Distributed Keyservers

Slides:



Advertisements
Similar presentations
Router Identification Problem Statement J.W. Atwood 2008/03/11
Advertisements

Future Directions For IP Architectures Ipv6 Cs686 Sadik Gokhan Caglar.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Hierarchy of Routing Knowledge IP Routing: All routers within domains that carry transit traffic have to maintain both interior and exterior routing information.
OSD Metadata Management
Multicast Communication
CS 6401 IPv6 Outline Background Structure Deployment.
Layering and the TCP/IP protocol Suite  The TCP/IP Protocol only contains 5 Layers in its networking Model  The Layers Are 1.Physical -> 1 in OSI 2.Network.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 6 Internet Protocol (IP) Addressing.
Security Issues in PIM-SM Link-local Messages J.W. Atwood, Salekul Islam {bill, Department.
Securing PIM-SM Link-Local Messages J.W. Atwood Salekul Islam Concordia University draft-atwood-pim-sm-linklocal-01.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
Multicast Routing. Unicast: one source to one destination Multicast: one source to many destinations Two main functions: – Efficient data distribution.
CCNA 4 v3.1 Module 1 Scaling IP Addresses
1 Achieving Local Availability of Group SA Ya Liu, Bill Atwood, Brian Weis,
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Link-local security J.W. Atwood, S. Islam PIM Working Group 2007/12/04
1 OSPFv3 Automated Group Keying Requirements draft-liu-ospfv3-automated-keying-req-01.txt Ya Liu, Russ White,
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
Link-local security J.W. Atwood, S. Islam PIM Working Group 2007/07/25
Planning an Active Directory Deployment Lesson 1.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Doc.: IEEE /1115r2 Submission J Chhabra, A. R. Prasad, J. Walker, H. AokiSlide s Security concepts Jasmeet Chhabra, Intel
Delay Tolerant Network (DTN) Security Key Management Design Alternatives IETF94 DTN Working Group November 3, 2015 Fred L. Templin
1 NSIS: A New Extensible IP Signaling Protocol Suite Myungchul Kim Tel:
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IP Version 6 (IPv6).
Chapter 2 Overview of Networking Components
Zueyong Zhu† and J. William Atwood‡
Selecting Unicast or Multicast Mode
J.W. Atwood PIM WG 2010/03/23 The KARP Working Group J.W. Atwood PIM WG 2010/03/23
Chapter 18 IP Security  IP Security (IPSec)
RPSEC WG Issues with Routing Protocols security mechanisms
Chapter 6 Exploring IPv6.
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
Single-Area OSPF 1 Cisco Networking Academy program Routing Protocols
Support for Flow bindings in MIPv6 and NEMO
Goals of soBGP Verify the origin of advertisements
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
CS4470 Computer Networking Protocols
CAPWAP BOF IETF-57, Vienna Inderpreet Singh
69th IETF, 26 July 2007 Michael Behringer Francois Le Faucheur
THE STEPS TO MANAGE THE GRID
Understand Networking Services
Objective: Classful Internet Addressing
Single-Area OSPF (Open Shortest Path First Protocol)
Routing.
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
Neighbor discovery to support direct communication in ITS
Group Key Management for PIM-SM Routers
draft-ipdvb-sec-01.txt ULE Security Requirements
CSCI {4,6}900: Ubiquitous Computing
Chapter 8: Single-Area OSPF
NET 536 Network Security Lecture 5: IPSec and VPN
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
IEEE MEDIA INDEPENDENT HANDOVER
Virtual LAN VLAN Trunking Protocol and Inter-VLAN Routing
CCE1030 Computer Networking
Routing.
Implementing Multicast
Computer Networks Protocols
Multicasting Unicast.
draft-gulrajani-pim-hello-intid-00
Layering and the TCP/IP protocol Suite
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

Distributed Keyservers J.W. Atwood 2008/03/11 bill@cse.concordia.ca

Group Keying draft-tsvwg-rsvp-security-groupkeying Trust models RSVP keying models Interface, Neighbor, Group Provisioning of keys Shared security domains Separate security domains

PIM-SM Security Domains Single domain Multicast messages PIM-SM is inherently a “single administrative domain” protocol

Levels of Security One shared key per security domain No replay protection No data origin authentication Possible to do manually One key per sender (n+1) SAs per router “harder” to manage Must have automatic key management

Similarities and Differences RSVP Unicast communication Intervening router may not support RSVP PIM-SM Multicast communication Neighbor is guaranteed to be adjacent

..2 OSPFv3 Multicast communication Neighbor is adjacent Unicast routing may not be “up”  key may need to come from at most one hop away.

An Example Network Useful to explore the management of keys and SAs

Basic Network R6 R5 R4 R3 R2 R11 R10 R9 R8 R7 R14 R13 R12 R1

R1 as Sender R6 R5 R4 R3 R2 R11 R10 R9 R8 R7 R14 R13 R12 R1

R9 as Sender R6 R5 R4 R3 R2 R11 R10 R9 R8 R7 R14 R13 R12 R1

R1 as Receiver R6 R5 R4 R3 R2 R11 R10 R9 R8 R7 R14 R13 R12 R1

Communications Model Each router is the origin for a small group That router is the (only) sender) All its neighbors are the receivers All these groups share the ALL_PIM_ROUTERS group, but can be distinguished by the sender address

..2 To manage this, we can mandate one of the following: A single key for the entire administrative region A key per “speaking router” This will be an element of “policy” for the routers

(Group) Security Association Management The SPIs have to be centrally allocated, to ensure uniqueness, because the multicast groups have multiple receivers The GC will do this

Key management architecture For the single key case, the GC/KS needs to distribute the (shared) key to all routers For the one-key per router case, each speaking router needs to distribute its key to all adjacent routers Overall control of the adjacencies should be centralized, for network operator convenience

..2 We can model this as a central Group Controller (GC) and N distributed Key Servers (KS) (one per router) Each KS is initialized with its adjacencies at installation time, along with the address of the group controller for the PIM-SM “control plane key management group”

..3 On startup, the last known configuration of adjacencies is used, and then refreshed from the GC after an appropriate interval. Only the GC needs to be replicated for reliability (if an individual router is down, it is not needed as a key server)

Management of the “key management” group The GDOI GC/KS is formulated as a centralized entity. An extension needs to be specified To specify the protocol between a centralized GC and the (thousands of) individual KS  Is there interest in MSEC to host this work?

Adjacency lists in the GC/KS Question of deciding which router(s) are entitled to receive keys from a “speaking router” Some sort of global (to the secure region) unique identification Applicable to many routing protocols Represents “policy” I took it to kmart BOF

Questions?