A SECURITY MANAGEMENT FRAMEWORK FOR ROUTING PROTOCOLS: RPSEC



Similar documents
APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Introduction to Security and PIX Firewall

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IPsec VPN Application Guide REV:

Chapter 7 Transport-Level Security

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Interconnecting Cisco Network Devices 1 Course, Class Outline

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Network Security Essentials Chapter 5

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Security vulnerabilities in the Internet and possible solutions

Triple DES Encryption for IPSec

IP Security. Ola Flygt Växjö University, Sweden

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Group Encrypted Transport VPN

Designing and Developing Scalable IP Networks

Computer Security: Principles and Practice

Using IPSec in Windows 2000 and XP, Part 2

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

The BANDIT Products in Virtual Private Networks

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

VPN. VPN For BIPAC 741/743GE

Implementing and Managing Security for Network Communications

Network Authentication X Secure the Edge of the Network - Technical White Paper

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

MPLS VPN Security Best Practice Guidelines

Branch Office VPN Tunnels and Mobile VPN

Understanding the Cisco VPN Client

Chapter 4 Virtual Private Networking

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Internet Protocol Security IPSec

Cisco Which VPN Solution is Right for You?

Computer Security DD2395

How To Learn Cisco Cisco Ios And Cisco Vlan

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

TLS and SRTP for Skype Connect. Technical Datasheet

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

"Charting the Course...

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Network Security. Lecture 3

Industrial Communication Whitepaper. Principles of EtherNet/IP Communication

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Configuring Internet Key Exchange Security Protocol

Network Security Part II: Standards

Computer Networks. Secure Systems

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

CCT vs. CCENT Skill Set Comparison

Tomás P. de Miguel DIT-UPM. dit UPM

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Laboratory Exercises V: IP Security Protocol (IPSec)

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Application Note: Onsight Device VPN Configuration V1.1

Chapter 17. Transport-Level Security

Introduction to IP v6

Chapter 32 Internet Security

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

MINI-FAQ: OpenBSD 2.4 IPSEC VPN Configuration

Cisco Wireless Security Gateway R2

Chapter 1 Personal Computer Hardware hours

BGP Routing. Course Description. Students Will Learn. Target Audience. Hands-On

Table of Contents. Introduction

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Network Working Group Request for Comments: Category: Standards Track December Security Architecture for the Internet Protocol

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Lecture 10: Communications Security

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

IP - The Internet Protocol

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

VXLAN: Scaling Data Center Capacity. White Paper

IPsec Details 1 / 43. IPsec Details

Chapter 3 LAN Configuration

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Amazon Virtual Private Cloud. Network Administrator Guide API Version

basic BGP in Huawei CLI

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

(d-5273) CCIE Security v3.0 Written Exam Topics

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

Protocols and Architecture. Protocol Architecture.

Lecture 17 - Network Security

Applications that Benefit from IPv6

CCNA Security 1.1 Instructional Resource

IP Multicasting. Applications with multiple receivers

Transcription:

A SECURITY MANAGEMENT FRAMEWORK FOR ROUTING PROTOCOLS: RPSEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

ROUTING PROTOCOLS Goal: Build forwarding table Exchange messages with peers to share information Communication model Unicast, multicast Communication transport IP, UDP, TCP Prerequisite function Identify peer routers (discover, configure) Security functions Neighbor validity (authentication and authorization) Message integrity 2

ROUTING PROTOCOL CONFIGURATION Previous slide showed a variety of options Some routing protocols can be configured with variants OSPF: IPsec or Authentication Trailer (AT) AT can be MD5 or SHA1 Neighbor relationships IGPs (e.g., OSPF, PIM-SM) tend to discover neighbors But should be told which ones are legitimate EGPs (e.g., BGP) need to be told who their neighbors are 3

HIGH LEVEL VIEW R1 RP-1 Message Exchange RP-1 R2 Routers Routing protocols Security mechanisms Network Operator? Network Operator Security management Configuration/ Distribution 4

SECURITY MECHANISM Message Integrity Security protocol calculates authentication data using Input = Routing protocol message + some credential Today, the most-used credential is a Pre-shared key Security Association (SA) = security protocol + credential In practice, a router is both authenticated and authorized if it possesses the parameters of an SA 5

EXISTING SECURITY MECHANISMS Two types In-band and Out-of-band In-band (part of the routing protocol exchanges) Calculate the authentication data and attach it as a trailer to the routing protocol message Keyed-MD5, HMACs Out-of-Band (part of the routing transport functionality) TCP-MD5, TCP-AO Calculate the authentication data and attach it to the TCP segment IPsec Calculate the authentication data and attach it to the IP header 6

SECURITY MANAGEMENT Manual method for management of SA If it is done at all, it is (almost) never re-done. SA Management is: Configuration/addition/deletion of an SA Current practice: device-by-device basis Manual access: visit the router or access via remote CLI 7

EXISTING KMP STANDARDS IETF Standard Unicast KMPs IKEv1 IKEv2 GKMP GDOI GSAKMP Work in progress G-IKEv2 An updated version of GDOI WORK IN PROGRESS KMPs for Routing Protocol (KARP work) Unicast KMP RKMP - based on IKEv2 Group KMPs G-IKEv2-MRKM MaRK Both based on G-IKEv2 No solution has been standardized yet Parameters for KMPs are also configured manually 8

CRYPTOGRAPHIC KEY TABLE (CKT) KARP working group standardized CKT (RFC7210) Stores master keys, key derivation functions and cryptographic protocols for the routing protocols 9

