Access control for IP multicast T-110.557 Petri Jokela

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

Internet Protocol Security (IP Sec)
A New Approach of Signing Documents with Symmetric Cryptosystems and an Arbitrator Nol Premasathian Faculty of Science King Mongkut’s.
© N. Ganesan, All rights reserved. Chapter IP Addressing Format.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
CP3397 ECommerce.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography and Network Security
Presented by Fengmei Zou Date: Feb. 10, 2000 The Secure Sockets Layer (SSL) Protocol.
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
What’s Next: DNSSEC & RPKI Mark Kosters. Why are DNSSEC and RPKI Important Two critical resources – DNS – Routing Hard to tell when it is compromised.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Cryptography and Network Security Chapter 17
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 8 Web Security.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Secure Socket Layer (SSL)
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Julien Laganier MEXT WG, IETF-79, Nov Authorizing MIPv6 Binding Update with Cryptographically Generated Addresses
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Denial-of-Service, Address Ownership,and,Early Authentication in IPv6 World (An Approach) Aditya Vutukuri From article by Pekka Nikander Ericsson Research.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.

The Secure Sockets Layer (SSL) Protocol
Security Outline Encryption Algorithms Authentication Protocols
Unit 3 Section 6.4: Internet Security
Cryptography and Network Security
Cryptography and Network Security
Message Digest Cryptographic checksum One-way function Relevance
The Secure Sockets Layer (SSL) Protocol
A Programmer’s Guide to Secure Connections
Advanced Computer Networks
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

Access control for IP multicast T Petri Jokela

Contents ● Unicasting / multicasting ● HIP – User authentication ● Certificates – User authorization ● Certificate based Multicast Access Control - C-MAC ● Future work ● Summary

Multicasting ● Unicasting – Point-to-point connection – Multiple receivers -> resources wasted ● Multicasting – One outgoing stream, multiplied near recipients – How to control stream receiving?

I 3 based multicast ● Traffic is sent with a stream identifier – Chord routing protocol used for data routing ● End-user sets a trigger at an I 3 server – Receive a stream ● stream identifier in the trigger – Traffic unicasted from the server to the end-user

IP multicasting Source Router Host Join... Join multicast group X Multicast routing protocol Send to IPv4: /4 IPv6: ff00::/8 Join multicast group -IGMP Router broadcasts

HIP usage ● The end-user authentication – During HIP 4-way handshake – End-user sends HI (public key) – Use private key to prove HI ownership ● IPsec usage – Data decryption key information sent over IPsec ESP

Certificates ● SPKI certificates – RFC2693 ● Certificate – 5-tuple, containing: – Issuer: Who gives the rights – Subject: To who this certificate gives rights – Authorization: What this certificate authorizes the subject to do – Validity: How long this cert is valid – Delegation: Can the subject delegate this further? – Certificate signed with issuer’s private key

Certificate delegation ● Certificate delegated: new and old cert concatenated – Issuer: itself – Subject: next retailer or end-user – Authorization: subset of original – Validity: subset of original – Delegation: depends on subject – Signature over the whole certificate chain ● The receiver can validate – Knows the first public key – Goes through the certificate chain

C-MAC parties Source Router End-user Retailer Cert ok? Data stream Keying

C-MAC: certificate distribution Source Router End-user Retailer Cert ok? Data stream Keying

C-MAC operation: cert distribution ● The data source issues a certificate – Issuer: data source public key – Subject: retailer’s public key – Authorization: receive data multicasting X – Validity: how long valid – Delegation: yes ● Certificate given to a retailer ● Retailer can further delegate to another retailer ● Finally, certificate is sold to the end-user – Payment: VISA, other... – not specified here

C-MAC: authentication and authorization Source Router End-user Retailer Cert ok? Data stream HIP negotiation

C-MAC: end-user authentication and authorization ● End user joins a multicast group – HIP association with the router – Router learns end-hosts public key (HI) ● End user sends the certificate to the router – Router verifies the certificate chain – Verify the subject, must match the end-user HI – Make a verification to the last retailer – Retailer marks the certificate used

C-MAC: data transmission Source Router End-user Retailer Cert ok? Data stream Keying

C-MAC: Data transmission ● Data must be encrypted – IP multicast: sent to everyone on the link – Where? At the last router ● Valid receiver needs a key – The decryption key is sent to valid receivers – Key sent over the IPsec ESP ● Rekeying needed – How validity times are defined? – Minutes, hours, days,...? ● Problems – How to prevent end-user to redistribute the key? – And if prevented, how to prevent resending decrypted data?

Future work ● Trust relations between entities – How this system could be adopted in real business ● Security – No security analysis made on this (complex) system ● Performance optimization – Encoding of data – Key distribution ● Payment system – Not studied in this paper ● Prototyping

Summary ● Access Control system for IP multicast – IP multicasting – Certificates for access control ● certificate chain – User authentication ● HIP – Data encryption ● A lot of work to do

Thank you!