69th IETF, 26 July 2007 Michael Behringer Francois Le Faucheur

Slides:



Advertisements
Similar presentations
_3gpp_inter-tech_handover IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Considerations for 3GPP/non-3GPP Handover.
Advertisements

Router Identification Problem Statement J.W. Atwood 2008/03/11
1 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt.
G : DCM Signaling Mechanism Using GMPLS RSVP-TE ITU-T Workshop on IP-Optical, Chitose, Japan 7/11/2002 Dimitrios Pendarakis, Tellium, Inc. ITU-T.
Trust Router Overview IETF 86, Orlando, FL Trust Router Bar BOF Margaret Wasserman
Philip Eardley, Bob Briscoe, Dave Songhurst - BT Research Francois Le Faucheur, Anna Charny – Cisco Kwok-Ho Chan, Joe Babiarz - Nortel IETF-64 tsvwg Nov.
Network Localized Mobility Management using DHCP
RSVP Cryptographic Authentication "...RSVP requires the ability to protect its messages against corruption and spoofing. This document defines a mechanism.
Draft-li-rtgwg-cc-igp-arch-00IETF 88 RTGWG1 An Architecture of Central Controlled Interior Gateway Protocol (IGP) draft-li-rtgwg-cc-igp-arch-00 Zhenbin.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
MIF API draft-ietf-mif-api-extension-05 Dapeng Liu.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
ROUTER Routers have the following components: CPU NVRAM RAM ROM (FLASH) IOS Cisco 2800 Series Router.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIIS and Its Higher Layer Transport Requirements: Ad hoc Update and Discussion on.
Discussion on IEEE metrics guidelines Document Number: IEEE R0 Date Submitted: Source: Antonio BovoVoice:
Secure Credential Manager Claes Nilsson - Sony Ericsson
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
Extensions to OSPF-TE for Inter-AS TE draft-ietf-ccamp-ospf-interas-te-extension-01.txt Mach Renhai
The PHB information treatment in the Differentiated Service network Seiichiro Toda Graduate School of Media and Governance Keio University
11 December, th IETF, AAA WG1 AAA Proxies draft-ietf-aaa-proxies-01.txt David Mitton.
RSVP Resource Sharing Remote Identification Association draft-ietf-ccamp-rsvp-resource-sharing-00 Francois Le Faucheur Ashok Narayanan Subha Dhesikan IETF.
Evaluation of Possible IGP Extensions for WSON CCAMP WG, IETF 70th Vancouver, Canada draft-li-ccamp-wson-igp-eval-00.txt Dan Li Jianhua.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Sec Title: Considerations on use of TLS for MIH protection Date Submitted: January 14, 2010.
IETF 67 – SIMPLE WG SIMPLE Problem Statement Draft-rang-simple-problem-statement-01 Tim Rang - Microsoft Avshalom Houri – IBM Edwin Aoki – AOL.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 68 - ANCP WG March 18-23, 2007 draft-ietf-ancp-security-threats-00.txt.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Flow Distribution Rule Language for Multi-Access Nodes draft-larsson-mext-flow-distribution-rules-01.
CE Based Membership Verification for L3VPN
Luyuan Fang Michael Behringer Ross Callon Jean-Luis Le Roux
Security Considerations
Daniel King, Old Dog Consulting Adrian Farrel, Old Dog Consulting
RADEXT WG RADIUS Attribute Guidelines
Jean-Philippe Vasseur – Cisco Systems Raymond Zhang - Infonet
J.W. Atwood PIM WG 2010/03/23 The KARP Working Group J.W. Atwood PIM WG 2010/03/23
Trust Anchor Management Problem Statement
Updated SBSP draft-birrane-dtn-sbsp-01.txt Edward Birrane
Chapter 18 IP Security  IP Security (IPSec)
<draft-lefaucheur-rsvp-dste-02
Distributed Keyservers
IP Router-Alert Considerations and usage
P2P Streaming for Mobile Nodes: Scenarios and Related Issues
Goals of soBGP Verify the origin of advertisements
Daniel King, Old Dog Consulting Adrian Farrel, Old Dog Consulting
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
A. Báder, L. Westberg, G. Karagiannis,
ROLL RPL Security IETF 77 status
Softwire Security Update
MLEF Without Capacity Admission Does Not Satisfy MLPP Requirements
Francois Le Faucheur Cisco
Thomas Nadeau Yacine El Mghazli Kwok Ho Chan
<draft-lefaucheur-rsvp-ipsec-01
RSVP Proxy Approaches draft-ietf-tsvwg-rsvp-proxy-approaches-01.txt Francois Le Faucheur - Francois Le Faucheur Dan Wing Cisco.
ESS Mesh Deployment Usage Model
Signaling RSVP-TE P2MP LSPs in an Inter-domain Environment draft-ali-mpls-inter-domain-p2mp-rsvp-te-lsp-01.txt Zafar Ali, Cisco Systems.
Chat Refs: RFC 1459 (IRC).
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Maryna Komarova (ENST)
draft-ipdvb-sec-01.txt ULE Security Requirements
ESS Mesh Deployment Usage Model
IEEE MEDIA INDEPENDENT HANDOVER
Policy-Based IPSec Management (Role combination)
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
AD RMS Templates Active Directory Rights Management Services (AD RMS)
IEEE MEDIA INDEPENDENT HANDOVER
PAA-2-EP protocol PANA wg - IETF 58 Minneapolis
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
BPSec: AD Review Comments and Responses
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

69th IETF, 26 July 2007 Michael Behringer Francois Le Faucheur A Framework for RSVP Security Using Dynamic Group Keying draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt 69th IETF, 26 July 2007  Michael Behringer Francois Le Faucheur 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Where are we coming from? Writing Security Considerations section for each new “RSVP extension for Foo” I-D (painfully) showed that: Applicability of existing RSVP security mechanism is not sufficiently documented Existing key approaches have limitations New key approaches could help alleviate/remove some some limitations 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Per Neighbor / Interface Keys for RSVP Authentication today Per Neighbor / Interface Keys for RSVP Authentication Shared keys (K2, K3, K4) per peer / interface Today typically statically configured Operationally heavy  typically not used K3 (PATH)3 R3 K3 (PATH)2 K2 K2 K4 R1 R2 (PATH)4 non-RSVP K4 R4 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Dynamic Group Keying for RSVP draft-weis-gdoi-for-rsvp-00 new proposal Dynamic Group Keying for RSVP draft-weis-gdoi-for-rsvp-00 Use a group key server (GKS) to distribute group keys (GK) and policy to RSVP nodes; used for RSVP Authentication GDOI distributed group keys are dynamically provisioned  easier to use than static peer/if keys GKS GK GK GK R3 GK R1 R2 GK R5 R4 zone of trust 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Objective of this Document Different keying approaches for RSVP traditional: per peer, per interface new: per group (GDOI) Different security, applicability Usage: RSVP Authentication and Encryption Goal of document: describe applicability, security of these keying approaches for RSVP 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Per Neighbor / Interface Keys Works intra-domain Works inter-domain Does not work easily across non-RSPV nodes Note: regular RSVP (without authentication) does! Key 3 R3 PATH R1 R2 R5 Key 4 non-RSVP R4 which key to use? 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Group Keys Work intra-domain Do not work inter-domain (not applicable). Assume: domain = zone of trust  Cannot apply same key across zones of trust Works across non-RSVP nodes Group Key PATH R3 R1 R2 R5 Group Key non-RSVP R4 use group key! 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Impact of Subverted Nodes Subverted: Not trusted Under control of hacker, misconfigured, buggy, etc Single subverted node can reserve all bandwidth through it  local DoS, theft of service modify / fake path message global impact, since rsv message goes end-to-end fake src / dst  potential DoS anywhere in domain fake phop  potential DoS, local modify / fake reservation message local impact, since rsv message goes hop by hop 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Impact of Subverted Nodes – Protection with Authentication With peer / interface keys: Path message: Can still fake all fields, including src/dst Can create new fake messages Rsv message: Can fake and create, but local impact only With group keys: Same impact 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

What Does RSVP Authentication Do? RSVP Authentication (with any key type) ensures the origin and integrity of the message (*); it does not ensure the correctness of the message content. (*) and replay protection 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Conclusions peer or interface key group key works intra-domain y works inter-domain n works with non-RSVP hops in path protects against subverted nodes Usage of the key for encryption (instead of authentication) has the same properties as shown in the above table for authentication. 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt

Questions Does the document add value? What are the areas that need be added, expanded,…? We solicit review and further input 69th IETF, 26 July 2007 draft-behringer-tsvwg-rsvp-security-groupkeying-00.txt