Re: [MSEC] Key Management protocol (GDOI - 6407) forward

Paul Lambert <paul@marvell.com> Wed, 16 October 2013 16:05 UTC

Return-Path: <paul@marvell.com>
X-Original-To: msec@ietfa.amsl.com
Delivered-To: msec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0FD711E82FB for <msec@ietfa.amsl.com>; Wed, 16 Oct 2013 09:05:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.208
X-Spam-Level:
X-Spam-Status: No, score=-2.208 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_EMBEDS=0.056, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aunz5yHrgs40 for <msec@ietfa.amsl.com>; Wed, 16 Oct 2013 09:05:25 -0700 (PDT)
Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) by ietfa.amsl.com (Postfix) with ESMTP id 41D2D21F9D4C for <msec@ietf.org>; Wed, 16 Oct 2013 09:05:24 -0700 (PDT)
Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.14.5/8.14.5) with SMTP id r9GG58g1007196; Wed, 16 Oct 2013 09:05:19 -0700
Received: from sc-owa.marvell.com ([199.233.58.135]) by mx0b-0016f401.pphosted.com with ESMTP id 1fhar544kq-1 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Wed, 16 Oct 2013 09:05:18 -0700
Received: from SC-vEXCH2.marvell.com ([10.93.76.134]) by SC-OWA.marvell.com ([::1]) with mapi; Wed, 16 Oct 2013 09:05:17 -0700
From: Paul Lambert <paul@marvell.com>
To: Brian Weis <bew@cisco.com>
Date: Wed, 16 Oct 2013 09:05:15 -0700
Thread-Topic: [MSEC] Key Management protocol (GDOI - 6407) forward
Thread-Index: Ac7KiYFCVTDu21W6S6y/glkbU/jvvA==
Message-ID: <CE840679.25C65%paul@marvell.com>
In-Reply-To: <E87892BC-C8F4-4250-BE62-C2A41ED13E43@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.7.130812
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_CE84067925C65paulmarvellcom_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.10.8794, 1.0.431, 0.0.0000 definitions=2013-10-16_06:2013-10-16, 2013-10-16, 1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1305240000 definitions=main-1310160059
Cc: "msec@ietf.org" <msec@ietf.org>, Jeff Gooding/SCE/EIX <Jeff.Gooding@sce.com>, "Maik Seewald (maseewal)" <maseewal@cisco.com>, "Andrew.Free@sce.com" <Andrew.Free@sce.com>, "Madani, Vahid" <VxM6@pge.com>, "Adamiak, Mark (GE Energy Management)" <mark.adamiak@ge.com>, "Novosel, Damir" <DNovosel@Quanta-Technology.com>, "Thanos, Daniel (GE Energy Management)" <Daniel.Thanos@ge.com>, "Herb Falk <herb@sisconet.com>" <Herb@sisconet.com>, "Alex Apostolov (alex.apostolov@omicronusa.com)" <alex.apostolov@omicronusa.com>
Subject: Re: [MSEC] Key Management protocol (GDOI - 6407) forward
X-BeenThere: msec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Multicast Security List <msec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/msec>, <mailto:msec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/msec>
List-Post: <mailto:msec@ietf.org>
List-Help: <mailto:msec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/msec>, <mailto:msec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Oct 2013 16:05:30 -0000


Brian,

Thanks for the pointer below.  I now see how the SID works in IKE

Section 3.5 of RFC 6407 gives an overview of the key server (KS) operations that guarantee uniqueness of the SID values. The actual distribution of the SID is done in the KD payload (fourth message in  Figure 2) along with keying material.  See the SID "KD Type" in Section 5.6, further defined in Section 5.6.4. By default the KS will distribute one SID each time a group member "registers" to the KS.

A group member can request more than one SID value if it believes it will need them. For example, if it plans to install the policy in more than one SA Database (SAD) it will need one per SAD). The request is done in the GAP payload sent in message 2 of Figure 2.
Are there any reference implementations of test vectors for MSEC?
No. Since the GDOI payload is an IKEv1 payload, it is encrypted under a dynamic key and so actual test vectors would be difficult.

