Top Banner
IDC’99, Madrid 23 Sept. 1999 1 Ian Brown, UCL Secure multicast conferencing Peter Kirstein, Ian Brown and Edmund Whelan University College London
15

Secure Multicast Conferencing

Dec 21, 2014

Download

Business

Ian Brown

Presented in Madrid, 1999
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

1Ian Brown, UCL

Secure multicast conferencing

Peter Kirstein, Ian Brown and Edmund Whelan

University College London

Page 2: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

2Ian Brown, UCL

Multicast conferencing involves...

VideoAudio

Shared whiteboard

Page 3: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

3Ian Brown, UCL

Security provides...

• Confidentiality: only authorised conference members can access conference data

• Integrity: you can be sure data has not been altered in transit

• Authentication: of conference announcers and participants

Page 4: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

4Ian Brown, UCL

Point-to-point conferencing security is easy...

GCCProvider

Node 2 Node 3 Node 4

Node 1

MCS Connections

Top GCCProvider

NodeController

ApplicationProtocol

Entity

GCCProvider

GCCProvider

NodeController

NodeController

NodeController

ApplicationProtocol

Entity

• Each link is secured using a standard communications security protocol: IPSEC, SSL/TLS, SSH

• Extremely wasteful of bandwidth

• Multipoint control units are security risks

Page 5: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

5Ian Brown, UCL

But multicast is more tricky...

• Multicast doesn’t fit the “point-to-point” model of current security protocols

• There is no standard method of sharing keys between group members

Page 6: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

6Ian Brown, UCL

Insecure conferences

• Use Real-time Transport Protocol (RTP) to send data

• Users announce conferences and invite users by sending a session invitation via e-mail, the Session Announcement or Session Invitation Protocols

Page 7: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

7Ian Brown, UCL

Secure transport

• RTP allows data to be encrypted with DES - implemented in UCL’s tools

• We want to move to IPSEC to remove need for cryptographic code in applications and take advantage of its wide range of ciphersuites and protocol and implementation security

Page 8: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

8Ian Brown, UCL

IP security extensions

• Now standardised by IETF (RFC 2411)

• Provides network-layer protection for all packets sent between compatible machines

• Not yet finished for multicast

Page 9: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

9Ian Brown, UCL

Key distribution problem

• The Internet Key Exchange (IKE) allows two hosts to negotiate security parameters for an IPSEC connection

• But multicast IKE is much harder, and being investigated by the IRTF

Page 10: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

10Ian Brown, UCL

Conferencing solution

• We use secure session invitations to distribute security parameters

• Sent using secure SAP, SIP, or e-mail (S/MIME) or retrieved via the World Wide Web (TLS)

Page 11: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

11Ian Brown, UCL

Web distribution

• Session descriptions are stored on a secure Web server

• Authorised conference members can retrieve descriptions over a TLS link

Page 12: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

12Ian Brown, UCL

Smartcards

• Users don’t like having to remember many long passphrases

• Mobile users need access to keys from many different systems

• Software keys are vulnerable to theft

• Smartcards alleviate all these problems

Page 13: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

13Ian Brown, UCL

Active services

• In-network code can reduce bandwidth requirements, convert between coding schemes, provide multicast connectivity, etc. etc.

Page 14: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

14Ian Brown, UCL

Processing encrypted data

Trusted environment

Filter

Plugin filtersCryptoengine

Cryptoengine

Secure, wireless low-bandwidth links

Secure, wired high-bandwidth links

Internet

Mobile Host

• You can give proxies the session keys needed for them to access and process data

• We are developing proxies that can work without this security risk

Page 15: Secure Multicast Conferencing

IDC’99, Madrid23 Sept. 1999

15Ian Brown, UCL

Conclusions

• Multicast conference data can be secured at the network or application layer

• Until multicast key distribution is standardised, lightweight methods based on session descriptions can be used

• New techniques are needed to allow in-network processing of encrypted data