Through the Wormhole: Yves V ANAUBEL Tracking Invisible MPLS Pascal - - PowerPoint PPT Presentation

through the wormhole
SMART_READER_LITE
LIVE PREVIEW

Through the Wormhole: Yves V ANAUBEL Tracking Invisible MPLS Pascal - - PowerPoint PPT Presentation

November 1st, 2017 Through the Wormhole: Yves V ANAUBEL Tracking Invisible MPLS Pascal M RINDOL Jean-Jacques P ANSIOT Tunnels Benoit D ONNET Agenda MPLS background Invisible MPLS tunnels Measurement Campaign and Results Agenda


slide-1
SLIDE 1

November 1st, 2017

Through the Wormhole: Tracking Invisible MPLS Tunnels

Yves VANAUBEL Pascal MÉRINDOL Jean-Jacques PANSIOT Benoit DONNET

slide-2
SLIDE 2

Agenda

❖ MPLS background ❖ Invisible MPLS tunnels ❖ Measurement Campaign and Results

slide-3
SLIDE 3

Agenda

❖ MPLS Background

  • Label Stack Entries
  • MPLS Network

❖ Invisible MPLS tunnels ❖ Measurement Campaign and Results

slide-4
SLIDE 4

MPLS Label Stack Entries

❖ Label Stack Entries (LSE) :

  • 32 bits
  • Inserted between the MAC and the IP layer

Label TTL TC S 7 15 23 31

  • Label : Label value, 20 bits
  • TC: Traffic Class field, 3 bits
  • S: Bottom of stack, 1 bit
  • TTL: Time To Live, 8 bits
slide-5
SLIDE 5

MPLS Network

ISP X ISP A

1.1.1.0/24

ISP B

2.2.2.0/24

Source

1.1.1.1

Destination

2.2.2.2

IP/to:2.2.2.2 IP/to:2.2.2.2 IP/to:2.2.2.2 IP/to:2.2.2.2 Ingress LSR (LER) Egress LSR (LER) FH LSR LSR LH LSR LSP LSR : Label Switching Router LER : Label Edge Router LSP : Label Switched Path UHP : Ultimate Hop Popping PHP : Penultimate Hop Popping 4 5 3 Label Distribution Protocol (LDP)

slide-6
SLIDE 6

Agenda

❖ MPLS Background ❖ Invisible MPLS tunnels

  • Definition
  • Impact on the Topology Inference
  • Revelation

❖ Measurement Campaign and Results

slide-7
SLIDE 7

MPLS Tunnel Discovery

❖ Classical MPLS tunnels can be revealed based on standard active

measurement tools (traceroute)

❖ Two features are required:

  • ICMP extension ([RFC4950]):

✓ If an MPLS router must forge an ICMP time exceeded message,

it should quote the MPLS LSE into it.

  • TTL propagation ([RFC3443]):

✓ The ingress router of an MPLS tunnel should initialize the

LSE-TTL with the value inside the IP-TTL field.

✓ The opposite operation is done by the egress LER.

slide-8
SLIDE 8

Explicit Tunnels

❖ The two options are enabled ❖ This kind of tunnel is perfectly visible with traceroute

LSP R1 R2 R3 R4 R5 Source Destination

Traceroute output:

  • 1. R1
  • 2. R2 - MPLS tag
  • 3. R3 - MPLS tag
  • 6. Destination
  • 4. R4 - MPLS tag
  • 5. R5

PHP

Ingress LER Egress LER

slide-9
SLIDE 9

Invisible Tunnels

❖ With invisible tunnels, the TTL propagation is disabled ❖ Only ingress/egress LERs visible

LSP R1 R2 R3 R4 R5 Source Destination

Traceroute output:

  • 1. R1
  • 3. Destination
  • 2. R5

R2 R3 False IP link (R1 → R5) inference!