Yes …  but still possible by showing full computations on both sides.  Not as necessary here since IKEv1 is a well known entity.

Appreciate all the help.  Will see if I can reuse any of the ideas …

Paul





Hope that helps,
Brian


Paul


Hi Paul,

On Oct 14, 2013, at 6:10 PM, Paul Lambert <paul@marvell.com<mailto:paul@marvell.com>> wrote:


Brian,

Thanks for the info …


The data transports are defined in the IEC 61850-90 family of standards, and are a part of the frame formats used within and between power substations. I don't think they is generally re-usable to other industries.

But some of the payloads defined in this Internet-Draft might be applicable for key management in other industries. In particular the OID Identification (ID) payload could be used by any protocol using an OID as an identity.

In MSEC or the 61850 series I do not see how the group key distribution handles the issues of nonce/key uniqueness for algorithm modes like CCM or GCM.  I'd assumed that this multicast group would need to address this very important security requirement.

I'm sure it must just be my quick read of MSEC that I'm missing something, but  … How does the MSEC or 61850 protocols handle the limitations of AES-CCM or AES-GCM and provide a guarantee of transmitted nonce/key uniqueness for multicast groups?

You're right, this is very important. You can find a general description of the MSEC solution in RFC 6054 <http://tools.ietf.org/html/rfc6054>. Briefly, the Nonce space is segmented so that each group members has a unique part of the nonce space. The GDOI protocol supports this in RFC 6407 by distributing unique upper bits of the nonce (SID).

I was hoping to find in the MSEC a new algorithm mode (which I believe is the preferred answer to the issue) or perhaps another mechanism.   The Wi-Fi multicast security solutions currently require N squared messages to give each device it's own group key because of the nonce/key uniqueness requirement.  This is a limitation (IMO) of CCM and GCM.  IN some environments or protocols it might be possible to coordinate or control the nonce to make sure it is not repeated for a group of devices.  This is quite difficult for consumer device since if reset they would forget state and potentially repeat a nonce (unless some device coordinates nonce usage – impossible in ad hoc environments).

The MSEC protocols all assume a centralized key management service, which carefully allocates the SIDs. As you say, in order to repeat the devices have to request an SID after a reset but they also have to request the rest of the keying state as well.  The controller always returns a new SID to ensure the old nonces are not reused. Another system using a centralized controller could likely do something similar.

Hope that helps,
Brian



Regards,

Paul



Thanks,
Brian


Thanks in advance,

Paul







Herbert Falk
Solutions Architect
SISCO, INC.
6605 19 1Ž2 Mile Rd.
Sterling Heights, MI 48314
(586) 254-0020 x-105


"In matters of style, swim with the current;   in matters of principle, stand like a rock." [Thomas Jefferson]


NOTICE: This communication may contain privileged or other confidential information. If you are not the intended recipient, or believe that you have  received this communication in error, please do not print, copy, retransmit,  disseminate, or otherwise use the information. Also,  please indicate to the sender that you have received this communication in error, and delete the copy you received. Thank you.

________________________________


_______________________________________________
MSEC mailing list
MSEC@ietf.org<mailto:MSEC@ietf.org>
https://www.ietf.org/mailman/listinfo/msec

--
Brian Weis
Security, Enterprise Networking Group, Cisco Systems
Telephone: +1 408 526 4796
Email: bew@cisco.com<mailto:bew@cisco.com>




--
Brian Weis
Security, Enterprise Networking Group, Cisco Systems
Telephone: +1 408 526 4796
Email: bew@cisco.com<mailto:bew@cisco.com>




--
Brian Weis
Security, Enterprise Networking Group, Cisco Systems
Telephone: +1 408 526 4796
Email: bew@cisco.com<mailto:bew@cisco.com>