150 likes | 328 Views
Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01. Se Gi Hong & Henning Schulzrinne Columbia University. Overview of PBS. Objective Preventing Denial-of-Service (DoS) attacks and other forms of unauthorized traffic. Network traffic authorization
E N D
Permission-Based Sending (PBS) NSLP: Network Traffic Authorizationdraft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne Columbia University IETF 72 - NSIS
Overview of PBS • Objective • Preventing Denial-of-Service (DoS) attacks and other forms of unauthorized traffic. • Network traffic authorization • A sender has to receive permission from the intended receiver before it injects any packets into the network. • Permission represents the authority to send data. • Deny-by-default • In the closed network (all end users have PBS NSLP functionalities) • The unauthorized traffic without permission is dropped at the first router by default. • In the open Internet (some end users do not have PBS NSLP functionalities) • The traffic from the end users who do not have PBS NSLP functionalities are rate-limited by default. IETF 72 - NSIS
Design Overview • Distributed system • The permission is granted by the intended receiver of a data flow. • Signaling installs and revokes the permission state of routers for data flows. • Stateful system • A subset of routers keeps state for a data flow and monitors whether the flow is authorized. • Deployable system • PBS can be applied to current networks. • The PBS does not change IP and TCP/UDP packet header. • Existing security protocol is used. • IPsec • Scalable system • Not all routers need to be aware of PBS. • Reduce computational overhead. • Only the data packets from senders who are affected by the attacks use IPsec. IETF 72 - NSIS
Design Overview • DoS defense mechanism • DoS detection mechanism • PBS Detection Algorithm (PDA) can detect DoS attacks. • PDA uses signaling messages to monitor the attacks. • Reaction mechanism against DoS attacks • Limited permission • Limited permission prevents overflow of data packets. • IPsec Authentication Header (AH) • For the authentication and integrity of data packets. • Changing data path • To avoid a compromised router that drops legitimate packets. IETF 72 - NSIS
Three Components of the PBS NSLP Architecture • Path-coupled (on-path) signaling component • Installs and maintains permission state. • Monitors attacks, and triggers reaction mechanism against the attacks. • Authentication of signaling message is protected by IPsec AH. • Authorization component • Decides whether to grant permission (amount of data volume) for a flow • Detects and identifies the attack by PDA. • Decides the reaction mechanism against the attacks. • e.g., IPsec AH for data packet, changing data flow path • Traffic management component • Screens the data packets to see whether the data packets are authorized. • Drops the unauthorized packets using IP packet filter. • Calculates the volume of the data to monitor data flow. • Verifies the authentication of packets. IETF 72 - NSIS
PBS NSLP Signaling Message • Two-way handshake • Query message • Sent by a sender to request permission • Requested application is described • Rate-limited by proof-of-work • Permission message • Sent by a receiver • Sets up (grants), removes (revokes) and modifies permission state • Triggers reaction mechanism against the attacks • Soft-state • The permission state is refreshed periodically by a soft-state mechanism IETF 72 - NSIS
PBS Detection Algorithm (PDA) • Monitoring DoS attack • Use existing PBS NSLP messages (Query/Permission messages) • Use soft-state mechanism to periodically monitor the data flow • Basic operation of PDA • Query message sent by a sender contains the number of bytes that the sender has sent since the permission was granted • The receiver compares the number of bytes in the Query message and the number of bytes that the receiver has actually received • If there is a difference, the signaling message (Permission message) triggers the reaction mechanism IETF 72 - NSIS
Back-up slides IETF 72 - NSIS
On-path signaling Authorization PBS NSLP Processing NTLP (GIST) Processing Traffic Management Data flow Signal flow Control and configuration PBS NSLP Architecture IETF 72 - NSIS
Query Message • Message type flag (M) • Set to M=0 to indicate the message is the Query message • Flow identifier • Descriptor of data flow • Source IP address, destination IP address, protocol identifier, higher (port) addressing, flow label, SPI field, DSCT/TOS field. • Requested volume (RV) • The number of bytes that a sender requests. • Volume information (V) • The number of bytes that a sender has sent since the sender received the permission from the intended receiver. • It is used to monitor the DoS attacks. • Public key (Ks) • The sender’s public key for the authentication of signaling packets. • An X.509 certificate is used for the digital signature. • Cryptography algorithm (C) • Cryptography algorithm to be used for the authentication field in IPsec AH. • C=00: RSA, C=01: DSA, C=10: ECDSA IETF 72 - NSIS
Permission Message • Message type flag (M) • Set to M=1 to indicate the message is the Permission message • Flow identifier • Allowed volume (AV) • The number of bytes that a receiver grants a sender for the request. • Time limit (TTL) • Time limit for the permission of the data flow. • Refresh period (T) • Used for the soft-state of the permission. • Solution flags (S) • S=00: No reaction, S=01: IPsec AH with HMAC, S=10: IPsec AH with public key cryptography for the data flow. S=11: The sender needs to change data path. • Public key (Kr) • The receiver’s public key for the authentication of signaling packets. • An X.509 certificate is used for the digital signature. • Cryptography algorithm (C) • Cryptography algorithm to be used for the authentication field in IPsec AH. IETF 72 - NSIS
Data flow Signal flow R1 Receiver R2 Sender Data flow 3 Q (M, FID, RV, V, Ks, C) Q (M, FID, RV, V, Ks, C) Q (M, FID, RV, V, Ks, C) 1 P (M, FID, AV, TTL, T, S, Kr, C) P (M, FID, AV, TTL, T, S, Kr, C) P (M, FID, AV, TTL, T, S, Kr, C) 2 T Q (M, FID, RV, V, Ks, C) Q (M, FID, RV, V, Ks, C) Q (M, FID, RV, V, Ks, C) 4 P (M, FID, AV, TTL, T, S, Kr, C) P (M, FID, AV, TTL, T, S, Kr, C) P (M, FID, AV, TTL, T, S, Kr, C) 5 Basic Operation of PBS NSLP IETF 72 - NSIS
A (Attacker spoofing S’s address) Signal flow Attack flow (2MB) R2 R3 Receiver R1 4 Sender Data flow (1MB) 3 Query Query Query Query 1 Permission (AV=10MB) Permission (AV=10MB) Permission (AV=10MB) Permission (AV=10MB) 2 Detect attack (1MB Vs 3MB) T Query (V=1MB) Query (V=1MB) Query (V=1MB) Query (V=1MB) 5 Permission (S=10) Permission (S=10) Permission (S=10) Permission (S=10) 6 Basic Operation of PDA Data flow IETF 72 - NSIS
Data flow Signal flow (Attacker, Drop attack) R2 R1 R3 Receiver Sender Query Query 1 Query Query 2 Change data flow path Detection of Black Hole Attack T.O. T.O. IETF 72 - NSIS
Data flow Signal flow (Attacker, Drop attack) R1 R3 R2 Receiver Sender Data flow (1MB) Data flow (1MB) 3 Query Query Query Query 1 Permission (AV=10MB) Permission (AV=10MB) Permission (AV=10MB) Permission (AV=10MB) 2 Detect attack (1MB Vs 0MB) T Query (V=1MB) Query (V=1MB) Query (V=1MB) Query (V=1MB) 4 Permission (S=11) Permission (S=11) Permission (S=11) Permission (S=11) 5 Detection of Dropping Only Data Packets IETF 72 - NSIS