2/25/2016CSI WG/IETF761 Open Source Project SEND & Extensions Beijing University of Posts & Telecommunications HUAWEI Yuhong LI (Speaker) Wendong WANG.

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

SeND Hash Threat Analysis CSI WG Ana Kukec, Suresh Krishnan, Sheng Jiang.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
TCP/IP Protocol Suite 1 Chapter 27 Upon completion you will be able to: Next Generation: IPv6 and ICMPv6 Understand the shortcomings of IPv4 Know the IPv6.
IPv6 Overview Brent Frye EECS710. Overview Google Drive Microsoft Cloud Drive Dropbox Paid-for alternatives 2.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Access control for IP multicast T Petri Jokela
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
1 Name Directory Service based on MAODV and Multicast DNS for IPv6 MANET Jaehoon Jeong, ETRI VTC 2004.
1 DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad-hoc Network Jaehoon Jeong, ETRI ICACT.
Guide to TCP/IP Fourth Edition
Cisco Public © 2013 Cisco and/or its affiliates. All rights reserved. 1.
Asymmetric Extended Route Optimization (AERO)
7 IPv6: transition and security challenges Selected Topics in Information Security – Bazara Barry.
1 Chapter Overview Routing Principles Building Routing Tables.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Design and Implementation of a Multi-Channel Multi-Interface Network Chandrakanth Chereddi Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Ahmad Alsadeh, Augmented SEND: Aligning Security, Privacy, and Usability Dr. Ahmad Alsadeh Birzeit University Palestine.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 Julien Laganier MEXT WG, IETF-79, Nov Authorizing MIPv6 Binding Update with Cryptographically Generated Addresses
Module 12 Integrating Exchange Server 2010 with Other Messaging Systems.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
SEND Linux Implementation Report Jonathan Wood DoCoMo USA Labs IETF 58 November 2003.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
1 Arkko, 57th IETF: SEND base protocol issue list Issues in the SEND base document draft-ietf-send-ipsec-01.txt
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Secure Neighbor Discovery in IPv6 Jari Arkko Ericsson Research James Kempf DoCoMo US Labs.
CGA Extension Header for IPv6 draft-dong-savi-cga-header-03.txt Margaret Wasserman IETF 78, Maastricht July 2010.
6lowpan ND Optimization draft Update Samita Chakrabarti Erik Nordmark IETF 69, 2007 draft-chakrabarti-6lowpan-ipv6-nd-03.txt.
Advanced Technology Centre © BAE SYSTEMS All rights reserved. Slide 1 OLSR Simulation and Implementation Christopher Dearlove
A Source Address Validation Architecture (SAVA) and IETF SAVI Working Group Jun Bi Tsinghua University/CERNET Oct 20, 2008.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
1 Requirements for Internet Routers (Gateways) and Hosts Relates to Lab 3. (Supplement) Covers the compliance requirements of Internet routers and hosts.
Update on SEND Keys Draft draft-kempf-mipshop-handover-key-00.txt James Kempf DoCoMo Labs USA Rajeev Koodli Nokia
Module 6: IPv6 Fundamentals. Introduction to IPv6 Unicast IPv6 Addresses Configuring IPv6.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier September 21, 2002.
ICMPv6 Error Message Types Informational Message Types.
RFC 4191 Router Preferences and More-Specific Routes
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-01 Suresh Krishnan Ana Kukec Khaja Ahmed.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
PAGE 1 A Firewall Control Protocol (FCON) draft-soliman-firewall-control-00 Hesham Soliman Greg Daley Suresh Krishnan
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
英文标题 :40-47pt 副标题 :26-30pt 字体颜色 : 反白 内部使用字体 : FrutigerNext LT Medium 外部使用字体 : Arial 中文标题 :35-47pt 字体 : 黑体 副标题 :24-28pt 字体颜色 : 反白 字体 : 细黑体.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
IETF-53-IPv6 WG- Cellular host draft 1 Minimum IPv6 Functionality for a Cellular Host Jari Arkko Peter Hedman Gerben Kuijpers Hesham Soliman John Loughney.
CSI WG / IETF741/12 Implementation of SeND/CGA and Extensions Beijing University of Posts and Telecommunications HUAWEI.
1 cellhost-ipv6-52.ppt/ December 13, 2001 / John A. Loughney Minimum IPv6 Functionality for a Cellular Host John Loughney, Pertti Suomela, Juha Wiljakka,
David B. Johnson Rice University Department of Computer Science DSR Draft Status Monarch Project 57th IETF.
DoCoMo's Open Source SEND Status CSI BoF Julien Laganier, James Kempf,
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Secure Proxy ND Support for SEND draft-krishnan-csi-proxy-send-00
Encryption and Network Security
Cryptography and Network Security
Internet Control Message Protocol (ICMP)
draft-lts-pim-hello-mtu-01
Internet Control Message Protocol (ICMP)
CPPA3 Overview.
Presentation transcript:

