scion control plane overview
play

SCION: Control Plane Overview Adrian Perrig Network Security Group, - PowerPoint PPT Presentation

SCION: Control Plane Overview Adrian Perrig Network Security Group, ETH Zrich SCION Control Plane Overview Control plane: How to find and distribute end-to-end paths [Chapter 2.1, Chapter 7] Path exploration Path registration


  1. SCION: Control Plane Overview Adrian Perrig Network Security Group, ETH Zürich

  2. SCION Control Plane Overview ▪ Control plane: How to find and distribute end-to-end paths 
 [Chapter 2.1, Chapter 7] ▪ Path exploration ▪ Path registration ▪ Path lookup ▪ Security and reliability aspects ▪ Service anycast ▪ SCION control message protocol (SCMP) 2

  3. Reminder: SCION Isolation Domain (ISD) I J T U A B K M V Y Z W L X C E N P C’ D B’ O A’ F H E’ D’ S Q G R 3

  4. Intra-ISD Path Exploration: Beaconing ▪ Core ASes K, L, M initiate Path- segment Construction Beacons (PCBs), or “beacons” K M ▪ PCBs traverse ISD as a policy- L constrained multi-path flood N P ▪ Each AS receives multiple PCBs O representing path segments to a core AS S Q ▪ Each PCB can be used as an up- R path segment to communicate with core AS 4

  5. Beaconing in More Detail ▪ Each AS deploys one or multiple beacon servers K M ▪ PCBs are sent via a SCION service anycast packet L ▪ SCION border routers receive PCB N P and select one beacon server to O forward it to ▪ Beacon servers coordinate to re- S Q send PCBs periodically to Border router downstream ASes R Beacon server ▪ Currently every 5 seconds, PCBs are selected and forwarded 5

  6. PCB Contents ▪ A PCB contains an info field with: ▪ PCB creation time K M 3 ▪ Each AS on path adds: 2 1 M: L • Info field ▪ AS name • Timestamp • ISD: Blue • Hop field 1 2 ▪ Hop field for data-plane • Out: 1 N P • Expiration, MAC 4 • Signature 3 forwarding O P: • Hop fields • In: 2, Out: 3 ▪ Link identifiers • Peering: 4, Out: 3 • Expiration, MAC • Signature S Q ▪ Expiration time ▪ Message Authentication Code R (MAC) ▪ AS signature 6

  7. Path Server Infrastructure ▪ Path servers offer lookup service: ▪ ISD, AS → down-path segments, core- path segments ▪ Local up-path segment request → up- path segments to core ASes K M ▪ Core ASes operate core path server infrastructure L ▪ Consistent, replicated store of down- path segments and core-path segments N P ▪ Each non-core AS runs local path servers O ▪ Serves up-path segments to local clients ▪ Resolves and caches response of S Q remote AS lookups Border router R Beacon server Path server 7

  8. Down-Path Segment Registration ▪ Each AS’ beacon servers select path segments that they wants to announce K M as down-path segments L for others to use to N P communicate with AS O ▪ Beacon servers upload S Q the selected down-path segments to path servers R in core ASes 8

  9. Up-Path Segment Registration ▪ Each AS’ beacon servers select path segments that they wants to announce as K M up-path segments for local L hosts to communicate N P with other AS O ▪ Beacon servers send the selected up-path S Q segments to local path R servers 9

  10. Core Beaconing for Inter-ISD Path Exploration T: • Info field • Timestamp • ISD: Orange I J • Hop field 4 3 5 2 • Out: 7 1 • Expiration, MAC 8 1 T U • Signature 2 7 3 6 M: 5 4 • Hop field • In: 2, Out: 1 A B • Expiration, MAC 1 2 • Signature K M V 3 6 J: Y Z 5 4 • Hop field W L • In: 5 X • Expiration, MAC C E • Signature C’ N P D B’ O A’ F H E’ D’ S Q G R 10

  11. Inter-ISD Path Exploration: 
 Sample Core Paths from AS T I J T U A B K M V Y Z W L X C E C’ N P D B’ O A’ F H E’ D’ S Q G R 11

