30
Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

  • View
    223

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

Security Policy Reconciliation in Distributed Environments

Hao Wang, Somesh Jha, Miron Livny

University of Wisconsin

Patrick D. McDaniel

AT&T Research

Page 2: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 2

Policy Reconciliation

• To reconcile multiple policies among participants

Alice Bob

Session policy1. … 2. …

1. … 2. …3. …

Page 3: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 3

Motivation—Secure Communication

SSH Protocol 1. SSH12. SSH2

1. SSH2

Encryption 1. AES-1281. 3DES

1. AES-128 1. 3DES

MAC 1. HMAC-SHA12. HMAC-MD5

1. HMAC-MD52. HMAC-SHA1

Compression 1. None2. Zlib

1. Zlib2. None

SSH Session

Server Policy Client Policy

Different preference

Different requirement

Different preference

Page 4: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 4

Motivation—Resource Sharing

• Policy reconciliation also occurs in collaborative environments– E.g. GRID, Condor, SETI@Home– Policies may change frequently

InternetInternet

1.MUST authenticate1.Use PKI2.Use Kerberos

2.MUST encrypt all channels

1.Use AES-128

1.MUST authenticate1.Use Kerberos

2.MAY encrypt all channels

1.Use AES-128

1.MUST authenticate1.Use PKI2.Use Kerberos

2.MUST encrypt all channels

1.Use AES-1282.Use DES-1283.Use Blowfish-

1283.MAY use integrity

check1.HMAC-MD5

?

?

Page 5: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 5

Recurring Theme

• Each site/host/user may have– Different security requirements– Different security preferences

• Session policy is dynamic

Internet

Internet

Page 6: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 6

Policy Reconciliation

• To establish a provisioning session policy among participants

Alice Bob

ReconciliationEngine

Session policy1. … 2. …

1. … 2. …3. …

Page 7: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 7

Problem Domain

• We deal with session provisioning policy– E.g. a secure session between two parties

• We do not deal with– Policy decisions– Policy constructions, transformations– Resolving policy conflicts

• Separation of policies and mechanisms– Our work provides the mechanism

Page 8: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 8

Outline

• Motivation• Policy Representation using DAG• Policy Reconciliation• Implementation

Page 9: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 9

Security Policy Reconciliation

• How to represent security policies– Need to capture dependencies within

each policy– Need to capture policy preferences

• How to reconcile security policies– Need to resolve policy preferences– Need to be efficient

Page 10: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 10

Existing Approaches

• How to represent security policies– Flat– Do not address preferences– e.g. IPsec policy:

• Proposal 1: AH– Transform 1: HMAC-SHA– Transform 2: HMAC-MD5

• Proposal 2: ESP– Transform 1: 3DES with HMAC-SHA– Transform 2: 3DES with HMAC-MD5

• Proposal 2: PCP– Transform 1: LZS– Transform 2: Deflate

Proposal 1 may use one of the 2 listed

transforms

This policy offers 2

proposalsProposal 2 MUST use both ESP and

PCP; and there are two transforms

each for ESP and PCP.

Page 11: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 11

Existing Approaches (cont.)

• How to reconcile security policies– Policies with preferences have not

been well addressed– Dependencies within policies are not

expressed explicitly– Generally a NP-complete problem

• Gong and Qian, 1994• McDaniel and Prakash, 2002

Page 12: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 12

Our Contributions

• How to represent security policies – Use directed acyclic graph (DAG) to

represent policies• Concise• Capture dependencies among policy

components• Allow efficient reconciliation

– Handle policies with preferences

Page 13: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 13

Our Contributions

• How to reconcile security policies – DAG model simplifies the problem– Policy is reconciled only once per

session– Reconcile policies with preferences– Polynomial time reconciliation– Supports multi-party reconciliation

• Current implementation supports two-party reconciliation

Page 14: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 14

Policy Representation

• Graph model– Use Directed Acyclic Graph (DAG) S = (N,

E) called schema• N—set of nodes

– Each node is either an AND ( ) or an OR ( ) node– AND node == collection– OR node == decision

• E—set of edges

– A policy P = (S, C) is a sub-schema derived from S, where C is the condition function

– A policy instance is derived from P

Page 15: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 15

Policy Schema

Integrity

root

Authentication Encryption

Kerberos PKI Password AES 3DES Blowfish HMAC

MD5 SHA1CBC

• Authentication– Kerberos– PKI (X.509)– Password

• Encryption– AES-CBC– 3DES-CBC– Blowfish-CBC

• Integrity– HMAC-MD5– HMAC-SHA1

Page 16: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 16

Policy Schema & Policies

• The policy schema defines the blue print• Each site has its own security policy based

on the schema, i.e. sub-schema– Similar to database schema

Integrity

root

Authentication Encryption

Kerberos PKI Password AES 3DES Blowfish

HMAC

MD5 SHA1

Integrity

root

Authentication Encryption

Kerberos PKI AES 3DES

HMAC

MD5 SHA1Schema Policy sub-schema

CBC CBC

Page 17: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 17

Policy Schema & Policies

Integrity

root

Authentication Encryption

Kerberos PKI Password AES 3DES Blowfish

HMAC

MD5 SHA1

Integrity

root

Authentication Encryption

Kerberos PKI AES 3DES

HMAC

MD5 SHA1Schema Policy sub-schema

CBC CBC

Integrity

root

Authentication Encryption

Kerberos AES

HMAC

MD5Policy instance 1

CBC

Integrity

root

Authentication Encryption

PKI 3DES

HMAC

MD5Policy instance 2

CBC

Page 18: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 18

Policies May Have Preferences

• Each user/host/site has its own preferences – Either due to design or requirements– E.g. A may consider Kerberos to be the

preferred authentication algorithm over PKI; while B prefers PKI

• A policy P with preference: (S, C, Pref)– Pref(n): partial order function for each node

Page 19: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 19

Policy With Preferences

Integrity

root

Authentication Encryption

Kerberos PKI Password AES 3DES Blowfish HMAC

MD5 SHA1CBC

• Authentication1. Kerberos2. PKI (X.509)3. Password

• Encryption1. AES-CBC2. 3DES-CBC3. Blowfish-CBC

• Integrity1. HMAC-MD52. HMAC-SHA1

1 2 3

1 2

3 11 2

1 1 1

Page 20: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 20

Policy With Preferences

Kerberos PKI

Password

• Policy 1:– Authentication

1.Kerberos or PKI2.Password Kerberos

PKI

Password

• Policy 2:– Authentication

1.Kerberos2.PKI3.Password

• Use partial ordering to express preferences

Page 21: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 21

Outline

• Motivation• Policy Representation using DAG• Policy Reconciliation• Implementation

Page 22: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 22

Policy Reconciliation

• Assumptions– A common policy schema shared by

participants– Custom policy schemas for different

participants

• Goals– A common policy schema for the participants– Reconciled once per session– Must handle preferences

Page 23: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 23

Policy Construction

Sub-schema A

Sub-schema B

Integrity

root

Authentication Encryption

Kerberos PKI Password AES 3DES Blowfish

HMAC

MD5 SHA1Schema

CBC

Integrity

root

Authentication Encryption

Kerberos PKI Password AES 3DES Blowfish

HMAC

SHA1CBC

Integrity

root

Authentication Encryption

Kerberos PKI Password AES Blowfish

HMAC

MD5 SHA1CBC

Page 24: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 24

Reconciling Preferences

Kerberos PKI

Password

Kerberos

PKI

Password

Sub-schema A

Sub-schema B

Integrity

root

Authentication Encryption

Kerberos PKI Password AES 3DES Blowfish

HMAC

SHA1CBC

Integrity

root

Authentication Encryption

Kerberos PKI Password AES Blowfish

HMAC

MD5 SHA1CBC

1 1 2 1 2

1 2

1 2 3 1 2 3

1

Page 25: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 25

Policy Reconciliation With Preferences

root

Authentication

Kerberos PKI

root

Authentication

Kerberos Password

Sub-schema B

Kerberos PKI

Password

Kerberos

PKI

Password

Password PKI

root

Authentication

Kerberos

Reconciled Policy Schema

PKI Password

Kerberos

PKI

Password

Preference APreference A Preference BReconciled Preference

Sub-schema A

1 1 2 1 2 3 1 2 3

Page 26: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 26

Policy Reconciliation

SHA1Reconciled Policy CBC

Sub-schema A

Sub-schema B

Integrity

root

Authentication Encryption

Kerberos PKI Password AES 3DES Blowfish

HMAC

Integrity

root

Authentication Encryption

Kerberos PKI Password AES Blowfish

HMAC

1 1 2 1 2

1 2

1 2 3 1 2 3

1

Integrity

root

Authentication Encryption

Kerberos PKI Password AES Blowfish

HMAC

1 2 3 1 2

1

SHA1CBCMD5 SHA1CBC

Page 27: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 27

Policy Instantiation

Reconciled Policy

Integrity

root

AuthenticationEncryption

Kerberos AES HMAC

SHA1Policy Instance 1 CBC

Integrity

root

AuthenticationEncryption

Kerberos BlowfishHMAC

SHA1Policy Instance 2 CBC

Kerberos

PKI

Password

AES-CBC

Blowfish-CBC

Most preferred Instance

SHA1CBC

Integrity

root

Authentication Encryption

Kerberos PKI Password AES Blowfish

HMAC

1 1 2 1 2

1

Page 28: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 28

Policy Reconciliation—Summary

Schema

Policy Reconciliation Engine

Policy Instance Policy Instance Policy Instance

Policy sub-schema Policy sub-schemaPolicy sub-schema

ReconciledPolicy Schema

Page 29: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 29

Implementation

• Policy Reconciliation Engine (PRE)– See

http://www.cs.wisc.edu/~hbwang/PRE/tr1499.pdf for details

– Code available at http://www.cs.wisc.edu/~hbwang/PRE

• Integrated with Condor, a high-throughput, distributed system– http://www.cs.wisc.edu/condor

Page 30: Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research

IEEE Policy 2004, Hao Wang 30

Conclusion

• We demonstrated a graph-based algorithm for policy reconciliation– Exposes the structure of policies– Is concise and efficient– Handles policies with preferences– Models dependencies within each

policy