Introduction to Network Resilience

Chair for Network Architectures and Services – Prof. Carle
Department for Computer Science
TU München
Overview
Master Course Computer Networks (IN2097)
Introduction to
I.
Terminology
II.
Challenges
g in the current Internet
III.
Resilience Mechanisms
Network Resilience
Dr. Ali Fessi
Dr. Nils Kammenhuber
Prof. Dr.-Ing. Georg Carle
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Overview
I.
Terminology
II
II.
Challenges in the current Internet
III.
Resilience Mechanisms
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
2
Terminolgy - Overview
3
1.
The “fault Î error Î failure” chain
2.
Fault tolerance
3.
Resilience
4
4.
Dependability
5.
Security
6.
Availability vs. Reliability
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
4
The “fault Î error Î failure” chain
‰
Service:
ƒ Sequence of the system‘s external state
‰
Correct service is delivered when the service implements the
system function
‰
Definition
ƒ A service failure, or simply failure, is an event that occurs
when the delivered service deviates from correct service
ƒ i.e., at least one external state of the system deviates from
the correct service state
ƒ (de: Ausfall)
The “fault Î error Î failure” chain
‰
Definition
ƒ The deviation of an external state of the system from the
correct service state is called an error
ƒ Thus,, an error is the part
p of the total state of the system
y
that
may lead to its subsequent failure
ƒ (de: Defekt)
‰
Definition
ƒ The cause of an error (adjuged or hypothesized) is called a
fault
ƒ (de: Fehler)
& “fault
fault Î error Î failure
failure”
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
5
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Fault Tolerance
‰
6
Resilience
Definition
ƒ A system is fault-tolerant if it can mask the presence of faults
i th
in
the system
t
b
by using
i redundancy
d d
‰
‰
Origin
ƒ Latin verb: “resilire” ~ jump back
Resilience definition in different fields
ƒ Physics
y
‰
• A material’s property of being able to recover to a normal state
after a deformation resulting from external forces;
Redundancy means
1 Replication of the same object (software or hardware) or
1.
2. Diversity
•
•
ƒ Ecology
E l
• Moving from a stability domain to another under the influence of
disturbance;;
Design or implementation
Hardware or software
ƒ Psychology and psychiatry
• Living and developing successfully when facing adversity;
ƒ Business
• the capacity to reinvent a business model before circumstances
force to;
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
7
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
8
Resilience
‰
Dependability Attributes
Definition:
‰
ƒ “Resilience is the persistence of dependability when facing changes.”
Availability
ƒ Readiness for correct service
J.-C. Laprie.
p
“From Dependability
p
y to Resilience”. In 38th International
Conference On Dependable Systems and Networks. IEEE/IFIP, 2008.
‰
‰
Changes can be particularly attacks
ƒ Continuity of correct service
Resilience
‰
Reliability (Zuverlässigkeit)
(
ä
)
Integrity (Integrität)
e
environment
o e t
Security
(Sicherheit)
‰
Safety
y ((Sicherheit))
‰
9
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Security Attributes
“CIA” model
‰
R(t) = Pr [ unit is operating until t ]
Availability
ƒ Readiness for correct service
‰
‰
Integrity
The availability of a unit at a point of time t is the probability that
the unit is operational at t
ƒ Absence of improper system alterations
‰
The reliability of a unit at a point of time t is the probability that
the unit is operational until t
Confidentiality
ƒ Absence of unauthorized disclosure of information
‰
10
Reliability vs. Availability
ƒ Confidentiality, Integrity, Availability
‰
Maintainability
ƒ Ability to undergo repair and modification
Confidentiality (Vertraulichkeit)
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Integrity
ƒ Absence
Ab
off improper
i
system
t
alterations
lt ti
Maintainability (Wartbarkeit)
‰
Safety
