The Integration of the Bundle Security Protocol Features into DTN2 Walter J. Scheirer and Prof. Mooi Choo Chuah Department of Computer Science and Engineering.

Slides:



Advertisements
Similar presentations
Overview of the SDE Protocol Presented by Ken Alonge Chair,
Advertisements

IPv6 Overview Brent Frye EECS710. Overview Google Drive Microsoft Cloud Drive Dropbox Paid-for alternatives 2.
The Future of TCP/IP Always evolving: –New computer and communication technologies More powerful PCs, portables, PDAs ATM, packet-radio, fiber optic, satellite,
IPv6 Internet Protocol Version Information management 2 Groep T Leuven – Information department 2/24 Internet Protocol Version 6 (IPv6)
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
IPv6 Tutorial Module 1: IPv6 Protocol Structure Dan Campbell, President Millennia Systems, Inc.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
© 2004 The MITRE Corporation. All rights reserved DTN Security Susan Symington March 2005 IETF DTN meeting.
IPv6 Header & Extensions Joe Zhao SW2 Great China R&D Center ZyXEL Communications, Inc.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Chapter 3 Review of Protocols And Packet Formats
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
IP Security: Security Across the Protocol Stack
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. IP version 6 Asst. Prof. Chaiporn Jaikaeo,
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Karlstad University IP security Ge Zhang
March 7, 2008Security Proposal 1 CCSDS Link Security Proposal Ed Greenberg Greg Kazz Howard Weiss March 7, 2008.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
 A Web service is a method of communication between two electronic devices over World Wide Web.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Outline Motivation Protocol Terminology Implementation architecture SDNV Addressing scheme Bundle format Primary block Generic Block Processing Bundle.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Chapter 27 IPv6 Protocol.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
By Mau, Morgan Arora, Pankaj Desai, Kiran.  Large address space  Briefing on IPsec  IPsec implementation  IPsec operational modes  Authentication.
1 Figure 3-5: IP Packet Total Length (16 bits) Identification (16 bits) Header Checksum (16 bits) Time to Live (8 bits) Flags Protocol (8 bits) 1=ICMP,
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
DTN Security Update Stephen Farrell, Trinity College Dublin Susan Symmington, The MITRE Corp. Howard Weiss, Sparta Inc. IETF-65 Dallas March 2006.
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
IP Fragmentation. Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on rcving side,
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography CSS 329 Lecture 13:SSL.
1 Layer 3: Routing & Addressing Honolulu Community College Cisco Academy Training Center Semester 1 Version
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Internet Protocol Version 6 Specifications
CSE 4905 IPsec.
Updated SBSP draft-birrane-dtn-sbsp-01.txt Edward Birrane
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
Bundle Protocol Specification
Visit for more Learning Resources
CCSDS Link Security Proposal
Standards Basics.
Guide to TCP/IP Fourth Edition
Net 323 D: Networks Protocols
NET 323D: Networks Protocols
CSE 5/7349 – February 15th 2006 IPSec.
Presentation transcript:

The Integration of the Bundle Security Protocol Features into DTN2 Walter J. Scheirer and Prof. Mooi Choo Chuah Department of Computer Science and Engineering Lehigh University

References: Bundle Security Protocol Specification  draft-irtf-dtnrg-bundle-security-00, June 8, 2005 Bundle Protocol Specification  draft-irtf-dtnrg-bundle-spec-03.txt, July 2005 *  draft-irtf-dtnrg-bundle-spec-02.txt, Sept DTN2  Sept. 6, 2005 CVS revision  Current

Major Features Bundle Authentication Header (BAH) Payload Security Header (PSH) Confidentiality Header (CH) Bundle Fragmentation/Reassembly

Summary of Technical Approach Bundle Authentication Header (BAH)  The BAH is used to assure the authenticity of the bundle along a single hop from sender to recipient Payload Security Header (PSH)  The PSH is used to assure the authenticity of the bundle from the PSH security source, which creates the PSH, to the PSH security destination, which verifies the PSH authenticator Confidentiality Header (CH)  The CH is used to indicate that the bundle payload has been encrypted while en route between the CH source and the CH security destination

Summary of Technical Approach Each node will turn on the optional security-related delivery option parameters if it desires certain security features -  if it desires confidentiality, then a CH header must be applied to the bundle  if it desires authentication, a PSH and/or a BAH must be applied and the relevant parts of the bundle digitally signed or MACed appropriately

Bundle with security headers BAH (w/ signed Hash value All other Headers Primary Bundle Header Payload Class Len. Payload AE78F98D567BB32CAD5F4D PSH (w/ signed Hash value) Confid. Header 567BB32CAD5F4D All other Headers Primary Bundle Header Len. Payload Segment Size Payload Hash Size Toilet Paper Ciphersuite ID Format flag Key ID (optional) Len.0 BAH All other Headers Primary Bundle Header Payload Class Len. Payload AE78F98D Payload Segment Size Payload Hash Size Toilet Paper Ciphersuite ID Format flag Next Hdr Key ID (optional) Len.0 PSH (w/ signed Hash value) BAH Fragment Header (offset=9) Next Hdr PSH, confidentiality header and payload class field deleted from successive fragments Authent. of Hdr & payload segment Authent. of Hdr & payload segment Fragment Header (offset=0) Authent. of Hdr & payload segment Confid. Header Challenges faced in fragmentation scenario:

Implementation Details Ciphersuites  Have been implemented using the OpenSSL (v a, Fedora Core 2) library  Significant code addition to servlib/bundling/BundleProtocol.cc  BAH EntireBundleHMAC, HeadofBundleHMAC, HeadOfBundleSig, EntireBundleSig, EntireBundleMAC

Implementation Details  PSH EntireBundleHMAC  CH Payload Encryption - Blowfish Support different combinations of Headers  BAH, PSH, CH; BAH and PSH; BAH and CH

Implementation Details Security Headers populate header fields apply ciphersuite append to bundle Sending parse header fields apply ciphersuite verify integrity Receiving

Implementation Details Protocol Stack Bundle Transmitted BundleProtocol.cc / format_headers() build CH build PSH build BAH TCP Convergence LayerBundle Received BundleProtocol.cc / parse_headers() check CH check PSH check BAH TCP Convergence Layer

Questions?