ICOS BOF Securing Internet Configuration Bernard Aboba Microsoft IETF 62, Minneapolis, MN.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv6 Overview Brent Frye EECS710. Overview Google Drive Microsoft Cloud Drive Dropbox Paid-for alternatives 2.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
Network Localized Mobility Management using DHCP
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Georgy Melamed Eran Stiller
Internet Protocol Security (IPSec)
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
NetComm Wireless VPN Functionality Feature Spotlight.
DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) BY: SAMHITA KAW IS 373.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
EMU BOF EAP Method Requirements Bernard Aboba Microsoft Thursday, November 10, 2005 IETF 64, Vancouver, CA.
1 EAP Usage Issues Feb 05 Jari Arkko. 2 Typical EAP Usage PPP authentication Wireless LAN authentication –802.1x and i IKEv2 EAP authentication.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Connecting The Network Layer to Data Link Layer. ARP in the IP Layer The Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) Part.
DHCP Configuration of IPSEC Tunnel Mode Draft-ipsec-dhcp-05.txt Bernard Aboba Microsoft.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
BZUPAGES.COM BOOTP and DHCP The Bootstrap Protocol (BOOTP) is a client/server protocol that configures a diskless computer or a computer that is booted.
Attacking IPsec VPNs Charles D George Jr. Overview Internet Protocol Security (IPSec) is a suite of protocols for authenticating and encrypting packets.
PANA Framework Prakash Jayaraman, Rafa Marin Lopez, Yoshihiro Ohba, Mohan Parthasarathy, Alper Yegin IETF 59.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
RFC 2716bis Wednesday, July 12, 2006 Draft-simon-emu-rfc2716bis-02.txt Dan Simon Bernard Aboba IETF 66, Montreal, Canada.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Windows Vista Configuration MCTS : Advanced Networking.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
<draft-ohba-pana-framework-00.txt>
Booting up on the Home Link
Encryption and Network Security
IT443 – Network Security Administration Instructor: Bo Sheng
Multiple Encapsulation Methods
Understand Networking Services
2002 IPv6 技術巡迴研討會 IPv6 Mobility
Maryna Komarova (ENST)
CS4470 Computer Networking Protocols
Computer Networks Protocols
Chapter 6 IP Security.
Presentation transcript:

ICOS BOF Securing Internet Configuration Bernard Aboba Microsoft IETF 62, Minneapolis, MN

Outline What is IP Configuration? Problem definition Architectural Principles Potential approaches Provisioning

What is IP Configuration? Parameters IP address configuration (IP address, subnet mask) Default gateway configuration Internet layer parameter configuration (MTU, etc.) Name server configuration (IEN 116, DNS, WINS, iSNS, NIS) Boot configuration (TFTP, NFS, iSCSI) Service Location/Directory configuration (RLS, SLPv2, LDAP) Mobility configuration (MIP) Time server configuration (NTP, SNTP) Scenarios Intra-domain: Hosts that only obtain configuration within a single administrative domain Inter-domain: Mobile hosts moving between administrative domains (corpnet, home, carrier/ISP)

Security Problems Secure IP configuration Definition: secure configuration of IP address & configuration parameters Example: Secure configuration of the TFTP server Not a substitute for protocol security Does not preclude insecure use of a securely configured server Secure protocols Definition: Security for the protocols whose servers are configured Example: Secure TFTP Not a substitute for configuration security Assume mutual authentication/integrity/replay protection Enables continued operation if at least one good server can be discovered Client can detect/blacklist rogue servers Issues  Attacker can DoS configuration servers, so that only bogus configuration gets through  Not all protocols are secured, so blacklist not always possible Applications with major security problems Remote boot (boot server, boot image) Mobility (BU security)

Threat Model Documents RFC 3756, “IPv6 Neighbor Discovery (ND) Trust Models and Threats”, May 2004 RFC 3118, “Authentication for DHCP Messages” draft-ietf-dhc-v4-threat-analysis-02.txt, “Dynamic Host Configuration Protocol for IPv4 (DHCPv4) Threat Analysis”, April 2004 draft-prigent-dhcpv6-threats-00.txt, “DHCPv6 Threats”, March 2001 Threats Rogue configuration servers (man-in-the-middle, DoS) Redirect attacks (e.g. rogue default gateway, DNS server) DoS attack via invalid configuration Accidentally configured configuration servers Rogue clients (DoS) Impersonation of another client Resource exhaustion attack on server (more likely on IPv4) CPU exhaustion (if heavyweight computation required) Non-threats Disclosure MAC, IP addresses are public information Most server addresses considered public information Not clear what, if any configuration data is sensitive

Required Security Services Data origin authentication and integrity/replay protection of IP address assignment & configuration parameters Protection of clients against rogue servers Protection of servers against rogue clients DoS protection Efficient request limiting (implementation issue) Lightweight anti-spoofing (e.g. cookies)

