security assessment on a vxlan based network
play

Security assessment on a VXLAN-based network Guido Pineda Reyes - PowerPoint PPT Presentation

Introduction VXLAN prototype Security assessment Q&A Security assessment on a VXLAN-based network Guido Pineda Reyes MSc. Systems and Networking Engineering University of Amsterdam February 5, 2014 Guido Pineda Reyes Security


  1. Introduction VXLAN prototype Security assessment Q&A Security assessment on a VXLAN-based network Guido Pineda Reyes MSc. Systems and Networking Engineering University of Amsterdam February 5, 2014 Guido Pineda Reyes Security assessment on a VXLAN-based network

  2. Introduction VXLAN prototype Security assessment Q&A Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  3. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  4. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Virtual eXtensible LAN Introduction Still an Internet Draft, current revision: 7th Allows to extend logical networks Encapsulates layer MAC-based Layer 2 frames within a UDP packet Up to 16 million logical networks Security measurements have not been performed yet Guido Pineda Reyes Security assessment on a VXLAN-based network

  5. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Virtual eXtensible LAN Typical use case Guido Pineda Reyes Security assessment on a VXLAN-based network

  6. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  7. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Research questions Main question: How feasible are the known VLAN attacks in a VXLAN environment? Subquestions: Which attacks were successful? What is the difference between these attacks in a VLAN and a VXLAN environment? Is there anyway to prevent them or mitigate them? Guido Pineda Reyes Security assessment on a VXLAN-based network

  8. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  9. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Approach Build the VXLAN prototype. Deploy the security assessment on the prototype. Focus on successful attacks. Understand how this attacks work to give a solution on how to mitigate or prevent them. Guido Pineda Reyes Security assessment on a VXLAN-based network

  10. Introduction VXLAN prototype Security assessment Q&A VXLAN prototype Design Guido Pineda Reyes Security assessment on a VXLAN-based network

  11. Introduction VXLAN prototype Security assessment Q&A VXLAN prototype Options VMware vSphere products VMware vSphere + Cisco Nexus 1000v VXLAN Linux implementation (needs kernel modification) Guido Pineda Reyes Security assessment on a VXLAN-based network

  12. Introduction VXLAN prototype Security assessment Q&A VXLAN prototype Connectivity tests: UDP encapsulated traffic Guido Pineda Reyes Security assessment on a VXLAN-based network

  13. Introduction VXLAN prototype Security assessment Q&A VXLAN prototype Connectivity tests: VXLAN encapsulation Guido Pineda Reyes Security assessment on a VXLAN-based network

  14. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Security Assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Evaluation Guido Pineda Reyes Security assessment on a VXLAN-based network

  15. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  16. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions MAC Flood Attack Scenarios Guido Pineda Reyes Security assessment on a VXLAN-based network

  17. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions MAC Flood Attack Tool: macof Results: Attacker on physical net: Successful Attacker on logical net: Failed Mitigation/Prevention: Restrict the number of MAC addresses to one port Specify static MAC address association IDS Guido Pineda Reyes Security assessment on a VXLAN-based network

  18. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  19. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Double-Encapsulated 802.1Q/Nested VLAN Attack Scenario Guido Pineda Reyes Security assessment on a VXLAN-based network

  20. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Double-Encapsulated 802.1Q/Nested VLAN Attack Concept Guido Pineda Reyes Security assessment on a VXLAN-based network

  21. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Double-Encapsulated 802.1Q/Nested VLAN Attack Tool: scapy Results: Attacker on logical net: Failed Guido Pineda Reyes Security assessment on a VXLAN-based network

  22. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  23. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions ARP Attack Scenarios Guido Pineda Reyes Security assessment on a VXLAN-based network

  24. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions ARP Attack Summary Tool: arpspoof Configuring private communication between the Results: hosts at the service provider Attacker on physical net: level. Successful Attacker on logical net: Successful Mitigation/Prevention: Blocking direct communication between the attacker and the victim. Guido Pineda Reyes Security assessment on a VXLAN-based network

  25. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions ARP Attack Scenarios Guido Pineda Reyes Security assessment on a VXLAN-based network

  26. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

Recommend


More recommend