1 / 11

NAT/Firewall NSLP Activities

NAT/Firewall NSLP Activities. IETF 60th - August 2nd 2004 Cedric Aoun, Martin Stiemerling, Hannes Tschofenig. NAT/Firewall NSLP updates. NAT / Firewall NSLP - v01 -> v03. Documents introduced after IETF 59.

minnie
Download Presentation

NAT/Firewall NSLP Activities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NAT/Firewall NSLP Activities IETF 60th - August 2nd 2004 Cedric Aoun, Martin Stiemerling, Hannes Tschofenig

  2. NAT/Firewall NSLP updates NAT / Firewall NSLP - v01 ->v03 Documents introduced after IETF 59 WG document has significantly improved and integrated prior analysis done in the accompanying ephemeral drafts Security Threats for NAT/FW NSLP v01 Intra-realm considerations v00 ->v01 NAT/Firewall NSLP Security Problems Migration Draft v01 ->v02

  3. NATFW NSLP WG document updates • Editorial changes: • increased readability, shortened section 2 and moved security discussions into one section • New terminology for Reserve External Address messages destination address: • Opportunistic Address • New section: • Section 4: NTLP requirements

  4. NATFW NSLP WG document updates • New messages and message processing changes: • CREATE - Creates, maintains and deletes a NATFW NSLP session and all its associated policy rule states • Reserve External Address (REA) • RESPONSE - integrates all semantics of the previous response messageswith usage of various response object types • NOTIFY - asynchronous event notification message • TRIGGER - Message used by NR to update and refresh policy rule state installed by NR requested CREATE. Allows deployments with one end initiative NSIS messages but not the other • CREATE messages sent from the far-end (i.e. , not triggered) take precedence on triggered CREATE and no loner require TRIGGER messages to be sent by NR • QUERY - query message used for diagnosis and potential NI misbehavior detection

  5. NATFW NSLP WG document updates • Protocol can signal policy rules with ‘drop‘ action • Feedback requested from WG on this as it has limited applicability • Different response types - hinted by the RESPONSE_TYPE object: • RESPONSE (usual case) • CREATE: • A) Sent only if the responding node is not the message destination • I.e.no NR on the other end • B) Sent by node meeting the scope • Sent either on the existing pinned down reverse or a new separate one • CREATE could be sent with a specific source address (if provided in the message triggering the CREATE) or the responding node address • No RESPONSE(no RESPONSE_TYPE object inserted) case of NOTIFY messages and session states deleting CREATE messages

  6. NR behind a NAT - existing capability DS Public Internet NAT Private address NR No NI | space | | REA[CREATE, DISC] | | |<---------------------------------- | | | RESPONSE[Error/Success] | | | -------------------------------- > | | |CREATE | | | ---------------------------------> | | | RESPONSE[Error/Success] | | | -------------------------------- > | | | | | | | NR acts autonomously without Any DS NSIS capability knowledge No restriction on authorized data senders address

  7. NR Behind NAT - extensions Foo.com Public Internet Bar.com DS NAT Firewall NR No NI | | TRIGGER[DSinfo] TRIGGER[DSinfo]<-----------------| <---------------| | |CREATE | | |--------------->|CREATE | | |-----------------> | | | RESPONSE[SUCCESS] | | <-----------------| RESPONSE[SUCCESS] | |<------------- | | Refresh period expiry | or updates to Data Sender information | | | | | TRIGGER[DSinfo] TRIGGER[DSinfo]<------------------| <----------------| | | |CREATE | |--------------->|CREATE | | |------------------>| | | RESPONSE[SUCCESS] | | <------------------| RESPONSE[SUCCESS] | |<----------------| | Authorized data sender address is limited to known DS address and port (if available to the user application layer) NR acts autonomously without Any DS NSIS capability knowledge

  8. NATFW NSLP WG document updates • Session refresh still handled end to end • Refreshes only generated by NI and not by intermediate NE • BUT when intermediate NE requests lifetime changes • They also provide the associated Message Refresh Rate • Allows the support of different relations between state lifetime and message refresh rate +----+ CREATE(lt=60s) +-----------+ CREATE(lt=20s) +---------+ | |------------------------>| NSLP |---------------------> | | | NI | | | | NR | | |<----------------------- | forwarder |<----------------------| | +----+ RESPONSE +-----------+ RESPONSE +--------+ (lt=15s MRR=3s) (lt=15s MRR=3s) lt = lifetime MRR = Message Refresh Rate

  9. NATFW NSLP WG document updates • NATFW NSLP’s NTLP requirements: • Ability to detect that the NSIS Responder does not support NATFW NSLP • Detection of NATs and their support of the NSIS NATFW NSLP. • Message origin authentication and message integrity protection • Will depend on used security approach: hop by hop or end to end • Detection of routing changes • Protection against malicious announcement of fake path changes • Transport of user application correlation information. This requirement allows NSLP NATFW to check that the message was solicited by prior application message exchanges before an NTLP messaging association is established between an NR and the upstream NF.

  10. Open issues • Procedural: • Authors sent protocol operations changes to mailing list but no comments were received? • No news = GOOD NEWS :-) ? • Should a REA always trigger a CREATE message? • Should triggered CREATE messages be always sent on a new reverse path (and not the pinned down one)? • Should TRIGGER messages require a RESPONSE? • In case a CREATE is not received by the NR it would know if the TRIGGER was received by its target

  11. Open issues • Usage of TRIGGER and REA variant for NRs behind Firewalls • Currently not discussed in the document, relates to: • Scenarios where one end-host supports the protocol • Drop action handling • Would have more issues with route asymmetry as no path anchoring provided as is the case with NR behind NAT scenario • In case the host was the application initiator it would send the CREATE triggering a CREATE, but if it wasn’t the application initiator • TRIGGER would certainly be useful • Message and object format alignment to NTLP and Qos NSLP • Do we have agreement on the format? • Extensibility handling and its integration in the object format • Twice NAT handling • Security issues - discussed in security presentation

More Related