Defending Networked Resources Against Floods of Unwelcome Requests - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Defending Networked Resources Against Floods of Unwelcome Requests

Description:

Stevens Institute of Technology UC Berkeley and ICSI. Who should control communications? ... Allow a communication iff all participants approve ... – PowerPoint PPT presentation

Number of Views:26
Avg rating:3.0/5.0
Slides: 17
Provided by: michael1380
Learn more at: https://cs.nyu.edu
Category:

less

Transcript and Presenter's Notes

Title: Defending Networked Resources Against Floods of Unwelcome Requests


1
A policy framework for the future Internet
Arun Seehra, Jad Naous, Michael Walfish, David
Mazières, Antonio Nicolosi, and Scott Shenker
The University of Texas at Austin
Stanford Stevens Institute of Technology
UC Berkeley and ICSI
2
Who should control communications?What should
they control?
  • Many Internet stakeholders senders, receivers,
    transit providers, edge providers, middleboxes,
  • Each has many valid policy goals
  • Where do your sympathies lie?

3
Prior proposals large union, small intersection
  • Proposals generally choose particular concerns
  • To the exclusion of other concerns
  • Our community lots of sympathy, little consensus

4
So what options does our community have?
  • Embrace the status quo do nothing
  • This is architectural abdication
  • Make a hard choice select the right subset
  • This would be a gamble
  • On a choice that must last another 30 years
  • By a community not known for accurate predictions
  • Choose all of the above take the union of
    controls
  • This preserves our options no picking
    winners/losers
  • The late binding avoids guesses about unknowables

5
All of the above brings challenges
1. Can we identify a coherent union? 2. Can we
build a mechanism to support it?
Rest of this talk
6
What is the right union?
  • Rough consensus only about who doesnt get a say
  • We propose

Allow a communication iff all participants approve
  • Overkill for any application, not for a framework
  • Conjecture nothing weaker meets all policy
    goals, nothing stronger needed

7
Veto power for all?!
x o o o o o o o o o o o o x o o o x o o o o x o o
o o o o o o o o x o o o x o o o o o o o o x o o
  • You might worry
  • ISPs get a lever
  • Which could threaten
  • Net neutrality
  • Universal connectivity
  • On the other hand
  • Endpoints empowered
  • Which could create
  • Competition
  • Instead of monopoly

We didnt create this tussle and cant end it
today We can seek an outlet for it
Clark et al. SIGCOMM 2002
8
The challenges in all of the above
x o o o o o o o o o o o o x o o o x o o o o x o o
o o o o o o o o x o o o x o o o o o o o o x o o
  • 1. Can we identify a coherent union?
  • 2. Can we build a mechanism to support it?
  • (My goal is to convince you its feasible)

9
Requirements for a candidate mechanism
x o o o o o o o o o o o o x o o o x o o o o x o o
o o o o o o o o x o o o x o o o o o o o o x o o
  • Communication needs approval from all parties
  • Communication follows the approved path
  • Adversarial environment
  • No centralization or trusted entities
  • Data plane is feasible, even at backbone speeds

10
ICING from 30,000 feet
Ri public key P R0,R1,R2,R3,R4 Ci MAC(si,
P)
D
  • C1
  • C2
  • C3
  • C4

R4
R0
R1
R3
R2
  • CS applies policy can also abdicate, delegate
  • Not covering how R0 gets approval to reach CSi,
    PS
  • Packets must be bound to paths efficiently
  • With no key distribution or pairwise coordination
  • While resisting attacks

11
Binding a packet to its path
Ri pubkey P R0,R1,R2,R3,R4 Ci MAC(si,
P) xi privkey of Ri ki,j H(gxixj, Ri, Rj)
  • Honest realms
  • 1. verify consent, provenance
  • 2. prove to later realms

?
C3
C4
C1
C2
R2
?
R3
C2 MAC(k0,2, 0H(P,M))
MAC(k1,2, 1H(P,M))
R4
12
ICINGs data plane in a nutshell
  • Binds a packet to its path (required by union)
  • Packet carries path (list of public keys), auth
    tokens
  • Realms use ki,j to transform auth tokens
  • For jlti, Ri verifies that all kj,i were applied
  • For jgti, Ri proves to Rj using ki,j
  • No key distribution Ri derives ki,j from Rjs
    name
  • Resists attack forgery, injection,
    short-circuiting,
  • Feasibility is required space, computation
    tolerable?

13
ICINGs data plane is feasible
  • Space overhead?
  • Average ICING header 250 bytes
  • Average packet size 1300 bytes CAIDA
  • So, total overhead from ICING 20 more space
  • Can forwarding happen at backbone speeds?
  • On NetFPGA, ICING speed is 80 of IP speed
  • At what hardware cost?
  • Equiv. gate count 13.4 M for ICING vs. 8.7 M for
    IP
  • Total logic area ICING costs 78 more than IP

14
Reflecting on ICING
consent server 1
CS 2
CS 3,4
D
  • ICING meets its requirements
  • Communication needs approval from all parties
  • Communication follows the approved path
  • Adversarial environment
  • No trusted entities
  • Data plane is feasible, even at backbone speeds

15
Aspects of ICING that this talk punted
  • The control plane (which is pluggable)
  • Handles configuration, path selection, getting
    Ci,
  • Runs in commodity servers, unseen by data plane
  • Ensures unapproved communications blocked early
  • Lots about the data plane
  • Expiration and revocation Ci, keys, secrets
  • Handling network failure, defending against
    attack
  • Deployment

16
Recap
  • Many good policies no consensus on best
  • So try to uphold all of the above
  • Brings technical challenges
  • ICING addresses those challenges
  • Today not implausible. Tomorrow not
    impractical.
  • 100,000-foot view bandwidth and computation keep
    increasing, so use them to buy new properties
  • We think ICINGs properties are worth its price

x o o o o o o o o o o o o x o o o x o o o o x o o
o o o o o o o o x o o o x o o o o o o o o x o o
Write a Comment
User Comments (0)
About PowerShow.com