Updated SBSP draft-birrane-dtn-sbsp-01.txt Edward Birrane

Slides:



Advertisements
Similar presentations
Overview of the SDE Protocol Presented by Ken Alonge Chair,
Advertisements

Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Introduction to IPv6 Presented by: Minal Mishra. Agenda IP Network Addressing IP Network Addressing Classful IP addressing Classful IP addressing Techniques.
Future Directions For IP Architectures Ipv6 Cs686 Sadik Gokhan Caglar.
The Future of TCP/IP Always evolving: –New computer and communication technologies More powerful PCs, portables, PDAs ATM, packet-radio, fiber optic, satellite,
Internet Security CSCE 813 IPsec
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
IPv6 Header & Extensions Joe Zhao SW2 Great China R&D Center ZyXEL Communications, Inc.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 IPFIX Protocol Specifications IPFIX IETF-59 March 3, 2004 Benoit Claise Mark Fullmer Reinaldo Penno Paul Calato Stewart Bryant Ganesh Sadasivan.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Introduction to IPv6 Presented by:- ASHOK KUMAR MAHTO(09-026) & ROHIT KUMAR(09-034), BRANCH -ECE.
Network Security David Lazăr.
ICN and DTN NetInf over BP using BPQ Elwyn Davies Folly Consulting Ltd/Trinity College Dublin or
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Lecture 10 Advance Topics in Networking IPv6.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
The Integration of the Bundle Security Protocol Features into DTN2 Walter J. Scheirer and Prof. Mooi Choo Chuah Department of Computer Science and Engineering.
CCSDS Security/DTN Status 11/6/2015 DENNIS IANNICCA CCSDS GRC CHARLES SHEEHE CCSDS GRC POC 1.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
DTN Security Update Stephen Farrell, Trinity College Dublin Susan Symmington, The MITRE Corp. Howard Weiss, Sparta Inc. IETF-65 Dallas March 2006.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
GRE.
“Streamlined” Bundle Security Protocol Edward Birrane
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
UDP Encapsulation for IP Tunneling
Internet Protocol Version 6 Specifications
Chapter 3 TCP and IP Chapter 3 TCP and IP.
End-to-middle Security in SIP
Introduction Wireless devices offering IP connectivity
IP Version 6 (IPv6).
Key Distribution in DTNs
A quick intro to networking
CSE 4905 IPsec.
Encryption and Network Security
Chapter 18 IP Security  IP Security (IPSec)
An IPv6 Flow Label Specification Proposal
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Bundle Protocol Specification
RBridge Channel Tunnel Protocol
DTN Bundle Protocol on the IETF Standards Track
BPSEC Updates Edward Birrane
IP - The Internet Protocol
AMA Data Model Edward Birrane
Security at the Application Layer: PGP and S/MIME
TGaq Transaction Protocol (update)
draft-ipdvb-sec-01.txt ULE Security Requirements
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Updates to Draft Specification for DTN TCPCLv4
IP - The Internet Protocol
BPSEC Updates Edward Birrane
Networking and Network Protocols (Part2)
IP Forwarding Relates to Lab 3.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IP - The Internet Protocol
draft-ietf-dtn-bpsec-06
Proposed DTN WG Charter Items
IPv6 Encapsulation for IOAM - Enhancement of IPv6 Extension Headers draft-li-6man-ipv6-sfc-ifit-01 draft-li-6man-enhanced-extension-header-00 Zhenbin.
BPSec: AD Review Comments and Responses
draft-ietf-bier-ipv6-requirements-01
Interoperabilty Cipher Suites
Presentation transcript:

Updated SBSP draft-birrane-dtn-sbsp-01.txt Edward Birrane Edward.Birrane@jhuapl.edu 443-778-7423

SBSP - Added Key Properties Fundamental End-to-end confidentiality End-to-end integrity Multiple ciphersuite support Additional Block-Level Granularity Multiple Security Sources Single Security Destinations Mixed Security Policy User-selectable ciphersuites / Configurable policy Deterministic Processing

SBSP - Key Properties 1 Block-Level Granularity Security services applied to blocks, not bundles. Integrity sign extension block 1 Encrypt payload block Multiple Security Sources BPAs can apply security to both transmitted and forwarded bundles. Bundle source adds an integrity signature to the payload. Then a gateway node adds encryption. Single Security Destination Completely decouple routing and security. Use tunneling (BIBE) for cases where an “intermediate destination” is necessary.

SBSP - Key Properties 2 Mixed Security Policy Waypoints must be able to process an integrity-protected block without having the keys to verify the integrity. Non-security nodes must be accommodated in the network. User-Selected Ciphersuites Encoding of ciphersuite identifiers and parameters Deterministic Processing Security services are not applied to fragments. Wrap a fragment in a new bundle through BIBE if it needs security services. Carefully specify interaction between confidentiality and integrity when they are separate services.

SBSP Block Structure SBSP blocks added 1 per security service SBSP block is a tuple of (security service, security target). Fits key properties Waypoints can add SBSP blocks Different ciphersuites/services can be applied to different targets. Deterministic rules for processing BIB and BCB blocks. Reference implementation emerging ION 3.4.x SBSP captures simple cases of RFC6257. Not hard to port.

SBSP - Added CMS Block NASA/GRC and DLR provided initial text Case where payload is CMS text not in scope for this spec That is application-layer security. Changes to the Abstract Security Block Ciphersuite ID and flags in the ASB are now optional CMS text in the CMS Block captures this in the block payload. Updated processing rules CMS Block and BCB/BIB cannot share security targets. CMS Block may capture multiple security services for its target.

SBSP - Added CMS Block CMS and other blocks can syntactically co-exist in a bundle. CMS blocks have option to fully encapsulate targets In example, Lone CMSB (B3) encapsulates the payload. Payload left in place, but with empty data field. Option to have CMSB not encapsulate targets as well.

SBSP - Open Questions (1/2) Do we need an authentication block (BAB)? Authentication at the link layer is considered a GoodThing. Value of authenticating between adjacent hops in the overlay? Proposal 1: Keep BABs, require policy that has security-aware node process BAB and non-security aware nodes drop bundle or block as per Bundle Protocol block processing flags. Proposal 2: Remove BABs and have authentication done by CLA or below. Can blocks encapsulate other blocks? If block B1 encrypts block B2 we have: Proposal 1 Have two blocks: B1 with info and B2 with ciphetext in its payload Proposal 2 Have 1 block: B1 with info and no record of B2 otherwise in the bundle.

SBSP - Open Questions (1/2) Do we need CMS? Is CMS syntax enabling based on likely adoption, or hindering based on bit size and additional processing/memory requirements? Proposal 1: Remove CMS from SBSP and let applications tunnel CMS in payloads. Proposal 2: Define a CMS block and integrate it into SBSP Proposal 3: Modify BAB, BIB, BCB to optionally have CMS in their payloads. What is the correct processing order when layering BIB/BCB? Proposal 1: BCB then BIB Proposal 2: BIB then BCB

Future Work Can we re-name SBSP BSP Can we adopt BSP in the DTNWG? Potential naming collision with RFC6257 (experimental spec from DTN IRTF) SBSP is not a long-term name. Recommend: Rename SBSP as BSP going forward. Can we adopt BSP in the DTNWG? Other items?