efficient cross layer negotiation
play

Efficient Cross-Layer Negotiation Bryan Ford Janardhan Iyengar - PowerPoint PPT Presentation

Efficient Cross-Layer Negotiation Bryan Ford Janardhan Iyengar MPI-SWS and Franklin & Marshall Yale University College Presented at HotNets-VIII, October 22, 2009 Tng: Transport Next Generation Project Support: NSF FIND grants


  1. Efficient Cross-Layer Negotiation Bryan Ford Janardhan Iyengar MPI-SWS and Franklin & Marshall Yale University College Presented at HotNets-VIII, October 22, 2009 “Tng: Transport Next Generation” Project Support: NSF FIND grants CNS-0916413 and CNS-0916678

  2. A Proliferation of Layers and Layer Combinations Application HTTP FTP DNS RTP HTTP SSL Transport SSL DTLS Security TCP Transport SCTP TCP UDP DCCP IPsec IPv6 IPsec Network IPsec HTTP IPv6 Security IPsec SSL Teredo UDP TCP UDP Network (DirectAccess) IP IPv6 IP Data Ethernet Token-Ring PPP Link Ethernet

  3. Future: Ever More Layers/Combinations? Further Multi-Streaming Multipath Decomposition Transports Transports [“Breaking Up the SCTP [rfc4960], SCTP [rfc4960], Transport Logjam”, SST [SIGCOMM'07] MPTCP [WIP] HotNets'08] Application Application Application Semantic Stream Stream Multipath Transport Isolation Channel Subflow Subflow Flow Network Network Endpoint Link Link Network Link

  4. The Negotiation Problem Decisions, decisions! Application HTTP SIP IAX Transport SSL DTLS Security Transport TCP SCTP UDP DCCP Network IPv4 IPv6 IPv4 IPv6

  5. Compatibility and Preference Which combinations do both endpoints support? Which combinations do they prefer ? SIP IAX SIP IAX ? DTLS DTLS UDP DCCP UDP DCCP IPv4 IPv6 IPv4 IPv6 Host A Host B

  6. Talk Outline ● Background and Alternatives ● A Model for Negotiation ● Negotiation Transport Protocol ● Discussion, Conclusion

  7. Background and Alternatives

  8. Approach 0: Name Encoding http:// https:// http++sctp:// http++ssl++sctp:// means: means: means: means: HTTP HTTP HTTP SSL HTTP SSL TCP TCP SCTP SCTP IP IP IP IP [rfc2616] [rfc2818] ? [draft-wood-tae- specifying- uri-transports]

  9. Disadvantages of Name Encoding Loss of Transparency – User cares about application , not underlying stack... but is forced to see and care about underlying stack – When underlying stack changes, URLs change/break ● redirectors proliferate between http:// and https:// spaces Loss of Compatibility – If user puts “ http++sctp://... ” link on a web page, legacy browsers break; cannot fall back to TCP Where Do You Stop? – “ http++tls++tcp++ipv6++ethernet ” ???

  10. Approach 1: Try and Fall Back Host A Host B SCTP INIT SCTP RST TCP INIT TCP ACK

  11. Challenge 1: Controlling Delay ● Failures can incur timeouts (e.g., due to NATs) ● ...potentially compounded by layering Timeout(s) SIP IAX SIP IAX Timeout(s) DTLS DTLS Timeout(s) UDP DCCP UDP DCCP Timeout(s) IPv4 IPv6 IPv4 IPv6 Host B Host A

  12. Approach 2: Try in Parallel Host A Host B SCTP INIT TCP INIT SCTP RST TCP ACK

  13. Challenge 2a: Redundant State Host A Host B SCTP INIT TCP INIT SCTP ACK TCP ACK

  14. Challenge 2b: Combinations Layering can lead to explosion of choices SIP IAX SIP DTLS IAX DTLS UDP UDP UDP UDP IPv4 IPv4 IPv4 IPv4 SIP IAX SIP IAX SIP DTLS IAX DTLS DCCP DCCP DCCP DCCP IPv4 IPv4 IPv4 IPv4 DTLS SIP IAX SIP DTLS IAX DTLS UDP DCCP UDP UDP UDP UDP IPv6 IPv6 IPv6 IPv6 Host B SIP IAX IPv4 IPv6 SIP DTLS IAX DTLS DCCP DCCP DCCP DCCP IPv6 IPv6 IPv6 IPv6 Host A

  15. Approach 3: Out-of-Band Information Host A DNS Server Host B DNS++ Req DNS++ Reply SIP IAX DTLS UDP DCCP IPv4 IPv6 SIP DTLS DCCP IPv6

  16. Challenge 3a: Administration DNS server must know: DNS Server Host B ● Name → IP mapping (as before) ● Entire protocol stack supported by Host B “Dynamic DNS++”? ● Protocol options...? ⇒ Synchronization Nightmare?

