“Secure” migration to host identity based networks Kristian Slavov, Patrik Salmela Ericsson Research, NomadicLab NordicHIP 9.10.2007.

Slides:



Advertisements
Similar presentations
Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
Advertisements

Internet Protocol Security (IP Sec)
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Secure Network Bootstrapping Infrastructure May 15, 2014.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Yuan, Tein Horng Academia Sinica Computing Centre 13 June 2003.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 Internet Networking Spring 2004 Tutorial 1 Subnetting and CIDR Proxy ARP.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
Circuit & Application Level Gateways CS-431 Dick Steflik.
1 Reminding - ARP Two machines on a given network can communicate only if they know each other’s physical network address ARP (Address Resolution Protocol)
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Enabling Secure Internet Access with ISA Server.
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Naming Examples UUID (universal unique ID) – 128 bit numbers, locally generated, guaranteed globally unique Uniform Resource Identifier (URI) URL (uniform.
Re-thinking Security in Network Mobility Jukka Ylitalo Ericsson Research NomadicLab NDSS '05 Workshop - February 2.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Prefix Delegation Protocol Selection T.J. Kniveton MEXT Working Group IETF 70 - December ’07 - Vancouver.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Building Security into Your System Bill Major Gregory Ponto.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Academia Sinica Grid Computing Certification Authority (ASGCCA)
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
HIP proxy Patrik Salmela Contents Background: ID-locator split HIP Why a HIP proxy Functionality of a HIP proxy The prototype.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Grid technology Security issues Andrey Nifatov A hacker.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Introduction to Active Directory
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Fall 2006CS 395: Computer Security1 Key Management.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Example security systems n Kerberos n Secure shell.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
HIP-Based NAT Traversal in P2P-Environments
P2P Streaming for Mobile Nodes: Scenarios and Related Issues
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
* Essential Network Security Book Slides.
Message Digest Cryptographic checksum One-way function Relevance
Firewalls Purpose of a Firewall Characteristic of a firewall
Building Security into Your System
Presentation transcript:

“Secure” migration to host identity based networks Kristian Slavov, Patrik Salmela Ericsson Research, NomadicLab NordicHIP

Assumptions Host Identity based network Hosts in the network utilise host identity binding protocols for communications Hosts in the network utilise host identity binding protocols for communications HIP, NodeID HIP, NodeID Legacy host Doesn’t support used communication protocols Doesn’t support used communication protocols Cannot address all hosts due to complex global network Cannot address all hosts due to complex global network Need to authenticates to the network Need to authenticates to the network

Problems Legacy host How to connect to a host not necessarily reachable via legacy techniques? How to connect to a host not necessarily reachable via legacy techniques? Peer host How to identify and authenticate the client? How to identify and authenticate the client? What is required? Security features, network protocol agility, name resolution Security features, network protocol agility, name resolution

HIP Proxy Basically a simple proxy Store-(modify)-forward Store-(modify)-forward Can do name resolution for the client host Can do name resolution for the client host Additional features Can create HIP connections on behalf of the legacy host Can create HIP connections on behalf of the legacy host Creates temporary host identities for legacy hosts Enables a mobile sub-network

Legacy Authentication Service Understands legacy authentication procedures SIM, HTTP-Digest, etc. SIM, HTTP-Digest, etc. Stores (host) identities for subscribed users AuC, AAA, etc. AuC, AAA, etc. Issues binding certificates for temporary and permanent (host) identities.

λ*λ* β β*β* LAS HIP Proxy Legacy host performs network attachment. HIP Proxy generates temporary identity for the legacy proxy. α*α*

λ*λ* β β*β* LAS HIP Proxy Legacy host authenticates itself to the network. A HIP connection is established between HIP proxy and the authentication server. α*α*

λ*λ* β β*β* LAS HIP Proxy As a result LAS creates identity binding certificate for the HIP proxy. α*α* α β

λ*λ* β β*β* LAS HIP Proxy Traffic sent by the legacy host is intercepted at the HIP proxy. New HIP association is created using identity certificate provided by the LAS. α*α* α β

Recap HIP Proxy creates temporary host identity to a legacy host Legacy host authenticates to LAS LAS negotiates with HIP Proxy and issues a certificate binding temporary identity and permanent identity together. Legacy host initiates connection to a peer host HIP Proxy intercepts, runs connection establishment protocol with the peer host using identity certificate Traffic flows between legacy host and peer host

Weaknesses Network access divided into two parts with different (security) properties access network (i.e. legacy host to HIP proxy) access network (i.e. legacy host to HIP proxy) core network (i.e. HIP proxy to peer host) core network (i.e. HIP proxy to peer host) Access network is insecure Security depends on the legacy host Security depends on the legacy host Identification in the access network Identification in the access network

Security problems HIP proxy Uses legacy host’s identity to do bad things Uses legacy host’s identity to do bad things Target for hacking attacks Operators may certify HIP proxies Operators may certify HIP proxies LAS configured to issue identity binding certificates only to trusted HIP proxies Certificate revocation Lifetimes Lifetimes The peer host must explicitly check from the CA The peer host must explicitly check from the CA The peer host could subscribe for revocation info at the LAS of the certificate Name resolution No DNSSEC or alike No DNSSEC or alike HIP proxy needs to tamper the DNS queries/replies

Conclusion Allows legacy hosts to communicate with “full-featured” hosts Allows the peer hosts to associate the legacy host with proper host identity Allows certain type of network mobility for legacy hosts An opportunistic security solution