talk, ipsec use in 3

29
Use of IPsec & IKE in Universal Mobile Telecommunication System Dr. John K. Zao Sr. Scientist, Information Security Verizon Communications / BBN Technologies BBN Technologies An Operating Unit of IPSEC 2000 Paris La Defense - France 10/26/2000

Upload: dominque23

Post on 23-Jun-2015

623 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Talk, IPsec Use in 3

Use of IPsec & IKE in Universal Mobile Telecommunication System

Dr. John K. ZaoSr. Scientist, Information Security

Verizon Communications / BBN Technologies

BBN TechnologiesAn Operating Unit of

IPSEC 2000Paris La Defense - France 10/26/2000

Page 2: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

2 BBN TechnologiesAn Operating Unit of

Outline

Overview: 3G Wireless Data Networks

Analysis: UMTS Security

Proposal: Possible Use of IPsec & IKE in UMTS Security

Page 3: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

3 BBN TechnologiesAn Operating Unit of

Outline

Overview: 3G Wireless Data Networks History Architecture Domains Strata

Analysis: UMTS Security

Proposal: Possible Use of IPsec & IKE in UMTS Security

Page 4: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

4 BBN TechnologiesAn Operating Unit of

Wireless Data Network Development

2G 2.5G 3G

Europe

USA

Page 5: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

5 BBN TechnologiesAn Operating Unit of

GPRS / UMTS System Architecture

MSC

EIR

MESIM

AuC

HLR VLR

BSC

BSC

BTS

BTS

BTS

BTS

PSTN / ISDNPSPDN / CSPDN

MESIM

MESIM

MESIM

MSC

Access Netw orkDomain

Core Netw orkDomain

Serving Netw orkDomain

Transit Netw orkDomain

User EquipmentDomain

InfrastructureDomain

MobileEquipment

DomainUSIM

Domain

Home Netw orkDomain

Page 6: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

6 BBN TechnologiesAn Operating Unit of

UMTS Domain Hierarchy

Access Netw orkDomain

Serving Netw orkDomain

Transit Netw orkDomain

User EquipmentDomain

InfrastructureDomain

MobileEquipment

Domain

USIMDomain

Home/Remote Netw orkDomain

ME USIM

MT SNAN HN / RN

HE / TE

TN

Cu Uu Iu [Yu] [Zu]

SN

User Apps Provider Apps

Domain – a high-level group of UMTS entities; reference points (interfaces) are defined between domains

Page 7: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

7 BBN TechnologiesAn Operating Unit of

UMTS MT-HN Strata

Home StratumService Stratum

Transport StratumAccess Stratum

Access Netw orkDomain

Serving Netw orkDomain

Transit Netw orkDomain

User EquipmentDomain

InfrastructureDomain

MobileEquipment

Domain

USIMDomain

Home/Remote Netw orkDomain

ME USIM

MT SNAN HN / RN

HE / TE

TN

Cu Uu Iu [Yu] [Zu]

SN

User Apps Provider Apps

Stratum – a group of UMTS protocols that are relevant to one aspect of the services provided by one or more domains

Page 8: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

8 BBN TechnologiesAn Operating Unit of

UMTS MT-RN Strata

Service Stratum

Transport StratumAccess Stratum

Application Stratum

Access Netw orkDomain

Serving Netw orkDomain

Transit Netw orkDomain

User EquipmentDomain

InfrastructureDomain

MobileEquipment

Domain

USIMDomain

Home/Remote Netw orkDomain

ME USIM

MT SNAN HN / RN

HE / TE

TN

Cu Uu Iu [Yu] [Zu]

SN

User Apps Provider Apps

Stratum – a group of UMTS protocols that are relevant to one aspect of the services provided by one or more domains

Page 9: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

9 BBN TechnologiesAn Operating Unit of

Outline

Overview: 3G Wireless Data Networks

Analysis: UMTS Security Security Threads Security Architecture Security Features/Services

Network Access Security Network Domain Security User Domain Security Application Domain Security

Security Mechanisms Mobile User Identity Allocation Entity Authentication & Key Agreement User Traffic Confidentiality Network Domain Security

