Lecture 4 Fall 2017 It u
Lecture 4 Fall 2017 It u
Communications
Lecture 4: ALL IP Networking
Prof. Mustafa Ergen
Outline
• Deep Packet Inspection
• IP Header Compression
• IPSEC
• IP Authentication
• Mobile IP
• SIP
• IMS
Deep Packet Inspection
DPI: Deep Packet Inspection
• A packet is analogous to a physical postal mail
message. The address on the outside of the envelope
is analogous to the “packet header” and the
information inside the envelope is analogous to the
“payload.”
Control Engine
Enforcement Function
Datapath Engine
Encryption and Obfuscation
• In the DPI world, life is becoming much more difficult
with the use of encryption
• RC4, the most popular encryption algorithm used by
most P2P protocols. Since the key lengths used are very
large, it is almost impossible to reverse engineer and gain
some information, like guessing a password.
• The creators of several applications have chosen to
conceal their operation by scrambling their related
communications.
• This is obfuscation (concealing actions, by making things
much more complex than necessary).
• Ex: eMule (version 0.47c) and BitTorrent.
• Proprietary technology (e.g., Skype).
Application and Protocol Signatures
• What is a signature? signatures are pattern recipes
which are chosen for uniquely identifying an
associated application (or protocol).
What to inspect?
§P2P: Gnutella, Imesh, Edonkey, BitTorrent, OFF, etc.
§Social Applications: Facebook, Myspace, Twitter, etc. §Session: SSH, Telnet, VNC, Xwindows, Rlogin, RSH, Radming, etc.
§Encrypted P2P: Skype, Bittorent, Edonkey, Winny, etc. §Security/Tunneling: L2TP, GRE, IPSEC, IKE/ISKAMP, PPTP, SSL,
WAP, RC5DES, SOCKS, etc.
§Streaming media: Real, Flash, RTP/RTSP, Windows Media, Quicktime, MPEG, Joost, iTunes,
AVI, PPLive, Sopcast, Youtube, Slingbox, SCTP, etc. §Middleware: Corba, Java RMI, Sun RPC, Java Client, etc.
§Email: IMAP, POP, Gmail/Yahoo/Webmail, SMTP, Exchange, etc. §Directory Services: LDAP, WHOIS, RADIUS, TACACS, WINS,
WHOIS, DHCP, Finger, Kerberos, etc.
§Collaboration: Webex, Netmeeting, RDP/VNC, etc.
§Enterprise Apps: Oracle, Baan, JDEdwards, SAP, Citrix, SQL, etc.
§Instant Messaging: Yahoo, AIM, Google Talk, MSN, Apple talk, QQ, Popo, etc.
§Network Management: ICMP, SNMP, NTP, Ipcom, RSVP,
§VoIP: SIP, H323, MGCP, Skinny, etc. Timeserver, etc.
§URL Filtering: Dynamic download link, Popular web sites, etc. §Productivity: Zoho, Google Apps, MS Live, etc.
§Gaming: PC based games, Xbox, Playstation, Wii, etc. §Other: TFTP, HTTP, X400, POP3, SFTP, Netbios, IMAP4, HTTPs,
SMTPs, LDAP over SSL, SQL, NETIQ, LDAP over SSL, Real Audio Port,
§Wireless Apps: SMS, MMS, WebSMS, etc. DHCP client/server, Nowell Netware, etc.
• 90% fixed
signatures
• 10% requires
updates
Signature
files
Where is DPI?
BS
Country
RNC DPI SGSN GGSN backbone
DPI
BS Location based
Inspection
inspection and ad DPI
between mobiles
injection
LTE PDNGW DPI Internet
Country wide
–
WiMAX HA Wiretapping
Admsision and
control, user Content
profiling, etc. banning only
DPI not URL
DSLAM
DPI Banning
BRAS DPI some
prohibited
content
DSLAM and
Enterprise DPI
applications
Campus
DPI
Schools
Internet Cafes
Methods of Analysis
• False positives is the basic terminology referring to
misclassification – or in simple terms - the likelihood
that an application will be identified as something it
is not.
• Heuristic analysis
typically boils down to
the extraction of
statistical parameters
of examined packet
transactions.
