scion control plane overview
play

SCION: Control Plane Overview Adrian Perrig Network Security Group, - PowerPoint PPT Presentation

SCION: Control Plane Overview Adrian Perrig Network Security Group, ETH Zrich SCION Control Plane Overview Control plane: How to find and distribute end-to-end paths [Chapter 2.1, Chapter 7] Path exploration Path registration


  1. SCION: Control Plane Overview Adrian Perrig Network Security Group, ETH Zürich

  2. SCION Control Plane Overview ▪ Control plane: How to find and distribute end-to-end paths 
 [Chapter 2.1, Chapter 7] ▪ Path exploration ▪ Path registration ▪ Path lookup ▪ Security and reliability aspects ▪ Service anycast ▪ SCION control message protocol (SCMP) 2

  3. Reminder: SCION Isolation Domain (ISD) I J T U A B K M V Y Z W L X C E N P C’ D B’ O A’ F H E’ D’ S Q G R 3

  4. Intra-ISD Path Exploration: Beaconing ▪ Core ASes K, L, M initiate Path- segment Construction Beacons (PCBs), or “beacons” K M ▪ PCBs traverse ISD as a policy- L constrained multi-path flood N P ▪ Each AS receives multiple PCBs O representing path segments to a core AS S Q ▪ Each PCB can be used as an up- R path segment to communicate with core AS 4

  5. Beaconing in More Detail ▪ Each AS deploys one or multiple beacon servers K M ▪ PCBs are sent via a SCION service anycast packet L ▪ SCION border routers receive PCB N P and select one beacon server to O forward it to ▪ Beacon servers coordinate to re- S Q send PCBs periodically to Border router downstream ASes R Beacon server ▪ Currently every 5 seconds, PCBs are selected and forwarded 5

  6. PCB Contents ▪ A PCB contains an info field with: ▪ PCB creation time K M 3 ▪ Each AS on path adds: 2 1 M: L • Info field ▪ AS name • Timestamp • ISD: Blue • Hop field 1 2 ▪ Hop field for data-plane • Out: 1 N P • Expiration, MAC 4 • Signature 3 forwarding O P: • Hop fields • In: 2, Out: 3 ▪ Link identifiers • Peering: 4, Out: 3 • Expiration, MAC • Signature S Q ▪ Expiration time ▪ Message Authentication Code R (MAC) ▪ AS signature 6

  7. Path Server Infrastructure ▪ Path servers offer lookup service: ▪ ISD, AS → down-path segments, core- path segments ▪ Local up-path segment request → up- path segments to core ASes K M ▪ Core ASes operate core path server infrastructure L ▪ Consistent, replicated store of down- path segments and core-path segments N P ▪ Each non-core AS runs local path servers O ▪ Serves up-path segments to local clients ▪ Resolves and caches response of S Q remote AS lookups Border router R Beacon server Path server 7

  8. Down-Path Segment Registration ▪ Each AS’ beacon servers select path segments that they wants to announce K M as down-path segments L for others to use to N P communicate with AS O ▪ Beacon servers upload S Q the selected down-path segments to path servers R in core ASes 8

  9. Up-Path Segment Registration ▪ Each AS’ beacon servers select path segments that they wants to announce as K M up-path segments for local L hosts to communicate N P with other AS O ▪ Beacon servers send the selected up-path S Q segments to local path R servers 9

  10. Core Beaconing for Inter-ISD Path Exploration T: • Info field • Timestamp • ISD: Orange I J • Hop field 4 3 5 2 • Out: 7 1 • Expiration, MAC 8 1 T U • Signature 2 7 3 6 M: 5 4 • Hop field • In: 2, Out: 1 A B • Expiration, MAC 1 2 • Signature K M V 3 6 J: Y Z 5 4 • Hop field W L • In: 5 X • Expiration, MAC C E • Signature C’ N P D B’ O A’ F H E’ D’ S Q G R 10

  11. Inter-ISD Path Exploration: 
 Sample Core Paths from AS T I J T U A B K M V Y Z W L X C E C’ N P D B’ O A’ F H E’ D’ S Q G R 11