  12. Path Lookup: Local ISD ▪ Client requests path segments to <ISD, AS> from local path server ▪ If down-path segments are not locally K M cached, local path server send request L to core path server ▪ Local path server replies N P O ▪ Up-path segments to local ISD core ASes S Q ▪ Down-path segments to <ISD, AS> ▪ Core-path segments as needed to R connect up-path and down-path segments 12

  13. Path Lookup: Remote ISD ▪ Host contacts local path server requesting <ISD, T AS> U ▪ If path segments are not cached, local path server K M V will contact core path Y Z server W L X ▪ If core path server does not have path segments C’ N P B’ cached, it will contact O A’ remote core path server E’ ▪ Finally, host receives up-, D’ S Q core-, and down-segments Border router R Beacon server Path server 13

  14. How to Secure PCB Dissemination ▪ Assumptions ▪ Each AS has certificate: {AS, K AS , expiration} KcoreAS ▪ Talks on SCION PKI and control-plane PKI provide more detail on how this works ▪ Beacon servers know relevant AS certificates ▪ Each PCB is signed by core AS that issues it ▪ Each AS that resends PCB signs updated PCB ▪ Note: data-plane information (hop fields) are protected with efficient Message Authentication Code 14

  15. Failed Interface Detection ▪ Border routers send periodic keep-alive message to neighboring border routers ▪ Received keep-alive messages are disseminated to all internal T U beacon server instances ▪ After a threshold number of V Y keep-alive messages are W X missing, link is declared inactive Border router Beacon server Path server 15 Keep-alive message

  16. Secure Path Revocation ▪ Each AS adds a Revocation Token (RT) to the PCB ▪ RTs enable efficient authentication of link revocation messages from corresponding AS ▪ When packet reaches a border router that cannot forward the packet, router sends a link revocation message back to host ▪ Host re-distributes revocation message to path and beacon servers, to remove path segments containing broken links ▪ Section 7.3 in SCION book describes this process in detail 16

  17. Service Anycast ▪ To support service-based communication, SCION offers service anycast K M ▪ Service address type used as a L packet’s destination address ▪ An up-path segment can be included, N P and a service anycast extension can O indicate in which ASes the request should be considered S Q ▪ Border routers determine if the R packet should be sent to a server instance in the AS 17

  18. Failure Resilience and Service Discovery ▪ For reliability, control-plane infrastructure services rely on a consistency service with the following properties ▪ Leader election ▪ Group membership list ▪ Distributed consistent database ▪ Currently, we are using Apache Zookeeper for this purpose ▪ Discovery service provides list of active server instances ▪ Combination of information from consistency service and static configurations 18

  19. Failure Resilience: Beacon Service ▪ All AS beacon server instances connect to consistency service and appear as group members ▪ Leader election algorithm determines master beacon server ▪ PCBs are disseminated with a SCION service address as the destination address ▪ SCION border router will select one running beacon server instance to deliver PCB to ▪ Receiving beacon server instance re-distributes PCB to all other instances via the consistency service’s distributed database ▪ Master beacon server disseminates PCBs and registers up-path segments at local path server, and down-path segments at core path servers 19

  20. Failure Resilience: Path Service ▪ All AS path server instances connect to consistency service and appear as group members ▪ Leader election algorithm determines master path server in a core AS ▪ No leader election in non-core AS ▪ Path replication within core AS ▪ To handle high load, down-path segment registrations are not disseminated by consistency service ▪ Instead, non-master path servers fetch down-path segments from master path server and push registered down-path segments to master path server ▪ Down-path segment registrations are also sent to a path server of each core AS ▪ Path replication within non-core AS ▪ Non-core path servers use consistency service for up-path segment replication 20

  21. SCION Control Message Protocol (SCMP) ▪ SCMP is analogous to ICMP in the current Internet and provides: ▪ Network diagnostic: SCION equivalents of ping or traceroute ▪ Error messages: signal problems with packet processing or inform end hosts about network-layer problems ▪ SCMP is the first secure control message protocol we are aware of ▪ Asymmetric authentication (AS certificates) or symmetric authentication (DRKey) are supported 21

  22. For More Information … ▪ … please see our web page: 
 www.scion-architecture.net ▪ Chapter 7 of our book “SCION: A secure Internet Architecture” ▪ Available from Springer this Summer 2017 ▪ PDF available on our web site 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend