No Slide Title

Download Report

Transcript No Slide Title

RMTP-II Security Considerations
Brian Whetten
GlobalCast Communications
Types of Security Concerns
Highest
Non-Repudiation
Privacy
Multicast
IPSec
Access Control
Authentication
RMTP-II
Denial of Service
Lowest
Security
Level
Mis-Configuration
IP Multicast
RMTP-II Roles
 Sender
- Sends reliable IP multicast traffic
 Top Node (TN) - Provides central control point
 Designated Receiver (DR) - ACK Aggregation,
Local Retransmission
 Receiver - Receives traffic, does not necessarily
source multicast packets
 Assume:
DR’s and TN’s are trusted, others aren’t
Denial of Service Attacks
 Denial

of Service to a Specific Receiver or Sender
Corruption of Control State
 Network
Overload
Spurious Retransmission Requests
 Sender Transmitting Too Fast
 Improperly Scoped Multicast Packets

 CPU

Exhaustion
Group Membership Change Request Flooding
 Memory

Exhaustion
Refusal to ACK Packets
 Others?
Strong Defense for Denial of Service
 Extend
Multicast IPSec to provide light-weight
group authentication
One key for all DR’s and TN’s in the same trust domain
 One key for each sender
 One key for all receivers
 Otherwise as per Canetti Draft

 Still
allows valid senders/receivers access to DoS
attacks, if they are malicious

Network manager can likely remove or punish user
 Still

allows brute force DoS attacks
Solved at the IP Level (SEP)
Light Weight Authentication
 Different
keys, depending on roles
 Options: multiple keys for each network trust
domain, for each sender
 Implemented as part of security architecture
Receivers
Sender
Tokyo
New York
ISP
DR
Receivers
Top Node
London
Group
Controller
Server
DR
DR
Weak Defenses for Denial of Service
 Check
IP Addresses of Control Packet Author
Against Local Group List (spoofable)
Helps: Corruption of Control State
 Helps: Spurious Retransmission Requests
 Helps: Group Membership Change Request Flooding

 Bandwidth
Limits on Local Retransmissions
Part of Local Recovery Pathology Management
 Helps: Spurious Retransmission Requests

 Forced
Removal of Slow Receivers
Helps: Refusal to ACK Packets
 Helps: Spurious Retransmission Requests

Weak Defenses (cont.)
 Manual
Network Manager Controls
Allows Network Manager to Control Transmission Rates
 Could be Extended to Rejecting Senders and Receivers
 Helps: Sender Transmitting Too Fast
 Helps: Spurious Retransmission Requests

 Congestion

 IP
Control Works With Worst Report
Helps: Sender Transmitting Too Fast
Multicast Defenses (pruning, etc.)
Helps: Improperly Scoped Multicast Packets (SEP)
 Helps: Sender Transmitting Too Fast

Manageability
 Top
node controls the tree
 Gives manager control
 App requests QoS
Manager can override Sender
 Congestion control works
to meet QoS

The Network
TN
TN
DR
 Top
node reports group
performance to manager
 Manager can adjust
Manager
parameters on the fly
DR
Receivers
Mis-Configuration
 RMTP-II
Presently Requires Manual Configuration
Performance Parameters
 Tree Topology Configuration

 Both Are
Topics for Further Research
 Concern: Minimize Scope of Configuration Errors
Ideally to the network controlled by that administrator
 Tree topology errors typically affect all downstream
nodes
 Performance parameters are primarily specified per-tree,
at the top node, or per-group, specified at the sender
 Topic requires further study
