Currently Open Issues in the MIPv6 Base RFC MIPv6 security design team.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Security Issues In Mobile IP
Mobility Support in IPv6 Advanced Internet, 2004 Fall 8 November 2004 Sangheon Pack.
Mobile IPv6 趨勢介紹 1. Mobile IP and its Variants Mobile IPv4 (MIPv4) – MIPv4 – Low-Latency Handover for MIPv4 (FMIPv4) – Regional Registration for MIPv4.
Internet Security CSCE 813 IPsec
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Mobile IPv6 - NSIS Interaction for Firewall traversal draft-thiruvengadam-nsis-mip6-fw-04 S. Thiruvengadam Hannes Tschofenig Franck Le Niklas Steinleitner.
1 © NOKIA NSIS MIPv6 FW/ November 8 th 2004 Mobile IPv6 - NSIS Interaction for Firewall traversal draft-thiruvengadam-nsis-mip6-fw-01 S. Thiruvengadam.
Authentication In Mobile Internet Protocol version 6 Liu Ping Supervisor: professor Jorma Jormakka.
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
MOBILITY SUPPORT IN IPv6
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
1 Overview of Mobility Protocols Md. Shohrab Hossain Dec 6, 2014.
Mobile IPv6 Binding Update: Return Routability Procedure Andre Encarnacao and Greg Bayer Stanford University CS 259 Winter 2008 Andre Encarnacao, Greg.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Quick-Start for TCP and IP draft-ietf-tsvwg-quickstart-02.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti TSVWG, March 2006 This and earlier presentations::
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
CSCE 715: Network Systems Security
Click to edit Master title style Click to add subtitle © 2008 Wichorus Inc. All rights reserved. CONFIDENTIAL - DO NOT DISTRIBUTE rfc3775bis Issues July.
Mobile IPv6 Location Privacy Solutions UPDATE draft-irtf-mobopts-location-privacy-solutions-04.txt Ying Qiu, Fan Zhao, Rajeev Koodli.
1 Julien Laganier MEXT WG, IETF-79, Nov Authorizing MIPv6 Binding Update with Cryptographically Generated Addresses
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Karlstad University IP security Ge Zhang
IP Address Location Privacy and Mobile IPv6 draft-koodli-mip6-location-privacy-00.txt draft-koodli-mip6-location-privacy-solutions-00.txt.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
1 Mobility Support in IPv6 (MIPv6) Chun-Chuan Yang Dept. Computer Science & Info. Eng. National Chi Nan University.
1 Monami6 Working Group IETF 66 July 2006 Montréal, Canada Thierry Ernst (INRIA) Nicolas Montavont (ENST Bretagne)
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
07/03/ nd IETF – Minneapolis Mobile IPv6 WG meeting PF_KEY Extension as an Interface between Mobile IPv6 and IPsec/IKE Shinta Sugimoto Francis Dupont.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
Overview of draft–16 for MIPv6 MIPv6 Design Team March 19 th, 2002.
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Multiple Care-of Address Registration on Mobile IPv6 Ryuji Wakikawa Keisuke Uehara Thierry Ernst Keio University / WIDE.
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
Network Mobility (NEMO) Advanced Internet 2004 Fall
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Click to edit Master title style Click to add subtitle © 2008 Wichorus Inc. All rights reserved. CONFIDENTIAL - DO NOT DISTRIBUTE rfc3775bis Issues November.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Guidelines for Firewall Vendors Mobile IPv6 Suresh Krishnan, Yaron Sheffer, Niklas Steinleitner, Gabor.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
Multiple Care-of Address Registration draft-ietf-monami6-multiplecoa-02.txt.
Mobile IPv6 Location Privacy Solutions UPDATE draft-irtf-mobopts-location-privacy-solutions-04.txt Ying Qiu, Fan Zhao, Rajeev Koodli.
K. Salah1 Security Protocols in the Internet IPSec.
SECURITY THREATS ANALYSIS OF ROUTE OPTIMIZATION MECHANSIM IN MOBILE IPV6 BY Wafaa Al-Salihy.
7/24/2007IETF69 PANA WG1 PANA Issues and Resolutions draft-ietf-pana-pana-17.txt draft-ietf-pana-framework-09.txt Yoshihiro Ohba Alper Yegin.
Mobile IPv6 Location Privacy Solutions draft-irtf-mobopts-location-privacy-solutions-01.txt Ying Qiu, Fan Zhao, Rajeev Koodli.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
Booting up on the Home Link
Open issues with PANA Protocol
Multiple Care-of Address Registration
Support for Flow bindings in MIPv6 and NEMO
Mobility Support in IPv6 (MIPv6)
Charles E. Perkins RFC 2002bis Charles E. Perkins
Presentation transcript:

