THOUGHTS ON TSN SECURITY

Similar documents
S Series Switches. MACsec Technology White Paper. Issue 1.0. Date HUAWEI TECHNOLOGIES CO., LTD.

3 Data Link Layer Security

MACSec Security Service FIPS Validation. Richard Wang May 19, 2017 International Crypto Module Conference

Secure PTP - Protecting PTP with MACsec without losing accuracy. ITSF 2014 Thomas Joergensen Vitesse Semiconductor

Chapter 24 Wireless Network Security

Time Synchronization Security using IPsec and MACsec

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Wireless LAN Security. Gabriel Clothier

CSCE 715: Network Systems Security

IPSec. Overview. Overview. Levente Buttyán

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Network Encryption 3 4/20/17

IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud

Authentication and Security: IEEE 802.1x and protocols EAP based

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

The IPsec protocols. Overview

Table of Contents 1 IKE 1-1

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Authentication and Security: IEEE 802.1x and protocols EAP based

Implementing MACsec Encryption

Innovations in Ethernet Encryption (802.1AE - MACsec) for Securing High Speed (1-100GE) WAN Deployments

Virtual Private Network

Network Systems. Bibliography. Outline. General principles about Radius server. Radius Protocol

IEEE WiMax Security

(2½ hours) Total Marks: 75

COPYRIGHTED MATERIAL. Contents

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

Network Access Flows APPENDIXB

Network Security. Chapter 11 Security Protocols of the Data Link Layer. Scope of Link Layer Security Protocols

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

Cisco ASR 5000 Series Small Cell Gateway

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

What is Eavedropping?

05 - WLAN Encryption and Data Integrity Protocols

ISE Primer.

Grandstream Networks, Inc. GWN7000 OpenVPN Site-to-Site VPN Guide

VPN Overview. VPN Types

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Network Device Collaborative Protection Profile (NDcPP) Extended Package MACsec Ethernet Encryption. October 5, 2015 Version 1.0

Secure Extension of L3 VPN s over IP-Based Wide Area Networks

Virtual Tunnel Interface

Virtual Private Networks.

EXAM IN TTM4137 WIRELESS SECURITY

FAQ on Cisco Aironet Wireless Security

Securing Your Wireless LAN

Securing Wireless LANs with Certificate Services

CSN & BSS Bridging

Security in IEEE Networks

Virtual Private Networks (VPN)

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Frequently Asked Questions WPA2 Vulnerability (KRACK)

MACSEC and MKA Configuration Guide, Cisco IOS XE Release 3S

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Virtual Private Networks

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec

COSC4377. Chapter 8 roadmap

CSC 6575: Internet Security Fall 2017

Wireless technology Principles of Security

Cisco Live /11/2016

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

VPN Auto Provisioning

SSCI assignment for MACsec XPN Cipher Suites

Mobile WiMAX Security

WIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK

Link Security Considerations in the. Enterprise

IEEE 802.1AE (MacSec) & IEEE 802.1Qbb (PFC)

CSC 4900 Computer Networks: Security Protocols (2)

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Standard For IIUM Wireless Networking

Analysis of VPN Protocols

AIR-WLC K9 Datasheet. Overview. Check its price: Click Here. Quick Specs

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Changes to 802.1Q necessary for 802.1Qbz (bridging media)

CS Computer Networks 1: Authentication

802.1X: Background, Theory & Implementation

Security analysis of Dutch smart metering systems

Cisco Wireless LAN Controller Module

Virtual Tunnel Interface

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Configuring a VAP on the WAP351, WAP131, and WAP371

Appendix E Wireless Networking Basics

Exam Questions CWSP-205

Vidder PrecisionAccess

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1415/ Chapter 16: 1

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

Chapter 4 Configuring 802.1X Port Security

Layer 2 authentication on VoIP phones (802.1x)

CSE509: (Intro to) Systems Security

Numerics. Index 1. SSH See SSH. connection inactivity time 2-3 console, for configuring authorized IP managers 11-5 DES 6-3, 7-3

Port-based authentication with IEEE Standard 802.1x. William J. Meador

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2

Overview. SSL Cryptography Overview CHAPTER 1

CloudBridge :31:07 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Transcription:

THOUGHTS ON TSN SECURITY Contributed by Philippe Klein, PhD (philippe@broadcom.com) 1

METWORK SECURITY PROTOCOLS Description Complexity Performance Layer 4..7 Layer 3 Layer 2 SSL / TLS, IPsec MACsec Application layer encryption Client server mode Layer 3 Network security End to End tunnels Peer to peer Protocol Layer 2 security Hop by hop Peer to peer protocol Security built into the application Phased deployment difficult Client initiated Uses TCP connection oriented protocol Complex protocol suite, many options Key management using IKE protocol and PKI for authentication Relatively simple to implement Phased deployment possible Key management (MKA via 802.1X-2010) Assumes medium to low performance Ranges from low to high Significant header expansion Designed for high throughput Minimal header expansion 4

MACsec SCOPE IEEE Std 802.1AE (aka MACsec) Media Access Control (MAC) Security MAC Security (MACsec) allows authorized systems that attach to and interconnect LANs in a network to maintain confidentiality of transmitted data and to take measures against frames transmitted or modified by unauthorized devices. Relationship between IEEE Std 802.1AE and other IEEE 802 standards IEEE Std 802.1X specifies Port-based Network Access Control, and provides a means of authenticating and authorizing devices attached to a LAN. 5

