March 7, 2008Security Proposal 1 CCSDS Link Security Proposal Ed Greenberg Greg Kazz Howard Weiss March 7, 2008.

Slides:



Advertisements
Similar presentations
How Updated CCSDS Protocols can Simplify Data Formatting for the Constellation Project Ed Greenberg Greg Kazz.
Advertisements

IPv4 - The Internet Protocol Version 4
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
Secure Socket Layer.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Space Data Link Security Protocol Compatibility with other standards Bruno Saba DCT/TV/IN 26/10/2010.
SDLS impact on TM, AOS, TC Space Data Link Protocols Greg Kazz NASA/JPL Oct 16/17, 2012.
A General Purpose CCSDS Link layer Protocol Next Generation Data Link Protocol (NGDLP) Ed Greenberg Greg Kazz 10/17/
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Stream Control Transmission Protocol 網路前瞻技術實驗室 陳旻槿.
Source Port # (16)Destination Port # (16) Sequence Number (32 bits) Acknowledgement Number (32 bits) Hdr Len (4) Flags (6)Window Size (16) Options (if.
THE USE OF IP ESP TO PROVIDE A MIX OF SECURITY SERVICES IN IP DATAGRAM SREEJITH SREEDHARAN CS843 PROJECT PRESENTATION 04/28/03.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
Internet Protocol (IP)
1 Kyung Hee University Chapter 7 Internet Protocol Version 4 (IPv4)
Unified Frame Format Next Generation Data SpaceLink Protocol (NGSLP) Ed Greenberg Greg Kazz 2/20/
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Next Generation Space Link Protocol – Raison d’etre Greg Kazz Ed Greenberg SLS-SLP WG Fall 2013 CCSDS Meeting - San Antonio, TX, USA.
TCP/IP Protocols Contains Five Layers
CCSDS Security WG meeting October 2008, hosted by DLR at DIN premises (Berlin) 1 Data Link Security BOF An ESA contribution on Lessons Learned and Issues/Questions.
CCSDS Unified Space Data Link (USLP)
Karlstad University IP security Ge Zhang
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
FSH/security SLS-SLP fall2009 (version 4) Page 1 Security Headers + Homogeneous approach to FSH and Insert Zone in TM/AOS/TC frames: some problems and.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Proposal for a TC-2 Protocol Ed Greenberg Greg Kazz Oct /27/20151.
Samples of Descriptive Problems CSC/ECE 573, Sections 001 Fall, 2012.
SDLS Protocol Padding concept Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Chapter 27 IPv6 Protocol.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Seeking a General Purpose CCSDS Link layer Protocol Next Generation Data Link Protocol (NGDLP) Ed Greenberg Greg Kazz 5/1/2012 5/1/12 Proposed Universal.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
Proposal for a Proximity-2 Protocol Ed Greenberg Greg Kazz May /11/20161.
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
Space Data Link Secure Protocol Interoperability Testing Interfaces Definition Proposal Bruno Saba DCT/TV/IN 26/04/2010.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Figure 2-6: Internal Organization of Protocol Entity (Sending End) Figure 4-14: Internal Organization of Protocol Entity (Sending End) MAP Packet Service.
Packet Service Packet Extraction VC Access Service VC_FSH Service VC Frame Service MC_Insert Service MC Frame Service MC_OCF Service Virtual Channel Reception.
Why we need USLP Greg Kazz Ed Greenberg November 9-10, 2014 CCSDS Fall London Question: Why the change of name from NGSLP to USLP? Answer: 1) In time the.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
CCSDS Telecommand Sync and Channel Coding Specification using advanced Block Codes Ed Greenberg NASA/JPL Oct. 15,
Why we need USLP Greg Kazz Ed Greenberg November 9-10, 2014
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSecurity.
Bruno Saba DCT/TV/IN 26/04/2010
Transfer Frame Structures
Figure 2-6: Internal Organization of Protocol Entity (Sending End)
How Updated CCSDS Protocols can Simplify Data Formatting for the Constellation Project Ed Greenberg Greg Kazz.
Unified Frame Format Next Generation Data SpaceLink Protocol (NGSLP)
Seeking a General Purpose CCSDS Link layer Protocol Next Generation Data Link Protocol (NGDLP) Ed Greenberg Greg Kazz 5/1/2012 5/1/12 Proposed Universal.
Next Generation Space Link Protocol – Raison d’etre
IPSec IPSec is communication security provided at the network layer.
CCSDS Link Security Proposal
Ed Greenberg Greg Kazz 10/17/2012
Internet Protocol Version4
Internet Protocol (IP)
Chapter 7 Internet Protocol Version 4 (IPv4)
Presentation transcript:

March 7, 2008Security Proposal 1 CCSDS Link Security Proposal Ed Greenberg Greg Kazz Howard Weiss March 7, 2008

Security Proposal 2 Objective Define a security protocol shim that can be incorporated into all the CCSDS TM, TC and AOS link protocols. The protocol should utilize a commercial security protocol that is analogous to that used for IPsec. The security protocol should be capable of protecting the contents of the frame as required –1. Encrypting traffic ( so it cannot be read by parties other than those for whom it is intended ) –2. Integrity validation ( ensuring traffic has not been modified along its path ) –3. Authenticating the peers ( ensuring that traffic is from a trusted party ) –4. Anti-replay ( protecting against replay of the secure session )

March 7, 2008Security Proposal 3 Method for including Security in CCSDS Frames Frame Header Security Header Optional Trailers i.e. CLCW, CRC Current Std Frame Header Optional Trailers i.e. CLCW, CRC Proposed Std Frame Data Contents 1.A flag bit in the Primary header of the frame identifies the presence of a secondary header. A “Security” secondary header shall be defined to enable this process. 2.The frame processing, except for data content parsing, can be accomplished without decryption allowing frame validation checking using CRC and use of CLCW for COP services. CLCW could optionally be included within encrypted data region if desired for missions that perform the COP at the POCC not at the station. 3.Security is applied by frame maker and decryption/authentication occurs at frame’s user 4.The Security process utilizes data fields in the primary and security headers Note: The TC and AOS specifications should be modified by converting a spare bit to signal the presence of the secondary (security) header. encrypted

March 7, 2008Security Proposal 4 CCSDS Frame Formats TM transfer Frame Primary Header AOS Header Transfer Frame Secondary Header SSVD Spare Flags TC transfer Frame Primary Header SSVD Spare Flags Note: Yellow area in each Frame type is used to flag that a security secondary header is included which immediately follows the primary header.

March 7, 2008Security Proposal 5 What’s needed in the Security Header? Conform to the CCSDS definition of Secondary header in TM spec –1 byte that contains Version and Length plus a second byte that identifies the secondary headers structure Should we provide for multiple “secondary” headers? –A Flag bit to indicate that another secondary header could be included signaling another header Need to Identify this Secondary Header as the Security Header –The TM specification requires that 255 secondary headers can eventually be identified Is there any data required for associating the sender and receiver –The S/C Id in primary header ties the S/C POCC to the S/C is that enough? –Should their be multiple associations for a single S/C ( i.e. different users on S/C) ? Provide a Security Sequence Number Field to prevent replay –How big and fixed or provide length and value fields? Identify Encryption Protocol being used per the private agreements –How many encryption protocols should we provide for? –Encryption protocol should be a protocol that is recommended by CCSDS for this purpose Identify Authentication Protocol being used per the private agreement –How many authentication protocols should we provide for? –Authentication protocol should be a protocol that is recommended by CCSDS for this purpose Provide for the Authentication Data field ( when used ) –Does a defining length field for this purpose need to be to included in header? Provide for padding (if required) –Does the defining length field for this purpose need to be included in header?

March 7, 2008Security Proposal 6 An Example Security Header Note: Combination of S/C ID a VC ID could be used to identify different security pairs Use TM specified Secondary Header form which provides for multiple secondary header types. –Version ID ( 2 bits ) –Length of Secondary Header ( 6 bits ) Identify this Secondary Header as the Security Header ( 8 bits ) Flag that another “Secondary” header follows ( 1 bit ) Length of Sequence Number Field ( 3 bits provides for a 0-7 byte sequence number field ) Identify Encryption Protocol Field ( 2 bits ) –Zero value means no encryption performed? Identify Authentication Protocol Field ( 2 bits ) –Zero value means no authentication included? Security sequence number length ( variable per value in Sequence length Field ) Authentication Data field ( fixed by chosen Authentication Protocol ) Version Secondary Header Length Additional Secondary Hdr Follows Header Type Encryption Protocol Authentication Protocol Length of Sequence Number Sequence Number Authentication Field Bits 8 26Variable 1 322Fixed by Algorithm Bytes111Variable

