HIP resynchronization Tom Henderson IETF-59, March 3, 2004.

Slides:



Advertisements
Similar presentations
An Improved TCP for transaction communications on Sensor Networks Tao Yu Tsinghua University 2/8/
Advertisements

Keiji Maekawa Graduate School of Informatics, Kyoto University Yasuo Okabe Academic Center for Computing and Media Studies, Kyoto University.
Using HIP to solve MULTI-HOMING IN IPv6 networks YUAN Zhangyi Beijing University of Posts and Telecommunications.
IP security over ATM CS 329 Hwajung Lee Computer and Communications Security The George Washington University.
IS-IS ESN TLV draft-chunduri-isis-extended-sequence-no-tlv-01 Uma Chunduri, Wenhu Lu, Albert Tian Ericsson Inc. Naiming Shen Cisco Systems, Inc. IETF 83,
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
SAVI IP Source Guard draft-baker-sava- implementation Fred Baker.
Security at the Network Layer: IPSec
Chapter 5 Network Security Protocols in Practice Part I
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-kivinen-mobike-design-00.txt Tero Kivinen
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Internet Networking Spring 2003
1 Internet Networking Spring 2002 Tutorial 2 IP Checksum, Fragmentation.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
K. Salah1 Security Protocols in the Internet IPSec.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Mapping Internet Addresses to Physical Addresses (ARP)
1 Transport Layer Computer Networks. 2 Where are we?
HIP API issues in base spec Tom Henderson IETF-59, March 3, 2004.
March 7, 2005MOBIKE WG, IETF 621 Mobility Protocol Options for IKEv2 (MOPO-IKE) Pasi Eronen.
Exploring the Packet Delivery Process Chapter
IETF 77 1 HIP mobility (RFC 5206bis) issue review March 31, 2011 Tom Henderson (editor)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Quick-Start for TCP and IP draft-ietf-tsvwg-quickstart-02.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti TSVWG, March 2006 This and earlier presentations::
SMUCSE 5349/49 IP Sec. SMUCSE 5349/7349 Basics Network-level: all IP datagrams covered Mandatory for next-generation IP (v6), optional for current-generation.
Security Issues in PIM-SM Link-local Messages J.W. Atwood, Salekul Islam {bill, Department.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 4: Securing IP.
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
Karlstad University IP security Ge Zhang
Transportation Layer (1). Transportation Layer Very similar to the data link layer. – two hosts connected by a link or two hosts connected by a network.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
Internet Security and Firewall Design Chapter 32.
CSIT 220 (Blum)1 ARP Based on Computer Networks and Internets (Comer)
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol draft-kivinen-mobike-protocol-00.txt Tero Kivinen
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
Currently Open Issues in the MIPv6 Base RFC MIPv6 security design team.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
K. Salah1 Security Protocols in the Internet IPSec.
Replay protection for CAVE based AKA when moving R-UIM between mobiles.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on
Establishing Host Identity Protocol Opportunistic Mode with TCP Option
Chapter 5 Network Security Protocols in Practice Part I
Version B.00 H7076S Module 3 Slides
CSE 4905 IPsec.
CSE 4905 IPsec II.
Error and Control Messages in the Internet Protocol
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
Internet Networking Spring 2002
IPSec IPSec is communication security provided at the network layer.
IKEv2 Mobility and Multihoming Protocol (MOBIKE)
njh
Virtual Private Networks (VPNs)
Quick-Start for TCP and IP
  30 A 30 B 30 C 30 D 30 E 77 TOTALS ORIGINAL COUNT CURRENT COUNT
Virtual Private Networks (VPNs)
Sally Floyd and Eddie Kohler draft-floyd-ccid4-01.txt July 2007
Presentation transcript:

HIP resynchronization Tom Henderson IETF-59, March 3, 2004

The resynch problem possible causes: –I have recently rebooted (or daemon crashed) and have lost my IPsec state –network mischief IP datagram arrives on unknown SPI

HIP resynch solutions What to do? –IPsec does nothing in this case HIP draft -09 proposes to send an I1 or an R1 to restart an exchange –assumes that HIP daemon listening on PF_KEY interface gets notified somehow Let’s assume we rebooted and need to start the exchange again –should we do local “uptime” check first??

HIP resynch options i) use “unknown SPI” as surrogate for I1, send R1 (original base spec behavior) –subject to replay attacks (was origin of birthday counter) –what if you don’t know the HIT? ii) allow recipient to become new initiator (more natural), send I1 –opens up attack-- third party can stimulate two other hosts to set up an unnecessary SA iii) send I1, but with “resynch” bit or parameter

Resynch solution IP datagram arrives on unknown SPI send I1 with unknown SPI TLV Do I have that SPI? - if so, send R1 - if not, drop (or REJECT??) send R1 with resynch bit did I send I1 recently? - if yes, send I2 - if not, drop I2 with Unknown SPI R2 drop old SAs install new ones more work than usual for responder

One more possible attack IP datagram arrives on unknown SPI send I1 with unknown SPI TLV Reject ? replay R1 resynch compute, compute send I2 with unknown SPI TLV Birthday count may be of help in R1 could also rate limit these types of initiations

HIP resynch summary seems difficult to defend against attacks when we are responding to: –unauthenticated packets (unknown SPI) –packets that can be replayed (R1) more thought needed if we keep it, move out of base spec –define new “Unknown SPI” TLV –move birthday to separate TLV (out of base spec) –define resynch procedures, new state