Download Packet Timing Security Aspects TICTOC – IETF 78

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

RapidIO wikipedia , lookup

Net bias wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Wireless security wikipedia , lookup

IEEE 1355 wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer security wikipedia , lookup

Distributed firewall wikipedia , lookup

Deep packet inspection wikipedia , lookup

Real-Time Messaging Protocol wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Packet Timing Security
Aspects
TICTOC – IETF 78
Stefano Ruffini, Ericsson
Introduction
› Aspects related to security planned to be studied in TICTOC
› Relevant discussions in earlier meetings , e.g.:
– Security aspects in Femtocell application (Tictoc-1 from IETF-75:
http://www.ietf.org/proceedings/75/slides/tictoc-1)
– Problem Statement Security (tictoc-2 from IETF -77:
http://www.ietf.org/proceedings/77/slides/tictoc-2/tictoc-2_files/frame.htm
)
› Note: ITU-T G.8265 provides general considerations on this
subject. Work in TICTOC may provide valuable complement
› Some considerations are presented in the following slides
indicating aspects that could be considered
© Ericsson AB 2010
2
2010-07-22
Security and Timing
› For packet-based synchronization (PTP or NTP) the protection of the
timing data being delivered is a crucial feature
– to prevent malicious attacks,
– to avoid accidental disturbances
› Timing packets could be intercepted by other than the intended recipient,
remanufactured in various ways and replayed in whole or part.
– An intruder could inject false time values, disrupt the protocol or congest the
network
› Timing data need to come from a trusted source of synchronization,
– loss, manipulation or corruption of data must be prevented or detected
› Availability, integrity and authentication need to be put in place,
› Confidentiality may not be essential in this respect
– Nevertheless, It is important to permit the operation with existing, standardsbased security techniques.
› Aspects highlighted by G.8265:
– slaves should be prevented from connecting to rogue masters; masters should
be prevented from providing service to unauthorised slaves
– It may not be possible to implement some of these (security) requirements
without actually degrading the overall level of timing or system performance.
© Ericsson AB 2010
3
2010-07-22
Mobile Backhaul
› Mobile Backhaul normally is a closed network but exceptions exist
(e.g. femtocell);
› In case of a closed network only insiders, i.e., people who have direct
access to the Mobile Backhaul network can initiate attacks.
› IPSEC is being considered in some mobile applications, especially in
case of « unsecure links » being involved (e.g. femtocells, see 3GPP
TR 22.820)
Operator’s core
network
UE
HNB
unsecure
link
SeGW
OAM
HNB GW
OAM
› IPSEC can provide: authentication, confidentiality, integrity
› Note: some Man–in-the-Middle attacks may not be handled by IPSEC
(e.g. ARP spoofing creating additional delays) and shall be specifically
addressed
© Ericsson AB 2010
4
2010-07-22
Handling of Timing packets and IPSEC
› 1588 Transparent Clock
– Payload is modified as to add information on the actual delays
– not feasible in case of encrypted data (e.g. IPSEC)
– some issues also in case of multioperator
– Ongoing discussions on Layer violation issues
› 1588 Boundary Clock (or Stratum Clock in case of NTP)
– Timing packets are terminated and regenerated
– Additional delay variation in case of IPSEC (performance issues)
– Not viable for trasparent timing transport
› Controlling the delay
– Data is not modified
– Might be the only solution in case of IPSEC (no need to modify the payload)
– Need to identify the PTP packet
Correction delay
PTP Flow
PTP Flows
Example in case of VDSL or GPON
OLT/VTU-O
End User
(e.g. Base Station)
ONU/VTU-R
(see C977 from SG15 – June 2010)
G.984.3 Amd. 2
Delay and HW timestamping
© Ericsson AB 2010
5
TBD (VDSL2)
Delay and HW timestamping
2010-07-22
Identifying PTP (or NTP) packets in IPSEC
› It may be advantageous to identify if the content of a tunnel
are “special” packets from a timing perspective (e.g.
PTP/NTP)
– This may allow a specific handling of the packet
– Additional issues when the content of the timing packet is encrypted
(e.g. IPSEC);
› How to identify Timing packets in case of IPSEC:
– IPSEC Header (e.g. RES bits)
– “unused” QoS bits in the IP header
– Others
› Discussions with concerned group is necessary (e.g.
ipsecme)
© Ericsson AB 2010
6
2010-07-22
NTP and PTP Security Schemes
› NTP and PTP can provide protocol level security
– IEEE 1588 Experimental Annex K provides group source authentication,
message integrity, and replay attack protection
– NTP v4 Autokey protocol defines a security model for authenticating servers to
clients using the Network Time Protocol (NTP) and public key cryptography)
(Note: “Its design is based on the premise that this IPsec schemes cannot be
adopted intact, since that would preclude stateless servers and severely
compromise timekeeping accuracy”.)
› Further investigation required to better understand the applicability and
need for these features in a mobile backhaul environment
© Ericsson AB 2010
7
2010-07-22
Conclusions
› Security is a key aspect in case of packet timing.
› Several aspects need to be investigated, e.g.:
– Applicability and need of the protocols security features (NTP
Autokey, PTP Annex K) in mobile backhaul
– Timing packets over IPSEC
› Scenarios
› Performances
› Identification of Timing Packets
© Ericsson AB 2010
8
2010-07-22