13
SIP-SAML assisted Diffie- Hellman MIKEY IETF 65 MSEC Mar 21, 2006 Robert Moskowitz

SIP-SAML assisted Diffie-Hellman MIKEY

  • Upload
    keziah

  • View
    20

  • Download
    0

Embed Size (px)

DESCRIPTION

SIP-SAML assisted Diffie-Hellman MIKEY. IETF 65 MSEC Mar 21, 2006 Robert Moskowitz. Requirements to think about For SRTP keying. Provides mutual authentication of the call parties. Both parties are actively involved in session key generation. - PowerPoint PPT Presentation

Citation preview

Page 1: SIP-SAML assisted Diffie-Hellman MIKEY

SIP-SAML assisted Diffie-HellmanMIKEY

IETF 65 MSEC

Mar 21, 2006

Robert Moskowitz

Page 2: SIP-SAML assisted Diffie-Hellman MIKEY

Requirements to think aboutFor SRTP keying

1) Provides mutual authentication of the call parties.

2) Both parties are actively involved in session key generation.

3) Is able to provide full perfect forward secrecy (PFS).

4) Supports distribution of group session keys.5) Provides liveliness test when the UA does not

have a reliable clock.6) Supports limited UAs.

Page 3: SIP-SAML assisted Diffie-Hellman MIKEY

Observations

• Items 2 and 3 are naturally provided by a Diffie-Hellman exchange.

• Item 1 can be provided by a SAML attribute cert of the UAs ID and DH key– signed by the UA’s SIP server.– The important part of this presentation

• An optional second round trip extension to MIKEY, encrypted with the Diffie-Hellman derived session key can provide items 4 and 5.– Perhaps item 5 (lack of reliable time clocks) may not be of

practical concern• Locality of validation and D-H key sizes to address item

6.• All of these components together create a relatively easy

to deploy secure VoIP environment.

Page 4: SIP-SAML assisted Diffie-Hellman MIKEY

Scenarios for MIKEY

• peer-to-peer• simple one-to-many• small-sized groups• If we design the MIKEY exchange to first create

a peer-to-peer session key that can be extended to securely transmit another key, – the one-to-many and small groups exchanges are

simply handled as special cases of the peer-to-peer exchange.

Page 5: SIP-SAML assisted Diffie-Hellman MIKEY

Trusted UA Credentials

• For any successful MIKEY exchange, the parties SHOULD have trusted credentials.

• These credentials SHOULD contain:– UA Identity– DH Public key– Proof of Trust– Time range for trusting credential

• draft-tschofenig-sip-saml-05.txt

Page 6: SIP-SAML assisted Diffie-Hellman MIKEY

Low Latency and Computational overhead

• MIKEY has to occur after call 'pickup' and before talking.

• Latency here would be very apparent to the users.

• Thus a MIKEY exchange SHOULD be completed in one round trip.

• Additional round trips should be optional for additional features.

Page 7: SIP-SAML assisted Diffie-Hellman MIKEY

Low Latency and Computational overhead

• A hidden latency cost is credential validation.• If the UA received caller’s SAML certificate from

its domain's SIP server– it trusts its server implicitly

• thus it can extend that trust to relying on it to validate the other party's SAML certificate.

– This not only eliminates the hidden validation latency, but also its computational cost to the UA.

• Starting point– draft-ietf-sipping-certs-03

Page 8: SIP-SAML assisted Diffie-Hellman MIKEY

Low Latency and Computational overhead

• A common practice in generating a DH session key is to use the DH key in a keyed hash over random nonces and other data:

– TGK is HMACx(RAND1|RAND2) where x = g(xi* x

r)

• This construct allows for a long-lived Diffie-Hellman key pair– as it is never used to encrypt any transmitted data– rather to generate the actual key.– NIST Special Publication 800-56A

• Sec 6.3

Page 9: SIP-SAML assisted Diffie-Hellman MIKEY

Low Latency and Computational overhead

• Consider Diffie-Hellman key size– Recommendation is 4096 bits to equal 128 bits for

AES key– This will be too expensive for many SIP phones– Use ECC Diffie-Hellman?– Use optional smaller Diffie-Hellman key size

• 512 bits• SIP phone could have mechanism to get new key

periodically from PC or PDA– Or compute one overnight

• Remember Diffie-Hellman key is used in an HMAC to produce session key.

Page 10: SIP-SAML assisted Diffie-Hellman MIKEY

Next

• Generate interest

• Finish the Internet Draft– Used as the source for much of this

presentation!

• Get ‘buy in’ from SIP server vendors and SIP phone vendors

Page 11: SIP-SAML assisted Diffie-Hellman MIKEY

What about security risks

• If both parties are registered to the same SIP domain– The SIP server can LIE and generate 2 SAML

certs to place itself as the Man-in-the-Middle

• If the parties are in different domains– The SIP servers can COLLUDE

• Each generating 2nd SAML certs• Allowing either of both servers to be the Man-in-

the-middle

Page 12: SIP-SAML assisted Diffie-Hellman MIKEY

What about security risks

• SIP phone MIGHT get its SAML cert for a 3rd party that will not participate in a Diffie-Hellman attack

Page 13: SIP-SAML assisted Diffie-Hellman MIKEY

• Questions?