Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Call Server LIS VPC ESGW SR Manhattan PSAP LO=Wall St Route=Manhattan PSAP The Location Object (LO) is provided in the call setup information to the Call.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Out of Jurisdiction Emergency Routing draft-winterbottom-ecrit-priv-loc-01.txt James Winterbottom, Hannes Tschofenig, Laura Liess.
Authentication & Kerberos
Risks with IP-based Emergency Services draft-ietf-ecrit-trustworthy-location.
September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Emergency Services IAB Tech Chat 28 th February 2007 Hannes Tschofenig.
9,825,461,087,64 10,91 6,00 0,00 8,00 SIP Identity Usage in Enterprise Scenarios IETF #64 Vancouver, 11/2005 draft-fries-sipping-identity-enterprise-scenario-01.txt.
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
Trustworthy Location Information draft-tschofenig-ecrit-trustworthy- location draft-tschofenig-ecrit-trustworthy- location Hannes Tschofenig, Henning Schulzrinne.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
Applied Cryptography for Network Security
Identity in SIP (and in-band) STIR BoF Berlin, DE 7/30/2013.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Proxy Authentication of the Emergency Status of SIP Calls draft-barnes-ecrit-auth-00 Richard Barnes IETF 69, Chicago, IL, USA.
ECRIT interim meeting - May Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats Hannes Tschofenig Henning.
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
Ernst Langmantel Technical Director, Austrian Regulatory Authority for Broadcasting and Telecommunication (RTR GmbH) The opinions expressed in this presentation.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
1 A Path Forward on Identity Agreement on a problem space –We all agree that E.164 numbers don’t work well with RFC4474 –Less agreement about the requirements.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
STIR Charter (discussion) STIR BoF Berlin, DE 7/30/2013.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 21 Distributed System Security Copyright © 2008.
1 Location Hiding Henning Schulzrinne Laura Liess Hannes Tschofenig.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
SAML FTF #4 Workitems Bob Blakley. SAML “SenderVouches” SubjectConfirmation Method: A Proposed Alternative to Bindings 0.5 Proposals.
Payment in Identity Federations David J. Lutz Universitaet Stuttgart.
1 IETF 72 SIP WG meeting SIP Identity issues John Elwell et alia.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture 13 th April 2007, THE FIRST INTERNATIONAL WORKSHOP ON RESEARCH.
PAGE 1 A Firewall Control Protocol (FCON) draft-soliman-firewall-control-00 Hesham Soliman Greg Daley Suresh Krishnan
Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats-01.txt Hannes Tschofenig, Henning Schulzrinne, Murugaraj.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
Fall 2006CS 395: Computer Security1 Key Management.
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
Authentication Presenter Meteor Advisory Team Member Version 1.1.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
ECRIT - IETF 62 (March 2005) - Minneapolis 1 Requirements for Emergency Calling draft-schulzrinne-sipping-emergency-req-01 draft-ietf-sipping-sos-01 Henning.
ECRIT WG IETF-75 Trustworthy Location Bernard Aboba
Key management issues in PGP
12th April 2007, SDO Emergency Services Workshop 2007
Intrusion Tolerant Architectures
Carrying Location Objects in RADIUS
Digital Signatures A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make but.
Hannes Tschofenig, Henning Schulzrinne, Bernard Aboba
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Securing the CASP Protocol
Authors: Hannes Tschofenig Henning Schulzrinne Maarten Buechli
Emergency call assurance
Presentation transcript:

Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig

Acknowledgements I would like to thank the Geopriv/ECRIT interim meeting participants for their time to discuss the topics presented in this slide set. In particular i would like to thank Henning Schulzrinne, Ted Hardie, Andy Newton, Allison Mankin and Jon Peterson. The interim meeting minutes can be found at:

Background A lot of discussions at the Geopriv/ECRIT Interim Meeting (New York, May 2005): Denial of service prevention for Emergency Services Threat: End host lies about location information or replays it. Send emergency personnel to arbitrary place from everywhere in the world. Aspect has architectural relevance

