nicolae paladi sdn security - rise viktoria paladi sdn security design challenges in multi-tenant...

23
Nicolae Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT Lund University

Upload: lequynh

Post on 17-May-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Nicolae Paladi

SDN Security Design Challenges

In Multi-Tenant Virtualized Networks

SICS Swedish ICT!Lund University

Page 2: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Multi-tenancy

Multiple tenants share a common physical infrastructure.

Page 3: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Multi-tenancy

A tenant corresponds to a customer using a particular virtual network.

Organization A

Page 4: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Multi-tenancy

Organization BOrganization A

Tenants may belong to different administrative domains.

Page 5: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Multi-tenancy

Domain A

Domain B

Tenants expect network isolation of their domain.

Page 6: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Multi-tenancy

Tenant ATenant B

Tenant C

Physical resource sharing is fully abstracted, with tenants unaware of other neighbours.

Page 7: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Multi-tenancyTenants may create multiple distinct virtual

network instances and topologies.

Page 8: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Network Slicing

A. Bandwidth B. Topology C. Traffic D. Device CPU E. Forwarding tables (aka

forwarding information base)

Page 9: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

A network architecture which decouples the network forwarding functionality from the control and management logic!

Software Defined Networking

Page 10: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Southbound API

Global network view

Network Operating System(e.g. NOX, Rosemary, etc.)

Network Hypervisor

Management Applications

SDN System Model• Management applications are used by network

administrators to express their network configuration goals using a set of high-level comments. May include components such as firewalls, intrusion detection systems, traffic shapers, etc.

• Control plane is a logically distributed abstraction layer that transforms high-level network operator goals into discrete routing policies based on a global network view.

• Southbound API is a vendor-agnostic set of instructions implemented by the routing equipment on the data plane.

• The data plane contains both hardware and software rout- ing equipment. This component implements the routing policies that satisfy the goals of the network administrator.

Page 11: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Scenario

http://chucksblog.emc.com/chucks_blog/2012/07/workload-mobility-is-more-real-than-you-might-think.html

Page 12: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Scenario

• Large-scale enterprise network infrastructure (e.g. one or multiple datacenters)!

• Multiple tenants share the virtualised infrastructure !

• Tenants set up their own topology!

• Provider allocates quotas, manages routing, handles conflicts and service disruptions

http://chucksblog.emc.com/chucks_blog/2012/07/workload-mobility-is-more-real-than-you-might-think.html

Page 13: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Who is the adversary?!

What are the capabilities of the adversary?!

What are the threat vectors?

SDN Adversarial Model

Page 14: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Security of SDN infrastructure!vs.!

Security capabilities enabled by SDN

Page 15: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Security of SDN infrastructure!vs.!

Security capabilities enabled by SDN

Page 16: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Adversarial Model Assumptions

• Assume hardware integrity • Assume physical security • Assume cryptographic security

Page 17: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Adversary Capabilities

• Overhear, intercept, and synthesise messages. • Analyse the traffic patterns in the network • Disrupt or degrade network connectivity. • Send valid tenant packages with an arbitrary content and frequency to the components it can reach.

• Attempt to impersonate other tenants. • Install arbitrary management applications and issue policies within its network domain. • Attempt to decrypt intercepted network traffic that is sent and received by other tenants. • Attack the network communication of the SDN-based infrastructure. • Attempt to impersonate network infrastructure components. • Issue malicious policies aiming to either monitor, distort or disrupt network traffic. •Attempt to decrypt intercepted network traffic that is sent and received by other network infrastructure components.

Page 18: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Southbound API

Global network view

Network Operating System(e.g. NOX, Rosemary, etc.)

Network Hypervisor

Management Applications

F/G

D

A/B/C

E

C

Attack VectorsA.Vulnerabilities in the control plane B. Attacks on control plane communications

C. Lack of a trust chain between the management applications and the data plane

D. Attacks on policies and rules in programmable networks

E. Resource limit violations F. Attacks on virtual switches and network gateways

G. Weak bandwidth isolation as attack vehicle

Page 19: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Southbound API

Global network view

Network Operating System(e.g. NOX, Rosemary, etc.)

Network Hypervisor

Management Applications

F/G

D

A/B/C

E

C

Security Requirements• A: Access control model to limit effect of

vulnerabilities in controllers. • A: Policy verification prior to deployment. • B: Authenticated communication between

control plane components; secure enrolment mechanism for management applications and data plane devices.

• C: Traceability and non-repudiation for all configuration commands and policies issued by network management applications.

• D: A mechanism for network policy isolation, such that the effects of policies in a certain tenant domain have no effect on other domains.

Page 20: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Security Requirements (continued)• D: New network management policies

must run through an integration verification engine prior to deployment.

• E: Mechanism to ensure that network management applications do not allocate resources beyond the assigned quota.

• F: Verified integrity of virtual network components prior to deployment; keys protected with a hardware root of trust.

• G: Policy-based routing decisions immune to vulnerabilities in bandwidth isolation between tenants.

• G: Software and hardware network components must offer equally strong bandwidth isolation properties.

Southbound API

Global network view

Network Operating System(e.g. NOX, Rosemary, etc.)

Network Hypervisor

Management Applications

F/G

D

A/B/C

E

C

Page 21: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Upcoming Work (Setting up the infrastructure)

1. Integrity verification of virtual network components prior to deployment.!

2. Authenticated communication between control plane components.!

3. Secure enrolment mechanism for management applications and data plane devices.!

4. Configuration policy grammar suitable for integration verification. http://pixshark.com/brick-wall-black-and-white-drawing.htm

Page 22: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Upcoming Work (Ramping up security guarantees)

1. Access control model for network operating systems.!

2. Additional mechanisms for quota enforcement and monitoring.!

3. Scalable model-based policy integration verification prior to deployment on data plane.

Bodiam Castle

Page 23: Nicolae Paladi SDN Security - RISE Viktoria Paladi SDN Security Design Challenges In Multi-Tenant Virtualized Networks SICS Swedish ICT! Lund University

Recommended Reading• A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang, “A clean slate 4D approach to

network control and management,” ACM SIGCOMM Computer Communication Review, vol. 35, no. 5, pp. 41–54, 2005.

• M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, “Ethane: taking control of the enterprise,” in ACM SIGCOMM Computer Communication Review, vol. 37, pp. 1–12, ACM, 2007.

• M. Casado, N. Foster, and A. Guha, “Abstractions for software-defined networks,” Communications of the ACM, vol. 57, no. 10, pp. 86–95, 2014.

• N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, “NOX: towards an operating system for networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 3, pp. 105– 110, 2008.

• T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, et al., “Onix: A Distributed Control Platform for Large-scale Production Networks.,” in OSDI, vol. 10, pp. 1–6, 2010.

• P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, “A security enforcement kernel for OpenFlow networks,” in Proceedings of the first workshop on Hot topics in software defined networks, pp. 121– 126, ACM, 2012.

• S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh, and B. B. Kang, “Rosemary: A Robust, Secure, and High- Performance Network Operating System,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 78–89, ACM, 2014.

• D. Kreutz, F. Ramos, and P. Verissimo, “Towards secure and dependable software-defined networks,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp. 55–60, ACM, 2013.

• Lasserre, M., et al. Framework for Data Center (DC) Network Virtualization. No. RFC 7365. 2014.

• Hartman, S., Zhang, D., Wasserman, M., Qiang, Z., Mingui, Z. Security Requirements of NVO3, draft-ietf-nvo3-security-requirements-04.