OSPF WG Cryptographic Algorithm Implementation Requirements for OSPF draft-bhatia-manral-crypto-req-ospf-00.txt Vishwas Manral, IPInfusion Manav Bhatia,

Slides:



Advertisements
Similar presentations
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Advertisements

Draft-ietf-dhc-stateless-dhcpv6- renumbering-01 Tim Chown dhc WG, IETF 60, San Diego, August 2, 2004.
RSVP Cryptographic Authentication "...RSVP requires the ability to protect its messages against corruption and spoofing. This document defines a mechanism.
OSPF WG – IETF 68 - Prague OSPF WG Document Candidates Acee Lindem/Redback Networks.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Hash functions a hash function produces a fingerprint of some file/message/data h = H(M)  condenses a variable-length message M  to a fixed-sized fingerprint.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
By Rod Lykins.  Background  Benefits  Security Advantages ◦ Address Space ◦ IPSec  Remaining Security Issues  Conclusion.
Cryptography and Network Security Chapter 12 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Lecture 2: Message Authentication Anish Arora CSE5473 Introduction to Network Security.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
Chapter 21 Public-Key Cryptography and Message Authentication.
Optimizing BFD Authentication draft-mahesh-bfd-authentication-00 Mahesh Jethanandani, Ashesh Mishra Manav Bhatia, Ankur Saxena.
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
Karlstad University IP security Ge Zhang
Cryptography and Network Security (CS435) Part One (Introduction)
1 Authentication Algorithm Document Discussions CCSDS Security Working Group Fall 2007 Meeting 3-5 October 2007 ESA/ESOC, Darmstadt Germany (Hotel am Bruchsee,
Maryland Information Systems Security Lab D EPARTMENT OF C OMPUTER S CIENCE EAP Password Authenticated eXchange (PAX) T. Charles Clancy William A. Arbaugh.
7/11/2006IETF-66 MSEC IPsec composite groups page 1 George Gross IdentAware ™ Multicast Security IETF-66, Montreal, Canada July.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
OSPF WG Stronger, Automatic Integrity Checks for OSPF Packets Paul Jakma, University of Glasgow Manav Bhatia, Alcatel-Lucent IETF 79, Beijing.
RADEXT WG IETF 91 Rechartering. Why? Current charter doesn’t allow us to take on new work that is waiting in the queue Has an anachronistic Diameter entanglement.
Guidelines for Cryptographic Algorithm Agility Russ Housley IETF 89 - SAAG Session.
OSPF WG – IETF 69 - Chicago OSPF WG Document Abhay Roy/Cisco Systems Acee Lindem/Redback Networks.
Potential vulnerabilities of IPsec-based VPN
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2014 Nitesh Saxena.
Cryptographic Hash Functions
1 OSPFv3 Automated Group Keying Requirements draft-liu-ospfv3-automated-keying-req-01.txt Ya Liu, Russ White,
Design Guidelines Thursday July 26, 2007 Bernard Aboba IETF 69 Chicago, IL.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Slide 1 August 2005, Paris, FranceIETF DNSEXT 2929bis etc. Donald E. Eastlake 3 rd
OSPF WG Security Extensions for OSPFv2 when using Manual Keying Manav Bhatia, Alcatel-Lucent Sam Hartman, Huawei Dacheng Zhang, Huawei IETF 80, Prague.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
Lecture 22 Network Security (cont) CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger slides are modified from Jim Kurose,
ISIS IETF 68 Chris Hopps, David Ward. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft.
Doc.: IEEE /0946r1 Submission July 2012 A proposal for next generation security in built on changes in ac 16 July 2012 Slide 1 Authors:
Hash Algorithms Ch 12 of Cryptography and Network Security - Third Edition by William Stallings Modified from lecture slides by Lawrie Brown CIM3681 :
Cryptography CSS 329 Lecture 13:SSL.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-00.
Data Integrity / Data Authentication. Definition Authentication (Signature) algorithm - A Verification algorithm - V Authentication key – k Verification.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Analysis of BFD Security According to KARP Design Guide draft-ietf-karp-bfd-analysis-01 draft-ietf-karp-bfd-analysis-01 Manav Bhatia Dacheng Zhang Mahesh.
Cryptography, Decryption, Security Algorithms ● Phoenix Linux User Group Hackfest
J.W. Atwood PIM WG 2010/03/23 The KARP Working Group J.W. Atwood PIM WG 2010/03/23
RPSEC WG Issues with Routing Protocols security mechanisms
IS-IS WG IS-IS Cryptographic Authentication Requirements
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
Pre-Shared Key EAP methods & EAP-PSK
Better security for maintainers
Lecture 4.1: Hash Functions, and Message Authentication Codes
Security Activities in IETF in support of Mobile IP
HMAC and its Design Objectives
OSPF WG Supporting Authentication Trailer for OSPFv3
Presentation transcript:

OSPF WG Cryptographic Algorithm Implementation Requirements for OSPF draft-bhatia-manral-crypto-req-ospf-00.txt Vishwas Manral, IPInfusion Manav Bhatia, Lucent Technologies IETF 67, San Diego, USA

Different OSPF Auth Schemes NULL, Simple and Cryptographic Recent Reports of attacks on collision resistance properties of MD5 and SHA-1 Cryptographically stronger algorithms have been proposed in the WG (HMAC-SHA-1, etc)

New Algorithms keep coming.. In Cryptography new algorithms surface continuously and existing one are continuously attacked.. Thus the choice of mandatory-to-implement algorithms should be conservative to minimize the likelihood of OSPF being compromised. Would not want to change the OSPF spec each time a cryptographically stronger algorithm is suggested. Eg., DES in the older IPsec RFC was a MUST but now has become a SHOULD NOT. Same goes with MD5 in the IPsec space.

Interoperability Issues There should be a document that tells which algorithms to support and which not for minimum interoperability. With time the number of algorithms to support will increase and we need a minimum set of algorithms as well as their current state of support documented The document would specify the MUST/ MAY/ SHOULD/ SHOULD NOT for algorithms that are to be supported This would be a running document that can be changed as and when newer algorithms come and the older ones get deprecated For IPsec the algorithms supported in RFC2401 and the ones in RFC4305 have changed. In fact some MUST have become SHOULD NOT etc.

Additional RFC 2119 terms SHOULD+ Same as SHOULD. However, it is likely that an algorithm marked as SHOULD+ will be promoted at some future time to be a MUST. MUST- Same as MUST for now. However, its expected that at some point in future this algorithm will no longer be a MUST MAY+ - Same as MAY for now. However, its expected that this algorithm may get promoted at some future time to be a SHOULD.

Auth Scheme Selection when Security is required Old RFC New Req Requirement Authentication Scheme MUST 2328 SHOULD NOT Null Authentication (1) MUST 2328 SHOULD NOT Simple Password (2) MUST 2328 MUST Cryptographic Auth (1) NULL auth cannot be used if operator requires network security. (2) Used mostly to avoid accidental introduction of router in a domain. Not useful if security is required

Authentication Algo Selection Old Old New Req RFC Requirement Authentication Algorithm MUST 2328 MUST- Keyed MD5 - - SHOULD+ HMAC-SHA-1 [*] - - MAY+ HMAC-SHA-256/ HMAC-SHA-384/ HMAC-SHA-512 [*] Bhatia, M., Manral, V., White, R. and Barnes, M.," OSPF HMAC Cryptographic Authentication”, Work in Progress

Questions?