MPLS and VPLS Security: Enno Rey, Erey@ernw - de
MPLS and VPLS Security: Enno Rey, Erey@ernw - de
MPLS and VPLS Security: Enno Rey, Erey@ernw - de
Slide 1
Agenda
MPLS VPNs
Layer 2 VPNs
Slide 2
MPLS Basics
Tag
COS S
TTL
Slide 3
MPLS Basics
IP packets are classified
and labeled
MPLS
backbone
Slide 4
MPLS Basics
In the backbone packet forwarding is done based on labels. The
red label is swapped for a blue label, the blue one for a purple
one.
MPLS backbone
Note: for simplicitys sake well neglect pen-ultimate hop popping here.
Slide 5
MPLS Basics
The label is removed and the
IP-packet is forwarded (routed).
MPLS backbone
In this scenario, well call them forwarding labels (as thats what they serve as here).
Slide 6
Security discussion
The first thing joe hacker thinks of when speaking about some
forwarding (routing or routers) technology is spoofing or injection.
Btw: this approach is a bit nave or have you ever seen a successful ospf injection attack?
But: the just discussed forwarding labels have local significance only.
Two neighboring peers agree on their significance by means of some label
distribution protocol.
However, those nice little shiny labels can serve many other purposes
Slide 7
MPLS Services
Slide 8
VPNs
Traffic
Engineering
IP+ATM
IP+Optical
GMPLS
Any
Transport
Over MPLS
MPLS
Network Infrastructure
Slide 9
MPLS Services
Slide 10
MPLS-based technology [mainly RFCs 2547 & 2917] with its own
concepts and terminology.
Slide 11
P-Router
CE-Router
VPN -Site
PE -Router
PE-Router
P-Network
CE-Router
VPN - Site
C-Network
Slide 12
VPN-A
Site-1
ip vrf red
PE
CE
VPN-B
Site-1
CE
ip vrf green
VPN-B
Site-2
Global routing
table
Slide 13
MP-iBGP sessions
10.2.0.0
VPN_A
CE 11.5.0.0
CE
VPN_B
VPN_A
10.2.0.0
CE
PE
PE
10.1.0.0
CE
VPN_A
11.6.0.0
CE
VPN_B
PE
PE
CE
VPN_B
10.3.0.0
10.1.0.0 CE
Customer
networks
MPLS provider
network
Customer
networks
Slide 14
When a packet leaves an ingress PE, the packet has (at least) two labels:
- one forwarding label for transport to the egress PE across the backbone.
- a second one identifies the VPN (and prefix) of the destination.
Slide 15
from ([1])
Slide 16
No encryption
Slide 17
Slide 18
Slide 19
Requires:
- knowledge of IP addresses and labels, e.g. by simple guessing (not too difficult).
- reachability of PE or P-router from the internet
(depending on design probably more difficult).
- transport of labeled packet from origin to router in question (not clear).
We tested against some current IOS Service Provider images without success.
Slide 20
Requires:
- access to core (debatable, see below).
- the right tools at point of attack
(may be difficult, as point of attack is probably a router)
Slide 21
MP-BGP session
Slide 22
Requires:
- access to core (debatable, see below).
- the right tools at point of attack
(may be difficult, as point of attack is probably a router).
Slide 23
Attack scenario
VPN alpha
172.31.1.2
CE
VPN beta
alpha
172.31.1.2
CE
PE
PE
PE
PE
CE
CE
172.31.2.2
beta
172.31.2.2
Slide 24
IP
IP
IP
IP
IP
IP
172.31.1.2
172.31.2.2
172.31.1.2
172.31.2.2
172.31.1.2
172.31.2.2
>
>
>
>
>
>
172.31.2.2:
172.31.1.2:
172.31.2.2:
172.31.1.2:
172.31.2.2:
172.31.1.2:
icmp
icmp
icmp
icmp
icmp
icmp
40:
40:
40:
40:
40:
40:
echo
echo
echo
echo
echo
echo
01:59:14.136855 IP 172.31.1.2 > 172.31.2.2: icmp 80: echo request seq 5725
01:59:14.136906 IP 172.31.2.2 > 172.31.1.2: icmp 80: echo reply seq 5725
Slide 25
Conclusions
Slide 26
Access to core
In most security discussions the core is assumed to be trusted (e.g. [1]).
