-
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
Module: Future of the Internet
Professor Trent Jaeger Penn State University
1
Module: Future of the Internet Professor Trent Jaeger Penn State - - PowerPoint PPT Presentation
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
1
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
2
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
3
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
4
1
Scalability,*Control*and*Isola2on*On* Next7Genera2on*Networks *
Xin$Zhang,$Hsu-Chun$Hsiao,$Geoff$Hasker,$$ Haowen$Chan,$Adrian$Perrig,$David$Andersen$
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
5
Applica'on* Transport* Data*link* Network* Physical*
3 "
Feb*2008:*Pakistani*ISP*hijacks*YouTube*prefix* Apr*2010:*A*Chinese*ISP*inserts*fake*routes* affec'ng*thousands*of*US*networks.* Nov*2010:*10%*of*Internet*traffic*'hijacked'*to* Chinese*servers*due*to*DNS*Tampering.*
SUBGP*origin * aXesta'on * SUBGP*route* aXesta'on * DNSSec * Mul'Upath* rou'ng * ! Fixes*to*date*–*ad*hoc,*patches* ! Inconvenient*truths*
" SUBGP:*delayed*convergence** " Global*PKI:*single*root*of*trust*
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
6
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
7
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
8
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
9
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
10
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
11
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
12
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
13
! Des&na&on*or*ISP*have*no*control*over*inbound*paths* ! Route*inconsistencies*
" Forwarding*state*may*be*different*from*announced*state*
D* C* A* B* M* D’s*prefix*here!*
5 "
Prefer*the** red*path*…*
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
14
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
15
7 "
…%…% …%…%
CMU% PSC% I2% L3% M% A;acks % (e.g.,%bad%routes) %
…%…%
D% C% A% B%
%…% ! %Isola0on%of%a;acks% ! %Scalable%and%reliable%rou0ng%updates% ! %Operate%with%mutually%distrus0ng%en00es%without%a%global%single% root%of%trust:%enforceable%accountability% …%…%
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
16
8 " 8 "
…%…% …%…%
CMU% PSC% I2% L3%
…%…%
D% C% A% B% Hide%the%peering%% link%from%CMU%
! Transit%ISPs,%source%and%desHnaHon%all%need%path%control%
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
17
9 "
CMU% PSC% Level%3% I2%
! Know%who%needs%to%be%trusted%
! Absence%of%consistency%in%BGP% prevents%knowing%exactly%who%needs% to%be%trusted% X% Y% Z% Who%will%forward% packets%on%my%path?% …%…% …%…% …%…%
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
18
trusted for any operation – Strong isolation from untrusted parties
– No single root of trust
10
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
19
Goal: each endpoint learns multiple verifiable paths to its core
! TD Core periodically initiates PCBs ! Providers advertise upstream topology to peering and customer ADs
! Collect PCBs ! For each neighbor AD, select which k PCBs to forward ! Update cryptographic information in PCBs
select k down-paths and up-paths
13
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
20
! Map to geographic, political, legal boundaries
! Route to other TDs ! Initiate path construction beacons ! Manage Address and Path Translation Servers ! Handle TD membership ! Root of trust for TD: manage root key and certificates
! Transit AD or endpoint AD
12
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
21
20 #
TD:(isola2on(of(route( computa2on ( TD(cores:(interconnected( large(ISPs (
Source( Des2na2on(
AD:(atomic( failure(unit (
core ( core (
Up%paths ( Down%paths (
Systems and Internet Infrastructure Security (SIIS) Laboratory Page
22
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
23