ƒ Absence of catastrophic consequences on the user(s) and the
Availability (Verfügbarkeit)
Dependability
(Verlässlichkeit)
Reliability
A(t) = Pr [ unit is operating at t ]
Notes:
ƒ CIA model
d l actually
t ll nott sufficient
ffi i t tto d
describe
ib ““security”
it ”
ƒ “Security” addresses all kind of possible attacks which may lead to
th d
the
deviation
i ti ffrom correctt service
i
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
11
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
12
MTTF & MTTR
‰
Examples
Mean Time To Failure (MTTF)
ƒ Mean time between
‰
• Point of time when a unit is put into operation
• Point of time when the unit fails for the next time
‰
Mean Time To Repair (MTTR)
ƒ Mean time between
& One can achieve
ƒ high
hi h availability
il bilit
ƒ with low reliability (low MTTF)
ƒ if MTTR is sufficiently low
• Point of time when a unit fails
• Point of time when the unit is p
put into operation
p
again
g
‰
This results into an average availability
Aavgg =
‰
MTTF
MTTF + MTTR
13
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
DNS lookup (stateless service)
ƒ MTTF: 30 min
ƒ MTTR: 1 ms
ƒ Aavg = 0.998
Examples
Conference bridge (statefull service)
ƒ Each time, the bridge fails, participants need to re-dial
g
that
ƒ Even if MTTR is sufficientlyy low,, it has to be guaranteed
the MTTF is sufficiently high to assure service quality
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
14
Overview
Web servers
1
2
…
k
Proxy
Rsystem
t (t ) = R proxy (t ) ⋅ Rwebserver
b
pooll (t )
I.
Terminology
II
II.
Challenges in the current Internet
III.
Resilience Mechanisms
Rweb server pool (t ) = 1 − (1 − Rwebserver(t ))k
‰ Same holds for the availability
Asystem (t ) = Aproxy (t ) ⋅ Awebserver pool (t )
Aweb server pool (t ) = 1 − (1 − Awebserver(t ))k
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
15
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
16
Challenges in the current Internet
Challenges in the current Internet
1.
Topology Failures
1.
Topology Failures
2.
Overload
2.
Overload
3.
Lack of Integrity
3.
Lack of Integrity
4
4.
Software Faults
4.
S ft
Software
Faults
F lt
5.
Domino Effects
5.
Domino Effects
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
17
Topology Failures
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
18
Topology Failures; Sub-Marine Cables
‰ Failures in the “network graph”
‰ Network graph
ƒ Physical topology
ƒ Logical topology including service dependencies, e.g., DNS
& Dependency graphs
‰ ~99% of inter-continental Internet traffic (less than 1% using satellites)
‰ High redundant
‰ But vulnerable to
ƒ Fishing and anchoring (70% of sub-marine cable failures)
ƒ Natural disasters (12%)
ƒ Cable theft
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
19
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
20
Submarine Cables; Natural Disasters
Submarine Cables; Natural Disasters
‰ Hengchun earthquake (December 2006)
‰ Hengchun earthquake (December 2006)
‰ Impact
p
ƒ Affected countries: China, Taiwan, Hong Kong, Philippines
China‘s
s Internet connectivity reduced by 70%
ƒ China
ƒ Hong Kong‘s Internet access completely disabled
‰ Recovery
ƒ BGP automatic re-routing
re routing helped to reduce disconnectivity
ƒ But resulted into congested links
ƒ Manual
M
l BGP policy
li changes
h
+ switch
it h portt re-configuration
fi
ti were necessary
ƒ Hong Kong‘s Internet users were still experiencing slow Internet
connections 5 days after the earthquake
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
21
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
22
Submarine Cables; Cable Theft
Submarine Cables; Failures in the Mediterranean Sea
‰ In Jan. + Feb. 2008, 3 successive events
‰ In March 2007, pirates stole an 11 kilometers section of the
submarine cable connecting Thailand
Thailand, Vietnam and Hong Kong
Kong,
‰ Impact: significant downgrade in Internet speed in Vietnam.
‰ Impact
‰ Intention: The thieves wanted to sell 100 tons of cable as scrap.
