Protecting Insecure Communications with Topology-aware Network - - PowerPoint PPT Presentation

protecting insecure communications with topology aware
SMART_READER_LITE
LIVE PREVIEW

Protecting Insecure Communications with Topology-aware Network - - PowerPoint PPT Presentation

Protecting Insecure Communications with Topology-aware Network Tunnels Georgios Kontaxis Angelos D. Keromytis Department of Computer Science Columbia University, USA Clients securing their traffic to a server TLS unavailable at the server


slide-1
SLIDE 1

Protecting Insecure Communications with Topology-aware Network Tunnels

Georgios Kontaxis

Angelos D. Keromytis Department of Computer Science Columbia University, USA

slide-2
SLIDE 2

kontaxis@cs.columbia.edu

Clients securing their traffic to a server

  • TLS unavailable at the server
  • Minimize the unencrypted network path on the Internet
  • Without the server’s participation
  • Not a substitute for TLS!

2

slide-3
SLIDE 3

kontaxis@cs.columbia.edu

Limited adoption of transport layer security

  • Top 10K sites (Alexa)
  • Only 32% support HTTPS
  • Only 15% redirect HTTP to HTTPS

3

HTTPS response HTTPS? % # 1 Error (Conn. refused) No 21.4 2144 2 Error (Invalid cert.) No 22.1 2205 3 Error (HTTP 4xx 5xx) No 2.9 292 4 HTTPS downgraded No 21.5 2152 Total No 67.9 6793 5 OK Yes 17.0 1695 6 OK (HTTP upgraded) Yes 15.1 1512 Total Yes 32.1 3207

slide-4
SLIDE 4

kontaxis@cs.columbia.edu

Imperfect deployment of TLS

  • Implementation vulnerabilities threaten user security
  • Users cannot rely on websites to patch themselves up
  • 45% of servers affected by FREAK vulnerable 9 months later
  • DROWN affects a TLS 1.2 client because server supports SSLv2

4

FREAK POODLE Heartbleed RC4 BEAST DROWN

slide-5
SLIDE 5

kontaxis@cs.columbia.edu

Short network paths minimize the attack surface

  • kontaxis@austria$ traceroute www.nytimes.com
  • 1. EDIS GmbH (AT)
  • 2. RETN Limited (UK)
  • 3. NTT America, Inc. (US)
  • 4. Fastly (US)
  • kontaxis@ec2-us-east-1$ traceroute www.nytimes.com
  • 1. Amazon Inc. (US)
  • 2. Fastly (US)

5

AS 1 Client Server A AS 2 AS n

slide-6
SLIDE 6

kontaxis@cs.columbia.edu

Web services are clustered in the cloud

  • Cloud networks host the majority of web services
  • Excellent vantage point to browse the web
  • Users have access to Virtual Machines in the cloud

6

% Autonomous System Name 17.1 Akamai Technologies, Inc. 13.9 Amazon.com, Inc. 11.4 CloudFlare, Inc. 9.9 Google Inc. 3.7 EdgeCast Networks, Inc. 2.9 SoftLayer Technologies Inc. 2.1 Fastly 1.7 Tinet SpA 1.6 Internap Network Services Corp. 1.5 Rackspace Hosting 65.8 Total

slide-7
SLIDE 7

kontaxis@cs.columbia.edu

Cloud networks are the gateway to Internet services

7

Server A Cloud Provider 1 Server B Cloud Provider 2 AS x AS y AS 1 Client

slide-8
SLIDE 8

kontaxis@cs.columbia.edu

Proposed overlay of encrypted tunnels with the cloud

  • We replace multi-hop plain-text links with encrypted tunnels

8

Server A Cloud Provider 1 Server B Cloud Provider 2 AS x AS y AS 1 Client Server A Cloud Provider 1 Server B Cloud Provider 2 Client Topology-aware Tunnel 1 Topology-aware Tunnel 2

slide-9
SLIDE 9

kontaxis@cs.columbia.edu

Topology-aware Network Tunnels (TNT)

  • Routing through the tunnel closest to the server

9

Server A Cloud Provider 1 Server B Cloud Provider 2 AS x AS y AS 1 Client Server A Cloud Provider 1 Server B Cloud Provider 2 Client Topology-aware Tunnel 1 Topology-aware Tunnel 2

slide-10
SLIDE 10

kontaxis@cs.columbia.edu

Cloud Provider 1 Cloud Provider 2 Client Topology-aware Tunnel 1 Topology-aware Tunnel 2 AS z

TNT establishes links to popular cloud networks

10

slide-11
SLIDE 11

kontaxis@cs.columbia.edu

  • Initially traffic is routed through a tunnel at random

Server A Cloud Provider 1 Cloud Provider 2 Client Topology-aware Tunnel 1 Topology-aware Tunnel 2 AS z

Given a destination TNT maps the available paths

11

Dest GW Metric Any Any

slide-12
SLIDE 12

kontaxis@cs.columbia.edu

  • Active, passive network measurements identify the shortest path

Server A Cloud Provider 1 Cloud Provider 2 Client Topology-aware Tunnel 1 Topology-aware Tunnel 2 AS z

TNT evaluates the available paths to a destination

12

Dest GW Metric Any Any A Tun 1 1 A Tun 2 2

slide-13
SLIDE 13

kontaxis@cs.columbia.edu

  • TNT starts routing packets through the shortest path in real time

Server A Cloud Provider 1 Cloud Provider 2 Client Topology-aware Tunnel 1 Topology-aware Tunnel 2 AS z

TNT makes routing decisions to minimize plain-text traffic

13

Dest GW Metric Any Any A Tun 1 1 A Tun 2 2

slide-14
SLIDE 14

kontaxis@cs.columbia.edu

Insecure network paths are minimized

  • Tunnel exit in the same network as a web server
  • Zero traffic exposure to the Internet
  • Tunnels to AWS, Azure are colocated with 20% of web services

14

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 1 2 3 4 5 CDF Autonomous systems making up the network path to a web service

TNT-cloud ISP-US-E Uni-US-E ISP-EU-W

slide-15
SLIDE 15

kontaxis@cs.columbia.edu

Insecure network paths are minimized

  • Tunnel exit in a network near the web server
  • Minimal traffic exchange outside the cloud
  • TNT paths are always shorter than the native path

15

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 1 2 3 4 5 CDF Autonomous systems making up the network path to a web service

TNT-cloud ISP-US-E Uni-US-E ISP-EU-W

slide-16
SLIDE 16

kontaxis@cs.columbia.edu

TNT preserves the browsing experience

  • Page load time and latency do not deviate from the baseline
  • Used the network at Columbia University for comparison

16

200 400 600 800 1000 1200 1 10 100 1000 Round-trip Time (ms) Web servers Baseline routing TNT routing 1000 1100 1200 1300 1400 1500 1600 1700 1800 1900 2000 100 200 300 400 500 600 700 800 900 1000 Page Load time (ms) Web pages Baseline routing TNT routing

slide-17
SLIDE 17

kontaxis@cs.columbia.edu

Topology-aware network tunnels

  • An overlay of encrypted links to key network infrastructure
  • Motivated by the clustering of services in the cloud
  • Minimize plain-text traffic on the Internet
  • Without the cooperation of individual services
  • Put clients in control of their security
  • Deployable using existing technologies and resources

17

slide-18
SLIDE 18

Find out more about TNT

https://www.cs.columbia.edu/~kontaxis/tnt/ kontaxis@cs.columbia.edu

Server A Cloud Provider 1 Server B Cloud Provider 2 AS x AS y AS 1 Client Topology-aware Tunnel 1 Topology-aware Tunnel 2 AS z Server C