EndBox: Scalable M iddlebox Functions Using Client-Side Trusted - - PowerPoint PPT Presentation

endbox scalable m iddlebox functions using client side
SMART_READER_LITE
LIVE PREVIEW

EndBox: Scalable M iddlebox Functions Using Client-Side Trusted - - PowerPoint PPT Presentation

Institute of Operating Systems and Computer Networks EndBox: Scalable M iddlebox Functions Using Client-Side Trusted Execution Image CC-BY-SA Victorgrigas David Goltzsche, 1 Signe Rsch, 1 Manuel Nieke, 1 Sbastien Vaucher, 2 Nico Weichbrodt, 1


slide-1
SLIDE 1

EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution

Image CC-BY-SA Victorgrigas

David Goltzsche,1 Signe Rüsch,1 Manuel Nieke,1 Sébastien Vaucher,2 Nico Weichbrodt,1 Valerio Schiavoni,2 Pierre-Louis Aublin,3 Paolo Costa,4 Christof Fetzer,5 Pascal Felber,2 Peter Pietzuch3 and Rüdiger Kapitza1

1TU Braunschweig goltzsche@ibr.cs.tu-bs.de

@d_goltzsche

2University of Neuchâtel 3Imperial College London 4Microsoft Research 5TU Dresden

Institute of Operating Systems and Computer Networks

slide-2
SLIDE 2

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

What Are Middleboxes?

Middleboxes are essential parts of large networks

Example: enterprise networks

Functions related to security or performance Current best practice: central deployment as physical boxes

High infrastructure and management costs

(Sherry et al. SIGCOMM’12)

Scalability issues with growing client numbers

Server Server Server Middlebox

Enterprise Network

Gateway Client Client Client

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 2 Institute of Operating Systems and Computer Networks

slide-3
SLIDE 3

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

What Are Middleboxes?

Middleboxes are essential parts of large networks

Example: enterprise networks

Functions related to security or performance Current best practice: central deployment as physical boxes

High infrastructure and management costs

(Sherry et al. SIGCOMM’12)

Scalability issues with growing client numbers

Server Server Server Middlebox

Enterprise Network

Gateway Client Client Client

Problem: Middleboxes are necessary for large networks, but come at high costs and do not scale well with number of clients.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 2 Institute of Operating Systems and Computer Networks

slide-4
SLIDE 4

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Placement of Middleboxes

Server Server Server Middlebox

Enterprise Network

Gateway Client Client Client

(a) Centralised

Server Server Server Gateway Middle box Cloud

Enterprise Network

Client Client Client

(b) Cloud-based

Gateway Middle box Server Middle box Server Middle box Server

Enterprise Network

Client Client Client

(c) Server-side

Server Server Server Gateway

Enterprise Network

Middle box Middle box Middle box Client Client Client

(d) Client-side

(a) (b) (c) (d) Low infra. cost Low latency Good scalability Trusted infrastructure Easy administration

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 3 Institute of Operating Systems and Computer Networks

slide-5
SLIDE 5

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Placement of Middleboxes

Server Server Server Middlebox

Enterprise Network

Gateway Client Client Client

(a) Centralised

Server Server Server Gateway Middle box Cloud

Enterprise Network

Client Client Client

(b) Cloud-based

Gateway Middle box Server Middle box Server Middle box Server

Enterprise Network

Client Client Client

(c) Server-side

Server Server Server Gateway

Enterprise Network

Middle box Middle box Middle box Client Client Client

(d) Client-side

(a) (b) (c) (d) Low infra. cost ✗ Low latency ✔ Good scalability ✗ Trusted infrastructure ✔ Easy administration ✔

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 3 Institute of Operating Systems and Computer Networks

slide-6
SLIDE 6

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Placement of Middleboxes

Server Server Server Middlebox

Enterprise Network

Gateway Client Client Client

(a) Centralised

Server Server Server Gateway Middle box Cloud

Enterprise Network

Client Client Client

(b) Cloud-based

Gateway Middle box Server Middle box Server Middle box Server

Enterprise Network

Client Client Client

(c) Server-side

Server Server Server Gateway

Enterprise Network

Middle box Middle box Middle box Client Client Client

(d) Client-side

(a) (b) (c) (d) Low infra. cost ✗ ✔ Low latency ✔ ✗ Good scalability ✗ ✔ Trusted infrastructure ✔ ✗ Easy administration ✔ ✔

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 3 Institute of Operating Systems and Computer Networks

slide-7
SLIDE 7

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Placement of Middleboxes

Server Server Server Middlebox

Enterprise Network

Gateway Client Client Client

(a) Centralised

Server Server Server Gateway Middle box Cloud

Enterprise Network

Client Client Client

(b) Cloud-based

Gateway Middle box Server Middle box Server Middle box Server

Enterprise Network

Client Client Client

(c) Server-side

Server Server Server Gateway

Enterprise Network

Middle box Middle box Middle box Client Client Client

(d) Client-side

(a) (b) (c) (d) Low infra. cost ✗ ✔ ✔ Low latency ✔ ✗ ✔ Good scalability ✗ ✔ ✗ Trusted infrastructure ✔ ✗ ✔ Easy administration ✔ ✔ ✗

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 3 Institute of Operating Systems and Computer Networks

slide-8
SLIDE 8

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Placement of Middleboxes

Server Server Server Middlebox

Enterprise Network

Gateway Client Client Client

(a) Centralised

Server Server Server Gateway Middle box Cloud

Enterprise Network

Client Client Client

(b) Cloud-based

Gateway Middle box Server Middle box Server Middle box Server

Enterprise Network

Client Client Client

(c) Server-side

Server Server Server Gateway

Enterprise Network

Middle box Middle box Middle box Client Client Client

(d) Client-side

(a) (b) (c) (d) Low infra. cost ✗ ✔ ✔ ✔ Low latency ✔ ✗ ✔ ✔ Good scalability ✗ ✔ ✗ ✔ Trusted infrastructure ✔ ✗ ✔ ✗ Easy administration ✔ ✔ ✗ ✗

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 3 Institute of Operating Systems and Computer Networks

slide-9
SLIDE 9

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Placement of Middleboxes

Server Server Server Middlebox

Enterprise Network

Gateway Client Client Client

(a) Centralised

Server Server Server Gateway Middle box Cloud

Enterprise Network

Client Client Client

(b) Cloud-based

Gateway Middle box Server Middle box Server Middle box Server

Enterprise Network

Client Client Client

(c) Server-side

Server Server Server Gateway

Enterprise Network

Middle box Middle box Middle box Client Client Client

(d) Client-side

(a) (b) (c) (d) Low infra. cost ✗ ✔ ✔ ✔ Low latency ✔ ✗ ✔ ✔ Good scalability ✗ ✔ ✗ ✔ Trusted infrastructure ✔ ✗ ✔ ✔ Easy administration ✔ ✔ ✗ ✔

✔ with EndBox EndBox targets enterprise networks and places middleboxes on untrusted clients.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 3 Institute of Operating Systems and Computer Networks

slide-10
SLIDE 10

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Outline

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 4 Institute of Operating Systems and Computer Networks

slide-11
SLIDE 11

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Approach of EndBox

configures Admin

EndBox Server FW/GW Enterprise Network Client machine Applications EndBox Client TEE

Untrusted clients can manipulate or circumvent traffic analysis

Client traffic routed through trusted execution environments (TEEs)

Inside TEE, packets are processed, signed and encrypted Unsigned outgoing traffic dropped by firewall/gateway (FW/GW) Encrypted incoming traffic cannot be encrypted outside of TEE

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 5 Institute of Operating Systems and Computer Networks

slide-12
SLIDE 12

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Approach of EndBox

configures Admin

EndBox Server FW/GW Enterprise Network

Apps

TEE

EndBox Client

Client machine Applications EndBox Client TEE

Untrusted clients can manipulate or circumvent traffic analysis

Client traffic routed through trusted execution environments (TEEs)

Inside TEE, packets are processed, signed and encrypted Unsigned outgoing traffic dropped by firewall/gateway (FW/GW) Encrypted incoming traffic cannot be encrypted outside of TEE

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 5 Institute of Operating Systems and Computer Networks

slide-13
SLIDE 13

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Approach of EndBox

configures Admin

EndBox Server FW/GW Enterprise Network

Apps

TEE

EndBox Client

Client machine Applications EndBox Client TEE

Untrusted clients can manipulate or circumvent traffic analysis

Client traffic routed through trusted execution environments (TEEs)

Inside TEE, packets are processed, signed and encrypted Unsigned outgoing traffic dropped by firewall/gateway (FW/GW) Encrypted incoming traffic cannot be encrypted outside of TEE EndBox enforces the routing of application traffic through TEEs deployed on untrusted client machines.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 5 Institute of Operating Systems and Computer Networks

slide-14
SLIDE 14

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

TEE: Intel SGX in a Nutshell

x86 instruction set extension introduced with Skylake architecture Creation of trusted execution environments (TEEs) → enclaves Execution and data inside enclaves protected from privileged software Hardware-based memory integrity protection and encryption Remote attestation of enclaves Only CPU is trusted Application TEE / Enclave Operating System Hardware CPU

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 6 Institute of Operating Systems and Computer Networks

slide-15
SLIDE 15

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

TEE: Intel SGX in a Nutshell

x86 instruction set extension introduced with Skylake architecture Creation of trusted execution environments (TEEs) → enclaves Execution and data inside enclaves protected from privileged software Hardware-based memory integrity protection and encryption Remote attestation of enclaves Only CPU is trusted Application TEE / Enclave Operating System Hardware CPU Intel SGX allows the creation of enclaves, trusted execution environments (TEEs) protected by hardware.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 6 Institute of Operating Systems and Computer Networks

slide-16
SLIDE 16

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Implementation of EndBox Prototype

Client Machine EndBox Client 1 2 4 IDPS, Firewall, … 3 Cryptography Fragmentation, Encapsulation TEE

Soft router

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 7 Institute of Operating Systems and Computer Networks

slide-17
SLIDE 17

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Implementation of EndBox Prototype

Client Machine EndBox Client 1 2 4 IDPS, Firewall, … 3 Cryptography Fragmentation, Encapsulation TEE

Soft router

1

Packet copied into enclave

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 7 Institute of Operating Systems and Computer Networks

slide-18
SLIDE 18

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Implementation of EndBox Prototype

Client Machine EndBox Client 1 2 4 IDPS, Firewall, … 3 Cryptography Fragmentation, Encapsulation TEE

Soft router

1

Packet copied into enclave

2

Execute middlebox function(s)

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 7 Institute of Operating Systems and Computer Networks

slide-19
SLIDE 19

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Implementation of EndBox Prototype

Client Machine EndBox Client 1 2 4 IDPS, Firewall, … 3 Cryptography Fragmentation, Encapsulation TEE

Soft router

1

Packet copied into enclave

2

Execute middlebox function(s)

3

Packet accepted/discarded

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 7 Institute of Operating Systems and Computer Networks

slide-20
SLIDE 20

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Implementation of EndBox Prototype

Client Machine EndBox Client 1 2 4 IDPS, Firewall, … 3 Cryptography Fragmentation, Encapsulation TEE

Soft router

1

Packet copied into enclave

2

Execute middlebox function(s)

3

Packet accepted/discarded

4

Packet signed, encrypted and copied

  • ut of enclave

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 7 Institute of Operating Systems and Computer Networks

slide-21
SLIDE 21

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Implementation of EndBox Prototype

Client Machine EndBox Client 1 2 4 IDPS, Firewall, … 3 Cryptography Fragmentation, Encapsulation TEE

Soft router

1

Packet copied into enclave

2

Execute middlebox function(s)

3

Packet accepted/discarded

4

Packet signed, encrypted and copied

  • ut of enclave

Integration of enclaves into OpenVPN client Utilise Click modular router (Kohler et al. TOCS’00) for arbitrary middlebox functions TaLoS library (Aublin et al. technical report ’17) for in-enclave TLS termination

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 7 Institute of Operating Systems and Computer Networks

slide-22
SLIDE 22

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Implementation of EndBox Prototype

Client Machine EndBox Client 1 2 4 IDPS, Firewall, … 3 Cryptography Fragmentation, Encapsulation TEE

Soft router

1

Packet copied into enclave

2

Execute middlebox function(s)

3

Packet accepted/discarded

4

Packet signed, encrypted and copied

  • ut of enclave

Integration of enclaves into OpenVPN client Utilise Click modular router (Kohler et al. TOCS’00) for arbitrary middlebox functions TaLoS library (Aublin et al. technical report ’17) for in-enclave TLS termination EndBox executes middlebox functions inside trusted SGX enclaves embedded into a VPN client and uses the Click modular router.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 7 Institute of Operating Systems and Computer Networks

slide-23
SLIDE 23

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

EndBox Configuration Updates

Configuration updates are challenging with distributed middleboxes

Client Machine Config File Server EndBox Client Enclave 4 2 3 Admin EndBox Server 5

Timer

1

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 8 Institute of Operating Systems and Computer Networks

slide-24
SLIDE 24

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

EndBox Configuration Updates

Configuration updates are challenging with distributed middleboxes

Client Machine Config File Server EndBox Client Enclave 4 2 3 Admin EndBox Server 5

Timer

1

1

Admin uploads encrypted configuration and starts grace period timer

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 8 Institute of Operating Systems and Computer Networks

slide-25
SLIDE 25

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

EndBox Configuration Updates

Configuration updates are challenging with distributed middleboxes

Client Machine Config File Server EndBox Client Enclave 4 2 3 Admin EndBox Server 5

Timer

1

1

Admin uploads encrypted configuration and starts grace period timer

2

New version number piggybacked on OpenVPN ping messages

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 8 Institute of Operating Systems and Computer Networks

slide-26
SLIDE 26

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

EndBox Configuration Updates

Configuration updates are challenging with distributed middleboxes

Client Machine Config File Server EndBox Client Enclave 4 2 3 Admin EndBox Server 5

Timer

1

1

Admin uploads encrypted configuration and starts grace period timer

2

New version number piggybacked on OpenVPN ping messages

3

If necessary, client obtains new configuration file

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 8 Institute of Operating Systems and Computer Networks

slide-27
SLIDE 27

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

EndBox Configuration Updates

Configuration updates are challenging with distributed middleboxes

Client Machine Config File Server EndBox Client Enclave 4 2 3 Admin EndBox Server 5

Timer

1

1

Admin uploads encrypted configuration and starts grace period timer

2

New version number piggybacked on OpenVPN ping messages

3

If necessary, client obtains new configuration file

4

Configuration is decrypted and applied

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 8 Institute of Operating Systems and Computer Networks

slide-28
SLIDE 28

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

EndBox Configuration Updates

Configuration updates are challenging with distributed middleboxes

Client Machine Config File Server EndBox Client Enclave 4 2 3 Admin EndBox Server 5

Timer

1

1

Admin uploads encrypted configuration and starts grace period timer

2

New version number piggybacked on OpenVPN ping messages

3

If necessary, client obtains new configuration file

4

Configuration is decrypted and applied

5

Ping server with piggybacked version number to prove application

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 8 Institute of Operating Systems and Computer Networks

slide-29
SLIDE 29

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

EndBox Configuration Updates

Configuration updates are challenging with distributed middleboxes

Client Machine Config File Server EndBox Client Enclave 4 2 3 Admin EndBox Server 5

Timer

1

1

Admin uploads encrypted configuration and starts grace period timer

2

New version number piggybacked on OpenVPN ping messages

3

If necessary, client obtains new configuration file

4

Configuration is decrypted and applied

5

Ping server with piggybacked version number to prove application

EndBox configurations are centrally controlled and enforced.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 8 Institute of Operating Systems and Computer Networks

slide-30
SLIDE 30

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Outline

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 9 Institute of Operating Systems and Computer Networks

slide-31
SLIDE 31

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Evaluation of EndBox

5 client machines for executing many clients

SGX-capable 4-core Xeon v5 CPUs, 32GB RAM

2 server machines as OpenVPN servers

non-SGX 4-core Xeon v2 CPUs, 16GB RAM

10 Gbps interconnection (switched network) Research questions:

What is EndBox’s impact on latency? What throughput can EndBox achieve? Does EndBox improve scalability?

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 10 Institute of Operating Systems and Computer Networks

slide-32
SLIDE 32

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Latency Depending on Middlebox Placement

10 20

10.8 11.3 11.5 17.4

Ping RTT [ms] no redirection local redirection EndBox SGX AWS (eu-central-1) Experiment latency overhead local redirection 4.6% EndBox SGX 6.5% AWS (Europe) 61%

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 11 Institute of Operating Systems and Computer Networks

slide-33
SLIDE 33

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Latency Depending on Middlebox Placement

10 20

10.8 11.3 11.5 17.4

Ping RTT [ms] no redirection local redirection EndBox SGX AWS (eu-central-1) Experiment latency overhead local redirection 4.6% EndBox SGX 6.5% AWS (Europe) 61% EndBox has low impact on latency compared to cloud-based solutions.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 11 Institute of Operating Systems and Computer Networks

slide-34
SLIDE 34

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Throughput for Different Middlebox Use cases

NOP LB FW IDPS DDoS 200 400 600 800

7 6 4 7 6 1 7 4 7 6 9 2 6 6 2 5 3 4 9 6 5 2 7 4 2 2 4 1 4

Throughput [Mbps] OpenVPN+Click EndBox SGX

Use case throughput overhead Forwarding (NOP) 30.6% Load balancing (LB) 34.8% Firewalling (FW) 29.5% Intrusion prev. (IDPS) 39.0% DDoS mitigation (DDoS) 37.5%

packet size: 1500 bytes

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 12 Institute of Operating Systems and Computer Networks

slide-35
SLIDE 35

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Throughput for Different Middlebox Use cases

NOP LB FW IDPS DDoS 200 400 600 800

7 6 4 7 6 1 7 4 7 6 9 2 6 6 2 5 3 4 9 6 5 2 7 4 2 2 4 1 4

Throughput [Mbps] OpenVPN+Click EndBox SGX

Use case throughput overhead Forwarding (NOP) 30.6% Load balancing (LB) 34.8% Firewalling (FW) 29.5% Intrusion prev. (IDPS) 39.0% DDoS mitigation (DDoS) 37.5%

packet size: 1500 bytes

EndBox has an average throughput overhead of 34,3% for multiple use cases.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 12 Institute of Operating Systems and Computer Networks

slide-36
SLIDE 36

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Scalability on Server-side

Setup Description vanilla OpenVPN unmodified OpenVPN version EndBox EndBox with SGX OpenVPN+Click OpenVPN and server-side Click instance Clients generate a workload of 200 Mbps each

2 4 6 Throughput [Gbps] vanilla OpenVPN EndBox OpenVPN+Click 1 10 20 30 40 50 60 25 50 75 100 Number of clients CPU usage [%]

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 13 Institute of Operating Systems and Computer Networks

slide-37
SLIDE 37

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Scalability on Server-side

Setup Description vanilla OpenVPN unmodified OpenVPN version EndBox EndBox with SGX OpenVPN+Click OpenVPN and server-side Click instance Clients generate a workload of 200 Mbps each

2 4 6 Throughput [Gbps] vanilla OpenVPN EndBox OpenVPN+Click 1 10 20 30 40 50 60 25 50 75 100 Number of clients CPU usage [%]

EndBox scales linearly with the number of clients.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 13 Institute of Operating Systems and Computer Networks

slide-38
SLIDE 38

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Scalability on Server-side

Setup Description vanilla OpenVPN unmodified OpenVPN version EndBox EndBox with SGX OpenVPN+Click OpenVPN and server-side Click instance Clients generate a workload of 200 Mbps each

2 4 6 Throughput [Gbps] vanilla OpenVPN EndBox OpenVPN+Click 1 10 20 30 40 50 60 25 50 75 100 Number of clients CPU usage [%]

