Overview of CALEA Conformance Proposed Standard PTSC-LAES-2006-084R6 Manish Karir, Merit – Research and Development.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

EduCause LI Overview February 2007
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CCNA – Network Fundamentals
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Transmission Control Protocol (TCP) Basics
Chapter 7 – Transport Layer Protocols
Cisco Architecture for Lawful Intercept in IP Networks October 2004,rfc3924 Author(s): F. Baker,B. Foster,C. Sharp.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Gursharan Singh Tatla Transport Layer 16-May
CS 356 Systems Security Spring Dr. Indrajit Ray
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
Process-to-Process Delivery:
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Protocols and the TCP/IP Suite
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Chapter 7 Low-Level Protocols
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Transport Layer Layer #4 (OSI-RM). Transport Layer Main function of OSI Transport layer: Accept data from the Application layer and prepare it for addressing.
Mukesh N. Tekwani Elphinstone College Mumbai
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.6 UDP Principles (Chapter 24) (User Datagram Protocol)
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
University of the Western Cape Chapter 12: The Transport Layer.
TCP/IP Transport and Application (Topic 6)
STAR-GATE for PACKET DATA Arkady Linshitz Product Manager.
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Data Communications and Networks
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Chapter 13 The Internet.
February 24, 2004 TR-45 Lawfully Authorized Electronic Surveillance (LAES) Packet Solutions Industry Meeting March 19 th, 2004 Terri L. Brooks Chair TR-45.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Process-to-Process Delivery:
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Chapter 9: Transport Layer
Layered Architectures
Understand the OSI Model Part 2
Internet Protocol: Connectionless Datagram Delivery
Process-to-Process Delivery:
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
AAA: A Survey and a Policy- Based Architecture and Framework
CS4470 Computer Networking Protocols
Process-to-Process Delivery: UDP, TCP
UDP Principles (Chapter 24) (User Datagram Protocol)
Transport Layer 9/22/2019.
Presentation transcript:

Overview of CALEA Conformance Proposed Standard PTSC-LAES R6 Manish Karir, Merit – Research and Development

Outline 1.Architectural Assumptions –Internet Access Service Provider Model –Electronic Surveillance Model –Vocabulary Building 2.CALEA Functions –Functional Breakdown of Components –Architecture, Interfaces and Intercept Access Points 3.CALEA conformance –Timing Requirements –CmII/CmC Packet Formats and Encapsulation –General IASP Requirements 4.Re-Cap and Conclusions

Internet Access Services Model Source: PTSC-LAES R6

Internet Access and Services Model Three Aspects to Gaining Access 1. Reg-F - Registration Function: »The act of a user getting access to the network (e.g. login/authentication of any sort) 2. Res-F - Reservation Function: »The user requesting resources from the network (e.g. requesting an IP address, temporary addresses are not included) 3. PT-F - Packet Transfer Function: »Transfer of Layer-3 packets to/from the Internet

Electronic Surveillance Model Components and Responsibilities 1.Service Provider Administration Responsible for the Access and Delivery Functions 2.Access Function (AF) Consists of one or more Intercept Access Points (IAPs) 3.Delivery Function (DF) Transfer of data from the Access Function to the Collection Function 4.Law Enforcement Administration Controls the LEA collection function 5.Collection Function (CF) Location where the communication intercepts are stored Law Enforcement Responsibility Internet Access Service Provider Responsibility

Electronic Surveillance Model Source: PTSC-LAES R6

More Definitions /Acronyms LI - Lawful Intercept CmII - Communication Identifying Information (e.g. packet headers…but more…) CmC - Communication Content (e.g. the packets) IAP - Intercept Access Point Combinations: –AACmII - Access Associated CmII –CACmII - Content Associated CmII –CmC-IAPs - The point in the network where communication content is intercepted –CmII-IAPs - The point in the network where communication headers are intercepted –Note: CmC-IAPs might be different from CmII- IAPs

The 3 Key Concepts 1.CmC - Communication Content –Captured at CmC-IAPs, full packets –Packets are passed to Delivery Function(DF) –The DF transfers these to the LEA Collection Function (CF) 2.AACmII - Access Associated CmII –Essentially login/logout and authorization activity –DHCP IP address assigned –Information provided to CF via the DF cont.

