TCP-AO Key Management Sandra Murphy

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
H. 323 Chapter 4.
Leveraging Good Intentions to Reduce Unwanted Network Traffic Marianne Shaw (U. Washington) USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on.
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
CCNA – Network Fundamentals
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Fundamentals of Computer Networks ECE 478/578 Lecture #20: Transmission Control Protocol Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
10. UDP/TCP WWW page: Text book: Mastering Networks (Chapter 10) Network IP protocol is routes the data.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
Security implications of Network Address Translators (NATs) (draft-gont-behave-nat-security) Fernando Gont Pyda Srisuresh UTN/FRH EMC Corporation 76th.
Header and Payload Formats
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Gursharan Singh Tatla Transport Layer 16-May
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Bootstrap and Autoconfiguration (DHCP)
1 Transport Layer Computer Networks. 2 Where are we?
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 26.
Transport Layer: UDP, TCP
Transport Layer: TCP and UDP. Overview of TCP/IP protocols Comparing TCP and UDP TCP connection: establishment, data transfer, and termination Allocation.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
TCP/IP Protocols Contains Five Layers
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
C-FIND Performance Issues. Multiple Patient IDs PACS increasingly have records transferred between facilities (IHE and otherwise) Transferred patient.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Chapter 2 Applications and Layered Architectures Sockets.
2000 년 11 월 20 일 전북대학교 분산처리실험실 TCP Flow Control (nagle’s algorithm) 오 남 호 분산 처리 실험실
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
Chapter 9: Transport Layer
Multipath TCP ACM Queue, Volume 12 Issue 2, pp. 1-12, February 2014 Christoph Paasch and Olivier Bonaventure University College London 1.
Multipath TCP Signaling Options or Payload? Costin Raiciu
MPTCP Protocol draft-ietf-mptcp-multiaddressed-02 Update and Open Issues Alan Ford IETF79 – Beijing 1.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
© 2002, Cisco Systems, Inc. All rights reserved..
K. Salah1 Security Protocols in the Internet IPSec.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
Cryptography CSS 329 Lecture 13:SSL.
1 Transmission Control Protocol (TCP) RFC: Introduction The TCP is intended to provide a reliable process-to-process communication service in a.
19 March 2003Page 1 BGP Vulnerabilities Draft March 19, 2003 Sandra Murphy
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Chapter 9: Transport Layer
Port Scanning James Tate II
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
Instructor Materials Chapter 9: Transport Layer
5. End-to-end protocols (part 1)
Chapter 17 and 18: TCP is connection oriented
TCP.
TCP - Part I Karim El Defrawy
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Transport Protocols: TCP Segments, Flow control and Connection Setup
Computer Networks Protocols
Presentation transcript:

TCP-AO Key Management Sandra Murphy

What TCP-MD5 Did Wrong Uses an un-sophisticated MAC technique (suffix only) No algorithm agility –… and uses MD5 No KeyID – rekey during connection difficult Options excluded

TCP-AO Goals IETF standard authentication mechanism Algorithm agility Re-key during connection Cover TCP options (optionally) Miserly use of option bytes –No parameter representation in-stream Compatible with TCP operation –Order independent; no TCP state machine changes Use is independent between inbound/outbound (Initial) coexistence with TCP-MD5 –But no upgrade to TCP-AO within connection

Key Management in TCP-AO Key management is a separate protocol; not in- band because: –Option space has little room for negotiation –Removes need to deal with TCP retransmission, etc. Key used determines algorithm and any needed parameters –Implies that parameter change induces key change No KeyID required, but KeyID allowed in order to permit key overlap in re-key during connection

Key Establishment A new key is established on each new connection attempt A matter of intense discussion –BAD Present operation uses manual keys – and will still be doing so when TCP-AO is deployed Multiple connections during instability (links/neighbors) might run through the list of configured keys – making a bad situation worse –GOOD While common advice is to randomize ports and ISN in the SYN, nothing in TCP at the receiver prevents/prohibits/detects re-use So if keys are not changed for every connection, replay of an old SYN could restart connection or under the wrong conditions abort an existing connection Must deal with operational concerns -- some way to produce “enough” manual keys?

Key Management Roles Key Manager –Responsible for initial key establishment on connection startup, create/delete TSAD entry TCP-AO choice could be application request or policy control –Responsible for re-keying and TSAD update On external signal, policy, and/or communication from TSAD TSAD ( TCP Security Association Database ) –Holds/archives key tuples for each direction of connection TCP –Communicates with Key Manager on connection state change (at least on open and transition to Closed) –Communicates with TSAD to retrieve key tuples on segment transmission and receipt –Performs validation with keys retrieved

TSAD Could be part of TCB, could be separate Indexed by connection ID (“socket pair”) Entry contains (separate for inbound/outbound): –Option exclusion list –Zero or more key tuples Zero means TCP-AO not used –Each tuple includes KeyID(optional), MAC, key length, key If there is no KeyID on any tuple, there is only one tuple MAC type can be NONE (indicating no TCP-AO) No overlap of KeyIDs (i.e., if parms change, key changes)

TCP Interactions with Key Mgmt On OPEN (or LISTEN on SYN receipt?) –Request key establishment from Key Manager On transition to CLOSED after CLOSE or ABORT call –Archive TSAD entry to cache (for later check for key reuse)

TCP Interactions with Key Mgmt On segment transmit –Request tuple from TSAD (including # bytes to process) If no TSAD entry, no key tuples or MAC of NONE, send w/o TCP-AO option Otherwise, perform MAC and add TCP-AO On segment receipt –Request tuple from TSAD (including # bytes to process) Various considerations of tuple exists or not, MAC is NONE or not, TCP-AO is present or not, where most errors result in silent drop or silent accept Validation failures are silently dropped (& indicated to TSAD?) –Process segment as usual (in window, etc.) No pre-processing to avoid exhaustion from spoofed packets