On Static Reachability Analysis of IP Networks

On Static Reachability Analysis of IP Networks

1 On Static Reachability Analysis of IP Networks ¡ ¡ ¡ Geoffrey G. Xie Jibin Zhan David A. Maltz Hui Zhang ¢ ¢ ¢ Albert Greenberg Gisli Hjalmtysson Jennifer Rexford ABSTRACT Determining what kinds of packets can be exchanged The primary purpose of a network is to provide reach- between two hosts connected to a network is a difficult ability between applications running on end hosts. In and critical problem facing network designers and opera- this paper, we describe how to compute the reachability tors. To our knowledge, the problem is largely unexam- a network provides from a snapshot of the configuration ined in the networking research literature. Solving the state from each of the routers. Our primary contribution problem requires knowing far more than the network’s is the precise definition of the potential reachability of a topology or the routing protocols it uses. For example, network and a substantial simplification of the problem despite having a route to a remote end-point, a sender’s through a unified modeling of packet filters and routing packets may be discarded by a packet filter on one of the protocols. In the end, we reduce a complex, important links in the path. The network’s packet filters, routing practical problem to computing the transitive closure to policies, and packet transformations all must be taken into set union and intersection operations on reachability set account to even ask the simple and very important ques- representations. We then extend our algorithm to model tion of “can these two hosts communicate?” the influence of packet transformations (e.g., by NATs or This paper crystallizes the problem of calculating the ToS remapping) along the path. Our technique for static reachability provided by a network. By mapping packet analysis of network reachability is valuable for verifying filters, routing information, and packet transformations to the intent of the network designer, troubleshooting reacha- a single unified model of reachability we have determined bility problems, and performing “what-if” analysis of fail- how to transform this seemingly intractable problem into ure scenarios. a classical graph problem that can be solved with polyno- Index Terms—Routing, Static Configuration Analysis. mial time algorithms such as transitive closure. This is the primary contribution of this paper. I. INTRODUCTION A. Advantages of Automated Static Analysis While the ultimate goal of networking is to enable com- munication between hosts that are not directly connected, Currently, the common practice to determine if pack- a wide variety of mechanisms are being used to limit the ets can reach from one point in a network to another is to set of destinations the hosts can reach. For example, back- use tools such as ping and traceroute to send probe bone networks may provide Virtual Private Network ser- traffic that experimentally test whether reachability exists. vices to connect only remote offices belonging to the same In contrast, we have developed a static-analysis approach enterprise, and enterprise networks themselves are often that can be applied even if only a description of the net- segmented into departments or offices whose hosts must work is available. Static analysis has many advantages be isolated for business or security reasons. Also, due to over ping and traceroute, including: a configuration or design mistake, two hosts may not be § The ability to determine a description of the set of able to communicate under certain failure scenarios, even packets that could traverse the network from a given though the network remains connected; knowing when starting point to a given ending point, whereas exper- these vulnerabilities exist is crucial to building a more re- imental techniques can only check the reachability of liable network. the specific probe traffic they send. § The ability to calculate the set of routers and hosts Research sponsored by the NSF under ANI-0085920, ANI-0331653, and ANI-0114014. Views and conclusions contained in this document that a given packet could potentially reach, whereas are those of the authors. ping and traceroute can only check reachabil- * Naval Postgraduate School. [email protected]. This work was done while ity along the path currently selected by the routing G. G. Xie was a visiting scientist at Carnegie Mellon University. £ protocols. ¥ Carnegie Mellon University. ¤ jibin,dmaltz,hzhang @cs.cmu.edu ¦ § The ability to evaluate the reachability of a net- ¥ AT&T Labs–Research. ¤ albert,gisli,jrex @research.att.com. G. Hjalmtysson is also with Reykjav´ik University. work during its design phase—before the network 2 has been deployed or a problem has arisen. Network mechanisms is critical to accurately computing the reach- operators can perform our static analysis using only ability of a network. the configuration files used to program the network’s Third, we present an algorithm for the static analysis of routers, and these files are readily available to them. reachability for IP networks and explain how the network § The