ƒ Affected countries: Egypt, Iran, India and a number of other
middle east countries
ƒ Disruption of
• 70% in Egypt
• 60% in India
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
23
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
24
Topology Failures; Routing
Topological Failures; Routing
‰ Failures in the IP topology graph
‰ Time to Recovery
ƒ Failures of routers (nodes)
ƒ Intra-domain
Intra domain routing (OSPF
(OSPF, RIP
RIP, IS
IS-IS,
IS EIGRP): up to
ƒ Failure of links between routers
several 100ms
‰ Failure of links between routers generally caused by disconnection at
ƒ Inter-domain routing (BGP): up to several minutes
lower layers
‰ Failure of routers
ƒ DoS attacks
ƒ Failures due to software bugs
ƒ Examples of reported bugs
• Vulnerability to too long AS (BGP Autonomous Systems) paths
• Long passwords to login to the router
• Overflow
O fl
off connection
ti tables
t bl in
i some commercial
i l firewalls
fi
ll
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
25
Topological Failures; Routing
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
26
Challenges in the current Internet
‰ Other reasons
ƒ Misconfiguration which leads to false modification of the Internet topology
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
27
1.
Topology Failures
2.
Overload
3.
Lack of Integrity
4.
S ft
Software
Faults
F lt
5.
Domino Effects
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
28
Overload
Lack of Congestion at the Network Layer
‰ Topology failures are binary (link or node is up or down)
‰ Routing protocols react to the failure of a link or a router.
‰ But equipment in the network (routers
(routers, servers
servers, etc
etc.)) have
‰ But not to network congestions
limited capacity
‰ ARPANET had some mechanisms to react to congestions
ƒ Queue length
‰ But they resulted into oscillations
ƒ CPU power
‰ Congestion control was introduced in the Internet as
ƒ etc.
enhancement of TCP
‰ But TCP has
ƒ no knowledge about the network topology
& Overload (congestion) is not rare
ƒ no way of re-wiring the traffic path in case of congestion
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
29
DoS Attack vs. Flash Crowds
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
30
DoS Attacks
‰ Some DoS attacks have a political or ethnical reasons
‰ Big challenge
ƒ Ambiguous differentiation between DoS attacks and flash
crowds
ƒ Flash crowds: unusual but legitimate traffic
ƒ Even if attacks are identified as such,
such it remains difficult to
separate between malicious and legitimate traffic and to
eliminate the malicious traffic
ff
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
31
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
32
Challenges in the current Internet
Lack of Integrity
‰ Majority of Internet traffic (signaling and data) is not integrityprotected
1.
Topology Failures
2.
Overload
3.
Lack of Integrity
4.
S ft
Software
Faults
F lt
ƒ Forged BGP announcements
5.
Domino Effects
ƒ Forged DNS responses
‰ This leads to several security vulnerabilities
ƒ ARP poisoning
ƒ SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM
ƒ etc
etc.
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
33
Challenges in the current Internet
1.
Topology Failures
2.
Overload
3.
Lack of Integrity
4
4.
Software Faults
5.
Domino Effects
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
34
Software Faults
‰ Developments faults
ƒ Introduced during the development phase
‰ Configuration faults
ƒ Introduced during the deployment phase
35
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
36
Software Faults
Challenges in the current Internet
‰ Examples
ƒ Buffer overflows in server or router implementation
ƒ BGP Youtube misconfiguration
ƒ O
On Jan.
J
31st 2009,
2009 G
Google
l search
h engine
i marked
k d every
search result with “This site may harm your computer”;
Root cause: Database of suspected sites was mistakenly
extended by ‚/‘
ƒ Software update of the Authentication Server (Home
Location Register HLR) of T-Mobile on April 21st 2009
1.
Topology Failures
2.
Overload
3.
Lack of Integrity
4
4.
Software Faults
5.
Domino Effects
• Impact:
p
p
phone calls and text messaging
g g were not p
possible for 4
hours
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
37
38
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Domino Effects
Domino Effects
‰ Any kind of challenges mentioned above may lead to other
challenges
ƒ E.g.,
E
failure
f il
off a server in
i a server pooll may llead
d tto overload
l d
of neighboring servers
ƒ Router failures may lead to congestion of neighboring links
and routers
ƒ DNS failure mayy lead to unavailability
y of other services,
‰
E.g., DoS attack on Microsoft router on 24th + 25th Jan. 2001
lead to unavailability of DNS and thus of services located in
other MS sites
microsoft.com
DNS
msn.com
msnbc.com
R
Router
microsoft.de
h
hotmail.co.jp
il j
Internet
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
39
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
40
Overview
Resilience Mechanisms
I.
