Transcript March 2009

March 2009
Secure Datastore Architecture
Concepts
Author:
Name
Richard Paine
Submission
Company
Self
Address
nd
6115 72 Dr NE
Slide 1
Phone
email
2068548199
[email protected]
m
Richard Paine, Self1
March 2009
Project
IEEE 802 Executive Committee Study Group on TV White Spaces – Secure Datastore /End-to-End Security
Architecture Concepts
Title
ECSG WS Study Group
Date
Submitted
2009-03-09
Source(s)
Contributor: Richard Paine, Affiliation Self Voice: 206-854-8199, e-mail: [email protected]
Abstract
IEEE 802 ECSG on White Space slide deck to capture 802 and TVWS USE CASE Security Issues
Purpose
To provide input to the ECSG and others on possible use cases that will help clarify how the TVWS spectrum might be secured
and how these uses might possibly be addressed by IEEE 802 work.
Release
The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any
modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards
publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to
reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this
contribution may be made public by IEEE 802.
Patent
Policy and
Procedures
Submission
The contributor is familiar with the IEEE-SA Patent Policy and Procedures:
<http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and <http://standards.ieee.org/guides/opman/sect6.html#6.3>.
Further information is located at <http://standards.ieee.org/board/pat/pat-material.html> and
<http://standards.ieee.org/board/pat>.
Slide 2
Richard Paine, Self
March 2009
802 End-to-End Security
Submission
Slide 3
Richard Paine, Self
March 2009
OSI-TCP/IP Stack Comparison
Submission
Slide 4
Richard Paine, Self
March 2009
Platform and Security Layers
Application-Secured Payload
Application
Application
SSL, TLS, etc.
OS-Session
OS-Session
IPSec, HIP, etc.
OS-Internetworking
Media
Media
Physical
Medium
Modem
802.1x, etc.
•
OS-Internetworking
Modem
802.1x, etc.
Each platform abstraction layer supports its own communications security
– Note: Media security is generally platform-to-network, not platform-to-platform
• Implementation of each platform abstraction should be secured
–
–
–
–
Certification of regulatory/standards compliance
Real-time attestation of implementation (“tamper-proof”)
Ability to secure sensitive data
This is not shown, but implied
Submission
Slide 5
Richard Paine, Self
March 2009
Discontinuity between IEEE 802 and IETF
IPSec, HIP, etc.
OS-Internetworking
OS-Internetworking
802 Interface to the “Outside World”
Media
Media
Physical
Medium
Modem
802.1x, etc.
Submission
Modem
802.1x, etc.
Slide 6
Richard Paine, Self
March 2009
End Device Stack
Network Equipment
Data Link
802 MAC
802 IF
To Upper
Layers
802 PHY
802 IF
To Network
Device
Layers
Physical
Medium
Submission
Slide 7
Richard Paine, Self
March 2009
Lightweight Host Identity Protocol Example
Gurtov; Host Identity Protocol (HIP); Wiley, 2008; pg 131.
TCP/UDP
TCP/UDP
HIP
IPSEC
HIP
Authentication Layer
IPSEC
Authentication Layer
IP
IP
Authentication Interaction
Authenticated Control Messages
Unauthenticated Control Messages
ESP Payload: not encrypted, not authenticated
Submission
Slide 8
Richard Paine, Self
March 2009
The End-to-End LHIP Security Stack
Secure Network Equipment
Secure Network Equipment
IF To Upper
Layers
IF To Upper
Layers
Physical
Medium
Submission
Slide 9
Richard Paine, Self
March 2009
The End-to-End HIP/SMA Security Stack
IETF’s Secure
DataStore and
Schema (MAP)
FCC WS
DB and Schema
Adding HIP, TNC, and the FCC WS Work
Secure Network Equipment
Data Link
SMA PKI Datastore
People/Machines
SMA Secure
DataStore
And Schema
802 IF
To Upper
Layers
IF To Upper
Layers
802 MAC
802 PHY
802 IF
To Device
Layers
TNC Secure
DataStore and
Schema
Physical
Medium
Submission
Slide 10
Richard Paine, Self
March 2009
TOG’s SMA Secure Datastore and Schema
TOG’s SMA Secure Datastore and Schema
Summary Data
IETF’s Secure
DataStore and
Schema (MAP)
IETF’s Secure
DataStore and
Schema (MAP)
Application-Secured Payload
Application
Application
SSL, TLS, etc.
OS-Session
OS-Session
IPSec, HIP, SMA, etc.
OS-Internetworking
SMA PKI Datastore SMA PKI Datastore
People/Machines People/Machines
OS-Internetworking
802 Interface to the “Outside World”
Media
Media
Physical
Medium
Modem
802.1x, etc.
Modem
802.1x, etc.
TCG’s TNC Secure
DataStore and
Schema (IF-MAP)
TCG’s TNC Secure
DataStore and
Schema (IF-MAP)
FCC Secure
WS DataStore
Submission
FCC Secure
WS DataStore
Slide 11
Richard Paine, Self
March 2009
Ideal End-to-End Security
Trusted
Policy
Engine
IETF/TCG/TOG/IEEE Secure
DataStore and
Schema (MAP)
IETF/TCG/TOG/IEEE Secure
DataStore and
Schema (MAP)
Application
Trusted
Policy
Engine
App.-Secured Payload
Application
SSL, TLS, etc.
OS-Session
OS-Internetworking
Modem
IPSec, HIP, SMA, etc.
Media
Media
IP
Infrastructure
OS-Session
OS-Internetworking
Modem
Trusted
component
used to verify
compliance
and prevent
policy
violation
Submission
Slide 12
Richard Paine, Self
March 2009
Secure Datastore Commonalities
•
Datastores/Schema all have similarities (FCC, SMA, LHIP, & TNC)
– Location information and measurement
• Geolocation, sensor measurements
– Host information:
• Identity, name, address, etc.
– Network IDs:
• MAC, IP address, etc.
– Local policy databases
• Spectrum policy information
• Security policies database
• Co-existence policies
– Remote database information
• DNS, Spectrum Servers, Certificate Authorities, Sensitive SW Sources (e.g. McAfee), etc.
– Trust certificates
– Identities of trusted third party connections
•
IF should/could be standardized
Submission
Slide 13
Richard Paine, Self
March 2009
Interfaces Need to be Defined
• 802.11k SME MIB “Zero Config”-like Access
– Object IDs for the MIB Entries
•
•
•
•
802.11 SME MIB Clients
802.16 MIB Clients
802.21 MIB Clients
SMA Interface [SLDAP (Secure Lightweight Directory
Access Protocol)]
• DNS
• TCG’s TNC [IF-MAP (InterFace-Metadata Access Point)]
• FCC WS – interface undefined, but required fields
similar
Submission
Slide 14
Richard Paine, Self
March 2009
End-to-End Projects Identified
• Joint IEEE-IETF Task Force on end-to-end security protocols
and definitions
– Passing of SMA/cryptographic identity/security information from PHY
to upper layers (schema?)
• IEEE/802.21 project for security handoff between disparate
systems (schema?)
• Joint IEEE-TCG Task Force on device security at lower layers
– Attesting to lower layers
– Compliance with regulatory/standards policies, e.g. FCC White Spaces
regulations
• Interface definitions for all interfaces in 802
Submission
Slide 15
Richard Paine, Self
March 2009
Resolutions?
•
•
•
•
•
HIP
SMA Datastore [Secure LDAP (SLDAP)]
DNS Resource Records (Not Secure)
TCG’s TNC Datastore Access (SLDAP?)
All schema (should be common)
Submission
Slide 16
Richard Paine, Self