Group Secure Association Key Management Protocol (GSAKMP) Presented by Hugh Harney

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
ISAKMP RFC 2408 Internet Security Association & Key Management Protocol Protocol Establish, modify, and delete SAs Negotiate crypto keys Procedures Authentication.
Security at the Network Layer: IPSec
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Network Layer Security: IPSec
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Sepucha_Date_01 Group Key Management Architecture Howie Weiss NASA/JPL/SPARTA
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
Cryptography and Network Security
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
IP Security. IPSEC Objectives n Band-aid for IPv4 u Spoofing a problem u Not designed with security or authentication in mind n IP layer mechanism for.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
IP Security: Security Across the Protocol Stack
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
CSCE 715: Network Systems Security
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Principles of Policy in Secure Groups Hugh Harney SPARTA, Inc. Andrea Colegrove SPARTA, Inc. Patrick McDaniel University of Michigan.
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Group Key Management Architecture
Chapter 5 Network Security Protocols in Practice Part I
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
UNIT.4 IP Security.
IPSec IPSec is communication security provided at the network layer.
BINF 711 Amr El Mougy Sherif Ismail
Cryptographic Protocols
CSE 5/7349 – February 15th 2006 IPSec.
Presentation transcript:

Group Secure Association Key Management Protocol (GSAKMP) Presented by Hugh Harney

Agenda Framework GSAKMP Policy GSAKMP Key Management GSAKMP Message Structures Summary

SMuG Framework

Policy Group policy vs. Peer Policies AndreaBob A and B have 1 st hand knowledge A and B are sharing their own data A and B participate in key creation Andrea Bob Sue ? A and B have 1 st hand knowledge A and S have 1 st hand knowledge B and S have never communicated Who owns the data? How can S trust B? B trust S? Was the A to B key exchange as strong As the A to S exchange? Will A and B protect the data equally? Is A authorized to distribute key? Is A controlling the group?

GSAKMP Features Layered approach Additional functionality vs. re-engineering Full policy specification and dissemination Authenticated policy token Distributed Key Management Security infrastructure discovery Push or Pull operation Optional fields for high grade security Ubiquitous policy enforcement Access control Authorizations Mechanism specifications Rekey Logical Key Hierarchy Proof of concept source code is available - FREE

GSAKMP Policy Token (Generic) Token IDAuthorizationAccess ControlMechanismsSignature Block VersionProtocolGroup IDTimestamp Group OwnerKey Server Compromise Recovery Agent PermissionsAccess Group Communications Security Association Unicast Security Association Signer ID Certificate Info Signature Data

GSAKMP Policy IPSEC example Token ID Field Token ID Authorizations Access Control Mechanisms Signature Block Group Name IPV4 Multicast Addr: Group #: abcd Source Address: aaa.bbb.ccc.ddd Token version GSAKMP v1.0 ANTIGONE v1.0 Protocol ID IP Multicast Reliable IP Multi Life date 1 day

GSAKMP Policy IPSEC example: Authorizations Field Token ID Authorizations Access Control Mechanisms Signature Block Root Cert Type(s) X.509 v3-DSS-SHA1 Key length 1024 Root CA /C=US/ST=MD/L=Columbia/ O=SPARTA,Inc./CN =John Root Group Owner Subject Name /C=US/ST=MD/L=Columbia/ O=SPARTA,Inc./ CN=Jane Owner (Opt Serial #) 1234…. PKI Information GC/KS Subject Name (Opt) Serial # PKI Information Rekey Control Subject Name (Opt) Serial # PKI Information Root Cert Type(s) X.509 v3-DSS-SHA1 Key length 1024 Root CA /C=US/ST=MD/L=Columbia/ O=SPARTA,Inc./CN = Sally Member

GSAKMP Policy IPSEC example: Access Control Field Token ID Authorizations Access Control Mechanisms Signature Block permissions Security level 1 Security level 2 Security level 3 Etc. access Control List /C=US/ST=MD/L=Columbia/O=SPARTA,Inc./CN = Grumpy Member /C=US/ST=MD/L=Columbia/O=SPARTA,Inc./CN = Doc Member /C=US/ST=MD/L=Columbia/O=SPARTA,Inc./CN = Sneezy Member Etc. Access Control Rules Distinguished name must be in member Database AND Distinguished name must not be on bad guy list

GSAKMP Policy IPSEC example: Mechanisms Field Token ID Authorizations Access Control Mechanisms Signature Block Unicast Peer SA Security Protocol Key Length Key Creation Method Group Establishment Messages Key encryption algorithm Signature Key creation method Group Data Comms SPI: mandatory for group Security Protocol Key Length Key Creation Method Group Source Authentication Group Management Key encryption algorithm Rekey method Signature Data channel exceptions AH ESP IPSec (none) Direction in out ESP Algorithm 3 DES ( See DOI) ESP Authentication hmac-sha (See DOI) Encapsulation Mode tunnel transport SA Life time bytes Selectors source address: (destination port): (group ID): 4 byte? (security label):

