scipass - lawrence berkeley national laboratory

19
SciPass Securish OpenFlow Based Science DMZ Edward Balas GlobalNOC Indiana University June 15, 2015 1

Upload: others

Post on 15-Oct-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SciPass - Lawrence Berkeley National Laboratory

SciPass Securish OpenFlow Based Science DMZ

Edward Balas GlobalNOC

Indiana University June 15, 2015

1

Page 2: SciPass - Lawrence Berkeley National Laboratory

Problem• Campus Networks are

enterprise infrastructure – large number of small flows – security is a required

capability • not elephant flow friendly • could just bypass but that

doesn’t provide required security

• what about performance assurance?

2

Page 3: SciPass - Lawrence Berkeley National Laboratory

Science DMZ• design to support high

performance science apps – reduce loss that

impacts TCP perf – appropriate security

for 100Gbps – integrate network test

points • go fast, keep it controlled

3

Not This

I should try rear engine

This

Page 4: SciPass - Lawrence Berkeley National Laboratory

Objective:• reconfigure existing components

for better experience • Correct, Consistent, Performant,

Affordable • 100G Science DMZ with security

features baked in. – adaptive IDS load balancing – hardware block / forward

traffic – controlled bypass of

institutional firewall – integrated measurement

4

Even Better, engine in rear

Page 5: SciPass - Lawrence Berkeley National Laboratory

Approach• Combine

• OpenFlow Switch • Bro • PerfSonar

• create reactive system • default to secure /

slow path • use IDS to control

what goes on fast path

5

Page 6: SciPass - Lawrence Berkeley National Laboratory

Default Behavior• traffic goes through

firewall

6

Page 7: SciPass - Lawrence Berkeley National Laboratory

Default Behavior• In parallel, copies of

packets are sent to IDS ports

• copies are sent to array of IDS

• load balancing techniques

7

Page 8: SciPass - Lawrence Berkeley National Laboratory

IDS detects good• As IDS inspects traffic • identifies science

flows • signals SciPass setup

fast path and not send data to IDS for flow

8

Page 9: SciPass - Lawrence Berkeley National Laboratory

SciPass Bypasses Firewall• Based on IDS input

SciPass installs fast path rule for a transfer – Firewall is

bypassed – Traffic not sent to

IDS

9

Page 10: SciPass - Lawrence Berkeley National Laboratory

Technical Details

• stand alone / appliance SDN Deployment • combines Bro with SciPass to create a

reactive / adaptive system • The new thing here is that we are

fingerprinting GOOD traffic and enhancing its path through the DMZ.

• Oh and we can do fine grained 5-tuple based blocking

10

Page 11: SciPass - Lawrence Berkeley National Laboratory

Simple Load Balancing• Similar to binary search 1.Divide IP space into the number of sensors on start 2.check the sensor load, if above threshold

a. split prefix with largest load but leave on same sensor b. observe load by subnet c. if highest load subnet too big to move to other sensor,

goto 3 d. if subnet will fit on other, move subnet to less loaded

sensor 3.repeat periodically

11

Page 12: SciPass - Lawrence Berkeley National Laboratory

Who is doing this?

• Indiana University – GlobalNOC – Indiana University Security Office

• Collaborating with – Bro Team

• Looking for other participants

12

Page 13: SciPass - Lawrence Berkeley National Laboratory

Testing

• DMZ deployed in Indianapolis lab • Brocade MLXe switch • Netscreen 5200 • IBM G8264

• Tested to ESnet well known test points • 7ms of delay to the Argonne server • http://fasterdata.es.net/performance-testing/DTNs/

13

Page 14: SciPass - Lawrence Berkeley National Laboratory

Manual Bypass after 8 sec

14

Page 15: SciPass - Lawrence Berkeley National Laboratory

Reactive Bypass Performance• 64 ms - time to detect and bypass • 250 ms - doubled throughput of firewall • 1.5 sec - same throughput as no firewall

15

Page 16: SciPass - Lawrence Berkeley National Laboratory

IU Campus Trial

• Deployed temporarily for IDS load balance • Mix of Bro and Snort • 8 sensor groups

• each group contains 1 bro + 1 snort • 18,000,000 possible local addresses • 10 to 20Gbps of traffic avg • Test effectiveness of balance

16

Page 17: SciPass - Lawrence Berkeley National Laboratory

Trial Results

• 20% traffic load delta after 10 balancing rounds

• 10% traffic load delta after 20 rounds • stopped short of 5% due to traffic patterns • results encouraging

17

Page 18: SciPass - Lawrence Berkeley National Laboratory

Status

• IDS load balancer deployment in June • Planning for field trials of DMZ use case • First “production” release available • Investigating non-sampled flow at 100g

• netsage project • IDS load balancer deployment

18

Page 19: SciPass - Lawrence Berkeley National Laboratory

More Info

• Project Page • http://globalnoc.iu.edu/sdn/scipass.html

• Code Repository •https://github.com/GlobalNOC/SciPass

• email •[email protected]

19