Securing the CASP Protocol

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Cryptography and Network Security Chapter 17
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Chapter 8 Web Security.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
Chapter 21 Distributed System Security Copyright © 2008.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Network Security Introduction
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 NSIS: A New Extensible IP Signaling Protocol Suite Myungchul Kim Tel:

11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Computer and Network Security
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
IPSecurity.
Version B.00 H7076S Module 3 Slides
Phil Hunt, Hannes Tschofenig
Encryption and Network Security
Cryptography and Network Security
Chapter 18 IP Security  IP Security (IPSec)
SECURING NETWORK TRAFFIC WITH IPSEC
Secure Sockets Layer (SSL)
Internet Security CS457 Seminar Zhao Cheng
UNIT.4 IP Security.
CSCE 715: Network Systems Security
Goals of soBGP Verify the origin of advertisements
Information and Network Security
Cryptography and Network Security
Computer Security Network Security
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Maryna Komarova (ENST)
draft-ipdvb-sec-01.txt ULE Security Requirements
Cryptography and Network Security
SSL (Secure Socket Layer)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Cryptography and Network Security
The University of Adelaide, School of Computer Science
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CDK: Chapter 7 TvS: Chapter 9
Unit 8 Network Security.
Advanced Computer Networks
Cryptography and Network Security
Chapter 6 IP Security.
Presentation transcript:

Securing the CASP Protocol Hannes Tschofenig CT IC 3

Creating a Security Solution for CASP Threat-Analysis Security Requirements Framework Thoughts Custom Security Existing Security Key Management (authentication, authorization, session key establishment), Signaling message protection (integrity, confidentiality, replay protection), authorization, denial of service protection, identity protection, topology hiding, protocol specific security issues

CASP Protocol Parts Implication for Security Many usage scenarios have to be supported Unlike RSVP a transport connection is established Unlike RSVP the next peer has to be known in advance before a CASP payload message is sent Using existing security mechanisms does not always fit 100% CASP tries to be more complete than RSVP Security also includes key management aspects and addresses framework issues

Security for the Discovery Component The Scout Protocol Threat Denial of service attacks, man-in-the-middle attacks, downgrading of security or capabilities Problems Other node is unknown (reason for discovery) Message is restricted to a single roundtrip and message size is small Security protection can easily introduce other attacks such as DoS Solution Scout message contains only very few protection mechanisms BUT Subsequent the subsequent message exchange has to repeat information and Has to provide some additional security verifications

Security for the Transport Layer Threat Attacks against the transport layer can cause a connection abort. Problems Vulnerability of TCP itself TLS does not protect TCP header Solution If attack is a concern then Use IPSec at network layer Use the more robust SCTP

Security for the Messaging Layer Threat Messaging layer contains security relevant information for a variety of attacks Problems More than a single security mechanisms has to be supported (for different parts of the network and different usage scenarios) Solution IPSec TLS (possibly with EAP on top of it) Many different key exchange protocols supported (IKE, KINK, SOI, etc.) Efficiency gained by reusing security association more a number of client-layers and a number of messages.

Security for the Client-Layers Threat Intermediate CASP node is able to inspect and modify information Problems Peer-to-Peer protection not always sufficient Examples: Authorization tokens, transport of local information, selectively protecting objects, transporting sensitive information Solution CMS used to selectively wrap objects and to provide protection for them. For investigation: Reusing of a CMS security association

Miscellaneous Issues Non-Repudiation Rarely required Supported for client-layer protocols by using digitally signed encapsulated objects (CMS) and possibly applying a counter-signature by the other party Denial of Service Prevention Network Topology Hiding Supported for Record Route object Additionally supported by removing addresses from a (strict or loose) route object

Miscellaneous Issues Authorization Supports both “online” or “offline” authorization “Online” authorization requires protocol interaction with third party entity (AAA-based). EAP/Diameter support is possible. Identity mapping possibly required “Offline” authorization supported via Kerberos authorization information or attribute certificate Authorization language is open issue – research required. Usage of specific authorization information is scenario and environment dependent.

Are there any questions?