WG Review: Multicast Security (msec)
The IESG <iesg-secretary@ietf.org> Mon, 29 January 2001 17:55 UTC
Received: from loki.ietf.org (loki [10.27.2.29]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA06740; Mon, 29 Jan 2001 12:55:17 -0500 (EST)
Received: (from adm@localhost) by loki.ietf.org (8.9.1b+Sun/8.9.1) id MAA18743 for ietf-123-outbound.10@ietf.org; Mon, 29 Jan 2001 12:45:01 -0500 (EST)
Received: from ietf.org (odin.ietf.org [10.27.2.28]) by loki.ietf.org (8.9.1b+Sun/8.9.1) with ESMTP id MAA18720 for <all-ietf@loki.ietf.org>; Mon, 29 Jan 2001 12:41:00 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA06520; Mon, 29 Jan 2001 12:40:50 -0500 (EST)
Message-Id: <200101291740.MAA06520@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce:;
cc: new-work@ietf.org
Subject: WG Review: Multicast Security (msec)
Date: Mon, 29 Jan 2001 12:40:50 -0500
Sender: scoya@cnri.reston.va.us
A new IETF working group has been proposed in theSecurity Area. The IESG has not made any determination as yet. The following Description was submitted, and is provided for informational purposes only: Multicast Security (msec) ------------------------- Current Status: Proposed Working Group Mailing Lists: General Discussion:msec@securemulticast.org To Subscribe: msec-request@securemulticast.org In Body: subscribe Archive: http://www.pairlist.net/mailman/listinfo/msec Description of Working Group: The purpose of the MSEC WG is to standardize protocols for securing group communication over internets, and in particular over the global Internet. Initial efforts will focus on scalable solutions for groups with a single source and a very large number of recipients. Additional emphasis will be put on groups where the data is transmitted via IP-layer multicast routing protocols (with or without guaranteed reliability). The developed standard will assume that each group has a single trusted entity (the Group Controller) that sets the security policy and controls the group membership. The standard will strive to provide at least the following basic security guarantees: + Only legitimate group members will have access to current group communication. This includes groups with highly dynamic membership. + Legitimate group members will be able to authenticate the source and contents of the group communication. This includes cases where group members do not trust each other. An additional goal of the standard will be to protect against denial-of-service attacks, whenever possible. Due to the large number of one-to-many multicast applications and the sometimes conflicting requirements these applications exhibit, it is believed that a single protocol will be unable to meet the requirements of all applications. Therefore, the WG will first specify a general framework that includes a number of "functional building blocks". Each such building block will be instantiated by one or more protocols that that will be interchangable. The functional building blocks and protocols developed at the SMUG Rsearch Group of the IRTF will be used as the starting point for the work of MSEC. Specifically, the following functional building-blocks will be the basis of the standard: (BB1) Data security transforms functional building block. This building block provide for group and source authentication and group secrecy, assuming that the parties hold the necessary cryptographic keys. This BB will support both IP-layer and transport/application layer security services. (BB2) Group key management and group security association (GSA) functional building block. This building block makes sure that the group members have the cryptographic keys needed for BB1. This includes secure generation, distribution, and update of the cryptographic keys. (BB3) Group policy management functional building block. This building block provides means for determination and disemination of group security policy, that governs the behavior of BB1 and BB2. (It is stressed that MSEC will not address general policy management issues, and will concentrate on mechanisms required for BB1 and BB2.) MSEC will work closely with the Secure Multicast (SMUG) and Reliable Multicast (RMRG), IRTF research groups, and with the Multicast Transport (RMT), IP Security (IPsec) and Policy (Policy Framework and IPSP) WGs of the IETF. DELIVERABLES MSEC will generate the at least the following documents: 1 An informational RFC describing the security requirements and problem-space for group and multicast security for one-to-many communications. This RFC will be based on draft-irtf-smug-taxonomy-01.txt. 2 An informational RFC that specifies the overall framework for the solution. This includes specifying the general functionality of the building blocks and their inter-relations. This RFC will be based on draft-irtf-smug-framework-01.txt. 3 RFCs detailing the structure and functionality of each building block. These RFCs will be based on: draft-irtf-smug-data-transforms-00.txt draft-irtf-smug-gkmbb-gsadef-01.txt draft-irtf-smug-mcast-policy-01.txt 4 Standards-track RFCs describing specific protocols that instantiate each one of the functional builing blocks. At least one protocol for instantiating each building block will be standardized. Some of these RFCs will be based on: draft-irtf-smug-gdoi-00.txt draft-harney-sparta-gsakmp-sec-02.txt draft-irtf-smug-tesla-00.txt
- WG Review: Multicast Security (msec) The IESG