Security Area Advisory Group 9 November 2006 Russ Housley Sam Hartman.

Slides:



Advertisements
Similar presentations
1 ISMS WG 79th IETF Beijing November 10, 2010 Goal:Creating a security model for SNMPv3 that will meet the security and operational needs of network administrators.
Advertisements

Provision of Symmetric Keys (KEYPROV) WG Thursday, July 30, 2009 Morning Session I Todays presentations available at:
Transport Layer Security (TLS) IETF-76 Chairs Joe Salowey Eric Rescorla
ABFAB for Internet-of-Things Rhys Smith, Janet Sam Hartman & Margaret Wasserman, Painless Security.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 5 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.
SIPPING IETF51 3GPP Security and Authentication Peter Howard 3GPP SA3 (Security) delegate
1 ITEC 809 Securing SIP in VoIP Domain Iyad Alsmairat Supervisor: Dr. Rajan Shankaran.
Lecture 22 Internet Security Protocols and Standards
LTANS WG Meeting July 30, IETF 78 – Maastricht Tobias Gondrom Carl Wallace.
Protected Extensible Authentication Protocol
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
NEA Working Group IETF meeting Nov 17, 2011 IETF 82 - NEA Meeting1.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
The IRTF Promoting Research for the Evolution of the Future Internet Cees de Laat chair AAAARCH-Research Group Utrecht University.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
CAPWAP Overview Saag Presentation 65 th IETF 23 March 2006 Scott G. Kelly T. Charles Clancy
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
MASS / DKIM BOF IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass MIPA.
Doc.: IEEE /0394r0 Submission March 2008 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
Proposed Transport Layer Security (TLS) Evidence Extensions Russ Housley IETF 67 – TLS WG Session.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Transport Layer Security (TLS) IETF-72, Dublin July 27, 2008 Chairs: Eric Rescorla Joseph Salowey.
EAP Method Update (EMU) IETF-79 Chairs Joe Salowey Alan DeKok.
Maryland Information Systems Security Lab D EPARTMENT OF C OMPUTER S CIENCE EAP Password Authenticated eXchange (PAX) T. Charles Clancy William A. Arbaugh.
IETF-64 DKIM BoF BoF Chairs Stephen Farrell Barry Leiba Domain Keys Identified Mail draft charter, mailing.
Copyright 2002, USC/ISI. All rights reserved. Kerberos Clarifications and Extensions Status Dr. Clifford Neuman Center for Computer Systems Security Information.
NEA Requirements Update -06 version summary. Posture Transport Considerations Issue –Ability of existing protocols used for network access to meet requirements.
EAP Method Update (EMU) IETF-80 Chairs: Joe Salowey Alan DeKok.
Guidelines for Cryptographic Algorithm Agility Russ Housley IETF 89 - SAAG Session.
LTANS service and protocol Carl Wallace (on behalf of Peter Sylvester) 6 Aug 2004, 60th IETF, San Diego.
Network Structures WG Paul Griffin 13 January 2006.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
LTANS WG: ERS November 7, 2005 Tobias Gondrom. LTANS WG (ltans): ERS Draft straightened up Corrected ERS (feedback from Peter and Carl) Prepared for WG.
Secure Multipart Internet Mail (S/MIME) Working Group Tuesday, July 24, 2007 Afternoon Session III
Security Area Advisory Group Tim Polk Sean Turner July 29, 2010.
Key Management in AAA Russ Housley Incoming Security Area Director.
Long-term Archive and Notary Services (LTANS) Working Group Charter Review.
Transport Layer Security (TLS) Chairs: Eric Rescorla Joe Salowey.
Public Key Infrastructure Using X.509 (PKIX) Working Group March 20,
IETF sec - 1 Security Work in the IETF Scott Bradner Harvard University
IETF 78 Maastricht 27 July 2010 Josh Howlett, JANET(UK)
March 2008IETF KMART BoF1 KMART BOF Key Management for Routing Co-Chairs: Acee Lindem Donald Eastlake 3rd
Transport Layer Security (TLS) IETF-84 Chairs: Eric Rescorla Joe Salowey.
Transport Layer Security (TLS) IETF 73 Thursday, November Chairs: Eric Rescorla Joe Salowey.
Long-term Archive and Notary Services (LTANS) Working Group.
Transport Layer Security (TLS) IETF-78 Chairs Joe Salowey Eric Rescorla
7 November 2005IETF-64 Joint APP-TSV Area Meeting Jabber Room: Ted Hardie Scott Hollenbeck Allison Mankin Jon Peterson.
S/MIME Working Group Status Russ Housley November 2002 PLEASE SIGN THE BLUE SHEET.
Security Area Advisory Group Sam Hartman Tim Polk July 26, 2007.
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
1 SECMECH BOF EAP Methods IETF-63 Jari Arkko. 2 Outline Existing EAP methods Technical requirements EAP WG process for new methods Need for new EAP methods.
Long-term Archive and Notary Services (LTANS) Working Group.
IETF-84 EMU TEAP Updates Nancy Joseph Salowey Hao Zhou
11/20/2002AAA Agenda- IETF 55 Atlanta1 Authentication, Authorization, Accounting (AAA) WG Chairs: Bernard Aboba Dave Mitton.
IETF Provisioning of Symmetric Keys (keyprov) WG Update WG Chairs: Phillip Hallam-Baker Hannes Tschofenig Presentation by Mingliang Pei 05/05/2008.
SASL GSS-API Bridge: GS2
Public Key Infrastructure Using X.509 (PKIX) Working Group
IETF Provisioning of Symmetric Keys (keyprov) WG Update
August 1, 2005 Carl Wallace & Tobias Gondrom
The Tunneled Extensible Authentication Method (TEAM)
Addressing security challenges on a global scale
Presentation transcript:

Security Area Advisory Group 9 November 2006 Russ Housley Sam Hartman

Agenda ● WG Reports ● BOF Reports ● Invited Presentations – Embedding Security Knowledge in RFCs (Venkat Pothamsetty) – Real Attacks and Threat Models (Steve Bellovin) – How Not To Protect PC’s From Power Analysis (Russ Housley on behalf of Adi Shamir) ● Open Microphone

EMU (EAP Methods Update) ● Joe Salowey

MSEC (Multicast Security) ● Ran Canetti ● Lakshminath Dondeti

BTNS (Better-Than-Nothing Security) ● Love Hörnquist Åstrand ● Pekka Nikander

DKIM (Domain Keys Identified Mail) ● Stephen Farrell ● Barry Leiba

KRB-WG (Kerberos) ● Jeffrey Hutzelman

Kitten (GSS-API Next Generation) ● Jeffrey Altman

NEA ( Network Endpoint Assessment ) ● Steve Hanna ● Susan Thomson

HOKEY ( Handover Keying ) ● Charles Clancy ● Glen Zorn

SASL (Simple Authentication and Security Layer) ● Tom Yu ● Kurt Zeilenga

PKIX (Public-Key Infrastructure using X.509) ● Steve Kent ● Stefan Santesson

S/MIME (Secure MIME) ● Blake Ramsdell ● Sean Turner

ISMS (Integrated Security Model for SNMP) ● Juergen Schoenwaelder ● Juergen Quittek

LTANS (Long-Term Archive and Notary Services) ● Tobias Gondrom ● Carl Wallace

TLS (Transport Layer Security) ● Pasi Eronen ● Eric Rescorla

SPKM BOF (NFSv4 and Low Infrastructure Public Key Based GSS Security Mechanisms) ● Jeff Hutzelman

KeyProv (Provisioning of Symmetric Keys BOF) ● Phillip Hallam-Baker ● Susan Cannon

Invited Presentations ● Embedding Security Knowledge in RFCs – Venkat Pothamsetty ● Real Attacks and Threat Models – Steve Bellovin ● How Not To Protect PC’s From Power Analysis – Russ Housley on behalf of Adi Shamir

Open Microphone ● Concern? ● Issue? ● Plea for help? ● Soap box?