Terminology
1.
Topology Protection
II.
Challenges
g in the current Internet
2.
Congestion Control
III.
Resilience Mechanisms
3.
Signaling Integrity
4
4.
Server Redundancy
5.
Virtualization
6.
Overlay and P2P Networks
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
41
Resilience Mechanisms
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
42
Topology-based Resilience Metrics
‰ Several metrics exist
‰ But not all are useful
1.
Topology Protection
2.
Congestion
g
Control
3.
Signaling Integrity
4.
S
Server
Redundancy
R d d
5.
Virtualization
6.
Overlay and P2P Networks
‰ Definitions
ƒ k-link (edge) connectivity is the minimal number of links
g p
whose removal would disconnect the graph
ƒ k-node (vertex) connectivity is the minimal number of nodes
whose
h
removall (i
(including
l di removall off adjacent
dj
t links)
li k ) would
ld
disconnect the graph
ƒ A k-regular graph is k-node-connected if there are k nodedisjoint paths between any pair of nodes
nodes.
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
43
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
44
Path Protection
Local Protection
src
dst
‰ Node or link failures are detected locally and backup paths are
used until routing re-converges
& This
Thi can reduces
d
the
th MTTR b
by th
the order
d off a magnitude
it d
compared to path protection
& Contra: higher signaling and equipment overhead
Primary path
Backup path
Link protection
‰ Traffic is forwarded using backup path in case of failure
src
dst
‰ Source needs to monitor the operation of primary path
& Info about node or link failure needs to be propagated back to
src
Node protection
45
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Example
src
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
dst
46
IEEE 802.3ad: Link Aggregation
R1
‰ IEEE Link Aggregation allows for bundling
ƒ several physical Ethernet connections
ƒ into a logical one
‰ Connection between
ƒ Two hosts
ƒ Two Ethernet switches
ƒ Host
H t and
d switch
it h
R2
src
dst
R3
R4
‰ Location protection at IP layer
‰ Routing protocol: OSPF
‰ IEEE Link Aggregation allows for increasing bandwidth
‰ But is also a fault tolerance mechanism
out,
ƒ If a cable is plugged out
‰ Local
L
l protection
t ti according
di tto IP Fast
F t Reroute
R
t (IPFRR) (RFC 5714)
1. Normal operation: Routing from src to dst via R3 and R4
2. After failure of link between R4 and dst: Rerouting from R4 to dst via R2
• e.g., for maintenance reasons,
3. Then, info is propagated in the network, OSPF routing converges and a new
ƒ the two layer
layer-2
2 devices remain connected
connected.
path is used from src to dst via R1 and R2.
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
47
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
48
Multihoming
Resilience Mechanisms
‰ Multihoming refers to a network setup where a host or a network
is connected to the Internet via more than 1 connection
‰ It can be applied in various contexts
ƒ Host Multihoming
1.
Topology Protection
2.
Congestion
g
Control
3.
Signaling Integrity
4.
S
Server
Redundancy
R d d
5.
Virtualization
6.
Overlay and P2P Networks
• An IP host connected via multiple
p network interfaces
• Each network interface might be connected to a different access
network
ƒ Multihoming at the transition point between networks
• An enterprise network connected to the Internet via multiple ISPs
• BGP peering with multiple providers
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
49
Congestion Control
50
Traffic Engineering
‰ Addresses network congestion at the network layer
‰ Goals
ƒ Optimize network throughput, packet loss, delay
‰ Input
ƒ Network topology
ƒ Traffic matrix (may change over time, e.g., daily patterns)
‰ Output
O t t
ƒ (Eventually modified) link weights used to compute routing
tables
‰ TCP congestion control
‰ Traffic Engineering
‰ Protection again DoS attacks
ƒ Rate limiting: vulnerable to
• “false
false positives”
positives , i.e.,
i e legitimate traffic is classified as malicious
• “false negatives”, i.e., malicious traffic is classified as legitimate
ƒ Cookies
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
51
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
52
Denial-of-Service Protection with Cookies (1)
Denial-of-Service Protection with Cookies (2)
‰
1: request
Bob
ƒ Advantage: allows to counter simple address spoofing attacks
2: Cookie
Alice
ƒ Drawbacks
3: request, Cookie
‰
‰
‰
‰
Cookies discussion:
• Requires CPU resources
Upon receiving a request from Alice, Bob calculates a Cookie and sends it to Bob.
