Rserpool Security Trust Argument draft-ietf-rserpool-asap-13.txt Maureen Stillman November 6, 2006

Slides:



Advertisements
Similar presentations
April 23, XKMS Requirements Update Frederick Hirsch, Mike Just April 23, 2002 Goals Requirements Summary –General, Security Last Call Issues –For.
Advertisements

SSL/TLS Protocol Network Security Gene Itkis. Basic paradigmatic application: on-line purchase Client contacts Server (possibly for the first time) Spontaneity.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
11/10/031 ENRP and ASAP Updates and Issues Presenter: Qiaobing Xie November 10, 2003.
1 SASP v1 (Server/Application State Protocol) draft-bivens-sasp-00.txt Alan Bivens IBM Research New York, USA IETF 60.
SIP Security Matt Hsu.
Chapter 8 Web Security.
MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents Presented By Mr. Muhammad Awais Shibli.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
1 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada draft-urien-badra-eap-tls-identity-protection-00.txt
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
RADIUS Crypto-Agility Requirements November 18, 2008 David B. Nelson IETF 73 Minneapolis.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
1 NIST Key State Models SP Part 1SP (Draft)
MWIF Confidential MWIF-Arch Security Task Force Task 5: Security for Signaling July 11, 2001 Baba, Shinichi Ready for MWIF Kansas.
1 Pascal URIEN, IETF 63th Paris, France, 2nd August 2005 “draft-urien-eap-smartcard-type-02.txt” EAP Smart Card Protocol (EAP-SC)
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Session Traversal Utilities for NAT (STUN) IETF-92 Dallas, March 26, 2015 draft-ietf-tram-stunbis Marc Petit-Huguenin, Gonzalo Salgueiro.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
1 rserpool-comp-06.ppt / 14 July 2003 / John Loughney IETF 57 Comparison of Protocols for Reliable Server Pooling John Loughney.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
1 Protecting SIP Against DoS An Architectural Approach.
Draft-gu-ppsp-tracker-protocol-04 Presenter : Gu Yingjie IETF-81, Quebec, July, 2011.
Emerging Solutions in Network Time Synchronization Security
Identities Exposed How Design Flaws in Authentication Solutions May Compromise Your Privacy.
The Secure Sockets Layer (SSL) Protocol
Robust Security Network (RSN) Service of IEEE
History and Implementation of the IEEE 802 Security Architecture
OGF PGI – EDGI Security Use Case and Requirements
Phil Hunt, Hannes Tschofenig
Encryption and Network Security
Cryptography and Network Security
Secure Sockets Layer (SSL)
UNIT.4 IP Security.
Visit for more Learning Resources
Cryptography and Network Security Chapter 16
The Reliable Server Pooling Framework
Proposed solutions to comments on section 7
Global Standards Collaboration (GSC) GSC-15
IETF-70 EAP Method Update (EMU)
The Tunneled Extensible Authentication Method (TEAM)
SECURITY IN DISTRIBUTED FILE SYSTEMS
Maureen Stillman March 17, 2003
Cryptography and Network Security
Athith Amarnath, graduate Student Database and Security Research Group
Sukumara T, Janne S, Kishan SG, Harish G, Eashwar / Presented to CIGRE Colloquium, Mysore, Cyber Security - Secure communication design for.
Maryna Komarova (ENST)
draft-ipdvb-sec-01.txt ULE Security Requirements
Multi-party Authentication in Web Services
The Secure Sockets Layer (SSL) Protocol
Mesh Security Proposal
Network Security 4/21/2019 Raj Rajarajan.
5G Use Case Configuration & PNF SW Upgrade using NETCONF ONAP DDF, Jan 9, 2019 Ericsson.
Potential L2 security options for UL BCS
Cryptography and Network Security
Presentation transcript:

Rserpool Security Trust Argument draft-ietf-rserpool-asap-13.txt Maureen Stillman November 6, 2006

Current Status Generate updates to security considerations sections for ASAP and ENRP

Threat Summary PE registration/deregistration flooding and/or spoofing (threat 2.1, 2.2, 2.3, 2.4) Security mechanism in response: ENRP server authenticates the PE ENRP PE Registration messages

Threat Summary PE registers with a malicious ENRP server (threat 2.6) Security mechanism in response: PE authenticates the ENRP server ENRP PE Mutual authentication

Threat Summary Malicious ENRP server joins the pool Mitigation: mutual authentication of ENRP servers ENRP Mutual authentication

Threat Summary PU communicates with a malicious ENRP server for name resolution (Threat 2.7, 2.12) Security mechanism in response: The PU authenticates the ENRP server. PU ENRP ENRP authentication

Threat Summary Replay attack (threat 2.8) –Can corrupt the ENRP database Mitigation: security mechanism that supports protection from replay attack

Threat Summary Threat 2.10) Corrupted data which causes a PU to have misinformation concerning a name resolution Security mechanism in response: Security protocol which supports integrity protection Threat 2.11) Eavesdropper snooping on namespace information Security mechanism in response: Security protocol which supports data confidentiality

Summary of Requirements Security mechanisms must provide support for authentication, integrity, data confidentiality and protection from replay attacks TLS supports all this and we selected that for our security mechanism –No need to invent new security mechanisms

Summary by component PU (rserpool client) Mandatory to implement –Authentication of ENRP server protects the client from malicious ENRP server –Confidentiality, integrity and protection from replay attacks

Summary by component PE Mandatory to implement –Authentication of ENRP server protects it from malicious ENRP server –Confidentiality, integrity and protection from replay attacks

Summary by component ENRP Mandatory to implement –Mutual authentication of ENRP server protects it from malicious ENRP server –Authentication of PE protects it from malicious PE –Confidentiality, integrity and protection from replay attacks

Rserpool Security Architecture using TLS = easy trust argument PU PE ENRP Server Authentication of ENRP server, integrity, replay, confidentiality ENRP Server Mutual authentication, integrity, replay, confidentiality

ENRP mixed security database ENRP PE A pool “foo” PE C pool “foo” ENRP foo Database PE A,C – secure PE B, D – not secure PE B pool “foo” PE D pool “foo”

Proposed Solution ENRP PE A pool “foo” PE C pool “foo” ENRP foo Database PE A,C – secure PE B pool “foo” PE D pool “foo” Security error Secure database

Mixed data base issues Need to mark PE registrations – some have used security to register others not When a PU requests a list, does it get the mixed list or one or the other? Makes implementation more complex Consensus reached – mixed database not allowed; either all secure or all not secured

Securing the control channel Two options –Data channel only –Control and data -- We have decided to multiplex the data and control channel When the data channel is secured, the control channel is as well due to the multiplex If data is not secured, neither is the control Consensus reached that this is adequate for securing the control channel

TLS cipher suite TLS has dozens of ciphersuites specified Client and server perform a handshake to determine cipher suite If they have no overlap; then communication is not possible Usually specify a mandatory to implement ciphersuite to get around this problem –Consensus is TLS_RSA_WITH_AES_128_CBC_SHA mandatory; TLS_RSA_WITH_3DES_EDE_CBC_SHA recommended

Next steps Finish security update to ASAP and ENRP protocol