Borza/Vie ga Secure Device Identity Tutor ialSecure Device Identity TutorialMik e Bo rzaJohn Viegawith Charles QiK aren Zelenko2005-07-18 Page 1Borza/Vie ga Secure Device Identity Tutor ialA genda● Secure Device Identity – 100,000 foot view● The 5 criteria● The 10,000 foot view● Related technologies● Related presentations–Charles Qi, Broadcom Broadsafe HSM–Karen Zelenko – Phoe nix Technologies security modules2005-07-18 Page 2Borza/Vie ga Secure Device Identity Tutor ialThe 100,000 Fo ot View2005-07-18 Page 3Borza/Vie ga Secure Device Identity Tutor ialWhat is it?● Unique per-device identifiers –M ethod or methods for authenticating that the device is uniquely bound to that identifier–M anufacturing ID may be augmented with Locally Significant Ide ntity (LSID )● What is a device?– “Anything with an identity” – Nor m Finn ● Distributed trust model, no central registry–no extra administration or cost within IEEE to implement2005-07-18 Page 4Borza/Vie ga Secure Device Identity Tutor ialWhy is it needed?● No standard ways to identify devices across network architectures● MA C addresses are not sufficient–M ultiple per device–Reconfigurable–Not cryptographically bound● Device identity is important for completing chains of trust–Closes a significant window of vulnerability2005-07-18 Page 5Borza/Vie ga Secure Device Identity Tutor ialWhere will it be used?● Network equipment provisioning● Identification of devices joining a ...
●Unique per-device identifiers –Method or methods for authenticating that the device is uniquely bound to that identifier –Manufacturing ID may be augmented with Locally Significant Identity (LSID) ●What is a device?
–“Anything with an identity”– Norm Finn ●Distributed trust model, no central registry
–no extra administration or cost within IEEE to implement
2005-07-18
Page 4
Borza/Viega
Why is it needed?
Secure Device Identity Tutorial
●No standard ways to identify devices across network architectures ●MAC addresses are not sufficient –Multiple per device –Reconfigurable –Not cryptographically bound ●Device identity is important for completing chains of trust –Closes a significant window of vulnerability
2005-07-18
Page 5
Borza/Viega
● ● ● ● ● ● ●
Secure Device Identity Tutorial Where will it be used?
Network equipment provisioning Identification of devices joining a network Authenticated key exchange in other protocols –E.g., 802.1AF, 802.1X Inventory management Internal component identification LLDP chassis IDs …
2005-07-18
Page 6
Borza/Viega
2005-07-18
The 5 Criteria
Secure Device Identity Tutorial
Page 7
Borza/Viega
●
●
●
Secure Device Identity Tutorial
1 – Broad Market Potential
Potentially applicable in any 802 protocol
–also applicable to non-802 network protocols Specifically motivated by 802.1AE/AF need to authenticate network nodes
By intent, will be light and robust enough to implement in a vast range of network devices across the cost spectrum
2005-07-18
Page 8
Borza/Viega
2 – Compatibility
Will maintain compatibility with
●802 Overview and Architecture
●802.1D, 802.1Q, 802.1f
Secure Device Identity Tutorial
●Managed objects consistent with 802.1 practice
2005-07-18
Page 9
Borza/Viega
●
●
●
3 – Distinct Identity
Secure Device Identity Tutorial
No existing 802 standard provides this capability across different network architectures
A single framework will be defined
The standard will be self-contained and complete
2005-07-18
Page 10
Borza/Viega
●
●
Secure Device Identity Tutorial
4 – Technical Feasibility
Existing identity modules provide a proof-of-feasibility for the technology
No unknown functionality is envisaged to complete development of this standard