Multicast ESP < draft-ietf-msec-mesp-01.txt> Mark Baugher - - PowerPoint PPT Presentation

multicast esp draft ietf msec mesp 01 txt
SMART_READER_LITE
LIVE PREVIEW

Multicast ESP < draft-ietf-msec-mesp-01.txt> Mark Baugher - - PowerPoint PPT Presentation

Multicast ESP < draft-ietf-msec-mesp-01.txt> Mark Baugher (Cisco Systems), Ran Canetti, P. Chen, P. Rohatgi (IBM) Overview Changes from previous draft The problem we are trying to solve What is MSEC MESP? Open issues


slide-1
SLIDE 1

Multicast ESP < draft-ietf-msec-mesp-01.txt>

Mark Baugher (Cisco Systems), Ran Canetti, P. Chen, P. Rohatgi (IBM)

slide-2
SLIDE 2

Multicast ESP 2

Overview

  • Changes from previous draft
  • The problem we are trying to solve
  • What is MSEC MESP?
  • Open issues
  • Signaling
  • Summary
slide-3
SLIDE 3

Multicast ESP 3

Changes from Previous Draft

  • MESP started as a multi-layer security

protocol in SMuG

  • MESP resumed as a multicast variant of

IPsec ESP in MSEC

  • MESP re-defined as a multicast

transform-framework for ESP today

ESPbis has incorporated needed multicast features and so MESP need not be a separate protocol.

slide-4
SLIDE 4

Multicast ESP 4

Multicast Data Security

  • The MESP framework is for multicast

IPsec data-origin authententication

– 3 MESP framework services

  • Source message authentication (SrA)
  • Group authentication
  • Group Secrecy

The following three slides address each of the three issues listed above.

slide-5
SLIDE 5

Multicast ESP 5

  • 1. Authenticating the Source of

Multicast Messages

  • When group size > 2, symmetric MACs don’t

provide data-origin authentication

  • Asymmetric techniques work for some (small

number) of applications

  • Newer more-efficient solutions exist that

might be suitable at the IP layer

MESP is a framework for group source message authentication algorithms; TESLA is one of the first.

slide-6
SLIDE 6

Multicast ESP 6

  • 2. Group Authentication
  • MAC authentication authenticates a source as

a group member only (Group Authentication)

  • MACs protect digital signatures against DoS

attacks

  • MACs protect timed MACs (TESLA) against

DoS attacks

AES-XCBC-MAC-96 and combined mode MACs may not fulfill the DoS protection functions

slide-7
SLIDE 7

Multicast ESP 7

  • 3. Group Secrecy
  • IPsec ESP confidentiality in a group

security setting

  • Generally, IPsec encryption transforms

are suitable for multicast operation

  • Each should be evaluated, however

briefly, as suitable for multicast

slide-8
SLIDE 8

Multicast ESP 8

Multicast Data Security Services

  • Point-to-point

Security Services

– Confidentiality – Message integrity – Message Source-

Authentication

  • Multicast Security

Services

– Group Secrecy – Group Authentication – Source

Authentication

Group secrecy is group analog to confidentiality; group authentication gives message integrity and validates the message originated from a member; source authentication validates that it originated from a specific group member

slide-9
SLIDE 9

Multicast ESP 9

Multicast ESP (MESP) Design

  • A transform framework for ESP

– Defines GS, SrA and GA functionalities

  • Predetermined sender order: GS, SrA, GA

– GA protects SrA

  • Uses internal & external authenticators

– SrA called “internal authentication” – GA called “external authentication” – GA protects SrA

slide-10
SLIDE 10

Multicast ESP 10

MESP Packet Format

1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Security Parameters Index (SPI) | ^ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Sequence Number | ^ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | ~ IV (variable & optional) ~ | | +---------------------------------------------------------------+ | | ~ Internal Authentication Parameters (variable & optional) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | ~ Data (variable) ~^ I E + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+E N X ~ ~ Padding (0-255 bytes) |N T T +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+C | | | | Pad Length | Next Header |v v | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ~ Internal Authentication Tag (variable) ~ v +---------------------------------------------------------------+ ~ Integrity Check Value (variable) ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