2/25/2016CSI WG/IETF761 Open Source Project SEND & Extensions Beijing University of Posts & Telecommunications HUAWEI Yuhong LI (Speaker) Wendong WANG Guangxue SU Quanchao HUI

Contents Project overview Basic and extended functions Implementations Tests Future work

2/25/2016CSI WG/IETF763 Project Overview Project began from Nov GPL-style License Code –Plan to put at Google Code ( Platforms –HostLinux* –RouterQuagga over Linux* Linux* Linux Kernel Ubuntu 8.04

2/25/2016CSI WG/IETF764 Basic Functions Implementations of RFCs: –RFC Secure Neighbor Discovery (SEND) –RFC Cryptographically Generated Addresses (CGAs) –RFC X.509 Extensions for IP Addresses and AS Identifiers Supported features: –Processing CPS/CPA messages (Authorization Delegation Discovery) Configuration of trust anchor & certificate path Adding IP Address Extensions to certificates Handling of the certificate path … –Processing ND messages with SEND options Generation & Verification of CGA and CGA parameters Generation & Verification of the RSA signature Handling the Nonce & Timestamp options …

2/25/2016CSI WG/IETF765 Extended Functions Supports –ECDSA as an alternative of RSA Based on draft-shen-csi-ecc-01 ( the revised version in draft-cheneau-csi-ecc-sig-agility-00) –CRL verification

2/25/2016CSI WG/IETF766 Implementations SEND Kernel module –Embedded into IPv6 module of Linux kernel –About 6K lines of C++ SEND Daemon module –Cryptographical procedures are implemented in user space in the form of Daemon –About 7K lines of C++

2/25/2016CSI WG/IETF767 Software Prototype ---- Host

2/25/2016CSI WG/IETF768 Software Prototype –--- Router

Tests of SEND & Extensions Performed in a link-local environment 72 function tests for SEND and extensions Performance tests on CGA and RSA/ECDSA

Test scenario 1: nodes support only SEND Messages from the original NDP nodes are considered insecure and are discarded –Neighbor Discovery SEND nodes discard ND messages without SEND options. –Router Discovery SEND nodes send CPS to routers to require CPA; Routes are considered insecure and will be ignored if routes do not respond CPA messages –Redirect SEND nodes ignore Redirect messages from NDP nodes

Test scenario 2: nodes work in compatible mode SEND nodes in compatible mode accept NDP nodes, but mark them as insecure –Neighbor Discovery SEND nodes on link are marked as secure NDP nodes on the link are marked as insecure –Router Discovery Routers which pass CPA verification are marked as secure Other routers are marked as insecure secure routers have higher priority when routing –Redirect Both SEND/ND redirect messages are accepted.

Test results of CGA generating time Platform: –An Intel Duo2 (2.53GHz) workstation Results of average CGA generating time –SEC=0: 100 μs –SEC=1: 60 ms; –SEC=2: 2000s (varies from 100~7000sec) –SEC=3: N/A Theoretically estimating, more than hours are required.

Performance comparisons of RSA and ECDSA Ref: draft-shen-csi-ecc-01 ( the revised version in draft-cheneau-csi-ecc-sig- agility-00) RSA-1024 and ECDSA-192 is of the same security strength. ECDSA has a shorter signature length, and a less signature generating time.

2/25/2016CSI WG/IETF7614 Future work Supports signature algorithm agility based on –draft-cheneau-csi-cga-pk-agility-00 Support for Multiple Signature Algorithms in Cryptographically Generated Addresses (CGAs) Proposed in Oct. 12, 2009 by Huawei Support multiple signature algorithms through providing multiple public keys in CGA –draft-cheneau-csi-send-sig-agility-00 Signature Algorithm Agility in the Secure Neighbor Discovery (SEND) Protocol Proposed in Oct. 12, 2009 by Huawei Add Supported Signature Algorithm Option, provide agility to SEND –draft-cheneau-csi-ecc-sig-agility-00 ECC public key and signature support in Cryptographically Generated Addresses (CGA) and in the Secure Neighbor Discovery (SEND) Proposed in Oct. 12, 2009 by Huawei E.g. how to use ECC public key in CGA etc.

Thanks! Questions/Comments? Contact us –Yuhong –Wendong Wang: –Guangxue –Quanchao