Report on the Security and Privacy Working Group Karen Sollins

advertisement
Report on the
Security and Privacy Working
Group
Karen Sollins
MIT
May 30, 2007
The “Take-away”
Authentication in the core of the
network would provide significant added
value.
Authentication can valuably be scoped
to reduce the problem space.
Both trust and engineering play crucial
roles in making it feasible.
5/30/07
Sollins/PrivSec Report
2
Objective
Consider the value and feasibility of
provision of authentication as a core
service inside the network (not only
E2E)
Examples of need from members
Identification of challenges
Study approaches
Evaluate in the context of member supplied
examples
5/30/07
Sollins/PrivSec Report
3
Background
Role of security in architecture
End-to-end design criteria
The changing scene
The challenges of authentication
5/30/07
Sollins/PrivSec Report
4
Candidate approaches
I3: indirection at the IP layer
HIP: layer between IP and transport
NAP/NAC: integration of host, network
and perimeter authentication,
assurance, and authorization
5/30/07
Sollins/PrivSec Report
5
Examples from participants
Radius (BT)
GSM and 3GPP authentication (BT)
SIP (Nokia)
Stateful Anycast for DDoS mitigation (MIT)
Dynamic Routing in IPSec (Nortel)
DKIM (Cisco)
Distributed Authorization for Web Services
(Microsoft - invited in for this, not regular
participant)
5/30/07
Sollins/PrivSec Report
6
Authenticated entity types
 Host
 Host interface
 End-point
 Network/realm
 Switch
 VLAN
 Anycast group
5/30/07











Person
Network connection
Access class (NAP)
Web auth entities
Business/enterprise
SIP call id
DKIM ids
Mail sender/relay
Radius/AAA entities
3GPP subscriber/auth center
GAA/GBA entities
Sollins/PrivSec Report
7
Challenges
 Authentication as
component of a function
 Nature of authenticated
entities
 Policies
 Trust
 Anonymity
 Specific services
required to support it
 Scoping of
authentication




Limit types of entities
Scaling
Independence of control
Choice of algorithms and
strength
 Distribution of
vulnerability
This is representative, but not complete
5/30/07
Sollins/PrivSec Report
8
Organization
 Leadership: Dirk Trossen (new), Karen Sollins
 Participation: BT, Intel, Motorola, Nortel, Cisco, Nokia,
FranceTelecom (prev.), MIT
 Meetings: bi-weekly, Tuesday, 12-1pm ET,
teleconference
 White paper on work to date in progress (some text
exists!)
 Infrastructure:
 Mailing list: privsec@cfp.mit.edu
 Web site: http://cfp.mit.edu/groups/security/security.html
Includes all documents, slides and notes from each meeting
 Simple id/pw protection (“privsec”)

5/30/07
Sollins/PrivSec Report
9
Looking forward
WG meeting tomorrow morning
 3 talks
 Dave
Clark: an application architecture and the E2E
arguments
 Manish Dave: privacy, the Intel perspective
 Dave Reed: privacy issues in Living the Future
 Discussion about our next focus (led by Dirk
Trossen)
 What
we want to do
 How we want to do it
 Intellectual study
 Proof of concept
 How best to engage members
5/30/07
Sollins/PrivSec Report
10
Download