IP Header Compression
IP Header Compression
• In many services and applications e.g., Voice
over IP, interactive games, messaging etc, the
payload of the IP packet is almost of the same In Cellular,
size or even smaller than the header.
•Wireless Link is
• Over the end-to-end connection, comprised highly error prone
of multiple hops, these protocol headers are
extremely important but over just one link
(hop-to-hop) these headers serve no useful •Large round trip
purpose. time
• The framework for IP security (IPSec) has begun in the 1990s by IETF. The IPSec
standard is optional for IPv4, however mandatory feature of IPv6 network.
Key management is not part of the protocol; however, it can be provided manu- ally or
through Internet Key Exchange (IKE) protocol [RFC2409], which is based on public-key-
based approach for automatic key management. Other automated key distribution
techniques such as Kerberos and SKIP may be used as well.
IPSec Modes of Operation:
•Transport mode is basically
with two peers without any
intermediate nodes in between.
Service Network
Equipment
Controller/ Controller & Gateway Controller & Gateway Controller & Gateway
IP Gateway
Tunneling IPSec
: Internet
GRE is in Base DSL
WiMAX Station
and GTP is
in LTE
Femtocell
Mobile
Station
Authentication, Authorization &
Accounting
AAA/RADIUS
• Authentication, Authorization and Accounting
– Used to verify identity of the remote user
– Introduced RADIUS: Remote Authentication Dial-In User
service
– RADIUS is introduced in dial-up era, new protocol is
DIAMETER backward compatible with RADIUS
IK is used to
authenticate the
signaling
message, CK is
used to encrypt
the data over the
air
Mobile IP
Mobility and Standard IP Routing
• IP assumes end hosts are in fixed physical locations
– What happens if we move a host between
networks?
• IP addresses enable IP routing algorithms to get packets
to the correct network
– Each IP address has network part and host part
• This keeps host specific information out of routers
– DHCP is used to get packets to end hosts in
networks
• This still assumes a fixed end host
• What if a user wants to roam between networks?
– Mobile users don’t want to know that they are
moving between networks
– Why can’t mobile users change IP when
running an application?
Mobile IP
• Mobile IP was developed as a means for transparently dealing with
problems of mobile users
– Enables hosts to stay connected to the Internet
regardless of their location
– Enables hosts to be tracked without needing to
change their IP address
– Requires no changes to software of non-mobile
hosts/routers
– Requires addition of some infrastructure
– Has no geographical limitations
– Requires no modifications to IP addresses or IP
address format
– Supports security
• Could be even more important than physically connected routing
Components
Mobile IP Entities
• Mobile Node (MN)
– The entity that may change its point of attachment from network to
network in the Internet
• Detects it has moved and registers with “best” FA
– Assigned a permanent IP called its home address to which other hosts
send packets regardless of MN’s location
• Since this IP doesn’t change it can be used by long-lived applications as
MN’s location changes
• Home Agent (HA)
– This is router with additional functionality
– Located on home network of MN
– Does mobility binding of MN’s IP with its COA
– Forwards packets to appropriate network when MN is away
• Does this through encapsulation
Mobile IP Entities contd.
• Foreign Agent (FA)
– Another router with enhanced functionality
– If MN is away from HA the it uses an FA to send/receive data to/from
HA
– Advertises itself periodically
– Forward’s MN’s registration request
– Decapsulates messages for delivery to MN
• Care-of-address (COA)
– Address which identifies MN’s current location
– Sent by FA to HA when MN attaches
– Usually the IP address of the FA
• Correspondent Node (CN)
– End host to which MN is corresponding (eg. a web server)
Mobile IP Support Services
• Agent Discovery
– HA’s and FA’s broadcast their presence on each network to which they
are attached
• Beacon messages via ICMP Router Discovery Protocol (IRDP)
– MN’s listen for advertisement and then initiate registration
• Registration
– When MN is away, it registers its COA with its HA
• Typically through the FA with strongest signal
– Registration control messages are sent via UDP to well known port
• Encapsulation – just like standard IP only with COA
• Decapsulation – again, just like standard IP
Mobile IP Operation
• A MN listens for agent advertisement and then initiates
registration
– If responding agent is the HA, then mobile IP is not necessary
• After receiving the registration request from a MN, the HA
acknowledges and registration is complete
– Registration happens as often as MN changes networks
• HA intercepts all packets destined for MN
– This is simple unless sending application is on or near the same
network as the MN
– HA masquerades as MN
– There is a specific lifetime for service before a MN must re-register
– There is also a de-registration process with HA if an MN returns home
Mobile IP Operation contd.