This sounds a bit nave, however I tend to agree. But:
from [2]
from [3]
Slide 27
AToM: Technology for transport of different layer 2 protocols (e.g. ATM, Frame
Relay, Ethernet, PPP, HDLC) over MPLS backbone.
Operates with Pseudo Wires = logical circuits established between MPLS capable
backbone devices.
Slide 28
There are two variants that are of particular interest for us:
Ethernet over MPLS [EoMPLS]
Virtual Private LAN Service [VPLS]
Slide 29
Ethernet
Segment
ISP C
MPLS Network
Enterprise
LAN
ISP A
PE
ISP 2
ISP B
PE
PE
PE
ISP 1
PE
ISP 3
PE
Ethernet
Segment
Enterprise
LAN
Slide 30
VPLS
Common VC ID
between PEs
creates a Virtual
Switching
Instance
CE
Provides point-to-multipoint
connectivity.
MPLS enabled
core forms
Tunnel LSPs
PE
PE
CE
MPLS
CE
Slide 31
Broadcast medium
VLANs
And trunks
Slide 32
EoMPLS/VPLS parameters
Design: is there some Layer 2 device between the (MPLS-performing) PE and the CE?
If so: how are the VCs built up now? What about transparency & security then?
Slide 33
Hypothesis
Implementing ethernet via WAN technologies (here: MPLS) will
create new challenges in terms of network security.
=> customers do not get real ethernet (e.g. they cant choose VLAN numbers)
Other vendors (Cisco) have proprietary protocols for the very same purpose
(Cisco Layer2 Protocol Tunneling [L2PT, do not confuse with L2TP]).
Slide 34
Slide 35
MPLSBackbone
CE
PE
Ethernet B
Ethernet A
PE
CE
Ethernet A
STP Root
Slide 36
CE
MPLSBackbone
PE
Customer B
Customer A,
Site Amsterdam
CE
PE
PE
CE
Customer A,
Site New York
STP Root
Note (for all network admins here): there is no easy solution for this one.
Slide 37
PE
MPLS
backbone
Customer B
Customer A,
Site Amsterdam
PE
Fileserver
PE
CE
Maybe but
Customer A,
Site New York
STP Root
Slide 38
PE
MPLS
backbone
Customer A
Site Amsterdam
PE
VTP server
w. higher rev.
CE
Customer A
Site Heidelberg
Customer B
Slide 39
Site Amsterdam
VLAN 10: servers
CE
PE
MPLS
backbone
PE
CE
Site Paris
VLAN 10: wlan
Customer B
Slide 40
Assessment
And always remember aspects like no encryption, shared PE etc. (see above)
Slide 41
Slide 42
PE
MPLS
backbone
Site Amsterdam
PE
CE
Site Paris
Slide 43
Remember: the image VPLS cloud = big virtual switch is not entirely correct
(e.g. as those devices usually do not participate in STP/other infrastructure
protocols).
Slide 44
Bunch of Juniper M7i routers (note: these are considered big iron).
Slide 45
Slide 46
Back to my hypothesis
Slide 47
Slide 48
Summary
There are new technologies emerging that provide ethernet services over
MPLS, namely Virtual Private LAN Service.
The subsequent merger of Layer 2 and Layer 3 will have broad implications for
current paradigms of network security.
Slide 49
Questions?
and answers.
Slide 50
Slide 51
Sources
[1] Presentation MPLS Basics and In-Depth:
http://www.rhic.bnl.gov/RCF/UserInfo/Meetings/Technology/Archive/0
6-30-04-CISCO/BNL-MPLS-Intro-Services-6-30-04.ppt
[2] http://www.nanog.org/mtg-0306/pdf/thomas.pdf
[3] Cisco presentation Security in Core Networks:
http://www.cisco.com/global/HU/rendezvenyek/presentations/Securit
yinCoreNetworks.pdf
[5] Michael H. Behringer/Monique J. Morrow: MPLS VPN Security
(Indianapolis 2005)
Slide 52