Ingress LER Egress LER

slide-10
SLIDE 10

Impact on the Topology Inference

❖ Internal MPLS routers are hidden from traceroute ❖ An entry point of an MPLS network appears as the neighbor of

all exit points

❖ The whole layer-3 network turns into a dense mesh of High

Degree Nodes (HDN)

Hidden MPLS Cloud Entry Degree = 6

slide-11
SLIDE 11

High Degree Node

❖ A node is a HDN if it has at least 128 neighbors

  • 128 is a lower bound relative to well-known physical

provider edge hardware

  • Reasonable balance between the volume of probes

sent and the amount of interesting data collected

slide-12
SLIDE 12

Invisible Tunnels - Revelation

❖ Direct Path Revelation (DPR)

  • For networks not using MPLS for internal routing
  • Mostly Juniper devices (default behavior)

❖ Backward Recursive Path Revelation (BRPR)

  • For networks using MPLS for all prefixes (internal

and external)

  • Mostly CISCO routers (default behavior)
slide-13
SLIDE 13

Direct Path Revelation (DPR)

VP CE1 PE1 CE2 PE2 P1 P2 P3 Forward Egress LSP PHP IP TTL not modified DST

AS1 AS3 AS2

traceroute from VP to DST: 1 CE1 18.317 ms 2 PE1 34.508 ms 3 PE2 97.529 ms 4 CE2 107.050 ms 5 DST 131.278 ms traceroute from VP to PE2: 1 CE1 18.317 ms 2 PE1 34.508 ms 3 P1 58.521 ms 4 P2 73.981 ms 5 P3 85.190 ms 6 PE2 94.529 ms => Try to run a trace to an internal prefix and see if routers reveal themselves Simple IP forwarding if MPLS not used for internal traffic Return Ingress Forward Ingress Return Egress => HDN Juniper => HDN

slide-14
SLIDE 14

Backward Recursive Path Revelation (BRPR)

VP CE1 PE1 CE2 PE2 P1 P2 P3 LSP PHP IP TTL not modified DST

AS1 AS3 AS2

Path from VP to DST: CE1 18.317 ms PE1 34.508 ms traceroute from VP to PE2 reveals P3 => Try to run a trace to the egress router (internal prefix) MPLS is used for internal traffic, with PHP enabled PE2 97.529 ms CE2 107.050 ms DST 131.278 ms Return Ingress Forward Egress Return Egress Forward Ingress CISCO traceroute from VP to P3 reveals P2 traceroute from VP to P2 reveals P1 traceroute from VP to P1 does not reveal any new node => HDN => HDN => STOP

slide-15
SLIDE 15

Agenda

❖ MPLS background ❖ Invisible MPLS tunnels ❖ Measurement Campaign and Results

slide-16
SLIDE 16

❖ PlanetLab network ❖ 91 vantage points equally divided in 5 groups ❖ Selection of HDNs in CAIDA ITDK dataset ❖ Destinations set: HDNs and their neighbors, i.e. about 1.3M IP

addresses

❖ Destinations distributed amongst the 5 groups ❖ Scamper with paris-traceroute ❖ Each IP address in the traces pinged for fingerprinting ❖ About 19 days of measurement

Measurement Campaign

slide-17
SLIDE 17

Measurement Results

❖ 13,771 revealed invisible tunnels

  • 61% with DPR
  • 16% with BRPR
  • 23% with DPR/BRPR (1 hop, impossible to

discriminate between the two techniques)

❖ 5193 revealed public IP addresses

slide-18
SLIDE 18

Invisible Tunnels Length

5 10 15

  • Nb. Hops

500 1000 1500 2000 2500 3000

  • Nb. Egress Interfaces

DPR BRPR DPR or BRPR

slide-19
SLIDE 19

Impact of Invisible Tunnel on Internet Models

10 20 30 40

  • Nb. Neighbors

0.00 0.05 0.10 0.15 0.20

PDF

Invisible Visible

❖ Degree distribution

slide-20
SLIDE 20

Impact of Invisible Tunnel on Internet Models

❖ Path lengths

5 10 15 20 25 30

Path Length

0.00 0.02 0.04 0.06 0.08 0.10

PDF

Invisible Visible

slide-21
SLIDE 21

Conclusions

❖ New techniques to infer the presence and reveal

invisible MPLS tunnels

❖ Validation based on GNS3 emulations ❖ Gain knowledge on the internal architecture of opaque

MPLS ASes

❖ Help improving Internet models

slide-22
SLIDE 22

Conclusions

❖ Other techniques allow to infer the length of invisible

tunnels without revealing the content

  • Can be used as triggers before applying the revelation

methods

  • Allow a modification of traceroute to run hidden

MPLS tunnel revelations based on the triggers

❖ Dataset and GNS3 validation models publicly available:

http://www.montefiore.ulg.ac.be/~bdonnet/mpls