• HA then encapsulates all packets addressed to MN
and forwards them to FA
– IP tunneling
• FA decapsulates all packets addressed to MN and
forwards them via hardware address (learned as part
of registration process)
• NOTE that the MN can perform FA functions if it
acquires an IP address eg. via DHCP
• Bidirectional communications require tunneling in
each direction
Mobile IP Tunneling
Across Internet
Time Diagram of Handover
time
CH
Packet
HA
New FA
Registration_Request
Max_Time_One_Beacon_Period
Registration_Reply
Beacon
MH
Hand Over Begins
New FA Detection Registration Ends Receive Packet
A Client Mobile IP
ProxyMIP
• Proxy Mobile IP
• Mobile IP Client is in the Access Gateway
• No requirement on the device
Mobile IP in WiMAX
Security in Mobile IP
• Authentication can be performed by all parties
– Only authentication between MN and HA is
required
– Keyed MD5 is the default
• Replay protection
– Timestamps are mandatory
– Random numbers on request reply packets
are optional
• HA and FA do not have to share any security
information.
Problems with Mobile IP
• Suboptimal “triangle” routing
– What if MN is in same subnetwork as the node to
which it is communicating and HA is on the other
side of the world?
• It would be nice if we could directly route packets
– Solution: Let the CN know the COA of MN
• Then the CN can create its own tunnel to MN
• CN must be equipped with software to enable it to
learn the COA
• Initiated by HA who notifies CN via “binding update”
• Binding table can become stale
Other Mobile IP Problems
• Single HA model is fragile
– Possible solution – have multiple HA
• Frequent reports to HA if MN is moving
– Possible solution – support of FA clustering
• Security
– Connection hijacking, snooping…
• Many open research questions
Mobility in IPv6
• Route Optimization is a fundamental part of Mobile IPv6
– Mobile IPv4 it is an optional set of extensions that
may not be supported by all nodes
• Foreign Agents are not needed in Mobile IPv6
– MNs can function in any location without the
services of any special router in that location
• Security
– Nodes are expected to employ strong
authentication and encryption
• Other details…
Session Initiation Protocol
Transition to IP
• Changing Business Models
– For carriers, wireline voice revenue is in decline
– Wireless carriers have had explosive growth, but also seek
new revenue sources
• Enterprises have moved toward a converged voice
and data network
• Traditional circuit switched technology is in decline,
being replaced by Voice over IP
– After years of argument, SIP (Session Initiation Protocol) is
the choice for VoIP.
SIP
• An Application-layer control (signaling) protocol for
creating, modifying and terminating sessions with
one or more participants.
• Sessions include Internet multimedia conferences,
Internet telephone calls and multimedia distribution.
• Members in a session can communicate via multicast
or via a mesh of unicast relations, or a combination
of these.
• Text based , Model similar to HTTP : uses client-
server model
SIP Basic Functionality
Supports 5 facets of communication:
• User location: determination of the end system to be
used for communication;
• User capabilities: determination of the media and
media parameters to be used;
• User availability: determination of the willingness of
the called party to engage in communications;
• Call setup: "ringing", establishment of call parameters
at both called and calling party;
• Call handling: including transfer and termination of
calls.
SIP Functionality (cont.)
• SIP can also initiate multi-party calls using a
multipoint control unit (MCU) or fully-meshed
interconnection instead of multicast.
• Internet telephony gateways that connect Public
Switched Telephone Network (PSTN) parties can also
use SIP to set up calls between them.
Development of SIP
• SIP developed by Handley, Schulzrinne, Schooler, and
Rosenberg
- Submitted as Internet-Draft 7/97
• Assigned RFC 2543 in 3/99
• Goals: Re-use of & Maximum Interoperability with
existing protocols
}
To: Jean Luc Picard <sip:[email protected]> identify
Call-ID: [email protected] this
CSeq: 1 INVITE session
request
– Via: Shows route taken by request.