WHAT IS MACsec? Hop-to-hop Layer 2 Security Protects communication between trusted components of the network infrastructure All frames exchanged between the two elements (called SecY) are authenticated and optionally encrypted Controls access to the network when combined with 802.1X Provides source authentication, integrity, and confidentiality using strong crypto (AES-GCM) Secure LANs from attacks of: Wiretapping (confidentiality) Impersonation (authentication) Masquerading (MAC address spoofing) Man-in-the-Middle attacks Replay attack (authentication + anti-replay counter) Denial-of-Service (DOS) attacks Does not: Protect against attacks of trusted components themselves Provide end-to-end security Replace 802.11i 6

SECURE MAC SERVICE RELATIONSHIP Connectivity Associations (CA) Set of stations that can securely communicate with each other using Secure Channels Secure Channels (SC) An uni-directional channel identified by an SC Identifier in the packet header used to communicate between stations belonging to the same CA Security Association (SA) An active key associated for each SC. Standard requires 2 active SAs per SC to support noninterrupting key swap Usage Scenarios Point to Point LANs Shared Media LANs Provider Bridged Networks 7

2_STATION SC 8

3_STATION SC 9

MACsec - ENCRYPTION 10

MACsec MODEL SecY SecY 11

SecY MAC Security Entity 12

SecY ARCHITECTURE & OPERATION 13

MACsec ENCRYPTION Cypher Suite: 128 or 256 AES-GCM (Galois/Counter Mode) 14

SecTAG 15

MACsec - AUTHENTICATION 16

MACsec FRAME CRYPTOGRAPHIC PROTECTION PAE PAE 802.X authentication is used to authenticate end stations MKA (MACsec Key Agreement) Protocol is used to exchange session keys based on CA Key 17

IEEE Std 802.1X - PORT BASED NETWORK ACCESS CONTROL Supplicant Authenticator Authentication Server 18

802.1X EAP (EXTENSIBLE AUTHENTICATION PROTOCOL) Define a frameset to allow different Authentication METHODs Pre shared keys, Certificates, Passwords, SIM credentials, Biometrics,. AEPol/AEPoW : define container messages to carry the authentication protocol over wired and wireless links 19

IEEE 802.1X MKA KEY DISTRIBUTION CAK Secure Connectivity Association Key ICK Integrity Check Value Key KEK Key Encrypting Key SAK Secure Association Key allows implementation of a policy of perfect forward security 20

MACsec - CHALLENGES 21

END TO END FOR SERVICE PROVIDERS Examples of End to End Hybrid Networks for Service Providers 22

HYBRID HOME NETWORK CONNECTIVITY Coax MOCA Network Powerline 1901 HPAV Network DSL PON DoCSIS GW Wireless 802.11 WiFi BSS Wireless 802.11 GLK Network Ethernet 802.3 Network Access GW Backbone Leaf End Devices L2 Path 23

NATIVE L2 SECURITY SCHEMES Technology Authentication Encryption Comments Ethernet / IEEE 802.3 EAP AES-128 GCM IEEE 802.1AE (MACsec), 802.1X MoCA HomePlug AV2 / IEEE 1901 Proprietary (dynamic) PSKs Proprietary (dynamic) PSKs DES AES-128 CBC AES-128 CBC The whole MPDU is encrypted in the PHY (including the Eth MAC header) WiFi / IEEE 802.11 EAP AES-128 CCMP 802.1X, AES-GCM for 802.11ad DoCSIS Proprietary PSK DES AES-128 CBC http://www.cablelabs.com/specification/docsis-3-1-security-specification DPoE Security and Certificate Specification includes EAP http://www.cablelabs.com/wp-content/uploads/specdocs/dpoe-sp- SECv1.0-I05-140327.pdf EPON EAP AES-128 GCM IEEE 802.1AE (MACsec), 802.1X ADSL PAP/CHAP none L3 encryption EAP = Extendable Authentication Protocol (RFC 3748) GCM = Galois/Counter Mode PSK = Private Shared Key DPoE = DOCSIS Provisioning of EPON Specifications 24

DEVIL S ADVOCATE (NO FLAME PLEEEEASE) Hop to hop limitation Packet need to decrypted to access the inner VLAN tag Key explosion Let be realistic Key management was and still is the main roadblock to security deployment 802.1AEcg (aims to Provider bridges) VLAN is copied outside the encrypted fields What if: Same key could now be OPTIONALLY reused if the Authentication Method and credentials are the same on 2 links If the SA is the same on Ingress and Egress, could the encrypted packets be forwarded as is? Better performance? Better transit protection? Retain network synchronization accuracy? Optional link or path authentication Notice that this scheme was already presented at the Ethernet Summit in 2014 by Vitesse Semiconductors Q: What about IEEE 1588 Annex K? 25

MY (HUMBLE) CONCLUSIONS IEEE 802.1AE (MACsec) is a robust solution for network wide security at the link layer but More effort should be made to address the low end (SMB? / SOHO / Home) market Hard to promote as many customers are foreseeing the need for security Seen as expensive and cumbersome Must be actively promoted beyond Ethernet Core Networks MUST BE INTEGRATED UP FRONT IN ARCHITECTURE DESIGN 26

Thank you Broadcom Proprietary and Confidential. 2015 Broadcom Corporation. All rights reserved. 27