Abstract
When establishing a VPN to connect different sites of a network, the integrity of the involved VPN endpoints is often a major security concern. Based on the Trusted Platform Module (TPM), available in many computing platforms today, remote attestation mechanisms can be used to evaluate the internal state of remote endpoints automatically. However, existing protocols and extensions are either unsuited for use with IPsec or impose considerable additional implementation complexity and protocol overhead.
In this work, we propose an extension to the IPsec key exchange protocol IKEv2. Our extension (i) allows for continuous exchange of attestation data while the IPsec connection is running, (ii) supports highly efficient exchange of attestation data and (iii) requires minimal changes to the IKEv2 protocol logic. The extension is fully backwards compatible and mostly independent of the employed low-level attestation protocol. Our solution has much less overhead than the TCG TNC design, however, we also discuss integration with TNC deployments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (2008)
Kent, S., Seo, K.: Security Architecture for the Internet Protocol. RFC 4301 (2005)
Trusted Computing Group (TCG): Tcg homepage (2009), https://www.trustedcomputing.org
Trusted Computing Group: TCG Architecture Overview, v1.4 (2007)
Trusted Computing Group: TPM Main Specification, v1.2 (2005)
Microsoft TechNet: Bitlocker drive encryption technical overview (2008), http://technet.microsoft.com/en-us/library/cc732774.aspx
Sirrix AG security technologies: Homepage (2009), http://www.sirrix.com
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. Research Report RC23064, IBM Research (2004)
McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Seshadri, A.: Minimal TCB code execution. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA. Technical Committee on Security and Privacy, IEEE Computer Society, Los Alamitos (2007)
Chen, L., Landfermann, R., Loehr, H., Rohe, M., Sadeghi, A.R., Stüble, C.: A protocol for property-based attestation. In: [45]
Korthaus, R., Sadeghi, A.R., Stüble, C., Zhan, J.: A practical property-based bootstrap architecture. In: STC 2009: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 29–38. ACM, New York (2009)
Alam, M., Zhang, X., Nauman, M., Ali, T., Seifert, J.P.: Model-based behavioral attestation. In: SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 175–184. ACM, New York (2008)
Peng, G., Pan, X., Zhang, H., Fu, J.: Dynamic trustiness authentication framework based on software’s behavior integrity. In: 9th International Conference for Young Computer Scientists, pp. 2283–2288. IEEE Computer Society, Los Alamitos (2008)
Nauman, M., Alam, M., Zhang, X., Ali, T.: Remote attestation of attribute updates and information flows in a ucon system. In: [46], pp. 63–80
Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linux kernel integrity measurement using contextual inspection. In: [47], pp. 21–29
Petroni Jr., N.L., Hicks, M.: Automated detection of persistent kernel control-flow attacks. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 103–115. ACM, New York (2007)
Baiardi, F., Cilea, D., Sgandurra, D., Ceccarelli, F.: Measuring semantic integrity for remote attestation. In: [46], pp. 81–100
Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to RISC. In: CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security, pp. 27–38. ACM, New York (2008)
England, P., Lampson, B., Manferdelli, J., Peinado, M., Willman, B.: A trusted open platform. IEEE Computer 36, 55–63 (2003)
EMSCB Project Consortium: The European Multilaterally Secure Computing Base (EMSCB) project (2004), http://www.emscb.org
The OpenTC Project Consortium: The Open Trusted Computing (OpenTC) project (2005), http://www.opentc.net
Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, IBM Research Division (2005)
Schulz, S., Sadeghi, A.R.: Secure VPNs for trusted computing environments. In: [46], pp. 197–216
Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: [45], pp. 21–24
Asokan, N., Ekberg, J.E., Sadeghi, A.R., Stüble, C., Wolf, M.: Enabling Fairer Digital Rights Management with Trusted Computing. Research Report HGI-TR-2007-002, Horst-Görtz-Institute for IT-Security (2007)
Stumpf, F., Tafreschi, O., Röder, P., Eckert, C.: A robust integrity reporting protocol for remote attestation. Revised version (2006)
Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Asokan, N.: Beyond secure channels. In: [47], pp. 30–40
Armknecht, F., Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Ramunno, G., Vernizzi, D.: An efficient implementation of trusted channels based on OpenSSL. In: Xu, S., Nita-Rotaru, C., Seifert, J.P. (eds.) STC, pp. 41–50. ACM, New York (2008)
Trusted Computing Group: TNC IF-T: Protocol Bindings for Tunneled EAP Methods, v1.1 (2007)
Kaufman, C.: Internet Key Exchange (IKEv2) Protocol. RFC 4306 (2005)
Trusted Computing Group: Subject Key Attestation Evidence Extension, v1.0 (2005)
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (1997)
Paterson, K.G.: A Cryptographic Tour of the IPsec Standards (2006), http://citeseer.ist.psu.edu/737404.html
Doraswamy, N., Harkins, D.: IPsec: The new Security Standard for the Internet, Intranets and Virtual Private Networks, 2nd edn. Prentice-Hall, Englewood Cliffs (2003)
Trusted Computing Group: TNC IF-TNCCS: Trusted Network Connect Client-Server, v1.2 (2009)
Kent, S.: IP Encapsulating Security Payload (ESP). RFC 4303 (2005)
Chen, L., Löhr, H., Manulis, M., Sadeghi, A.R.: Property-based attestation without a trusted third party. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 31–46. Springer, Heidelberg (2008)
Trusted Computing Group: TNC Architecture for Interoperability, v1.3 (2008)
Trusted Computing Group: TNC TNC IF-IMC Specification, v1.2 (2007)
Trusted Computing Group: TNC TNC IF-IMV Specification, v1.2 (2007)
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). RFC 3748 (2004) (Updated by RFC 5247)
Trusted Computing Group: TNC IF-T: Binding to TLS, v1.0 (2009)
Pfitzmann, B., Riordan, J., Stüble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. In: Fox, D., Köhntopp, M., Pfitzmann, A. (eds.) VIS 2001, Sicherheit in komplexen IT-Infrastrukturen, pp. 1–18. DuD Fachbeiträge, Vieweg Verlag (2001)
Alkassar, A., Stüble, C.: Die Sicherheitsplattform Turaya, pp. 86–96. Vieweg+Teubner (2008) (German)
Juels, A., Tsudik, G., Xu, S., Yung, M. (eds.): Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006). ACM Press, New York (2006)
Chen, L., Mitchell, C.J., Martin, A. (eds.): Trust 2009. LNCS, vol. 5471. Springer, Heidelberg (2009)
Ning, P., Atluri, V., Xu, S., Yung, M. (eds.): Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2007). ACM Press, New York (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sadeghi, AR., Schulz, S. (2010). Extending IPsec for Efficient Remote Attestation. In: Sion, R., et al. Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6054. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14992-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-14992-4_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14991-7
Online ISBN: 978-3-642-14992-4
eBook Packages: Computer ScienceComputer Science (R0)