– Call-ID: unique identifier generated by client.
– CSeq: Command Sequence number
• generated by client
• Incremented for each successive request
Via Field in Header
• The Request headers include a Via field
• The Via field indicates the path taken by the
request so far.
• Every proxy adds a Via Header with its address to
make sure that responses within a transaction take
the same path (to avoid loops, or to make sure that
same firewall will be hit on the way back)
• This prevents request looping and ensures replies
take the same path as the requests, which assists in
firewall traversal and other unusual routing
situations.
Via Headers and Routing
• Via headers are used for routing SIP messages
• Requests
– Request initiator puts address in Via header
– Servers check Via with sender’s address, then add own
address, then forward. (if different, add “received”
parameter)
• Responses
– Response initiator copies request Via headers.
– Servers check Via with own address, then forward to next
Via address
• All Via headers are copied from request to response
in order
• Response is sent to address in top Via header
Via Header (cont.)
Step #5 Receiving Subsequent
Requests
• Subsequent to receipt, the following checks are made:
1. If the Call-ID is new,
- the request is for a new call, regardless of the values
of the To and From header fields.
2. If the Call-ID exists,
- the request is for an existing call.
- If the To, From, Call-ID, and CSeq values exactly match
(including tags) those of any requests received previously,
- the request is a retransmission.
3. If there was no match to the previous step,
- To & From fields compared against existing call leg local and
remote addresses.
- If there is a match, & the CSeq in the request > last CSeq
received on that leg,
- the request is a new transaction for an existing call leg.
Reliability
• If UDP is used:
-SIP client should retransmit a BYE, CANCEL, OPTIONS, or
REGISTER request, exponential backoff, starting at a T1
second interval, doubling the interval for each packet, and
capping off at a T2 second interval.
-Retransmit a INVITE request with an interval that starts at T1
seconds, exponential back off, cease retransmissions if a
provisional or definitive response recvd., or once it has sent a
total of 7 request packets
• Clients using TCP do not need to retransmit requests
Authentication & Encryption
• SIP supports a variety of approaches:
– end to end encryption
– hop by hop encryption
• Proxies can require authentication:
– Responds to INVITEs with 407 Proxy-
Authentication Required
– Client re-INVITEs with Proxy-Authorization
header.
• SIP Users can require authentication:
– Responds to INVITEs with 401 Unathorized
– Client re-INVITEs with Authorization header
IP Multimedia Subsystem
Introducing IMS
• Standards experts sought to solve these issues and
move to VoIP for services
– Resulting architecture is called IP Multimedia Subsystem
or IMS
– IMS began in the wireless community (3GPP/3GPP2), but
is now being accepted by a variety of carriers and industry
organizations
• The IETF, ETSI/TISPAN, CableLabs, ITU-T support it as a framework
for IP multimedia applications and services
What is IMS…
• IP Multimedia Subsystem (IMS) is an architecture that
enables wireline, wireless and cable operators to offer a
new generation of rich multimedia services
– Across both circuit switched and packet switched
networking infrastructures
• IMS defines a architecture of logical elements using SIP
for call signaling between network elements
– Provides a layered approach with defined service, control,
and transport planes
The IMS Architecture
IP Multimedia Networks Legacy mobile
CS Network signalling Networks
Mm
Mb Mb CS
BGCF I-CSCF
AS
CS Mm
Mk Mk
ISC
Mw Cx Sh
Mj BGCF C, D,
Mi Gc, Gr
Cx
HSS
IM- MGCF S-CSCF
Mg Dx
MGW Mc
Mr Mw
SLF
Mb Dx
Mb Mb Mb IMS Subsystem
3GPP TS 23.228 V7.2.0 (2005-12)
IMS – Simplified View
Key Elements:
§ AS – Application Server
§ SCIM - Service Capability
Interaction Manager
Application Application Application
Server Server Server § MRFC - Multimedia Resource
Function Controller
§ MRFP - Multimedia Resource
SCIM Function Processor
§ MRF – Media Resource
Function
Transport
Session Control
• Common Session Control (SIP)
• Provides common service policies
• Leverages investments across multiple
applications
Access