Survivable Real-Time Network Services

Slides:



Advertisements
Similar presentations
A Survey of Secure Wireless Ad Hoc Routing
Advertisements

Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
Sir John Tenniel; Alice’s Adventures in Wonderland,Lewis Carroll 7-Aug-151 NTP Architecture, Protocol and Algorithms David L. Mills University of Delaware.
Enhanced NTP IETF – TicToc BOF Greg Dowd – Jeremy Bennington –
A Security Analysis of the Network Time Protocol (NTP) Presentation by Tianen Liu.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A Security Analysis of Network Time Protocol Andy Hospodor COEN /03/03 Paper by Matt Bishop, 1991.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Self-stabilizing energy-efficient multicast for MANETs.
Computer Network Design EEL 6785 Dr. Janusz Zalewski University of Central Florida.
NTP Header and Extension Fields Message DigestKey IDCompute Hash Message DigestCompare Message Authenticator Code (MAC) Figure 1 Message Authentication.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Emerging Solutions in Network Time Synchronization Security
Presented by Edith Ngai MPhil Term 3 Presentation
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
Introduction Wireless devices offering IP connectivity
Intrusion Tolerant Architectures
Dynamic Routing Protocols II OSPF
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Cryptography and Network Security
RTP: A Transport Protocol for Real-Time Applications
OSPF (Open Shortest Path First)
Cryptographic Hash Function
CSCE 715: Network Systems Security
Tutorial on Creating Certificates SSH Kerberos
Network Time Protocol (NTP) General Overview
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
NTP Performance Analysis
Dept. of Computer Science
CAIRN/DARTnet Collaboration
Scalable, Autonomous Network Services Configuration
NTP Security Algorithms
Wrangling a Large Herd of Internet Clocks
Providing Secure Storage on the Internet
NTP Clock Discipline Modelling and Analysis
NTP Security Protocol David L. Mills University of Delaware
NTP Clock Discipline Principles
Ubiquitous Authentication Using Random Keys
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
NTP Cryptographic Authentication (Autokey)
Quad Charts David L. Mills University of Delaware
Survivable Real-Time Network Services (G409/J175)
SSL (Secure Socket Layer)
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
Scalable, High Speed Time Synchronization (D012)
NTP Security Model David L. Mills University of Delaware
Survivable Real-Time Network Services
Autokey Version 2 Protocol Model and Implementation
ONLINE SECURE DATA SERVICE
Interleaved Synchronization Protocols for LANs and Space Data Links
NTP Architecture, Protocol and Algorithms
NTP Security Protocol David L. Mills University of Delaware
NTP Research Opportunities
Overview Multimedia: The Role of WINS in the Network Infrastructure
NTP Security Model David L. Mills University of Delaware
Chapter 8 roadmap 8.1 What is network security?
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

Survivable Real-Time Network Services David L. Mills University of Delaware http://www.eecis.udel.edu/~mills mailto:mills@udel.edu 23-Nov-18

Distributed, real-time sensor networks Ad-hoc, wireless networking Self organizing network infrastructure Redundant sensors resist loss of data Diversity paths resist jamming Autonomous system model Sensors loosely deployed on battlefield or planetary surface Sensors can be lost or destroyed or added during the mission Working assumptions Lowest level is network connectivity and routing Next level is security and time management Higher levels define applications Game plan Nearest equivalent sandbox is the Internet Nearest equivalent sensor network is the Network Time Protocol (NTP) 23-Nov-18

Autonomous system model Fire-and-forget software Single software distribution can be configured, built and installed automatically on most host architectures and operating systems Run-time configuration can be automatically determined and maintained in response to changing network topology and server availability Autonomous configuration Survey nearby network environment to construct a list of suitable servers Select best servers from among the list using mitigation algorithms and a statistical metric Reconfigure the subnet for best accuracy with overhead constraints Periodically refresh the list in order to adapt to changing topology Autonomous authentication For each new server found, fetch and verify its cryptographic credentials Authenticate each message received using an engineered protocol Regenerate keys in a timely manner to avoid compromise 23-Nov-18

Goals and non-goals Goals Non-goals Robustness to many and varied kinds of failures, including Byzantine faults, destruction, malicious attacks and implementation bugs Maximum utilization of Internet multicast services and protocols Depend only on public values and certificates seeded in the network itself Cryptographic authentication based on established public key infrastructure Non-goals Administrative scoping – use it as it is, but provide TTL fences Access control - this is provided by firewalls and address filtering Privacy - all protocol values, including time values, are public Protection against attacks on data values - this is provided by the NTP protocol Non-repudiation - this can be provided by a layered protocol if necessary 23-Nov-18