Architectural Principles Less is more Lower layer independence Higher layer independence Security at the Internet layer Algorithm support Mobility Support

Less is More The number of Internet layer configuration (security) mechanisms should be minimized and the chosen mechanisms should be as simple as possible. Need to support embedded hosts with limited resources Proliferation of configuration (security) mechanisms compromises interoperability, increases footprint and configuration latency Potential for conflict and additional traffic With multiple mechanisms, may need to try several and/or merge returned configuration

Lower Layer Independence Desirable for hosts to be able to configure themselves on multiple networks without adding configuration code specific to a new link layer. Multi-homed hosts becoming popular Examples: WWAN/WLAN phones Counter-examples RFC 903 (RARP) RFC 1661 (PPP IPCPv4) Assigns IP addresses instead of using BOOTP/DHC P NAS devices did not act as BOOTP/DHCP servers at the time (now common) IPv6CP (RFC 2472) only assigns link identifier, not prefix RFC 1877 (IPCPv4 Extensions for Name Service Configuration) PPPEXT WG has resisted equivalent IPv6CP extensions IPCP allocation no longer FCFS, requires IETF Consensus (RFC 3818) DHCPINFORM can be implemented over PPP instead IKEv2 CFG_REQUEST/REPLY (Section 2.19, 3.15) Allows IKEv2 peer to request configuration from its peer Support for configuration of IPv4/IPv6 address, netmask, prefix, DHCPv4/v6 server, DNS server, WINS server, routes  WINS not even defined for IPv6! Need to avoid chicken/egg problem (need inner address to configure tunnel mode SA, but can’t obtain inner address without a tunnel mode SA) Alternative mechanism still needed for other configuration parameters Alternative is multi-stage setup, snopping of IP address configuration by VPN server (RFC 3456)

Higher Layer Independence Internet Layer Configuration should avoid higher layer dependencies. Circular dependencies Higher layer operation depends on Internet layer configuration (addressing, fragmentation) Without an IP address, can't set up a TCP/SCTP connection Can't use higher layer protocols depending on reliable transport Resource issues Embedded hosts may wish to minimize boot ROM code Some boot ROMs support IP/UDP, but not TCP/SCTP Embedded systems may not have headroom for complex higher layer protocols (e.g. LDAP) Food for thought Certificate processing requires a footprint of the same order (or greater) than TCP.

Internet Layer Reliance If both lower and higher layer dependencies are undesirable, then IP configuration (security) needs to depend on the Internet layer. During boot, some Internet layer facilities may not be available IP fragmentation and reassembly not reliable when sending from the unspecified address IPsec requires an IP address Implications IPsec typically used only after address assignment or for relay- server security Payloads no larger than MTU; may need to build-in fragmentation support to handle certificate payloads

Algorithm Support In order to enable interoperability, it is necessary to define at least one mandatory-to- implement algorithm Algorithm support should be negotiable

EAP Extensible Authentication Protocol (EAP) is a media-independent framework for network access authentication RFC 3748 defines EAP over PPP IEEE 802.1X defines EAP over IEEE 802 wired networks IEEE i defines EAP over IEEE EAP encapsulation not defined on other link layers Defining EAP on a new link not just a protocol design exercise Standards organization defining the link layer must agree to the EAP security model (new state machine) Example: Would ANSI T.10 define EAP over Fibre Channel? Result: EAP introduces link layer dependency unless it can be run over IP (or higher) layers Algorithm support RFC 3748 mandatory-to-implement algorithm is MD5 Where this is inadequate, application needs to define its own mandatory-to-implement algorithm

Mobility Support Mobility is an important feature of the Internet Architecture and needs to be supported by Internet Layer Configuration (security) mechanisms Need for both intra and inter-domain support Need to be able to obtain (secure) configuration within administrative domains not previously visited or explicitly configured Transition issues Mix of security-capable/incapable clients and servers likely to persist for a long time Security capabilities and policies likely to vary between administrative domains

Potential Approaches Server-side Pre-shared keys Typically only used with mutual authentication Certificates Used to sign messages sent from client to server Requires provisioning of trust anchor on the client Client-side Nothing: client authentication not always important Same as before: client proves that it is the same client as in a previous transaction Resource ownership: client proves authorization for a resource (e.g. SEND) Client authentication to the server (e.g. EAP)

Provisioning Issues Initial provisioning: how does a customer obtain X hosts provisioned to obtain configuration securely? Re-provisioning: how do we deal with credential expiry, change or revocation?

Initial Provisioning Scenario: Company Y calls OEM, says “please send me 10K hosts, pre-provisioned for IP configuration security.” Can they easily be manufactured? Where goal is secure boot, credentials may need to be provisioned in NVRAM How many different credentials are required? Shared secrets, certificates, trust anchors, etc. How much boot ROM code is required? Certificate handling requires substantial footprint Boot ROM code often runs in REAL mode Does NVRAM need to be individually provisioned? Unique shared secret/certificate for each client? Same set of trust anchors?

Feedback?