   Current  (S-­‐)BGP  cannot  prevent  replay  of  old  paths  

5  

Note  that  these  issues  are  fundamental  to  (S)-­‐BGP,  they  cannot  be  easily  fixed  by  small  changes!  

Wish  List  (1):  Isola2on  

6  

…  …   …  …  

CMU  

PSC  

I2  L3  

M  

AYacks  (e.g.,  bad  routes)  

…  …  

D  

C  A   B  

 …  

   Isola2on  of  aYacks     Scalable  and  reliable  rou2ng  updates     Operate  with  mutually  distrus2ng  en22es  without  a  global  single  root  of  trust:  enforceable  accountability  

…  …  

Page 4: SCION - larc.smu.edu.sg

4

Wish  List  (2):  Balanced  Control  

7  7  

…  …   …  …  

CMU  

PSC  

I2  L3  

…  …  

D  

C  A   B  

Hide  the  peering    link  from  CMU  

 Transit  ISPs,  source  and  des2na2on  all  need  path  control  

Wish  List  (3):  Explicit  Trust  

8  

CMU  

PSC  

Level  3   I2  

 Know  who  needs  to  be  trusted   Absence  of  consistency  in  BGP  

prevents  knowing  exactly  who  needs  to  be  trusted  

X   Y   Z  

Who  will  forward  packets  on  my  path?  

…  …   …  …   …  …  

Internet  

Page 5: SCION - larc.smu.edu.sg

5

SCION Architectural Goals •  High availability, even for networks with malicious parties •  Explicit trust for network operations •  Minimal TCB: limit number of entities that need to be

trusted for any operation –  Strong isolation from untrusted parties

•  Operate with mutually distrusting entities –  No single root of trust

•  Enable route control for ISPs, receivers, senders •  Simplicity, efficiency, flexibility, and scalability

9

Core goal: As long as attacker-free path exists, communication should be available

SCION Architectural Goals"

10

• The architecture isolates attacks to domains with common laws and economic incentives"

• Explicit understanding who is trusted for network operations"

• All relevant parties have balanced control over path selection"

• No single global root of trust"

• High efficiency, scalability, flexibility"

Transport

Data link

Network

Application

Physical

Page 6: SCION - larc.smu.edu.sg

6

SCION  Architecture  Overview  

11  

Source   Des2na2on  

PCB   PCB   PCB  PCB  

 Trust  domain  (TD)s    Isola2on  and  scalability  

 Path  construc2on    Path  construc2on  

beacons  (PCBs)  

 Path  resolu2on    Control    Explicit  trust  

 Route  joining  (shortcuts)    Efficiency,  flexibility  

S:  blue  paths  D:  red  paths  

path  srv TD

TD  Core

Trust Domain Decomposition •  Global set of TD (Trust Domains)

 Map to geographic, political, legal boundaries

•  TD Core: set of top-tier ISPs that manage TD  Route to other TDs   Initiate path construction beacons  Manage Address and Path Translation Servers  Handle TD membership  Root of trust for TD: manage root key and certificates

•  AD is atomic failure unit, contiguous/autonomous domain  Transit AD or endpoint AD

12

Page 7: SCION - larc.smu.edu.sg

7

Path Construction"Goal: each endpoint learns multiple verifiable paths to its core"•  Discovering paths via Path Construction Beacons (PCBs)"

  TD Core periodically initiates PCBs"

  Providers advertise upstream topology to peering and customer ADs"

•  ADs perform the following operations "

 Collect PCBs"

  For each neighbor AD, select which k PCBs to forward"

 Update cryptographic information in PCBs"

•  Endpoint AD will receive up to k PCBs from each upstream AD, and select k down-paths and up-paths"

13

Path  Construc2on  

14  

TD  Core

A  

B  

C  

PCB  

PCB  

PCB  

Embed  into  pkts  

:  interface   :  Opaque  field   :  expira2on  2me   :  signature  

=  SIG(              ||          ||          )  

=            ||MACK(              )  

=  SIG(                  ||          ||            ||              )  

=                    ||  MACK(                      ||            )  

PCB  

   =                    ||  MACK(                    ||            )  

=  SIG(                  ||          ||            ||              )  

Page 8: SCION - larc.smu.edu.sg

8

Path Construction

15

Interfaces:

Opaque field:

Signature:

TCA: I(TC): ϕ || {ϕ, TC1} O(TC) : {ϕ, TC1} ||MACKtc( {ϕ, TC1} || ϕ) Σ(TC): Sign( I(TC) || T(TC) || O(TC) || ϕ)

AC: I(A): I(TC)|| {A1, A2} O(A) : {A1, A2} || MACKa( {A1, A2} ||O(TC) ) Σ(A): Sign( I(A) || T(A) || O(A) ||Σ(TC) )

TD Core (TC)

A B

C D

G F E

1 2

2

1

2

1

2

1

3

1 3 2 4

1 1 1

I(i) = previous-hop interfaces || local interfaces

O(i) = local interfaces || MAC over local interfaces and O(i-1)

Σ(i) = sign over I(i), T(i), O(i), and Σ(i-1), with cert of pub key

Path Construction

16

O(C) : {C1, C4} || MACKa( {C1, C4} || O(A) )

Σ(C): Sign( I(C) || T(C) || O(C) ||Σ(A) )

CE:

C? – One PCB per neighbor

I(C): I(A)|| {C1, C4}

Also include peering link!

IC,D(C): {C4, C2} || TD || AIDD

OC,D(C): {C4, C2} ||MACKc( {C4, C2} ) ΣC,D(C): Sign( IC,D(C) || TC,D(C) || OC,D(C) || O(C) )

TD Core (TC)

A B

C D

G F E

1 2

2

1

2

1

2

1

3

1 3 2 4

1 1 1

Interfaces:

Opaque field:

Signature:

I(i) = previous-hop interfaces || local interfaces

O(i) = local interfaces || MAC over local interfaces and O(i-1)

Σ(i) = sign over I(i), T(i), O(i), and Σ(i-1), with cert of pub key

Page 9: SCION - larc.smu.edu.sg

9

Address/Path Resolution •  TD core provides address/path resolution servers

•  Each endpoint is identified as an AID:EID pair. AID is signed by the containing TD, and EID is signed by the containing AD (with AID).

  Address is a public key [AIP 2008]

•  Each AD registers name / address at address resolution server, uses an up-path to reach TD core   Private key used to sign nameaddress mapping

•  ADs select which down-paths to announce

•  ADs sign down-paths with private key and register down-paths with path resolution servers

17

Route Joining •  Local traffic should not need to traverse TD core •  Sender obtains receiver’s k down-paths •  Sender intersects its up-paths with receiver’s down-paths •  Sender selects preferred routes based on k2 options

18

Page 10: SCION - larc.smu.edu.sg

10

Intra-TD Forwarding •  Down-path contains all forwarding decisions (AD

traversed) from endpoint AD to TD core   Ingress/egress points for each AD, authenticated in opaque fields

  ADs use internal routing to send traffic from ingress to egress point

•  Joined end-to-end route contains full forwarding information from source to destination  No routing / forwarding tables needed!

19

Cross-­‐TD  Forwarding  

20  

TD:  isola2on  of  route  computa2on  

TD  cores:  interconnected  large  ISPs  

Source  Des2na2on  

AD:  atomic  failure  unit  

core  core  

Up-­‐paths  Down-­‐paths  

Page 11: SCION - larc.smu.edu.sg

11

Resolved BGP / Control Plane Issues •  Lack of fault isolation

–  Error propagation, potentially to entire Internet, disruption of flows outside domain –  Adversary can attract flows outside domain –  Black art to keep BGP stable, manual rule sets, unanticipated consequences

•  Lack of scalability, amount of work by BGP is O(N), N number of destinations –  Path changes need to be sent to entire Internet

•  S-BGP requires single root of trust for AS and address certificates •  Dramatically higher router overhead during periods of route instability

–  Increased number of routing updates during DDoS attacks •  Slow route convergence

–  Convergence attack –  Network may require minutes up to tens of minutes to converge

•  Lack of freshness for BGP update messages •  Other specific attacks

–  Blackhole attacks –  Wormhole attack

21

Resolved IP / Data Plane Issues •  Complex route table lookup for each packet •  Bursting routing tables •  Lack of predictability for path availability •  Lack of route choice/control by senders and receivers

22

•  No path predictability due to inconsistency between routing table and BGP updates