NTP as sensor network Anatomy of a sensor Peer 1 Filter 1 Intersection and Clustering Algorithms Combining Algorithm Peer 2 Filter 2 Loop Filter P/F-Lock Loop Peer 3 Filter 3 VFO NTP Messages Timestamps Anatomy of a sensor Multiple peers provide redundancy and diversity Data filters select best from a window of offset/delay samples Intersection algorithm discards falsetickers using Byzantine agreement principles Clustering algorithm picks the best subset of truechimer peers Combining algorithm, loop filter and variable frequency oscillator (VFO) implement hybrid phase/frequency-lock feedback loop which determines the system time 23-Nov-18

NTP autonomous systems Configuration and authentication and synchronization are inseparable Autonomous configuration (Manycast) Centralized configuration management does not scale to large networks Finding optimal topologies in large subnet graphs under degree and distance constraints is NP-hard Formal methods may not produce good topologies in acceptable time Span-limited, expanding-ring search strategies may be a good place to start Autonomous authentication (Autokey) Centralized key management does not scale to large networks Symmetric key cryptosystems require pairwise key agreement and persistent state in clients and servers Servers cannot maintain persistent state for possibly thousands of clients Public-key cryptosystems are too slow for good timekeeping Solution may involve a combination of public and symmetric key cryptosystems 23-Nov-18

Autonomous configuration Manycast dynamic server discovery scheme Clients discover servers using span-limited, expanding-ring search To minimize overhead, clients send polls at intervals depending on the number of servers found To minimize implosion, servers reply only if equal or lower stratum Clients mobilize potential server associations for later mitigation Automatic quasi-optimal mitigation algorithms NTP synchronization distance metric is used as a quality indicator Distance is dominated by stratum, which is normally controlling Byzantine agreement algorithm is used to detect and discard falsetickers Clustering algorithm discards outlyers in repeating rounds until no more than a fixed minimum number of survivors remain 23-Nov-18

Static and dynamic stratum assignment Manycast subnet topology is automatically determined and maintained Nodes are identically configured as both Manycast servers and clients In addition, primary servers are configured for external references In operation, primary servers peer with each other, secondary servers peer first with primary, then with secondary servers at the same stratum However, this scheme results in only two strata, so we assign each node static floor and ceiling strata Peer distance below the floor is increased by the floor Peer distance above the ceiling is increased to the maximum Node stays between floor and ceiling, unless insufficient servers are found Manycast search strategy stays the same However, the scheme needs to dynamically determine quasi-optimum floor and ceiling for each node Ongoing research… 23-Nov-18

Autonomous timekeeping Autokey authentication and NTP synchronization protocols work independently for each peer Public keys and certificates are obtained and verified relatively infrequently using X.509 certificates and certificate trails Session keys are derived from public keys using fast algorithms Each NTP message is individually authenticated using session key and message digest (keyed MD5), but cryptographically bound do public key A proventic trail is a sequence of NTP servers, each time synchronized and cryptographically verified to the next and ending on one or more trusted primary time servers NTP and Autokey run in parallel to synchronize time and construct proventic trails When both time and at least one proventic trail are verified, the peer is admitted to the population used to synchronize the system clock Further research: trust metric based on number of proventic trails 23-Nov-18

Autokey packet format NTP Protocol Header Format (32 bits) LI leap warning indicator VN version number (4) Strat stratum (0-15) Poll poll interval (log2) Prec precision (log2) LI VN Mode Strat Poll Prec Root Delay Root Dispersion Reference Identifier Reference Timestamp (64) NTP Timestamp Format (64 bits) Originate Timestamp (64) Seconds (32) Fraction (32) Value is in seconds and fraction since 0h 1 January 1900 Cryptosum Receive Timestamp (64) Transmit Timestamp (64) NTP v4 Extension Field Extension Field 1 (optional) Field Type Length Extension Field (padded to 32-bit boundary) Extension Field 2… (optional) Last field padded to 64-bit boundary Key/Algorithm Identifier NTP v3 and v4 Authenticator (Optional) Message Digest (64 or 128) NTP v4 only authentication only Authenticator uses MD5 cryptosum of NTP header plus extension fields (NTPv4) 23-Nov-18

Session keys Source Address Dest Address Key ID Cookie Hash NTPv4 Session Key NTPv4 session key includes four 32-bit words; NTPv6 session key includes ten 32-bit words Session key value is the 16-octet MD5 message digest of the session key Key IDs have pseudo-random values and are used only once. A special key ID value of zero is used as a NAK reply In any message including an extension field, the cookie has a public value (zero) In other cases the cookie is a hash of the addresses and a private value encrypted by the client public key 23-Nov-18

