FastPass: Availability Tokens to Defeat DoS - PowerPoint PPT Presentation

About This Presentation
Title:

FastPass: Availability Tokens to Defeat DoS

Description:

Allow Internet destinations to provide clients with an 'availability token' ... protecting a flow that can be adversely affected by even low loss percentages, ... – PowerPoint PPT presentation

Number of Views:39
Avg rating:3.0/5.0
Slides: 24
Provided by: Dan1
Learn more at: http://www.cs.cmu.edu
Category:

less

Transcript and Presenter's Notes

Title: FastPass: Availability Tokens to Defeat DoS


1
FastPass Availability Tokens to Defeat DoS
  • Presented at CMU Systems Seminar by
  • Dan Wendlandt
  • Work with David Andersen Adrian Perrig

2
Bandwidth exhaustion attacksrequire
infrastructure support
Loss at router buffers, before reaching endhost
3
Basic Idea Availability tokens
  • Allow Internet destinations to provide clients
    with an availability token through an arbitrary
    out-of-band mechanism that guarantees Internet
    availability regardless of host resource capacity
    OR the number of attackers.

4
Stateless Router-based CapabilitiesA useful
building block
Source
Destination
Give priority?
5
Problem Denial-of-Capability
  • First packet is sent without capability
  • This request channel is subject to packet floods
    (DoC).

Back where we started?
NO!
6
New Requirement One packet
  • Instead of protecting a flow that can be
    adversely affected by even low loss percentages,
    we now must only get ONE PACKET through.

7
Possible Approaches
  • Dumb Routers
  • Best-effort traffic, rely on probability
  • Fair Routers
  • Try to give everyone an equal chance
  • Informed Routers
  • Infrastructure is told by destinations what
    packets to prioritize

8
Availability in a Next-Gen architecture ( m2m ) ?
  • Many more hosts
  • Diverse end-host resources (bandwidth
    computation)
  • Greater cost of being unreachable
  • More stringent requirements for time to establish
    a connection

9
How to compare?
  • Time-to-Capability (TTC)
  • Robustness to uncooperative infrastructure
  • Cost/complexity to deploy
  • Assumptions about topology or client resources
  • Scalability nature of collateral damage

10
Today Incremental Improvements
  • All previous schemes increase the number of
    attacker resources needed to totally deny
    availability to a destination, but do not offer
    fundamentally secure
  • availability.

11
Goal Setting a Higher Bar
  • We want arbitrary hosts to be able to
    communicate without delay regardless of their
    location in the Internet topology or their local
    resources.
  • Subject only to provisioning the purchase from
    their network service provider.

Total Network Capacity Control
12
Availability Tokens
  • Extra data in the capability header that proves
    to forwarding routers that the destination wishes
    to accept the request packet

Link Header
IP Header
Capability Token
Transport Level Header Data
Request Packet
13
Examples
  • Destinations outsource token distribution to
    Akamai, which requires proof-of-work, etc to
    provide token. Protected by bandwidth
    geographic diversity
  • An online brokerage uses a one-time-password tool
    to generate tokens.
  • Small company provides private key to employees
    along with VPN software.

14
A flavor of three schemes
  • Public Key Scheme
  • Iterative Capability Discovery
  • Hash-Chain Scheme

WARNING! Important Details Omitted due to
time-constraints
15
Public Key Scheme
  • Private key generates token as a signature,
    public key distributed to all routers.
  • Routers verify signature and check for duplicate
    or expired tokens.
  • Main Challenge
  • Crypto cannot be DoS-able.

16
Iterative Capability Discovery
  • Use partial router capabilities to protect
    discovered portions of the path.
  • At congested points, encrypt capabilities THROUGH
    congested router with public key of destination,
    punt it back to client.
  • Dest. authorizes client by decrypting these
    capabilities.
  • Iterate.

17
Iterative Discovery (1)
Source
Congestion!
Destination
Encrypted with Dest. Public key
Returned to Source
18
Iterative Discovery (2)
Source
Akamai
Proof of Work / Identity
Unencrypted Capability
19
Iterative Discovery (1)
Source
Congestion!
Destination
Partial Capability works as token to get request
through congested router
20
Lightweight Hash-Chain Scheme
How to make this work in todays architecture
routers?
Idea Replace public key crypto with symmetric,
using a shared router destination secret.
This comes at the cost of robustness to
compromised routers.
21
Lightweight Hash-Chain Scheme
H_2 Hash(H_1)
AS D
AS C
AS A
AS B
AS X
AS Y
H_1 Hash(H_0)
D
Destination has secret H0
22
Hash-Chain tokens
  • Destination can compute all H_i, and provides
    source S with sequence of
  • Hash(S-address, H_i) pairs.
  • Compromised of key H_i only impacts routers at a
    radius gt i from the source.

23
Thanks!
  • Interested in chatting or reading a SIGCOMM
    draft? Let me know!
  • danwent_at_gmail.com
  • http//www.cs.cmu.edu/dwendlan/
Write a Comment
User Comments (0)
About PowerShow.com