Time Synchronization Protocols and Security IETF tictoc working group 28 July 2011 Karen ODonoghue

Slides:



Advertisements
Similar presentations
1 1588v2 modules of time synchronization with frequency layer support draft-su-tictoc-1588v2-time-sync-modules-00 IETF 75 th, Stockholm TICTOC WG
Advertisements

Joint meeting of TICTOC - Timing over IP Connections and Transfer Of Clock and NTP - Network Timing Protocol Chairs: Yaakov Stein yaakov_s at rad.com Karen.
Tictoc working group Thursday, 31 March CEST (1540 – 1740 UTC) Karen ODonoghue and Yaakov Stein, co-chairs.
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Cellular Networks.
SCSC 455 Computer Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Networking Academy Advanced Technology Update June 19, 2008.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
TICTOC -Topology-Discovery and Clock-Discovery TICTOC BOF IETF70 Stewart Bryant
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Enhanced NTP IETF – TicToc BOF Greg Dowd – Jeremy Bennington –
Internet-Based Client Access
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Sensors to Servers Meeting #3: March 20, 2014 IoTCM: IoT Connection Model.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Module 5: Configuring Access for Remote Clients and Networks.
SSL(Secure Socket Layer) Guided By:- Presented By:- Richard Sinn Jimmy Mehta
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-ietf-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning Schulzrinne.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
Module 10: Providing Secure Access to Remote Offices.
Tictoc working group Thursday, 28 July – 1720 EDT (1920 – 2120 UTC) Karen O’Donoghue and Yaakov Stein, co-chairs.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 68 - ANCP WG March 18-23, 2007 draft-ietf-ancp-security-threats-00.txt.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim.
IETF sec - 1 Security Work in the IETF Scott Bradner Harvard University
KERBEROS SYSTEM Kumar Madugula.
NTP and PTP Random Thoughts on Trade-offs and Scalability IETF 68 TICTOC BOF Karen O’Donoghue
S/MIME IBE Submissions Terence Spies Voltage Security.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
NTP Status Update Karen O’Donoghue. Documents Document Status: – APPROVED for Publication (8 days in RFC Editor Queue!) draft-ietf-ntp-ntpv4-proto-13.
Emerging Solutions in Network Time Synchronization Security
Virtual Private Networks
Virtual Private Network
56th IETF syslog WG Chair: Chris Lonvick
Time Synchronization Protocols and Security
Living in a Network Centric World
Living in a Network Centric World
Joint TICTOC and NTP Meeting
draft-ietf-geopriv-lbyr-requirements-02 status update
Kerberos: An Authentication Service for Open Network Systems
MPA TM543Competitive Success/snaptutorial.com
Protocol for Carrying Authentication for Network Access - PANA -
Living in a Network Centric World
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Living in a Network Centric World
NTP and PTP Random Thoughts on Trade-offs and Scalability
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Joint NTP and TICTOC Meeting
Living in a Network Centric World
Presentation transcript:

Time Synchronization Protocols and Security IETF tictoc working group 28 July 2011 Karen ODonoghue

Agenda What has been done thus far? What are the basic aspects of the discussion around time/security? What are the potential types of security services?

Summary of initial survey Does the application require security? (if so, which one: authentication, encryption, traceability, others): –No – assuming a private network 6 flavors of cellular backhauling Circuit emulation –No answer –Possibly systems with legal requirements Test and Measurement –Sometimes authentication ToD / Internet –Authentication and encryption Sensor networks Requirements matrix –client authentication, server authentication, transaction auth, intermediate device auth

Different aspects of the discussion What are the threats that need to be addressed for the synchronization protocol? (and thus what security services need to be provided?) What external security practices impact the security and performance of time keeping? (and what can be done to mitigate these impacts?) What are the security impacts of time synchronization protocol practices? (e.g. on-the-fly modification of timestamps) What are the dependencies between other security services and time synchronization?

Possible Security Services Authentication –Server/master authentication –Client/slave authentication –Intermediate device authentication –Transaction authentication Confidentiality –Data Encryption Traceability timestamps

Next Steps Additional volunteers to work on the document