01/29/2001Policy'2001, Bristol, UK, January 29-31, IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution Zhi Fu S. Felix Wu He Huang James Loh Motorola UC Davis NortelNetworks Fengmin Gong Ilia Baldine Chong Xu IntruVert MCNC Cosine * Many of us were with NCSU while the work was done.
01/29/2001Policy'2001, Bristol, UK, January 29-31, l Motivation/Conflict Examples l Security Requirements l Conflict Detection and Analysis l Example l Remarks Content Content IPSec: Policy and Requirement
01/29/2001Policy'2001, Bristol, UK, January 29-31, l Policy: –if then l IPSec policy: –Condition: src,dst,src-port,dst-port, protocol, … –Action: Deny | Allow | ipsec (entry, exit, mode, sec-prot, alg) l Example: –Condition: src=A, dst=B, port=*, prot=TCP –Action: ipsec ( Rb, Rd, tun, ESP, 3DES ) BARcRbRd Rb,Rd, ESPA, B IPSec Policy: IPSec Policy: Implementation Policy
01/29/2001Policy'2001, Bristol, UK, January 29-31, Conflict #1: Conflict #1: Privacy and Content Examination ASG-1SG-2B XY
01/29/2001Policy'2001, Bristol, UK, January 29-31, Firewall-- drop any incoming IPSec/ESP encrypted packet if then IPSec Gateway--all packets from A to B should be encrypted with 3DES if <src = , dst = , prot=*> then <ipsec( , , transport, esp, 3des) > All Packets Dropped !!
01/29/2001Policy'2001, Bristol, UK, January 29-31, ASG-1SG-2B Conflict #2: Conflict #2: Selector Confusion XY
01/29/2001Policy'2001, Bristol, UK, January 29-31, Security Policies: A: All packets from A to B must authenticate to SG-2 SG-1: All packets from A to B will be allowed, but otherwise denied. The src and dst changed to be A and SG-2 thus the policy at SG-1 will drop the traffic from A to B. One way or the other, we loss…...
01/29/2001Policy'2001, Bristol, UK, January 29-31, A SG-1 A A
01/29/2001Policy'2001, Bristol, UK, January 29-31, SG-1.1, SG-2A, B B SG-2 SG-1SG-2.1 SG-1,SG-2.1 Conflict #3: Conflict #3: Tunnel Overlapping SG-1.1, SG-2A, B SG-1.1 SG-1.1, SG-2A, B A
01/29/2001Policy'2001, Bristol, UK, January 29-31, l A set of (implementation) policies does not quite work well together such that the packets (information bits) are either dropped or revealed/sent unsafely. l Requirement(s): Intention(s) behind the implementation-level policies: l e.g., I want to maintain the privacy of certain flows: –IPSec ESP Tunnels. l Conflicts: l a set of policies together does not support the requirements l requirements conflict among themselves. Policy Conflict Policy Conflict IPSec/VPN Policy
01/29/2001Policy'2001, Bristol, UK, January 29-31, Policy versus Requirement l Policy: (implementation, low-level) l How should a network entity or a policy domain handle a particular flow of packets? l Currently, the processing is based on the selector (i.e., the packet header information). l Requirement: (intention, high-level) l End-to-end, flow-based policy + access control + content examination + pairing. l If I want to send a sequence of information bits from A to B, how should they be handled, regardless of any packet header transformation (e.g., tunnel/NAT)
01/29/2001Policy'2001, Bristol, UK, January 29-31, IPSec Security Requirements (1) l Access Control Requirement (ACR) –Restrict access only to trusted traffic l E.g. Deny all telnet traffic l Security Coverage Requirement (SCR) –Apply security functions to prevent traffic from being compromised during transmission across certain area. +who can be trusted? H2H1RbRd Encryption or Authentication trusted
01/29/2001Policy'2001, Bristol, UK, January 29-31, IPSec Security Requirement (2) l Content Access Requirement (CAR) –Specify the needs to access content of certain traffic I will examine the content for intrusion detection l Security Association Requirement (SAR) –Specify trust/distrust relationship in SA setup X Can not set up SA CMR: modify CER : examine
01/29/2001Policy'2001, Bristol, UK, January 29-31, Security Requirement Satisfaction (1) H2H1RcRbRd H2H1RcRbRd l Access Control Requirement - deny or allow l Security Coverage Requirement –All the links and nodes in the area will need to be covered by specified security No! Yes! Encryption
01/29/2001Policy'2001, Bristol, UK, January 29-31, Security Requirement Satisfaction (2) H2H1RcRbRd l Content Access Requirement –Certain node needs to access the content, Rb? Rc? Rb: No! Rc: Yes! l Security Association Requirement –Some nodes are not allowed to set up SA
01/29/2001Policy'2001, Bristol, UK, January 29-31, IPSec Requirement Spec. l Formal specification: l ACR-SCR-CAR-SAR l Conflict Detection in Requirements: l Requirement Satisfiability Problem (RSP): given a set of requirements, an algorithm to check whether at all possible to find a set of policies to satisfy all the requirements. l Completeness Proof l Policy Determination: l Transformation: if possible, an algorithm to find the “optimal” set of policies. l Correctness and Efficiency
01/29/2001Policy'2001, Bristol, UK, January 29-31, IPSec Policy Analysis l Policy Conflict Analysis: l whether a set of policies satisfy all the specified requirements. l Policy Conflict Resolution: l if conflicts detected, how can we resolve them, if possible? l E.g., Tunnel breaking on trusted nodes.
01/29/2001Policy'2001, Bristol, UK, January 29-31, Example (per flow): SCR#1: ENC 2-4 trusted 3 SCR#2: AUTH 1-4 trusted 3 SCR#3: ENC 3-5 trusted 4 CAR#1: (ENC, AUTH) by 4 SAR#1: not-ENC 2-5 SAR#2: not-ENC 1-5 SAR#3: not-AUTH 1-4 Coverage: Content: SA relation:
01/29/2001Policy'2001, Bristol, UK, January 29-31, Solution: ENC AUTH SCR#1: ENC 2-4 trusted 3 SCR#2: AUTH 1-4 trusted 3 SCR#3: ENC 3-5 trusted 4 CAR#1: (ENC, AUTH) by 4 SAR#1: not-ENC 2-5 SAR#2: not-ENC 1-5 SAR#3: not-AUTH 1-4 Coverage: Content: SA relation:
01/29/2001Policy'2001, Bristol, UK, January 29-31, Remarks l IPSec Security Requirement Specification. l Developed algorithms to detect and analyze conflicts among policies and requirements in polynomial time l some of the results are in our new paper. l Future Works: l Implementation and Empirical Evaluation l Transformation from Policies to Requirements l General Topology (integrated with Routing) l Inter-domain & Distributed Policy Analysis l Other Policies (QoS and Routing)