March 2009 Secure Datastore Architecture Concepts Author: Name Richard Paine Submission Company Self Address nd 6115 72 Dr NE Slide 1 Phone email 2068548199 richard.h.paine@gmail.co m Richard Paine, Self1 March 2009 Project IEEE 802 Executive Committee Study Group on TV White Spaces – Secure Datastore /End-to-End Security Architecture Concepts Title ECSG WS Study Group Date Submitted 2009-03-09 Source(s) Contributor: Richard Paine, Affiliation Self Voice: 206-854-8199, e-mail: richard.h.paine@gmail.com Abstract IEEE 802 ECSG on White Space slide deck to capture 802 and TVWS USE CASE Security Issues Purpose To provide input to the ECSG and others on possible use cases that will help clarify how the TVWS spectrum might be secured and how these uses might possibly be addressed by IEEE 802 work. Release The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802. Patent Policy and Procedures Submission The contributor is familiar with the IEEE-SA Patent Policy and Procedures: <http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and <http://standards.ieee.org/guides/opman/sect6.html#6.3>. Further information is located at <http://standards.ieee.org/board/pat/pat-material.html> and <http://standards.ieee.org/board/pat>. Slide 2 Richard Paine, Self March 2009 802 End-to-End Security Submission Slide 3 Richard Paine, Self March 2009 OSI-TCP/IP Stack Comparison Submission Slide 4 Richard Paine, Self March 2009 Platform and Security Layers Application-Secured Payload Application Application SSL, TLS, etc. OS-Session OS-Session IPSec, HIP, etc. OS-Internetworking Media Media Physical Medium Modem 802.1x, etc. • OS-Internetworking Modem 802.1x, etc. Each platform abstraction layer supports its own communications security – Note: Media security is generally platform-to-network, not platform-to-platform • Implementation of each platform abstraction should be secured – – – – Certification of regulatory/standards compliance Real-time attestation of implementation (“tamper-proof”) Ability to secure sensitive data This is not shown, but implied Submission Slide 5 Richard Paine, Self March 2009 Discontinuity between IEEE 802 and IETF IPSec, HIP, etc. OS-Internetworking OS-Internetworking 802 Interface to the “Outside World” Media Media Physical Medium Modem 802.1x, etc. Submission Modem 802.1x, etc. Slide 6 Richard Paine, Self March 2009 End Device Stack Network Equipment Data Link 802 MAC 802 IF To Upper Layers 802 PHY 802 IF To Network Device Layers Physical Medium Submission Slide 7 Richard Paine, Self March 2009 Lightweight Host Identity Protocol Example Gurtov; Host Identity Protocol (HIP); Wiley, 2008; pg 131. TCP/UDP TCP/UDP HIP IPSEC HIP Authentication Layer IPSEC Authentication Layer IP IP Authentication Interaction Authenticated Control Messages Unauthenticated Control Messages ESP Payload: not encrypted, not authenticated Submission Slide 8 Richard Paine, Self March 2009 The End-to-End LHIP Security Stack Secure Network Equipment Secure Network Equipment IF To Upper Layers IF To Upper Layers Physical Medium Submission Slide 9 Richard Paine, Self March 2009 The End-to-End HIP/SMA Security Stack IETF’s Secure DataStore and Schema (MAP) FCC WS DB and Schema Adding HIP, TNC, and the FCC WS Work Secure Network Equipment Data Link SMA PKI Datastore People/Machines SMA Secure DataStore And Schema 802 IF To Upper Layers IF To Upper Layers 802 MAC 802 PHY 802 IF To Device Layers TNC Secure DataStore and Schema Physical Medium Submission Slide 10 Richard Paine, Self March 2009 TOG’s SMA Secure Datastore and Schema TOG’s SMA Secure Datastore and Schema Summary Data IETF’s Secure DataStore and Schema (MAP) IETF’s Secure DataStore and Schema (MAP) Application-Secured Payload Application Application SSL, TLS, etc. OS-Session OS-Session IPSec, HIP, SMA, etc. OS-Internetworking SMA PKI Datastore SMA PKI Datastore People/Machines People/Machines OS-Internetworking 802 Interface to the “Outside World” Media Media Physical Medium Modem 802.1x, etc. Modem 802.1x, etc. TCG’s TNC Secure DataStore and Schema (IF-MAP) TCG’s TNC Secure DataStore and Schema (IF-MAP) FCC Secure WS DataStore Submission FCC Secure WS DataStore Slide 11 Richard Paine, Self March 2009 Ideal End-to-End Security Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Application Trusted Policy Engine App.-Secured Payload Application SSL, TLS, etc. OS-Session OS-Internetworking Modem IPSec, HIP, SMA, etc. Media Media IP Infrastructure OS-Session OS-Internetworking Modem Trusted component used to verify compliance and prevent policy violation Submission Slide 12 Richard Paine, Self March 2009 Secure Datastore Commonalities • Datastores/Schema all have similarities (FCC, SMA, LHIP, & TNC) – Location information and measurement • Geolocation, sensor measurements – Host information: • Identity, name, address, etc. – Network IDs: • MAC, IP address, etc. – Local policy databases • Spectrum policy information • Security policies database • Co-existence policies – Remote database information • DNS, Spectrum Servers, Certificate Authorities, Sensitive SW Sources (e.g. McAfee), etc. – Trust certificates – Identities of trusted third party connections • IF should/could be standardized Submission Slide 13 Richard Paine, Self March 2009 Interfaces Need to be Defined • 802.11k SME MIB “Zero Config”-like Access – Object IDs for the MIB Entries • • • • 802.11 SME MIB Clients 802.16 MIB Clients 802.21 MIB Clients SMA Interface [SLDAP (Secure Lightweight Directory Access Protocol)] • DNS • TCG’s TNC [IF-MAP (InterFace-Metadata Access Point)] • FCC WS – interface undefined, but required fields similar Submission Slide 14 Richard Paine, Self March 2009 End-to-End Projects Identified • Joint IEEE-IETF Task Force on end-to-end security protocols and definitions – Passing of SMA/cryptographic identity/security information from PHY to upper layers (schema?) • IEEE/802.21 project for security handoff between disparate systems (schema?) • Joint IEEE-TCG Task Force on device security at lower layers – Attesting to lower layers – Compliance with regulatory/standards policies, e.g. FCC White Spaces regulations • Interface definitions for all interfaces in 802 Submission Slide 15 Richard Paine, Self March 2009 Resolutions? • • • • • HIP SMA Datastore [Secure LDAP (SLDAP)] DNS Resource Records (Not Secure) TCG’s TNC Datastore Access (SLDAP?) All schema (should be common) Submission Slide 16 Richard Paine, Self