a s ecurity m anagement f ramework for r outing p rotocols : rp sec draft-atwood-rtgwg-rpsec william...

26
A SECURITY MANAGEMENT FRAMEWORK FOR ROUTING PROTOCOLS: RPSEC draft-atwood-rtgwg- rpsec William Atwood Nitin Prajapati

Upload: heriberto-housden

Post on 01-Apr-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

A SECURITY MANAGEMENT FRAMEWORK FOR ROUTING PROTOCOLS: RPSEC

draft-atwood-rtgwg-rpsec

William Atwood

Nitin Prajapati

Page 2: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

2

IETF9

1-R

TG

WG

ROUTING PROTOCOLS

Goal: Build forwarding table Exchange messages with peers to share information

Communication model Unicast, multicast

Communication transport IP, UDP, TCP

Prerequisite function Identify peer routers (discover, configure)

Security functions Neighbor validity (authentication and authorization) Message integrity

20

14

-11

-12

Page 3: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

3

IETF9

1-R

TG

WG

ROUTING PROTOCOL CONFIGURATION

Previous slide showed a variety of options Some routing protocols can be configured with

variants OSPF: IPsec or Authentication Trailer (AT)

AT can be MD5 or SHA1

Neighbor relationships IGPs (e.g., OSPF, PIM-SM) tend to “discover”

neighbors But should be told which ones are legitimate EGPs (e.g., BGP) need to be told who their

neighbors are

20

14

-11

-12

Page 4: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

4

IETF9

1-R

TG

WG

HIGH LEVEL VIEW

R1 R2

RP-1 RP-1Message Exchange

Network Operator Network Operator

?

Routers

Routing protocols

Security mechanisms

Security management

Configuration/ Distribution

20

14

-11

-12

Page 5: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

5

IETF9

1-R

TG

WG

SECURITY MECHANISM

Message Integrity Security protocol calculates authentication data using

Input = Routing protocol message + some credential Today, the most-used credential is a Pre-shared key

Security Association (SA) = security protocol + credential

In practice, a router is both authenticated and authorized if it possesses the parameters of an SA

20

14

-11

-12

Page 6: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

6

IETF9

1-R

TG

WG

EXISTING SECURITY MECHANISMS

Two types In-band and Out-of-band

In-band (part of the routing protocol exchanges) Calculate the authentication data and attach it as a

trailer to the routing protocol message Keyed-MD5, HMACs

Out-of-Band (part of the routing transport functionality) TCP-MD5, TCP-AO

Calculate the authentication data and attach it to the TCP segment

IPsec Calculate the authentication data and attach it to the

IP header

20

14

-11

-12

Page 7: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

7

IETF9

1-R

TG

WG

SECURITY MANAGEMENT

Manual method for management of SA If it is done at all, it is (almost) never re-done.

SA Management is:Configuration/addition/deletion of an SA

Current practice: device-by-device basisManual access: visit the router or access

via remote CLI

20

14

-11

-12

Page 8: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

8

IETF9

1-R

TG

WG

EXISTING KMP STANDARDS

Unicast KMPs IKEv1 IKEv2

GKMP GDOI GSAKMP

Work in progress G-IKEv2

An updated version of GDOI

Unicast KMP RKMP - based on IKEv2

Group KMPs G-IKEv2-MRKM MaRK Both based on G-IKEv2

No solution has been standardized yet

IETF Standard KMPs for Routing Protocol (KARP work)

Parameters for KMPs are also configured manually

WORK IN PROGRESS2

01

4-1

1-1

2

Page 9: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

9

IETF9

1-R

TG

WG

CRYPTOGRAPHIC KEY TABLE (CKT)

KARP working group standardized CKT (RFC7210)

Stores master keys, key derivation functions and cryptographic protocols for the routing protocols

20

14

-11

-12

Page 10: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

10

IETF9

1-R

TG

WG

COMMON SECURITY PARAMETERS

Peer Authentication - Peer identity Peer credentials

SA Negotiation - List of security

protocols List of cryptographic

algorithms

Deriving traffic keys for secure communications - Master key Key derivation

functions (KDF)

Authentication

Security protocol

Keys KDF A master key

Lifetime of key

KMP requirements Routing Protocol Security Requirements 2

01

4-1

1-1

2

Page 11: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

11

IETF9

1-R

TG

WG

RECAP…

(Routing protocols)

(Security mechanisms)

(Security Management)

(Configuration/ Distribution)

R1 R2

RP-1 RP-1

Message Exchange

Network Operator

?

KMPKMPnegotiate/establish ?Common Security

Parameters

Security ManagementFramework

Management Scheme

Deficiencies at layers 3 and 4

Layer 1

Layer 2

Layer 3

Layer 4

20

14

-11

-12

Page 12: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

12

IETF9

1-R

TG

WG

PROBLEM STATEMENT

To enhance the security of routing protocols

1. A set of KMPs is required (Layer 3) (work in progress by others)

2. A method for managing security parameters for routing protocols is required (Layer 3)

a. Common security parameters3. A management scheme for configuration and

distribution of security parameters is required (Layer 4)

a. Management modules for security parameters

Goals 2 and 3 have no work under way, to our knowledge

There is a need to improve the security management framework for the routing protocols

20

14

-11

-12

Page 13: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

13

IETF9

1-R

TG

WG

PROPOSAL

Routing Protocol Security (RPsec)

Improve the present security management framework of the routing protocols

Mitigate the identified deficiencies Layer 3: Security Parameter Management Layer 4: Configuration and Distribution Management

