Tunnels and Bridges: A drive through OpenStack Networking – Mark McClain
- Challenges with the cloud
- High density multi-tenancy
- On demand provisioning
- Need to place / move workloads
- SDN , L2 fabric, network virtualisation Overlay tunneling
- The Basics
- The user sees the API, doesn’t matter too much what is behind
- Neutron = Virtual subnet + L2 virtual network + virtual port
- Nova = Server + interface on the server
- Design Goals
- Unified API
- Small Core. Networks + Subnets + Ports
- Plugable open archetecture
- Features
- Overlapping IPs
- Configuration DHCP/Metadata
- Floating IPs
- Security Groups ( Like AWS style groups ) . Ingress/egress rules, IPv6 . VMs with multiple VIFS
- Deployment
- Database + Neutron Server + Message Queue
- L2 Agent , L3 agent + DHCP Agent
- Server
- Core
- Plugins types = Proxy (proxy to backend) or direct control (login instide plugin)
- ML2 – Modular Layer 2 plugin
- Plugin extensions
- Add to REST API
- dpch, l3, quota, security group, metering, allowed addresses
- L2 Agent
- Runs on a hypervisor
- Watch and notify when devices have been added/removed
- L3 agent – static routing only for now
- Load balancing as a service, based on haproxy
- VPN as a service , based on openswan, replicates AWS VPC.
- What is new in Juno?
- IPv6
- based on Radbd
- Advised to go dual-stack
- Look ahead to Kilo
- Paying down technical debt
- IPv6 prefix delegation, metadata service
- IPAM – hook into external systems
- Facilitate dynamic routing
- Enabling NFV Applications
- See Cloud Administrators Guide
Crypto Won’t Save You Either – Peter Gutmann
- US Govt has capabilities against common encryption protocols
- BULLRUN
- Example Games consoles
- Signed executables
- encrypted storage
- Full media and memory encryption
- All of these have been hacked
- Example – Replaced signature checking code
- Example – Hacked “secure” kernel to attack the application code
- Example – Modify firmware to load over the checking code
- Example – Recover key from firmware image
- Example – Spoof on-air update
- LOTS of examples
- Nobody noticed bunch of DKIM keys were bad, cause all attackers had bypassed encryption rather than trying to beat the crypto
- No. of times crypto broken: 0, bypassed: all the rest
- National Security Letters – The Legalised form of rubber-hose cryptanalysis
- Any well design crypto is NSA-proof
- The security holes are sitting right next to the crypto