Internet DRAFT - draft-dondeti-msec-inband-key-updates
draft-dondeti-msec-inband-key-updates
Individual L. Dondeti
Internet-Draft QUALCOMM
Expires: April 26, 2006 October 23, 2005
Piggybacking Key Material with Security Encapsulated Data: Inband Key
Updates
draft-dondeti-msec-inband-key-updates-01
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 26, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
IPsec and SRTP use out-of-band key management. Synchronization of
group security associations is an issue when out-of-band key
management protocols are used. In case of rapid or unplanned
rekeying, some members may not receive the key updates in time to
decrypt the IPsec or SRTP traffic. To address that problem, this
document describes a strawman proposal to carry group key updates as
part of IPsec and SRTP.
Dondeti Expires April 26, 2006 [Page 1]
Internet-Draft Inband Key Updates October 2005
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Motivation . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Piggybacking key updates in encapsulated data packets . . . . . 3
3. Proposed modification to IPsec ESP encapsulation . . . . . . . 4
4. Proposed modification to SRTP encapsulation . . . . . . . . . . 6
5. Details on the GSA Update addition to the encapsulations . . . 6
6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 6
7. Security Considerations . . . . . . . . . . . . . . . . . . . . 7
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 7
9. Informative References . . . . . . . . . . . . . . . . . . . . 7
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 8
Intellectual Property and Copyright Statements . . . . . . . . . . 9
Dondeti Expires April 26, 2006 [Page 2]
Internet-Draft Inband Key Updates October 2005
1. Introduction
1.1. Motivation
Synchronization of group security associations (GSA) after rekeying
is a difficult problem. Currently in the IETF MSEC protocols,
repeated retransmission of rekey messages is suggested as a reliable
transport mechanism. Other solutions such as forward error
correction (FEC), feedback based mechanisms for reliable delivery of
key updates are also proposed in the research literature. However,
even with the use of reliable delivery mechanisms for sending group
key updates, it is plausible that some members do not receive the
updates in time to decrypt data packets encapsulated with the new
GSA.
To ensure that all members receive a GSA before it is used to
encapsulate packets, it is plausible to plan SA updates so that all
members receive the updates in time. However, in some rekeying
scenarios, for instance in membership revocation and immediate
rekeying (as opposed to say, batch rekeying), there is only a small
window between delivering the new GSA and using it to protect data
transmission. Members may also have been offline during a GSA update
and may be forced to wait for the next update or request to receive
the update via a secure unicast channel.
A solution other than reliable delivery to ensure that all group
members receive key updates in time is to piggyback key material on
security encapsulated data packets. This is the case in 3GPP2 BCMCS
specification, with an overloading of the master key identifier (MKI)
field of SRTP packets. Incidentally, solutions along these lines --
MKI field reuse not withstanding -- are not uncommon: for example,
SRTP-TESLA packets contain disclosed TESLA keys. Furthermore, there
were some verbal proposals in the IETF MSEC WG on piggybacking key
material with data packets to ensure reliable delivery of rekey
messages.
2. Piggybacking key updates in encapsulated data packets
We propose to include all or a portion of GSA update messages as part
of encapsulated data packets as a mechanism to synchronize GSAs
easily and efficiently. In the simplest case, an SA update fits
within a single encapsulated packet and makes it convenient for a
group member to first recover the SA update followed by decapsulating
the data. More generally, the SA update is FEC encoded and pieces of
the update are included with data packets so that receipt of np1
packets out of np successive packets will enable a group member to
extract the GSA update required to decrypt those packets.
Dondeti Expires April 26, 2006 [Page 3]
Internet-Draft Inband Key Updates October 2005
The proposed solution has several use cases. In the simplest case, a
small amount of data is included in every packet which when
(cryptographically) combined with initial key material or SA material
results in the current SA. In this case, note that the receiver can
use any single encapsulated packet to recover the current SA and
decapsulate the packet.
