Presentation at ISMS WG Meeting1 ISMS – March 2005 IETF David T. Perkins.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

AUTHENTICATION AND KEY DISTRIBUTION
Chapter 14 – Authentication Applications
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication & Kerberos
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
COMP4690, by Dr Xiaowen Chu, HKBU
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Integrated Security Model for SNMPv3 (ISMS) pronounced "is" "miss" David T. Perkins & Wes Hardaker 60 th IETF August 6, 2004.
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
RADIUS Secured and Authenticated WiFi Robert Leahy Charles Bodman Brandon Ellis.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
Windows 2003 and 802.1x Secure Wireless Deployments.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Host Identity Protocol
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Title: HP OpenView Network Node Manager SPI for SNMPv3 Session #: 326 Speakers: Jeff Scheaffer, HP OpenView NSM David Reid, SNMP Research.
On the Impact of Security Protocols on the Performance of SNMP J. Schonwalder and V. Marinov IEEE Transactions on Network and Service Management, 2011,
Chapter 13 – Network Security
70-411: Administering Windows Server 2012
1 EAP Usage Issues Feb 05 Jari Arkko. 2 Typical EAP Usage PPP authentication Wireless LAN authentication –802.1x and i IKEv2 EAP authentication.
Abierman-nanog-30may03 1 XML Router Configs BOF Operator Involvement Andy Bierman
WP4 Security and AA(A) issues For WP4: David Groep
Chapter 21 Distributed System Security Copyright © 2008.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
Real-time Flow Management 2 BOF: Remote Packet Capture Extensions Jürgen Quittek NEC Europe Ltd, Heidelberg, Germany Georg Carle GMD.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
SNMPv3 1.DESIGN REQUIREMENTS 2.BIRTH & FEATURES of SNMPv3 3.ARCHITECTURE 4.SECURE COMMUNICATION - USER SECURITY MODEL (USM) 5. ACCESS CONTROL - VIEW BASED.
Chapter 3: Authentication, Authorization, and Accounting
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Network Management Security
SNMP for the PAA-2-EP protocol PANA wg - IETF 59 Seoul -> Yacine El Mghazli (Alcatel)
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
ISMS IETF72 David Harrington. Status IETF72 Transport Subsystem for the Simple Network Management Protocol (SNMP) –IETF69: draft-ietf-isms-tmsm-09.txt.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
SSHSM Issues David Harrington IETF64 ISMS WG Vancouver, BC.
August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE WG.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
K. Salah1 Security Protocols in the Internet IPSec.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Thoughts on the LMAP protocol(s) LMAP Interim meeting, Dublin, 15 th September 2014 Philip Eardley Al Morton Jason Weil 1.
Convergence of Network Management Protocols
SNMPv1 Network Management: Communication and Functional Models
2018 Real Cisco Dumps IT-Dumps
Chapter 8: Monitoring the Network
PAA-2-EP protocol PANA wg - IETF 58 Minneapolis
Presentation transcript:

Presentation at ISMS WG Meeting1 ISMS – March 2005 IETF David T. Perkins

Presentation at ISMS WG Meeting2 Problem To be Solved Reduce the incremental operational cost of supporting SNMPv3 to approach zero! Primarily for network infrastructure devices (such as routers, bridges, etc), but also servers and work stations Assume work is already done to configure authentication for access via CLI and/or WEB Problem is both authentication and authorization, but WG charter defers authorization solutions.

Presentation at ISMS WG Meeting3 Types of SNMP Entities Agents – provide access to management information on the system containing the agent Managers – access management info on managed systems (that is systems containing agents) Observers – "third party" reporter of events Proxy Agents – Application level forwarder (and optionally version translator) of SNMP messages Mid-level Managers – are simply quite powerful agents that access info from other agents and make it available to managers.

Presentation at ISMS WG Meeting4 Categories of SNMP Managers Poller: identity is a service name, such as "poller". Long running. Transport address need not be stable. Only reads mgmt info. Notification receiver: identity is a service, such as "notifyrcvr". Long running. Transport addr must be stable. Passive. Mgmt app: identity is the user that initiated it. Used for config, trouble shooting, etc. Transport addr need not be stable. May read and write mgmt info.