Proposal: Possible Use of IPsec & IKE in UMTS Security

Page 10: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

10 BBN TechnologiesAn Operating Unit of

3G Security: Threats BasicThreads

Confidentiality Violation

Integrity Violation

Denial of Services

Illegitimate Uses

Repudiation

EnablingThreads

Eavesdropping, User Traffic

Alteration,User Traffic

Intervention,Physical

Masquerading,User

Repudiation,Charge

Eavesdropping, Signal & Control

Alteration,Signal & Control

Intervention,Protocols

Masquerading,Service Net

Repudiation,Traffic Origin

Masquerading,User

Alteration,ME Download

Masquerading,Net Elements

Masquerading,Home Environment

Repudiation,Traffic Delivery

Masquerading,Net Elements

Alteration,USIM Download

Privilege Misuse Privilege Misuse,User

Traffic Analysis, Passive

Alteration,System Data

Service Abuse Privilege Misuse,Service Net

Traffic Analysis, Active

Masquerading,Net Elements

Stealing,Terminals

Unauthorized Access, System Data

Masquerading, Download Origins

Information Leakage User Location

Source: 3G Security; Security Threats & Requirements [3G TS 21.133]

Page 11: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

11 BBN TechnologiesAn Operating Unit of

3G Security : Threats, Radio Interface

BasicThreads

Confidentiality Violation

Integrity Violation

Denial of Services

Illegitimate Uses

Repudiation

EnablingThreads

Eavesdropping, User Traffic

Alteration,User Traffic

Intervention,Physical

Masquerading,User

Repudiation,Charge

Eavesdropping, Signal & Control

Alteration,Signal & Control

Intervention,Protocols

Masquerading,Service Net

Repudiation,Traffic Origin

Masquerading,User

Alteration,ME Download

Masquerading,Net Elements

Masquerading,Home Environment

Repudiation,Traffic Delivery

Masquerading,Net Elements

Alteration,USIM Download

Privilege Misuse Privilege Misuse,User

Traffic Analysis, Passive

Alteration,System Data

Service Abuse Privilege Misuse,Service Net

Traffic Analysis, Active

Masquerading,Net Elements

Stealing,Terminals

Unauthorized Access, System Data

Masquerading, Download Origins

Information Leakage User Location

Relevant Threads Significant Threads

Major Threads Radio Eavesdropping & Traffic Analysis

User & Net Element Masquerading

Page 12: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

12 BBN TechnologiesAn Operating Unit of

3G Security : Threats, ME-USIM InterfaceBasicThreads

Confidentiality Violation

Integrity Violation

Denial of Services

Illegitimate Uses

Repudiation

EnablingThreads

Eavesdropping, (USIM) User Traffic

Alteration, (USIM) User Traffic

Intervention,Physical

Masquerading, User (Stolen ME & USIM)

Repudiation,Charge

Eavesdropping, (USIM) Signal & Control

Alteration, (USIM) Signal & Control

Intervention,Protocols

Masquerading,Service Net

Repudiation,Traffic Origin

Masquerading,User (ME/USIM)

Alteration,ME Download

Masquerading,Net Elements

Masquerading,Home Environment

Repudiation,Traffic Delivery

Masquerading,Net Elements

Alteration,USIM Download

Privilege Misuse Privilege Misuse, (Borrowed USIM)

Traffic Analysis, Passive

Alteration,System Data (ME)

Service Abuse Privilege Misuse, Service Net

Traffic Analysis, Active

Masquerading,Net Elements

Stealing,Terminals (ME)

Unauthorized Access, System Data (USIM)

Masquerading, Download Origins

Information Leakage, User Location

Relevant Threads Significant Threads

Major Threads ME/USIM Masquerading ME/USIM Data Alteration & Access ME/USIM Download Alteration &

