UPnP Security Vic Lortz Chair, Security WC Intel Corporation.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Enabling Secure Internet Access with ISA Server
UPnP Security Vic Lortz Chair, Security WC Intel Corporation.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Windows OS support of UPnP Peter K. Jarvis UPnP Group Program Manager Microsoft Corporation.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Lecture 23 Internet Authentication Applications
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Information Security Policies and Standards
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Introduction To Windows NT ® Server And Internet Information Server.
Chapter 8 Web Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Intranet, Extranet, Firewall. Intranet and Extranet.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Web Services Igor Wasinski Olumide Asojo Scott Hannan.
IETF-50 UPnP Update Prakash Iyer Intel Corporation
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Module 11: Remote Access Fundamentals
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Web Services based e-Commerce System Sandy Liu Jodrey School of Computer Science Acadia University July, 2002.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Module 9: Fundamentals of Securing Network Communication.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Imaging Status Shivaun Albright Imaging Committee Chair HP.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Security: The Goal Computers are as secure as real world systems, and people believe it. This is hard because: Computers can do a lot of damage fast. There.
S imple O bject A ccess P rotocol Karthikeyan Chandrasekaran & Nandakumar Padmanabhan.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
1 G52IWS: Web Services Chris Greenhalgh. 2 Contents The World Wide Web Web Services example scenario Motivations Basic Operational Model Supporting standards.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
BEA position on W3C ‘Web Services’ Standards Jags Ramnarayan 11th April 2001.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Web Services Security Mike Shaw Architectural Engineer.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
Security in OPC Unified Architecture (UA) Dick Oyen IndustrialSysDev, Inc.
Cryptography and Network Security
Securing the Network Perimeter with ISA 2004
Goals Introduce the Windows Server 2003 family of operating systems
Cryptography and Network Security
Presentation transcript:

UPnP Security Vic Lortz Chair, Security WC Intel Corporation

Agenda Introduction Fundamentals: security mechanisms and protection for each phase of UPnP Scenarios Remote plugfest learnings

UPnP Today UPnP is about empowering ordinary people Introduction UPnP Today UPnP is about empowering ordinary people automatic networking no need for technical expertise convenient, “it just works” presumes a secure network

The Expanding Universe Introduction The Expanding Universe Wireless, apartments, dorms, hotels, enterprise networks… Remote access Hackers Viruses

What’s Needed: Security Introduction What’s Needed: Security Scenarios and requirements defined early 2001 Security Working Committee established August, 2001 Version 0.8 of spec docs completed March, 2002 Sample implementations and 3rd plugfest underway

Spec documents DeviceSecurity – primary service Introduction Spec documents DeviceSecurity – primary service SecurityConsole – service for publishing keys and names, distributing certificates DeviceStealth – service for securing discovery AuditService – service for event logs (not just security-related) SecureDevice – device template, contains overall architectural description, secure event mechanism

Introduction Current Status Sample implementations: Intel, LGE, Siemens (2 independent), Sony Microsoft is enhancing test tool On track to complete DeviceSecurity and SecurityConsole services by end of 2002. DeviceStealth, secure eventing, and AuditService to follow soon First customer: IGD V2 (A/V also interested).

Benefits and Costs Benefits Costs Protects from “bad guys” Introduction Benefits and Costs Benefits Protects from “bad guys” Enables high-value services (e.g., remote power metering, medical monitoring) Costs Additional code in devices, cycles to do crypto Larger packet sizes on network Incompatible with legacy UPnP (this is a feature) Some configuration is required Challenge is to minimize configuration without losing security

Version 2 (best guess) V2 solution will probably be almost identical to V1 solution Encryption strategy probably will be different Secure eventing definitely will be different V1 UPnP Security is already very close to WS-Security (and related specs) V2 UPnP Security will be a proper subset of WS-Security Microsoft is working to make sure UPnP requirements are addressed in WS-Security

UPnP Security Fundamentals

Fundamentals Principals Principals are “raw” public keys (no expensive Public Key Infrastructure) Key hashes are principal identifiers Users can assign local names to keys Key values are passed by SOAP (for control actions) or in self-signed X.509 certificates (for presentation pages) Groups of keys can be defined

