Access control for IP multicast T110 557 Petri

  • Slides: 18
Download presentation
Access control for IP multicast T-110. 557 Petri Jokela petri. jokela@nomadiclab. com

Access control for IP multicast T-110. 557 Petri Jokela petri. jokela@nomadiclab. com

Contents ● ● Unicasting / multicasting HIP – ● Certificates – ● ● ●

Contents ● ● Unicasting / multicasting HIP – ● Certificates – ● ● ● User authentication User authorization Certificate based Multicast Access Control C-MAC Future work Summary

Multicasting ● Unicasting – – ● Point-to-point connection Multiple receivers -> resources wasted Multicasting

Multicasting ● Unicasting – – ● Point-to-point connection Multiple receivers -> resources wasted Multicasting – – One outgoing stream, multiplied near recipients How to control stream receiving?

3 I based multicast ● Traffic is sent with a stream identifier – ●

3 I based multicast ● Traffic is sent with a stream identifier – ● Chord routing protocol used for data routing End-user sets a trigger at an I 3 server – Receive a stream ● – stream identifier in the trigger Traffic unicasted from the server to the end-user

IP multicasting Multicast routing protocol Send to IPv 4: 224. 0. 0. 0/4 Source

IP multicasting Multicast routing protocol Send to IPv 4: 224. 0. 0. 0/4 Source Router Join multicast group -IGMP Router broadcasts Host IPv 6: ff 00: : /8 Router Join. . . Host Router Join multicast group X Host

HIP usage ● The end-user authentication – – – ● During HIP 4 -way

HIP usage ● The end-user authentication – – – ● During HIP 4 -way handshake End-user sends HI (public key) Use private key to prove HI ownership IPsec usage – Data decryption key information sent over IPsec ESP

Certificates ● SPKI certificates – ● RFC 2693 Certificate – 5 -tuple, containing: –

Certificates ● SPKI certificates – ● RFC 2693 Certificate – 5 -tuple, containing: – – – Issuer: Who gives the rights Subject: To who this certificate gives rights Authorization: What this certificate authorizes the subject to do Validity: How long this cert is valid Delegation: Can the subject delegate this further? Certificate signed with issuer’s private key

Certificate delegation ● Certificate delegated: new and old cert concatenated – – – ●

Certificate delegation ● Certificate delegated: new and old cert concatenated – – – ● Issuer: itself Subject: next retailer or end-user Authorization: subset of original Validity: subset of original Delegation: depends on subject Signature over the whole certificate chain The receiver can validate – – Knows the first public key Goes through the certificate chain

C-MAC parties Source Data stream Router Retailer Cert ok? Router Keying End-user Retailer

C-MAC parties Source Data stream Router Retailer Cert ok? Router Keying End-user Retailer

C-MAC: certificate distribution Source Data stream Router Retailer Cert ok? Router Keying End-user Retailer

C-MAC: certificate distribution Source Data stream Router Retailer Cert ok? Router Keying End-user Retailer

C-MAC operation: cert distribution ● ● The data source issues a certificate – –

C-MAC operation: cert distribution ● ● The data source issues a certificate – – – Issuer: data source public key Subject: retailer’s public key Authorization: receive data multicasting X Validity: how long valid Delegation: yes – Payment: VISA, other. . . – not specified here Certificate given to a retailer Retailer can further delegate to another retailer Finally, certificate is sold to the end-user

C-MAC: authentication and authorization Source Data stream Router Retailer Cert ok? Router HIP negotiation

C-MAC: authentication and authorization Source Data stream Router Retailer Cert ok? Router HIP negotiation End-user Retailer

C-MAC: end-user authentication and authorization ● End user joins a multicast group – –

C-MAC: end-user authentication and authorization ● End user joins a multicast group – – ● HIP association with the router Router learns end-hosts public key (HI) End user sends the certificate to the router – – Router verifies the certificate chain Verify the subject, must match the end-user HI Make a verification to the last retailer Retailer marks the certificate used

C-MAC: data transmission Source Data stream Router Retailer Cert ok? Router Keying End-user Retailer

C-MAC: data transmission Source Data stream Router Retailer Cert ok? Router Keying End-user Retailer

C-MAC: Data transmission ● ● Data must be encrypted – – IP multicast: sent

C-MAC: Data transmission ● ● Data must be encrypted – – IP multicast: sent to everyone on the link Where? At the last router – – The decryption key is sent to valid receivers Key sent over the IPsec ESP – – How validity times are defined? Minutes, hours, days, . . . ? – – How to prevent end-user to redistribute the key? And if prevented, how to prevent resending decrypted data? Valid receiver needs a key Rekeying needed Problems

Future work ● Trust relations between entities – ● Security – ● ● ●

Future work ● Trust relations between entities – ● Security – ● ● ● How this system could be adopted in real business No security analysis made on this (complex) system Performance optimization – – Encoding of data Key distribution – Not studied in this paper Payment system Prototyping

Summary ● Access Control system for IP multicast – – IP multicasting Certificates for

Summary ● Access Control system for IP multicast – – IP multicasting Certificates for access control ● – User authentication ● – ● certificate chain HIP Data encryption A lot of work to do

Thank you!

Thank you!