Download presentation
Presentation is loading. Please wait.
Published bySheila Cannon Modified over 9 years ago
1
Access control for IP multicast T-110.557 Petri Jokela petri.jokela@nomadiclab.com
2
Contents ● Unicasting / multicasting ● HIP – User authentication ● Certificates – User authorization ● Certificate based Multicast Access Control - C-MAC ● Future work ● Summary
3
Multicasting ● Unicasting – Point-to-point connection – Multiple receivers -> resources wasted ● Multicasting – One outgoing stream, multiplied near recipients – How to control stream receiving?
4
I 3 based multicast ● Traffic is sent with a stream identifier – Chord routing protocol used for data routing ● End-user sets a trigger at an I 3 server – Receive a stream ● stream identifier in the trigger – Traffic unicasted from the server to the end-user
5
IP multicasting Source Router Host Join... Join multicast group X Multicast routing protocol Send to IPv4: 224.0.0.0/4 IPv6: ff00::/8 Join multicast group -IGMP Router broadcasts
6
HIP usage ● The end-user authentication – During HIP 4-way handshake – End-user sends HI (public key) – Use private key to prove HI ownership ● IPsec usage – Data decryption key information sent over IPsec ESP
7
Certificates ● SPKI certificates – RFC2693 ● Certificate – 5-tuple, containing: – Issuer: Who gives the rights – Subject: To who this certificate gives rights – Authorization: What this certificate authorizes the subject to do – Validity: How long this cert is valid – Delegation: Can the subject delegate this further? – Certificate signed with issuer’s private key
8
Certificate delegation ● Certificate delegated: new and old cert concatenated – Issuer: itself – Subject: next retailer or end-user – Authorization: subset of original – Validity: subset of original – Delegation: depends on subject – Signature over the whole certificate chain ● The receiver can validate – Knows the first public key – Goes through the certificate chain
9
C-MAC parties Source Router End-user Retailer Cert ok? Data stream Keying
10
C-MAC: certificate distribution Source Router End-user Retailer Cert ok? Data stream Keying
11
C-MAC operation: cert distribution ● The data source issues a certificate – Issuer: data source public key – Subject: retailer’s public key – Authorization: receive data multicasting X – Validity: how long valid – Delegation: yes ● Certificate given to a retailer ● Retailer can further delegate to another retailer ● Finally, certificate is sold to the end-user – Payment: VISA, other... – not specified here
12
C-MAC: authentication and authorization Source Router End-user Retailer Cert ok? Data stream HIP negotiation
13
C-MAC: end-user authentication and authorization ● End user joins a multicast group – HIP association with the router – Router learns end-hosts public key (HI) ● End user sends the certificate to the router – Router verifies the certificate chain – Verify the subject, must match the end-user HI – Make a verification to the last retailer – Retailer marks the certificate used
14
C-MAC: data transmission Source Router End-user Retailer Cert ok? Data stream Keying
15
C-MAC: Data transmission ● Data must be encrypted – IP multicast: sent to everyone on the link – Where? At the last router ● Valid receiver needs a key – The decryption key is sent to valid receivers – Key sent over the IPsec ESP ● Rekeying needed – How validity times are defined? – Minutes, hours, days,...? ● Problems – How to prevent end-user to redistribute the key? – And if prevented, how to prevent resending decrypted data?
16
Future work ● Trust relations between entities – How this system could be adopted in real business ● Security – No security analysis made on this (complex) system ● Performance optimization – Encoding of data – Key distribution ● Payment system – Not studied in this paper ● Prototyping
17
Summary ● Access Control system for IP multicast – IP multicasting – Certificates for access control ● certificate chain – User authentication ● HIP – Data encryption ● A lot of work to do
18
Thank you!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.