One document matched: draft-mrw-dvne-fw-00.txt
Network Working Group M. Wasserman
Internet-Draft Painless Security
Intended status: Standards Track P. Nallur
Expires: April 21, 2011 Futurewei Technologies
October 18, 2010
Dynamic Virtual Network Engine (DVNE) Framwork
draft-mrw-dvne-fw-00.txt
Abstract
This document discusses the management and configuration requirements
for large Virtual Networks (VNs). VNs are private networks that
employ tunneling technologies to overlay private network links over
physical IP networks.
As VNs grow, the amount of administrative effort required to manually
configure virtual nodes and to set up the required tunnels becomes
prohibitive. The DVNE protocol automates this process, elminating
much of the administrative work involved in setting up a virtual
network.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 21, 2011.
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
Wasserman & Nallur Expires April 21, 2011 [Page 1]
Internet-Draft DVNE Framework October 2010
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Applicability . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 3
4. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
5. DVNE Model . . . . . . . . . . . . . . . . . . . . . . . . . . 4
5.1. Mediator . . . . . . . . . . . . . . . . . . . . . . . . . 5
5.2. VN Nodes . . . . . . . . . . . . . . . . . . . . . . . . . 5
5.3. Using DVNE Service . . . . . . . . . . . . . . . . . . . . 5
5.4. VN Address Assignment . . . . . . . . . . . . . . . . . . 6
5.5. Tunnel Establishment . . . . . . . . . . . . . . . . . . . 6
5.6. Next Hop Determination . . . . . . . . . . . . . . . . . . 9
5.7. Interaction Between DVNE Entities . . . . . . . . . . . . 9
6. Security Considerations . . . . . . . . . . . . . . . . . . . 11
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
9.1. Normative References . . . . . . . . . . . . . . . . . . . 12
9.2. Informative References . . . . . . . . . . . . . . . . . . 12
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 12
Wasserman & Nallur Expires April 21, 2011 [Page 2]
Internet-Draft DVNE Framework October 2010
1. Introduction
This document discusses the management and configuration requirements
for large Virtual Networks (VNs). VNs are private networks that
employ tunneling technologies to overlay private network links over
physical IP networks.
As VNs grow, the amount of administrative effort required to manually
configure virtual nodes, and to set up the required tunnels, becomes
prohibitive. The DVNE protocol automates this process, eliminating
much of the administrative work involved in setting up a virtual
network.
2. Applicability
IPsec [RFC4301] site-to-site VPNs [RFC3809] are widely deployed in
enterprise networks. IPsec gateways located anywhere on the Internet
are virtual network nodes which are responsible for initiating/
terminating IPsec tunnels and encapsulating/decapsulating IPsec
packets. Every IPsec gateway should be configured with the addresses
of the gateway(s) to be tunneled to and the parameters pertaining to
the tunnel. It might be configured with the routing protocol(s) to
be used after the tunnel has been established and any other
configuration needed for virtual network connectivity. As the number
of such gateways increases, the scalability issues would arise. When
an IPsec gateway join or leave, the configuration of each gateway
would be updated.
Some people and companies have very dynamic networking needs. Small
or medium size companies might find the IT costs of deploying a
complete VPN infrastructure could not be justified. They may have
their access device(s) connected to the Internet via xDSL or the ISP
deploys CGN [I-D. nishitani-cgn] in its networks. It is challenging
to manually configure these access devices as virtual network nodes
to construct a virtual network, since they have dynamic addresses and
imposed on some communication constraints (by CGN). Such dynamic
nature might also apply to an individual person or a family. A
person might like to access his home network which might locate
behind NAT devices from anywhere over the Internet by auto-
configuring his home gateway and handset for media sharing.
3. Problem Statement
Constructing a virtual network traversing physical IP networks
encounters 2 major problems:
Wasserman & Nallur Expires April 21, 2011 [Page 3]
Internet-Draft DVNE Framework October 2010
o When the size of virtual networks grows, the configuration and
management burden is overwhelming. For example, when a virtual
network node joins a virtual network, the needed parameters should
be provisioned to the new comer, and changes would be propagated
to the existing virtual network nodes.
o The dynamic natural of virtual networks, such as addresses
assigned dynamically to virtual network nodes for the Internet
connection, would make static configuration and manual
configuration impossible.
