From 4a059df9c351a97e1ba175e81fb2601deca79a05 Mon Sep 17 00:00:00 2001 From: Othmar Gsenger Date: Fri, 27 Apr 2007 16:29:10 +0000 Subject: auth --- internet-draft-satp.xml | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) (limited to 'internet-draft-satp.xml') diff --git a/internet-draft-satp.xml b/internet-draft-satp.xml index c48dfa9..895f197 100644 --- a/internet-draft-satp.xml +++ b/internet-draft-satp.xml @@ -12,7 +12,7 @@ - secure anycast tunneling protocol (satp) + secure anycast tunneling protocol (SATP) @@ -44,7 +44,7 @@ secure protocol - The secure anycast tunneling protocol (satp) defines a protocol used for communication between any combination of unicast and anycast tunnel endpoints. It allows tunneling of every ETHER TYPE protocol (e.g. ethernet, ip, arp ...). SATP directly includes cryptography and message authentication based on the methodes used by SRTP. It is intended to deliver a generic, scaleable and secure solution for tunneling and relaying of packets of any protocol. + The secure anycast tunneling protocol (SATP) defines a protocol used for communication between any combination of unicast and anycast tunnel endpoints. It allows tunneling of every ETHER TYPE protocol (e.g. ethernet, ip, arp ...). SATP directly includes cryptography and message authentication based on the methodes used by SRTP. It is intended to deliver a generic, scaleable and secure solution for tunneling and relaying of packets of any protocol. @@ -194,7 +194,7 @@ Tunneling of IPv6 over IPv4 with RTP payload | : authentication tag (RECOMMENDED) : | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | - +- Encrypted Portion* Authenticated Portion ---+ + +- Encrypted Portion Authenticated Portion ---+ @@ -218,7 +218,7 @@ None of the pre-defined encryption transforms uses any padding; for
The payload type field defines the payload protocol. ETHER TYPE protocol numbers are used. See IANA assigned ethernet numbers . The values 0000-05DC are reserverd and MUST NOT be used. -
+
Some examples for protocol types HEX @@ -230,6 +230,12 @@ HEX 86DD IPv6
+
+ The MKI (Master Key Identifier) is OPTIONAL and of configurable length. See SRTP Section 3.1 for details +
+
+ The authentication tag is RECOMMENDED and of configurable length. It contains a cryptographic checksum of the sender ID, sequence number and the encrypted portion, but not ofthe MKI. On sender side encryption HAS TO be done before calculating the authentication tag. A receiver HAS TO first calculate the authentication tag and than decrypt the encrypted portion. +
@@ -262,7 +268,7 @@ HEX
- As satp uses the same encrytion technics as SRTP, it shares the same security issues. This section will only discuss some small changes. Please read SRTP RFC3711 section 9 for details. + As SATP uses the same encrytion technics as SRTP, it shares the same security issues. This section will only discuss some small changes. Please read SRTP RFC3711 section 9 for details.
Replay protection is done by a replay list. Every anycast receiver has it's own replay list, which SOULDN'T be syncronised, because of massive overhead. This leads to an additional possible attack. A attacker is able to replay a captured packet once to every anycast reciever. This attack is considered of be very unlikely, because multiple attack hosts in different loactions are needed to reach the seperate anycast receivers and the number of replays is limited to the count of receivers - 1. Such replays might also happen because of routing problems, so a payload protocol HAS TO be robust against a small number of duplicated packages. The window size and position HAS TO be syncronised between multible anycast receivers to limit this attack.
-- cgit v1.2.3