COMMON SECURITY PARAMETERS KMP requirements Peer Authentication - Peer identity Peer credentials SA Negotiation - List of security protocols List of cryptographic algorithms Deriving traffic keys for secure communications - Master key Key derivation functions (KDF) Routing Protocol Security Requirements Authentication Security protocol Keys KDF A master key Lifetime of key 10

RECAP RP-1 R1 R2 Message Exchange RP-1 Security Management Framework Layer 1 (Routing protocols) Layer 2 (Security mechanisms) KMP KMP negotiate/establish? Common Security Parameters Management Scheme? Layer 3 (Security Management) Layer 4 11 (Configuration/ Distribution) Network Operator Deficiencies at layers 3 and 4

PROBLEM STATEMENT To enhance the security of routing protocols 1. A set of KMPs is required (Layer 3) (work in progress by others) 2. A method for managing security parameters for routing protocols is required (Layer 3) a. Common security parameters 3. A management scheme for configuration and distribution of security parameters is required (Layer 4) a. Management modules for security parameters Goals 2 and 3 have no work under way, to our knowledge There is a need to improve the security management framework for the routing protocols 12

PROPOSAL Routing Protocol Security (RPsec) Improve the present security management framework of the routing protocols Mitigate the identified deficiencies Layer 3: Security Parameter Management Layer 4: Configuration and Distribution Management RPsec will enable a shift from present manual methods to fully automated methods RPsec will make a secure routing infrastructure easier to achieve 13

HOW RPSEC FITS INTO THE PRESENT SECURITY MANAGEMENT FRAMEWORK Routing Protocols- Message exchange 1.Manual methods 2. (Bullet 1) KMPs for RP Workin-progress Routing Protocol (Layer 1) Keys and Security Protocol (Layer 2) Key Management Security mechanisms (Bullet 2) Provisions common security parameters RPsec (Layer 3) Configuration Management (Layer 4) (Bullet 3) RPsec configuration/ distribution scheme 14

ACKNOWLEDGMENT Initial proposal was in KARP at IETF-87 (Berlin July 2013) draft-atwood-karp-aapm-rp Suggested authentication, authorization and policy management for routing protocols Sam Hartman and Dacheng Zhang suggested using a Routing Authentication Policy Database (RAPD) with the CKT Updated for IETF-88 (Vancouver Nov 2013) but not presented draft-zhang-karp-rapd A more detailed specification of role of RAPD Authentication and Authorization only. Separated from the policy management aspects RPsec is the continuation of the above efforts 15

DESIGN OBJECTIVES Independent of any specific security protocol Allows administrators to easily specify multiple security options for a routing protocol Accessible to multiple routing protocols implementations Accessible to multiple KMPs Provides support for both unicast and multicast routing protocol communication models 16

OVERVIEW RPsec RPAD RSPD CKT Three component databases--- Provide peer authorization information Security protocol choices Key related parameters Role A support module for key/sa management (at Layer 3) KM methods will use RPsec for authentication and key/sa negotiation. Routing protocol may consult RPsec directly for security parameters. 17

RSPD Objective Specify the processing behavior for the identified routing protocol traffic. Provide administrators the flexibility to specify multiple security options with associated lifetime information A KMP uses the RSPD for SA negotiation Traffic descriptors Processing behavior Protect Bypass Discard RSPD Security protocol 1 Security protocol 2 Transforms Lifetime Directionality Sender-only Receiver-only Symmetric 18

RPAD Objective Stores authentication data and a KMP specification for the identified routing peers. A KMP will use authentication data to assert a local/peer device's identity Local identity & credential List of peers & their credentials RPAD KMP Lifetime 19

CKT Provisions key material and associated cryptographic algorithms The RSPD and CKT are used together to ensure that the key is provided to the security protocol that is used for securing the routing protocol. Master key KDF CKT Cryptographic protocol Lifetime List of peers 20

RELATION BETWEEN RPSEC DATABASES Each entry in RSPD points to a corresponding entry in CKT, RPAD RSPD CKT Points to Routing protocol KMP A KMP negotiates policies as dictated in the RSPD 21

RPSEC YANG MODULES We have specified the options for the security parameters in four Yang modules for the RPsec rpsec-common-types.yang rspd.yang rpad.yang ckt.yang The RPsec Yang modules provide: parameters for both unicast and multicast communication logically structured entries in RSPD, RPAD and CKT 22

RPSEC CONFIGURATION/DISTRIBUTION ARCHITECTURE NetConf Client NetConf server Send request for RPsec entries Reply with or push RPsec entries A Framework for Policy Admission Control 23 This architecture can also be scaled to a distributed architecture

RECAPITULATION YANG modules for representation and configuration of RPsec databases Routing Protocol (Layer 1) Existing Security Mechanisms (Layer 2) Key Management (KMP and manual method) KMP & Peer Validation SA Negotiation Keys and SAs RPAD RSPD CKT RPsec RPAD Yang Module (Layer 3) RSPD Yang Module CKT Yang Module Configuration Management (NetConf) (Layer 4) KMP negotiates SA and provides fresh keys to security protocols at layer 2 RPsec component databases 24

SUMMARY OF RPSEC Provisions authentication information for the routing protocol peers. Provides support for KMPs for dynamic negotiation, establishment and rekey/rollover of SAs for the routing protocols when available. Administrators can specify multiple security mechanisms in the RSPD for the routing protocol. Overcomes the manual security configuration issues faced by the operators Automated regular key changes for the routing protocols. Finally, provides four Yang modules that can be easily modified and configured distributed over the network. 25

QUESTIONS? Thank you! 26