Architectural Considerations (1/2) Network driven Approach Determine PSAP extract location+identity+… determine language determine media PSAP Phone 911 Contact PSAP 48° 49' N 2° 29' E  Paris fire department Distributed Directory Query / Response Protocol Fetch Location Assumption: Network intermediary is able to obtain location of end host. SIP Proxy

Architectural Considerations (2/2) End-Host driven Approach extract user location+identity+… determine language determine media PSAP Contact PSAP 48° 49' N 2° 29' E  Paris fire department Distributed Directory Query / Response Protocol determine PSAP location Phone Fetch Location

Observations Approach (1) requires that the network intermediary knows the end hosts location Some architectures separate between — Network Access Provider, — Internet Service Provider and the — Application Service Provider Application Service Providers often do not have the location of the end host. Location information obtained by an end host via GPS or from the network using DHCP is not cryptographically protected.

Denial of Service Threat (1/2) Adversary places an emergency call and attaches the wrong location information. Constraints: — Authentication and authorization for network access or emergency call cannot be mandated. Why to worry since this is already possible in today’s network? Not quite since you can use a public phone but you attach arbitrary location information. Additionally, non-voice calls should be also supported.

Goals Determine quality of emergency call in real-time (for ranking) [does not mean that the call is malicious if various security checks cannot be performed] Catch adversary (later; non real-time)

How to trace back the adversary? Depends how the adversary placed the emergency call: Authenticate emergency caller to PSAP: — Might require a public key infrastructure — Deployment concerns — Performance concerns Asserted identities: — Works with approach (1) (P-Asserted-ID) and — with approach (2) if you have a separate identity provider (SAML like scheme) IP address: — IP traceback mechanisms

How to determine trustworthiness of provided information? Information received by the PSAP should be correct. — At least not intentionally incorrect = modified by adversary. — Entity signing information is held responsible for it. Assumption: — Network access provider / internet service provider signs location information — Easier to setup public key infrastructure for usage between network access provider/ internet service provider and PSAP PSAP performs the following steps when receiving an emergency call: — path validation — digital signature verification — determine degree of trustworthiness into the network access provider and internet service provider Location signing and verifying is not a binary decision (location, signer, etc. plays a role)

How to determine trustworthiness of provided information? Challenges (1/2) Signing location information by the network access provider or internet service provider does not directly identify the end host (and the user) With typical network access authentication the user is not known to a visited network provider (although it could potentially be revealed in cooperation with the user’s home network). In some cases even with network access authentication the user cannot be traced back (e.g., pre-paid cards in some countries). Without network access authentication no information about the user is known. If some providers do not support location signing then the benefit it decreased.

How to determine trustworthiness of provided information? Challenges (2/2) Replay of signed location information is possible particularly if end hosts cooperate to mount an attack. How to prevent possible replays: — Bind it to the signaling session Easier with approach (1). (e.g., SIP: From, Contact, Date, Call- ID, etc.) — If asserted location is requested before starting the signaling session then replay protection is more difficult. Which field can you use? IP address (might not be reliable source if the end host is behind a NAT) Timestamp

Conclusion There are some basic assumptions that require further investigations. We need PSAP operators us to tell what they want! What is more important? — Asserted Location — Authenticated Identity Do you accept an emergency call* with asserted location but without an authenticated identity? Do you accept an authenticated emergency call* without an asserted location? Emergency specific authentication and authorization might be useful (=> new credentials required) * if the PSAP is under denial of service

Open Issues Is is sufficient for PSAP to verify that it was signed by a “known” entity? How large is the number of network or internet service providers? — Has an impact on likelyhood of trusting someone’s asserted location. What is the identity that is used in the certificates? (RFC 3770?) Is it possible to get another host’s location being signed? Can a provider be held responsible for something? OR Are network operators and internet service providers excited?