EndBox scales linearly with the number of clients. EndBox has no server-side performance penalty.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 13 Institute of Operating Systems and Computer Networks

slide-39
SLIDE 39

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Scalability on Server-side

Setup Description vanilla OpenVPN unmodified OpenVPN version EndBox EndBox with SGX OpenVPN+Click OpenVPN and server-side Click instance Clients generate a workload of 200 Mbps each

2 4 6 Throughput [Gbps] vanilla OpenVPN EndBox OpenVPN+Click 1 10 20 30 40 50 60 25 50 75 100 Number of clients CPU usage [%]

EndBox scales linearly with the number of clients. EndBox has no server-side performance penalty. EndBox has a 3.8× higher throughput compared to a traditional deployment.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 13 Institute of Operating Systems and Computer Networks

slide-40
SLIDE 40

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Scalability on Server-side

Setup Description vanilla OpenVPN unmodified OpenVPN version EndBox EndBox with SGX OpenVPN+Click OpenVPN and server-side Click instance Clients generate a workload of 200 Mbps each

2 4 6 Throughput [Gbps] vanilla OpenVPN EndBox OpenVPN+Click 1 10 20 30 40 50 60 25 50 75 100 Number of clients CPU usage [%]

EndBox scales linearly with the number of clients. EndBox has no server-side performance penalty. EndBox has a 3.8× higher throughput compared to a traditional deployment. EndBox saves resources on server-side.

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 13 Institute of Operating Systems and Computer Networks

slide-41
SLIDE 41

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Outline

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 14 Institute of Operating Systems and Computer Networks

slide-42
SLIDE 42

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Related Work

Moving middlebox functions to clients has been proposed before Trusted clients assumed, exception: ETTM (Dixon et al. NSDI’11)

Based on Trusted Platform Module (TPM) Large trusted computing base (TCB) includes hypervisor Paxos applied for consensus → bad scalability

Recent work uses SGX, but target cloud-based trusted middleboxes

ShieldBox (Trach et al. SOSR’18)

SafeBricks (Poddar et al. NSDI’18)

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 15 Institute of Operating Systems and Computer Networks

slide-43
SLIDE 43

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Related Work

Moving middlebox functions to clients has been proposed before Trusted clients assumed, exception: ETTM (Dixon et al. NSDI’11)

Based on Trusted Platform Module (TPM) Large trusted computing base (TCB) includes hypervisor Paxos applied for consensus → bad scalability

Recent work uses SGX, but target cloud-based trusted middleboxes

ShieldBox (Trach et al. SOSR’18)

SafeBricks (Poddar et al. NSDI’18) EndBox is the first approach exploring the deployment of client-side middleboxes with recent hardware trends like Intel SGX

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 15 Institute of Operating Systems and Computer Networks

slide-44
SLIDE 44

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Outline

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 16 Institute of Operating Systems and Computer Networks

slide-45
SLIDE 45

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Conclusion

EndBox’s contributions: Secure deployment and execution of middlebox functions on untrusted client machines Scales linearly with number of clients Up to 3.8× higher throughput Centrally controlled and enforced configuration Secure analysis of encrypted traffic (see paper!) Additional scenario: ISP (see paper!)

Server Server Server Gateway

Enterprise Network EndBox EndBox EndBox

Client Client Client Client machine Applications EndBox Client TEE

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 17 Institute of Operating Systems and Computer Networks

slide-46
SLIDE 46

Introduction to Middleboxes Design of EndBox Evaluation of EndBox Related Work Conclusion

Conclusion

EndBox’s contributions: Secure deployment and execution of middlebox functions on untrusted client machines Scales linearly with number of clients Up to 3.8× higher throughput Centrally controlled and enforced configuration Secure analysis of encrypted traffic (see paper!) Additional scenario: ISP (see paper!)

Server Server Server Gateway

Enterprise Network EndBox EndBox EndBox

Client Client Client Client machine Applications EndBox Client TEE

Thank you for your time! Questions? goltzsche@ibr.cs.tu-bs.de @d_goltzsche github.com/ibr-ds

2018-06-27 D. Goltzsche, TU Braunschweig, Germany DSN’18: EndBox Page 17 Institute of Operating Systems and Computer Networks