1 / 42

J. William Atwood Bing Li Concordia University, Montreal Salekul Islam

IP Multicast Receiver Access Control draft- atwood - mboned-mrac-req draft- atwood - mboned - mrac -arch. IETF90-MBONED. J. William Atwood Bing Li Concordia University, Montreal Salekul Islam United International University, Dhaka. Overview.

lavey
Download Presentation

J. William Atwood Bing Li Concordia University, Montreal Salekul Islam

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IP Multicast Receiver Access Controldraft-atwood-mboned-mrac-reqdraft-atwood-mboned-mrac-arch IETF90-MBONED J. William Atwood Bing Li Concordia University, Montreal Salekul Islam United International University, Dhaka

  2. Overview • Exploring the area of Receiver Access Control for IP Multicast • Subtitle: Making money using IP Multicast • Covers some of the same concerns as those of the “well-managed multicast” work that was presented in MBONED four years ago • much smaller scope of interest • MBONED: “application” level drafts • PIM: “network” level drafts IETF 90-MBONED

  3. Trust Relationships: Unicast NSP CP EU EU EUD EUD CS Purchasing Data Delivery IETF 90-MBONED

  4. Trust Relationships:Multicast CP NSP EU EU EUD EUD CS Purchasing Data Delivery IETF 90-MBONED

  5. Trust Relationships:Multicast, Re-established NSP CP EU EU EUD EUD NSP Representative CS Purchasing Data Delivery IETF 90-MBONED

  6. Problem Size:mboned-maccnt-req Covers various business models AAA QoS CP CP EU EU Constraint: only one user on a physical link EUD EUD NSP Purchasing Data Delivery IETF 90-MBONED

  7. Problem Size:Other work in my lab FI MR AAA General business model CP CP EU EU N users on link No QoS EUD EUD NSP Purchasing Data Delivery IETF 90-MBONED

  8. Two Assumptions • The End User (EU) acquires a “ticket” from the Merchant (or anyone else) containing: • Session Descriptor • Secure End User authentication • Possibly, an encryption key for the data stream • The “Network Representative” has information on how to validate a “ticket” or assess the authorization of the EU or EU Device • This makes the discussion today independent of the business model in use by the NSP and/or CP • It restricts the scope of the work IETF 90-MBONED

  9. Problem Size:Today’s Discussion FI MR AAA CP CP EU EU EUD EUD NSP Purchasing Data Delivery IETF 90-MBONED

  10. Two levels of interaction • Application Level • EU presents the “ticket” • Goal: Join the group • Network Level • End User Device issues IGMP/MLD • To ensure that only legitimate subscribers get access • MUST be secure at Application Level • MUST be secure at Network Level IETF 90-MBONED

  11. Two Approaches • Solution 1 • Carry the “ticket” in an extended network-level join exchange • The security of the two levels is implied by the fact that they are carried in a single level of message exchanges, which are secured • Solution 2 • Provide separate secure application level join and secure network level join functions, along with a method for explicitly coordinating them IETF 90-MBONED

  12. Extending IGMP • Long history of attempts to extend IGMP • All of them abandoned • All were “restricted” solutions • Based on a particular version of IGMP, -OR- • Proposed a limited set of authorization methods • A list of citations is in the draft • None of these attempts considered “accounting” specifically IETF 90-MBONED

  13. Securing IGMP/MLD • One IRTF Internet Draft on securing IGMP • Once a device established a secure relationship with its router, it was allowed to send a join for any group. • RFC 3376 suggests using AH to secure IGMP packets • RFC 3810 is silent on the issue of securing MLD packets • None of these attempts considered “accounting” specifically • No need to deploy the solution if accounting is unnecessary! IETF 90-MBONED

  14. Goals • List the requirements on a set of mechanisms that • allow the Network Service Provider to act on behalf of the Content Provider • meet the access control and revenue generation goals • remain as independent as possible from the specific business model in use • Specify an architecture that meets these goals IETF 90-MBONED

  15. Approach • We explore Solution 2 • Separate joins and explicit coordination • Thus, the constraints fall naturally into three categories: • Application-level constraints • Network-level constraints • Interaction constraints IETF 90-MBONED

  16. Requirements • Application level constraints • Authenticating and Authorizing Multicast End Users • Group Membership and Access Control • Independence of Authentication and Authorization Procedures • Re-authentication and Re-authorization • Accounting • Multiple Sessions on One Device • Multiple Independent Sessions on a LAN • Application Level Interaction must be Secured IETF 90-MBONED

  17. Requirements ..2 • Network level constraints • Maximum Compatibility with MLD and IGMP • Group Membership and Access Control • Minimal Modification to MLD/IGMP • Multiple Network Level Joins for End User Device • NSP Representative Differentiates Multiple Joins • Network Level Interaction must be Secured IETF 90-MBONED

  18. Requirements ..3 • Interaction constraints • Coupling of Network and Application Level Controls • Separation of Network Access Controls from Group Access Controls IETF 90-MBONED

  19. Building Blocks • AAA: A general framework for managing access to networks, based on RADIUS and Diameter • EAP: A general framework for negotiating a method for authenticating users • Some methods allow mutual authentication • Typically used for access to the “entire network” • Can be adapted to manage access to multicast groups IETF 90-MBONED

  20. Building Blocks..2 • PANA: A “lower layer” for EAP, between the EUD and the NSP • Can be used to create a key, known to the PANA Client (PaC) and the PANA Authentication Server (PAA) (= NSP Representative) • Enforcement is done by an Enforcement Point (EP) • IGMP/MLD: Network-level access control for IP Multicast • Unsecured (in standard multicast) IETF 90-MBONED