Permissions XML elements defined by device manufacturer Fundamentals Permissions XML elements defined by device manufacturer Permissions are abstractions (do not map 1:1 onto UPnP actions) Devices can also define named sets of permissions (profiles) Can include parameters E.g., “<read/>”, “<Administrator/>”, “<user><name> Frodo </name></user>”

Access Control Lists <entry> <subject> {<hash> or Fundamentals Access Control Lists <entry> <subject> {<hash> or <any/>} </subject> <access> {permission elements or <all/>} </access> <valid> {optional <not-before> and/or <not-after>} </valid> </entry>

Discovery: DeviceStealth Fundamentals Discovery: DeviceStealth Device advertises itself as generic “SecureDevice” or “BasicDevice” Full device description obtained via access-controlled SOAP actions IsTypeSupported() GetDeviceDetails()

Fundamentals Control: Secure SOAP XML Dsig-based signatures and anti-replay in SOAP header SetSessionKey() – binds symmetric keys with public keys DecryptAndExecute() – for privacy, encrypts and tunnels entire HTTP packet Minimal (null) canonicalization Crypto algorithms: RSA, SHA1-HMAC, AES

(XML signature, {key info}, Freshness block for anti-replay) Fundamentals Secure SOAP Message HTTP Header SOAP Envelope SOAP Header (XML signature, {key info}, Freshness block for anti-replay) SOAP Body (UPnP Action)

Fundamentals Secure Eventing Requires implementation of DeviceSecurity to establish session keys Secure subscribe call includes 4 new headers KEY-ID, IV, KEY-SEQ, HMAC Events are encrypted and signed using the designated session keys

Fundamentals Presentation Pages Device (server) authentication with self-signed X.509 certificate Browser (client) also authenticates with self-signed certificate Permissions and ACLs also apply to presentation pages, based on the public key in the browser certificate

Authorization Certificates Fundamentals Authorization Certificates Equivalent to signed ACL entries also include issuer, device public key ID, and signature Enable small ACLs Support constrained delegation of permissions

The Power of Delegation Fundamentals The Power of Delegation Provides scalable access control applicable to hierarchical organizations Enables flexible business models subcontractors constrained delegation limits powers (liability) Auditable (better than sharing passwords)

Scenarios

Fundamentals Bootstrapping Trust Need some way to establish trust of control point keys Public keys can be sent in the clear, but need out-of-band mechanism to bootstrap trust Hardware-based (e.g., IR) Default method (SecurityConsole)

New Device Introduction Scenarios New Device Introduction Security Console Device discovery GetPublicKeys() TakeOwnership()

Control Point Introduction Scenarios Control Point Introduction Control Point Security Console discovery PresentKey()

Access Control Configuration Scenarios Access Control Configuration Security Console Device (prior TakeOwnership…) GetDefinedPermissions() AddACLEntry()

Control Point Uses Device Scenarios Control Point Uses Device Control Point Device GetPublicKeys() SetSessionKeys() SomeAction() + sig or DecryptAndExecute()

Access Control Using Certs Scenarios Access Control Using Certs Security Console Control Point Device GetMyCertificates() CacheCertificate() optional step… SomeAction() + sig + cert(s)

Summary UPnP Security 1.0 is nearly complete V2 Security will be similar, especially in the areas of trust bootstrapping and authorization Your customers will expect and demand security Toolkits and O/S support will be available soon (stay tuned)

Collateral http://forum.upnp.org/archives/security.html http:www.upnp.org/members/repository.asp

Remote Plugfest Learnings

Motivation Two and three day plug-fests are not long enough to resolve complicated issues Fixing some of these problems can be very invasive to code Current economic climate dictates that travel to numerous plugfests is infeasible

Basic Solution UPnP is a network-based protocol, so let’s use the Internet Rather than use SSDP, explicitly load description documents using URLs communicated out-of-band Firewall workarounds: Put devices outside firewall Use a VPN Target a few actions every week between companies, testing during agreed times Requires commitment for at least one person at each company to be available for 1 to 2 hours a week

Impact Raises level of assurance that implementations will work together Don’t come to F2F plugfests hoping things will “just work” Makes F2F plugfests more productive Allows implementers to work on real issues, instead of tiny mistakes Allows for accurate communication of status for planning purposes

Acronyms XML Dsig – XML Digital Signature XML Enc – XML Encryption SOAP – Simple Object Access Protocol PKI – Public Key Infrastructure (e.g., X.509)

For the interconnected lifestyle