In a more complex case, the sender encodes the GSA update using FEC
and includes portions of the update in more than one encapsulated
packet. The receiver needs only a subset of the packets containing a
GSA update to recover the GSA. More formally, a receiver needs np1
packets out of np successive packets to acquire the GSA update
message.
It is easy to conceive use cases in between the above two examples.
One immediate problem to think about is the protection afforded to
the "key update" portion of the encapsulated data packets. Note that
the assumption is that the data itself is protected by the new GSA,
and that the key material cannot be protected with the new GSA. The
key material might be protected with a combination of old and the new
GSAs. Details TBD.
3. Proposed modification to IPsec ESP encapsulation
Dondeti Expires April 26, 2006 [Page 4]
Internet-Draft Inband Key Updates October 2005
IPsec ESP with a GSA update piggybacked:
--------------------------------------------------------------------
| new IP hdr* | | orig IP hdr* | | | GSA | ESP | ESP|
|(any options)| ESP | (any options) |TCP|Data| Upate | Trailer|Auth|
--------------------------------------------------------------------
|<--------- encrypted ------------------->|
|<----------- authenticated ------------------->|
--------------------------------------------------------------------
| new* |new ext | | orig*|orig ext | | | GSA | ESP | ESP|
|IP hdr| hdrs* |ESP|IP hdr| hdrs * |TCP|Data|Update |Trailer|Auth|
--------------------------------------------------------------------
|<--------- encrypted ------------------->|
|<---------- authenticated ------------------>|
* = if present, construction of outer IP hdr/extensions
and modification of inner IP hdr/extensions is
discussed below.
Figure 1: Proposed IPsec ESP modification
Dondeti Expires April 26, 2006 [Page 5]
Internet-Draft Inband Key Updates October 2005
4. Proposed modification to SRTP encapsulation
SRTP with a GSA update piggybacked:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<+
|V=2|P|X| CC |M| PT | sequence number | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| timestamp | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| synchronization source (SSRC) identifier | |
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ |
| contributing source (CSRC) identifiers | |
| .... | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| RTP extension (OPTIONAL) | |
+>+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | payload ... | |
| | +-------------------------------+ |
| | | RTP padding | RTP pad count | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | GSA Update (OPTIONAL) | |
+>+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<+
| ~ SRTP MKI (OPTIONAL) ~ |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| : authentication tag (RECOMMENDED) : |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| |
+- Encrypted Portion* Authenticated Portion ---+
Figure 2: Proposed SRTP modification
5. Details on the GSA Update addition to the encapsulations
This version of the document is short on details. But, in short, the
GSA update might contain a identity payload (say 16 bits in length)
for various different uses of the field. The new payload might
contain a full GSA update or an FEC block of a GSA update. The new
field needs integrity protection and typically encrypted independent
of the encapsulated data packet.
6. Acknowledgments
Dondeti Expires April 26, 2006 [Page 6]
Internet-Draft Inband Key Updates October 2005
SRTP MKI overloading in 3GPP2 BCMCS specification was pointed out to
me by Raymond Hsu, AC Mahendran, Jun Wang and others in QUALCOMM.
7. Security Considerations
TBD. Integrity protection and encryption of key update payloads
included in encapsulated data packets is tricky.
8. IANA Considerations
9. Informative References
[RFC3711] Baugher, M., McGrew, D., Naslund, M., Carrara, E., and K.
Norrman, "The Secure Real-time Transport Protocol (SRTP)",
RFC 3711, March 2004.
[RFC3547] Baugher, M., Weis, B., Hardjono, T., and H. Harney, "The
Group Domain of Interpretation", RFC 3547, July 2003.
Dondeti Expires April 26, 2006 [Page 7]
Internet-Draft Inband Key Updates October 2005
Author's Address
Lakshminath Dondeti
QUALCOMM
5775 Morehouse Dr.
San Diego, CA 92121
USA
Phone: +1 858-845-1267
Email: ldondeti@qualcomm.com
Dondeti Expires April 26, 2006 [Page 8]
Internet-Draft Inband Key Updates October 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Dondeti Expires April 26, 2006 [Page 9]