  21. Building Blocks..3 • IP Security (IPsec): Protocols and methods for establishing the authenticity, integrity, and other cryptographic properties of IP datagrams • Can be used to secure IGMP/MLD • We call this secure form of IGMP/MLD Secure IGMP (SIGMP) or Secure MLD (SMLD) IETF 90-MBONED

  22. Architecture EU EU NSP AAAS EUD EUD Diameter(EAP) PANA(EAP) PAA SIGMP Q/EP DR PANA(EAP) PAA SIGMP Q/EP DR Purchasing Data Delivery IETF 90-MBONED

  23. Environment: Network Segment for Multicast EU1 Q EU2 NQ EU3 IETF 90-MBONED

  24. Environment: Add EAPS and PAA EAPS PAA AAAS EU1 Q EU2 NQ EU3 IETF 90-MBONED

  25. Environment: Locate EAP participants EAP Peer EAP Server EAP Authen- ticator EAPS PAA AAAS EU1 Q EU2 NQ EU3 IETF 90-MBONED

  26. Environment: Show EAP Transport EAP Peer EAP Server EAP Authen- ticator EAPS PAA AAAS PANA Diameter EU1 Q EU2 NQ EU3 IETF 90-MBONED

  27. Enforcement Points • The PAA is the negotiator for the network end of the PANA session • The PaC is the negotiator for the user end of the PANA session • In general, the PAAwill have one or more Enforcement Points (EP) under its control • For general network access control, the EP may well be a switch • For our application, the EP must be the Querier (Q) for that network segment. If a snooping IGMP switch is present, we may need to adjust this. IETF 90-MBONED

  28. Environment: Show EPs EAP Peer EAP Server EAP Authen- ticator EAPS PAA AAAS PANA PaC PAA Diameter EU1 AAAS EP1 NAS Q EU2 EP2 NQ EU3 IETF 90-MBONED

  29. Master Session Key From EAP negotiation, a Master Session Key (MSK) becomes known to the EAPS and the EU. The EAPS forwards a copy to the PAA using Diameter. IETF 90-MBONED

  30. EAP: MSK MSK MSK EAP Peer EAP Server EAP Authen- ticator EAPS PAA AAAS PANA PaC PAA Diameter EU1 AAAS EP1 NAS Q EU2 EP2 NQ EU3 IETF 90-MBONED

  31. EAP: MSK copied to PAA MSK MSK MSK EAP Peer EAP Server EAP Authen- ticator EAPS PAA AAAS PANA PaC PAA Diameter EU1 AAAS EP1 NAS Q EU2 EP2 NQ EU3 IETF 90-MBONED

  32. PaC-EP Master Key The PAA uses the MSK and EP-specific information to compute a PaC-EP Master Key (PEMK) for each EP. It sends the corresponding key to each of the EPs, along with information identifying the multicast group and the EU address. IETF 90-MBONED

  33. PAA sends PEMK to EPs MSK MSK MSK EAP Peer EAP Server EAP Authen- ticator EAPS PAA AAAS PANA PaC PAA Diameter EU1 AAAS EP1 NAS Q PEMK_1 EU2 EP2 NQ PEMK_2 EU3 IETF 90-MBONED

  34. Multicast Session Specific Key Each EP combines its PEMK with information about the EU address and the specific multicast session, to produce a Multicast Session Specific Key (MSSK). At the EU, given that the EP is known to be Q, and given the MSK and the specific multicast group, the EU can calculate the same MSSK. The EP and the EU now have a shared key that they can use to establish the EU’s right to join the multicast group. IETF 90-MBONED

  35. EPs compute MSSK; EUs compute PEMK and MSSK MSK MSK MSK EAP Peer EAP Server EAP Authen- ticator EAPS PAA AAAS PANA PaC PAA PEMK_1 Diameter EU1 AAAS EP1 NAS MSSK_1.1 Q PEMK_1 MSSK_1.1 EU2 EP2 NQ PEMK_2 EU3 IETF 90-MBONED

  36. Open vs Secure Groups • Open Group • No access controls • Operations will follow standard IP multicast rules (3376 or 3810) • Secure Group • Access controls to prevent an unauthorized EU from accessing the group • Additional operations are needed • IGMP/MLD exchanges are protected with IPsec, using the derived keys IETF 90-MBONED

  37. Multicast Security Associ-ations for Secure IGMP • Many distinct Multicast Security Associations are required on each network segment: • One with Q as the sender, and NQ plus the admitted members as receivers • One for each legitimate participant EU, with the EU as the sender, and NQ plus Q as the receivers • All are uni-directional, as defined in RFC5374 • These are negotiated using GSAM, and used by Secure IGMP (SIGMP) (or Secure MLD, for v6) IETF 90-MBONED

  38. Results • Secure Authentication of the End User • Authorization is then possible using standard AAA interactions within the NSP • A shared key is generated, which can be used to derive the necessary keys for protecting the IGMP/MLD exchanges IETF 90-MBONED

  39. Documents: Issued • MRAC Requirements • draft-atwood-mboned-mrac-req • MRAC Architecture • draft-atwood-mboned-mrac-arch • Secure IGMP • draft-atwood-pim-sigmp • GSAM (coordination of Secure IGMP end points) • draft-atwood-pim-gsam IETF 90-MBONED

  40. Documents: To Come Using PANA+EAP to achieve the MRAC Secure MLD IETF 90-MBONED

  41. Next Steps Request for feedback (on the list or elsewhere) If this work is found useful, we request a liaison statement to PIM WG asking for the SIGMP/SMLD work to be done. IETF 90-MBONED

  42. Thank You! Questions? IETF 90-MBONED

More Related