DNS SD Privacy Christian Huitema, Daniel Kaiser

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Things we need to standardise: a recap/review since IETF89 dnssd WG, IETF90, Toronto, 24 th July 2014.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Multiprotocol Attacks and the Public Key Infrastructure* Jim Alves-Foss Center for Secure and Dependable Software University of Idaho
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Ari Juels RSA Laboratories Proofs of Work (POWs) and Bread Pudding Protocols with Markus Jakobsson Bell Laboratories.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
 WHAT IS ENCRYPTION :-  Encryption (Round) (cont.) :-  HISTORY OF DE :-  TYPES OF DATA ENCRYPTION :-  Decryption :-  Security And Cryptanalysis.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Wireless and Security CSCI 5857: Encoding and Encryption.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Session 7 LBSC 690 Information Technology Security.
Using DHCPv6 for DNS Configuration in Hosts draft-ietf-droms-dnsconfig-dhcpv6-00.txt Ralph Droms.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Weak Identifier Multihoming Protocol (WIMP) draft-ylitalo-multi6-wimp-00.txt J. Ylitalo, V. Torvinen, E. Nordmark Vesa Torvinen Ericsson Research Nomadiclab,
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
SACRED REQUIREMENTS DOCUMENT Stephen Farrell, Baltimore Alfred Arsenault, Diversinet.
Dnssd requirements draft-ietf-dnssd-requirements-03 Kerry Lynn Stuart Cheshire Marc Blanchet Daniel Migault IETF 90, Toronto, 24 July
ANSI X9.44 and IETF TLS Russ Housley and Burt Kaliski RSA Laboratories November 2002.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Session Traversal Utilities for NAT (STUN) IETF-92 Dallas, March 26, 2015 draft-ietf-tram-stunbis Marc Petit-Huguenin, Gonzalo Salgueiro.
Engin Gündüz, Shane Kerr. IETF 61, November 2004, Washington DC. 1 IRIS AREG Draft draft-ietf-crisp-iris-areg versions 07 & 08.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Key Centric Identity Date: Authors:
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Path Computation Element (PCE) Discovery using Domain Name System(DNS) draft-wu-pce-dns-pce-discovery-07 Qin Wu ) Dhruv Dhody
7/10/20161 Computer Security Protection in general purpose Operating Systems.
MPLS-TP Next-Hop Ethernet Addressing draft-fbb-mpls-tp-ethernet-addressing-00 Dan Stewart Matthew
Reviews Rocky K. C. Chang 20 April 2007.
November 14, 2016 Secure MAC algorithms for use with NTP draft-aanchal4-ntp-mac-03 CFRG: IETF97 Aanchal Malhotra Sharon Goldberg.
47th IETF - Adelaide Chris Lonvick
TGaq Transaction Protocol
dnssd WG Chairs: Ralph Droms,
Computer Communication & Networks
editor: Stephen Farrell,
draft-dthakore-tls-authz
DHCP Anonymity Profile Update
Scaling up DNS-based service discovery
Maureen Stillman March 17, 2003
Optimizing DTLS for use in IoT
File service architecture
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
9.2 SECURE CHANNELS Medisetty Swathy.
Pairing Protocol (for DNS SD privacy)
Homework #5 Solutions Brian A. LaMacchia
Autonomous Aggregate Data Analytics in Untrusted Cloud
dnssd WG Chairs: Ralph Droms,
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Protocol ap1.0: Alice says “I am Alice”
Pre-Authentication Authentication of Management Frames
Daniel Kaiser, Christian Huitema IETF 98 March 28, 2017
CDK: Chapter 7 TvS: Chapter 9
Chapter 3 - Public-Key Cryptography & Authentication
Jesse Walker, Intel Corporation Russ Housley, Vigil Security
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

DNS SD Privacy Christian Huitema, Daniel Kaiser IETF 97, Seoul, November 17, 2016 draft-ietf-dnssd-privacy-00 draft-ietf-dnssd-privacy-00

Changes in content from IETF 96 Removed the confusing “simple design” Text was confusing, “we could do this, but we won’t, do that instead.” Focus instead on the “two-step” solution: Publish the “private discovery service” using DNS-SD and obfuscated names Private discovery service uses DNS over TLS, secured with a mutually authenticated pairwise shared secret (PSK). Fixed a bunch of small issues in the text E.g., the two-step solution does in fact defend against fingerprinting. Moved “pairing” specification to separate draft Still rely on PSK established through pairing process draft-ietf-dnssd-privacy-00

Discuss: simple fix to scaling issues Current: Advertise hints of the form Hash(nonce, PSK) Potential cost is O(N*M), N: number of pairings per machine M: number of servers in the network Suggested fix: compute only once per interval, e.g. 5 minutes Nonce = 32 bit Unix time, rounded to “interval” Servers compute N hashes per interval, based on server’s pairings Clients compute N hashes per interval, based on client’s pairings Clients perform M simple “hash comparisons” per query Simple implementation: set 24 bit nonce as Unix time >> 8 Feedback? draft-ietf-dnssd-privacy-00

draft-ietf-dnssd-privacy-00 Process and Next steps Adoption call passed Draft is now: draft-ietf-dnssd-privacy-00 Need implementation experience Working on it with Get DNS team Anybody else? Report on implementation and last call before IETF 98? draft-ietf-dnssd-privacy-00