EREG: an Intelligent Network capability set for User and Infrastructure ENUM Tony Rutkowski VeriSign Switzerland Andrew Newton.

Slides:



Advertisements
Similar presentations
Internet Peer-to-Peer Application Infrastructure Darren New Invisible Worlds, Inc.
Advertisements

The Internet Registry Information Service (IRIS) Protocol January 12, 2005 Marcos Sanz, DeNIC Andrew Newton, VeriSign Leslie Daigle, VeriSign.
Implementing Telephone Numbers for VoIP Tony Rutkowski Vice-President of Regulatory Affairs Tom Kershaw Vice-President of.
Fujitsu Laboratories of Europe © 2004 What is a (Grid) Resource? Dr. David Snelling Fujitsu Laboratories of Europe W3C TAG - Edinburgh September 20, 2005.
SG-A Ad Hoc - ENUM Jordyn A. Buchanan Register.com February 12, 2001.
IRIS: an Intelligent Network capability set for Next Generation Networks Tony Rutkowski VeriSign Andrew Newton
Internet Protocol Security (IP Sec)
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Bridging Technical Possibilities With Policy Technicalities Montreal, QC June 24, 2003.
UDDI v3.0 (Universal Description, Discovery and Integration)
Web Services Nasrullah. Motivation about web service There are number of programms over the internet that need to communicate with other programms over.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
LAB#2 JAVA SECURITY OVERVIEW Prepared by: I.Raniah Alghamdi.
Environmental Terminology System and Services (ETSS) June 2007.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Chapter 4 Database Management Systems. Chapter 4Slide 2 What is a Database Management System (DBMS)?  Database An organized collection of related data.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
Key Management in Cryptography
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
Introduction to UDDI From: OASIS, Introduction to UDDI: Important Features and Functional Concepts.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Security and DICOM Lawrence Tarbox, Ph.D. Chair, DICOM Working Group 14 Siemens Corporate Research.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Copyright © 2004, Epok, Inc. Extensible Resource Identifiers (XRIs) XDI Face to Face 28 April 2004.
CNRI Handle System and its Applications
ENUM? “ Telephone Number Mapping (ENUM or Enum, from TElephone NUmber Mapping) is a suite of protocols to unify the telephone numbering system E.164 with.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
ENUM Update for voipeer BOF Richard Shockey ENUM co-chair IETF 63 Paris.
Sep 30, 2000XML Workshop Talk, IIT Bombay XML Standardization for Business Applications Dr. Vasudev Kamath Persistent Systems.
CRISP Requirements Discussion draft-ietf-crisp-requirements-02.txt Andrew Newton 55 th IETF, November 19, 2002 Atlanta, GA.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Metadata and Geographical Information Systems Adrian Moss KINDS project, Manchester Metropolitan University, UK
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Chapter 21 Distributed System Security Copyright © 2008.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
1 Advanced Software Architecture Muhammad Bilal Bashir PhD Scholar (Computer Science) Mohammad Ali Jinnah University.
June 6, CRISP Overview and Update Andrew Newton VeriSign Labs
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Patrik Fältström. ITU Tutorial Workshop on ENUM. Feb 8, 2002, Geneva Explanation of ENUM (RFC 2916) Patrik Fältström Area Director, Applications Area,
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
Module 7: Implementing Security Using Group Policy.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Java Programming: Advanced Topics 1 Enterprise JavaBeans Chapter 14.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Goals Introduce the Windows Server 2003 family of operating systems
SDMX IT Tools SDMX Registry
Presentation transcript:

EREG: an Intelligent Network capability set for User and Infrastructure ENUM Tony Rutkowski VeriSign Switzerland Andrew Newton VeriSign Labs ETSI 1 st ENUM Workshop Sophia Antipolis, France Feb 2004 V Jan-04

Outline Overview of EREG – the ENUM Registry “Intelligent Network” Reference models and interfaces Security and authentication Applications Policy developments Activities and status

Capability Sets PSTN Intelligent Network (IN) Capability Sets  definable provider relationships and access arrangements  protocol suite for discovery and query of distributed subscriber data among telecom providers ENUM Internet Registry Information Service (IRIS) EREG  definable provider relationships and access arrangements  protocol suite for discovery and query of distributed ENUM registration data among ENUM registries

Internet Registry Information Service (IRIS) Developed in IETF to provide capability sets existing in telecom Intelligent Network environment Text based protocol designed to allow registries of Internet resources  to express query and result types specific to their needs  while providing a framework for authentication, structured data, entity references and search continuations Encompasses the following  a decentralized system using DNS hierarchies where possible for location  built upon standard Internet building blocks  does not impose any informational trees or matrices  may be used with multiple application transports, including BEEP

IRIS Status Prime focus of CRISP (Cross Registry Information Service Protocol) working group of the IETF Chaired by April Marine and George Michaelson A new specification for use by registries of Internet resources globally  Requirements are done  Protocol selection is done  Now refining IRIS for publication as a standard Applying what we have learned about operating services over the Internet from the 20 intervening years to the problems of today Implementation tool sets available as freeware and for plugtest demonstrations

IRIS attributes XML based Internationalization  Localization of data tags and content  Identifying contact equivalences  Support of Internationalized Domain Names Unified Service  Structured queries and results