Alice will receive the Cookie and resend the request with the Cookie together.
Bob verifies that the Cookie is correct and then starts to process Alice‘s
Alice s request.
request
An attacker that is sending requests with a spoofed (i.e. forged) source address will not
be able to send the Cookie.
• In some applications, e.g., DNS, it might be easier to respond
to the request than generating the cookie
• Requires one additional message roundtrip
roundtrip.
• Network may remain congested
“Request”
Attacker
Bob
Alice
“Cookie”
Cookie
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
53
Resilience Mechanisms
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
54
Signaling Integrity; “ARP” protection
‰ Manual configuration, e.g., ARP messages with wrong matching
1.
Topology Protection
2.
Congestion Control
3.
Signaling Integrity
4.
S
Server
Redundancy
R d d
5.
Virtualization
6.
Overlay and P2P Networks
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
(IP to MAC) are discarded
& Too costly
‰ IPv6 SEcure Neighbor Discovery (SEND) (RFC 2461 and 2462)
ƒ Uses a Cryptographically Generated Address
(CG )
(CGA)
Routing prefix
55
Hash62(Host public key)
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
56
Signaling Integrity; DNSSEC
Signaling Integrity; BGP Security
‰ Protects DNS responses with cryptographic signatures
‰ Not trivial
‰ In a dedicated DNS record: the RRSIG record (RFC4034)
‰ Can not be solved by simply adding message integration protection
of BGP announcements
‰ DNS Records can be verified with a “chain of trust”
ƒ E.g., what is if “Pakistan Telecom” signs BGP
ƒ Public key of the DNS root zone must be known by clients
p
announcements for a Youtube prefix?
‰ Authority delegation is restricted to sub
sub-domains
domains
& Integrity of BGP announcements needs to be validated by a
ƒ e.g., system administrator of “net.in.tum.de” can not sign records
combination of
for “lrz.de”
& topology authentication,
ƒ Note: this is not the case for PKIs currently used in the web
& BGP path authentication and
& announcement
announcement's
s origin authentication
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
57
Signaling Integrity
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
58
Signaling Integrity
‰ Domain Keys Identified Mail (DKIM)
‰ Spammers can still sign their outgoing messages
ƒ Allows for validation of a domain name associated with an
& DKIM should be used with reputation:
email address
• Email messages sent by a domain that is known for signing
good messages can be accepted
ƒ An organization takes responsibility for a message in a way
• while others may require further examination.
p
that can be validated byy a recipient
ƒ Prominent email service providers implementing DKIM
• Yahoo, Gmail, and FastMail.
• Any mail from these organizations should carry a DKIM
signature
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
59
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
60
Resilience Mechanisms
Server Redundancy
‰ Server redundancy as a fault tolerance mechanism
1.
Topology Protection
‰ Servers instances may be
2.
Congestion Control
ƒ in the same LAN or
3.
Signaling Integrity
ƒ different sub-networks & Geographic diversity
4
4.
Server Redundancy
5.
Virtualization
6.
