90 likes | 192 Views
ANCP Network Anti-Attack Updates. draft-fan-ancp-network-anti-attack-01 IETF 78 th , July. 25-30, 2010 Bo Wu ( wu.bo@zte.com.cn ) Liang Fan ( fan.liang2@zte.com.cn ) Bo Yuan ( yuan.bo3@zte.com.cn ) ZTE Corporation. Current Status. 01-version updates
E N D
ANCP Network Anti-Attack Updates draft-fan-ancp-network-anti-attack-01 IETF 78th , July. 25-30, 2010 Bo Wu (wu.bo@zte.com.cn ) Liang Fan ( fan.liang2@zte.com.cn ) Bo Yuan ( yuan.bo3@zte.com.cn) ZTE Corporation
Current Status • 01-version updates • Add 2 use cases based on comments from last meeting
Attacker Problem statement • Traditionally, network attacks from subscribers are detected at NAS site • Detection could be done by NAS or additional device, such as Firewall/DPI box. Centralized attacking detection & policy enforcement
Case 1: Control Message Attack • PPPoE/DHCP Control Message Attack • PPPoE PADI, DHCP discover, etc. • Could be a fake one or just replicated from the original one • Massive amount of packets per second • Influence to the NAS • All control message will be sent to the control plane • Though trigger the traffic managing policy on control plane, but will Loss of the legal control message of the same type • NAS will enforce ACL to rate-limit control packets from dedicated subscriber Attacker
Attacker Example: PADI Packet Attack • The attacker sends a large number of PADI Packets • The NAS receives these packets and sends the packets to its control plane • The PPP control plane on the NAS will be aware of the abnormal rate of control messages from a dedicated subscriber • The NAS sends the anti-attack policy to the AN.
Case 2: DOS Attack • DOS attack • SYN flood, fraggle, smurf, etc. • Towards the NAS & the network behind the NAS • Usually happened on a large number of hosts (synchronously) • Original Solution • Detected on the NAS site, by an internal or external DPI function module • Policies implemented on the NAS site Attacker
Example: SYN Flood Attack • The attacker sends a large number of SYN packets • The NAS will be aware of the SYN flood attack from the dedicated subscriber with or without an external box. • The NAS sends the anti-attack policy to the AN. Attacker
Conclusion • Use ANCP to dynamically trigger current available function on the AN. • MAC Black/White List • Send MAC black list of the attacking message, or MAC white list of the registered MAC addresses to the AN • MAC white list not applicable to enterprise user • MAC Table Size Limitation • Enable MAC learning limitation on the AN • MAC Rate Limitation • Limit upstream rate of a dedicated MAC on the AN • No influence to other hosts on the same access loop
Next steps • Need comments from work group Thank you