Generating the session key list Source Address Dest Address Cookie Key ID Session Key ID List Final Index Final Key ID Compute Hash Compute Signature Index n Next Key ID Signature Index n + 1 Server rolls a random 32-bit seed as the initial key ID and selects the cookie. Messages with a zero cookie contain only public values Initial session key is constructed using the given addresses, cookie and initial key ID. The session key value is stored in the key cache Next session key is constructed using the first four octets of the session key value as the new key ID. The server continues to generate the full list Final index number and key ID are provided in an extension field with signature and timestamp 23-Nov-18

Message Authenticator Code (MAC) Sending messages NTP Header and Extension Fields Session Key ID List Compute Hash Key ID Message Authenticator Code (MAC) Message authenticator code (MAC) consists of the MD5 message digest of the NTP header and extension fields using the session key ID and value stored in the key cache. Server uses the session key ID list in reverse order and discards each key value after use. Extension field containing the final index, key ID and signature is included in the first message from the list. Extension field can be provided upon request at any time. When all entries in the key list are used, a new one is generated. 23-Nov-18

Message Authenticator Receiving messages NTP Header and Extension Fields Message Authenticator Code (MAC) Compute Hash Key ID Message Digest Message Digest Compare Intent is not to hide the message contents, just verify where it came from and that it has not been modified in transit MAC message digest is compared with the computed digest of the NTP header and extension fields using the session key ID in the MAC and the key value computed from the addresses, key ID and cookie If the cookie is zero, the message contains public values. Anybody can validate the message or make a valid message containing any values If the cookie has been determined by secret means, nobody except the parties to the secret can validate a message or make a valid message 23-Nov-18

Key management Keyspace is relatively small, so keys must be refreshed frequently. Keys are refreshed automatically and without management intervention Session key list is regenerated about once per hour Server private cookie is regenerated about once per day Public keys and certificates are regenerated by scripts about once per. month Autokey protocol automatically handles key refreshment and recovery Autokey protocol enforces partial ordering for file creation and use NTP filestamp is appended to the name of every cryptographic data file Filestamps accompany the data as it is moved from place to place Certificate and certificate requests include filestamp as sequence number Dependency graph is created for public keys, certificates and data dependent on them By induction, the graph includes all cryptographic data in the network derived from the trusted primary servers at the root of the graph 23-Nov-18

Lessons learned Authentication and time synchronization must presume nothing about the network other than network routing Authentication and time synchronization are interdependent Every value, public and private, in the network must have a proventic timestamp cryptographically bound to trusted time and certificate servers Key refreshment means must be an integral component of the security model and authentication scheme Autonomous configuration must presume nothing about the network other than multicast routing and authentication Everything moves in every direction, anything can lie and everything gets old The protocols are most vulnerable to a clogging attack from the time a new player has been discovered until receiving its certificate It is really difficult to balance effective clogging defense and rapid response to topology changes 23-Nov-18

Current progress and status NTP Version 4 architecture and algorithms Backwards compatible with earlier versions Improved local clock model implemented and tested Multicast mode with propagation calibration implemented and tested NTP Version 4 with Manycast and Autokey is available for download from www.ntp.org Manycast autonomous configuration Manycast mode with static floor/ceiling implemented and tested Deployed for UDel and CAIRN testbeds in operational environment Autokey autonomous authentication Autokey protocol with self-signed certificates implemented and tested Key refreshment automated and tested under several intrusion scenarios, including replay and clogging 23-Nov-18

Future plans Refine Manycast implementation in NTP Version 4 Define dynamic floor/ceiling metric based on NTP stratum and distance Implement dynamic configuration scheme based on this metric Refine Autrokey implementation in NTP Version 4 Define multiple-component, nonbinary trust metric Implement dynamic certificate trail validation scheme based on this metric Deploy, test and evaluate NTP Version 4 daemon in CAIRN testbed, then at friendly sites in the US, Europe and Asia Revise the NTP formal specification and launch on standards track Participate in deployment strategies with NIST, USNO, others Prosecute standards agenda in IETF, ANSI, ITU, POSIX Develop scenarios for other applications such as web caching, DNS servers and other multicast services 23-Nov-18

Further information Network Time Protocol (NTP): http://www.ntp.org/ Current NTP Version 3 and 4 software and documentation FAQ and links to other sources and interesting places David L. Mills: http://www.eecis.udel.edu/~mills Papers, reports and memoranda in PostScript and PDF formats Briefings in HTML, PostScript, PowerPoint and PDF formats Collaboration resources hardware, software and documentation Songs, photo galleries and after-dinner speech scripts FTP server ftp.udel.edu (pub/ntp directory) Current NTP Version 3 and 4 software and documentation repository Collaboration resources repository Related project descriptions and briefings See “Current Research Project Descriptions and Briefings” at http://www.eecis.udel.edu/~mills/status.htm 23-Nov-18