30
May 23, 2006 Columbia Verizon Research Columbia Verizon Research Security: Security: SIP Application Layer Gateway SIP Application Layer Gateway Eilon Yardeni Eilon Yardeni Columbia University Columbia University Gaston Ormazabal Gaston Ormazabal Verizon Labs Verizon Labs

Columbia Verizon Research Security: SIP Application Layer Gateway

  • Upload
    hubert

  • View
    31

  • Download
    0

Embed Size (px)

DESCRIPTION

Columbia Verizon Research Security: SIP Application Layer Gateway. Eilon Yardeni Columbia University Gaston Ormazabal Verizon Labs. Agenda. Team Project Overview Background What is the Problem Goals Technical Overview Hardware Platform Software Developed at Columbia - PowerPoint PPT Presentation

Citation preview

Page 1: Columbia Verizon Research  Security: SIP Application Layer Gateway

May 23, 2006

Columbia Verizon Research Columbia Verizon Research Security:Security:

SIP Application Layer GatewaySIP Application Layer Gateway

Eilon YardeniEilon YardeniColumbia UniversityColumbia UniversityGaston Ormazabal Gaston Ormazabal

Verizon LabsVerizon Labs

Page 2: Columbia Verizon Research  Security: SIP Application Layer Gateway

2May 23, 2006

AgendaAgenda Team Project Overview

– Background What is the Problem

– Goals Technical Overview

– Hardware Platform– Software Developed at Columbia– Integrated Testing and Analysis Tool– Large Scale Testing Environment

Conclusions

Page 3: Columbia Verizon Research  Security: SIP Application Layer Gateway

3May 23, 2006

TeamTeam

VerizonVerizon Stu Elby, VP Architecture Jim Sylvester, VP Systems

Integration and Testing– Gaston Ormazabal

ColumbiaColumbia Prof. Henning Schulzrinne

– Jonathan Lennox– Kundan Singh– Eilon Yardeni

Page 4: Columbia Verizon Research  Security: SIP Application Layer Gateway

4May 23, 2006

BackgroundBackground Columbia likes to work in real life problems and

analyze large data sets with the goal of improving generic architectures and testing methodologies

Columbia has world-renowned expertise in SIP Verizon needs to solve a perimeter protection

problem for security of VoIP Services– Protocol Aware Application Layer Gateway

Verizon needs to build a high powered test tool to verify performance and scalability of these security solutions at carrier class rates– Security and Performance are a zero sum game

Page 5: Columbia Verizon Research  Security: SIP Application Layer Gateway

5May 23, 2006

What is Dynamic Pinhole FilteringWhat is Dynamic Pinhole Filtering SIP calls are stateful RTP media ports are negotiated during signaling, assigned

dynamically, and taken down SIP signaling is done over a static port:5060

– INVITE message contains an SDP message indicating the caller’s incoming media port (e.g., 43564 )

– Response 200OK has SDP with the callee’s incoming media port Each port creates a pinhole in firewall Pinholes are kept open only until a BYE message signals

closing of both pinholes Firewall must keep a state table with all active pinholes to check

if an arriving RTP packet can enter through an open pinhole, otherwise drop packet

Page 6: Columbia Verizon Research  Security: SIP Application Layer Gateway

6May 23, 2006

SIP/2.0 200 OKFrom: <sip:user1@handler>

c=IN IP4 128.59.19.162m=audio 56432 RTP/AVP 0

INVITE sip:[email protected]

From: <sip:user2@loader>c=IN IP4 128.59.19.163m=audio 43564 RTP/AVP 0

Example of Dynamic Pinhole FilteringExample of Dynamic Pinhole Filtering

CAM Table

SIPUAUser2

SIPUAUser1

128.59.19.163:43564

128.59.19.163:56432

Page 7: Columbia Verizon Research  Security: SIP Application Layer Gateway

7May 23, 2006

Project GoalsProject Goals Program SIP based dynamic pinhole filtering in a

parallel processing hardware platform Build an integrated testing and analysis tool that will

validate functionality and performance of above device at carrier-class rates– Tool will provide automation of testing (script based)

Apply testing tool to evaluate several Session Border Controllers on behalf of Verizon