  17. Challenge 3b: E2E Robustness If endpoints agree on configuration X, will it work? SIP IAX SIP IAX DTLS DTLS UDP DCCP UDP DCCP UDP DCCP IPv4 IPv6 IPv4 IPv6 IPv4 IPv6 Host A Host B Middlebox

  18. Our Solution: Negotiation ● Hosts explicitly describe possible configurations during initial “meta-communication” exchange, before actual communication commences “Hi, I speak: “Hi, I speak: SIP IAX SIP IAX DTLS DTLS UDP DCCP UDP DCCP IPv4 IPv6 ” ” IPv4 IPv6 Host A Host B

  19. A Model for Negotiation

  20. Negotiation Model Overview 1.Initiator sends a Protocol Graph Proposal 2.Responder returns Revised Protocol Graph 3.(Optional) further protocol graph revision steps 4.Peers commit, Acknowledge Protocol Graph 5.Peers communicate via negotiated protocols

  21. Message 1: Initiator → Responder: Propose Protocol Graph Negotiation Message 1 goal (SIP) opt1 opt2 Host A Host B (alternatives) TLS DTLS opt1 opt2 opt1 opt2 TCP DCCP opt1 opt2 opt1 opt2 base (IP)

  22. Message 2: Responder → Initiator: Revise Protocol Graph Negotiation Message 2 goal (SIP) opt1 opt2 Host A Host B TLS DTLS opt1 opt2 opt1 opt2 TCP DCCP opt1 opt2 opt1 opt2 base (IP)

  23. Message 3: Initiator → Responder: Acknowledge Protocol Graph Negotiation Message 3 goal (SIP) opt2 Host A Host B TLS opt1 TCP base (IP)

  24. Message 4+: According to Negotiated Stack Host A Host B Normal Packets SIP TLS TCP

  25. Concurrent Protocol Initialization Whenever feasible: ● embed protocol-specific handshake info into graph ● run handshakes concurrently while negotiating ● commit only negotiated configuration atomically Host A Host A 1 SIP 2 SIP REGISTER 200 OK TLS DTLS TLS DTLS ClientHello ClientHello ServerHello ServerHello TCP DCCP TCP DCCP INIT Request INIT-ACK Reply IP IP

  26. Key Benefits of Negotiation Model ● Supports backward-compatible evolution – New smart nodes can fall back on old dumb protocols ● Happens strictly between nodes concerned – Users don't have to care (e.g., between http: & https:) – Name server administrators don't have to care ● Protocol graph representation scales to handle: – Arbitrarily deep protocol stacks – Many alternatives per layer ● Setup whole “layer cakes” in minimal # of RTTs – Regardless of protocol stack depth

  27. Further Challenges & Extensions (see paper) ● Multi-Round Negotiation – due to dependencies, hiding of alternatives, graph size ● Negotiation Across Multiple Contexts – IPv4 vs IPv6, new protocol vs legacy, UDP encapsulation ● Recursive Negotiation – negotiate “crypto wrapper” and “contents” concurrently ● Peer-to-Peer Negotiation – symmetric peers must converge on a configuration

  28. Negotiation Transport Protocol

  29. How to Express Protocol Graphs? Negotiation Message Structure: Negotiation Message Node Description Node #1 Num Children Options Length Node #2 Child 1 Node ID Child 2 Node ID ... ... Child m Node ID Node #n Negotiation Options (variable) Protocol-Specifc Data (variable)

  30. How to Convey Protocol Graphs? Negotiation messages might be big: – Many layers × many alternatives for each to describe – Embedded protocol-specific data: crypto keys, etc. Individual graph nodes may be large or small – Segment large nodes, aggregate small ones into packets Receiver probably wants only specific nodes – Efficiently ignore/drop anything it doesn't understand ⇒ Specialized Negotiation Transport Protocol

  31. Negotiation Transport: Packet Structure Fixed header + multiple chunks [SCTP] each describing different graph node Negotiation Transport Packet Fixed Header Chunk #1 Chunk #2 ... Chunk #n

  32. Negotiation Transport Negotiation packet sequencing permits individual packet ack/retransmit [SST] Transport Header Msg T ype Step Number Transmit Seq Negotiation Protocol Magic Cookie Negotiation Transaction ID – AckCt Ack Seq

  33. Negotiation Transport Each chunk describes [part of] a graph node ● Receiver can ack & discard all chunks for unknown protocols without storing any Transport Chunk – Node ID Chunk Length Protocol ID Chunk Payload (variable)

  34. Not needed Let negotiated protocol worry about: ● Connection state machines ● Application-friendly semantics (e.g., streams) ● Flow control ● Congestion control (beyond slow-start) ● ...

  35. Discussion, Conclusion

  36. What Doesn't (Really) Work ● Encoding protocol stacks in names – Non-transparent to user; compatibility hell ● Try alternatives serially & fall back – Delay/timeout hell ● Probe alternatives in parallel – Redundant protocol instances; combinatorial hell ● Encode alternatives in DNS responses – Not end-to-end robust; administrative hell

  37. What Might Work Explicit In-Band Negotiation: ● Get user & third parties out of the loop ● Describe alternatives in compact protocol graphs ● Handshake deep layer cakes concurrently ● Receiver stores only what he understands & wants “T ng : Transport Next Generation” project http://bford.info/tng/ Support: NSF FIND grants CNS-0916678 and CNS-0916413

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend