28
Link-local security J.W. Atwood, S. Islam, S. Maziar PIM Working Group 2008/11/18 [email protected]

Link-local security

  • Upload
    bethan

  • View
    39

  • Download
    0

Embed Size (px)

DESCRIPTION

Link-local security. J.W. Atwood, S. Islam, S. Maziar PIM Working Group 2008/11/18 [email protected]. draft-ietf-pim-sm-linklocal-05. Minor changes Introduction sets up the environment Notes possibility of GSAKMP for automated key management Some housekeeping New Stuff - PowerPoint PPT Presentation

Citation preview

Page 1: Link-local security

Link-local security

J.W. Atwood, S. Islam, S. Maziar

PIM Working Group2008/11/18

[email protected]

Page 2: Link-local security

draft-ietf-pim-sm-linklocal-05 Minor changes

Introduction sets up the environment Notes possibility of GSAKMP for

automated key management Some housekeeping

New Stuff Section on “Rekeying” (copied from

4552)

Page 3: Link-local security

Recent activity Attempts to get help on the

“environment” problem Distributed key servers Router identification

Realization that this draft is (almost) independent of those issues

Page 4: Link-local security

Setting the Environment Router identification Controlling keys Controlling adjacency Usefulness of distributed

keyservers

Page 5: Link-local security

Router Identity A mechanism exists to give each

router an identity Unique within an administrative

region PKI, HIP, etc.

See “Router Identification Problem Statement” at IETF-71

Page 6: Link-local security

Controlling keys and adjacency GC/KS exists

Assign DEKs and SAIs GC can answer the question, “is this

router a legitimate neighbor for me?” A “distributed key server” model may

be appropriate See “Distributed Keyservers” at IETF-71

Page 7: Link-local security

Examples Two “end” cases provide the

examples One key, one SA for the entire

administrative region One key, one SA for each speaking

router

Page 8: Link-local security

A walk through the draft RFC 4601 is based on the new AH, and

mandates authentication using AH We draw heavily from RFC 4552

Specify mandatory authentication and optional confidentiality

Keying Require manual keying Provide means of support for automatic

keying

Page 9: Link-local security

Transport vs. Tunnel mode Two routers are acting as hosts

MUST support transport mode MAY support tunnel mode

Page 10: Link-local security

Authentication & Confidentiality MUST support authentication

MUST support ESP MAY support AH

SHOULD support confidentiality MUST use ESP

Page 11: Link-local security

IPsec requirements Transport mode Multiple SPDs Selectors Interface ID tagging Manual key support No stream ciphers IP encapsulation

Page 12: Link-local security

Key management MUST support manual keying Do not preclude the use of IKE or

GSAKMP to establish keys

Page 13: Link-local security

Manual Key Management Manual configuration at boot-up SAD entries SPD entries

Page 14: Link-local security

Automated Key Management Cannot use IKE Could use GDOI Could use GSAKMP

Page 15: Link-local security

Communication Patterns Each “speaker” represents a small

group All are sending on the same

destination address New rules in IPsec allow using sender

address and interface ID tag to differentiate

Page 16: Link-local security

Key Server Models Go to regional KS for keys Go to local KS (the speaking

router) for keys (allows continuing when path to

regional KS is broken)

Page 17: Link-local security

Neighbor Relationships Managed by regional GC Out of scope for this document

Page 18: Link-local security

Number of Sas Optional: one SA for each neighbor

plus one for outgoing Mandatory: one SA for all

neighbors and one for outgoing

Page 19: Link-local security

Rekeying Procedure for doing it Configurable KeyRolloverInterval Rekeying Interval

Manual: 90 days Automatic: Will be specified by the

key server document

Page 20: Link-local security

IPsec Protection Barrier and GSPD Manual Keying

SAD entries SPD entries

Page 21: Link-local security

..2 Automatic Keying

SAD entries (created by the automatic procedure)

GSPD entries Configured “send only” Triggered by the automatic procedure

PAD entries Filled by adjacency management Out of scope for document

Page 22: Link-local security

Security Association Lookup Multicast lookup uses

Sender address (not unique because of link-local addresses)

Interface ID tag SPI

Page 23: Link-local security

Activating Anti-replay Only recommended for automatic

keying Keep sequence number per SA Keep SA per sender

Page 24: Link-local security

SAD per interface 4601 suggests it may be desirable 4301 deprecates SAD per interface

Replaced with interface ID tags for lookup

Page 25: Link-local security

Extended Sequence Number Suggested for use with manual

keying

Page 26: Link-local security

Security Considerations Limitations of manual keys Impersonation in single-key group Pointers to

4593 (Generic Threats to Routing Protocols)

5294 (Specific threats to PIM-SM) 4601 (PIM-SM)

Page 27: Link-local security

Plans Tidy up a few housekeeping issues Listen carefully for feedback during

and after this meeting Ask for WGLC, based on the next

version of the draft

Page 28: Link-local security

Questions?