You are on page 1of 4

2010 International Conference on Networking and Digital Society

A Secure Communication Model of Solving Anycast Scalability in IPv6


Wang Xiaonan
Changshu Institute of Technology
School of Computer Science and Engineering
Changshu, China
e-mail: wxn_2001@163.com

Abstract-The existing designs for providing anycast services Anycast can support various web services. For example,
are either to confine each anycast group to a preconfigured DNS resolvers would no longer have to be configured with
topological region or to globally distribute routes to individual the IP addresses of their servers, but rather could send a
anycast group ,both of which are all confronted with two
request to a well-known DNS anycast address, which makes
problems: scalability and security. A new kind of Anycast
it easy for DNS resolvers to move to any new networks by
communication model is proposed in this paper, which not
only solves Anycast existing scalability and security problem
its pleasure.
but also allows Anycast members to freely leave and join
II. ANYCAST SCALABILITY
Anycast group. In addition, this model accomplishes the
distributed maintenance and transaction of the information on IPv6 allocates anycast addresses from unicast addresses,
Anycast members so in some sense it fulfills the load balance. so Anycast address is not distinguishable from Unicast
This paper deeply analyzes and discusses the feasibility and address, which, to some extent, mitigates routing table
performance of this communication model , and argues that it
expanding explosion caused by Anycast service and makes
is able to support the large-scale Anycast group .
full use of the existing routing resources. Traditional
Keywords-IPv6, Anycast, Anycast Controller, Scalability,
Unicast routing can aggregate routes to destinations that
Security share the same prefix into one routing entry, which make it
possible for Unicast to scale. However, unfortunately
Anycast defies this kind of hierarchical aggregation.
I. INTRODUCTION
An anycast address represents a node group which share
The original definition of Anycast in RFC1546 is: "A the same characteristics and can be distributed to every
host transmits a datagram to an Anycast address and the internet region. Therefore, if unicast routing protocol is used
internet is responsible for providing best effort delivery of to route anycast packets each member of global anycast
the datagram to at least one, and preferably only one, of the group will be advertised as a separate entry in all the
servers that accept datagrams for the Anycast address." In relevant routing tables, which makes the routing tables
practice, Anycast is a point-to-point flow of packets expand proportionally to the number of the global anycast
between a single client and the nearest destination server groups in the entire Internet , thereby resulting in anycast
identified by an Anycast address. The idea behind Anycast scalability.
is that a client would like to send packets to a server
offering a particular service or application, but it is not Ill. ANYCAST SECURITY
important which server is chosen. To accomplish this, a Anycast address is assigned to a group of servers which
single Anycast address is assigned to one or more servers offers the same service so it can not be used as the source
within a so-called Anycast group and a client sends packets address of a response packet. Therefore, anycast member
to an anycast server by placing the Anycast address in the will use its unicast address as the source address of the
packet header with being unaware that Anycast is used. And response packet when it responds to anycast service requests
then the network of routers will attempt to deliver the from clients. But clients can not judge if that source address
packets to the nearest server with the destination Anycast is a valid one of a legitimate anycast member, hence, if that
address, just as is shown in figure 1. source address is fake all the messages sent from the clients
�up A mem � ar�up A mem� will be intercepted and incorrectly transacted by this false
anycast member.

ra
In addition, a fake anycast member may repeatedly
send some outdated messages to the clients but clients can
not judge if these messages are valid or not so some
11 � measures must be taken to avoid this kind of attack, namely,
replay attack.
��
Figure1 Anycast Service To sum up, a secure anycast communication model
must possess the following characteristics:
1 )an authentication mechanism to control the join and
leave of anycast members;
978-1-4244-5161-61101$26.00 ©2010 IEEE