Eavesdropping

Page 13: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

13 BBN TechnologiesAn Operating Unit of

3G Security : Threats, General System

BasicThreads

Confidentiality Violation

Integrity Violation

Denial of Services

Illegitimate Uses

Repudiation

EnablingThreads

Eavesdropping, User Traffic

Alteration,User Traffic

Intervention,Physical

Masquerading,User

Repudiation,Charge

Eavesdropping, Signal & Control

Alteration,Signal & Control

Intervention,Protocols

Masquerading,Service Net

Repudiation,Traffic Origin

Masquerading,User

Alteration,ME Download

Masquerading,Net Elements

Masquerading,Home Environment

Repudiation,Traffic Delivery

Masquerading,Net Elements

Alteration,USIM Download

Privilege Misuse Privilege Misuse,User

Traffic Analysis, Passive

Alteration,System Data

Service Abuse,Emergency Service

Privilege Misuse,Service Net

Traffic Analysis, Active

Masquerading,Net Elements

Stealing,Terminals

Unauthorized Access, System Data

Masquerading, Download Origins

Information Leakage User Location Relevant Threads Significant

ThreadsMajor Threads Privilege Misuse

Network Element Masquerading Wired Link Eavesdropping

Page 14: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

14 BBN TechnologiesAn Operating Unit of

UMTS Security Architecture

Service Stratum

Transport StratumAccess Stratum

Application Stratum

Access Netw orkDomain

Serving Netw orkDomain

Transit Netw orkDomain

User EquipmentDomain

InfrastructureDomain

MobileEquipment

Domain

USIMDomain

Home/Remote Netw orkDomain

ME USIM

MT SNAN HN / RN

HE / TE

TN

Cu Uu Iu [Yu] [Zu]

SN

User Apps Provider Apps

Network Access Security

Network Domain Security

User Domain Security

Application Domain Security

User Domain Security – protection against attacks on ME - USIM/USIM interfaces

Network Access Security – protection against attacks on radio (access) links Network Domain Security – protection against attacks on wired network

infrastructure Application Domain Security – protection on user &

provider application exchanges Security Management – monitoring & managing user - provider security

features

Page 15: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

15 BBN TechnologiesAn Operating Unit of

Network Access Security

User Identity ConfidentialityServicesServices

Identity Confidentiality Location Confidentiality Untraceability

MechanismsMechanisms Temporary Visiting Identity Encrypted Permanent Identity Encrypted Signal / Control Data

Entity AuthenticationServicesServices

Authentication Mechanism Agreement

User Authentication Network Element Authentication

MechanismsMechanisms HE-SN Authentication & Key

Agreement Local Authentication

Data ConfidentialityServicesServices

Cipher Algorithm Agreement Cipher Key Agreement User Data Confidentiality Signal / Control Data Confidentiality

Data IntegrityServicesServices

Integrity Algorithm Agreement Integrity Key Agreement Signal / Control Data Integrity Signal / Control Data Origin

Authentication

Page 16: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

16 BBN TechnologiesAn Operating Unit of

Network Domain Security

Entity AuthenticationServicesServices

Mechanism Agreement Network Element Authentication

MechanismMechanism Explicit Symmetric Key

Authentication

Data ConfidentialityServicesServices

Cipher Algorithm Agreement Cipher Key Agreement Signal / Control Data Confidentiality

Data IntegrityServicesServices

Integrity Algorithm Agreement Integrity Key Agreement Signal / Control Data Integrity Signal / Control Data Origin

Authentication

Page 17: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

17 BBN TechnologiesAn Operating Unit of

User Domain Security

User - USIM AuthenticationServicesServices

PIN-based Authentication

USIM - ME AuthenticationServicesServices

Shared Secret Authentication

Page 18: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

18 BBN TechnologiesAn Operating Unit of

Application Domain Security

Secure USIM Download & MessagingServicesServices

Application Identity Authentication Application Data Confidentiality Application Data Origin Authentication Application Data Integrity Application Exchange Sequence Integrity Application Exchange Replay Protection Application Data Non-repudiation

IP Security[TBD][TBD]

User Traffic ConfidentialityServiceService

End-to-End Data Confidentiality

User Profile Confidentiality[TBD][TBD]

Page 19: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

19 BBN TechnologiesAn Operating Unit of

* Mobile User Identity (MUI) Exchanges

Temporary MUI (TMUI) Allocation

Permanent MUI (IMUI) Identification

Similar to Mobile IP Registration

Source: UMTS Security Architec-ture [3G TS 33.102]

Page 20: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

20 BBN TechnologiesAn Operating Unit of

Entity Authentication & Key Agreement

ParametersAuthentication Vector

AV(i) := RAND(i)||XRES(i)||CK(i)||IK(i)||AUTN(i)

