draft-ipdvb-sec-01.txt ULE Security Requirements

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Cryptography and Network Security
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Chapter 5 Network Security Protocols in Practice Part I
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
CSE 4905 IPsec.
Phil Hunt, Hannes Tschofenig
Cryptography and Network Security
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptographic Hash Function
Goals of soBGP Verify the origin of advertisements
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
Module 8: Securing Network Traffic by Using IPSec and Certificates
IPSec IPSec is communication security provided at the network layer.
Softwire Security Update
IETF-70 EAP Method Update (EMU)
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
Cryptography and Network Security
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
Maryna Komarova (ENST)
Virtual Private Networks (VPNs)
Securing the CASP Protocol
NET 536 Network Security Lecture 5: IPSec and VPN
Security Risanuri Hidayat 21 February 2019 security.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Introduction to Network Security
Virtual Private Networks (VPNs)
PAA-2-EP protocol PANA wg - IETF 58 Minneapolis
27 Febraury 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Sub-committee Status Report.
Cryptography and Network Security
Chapter 6 IP Security.
Lecture 36.
Lecture 36.
Cryptography and Network Security
Presentation transcript:

draft-ipdvb-sec-01.txt ULE Security Requirements IP-DVB WG Meeting (IETF-68) - Prague draft-ipdvb-sec-01.txt ULE Security Requirements Presenter: Sunil Iyengar University of Surrey, UK 20/03/07

ULE Architecture Added

Security Requirements Added Data confidentiality is the major requirement. Protection of Layer 2 NPA address. Integrity protection and authentication of the ULE source is required against active attacks. Protection against replay attacks. Layer L2 ULE Source and Receiver authentication.

Security Scenarios Case 1: Monitoring (passive threat). Here the intruder monitors the ULE broadcasts to gain information about the ULE data and/or tracking the communicating parties identities (by monitoring the destination NPA). Case 2: Local hijacking of the MPEG-TS multiplex (active threat). Here an intruder is assumed to be sufficiently sophisticated to over-ride the original transmission from the ULE Encapsulation Gateway and deliver a modified version of the MPEG-TS transmission to a single ULE Receiver or a small group of Receivers (e.g. in a single company site). Case 3: Global hijacking of the MPEG-TS multiplex (active threat). Here we assume an intruder is very sophisticated and able to hijack the whole MPEG transmission multiplex. For both cases 2 and 3, there can be two sub cases: Insider attacks i.e. active attacks from adversaries in the known of secret material. Outsider attacks i.e. active attacks from outside of a virtual private network.

Security Scenarios Requirements Case 1: Data confidentiality MUST be provided to prevent monitoring of the ULE data (such as user information and IP addresses). Protection of NPA addresses MUST be provided to prevent tracking ULE Receivers and their communications. Case 2: In addition to case 1 requirements, new measures need to be implemented such as authentication schemes using Message Authentication Codes, digital signatures or TESLA [RFC4082] and using sequence numbers to prevent replay attacks in terms of insider attacks. In terms of outsider attacks group authentication using Message Authentication Codes should provide the same level of security. However, scenario 2 threats apply only in specific service cases and therefore source authentication and protection against replay attacks are OPTIONAL. Case 3: The requirements here are similar to Case 2. In addition, intrusion detection is also desirable by the MPEG-2 network operator.

Revision History Working Group Draft revisions Fixed editorial mistakes and ID style for WG adoption. Major comments and suggestions (Michael Noistering) regarding authentication and integrity assurance. He also suggested that the threat scenarios section 3.2 should be expanded. Elaborate the impact of threats for IP as opposed to Layer 2 (Gorry Fairhurst) Algorithm Agility added as a requirement (gorry) Fixed editorial mistakes and added some changes as pointed out by Knut (ESA) and added an appendix which shows the framework for securing the ULE network.

ULE Security Framework Interfaces Key management <-> ULE Security databases ULE Security databases <-> ULE interfaces

Key Management Block This key management framework is responsible for user authentication, access control, and Security Association negotiation (which include the negotiations of the security algorithms to be used and the generation of the different session keys as well as policy material). This Key management framework can be either automated or manual. Hence Key management client entity will be present in all ULE receivers as well as ULE sources. In some cases the ULE source could also be the Key Server Entity. Existing key management protocols like GSAKMP, GDOI may be used or manual insertion of keying material can also be deployed.

ULE Security Block A new security extension header for the ULE protocol is required to provide the security features of data confidentiality, data integrity, data authentication and mechanisms to prevent replay attacks. Security keying material will be used for the different security algorithms (for encryption/decryption, MAC generation, etc.), which are used to meet the security requirements. This block will use the keying material and policy information from the ULE security database block on the ULE payload to generate the secure ULE extension Header or to decipher the secure ULE extension header to get the ULE payload. There could be other extension headers placed before or after the ULE Security Header extension

ULE Databases There needs to be two databases: ULE-SAD: ULE Secure Association Database contains all the Security Associations that are currently established with different ULE peers. ULE-SPD: ULE Secure Policy Database contains the policies as defined by the system manager. Those policies describe the security services that must be enforced. The design of these two databases will be based on IPSec databases as defined in RFC4301 [RFC4301].

Revision Future Fix editorial mistakes and added some changes as pointed out by Knut (ESA). Change WG draft status to INFO Sections to be updates: Security Requirements Appendix This revision should be ready by end of March 2007.

Conclusions Since most of the comments on the mailing list have been addressed Would like to request this draft to be adopted for IESG evaluation The next step would be to design the security extension and the interface documents as described in the framework as separate drafts. Not part of current charter but would like to continue input to the IPDVB group with guidance from the MSEC group ?? Plan to have a working prototype based on our initial work in June.