Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3341302.3342088acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Safely and automatically updating in-network ACL configurations with intent language

Published: 19 August 2019 Publication History

Abstract

In-network Access Control List (ACL) is an important technique in ensuring network-wide connectivity and security. As cloud-scale WANs today constantly evolve in size and complexity, in-network ACL rules are becoming increasingly more complex. This presents a great challenge to the updating process of ACL configurations: network operators are frequently required to update "tangled" ACL rules across thousands of devices to meet diverse business requirements, and even a single ACL misconfiguration may lead to network disruptions. Such increasing challenges call for an automated system to improve the efficiency and correctness of ACL updates. This paper presents Jinjing, a system that aids Alibaba's network operators in automatically and correctly updating ACL configurations in Alibaba's global WAN. Jinjing allows the operators to express in a declarative language, named LAI, their update intent (e.g., ACL migration and traffic control). Then, Jinjing automatically synthesizes ACL update plans that satisfy their intent. At the heart of Jinjing, we develop a set of novel verification and synthesis techniques to rigorously guarantee the correctness of update plans. In Alibaba, our operators have used Jinjing to efficiently update their ACLs and have thus prevented significant service downtime.

Supplementary Material

MP4 File (p214-tian.mp4)

References

[1]
Beckett, R., Gupta, A., Mahajan, R., and Walker, D. A general approach to network configuration verification. In ACM SIGCOMM (SIGCOMM) (2017).
[2]
Beckett, R., Gupta, A., Mahajan, R., and Walker, D. Control plane compression. In ACM SIGCOMM (SIGCOMM) (2018).
[3]
Beckett, R., Mahajan, R., Milstein, T. D., Padhye, J., and Walker, D. Don't mind the gap: Bridging network-wide objectives and device-level configurations. In ACM SIGCOMM (SIGCOMM) (2016).
[4]
Beckett, R., Mahajan, R., Milstein, T. D., Padhye, J., and Walker, D. Network configuration synthesis with abstract topologies. In 38th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) (2017).
[5]
Brucker, A. D., Brügger, L., Kearney, P., and Wolff, B. Verified firewall policy transformations for test case generation. In International Conference on Software Testing, Verification and Validation (ICST) (2010).
[6]
Cardwell, N., Cheng, Y., Brakmo, L., Mathis, M., Raghavan, B., Dukkipati, N., Chu, H.-k. J., Terzis, A., and Herbert, T. Packetdrill: scriptable network stack testing, from sockets to packets. In USENIX Annual Technical Conference (ATC) (2013).
[7]
Chen, F., Liu, A. X., Hwang, J., and Xie, T. First step towards automatic correction of firewall policy faults. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2012).
[8]
Davis, M., Logemann, G., and Loveland, D. A machine program for theorem-proving. Communications of the ACM 5, 7 (1962), 394--397.
[9]
Davis, M., and Putnam, H. A computing procedure for quantification theory. Journal of the ACM (JACM) 7, 3 (1960), 201--215.
[10]
El-Hassany, A., Tsankov, P., Vanbever, L., and Vechev, M. T. Network-wide configuration synthesis. In 29th International Conference on Computer Aided Verification (CAV) (2017).
[11]
El-Hassany, A., Tsankov, P., Vanbever, L., and Vechev, M. T. NetComplete: Practical network-wide configuration synthesis with autocompletion. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2018).
[12]
Fayaz, S. K., Sharma, T., Fogel, A., Mahajan, R., Millstein, T., Sekar, V., and Varghese, G. Efficient network reachability analysis using a succinct control plane representation. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2016).
[13]
Fogel, A., Fung, S., Pedrosa, L., Walraed-Sullivan, M., Govindan, R., Mahajan, R., and Millstein, T. A general approach to network configuration analysis. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2015).
[14]
Gember-Jacobson, A., Akella, A., Mahajan, R., and Liu, H. H. Automatically repairing network control planes using an abstract representation. In 26th Symposium on Operating Systems Principles (SOSP) (2017), pp. 359--373.
[15]
Gember-Jacobson, A., Viswanathan, R., Akella, A., and Mahajan, R. Fast control plane analysis using an abstract representation. In ACM SIGCOMM (SIGCOMM) (2016).
