MIKEY Capability Discovery Seokung Yoon (Korea Information Security Agency) draft-seokung-msec-mikey-capability-discovery-00.txt.

Slides:



Advertisements
Similar presentations
1 © 2001, Cisco Systems, Inc. All rights reserved. © 2004, Cisco Systems, Inc. All rights reserved. Location Conveyance in SIP draft-ietf-sipping-location-requirements-02.
Advertisements

Advanced IM Capabilities Hisham Khartabil. draft-rosenberg-simple- messaging-requirements- 01.txt Found on jdrosen.net or softarmor.com (in the morge)
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Group-to-RP Mapping Algorithm PIM Working Group Bharat Joshi Infosys Technologies Ltd. draft-joshi-pim-group-rp-mapping-00.txt.
Communication Service Identifier Requirements on SIP draft-loreto-3gpp-ics-requirements.txt
Information-Centric Networks09c-1 Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks –V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass,
Draft-ietf-dime-agent-overload- 01.txt. Agenda Extensions to DOIC Questions Review of representative use cases.
SIP issues with S/MIME and CMS Rohan Mahy SIP, SIPPING co-chair.
Mobility Solutions BCMCS Key Derivation Procedure Harmonization with IETF SRTP.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID STUN, TURN and ICE Cary Fitzgerald.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
Fredrik Lindholm 52st IETF Meeting 1Key management extensions Key Management Extensions for SDP and RTSP.
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
1 Optimizing DNS-SD Query draft-aggarwal-dnssd-optimize-query-00 Ashutosh Aggarwal (Qualcomm) dnssd WG meeting, IETF90, Toronto,
July 30, 2010SIPREC WG1 SIP Call Control - Recording Extensions draft-johnston-siprec-cc-rec-00 Alan Johnston Andrew Hutton.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
Diameter End-to-End Security: Keyed Message Digests, Digital Signatures, and Encryption draft-korhonen-dime-e2e-security-00 Jouni Korhonen, Hannes Tschofenig.
SIP Action Referral Rifaat Shekh-Yusef Cullen Jennings Alan Johnston Francois Audet 1 IETF 80, SPLICES WG, Prague March 29, 2011.
Draft-gu-ppsp-protocol-00 PPSP Session IETF 77, Anaheim March 22, 2010.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
ZFONE  Philip Zimmermann’s new secure VOIP application  Interoperates with SIP signaling  Communication with AES by SRTP  Successor of PGPfone  Does.
Coordination Trafficking in persons.  ROLES AND RESPONSIBILITIES  Coordinator  The Ministry of Foreign Affairs and the Ministry of Social Solidarity.
Responsible Submitter An SMTP Service Extension IETF 60 San Diego, CA Harry Katz Microsoft Corp. 8/4/2004.
Presents Fall Forum H.235 Security Status Quo and Perspectives Presented by Martin Euchner, Rapporteur Q.G/16 Siemens AG.
ZRTP: Media Path Key Agreement for Unicast Secure RTP April 2011, RFC 6189 Author(s): P. Zimmermann, A. Johnston, J. Callas Speaker :Ted 1.
Draft-miniero-mediactrl-escs- 00.txt Alessandro Amirante Tobia Castaldi Lorenzo Miniero Simon Pietro Romano (University of Napoli Federico II)
Modifications in ACAP © Created by Isaac P. E. Mailleue Research Integrity Coordinator University of North Carolina at Greensboro September 2013.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
IETF70, Vancouver, December 2007draft-wing-sipping-srtp-key-021 Disclosing Secure RTP (SRTP) Session Keys draft-wing-sipping-srtp-key-02 Dan Wing,
Engaging Enriching Purposeful Connecting Personal What are the key components that make synchronous learning work? In this session, we will explore the.
RTP – Real-time Transport Protocol Elbert Tsay, Brad Bargabus, Patrick Lim, Henry Quach The Five Packeteers (minus 1  )
1 Secure VoIP: call establishment and media protection Johan Bilien, Erik Eliasson, Joachim Orrblad, Jon-Olov Vatn Telecommunication Systems Laboratory.
ROLL Working Group Meeting IETF-81, Quebec City July 2011 Online Agenda and Slides at: bin/wg/wg_proceedings.cgi Co-chairs:
1 SIP Requirements for SRTP Keying Dan Wing IETF 66 v4.
Audio/Video Transport Core Maintenance Working Group Magnus Westerlund Roni Even Jabber room:
Interactive Connectivity Establishment : ICE
U NIVERSITY of N EW H AMPSHIRE I NTER O PERABILITY L AB iSCSI Plugfest (Oct 28 - Nov 3) UNH InterOperability Laboratory Yamini Shastry Graduate Research.
ABSTRACT: This contribution proposes the HRPD-WiMAX handoff solution. TITLE: HRPD-WiMAX Handoff TSG-A WG4 RECOMMENDATION: Review and Adopt Samsung Electronics.
MSEC Montreal, July 26 Ran Canetti and Lakshminath Dondeti
Proposal Writing. # 1:The title Choose a title that conveys information about your project. Avoid acronyms that have negative connotations. Make it Brief.
Diameter Overload DIME WG IETF 87 July, Starting Point DIAMETER_TOO_BUSY provides little guidance on what a Diameter client should do when it receives.
IETF 67 – SPEERMINT WG Presence Use Cases draft-houri-speermint-usecase-presence-00 Avshalom Houri – IBM Edwin Aoki – AOL LLC Sriram Parameswar - Microsoft.
An additional mode of key distribution in MIKEY draft-ignjatic-msec-mikey-rsa-r-00 D. Ignjatic, L. Dondeti, F. Audet.
August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE WG.
Indication of Terminated Dialog draft-holmberg-sipping txt Christer Holmberg NomadicLab Ericsson.
MIKEY, Revisited Lakshminath Dondeti Thanks to: Dragan Ignjatic, Ran Canetti and others.
1 Resource Certification Robert Loomans February 2, 2007.
1 1 Cullen Jennings IETF 90 V5. 2 WebRTC has “flows” of Audio, Video, and Data between browsers JavaScript applications running in the browser have an.
SIPPING Drafts Jonathan Rosenberg dynamicsoft. Conferencing Package Issues Only one – scope Depends on broader work in conferencing May include –Participant.
1 End-to-middle Security in SIP Kumiko Ono NTT Corporation March 1, 2004 draft-ietf-sipping-e2m-sec-reqs-01.txt draft-ono-sipping-end2middle-security-01.txt.
P2P Streaming Protocol (PPSP) Requirements draft-zong-ppsp-reqs-02 Ning Zong Yunfei Zhang Victor Pascual Carl Williams.
SEED Overview ‘Use of the SEED Encryption Algorithm in CMS’ November 11, 2003 Jongwook Park, KISA
1 PSAMP WGIETF, November 2003PSAMP WG PSAMP Framework Document draft-ietf-psamp-framework-04.txt Duffield, Greenberg, Grossglauser, Rexford: AT&T Chiou:
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
SDP Security Descriptions for Media Streams draft-ietf-mmusic-sdescriptions-02.txt November 14, 2003 Flemming Andreasen Mark Baugher.
SIP wg Items Jonathan Rosenberg dynamicsoft Caller Preferences: Changes Discussion of Redirects –Previous draft only proxy –Nothing different for redirect.
End-to-middle Security in SIP
SBSM BOF Session-Based Security Model for SNMPv3
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Media Independent Handover Services and Interoperability
IEEE MEDIA INDEPENDENT HANDOVER DCN:
An Architecture for Media Recording using the Session Initiation Protocol draft-ietf-siprec-architecture Andy Hutton
Presentation transcript:

MIKEY Capability Discovery Seokung Yoon (Korea Information Security Agency) draft-seokung-msec-mikey-capability-discovery-00.txt

Problem Statement We implemented a secure VoIP phone with SRTP (AES, SEED) and MIKEY for a key management protocol for SRTP To set up a secure call, the capability discovery procedure should be needed and defined in MIKEY But, capability discovery define in MIKEY needs two roundtrip if the initiator select mismatch algorithm with the responder It is not appropriate for the real-time communication

Capability Discovery in MIKEY Initiator Responder AESSEED SEED INVITE (MIKEY Init) = {AES} Error = {SEED} NEW INVITE (MIKEY Init) = {SEED} 200 OK (MIKEY Resp) Secure Media Session (SRTP) The initiator indicates the security policy to be used. If the responder does The initiator indicates the security policy to be used. If the responder does not support it, the responder can together with an error message, send back not support it, the responder can together with an error message, send back its own capabilities to let the Initiator choose a common set of parameters. its own capabilities to let the Initiator choose a common set of parameters.

Proposal (1/2) Initiator Responder 200 OK (MIKEY Resp) = {SEED} AESSEED SEED INVITE (MIKEY Init) = {AES, SEED} Secure Media Session (SRTP) The Initiator sends its own capabilities to let the Responder choose a The Initiator sends its own capabilities to let the Responder choose a common set of parameters. This is done by including one or more security common set of parameters. This is done by including one or more security policy payloads policy payloads

Proposal (2/2) Modify the MIKEY Message Modify the MIKEY Message

Next Step Questions or Comments?? Take this work as an WG item??