IRIS General Concepts Each kind of Internet registry is identified by a registry type  The identifier for a registry type is a URI used within the XML instances to identify the XML schema formally describing the set of queries, results, and entity classes allowed within that type of registry The structure of these URN's makes no assumptions or restrictions on the type of registries  IRIS may support multiple registry types of disparate or similar nature; it is only a matter of definition  a single registry type may be defined for domain name registries while multiple registry types may be defined for the various IP address registries A registry information server may handle queries and serve results for multiple registry types  Each registry type that a particular registry operator serves is a registry service instance IRIS and the XML schema are independent of the registry service maintenance systems  IRIS is a specification for a framework with which these registries can be defined, used, and interoperate  The framework merely specifies the elements for registry identification and the elements which must be used to derive queries and results Allows a registry type to define its own structure for naming, entities, queries, etc. through the use of XML namespaces and XML schemas  a registry type is identified by the same URI that identifies its XML namespace. Framework defines certain structures common to all registry types  references to entities, search continuations, entity classes, and more  registry type may declare its own definitions for all of these, or it may mix its derived definitions with the base definitions IRIS defines two types of referrals, an entity reference and a search continuation  An entity reference indicates specific knowledge about an individual entity  A search continuation allows for distributed searches  Both referrals may span differing registry types and instances  No assumptions or specifications are made about roots, bases, or meshes of entities

IRIS Framework Registry-Specific :: Defines queries, results, and entity classes of a specific type of registry. Each specific type of registry is identified by a URN Common-Registry :: Defines base operations and semantics common to all registry types such as referrals, entity references, etc. It also defines the syntaxes for talking about specific registry types. Application-Transport :: Defines the mechanisms for authentication, message passing, connection and session management, etc. It also defines the URI syntax specific to the application-transport mechanism. However, because of the separation of the layers, other transports can be used and have been defined. IRIS [any defined transport] Registry-Specific Common-Registry Application-Transport DomainAddressetc

ENUM Registry Information Service (EREG) An IRIS implementation developed specifically for infrastructure and user ENUM Meets requirements in Secs. 10.2,10.4, C.2 of ETSI TS V1.1.1 ( ), ENUM Administration in Europe Provides WHOIS/NICNAME equivalent requirements in Sec. 3 of ETSI TS V1.1.1 ( ), Services and Protocols for Advanced Networks (SPAN); Minimum requirements for interoperability of European ENUM trials Meets requirements in ETSI TS V1.1.1 ( ), Telecommunications security; Lawful Interception (LI); Requirements of Law Enforcement Agencies Allows potential IN-like capabilities such as caller-id or fraud checking

EREG Framework EREG Model Tier 0 Registry Tier 1 Registry ENUM Tier 2 Nameserver Provider ENUM Registrar Registrant (ENUM End User) Applications Validation function

EREG Security Designed for distributed data that occurs in ENUM architectures, with defined methods for finding the right server Ability to control who gets the info Critical need for network administration and law enforcement $iris kosters.net Kosters, Mark US $iris –cert fbi.cert kosters.net Kosters, Mark Fox Shadow Lane Clifton, VA US

Authentication and Authorization Distinction  Authentication – the process used to verify the identity of a user  Authorization – the access policies applied to a user based on authentication Authentication mechanisms facilitate authorization schemes  Authentication mechanisms passwords, one-time passwords, digital certificates, references  Authorization schemes user-based, sequence-based, chain-based, attribute-based, time-based, referee-based

Digital Certificates Use a branch of mathematics called public key cryptography to conduct authentication.  Used in conjunction with TLS, they also allow for server authentication and session encryption. Facilitate the following authorization schemes:  user-based  chain-based  attribute-based  time-based

Certificate Chains Authorization can be based on one of the certificates in the chain. Example:  If the certificate is signed by the “lea CA” Allow access to all contact data  If the certificate is signed by the “regr CA” Allow access only to all domain and registrant data

Attributes in Certificates Information attributes in certificates are cryptographically secure. Example:  If the “Type” attribute in the certificate equals “LEA” Allow access to all contact data  If the “Type” attribute in the certificate equals “Registrar” Allow access only to all domain and registrant data

EREG Referrals The IRIS protocol allows a server to pass extra information via a client to a referent server. This information may contain authentication data, thus allowing a referee-based authorization policy.

EREG Navigation of Servers and Data Navigation of DNS to help find an authoritative server. Query Distribution with entity references and search continuations. Relay bags to enable common index servers. Structured queries and results give clients the knowledge to display relationships.

EREG: query types and elements  finds ENUMs by searches on fields associated with a registrant  Allowable search fields include,,,,  Provides optional elements containing language tags Query  Includes host name, host handle, IPv4 address, or IPv6 address of the name server

EREG: enum result elements  status  - permanently inactive  - normal state  - new delegation  - dispute  - database purge pending 

EREG: other result types Error results 

EREG XML Schema

EREG Policy Developments Operational  EREG provides critical capabilities among providers to securely maintain the basic services to troubleshoot to create new applications and offerings to subscribers such as callerID, fraud detection, etc  EREG allows providers to define policies and contractual obligations among themselves and express them as access rights  EREG can support multiple transport layer options and different subscriber maintenance systems Governmental  EREG provides capabilities long demanded of communication service providers by national regulators and law enforcement authorities to maintain authoritative subscriber information to produce subscriber information quickly upon lawful order  EREG is an open protocol based on XML that is being supported by eGovernment initiatives in Europe and worldwide

Extensive open source software and information available by VeriSign Labs for PlugTests dregquery

EREG Implementations and Interoperability Underway at providers and university testbeds - Q Plugtest interoperability demonstrations for EREG in conjunction with infrastructure and user ENUM - Q3 2004

Additional Links and Information See A. Newton, IRIS - An ENUM Registry (ereg) Type for the Internet Registry Information Service, draft-newton-iris-ereg- 01, October 24, 2003 IETF CRISP Working Group 