[16]
Hajjat, M. Y., Sun, X., Sung, Y. E., Maltz, D. A., Rao, S. G., Sripanidkulchai, K., and Tawarmalani, M. Cloudward bound: Planning for beneficial migration of enterprise applications to the cloud. In ACM SIGCOMM (SIGCOMM) (2010).
[17]
Hallahan, W. T., Zhai, E., and Piskac, R. Automated repair by example for firewalls. In Formal Methods in Computer Aided Design (FMCAD) (2017).
[18]
Horn, A., Kheradmand, A., and Prasad, M. R. Delta-net: Real-time network verification using atoms. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (Mar. 2017).
[19]
Hwang, J., Xie, T., Chen, F., and Liu, A. X. Fault localization for firewall policies. In International Symposium on Reliable Distributed Systems (SRDS) (2009).
[20]
Jayaraman, K., Bjørner, N., Outhred, G., and Kaufman, C. Automated analysis and debugging of network connectivity policies. In Technical Report MSR-TR-2014-102 (2014).
[21]
Kazemian, P., Varghese, G., and McKeown, N. Header space analysis: Static checking for networks. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2012).
[22]
Khurshid, A., Zhou, X., Zhou, W., Caesar, M., and Godfrey, P. B. VeriFlow: Verifying network-wide invariants in real time. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2013).
[23]
Liu, A. X. Formal verification of firewall policies. In International Conference on Communications (ICC) (2008).
[24]
Lopes, N. P., Bjørner, N., Godefroid, P., Jayaraman, K., and Varghese, G. Checking beliefs in dynamic networks. In 12th USENIX Symposium on Networked System Design and Implementation (NSDI) (2015).
[25]
Narain, S., Levin, G., Malik, S., and Kaul, V. Declarative infrastructure configuration synthesis and debugging. J. Network Syst. Manage. 16, 3 (2008), 235--258.
[26]
Nelson, T., Ferguson, A. D., Yu, D., Fonseca, R., and Krishnamurthi, S. Exodus: Toward automatic migration of enterprise network configurations to SDNs. In 1st ACM SIGCOMM Symposium on Software Defined Networking Research (SOSR) (2015).
[27]
Panda, A., Argyraki, K., Sagiv, M., Schapira, M., and Shenker, S. New directions for network verification. In LIPIcs-Leibniz International Proceedings in Informatics (2015), vol. 32, Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
[28]
Panda, A., Lahav, O., Argyraki, K. J., Sagiv, M., and Shenker, S. Verifying reachability in networks with mutable datapaths. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2017).
[29]
Quoitin, B., and Uhlig, S. Modeling the routing of an autonomous system with C-BGP. IEEE Network 19, 6 (2005), 12--19.
[30]
Selman, B., Mitchell, D. G., and Levesque, H. J. Generating hard satisfiability problems. Artificial intelligence 81, 1-2 (1996), 17--29.
[31]
Stoenescu, R., Popovici, M., Negreanu, L., and Raiciu, C. Symnet: Scalable symbolic execution for modern networks. In ACM SIGCOMM (SIGCOMM) (Aug. 2016).
[32]
Sung, Y. E., Rao, S. G., Xie, G. G., and Maltz, D. A. Towards systematic design of enterprise networks. In ACM CoNEXT (CoNEXT) (2008).
[33]
Velner, Y., Alpernas, K., Panda, A., Rabinovich, A., Sagiv, M., Shenker, S., and Shoham, S. Some complexity results for stateful network verification. In 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) (2016).
[34]
Wang, A., Jia, L., Zhou, W., Ren, Y., Loo, B. T., Rexford, J., Nigam, V., Scedrov, A., and Talcott, C. L. FSR: formal analysis and implementation toolkit for safe interdomain routing. IEEE/ACM Transactions on Network (ToN) 20, 6 (2012), 1814--1827.
[35]
Yoon, M., Chen, S., and Zhang, Z. Minimizing the maximum firewall rule set in a network with multiple firewalls. IEEE Transactions on Computers 59 (2010).
[36]
Yuan, L., Mai, J., Su, Z., Chen, H., Chuah, C., and Mohapatra, P. Fireman: A toolkit for Firewall modeling and analysis. In IEEE Symposium on Security and Privacy (IEEE S&P) (2006).
[37]
Zaostrovnykh, A., Pirelli, S., Pedrosa, L., Argyraki, K., and Candea, G. A formally verified NAT. In ACM SIGCOMM (SIGCOMM) (2017).
[38]
Zhang, S., Ivancic, F., Lumezanu, C., Yuan, Y., Gupta, A., and Malik, S. An adaptable rule placement for software-defined networks. In 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2014).
[39]
Zhang, S., Mahmoud, A., Malik, S., and Narain, S. Verification and synthesis of firewalls using SAT and QBF. In 20th IEEE International Conference on Network Protocols (ICNP) (2012).