171
2) an authentication mechanism to check if the C_region by the management organization of its local
identification of the anycast member, who responds to the network.
anycast service requests from the clients, is valid and
C. Anycast Address
legitimate;
3)a method to check if the response message from the In general an anycast address is assigned to a group of
anycast member is outdated. servers which offer the same service and a data packet with
According to the above discussion and analysis a new that anycast address as its destination address can be routed
kind of anycast communication model is proposed in this to the nearest anycast member. In this model an anycast
paper. This model has many advantages, the first one is that controller is added into each local network which manages
it effectively solve the anycast's scalability; the second one the join and leave of anycast members located in the local
is that it accomplishes the secure mechanism of network and maintains a database to record the relevant
authenticating anycast members' identifications; the last one parameters of anycast members located in the local network,
is that it achieves the distributed management of anycast including unicast address and the number of current sessions,
members. etc, just as is shown in figure 2.
The following sections give a detailed analysis and
discusses of this model.
anycast controller

IV. ANYCAST COMMUNICATION MODEL

A. Anycast Address
Anycast address model adopted by IPv6 is totally
different from the one recommended by RFC1546. The Figure2 Anycast Architecture
former suggests that anycast addresses should be allocated
from unicast addresses so that anycast address structure is
In this model all the anycast controllers are the
not distinguishable from unicast one, but the latter
members of a multicast group and the information exchange
recommends that anycast address should adopt an
between anycast controllers may be achieved in the
independent model. This model chooses the latter
multicast way. The process of a client's requesting anycast
recommendation.
service is described as follows:
It can be inferred from the above discussion that IPv6
I)a client requests DNS to parse the domain name and
address has a layered structure, therefore this model adopts
DNS returns the corresponding Anycast address;
the followin anycast address format:
2) according to the definition of anycast address in 4.1
the client can learn that the address returned by DNS is an
The first 3 bits are an anycast prefix whose value may anycast one so it sends to anycast controller a message
be set to any values except 001 and in this model this value which includes the received anycast address and requests
is set to 000. From the above figure, it can be inferred that anycast controller to parse that anycast address into the
anycast address in this model is still global and can be corresponding unicast address;
assigned to any hosts located in the global regions. 3) after anycast controller authenticates the client's
In general, a legitimate and valid anycast address must be identification it first searches the local database for the
assigned and authenticated by lANA. received anycast address and locates the anycast member
B. Maintaining the Integrity of the Specifications with the least sessions and the best performance, and then
signs its unicast address and returns it to the client, or if no
In this model, the legitimacy and validity of an anycast
corresponding entry is found in the database the anycast
member can be estimated by three factors:
controller sends to its neighbor anycast controller a query
1 )the anycast address of an anycast member must be
message for the information on that anycast address and sets
valid and legitimate, namely, it must be assigned and
a timer whose functions are to control the routing time of
authenticated by lANA;
query messages and to avoid the replay attack from fake
2)the owner of the anycast group must acknowledge and
anycast members;
authenticate the identification of that anycast member;
4) after receiving the query message the neighbor
3)the physical location of the anycast member must be
anycast controller first authenticates its legitimacy and
valid and legitimate, namely, that anycast member must have
validity and then searches its local database for that anycast
the valid membership in its physical network.
address. If there exist some corresponding entries in it the
In this model, the legitimacy and validity of the above
neighbor anycast controller will select the anycast member
three factors are authenticated by C_addr, C_membership
with the least sessions and the best performance and
and C_region respectively. C3ddr is released by lANA,
transmit that query message to that optimal member; or the
C_membership by the owner of the anycast group and

