SVLAN: Secure & Scalable Network Virtualization Jonghoon Kwon, - - PowerPoint PPT Presentation

svlan secure scalable network virtualization
SMART_READER_LITE
LIVE PREVIEW

SVLAN: Secure & Scalable Network Virtualization Jonghoon Kwon, - - PowerPoint PPT Presentation

SVLAN: Secure & Scalable Network Virtualization Jonghoon Kwon, Taeho Lee, Claude Hhni, Adrian Perrig ETH Zrich, Network Security Group Jonghoon Kwon, Ph.D | | 25.02.2020 1 Current Inter-domain Network Virtualization: VLAN PM PM PM


slide-1
SLIDE 1

| |

Jonghoon Kwon, Taeho Lee, Claude Hähni, Adrian Perrig ETH Zürich, Network Security Group

25.02.2020 1

SVLAN: Secure & Scalable Network Virtualization

Jonghoon Kwon, Ph.D

slide-2
SLIDE 2

| | 25.02.2020 Jonghoon Kwon, Ph.D 2

Current Inter-domain Network Virtualization: VLAN

PM PM

Virtual LAN (IEEE 802.1q)

Layer-2 bridging Supporting apx. 4 K virtual networks with a 12-bit VID value

PM PM

Internet

ETH | VLAN | IP | Data VID 101 VID 102

slide-3
SLIDE 3

| | 25.02.2020 Jonghoon Kwon, Ph.D 3

Current Inter-domain Network Virtualization: VXLAN

VM VM Hypervisor

Internet

Edge Network

Virtual eXtensible LAN

Supporting 16 M virtual networks with a 24-bit VNI value Interconnecting layer-2 networks over an underlying layer-3 network

VTEP VM VM Hypervisor Core Network VTEP

ETH | IP | Data VXLAN tunnel Outer ETH | Outer IP | Outer UDP | VXLAN | ETH | IP | Data ETH | IP | Data VNI 1001 VNI 1002

slide-4
SLIDE 4

| | 25.02.2020 Jonghoon Kwon, Ph.D 4

Adversarial Model and Desired Properties

Compromise Network Isolation Disrupt Virtual Network Security Scalability Flexibility

slide-5
SLIDE 5

| | 25.02.2020 Jonghoon Kwon, Ph.D 5

VXLAN: Insufficient Security

VM VM Hypervisor

Internet

VTEP VM VM Hypervisor VTEP

Trusted Trusted Untrusted

Outer ETH | Outer IP | Outer UDP | VXLAN | ETH | IP | Data

Attackers may manipulate VNIs and forward malicious traffic

Edge Network Core Network

slide-6
SLIDE 6

| | 25.02.2020 Jonghoon Kwon, Ph.D 6

VXLAN: Scalability Constraints

VM VM Hypervisor VTEP VM VM Hypervisor VTEP VM VM VM VM VM VM VM

Internet

Edge Network Core Network

slide-7
SLIDE 7

| | 25.02.2020 Jonghoon Kwon, Ph.D 7

VXLAN: Insufficient Flexibility

VM VM Hypervisor VTEP VM VM Hypervisor VTEP

Internet

Edge Network Core Network

slide-8
SLIDE 8

| | 25.02.2020 Jonghoon Kwon, Ph.D 8

VXLAN: Insufficient Flexibility

VM VM Hypervisor VTEP VM VM Hypervisor VTEP

Internet

Edge Network Core Network

slide-9
SLIDE 9

| | 25.02.2020 Jonghoon Kwon, Ph.D 9

Challenges and Countermeasures

Intra-domain Properties

  • Host-level granularity
  • Limited number of VNI
  • Frequent VNI update

Inter-domain Properties

  • Insecure overlay tunneling
  • ARP broadcast
  • State routing

Intra-domain network slicing (Destination-driven connectivity)

  • Application-level granularity
  • Unlimited virtual group
  • Centralized management

Verifiable Inter-domain routing (Packet-carrying forwarding state)

  • Crypto-based protection
  • Separation of control & data plane
  • Stateless routing
slide-10
SLIDE 10