Currently Open Issues in the MIPv6 Base RFC MIPv6 security design team

Editorial Issues 1.Many textual and editorial improvements needed  Please read the draft and comment  “parameter” -> “option” 2.Maximum binding lifetimes have to be specified in the document.  5 minutes? 3.State tables or better behaviour descriptions to the CN, MN chapters? 4.Better terminoloy for ‘RR procedure’ ‘binding update procedure’  “RR procedure” is CoT/CoTI/HoT/HoTI?  “BU procedure” is RR prodedure plus BU and optional BA? 5.Better names for message types?

Open Issues 1.Bit method to prevent bidding down attacks? 2.How/whether to authenticate BA and BR? 3.Whether to authenticate the BM? 4.Should HAO be used in the Home Registrations or not? 5.How to secure home registrations, use ESP or AH? 6.Formatting issues: MH, fixed fields, parameters,... 7.Is an SPI field useful? 8.Retransmission and nonce lifetimes 9.Do we need suboptions on HAO any more? 10.Does alternative CoA work with RR?

Bit method to prevent bidding down attacks? Discussion in IPv6 about reserving bits in interface IDs in progress Using reserved space requires a separate proposal in Ipv6 WG Proposed justification: –Mechanical semantics is “don't do RR” –Later bit might be redefined to mean e.g. That the IID is a hash of something – random number or public key [IPR likely here]

Bit method – next steps IPv6 WG will discuss reserving on Thursday Need to make proposal on usage for MIPv6

How and whether to authenticate the BA and BR? Need to be able to verify that they were sent in response to the BU? –An on-path attacker could of course spoof this Without check off-path attacker could spoof BA or BRs Adding a nonce in BU (returned in BA/BR) will do the trick? Similar issue for HoT/CoT –Include nonces in HoTI/CoTI as well?

Whether to authenticate the BM? When MN receives BM it checks in CN in Binding Update List –If no then must ignore BM Otherwise, unless too recent BM from CN, –Start RR procedure, or –Reverse tunnel The BM could still be spoofed by off-path attackers –Would cause some extra work but no ill effects

Should HAO be used in the Home Registrations or not? HA finds SA based on IPsec SPI + destination address Verifies src address against SA/SPD entry –Either the SA/SPD has a wildcard source, or –The HOA is used in the home BU Need to understand the tradeoffs here and pick

How to secure home registrations, use ESP or AH? ESP is needed for tunneled HoT; easier to do ESP for the home registrations? If ESP and HAO then the HoA/CoA will be included twice in the packet –In the IP src and HAO – not protected by IPsec –In the BU – protected by IPsec If AH and HAO is used then HoA just once

Formatting issues: MH, fixed fields, parameters,... BUs to CN need authenticator and two cookies BUs to HA don't need this – just a sequence number to prevent reordered BUs Current plan is to define an authenticator parameter and a two-cookie parameter

Is an SPI field useful? A few algorithms can be identified using the flags field –Smaller packets Isn't needed for RR Probably not needed for RR with BSAs Can be added as a parameter by future schemes that need an SPI

Retransmission and nonce lifetimes When CoT, HoT, or BA is not received the MN needs to retransmit If the cookies in the BU are too old the CN will reject it How does MN know for how long it can use cookies? Should we just pick a constant? (e.g. 30 seconds)

Do we need suboptions on HAO any more? Originally all the DOs used suboptions Now everything but HAO is a separate message with parameters Thus suboptions are only used for HAO Seems to make sense to drop the HAO suboptions? –Is there future undocumented usage?

Does alternative CoA work with RR? Help us understand alt-CoA usage Implications of bombing attacks –CoTI sent with alt-CoA as source –COT sent back to alt-CoA with cookie computed for alt-CoA –BU can then be sent with any source and alt- CoA parameter Is this ok?

Deleting binding and replayed BUs? No state after BCE deleted –If BCE deleted (expired, or BU with lifetime zero) and nonce used to create it is still valid the BU can be replayed to recreate the BCE Need to retain information about BCE until nonce used to create it is invalid –Or make the nonce invalid once BCE deleted

Make BA mandatory? Needed for home registrations always Due to HAO verification it makes lots of sense to use BA for other BUs as well –Avoid data packets being dropped due to HAO if the BU is dropped in the network Suggestion: –BA not mandatory –Document the benefit of using BA –This allows unvHAO to be added separately