Papers
Topics
Authors
Recent
Search
2000 character limit reached

Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning

Published 29 Aug 2024 in cs.CR and cs.NI | (2408.16940v2)

Abstract: Software-defined networking (SDN) is a centralized, dynamic, and programmable network management technology that enables flexible traffic control and scalability. SDN facilitates network administration through a centralized view of the underlying physical topology; tampering with this topology view can result in catastrophic damage to network management and security. To underscore this issue, we introduce Marionette, a new topology poisoning technique that manipulates OpenFlow link discovery packet forwarding to alter topology information. Our approach exposes an overlooked yet widespread attack vector, distinguishing itself from traditional link fabrication attacks that tamper, spoof, or relay discovery packets at the data plane. Unlike localized attacks observed in existing methods, our technique introduces a globalized topology poisoning attack that leverages control privileges. Marionette implements a reinforcement learning algorithm to compute a poisoned topology target, and injects flow entries to achieve a long-lived stealthy attack. Our evaluation shows that Marionette successfully attacks five open-source controllers and nine OpenFlow-based discovery protocols. Marionette overcomes the state-of-the-art topology poisoning defenses, showcasing a new class of topology poisoning that initiates on the control plane. This security vulnerability was ethically disclosed to OpenDaylight, and CVE-2024-37018 has been assigned.

Summary

  • The paper introduces the Marionette attack that exploits flow entry manipulations to alter LLDP packet routing within SDN environments.
  • It evaluates the attack across ten SDN discovery protocols and five controllers, demonstrating complete success in topology poisoning.
  • The study highlights critical implications for SDN security by urging protocol redesign and improved defense mechanisms against control plane attacks.

An Analysis of Topology Poisoning in SDN Through OpenFlow Manipulation

The presented paper explores a novel class of topology poisoning attack within Software-Defined Networking (SDN) environments, specifically targeting the OpenFlow protocol's link discovery mechanism. This attack, termed as "Marionette," leverages the inherent vulnerabilities in SDN's control plane to manipulate the network topology perceived by benign controllers, thereby altering traffic routing behavior with minimal detection.

Technical Summary

The crux of the attack lies in its ability to manipulate the paths of Link Layer Discovery Protocol (LLDP) packets used by the OpenFlow Discovery Protocol (OFDP) for topology recognition. By injecting carefully crafted flow entries into network switches, an attacker can alter the forwarding paths of these discovery packets. This causes legitimate controllers to independently and persistently infer a false topology. The authors distinguish their approach by demonstrating its ability to operate on the control plane, contrasting with existing data plane-centric attacks such as relaying or fabricating LLDP packets.

At its core, the attack exploits a control plane weakness: flow entries intended for normal traffic forwarding can inadvertently affect link discovery processes, an aspect previously overlooked by the security community. The attack succeeds by injecting "poisonous" flow entries with higher priorities to redirect LLDP packets, ultimately deceiving the control plane into acknowledging a contrived network graph.

Evaluation and Efficacy

The research evaluates the attack’s performance against a suite of ten SDN discovery protocols and five prominent open-source controllers (Floodlight, OpenDaylight, ONOS, Ryu, and Pox). In each case, the Marionette attack demonstrated complete success in achieving desired topology poisoning, with some variations in complexity due to controller-specific features, such as ONOS's use of fixed LLDP packet fingerprints.

The authors also address the practical deployment of this attack in both single-controller and multi-controller clusters, demonstrating its feasibility and effectiveness by simulating impersonation attacks on both OpenDaylight and ONOS clusters. They showcase how a compromised controller or a malicious application can initiate these attacks, detailing the flow entry modifications necessary for the topology alteration.

Theoretical and Practical Implications

From a theoretical perspective, this research highlights a significant oversight in existing SDN security frameworks—the susceptibility of control plane operations to flow entry manipulations targeting link discovery protocols. This finding suggests that SDN security frameworks need to revisit fundamental assumptions about control plane trust and flow rule exclusivity.

Practically, the implications are profound, suggesting that current SDN defenses (e.g., monitoring-based, flow rule checker, and voting-based defenses) are inadequate against this class of topology poisoning. As a result, the defense strategies must be re-evaluated. The authors recommend modifications to the discovery protocol itself, such as introducing randomness in LLDP packet headers to ensure discovery packets are reliably processed by the intended flow entries only.

Future Directions

This paper opens numerous venues for future research in SDN security. One evident direction is the exploration of more sophisticated detection mechanisms that can identify and address vulnerabilities within the control plane, particularly those that intersect with the data plane's flow operations. Furthermore, the reinforcement learning model used for computing the deceptive topology could be refined or replaced with adversarial models, potentially improving the efficiency and stealth of topology alterations.

In conclusion, this study provides an insightful foray into a relatively uncharted vector of SDN attacks, urging the community to enhance SDN's resilience by reinforcing the link discovery process against potential misuses of flow entries. The proposed approach raises critical questions about the security guarantees offered by current SDN designs, emphasizing the need for robust, adaptable security mechanisms capable of defending against both traditional and emerging threats.

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.