Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman

Slides:



Advertisements
Similar presentations
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
Advertisements

Router Identification Problem Statement J.W. Atwood 2008/03/11
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
ABFAB for Internet-of-Things Rhys Smith, Janet Sam Hartman & Margaret Wasserman, Painless Security.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Trust Router Overview IETF 86, Orlando, FL Trust Router Bar BOF Margaret Wasserman
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Key Negotiation Protocol & Trust Router draft-howlett-radsec-knp ABFAB, IETF March, Prague.
Computer Science 6390 – Advanced Computer Networks Dr. Jorge A. Cobb How to provide Inter-domain multicast routing? PIM-SM MSDP MBGP.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Adaptive Web Caching: Towards a New Caching Architecture Authors and Institutions: Scott Michel, Khoi Nguyen, Adam Rosenstein and Lixia Zhang UCLA Computer.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
ABFAB Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Multihop Federations & Trust Router draft-mrw-abfab-multihop-fed-02.txt draft-mrw-abfab-trust-router-01.txt Margaret Wasserman
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
The Zone Routing Protocol (ZRP)
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Common Devices Used In Computer Networks
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Interdomain multicast routing with IPv6 Stig Venaas University of Southampton Jerome Durand RENATER Mickael Hoerdt University Louis Pasteur - LSIIT.
Interdomain IPv6 multicast Stig Venaas UNINETT. PIM-SM and Rendezvous Points Interdomain multicast routing is usually done with a protocol called PIM-SM.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IPv6 Site-Local Discussion Bob Hinden & Margaret Wasserman IETF 56 San Francisco March 2003.
Spring 2004 Mobile IP School of Electronics and Information Kyung Hee University Choong Seon HONG
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Session Peering Use Cases for Federations David Schwartz – Kayote Networks Eli Katz - XConnect Jeremy Barkan - Digitalshtick draft-schwartz-speermint-use-cases-federations-00.txt.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
IP Multicast Receiver Access Control draft-atwood-mboned-mrac-req draft-atwood-mboned-mrac-arch.
Trust Router Overview IETF 86, Orlando, FL Routing Area Meeting Margaret Wasserman
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Port Based Network Access Control
Draft-howlett-abfab-trust-router-ps ABFAB, IETF83 Josh Howlett & Margaret Wasserman.
CLASSe PROJECT: IMPROVING SSO IN THE CLOUD Alejandro Pérez Rafael Marín Gabriel López
Chapter 5 Network and Transport Layers
Introduction to Windows Azure AppFabric
Debashish Purkayastha, Dirk Trossen, Akbar Rahman
Agenda retrospective - B. Aboba Lunch
Presentation transcript:

Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman

Why Am I Here? Presenting work that has been proposed in the ABFAB WG for Multihop Federations – Overall Multihop Architecture and Trust Router draft-mrw-abfab-multihop-fed-01.txt – Key Negotiation Protocol draft-howlett-radsec-knp-01.txt Not changing AAA protocols – Specifications compatible with Radius, RadSec and Diameter Here to get your feedback/comments

ABFAB Architecture

ABFAB architecture The ABFAB substrate provides four functions: – Transport: how messages are conveyed between client and server – Server discovery: how Relying Parties find a server in the Subject’s domain – Trust establishment: how the client/server establish confidence that they are talking to the right client/server. – Rules determination: how the client/server decide what they should infer from the messages, and how they should behave in that regime. Relying Party AAA server Relying party domain Identity Provider domain ABFAB substrate Subject AAA client

RADIUS Proxy Substrate – An authentication request will traverse a set of AAA proxies – Each AAA proxy knows how to forward the request Based on destination realm or hierarchical portion of the realm AAA client AAA server Relying party domain Identity Provider domain

Static configuration is simple… AAA client AAA server IETF 80 eduroam network JANET(UK) cz eu uk Send ‘ja.net’ towards destination ‘uk’

…until it isn’t. AAA client AAA server IETF 80 eduroam network JANET(UK).cz.eu.uk Send ‘ja.net’ towards destination ‘uk’ AAA client IETF 81 eduroam network.us.ca Send ‘ja.net’ towards destination ‘eu’

Static configuration doesn’t scale As an AAA system scales, you need to maintain more configuration across more nodes. The configuration is necessarily dissimilar between AAA nodes, but the entire system needs to behave as though all nodes share a consistent view of the entire system. Inconsistency may result in undesirable behaviour. Inventing an ad hoc solution within a single domain is trivial. The multi- domain case is also tractable, providing there is close coordination. However, if ABFAB is successful the potential number of domains and overall system size is considerable: coordination will be challenging. We need a standard mechanism that enables AAA nodes within a large and loosely-coupled AAA system to behave as though they share a consistent view of the entire system.

Introducing the Trust Router Serves a similar role to BGP in IP routing – Distributes information about available “Trust Links” within a federation (or “Policy Regime”) – Calculates a local tree of “Trust Paths” to reach destination realms – Determines the “best” path to reach each destination realm

Trust router protocol eu usca uk Announce eduroam: ja.net ja.net

Trust router RADIUS substrate Trust Router allows path selection through the AAA fabric But, static configuration is still required at each hop for trust establishment All AAA servers in the path can see session keys and, potentially, personal information such as real names AAA client AAA server Relying party domain Identity Provider domain

Well, we have RadSec… RadSec is Radius over TLS or DTLS Invoke PKI to banish hop-by-hop security; permits e2e trust establishment Knowing your peer explicitly may improve rules determination Other benefits: – Prevents exposure of information to intermediate AAA nodes – Reduces EAP transmission latency

A single PKI for ABFAB deployments? A PKI environment is a one-to-many relationship; good when you have uniform business requirements and a small number of certificate authorities However, a one-to-many relationship imposes costs (financial and operational) on all Relying Parties that may not match varied business requirements A one-to-one relationship allows the actors to agree to their mutual business requirements But pairwise credentials don’t scale, right?

Didn’t we just fix the multiple credential problem? We’ve just described a mechanism (ABFAB) that enables a single EAP credential to be used with all RPs that trust the EAP server An AAA server is just another RP, so let’s apply ABFAB to RadSec!

RadSec with ABFAB AAA client (EAP peer) AAA server (EAP authenticator) Relying party domain Identity Provider domain EAP server Allows trust to be established using ABFAB, not PKI However, not all AAA clients and AAA servers in a large federation will be connected via a single EAP server ABFAB EAP credential AAA credential

Key Negotiation Protocol KNP enables a RadSec client and server to dynamically establish a short-lived credential for a subsequent RadSec connection. KNP uses EAP authentication of credentials issued to the AAA client by an EAP server that is also trusted by the AAA server. The EAP server is called the ‘Introducer’. The process of establishing the RadSec credential between AAA client and server is called ‘Introduction’.

KNP Introduction AAA client (EAP peer) AAA server (EAP authenticator) Relying party domain Identity Provider domain Introducer (EAP server) When an AAA Client and a AAA Server are connected via a single KNP Introducer, this is referred to as a Trust Link KNP Introduction

Transitive operation Not all AAA nodes share a common Introducer. An Introducer can also be party as AAA client or server to an Introduction. This enables transitive introduction: the AAA client recurses along a path of Introducers to the AAA server.

Transitive Use of KNP AAA client AAA server Relying party domain Identity Provider domain Introducer When a AAA Client can reach a AAA Server through a chain of KNP Introducers, this is a Trust Path How does the RP know what path to traverse? It asks it’s local Trust Router! Introducer K1 K2 K3

Trust Path A Trust Path is a series of KNP hops that can be used to reach a AAA server in a destination realm Each KNP hop is called a Trust Link Shown as series of realms and types, connected by arrows – Currently defined types are Trust Router (T) or AAA Server (R) – Example: A -> B(T) -> C(T) -> D(T) -> D(R)

Trust Router Functions Trust Router Protocol – Distributes information about available Trust Links in the network – Calculates a tree of Trust Paths to reach target destinations Trust Path Query – Provide “best” path to a destination realm in response to queries from local RPs Temporary Identity Request – Provision temporary identities that RPs can use to reach the next hop in the Trust Path, in response to KNP requests from RPs – AKA, serve as a KNP Introducer

Trust Router Protocol Exchange information about Trust Links between Trust Routers – Trust Links are unidirectional and of a specific type A -> B(T) does not imply A -> B(R), B -> A(T) or B -> A(R) – Realm names are not necessarily hierarchical, but they may be example-u.ac.uk is not necessarily reached via.uk or.ac.uk Tree of available Trust Paths rooted in local realm is calculated by each Trust Router

Trust Path Query Generated by an RP to request a Trust Path to reach a AAA server in a destination realm When a Trust Path Query is received, the Trust Router: – Authenticates the RP, and checks local policy to determine whether or not to reply – Searches its tree of Trust Paths to find the best path to reach the destination – Returns the best path, if found, to the RP

Temporary Identity Request The RP issues a Temporary Identity Request to obtain an identity that will be used to traverse each link in the Trust Path – The existence of the Trust Link implies that a Temporary Identity Request will be granted

Trust Router Protocol ABFAB Multihop Federation AAA client AAA server Relying party domain Identity Provider domain Introducer Uses ABFAB, KNP and Trust Routers to allow RPs to reach AAA Servers in all destination realms that can be reached through a transitive Trust Path across the federation Minimal per-hop configuration, as needed to define one- to-one trust relationships and express local policy Introducer K1 K2 K3

Questions? Feedback? Questions about what we are proposing? Feedback on this proposal? discussion to

BACKGROUND SLIDES

Concerns about PKI for ABFAB PKI makes sense where you have uniform business requirements and a small number of certificate authorities (ideally one) However, ABFAB federations are often composed of entities with different security requirements Multiple trust authorities may be needed to support certification within regional, legal or organizational boundaries. – To comply with different local laws – To allow local authorities within a country or continent – Some organizations may demand local control

Multiple Business Requirements May require multiple types of certificates – Financial costs (to purchase certificates, software, etc.) – More complex, longer registration/enrollment, limited by CA policies – Increased administrative and support complexity (e.g. knowing which certificates are valid for what) Or force fit all requirements to a single certificate type – Match lowest security requirements, to reduce costs May compromise security for RPs with higher security requirements Lower than ideal security – - e.g. People may use existing certificates for new applications, even when they aren't a good fit for the security requirements – Or match highest security requirements Imposes higher then justified cost on RPs with less stringent security requirements More complex, longer registration/enrollment, limited by CA policies Some RPs may not be able to meet stringent requirements, which leads to lower than ideal security – e.g. People may bypass the PKI for things

Multiple CAs High cost to establish procedures for cross/multi-CA trust – Establishing cross-CA policy is time-consuming and expensive – May include requirements for cross-CA auditing Leads to more complex, more costly registration procedures – May be union of security requirements of all CA – Some RPs may not be able to meet stringent requirements, which leads to lower than ideal security e.g. People may bypass the PKI for things that don't fit the CA policies Security of the overall system depends on the weakest link

Why is Trust Router/KNP Better? Each Trust Router peering is a separate business relationship – Relationship is negotiated between two parties – Parties can control their own costs