  12. Path Lookup: Local ISD ▪ Client requests path segments to <ISD, AS> from local path server ▪ If down-path segments are not locally K M cached, local path server send request L to core path server ▪ Local path server replies N P O ▪ Up-path segments to local ISD core ASes S Q ▪ Down-path segments to <ISD, AS> ▪ Core-path segments as needed to R connect up-path and down-path segments 12

  13. Path Lookup: Remote ISD ▪ Host contacts local path server requesting <ISD, T AS> U ▪ If path segments are not cached, local path server K M V will contact core path Y Z server W L X ▪ If core path server does not have path segments C’ N P B’ cached, it will contact O A’ remote core path server E’ ▪ Finally, host receives up-, D’ S Q core-, and down-segments Border router R Beacon server Path server 13

  14. How to Secure PCB Dissemination ▪ Assumptions ▪ Each AS has certificate: {AS, K AS , expiration} KcoreAS ▪ Talks on SCION PKI and control-plane PKI provide more detail on how this works ▪ Beacon servers know relevant AS certificates ▪ Each PCB is signed by core AS that issues it ▪ Each AS that resends PCB signs updated PCB ▪ Note: data-plane information (hop fields) are protected with efficient Message Authentication Code 14

  15. Failed Interface Detection ▪ Border routers send periodic keep-alive message to neighboring border routers ▪ Received keep-alive messages are disseminated to all internal T U beacon server instances ▪ After a threshold number of V Y keep-alive messages are W X missing, link is declared inactive Border router Beacon server Path server 15 Keep-alive message

  16. Secure Path Revocation ▪ Each AS adds a Revocation Token (RT) to the PCB ▪ RTs enable efficient authentication of link revocation messages from corresponding AS ▪ When packet reaches a border router that cannot forward the packet, router sends a link revocation message back to host ▪ Host re-distributes revocation message to path and beacon servers, to remove path segments containing broken links ▪ Section 7.3 in SCION book describes this process in detail 16

  17. Service Anycast ▪ To support service-based communication, SCION offers service anycast K M ▪ Service address type used as a L packet’s destination address ▪ An up-path segment can be included, N P and a service anycast extension can O indicate in which ASes the request should be considered S Q ▪ Border routers determine if the R packet should be sent to a server instance in the AS 17

  18. Failure Resilience and Service Discovery ▪ For reliability, control-plane infrastructure services rely on a consistency service with the following properties ▪ Leader election ▪ Group membership list ▪ Distributed consistent database ▪ Currently, we are using Apache Zookeeper for this purpose ▪ Discovery service provides list of active server instances ▪ Combination of information from consistency service and static configurations 18

  19. Failure Resilience: Beacon Service ▪ All AS beacon server instances connect to consistency service and appear as group members ▪ Leader election algorithm determines master beacon server ▪ PCBs are disseminated with a SCION service address as the destination address ▪ SCION border router will select one running beacon server instance to deliver PCB to ▪ Receiving beacon server instance re-distributes PCB to all other instances via the consistency service’s distributed database ▪ Master beacon server disseminates PCBs and registers up-path segments at local path server, and down-path segments at core path servers 19

  20. Failure Resilience: Path Service ▪ All AS path server instances connect to consistency service and appear as group members ▪ Leader election algorithm determines master path server in a core AS ▪ No leader election in non-core AS ▪ Path replication within core AS ▪ To handle high load, down-path segment registrations are not disseminated by consistency service ▪ Instead, non-master path servers fetch down-path segments from master path server and push registered down-path segments to master path server ▪ Down-path segment registrations are also sent to a path server of each core AS ▪ Path replication within non-core AS ▪ Non-core path servers use consistency service for up-path segment replication 20

  21. SCION Control Message Protocol (SCMP) ▪ SCMP is analogous to ICMP in the current Internet and provides: ▪ Network diagnostic: SCION equivalents of ping or traceroute ▪ Error messages: signal problems with packet processing or inform end hosts about network-layer problems ▪ SCMP is the first secure control message protocol we are aware of ▪ Asymmetric authentication (AS certificates) or symmetric authentication (DRKey) are supported 21

  22. For More Information … ▪ … please see our web page: 
 www.scion-architecture.net ▪ Chapter 7 of our book “SCION: A secure Internet Architecture” ▪ Available from Springer this Summer 2017 ▪ PDF available on our web site 22

Recommend


More recommend