4. Terminology
o Virtual Network (VN): an overlay network connecting VN nodes based
on physical networks along with the edge networks to which VN
nodes attach.
o DVNE: An approach to configure and manage virtual networks based
on the provision of dedicated servers, called Mediators.
o Mediator: Functional element of DVNE. Servers for configuring and
managing VNs. The administrator(s) can configure with the
Mediator VN construction policy and the Mediator in turn configure
with the designated or qualified VN nodes.
o VN node: Functional element of DVNE. The node connected to the
Internet which is responsible for initialing/terminating tunnels
or encapsulating/decapsulating encapsulated packets. All VN nodes
belonging to the same VN form an overlay network. VN node can
connect to edge networks to the overlay network.
5. DVNE Model
DVNE Mediators are configuration managers that help configure virtual
network connectivity to virtual network nodes already connected to
the Internet. The Mediator may be a server or a cluster. For
discovery purpose, the DNS names or addresses of the Mediator could
be pre-configured, referenced on web pages, provisioned via DHCP
[RFC2131][RFC3315] or DNS lookup.
The DVNE model is based on the set of functional elements depicted in
figure 1.
Wasserman & Nallur Expires April 21, 2011 [Page 4]
Internet-Draft DVNE Framework October 2010
+----------+
| Mediator |
+----------+
/ \
/ \
/ \
+---------+ +---------+
| VN Node |<========>| VN Node |
+---------+ +---------+
|
------------
/ \
| Edge Network |
\ /
------------
Figure 1: Simple DVNE configuration
5.1. Mediator
The Mediator is the place where the VN nodes connect to register and
activate their presence in the virtual network. The mediator
configures with VN nodes the necessary parameters for creating,
modifying or deleting a virtual network either automatically or by
request.
A Mediator must be IPv4 addressable. It must be reached by all VN
nodes (i.e., without NAT traversal needed).
5.2. VN Nodes
VN nodes function in the virtual network as routers or hosts. If a
VN node is a VN router, it is followed by an edge network consisting
of one or more physical hosts. After the configuration order is
received from the Mediator, the VN node set up tunnels, exchange
routing information and data forwarding, etc. accordingly.
5.3. Using DVNE Service
Administrators configure parameters for VN construction with the
Mediator instead of going to every single VN node. The configuration
between the admin and the Mediator can be achieved by interactive
commands, Web pages or any other alternative means. The
configuration parameters may contain the topology of the overlay
network (i.e., hub-and-spokes or hub), the function type of specific
VN nodes (i.e., router or host), the tunneling method (e.g., IPsec),
Wasserman & Nallur Expires April 21, 2011 [Page 5]
Internet-Draft DVNE Framework October 2010
the routing protocols (e.g., OSPF) or routing lookup method (e.g.,
via DNS lookup), etc. The Mediator will configure each VN node
accordingly when the VN node registers. We called this process as
administrative configuration.
Approaching the Mediator, the VN node should be asked first of all to
provide its identity and credentials so that proper user
authentication, authorization and accounting can be carried out
(e.g., relying on existing AAA facilities such as RADIUS). This
means the VN node and the Mediator have to share a pre-configured or
automatically established security association to be used to prevent
unauthorized use of the service. With this respect the Mediator can
be seen as an access-control server for VN nodes.
After successful authentication, the VN node may register further
information with the Mediator such as the IP address to which it is
attaching and/or request such as function type it would like (i.e.,
router or host), etc. In response, the Mediator configures the VN
node according to administrative configuration and the request if
exists. The configuration may contain the addresses of any other VN
nodes (which might be registered by the corresponding VN nodes in
advance), the tunneling method (e.g., IPsec), the routing protocols
used upon established tunnels or routing lookup method (e.g., name
service lookup) used for next-hop determination, etc.
5.4. VN Address Assignment
IP address should be assigned to the VN nodes and any edge network
they connect. Automatic addressing, e.g., DHCP is recommended in
this case not only because it is automatic but also it helps avoid
addressing conflict if used well. Besides, the address allocation
record can be used for next-hop determination when routing protocol
is not used.
The lifetime of these dynamically assigned VN addresses should be
relatively long and potentially longer than the lifetime of the
connection of the VN nodes to the Mediator. This is to allow the VN
node to get semipermanent VN addresses even though it gets
dynamically assigned IPv4 addresses through DHCP for access to the
Internet.
5.5. Tunnel Establishment
The Mediator configures a VN node with adequate information to create
tunnels. E.g., it may provide a VN node the address of another VN
node it attempts to tunnel to, the tunneling method (and
encapsulation options). The Mediator may provide extra information
in aid of tunnel setup authentication. E.g., it may relay
Wasserman & Nallur Expires April 21, 2011 [Page 6]
Internet-Draft DVNE Framework October 2010
fingerprint of certificates for each other [RFC4572].
