Trust Router Overview IETF 86, Orlando, FL Routing Area Meeting Margaret Wasserman

Slides:



Advertisements
Similar presentations
Trust Router. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any.
Advertisements

Trust Router Overview IETF 86, Orlando, FL Trust Router Bar BOF Margaret Wasserman
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Trust Router Workshop 15 th October Introduction to the Day Moonshot Workshop.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Key Negotiation Protocol & Trust Router draft-howlett-radsec-knp ABFAB, IETF March, Prague.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Internet Networking Spring 2002 Tutorial 13 Web Caching Protocols ICP, CARP.
ABFAB Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Multihop Federations & Trust Router draft-mrw-abfab-multihop-fed-02.txt draft-mrw-abfab-trust-router-01.txt Margaret Wasserman
DHCP for Multi-hop Wireless Ad-Hoc Networks Presented by William List.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Guide to TCP/IP, Third Edition
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
Chapter 4: Managing LAN Traffic
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
Router and Routing Basics
Copyright © Lopamudra Roychoudhuri
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Connecting The Network Layer to Data Link Layer. ARP in the IP Layer The Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) Part.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 6 Delivery and Routing of IP Packets.
Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Draft-narayanan-icnrg-bgp-uri-00 Ashok Narayanan Stefano Previdi Brian Field ICNRG Aug
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Draft-ietf-abfab-aaa-saml Josh Howlett IETF 90. Remaining issues (recap from IETF 89) SAML naming of AAA entities The focus of this presentation Alejandro.
Module 1: Configuring Routing by Using Routing and Remote Access.
Basic Routing Principles V1.2. Objectives Understand the function of router Know the basic conception in routing Know the working principle of router.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Mapping IP Addresses to Hardware Addresses Chapter 5.
Multicasting  A message can be unicast, multicast, or broadcast. Let us clarify these terms as they relate to the Internet.
Network Layer: Address Mapping, Error Reporting, and Multicasting
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Draft-howlett-abfab-trust-router-ps ABFAB, IETF83 Josh Howlett & Margaret Wasserman.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Chapter 5 Network and Transport Layers
Chapter 21 Address Mapping
Zueyong Zhu† and J. William Atwood‡
Objective: ARP.
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Forwarding and Routing IP Packets
COMP 3270 Computer Networks
Chapter 6 – Routing.
Introduction to Networking
Internet Networking recitation #12
2018 Huawei H Real Questions Killtest
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
AbbottLink™ - IP Address Overview
Ch 17 - Binding Protocol Addresses
IP Multicast COSC /5/2019.
Lecture 4a Mobile IP 1.
Presentation transcript:

Trust Router Overview IETF 86, Orlando, FL Routing Area Meeting Margaret Wasserman

Problem Statement abfab-trust-router-ps/ abfab-trust-router-ps/ Describes the problems that motivated the Trust Router work

Trust Router Draft trust-router/ trust-router/ Describes the role and purpose of a Trust Router Defines the concept of communities COIs and APCs Defines two protocols Temporary Identity (TID) Protocol Trust Router Protocol

Trust Router Overview Trust Router Motivations Trust Router Operation Communities Temporary Identity Protocol Message contents Role of Trust Router as gateway Trust Router Protocol Message contents Trust link types Implementation Status

Trust Router Motivations Scalability of ABFAB Federations Eliminate need to configure credentials for every pair of RPs and IdPs Eliminate need to configure manual “routing” information in intermediate AAA Proxies Reduce costs of adding new members, removing members, changes in peer relationships Flexibility to create new Communities Groups that want to share access to a set of services, m apped to registrar Communities for authentication Eliminate need to set up new Registrar Community for every group

Looks Familiar? Current SAML Federations are reminiscent of early Internet SAML metadata (like host tables) is distributed manually and configured by every IdP or RP Need for every end-site to know about every other end-site, or they can’t connect Solution: Routing! Although we won’t be forwarding IP packets, the distribution of trust information looks a lot like the distribution of routing information

Communities Authentication Policy Communities (APCs) Used to authenticate access to RP Services Communities of Interest (COIs) Group of RP Clients, IdPs and Trust Routers that share access to a set of services COI must be resolved to an APC (for a given IdP Realm), before authentication can be achieved

Trust Router Operation

Temporary Identity Protocol Used by an RP to negotiate a Temporary Identity on a (set of) AAA Server(s) in a target realm TID Request is sent to the RP’s local Trust Router and forwarded across a Trust Path to the target AAA Server(s) Response is returned by reversing the Trust Path

Temporary Identity Protocol Simple request/response protocol Messages are encoded in JSON Uses GSS-API for authentication Request include ½ of a DH exchange Server replies with a list of AAA Server IP Addresses Response includes the other ½ of a DH exchange for each AAA Server Both ends can compute a shared key that is used for the subsequent AAA authentication Key cannot be computed by intermediate Trust Routers

Example TID Request {"msg_type": "TIDRequest", "msg_body": {"rp_realm": ”mit.edu", "target_realm": ”oxford.uk.ac", "community": ”abfab-hackers.communities.ja.net", "dh_info": {"dh_p”: "FFFFFFFF…", "dh_g": "02", "dh_pub_key": "FBF98ABB…”} } }

Trust Router as TID Gateway Trust Router receives a TID Request from an RP Client (e.g. AAA Proxy) Determines appropriate APC for the community included in the original request If different, moves original COI into orig-coi field Finds matching rp_client entry (from gss_name), applies filters, and adds constraints to the message Determines “Trust Path” and adds it to the message. Forwards message to AAA Server (or next hop Trust Router)

Trust Router Protocol Runs between pairs of Trust Routers Configured as “peers” with GSS credentials to reach each other “Routing” protocol used to dynamically distribute information about Available Trust Links Used to route TID requests and responses across the federation RP Client membership in COIs APC to use for each IdP Realm/COI pair

Trust Link Types Trust Link Types (named by target type) Routing Links Trust Router Link Indicates that the originating trust router can provide temporary IDs to reach the target trust router IdP Realm Link Indicates that the originating trust router can provide temporary IDs to reach the AAA servers in the target realm Information Flooding Links COI RP Membership Link Indicates that the the target RP Client is a member of the indicated COI APC Link Indicates that authentication for a target realm and COI should use the target APC

Trust Path A Trust Path is a set of Trust Links that forms a path across a federation between an RP and the AAA Server(s) in a Target IdP Realm A Trust Path is valid for a given Community Trust Routers forward TID Requests/Responses along Trust Paths, ultimately resulting in a TID that the RP can use to reach AAA Servers in the Target IdP Realm.

Next Steps [We held a Bar BOF at lunch today] We hope to hold a Pre-WG BoF at IETF 87 Need active discussion on the list Join our mailing list!

Questions? Feedback?