INRIA Rhône-Alpes - Planète research group 1 Security and RMT Protocols: TESLA I-D simple-auth I-D rmt-sec I-D IETF 69 th – Chicago meeting, July 2007.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

NORM PI Update draft-ietf-rmt-pi-norm-revised-04 68th IETF - Prague Brian Adamson NRL.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Sri Lanka Institute of Information Technology
FCAST update TESLA update IETF 76 – Hiroshima, November 2009 V. Roca (INRIA)
Digital Signatures and Hash Functions. Digital Signatures.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Lecture 2: Message Authentication Anish Arora CSE5473 Introduction to Network Security.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
INRIA Rhône-Alpes - Planète research group Reed-Solomon FEC I-D LDPC-* FEC I-D TESLA I-D Simple-auth I-D IETF 70 th – Vancouver meeting, November 2007.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
1 IPFIX Protocol Specifications IPFIX IETF-59 March 3, 2004 Benoit Claise Mark Fullmer Reinaldo Penno Paul Calato Stewart Bryant Ganesh Sadasivan.
CSCE 715: Network Systems Security
Multi-part Messages in KMIP John Leiseboer, QuintessenceLabs.
Simple Authentication schemes for ALC and NORM draft-ietf-rmt-simple-auth-for-alc-norm-00 IETF 73 – Minneapolis, November 2008 Vincent Roca (INRIA)
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
RTP Encryption for 3G Networks Rolf Blom, Elisabetta Carrara, Karl Norrman, Mats Näslund Communications Security Lab Ericsson.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
INRIA Rhône-Alpes - V. Roca - RMT Meeting IETF 71 st – Philadelphia, March 2008 Vincent Roca.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
INRIA Rhône-Alpes - V. Roca - 1 FCAST: Scalable Object Delivery on top of the ALC Protocol IETF 68 th – Prague meeting, March 2007 Vincent Roca (INRIA)
6lowpan ND Optimization draft Update Samita Chakrabarti Erik Nordmark IETF 69, 2007 draft-chakrabarti-6lowpan-ipv6-nd-03.txt.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier September 21, 2002.
Packet Format Issues #227: Need Shim Header to indicate Crypto Property of packet Do we need to add pre-amble header to indicate if data is encrypted or.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
RTP Splicing Status Update draft-ietf-avtext-splicing-for-rtp-11 Jinwei Xia.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier March 20, 2003.
MPTCP Protocol draft-ietf-mptcp-multiaddressed-02 Update and Open Issues Alan Ford IETF79 – Beijing 1.
RTCWEB STUN Usage for Consent Freshness and Session Liveness draft-muthu-behave-consent-freshness-01 Authors: D. Wing, Muthu A M. Perumal, R. Ram Mohan,
MSEC Montreal, July 26 Ran Canetti and Lakshminath Dondeti
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Multi-part Messages in KMIP John Leiseboer, QuintessenceLabs.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Simple Reed-Solomon FEC Scheme for FECFRAME draft-roca-fecframe-simple-rs-01 IETF 79 – Beijing, November 2010 V. Roca – M. Cunche (INRIA) J. Lacan – A.
1 Header Compression over IPsec (HCoIPsec) Emre Ertekin, Christos Christou, Rohan Jasani {
Moving HIP to Standards Track Robert Moskowitz ICSAlabs an Independent Div of Verizon Business Systems July 30, 2009 Slides presented.
RFC 4068bis draft-ietf-mipshop-fmipv6-rfc4068bis-01.txt Rajeev Koodli.
Multiple Care-of Address Registration draft-ietf-monami6-multiplecoa-02.txt.
DIME WG IETF 84 Diameter Design Guidelines draft-ietf-dime-app-design-guide-15 Tuesday, July 31, 2012 Lionel Morand.
K. Salah1 Security Protocols in the Internet IPSec.
GOE FEC schemes GOE FEC schemes IETF83, March 26 th, 2012, Paris V. Roca, A. Roumy (Inria) B. Sayadi (ALU-BL)
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
IETF#67 – 5-10 November 2006 FECFRAME requirements (draft-ietf-fecframe-req-01) Mark Watson.
NAT State Synchronization using SCSP draft-xu-behave-nat-state-sync-01
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
draft-ipdvb-sec-01.txt ULE Security Requirements
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
Sally Floyd and Eddie Kohler draft-floyd-ccid4-01.txt July 2007
Extended BFD draft-mirmin-bfd-extended
Presentation transcript:

INRIA Rhône-Alpes - Planète research group 1 Security and RMT Protocols: TESLA I-D simple-auth I-D rmt-sec I-D IETF 69 th – Chicago meeting, July 2007 Vincent Roca (INRIA)

INRIA Rhône-Alpes - V. Roca - 2 Situation TESLA source authentication for ALC/NORM draft-ietf-msec-tesla-for-alc-norm-02.txtupdated Simple auth. schemes for ALC/NORM draft-roca-rmt-simple-auth-for-alc-norm-00.txt new Security and RMT protocols: discussions and guidelines draft-ietf-rmt-sec-discussion-00.txtupdated

INRIA Rhône-Alpes - V. Roca - 3 Part 1: TESLA for ALC and NORM

INRIA Rhône-Alpes - V. Roca - 4 What’s new in version 02? … many, many things… new features:  authentication tags: compact versions, tag without key disclosure  optional weak group MAC filled in TBD parts:  NORM pkt types specified for some TESLA messages

INRIA Rhône-Alpes - V. Roca - 5 What’s new in version 02… (cont’) clarifications, additions:  bootstrap messages: when to use them, format  receiver operations: updated list of actions  EXT_AUTH: format, clarified the use of the ASID  added a security section  IANA section: updated let’s focus on some of these points…

INRIA Rhône-Alpes - V. Roca - 6 Compact authentication tag remove the “i” interval id field  instead we only send the lowest byte in “i_LSB” field …plus two additional bytes (“i_NSB” field) when the MAC field needs padding (e.g. with HMAC-SHA-1)  saves 32 bits/packet maybe it’s safe to define only compact auth. tags? | HET (=1) | HEL (=9) | ASID | 5 | i_LSB | | + | + Disclosed Key K_{i-d} + | (20 bytes) | + | + | | + MAC(K'_i, M) + | (10 bytes) | | | i_NSB |

INRIA Rhône-Alpes - V. Roca - 7 Authentication tag without key disclosure example (using HMAC-SHA-1):  size divided by 2.25… | HET (=1) | HEL (=4) | ASID | 6 | i_LSB | | + MAC(K'_i, M) + | (10 bytes) | | | i_NSB | | HET (=1) | HEL (=9) | ASID | 5 | i_LSB | | + | + Disclosed Key K_{i-d} + | (20 bytes) | + | + | | + MAC(K'_i, M) + | (10 bytes) | | | i_NSB | with key disclosure (36 bytes) without key disclosure (16 bytes)

INRIA Rhône-Alpes - V. Roca - 8 Auth. tag without key disclosure… (cont’) when can we use them?  when a high number of packets are generated per time interval (i.e. high data rate) since it’s not required to disclose the same K i-d again and again… no robustness problem, since any key K j can be used to compute all the previously disclosed keys, K k, k<j time interval i (0.5s)time interval i+1time interval i+2 K i-d K i-d+1 K i-d+2 no key discl.

INRIA Rhône-Alpes - V. Roca - 9 Weak group MAC motivations  add a short (32bit) group MAC to all packets, calculated with a group key, to mitigate attacks coming from outside of the group | HET (=1) | HEL (=5) | ASID | 6 | i_LSB | | | + MAC(K'_i, M) + | (10 bytes) | | | i_NSB | | Weak Group MAC (4 bytes) | | Weak Group MAC (4 bytes) |

INRIA Rhône-Alpes - V. Roca - 10 Weak group MAC… (cont’) benefits (the attacker is not a group member)  receivers immediately drop packets that fail the Weak Group MAC check  avoid costly digital signature computations in case of faked “bootstrap”/”direct sync req”/”response” packets limitations  no benefit if the attacker knows the group key  the EXT_AUTH size is increased (32bits)  more computation overhead  we recommend to check the group MAC only when an attack is detected