DVNE at this stage only considers the case where all VN nodes attach
to the same virtual link, i.e., a VN node can reach each other VN
node in the virtual network in one-hop. There are two major
topologies to consider for overlay networks. In the hub-and-spokes
case, the spoke nodes should be configured with hub nodes' address.
In the mesh case, each node should be configured with other nodes'
address.
Wasserman & Nallur Expires April 21, 2011 [Page 7]
Internet-Draft DVNE Framework October 2010
+-----------+
| Mediator |
+-----------+
| | |
-----+ | +-----
/ | \
+---------+ +---------+ +---------+
| VN Node |<==>| VN Node |<==>| VN Node |
+---------+ +---------+ +---------+
|
------------
/ \
| Edge Network |
\ /
------------
Figure 2: Hub and Spoke Topology
+-----------+
| Mediator |
+-----------+
| | |
-------+ | +-------
/ | \
/ +---------+ \
| ===> | VN Node |<=== |
| // +---------+ \\ |
| V V |
+---------+ +---------+
| VN Node |<==================>| VN Node |
+---------+ +---------+
|
------------
/ \
| Edge Network |
\ /
------------
Figure 3: Mesh Topology
Things get complicated if one or both VN nodes are behind NAT
devices. The registered address when a VN node logs in may be
meaningless for other VN nodes if the VN node is behind NAT devices
whatever the VN node wants to connect to or connected by another VN
node. In that case, the Mediator may configure STUN and/or TURN
Wasserman & Nallur Expires April 21, 2011 [Page 8]
Internet-Draft DVNE Framework October 2010
servers' addresses to a VN node and coordinate with ICE to work out
the effective or efficient address pairs for connectivity. [I-D.
saito-mmusic-sdp-ike] presents an alternative approach for IKE/IPsec
tunnels establishment with NAT traversal using SIP/SDP model.
Tunneling configuration adjust to NAT traversal. E.g., when NAT
devices comes in between, UDP encapsulation of IPsec tunneling
[RFC3948] is preferred whereas TLS tunneling is preferred without the
presence of NAT.
5.6. Next Hop Determination
Routing protocols could be used for the virtual network routing after
tunnels have been established. When routing protocols are not
available or too costly, other alternatives should be considered. In
hub-and-spokes case, the Mediator would configure the spokes nodes
with a default route to the hub node. In mesh case, the Mediator
would configure each node with routes to other nodes and update the
routes over time. Instead, VN nodes can request routes from the
Mediator or DNS name servers when they are ready to forward VN
packets (in which case, the address of these DNS servers should be
configured in advance). The tunnels can be established as described
above before or after the routes have been configured.
5.7. Interaction Between DVNE Entities
The definition of a specific set of protocols and procedures to be
used for the communication among the various entities in the DVNE
architecture is outside of the scope of the present framework
document. Nevertheless, in the reminder of this section some viable
technical alternatives to support admin-Mediator, Mediator-node, and
node-node interaction are briefly described in order to help future
implementation efforts or standardization initiatives.
The administrator could configure parameters for VN construction with
the Mediator via SSH, HTTP, SNMP, NETCONF or any other alternate
methods. All the se methods are secure.
A VN node should register some information (e.g., its addresses)
and/or request configuration to the Mediator. In response, the
Mediator should configure the VN node with addressing, routing,
tunneling, etc. The Mediator may configure the VN node with STUN/
TURN server's address if the VN node is behind NAT device(s). In
that case, both VN nodes and the Mediator may be integrated with ICE
mechanism to achieve NAT traversal. Other than the VN related
configuration and policies, the Mediator may relay referrals to two
VN nodes that are willing to setup tunnels with each other for better
connectivity. [I-D. carpenter-behave-referral-object] tries to
Wasserman & Nallur Expires April 21, 2011 [Page 9]
Internet-Draft DVNE Framework October 2010
standardize a generic referral objects and GROBJ BoF at this writing
time is undertaking related tasks.
When two VN nodes choose a pair of addresses for connectivity, one
node can initiate a tunnel to the other node according to the
administrative configuration or request. DVNE assumes the tunnel
method is IPsec All the interaction between the functional elements
of the proposed architecture need to be secured:
o The interaction between the Mediator and the administrator;
o The interaction between a VN node and the Mediator;
o The interaction between VN nodes.
The Mediator should impose a strong method to authenticate the
administrator, for example, using X.509 certificate issued by a
trusted Certification Authority. The configuration data between the
Mediator and the administrator usually exchange in an interactive
mode, SSH, TLS or any other alternative means can protect the
integrity and confidentiality of the configuration data.
The Mediator should impose a strong or moderate method to
authenticate the VN node and let the authorized VN node join the VN.