GSAKMP Policy IPSEC example: Signature Block Field Token ID Authorizations Access Control Mechanisms Signature Block Signature Information Algorithm: DSS Hash: SHA1 Signature Data

GSAKMP Key Management - Group Establishment Architecture Group Owner Group Controller (GC/KS) Group Member Group Member Group Member Group Member Subordinate Group Controller (GC/KS) Group Member Group Member

GSAKMP Key Management Establishment messages Request to Join SA Establishment Invitation Invitation Response Key Download Acknowledgment Shared Key Group Session ControllerMessage Member

GSAKMP Key Management Rekey Rekey ControllerMessage Member Rekey

Request to join Message Name : Request to Join Dissection : {HDR, GrpID, Nonce_I, GSA RQ} SigM, [CertM] Payload Types : GSAKMP Header, Nonce, Notification, Signature, [Certificate], [Certificate Request], [Vendor ID], [Identification], [Authorization] SigM : Signature of Group Member CertM : Certificate of Group Member {}SigX :Indicates minimum fields used in Signature [ ] : Indicate an optional data item

Invitation Message Name : Invitation to Join Dissection : {HDR, GrpID, Policy Token, (Nonce_R, Nonce_C) OR Nonce_I, [Key Creation], GSA RQ}SigC, [CertC], [SigSC], [CertSC] Payload Types : GSAKMP Header, Policy Token, Nonce, Notification, Signature, [Certificate], [Signature], [Certificate], [Key Creation], [Certificate Request], [Vendor ID], [Identification], [Authorization] SigC : Signature of Group Controller SigSC : Signature of Subordinate Group Controller CertC : Certificate of Group Controller CertSC : Certificate of Subordinate Group Controller {} SigX :Indicates minimum fields used in Signature [] : Indicate an optional data item

Invitation Response Message Name : Invitation Response Dissection : {HDR, GrpID, (Nonce_R, Nonce_C) OR Nonce_C, [ID_R], [Key Creation], GSA RS}SigM, [CertM] Payload Types : GSAKMP Header, Nonce, [Identification], Notification, Signature, [Key Creation], [Certificate], [Vendor ID], [Authorization] SigM : Signature of Group Member CertM : Certificate of Group Member {}SigX :Indicates minimum fields used in Signature [] : Indicate an optional data item

Key download over SA Message Name : Key Download Dissection : {HDR, GrpID, Nonce_C, ID_R, [(]Key Data[)*]}SigC, [SigSC], [CertSC] Payload Types : GSAKMP Header, Nonce, Identification, Key Download, Signature, [Authorization], [Vendor ID] SigC : Signature of Group Controller SigSC : Signature of Subordinate Group Controller CertC : Certificate of Group Controller CertSC : Certificate of Subordinate Group Controller {}SigX :Indicates minimum fields used in Signature [] : Indicate an optional data item (data)* : Indicates encrypted information

Key download insufficient SA Definition Message Name : Key Download Dissection : {HDR, GrpID, Nonce_C, ID_R, (Key Data)*}SigC, [SigSC], [CertSC] Payload Types : GSAKMP Header, Nonce, Identification, Key Download, Signature, [Authorization], [Vendor ID] SigC : Signature of Group Controller SigSC : Signature of Subordinate Group Controller CertC : Certificate of Group Controller CertSC : Certificate of Subordinate Group Controller {}SigX :Indicates minimum fields used in Signature [] : Indicate an optional data item (data)* : Indicates encrypted information

Acknowledgement Message Name : Acknowledgment Dissection : {HDR, GrpID, Nonce_C, [ID_R], ACK}SigM, [CertM] Payload Types : GSAKMP Header, Nonce, [Identification], Notification, Signature, [Certificate], [Vendor ID], [Identification], [Authorization] SigM : Signature of Group Member CertM : Certificate of Group Member {}SigX :Indicates minimum fields used in Signature [] : Indicate an optional data item

Rekey Message Name : Rekey Event Dissection : {HDR, GrpID, [Policy Token], Rekey Array}SigC, [CertC] Payload Types : GSAKMP Header, [Policy Token], Rekey Event, Signature, [Certificate], [Vendor ID] SigC : Signature of Group Controller CertC : Certificate of Group Controller {}SigX :Indicates minimum fields used in Signature [] : Indicate an optional data item

Closing Remarks GSAKMP has a free release ftp://ftp.sparta.com/pub/columbia/gsak mp