Secure and Policy-Compliant Source Routing
Secure and Policy-Compliant Source Routing
Source Routing
Abstract
In today’s Internet, inter-domain route control
remains elusive; nevertheless, such control could
improve the performance, reliability, and utility of the
network for end users and ISPs alike.
While researchers have proposed a number of
source routing techniques to combat this limitation,
there has thus far been no way for independent ASes
to ensure that such traffic does not circumvent local
traffic policies, nor to accurately determine the
correct party to charge for forwarding the traffic.
Introduction
Algorithm /Method Used:
Platypus Policy Framework.
Algorithm /Method Description:
Platypus uses network capabilities, primitives that are placed
within individual packets, to securely attest to the policy
compliance of source routing requests.
Network capabilities are
i) Transferable: an entity can delegate capabilities to others,
ii) Composable: a packet may be accompanied by a set of
capabilities, and
iii) cryptographically authenticated. Capabilities can be
issued by ASes to any parties they know how to bill.
Each capability specifies a desired transit point (called a
waypoint), a resource principal responsible for the traffic, and a
stamp of authorization
NETWORK operators and academic researchers alike recognize
that today’s wide-area Internet routing does not realize the full
potential of the existing network infrastructure in terms of
performance, reliability, or flexibility.
While a number of techniques for intelligent, source-
controlled path selection have been proposed to improve end-
to-end performance, reliability, and flexibility, they have proven
problematic to deploy due to concerns about security and
network instability. We attempt to address these issues in
developing a scalable, authenticated, policy-compliant, wide-
area source routing protocol.
We present the design and evaluation of Platypus, a source
routing system that, like many source-routing protocols before
it, can be used to implement efficient overlay forwarding, select
among multiple ingress/egress routers, provide virtual AS
multi-homing, and address many other common routing
deficiencies .
The key advantage of Platypus is its ability to ensure
policy compliance during packet forwarding. Platypus enables
packets to be stamped at the source as being policy compliant,
reducing policy enforcement to stamp verification. Hence,
Platypus allows for management of routing policy independent
of route export and path selection.
Objective:
In today’s Internet, inter-domain route control remains elusive;
nevertheless, such control could improve the performance,
reliability, and utility of the network for end users and ISPs
alike.
Existing System:
Share Policy
Enter Message
Receive Packets
Intermediate ISP
Authenticate Policy
Forward Packets
Destination
Sequence Diagram:
Source Share Policy Message ISPs Authenticate Destination
2 : sharing()
1 : sharing policy()
4 : message packets()
5 : send packets()
6 : authenticate packets()
7 : forward packets()