Overlay and P2P Networks
‰ Supporting mechanisms
ƒ IP Takeover
ƒ NAT Takeover
ƒ DNS
61
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Server Redundancy; IP Takeover
62
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Server Redundancy; IP Takeover with 2 Switches
‰ Both master and backup servers are connected to 2 switches
‰ Same procedure with ARP
& Incoming requests from both switches is forwarded to the
backup server
‰ Any component (server or switch or cable) can be removed
removed,
e.g., for maintenance reasons, while the service keeps on being
available
‰ Simple redundancy mechanism
‰ Backup server receives periodic “keep
keep alive
alive” messages from
master server, e.g., every 10ms
‰ In case of no response
ƒ Backup server broadcasts an ARP message in the LAN
Master server
Backup server
ƒ From now on, all IP traffic is forwarded to the backup server
keepalive
‰ Drawbacks
ƒ Existing session state gets lost
Master server
Backup server
keepalive
ƒ Ethernet switch is a single point of failure
Internet
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
63
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
64
Server Redundancy; NAT Takeover
Server Redundancy; DNS
‰ Similar to IP Takeover
‰ DNS can provide several IP addresses for the same name
‰ “Keep
p alive” messages
g from backup
p to master server
‰ By monitoring the availability of servers from a server pool
pool,
‰ Change NAT binding upon lack of response from master server
unavailable servers can be removed from DNS responses
& Incoming requests are forwarded to the backup server
DNS
Master server
Backup server
Keep alive
1
keepalive
2
Server pool
NAT
‰ Moreover,
M
DNS responses can b
be adjusted
dj t d according
di tto th
the currentt
Internet
load
‰ Note: Master and backup server do not have to be in the same LAN
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
& See, e.g., Content Distribution Networks (CDN)
65
Resilience Mechanisms
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
66
Virtualization
‰ Different virtualization techniques, e.g., KVM, Xen, etc.
‰ Can be used to enhance resilience of network services
1.
Topology Protection
2.
Congestion Control
3.
Signaling Integrity
• To address overload situations
4
4.
Server Redundancy
• In
I case servers in
i other
h llocations
i
crash
h
5.
Virtualization
6.
Overlay and P2P Networks
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
ƒ Start new servers from existing images on demand, e.g.,
67
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
68
Resilience Mechanisms
Overlay Routing
‰ Overlay networks
1.
Topology Protection
ƒ Are networks built on top of existing networks
2.
Congestion Control
ƒ They typically provide additional functionality not provided at
3.
Signaling Integrity
4
4.
Server Redundancy
5.
Virtualization
ƒ End hosts can organize themselves in a P2P network
6.
Overlay and P2P Networks
ƒ and provide routing using the overlay in case the underlay
the „underlay“ network
‰ Overlay routing
g fails
routing
69
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
Overlay Routing
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
70
Overlay Routing
‰ Example
ƒ Upon link failure between R1 and R2
ƒ A can reach B via D or C
‰ Typical reasons for lack of connectivity in the underlay
ƒ Misconfigured middleboxes (firewalls
(firewalls, NATs)
ƒ Slow BGP convergence
‰ Systems supporting overlay routing
ƒ Tor
B
R1
A
• while it is actually designed with anonymization in mind, it
R2
provides overlay routing and can be useful in case of network
partial failures
C
ƒ Skype
E
• Skype supernodes typically provide connectivity for Skype
D
clients behind firewalls or NATs
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
71
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
72
P2P Networks
P2P Networks
‰ Drawback: several attacks are possible
ƒ Sybil attacks:
‰ Resilience properties
ƒ Decentralization
• Attacker participate with several fake identities
• In order to control a portion of the network
ƒ Geographic diversity
ƒ Eclipse attacks
attacks,
ƒ Ability to cope with “churn”
• Attacker control the neighborhood of a peer or content
• In order to make unavailable for other participants in the P2P networks
• “Churn”
“Ch ” means th
thatt peers jjoin
i and
d lleave att any titime
ƒ etc.
„Sybil“ attack
& Replication of each data item on several peers
& Autonomic recovery from stale P2P routing tables
„Eclipse“ attack
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
73
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
P2P Networks
74
Summary
‰ Common approaches
& Managed P2P networks (or supervised P2P networks)
& E.g., Google File System (GFS), Skype
I.
II.
III.
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
P2P
75
Terminology
‰
The “fault
fault Î error Î failure
failure” chain
‰
Fault tolerance, Resilience, Dependability, Security
‰
A il bilit vs. R
Availability
Reliability
li bilit
Challenges
g in the current Internet
‰
Topological Failures, Overload, Lack of Integrity
‰
Software Faults,
Faults Domino Effects
Resilience Mechanisms
‰
Topology Protection, Congestion Control, Signaling Integrity
‰
Server Redundancy, Virtualization, Overlay and P2P Networks
Network- Master
IN2097
Security,
Course
WS 2008/09,
Computer
Chapter
Networks,
9
WS 2010/2011
76