ability to verify whether the reachability a net- model can be populated by static analysis of the network’s work actually provides matches the designer’s in- router configuration files. tent. Static analysis can verify that Virtual Private Networks are, in fact, isolated from other traffic. It can also be used to conduct “what-if” analysis— C. Structure of the Paper predicting the effects of equipment failures and In Section II, we present a brief overview of the most planned maintenance on the communication between relevant aspects of how routers operate and are config- end hosts. While syntax verification of router config- ured. We then formally describe our framework for ana- uration has been evaluated [3], [8], there is little un- lyzing a network’s reachability in Section III, beginning derstanding of the power and limitation of semantic our analysis by focusing on packet filters. We present verification based on static analysis. our algorithm for calculating reachability in Section IV. Manually calculating the static reachability of a net- In Section V we show how to map routing information work is often impractical, as data show that campus, en- to packet filters and how this model of routing is popu- terprise, and backbone networks vary in size from 5 to 500 lated by analyzing the router configuration files. In Sec- routers, with the largest networks having on the order of tion VI we describe how packet transforming mechanisms 1,000 routers, and that real networks use a wide variety are handled. Section VII discusses the applications and of mechanisms to control the reachability they provide. limitations of our approach. After a brief overview of re- A survey of 31 production networks [10], including ex- lated work in Section VIII, the paper concludes in Sec- amples of both carrier backbone and enterprise networks, tion IX with a summary of our contributions. found that 10 out of the 27 enterprise networks had packet filters applied to their internal links. Several of the net- works deliberately prevented some hosts from reaching II. BACKGROUND ON REACHABILITY others by preventing the distribution of routing informa- CONFIGURATION tion needed to direct packets between the hosts. Further In addition to forming the physical topology of routers complicating the question of a network’s reachability is and links, network operators must configure the protocols the use of mechanisms that actually transform packets as and mechanisms that collectively determine which hosts they travel across the network. For example, Network can communicate. Today’s routers offer a wealth of con- Address Translators (NATs) [15] that change a packet’s figuration options for enabling and tuning packet filters, source and destination address were found in the inte- routing protocols, and packet transformations. Our analy- rior of 10 of the 31 networks. Understanding the reach- sis techniques operate on a snapshot of the configuration ability “matrix” created by a network requires a frame- state for each of the routers in the network, as recorded in work for reasoning about the effects of all these different a configuration file. In well-managed networks, these files mechanisms—packet filters, routing policy, and packet are routinely captured and archived for backup purposes, transformations—at the same time. and are available to network operators. To make our discussion of the different reachability configuration options more concrete, we focus on the ex- B. Our Contributions ample enterprise network in Figure 1. The network has First, we formulate the problem of computing the reach- five routers R1 to R5 (depicted as solid rectangles) con- ability of a network and argue for the importance of craft- nected via physical links (depicted as solid lines) that ter- ing good solutions. We focus on the value of computing minate at interfaces (depicted as small circles). R1 and R3 reachability through static analysis. We rigorously define are remote sales offices connected directly to the central the reachability of a network, and we define expressions office where R2, R4, and R5 reside. R6 represents the ex- for upper and lower bounds on the reachability. ternal router in the service provider’s network where the Second, we describe a tractable framework for jointly enterprise connects to the Internet. reasoning about how packet filters, routing, and packet Each sales office has two subnets, A and B. Critical ac- transformations affect the reachability that a network pro- counting applications are run by hosts connected to subnet vides. Bringing together these three very different types of A, and general purpose computers are connected to subnet 3 B1 A5 net; instantiating this packet filter on the link from R1 to ACL 1 = interface A1 R1 R5 = subnet R5 is meant to prevent other subnets from accessing the ACL 1 = primary link R6 corporate servers on subnet A5. ACL2 drops all Sun ND = backup link ACL 4 R6 = external router protocol packets (protocol 77), which were implicated in A3 link to Internet R3 R2 R4 = packet filter an earlier attack on Cisco routers.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us