INRIA Rhône-Alpes - V. Roca - 11 Use of the ASID field Authentication Scheme ID  a 4 bit field common to all EXT_AUTH header ext. TESLA, group MAC, and digital signatures  session description (e.g. SDP) defines the mapping ASID value↔authentication scheme | HET (=1) | HEL | ASID | Type | | ~ Content ~ |

INRIA Rhône-Alpes - V. Roca - 12 Use of the ASID… (cont’)  benefits  no IANA registration needed, mapping is per-session  several schemes can be used jointly works also if several AS are used for the same direction  several AS can be used jointly (e.g. DS + group MAC)  for instance: busy period (high data rate) sporadic traffic (eg. keepalive packets) digital signature + group MAC for sender→recv TESLA for sender→recv group MAC for recv → sender

INRIA Rhône-Alpes - V. Roca - 13 Use of the ASID… (cont’) questions to the group  does it make sense?  IMHO (1) it’s better than using the LCT codepoint field and (2) it also works with NORM  4 bits for the ASID is clearly too much, 2 or 3 bits are enough

INRIA Rhône-Alpes - V. Roca - 14 To conclude with TESLA for ALC/NORM we are aligned with the existing TESLA RFC  e.g. RFC4082 (intro), RFC4383 (TESLA in SRTP), RFC4442 (bootstrapping TESLA)  …but we define additional mechanisms (e.g. several key chains, auth tags w/o key disclosure, group MAC) work almost finished  our plan is to finish the specifications for IETF70 in parallel we are implementing it from scratch  we take advantage of it to check our specifications…  but another pair of eyes is welcome ☺

INRIA Rhône-Alpes - V. Roca - 15 Part 2: Simple authentication schemes for ALC and NORM

INRIA Rhône-Alpes - V. Roca - 16 Simple auth schemes for ALC/NORM a new I-D…  …that defines two basic authentication schemes for group communications  shares the EXT_AUTH format  ASID field is used goal is to have an appropriate set of authentication schemes  for ALC/NORM level security  it’s complementary to IPsec level security

INRIA Rhône-Alpes - V. Roca - 17 Simple auth schemes for ALC/NORM… (cont’) pros/cons in short | | RSA Digital | ECC Digital | Group MAC | TESLA | | | Signature | Signature | | | | True auth and | Yes | Yes | No (group | Yes | | integrity | | | security) | | | Immediate auth | Yes | Yes | Yes | No | | Processing | -- | + | ++ | + | | load | | | | | | Transmission | -- | + | ++ | + | | overhead | | | | | | Complexity | ++ | ++ | ++ | -- | | IPR/patents | ++ | -- | ++ | ++ |

INRIA Rhône-Alpes - V. Roca - 18 Simple auth schemes for ALC/NORM… (cont’) example: | HET (=1) | HEL (=33) | ASID | 0 | | + |.. Signature (128 bytes).. | + | | HET (=1) | HEL (=4) | ASID | 0 | | + | Group MAC (10 bytes) | | | Padding | Digital Signature EXT_AUTH header extension using 1024 bit signatures Group MAC EXT_AUTH header extension using HMAC-SHA bytes 12 bytes

INRIA Rhône-Alpes - V. Roca - 19 To conclude with simple auth schemes it’s the logical follow-up to TESLA I-D  provides a comprehensive set of techniques for the most basic security feature: source authentication and packet integrity a WG Item?  RMT or MSEC?

INRIA Rhône-Alpes - V. Roca - 20 Part 3: Security and RMT protocols: discussion and guidelines

INRIA Rhône-Alpes - V. Roca - 21 What’s new in version 00? now a WG Item doc  as decided during IETF67 updated the “technological building block” section  takes into account the “simple authentication schemes” I-D but it’s not finished…  lacks some text on keying protocols, need to update the IPsec section, etc.