Decoupling Policy from Mechanism in Internet Routing - PowerPoint PPT Presentation

About This Presentation
Title:

Decoupling Policy from Mechanism in Internet Routing

Description:

Verifiable attestation of policy compliance. Valid for a particular portion of the network ' ... Capabilities to attest to policy compliance (We don't handle ... – PowerPoint PPT presentation

Number of Views:41
Avg rating:3.0/5.0
Slides: 13
Provided by: alex253
Learn more at: https://cseweb.ucsd.edu
Category:

less

Transcript and Presenter's Notes

Title: Decoupling Policy from Mechanism in Internet Routing


1
Decoupling Policy from Mechanism in Internet
Routing
  • Alex C. Snoeren
  • and Barath Raghavan
  • University of California, San Diego

2
Mechanism vs. Policy
  • Routing Mechanism
  • Path discovery for end-to-end connectivity
  • Hop-by-hop forwarding along a path
  • Routing Policy
  • Deciding which routes to advertise
  • For which destinations, to whom?
  • Determining which packets to forward
  • Over what links, at what rate, for whom?

3
Wide-Area Routing
  • Control Plane
  • Each AS computes paths to destinations using
    received advertisements
  • Actual path selection based upon tuning
    parameters
  • Selectively exports routes to neighbors based
    upon business relationships
  • Often changes/removes/rewrites tuning parameters
  • Data Plane
  • Next hop selected according to local information
  • Destination addresses, current router, arrival
    link, etc.
  • Possibly filter inappropriate traffic
  • Drop traffic that shouldnt be here

4
Some Current Frustrations
  • BGP is extremely difficult to configure
  • Forced to use assembly language to express
    mechanism and local business policy
  • Poor performance
  • Recovery from failure can take a long time
  • Despite the existence of workable routes
  • Poor flexibility
  • ASes cant control routing outside of their
    network
  • Special-case modifications on human time-scales

All symptoms of policy-mechanism link
5
The Goal
  • Enforce all policies (only) while forwarding
  • We need some amount of filtering anyway
  • Removes complexity from control plane
  • Route discovery becomes policy neutral
  • Could need lots of information at each router
  • Need descriptions of all applicable policies
  • Information required as input to policy decision
  • Instead, compute policy decisions offline
  • Stamp each packet with a proof of compliance
  • Forwarding check reduces to stamp verification

6
Network Capabilities
  • Verifiable attestation of policy compliance
  • Valid for a particular portion of the network
  • Signed by an authorized party
  • Designates a resource (billable) principal
  • Capabilities are composable transferable
  • Capabilities can be exchanged between entities
  • To use, need to bind to a particular packet
  • Packets can carry more than one capability

7
Capability Binding
  • Authorization agent has a secret symmetric key,
    k, shared with routers in the region
  • Define a per-capability secret, issued with c
  • s MACk(c)
  • Compute a per-packet binding
  • B MACs(p)
  • Routers can verify packet bindings
  • B MACMACk(c)(p)

8
Platypus
  • For now, loose source routing is an out
  • Capabilities to attest to policy compliance
  • (We dont handle route discovery)
  • Allow Intra-AS traffic engineering
  • Each ISP engineers its own network
  • ISPs can decide granularity of control
  • Support accountability (gasp!) billing
  • Capabilities identify a resource principal

9
Efficient Overlay Construction
R1
R2
R3
R4
B
A
R5
R6
R7
R8
C
10
Intra-AS Router Variation
120
West Coast
110
Mid West
East Coast
Western Europe
100
90
80
AS3549 (GBLX) ? Lulea, Sweden, delay (msec)
70
60
50
40
30
20
0
10
20
30
40
50
60
70
80
90
Anaheim, CA ? AS3549 (GBLX), delay (msec)
11
Intra-AS Router Variation
100
West Coast
90
Mid West
East Coast
Western Europe
80
70
60
AS3549 (GBLX) ? Intel Berkeley, delay (msec)
50
40
30
20
10
0
0
10
20
30
40
50
60
70
80
90
100
UCSD ? AS3549 (GBLX), delay (msec)
12
Ongoing work
  • Capability Distribution
  • Broadcast encryption
  • Lightweight capability revocation
  • Performance
  • Flow-based authentication
  • Probabilistic verification
  • Accounting
  • Hierarchical resource principal naming
  • Distributed token buckets
  • Windowed Bloom filters?
Write a Comment
User Comments (0)
About PowerShow.com