March 7, 2008Security Proposal 7 M_PDU Hdr 4 byte (64 symbol) [ ASM is synchronization for Codeblock, Frame ] 6 byte AOS Header –6 byte Primary Header S/C id ---- used for Layer 2 routing recipient VC id identifies frame structuring and possibly VC originator Added Flag bit is set to 0 to identify no secondary (Security) Header included 2 byte MPDU Header [ location of first byte of first packet header in IP Data Container Field ] Packet Data field ASM AOS Hdr ( see below ) Packet Data Field 4 6 Supportable Frame Formats-Forward AOS: Example-1- No Insert Zone, No Encryption 2Codeblock length -8 (i.e. 120 for 1k LDPC or 504 for 4k LDPC)

March 7, 2008Security Proposal 8 2 byte ASM 6 byte TC Header –S/C id ---- used with VC id for Layer 2 routing recipient –VC id identifies frame structuring and possibly VC originator –Added Flag bit is set to 0 to identify no secondary (Security) Header included TC Data Contents field CRC ASM TC Hdr ( see below ) Packet Data Field 2 6 Supportable Frame Formats-Forward TC: Example-2- No Encryption CRC

March 7, 2008Security Proposal 9 2 byte 6 byte TC Header –S/C id ---- used with VC id for Layer 2 routing recipient –VC id identifies frame structuring and possibly VC originator –Added Flag bit is set to 0 to identify the absence of a secondary Header TC Data field CRC ASM TC Hdr ( see below ) Packet Data Field 2 6 Supportable Frame Formats-Forward TC: Example-2a- With Encryption CRC Security Header Encrypted Zone

March 7, 2008Security Proposal 10 M_PDU Hdr 4 byte (64 symbol) 6 byte AOS Header –S/C id ---- used with VC id for Layer 2 routing recipient –VC id identifies frame structuring and possibly VC originator –Added Flag bit is set to 1 to identify secondary (Security) Header present Security Header 2 byte MPDU Header [ location of first byte of first packet header in IP Data Container Field ] Packet Container ASMAOS Hdr Security Header Packet Data Field 46 Supportable Frame Formats-Forward AOS: Example-3 Security with no Insert Zone Encrypted Data Zone

March 7, 2008Security Proposal 11 M_PDU Hdr 4 byte (64 symbol) [ ASM is synchronization for Codeblock, Frame, Cipher ] 6 byte AOS Header –S/C id ---- used with VC id for Layer 2 routing recipient ( i.e. different agency labs on ISS ) –VC id identifies frame structuring (include voice or not) and VC originator –Added Flag bit is set to 0 to identify the absence of a secondary Header Insert Zone [ size identified by VC id ] –Security Header included by management –3 byte Command Field option for Low latency or Hardware Command –61 bytes Voice ( contains up to 60 bytes of Voice ) 1 byte Voice Insert Header –Selected voice channel ID –Number of valid Codec data chunks inserted in Voice field ( each chunk=10 bytes ) 60 bytes Operational Voice Codec “Chunks” –Can contain up 6o 2-10ms Codec chunks –Delivery not dependent on Router or LAN 2 byte MPDU Header [ location of first byte of first packet header in IP Data Container Field ] Packet Data field [ size identified by VC id ] ASMAOS Hdr Security Hdr Insert Zone Cmd Packet Data Field 46 Encrypted Data Contents allows use of IP without IPSec Supportable Frame Formats-Forward AOS: Example-4 Security within Insert Zone ( 4k LDPC at 72kbps ) 2 3 Encrypted Data Zone Voice 61

March 7, 2008Security Proposal 12 4 byte (64 symbol) [ ASM is synchronization for Codeblock, Frame, Cipher ] 6 byte TM Header –6 byte Primary Header S/C id ---- used with VC id for Layer 2 routing recipient VC id identifies frame structuring ( include voice or not ) and VC originator Secondary Header Flag bit is set to 1 to identify presence of secondary Header Secondary Header (Security Shim) –Security Header Optional Additional Secondary Header –Up to 64 bytes in length Content field [ structure identified by VC id ] ASMTM Hdr Security Hdr Frame Data Field 46 Supportable Frame Formats-Return TM: Example - 6 With Security Encrypted Data Zone Optional CLCW 4 Optional added Secondary Hdr