• DocumentCode
    2888616
  • Title

    End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace

  • Author

    Heer, Tobias ; Hummen, René ; Komu, Miika ; Götz, Stefan ; Wehrle, Klaus

  • Author_Institution
    Distrib. Syst. Group, RWTH Aachen Univ., Aachen, Germany
  • fYear
    2009
  • fDate
    14-18 June 2009
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, detect network intrusion, control access to network resources, and enforce different levels of quality of service. The cornerstones for these security-related network services are end- host authentication and authorization. Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity. The host identity protocol (HIP) is a key-exchange protocol that introduces such a cryptographic namespace for secure end-to-end communication. Although HIP was designed with middleboxes in mind, these cannot securely use its namespace because the on-path identity verification is susceptible to replay attacks. Moreover, the binding between HIP as an authentication protocol and IPsec as payload transport is insufficient because on-path middleboxes cannot securely map payload packets to a HIP association. In this paper, we propose to prevent replay attacks by allowing packet- forwarding middleboxes to directly interact with end-hosts. Also we propose a method for strengthening the binding between the HIP authentication process and its payload channel with hash-chain-based authorization tokens for IPsec. Our solution allows on-path middleboxes to efficiently leverage cryptographic end- host identities and integrates cleanly into existing standards.
  • Keywords
    authorisation; cryptographic protocols; middleware; program verification; quality of service; HIP authentication process; IPsec; address mapping; cryptographic namespace; end host authentication; end host authorization; end to end communication; hash chain based authorization token; host identity protocol; identity verification; middleboxes; network intrusion; network resources; network traffic; packet forwarding; quality of service; Authentication; Authorization; Communication system traffic control; Cryptographic protocols; Cryptography; Filters; Hip; Intrusion detection; Middleboxes; Payloads;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications, 2009. ICC '09. IEEE International Conference on
  • Conference_Location
    Dresden
  • ISSN
    1938-1883
  • Print_ISBN
    978-1-4244-3435-0
  • Electronic_ISBN
    1938-1883
  • Type

    conf

  • DOI
    10.1109/ICC.2009.5198984
  • Filename
    5198984