172
neighbor anycast controller will transmit that query message sends an accept message to the host and notifies all the other
to its neighbor anycast controllers; anycast controllers of the join of that new member in
5) after the optimal anycast member acquired in step 4) multicast way, and in the meanwhile it appends that new
receives that query message it first signs its own unicast member into its local database; or the local anycast
address and other relevant parameters with C_Addr and controller sends a refuse message to the host. Here, either an
C_Membership and encapsulates these data into the accept message or a refuse message must be signed by the
response message, and then send it to the source anycast local anycast controller and then be sent to the host;
controller; 3) after receiving the response message from the local
6) when the timer expires the anycast controller will anycast controller the host first decrypts the digital signature
deal with all the received response messages, it first in it to authenticate the source of that message, and if that
decrypts the digital signatures in the messages and after message is accept message that host owns the identification
authenticating their identifications then selects an anycast of that anycast member.
member with the least sessions and best performance, and at Until now a host joins successfully an anycast group.
last signs its unicast address and send it to the client; if no But how an anycast member requests to leave the anycast
response messages are returned during the time timer group it belongs to? The following words will discuss on the
restricts the anycast controller will send an error message to process of an anycast member's leaving the anycast group:
the client and notify that the anycast server is not available; 1) a host sends to its local anycast controller a leave
7) after the client receives the response message from request message which includes the anycast address of the
the local anycast controller it first decrypts the digital anycast group it belongs to, its own unicast address, three
signature in it and after authenticating its identification it digital signatures signed by private keys in C_addr,
extracts the unicast address of the optimal anycast member C_membership and C_region respectively, and the current
from that received message and then can establish a direct time of the local anycast controller;
connection with that member in the unicast secure 2) after the local anycast controller receives the leave
communication way. message it first check if the message is outdated according
to the current time field encapsulated in the message, and
D. Join and Leave ofAnycast Group
then decrypts three digital signatures in it with the public
In this model if a host wants to join an anycast group it keys of C3ddr, C_membership and CJegion respectively.
must meet three requirements: If that message is fresh and is authenticated successfully it
I)the address of that anycast group must be legitimate sends an agree message to the host and deletes that member
and valid, namely, that address must be assigned and from its local database, and in the meanwhile notifies all the
authenticated by lANA; other anycast controllers of the leave of that member in
2) the owner of that anycast group allows that host to multicast way. Also, an agree message must be signed by
join; the local anycast controller and then be sent to the host;
3) that host must be a legitimate and valid member in 3)after receiving the response message from the local
its physical network, namely, it must own a valid anycast controller the host first decrypts the digital signature
membership in that region authenticated by the management in it to authenticate the source of that message, and if that
organization of that local network. message is an agree message that host successfully leaves
If a host satisfies that above conditions it may send a that anycast group it belonged to.
join request to its local anycast controller. In this model The above process can be achieved by creating new
each local anycast controller needs to maintain a database to types of BGP and IGMP messages.
record the information on anycast members located in the
local network, such as unicast address, the number of E. Routing Analysis
current sessions and performance parameters, etc. The To effectively obtain an optimal anycast member in this
following words give a detailed description of a host's model a query message contains two fields: one is path
requesting to join an anycast group: attribute which records all the networks a query message
I) a host sends to its local anycast controller a Jom crosses in order to prevent the query message from looping,
request message which includes the anycast address, its own and the other is TTL which is used to control the routing
unicast address, three digital signatures signed by private scope of a quest message. The value of TTL is initialized to
keys in C_addr, C_membership and C_region respectively, the maximum number of network hops a query message can
and the current time of the local anycast controller; traverse and gets decreased by I with each hop. The entire
2) after the local anycast controller receives the join process of anycast controller's querying for the information
message it first check if the message is outdated according on an anycast address is described as follows:
to the current time field encapsulated in the message, and I) anycast controller encapsulates the anycast address
then decrypts three digital signatures in it with the public into a query message and sends it to its neighbor anycast
keys of C_addr, C_membership and C_region respectively. controller in a multicast way, and then start up a timer;
If that message is fresh and is authenticated successfully it

