Rdmap Security

20
A Seminar by Shinto. T. Jose

description

presented by Shinto T.Jose ,CUSAT,Kerala

Transcript of Rdmap Security

Page 1: Rdmap  Security

A Seminar byShinto. T. Jose

Page 2: Rdmap  Security

INTRODUCTION

• DIRECTLY MOVES DATA

• HIGH THROUGHPUT

• LOW LATENCY

• ZERO COPY NETWORKING

• RDMA• LAYERING• DATA FLOW• APPLICATIONS

Page 3: Rdmap  Security

INTRODUCTION

• RDMA• LAYERING• DATA FLOW• APPLICATIONS

ULPULP

TCPTCP

IPIP

DATA LINK LAYERDATA LINK LAYER

RDMA RDMA

Page 4: Rdmap  Security

INTRODUCTION

• RDMA• LAYERING• DATA FLOW• APPLICATIONS

Page 5: Rdmap  Security

INTRODUCTION

• Virtual interface Architecture

• Infiniband

• Iwarp

• Future versions of Microsoft Windows

• RDMA• LAYERING• DATA FLOW• APPLICATIONS

Page 6: Rdmap  Security

ARCHITECTURE

• COMPONENTS• RNIC

INTERACTIONS

Privileged Resource Manager

Privileged ULP

Non-privileged ULP

RNIC Engine

internet

RNIC interface

ULP interface

Page 7: Rdmap  Security

ARCHITECTURE

• RNIC• Privileged resource manager• Privileged ULP• Non privileged ULP

• COMPONENTS• RNIC

INTERACTIONS

Page 8: Rdmap  Security

ARCHITECTURE

• Privileged control interface

• Privileged data interface

• Non-Privelged data interface

• COMPONENTS• RNIC

INTERACTIONS

Page 9: Rdmap  Security

ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY

• IMPERSONATION– BLIND ATTACK OR ESTABLISHING

STREAM– GUESSING VALID PARAMETERS– END-TO-END AUTHENTICATION

• STREAM HIJACKING• MAN-IN-THE MIDDLE ATTACK

• SPOOFING• TAMPERING• SECURITY

OPTIONS

Page 10: Rdmap  Security

ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY

• IMPERSONATION • STREAM HIJACKING– HIJACK IN THE STREAM

ESTABLISHMENT PHASE– IP ADDRESS SPOOFING– END-TO-END INTEGRITY PROTECTION

AND AUTHETICATION• MAN-IN-THE MIDDLE ATTACK

• SPOOFING• TAMPERING• SECURITY

OPTIONS

Page 11: Rdmap  Security

ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY

• IMPERSONATION • STREAM HIJACKING• MAN-IN-THE MIDDLE ATTACK– ABILITY TO DELETE OR MODIFY– INVALIDATE STag– END-TO-END INTEGRITY PROTECTION

AND AUTHENTICATION

• SPOOFING• TAMPERING• SECURITY

OPTIONS

Page 12: Rdmap  Security

ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY

• MAN IN THE MIDDLE ATTACK

• MODIFICATION OF BUFFER CONTENT

• END-TO-END INTEGRITY PROTECTION AND AUTHENTICATION

• PHYSICAL PROTECTION

• SPOOFING• TAMPERING• SECURITY

OPTIONS

Page 13: Rdmap  Security

ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY

• SESSION CONFIDENTIALITY

• PER-PACKET DATA SOURCE AUTHENTICATION

• PER-PACKET INTEGRITY

• PACKET SEQUENCING

• SPOOFING• TAMPERING• SECURITY

OPTIONS

Page 14: Rdmap  Security

ATTACKS FROM LOCAL PEERS

• MORE COMPLETIONS THAN ITS FAIR SHARE

• CAUSES STARVING OF OTHER ULP’S

• RNIC MUST NOT ENABLE SHARING A CQ ACROSS UNTRUSTED ULPS

• LOCAL ULP ATTACKING A SHARED CQ

• LOCAL PEER ATTACKING THE RDMA READ REQUEST QUEUE

Page 15: Rdmap  Security

ATTACKS FROM LOCAL PEERS

• UNFAIRLY ALLOCATE RDMA READ REQUEST QUEUE RESOURCES FOR ITS STREAMS

• RDMA READ REQUEST QUEUE ENTRIES MUST BE RESTRICTED TO A TRUSTED LOCAL PEER (PRIVILEGED RESOURCE MANAGER)

• LOCAL ULP ATTACKING A SHARED CQ

• LOCAL PEER ATTACKING THE RDMA READ REQUEST QUEUE

Page 16: Rdmap  Security

ATTACKS FROM REMOTE PEERS

• USING UNAUTHORIZED STag• WHEN Stag FOR ONE STREAM IS

ENABLED, ATTACKER WILL USE IT FOR ANOTHER STREAM

• Stag VALUES SHOULD BE RANDOMLY SELECTED

• END-TO-END SECURITY IS USED

• SPOOFING

• TAMPERING

• ELEVATION OF PRIVILEGE

Page 17: Rdmap  Security

ATTACKS FROM REMOTE PEERS

• LOCAL BUFFER ENABLED WITH REMOTE WRITE

• BUFFER OVERRUN

• BASE AND BOUND CHECK

• END-TO-END SECURITY IS USED

• SPOOFING

• TAMPERING

• ELEVATION OF PRIVILEGE

Page 18: Rdmap  Security

ATTACKS FROM REMOTE PEERS

• NON PRIVILEGED ULP WILL MAKE IT AS PRIVILEGED ONE

• PRIVILEGED ULP WILL MAKE ITSELF AS PRIVILEGED RESOURCE MANAGER

• SECURITY BASED ON LOCAL IMPLEMENTATION

• END-TO-END SECURITY IS USED

• SPOOFING

• TAMPERING

• ELEVATION OF PRIVILEGE

Page 19: Rdmap  Security

CONCLUTION

• High throughput, low latency

• Maximum care given for security, but still remains a concern.

Page 20: Rdmap  Security

REFERENCES

• [RDMAP] Recio, R., Culley, P.,Garcia, D., and J. Hilland, "A Remote Direct Memory Access ProtocolSpecification ",RFC 5040, October 2007.

• [RDMAP SECURITY] J.Pinkerton. “RDMAP SECURITY”, RFC 5042, October 2007.