The 3 Key Concepts cont. 3. CACmII - Content Associated CmII - 2 methods –Intercept packet stream to/from subject and extract IP header information, port information is optional,(but might be authorized) finally deliver all header information to DF or deliver summary records –Sample subjects flows such that no flow can exist without being sampled and deliver summary records to LEA

Functional Breakdown CmC/CmII Access Function (AF): –Responsible for identifying/isolating CmC/CmII for the subject and presenting it to the MF/DF CmC/CmII Mediation Function (MF): –Responsible for the presentation of captured information into the appropriate format for delivery to LEA CmC/CmII Deliver Function (DF): –Responsible transmitting data from IASP to the collection function of the LEA

Functional Lawful Intercept Architecture Source: PTSC-LAES R6

Packet Delivery Interface DF-CF Interface Source: PTSC-LAES R6

Intercept Access Points

Delivery Timing Requirements 1.Event Timestamps: Each intercepted message should contain an accurate timestamp –CmII: timestamp should be accurate to within 200ms –CmC: timestamps need to be provided with each packet 2.Event Timing: Intercepted messages should be sent to LEA within specified time window –CmII should be sent by the DF to the CF within 8 seconds 95% of the time –CmC: ???

Timing Requirements Source: PTSC-LAES R6 T1 is dependent in IASP T2 is jointly determined by IASP and LEA by choice of agreed upon protocols and facilities

CmII Access Messages Access Messages: Notify LEA of access related functions performed by the subject including : Access Attempt (login) - subject begins the network authentication process Access Accepted - sent when subject has successfully authenticated with network AAA Access Failed - user provides invalid username/ password or MAC address cont.

CmII Access Messages cont. Access Session End (logout) - subject initiates disconnect Access Rejected - network rejects login attempt e.g. user is already logged in somewhere else and network does not allow multiple logins Signaling Message Report - (RADIUS, DIAMETER, etc.) may be used in place of the previous messages

CmII Packet Data Messages Packet Data Messages: Notify LEA of data related events performed by the subject Packet Data Session Start - sent when subject completes login and and IP address has been assigned Packet Data Session Failed - login is successful but no IP address, e.g. DHCP pool exhausted Packet Data Session End - session timeout

CmII Packet Data Messages Packet Data Messages: Notify LEA of data related events performed by the subject Packet Data Session Already Established - when surveillance starts after subject login Packet Data Header Report - packet header reports on a per-packet basis Packet Summary Report - periodic summary reports of packet header data

Example CmII Message Formats Access Accepted CmII Message Packet Header Data Report CmII Message

CmC Message Delivery Options SCTE Datagram Format ATIS IAS Datagram –Encapsulation Approach - one packet per encapsulated datagram –UDP/IP based encapsulation; TCP or other transport protocols are optional –IC-APDU - Protocol Data Unit Approach - multiple packets per Datagram We focus on the IAS Datagram approach as it is the simplest

IAS Datagram Encapsulation Approach One intercepted packet in each encapsulated UDP datagram Src IP is the address of DF Dst IP is address of CF Port numbers in UDP header may be agreed upon by LEA and IASP ContentID field is ASCII value that allows correlation between CmC and CmII **Timestamp is RFC3339 compliant: YYYY-MDDThh:mm:ss.sssZ **Intercepted Packet includes all headers

IAS Datagram - APDU Approach A simple extension of the encapsulation approach, to include multiple intercepted packets in a single encapsulated packet.

Subject Identification Two Aspects 1.Login Identification: –When network requires authentication prior to use –CmC and CmII is performed only after subject has been identified on the network –After login; subject can be identified via unique IP address or session identifier assigned to subject during login cont.

Subject Identification Two Aspects, cont. 2.Equipment Identification: –When network does not require authentication prior to use –Subject is identified via unique address or interface –Intercept in this scenario may be based on MAC address, IP address or physical/logical port

Six IASP Requirements 1.Privacy: IASP shall not monitor or permanently record subjects communications 2.Isolation: IASP shall ensure that only the subjects communication is intercepted 3.Transparency: IASP shall perform the intercept in a manner such that the subject cannot reasonably detect that intercept is being performed cont.

Six IASP Requirements cont. 4. Encryption/Compression: IASP shall deliver the intercept data unencrypted or provide the LEA with encryption method and keys. IASP shall provide data uncompressed or identify means to decompress 5. Security/Integrity: IASP shall ensure unaltered delivery of intercept data. Security is to be negotiated between IASP and LEA 6. Performance/Quality: IASP should be able to perform multiple intercepts at the same time

Re-cap and Conclusions This is a simplified overview of the standard - Not a substitute for a detailed reading and interpretation. This is a broad introduction to the draft standard. - Terminology used -Rough of the structure of the proposed standard cont.

Re-cap and Conclusions – Remember: 1.The standard itself is unclear in certain areas, for example: –The use of encryption by IASP to protect the CmC –Specifics such as what is the caseID and how is it different from content identifier, IAP system identity, subscriber ID etc. –Implementation details such as what are the sizes of the various fields in the packet headers, what are the timing requirements for CmC delivery 2.Important to remember that it is still a “draft” standard and subject to revision.