173
2
2) after a neighbor anycast controller receives a query 13 &,p. __________---,
message it first searches its local database for the entries on 1. 29
1. 28
that anycast address. If some relevant entries are found out
the neighbor anycast controller will select an optimal
anycast member in terms of the relevant parameters, such as 1. 2S
1. 24
the number of current sessions and the current performance,
1. 23
and then transmit the received query message to it, or 1. 22
anycast controller decreases TTL by I and appends its 1. 21h.-....,....�_,.."';':<"__,...,...-"""""._,!
._
O. 04 O. 08 O. 12 O . 16 0. 20 0.24
unicast address into path attribute, and then checks if the Percentage of domain that
have Anycast members
value of TTL is equal to zero and routing path forms loop. If
neither, the anycast controller again transmits that query Here, R I represents the ratio of the TRT value of
message to its neighbor controllers in a multicast way; performing the anycast service on application layer to the
3) after the optimal anycast member receives that query one of performing the same service in this model;
message, it encapsulates its own unicast address, its relevant TRTApplicationLayer is the TRT value of performing anycast
parameters and the values of the path attribute in the query service on application layer; TRT is the TRT value of
message into a response message and then the message is performing anycast service in this model; R2 represents the
signed by C_Addr and C_Membership, and at last the ratio of the TRT value of performing one anycast service on
optimal anycast member sends the response message with IP layer to the one of performing the same service in this
digital signature to the source anycast controller. model; TRT'PLayer is the TRT value of performing anycast
After sending a query message, the source anycast service on IP layer. From the above figures, it can be
controller starts up a timer and waits for the response inferred that the value of R1 trends to 1.225 and the value of
messages. When the timer expires the anycast controller R2 1.245. This experimental result indicates the
decrypts the digital signatures of all the received response performance of anycast service fulfilled in this model IS
messages to authenticate their sources and selects one better than the ones on application layer and IP layer.
anycast member with the least sessions and the best
V. PREPARE YOUR PAPER BEFORE STYLING
performance, and then after signing its unicast address sends
it to the client. After the client receives that unicast address Anycast is a new characteristic of IPv6 and supports
returned by the local anycast controller it can establish a various kinds of services. In IPv6 simulation, a new
direct connection with that optimal anycast member. In communication model is proposed to accomplish anycast
some extreme situations if no response messages are service's scalability and security. In this paper this model's
returned the anycast controller can return an error message validity and feasibility are analyzed and discussed in detail.
As a new kind of communication model, Anycast is
to the client.
promising, but since it is only on the primary stage there still
F. Performance Analysis exists many problems which need further study and analysis.
ACKNOWLDMENT
The performance analysis refers to the comparison
The work is supported by Jiangsu Natural Science
between anycast service performed in this model and the
Foundation (BK2009133)
one fulfilled on IP layer and application layer. From the
client's perspective the shorter the time interval between REFERENCES
client's sending service request and receiving service [I] Partridge C, Mendez T, Milliken W. Host Anycasting Service, RFC
response, which is called TRT, is, the better the service 1546 [EB/OL]. [2005-03-01]. http://www. ietf. org/rfc/rfc1546.txt.
quality is, so the performance analysis is obtained by [2] Deering S, Hinden R. Internet Protocol. Version 6 (IPv6)
comparing the values of TRT(total response time) of Specification, RFC 2460 [EB/OL]. [2005-03-18]. http://www. ietf.
org/rfc/rfc2460.txt.
transmitting the same bytes in the above three ways, as is
[3] Zhang Li, Yan Wei, Li Xiaoming. Anycast�-another
shown in the following formula and figures. communication model for IP[J]. Journal of computer research and
Rl=TRTApplictlliollLayel TRT;R2=TRTlPLtlyel TRT development, 2003, 40(6): 784-790(Ch).
[4] Greg 0, Michael R. Child-proof Authentication for MIPv6
1.3 �Jr.1----- (CAM)[C]// ACM Computer Communications Review.New York:
ACM Press, 200I.
1.29

1. 28
[5] Johnson D, Deering S. Reserved lPv6 Subnet Anycast Addresses,
RFC 2526 [EB/OL]. [2005-9-01]. http://www. ietf. org/rfc/rfc2526.txt.
1.2
[6] Ballani H, Francis P. Towards a global IP anycast service[C]//
1. 25 TTL=2
Proceeding of S1GCOMM. New York: ACM Press,2005.
1.25
[7] Kent S, Seo K. Security Architecture for the Internet Protocol, RFC
4301 [EB/OL]. [2005-12-12]. http://www. ietf. org/rfc/rfc430 l .txt.
[8] Pethia R, Crocker S, Fraser B. Guidelines for the Secure Operation of
1. 22
the Internet, RFC 1281 [EB/OL]. [2006-02-04]. http://www. ietf.
1.2 I h-::--"""":',...."":--....,.....,..,...---,,.....,.,,........,,,..
...,
..,,,_
,) org/rfc/rfc128 l .txt.
0.04 0.08 0.12 0 . 15 0.20 0.24
Percentage of domain that
have Anycast members

174

You might also like