Perform comparative analysis of architectural models and develop architectural improvements

Generalize testing methodology

Page 8: Columbia Verizon Research  Security: SIP Application Layer Gateway

8May 23, 2006

Applicability to ColumbiaApplicability to Columbia Hands on experience with SIP Application

Layer Gateways– Experience some SIP security related challenges– Experiment with carrier class traffic and scale models

Hands on experience with a state-of-the-art programmable packet processing hardware

Enhance Columbia’s SIP Proxy with Firewall Control Proxy capabilities

Formalize security benchmarking methodology for SIP ALGs

Page 9: Columbia Verizon Research  Security: SIP Application Layer Gateway

9May 23, 2006

Applicability to VerizonApplicability to Verizon Verizon needs this functionality to perform at

high rates for use:– In the protection of highly valued network assets

Session Border Controllers for Packet Telephony

– In the provision of security services to Enterprise customers for revenueVADS (SIP Application Layer Gateway)

Verizon needs to verify in the lab the performance and scalability of this technology prior to introduction in the network

Page 10: Columbia Verizon Research  Security: SIP Application Layer Gateway

10May 23, 2006

CS-2000 Physical Architecture CS-2000 Physical Architecture Deep Packet Processing Module (DPPM) Executes Network Application Inspecting and Controlling Packet Data Real-Time Silicon Database (128 bits wide X 512K long) and Unstructured Packet

Processing CAM technology

Single or Dual DPPM Configurations for HA, Performance or Multiple Use Physical Connectivity: Gigabit Ethernet and OC-3/OC-12/OC-48 POS

Application Server Module (ASM) Hardened Linux Infrastructure Hosts Analysis Applications Network Element Management

(Web, CLI, SNMP, ODBC) Mandatory Access Control

Auxiliary Slots

Future use for HDD Module Telemetry Inputs/Outputs Optical Bypass/HA Module

Page 11: Columbia Verizon Research  Security: SIP Application Layer Gateway

11May 23, 2006

CloudShield Application PlatformCloudShield Application Platform Applications written in RAVE and “pushed” to DPPM Dynamic Pinhole Implementation

– RAVE based Complex logic such as SIP call processing is difficult to

implement in Regular Expressions (Regex) Support only a “thin” SIP functionality

– SIP Proxy controlling the DPPM (Midcom-like solution) Introduce SIP Proxy - DDPM data exchange problem Solved by using a Firewall Control Protocol

Columbia developed a breakthrough solution that allowed to use SIP Proxy with performance equal to the “thin” SIP-RAVE– Maximized the use of RAVE – Use full SIP proxy functionality

Page 12: Columbia Verizon Research  Security: SIP Application Layer Gateway

12May 23, 2006

CS-2000 System with Dual DPPMsCS-2000 System with Dual DPPMs

10/100/1000 10/100

E1E2

Backplane

F0

C3

C4

Gigabit Ethernet Interconnects

D0

D1

E1E2

F0

C3

C4

D0

D1

3 4

P0

P0

System Level Port DistributionSystem Level Port Distribution

Application Server ModulePentium 1GHz

1000 1000

DPPM

Intel IXP 2800

DPPM

Intel IXP 2800

0 1 2

ASM

Page 13: Columbia Verizon Research  Security: SIP Application Layer Gateway

13May 23, 2006

Columbia Developed ModulesColumbia Developed Modules

Software Modules Static Filtering

– Filtering of pre-defined ports (e.g., SIP, ssh) Dynamic Filtering

– Filtering of dynamically opened ports (e.g., RTP) Switching Layer

– Perform switching between the input ports Firewall Control Module

– Intercept SIP call setup messages– Get RTP ports from the SDP– Maintain call state

Firewall Control Protocol– The way the Firewall Control Module talks with the CloudShield– Push dynamic table updates to the data plane– Could be used by multiple SIP Proxies that control one or more