Presentation at ISMS WG Meeting5 SNMPv3/USM Each operation is independent from each other Each message provides for identity verification, message integrity check (MIC), encryption, and timeliness and limited replay detection Identities are in a name-space that is independent of all other existing security infrastructures Key for authentication verification also used for MIC Authentication and encryption keys are long lived, since they are typically changed together and based on identity pass-phrase

Presentation at ISMS WG Meeting6 SNMPv3/USM Does Not Solve the Problem Requires extra work to be done on each system containing an SNMP agent Requires extra work and separate SNMP specific applications to manage USM users and keys

Presentation at ISMS WG Meeting7 Ideal solution Uses existing name space and attributes of existing security infrastructures including: SSH key pairs, X.509 certs, name/password, and/or name & secureID card Network infrastructure device configured with identities and verification mechanisms, then support for SNMPv3 is turned on No new information or configuration is needed on systems that run SNMP management applications

Presentation at ISMS WG Meeting8 Info Held By SNMP Managers User identity to use Credentials for the user identity Transport address of a system containing an SNMP agent Identity and info to verify SNMP agent identity (for example, for SSH - IP address and fingerprint of public key, for X.509 – CA cert) Note, Proxy has not yet been considered

Presentation at ISMS WG Meeting9 Info not Required to be Held by SNMP Managers Radius server address Shared secret for use with Radius Other authentication method specific info

Presentation at ISMS WG Meeting10 Pure EAP Authen Message Flow SNMP Manager Radius Server SNMP Agent EAP PEER Authenticator Authentication server Method specific Authen servers Session setup: authen with Radius server Key and session ID handoff Radius Client

Presentation at ISMS WG Meeting11 Mixed Authen Message Flow SNMP Manager Radius Server SNMP Agent X.509 Certs Method specific Authen servers Authentication server SSH key Local account Perform authentication locally or via EAP based on policy setting

Presentation at ISMS WG Meeting12 Sessions: Two Parts Session establishment, results in –Mutual authentication –Session ID (such as a SA pair) –Master session key (used to derive MIC and encryption keys) Operating, uses –Session ID –MIC and encryption keys –What is used for timeliness and replay detection?

Presentation at ISMS WG Meeting13 USM Timeliness and Replay Detection Uses a loosely synchronized clock Replays and message delays can occur within a 150 second window Because in USM, each message is independent, a complex mechanism is used The concept of "authoritative" and "nonauthoritative" engine and procedures were created to manage and update the loosely synchronized clock Authoritative and nonauthoritative causes problems with traps and informs

Presentation at ISMS WG Meeting14 Reuse USM? Problems with mapping the pair msgAuthoritativeEngineID:msgUserName to session identifier (how to distinguish multiple sessions that have the same engineID:name pair) Problems with clock (msgAuthoritativeEngineBoots: msgAuthoritativeEngineTime) (see previous page) However, can reuse msgAuthenticationParameters and msgPrivacyParameters, and crypto procedures associated with values for usmUserAuthProtocol and usmUserPrivProtocol

Presentation at ISMS WG Meeting15 Updated Security Model Specific Info UsmSecurityParameters ::= SEQUENCE { -- global User-based security parameters msgAuthoritativeEngineID OCTET STRING, msgAuthoritativeEngineBoots INTEGER ( ), msgAuthoritativeEngineTime INTEGER ( ), msgUserName OCTET STRING (SIZE(0..32)), -- authentication protocol specific parameters msgAuthenticationParameters OCTET STRING, -- privacy protocol specific parameters msgPrivacyParameters OCTET STRING } msgSrcSA INTEGER ( ), msgDstSA INTEGER ( ), msgSeqNum INTEGER ( ), Stay the same Make appropriate changes Replacement for first part above

Presentation at ISMS WG Meeting16 Summary Operating message flow requires a session to be established between the SNMP manager and SNMP agent. SNMP agent to choose authentication method based on policy configuration at the agent. Sessions instead of per message allows simplification of timeliness and replay detection