•  No isolation between control and data planes (routing and forwarding) •  By attacking routing, prevent forwarding to work correctly

•  Huge TCB (entire Internet) •  Single root of trust for DNSsec •  Intermittent routing loops during BGP convergence, need TTL to avoid

packet looping

Resolved IP / BGP / Misc. Issues

Page 12: SCION - larc.smu.edu.sg

12

SCION  Security  Benefits  

23  

S-­‐BGP  +  DNSSec   SCION  

IsolaOon  

No    collusion/wormhole  aYacks  

poor  path  freshness    path  replay  aYacks  single  root  of  trust  

Yes    no  cross-­‐TD  aYacks    path  freshness  scalability  

no  single  root  of  trust  

TCB   The  whole  Internet   TD  Core  and  on-­‐path  ADs  

Path  Control  Too  liRle  (dst)  or  too  much  (src),  

empowering  DDoS  aYacks  Balanced  control    

enabling  DDoS  defenses  

Performance  Benefits   Scalability  

  Rou2ng  updates  are  scoped  within  the  local  TD  

 Flexibility   Transit  ISPs  can  embed  local  rou2ng  policies  in  opaque  fields  

 Simplicity  and  efficiency   No  interdomain  forwarding  table  

 Current  network  layer:  rou2ng  table  explosion   Symmetric  verifica2on  during  forwarding   Simple  routers,  energy  efficient,  and  cost  efficient  

24  

Page 13: SCION - larc.smu.edu.sg

13

Discussion •  Incremental Deployment

 Current ISP topologies are consistent with the TDs in SCION   ISPs use MPLS to forward traffic within their networks   Only edge routers need to deploy SCION   Can use IP tunnels to connect SCION edge routers in different

ADs

25

•  Limitations ✗  ADs need to keep updating down-paths on path server ✗  Increased packet size ✗  Static path binding, which may hamper dynamic re-routing

Optimism for SCION Deployment •  SCION offers substantial improvements and

enhancements that cannot be achieved through incremental changes –  Otherwise insufficient incentive to move away from current Internet

•  SCION offers new business models for ISPs –  Enhanced QoS services –  Dramatically enhanced availability, DDoS defenses –  Small additional hardware cost

•  Insufficient incentives to move to content-centric networking architectures –  Economic challenges for ISPs to adopt CCN –  Akamai-style data dissemination can be used incrementally

26

Page 14: SCION - larc.smu.edu.sg

14

Evalua2on   Methodology    

 Use  of  CAIDA  topology  informa2on   Assume  5  TDs  (AfriNIC,  ARIN,  APNIC,  LACNIC,  RIPE)  

 We  compare  to  S-­‐BGP/BGP  

 Metric  1:  addi2onal  path  length  (AD  hops)  compared  to  BGP  

 Without shortcuts: 21% longer  With shortcuts:

o 1 down/up- path: 6.7% longer o 2 down/up- path: 3.5% longer o 5 down/up- path: 2.5% longer

27  

Evalua2on  (cont’d)   Metric  2:  Expressiveness  

 Frac2on  of  BGP  paths  available  under  SCION  

28  

Page 15: SCION - larc.smu.edu.sg

15

Related  Work   Rou2ng  security  

 S-­‐BGP,  soBGP,  psBGP,  SPV,  PGBGP     Only  topological  correctness;  addressed  a  subset  of  aYacks  

addressed  in  SCION  

 Rou2ng  control   Mul2path  (MIRO,  Deflec2on,  Path  splicing,  Pathlet),  NIRA  

 Only  given  control  to  the  source,  and/or  liYle  security  assurance   Next-­‐genera2on  architectures  

 HLP,  HAIR,  RBF,  AIP,  ICING/IGLOO   Focusing  on  other  aspects  (reducing  rou2ng  churns  and  rou2ng  

table  sizes,  enforcing  rou2ng  policies,  and  providing  source  accountability)  

29  

Conclusions  

"  Basic  architecture  design  for  a  next-­‐genera2on  network  that  emphasizes  isola2on,  control  and  explicit  trust  

"  Highly  efficient,  scalable,  available  architecture  

"  Enables  numerous  addi2onal  security  mechanisms,  e.g.,  network  capabili2es  

30  

Applica2on  

Transport  

Data  link  

Network  

Physical  


Recommended