AUTN,CK,IK,XRES derived from RAND,SQN,AMF

Authentication Data RequestAuthen_Req := IMUI || HLR_MSG

Authentication Data RequestAuthen_Res := [IMUI] || AV(1..n)

CommentsAuthentication is conducted between

HE/AuC & MS/USIMHE is authentication & key distribution

centerSN/VLR is trusted mediator If HE is off-line then MS-SN authenti-

cate using shared integrity key & protect their traffic using old (CK,IK)

Page 21: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

21 BBN TechnologiesAn Operating Unit of

User Traffic Confidentiality

Key Management

Cipher Key (Ks) Initialization Vector (IV)

Cipher Algorithms Synchronous Stream Cipher

Data stream XOR with key stream Synchronization controlled by IV

Issues Encryption synchronization

mechanism TFO voice protection adaptation Data traffic protection adaptation Encryption termination at net

gateways Encryption management

Page 22: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

22 BBN TechnologiesAn Operating Unit of

Network Domain Security

Similar to Multi-Realm Kerberos

Layer I Symmetric Session Key

Negotiation using PK technology

Layer II Session Key Distribution

within each Operator

Layer III Secure communication

between Elements of different Operators

Page 23: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

23 BBN TechnologiesAn Operating Unit of

Outline

Overview: 3G Wireless Data Networks

Analysis: UMTS Security

Proposal: Possible Use of IPsec & IKE in UMTS Security Motivation Use of IPsec with IKE Use of IPsec with UMTS Key Management Use of IKE with UMTS Cipher Mechanisms Use of IPsec with Stateful Header Compression

Page 24: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

24 BBN TechnologiesAn Operating Unit of

Motivation

Why are we thinking of putting IPsec & IKE into 3G?Because … IP (with XML payloads) is likely to be the networking

protocol for future Wireless Internet. GSM/GPRS/UMTS Security Architecture is complex &

fragmented. IPsec & IKE will become widely deployed. Use of USIM will make PK technology more accessible. …

What will be the major show stoppers? Wireless Voice traffic will NOT be over IP in near future. Wireless Signaling & Control traffic is NOT over IP either.

Page 25: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

25 BBN TechnologiesAn Operating Unit of

Use of IPsec with IKE in UMTS

Application Domain Security [Strong Case] User Traffic Confidentiality

Network Domain Security [Possible but Unlikely Case] Entity Authentication Data Confidentiality Data Integrity First, UMTS Core Network must speak IP …

Page 26: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

26 BBN TechnologiesAn Operating Unit of

Use of IPsec with UMTS Key Management

Network Domain Signaling & Control Security [Possible Case] Entity Authentication Data Confidentiality Data Integrity More likely than IPsec protection for entire UMTS Core

Network Use UMTS Key Management is reasonable for

compatibility Still, UMTS Signaling & Control must speak IP …

Page 27: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

27 BBN TechnologiesAn Operating Unit of

Use of IKE with UMTS Cipher Mechanisms

Not so unlikely as we think because … UMTS uses USIM-HE exchanges to establish user

security USIM & HE/AuC may use IKE technology

Entity Authentication & Cipher/Integrity Key Agreement Network Access Security Application Domain Security

Page 28: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

28 BBN TechnologiesAn Operating Unit of

Use of IPsec with Header Compression

Justification Wireless Data Network may have limited bandwidth Wireless Access & Network Domains support stateful L2

switching

Approach Adopt technologies from IETF Robust Header

Compression WG Consider possible IPsec header compression ?

Page 29: Talk, IPsec Use in 3

IPSEC 2000Paris La Defense - France 10/26/2000

29 BBN TechnologiesAn Operating Unit of

Bibliography

3rd Generation Partnership Project, Technical Specification Group (TSG) SA

3G TS 21.133 - 3G Security; Security Threats & Requirements

3G TS 21.120 - 3G Security; Security Principles & Objectives

3G TS 33.105 - 3G Security; Cryptographic Algorithm Requirements

3G TS 33.102 - UMTS; 3G Security; Security Architecture

3G TS 23.101 - UMTS; General UMTS Architecture

GSM Documents GS 02.60 – GPRS; Service Description; Stage 1

GS 03.60 – GPRS; Service Description; Stage 2

GS 02.09 – Security Aspects

GS 03.20 – Security Related Network Functions

Source: http://www.etsi.org/