Improving Security of Real-time Communications

Slides:



Advertisements
Similar presentations
RPKI Standards Activity Geoff Huston APNIC February 2010.
Advertisements

SeND Hash Threat Analysis CSI WG Ana Kukec, Suresh Krishnan, Sheng Jiang.
H ELSINKI U NIVERSITY OF T ECHNOLOGY AAA Architecture for hierarchical wireless Mobile IPv4 Tom Weckström Telecommunications Software and Multimedia Laboratory.
SIP issues with S/MIME and CMS Rohan Mahy SIP, SIPPING co-chair.
9,825,461,087,64 10,91 6,00 0,00 8,00 SIP Identity Usage in Enterprise Scenarios IETF #64 Vancouver, 11/2005 draft-fries-sipping-identity-enterprise-scenario-01.txt.
Secure Teleradiology Nick Collett Brookside Consulting
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
Trust Anchor Management Problem Statement 69 th IETF Trust Anchor Management BOF Carl Wallace.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
STIR Charter (discussion) STIR BoF Berlin, DE 7/30/2013.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Cullen Jennings Certificate Directory for SIP.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Wed 24 Mar 2010SIDR IETF 77 Anaheim, CA1 SIDR Working Group IETF 77 Anaheim, CA Wednesday, Mar 24, 2010.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
1 End-to-middle Security in SIP Kumiko Ono NTT Corporation March 1, 2004 draft-ietf-sipping-e2m-sec-reqs-01.txt draft-ono-sipping-end2middle-security-01.txt.
Mary Barnes (WG co-chair) Cullen Jennings (WG co-chair) DISPATCH WG IETF-86.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Key management issues in PGP
STIR Secure Telephone Identity Revisited
Timeline – Standards & Requirements
End-to-middle Security in SIP
Authenticated Identity
draft-rescorla-fallback-01
Security is one of the most widely used and regarded network services
Cullen Jennings S/MIME Certificates Cullen Jennings
OGSA-WG Basic Profile Session #1 Security
Shibboleth Roadmap
56th IETF syslog WG Chair: Chris Lonvick
STIR WG / IETF 94 Yokohama, Nov 2015 Jon
Timeline - ATIS Involvement
Trust Anchor Management Problem Statement
Cryptography and Network Security
HellasGrid CA & euGridPMA
STIR WG / IETF 97 Seoul, Nov 2016 Jon
ONAP and the Internet Engineering Task Force
Misc. Security Items.
S/MIME T ANANDHAN.
Public Key Infrastructure Using X.509 (PKIX) Working Group
Timeline - ATIS Involvement
OpenID Enhanced Authentication Profile (EAP) Working Group
The Tunneled Extensible Authentication Method (TEAM)
Proposed ATIS Standard for Signing of SIP RPH
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
APNIC Trial of Certification of IP Addresses and ASes
OpenID Enhanced Authentication Profile (EAP) Working Group
Security in ebXML Messaging
Secure Electronic Transaction (SET)
Analysis of Use of Separate Identity Header for SIP RPH Signing
Security at the Application Layer: PGP and S/MIME
RFC PASSporT Construction 6.2 Verifier Behavior
draft-ipdvb-sec-01.txt ULE Security Requirements
RFC PASSporT Construction 6.2 Verifier Behavior
RFC PASSporT Construction 6.2 Verifier Behavior
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
David L. Wasley Spring 2006 I2MM
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
RFC Verifier Behavior Step 4: Check the Freshness of Date
JSON Object Signing and Encryption (JOSE) Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
Rifaat Shekh-Yusef IETF105, OAuth WG, Montreal, Canada 26 July 2019
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
draft-ietf-stir-oob-02 Out of Band
Update on BRSKI-AE – Support for asynchronous enrollment
OpenID Enhanced Authentication Profile (EAP) Working Group
Presentation transcript:

Improving Security of Real-time Communications SIPNOC 2016 Herndon, Virginia Russ Housley

My Background Became active in the IRTF, and then IETF to work on security for Email and PKI IETF S/MIME WG Chair IETF Security Area Director – 4 years IETF Chair – 6 years IAB Chair – 2 years IETF STIR WG Chair

Introduction Two IETF activities that will improve the security of real-time communications: Secure Telephone Identity Revisited (STIR) Session initiation Protocol Best-practice Recommendations Against Network Danger (SIPBRANDY)

STIR Three parts to the STIR specification set: SIP Identity PASSporT Certificate Profile

SIP Identity RFC 4474bis Carries signature on the source of the session Relies on PASSporT for signature definition

STIR PASSporT Uses the JOSE JWT format for signature Three parts: BASE64URL(UTF8(JWS Protected Header)) BASE64URL(JWS Payload) BASE64URL(JWS Signature) Uses only ECDSA with P-256 and SHA-256 Design allows this to be used in other contexts too { "typ":"passport", "alg":"ES256", "x5u":"https://cert.example.org/ passport.cer" } { "iat":"1443208345", "otn":"12155551212", "duri":"sip:alice@example.com" }

STIR Certificate Profile Great deal of flexibility in the PKI Each Country Code need to set policies regarding trust anchors Certificate signed with either RSA or ECDSA with P-256 Subject public key is ECDSA with P-256

Display of Caller Identity Not being done by the IETF Vital for consumer confidence

SIPBRANDY will deprecate SDES Objective: two-party, SIP-signaled SRTP sessions with end-to-end security That means no sharing of SRTP keying material Personal Prediction: SIPBRANDY will deprecate SDES

SIPBRANDY Approach Leverage the caller authentication provided by STIR SRTP already provides some confidentiality and integrity Move to end-to-end Move to compatible key establishment

SIPBRANDY Opinion Successful deployment will require compatibility with WebRTC Need to think about transition to multi-party, even if it is not initial goal

Schedule STIR Expect WG Last Call in next few weeks Expect RFC before end of the year SIPBRANDY Not started yet WG to be chartered in next few weeks

Questions?