Cited By

View all
  • (2024)Poster: Automating Network Configuration with Natural Language IntentsProceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos10.1145/3672202.3673721(19-21)Online publication date: 4-Aug-2024
  • (2024)Interpretable Network Synthesis via Localized SpecificationsProceedings of the 2024 SIGCOMM Workshop on Formal Methods Aided Network Operation10.1145/3672199.3673889(51-53)Online publication date: 4-Aug-2024
  • (2024)Accelerating ACL Configuration Update through Data Plane AnalysisProceedings of the 2024 SIGCOMM Workshop on Formal Methods Aided Network Operation10.1145/3672199.3673888(48-50)Online publication date: 4-Aug-2024
  • Show More Cited By

Index Terms

  1. Safely and automatically updating in-network ACL configurations with intent language

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGCOMM '19: Proceedings of the ACM Special Interest Group on Data Communication
      August 2019
      526 pages
      ISBN:9781450359566
      DOI:10.1145/3341302
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 August 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. access control list
      2. domain specific language
      3. network configurations
      4. synthesis
      5. verification

      Qualifiers

      • Research-article

      Conference

      SIGCOMM '19
      Sponsor:
      SIGCOMM '19: ACM SIGCOMM 2019 Conference
      August 19 - 23, 2019
      Beijing, China

      Acceptance Rates

      Overall Acceptance Rate 462 of 3,389 submissions, 14%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)168
      • Downloads (Last 6 weeks)18
      Reflects downloads up to 26 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Poster: Automating Network Configuration with Natural Language IntentsProceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos10.1145/3672202.3673721(19-21)Online publication date: 4-Aug-2024
      • (2024)Interpretable Network Synthesis via Localized SpecificationsProceedings of the 2024 SIGCOMM Workshop on Formal Methods Aided Network Operation10.1145/3672199.3673889(51-53)Online publication date: 4-Aug-2024
      • (2024)Accelerating ACL Configuration Update through Data Plane AnalysisProceedings of the 2024 SIGCOMM Workshop on Formal Methods Aided Network Operation10.1145/3672199.3673888(48-50)Online publication date: 4-Aug-2024
      • (2024)A General and Efficient Approach to Verifying Traffic Load Properties under Arbitrary k FailuresProceedings of the ACM SIGCOMM 2024 Conference10.1145/3651890.3672246(228-243)Online publication date: 4-Aug-2024
      • (2024)Occam: A Programming System for Reliable Network ManagementProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3650086(148-162)Online publication date: 22-Apr-2024
      • (2024)Toward Autonomous Trusted Networks-From Digital Twin PerspectiveIEEE Network10.1109/MNET.2024.335318038:3(84-91)Online publication date: May-2024
      • (2024)Human-Intent-Driven Cellular Configuration Generation Using Program SynthesisIEEE Journal on Selected Areas in Communications10.1109/JSAC.2023.334538742:3(658-668)Online publication date: Mar-2024
      • (2024)NetCR: Knowledge-Graph-Based Recommendation Framework for Manual Network ConfigurationIEEE Internet of Things Journal10.1109/JIOT.2023.333701711:7(12941-12952)Online publication date: 1-Apr-2024
      • (2024)CloudPlanner: Minimizing Upgrade Risk of Virtual Network Devices for Large-Scale Cloud NetworksIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621109(741-750)Online publication date: 20-May-2024
      • (2023)LLM-Based Policy Generation for Intent-Based Management of Applications2023 19th International Conference on Network and Service Management (CNSM)10.23919/CNSM59352.2023.10327837(1-7)Online publication date: 30-Oct-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media