A moderate method could be using TLS as secure tunnel and using
username/password method to do actual authentication since X.509
certificate might be costly in some circumstances. The integrity and
confidentiality can be achieved by using TLS or any other alternative
means to protect the data.
The VN nodes use tunneling technologies which are out of the scope of
this document should accommodate NAT traversal. For example, UDP
encapsulation of ESP would be used for IPsec works in the presence of
NAT. for tunneling authentication, the Mediator can act as a proxy to
relay the authentication credentials or share pre-secret or
distribute session key for tunneled data encap/decap. The security
for tunneled data is dependent on which tunnel technology you used.
Security issues for tunnels are addressed in specific tunneling
specification or relevant documents and out of the scope of this doc.
Finally, the Mediator must implement protections against denial of
service attacks which may occur whenever a malicious user exhausts
all the resources available on the Mediator. A possible protection
against this attack could be achieved by administratively limiting
the VN scale and the number of VNs supported simultaneously.tunnel
and IPsec tunnel over UDP (when NAT traversal is needed). Other
alternatives like SSL, L2TP, GRE should be considered later.
Wasserman & Nallur Expires April 21, 2011 [Page 10]
Internet-Draft DVNE Framework October 2010
6. Security Considerations
All the interaction between the functional elements of the proposed
architecture need to be secured:
o The interaction between the Mediator and the administrator;
o The interaction between a VN node and the Mediator;
o The interaction between VN nodes.
The Mediator should impose a strong method to authenticate the
administrator, for example, using X.509 certificate issued by a
trusted Certification Authority. The configuration data between the
Mediator and the administrator usually exchange in an interactive
mode, SSH, TLS or any other alternative means can protect the
integrity and confidentiality of the configuration data.
The Mediator should impose a strong or moderate method to
authenticate the VN node and let the authorized VN node join the VN.
A moderate method could be using TLS as secure tunnel and using
username/password method to do actual authentication since X.509
certificate might be costly in some circumstances. The integrity and
confidentiality can be achieved by using TLS or any other alternative
means to protect the data.
The VN nodes use tunneling technologies which are out of the scope of
this document should accommodate NAT traversal. For example, UDP
encapsulation of ESP would be used for IPsec works in the presence of
NAT. for tunneling authentication, the Mediator can act as a proxy to
relay the authentication credentials or share pre-secret or
distribute session key for tunneled data encap/decap. The security
for tunneled data is dependent on which tunnel technology you used.
Security issues for tunnels are addressed in specific tunneling
specification or relevant documents and out of the scope of this doc.
Finally, the Mediator must implement protections against denial of
service attacks which may occur whenever a malicious user exhausts
all the resources available on the Mediator. A possible protection
against this attack could be achieved by administratively limiting
the VN scale and the number of VNs supported simultaneously.
7. IANA Considerations
There are no IANA considerations for this document.
Wasserman & Nallur Expires April 21, 2011 [Page 11]
Internet-Draft DVNE Framework October 2010
8. Acknowledgements
This document was written using the xml2rfc tool described in RFC
2629 [RFC2629].
9. References
9.1. Normative References
[RFC2131] Droms, R., "Dynamic Host Configuration Protocol",
RFC 2131, March 1997.
[RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
and M. Carney, "Dynamic Host Configuration Protocol for
IPv6 (DHCPv6)", RFC 3315, July 2003.
[RFC3809] Nagarajan, A., "Generic Requirements for Provider
Provisioned Virtual Private Networks (PPVPN)", RFC 3809,
June 2004.
[RFC3948] Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and M.
Stenberg, "UDP Encapsulation of IPsec ESP Packets",
RFC 3948, January 2005.
[RFC4301] Kent, S. and K. Seo, "Security Architecture for the
Internet Protocol", RFC 4301, December 2005.
[RFC4572] Lennox, J., "Connection-Oriented Media Transport over the
Transport Layer Security (TLS) Protocol in the Session
Description Protocol (SDP)", RFC 4572, July 2006.
9.2. Informative References
[RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
June 1999.
Wasserman & Nallur Expires April 21, 2011 [Page 12]
Internet-Draft DVNE Framework October 2010
Authors' Addresses
Margaret Wasserman
Painless Security
356 Abbott Street
North Andover, MA 01845
USA
Phone: +1 781 405 7464
Email: mrw@painless-security.com
URI: http://www.painless-security.com
Padmanabha Nallur
Futurewei Technologies
3255-4, Scott Blvd
Santa Clara, California
USA
Email: pnallur@huawei.com
Wasserman & Nallur Expires April 21, 2011 [Page 13]
| PAFTECH AB 2003-2026 | 2026-04-24 03:07:13 |