Trust Router Overview IETF 86, Orlando, FL Trust Router Bar BOF Margaret Wasserman

Slides:



Advertisements
Similar presentations
Happy Eyeballs Extension for Multiple Interfaces Gang Chen Carl
Advertisements

Enabling Secure Internet Access with ISA Server
ABFAB for Internet-of-Things Rhys Smith, Janet Sam Hartman & Margaret Wasserman, Painless Security.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
CSE331: Introduction to Networks and Security Lecture 8 Fall 2002.
Secure Network Bootstrapping Infrastructure May 15, 2014.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Key Negotiation Protocol & Trust Router draft-howlett-radsec-knp ABFAB, IETF March, Prague.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
ABFAB Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Multihop Federations & Trust Router draft-mrw-abfab-multihop-fed-02.txt draft-mrw-abfab-trust-router-01.txt Margaret Wasserman
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
1 Enabling Secure Internet Access with ISA Server.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
Guide to TCP/IP, Third Edition
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Router and Routing Basics
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
11 December, th IETF, AAA WG1 AAA Proxies draft-ietf-aaa-proxies-01.txt David Mitton.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Draft-ietf-abfab-aaa-saml Josh Howlett IETF 90. Remaining issues (recap from IETF 89) SAML naming of AAA entities The focus of this presentation Alejandro.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Module 1: Configuring Routing by Using Routing and Remote Access.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Basic Routing Principles V1.2. Objectives Understand the function of router Know the basic conception in routing Know the working principle of router.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Multicasting  A message can be unicast, multicast, or broadcast. Let us clarify these terms as they relate to the Internet.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Content Distribution Internetworking IETF BOF December 12, 2000 Phil Rzewski Gary Tomlinson.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Trust Router Overview IETF 86, Orlando, FL Routing Area Meeting Margaret Wasserman
Draft-howlett-abfab-trust-router-ps ABFAB, IETF83 Josh Howlett & Margaret Wasserman.
Cryptography and Network Security
Objective: ARP.
BOOTP and DHCP Objectives
Internet Networking recitation #12
2018 Huawei H Real Questions Killtest
AbbottLink™ - IP Address Overview
Ch 17 - Binding Protocol Addresses
Presentation transcript:

Trust Router Overview IETF 86, Orlando, FL Trust Router Bar BOF Margaret Wasserman

Trust Router Draft trust-router/ trust-router/ Describes the role and purpose of a Trust Router Defines the concept of communities COIs and APCs Defines two protocols Temporary Identity (TID) Protocol Trust Router Protocol

Trust Router Overview Trust Router Operation Communities Temporary Identity Protocol Message contents Role of Trust Router as gateway Trust Router Protocol Message contents Trust link types Implementation Status

Trust Router Operation

Communities Authentication Policy Communities (APCs) Used to authenticate access to RP Services Communities of Interest (COIs) Group of RP Clients, IdPs and Trust Routers that share access to a set of services COI must be resolved to an APC (for a given IdP Realm), before authentication can be achieved

Temporary Identity Protocol Used by an RP to negotiate a Temporary Identity on a (set of) AAA Server(s) in a target realm TID Request is sent to the RP’s local Trust Router and forwarded across a Trust Path to the target AAA Server(s) Response is returned by reversing the Trust Path

Temporary Identity Protocol Simple request/response protocol Messages are encoded in JSON Uses GSS-API for authentication Request include ½ of a DH exchange Server replies with a list of AAA Server IP Addresses Response includes the other ½ of a DH exchange for each AAA Server Both ends can compute a shared key that is used for the subsequent AAA authentication Key cannot be computed by intermediate Trust Routers

Example TID Request {"msg_type": "TIDRequest", "msg_body": {"rp_realm": ”mit.edu", "target_realm": ”oxford.uk.ac", "community": ”abfab-hackers.communities.ja.net", "dh_info": {"dh_p”: "FFFFFFFF…", "dh_g": "02", "dh_pub_key": "FBF98ABB…”} } }

Trust Router as TID Gateway Trust Router receives a TID Request from an RP Client (e.g. AAA Proxy) Determines appropriate APC for the community included in the original request If different, moves original COI into orig-coi field Finds matching rp_client entry (from gss_name), applies filters, and adds constraints to the message Determines “Trust Path” and adds it to the message. Forwards message to AAA Server (or next hop Trust Router)

Trust Router Protocol Runs between pairs of Trust Routers Configured as “peers” with GSS credentials to reach each other “Routing” protocol used to dynamically distribute information about Available Trust Links Used to route TID requests and responses across the federation RP Client membership in COIs APC to use for each IdP Realm/COI pair

Trust Link Types Trust Link Types (named by target type) Routing Links Trust Router Link Indicates that the originating trust router can provide temporary IDs to reach the target trust router IdP Realm Link Indicates that the originating trust router can provide temporary IDs to reach the AAA servers in the target realm Information Flooding Links COI RP Membership Link Indicates that the the target RP Client is a member of the indicated COI APC Link Indicates that authentication for a target realm and COI should use the target APC

Trust Path A Trust Path is a set of Trust Links that forms a path across a federation between an RP and the AAA Server(s) in a Target IdP Realm A Trust Path is valid for a given Community Trust Routers forward TID Requests/Responses along Trust Paths, ultimately resulting in a TID that the RP can use to reach AAA Servers in the Target IdP Realm.

Questions?