CloudShield firewalls

Programmed in RAVEExecuted in the DPPM

Part of SIP-proxyExecuted in the LinuxControl plane

Page 14: Columbia Verizon Research  Security: SIP Application Layer Gateway

14May 23, 2006

Columbia Modules DiagramColumbia Modules Diagram

Control Messages Proxy

CPOS

Inbound

CAM CAM

DynamicTable

Outbound

StaticTable

Drop

Lookup Switch

SIPFCP/UDP

Firewall Control Module

Linux server

sipd

Page 15: Columbia Verizon Research  Security: SIP Application Layer Gateway

15May 23, 2006

Integrated Testing and Analysis ToolIntegrated Testing and Analysis Tool

Intelligent Integrated End Point Tool Components

SIPUA Test Suite – Loader– Handler

Scanning Probes – nmap

Automated Script based Control Software Timing Devices Data Analysis Module

– Analyze handler’s file for initial and teardown call delays, – Number of packets dropped before pinhole opening– Number of packets crossing after pinhole closing– Scan results for pinhole coverage

Protocol Analyzer– SNORT

Graphical Displays

Page 16: Columbia Verizon Research  Security: SIP Application Layer Gateway

16May 23, 2006

Integrated Intelligent End PointIntegrated Intelligent End Point

SUT

4

IIEP

Traffic Analyzer

Media PortScanning/Probing Traffic

Traffic Passed

through Pinholes

TrustedUntrusted

Control and

Analysis

Signaling andMedia Generation

SIPUAHandler

SIPUA Loader

Signaling andMedia Generation

Port Scanning

Probes

Timing Synchronization

SNORT

IIEP

Traffic Generator

Page 17: Columbia Verizon Research  Security: SIP Application Layer Gateway

17May 23, 2006

SIPUA MethodologySIPUA Methodology

Loader/Handler– Establishes calls using SIP– Sends 160 byte RTP packets every 20ms

Settable to shorter interval if needed for granularity

– Starts RTP sequence numbers from zero– Dumps call number, sequence number,

current timestamp and port numbers to a file

Page 18: Columbia Verizon Research  Security: SIP Application Layer Gateway

18May 23, 2006

SIPUA Traffic GeneratorSIPUA Traffic Generator

SIP Proxy

SIPUALoader

SIPUAHandler

accept call=1accept call=2accept call=3accept call=4

SIP Proxy

invite sip:user1@cloudshieldinvite sip:user1@cloudshieldinvite sip:user1@cloudshieldinvite sip:user1@cloudshield

Page 19: Columbia Verizon Research  Security: SIP Application Layer Gateway

19May 23, 2006

Large Scale Integrated Testing and Analysis Large Scale Integrated Testing and Analysis EnvironmentEnvironment

Pair of Intelligent Integrated End Points– Generate traffic for detailed analysis

External Traffic Generator– Supplies external stress on SUT– SIPUA in Array Form supplies traffic from an array of 6 computer

pairs Controller

– Automated Script based Control Software– Connects to the External Traffic Generation and the IIEP over ssh– Invokes traffic generation– Gathers, analyzes and correlates results– Analyzes handler/loader’s files for initial and teardown call delays– Matches port scanning results with handler’s file

Page 20: Columbia Verizon Research  Security: SIP Application Layer Gateway

20May 23, 2006

Testbed ArchitectureTestbed Architecture

GigE Switch GigE Switch

LoaderIIEP

SIP Proxy

HandlerIIEP

ExternalLoaders(SIPUA)

External Handlers

(SIPUA)

Controller

Page 21: Columbia Verizon Research  Security: SIP Application Layer Gateway

21May 23, 2006

Problem DefinitionProblem Definition

Problem parameterized along two independent vectors– Call Rate (calls/sec)

Related to performance of SIP Proxy in Pentium

– Concurrent CallsRelated to performance of table lookup in IXP

2800

Page 22: Columbia Verizon Research  Security: SIP Application Layer Gateway

22May 23, 2006

Testing And Analysis MethodologyTesting And Analysis Methodology

Generate external load on the firewall– SIPUA Loader/Handler in external load mode– Generates thousands of concurrent RTP sessions– For 30K concurrent calls have 120K open pinholes– CAM table length is 120K entries

Search algorithm finds match in one cycle When external load is established, run the IIEP analysis

– SIPUA Loader/Handler in internal load mode– Port scanning and Protocol analyzer – Increment calls/sec rate

Measure pinhole opening and closing delays– Opening delay data provided in units of 20 ms packets– Closing delay data provided in units of 10 ms packets