RPsec will enable a shift from present manual methods to fully automated methods

RPsec will make a secure routing infrastructure easier to achieve

20

14

-11

-12

Page 14: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

14

IETF9

1-R

TG

WG

HOW RPSEC FITS INTO THE PRESENT SECURITY MANAGEMENT FRAMEWORK

Routing Protocol(Layer 1)

Configuration Management

(Layer 4)

Keys and Security Protocol(Layer 2)

Security mechanisms

1.Manual methods2. (Bullet 1)KMPs for RP Work-in-progress

(Bullet 3)RPsecconfiguration/distribution scheme

Routing Protocols-Message exchange

Key Management

RPsec

(Layer 3)

(Bullet 2)Provisions common security parameters

20

14

-11

-12

Page 15: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

15

IETF9

1-R

TG

WG

ACKNOWLEDGMENT

Initial proposal was in KARP at IETF-87 (Berlin July 2013)

draft-atwood-karp-aapm-rp Suggested authentication, authorization and policy

management for routing protocols Sam Hartman and Dacheng Zhang suggested using a Routing

Authentication Policy Database (RAPD) with the CKT

Updated for IETF-88 (Vancouver Nov 2013) but not presented draft-zhang-karp-rapd

A more detailed specification of role of RAPD—Authentication and Authorization only.

Separated from the policy management aspects

RPsec is the continuation of the above efforts

20

14

-11

-12

Page 16: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

16

IETF9

1-R

TG

WG

DESIGN OBJECTIVES

Independent of any specific security protocol

Allows administrators to easily specify multiple security options for a routing protocol

Accessible to multiple routing protocols implementations

Accessible to multiple KMPs

Provides support for both unicast and multicast routing protocol communication models

20

14

-11

-12

Page 17: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

17

IETF9

1-R

TG

WG

OVERVIEW

Role A support module for key/SA management (at Layer 3) KM methods will use RPsec for authentication and key/SA

negotiation. Routing protocol may consult RPsec directly for security

parameters.

Three component databases---

Provide peer authorization information

Security protocol choices

Key related parameters

RPAD

RSPD

CKT

RPsec 20

14

-11

-12

Page 18: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

18

IETF9

1-R

TG

WG

RSPD

Objective Specify the processing behavior for the identified routing

protocol traffic. Provide administrators the flexibility to specify multiple

security options with associated lifetime information A KMP uses the RSPD for SA negotiation

RSPD

Traffic descriptorsProtectBypassDiscard

Security protocol 1Security protocol 2Lifetime

Directionality

Processing behavior

Transforms

Sender-onlyReceiver-onlySymmetric

20

14

-11

-12

Page 19: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

19

IETF9

1-R

TG

WG

RPAD

Objective Stores authentication data and a KMP specification for

the identified routing peers. A KMP will use authentication data to assert a local/peer

device's identity

RPAD

Local identity & credential

Lifetime

KMP

List of peers & their credentials

20

14

-11

-12

Page 20: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

20

IETF9

1-R

TG

WG

CKT

Provisions key material and associated cryptographic algorithms

The RSPD and CKT are used together to ensure that the key is provided to the security protocol that is used for securing the routing protocol.

CKT

Master key

Lifetime

Cryptographic protocol

KDF

List of peers

20

14

-11

-12

Page 21: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

21

IETF9

1-R

TG

WG

RELATION BETWEEN RPSEC DATABASES

RPAD

RSPD

CKT

Routing protocol KMP

Each entry in RSPD points to a corresponding entry in CKT,

Points to

A KMP negotiates policies as dictated in the RSPD

20

14

-11

-12

Page 22: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

22

IETF9

1-R

TG

WG

RPSEC YANG MODULES

We have specified the options for the security parameters in four Yang modules for the RPsec rpsec-common-types.yang rspd.yang rpad.yang ckt.yang

The RPsec Yang modules provide: parameters for both unicast and multicast

communication logically structured entries in RSPD, RPAD and

CKT

20

14

-11

-12

Page 23: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

23

IETF9

1-R

TG

WG

NetConf serverNetConf Client

RPSEC CONFIGURATION/DISTRIBUTION ARCHITECTURE

Send request for RPsec entries

Reply with or push RPsec entries

This architecture can also be scaled to a distributed architecture

A Framework for Policy Admission Control

20

14

-11

-12

Page 24: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

24

IETF9

1-R

TG

WG

RECAPITULATIONRouting Protocol

(Layer 1)

Key Management (KMP and manual method)

Configuration Management (NetConf)(Layer 4)

RPsec

Existing Security Mechanisms(Layer 2)

KMP & Peer Validation

SA Negotiation

Keys and SAs

RPAD RSPD CKT

RPADYang

Module

RSPDYang

Module

CKTYang

Module

(Layer 3)

RPsec component databases

YANG modules for representation and configuration of RPsec databases

KMP negotiates SA and provides fresh keys to security protocols at layer 2

20

14

-11

-12

Page 25: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

25

IETF9

1-R

TG

WG

SUMMARY OF RPSEC

Provisions authentication information for the routing protocol peers.

Provides support for KMPs for dynamic negotiation, establishment and rekey/rollover of SAs for the routing protocols when available.

Administrators can specify multiple security mechanisms in the RSPD for the routing protocol.

Overcomes the manual security configuration issues faced by the operators Automated regular key changes for the routing protocols.

Finally, provides four Yang modules that can be easily modified and configured distributed over the network.

20

14

-11

-12

Page 26: A S ECURITY M ANAGEMENT F RAMEWORK FOR R OUTING P ROTOCOLS : RP SEC draft-atwood-rtgwg-rpsec William Atwood Nitin Prajapati

26

IETF9

1-R

TG

WG

QUESTIONS?

Thank you!

20

14

-11

-12