slide-11
SLIDE 11

Multicast ESP 11

Some Open MESP Issues

  • EXT (GA) as a MUST or SHOULD?
  • INT (SrA) as a MUST or SHOULD?
  • AES-MAC and combined-mode xforms

don’t serve the GA function well

  • AHbis could serve the GA function
slide-12
SLIDE 12

Multicast ESP 12

GDOI Signaling: SA TEK

1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-! ! Protocol ! SRC ID Type ! SRC ID Port ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-! !SRC ID Data Len! SRC Identification Data ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-! ! DST ID Type ! DST ID Port !DST ID Data Len! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-! ! DST Identification Data ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-! ! Transform ID ! SPI ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-! ! SPI ! RFC 2407 SA Attributes ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!

MESP is a new IPsec Transform ID. The ENC, INT and EXT transforms are new SA attributes

slide-13
SLIDE 13

Multicast ESP 13

GDOI Signaling: SA Attributes

INT-Transform has the values: name value

  • Reserved

RSA-SHA 1 TESLA 2 The EXT-Transform has the values: name value

  • Reserved

HMAC-SHA1 1

class value type

  • ENC-Transform

11 B INT-Transform 12 B EXT-Transform 13 B ENC-Transform has the values: name value

  • Reserved

3DES 1 AES-CBC 2 AES-CTR 3

slide-14
SLIDE 14

Multicast ESP 14

Summary

  • We want to promote MESP as a

transform framework for multicast IPsec ESP applications

  • We have several issues
  • Need definitions for MIKEY and

GSAKMP

  • Need to work on implementation

concurrent to TESLA development

slide-15
SLIDE 15

TESLA Overview

slide-16
SLIDE 16

Multicast ESP 16

Overview

  • TESLA developed by Perrig, Canetti, et. al. as

an efficient source authentication transform

  • Seems to have advantages over other MAC-

bases source authentication schemes

  • It is destined to be used by MESP
  • There are some complexity issues with TESLA
  • Need to consider if this is something that

belongs in the kernel

slide-17
SLIDE 17

Multicast ESP 17

TESLA Properties

  • High guarantee of source authenticity

for multicast groups

  • Does not provide non-repudiation
  • Robust against loss and re-ordering
  • Low overhead of 12-20 bytes/packet
  • Delayed disclosure & receiver buffering
  • No sender buffering
slide-18
SLIDE 18

Multicast ESP 18

Deriving Authentication Keys

F(Ki) F(Ki+1) F(Ki+2) Ki-1 <------- Ki <--------- Ki+1 <------- | | | | | | F'(Ki-1) F'(Ki) F'(Ki+1) | | | V V V K'i-1 K'i K'i+1

Based on an old scheme: Lamport’s One-Way Hash Chain (1981) and S/KEY (RFC 1760). HMAC-SHA1 is just one type of

  • ne-way function that can be used.
slide-19
SLIDE 19

Multicast ESP 19

Based on Hashed Key Chain

  • Ki= HMAC(Ki-1,1), K0= K

– Sender selects chain length N – Precomputes chain from N-1 to zero

  • K is digitally signed by sender

– Disseminated e.g. by key management – One sig per arbitrarily long “key chain”

  • Ki’= HMAC(Ki,0) is HMAC key for packet
  • Ki’ used for all packets in interval i
slide-20
SLIDE 20

Multicast ESP 20

TESLA Packet Processing

_____ _____ / \ / \ / \ \ / / \ \ / / \ \ V V \ \

  • -+------+------+------+------+---> t

Ij Ij+1 Ij+2 Ij+3 Kj Kj+1 Kj+2 Kj+3 +----+ +----+ | P1 | | P2 | +----+ +----+

slide-21
SLIDE 21

Multicast ESP 21

TESLA Packet Format

1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | [Length] | [Type] |D|C|L| Res | [Interval Id] | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | [Packet Sequence Number] | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ | | ~ MAC(Ki, Di) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | ~ [Disclosed Key] ~ | | ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ | | ~ [NK: Commitment to new key] ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | ~ [Disclosed Key from previous chain] ~ | | ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Padding (0-3 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

slide-22
SLIDE 22

Multicast ESP 22

TESLA Issues

  • Time synch

– Packets received

after key disclosure

– Receives with vastly

different sender RTTs

  • Receiver buffering

– Problematic in the

kernel

  • Others?