TNC Presentation

advertisement
TNC Presentation
Minneapolis IETF
March 10, 2005
John Vollbrecht
Meetinghouse Data
Communications
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #1
TCG Mission
Develop and promote open, vendor-neutral,
industry standard specifications for trusted
computing building blocks and software
interfaces across multiple platforms
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #2
TCG Organization
Board of Directors
Jim Ward, IBM, President and Chairman, Geoffrey Strongin, AMD, Mark Schiller, HP, David Riss, Intel, Steve Heil,
Microsoft, Tom Tahan, Sun, Nicholas Szeto, Sony, Bob Thibadeau, Seagate, Thomas Hardjono, VeriSign
Marketing Workgroup
Technical Committee
Advisory Council
Administration
Brian Berger, Wave
Graeme Proudler, HP
Invited Participants
VTM, Inc.
Public
Relations
Anne Price, PR
Works
Events
Marketing
Support
VTM, Inc.
TPM Work Group
Conformance WG
David Grawrock, Intel
Randy Mummert, Atmel
TSS Work Group
PC Client WG
David Challener, IBM
Monty Wiseman, Intel
Mobile Phone WG
Infrastructure WG
Janne Uusilehto, Nokia
Thomas Hardjono, Verisign
Ned Smith, Intel
Peripherals WG
Position Key
GREEN Box:
BLUE Box:
RED Box:
BLACK Box:
Elected Officers
Chairs Appointed by Board
Chairs Nominated by WG,
Appointed by Board
Resources Contracted by TCG
Hard Copy WG
Colin Walters, Comodo
Brian Volkoff, HP (interim)
Server Specific WG
Storage Systems
Larry McMahan, HP
Marty Nicholes, HP
Robert Thibadeau,
Seagate
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #3
Technical Workgroups
• Technical Committee
• Work groups
– Trusted Platform Module (TPM)
– TPM Software Stack (TSS)
– PC Specific Implementation
– Peripheral Implementation
– Server Specific Implementation
– Storage Systems Implementation
– Mobile Phone Specific Implementation
– Conformance (Common Criteria)
– Infrastructure
– Trusted Network Connect
• Marketing Work Group
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #4
Contributors
Meetinghouse Data Communications
Motorola Inc.
National Semiconductor
nCipher
Network Associates
Nokia
Contributors
Promoters
NTRU Cryptosystems, Inc.
Agere Systems
AMD
NVIDIA
ARM
Hewlett-Packard
OSA Technologies, Inc
ATI Technologies Inc.
IBM
Philips
Atmel
Intel Corporation
Phoenix
AuthenTec, Inc.
Microsoft
Pointsec Mobile Technologies
AVAYA
Sony Corporation
Renesas Technology Corp.
Broadcom Corporation
Sun Microsystems, Inc.
RSA Security, Inc.
Certicom Corp.
SafeNet, Inc.
Comodo
Adopters
Samsung Electronics Co.
Dell, Inc.
BigFix, Inc.
SCM Microsystems, Inc.
Endforce, Inc.
Citrix Systems, Inc
Seagate Technology
Ericsson Mobile Platforms AB
Enterasys Networks
SignaCert, Inc.
Extreme Networks
Foundry Networks Inc.
Sinosun Technology Co., Ltd.
France Telecom Group
Foundstone, Inc.
Standard Microsystems Corporation
Freescale Semiconductor
Gateway
STMicroelectronics
Industrial Technology Research Institute Fujitsu Limited
Sygate Technologies, Inc.
Fujitsu Siemens Computers
Interdigital Communications
Symantec
Funk Software, Inc.
Latis Networks, Inc.
Symbian Ltd
Gemplus
MCI
Synaptics Inc.
Giesecke & Devrient
Nevis Networks, USA
Texas Instruments
Hitachi, Ltd.
PC Guardian Technologies
Transmeta Corporation
Infineon
Sana Security
Trend Micro
InfoExpress, Inc.
Senforce Technologies, Inc
Utimaco Safeware AG
iPass
Silicon Integrated Systems Corp.
VeriSign, Inc.
Juniper Networks
Silicon Storage Technology, Inc.
Vernier Networks
Lenovo Holdings Limited
Softex, Inc.
VIA Technologies, Inc.
Lexmark International
Telemidic Co. Ltd.
Vodafone Group Services LTD
M-Systems Flash Disk Pioneers
Toshiba Corporation
Wave Systems
TriCipher, Inc.
Labs,
Inc.
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of theirZone
respective
owners.
Slide #5
ULi Electronics Inc.
TCG Membership
92 Total Members as of January 13, 2005
7 Promoter, 64 Contributor, 21 Adopter
Overview of TNC
• Trusted Network Connection Subgroup
– Infrastructure Working Group
– Trusted Computing Group (TCG)
– http://www.trustedcomputinggroup.org
• TNC V1 is being reviewed by TCG
– Goal is to release V1 Q2 ‘05
– Goal is to support limited initial interoperability demos at same time
– Standards documents become available to non-members when
released
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #6
TNC Purpose
• The Trusted Network Connect Sub Group (TNC-SG)
is working to define and promote an open solution
architecture that enables network operators to
enforce policies regarding endpoint integrity when
granting access to a network infrastructure. Endpoint
integrity policies may involve integrity parameters
spanning a range of system components (hardware,
firmware, software and application settings), and may
or may not include evidence of a Trusted Platform
Module (TPM)
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #7
Overview of TNC
Server
Client
Integrity
Measurement
Clients
Integrity
Measurement
Verifiers
Integrity dialog
TNC-C
TNC-S
TNC Dialog
TNC Transport
Network Access
Requestor
Network Access
Authority
PEP
data
control
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #8
TNC Version 1
• TNC Version 1 contains 3 specs
– Architecture Spec
– Interface from TNC Client to Integrity
Measurement Collectors
– Interface from TNC Server to Integrity
Measurement Verifiers
• Future releases will include
– TNC-C to TNC-S protocol
– Transport Layer requirements for TNC
– Mapping of how to carry TNC dialog in EAP
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #9
TNC Role
• TNC provides a way for remote “verifiers” to
check integrity of client elements using client
“collectors”
• Check is made as part of Access
Authorization dialog
• Role of interest for this discussion is 802.1X/
EAP Access
• Assumption is that TNC dialog is part of EAP
dialog
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #10
TNC as part of EAP Dialog
• Current assumption is that in an 802.1X
Access, TNC must be done in an “inner”
dialog
– If assumption is correct, TNC can only be done
inside a “protected” method
• can be done in PEAP, TTLS, FAST, -• Cannot be done in SIM, TLS, MD5, --
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #11
TNC as a protected Dialog
• Within Protected Method there may be
several dialogs - e.g.
– May do platform authentication followed by
user authentication
– May do TNC integrity verification after
authentication(s)
• Would be helpful to have state machine
for how inner dialogs interact
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #12
State machine for inner EAP
Questions on Proceeding
• Is there a standard way of handling inner
dialogs between existing protected methods?
– PEAP/ FAST
– TTLS
• Should Inner dialog be a “common capability”
for future “protected” methods?
• Are there underlying differences in ways that
protected methods support inner dialogs?
– E.g. how to handle brokers?
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #13
Inner
dialogs in
Protected
methods
repeat for each
inner dialog
Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners.
Slide #14
Download