Using the IPSec Architecture for Secure Multicast Communication

Using the IPSec Architecture for Secure Multicast Communication Thorsten Aurisch [email protected] Christoph Karg [email protected] Research Establishm...
Author: Steven Parrish
0 downloads 2 Views 447KB Size
Using the IPSec Architecture for Secure Multicast Communication Thorsten Aurisch [email protected]

Christoph Karg [email protected]

Research Establishment for Applied Science Neuenahrer Straße 20 D-53343 Wachtberg, Germany

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.1/17

Multicast Communication • Efficient data transmission from one sender to a group of receivers • Examples of usage . Briefing sessions . Database replication . Audio/video conferencing • Idea: send data once and duplicate it where necessary • Requirement: sophisticated routing infrastructure • Problem: How to secure the data traffic?

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.2/17

Important Questions • Which scenario for group communication? • How to secure the multicast traffic? • How to manage the security settings?

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.3/17

Scenario (Briefing Session) send receive

Receiver (1, 1)

Receiver (1, n1 )

Sender 1

Multicast Group Receiver (n, 1)

Receiver (2, 1)

Sender n

Sender 2

Receiver (n, mn )

Receiver (2, m2 )

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.4/17

Multicast Security • Mandatory requirements . Secrecy of the data traffic . Group authentication . Source authentication . Forward/backward security • Group key exchange . Key agreement protocols collaborative key negotiation . Key distribution protocols generation & distribution via a key server

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.5/17

Scenario (Key Exchange) Receiver (1, 1)

Receiver (1, n1 )

Key Distribution Protocol

Receiver (n, mn )

Key Distribution Protocol

Receiver (n, 1)

Key Agreement Protocol

Sender n

Sender 2

Key Distribution Protocol

Sender 1

Receiver (2, 1)

Receiver (2, m2 )

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.6/17

Scenario Details Sender hosts • Number n ≈ 25 • Send and receive data • Connected via broadband networks • Key exchange via agreement

Receiver hosts • Number mi ≈ 10000 • Only receive data • Connected via networks with narrow bandwidth • Key distribution from a designated sender RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.7/17

Security Concept • Security: Usage of the IPSec protocol suite . Security at network layer . Multicast support . Algorithms for encryption and group authentication . But: No source authentication Hope: several IETF drafts (work in progress) • To solve: Multicast Internet Key Exchange (MIKE) . Negotiation of IPSec settings . Key exchange functionality • Goal: Development of a MIKE daemon

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.8/17

Kernel Space

User Space

MIKE as part of the IPSec framework Application

IKE

AF_INET6

TCP

UDP

MIKE PF_KEY 2

SAD

SPD

MSAD

IPv6 Unicast/Multicast IPSec HF ISDN Ethernet

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.9/17

MIKE Design Goals • Two objectives: . Prototypical implementation . Simulation environment • Special focus on military environments . Narrow bandwidth (wireless communication) . Emission control (EMCON) • Design criteria . Separation of key management and application . Robust exchange protocols . Extensibility . Independency from multicast routing mechanisms . Usage of existing standards as far as possible RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.10/17

MIKE Architecture

Group Policy Database

MIKE daemon Key Manager Group 1

Key Manager Group n

Group Management Framework

Message Dispatcher

PF_KEY 2

TCP

UDP

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.11/17

Message Dispatcher • Task: transmission of key exchange messages • Prototypical implementation . Connection to the Internet . Configuration of IPSec kernel module • Simulation environment Group Policy Database

MIKE daemon

. Simulation of packet loss, delays, etc.

Key Manager Group 1

Key Manager Group n

. Visualization of key exchange protocols

Group Management Framework

Message Dispatcher

PF_KEY 2

TCP

UDP

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.12/17

Group Management Framework • Task: Multicast IPSec management of the host • Group access control • Invocation/termination of key managers • Key exchange message distribution

Group Policy Database

MIKE daemon Key Manager Group 1

Key Manager Group n

Group Management Framework

Message Dispatcher

PF_KEY 2

TCP

UDP

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.13/17

Key Manager • Task: negotiation of IPSec settings for one multicast group • Host authentication and digest validation • Sender mode . Key agreement with other senders . Receiver management

Group Policy Database

MIKE daemon Key Manager Group 1

Key Manager Group n

• Receiver mode

Group Management Framework

. Requesting IPSec settings from the designated sender

Message Dispatcher

PF_KEY 2

TCP

UDP

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.14/17

Group Policy Database • Task: provision of security relevant information • Type of information dependent on the accessing component . Filtering rules message dispatcher . Group access policy Key Manager group management framework

Group Policy Database

MIKE daemon Key Manager Group 1

Group n

Group Management Framework

. User access control, authentication data key manager

Message Dispatcher

PF_KEY 2

TCP

UDP

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.15/17

Implementation Details • Object oriented approach (C++) • Open source operating system . Debian Linux . USAGI IPv6/IPSecurity kernel patch • Development tools . GNU Tools (gcc, make, etc.) . Standard Template Library . Crypto++ Library • Roadmap: . First prototype at the end of 2003 . Simulation environment in 2004 RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.16/17

Conclusion • Scenario: Briefing sessions • Security via IPSec architecture • Setup via Multicast Internet Key Exchange

RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING AND ERGONOMICS

Computer Networks

KIE ICCRTS 2003 – p.17/17

Suggest Documents