Detect pinholes extraneously open

Page 23: Columbia Verizon Research  Security: SIP Application Layer Gateway

23May 23, 2006

Data ResultsData Results

Concurrent calls Calls/Sec SIP Proxy SIP RAVEOpen delay Close delay Open delay Close delay

10K 300 0.75 0 0.25 015K 300 0.74 0 0.33 020K 300 0.73 0 0.34 025K 300 0.75 0 0.26 030K 300 0.8 15.51 0.26 030K 200 0.83 0.02

Page 24: Columbia Verizon Research  Security: SIP Application Layer Gateway

24May 23, 2006

Data Results (2)Data Results (2)

0

2

4

6

8

10

12

14

16

18

10K 15K 20K 25K 30K

Proxy - Open Delay

Proxy - Close Delay

RAVE - Open Delay

RAVE - Close Delay

Page 25: Columbia Verizon Research  Security: SIP Application Layer Gateway

25May 23, 2006

Benefits to Verizon and ColumbiaBenefits to Verizon and Columbia

Technology Transfer to Verizon Labs– Set up a replica of Columbia testbed in Silver

Spring VoIP lab for rapid SBC evaluation

Licensing Agreement with CloudShield– Currently negotiating a Royalty Agreement to take

technology to market

Intellectual Property – Patents and Publications

Page 26: Columbia Verizon Research  Security: SIP Application Layer Gateway

26May 23, 2006

Technology TransferTechnology Transfer

Silver Spring VoIP Lab testbed– Have 12 computer in parallel running

SIPUA, SNORT, nmap, protocol analyzers– Set up Controller software– Interoperability testing with local SIP proxy

(Broadsoft)– SIPUA can be used for other SIP

performance testing with modifications

Page 27: Columbia Verizon Research  Security: SIP Application Layer Gateway

27May 23, 2006

Intellectual PropertyIntellectual Property Pending Patent Applications

– “Fine Granularity Scalability and Performance of SIP Aware Border Gateways: Methodology and Architecture for Measurements”

Inventors: Henning Schulzrinne, Kundan Singh, Eilon Yardeni (Columbia), Gaston Ormazabal (Verizon)

– “Architectural Design of a High Performance SIP-aware Application Layer Gateway”

Inventors: Henning Schulzrinne, Jonathan Lennox, Eilon Yardeni (Columbia), Gaston Ormazabal (Verizon)

Paper submitted to MASCOTS 2006– “Large Scale SIP-aware Application Layer Firewall”.

Authors: Henning Schulzrinne, Eilon Yardeni (Columbia), Gaston Ormazabal (Verizon)

Page 28: Columbia Verizon Research  Security: SIP Application Layer Gateway

28May 23, 2006

ConclusionsConclusions Have implemented for the first time a SIP ALG that

scales up to 30K concurrent calls with 300 calls/sec– This performance should satisfy Verizon “carrier-class”

requirements at a reasonable cost Have proved hypothesis that cpu exhaustion will limit

scalability because of degradation in performance Have constructed a SIP Proxy based model that will

permit modularization, – Hence increasing scalability of future architectures

Have built a one of a kind high-powered “black box” testing environment – Will permit Verizon verify this technology for other vendors

Page 29: Columbia Verizon Research  Security: SIP Application Layer Gateway

May 23, 2006

Back up slidesBack up slides

Page 30: Columbia Verizon Research  Security: SIP Application Layer Gateway

30May 23, 2006

Verizon Future Security ArchitectureVerizon Future Security Architecture

Call ServerNetwork

Unsecure signaling protocol

ACL-secured signaling protocol

Media traffic

H.248

MPCP

H.248

SIP

Shielded CallP VLAN

Verizon Packet Telephony

Access/Aggregation Network

MG9KMG9KPVGPVG

CPE/Enterprise Network

NGSS

PP8600 Pkt FilteringPP8600 Pkt Filtering

PP

86

00

Pk

t Filte

ring

PP

86

00

Pk

t Filte

ring

MediaProxyMediaProxy

GWCGWC

CISCO 6509CISCO 6509

MS20x0MS20x0

CPE/Enterprise Network

Public Internet

Ju

nip

er M

40

Ju

nip

er M

40