Security Threats for the NATFW NSLP

Download Report

Transcript Security Threats for the NATFW NSLP

Security Threats for the
NATFW NSLP
draft-fessi-nsis-natfw-threats-01.txt
Fessi, Stiemerling, Thiruvengadam,
Tschofenig, Aoun
IETF 60
Overview
• Identifies threats to NATFW NSLP
 List different types of attacks
 Limited to NSLP issues only
• Gives security requirements, but no solutions for protocol
•
•
yet
Analysis based on draft-ietf-nsis-nslp-natfw-02.txt
Analysis covered all messages except:
 TRIGGER
 NOTIFY
 QUERY
Attacks analysed
•
•
•
•
•
Authentication and authorization
Denial of service
Man in the Middle
Message Modification
Session Hijacking
 Modification and deletion
• Misuse of unreleased NSLP sessions
• Eavesdropping and traffic analysis
• Data traffice modification
 Considered but not specific to NSLP only
Authorization and Authentication
• Example: Receiver behind Firewall
 NI is outside the protected network
CREATE
Data
Sender
(NI)
?
RESPONSE
CREATE
Firewall
(NF)
RESPONSE
Data
Receiver
(NR)
Protected Network
• Problems:
 Forwarding message from unknown host/firewall
 Possibly installing policy rules (spending resources)
 No way of binding authorization to IP addresses
(NAT!)
Conclusion
• Security threats analysed
• Security requirements given
• Further steps:
 Please READ and give comments
 Develop security solution for NATFW NSLP