Research Area:  Software Defined Networks
Virtual switches are a crucial component of SDN-based cloud systems, enabling the interconnection of virtual machines in a flexible and "software-defined" manner. This paper raises the alarm on the security implications of virtual switches. In particular, we show that virtual switches not only increase the attack surface of the cloud, but virtual switch vulnerabilities can also lead to attacks of much higher impact compared to traditional switches. We present a systematic security analysis and identify four design decisions which introduce vulnerabilities. Our findings motivate us to revisit existing threat models for SDN-based cloud setups, and introduce a new attacker model for SDN-based cloud systems using virtual switches. We demonstrate the practical relevance of our analysis using a case study with Open vSwitch and OpenStack. Employing a fuzzing methodology, we find several exploitable vulnerabilities in Open vSwitch. Using just one vulnerability we were able to create a worm that can compromise hundreds of servers in a matter of minutes. Our findings are applicable beyond virtual switches: NFV and high-performance fast path implementations face similar issues. This paper also studies various mitigation techniques and discusses how to redesign virtual switches for their integration.
Keywords:  
SDN
Cloud Systems
Data Plane
NFV
Author(s) Name:  Kashyap Thimmaraju , Bhargava Shastry , Tobias Fiebig , Felicitas Hetzelt , Jean-Pierre Seifert , Anja Feldmann , Stefan Schmid
Journal name:  
Conferrence name:  SOSR -18: Proceedings of the Symposium on SDN Research
Publisher name:  ACM
DOI:  10.1145/3185467.3185468
Volume Information:  Article No.: 1, Pages 1–15
Paper Link:   https://dl.acm.org/doi/abs/10.1145/3185467.3185468