| | 25.02.2020 10

Our Vision on Secure and Scalable Network Virtualization

Jonghoon Kwon, Ph.D

Untrusted Network Untrusted Network

Edge network Core network

Mobile Slice IoT Slice Mission critical Slice

slide-11
SLIDE 11

| | 25.02.2020 11

SVLAN (Secure & Scalable Virtual LAN) Overview

Jonghoon Kwon, Ph.D

VM VM Hypervisor SVTEP

Receiver

VM VM Hypervisor SVTEP

Sender Authorization Delegate

SVLAN tunnel

Verifier

slide-12
SLIDE 12

| | 25.02.2020 12

Express Receiver’s Consent

Jonghoon Kwon, Ph.D

VM VM Hypervisor SVTEP VM VM Hypervisor SVTEP

Receiving Policy

Receiver Sender

slide-13
SLIDE 13

| | 25.02.2020 13

Acquiring Receiver’s Consent

Jonghoon Kwon, Ph.D

VM VM Hypervisor SVTEP VM VM Hypervisor SVTEP

Authorization request

Receiver Sender

slide-14
SLIDE 14

| | 25.02.2020 14

Acquiring Receiver’s Consent

Jonghoon Kwon, Ph.D

VM VM Hypervisor SVTEP VM VM Hypervisor SVTEP

Authorization Proof Path Segments + Authorization Proof

Receiver Sender

slide-15
SLIDE 15

| | 25.02.2020 15

SVLAN Packet Forwarding

Jonghoon Kwon, Ph.D

VM VM Hypervisor SVTEP VM VM Hypervisor SVTEP

Path Segment + Authorization Proof + Data

Receiver Sender

slide-16
SLIDE 16

| | 25.02.2020 16

Verifying the Validity of Packets

Jonghoon Kwon, Ph.D

VM VM Hypervisor SVTEP VM VM Hypervisor SVTEP

Path Segment + Authorization Proof + Data

Receiver Sender

slide-17
SLIDE 17

| | 25.02.2020 Jonghoon Kwon, Ph.D 17

Proof-of-Concept Implementation in SCIONLab

SCIONLab: Global Future Internet Testbed

Secure and fine-grained inter-domain segment routing Testbed distributed across the world

https://github.com/scionproto/scion https://www.scionlab.org

slide-18
SLIDE 18

| | 25.02.2020 Jonghoon Kwon, Ph.D 18

Cracking the Authorization Proof is Impractical

Brute-force attack would require 60000 years

  • n 100 Gbps line to break 64-bit MAC
slide-19
SLIDE 19

| | 25.02.2020 Jonghoon Kwon, Ph.D 19

No Significant Bandwidth Overhead

§ SR-MPLS

§ 36 bytes of additional header

§ 12 bytes of MPLS labels (three labels) § 24 bytes of proof

§ SCION

§ 60 bytes of additional header

§ 24 bytes of forwarding paths (three labels) § 32 bytes of extra header

slide-20
SLIDE 20

| | 25.02.2020 Jonghoon Kwon, Ph.D 20

Small Forwarding Performance Overhead

iMIX profiles the proportion of packets of a certain size based on statistical sampling from actual Internet traces

slide-21
SLIDE 21

| | 25.02.2020 Jonghoon Kwon, Ph.D 21

Latency Inflation Measurements in Cloud

Authorization Delegate Sender Receiver

14 Amazon EC2 instances

Select 3 instances as the sender, receiver, and authorization delegate Measure the latency for TTFP (Time to First Packet)

slide-22
SLIDE 22

| | 25.02.2020 Jonghoon Kwon, Ph.D 22

Latency Inflation with AD on Amazon Cloud

< 75% of latency inflation

slide-23
SLIDE 23

| | 25.02.2020 Jonghoon Kwon, Ph.D 23

Large-scale Simulation

slide-24
SLIDE 24

| | 25.02.2020 Jonghoon Kwon, Ph.D 24

SVLAN, Expected Benefits

§ Highly scalable network virtualization

§ Unlimited number of VNI § Stateless VTEP

§ Secure isolation from unwanted traffic

§ Only authorized packets get forwarded § Adversaries cannot impersonate authorized senders

§ Flexible network management

§ Receiving policy at different granularity § Easy update for virtual network

§ Reducing network overhead

§ No ARP flooding § Negligible latency influence

slide-25
SLIDE 25

Thank you!

SVLAN: Secure & Scalable Network Virtualization

Jonghoon Kwon, Taeho Lee, Claude Hähni, Adrian Perrig (jong.kwon@inf.ethz.ch) ETH Zurich Network Security Group Universitätstrasse 6 8092 Zürich https://netsec.ethz.ch

slide-26
SLIDE 26

| | 1.12.2014 First name Surname (edit via “Insert” > “Header & Footer”) 26

Backup Slides

slide-27
SLIDE 27

| | 25.02.2020 27

Implementation Example

Jonghoon Kwon, Ph.D

SVLAN header format on SCION

slide-28
SLIDE 28

| | 25.02.2020 28

Practical Consideration

Jonghoon Kwon, Ph.D

Location of Authorization Delegates

VM VM SVTEP

Sender

Hypervisor VM VM Hypervisor SVTEP

Receiver

Receiver’s AS Third party entity (Cloud)

slide-29
SLIDE 29

| | 25.02.2020 29

Practical Consideration

Jonghoon Kwon, Ph.D

Location of Verifiers Receiver Receiver’s AS Sender’s AS Third party entity (Cloud)

VM VM SVTEP

Sender

Hypervisor VM VM Hypervisor SVTEP

Receiver